Deliberant DLB70 Series User Manual

Wlan dual outdoor radio
Table of Contents

Advertisement

Quick Links

DLB70XX
WLAN Dual Outdoor Radio
User Manual
Version 1.0.0 (11.08.2006)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DLB70 Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Deliberant DLB70 Series

  • Page 1 DLB70XX WLAN Dual Outdoor Radio User Manual Version 1.0.0 (11.08.2006)
  • Page 2: Table Of Contents

    Table of Contents Preface ..................................... 4 FCC Information..................................4 Electronic Emission Notices..................................4 FCC Frequency Interference Statement ..............................4 FCC Radiation Exposure Statement ...............................4 Antenna Installation....................................4 Installation Requirements ..............................4 Packing List................................... 5 Quick Start Guides ................................. 6 Access Point Client Mode..............................6 Configuring Universal Repeater ............................
  • Page 3 Advanced Settings ................................31 Authentication Type....................................31 Fragment Threshold....................................31 RTS Threshold ......................................31 Beacon Interval .....................................32 ACK Timing ......................................32 Client Expired Time....................................32 MTU Size ......................................32 Data Rate ......................................32 Preamble Type ......................................32 Broadcast SSID ....................................32 IAPP ........................................32 802.11g Protection ....................................32 Block WLAN Relay (Isolate Client) ...............................32 Turbo Mode ......................................33 Aggregation Mode....................................33 Tx Burst Mode.......................................33...
  • Page 4 Auto Discovery Tool ................................66 Discover ........................................66 Setup IP ........................................66 Detail ........................................67 WDS........................................68 Active Clients ......................................68 Connect to Web Server..................................68...
  • Page 5: Preface

    Installation Requirements This guide is for the networking professional who installs and manages the Deliberant DLB70xx line of outdoor products hereafter referred to as the “device”. To use this guide, you should have experience working with the TCP/IP configuration and...
  • Page 6: Packing List

    be familiar with the concepts and terminology of wireless local area networks. NOTE: Only those antennas that are of the same type and with lesser gain than those that are certified with this device may be used legally by the installer. 23 dBi gain antenna - Arc Wireless Solutions antenna PN ANT-S-2126-01 Packing List Before you start to install the device, make sure the package contains the following items:...
  • Page 7: Quick Start Guides

    Quick Start Guides Simple Access Point (Dual AP) The DLB70XX series have two wireless radios: one 802.11A and one 802.11B/G. Sometimes it is desirable to provide customers with all three wireless standards, so this example shows how to create a bridged Access Point using both the 802.11A radio and the 802.11B/G radio.
  • Page 8 Follow the same steps for wlan2. In the Wireless > wlan2 > Basic Settings section: uncheck “Disable Wireless LAN Interface” checkbox. Set the Mode to “AP”. Assign the SSID. For this example we used DLB_AP_A since this is the 802.11A interface. For ease of management, it might be beneficial to change the LAN IP address to reside on the same subnet as the other PCs in your bridged network.
  • Page 9 5G Backhaul (WDS) / 2.4G AP (Bridged) 5G Backhaul (WDS) / 2.4G AP (Routed) 5G AP Client / 2.4G AP Dual Backhaul with STP Access Point Client Mode This device can be configured as a wireless Ethernet adapter. In this mode, the device can connect to the other wireless stations (Ad-Hoc network type) or Access Point (Infrastructure network type) and you don’t need to install any driver.
  • Page 10 The alternative way to configure is as follows: In the “Wireless Site Survey” page, select one of the SSIDs you want to connect and then press “Connect” button to establish the link. If the link is established successfully it will show the message “Connect successfully”. Then press “OK”. Then you can check the linking information in “Status”...
  • Page 11: Configuring Universal Repeater

    encryption before step1 and all the settings must be as same as the Access Point or Station. For more information about the detail authentication and data encryption settings, please refer the security section. Authentication Type In client mode, the device also supports two Authentication Types “Open system” and “Shared Key”. Although the default setting is “Auto”, not every Access Points can support “Auto”...
  • Page 12: Wireless Setup

    Wireless Setup Initial Configuration There are two ways to configure the device, one is through web-browser, and the other is through Secure Shell CLI interface. To access the configuration interfaces, make sure you are using a computer connected to the same network as the device. The default IP address of the device is 192.168.2.254, and the subnet-mask is 255.255.255.0.
  • Page 13: Router

    Router In this operation mode, the wired Ethernet (WAN) port is used to connect with an ADSL/Cable modem and the wireless NIC is used for your private WLAN. The NAT is enabled between the 2 NICs, and all the wireless clients share the same public IP address through the WAN port to the ISP.
  • Page 14 AP Client This mode provides the capability to connect with another AP using infrastructure/Ad-hoc networking types. With bridge operation mode, you can directly connect the wired Ethernet port to your PC and the device becomes a wireless adapter. And with WISP operation mode, you can connect the wired Ethernet port to a hub/switch and all the PCs connecting with the hub/switch can share the same public IP address from your ISP.
  • Page 15: Wlan 1 Wireless Configuration

    WLAN 1 Wireless Configuration Basic Settings Disable Wireless LAN Interface Disable the wireless interface of device Band The device supports 2.4GHz(B), 2.4GHz(G) and 2.4GHz(B+G) mixed modes. Mode The radio of the device supports different modes as follows: The radio of the device acts as an Access Point to serves all wireless clients to join a wireless local network. Client Support Infrastructure and Ad-hoc network types to act as a wireless adapter.
  • Page 16: Network Type

    Network Type Infrastructure This type requires the presence of 802.11b/g Access Point. All communication is done via the Access Point. Ad Hoc This type provides a peer-to-peer communication between wireless stations. All the communication is done from Client to Client without any Access Point involved. Ad Hoc networking must use the same SSID and channel for establishing the wireless connection.
  • Page 17 2417 Americas, EMEA, Japan, and China 2422 Americas, EMEA, Japan, Israel, and China 2427 Americas, EMEA, Japan, Israel, and China 2432 Americas, EMEA, Japan, Israel, and China 2437 Americas, EMEA, Japan, Israel, and China 2442 Americas, EMEA, Japan, Israel, and China 2447 Americas, EMEA, Japan, Israel, and China 2452...
  • Page 18: Advanced Settings

    Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LANs. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation.
  • Page 19: Ack Timing

    ACK Timing This is the amount of time that a station will wait for the ACK response after sending a wireless frame to a remote station. This is roughly transmission time (round-trip) + processing time on the remote station and can vary depending on environment. Generally a trial and error approach is best for finding optimum timing and should only be changed on longer wireless links.
  • Page 20: Tx Burst Mode

    Tx Burst Mode Not applicable for WLAN 1. Transmit Power The device supports four transmission output power levels 250, 200, 150 and 100mW for CCK (802.11b) mode and two transmission output power levels 100 and 50mW for OFDM (802.11g) mode. You can adjust the power level to change the coverage of the device.
  • Page 21: Security

    Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need.
  • Page 22 • 128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. The Default Tx Key field determines which of the four keys you want to use in your WLAN environment. WEP Encryption with 802.1x Setting The device supports an external RADIUS Server that can secure networks against unauthorized access.
  • Page 23: Wpa Authentication Mode

    WPA Authentication Mode The WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and that access to their network is restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode.
  • Page 24: Wds Network Topology

    • If your network topology has a loop, you need to enable the 802.1d Spanning Tree function. • You don’t need to add all MAC address of devices existing in your network to the WDS AP List. The WDS AP List only needs to specify the MAC address of devices you need to directly connect to.
  • Page 25 WDS2 The MAC Address of WDS1 WDS3 The MAC Address of WDS1 WDS4 The MAC Address of WDS1 WDS5 The MAC Address of WDS1 Ring topology Spanning Tree Device Entries of WDS AP List Protocol Required WDS1 The MAC Addresses of WDS2 and WDS5 WDS2 The MAC Addresses of WDS1 and WDS3 WDS3...
  • Page 26: Wireless Repeater

    Mesh topology Device Entries of WDS AP List Spanning Tree Protocol Required WDS1 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 WDS2 The MAC Addresses of WDS1, WDS3, WDS4 and WDS5 WDS3 The MAC Addresses of WDS1, WDS2, WDS4 and WDS5 WDS4 The MAC Addresses of WDS1, WDS2, WDS3 and WDS5 WDS5...
  • Page 27: Wireless Bridge

    Spanning Tree Description Entries of WDS AP List Protocol Required Access Point The MAC Address of Repeater Repeater The MAC Address of Access Point Wireless Bridge As a Wireless Bridge the device can establish a wireless connection between two or more Wired LANs. When you decide to use the WDS as a Wireless Bridge, please refer the following instructions for configuration.
  • Page 29: Wlan 2 Wireless Configuration

    WLAN 2 Wireless Configuration Basic Settings Disable Wireless LAN Interface Disable the wireless interface of device Band The device supports 2.4GHz(B), 2.4GHz(G) and 2.4GHz(B+G) mixed modes. Mode The radio of the device supports different modes as follows: The radio of the device acts as an Access Point to serves all wireless clients to join a wireless local network. Client Support Infrastructure and Ad-hoc network types to act as a wireless adapter.
  • Page 30: Network Type

    Network Type Infrastructure This type requires the presence of 802.11b/g Access Point. All communication is done via the Access Point. Ad Hoc This type provides a peer-to-peer communication between wireless stations. All the communication is done from Client to Client without any Access Point involved. Ad Hoc networking must use the same SSID and channel for establishing the wireless connection.
  • Page 31 5170 5180 5190 5200 5210 5220 5230 5240 5260 5280 5300 5320 5745 5765 5785 5805 When set to “Auto”, the device will find the least-congested channel for use.
  • Page 32: Advanced Settings

    Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LANs. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation.
  • Page 33: Beacon Interval

    bytes. Beacon Interval The beacon interval is the amount of time between access point beacons in milliseconds. The default beacon interval is 100. ACK Timing This is the amount of time that a station will wait for the ACK response after sending a wireless frame to a remote station. This is roughly transmission time (round-trip) + processing time on the remote station and can vary depending on environment.
  • Page 34: Turbo Mode

    Turbo Mode Not applicable for WLAN 2. Aggregation Mode This is a proprietary Ralink (802.11a chipset in the DLB70xx) aggregation setting that allows for jumbo frames consisting of multiple smaller frames that increases throughput between Ralink stations. Tx Burst Mode This is a proprietary Ralink (802.11a chipset in the DLB70xx) burst setting and allows very small networks (1~3 clients) to transmit at higher speeds.
  • Page 35: Security

    Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need.
  • Page 36 • 64-bit WEP Encryption: 64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars. • 128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars.
  • Page 37: Wpa Authentication Mode

    WPA Authentication Mode The WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and that access to their network is restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode.
  • Page 38: Access Control

    Access Control WDS Settings Wireless Distribution System (WDS) uses wireless media to communicate with the other devices, like the Ethernet does. This function allows one or more remote LANs to connect with the local LAN. To do this, you must set these devices in the same channel and set the MAC address of other devices you want to communicate with in the WDS AP List and then enable the WDS.
  • Page 39: Connecting Profile

    Connecting Profile If you enable the connecting profile in client mode, the system will check the preferred SSID and BSSID in a fixed period. If preferred APs are found, the radio will try to connect to them one by one regardless of the signal quality and strength.
  • Page 41: Tcp/Ip Configuration

    TCP/IP Configuration Configuring LAN Interface Configuring DHCP Server To use the DHCP server inside the device, please make sure there is no other DHCP server that exists in the same network as the device. Enable the DHCP Server option and assign the client range of IP addresses as shown in the following page. When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will be set to the IP address of device.
  • Page 42: Static Ip

    Static IP You can get the IP configuration data of the Static-IP from your ISP. You will need to fill in IP address, subnet mask, gateway address, and one of the DNS addresses. IP Address The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS.
  • Page 43 Default Gateway The IP address of Default Gateway provided by your ISP or MIS. The Default Gateway is the intermediate network device that has knowledge of the network IDs of the other networks in the Wide Area Network, so it can forward the packets to other gateways until they are delivered to the one connected to the specified destination.
  • Page 44: Pppoe

    DHCP Client (Dynamic IP) All IP configuration data besides DNS will be obtained from the DHCP server when DHCP-Client WAN Access Type is selected. DNS 1~3 The IP addresses of DNS provided by your ISP. (Domain Name Server) is used to map domain names to IP addresses. The DNS maintains central lists of domain name/IP addresses and maps the domain names in your Internet requests to other servers on the Internet until the specified web site is found.
  • Page 45: Pptp

    User Name The account provided by your ISP Password The password for your account. Connect Type “Continuous “: connect to ISP permanently “Manual”: Manually connect/disconnect to ISP “On-Demand”: Automatically connect to ISP when the user needs to access the Internet. Idle Time The number of minutes of inactivity before disconnecting from ISP.
  • Page 46: Configuring Clone Mac Address

    IP Address The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier outside of your local network. Subnet Mask The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
  • Page 47 Clone MAC address for Static IP WAN access type: Clone MAC address for PPPoE WAN access type:...
  • Page 48 Clone MAC address for PPTP WAN access type: Physical LAN interface MAC address clone:...
  • Page 49: Vpn Pass-Through

    VPN Pass-through This functionality lets the device Pass-through the VPN packets including PPTP/ L2TP/IPsec VPN Connection. Check the VPN Pass-through in WAN Interface of TCP/IP Page that you want and then click Apply Changes button. Static Route Setup You can set the routing information to let the Router know what routing is correct if it cannot learn automatically through other means.
  • Page 50: Dynamic Route Setup

    Router (R1) in Default Gateway field then click Apply Change button. Enter IP Address of Network 4, Subnet Mask and IP Address of Router (R2) in Default Gateway field then click Apply Change button. In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1/2 to transmit and receive the route information with other Routers.
  • Page 51 In the Dynamic Routing Table there are two routings for Network 3 and Network 4...
  • Page 52: Firewall Configuration

    Firewall Configuration Configuring LAN to WAN Firewall The device supports three kinds of filter Port Filtering, IP Filtering and MAC Filtering. All the entries in current filter table are used to restrict certain types of packets from your local network through the device. Use of such filters can be helpful in securing or restricting your local network.
  • Page 53: Configuring Port Forwarding (Virtual Server)

    WAN. Configuring Port Forwarding (Virtual Server) This function allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind the device's NAT firewall.
  • Page 54: Configuring Dmz

    Configuring DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e- mail) servers and DNS servers. All inbound packets will be redirected to the computer you set. It also is useful if you run some applications (e.g.
  • Page 55: Configuring Vpn

    Configuring VPN...
  • Page 56: Management Configuration

    Management Configuration Quality of Service (QoS) QoS allows you to specify some rules, to ensure the quality of service in your network, such as Bandwidth Priority to allocate bandwidth. This function can be helpful in shaping and queuing traffic from LAN (WLAN) to WAN or LAN to WLAN, but not WLAN to WLAN.
  • Page 57: Qos Rule Settings

    QoS Enabled Select this check box to enable quality of service. Bandwidth Borrowed Select this check box to allow a rule to borrow unused bandwidth. Bandwidth borrowing is decided by priority of the rules. Higher priority will get the remaining bandwidth first. Max Throughput Enter the value of max throughput in kbps that you want to allocate for one rule.
  • Page 58: Bandwidth Control

    the rules. This table can handle 50 rules at most. An example for usage For example, there are three users in your network. User A wants to browse the websites to retrieve information. User B wants to use FTP connection to download a large file. User C wants to use software phone to connect with customer.
  • Page 59: Snmp Agent

    NOTE: Only device on Client mode or WISP mode this functionality can take effective. Parameter Definition Label Description Upstream Data Rate Speed of transmit data that from Ethernet interface to Wireless interface. Upstream Latency Similar a waiting time the data queuing- time. Upstream Burst Packet Similar a buffer the data will into the buffer while the data is transmit or receive.
  • Page 60 Following Table describes the SNMP configuration parameters Label Description System Community String This is password sent with each trap to the SNMP Manager. System Name Type the Name which is name of device. System Location Type the Location which is location of device System Contact Type the Name which is person or group when the device has problem can find they.
  • Page 61 1.3.6.1.4.1.99.1 - Mode 1.3.6.1.4.1.99.2 - SSID 1.3.6.1.4.1.99.3 - Channel 1.3.6.1.4.1.99.4 - Band 1.3.6.1.4.1.99.5 - RSSI 1.3.6.1.4.1.99.6 - Active_Clients 1.3.6.1.4.1.99.7 - Active_Clients_List 1.3.6.1.4.1.99.8 - Encryption...
  • Page 62: Upgrade Firmware

    Upgrade Firmware Firmware Types The firmware for this device is divided into 2 parts, one is web pages firmware the other is application firmware, usually named g120webpage.bin and g120linux.bin. To upgrade the firmware, we suggest the user first upgrade the application firmware then the web pages firmware.
  • Page 63: Password

    To save & restore configuration data of device, just enter the target filename with full path to your local host then you can back up the configuration data to local host or restore configuration data to the device. Password The Web-Browser interface has password protection. To disable the Web-Browser password protection just leave the “User Name”...
  • Page 64: Using Cli Menu

    Using CLI Menu Start a SSH(Secure Shell) client session to login to the device The SSH server daemon inside the device uses TCP port 22. User must use SSH client utility such as Putty to login to the device. The default password for user “root” is either “qwert” or “zplus12320400” depending on your firmware version. Once the user has logged in to the device, then the password can be changed by CLI command.
  • Page 65: Menu Tree List

    Menu Tree List Password The SSH Configuration interface has password protection. Please note that this password is separate from the web configuration password.
  • Page 67: Auto Discovery Tool

    Auto Discovery Tool Auto Discovery can be used to find out how many devices are in your local area network The name of the tool is WirelessConf.exe. Discover After pressing this button, you will see how many devices are in your network and you would see the basic information about these devices, such as: •...
  • Page 68: Detail

    Detail If you want to see more detailed information, you could press the Detail button, and then you will see the Detail Information window.
  • Page 69: Wds

    If the device you selected is in WDS mode or AP+WDS mode, you can press the WDS button and then you will see the WDS List window. Active Clients After pressing the Active Clients button, you will see the WLAN AP Active Clients window. with information, such as: Connect to Web Server If you want connect to device’s web server you can press the Connect to Web Server button, or double-click on the device.

Table of Contents