Compex NetPassage WPP54AG User Manual

Wireless-ag 54mbps xr outdoor access point
Table of Contents

Advertisement

Quick Links

USER'S MANUAL
COMPEX
NETPASSAGE SERIES
WPP54AG
WPP54AG
WPP54AG
WPP54AG
WPP54AG
Manual Number: U-0486-V1.2C

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NetPassage WPP54AG and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Compex NetPassage WPP54AG

  • Page 1 USER’S MANUAL COMPEX NETPASSAGE SERIES WPP54AG WPP54AG WPP54AG WPP54AG WPP54AG Manual Number: U-0486-V1.2C...
  • Page 2: Trademark Information

    Compex, Inc. may make improvements and/or changes to the product and/or specifications of the product described in this manual, without prior notice. Compex, Inc will not be liable for any technical inaccuracies or typographical errors found in this guide. Changes are periodically made to the information contained herein and will be incorporated into later versions of the manual.
  • Page 3: Fcc Notice

    FCC NOTICE This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 4 Product Name: Compex Wireless-AG 54Mbps XR Managed Access Point (compatible with Compex PoE Plus) Model No.: Compex WPP54AG conforms to the following Product Standards: Radiated Emission Standards: ETSI EN 300 328-2: July 2000; FCC: 47 CFR Part 15, Subpart B, ANSI C63.4-1992; 47 CFR Part 15, Subpart C (Section 15.247), ANSI C63.4-1992.
  • Page 5: Technical Support Information

    The warranty information and registration form are found in the Quick Install Guide. For technical support, you may contact Compex or its subsidiaries. For your convenience, you may also seek technical assistance from the local distributor, or from the authorized dealer/reseller that you have purchased this product from.
  • Page 6: About This Document

    About This Document The product described in this document, Wireless Access Point, Compex WPP54AG is a licensed product of Compex Systems Pte Ltd. This document contains instructions for installing, configuring and using Access point. It also gives an overview of the key applications and the networking concepts with respect to the product.
  • Page 7: Conventions

    Conventions In this document, special conventions are used to help and present the information clearly. The Wireless Access Point with PoE is often referred to as WPP54AG or access point or AP in this document. Below is a list of conventions used throughout.
  • Page 8: Table Of Contents

    Copyrights © 2006 Compex Systems Pte Ltd ..............i Trademark Information ..................... i Disclaimer ..........................i Your Feedback........................i FCC NOTICE ........................ii Declaration of Conformity ....................ii Technical Support Information ..................iii About This Document...................... iv How to Use this Document ..................... iv Firmware ..........................
  • Page 9 CHAPTER 4: COMMON CONFIGURATION ......33 Management Port Setup..................33 Setting up your LAN ..................34 To view the active DHCP leases ..............37 To reserve specific IP addresses for predetermined DHCP clients..38 WLAN Setup ......................41 To configure the Basic setup of the wireless mode ........42 To configure the Security setup of the wireless mode.......
  • Page 10 CHAPTER 7: ADVANCED CONFIGURATION ......125 Routing........................125 To configure Static Routing of Compex WPP54AG ......... 126 NAT..........................127 To configure Virtual Servers based on De-Militarized Zone Host ... 128 To configure Virtual Servers based on Port Forwarding ......130 To configure Virtual Servers based on IP Forwarding ......133 Bandwidth Control....................
  • Page 11 System Clock Setup ..................168 Firmware Upgrade ..................169 Backup or Reset Settings ................171 Reboot System....................174 Change Password..................175 Logout ......................176 Using the HELP menu ................... 177 Get Technical Support ..................177 About System....................178 APPENDIX I: FIRMWARE RECOVERY ........179 APPENDIX II: TCP/IP CONFIGURATION ........181 For Windows 95/98/98SE/ME/NT ..............
  • Page 12: Chapter 1: Product Overview

    The WPP54AG Wireless-AG 54Mbps XR™ Outdoor Access Point is a high- performance AP designed for enterprise and outdoor users. WPP54AG is compatible with IEEE 802.11a/b/g and supports high-speed data transmission of up to 54Mbps at in both the 2.4GHz and the 5GHz frequency bands.
  • Page 13 LAN, while maintaining full access to the establishment’s resources. WPP54AG also incorporates unique features from Compex such as – the Parallel Broadband feature that allows bandwidth aggregation and fail- over redundancy capability. It uses Spanning Tree Protocol (STP) that provides the wireless network with extra redundancy and reliability.
  • Page 14: Features And Benefits

    Compex WPP54AG has been designed for high performance and offers a rich suite of features, with which you should acquaint yourself to be able to exploit your Compex WPP54AG’s full potential. • • This feature allows linking of several access points, virtually creating a larger network infrastructure that allows mobile users to roam wirelessly, while still being able to access network resources.
  • Page 15 • • NetPassage WPP54AG supports HTTPS (SSL) in addition to the standard HTTP. HTTP (SSL) features additional authentication and encryption for secure communication. •...
  • Page 16: When To Use Which Mode

    The access point is versatile in the sense that it may operate in seven different types of modes: Access Point Mode, Client Mode, Point to Point, Point to Multiple Point, Wireless Routing Client and Gateway. This section presents a brief outline of the different network applications that can be accommodated through the different modes of the access point.
  • Page 17: Access Point Client Mode

    - allowing them to communicate with all devices connected at the Ethernet port of the NetPassage WPP54AG. In the example above, the workgroup PCs will be able to access the printer...
  • Page 18: Point To Point Mode

    In Point to Point mode, the access point allows point-to-point communication between different buildings. It enables you to bridge wireless clients that are kilometres apart while unifying the networks. In the example above, you may configure two access points (AP) to perform transparent bridging between two buildings...
  • Page 19: Point To Multiple Point Mode

    In Point to Multiple Point mode, this mode is similar to that of the Point-to-Point mode. But the access point located at one facility is able to connect to up to 8 access points (AP) installed in any direction from that facility. The above illustration describes how this mode operates.
  • Page 20: Wireless Routing Client Mode

    An application of this mode would be for the Ethernet port of the Wireless Routing Client to be used for connection with other devices on the network while access Internet would achieved through wireless communication with wireless ISP. The above illustration describes how this mode operates.
  • Page 21: Gateway Mode

    Or put it more simply, Broadband Internet sharing in a wireless network! Since the access point supports several types of broadband connections, the first step in setting up the access point as a Broadband Internet Gateway is to identify the type of broadband Internet access you are subscribed to.
  • Page 22 Static IP address Use this type of connection if you have subscribed to a fixed IP address or to a range of fixed IP addresses from your Internet Service Provider. Dynamic IP address When powered using this type of connection, the access point requests for an IP address which will be automatically assigned to it by your Internet Service Provider.
  • Page 23: Wireless Adapter Mode

    Similarly to the Access Point Client mode, the access point used in this mode, is able to communicate wirelessly with another access point to perform transparent bridging between two networks. However here, the Wireless Adapter connects a single wired workstation only. No client software or drivers are required while using this mode.
  • Page 24: Chapter 2: Hardware Installation

    TCP/IP protocol is installed and IP address parameters are properly configured on all your network’s nodes You can install your Compex WPP54AG either onto the wall or mount it on a pole. The two mounting methods will be described as shown below.
  • Page 25: Method One: Mounting On The Wall

    4 holes into the wall. Next, secure the brackets to the wall as shown in the figure on the right. Align the main unit of Compex WPP54 with the bracket to attach them as shown in the figure.
  • Page 26 Connect one end of an RJ45 Ethernet cable to the LAN OUT port of the Injector and the other end to Ethernet Port 1 of Compex WPP54. Maximum length RJ45 Category 5 cable is 100 metres. Next, connect your SMA antenna (not provided) to the SMA reverse connector.
  • Page 27 PC you will use to configure the WPP54. Connect the power adapter in the Compex PoE kit (not provided) to the main electrical supply and the power plug into the socket of the injector.
  • Page 28: Method Two: Mounting On The Pole

    Place the straps through the slots in the bracket and then around the pole. Tighten the straps. Align the main unit of Compex WPP54 with the bracket to attach them as shown in the figure.
  • Page 29 Connect one end of an RJ45 Ethernet cable to the LAN OUT port of the Injector and the other end to Ethernet Port 1 of Compex WPP54. Maximum length RJ45 Category 5 cable is 100 metres.
  • Page 30 PC you will use to configure the WPP54. Connect the power adapter in the Compex PoE kit (not provided) to the main electrical supply and the power plug into the socket of the injector.
  • Page 31: Chapter 3: Access To Web-Based Interface

    2 to 254, so that it is in the same subnet as Access point. Compex has developed a powerful uConfig utility that has been designed to give you direct access to the Web interface. Insert the Product CD into your CD-ROM drive. The CD will run automatically.
  • Page 32 When the utility has been installed, double-click on the icon. The following screen will appear, click on the button to proceed. Select in the section and click on button. To retrieve and display the latest device(s) in the list, click on the button.
  • Page 33 Do not exit the uConfig program while accessing to the web-based interface. This will disconnect you from the device. Click on the button to proceed. At the login page, press the button to enter the configuration page. The default password is “password”.
  • Page 34 You will then reach the home page of your access point’s web-based interface.
  • Page 35: Manual Access To Web-Based Interface Via Internet Explorer

    For this method, you need to assign an IP address to your PC so that it belongs to the same subnet as your access point. In this example, we are using Windows XP for illustration. For Windows 98/98SE/2000/NT/ME, kindly refer to Appendix II “TCP/IP Configuration”.
  • Page 36 Highlight and click on the button. Select the radio button for . Enter the IP Address and Subnet Mask as 192.168.168.x and 255.255.255.0, where x can be any number from 2 to 254, except 1. In this example, we are using 192.168.168.160 as the static IP Address.
  • Page 37 Click on the button to close all windows. Next, in order to check if the IP address has been correctly assigned to your PC, go to menu, , select and type the command ipconfig/all. Your PC is now ready to configure your access point. Launch your Web browser.
  • Page 38 Open the tab and in the section, disable all the option boxes. Click on the button to update the changes. At the bar, enter http://192.168.168.1 and press on your keyboard. At the login page, click on the button to enter the configuration pages.
  • Page 39 You will then reach the home page of your access point’s Web interface.
  • Page 40: Chapter 4: Common Configuration

    This chapter illustrates the following features, which are available in ALL the operating modes of your access point, unless stated otherwise. • • • • • • • • • • • • • • This section shows you how to customize the parameters of your access point to suit the needs of your network.
  • Page 41: Setting Up Your Lan

    You can opt to adjust the default values of your access point and customize them to your network settings. Click on from the menu. In the page, refer to the table below to replace the default settings of Access point with appropriate values to suit the needs of your network.
  • Page 42 This table describes the parameters that can be modified in the Management Port Setup page. Parameters Description IP Address When the DHCP server of the access point is enabled (unless you set a different DHCP Gateway IP Address), this LAN IP Address would be allocated as the Default Gateway of the DHCP client.
  • Page 43 Parameters Description DHCP Gateway IP Though usually, the DHCP server also acts as the Default Address Gateway of the DHCP client, the access point gives you the option to define a different Gateway IP Address, which will be allocated as the Default Gateway IP of the DHCP client. The DHCP client will thus receive its dynamic IP address from the access point but will access to the Internet or to the other LAN through the Default Gateway defined by the DHCP Gateway IP...
  • Page 44: To View The Active Dhcp Leases

    The following will guide you to a page display of the active IP address leases that have been allocated by the built-in DHCP server of Access point. Click on from the menu. Go to the section, click on the button. The DHCP Active Leases table displays: •...
  • Page 45: To Reserve Specific Ip Addresses For Predetermined Dhcp Clients

    Making an IP address reservation lets you inform the DHCP server to exclude that specific address from the pool of free IP addresses it draws on for dynamic IP address allocation. For instance, if you set up a publicly accessible FTP/HTTP server within your private LAN, while that server would require a fixed IP address, you would still want the DHCP server to dynamically allocate IP addresses to the rest of the PCs on the LAN.
  • Page 46 Fill in: The host portion of the IP Address to reserve. The Hardware Address, in pairs of two hex values Press the button to make your new entry effective. page will then be refreshed to illustrate the currently reserved IP addresses.
  • Page 47 If you do not need the DHCP server to reserve an IP address anymore, you can delete the DHCP Server Reservation. Click on the reserved IP address that you wish to delete, e.g. 192.168.168.20. Click on the button. table will then be refreshed to reflect your changes.
  • Page 48: Wlan Setup

    This section shows how to perform the following functions: Basic: This function performs a basic setup of the wireless modes of operation: Access Point mode, Access Point Client mode and other operating modes. Security: This function performs data encryption and protection for the access point. Kindly refer to Chapter 5 on WLAN Security for details.
  • Page 49: To Configure The Basic Setup Of The Wireless Mode

    The following will guide you to configure the basic setup of the wireless mode you have selected. Click on from the menu. You will see the sub- menus expanded under . Click on The default operating mode of Access point is the Access Point mode.
  • Page 50 If you wish to change the current mode of your access point, click on , select your and click on the button to access the setup page of your selected mode. Then you are prompted to reboot the access point so as to effect the mode setting.
  • Page 51 Enter the parameters in their respective fields, click on the button and reboot your device to let your changes take effect. Note that the page for the Client mode is different from that of the Access Point mode. If you wish to set the access point in the mode, click on to select , and then you will see the page below.
  • Page 52 If you wish to set the access point in the mode, click on to select , and then you will see the page below. To create a new peer MAC, click on the button. The page will appear. ( Please take note that PtMP stands for Point to Multiple Point ). Click on , and then you are prompted to key in...
  • Page 53 This table describes the parameters that can be modified in the page. Parameters Description The Current Mode The default operating mode of the access point is the Access Point mode. The access point can operate in 7 modes: • Access Point •...
  • Page 54 • • This mode supports both wireless B and G clients. • • This mode supports wireless-G clients that offer transmission rates of up to 54Mbps in the 2.4GHz frequency band. Peer Mac ( Only in This mode can support more than one access point. This Point-to-Point feature allows you to create a new peer MAC for mode )
  • Page 55 In the page, click on the button. provides a list of the neighbouring access points detected, (channels), (Authentication), (Algorithm) used, and the strength of the received.
  • Page 56 To connect the WPP54AG-client to one of the access points detected: Select the radio button corresponding to the access point you want to connect to. Click on the button to effect the change and return to the setup page. Click on the button to update this screen.
  • Page 57 NOTE The purpose of using Site Survey is to scan and display all access points based on the current security setting of your access point. For instance, the following information supplied by the Site Survey according to the security setting is explained: •...
  • Page 58 To view the connection status when WPP54AG-client is linked to another access point, click on the button. table illustrates the following data: This table describes the parameters that can be viewed from the page. Parameters Description State Refers to the MAC address of the BSS (AP to which the WPP54AG-client is connected).
  • Page 59 Channel Survey provides a list of all channels that are supported by the access point. This feature will show relative interference of all channels and recommend the least congested channel. When the users want to scan for and find the best channel, they can use Channel Survey.
  • Page 60 The values indicate the level of interference. The higher the value, the higher the interference. If the value is zero, there is no interference. To connect the WPP54AG-client to one of the channels detected, select the radio button corresponding to the channel you want to connect to. Click on the button to effect the change and return to the setup page.
  • Page 61 This table describes the read-only parameters of all channels that can be viewed from the Channel Survey page. Parameters Description Freq Refers to the frequency of the channel at which your access point is operating. Channel Refers to the channel of the access point being used for transmission depending on its origin of country.
  • Page 62 The Antenna Alignment feature in the access point is designed to precisely align the antenna over such a long distance so that the connectivity communication between your access point and another remote or neighbouring access point could be improved as indicated by higher signal strength.
  • Page 63 NOTE If no MAC address is entered, the Antenna Alignment tool will make use of the SSID to align the antenna. Please make sure that the correct SSID is entered. If more than one access point (AP) share the same SSID, the Antenna Alignment tool will show the strongest signal AP.
  • Page 64: To Configure The Security Setup Of The Wireless Mode

    Kindly refer to Chapter 5 on WLAN Security for details on setting the different security modes of the access point. The following will guide you to configure the advanced setup of the wireless mode you have selected. Click on from the menu to expand into the four sub-menus.
  • Page 65 This table describes the parameters that can be modified in the page. Parameters Description Beacon Interval The Beacon Interval is the amount of time between (Only in Access beacon transmissions. A beacon is a guidance signal Point mode) sent by the access point to announce its presence to other devices in the network.
  • Page 66: Statistics

    Antenna Control The Antenna Control function allows you to control whether to use the: • External antenna (Default) • Internal antenna NOTE The values illustrated in the examples are suggested values for their respective parameters. The following shows you the information on the wireless device that is connected to the WLAN.
  • Page 67 To check the details on individual wireless client, click on the MAC Address in the WLAN Station List. The following screen will show the statistics of the selected wireless client.
  • Page 68 Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
  • Page 69 Click on from the menu. You will see the sub- menus expanded under . Click on...
  • Page 70 Click on from the menu. You will see the sub- menus expanded under . Click on...
  • Page 71 Click on from the menu. You will see the sub- menus expanded under . Click on...
  • Page 72 Click on from the menu. You will see the sub- menus expanded under . Click on To view the statistics information if a wireless client connected to the AP, click on the MAC address of that client.
  • Page 73: Wan Setup

    (only supported by Wireless Routing Client and Gateway) A correct WAN Setup allows you to successfully share your Internet connection among the wired and wireless clients of the access point. To do so, you need to identify the type of broadband Internet access you are subscribed to. If you are using : •...
  • Page 74 Step 3: Simply select and hit the button. Please remember to click under and hit button to let the settings take effect. Note: Additional configuration might be required before your ISP will allocate an IP address to the access point. Certain ISPs require authentication through a DHCP Client ID before releasing a public IP address to you.
  • Page 75 Please remember to click under and hit button to let the settings take effect.
  • Page 76 WAN Setup - Cable Internet with Static IP Assignment If you have an ISP that leases a static WAN IP for your subscription, you will need to configure your access point’s WAN type accordingly. For example, if the ISP provided you with the following setup information, you can set up your WAN as described below: IP Address 203.120.12.240...
  • Page 77 WAN Setup - ADSL Internet using PPP over Ethernet (PPPoE) If you subscribe to an ADSL service using PPP over Ethernet (PPPoE) authentication, you can set up your access point’s WAN type as follows. For example, you may configure an account whose username is ‘guest’ as described below: Step 1: Under...
  • Page 78 You can limit the maximum size a packet can be in a network by setting the (Maximum Transmissible Unit). Click the Button in has a range of 1 to 1492. Enter the and click...
  • Page 79 WAN Setup – ADSL Internet using PPTP If you subscribe to an ADSL service using Point-to-Point Tunneling Protocol (PPTP) authentication, you can set up your access point’s WAN type from the steps that follow. For example, if the ISP provided you with the following set up information, you can set up your WAN as described below: IP Address 203.120.12.47...
  • Page 80 WAN Setup – L2TP If you’re using Layer 2 Tunneling Protocol (L2TP) authentication, you can set up your access point’s WAN type from the steps that follow. For example, if the ISP provided you with the following set up information, you can set up your WAN as described below: IP Address 203.120.12.47...
  • Page 81: Telnet/Ssh Setup

    Telnet allows a computer to remotely connect to the NetPassage WPP54AG CLI (Command Line Interface) for control and monitoring. SSH (Secure Shell Host) establishes a secure host connection to the NetPassage WPP54AG CLI for control and monitoring. Telnet/SSH Setup Click...
  • Page 82 To enable Telnet Server: Select Telnet Server Enable and enter the Port Number. To enable SSH server: Select SSH Server Enable and enter the Port Number. Click Apply. To add user: 1. Click Add button. 2. In Add User Entry Page, enter User Name, Password, and specify whether user is granted permission to Read Only or Read/Write.
  • Page 83 To Delete User: 1. Select which user to Delete. 2. Click Delete. User Management list refreshes to update users. To Refresh User Management list: Click Refresh to refresh User Management list.
  • Page 84: Telnet Command Line Interface

    Telnet CLI (Command Line Interface) The user may connect to the CLI (Command Line Interface) via a TELNET session to the default IP, 192.168.168.1. This section uses Microsoft TELNET command for instruction. You may use any TELNET client. Connecting to CLI (Command Line Interface) via TELNET Connect to CLI (Command Line Interface) with the following command at DOS prompt.
  • Page 85: Ssh Command Line Interface

    SSH CLI (Secure Shell Host Command Line Interface) SSH is designed and created to provide the best security when accessing another computer remotely. Not only does it encrypt the session, it also provides better authentication facilities and features that increase the security of other protocols. It can use different forms of encryption and ciphers.
  • Page 86 SSH CLI has a command line interface like shown below for example. NOTE Please refer to Appendix V for the list of commands available at the console.
  • Page 87: Web Management Setup

    NetPassage WPP54AG supports HTTPS (SSL) in addition to the standard HTTP. HTTPS (SSL) features additional authentication and encryption for secure communication. Web Management Setup Select Web Management Setup from the CONFIGURATION menu. Select whether to set web server to HTTP or HTTPS (SSL) mode.
  • Page 88: Snmp Setup

    Simple Network Management Protocol (SNMP) is a set of communication protocols that separates the management architecture from the architecture of the hardware devices. Step 1: Click on from the menu. Step 2: Select from the drop-down list. The default is set to public while the default is private.
  • Page 89: Stp Setup

    (Only available in Access Point, Point to Point and Point to Multiple Point modes) Spanning Tree Protocol (STP) is a link management protocol that helps to prevent undesirable loops occurs in the network. For an Ethernet network to function properly, only one active path can exist between two stations. If a loop exists in the network topology, duplication of messages will occur and this might confuse the forwarding algorithm and allow duplicate frames to be forwarded.
  • Page 90 In short, the main purpose of activating STP is to prevent looping when you have redundant paths in the network. Without activating STP, redundant topology will cause broadcast storming. To establish path redundancy, STP creates a tree that spans all of the devices in an extended network, forcing redundant paths into a standby, or blocked, state, but establishing the redundant links as a backup in case the active link should fail.
  • Page 91 The path with the smallest cost will be used and extra redundant paths will be disabled. To explain the effect of STP & Pseudo VLAN on the wireless clients, we will compare 3 separate scenarios. Scenario #1 – (No STP, No Pseudo VLAN) Referring to the illustration below, if the Spanning Tree Protocol (STP) and Pseudo VLAN are not implemented in a network, all clients (Notebook#1, #2, #3 &...
  • Page 92 Scenario #2 – (With STP, No Pseudo VLAN) When STP is enabled, extra redundant network paths between APs will be disabled, hence preventing multiple active network paths in-between any two APs. If one of the APs is down, the STP algorithm will reactivate one of the redundant paths so that the network connection will not be lost.
  • Page 93 Scenario #3 – (With STP and Pseudo VLAN) In this example, both STP and Pseudo VLAN Per Node are implemented in this network. When Pseudo VLAN Per Node is activated, the wireless users will be unable to access one another.
  • Page 94 Click on from the menu. Select from the radio button, fill in the fields, and click on button to update the changes. Priority: (Default: 32768, Range: 0 – 65535) This is the relative priority. The lowest priority will be elected as the root. Hello Time: (Default: 2, Range: 1 –...
  • Page 95: Mac Filtering

    MAC Filtering acts as a security measure by controlling the users accessing to the network through their MAC address. Each WLAN or radio card supports up to 16 virtual access points and has its own MAC address listing. The client MAC addresses entries can be set apply to all, or to only selected virtual access points.
  • Page 96: Add A Mac Address To The Mac Address List

    Select from MAC Address Filtering page displays. In this page you may also set the MAC Filtering Status to for access points and set the Policy to either addresses. MAC Filtering set to with Policy to only the MAC addresses in the MAC Filter Address List and deny all other MAC addresses.
  • Page 97 MAC Filter Address List page displays. Click the button. Add MAC Address page displays.
  • Page 98 Enter the MAC Address of the client in the format xx-xx-xx-xx-xx-xx, where x can take any value in the range 0-9 or a-f. Enter the Comment. This describes the MAC Address you have entered. To apply to all virtual access points: Check To apply to specific virtual access point: Select the checkbox of the corresponding Click the button.
  • Page 99: Delete A Mac Address From All Access Points

    NOTE Please reboot to effect all changes and new MAC address entries. Select from MAC Address Filtering page displays. Click (This displays the MAC Address List of the radio card.)
  • Page 100 MAC Filter Address List page displays. Select the checkbox of the MAC address you wish to delete. Click the button. MAC Filter Address List page displays with updated MAC Address List.
  • Page 101: Delete A Mac Address From Individual Access Point

    Select from MAC Address Filtering page displays. Click for the corresponding access point.
  • Page 102 MAC Filter Address List page displays. Select the checkbox of the MAC address you wish to delete. Click the button. MAC Filter Address List page displays with updated MAC Address List.
  • Page 103: Edit Mac Address From The Mac Address List

    Select from MAC Address Filtering page displays. Click MAC Filter Address List page displays. Select the MAC address to edit.
  • Page 104 The Edit MAC Address page displays. Edit the MAC address settings accordingly. Click MAC Filter Address List page displays with updated MAC Address List.
  • Page 105: Chapter 5: Wlan Security

    This section illustrates how to make your WLAN more secure. All the nodes in your network MUST share the same wireless settings to be able to communicate. We will illustrate how to configure each type of security mode individually. To start with, follow the common preliminary steps described below to select the most appropriate security approach for protecting your wireless communications.
  • Page 106: How To Set Up Wep

    The guidelines below will help you to set up your access point for using WEP. At the WEP Setup page,...
  • Page 107 Specify the , by selecting either: • • • • Select the from the pull down menu: • • • • • • • • The access point lets you define up to four different transmission keys. It defines a set of shared keys for network security. You must enter at least one WEP key to enable security using a shared key.
  • Page 108: How To Set Up Wpa-Personal

    (Only available in Access Point mode) The guidelines below will help you to set up the access point for using WPA- Personal. Please follow the steps below if you have activated WPA-Personal, WPA2-Personal or WPA-Personal-AUTO security modes. At the page, Specify the , by selecting either: •...
  • Page 109 For WPA-Personal Set the WPA replaces WEP with a strong encryption technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). For WPA2-Personal Set the Advanced Encryption Standard (AES) is a stronger symmetric 128-bit block data encryption technique. AES is a requirement of WPA2 under the IEEE 802.11i standard.
  • Page 110: How To Set Up 802.1X/Radius

    (Only available in Access Point mode) The guidelines below will help you to set up the access point for using 802.1x/RADIUS. At the IEEE 802.1x Setup page,...
  • Page 111 Key in the IP address of the in your WLAN. You can optionally add in the IP address of a , if any. The RADIUS authentication server MUST be in the same subnet as the access point. By default, the value for number is .
  • Page 112: How To Set Up Wpa Enterprise

    (Only Access Point mode supports WPA2-Enterprise and WPA-Enterprise-AUTO) The guidelines below will help you to set up the access point for using WPA- . Please follow the steps below if you have selected the Enterprise WPA or WPA1- , WPA2- or WPA- -AUTO.
  • Page 113 By default, the value for . You can leave this value as it is. This value must be set to be the same as the one in the RADIUS server. Enter the used to validate client-server RADIUS communications. Select the of each encryption key: •...
  • Page 114 Enter the This is the length of time after which the access point will automatically generate a new shared key to secure multicast/broadcast traffic among all stations that are communicating with it. By default, the value is 600 seconds. Press the button and reboot your system, after which your settings will become effective.
  • Page 115: Chapter 6: Wireless Extended Features

    When operating in the Access Point mode, Access point allows you to define Wireless Pseudo VLAN Per Node and Wireless Pseudo VLAN Per Group. To learn more about Compex’s exclusive Wireless Pseudo VLAN, please refer to the white paper available online at www.cpx.com or www.compex.com.sg.
  • Page 116: Wireless Pseudo Vlan Per Node

    When implemented, this mode isolates each wireless client into its own pseudo VLAN. Wireless clients can therefore access resources on the wired network but are unable to see each other or access each other’s data.
  • Page 117 The following steps demonstrate how to set up a Wireless Pseudo VLAN per Node. From under Configuration, click on , which shows the page. Go to the section, and click on the button. function is disabled by default. Click on the button to make your selection of the type of Pseudo VLAN to implement.
  • Page 118 Select the radio button and click on the button. The Wireless Pseudo VLAN has configured as Per node.
  • Page 119: Wireless Pseudo Vlan Per Group

    The access point can configure up to 32 ‘groups’ of wireless clients identified by their MAC address. Whenever a wireless client requests network access, the access point will first verify whether its MAC address is present in any of the Pseudo VLAN groups.
  • Page 120 The following steps demonstrate how to set up Wireless Pseudo VLAN Groups. From the page, select and click on the button. Click on the button to create a client in the Wireless Pseudo VLAN group.
  • Page 121 Select a group number from the drop-down list. Fill in the field with the MAC address of the client in the format , where x is any value within the range 0-9 or a-f. Click on the button to update the changes. The Pseudo VLAN group has been added to the list as shown below.
  • Page 122 Follow the procedures mentioned in Steps 3-5. You can create up to 32 members per Wireless Pseudo VLAN group. Click on the in the table as shown below. From the page, Click on the button to remove the client from the group, or Click on the button after you had edited the entry.
  • Page 123: Wireless Setup - The Wireless Distributed System

    (Only in Access Point mode) A wireless distribution system creates a wider network in which mobile users can roam while still staying connected to the available network resources by linking up several access points. In a WDS, the access point can drive a cell of wired and wireless clients while at the same time, connecting to other access points.
  • Page 124 Chain Configuration WDS A chain configuration WDS spans an area in length, for instance a long corridor. Satellite access points are chained together starting from a root access point. The access point at either end of the chain will have only one WDS link enabled, while the access points in the middle will have two WDS links configured to associate with the neighboring Access point upward and downward in the chain.
  • Page 125 The following steps will guide you in setting up WDS in your access point. From under Configuration, click on , which shows the page. Go to the section, and click on the button.
  • Page 126 As illustrated on the , the feature is disabled by default. Click on the button. From the page, select and click on the button. Click on the button to create a MAC address of a client.
  • Page 127 Fill up the field with the wireless MAC address of the device to include in your WDS, using the format xx-xx-xx-xx-xx-xx, where x can take any hexadecimal value 0-9 or a-f. Click on the button to update the table. From the page, notice that the MAC Address has been added to the table as shown below.
  • Page 128 Click on the in the table as shown below. From the page, Click on the button to remove the client from the WDS, or Click on the button after you have edited the entry.
  • Page 129: Long Distance Parameters

    This setup allows the access point to calculate and display suggested values for certain parameters to use to ensure that wireless communication takes place efficiently and effortlessly between physically distant APs. The following steps demonstrate how to configure the Long Distance Parameters. From under Configuration, click on , which shows the...
  • Page 130 As illustrated on the Setup page, the feature is disabled by default. Select from the pull down menu. The access point can automatically calculate the values of the parameters to input based on the distance between your access point and the other wireless device.
  • Page 131 You can enter the parameters according to the recommended values in the pop-up window, click on the button to update the changes. This table describes the parameters that can be modified in the Long Distance Parameters page. Parameters Description Outdoor The Outdoor parameter is disabled by default.
  • Page 132: Chapter 7: Advanced Configuration

    (only supported by Wireless Routing Client and Gateway) The access point allows the network administrator to add a static routing entry into its routing table so that the access point can re-route IP packets to another network access point. This feature is very useful for a network with more than one access point.
  • Page 133: To Configure Static Routing Of Compex Wpp54Ag

    In this network, the main office of subnet 192.168.168.0 contains two routers: the office is connected to the Internet via the access point (192.168.168.1) and to the remote office via NetPassage 16A (192.168.168.254). The remote office resides on a subnet 192.168.100.0. You may add a static routing entry into the access point’s routing tables so that IP packets from the clients in the main office with a destination IP address of 192.168.100.X (where X is any number from 2 to 254) will be routed to the...
  • Page 134: Nat

    When the entry is added, it is reflected in the (only supported by Wireless Routing Client and Gateway) The basic purpose of NAT is to share a single public IP address when there are multiple PCs in the private network by using different TCP ports to identify requests coming from different PCs.
  • Page 135: To Configure Virtual Servers Based On De-Militarized Zone Host

    Important: Do NOT disable NAT unless absolutely necessary. Disabling NAT will disable broadband Internet sharing effectively. Having gone through the NAT Technology Primer on the Product CD, you would now have a good understanding of how DMZ works to make a specific PC in an NAT-enabled network directly accessible from the Internet.
  • Page 136 Step 3: On the page, you have to define the of the DMZ host. In this example, we keyed in the private IP address for the PC we wish to place within the DMZ : 192.168.168.55 (Enter as the and it will disable DMZ). Remember click button.
  • Page 137: To Configure Virtual Servers Based On Port Forwarding

    Virtual Server based on Port Forwarding is implemented to forward Internet requests arriving at the access point’s WAN interface, based on their TCP ports, to specific PCs in the private network. If you require more information on this function, please refer to the NAT Technology Primer on the Product CD. Step 1: Under the command...
  • Page 138 Step 4: On the following screen, you can set up a Virtual Server for a type by selecting from a drop-down menu OR you can define a For a more detailed explanation, please refer to the NAT Technology Primer found on the Product CD. Technology Primer Learn more from our NAT...
  • Page 139 Known Server Server Type Select from the drop-down list of known server types: (HTTP, FTP, POP3 or Netmeeting). Private Specify the LAN IP address of your server PC running within Address the private network. Public IP Select All, Single, or Range from the dropdown list. From Enter the beginning of the range.
  • Page 140: To Configure Virtual Servers Based On Ip Forwarding

    When you have subscribed for more than one IP address from your ISP, you may define Virtual Servers based on IP Forwarding for which all Internet requests, regardless of ports, are forwarded to defined computers in the private network. If you require more information of its function, please refer to the NAT Technology Primer on the Product CD.
  • Page 141 Step 5: page will reflect your new addition. NOTE For step 3 above, please ensure that you have subscribed to the Public IP Address you intend to forward from.
  • Page 142: Bandwidth Control

    (only supported by Wireless Routing Client and Gateway) The access point is designed to support simple bandwidth management that makes use of the Bandwidth Control. This feature gives the administrator the choice to manage the bandwidth control of subscribers in case of massive data transfer that causes slowdown problems when surfing the Internet.
  • Page 143: To Configure Wan Bandwidth Control Setting

    Step 2: By default, is disabled. Select , followed by clicking button. The access point can allow you to limit the entire throughput by configuring the Upload / Download Bandwidth Setting option. These values should be set to a positive integer indicating the maximum number of kilobytes transferred per second that will be allowed.
  • Page 144: To Configure Lan Bandwidth Control Setting

    The access point can allow you to limit the LAN user’s throughput by configuring the Bandwidth Control Rule. Step 1: Under the command menu, click on select Step 2: Click to create the bandwidth rule for LAN user. Step 3: Click to create the rule for LAN user’s bandwidth control.
  • Page 145 This table describes the parameters that can be modified in the Add Bandwidth Control Entry page. Parameters Description Rule Name The rule describes the type of bandwidth traffic to be controlled and of a specification of what action to take when that bandwidth traffic is encountered.
  • Page 146: Remote Management

    (only supported by Wireless Routing Client and Gateway) The advanced network administrator will be delighted to know that remote management is supported on the access point. With this feature enabled, you will be able to access the access point’s web-based configuration pages from anywhere on the Internet and manage your home/office network remotely.
  • Page 147: Parallel Broadband

    (only supported by Gateway) The access point is equipped with the exclusive Parallel Broadband technology to provide scalable Internet bandwidth with Load Balancing and Fail-Over Redundancy. By installing multiple units of the access point cascaded using Parallel Broadband, you may balance the Internet traffic generated from your private network over multiple broadband connections - providing the network with aggregated bandwidth! In the event of a particular broadband connection failing, the access point in cascade will use the remaining functional...
  • Page 148: To Enable Parallel Broadband On Compex Wpp54Ag

    To learn more about Parallel Broadband, please read the whitepaper at www.cpx.com or www.compex.com.sg. Before you begin, ensure that each of the access point within the network is properly configured to connect to its individual broadband Internet account. Then ensure that either: •...
  • Page 149: Email Notification

    Important: If you have only one unit of the access point, you DO NOT need to implement the Parallel Broadband feature for broadband Internet sharing. The access point provides this feature to notify you by email when there is a change in the WAN IP address that was supplied to you earlier.
  • Page 150 • Email address of Receiver: This is the email address of the receiver to whom the message would be sent. • IP address of Email Server: This is the IP address of the SMTP server through which the message would be sent out.
  • Page 151: Static Address Translation

    (only supported by Wireless Routing Client and Gateway) If you use a notebook for work at the office, it is probable that you also bring it home to connect to the Internet and retrieve emails or surf the web. Since it is most likely that your office’s and your home’s broadband-sharing network subnets are differently configured, you would have to struggle with reconfiguring your TCP/IP settings each time you use the notebook in a different...
  • Page 152 Step 1: Under the command menu, click on Step 2: You may then choose to Static Address Translation here, followed by clicking the button. (Note: SAT is disabled by default)
  • Page 153: Dns Redirection

    (only supported by Wireless Routing Client and Gateway) When you enter a URL in your Internet browser, the browser requests for a name-to-IP address translation from the Domain Name System (DNS) servers to be able to locate the web server hosting the website you want to access.
  • Page 154 NOTE For Internet access, please do NOT leave the DNS Server field of the PC’s TCP/IP Properties blank. Simply key in any legal IP address for it (e.g. 10.10.10.10) even though you do not have the exact DNS IP address.
  • Page 155: To Enable/Disable Dns Redirection

    Step 1: Under the command menu, click on Step 2: Simply choose Step 3: Complete the setup by clicking the button. It is difficult to remember the IP addresses used by computers to communicate on the Internet. It gets even more complicated when ISPs change your public IP address regularly, as is the case when the Internet connection type is Dynamic IP or PPPoE with Dynamic IP.
  • Page 156: To Enable/Disable Dynamic Dns Setup

    Step 1: Under the command menu, click on Step 2: You may then choose to Dynamic here, followed by clicking the button. (Note: Dynamic DNS is disabled by default)
  • Page 157: To Manage Dynamic Dns List

    Step 1: Under the command menu, click on Step 2: If you have already created a list earlier, click on the button to update the list. Step 3: To add a new Dynamic DNS to the list, click on the Add button and you will see the page appear.
  • Page 158 To select 2MyDNS – Dynamic DNS Service Provider as DDNS Service Provider Step 1: Under the column in the check the radio button next to the – – . Then click on button to proceed. Step 2: Enter your Step 3: checkbox is ticked by default.
  • Page 159 would allowed multiple identities. example, register: users looking for www.mydomain.2mydns.net ftp.mydomain.2mydns.net can still reach your hostname. Step 5: (Optional) In the Mail Exchanger field, enter the Static WAN IP address mail server configured to handle email for your domain. Select to enable this service.
  • Page 160 To select DtDNS as DDNS Service Provider Step 1: Under the column in the table of check the radio button next to the . Then click on the button to proceed. Step 2: Enter your Step 3: checkbox is ticked by default.
  • Page 161 Step 5: In our example, while the new domain name, is being added to the list, the message ‘Waiting in queue…” will be displayed under the column of the table.
  • Page 162: Chapter 8: Security Configuration

    • This chapter describes the security configuration mainly found in the Wireless Routing Client and Gateway modes. As part of the comprehensive security package found on the access point, you may perform IP packet filtering to selectively allow/disallow certain applications from connecting to the Internet.
  • Page 163 Security Configuration Step 4: Click on the button and you will be able to define the details of your from the screen on the right. Enter Rule Name for this new 4a). packet filtering rule. example, BlockCS 4b). From the IP Address drop down list, select whether to...
  • Page 164 Security Configuration Here, you need only specify the source port in the (From) field. IP port You may here, leave both, the (From) as well as the (To) fields, blank. Here, the rule will apply to all ports. 4d). From the Day of the Week drop down list, select whether the rule should apply to:...
  • Page 165 Security Configuration Step 5: Click on the button to make the new rule effective. table will then be updated. Step 6: In this example, let us say we would like block application called CS from all PCs (any IP address within the network) from Monday to Friday 7am to 6pm, and this application is using the port number 27015.
  • Page 166: Url Filtering

    The access point supports URL Filtering, which allows you to easily set up rules to block objectionable web sites from your LAN users. Step 1: Under the command menu, click on Step 2: You may now define the by clicking the button.
  • Page 167: Firewall Configuration

    To learn more about SPI firewall, read our whitepaper at www.cpx.com or at www.compex.com.sg. he following steps explain the configuration of Compex’s SPI firewall. As incorrect configuration to the firewall can result in undesirable network behavior, you are advised to carefully plan your firewall security rules. Step 1:...
  • Page 168 Step 4: You may add more firewall rules for specific security purposes. Click on the radio button at the screen shown above, followed by the button and the screen on the left will appear. Rule Name Enter a unique name to identify this firewall rule. Disposition This parameter determines whether the packets obeying the rule Policy...
  • Page 169 ICMP Packet Type Description Echo request Determines whether an IP node (a host or a router) is available on the network. Echo reply Replies to an ICMP echo request. Destination Informs the host that a datagram cannot unreachable be delivered. Source quench Informs the host to lower the rate at which sends...
  • Page 170 range of IP addresses. Source Port You can control requests for using a specific application by entering its port number here. Users can either set a single port number or a range of port numbers. Destination Port This parameter determines the application from the specified destination port.
  • Page 171: Firewall Logs

    When the access point’s SPI firewall is in operation, valuable traffic patterns in your network will be captured and stored into the Firewall Logs. From these logs, you can extract detailed information about the type of data traffic, the time, the source and destination address/port as well as the action taken by the SPI firewall.
  • Page 172: Chapter 9: System Utilities

    This feature lets you determine whether your access point can communicate (ping) with another network host. This feature is available only for the Wireless Routing Client and Gateway modes. Step 1: Select under the command menu. Step 2: Enter the IP address of the target host where the target host you want the access point to ping to.
  • Page 173: Syslog

    Syslog allows remote system logging. You can setup Syslog with the following steps. Click on from the menu. Select to Enter the Enter the Click to make the changes.
  • Page 174: System Identity

    If your network operates with several access points, you would find it useful to have a means of identifying each individual device. You can define the System Identity of your access point to be uniquely identifiable as follows: Click on from the menu.
  • Page 175: System Clock Setup

    Click on from the menu. Select the appropriate time zone from the drop-down list. the Auto Time Setting (SNTP) radio button. stands for Simple Network Time Protocol and is used to synchronise computer clocks. Fill in the field and click on the button to effect the changes.
  • Page 176: Firmware Upgrade

    Keep your access point updated with the latest capabilities by downloading its latest firmware revision from either of Compex’s corporate web sites at www.compex.com.sg or www.cpx.com before following the next steps. You can check the types and version of your firmware by clicking on About System from the HELP menu.
  • Page 177 Follow the instructions given during the upgrading process. You need to reboot the system after the firmware upgrade. NOTE The firmware upgrade process must NOT be interrupted otherwise the device might become unusable.
  • Page 178: Backup Or Reset Settings

    You may choose to save the current configuration profile, to make a backup of it onto your hard disk, to restore an earlier profile saved on file or to reset the access point back to its default settings. Click on from the menu.
  • Page 179 Click on from the menu. If you want to back up the current settings of your access point onto your hard disk drive, click on the button. Next, save your configuration file to your local disk.
  • Page 180 Click on from the menu. If you want to store back the settings that you had previously saved, click on … button. Proceed to the folder where you saved your … configuration file. Click on the button and the system will prompt you to reboot your device.
  • Page 181: Reboot System

    Most of the changes you make to the system’s settings require a system reboot before the new parameters can take effect. Click on from the menu. Click on the button. Wait for the system to reboot and the login page will be displayed.
  • Page 182: Change Password

    It is recommended that you change the default login password, which is case sensitive and is set by default, to password. Click on from the menu. Key in the . The factory default is password. Enter the in the field as well as in the field.
  • Page 183: Logout

    To exit the Web interface, follow the next few steps. Click on from the menu. Click the button to access your access point’s configuration interface again.
  • Page 184: Using The Help Menu

    Click on from the menu. The access point is a feature-packed device. If you require further information than provided in the manual or data sheet, please contact one of Compex’s Technical Support Centres by mail, email, fax or telephone.
  • Page 185: About System

    The About System page displays a summary of your system configuration information. Support technicians might require specific information about your system data when they are troubleshooting your configuration. You can use the information displayed in this page to quickly find the data they need to resolve your system problem.
  • Page 186: Appendix I: Firmware Recovery

    Power the access point on, and then start up your computer. You are recommended to set your computer’s IP address to 192.168.168.100 and its network mask to 255.255.255.0. Insert the Compex WPP54AG Product CD into the CD drive of your computer.
  • Page 187 Firmware Recovery From the Start menu, click Run and type cmd. When the command prompt window appears, type in the following command: X:\recovery\TFTP -i 192.168.168.1 PUT image_name.IMG, where refers to your CD drive and image_name.IMG to the firmware filename found in the Recovery folder of the Product CD.
  • Page 188: Appendix Ii: Tcp/Ip Configuration

    Once the hardware has been set up, you need to assign an IP address to your PC so that it will be in the same subnet as the access point. By default, the access point’s IP address is 192.168.168.1; and its subnet mask is 255.255.255.0. You need to configure your PC’s IP address to 192.168.168.xxx;...
  • Page 189 Select radio button Specify an IP address. Enter the IP Address and Subnet Mask 192.168.168.X 255.255.255.0, where X can be any number from 2 to 254, except for 1. In this example, we are using 192.168.168.160 as the static IP Address.
  • Page 190 In order to check if the IP address has been assigned correctly to your PC, simply go to the Start menu, select Run, and enter the command winipcfg. Select your respective Ethernet Adapter from the drop down list and click OK. Now, your PC is now ready to communicate with your access point.
  • Page 191: For Windows Xp/2000

    Go to your desktop, right-click on My Network Places icon and select Properties. Go to your network adapter icon, right click and select to Properties. Highlight Internet Protocol (TCP/IP) and click on Properties button.
  • Page 192 Select the radio button for Use the following IP address. Enter the IP Address Subnet Mask 192.168.168.X 255.255.255.0, where X can be any number from 2 to 254, except for 1. In this example, we are using 192.168.168.160 as the static IP Address.
  • Page 193 Next, in order to check if the IP address has been correctly assigned to your PC, go to Start menu, Accessories, select Command Prompt and type the command ipconfig/all. Your PC is now ready to communicate with your access point.
  • Page 194: Appendix Iii: Panel Views & Description

    Power is supplied to the device. No power is supplied to the device. 10 ACT LED Steady Red The respective port has successfully connected to Compex WPP54AG. Blinking The respective port is transmitting or receiving data. No connection is established.
  • Page 195 100 ACT LED Steady Red The respective port has successfully connected to Compex WPP54AG. Blinking Red The respective port is transmitting or receiving data. No connection is established. WLAN LED Steady Red Wireless interface up and running. Ready for operation.
  • Page 196: Appendix Iv: Command Line Interface Commands

    Get Operation List SYNTAX DESCRIPTION Get tasks Display all active process/tasks. Get sysinfo Display system information. Get aplist Display list of access points discovered. Get athstats Display wireless driver information. Get brinfo Display bridge and interfaces information. Get brmacshow Display bridge learned MAC address list. Get bssinfo.
  • Page 197 TX Power SYNTAX DESCRIPTION Set txpower <string> (Default full) auto, 1, 2, 3, 4, ..., 17, full, min TX Rate SYNTAX DESCRIPTION Set txrate <string> Values are: (default auto) (802.11a)-- 6, 9, 12, 18, 24, 36, 48, 54, auto (802.11b/g mixed)-- 1, 2, 5,5, 11, 6, 9, 12, 18, 24, 36, 48, 54, auto (802.11b-only)-- 1, 2, 5.5, 11, auto Wireless Mode SYNTAX...
  • Page 198 {CTRY_CROATIA, "HR" }, {CTRY_CYPRUS, "CY" }, {CTRY_CZECH, "CZ" }, {CTRY_DENMARK, "DK" }, {CTRY_DOMINICAN_REPUBLIC, "DO" }, {CTRY_ECUADOR, "EC" }, {CTRY_EGYPT, "EG" }, {CTRY_EL_SALVADOR, "SV" }, {CTRY_ESTONIA, "EE" }, {CTRY_FINLAND, "FI" }, {CTRY_FRANCE, "FR" }, {CTRY_FRANCE2, "F2" }, {CTRY_GEORGIA, "GE" }, {CTRY_GERMANY, "DE"...
  • Page 199 {CTRY_QATAR, "QA" }, {CTRY_ROMANIA, "RO" }, {CTRY_RUSSIA, "RU" }, {CTRY_SAUDI_ARABIA, "SA" }, {CTRY_SINGAPORE, "SG" }, {CTRY_SLOVAKIA, "SK" }, {CTRY_SLOVENIA, "SI" }, {CTRY_SOUTH_AFRICA, "ZA" }, {CTRY_SPAIN, "ES" }, {CTRY_SWEDEN, "SE" }, {CTRY_SWITZERLAND, "CH" }, {CTRY_SYRIA, "SY" }, {CTRY_TAIWAN, "TW" }, {CTRY_THAILAND, "TH"...
  • Page 200 WLAN State SYNTAX DESCRIPTION Get wlanstate Display whether status of current wireless operation is Enabled or Disabled. Set wlanstate enable/disable Set to Disable to turn off wireless operation. Set to Enable to turn back on wireless operation. Note: When executing this command, please ensure that you are not connected on wireless with device or you will be disconnected from the device and network.
  • Page 201: Appendix V: Technical Specifications

    Safety • FCC Part 15 SubPart B and SubPart C (for Electromagnetic wireless module) Conformance • EN 300 328-2 • EMC CE EN 301 489 (EN300 826) • EN 55022 (CISPR 22)/EN 55024 Class B • EN 61000-3-2 • EN 61000-3-3 •...
  • Page 202 Security • 64 - bit / 128 - bit WEP • WPA-Enterprise, WPA-Personal, WPA2-Enterprise, WPA2-Personal, WPA-Auto-Enterprise, WPA- Auto-Personal Pseudo Virtual LAN - Per Node - Per Group • Tagged VLAN • IEEE 802.1x – TLS, TTLS, PEAP, EAP-SIM Network Interface 2x RJ45 10/100 Mbps auto-negotiating Ethernet port Modulation...
  • Page 203 IP Addressing All classful/classless subnets Management • Telnet Command Console • HTTP Web Management IP Addressing All Classful/Classless Subnets Built-in DHCP Server DHCP Reservation By MAC address Operating Channels • 11 Channels: US and Canada • 13 Channels: Europe • 14 Channels: Japan Load Balancing Parallel Broadband (in Gateway mode)
  • Page 204 Environment Requirements Operating Temp: 0ºC to 70ºC Storage Temp: -15ºC to 70ºC Operating Humidity: 5% to 95% RH Humidity (RH – Relative Humidity):...

Table of Contents