Loopcomm LP-8186 User Manual

Wlan ap router
Table of Contents

Advertisement

Quick Links

WLAN AP Router
User Manual V1.2
- 1 -

Advertisement

Table of Contents
loading

Summary of Contents for Loopcomm LP-8186

  • Page 1 WLAN AP Router User Manual V1.2 - 1 -...
  • Page 2 Trademarks Copyright @2008 Contents are subject to change without notice. All trademarks belong to their respective proprietors. Copyright Statement THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION THAT IS THE PROPERTY OF THIS COMPANY. AND NO PART OF THIS DOCUMENTATION MAY BE REPRODUCED, STORED IN A RETRIEVAL SYSTEM OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, ELECTRICAL OR MECHANICAL, BY PHOTOCOPYING, RECORDING, OR OTHERWISE, WITHOUT THE PRIOR WRITTEN CONSENT OF THIS...
  • Page 3: Table Of Contents

    Table of Contents TERMINOLOGY ----------------------------------------------------------------------------------------- 7 1.INTRODUCTION -------------------------------------------------------------------------------------8 1.1 PACKAGE CONTENTS --------------------------------------------------------------------------------------------------8 1.2 PRODUCT SPECIFICATIONS-------------------------------------------------------------------------------------------8 1.3 PRODUCT FEATURES ---------------------------------------------------------------------------------------------------9 1.4 FRONT PANEL DESCRIPTION--------------------------------------------------------------------------------------- 10 1.5 REAR PANEL DESCRIPTION ---------------------------------------------------------------------------------------- 11 2.INSTALLATION------------------------------------------------------------------------------------- 12 2.1 HARDWARE INSTALLATION---------------------------------------------------------------------------------------- 12 2.2 SOFTWARE INSTALLATION ----------------------------------------------------------------------------------------- 12 3.SOFTWARE CONFIGURATION ---------------------------------------------------------------- 13 3.1 PREPARE YOUR PC TO CONFIGURE THE WLAN AP ROUTER--------------------------------------------- 13 3.2 CONNECT TO THE WLAN AP ROUTER--------------------------------------------------------------------------- 15...
  • Page 4 3.3.7Wireless -Access Control ----------------------------------------------------------------------------------------------- 27 3.3.8WDS Settings------------------------------------------------------------------------------------------------------------- 28 I WDS Security Setup -------------------------------------------------------------------------------------------------------- 29 II WDS AP Table -------------------------------------------------------------------------------------------------------------- 30 3.3.9 Site Survey -------------------------------------------------------------------------------------------------------------- 30 3.3.10 LAN Interface Setup--------------------------------------------------------------------------------------------------- 31 3.3.11WAN Interface Setup--------------------------------------------------------------------------------------------------- 32 I Static IP------------------------------------------------------------------------------------------------------------------------ 32 II DHCP Client ----------------------------------------------------------------------------------------------------------------- 33 III PPPoE------------------------------------------------------------------------------------------------------------------------ 35 IV PPTP ------------------------------------------------------------------------------------------------------------------------- 37 3.3.12Firewall - Port Filtering ------------------------------------------------------------------------------------------------ 39...
  • Page 5 4.FREQUENTLY ASKED QUESTIONS (FAQ) ------------------------------------------------- 54 4.1 WHAT AND HOW TO FIND MY PC'S IP AND MAC ADDRESS? ---------------------------------------------- 54 4.2 WHAT IS WIRELESS LAN? -------------------------------------------------------------------------------------------- 54 4.3 WHAT ARE ISM BANDS? ---------------------------------------------------------------------------------------------- 54 4.4 HOW DOES WIRELESS NETWORKING WORK? ---------------------------------------------------------------- 54 4.5 WHAT IS BSSID? --------------------------------------------------------------------------------------------------------- 55 4.6 WHAT IS ESSID? --------------------------------------------------------------------------------------------------------- 55 4.7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE?------------------------------ 55...
  • Page 6 4.27 WHAT IS VPN? ---------------------------------------------------------------------------------------------------------- 59 4.28 WHAT IS IPSEC?-------------------------------------------------------------------------------------------------------- 59 - 6 -...
  • Page 7: Terminology

    Terminology 3DES Triple Data Encryption Standard Advanced Encryption Standard ANSI American National Standards Institute Access Point Complementary Code Keying CSMA/CA Carrier Sense Multiple Access/Collision Avoidance CSMA/CD Carrier Sense Multiple Access/Collision Detection DDNS Dynamic Domain Name Server Diffie-Hellman Algorithm DHCP Dynamic Host Configuration Protocol DSSS Direct Sequence Spread Spectrum Extensible Authentication Protocol...
  • Page 8: Introduction

    Introduction The WLAN AP Router is IEEE 802.11b/g WLAN AP router solution; setting SOHO and enterprise standard for high performance, secure, manageable and reliable WLAN. This document describes the steps required for the initial IP address assignment and other WLAN router configuration.
  • Page 9: Product Features

    1.3 Product Features Complies with IEEE 802.1 lb/g standard for 2.4GHz Wireless LAN. Supports bridging, routing, WISP functions between wireless and wired Ethernet interfaces. Supports 64-bit and 128-bit WEP, WPA, WPA2 encryption/decryption function to protect the wireless data transmission. Supports IEEE 802. lx Authentication. Support Wi-Fi Protected Access Authentication with Radius and Pre-Shared Key mode.
  • Page 10: Front Panel Description

    1.4 Front Panel Description Figure 1 -WLAN AP Router Front Panel LED Indicator State Description The WLAN AP Router is powered on. 1. POWER LED The WLAN AP Router is powered off. Flashing Data is transmitting or receiving on the antenna. 2.
  • Page 11: Rear Panel Description

    1.5 Rear Panel Description Figure 2 - WLAN AP Router Rear Panel (SMA Antenna) Interfaces Description 1.Antenna The Wireless LAN Antenna.(Figure 2) (SMA) Push continually the reset button 5 ~ 10 seconds to reset the 2.Reset configuration parameters to factory defaults. The RJ-45 socket allows WAN connection through a Category 3.WAN 5 cable.
  • Page 12: Installation

    Installation 2.1 Hardware Installation Step 1: Place the WLAN AP Router to the optimum transmission location. The best transmission location for your WLAN AP Router is usually at the geographic center of your wireless network, with line of sign to all of your mobile stations. Step 2: Connect the WLAN AP Router to your wired network.
  • Page 13: Software Configuration

    Software configuration The web based management and configuration functions allow you to do the step-by-step easily. The WLAN AP Router is delivered with the following factory default parameters on the Ethernet LAN interfaces. Default IP Address: 192.168.1.254 Default IP subnet mask: 255.255.255.0 WEB login User Name: <empty>...
  • Page 14 For Microsoft Windows 2000/XP: Click the Start button and select Settings, then click Control Panel. The Control Panel window will appear. Move mouse and double-click the right button on Network and Dial-up Connections icon. Move mouse and double-click the Local Area Connection icon. The Local Area Connection window will appear. Click Properties button in the Local Area Connection window.
  • Page 15: Connect To The Wlan Ap Router

    3.2 Connect to the WLAN AP Router Open a WEB browser, i.e. Microsoft Internet Explore, then enter 192.168.1.254 on the URL to connect the WLAN AP Router. 3.3 Management and configuration on the WLAN AP Router 3.3.1 Status This page shows the current status and some basic settings of the device, includes system, wireless, Ethernet LAN and WAN configuration information.
  • Page 16 Item Description System Uptime It shows the duration since WLAN AP Router is powered on. Firmware version It shows the firmware version of WLAN AP Router. Wireless configuration Mode It shows wireless operation mode Band It shows the current wireless operating frequency. SSID It shows the SSID of this WLAN AP Router.
  • Page 17: 2Setup Wizard

    3.3.2 Setup Wizard This page guides you to configure wireless AP router for first time Screen snapshot - Setup Wizard Operation Mode This page followed by Setup Wizard page to define the operation mode. Screen snapshot - Operation Mode - 17 -...
  • Page 18: Time Zone Setting

    Time Zone Setting This page is used to enable and configure NTP client Screen snapshot - Time Zone Settings LAN Interface Setup This page is used to enable and configure NTP client Screen snapshot - LAN Interface Setup - 18 -...
  • Page 19: Wan Interface Setup

    WAN Interface Setup This page is used to configure WAN access type Screen snapshot - WAN Interface Setup Wireless Basic Settings This page is used to configure basic wireless parameters like Band, Mode, Network Type SSID, Channel Number, Enable Mac Clone(Single Ethernet Client) Screen snapshot —...
  • Page 20: Wireless Security Setup

    Wireless Security Setup This page is used to configure wireless security Screen snapshot - Wireless Security Setup 3.3.3 Operation Mode This page is used to configure which mode wireless AP router acts Screen snapshot - Operation Mode - 20 -...
  • Page 21: 4Wireless - Basic Settings

    Item Description Gateway Traditional gateway configuration. It always connects internet via ADSL/Cable Modem. LAN interface, WAN interface, Wireless interface, NAT and Firewall modules are applied to this mode Bridge Each interface (LAN, WAN and Wireless) regards as bridge. NAT, Firewall and all router's functions are not supported Wireless ISP Switch Wireless interface to WAN port and all Ethernet ports in bridge mode.
  • Page 22: 5Wireless -Advanced Settings

    Item Description Disable Wireless LAN Click on to disable the wireless LAN data transmission. Interface Band Click to select 2.4GHz(B) / 2.4GHz(G) / 2.4GHz(B+G) Mode Click to select the WLAN AP / Client / WDS / AP+WDS wireless mode. Site Survey The Site Survey button provides tool to scan the wireless network.
  • Page 23 Screen snapshot - Wireless Advanced Settings Item Description Authentication Type Click to select the authentication type in Open System, Shared Key or Auto selection. Fragment Threshold Set the data packet fragmentation threshold, value can be written between 256 and 2346 bytes. Refer to 4.10 What is Fragment Threshold? Refer to 4.10 What is Fragment Threshold? RTS Threshold...
  • Page 24: 6Wireless - Security Setup

    Preamble Type Click to select the Long Preamble or Short Preamble support on the wireless data packet transmission. Refer to 4.13 What is Preamble Type? Broadcast SSID Click to enable or disable the SSID broadcast function. Refer to 4.14 What is SSID Broadcast? IAPP Click to enable or disable the IAPP function.
  • Page 25 Item Description Encryption Select the encryption supported over wireless access. The encryption method can be None, WEP, WPA(TKIP), WPA2 or WPA2 Mixed Refer to 4.9 What is WEP? 4.15 What is Wi-Fi Protected Access (WPA)? 4.16 What is WPA2CAES1? 4.17 What is 802. IX Authentication? 4.18 What is Temporal Key Integrity Protocol (TKIP)? 4.19 What is Advanced Encryption Standard (AES)? Use 802.
  • Page 26: I Wep Key Setup

    WEP Key Setup Screen snapshot - WEP Key Setup Item Description Key Length Select the WEP shared secret key length from pull-down menu. The length can be chose between 64-bit and 128-bit (known as "WEP2") keys. The WEP key is composed of initialization vector (24 bits) and secret key (40-bit or 104-bit).
  • Page 27: 7Wireless -Access Control

    3.3.7 Wireless - Access Control If you enable wireless access control, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. When this option is enabled, no wireless clients will be able to connect if the list contains no entries.
  • Page 28: 8Wds Settings

    Reset Click the Reset button to abort change and recover the previous configuration setting. Current Access Control It shows the registered clients that are allowed to link to this WLAN List AP Router. Delete Selected Click to delete the selected clients that will be access right removed from this WLAN AP Router.
  • Page 29: I Wds Security Setup

    Item Description Enable WDS Click the check box to enable wireless distribution system. Refer to 4.21 What is Wireless Distribution Svstem (WDS)? MAC Address Fill in the MAC address of AP to register the wireless distribution system access capability. Comment Fill in the comment tag for the registered AP.
  • Page 30: Wds Ap Table

    WDS AP Table This page is used to show WDS statistics Screen snapshot - WDS AP Table Item Description MAC Address It shows the MAC Address within WDS. Tx Packets It shows the statistic count of sent packets on the wireless LAN interface.
  • Page 31: Lan Interface Setup

    Item Description SSID It shows the SSID of AP. BSSID It shows BSSID of AP. Channel It show the current channel of AP occupied. Type It show which type AP acts. Encrypt It shows the encryption status. Signal It shows the power level of current AP. Select Click to select AP or client you'd like to connect.
  • Page 32: 11Wan Interface Setup

    Item Description IP Address Fill in the IP address of LAN interfaces of this WLAN AP Router. Subnet Mask Fill in the subnet mask of LAN interfaces of this WLAN AI Router. Default Gateway Fill in the default gateway for LAN interfaces out going data packets. DHCP Server Click to select Disabled, Client or Server in different operation mode of wireless AP router.
  • Page 33: Dhcp Client

    Item Description Static IP Click to select Static IP support on WAN interface. There are IP address, subnet mask and default gateway settings need to be done. IP Address If you select the Static IP support on WAN interface, fill in the IP address for it.
  • Page 34 Item Description DHCP Client Click to select DHCP support on WAN interface for IP address assigned automatically from a DHCP server. Attain DNS Click to select getting DNS address for DHCP support. Automatically Please select Set DNS Manually if the DHCP support is selected. Set DNS Manually Click to select getting DNS address for DHCP support.
  • Page 35: Pppoe

    PPPoE Screen snapshot - WAN Interface Setup - PPPoE Item Description PPPoE Click to select PPPoE support on WAN interface. There are user name, password, connection type and idle time settings need to be done. User Name If you select the PPPoE support on WAN interface, fill in the user name and password to login the PPPoE server.
  • Page 36 Idle Time If you select the PPPoE and Connect on Demand connection type, fill in the idle time for auto-disconnect function. Value can be between 1 and 1000 minutes. MTU Size Fill in the mtu size of MTU Size. The default value is 1400. Refer to 4.23 What is Maximum Transmission Unit (MTU) Size? Attain DNS Click to select getting DNS address for PPPoE support.
  • Page 37: Pptp

    PPTP Screen snapshot - WAN Interface Setup - PPTP Item Description PPTP Allow user to make a tunnel with remote site directly to secure the data transmission among the connection. User can use embedded PPTP client supported by this router to make a VPN connection. IP Address If you select the PPTP support on WAN interface, fill in the IP address for it.
  • Page 38 Enable uPNP Click the checkbox to enable uPNP function. Refer to 4.22 What is Universal Plus and Plav (uPNP)? Enable Web Server Click the checkbox to enable web configuration from WAN side. Access on WAN Enable WAN Echo Click the checkbox to enable WAN ICMP response. Reply Apply Changes Click the Apply Changes button to complete the new configuration...
  • Page 39: 12Firewall - Port Filtering

    3.3.12 Firewall - Port Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Screen snapshot - Firewall - Port Filtering Item Description...
  • Page 40: 13Firewall - Ip Filtering

    3.3.13 Firewall - IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Screen snapshot - Firewall - IP Filtering Item Description...
  • Page 41: 14Firewall - Mac Filtering

    3.3.14 Firewall - MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Screen snapshot - Firewall - MAC Filtering Item Description...
  • Page 42: 15Firewall - Port Forwarding

    3.3.15 Firewall - Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway's NAT firewall.
  • Page 43: 16Firewall - Url Filtering

    3.3.16 Firewall - URL Filtering URL Filtering is used to restrict users to access specific websites in internet. Item Description Enable URL Filtering Click to enable the URL Filtering function. URL Address Add one URL address. Apply Changes Click the Apply Changes button to save settings. Delete Selected Click to delete the selected URL address that will be removed from the URL Filtering list.
  • Page 44: 17Firewall - Dmz

    3.3.17 Firewall - DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. Screen snapshot - Firewall - DMZ Item Description...
  • Page 45: 18Management - Statistics

    3.3.18 Management – Statistics This page shows the packet counters for transmission and reception regarding to wireless, Ethernet LAN and Ethernet WAN networks. Screen snapshot - Management – Statistics Item Description Wireless LAN It shows the statistic count of sent packets on the wireless LAN Sent Packets interface.
  • Page 46: 19Management - Ddns

    3.3.19 Management – DDNS This page is used to configure Dynamic DNS service to have DNS with dynamic IP address. Screen snapshot - Management – DDNS Item Description Enable DDNS Click the checkbox to enable DDNS service. Refer to 4.25 What is DDNS? Service Provider Click the drop down menu to pickup the right provider.
  • Page 47: 20Management - Time Zone Setting

    3.3.20 Management - Time Zone Setting This page is used to configure NTP client to get current time. Screen snapshot - Management - Time Zone Settings Item Description Current Time It shows the current time. Time Zone Select Click the time zone in your country. Enable NTP client Click the checkbox to enable NTP client update.
  • Page 48: 21Management - Log

    3.3.21 Management - Log This page is used to configure the remote log server and shown the current log. Screen snapshot - Management – Log Item Description Enable Log Click the checkbox to enable log. Wireless only Only show wireless log System all Show all log of wireless AP router Enable Remote Log...
  • Page 49: 22Management - Upgrade Firmware

    3.3.22 Management - Upgrade Firmware This page allows you upgrade the Access Point firmware to new version. Please note, do not power off the device during the upload because it may crash the system. Screen snapshot - Management - Upgrade Firmware Item Description Select File...
  • Page 50: 23Management Save/ Reload Settings

    3.3.23 Management Save/ Reload Settings This page allows you save current settings to a file or reload the settings from the file that was saved previously. Besides, you could reset the current configuration to factory default. Screen snapshot - Management - Save/Reload Settings Item Description Save Settings to File...
  • Page 51: 24Management - Password Setup

    3.3.24 Management - Password Setup This page is used to set the account to access the web server of Access Point. Empty user name and password will disable the protection. Screen snapshot - Management - Password Setup Item Description User Name Fill in the user name for web management login control.
  • Page 52: 26Management - Qos Setup

    3.3.26 Qos(Quality of Service) The QoS can let you classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first.
  • Page 53 Edit QoS Rule: You can assign packet classification criteria by its local IP range, remote IP range parameters. The parameters that you leave as blank will be ignored. The priority of this rule will be applied to packets that match classification criteria of this rule.
  • Page 54: Frequently Asked Questions (Faq)

    Frequently Asked Questions (FAQ) 4.1 What and how to find my PC's IP and MAC address? IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
  • Page 55: What Is Bssid

    Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network.
  • Page 56: What Are The Open Systemand Shared Key Authentications

    4.8 What are the Open System and Shared Key authentications? IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open system authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station.
  • Page 57: What Is Beacon Interval

    4.12 What is Beacon Interval? In addition to data frames that carry information from higher layers, 802.11 includes management and control frames that support data transfer. The beacon frame, which is a type of management frame, provides the "heartbeat" of a wireless LAN, enabling stations to establish and maintain communications in an orderly fashion.
  • Page 58: What Is Temporal Key Integrity Protocol (Tkip)

    4.18 What is Temporal Key Integrity Protocol (TKIP)? The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.Hi encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs.
  • Page 59: What Is Ntp Client

    4.26 What is NTP Client? NTP client is designed for fetching the current timestamp from internet via Network Time protocol. User can specify time zone, NTP server IP address. 4.27 What is VPN? VPN is the abbreviation of Virtual Private Network. It is designed for creating point-to point private link via shared or public network.

Table of Contents