Z-Com ZAC-1023-2 User Manual

Outdoor wireless cpe

Advertisement

Quick Links

IEEE 802.11b/g/n Outdoor Wireless CPE/
IEEE 802.11a/n Outdoor Wireless CPE
User's Manual
Model name: ZAC-1023-2 / ZAC-1023-5
ZAC-503 / ZAC-504
ZWA-3090 / ZWA-3100
ZN-7200-2EI-O / ZN-7200-2AEI-O
V1.0 May. 2014

Advertisement

Table of Contents
loading

Summary of Contents for Z-Com ZAC-1023-2

  • Page 1 IEEE 802.11b/g/n Outdoor Wireless CPE/ IEEE 802.11a/n Outdoor Wireless CPE User’s Manual Model name: ZAC-1023-2 / ZAC-1023-5 ZAC-503 / ZAC-504 ZWA-3090 / ZWA-3100 ZN-7200-2EI-O / ZN-7200-2AEI-O V1.0 May. 2014...
  • Page 2 Copyright Copyright © 2014 all rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system, translated into any language, or transmitted in any form or by any means without the written permission of the supplier. About This Manual This user manual is intended to guide professional installer to install the IEEE 802.11n Wireless Access Point and how to build the infrastructure centered on it.
  • Page 3 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. To avoid the possibility of exceeding radio frequency exposure limits, you shall beep a distance of at least 100cm between you and the antenna of the installed equipment. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
  • Page 5 Warranty Hardware warranty is for one (1) year from date of shipment from Distributor warrants that hardware will conform to the current relevant published specifications and will be free from material defects in material and workmanship under normal use and service. IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT (INCLUDING,...
  • Page 6: Table Of Contents

    Table of Content Chapter 1 Introduction ........................12 Introduction ............................. 12 Appearance ............................. 13 Key Features ........................... 13 Typical Application ......................... 14 Chapter 2 Hardware Installation ....................... 15 Preparation before Installation ...................... 15 Professional Installation Required ....................15 Safety Precautions ........................15 Installation Precautions .........................
  • Page 7 Port Forwarding ..........................36 DMZ ..............................37 Basic Wireless Settings ......................... 38 Site Survey ............................40 VAP Profile Settings ........................40 Chapter 4 Advanced Settings ......................43 Advanced Wireless Set tings ......................43 Traffic Shaping ..........................44 Wireless Security Settings ......................45 Access Control ..........................
  • Page 8 View Bridge Table ........................... 62 View Routing Table ......................... 62 View Active DHCP Client Table ..................... 62 Chapter 8 Troubleshooting ....................... 64 Appendix A. ASCII ..........................66...
  • Page 9 FIGURE Figure 1 IEEE 802.11n Wireless Access Point ..................13 Figure 2 Typical Application ......................... 14 Figure 3 Login Page ..........................28 Figure 4 Main Page ..........................29 Figure 5 Basic System Settings ......................30 Figure 6 Network Settings ........................31 Figure 7 TCP/IP Settings (Router) .......................
  • Page 10 Figure 30 Syslog ..........................57 Figure 31 Ping Watchdog ........................58 Figure 32 Basic Information ......................... 59 Figure 33 Connection ........................... 60 Figure 34 Network Flow Statistics ......................61 Figure 35 ARP Table ..........................61 Figure 36 Bridge Table ......................... 62 Figure 37 Routing Table ........................
  • Page 11 TABLE Table 1 IEEE 802.11n Wireless Access Point Factory Default Settings ..........27 Table 2 ACSII ............................66...
  • Page 12: Chapter 1 Introduction

    Designed with IEEE 802.11n standard, 2x2 MIMO technology and high output power makes it possible deliver up to 300Mbps high data rate with longer range for applications. ZAC-1023-2 operates at 2.4GHz band while ZAC-1023-5 operates at 5GHz band.
  • Page 13: Appearance

    Appearance Figure 1 IEEE 802.11n Wireless Access Point Key Features Compliant with IEEE 802.11n standard Support passive PoE which is supplied with 24V. High reliable watertight housing endures almost any harsh environments Support 64/128/152-bit WEP and 802.1X, WPA, WPA2, WPA&WPA2,WPA-PSK, WPA2-PSK, and WPA-PSK&WPA2-PSK etc User-friendly Web and SNMP-based management interface...
  • Page 14: Typical Application

    Typical Application The IEEE 802.11n Wireless Access Point can be applied into the following environments: Cost-effectively provide long distance backhaul for remote areas (e.g. village, oil well, island, mountain and etc.) Establish local backhaul for campus, farm and factory Provide and access for video streaming or surveillance for industrial and mining enterprises Figure 2 Typical Application...
  • Page 15: Chapter 2 Hardware Installation

    Chapter 2 Hardware Installation This chapter describes safety precautions and product information you have to know and check before installing IEEE 802.11n Wireless Access Point. Preparation before Installation Professional Installation Required Please seek assistance from a professional installer who is well trained in the RF installation and knowledgeable in the local regulations.
  • Page 16: Installation Precautions

    Installation Precautions To keep the IEEE 802.11n Wireless Access Point well while you are installing it, please read and follow these installation precautions. Users MUST use a proper and well-installed grounding and surge arrestor with the IEEE 802.11n Wireless Access Point; otherwise, a random lightening could easily cause fatal damage to IEEE 802.11n Wireless Access Point.
  • Page 17 Pole Mounting Ring Ferrite Suppression Core 24VDC Power Cord & PoE Injector Warning: Users MUST use the “Power cord & PoE Injector” shipped in the box with the IEEE 802.11n Wireless Access Point. Use of other options will likely cause damage to the IEEE 802.11n Wireless Access Point.
  • Page 18: Hardware Installation

    Hardware Installation Connect up The bottom of the Access Point is a movable cover. Grab the cover and pull it back harder to take it out as the figure shown below. Plug a standard Ethernet cable into the RJ45 port. Slide the cover back and press down the lock button to seal the bottom of the Access Point.
  • Page 19: Using The Grounding Wire

    Using the Grounding Wire The IEEE802.11n Wireless Access Point is equipped with a grounding wire. It is important that the Access Point, cables, and PoE Injector must be properly connected to earth ground during normal use against surges or ESD. 1.
  • Page 20 Warning: Users MUST power off the Access Point first before connecting the external antenna to it. Do not power on the device for a certain of time without physically attaching the external antenna; otherwise, damage might be caused to the unit itself. Bend the antennas to 90 degree or 45 degree.
  • Page 21 Note: The polarization of antennas should be properly aligned. Maximum signal strength between bridges occurs when both bridges are using identical polarization. Tighten up the connector joint clockwise to fix the antennas. To adjust antennas, loose the connector joint counterclockwise first, then adjust antenna to the desired position.
  • Page 22: Mount The Ap On A Pole

    Antenna installation is complete. Mount the AP on a Pole Turn the Access Point over. Put the pole mounting ring through the middle hole of it. Note that you should unlock the pole mounting ring with a screw driver before putting it through the device as the following right picture shows.
  • Page 23: Power Up

    Mount the Access Point steadily to the pole by locking the pole mounting ring tightly. P.S. This device is for indoor use only. Power Up Connect power cord to the PoE injector as the following right picture shows.
  • Page 24: Connect To The Access Point

    Connect the Ethernet cable that connects the Access Point to the “POE” port of the PoE injector as figured below. Connect the power plug to a power socket. The Access Point will be powered up immediately. Connect to the Access Point To be able to configure and manage the Access Point, please do the followings: Open the ferrite core by unsnapping the connector latches.
  • Page 25 Loop the cable around and through the core. This helps "lock" the core in place, and may be required in circumstances with severe interference. Close the core and snap the halves back together. Note: The ferrite is professionally installed and a shrink wrap has been put around the ferrite so the users CAN’T take the ferrite off.
  • Page 26 Connect the Ethernet cable with suppression core to the “Data In” port of the PoE injector. Connect the other end of Ethernet cable to a PC or a switch hub. The hardware installation is complete. To configure the Access Point, please refer to Chapter 3 Basic Settings.
  • Page 27: Chapter 3 Basic Settings

    Chapter 3 Basic Settings Factory Default Settings We’ll elaborate the IEEE 802.11n Wireless Access Point factory default settings. You can re-acquire these parameters by default. If necessary, please refer to the “Restore Factory Default Settings”. Table 1 IEEE 802.11n Wireless Access Point Factory Default Settings Features Factory Default Settings Username...
  • Page 28: System Requirements

    System Requirements Before configuration, please make sure your system meets the following requirements: A computer coupled with 10/ 100 Base-TX adapter; Configure the computer with a static IP address of 192.168.1.x, as the default IP address of IEEE 802.11n Wireless Access Point is 192.168.1.1. (X cannot be 0, 1, nor 255); A Web browser on PC for configuration such as Microsoft Internet Explorer 6.0 or above, Netscape, Firefox or Google Chrome.
  • Page 29 Enter the username (Default: admin) and password (Default: password) respectively and click “Login” to login the main page of IEEE 802.11n Wireless Access Point. As you can see, this management interface provides five main options in the black bar above, which are Status, System, Wireless, Management and Tools.
  • Page 30: Basic System Settings

    Basic System Settings For users who use the IEEE 802.11n Wireless Access Point for the first time, it is recommended that you begin configuration from “Basic Settings” in “System” shown below: Figure 5 Basic System Settings Device Name: Specify the device name, which is composed of no more than 15 characters with (0-9), (A-Z), (a-z) or (-).
  • Page 31 Figure 6 Network Settings Network Mode: Specify the network mode, including Bridge and Router. It is easy to configure parameters in Bridge Mode; however, users must pay extra attention to the way they configure the device when it is set to Router Mode. For details, please refer to TCP/IP Settings”. Spanning Tree: Spanning Tree Protocol (STP) is a link management protocol for AP which provides path redundancy while preventing loops in a network.
  • Page 32 Users may change the settings for IP Address, Subnet Mask, and DHCP Server. Obtain IP Address Automatically: If a DHCP server exists in your network, you can check this option, thus the IEEE 802.11n Wireless Access Point is able to obtain IP settings automatically from that DHCP server.
  • Page 33: Time Settings

    WAN Access Type: Specify the Internet access method to Static IP, DHCP or PPPOE. Users must enter WAN IP Address, Subnet Mask, Gateway settings provided by your ISPs. LAN Settings: When DHCP Server is disabled, users can specify IP address and subnet mask for the Access Point manually.
  • Page 34: Radius Settings

    Figure 8 Time Settings Current Time: Display the present time in Yr, Mon, Day, Hr, Min and Sec. Time Zone Select: Select the time zone from the dropdown list. NTP Server: Select the time server from the “NTP Server” dropdown list. Manual IP: Manually input the IP address of available time server.
  • Page 35: Firewall Filtering

    Figure 9 RADIUS Settings Authentication RADIUS Server This is for RADIUS authentication. It can communicate with RADIUS through IP Address, Port and Shared Secret. IP Address: Enter the IP address of the Radius Server; Port: Enter the port number of the Radius Server; Shared Secret: This secret, which is composed of no more than 31 characters, is shared by the IEEE 802.11n Wireless Access Point and RADIUS during authentication.
  • Page 36: Port Forwarding

    Figure 10 Source IP Filtering Filter Type: MAC Filtering: The MAC filtering gives users the ability to restrict packets from certain devices by entering MAC address. Source IP Filtering: The source IP filtering gives users the ability to restrict certain types of data packets from your local network to Internet through IEEE 802.11n Wireless Access Point.
  • Page 37: Dmz

    server like a web server or mail server on the private local network behind IEEE 802.11n Wireless Access Point’s NAT firewall. Figure 11 Port Forwarding A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network.
  • Page 38: Basic Wireless Settings

    Basic Wireless Settings Open “Basic Settings” in “Wireless” as below to make basic wireless configuration. Figure 13 Basic Wireless Settings Disable Wireless LAN Interface: Check this option to disable WLAN interface, then the wireless module of IEEE 802.11n Wireless Access Point will stop working and no wireless device can connect to it. Operation Mode: Four operating modes are available in IEEE 802.11n Wireless Access Point.
  • Page 39 Wireless Network Name (SSID): This wireless network name is shared among all associated devices in your wireless network. Keep it identical on all those devices. Note that the SSID is case-sensitive and cannot exceed 32 characters. Broadcast SSID: Under AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk.
  • Page 40: Site Survey

    Enable MAC Clone Available only under wireless client mode, it hides the MAC address of the AP while displays the one of the device connected to the Access Point. Default is Auto MAC Clone. User may choose to enter the MAC address to be cloned manually. Site Survey Under wireless client mode, the IEEE 802.11n Wireless Access Point is able to perform site survey, through which, information on the available Access Points will be detected.
  • Page 41 virtual AP, you may check the Enabled box of the profile and click on the profile (eg. Profile 2) to configure wireless and security settings. Hit Apply to active the profile. Figure 15 VAP Profile Settings Figure 16 VAP Profile Settings Profile Name: Name of the VAP profile SSID:...
  • Page 42 In AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk. By disabling broadcast SSID, the STA cannot scan and find the IEEE 802.11n Wireless Access Point, so that malicious attack by some illegal STA could be avoided. Wireless Separation: Wireless separation is an ideal way to enhance the security of network transmission.
  • Page 43: Chapter 4 Advanced Settings

    Chapter 4 Advanced Settings Advanced Wireless Set tings Open “Advanced Settings” in “Wireless” to make advanced wireless settings. Figure 17 Advanced Wireless Settings MPDU/A-MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled;...
  • Page 44: Traffic Shaping

    Leave it at its default of 2346 is recommended. Fragmentation Length Specify the maximum size in byte for a packet before data is fragmented into multiple packets. Setting it too low may result in poor network performance. Leave it at its default of 2346 is recommended.
  • Page 45: Wireless Security Settings

    Figure 18 Traffic Shaping Enable Traffic Shaping Check this box to control the overall bandwidth for a specific VAP network. Interface Selection: Select the VAP network you would like to enable traffic shaping. Outgoing Traffic Rate: To specify maximum outgoing bandwidth to a certain rate in kbit/s. Outgoing Traffic Burst: To specify the buffer size for outgoing traffic that can be sent within a given unit of time.
  • Page 46 Open System: It allows any device to join the network without performing any security check. Shared Key: Data encryption and key are required for wireless authentication (Not available in Bridge/AP Repeater mode). Legacy 802.1x: Available in AP/Wireless Client mode, it provides the rights to access the wireless network and wired Ethernet.
  • Page 47: Access Control

    encryption for the client. If it is selected, the data encryption can only be TKIP + AES and the passphrase is required. Data Encryption If data encryption is enabled, the key is required and only sharing the same key with other wireless devices can the communication be established.
  • Page 48: Wds Settings

    Figure 20 Access Control Profile Selection Select the VAP profile you would like to enable Access Control Access Control Mode If you select “Allow Listed”, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP. While when “Deny Listed” is selected, those wireless clients on the list will not be able to connect the AP.
  • Page 49 Figure 21 WDS Settings Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and click “Apply” to save settings. Note: WDS Settings is available only under Bridge and AP Repeater Mode. Bridge uses the WDS protocol that is not defined as the standard thus compatibility issues between equipment from different vendors may arise.
  • Page 50: Chapter 5 Management

    Chapter 5 Management Password From “Password Settings” in “Management”, you can change the password to manage your IEEE 802.11n VAC Access Point. Figure 22 Password Settings Current Password: Enter the current password. New Password: Enter the new password. Confirm Password: Enter the new password again for confirmation.
  • Page 51: Backup/ Retrieve Settings

    Figure 23 Firmware Upgrade Click “Browse” to select the firmware file you would like to load; Click “Upload” to start the upload process; Wait a few minutes, the VAC Access Point will reboot after successful upgrade. Note: Do NOT cut the power off during upgrade, otherwise the system may crash! Only official firmware issued by applicant to be used for firmware upgrade to continuously compliance of FCC rule.
  • Page 52: Restore Factory Default Settings

    Save Setting to File By clicking “Save”, a dialog box will pop up. Save it, then the configuration file ap.cfg will be generated and saved to your local computer. Load Settings from File By clicking “Browse”, a file selection menu will appear, select the file you want to load, like ap.cfg; Click “Upload”...
  • Page 53: User Certificate

    Click “Reboot” and hit “Yes” upon the appeared prompt to start reboot process. This takes a few minutes. Figure 26 Reboot User Certificate Under Wireless Client mode, when EAP-TLS is used, the RADIUS server must know which user certificates to trust. The Server can trust all certificates issued by a given CA. To import a user certificate, from Import User Certificates, click “Browse”...
  • Page 54: Remote Management

    Remote Management The IEEE 802.11n VAC Access Point provides a variety of remotes managements including Telnet, SNMP, FTP, SSH, HTTPS and exclusive WISE tool, making configuration more convenient and secure. Figure 28 Remote Management SNMP Management The IEEE 802.11n VAC Access Point supports SNMP for convenient remote management. Open “SNMP Settings”...
  • Page 55 Protocol Version: Select the SNMP version, and keep it identical on the IEEE 802.11n VAC Access Point and the SNMP manager. The IEEE 802.11n VAC Access Point supports SNMP v2/v3. Server Port: Change the server port for a service if needed; however you have to use the same port to use that service for remote management.
  • Page 56 Privacy Protocol: Specify the encryption method for SNMP communication. None and DES are available. None means no encryption is applied. DES is a Data Encryption Standard that applies a 58-bit key to each 64-bit block of data.
  • Page 57: Chapter 6 Monitoring Tools

    Chapter 6 Monitoring Tools System Log System log is used for recording events occurred on the IEEE 802.11n VAC Access Point, including station connection, disconnection, system reboot and etc. Open “System Log” in “Tools” as below. Figure 30 Syslog Remote Syslog Server Enable System log to alert remote server.
  • Page 58 Figure 31 Ping Watchdog Enable Ping Watchdog: To activate ping watchdog, check this checkbox. IP Address to Ping: Specify the IP address of the remote unit to ping. Ping Interval: Specify the interval time to ping the remote unit. Startup Delay: Specify the startup delay time to prevent reboot before the IEEE 802.11n VAC Access Point is fully initialized.
  • Page 59: Chapter 7 Status

    Chapter 7 Status View Basic Information Open “Information” in “Status” to check the basic information of the Access Point, which is read only. Information includes system information, LAN settings, wireless setting and interface status. Click “Refresh” at the bottom to have the real-time information. Figure 32 Basic Information View Association List Open “Connections”...
  • Page 60: View Network Flow Statistics

    Figure 33 Connection By clicking on the MAC address of the selected device on the web you may see more details including device name, connection time, signal strength, noise floor, ACK timeout, link quality, IP information, current data rate, current TX/RX packets. View Network Flow Statistics Open “Statistics”...
  • Page 61: View Arp Table

    Figure 34 Network Flow Statistics Poll Interval Specify the refresh time interval in the box beside “Poll Interval” and click “Set Interval” to save settings. “Stop” helps to stop the auto refresh of network flow statistics. View ARP Table Open “ARP Table” in “Status” as below. Click “Refresh” to view current table. Figure 35 ARP Table...
  • Page 62: View Bridge Table

    View Bridge Table Open “Bridge Table” in “Status” as below. Click “Refresh” to view current connected status.. Figure 36 Bridge Table View Routing Table Available in Router mode, the routing table shows the current route information. Figure 37 Routing Table View Active DHCP Client Table Available in Router mode, the DHCP allows to check the assigned IP address, MAC address and time expired for each DHCP leased client.
  • Page 63 Figure 38 DHCP Client Table...
  • Page 64: Chapter 8 Troubleshooting

    Chapter 8 Troubleshooting This chapter provides troubleshooting procedures for basic problems with the IEEE 802.11n Wireless Access Point. For warranty assistance, contact your service provider or distributor for the process. Q 1. How to know the MAC address of IEEE 802.11n Wireless Access Point? MAC Address distinguishes itself by the unique identity among network devices.
  • Page 65  Login the unit via other browsers such as Firefox.  Hardware reset the unit. Q 5. What if the wireless connection is not stable after associating with an AP under wireless client mode?  Since the IEEE 802.11n Wireless Access Point comes with a built-in directional antenna, it is recommended make the IEEE 802.11n Wireless Access Point face to the direction where the AP is to get the best connection quality.
  • Page 66: Appendix A. Ascii

    Appendix A. ASCII WEP can be configured with a 64-bit, 128-bit or 152-bit Shared Key (hexadecimal number or ACSII). As defined, hexadecimal number is represented by 0-9, A-F or a-f; ACSII is represented by 0-9, A-F, a-f or punctuation. Each one consists of two-digit hexadecimal. Table 2 ACSII ASCII ASCII...

Table of Contents