Digitus HIGH-SPEED 300N POWERLINE ACCESS POINT User Manual
Digitus HIGH-SPEED 300N POWERLINE ACCESS POINT User Manual

Digitus HIGH-SPEED 300N POWERLINE ACCESS POINT User Manual

Powerline access point

Advertisement

Quick Links

User's Manual
(DN-15018-1)
HIGH-SPEED 300N
POWERLINE ACCESS POINT

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HIGH-SPEED 300N POWERLINE ACCESS POINT and is the answer not in the manual?

Questions and answers

Summary of Contents for Digitus HIGH-SPEED 300N POWERLINE ACCESS POINT

  • Page 1 User’s Manual (DN-15018-1) HIGH-SPEED 300N POWERLINE ACCESS POINT...
  • Page 2: Table Of Contents

    Index FCC Part 68 ............................... 3 FCC Part 15 ............................... 4 Chapter 1 Introduction ..........................5 1.1 Overview ..........................5 1.2 Features ..........................5 1.3 System Requirements ......................6 Chapter 2 Installation ..........................7 2.1 Checklist ..........................7 2.2 The Front LEDs ........................8 2.3 The Rear Ports ........................
  • Page 3 6. Trouble Shooting ..........................49 Appendix A Glossary ..........................50 Appendix B Cabling / Connection ......................57...
  • Page 4: Fcc Part 68

    FCC Part 68 This equipment complies with Part 68 of the FCC Rules. On the bottom of this equipment is a label that contains the FCC Registration Number and Ringer Equivalence Number (REN) for this equipment. You must provide this information to the telephone company upon request.
  • Page 5: Fcc Part 15

    FCC Part 15 The modem generates and uses radio frequency energy. If it is not installed and used properly in strict accordance with the user's manual, it may cause interference with radio and television reception. The modem has been tested and found to comply with the limits for Class B computing devices in accordance with the specifications in Subpart B, Part 15 of the FCC regulations.
  • Page 6: Chapter 1 Introduction

    Chapter 1 Introduction Congratulations on your purchase of an Instant Powerline 200M 11n AP. The Powerline AP is the perfect option to connect a small group of PCs or small wireless clients. Integrated Wireless to Powerline networks, the device can extend large coverage and less dead space for your home network.
  • Page 7: System Requirements

     HTTP Web-Based Management ‧Firmware upgrade by UI ‧Password protected access 1.3 System Requirements 1) Personal computer (PC) 2) Pentium II 233 MHz processor minimum 3) 32 MB RAM minimum 4) 20 MB of free disk space minimum 5) Ethernet Network Interface Controller (NIC) RJ45 Port 6) Internet Browser...
  • Page 8: Chapter 2 Installation

    Chapter 2 Installation This chapter offers information about installing your router. If you are not familiar with the hardware or software parameters presented here, please consult your service provider for the values needed. 2.1 Checklist Check the shipping box carefully to ensure that the contents include the items you ordered. If any of the items are missing or damaged, contact your local distributor.
  • Page 9: The Front Leds

    The Front LEDs State Description Powerline network activity. Powerline Search or no Powerline network activity. Ethernet connection is OK. Ethernet Flashing Data transfer. No link to Ethernet. Wireless Function Enable Wireless Flashing Data transfer. 2.3 The Rear Ports Connector Description RJ-45 Port Connect to the Ethernet Cable Secure Button...
  • Page 10: Chapter 3 Configuration

    Chapter 3 Configuration 3.1 Determine your connection settings Before you configure the router; you need to know the connection information supplied by your service provider. 3.2 Connecting the Powerline Extender to your network Unlike a simple hub or switch, the setup of the Powerline Extender consists of more than simply plugging everything together.
  • Page 11: Management Lan Ip

    3.3.1 Management LAN IP To set up the configuration of LAN interface, private IP of your router LAN port and subnet mask for your LAN segment. Default IP is 192.168.16.168. IP Address: The IP of the device’s LAN port (default 192.168.16.168). Subnet Mask: Subnet Mask of you LAN (default 255.255.255.0).
  • Page 12 802.1d Spanning Tree: Enable/Disable. The Spanning Tree Protocol is an OSI layer-2 protocol that ensures a loop-free topology for any bridged LAN. LLTD: Enable/Disable. Link Layer Topology Discovery (LLTD) is a proprietary Link Layer protocol for network topology discovery and quality of service diagnostics. It was developed by Microsoft as part of the Windows Rally set of technologies.
  • Page 13: Wireless Basic Settings

    3.4.1 Wireless Basic Settings...
  • Page 14 Radio Off: Enable/Disable the wireless. Network Mode: There are 3 modes can choose, 11/b/g/n mixed mode/11b only/11g only. SSID: set up the wireless ID, default is wireless. Multiple SSID 1 ~ 7: You can set up to four SSID for this wireless network. Broadcast Network Name(SSID): Enable/Disable the SSID broadcast.
  • Page 15: Wireless Advance Settings

    3.4.2 Wireless Advance Settings Advanced Wireless: BG Protection Mode: Some 802.11g wireless adapters support 802.11g protections, which allows the adapter search for 802.11b/g singles only. Select “Auto” to turns it on or off automatically, select “On” to support protection or select “Off” to disable this function. Beacon Interval: Beacons are packets sent by an access point to synchronize a wireless network.
  • Page 16 multicast messages. Fragment Threshold: This value should remain at its default setting of 2346. If you experience a high packet error rate, you may slightly increase your fragmentation threshold within the value range of 0 to 2346. Setting the fragmentation threshold too low may result in poor performance. RTS Threshold: Request To Send threshold.
  • Page 17 APSD Capable: Automatic Power saves Delivery. Select to enable / disable data flow using power saving mode during transmitting. DLS Capable: Enable/Disable this function. WMM Parameters: You can configure WMM parameters by clicking on the button. The configuration window pops up (as shown below). Manually configure the parameters and click on the “Apply” button to execute.
  • Page 18: Wireless Security

    3.4.3 Wireless Security SSID Choice: Please choose a SSID you have set for this router in the Wireless Settings > Basic Settings from the drop-down list. The SSID will be shown on the wireless network for recognizing.. Security Mode: There are 10 modes for you to select: Open, Shared, WEP Auto, WPA, WPA-PSK, WPA2, WPA2-PSK, and WPA-PSKWPA2-PSK, WPA1WPA2, 802.1x.
  • Page 19 Security Mode -- Open / WEP Auto Default Key: Select to use the WEP key value of 1, 2, 3 or 4 as in the following settings. WEP Keys: Select ASCII or Hex to setup the key value. ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers from 0-127.
  • Page 20 Security Mode -- Shared Default Key: Select to use the WEP key value of 1, 2, 3 or 4 as in the following settings. WEP Keys: Select ASCII or Hex to setup the key value. ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers from 0-127.
  • Page 21 Security Mode -- WPA-PSK / WPA2-PSK / WPA-PSK + WPA2-PSK WPA Algorithms: Mark the option to enable modes of TKIP, AES, or TKIPAES (TKIPAES is only available in the security modes of WPA2-PSK and WPAPSK + WPA2-PSK) Pass Phrase: Enter a pass phrase encryption key format (8~32 bytes). Key Renewal Interval: Enter a value to setup the WPA key renewal interval.
  • Page 22 Security Mode -- WPA / WPA2 / WPA1 + WPA2 / 802.1x WPA Algorithms: Mark the option to enable modes of TKIP, AES, or TKIPAES (TKIPAES is only available in the security modes of WPA2-PSK and WPAPSK + WPA2-PSK) Key Renewal Interval: Enter a value to setup the WPA key renewal interval. The device regenerates the key in every interval seconds that you have setup without disconnection.
  • Page 23: Wps(Wi-Fi Protected Setup)

    3.4.4 WPS(Wi-Fi Protected Setup) The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This Router supports the configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. WPS: Enable/Disable the WPS.
  • Page 24: Wireless Station List

    3.4.5 Wireless Station List Monitor Stations which associated to this AP/Router here.
  • Page 25: Management

    3.5.1 Management Language Settings: Can select language which you want. Administrator Settings: Set the account and password to set and manage the Wireless Device.
  • Page 26: Upgrade Firmware

    3.5.2 Upgrade Firmware User can upgrade the firmware in this page. Be careful, don’t power off when doing the upgrade process.
  • Page 27: Settings Management

    3.5.3 Settings Management Users can Export Settings or Import Settings here. If want to load the factory defaults, please click the Load default button.
  • Page 28: Status

    3.5.4 Status You can check the device status in this page, The firmware version, Internet Configuration and LAN settings.
  • Page 29: Tcp/Ip Settings For Windows Operating System

    3.6.1 TCP/IP Settings for Windows Operating System 1. How can I find my IP Address in Windows 95, 98, or Me? ‧Click on Start, then click on Run. ‧The Run Dialogue Box will appear. Type winipcfg in the window as shown then click OK ‧The IP Configuration window will appear, displaying your Ethernet Adapter Information.
  • Page 30 2. How can I find my IP Address in Windows 2000/XP? ‧Click on Start and select Run. ‧Type cmd then click OK. ‧From the Command Prompt, enter ipconfig. It will return your IP Address, subnet mask, and default router. ‧Type exit to close the command prompt. ‧Make sure you take note of your computer´s Default Router IP Address.
  • Page 31 3. How can I assign a Static IP Address in Windows 98/Me? ‧From the desktop, right-click on the Network Neighborhood icon (Win ME - My Network Places) and select Properties. ‧Highlight TCP/IP and click the Properties button. If you have more than 1 adapter, then there will be a TCP/IP “Binding”...
  • Page 32 ‧Click Specify an IP Address. ‧Enter in an IP Address that is on the same subnet as the LAN IP Address on your router. Example: If the router´s LAN IP Address is 192.168.16.168, make your IP Address 192.168.16.X where X is between 2-99. Make sure that the number you choose is not in use on the network.
  • Page 33 4. How can I assign a Static IP Address in Windows 2000? ‧Right-click on My Network Places and select Properties. ‧Right-click on the Local Area Connection which represents your network card and select Properties. ‧Highlight Internet Protocol (TCP/IP) and click Properties.
  • Page 34 ‧Click Use the following IP Address and enter an IP Address that is on the same subnet as the LAN IP Address on your router. Example: If the router´s LAN IP Address is 192.168.16.168, make your IP Address 192.168.16.X where X = 2-99. Make sure that the number you choose is not in use on the network.
  • Page 35: Chapter 4. Powerline Networking Utility

    Chapter 4. Powerline Networking Utility Note. The Powerline Device can auto detect the other powerline bridges which plug in the same power circuit, you don’t need to use this powerline utility except you want to encryption all the powerline devices as the same group or you can not access the other computers.
  • Page 36 Figure 1: Install Shield Screen...
  • Page 37: Windows Configuration Utility

    4.2 Windows Configuration Utility In order to run the utility, double-click the utility icon. Figure 2 shows the main screen of the configuration utility. This screen shot shows a Powerline Ethernet device connected as a local device and other Powerline Ethernet devices as remote devices.
  • Page 38: User Interface

    4.3 User Interface 4.3.1 Main Screen The Main screen essentially provides a list of all Powerline Ethernet devices logically connected to the computer where the utility is running. The top panel shows all local Powerline Ethernet devices found connected to the computer's NIC (Network Interface Card).
  • Page 39 The lower panel displays all the Powerline Ethernet devices, discovered on the current logical network (remote devices). Displayed immediately above this panel is the number of remote devices found, the type of logical network (Public or Private), and a message area that reports connectivity and scan status.
  • Page 40 The Add button is used to add a remote device to your network that is not on the displayed list in the lower panel, for example, a device currently on another logical network. Users are advised to locate the passwords for all devices they wish to manage and add them to the local logical network by clicking on the Add button.
  • Page 41 The Scan button is used to perform an immediate search of the Powerline Ethernet devices connected to the computer. By default the utility automatically scans every few seconds and updates the display. A typical screen after naming and supplying passwords might appear as in Figure 6. Figure 6: Main Screen of the Configuration Utility...
  • Page 42: Privacy Screen

    4.3.2 Privacy Screen The Privacy dialog screen provides a means for managing the local network and providing additional security. All Powerline Ethernet devices are shipped using a default logical network (network name), which is normally “HomePlug”. The Privacy dialog screen allows user to make the network private by changing the network name (network password) of devices.
  • Page 43 The Set Local Device Only button is used to change the network name (network password) for the local device only. After doing this, all the devices seen on the Main panel prior to this will no longer be able to communicate or respond to the computer, as they will be on a different logical network.
  • Page 44: Diagnostics Screen

    4.4 Diagnostics Screen The Diagnostics screen shows system information and a history of all devices seen. The appearance is shown in Figure 8. The upper panel shows technical data concerning software and hardware on the host computer used to communicate over Powerline Ethernet Network. It shall include the following: ‧Operating System Type/Version ‧Host Network Name...
  • Page 45 The lower panel contains a history of all remote devices seen on the computer, over time. Devices are shown here regardless of whether or not they are on the same logical network. Devices that are active on the current logical network will show a transfer rate in the Rate column; devices on other networks, or devices that may no longer exist are shown with an “?”...
  • Page 46: About Screen

    4.4.1 About Screen The screen shows the software release date. Figure 9: About dialog screen 4.4.2 Preferences The lower part of the panel may display options for user preferences (such as turning the auto-scan feature on or off) as shown Figure 9 above.
  • Page 47: Push Button Setting

    5. Push Button Setting There are 2 buttons in this device, one is Reset button the other is Secure button. Reset: Push this button can reset to the factory default settings. Be careful, when you press the reset button, please make sure unplug (remove) the Ethernet cable (RJ-45cable) first, and then press the reset button. After press the reset button (the time need <...
  • Page 48 Possible Use Case Scenario 1: Unassociated device joining existing AVLN Possible Use Case Scenario 2: Two devices joining to form new AVLN Before this scenario begin, please make sure to press each device secure button > 10 sec till all LEDs re-flash to generate the random network password key first.
  • Page 49 Possible Use Case Scenario 3: Reset...
  • Page 50 6. Trouble Shooting 1. Why my utility can not work properly after finish install steps? Ans: Please follow the steps to check the problem. Check the Windows version, the utility only can support windows 2000, XP, 2003, vista 32, Vista 64. Reinstall the utility again, you can remove it and reinstall the utility again.
  • Page 51 Appendix A Glossary Address mask A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long and selects the network portion of the Internet address and one or more bits of the local portion. Sometimes called subnet mask.
  • Page 52 Customer Premises Equipment located in a user's premises. DHCP (Dynamic Host Configuration Protocol) DHCP is software that automatically assigns IP addresses to client stations logging onto a TCP/IP network. DHCP eliminates having to manually assign permanent IP addresses to every device on your network. DHCP software typically runs in servers and is also found in network devices such as Routers.
  • Page 53 Hop count A measure of distance between two points on the Internet. It is equivalent to the number of routers that separate the source and destination. HTML Hypertext Markup Language - The page-coding language for the World Wide Web. HTML browser A browser used to traverse the Internet, such as Netscape or Microsoft Internet Explorer.
  • Page 54 Management Information Base - A collection of objects can be accessed via a network management protocol, such as SNMP and CMIP (Common Management Information Protocol). Network Address Translation - A proposal for IP address reuse, where the local IP address is mapped to a globally unique address.
  • Page 55 Route The path that network traffic takes from its source to its destination. The route a datagram may follow can include many routers and many physical networks. In the Internet, each datagram is routed separately. Router A system responsible for making decisions about which of several paths network (or Internet) traffic will follow. To do this, it uses a routing protocol to gain information about the network and algorithms to choose the best route based on several criteria known as "routing metrics".
  • Page 56 Static IP Addresses A static IP address is an IP address permanently assigned to computer in a TCP/IP network. Static IP addresses are usually assigned to networked devices that are consistently accessed by multiple users, such as Server PCs, or printers. If you are using your Router to share your cable or DSL Internet connection, contact your ISP to see if they have assigned your home a static IP address.
  • Page 57 Virtual Connection (VC) A link that seems and behaves like a dedicated point-to-point line or a system that delivers packets in sequence, as happens on an actual point-to-point network. In reality, the data is delivered across a network via the most appropriate route.
  • Page 58 Appendix B Cabling / Connection Network cables connect PCs in an Ethernet network Category 5, called "Cat5" for short is commonly used type of network cable today. Cat 5 cables are tipped with RJ-45 connectors, which fit into RJ-45 port. Straight-through vs.

Table of Contents