Teletronics International EZStation2 User Manual

2.4ghz 400mw 802.11b/g radio with 15dbi patch antenna

Advertisement

Quick Links

EZStation2
User Manual
Rev. A
2.4GHz 400mW 802.11b/g Radio
with 15dBi Patch Antenna

Advertisement

Table of Contents
loading

Summary of Contents for Teletronics International EZStation2

  • Page 1 EZStation2 User Manual Rev. A 2.4GHz 400mW 802.11b/g Radio with 15dBi Patch Antenna...
  • Page 2 Disclaimers No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation or adaptation) without written permission from the copyright owner. All other trademarks and registered trademarks are the property of their respective owners. Statement of Conditions We may make improvements or changes in the product described in this documentation at any time.
  • Page 3: Before Start To Configure

    Before Start to Configure The WLAN Broadband Router is delivered with the following factory default parameters on the Ethernet LAN interfaces. Default IP Address: 192.168.1.254 Default IP subnet mask: 255.255.255.0 WEB login User Name: <empty> WEB login Password: <empty> The device has three operation modes (Gateway/Bridge/WISP). The default IP addresses for the device are 192.168.1.254, so you need to make sure the IP address of your PC is in the same subnet as the device, such as 192.168.1.X.
  • Page 4 For OS of Microsoft Windows 2000, XP: 1. Click the Start button and select Settings, then click Control Panel. The Control Panel window will appear. 2. Move mouse and double-click the right button on Network and Dial-up Connections icon. Move mouse and double-click the Local Area Connection icon.
  • Page 5 This page shows the current status and some basic settings of the device, includes system, wireless, Ethernet LAN and WAN configuration information. Item Description System Uptime It shows the duration since WLAN Broadband...
  • Page 6 Router is powered on. Firmware version It shows the firmware version of WLAN Broadband Router. Wireless configuration Mode It shows wireless operation mode Band It shows the current wireless operating frequency. SSID It shows the SSID of this WLAN Broadband Router.
  • Page 7: Setup Wizard

    Setup Wizard This page guides you to configure wireless broadband router for first time Operation Mode This page followed by Setup Wizard page to define the operation mode.
  • Page 8: Time Zone Setting

    Time Zone Setting This page is used to enable and configure NTP client LAN Interface Setup This page is used to configure local area network IP address and subnet mask...
  • Page 9: Wan Interface Setup

    WAN Interface Setup This page is used to configure WAN access type Wireless Basic Settings This page is used to configure basic wireless parameters like Band, Mode, Network Type SSID, Channel Number, Enable Mac Clone(Single Ethernet Client)
  • Page 10: Wireless Security Setup

    Wireless Security Setup This page is used to configure wireless security Operation Mode This page is used to configure which mode wireless broadband router acts...
  • Page 11 Item Description Gateway Traditional gateway configuration. It always connects internet via ADSL/Cable Modem. LAN interface, WAN interface, Wireless interface, NAT and Firewall modules are applied to this mode Bridge Each interface (LAN, WAN and Wireless) regards as bridge. NAT, Firewall and all router’s functions are not supported Wireless ISP Switch Wireless interface to WAN port and all...
  • Page 12 Item Description Disable Wireless Click on to disable the wireless LAN data LAN Interface transmission. Band Click to select 2.4GHz(B) / 2.4GHz(G) / 2.4GHz(B+G) Mode Click to select the WLAN AP / Client / WDS / AP+WDS wireless mode. Site Survey The Site Survey button provides tool to scan the wireless network.
  • Page 13 Item Description Authentication Type Click to select the authentication type in Open System, Shared Key or Auto selection. Fragment Threshold Set the data packet fragmentation threshold, value can be written between 256 and 2346 bytes. RTS Threshold Set the RTS Threshold, value can be written between 0 and 2347 bytes.
  • Page 14 802.11g Protection Protect 802.11b user. RF Output Power To adjust transmission power level. Turbo Mode Click to Enable/Disable turbo mode.(Only apply to WLAN IC of Realtek). Block Relay Between Click Enabled/Disabled to decide if blocking Clients relay packets between clients. Click Enabled/Disabled to init WMM feature.
  • Page 15 Item Description Encryption Select the encryption supported over wireless access. The encryption method can be None, WEP, WPA(TKIP), WPA2 or WPA2 Mixed Use 802.1x While Encryption is selected to be WEP. Authentication Click the check box to enable IEEE 802.1x authentication function.
  • Page 16 Item Description Key Length Select the WEP shared secret key length from pull-down menu. The length can be chose between 64-bit and 128-bit (known as “WEP2”) keys. The WEP key is composed of initialization vector (24 bits) and secret key (40-bit or 104-bit). Key Format Select the WEP shared secret key format from pull-down menu.
  • Page 17 Item Description Wireless Access Click the Disabled, Allow Listed or Deny Listed Control Mode of drop down menu choose wireless access control mode. This is a security control function; only those clients registered in the access control list can link to this WLAN Broadband Router.
  • Page 18: Wds Settings

    WDS Settings Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. To do this, you must set these APs in the same channel and set MAC address of other AP that you want to communicate with in the table and then enable the WDS.
  • Page 19 WDS Security Setup Requirement: Set [Wireless]->[Basic Settings]->[Mode]->AP+WDS This page is used to configure the wireless security between APs. WDS AP Table This page is used to show WDS statistics...
  • Page 20: Site Survey

    Item Description MAC Address It shows the MAC Address within WDS. Tx Packets It shows the statistic count of sent packets on the wireless LAN interface. Tx Errors It shows the statistic count of error sent packets on the Wireless LAN interface. Rx Packets It shows the statistic count of received packets on the wireless LAN interface.
  • Page 21 Refresh Click the Refresh button to re-scan site survey on the screen. Connect Click the Connect button to establish connection. LAN Interface Setup This page is used to configure the parameters for local area network that connects to the LAN ports of your WLAN Broadband Router. Here you may change the setting for IP address, subnet mask, DHCP, etc.
  • Page 22 assigned IP address, MAC address and time expired information. [Server mode only] DNS Server Manual setup DNS server IP address. Domain Name Assign Domain Name and dispatch to DHCP clients. It is optional field. 802.1d Spanning Select to enable or disable the IEEE 802.1d Tree Spanning Tree function from pull-down menu.
  • Page 23 Item Description Static IP Click to select Static IP support on WAN interface. There are IP address, subnet mask and default gateway settings need to be done. IP Address If you select the Static IP support on WAN interface, fill in the IP address for it. Subnet Mask If you select the Static IP support on WAN interface, fill in the subnet mask for it.
  • Page 24: Dhcp Client

    DHCP Client Item Description DHCP Client Click to select DHCP support on WAN interface for IP address assigned automatically from a DHCP server. Host Name Fill in the host name of Host Name. The default value is empty MTU Size Fill in the mtu size of MTU Size.
  • Page 25 Refer to 4.22 What is Universal Plug and Play (uPNP)? Enable Web Server Click the checkbox to enable web configuration Access on WAN from WAN side. Enable WAN Echo Click the checkbox to enable WAN ICMP Reply response. Set TTL value Click to Enable and set Time to Live value.
  • Page 26 Item Description PPPoE Click to select PPPoE support on WAN interface. There are user name, password, connection type and idle time settings need to be done. User Name If you select the PPPoE support on WAN interface, fill in the user name and password to login the PPPoE server.
  • Page 27 Enable uPNP Click the checkbox to enable uPNP function. Enable Web Server Click the checkbox to enable web configuration Access on WAN from WAN side. Enable WAN Echo Click the checkbox to enable WAN ICMP Reply response. Set TTL value Click to Enable and set Time to Live value.
  • Page 28 Item Description PPTP Allow user to make a tunnel with remote site directly to secure the data transmission among the connection. User can use embedded PPTP client supported by this router to make a VPN connection. IP Address If you select the PPTP support on WAN interface, fill in the IP address for it.
  • Page 29: Firewall - Port Filtering

    Firewall - Port Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Item Description Enable Port Filtering Click to enable the port filtering security function.
  • Page 30: Firewall - Ip Filtering

    Firewall - IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Item Description Enable IP Filtering...
  • Page 31: Firewall - Mac Filtering

    Firewall - MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Item Description Enable MAC...
  • Page 32: Firewall - Port Forwarding

    Firewall - Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway's NAT firewall.
  • Page 33: Firewall - Url Filtering

    Delete Selected Click to delete the selected IP address and port number that will be removed from the port-forwarding list. Delete All Click to delete all the registered entries from the port-forwarding list. Reset Click the Reset button to abort change and recover the previous configuration setting.
  • Page 34: Firewall - Dmz

    Firewall - DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. Item Description Enable DMZ...
  • Page 35 Item Description Enable IPSEC VPN Click to enable IPSEC VPN function. Enable NAT Click to enable NAT Traversal function. Traversal Generate RSA Key Click to generate RSA key. Show RSA Public Click to show RSA public key that we generate. Apply Changes Click the Apply Changes button to enable IPSEC VPN, NAT Traversal settings.
  • Page 36 VPN Setup - Edit Tunnel Item Description Enable Tunnel # Click to enable the IPSEC VPN current tunnel. Connection Name Assign the connection name tag. Auth Type Click to select PSK or RSA. Local Site Click to select Single Address or Subnet Address VPN connection.
  • Page 37 Item Description Key Management Click to select IKE or Manual mode. Advanced Click Advanced button to configure more IKE settings. Connection Type Click to select Initiator or Responder mode. Connect Click to connect manually. [Responder mode only] Disconnect Click to disconnect manually. [Responder mode only].
  • Page 38: Advanced Ike Setup

    Advanced IKE Setup Item Description Phase 1 Negotiation Mode Main mode. Encryption Algorithm Click to select 3DES or AES128 encryption. Authentication Click to select MD5 or SHA1 authentication. Algorithm Key Group Click to select DH1(modp768), DH2(modp1024) or DH5(modp1536) key group. Default value is Key Life Time Fill in the key life time value by seconds.
  • Page 39: Management - Statistics

    Algorithm Key Life Time Fill in the key life time value by seconds. Encapsulation Tunnel mode. Click to select ON or NONE. Perfect Forward Secrecy (PFS) Click the Ok button to save current tunnel settings. Cancel Click the Cancel button to close current window without any changes.
  • Page 40: Management - Ddns

    Management - DDNS This page is used to configure Dynamic DNS service to have DNS with dynamic IP address. Item Description Enable DDNS Click the checkbox to enable DDNS service. Service Provider Click the drop down menu to pickup the right provider.
  • Page 41: Management - Denial-Of-Service

    Management - Time Zone Setting This page is used to configure NTP client to get current time. Item Description Current Time It shows the current time. Time Zone Select Click the time zone in your country. Enable NTP client Click the checkbox to enable NTP client update. R update NTP Server Click select default or input NTP server IP...
  • Page 42 Item Description Enable DoS Click the checkbox to enable DoS prevention. Prevention Whole System Flood Enable and setup prevention in details. / Per-Source IP Flood… Select ALL Click the checkbox to enable all prevention items. Clear ALL Click the checkbox to disable all prevention items.
  • Page 43: Management - Log

    Management - Log This page is used to configure the remote log server and shown the current log. Item Description Enable Log Click the checkbox to enable log. System all Show all log of wireless broadband router Wirelessy Only show wireless log Only show Denial-of-Service log Enable Remote Log Click the checkbox to enable remote log service.
  • Page 44: Management - Upgrade Firmware

    Management - Upgrade Firmware This page allows you upgrade the Access Point firmware to new version. Please note, do not power off the device during the upload because it may crash the system. Item Description Click the Browse button to select the new version Select File of web firmware image file.
  • Page 45 Item Description Save Settings to File Click the Save button to download the configuration parameters to your personal computer. Click the Browse button to select the Load Settings from File configuration files then click the Upload button to update the selected configuration to the WLAN Broadband Router.
  • Page 46: Management - Watchdog

    Management - WatchDog This page is used to do watchdog function using ping command. User set IP address, interval and ping fail count conditions to decide whether router reboots or not. Item Description Enable WatchDog Click to enable watchdog. WatchDog IP IP address that is referred.
  • Page 47 Item Description Enable QoS Click to enable QoS. ISP Bandwidth Download Fill in the value that is the download stream from ISP by KB/s. Upload Fill in the value that is the upload stream from ISP by KB/s. Undef IP Bandwidth Download Define the download bandwidth that is not defined.
  • Page 48 Bandwidth Control IP Address Range Set start and end ip address. Guarantee Bandwidth Download Fill in the value by KB/s. Upload Fill in the value by KB/s. Piority Click to pick High, Medium or Low Apply Changes Click the Apply Changes button to complete the new configuration setting.
  • Page 49 Teletronics and we will be responsible for the cost of shipment back to the customer. Ship to: Teletronics International, Inc. 2 Choke Cherry Road, Suite 100 Rockville, MD 20850 USA. 7. SHIPPING METHOD: All the repaired products will be shipping back to customers via UPS/FedEX Ground service.
  • Page 50: Regulatory Information

    Regulatory Information Statement of Conditions We may make improvements or changes in the product described in this documentation at any time. The information regarding the product in this manual are subject to change without notice. We assume no responsibility for errors contained herein or for direct, indirect, special, incidental, or consequential damages with the furnishing, performance or use of this manual or equipment supplied with it, even if the suppliers have been advised of the possibility of such damages.
  • Page 51: European Union Ce Marking And Compliance Notices

    European Union CE Marking and Compliance Notices Products intended for sale within the European Union are marked, which indicates compliance with the applicable directives identified below. This equipment also carries the Class 2 identifier. With the Conformité Européene (CE) and European standards and amendments, we declare that the equipment described in this document is in conformance with the essential requirements of the European Council Directives, standards and other normative documents listed below: 73/23/EEC Safety of the User (article 3.1.a)
  • Page 52: Contact Information

    Contact Information Need to contact Teletronics? Visit us online for information on the latest products and updates to your existing products at: http://www.teletronics.com Can't find information about a product you want to buy on the web? Do you want to know more about networking with Teletronics products? Give us a call at: 301-309-8500 or fax your request to: 301-309-8551 For technical support issues you can e-mail us at:...
  • Page 53: Frequently Asked Questions (Faq)

    Frequently Asked Questions (FAQ) 1. What and how to find my PC’s IP and MAC address? IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.
  • Page 54 Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network. This mode is useful for quickly and easily setting up a wireless network anywhere that a wireless infrastructure does not exist or is not required for services, such as a hotel room, convention center, or airport, or where access to the wired network is barred (such as for...
  • Page 55 8. What are the Open System and Shared Key authentications? IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open system authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station.
  • Page 56 back a CTS (Clear to Send) packet before sending the actual packet data. This setting is useful for networks with many clients. With many clients, and a high network load, there will be many more collisions. By lowering the RTS threshold, there may be fewer collisions, and performance should improve.
  • Page 57: What Is 802.1X Authentication

    authentication protocol, will be added to the network. 16. What is WPA2? It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendment to the 802.11 standard. 17. What is 802.1x Authentication? 802.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication Protocol (EAP) over LANs (WAPOL).
  • Page 58 Maximum Transmission Unit (MTU) indicates the network stack of any packet is larger than this value will be fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate its MRU and will be accepted. The actual MTU of the PPP connection will be set to the smaller one of MTU and the peer’s MRU.

Table of Contents