CHAPTER 1: PRODUCT OVERVIEW ..........1 Introduction ......................1 Features and Benefits ..................2 When to use which mode ...................3 Access Point Mode.................... 3 Access Point Client Mode ................4 Point to Point Mode ................... 5 Point to Multiple point Mode ................6 Wireless Routing Client Mode ................
Page 3
Table of Contents STP Setup......................71 (Only available in Access Point, Point to Point and Point to Multiple Point modes)........................71 MAC Filtering......................75 CHAPTER 5: WLAN SECURITY............79 How to set up WEP .....................80 How to set up WPA-PSK/WPA2-PSK/WPA-PSK-AUTO (Only available in Access Point mode) ..................81 How to set up 802.1x/RADIUS (Only available in Access Point mode) ..83 How to set up WPA EAP/WPA2-EAP/WPA-EAP-AUTO (Only Access Point mode supports WPA2-EAP and WPA-EAP-AUTO) ...........85...
Page 4
Table of Contents Email Notification.....................121 Static Address Translation (only supported by Wireless Routing Client and Gateway) ......................123 DNS Redirection (only supported by Wireless Routing Client and Gateway) ...........................125 To enable/disable DNS Redirection............127 Dynamic DNS Setup..................127 To enable/disable Dynamic DNS Setup............. 128 To manage Dynamic DNS List (DDNS)............
Page 5
Table of Contents For Windows XP/2000..................161 APPENDIX III: PANEL VIEWS & DESCRIPTIONS .......163 APPENDIX IV: TECHNICAL SPECIFICATIONS ......165...
The AIRNET 54Mb Outdoor AP/Bridge series is a high-performance Access Point and Bridge designed for enterprises and outdoor users. It is compatible with IEEE 802.11a/b/g and supports high-speed data transmission up to 54Mb. Housed in a waterproof casing, AIRNET 54Mb Outdoor AP/Bridge series is designed to withstand any extreme climatic conditions, making it the ideal solution for outdoor applications.
Product Overview • Outdoor and Waterproof Design • Full IEEE 802.11a/b/g compatibility allows inter-operation among multiple vendors. • High speed data transfer rate up to 54Mbps • WDS - Wireless Distribution System • Long-Range Parameter Settings • Power over Ethernet - PoE •...
Product Overview The access point is versatile in the sense that it may operate in seven different types of modes: Access Point Mode, Client Mode, Point to Point, Point to Multiple Point, Wireless Routing Client , Gateway and Wireless Adapter. This section presents a brief outline of the different network applications that can be accommodated through the different modes of the access point.
Product Overview In Access Point Client mode, the access point acts as a wireless client that can operate wirelessly with another access point to perform bridging between two Fast Ethernet networks. The Access Point client cannot communicate directly with any other wireless device. In the example above, the workgroup PCs will be able to access the PCs connected to the access point in Access Point Client mode.
Product Overview In Point to Point mode, the access point allows point-to-point communication between different buildings. It enables you to bridge wireless clients that are miles or kilometers apart while unifying the networks. In the example above, you may configure two access points (AP) to perform transparent bridging between two buildings...
Product Overview In Point to Multiple Point mode, this mode is similar to that of the Point to Point mode. But the access point located at one facility is able to connect to up to 8 access points (AP) installed in any direction from that facility. The above illustration describes how this mode operates.
Product Overview An application of this mode would be for the Ethernet port of the Wireless Routing Client to be used for connection with other devices on the network while access Internet would achieved through wireless communication with wireless ISP. The above illustration describes how this mode operates.
Product Overview Or put it more simply, Broadband Internet sharing in a wireless network! Since the access point supports several types of broadband connections, the first step in setting up the access point as a Broadband Internet Gateway is to identify the type of broadband Internet access you are subscribed to.
Product Overview PPP over Ethernet (PPPoE) Select this type of connection if you are using ADSL services in a country utilising standard PPP over Ethernet for authentication. For instance: If you are in Germany which uses T-1 connection or If you are using SingNet Broadband or Pacific Internet Broadband in Singapore. PPTP Select this type of connection if you are using ADSL services in a country utilising PPTP connection and authentication.
• Do not work on the system or connect or disconnect cables during periods of lightning activity. • Do not locate the antenna near overhead power lines or other electric light or power circuits, or where it can come into contact with such circuits. When installing the antenna, take extreme care not to come into contact with such circuits, as they may cause serious injury or death.
Hardware Installation Take a moment to ensure you have all of the following parts in your Outdoor Waterproof Unit installation kit before you begin installing the product. If any parts are missing, please contact your local vendor or contact us at 305- 4182232.
Hardware Installation Before starting, please verify that the following is available: • CAT5/5e or FTP Outdoor Ethernet cable (from the Outdoor AP to PoE Injector) • At least one computer is installed with a Web browser and a wired or wireless network interface adapter •...
Hardware Installation The diagram below shows the overall setup of Outdoor Access Point.
Page 19
RJ-45 connector on the outdoor access point. Then connect the other end of the cable to the PoE injector. For the Netkrom PoE, the recommended length of the RJ45 Category 5 cable is up to 150 feet or 50 meters.
Page 20
Connect the external antenna to the N Female connector of the access point. Connect the RJ45 Ethernet cable attached to the Netkrom PoE Injector to a switch or PC you will use to configure the access point.
Page 21
Hardware Installation Connect the power adapter supplied in the Netkrom PoE kit to the main electrical supply and the power plug into the socket of the injector. Now, turn on your power supply. Notice that the POWER LED has lighted up.
Hardware Installation Outdoor Access Point device can be mounted on the pole or tower as shown in following: 1.-Mount the bracket to the pole with the U-bolts. 2.- Attach the radio to the bracket which was mounted on the pole with the supplied nuts and U-bolts.
There are two methods to access to the web-based Interface of your access point: • – • – You can access to the web-based interface directly without the need to assign a different IP address to your PC. • • You need to assign an IP address to your PC, such as 192.168.168.x, where x can take any value from 2 to 254, so that it is in the same subnet as Access point.
Page 24
Access to Web-based Interface When the utility has been installed, double-click on the icon. The following screen will appear, click on the button to proceed. Select in the section and click on the button. To retrieve and display the latest device(s) in the list, click on the button.
Page 25
Access to Web-based Interface Do not exit the uConfig program while accessing to the web-based interface. This will disconnect you from the device. Click on the button to proceed. At the login page, press the button to enter the configuration page. The default password is “password”.
Page 26
Access to Web-based Interface You will then reach the home page of your access point’s web-based interface.
Access to Web-based Interface Another utility program NpFind, intended to help you verify the IP address of your product. Follow the next steps to check the IP address of your access point. Insert the Product CD into the CD-ROM drive. It will automatically run. Click on and select program to run it.
Access to Web-based Interface For this method, you need to assign an IP address to your PC so that it belongs to the same subnet as your access point. In this example, we are using Windows XP for illustration. For Windows 98/98SE/2000/NT/ME, kindly refer to Appendix II “TCP/IP Configuration”.
Page 29
Access to Web-based Interface Highlight and click on the button. Select the radio button for . Enter the IP Address and Subnet Mask as 192.168.168.x and 255.255.255.0, where x can be any number from 2 to 254, except 1. In this example, we are using 192.168.168.160 as the static IP Address.
Page 30
Access to Web-based Interface Click on the button to close all windows. Next, in order to check if the IP address has been correctly assigned to your PC, go to menu, , select and type the command ipconfig/all. Your PC is now ready to configure your access point. Launch your Web browser.
Page 31
Access to Web-based Interface Open the tab and in the section, disable all the option boxes. Click on the button to update the changes. At the bar, enter http://192.168.168.1 and press on your keyboard. At the login page, click on the button to enter the configuration pages.
Page 32
Access to Web-based Interface You will then reach the home page of your access point’s Web interface.
Common Configuration This chapter illustrates the following features, which are available in ALL the operating modes of your access point, unless stated otherwise. • • • • • • • • • • • • • • This section shows you how to customize the parameters of your access point to suit the needs of your network.
Common Configuration You can opt to adjust the default values of your access point and customize them to your network settings. Click on from the menu. In the page, refer to the table below to replace the default settings of Access point with appropriate values to suit the needs of your network.
Page 35
Common Configuration Parameters Description IP Address When the DHCP server of the access point is enabled (unless you set a different DHCP Gateway IP Address), this LAN IP Address would be allocated as the Default Gateway of the DHCP client. The IP address of your Access point is set by default to 192.168.168.1.
Page 36
Common Configuration DHCP client will thus receive its dynamic IP address from the access point but will access to the Internet or to the other LAN through the Default Gateway defined by the DHCP Gateway IP Address. For instance, if the access point is used in Access Point Client mode and connects to an Internet gateway, X, a PC wired to the access point will be unable to obtain a dynamic IP address directly from X.
Common Configuration The following will guide you to a page display of the active IP address leases that have been allocated by the built-in DHCP server of Access point. Click on from the menu. Go to the section, click on the button.
Common Configuration Making an IP address reservation lets you inform the DHCP server to exclude that specific address from the pool of free IP addresses it draws on for dynamic IP address allocation. For instance, if you set up a publicly accessible FTP/HTTP server within your private LAN, while that server would require a fixed IP address, you would still want the DHCP server to dynamically allocate IP addresses to the rest of the PCs on the LAN.
Page 39
Common Configuration page will then be refreshed to illustrate the currently reserved IP addresses. If you do not need the DHCP server to reserve an IP address anymore, you can delete the DHCP Server Reservation. Click on the reserved IP address that you wish to delete, e.g. 192.168.168.20. Click on the button.
Page 40
Common Configuration table will then be refreshed to reflect your changes.
Common Configuration This section shows how to perform the following functions: Basic: This function performs a basic setup of the wireless modes of operation: Access Point mode, Access Point Client mode and other operating modes. Security: This function performs data encryption and protection for the access point. Kindly refer to Chapter 5 on WLAN Security for details.
Page 42
Common Configuration Between 19 and 17 dBm Flashes 6 times Between 17 and 14 dBm Flashes 3 times Between 13 and 10 dBm Flashes ONCE Below 10dBm Turns OFF NOTE The signal strength of below 10dBm is not recommended for outdoor long distance connection.
The following will guide you to configure the basic setup of the wireless mode you have selected. Click on from the menu. You will see the sub- menus expanded under . Click on The default operating mode of the access point is the Access Point mode. AIR-BR500G/GH AIR-BR500AG...
Page 44
Note that the page for the Client mode is different from that of the Access Point mode. AIR-BR500G/GH AIR-BR500AG If you wish to set the access point in the mode, click on to select , and then you will see the page below.
Page 45
Common Configuration AIR-BR500G/GH AIR-BR500AG If you wish to set the access point in the mode, click on to select , and then you will see the page below. AIR-BR500G/GH AIR-BR500AG To create a new peer MAC, click on the button. The page will appear.
Page 46
Common Configuration This table describes the parameters that can be modified in the page. Parameters Description The Current Mode The default operating mode of the access point is the Access Point mode. The access point can operate in 7 modes: •...
Page 47
Common Configuration be found in the listing. This feature is supported by the Access Point Client and Wireless Routing Client modes. Wireless Profile A selection of network environment types in which to operate the access point: • • This mode supports wireless A clients with data rates of up to 54 Mbps in the frequency range of 5.8 Ghz.
Page 48
Common Configuration Tx Rate Allow you to choose the rate of data transmission from 1Mbps to Fully Auto (AIR-BR500G/GH) and from 6Mbps to Fully Auto (AIR-BR500AG) Closed System The access point will not broadcast its WLAN name (ESSID) when Closed system is enabled. By default Closed system is disabled.
Page 49
Common Configuration In the page, click on the button. provides a list of the neighbouring access points detected, (channels), (Authentication), (Algorithm) used, and the strength of the received.
Page 50
Common Configuration Site Survey on the 2.4 Ghz frequency band To connect the access point client to one of the access points detected: Select the radio button corresponding to the access point you want to connect to. Click on the button to effect the change and return to the setup page.
Page 51
Common Configuration Parameters Description Bssid In an infrastructure wireless network, the BSSID refers to the wireless MAC address of the access point. SSID Refers to the network name that uniquely identifies the network to which the access point is connected. Chan Refers to the channel being used for transmission.
Page 52
Common Configuration To view the connection status when the access point client is linked to another access point, click on the button. table illustrates the following data: This table describes the parameters that can be viewed from the page. Parameters Description State Refers to the MAC address of the BSS (AP to which the...
Page 53
Common Configuration Channel Survey provides a list of all channels that are supported by the access point. This feature will show relative interference of all channels and recommend the least congested channel. When the users want to scan for and find the best channel, they can use Channel Survery.
Page 54
Common Configuration Channel Survey on the 2.4 Ghz frequency band Please take note that the MYQuality and NeighQuality are RSSI values. If the value is higher which means that you receive the stronger signal strength from several APs, it indicates that the higher interference from these APS will occur as well.
Page 55
Common Configuration Parameters Description Freq Refers to the frequency of the channel at which your access point is operating. Channel Refers to the channel of the access point being used for transmission depending on its origin of country. MyQuality Refers to the interference having a RSSI value caused by the current channel at which your access point is operating.
Page 56
Common Configuration The Antenna Alignment feature in the access point is designed to precisely align the antenna over such a long distance so that the connectivity communication between your access point and another remote or neighbouring access point could be improved as indicated by higher signal strength.
Common Configuration NOTE If no MAC address is entered, the Antenna Alignment tool will make use of the SSID to align the antenna. Please make sure that the correct SSID is entered. If more than one access point (AP) share the same SSID, the Antenna Alignment tool will show the strongest signal AP.
Page 58
Common Configuration This table describes the parameters that can be modified in the page. Parameters Description Beacon Interval The Beacon Interval is the amount of time between (Only in Access beacon transmissions. A beacon is a guidance signal Point mode) sent by the access point to announce its presence to other devices in the network.
Page 59
Common Configuration Frag Threshold The Frag Threshold value indicates the maximum size that a packet can reach without being fragmented. This value extends from 256 to 2346 bytes, where a value of 0 indicates that all the packets should be transmitted using RTS.
Common Configuration The following shows you the information on the wireless device that is connected to the WLAN. Click on from the menu. You will see the sub- menus expanded under . Click on Wireless clients that are connected to the WLAN are shown in the WLAN Station List.
Page 62
Common Configuration Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
Page 63
Common Configuration Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
Page 64
Common Configuration Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
Page 65
Common Configuration Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
Page 66
Common Configuration Click on from the menu. You will see the sub- menus expanded under . Click on mode, you are not allowed to view other wireless clients’ statistics. To view other wireless clients information, you need to change to Access Point mode.
Common Configuration A correct WAN Setup allows you to successfully share your Internet connection among the wired and wireless clients of the access point. To do so, you need to identify the type of broadband Internet access you are subscribed to. If you are using : •...
Page 68
Common Configuration Step 2: On the screen that follows, verify that the reads in red colour. Otherwise, click on the button. Step 3: Simply select and hit the button. Please remember to click under and hit button to let the settings take effect.
Page 69
Common Configuration Steps 4 - 5 are for those who need to clone their Ethernet adapter’s MAC address. In the found under the command menu, you will see the Click continue. Step 5: Simply click on the button so that your access point clones the ISP- recognized MAC address of your Ethernet adapter.
Page 70
Common Configuration Step 7: On the following screen, key in the ISP assigned DHCP Client ID as the (You may also like to key in a preferred person and the the access point). Click the button to complete. Please remember to click under and hit button to let the settings...
Page 71
Common Configuration WAN Setup - Cable Internet with Static IP Assignment If you have an ISP that leases a static WAN IP for your subscription, you will need to configure your access point’s WAN type accordingly. For example, if the ISP provided you with the following setup information, you can set up your WAN as described below: IP Address...
Page 72
Common Configuration WAN Setup - ADSL Internet using PPP over Ethernet (PPPoE) If you subscribe to an ADSL service using PPP over Ethernet (PPPoE) authentication, you can set up your access point’s WAN type as follows. For example, you may configure an account whose username is ‘guest’ as described below: Step 1: Under...
Page 73
Common Configuration setting is associated with the option, allowing you to specify the value (in seconds) after which the access point will disconnect from the ISP after the last Internet activity. A value of “0” will disable idle timeout. is associated with the option and specifies the maximum time the access point will wait before re-attempting to connect with your ISP.
Page 74
Common Configuration take effect. setting allows you to specify the value (in seconds) after which the access point will disconnect from the ISP after the last Internet activity. A value of “0” will disable idle timeout.
Common Configuration Simple Network Management Protocol (SNMP) is a set of communication protocols that separates the management architecture from the architecture of the hardware devices. Step 1: Click on from the menu. Step 2: Select from the drop-down list. The default is set to public while the default is private.
Common Configuration Spanning Tree Protocol (STP) is a link management protocol that helps to prevent undesirable loops occurs in the network. For an Ethernet network to function properly, only one active path can exist between two stations. If a loop exists in the network topology, duplication of messages will occur and this might confuse the forwarding algorithm and allow duplicate frames to be forwarded.
Page 77
Common Configuration In short, the main purpose of activating STP is to prevent looping when you have redundant paths in the network. Without activating STP, redundant topology will cause broadcast storming. To establish path redundancy, STP creates a tree that spans all of the devices in an extended network, forcing redundant paths into a standby, or blocked, state, but establishing the redundant links as a backup in case the active link should fail.
Page 78
Common Configuration To explain the effect of STP & Pseudo VLAN on the wireless clients, we will compare 3 separate scenarios. Scenario #1 – (No STP, No Pseudo VLAN) Referring to the illustration below, if the Spanning Tree Protocol (STP) and Pseudo VLAN are not implemented in a network, all clients (Notebook#1, #2, #3 &...
Page 79
Common Configuration If one of the APs is down, the STP algorithm will reactivate one of the redundant paths so that the network connection will not be lost. All wireless users will be able to communicate with each other if they are associated to the APs which are in the same WDS zone.
Common Configuration Click on from the menu Select from the radio button and click on the button to update the changes. MAC Filtering acts as a security measure by controlling the users accessing to the network through their MAC address. You can either keep a list of MAC address corresponding to users who are allowed to access the network or to keep a list of MAC address corresponding to users who are forbidden from network access.
Page 81
Common Configuration Click on from the menu. the function of MAC Filtering. Click on the button to create a client in the MAC Address List. In the field, enter the wireless MAC address of the client, in the format xx-xx-xx-xx-xx-xx, where x can take any value in the range 0-9 or a-f.
Page 82
Common Configuration Notice that the MAC Address has been added to the list. Next, you can choose whether you wish to allow or to prevent network access for the users in the MAC address list. Simply click on the radio button besides , or , respectively.
Page 83
Common Configuration Click on the in the table as shown below. Notice that there is a column labeled in the MAC Address List. When a tick is present, this shows that action will be taken (either to allow or prevent network access) for the PC holding the corresponding MAC address. From the page, Click on the...
This section illustrates how to make your WLAN more secure. All the nodes in your network MUST share the same wireless settings to be able to communicate. We will illustrate how to configure each type of security mode individually. To start with, follow the common preliminary steps described below to select the most appropriate security approach for protecting your wireless communications.
WLAN Security The guidelines below will help you to set up your access point for using WEP. At the WEP Setup page, Specify the , by selecting either: • • • • Select the from the pull down menu: • •...
WLAN Security Select the of each encryption key: • • 10 hexadecimal or 5 ASCII Text • • 26 hexadecimal or 13 ASCII Text To clear the values that you had entered in the field, click on the button. Click on the button and reboot your access point.
Page 87
WLAN Security Specify the , by selecting either: • • • • Fill in the (Pre-Shared network Key): If you are using the format, your entry can consist of a minimum of 8 alphanumeric characters or a maximum of 63 alphanumeric characters. Otherwise, when using the format, your entry MUST consist of 64 hexadecimal characters.
WLAN Security Press the button and reboot your system, after which your settings will become effective. The guidelines below will help you to set up the access point for using 802.1x/RADIUS. At the IEEE 802.1x Setup page, Key in the IP address of the in your WLAN.
Page 89
WLAN Security By default, the value for number is . You can leave this value as it is. This value must be set to be the same as the one in the RADIUS server. Enter the in the field provided. By default, the is set as seconds.
WLAN Security The guidelines below will help you to set up the access point for using WPA-EAP. Please follow the steps below if you have selected the WPA or WPA1-EAP, WPA2-EAP or WPA-EAP-AUTO. At the page, Key in the IP address of the in your WLAN.
Page 91
WLAN Security By default, the value for . You can leave this value as it is. This value must be set to be the same as the one in the RADIUS server. Enter the used to validate client-server RADIUS communications. Select the of each encryption key: •...
Page 92
WLAN Security Enter the This is the length of time after which the access point will automatically generate a new shared key to secure multicast/broadcast traffic among all stations that are communicating with it. By default, the value is 600 seconds. Press the button and reboot your system, after which your settings will become effective.
Wireless Extended Features This section illustrates how to configure the wireless extended features. To start with, follow the common preliminary steps described below. – – A VLAN is a group of PCs or other network resources that behave as if they were connected to a single network segment although they may be physically located on different segments of a LAN.
Wireless Extended Features When implemented, this mode isolates each wireless client into its own pseudo VLAN. Wireless clients can therefore access resources on the wired network but are unable to see each other or access each other’s data.
Page 95
Wireless Extended Features The following steps demonstrate how to set up a Wireless Pseudo VLAN per Node. From under Configuration, click on , which shows the page. Go to the section, and click on the button. function is disabled by default. Click on the button to make your selection of the type of Pseudo VLAN to implement.
Page 96
Wireless Extended Features Select the radio button and click on the button. The Wireless Pseudo VLAN has configured as Per node.
Wireless Extended Features The access point can configure up to 32 ‘groups’ of wireless clients identified by their MAC address. Whenever a wireless client requests network access, the access point will first verify whether its MAC address is present in any of the Pseudo VLAN groups.
Page 98
Wireless Extended Features The following steps demonstrate how to set up Wireless Pseudo VLAN Groups. From the page, select and click on the button. Click on the button to create a client in the Wireless Pseudo VLAN group. Select a group number from the drop-down list.
Page 99
Wireless Extended Features Fill in the field with the MAC address of the client in the format , where x is any value within the range 0-9 or a-f. Click on the button to update the changes. The Pseudo VLAN group has been added to the list as shown below. NOTE A client can be a member of more than one Pseudo VLAN group.
Page 100
Wireless Extended Features Follow the procedures mentioned in Steps 3-5. You can create up to 32 members per Wireless Pseudo VLAN group. Click on the in the table as shown below. From the page, Click on the button to remove the client from the group, or Click on the button after you had edited the entry.
Wireless Extended Features (Only in Access Point mode) A wireless distribution system links up several access points, creating a wider network in which mobile users can roam while still staying connected to the available network resources. In a WDS, the access point can drive a cell of wired and wireless clients while at the same time, connecting to other access points.
Page 102
Wireless Extended Features Chain Configuration WDS A chain configuration WDS spans an area in length, for instance a long corridor. Satellite access points are chained together starting from a root access point. The access point at either end of the chain will have only one WDS link enabled, while the access points in the middle will have two WDS links configured to associate with the neighboring Access point upward and downward in the chain.
Page 103
Wireless Extended Features The following steps will guide you in setting up WDS in your access point. From under Configuration, click on , which shows the page. Go to the section, and click on the button. As illustrated on the , the feature is disabled by default.
Page 104
Wireless Extended Features From the page, select and click on the button. Click on the button to create a MAC address of a client. Fill up the field with the wireless MAC address of the device to include in your WDS, using the format xx-xx-xx-xx-xx-xx, where x can take any hexadecimal value 0-9 or a-f.
Page 105
Wireless Extended Features From the page, notice that the MAC Address has been added to the table as shown below. NOTE To configure WDS, all your access points must use the same channel and security mode and both access points at opposite ends of a WDS link must have each other’s wireless MAC address Follow the procedures mentioned in Step 5 to Step 7.
Page 106
Wireless Extended Features Click on the in the table as shown below. From the page, Click on the button to remove the client from the WDS, or Click on the button after you have edited the entry.
Wireless Extended Features This setup allows the access point to calculate and display suggested values for certain parameters to use to ensure that wireless communication takes place efficiently and effortlessly between physically distant APs. The following steps demonstrate how to configure the Long Distance Parameters. From under Configuration, click on , which shows the...
Page 108
Wireless Extended Features As illustrated on the Setup page, the feature is disabled by default. Select from the pull down menu. The access point can automatically calculate the values of the parameters to input based on the distance between your access point and the other wireless device.
Page 109
Wireless Extended Features You can enter the parameters according to the recommended values in the pop-up window, click on the button to update the changes. This table describes the parameters that can be modified in the Long Distance Parameters page. Parameters Description Outdoor...
The access point allows the network administrator to add a static routing entry into its routing table so that the access point can re-route IP packets to another network access point. This feature is very useful for a network with more than one access point.
Advanced Configuration office is connected to the Internet via the access point (192.168.168.1) and to the remote office via Router A (192.168.168.254). The remote office resides on a subnet 192.168.100.0. You may add a static routing entry into the access point’s routing tables so that IP packets from the clients in the main office with a destination IP address of 192.168.100.X (where X is any number from 2 to 254) will be routed to Router B, which acts as the gateway to that subnet.
Advanced Configuration reflected in the The basic purpose of NAT is to share a single public IP address when there are multiple PCs in the private network by using different TCP ports to identify requests coming from different PCs. NAT is enabled by default. Due to NAT, computers in the private LAN behind the access point will not be directly accessible from the Internet.
Advanced Configuration Having gone through the NAT Technology Primer on the Product CD, you would now have a good understanding of how DMZ works to make a specific PC in an NAT-enabled network directly accessible from the Internet. When NAT is enabled, an Internet request from a client within the private network first goes to the access point receiving a request, the access point keeps track of which client is using which port number.
Page 114
Advanced Configuration Step 3: On the page, you have to define the of the DMZ host. In this example, we keyed in the private IP address for the PC we wish to place within the DMZ : 192.168.168.55 (Enter as the and it will disable DMZ).
Advanced Configuration Virtual Server based on Port Forwarding is implemented to forward Internet requests arriving at the access point’s WAN interface, based on their TCP ports, to specific PCs in the private network. If you require more information on this function, please refer to the NAT Technology Primer on the Product CD.
Page 116
Advanced Configuration Step 4: On the following screen, you can set up a Virtual Server for a type by selecting from a drop-down menu OR you can define a For a more detailed explanation, please refer to the NAT Technology Primer found on the Product CD.
Advanced Configuration As an example, if you want to set up a web server on a PC with IP address of 192.168.168.55, select HTTP as enter as the . Click on the button. You will see the entry reflected as on the right.
Page 118
Advanced Configuration Step 4: Click the button to continue. Step 5: page will reflect your new addition. NOTE For step 3 above, please ensure that you have subscribed to the Public IP Address you intend to forward from.
Advanced Configuration The access point is designed to support simple bandwidth management that makes use of the Bandwidth Control. This feature gives the administrator the choice to manage the bandwidth control of subscribers in case of massive data transfer which causes slowdown problems when surfing the Internet. Only two simple steps are required to enable or disable bandwidth control for the access point.
Advanced Configuration Step 2: By default, is disabled. Select , followed by clicking button. The access point can allow you to limit the entire throughput by configuring the option. These values should Upload / Download Bandwidth Setting be set to a positive integer indicating the maximum number of kilobytes transferred per second that will be allowed.
Advanced Configuration The access point can allow you to limit the LAN user’s throughput by configuring the Bandwidth Control Rule Step 1: Under the command menu, click on select Step 2: Click to create the bandwidth rule for LAN user. Step 3: Click to create the rule...
Page 122
Advanced Configuration This table describes the parameters that can be modified in the Add Bandwidth Control Entry page. Parameters Description Rule Name The rule describes the type of bandwidth traffic to be controlled and of a specification of what action to take when that bandwidth traffic is encountered.
Advanced Configuration The advanced network administrator will be delighted to know that remote management is supported on the access point. With this feature enabled, you will be able to access the access point’s web-based configuration pages from anywhere on the Internet and manage your home/office network remotely. Only two simple steps are required to set up remote management for the access point.
Advanced Configuration The access point is equipped with the exclusive Parallel Broadband technology to provide scalable Internet bandwidth with Load Balancing and Fail-Over Redundancy. By installing multiple units of the access point cascaded using Parallel Broadband, you may balance the Internet traffic generated from your private network over multiple broadband connections - providing the network with aggregated bandwidth! In the event of a particular broadband connection failing, The access point in cascade will use the remaining functional...
Advanced Configuration Before you begin, ensure that each of the access point within the network is properly configured to connect to its individual broadband Internet account. Then ensure that either: • each access point is connected to an Ethernet port in the network as illustrated above or •...
Advanced Configuration The access point provides this feature to notify you by email when there is a change in the WAN IP address that was supplied to you earlier. Step 1: Under command menu, click on and you will be brought to the following screen.
Page 127
Advanced Configuration • Email address of Receiver: This is the email address of the receiver to whom the message would be sent. • IP address of Email Server: This is the IP address of the SMTP server through which the message would be sent out.
Advanced Configuration If you use a notebook for work at the office, it is probable that you also bring it home to connect to the Internet and retrieve emails or surf the web. Since it is most likely that your office’s and your home’s broadband-sharing network subnets are differently configured, you would have to struggle with reconfiguring your TCP/IP settings each time you use the notebook in a different place.
Page 129
Advanced Configuration Step 1: Under the command menu, click on Step 2: You may then choose to Static Address Translation here, followed by clicking the button. (Note: SAT is disabled by default)
Advanced Configuration When you enter a URL in your Internet browser, the browser requests for a name-to-IP address translation from the Domain Name System (DNS) servers to be able to locate the web server hosting the website you want to access. The DNS server, in turn, looks for the answer in its local cache and if an appropriate entry is found, sends back this cached IP address to the browser.
Page 131
Advanced Configuration NOTE For Internet access, please do NOT leave the DNS Server field of the PC’s TCP/IP Properties blank. Simply key in any legal IP address for it (e.g. 10.10.10.10) even though you do not have the exact DNS IP address.
Advanced Configuration Step 1: Under the command menu, click on Step 2: Simply choose Step 3: Complete the setup by clicking the button. It is difficult to remember the IP addresses used by computers to communicate on the Internet. It gets even more complicated when ISPs change your public IP address regularly, as is the case when the Internet connection type is Dynamic IP or PPPoE with Dynamic IP.
Advanced Configuration If someone types in your address: MyName.Domain.com into their web browser, this request would go to the DDNS provider which would then re-direct that request to your computer, no matter what IP address it has been currently assigned by your ISP. Step 1: Under the command menu, click on...
Page 134
Advanced Configuration Step 3: To add a new Dynamic DNS to the list, click on the Add button and you will see the page appear. There are two default providers which you can use. The following parameters are explained below: •...
Page 135
Advanced Configuration For instance, If your ISP connection service uses the dynamic WAN IP, tick the checkbox to let the DDNS server learn your current WAN IP address. Enter your DDNS account However, if you are using a fixed WAN IP connection, enter the IP address in the field.
Page 136
Advanced Configuration Step 6: Click on the Add button to save the new addition. Step 7: The new domain is added to the Dynamic DNS list table. Step 8: It will appear as a hyperlink which you can click to go back to the Dynamic DNS Edit page.
Page 137
Advanced Configuration To select DtDNS as DDNS Service Provider Step 1: Under the column in the table of check the radio button next to the . Then click on the button to proceed. Step 2: Enter your Step 3: checkbox is ticked by default.
Page 138
Advanced Configuration Step 5: In our example, while the new domain name, is being added to the list, the message ‘Waiting in queue…” will be displayed under the column of the table.
This chapter describes the security configuration mainly found in the Wireless Routing Client and Gateway modes. As part of the comprehensive security package found on the access point, you may perform IP packet filtering to selectively allow/disallow certain applications from connecting to the Internet. Step 1: Under the command menu, click on...
Security Configuration Step 4: Click on the button and you will be able to define the details of your from the screen on the right. Enter Rule Name for this new 4a). packet filtering rule. example, BlockCS 4b). From the IP Address drop down list, select whether to...
Page 141
Security Configuration Range of TCP ports In this case, you will have to define (From) which port (To) which port, your rule applies. Single TCP port Here, you need only specify the source port in the (From) field. IP port You may here, leave both, the (From) as well as the...
Page 142
Security Configuration time Here, you may leave both (From) (To) fields blank. Step 5: Click on the button to make the new rule effective. table will then be updated. Step 6: In this example, let us say we would like block application called CS from all PCs (any IP address within the...
Security Configuration The access point supports URL Filtering which allows you to easily set up rules to block objectionable web sites from your LAN users. Step 1: Under the command menu, click on Step 2: You may now define the by clicking the button.
Security Configuration More than just a “NAT” firewall, there is a powerful Stateful Packet Inspection (SPI) firewall option that can be activated on the access point. Stateful inspection compares certain key parts of the packet to a database of trusted information before allowing it through.
Page 145
Security Configuration The packet types that you have selected in the section will be displayed in the firewall log if they are detected by the firewall. This also applies to the section. Step 4: You may add more firewall rules for specific security purposes.
Page 146
Security Configuration ICMP Types This IP protocol is used to report errors in IP packet routing. ICMP serves as a form of flow control, although ICMP messages are neither guaranteed to be received or transmitted. ICMP Packet Type Description Echo request Determines whether an IP node (a host or a router) is available on the network.
Page 147
Security Configuration of IP addresses. Destination IP This parameter lets you specify the set of workstations that receive the data packets. Users can either set a single IP address or set a range of IP addresses. Source Port You can control requests for using a specific application by entering its port number here.
Security Configuration When the access point’s SPI firewall is in operation, valuable traffic patterns in your network will be captured and stored into the Firewall Logs. From these logs, you can extract detailed information about the type of data traffic, the time, the source and destination address/port as well as the action taken by the SPI firewall.
This feature lets you determine whether your access point can communicate (ping) with another network host. This feature is available only for the Wireless Routing Client and Gateway modes. Step 1: Select under the command menu. Step 2: Enter the IP address of the target host where the target host you want the access point to ping to.
System Utilities If your network operates with several access points, you would find it useful to have a means of identifying each individual device. You can define the System Identity of your access point to be uniquely identifiable as follows: Click on from the menu.
System Utilities ’ ’ Click on ’ ’ from the menu. Select the appropriate time zone from the drop-down list. the Auto Time Setting (SNTP) radio button. stands for Simple Network Time Protocol and is used to synchronise computer clocks. Fill in the field and click on the button to effect the...
System Utilities You can check the types and version of your firmware by clicking on About System from the HELP menu. To begin with, ensure that you have downloaded the latest firmware onto your local hard disk drive. Click on from the menu.
Page 153
System Utilities Follow the instructions given during the upgrading process. You need to reboot the system after the firmware upgrade. NOTE The firmware upgrade process must NOT be interrupted otherwise the device might become unusable.
System Utilities You may choose to save the current configuration profile, to make a backup of it onto your hard disk, to restore an earlier profile saved on file or to reset the access point back to its default settings. Click on from the menu.
Page 155
System Utilities Click on from the menu. If you want to back up the current settings of your access point onto your hard disk drive, click on the button. Next, save your configuration file to your local disk.
Page 156
System Utilities Click on from the menu. If you want to store back the settings that you had previously saved, click on … button. Proceed to the folder where you saved your … configuration file. Click on the button and the system will prompt you to reboot your device.
System Utilities Most of the changes you make to the system’s settings require a system reboot before the new parameters can take effect. Click on from the menu. Click on the button. Wait for the system to reboot and the login page will be displayed.
System Utilities It is recommended that you change the default login password, which is case sensitive and is set by default, to password. Click on from the menu. Key in the . The factory default is password. Enter the in the field as well as in the field.
System Utilities To exit the Web interface, follow the next few steps. Click on from the menu. Click the button to access your access point’s configuration interface again.
System Utilities The About System page displays a summary of your system configuration information. Support technicians might require specific information about your system data when they are troubleshooting your configuration. You can use the information displayed in this page to quickly find the data they need to resolve your system problem.
This section demonstrates how to reload the firmware to the access point should the system fail to launch properly. In such cases, the access point will automatically switch to loader mode and the diagnostic LED will light up and remain ON. The table below illustrates the behavior of the diagnostic LED ( ).
Page 162
Firmware Recovery From the Start menu, click Run and type cmd. When the command prompt window appears, type in the following command: X:\recovery\TFTP -i 192.168.168.1 PUT image_name.IMG, where refers to your CD drive and image_name.IMG to the firmware filename found in the Recovery folder of the Product CD.
Once the hardware has been set up, you need to assign an IP address to your PC so that it will be in the same subnet as the access point. By default, the access point’s IP address is 192.168.168.1; and its subnet mask is 255.255.255.0. You need to configure your PC’s IP address to 192.168.168.xxx;...
TCP/IP Configuration Highlight the TCP/IP and click on Properties button. Select radio button Specify an IP address. Enter the IP Address and Subnet Mask 192.168.168.X 255.255.255.0, where X can be any number from 2 to 254, except for 1. In this example, we are using 192.168.168.100 as the static IP Address.
Page 165
TCP/IP Configuration In order to check if the IP address has been assigned correctly to your PC, simply go to the Start menu, select Run, and enter the command winipcfg. Select your respective Ethernet Adapter from the drop down list and click OK.
Page 166
TCP/IP Configuration Go to your desktop, right-click on My Network Places icon and select Properties. Go to your network adapter icon, right click and select to Properties. Highlight Internet Protocol (TCP/IP) and click on Properties button.
Page 167
TCP/IP Configuration Select the radio button for Use the following IP address. Enter the IP Address Subnet Mask 192.168.168.X 255.255.255.0, where Xcan be any number from 2 to 254, except for 1. In this example, we are using 192.168.168.160 as the static IP Address.
Page 168
& & Front View of Access Point N Female Connector Waterproof RJ45 Connector Back View of Access Point Mounting bracket Bottom View of Access Point Board...
Page 169
Panel View & Descriptions Name Description Reset Push button To reboot, press once. To reset password, press and hold the button for 5 seconds. The DIAG light will flash fast for about 5 flashes/sec before releasing the button. To restore the factory default settings, press and hold the button for more than 10 seconds.
Page 170
Model AIR-BR500G AIR-BR500GH AIR-BR500AG Ethernet Port Ethernet 10/100Base-TX (RJ-45) 802.11b/g: 2.400 ~ 2.497 Operating 802.11a: 2.400 ~ 2.497 GHz Frequency / 5.15~5.35 & 5.725~5.850 Programmable for different country regulations Channel GHz (US) 5.15~5.35 & 5.47~5.725GHz(Europe) 802.11b: DSSS (DBPSK, DQPSK, CCK) RF Modulation 802.11a/g: OFDM (BPSK,QPSK, 16-QAM, 64-QAM)
Technical Specifications IP Routing - static Routing, NAT and Port Forwarding (Wireless Routing Client and Gateway mode only) WDS - Wireless Distribution System PPPoE Client (Wireless Routing Client and Gateway mode only) PPTP for VPNs Network 802.1d Spanning Tree Protocol Network SNMP support Advanced...
Need help?
Do you have a question about the AIR-BR500G and is the answer not in the manual?
Questions and answers