GDI Halo Product Manual

802.11 a outdoor ap

Advertisement

Quick Links

Halo
802.11 a Outdoor AP
Product Manual
January 2007, Version 1.11

Advertisement

Table of Contents
loading

Summary of Contents for GDI Halo

  • Page 1 Halo 802.11 a Outdoor AP Product Manual January 2007, Version 1.11...
  • Page 2 Notice The changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. IMPORTANT NOTE To comply with the FCC RF exposure compliance requirements, no change to the antenna or the device is permitted. Any change to the antenna or the device could result in the device exceeding the RF exposure requirements and void user’s authority to operate the device.
  • Page 3: Table Of Contents

    Table of Contents CHAPTER 1. INTRODUCTION ........................ 5 VERVIEW ..................................EATURES ................................ARNINGS ..................................YSTEM EQUIREMENTS ............................ARDWARE ESCRIPTION ............................ARDWARE NSTALLATION ............................CHAPTER 2. ANTENNA AND RF TUTORIAL ..................17 CHAPTER 3. BASIC INSTALLATION AND SECURITY..............24 EFAULT ACTORY ETTINGS ..........................
  • Page 4 Wireless Interactive. Preface About This Manual This manual explains proper installation of the Halo series radios. Document Conventions This publication uses the following conventions to convey instructions and information: STA refers to a station...
  • Page 5: Chapter 1. Introduction

    Chapter 1. Introduction Thank you for choosing this Enterprise-class outdoor radio (hereafter called radio). This radio provides a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals. This chapter gives an overview of the enterprises-class radio, as well as its key features. In addition, we detail about the hardware descriptions, system requirements and basic installation.
  • Page 6: Key Features

    1-2 Key Features The radio is user-friendly and provides solid wireless and networking support. The following standards and conventions are supported: • Standards Compliant The Wireless Access Point complies with the IEEE 802.11a for Wireless LANs. • WEP support Support for WEP is included. 64-bit, 128-bit, and 152-bit keys. •...
  • Page 7 • Atheros Super G Mode Super G mode enables the transmission up to 108Mbps • Multiple security settings per VLAN with up to 8 VLANs Security settings for multiple groups; so employees, guests and contractors now easily and securely share the same infrastructure •...
  • Page 8: Warnings

    1 - 3 W a r n i n g s In order to comply with international radio frequency (RF) exposure limits, dish antennas should be laced at a minimum of 8.7 inches (22 cm) from the bodies of persons. Other antennas should be laced a minimum of 7.9 inches (20 cm) from the bodies of persons.
  • Page 9 Following installation, access to the unit should be password protected by the network administrator to maintain regulatory compliance. The Halo Series Radio and POE injector can be damaged by incorrect power application. Read and carefully follow the installation instructions before...
  • Page 10: System Requirements

    A Web browser for configuration such as Microsoft Internet Explorer 6.0 or above, or Netscape Navigator 4.78 or above • At least one computer with the TCP/IP protocol installed What’s In the Box? • Halo Series Radio • Power adapter and cord • Power over Ethernet (POE) injector •...
  • Page 11: Hardware Description

    Use the SFTP CAT5 cable with weatherproof connector to connect to the “To ODU” side of POE injector. N- Type Antenna Here you can attach the proper antenna with the Halo Series Radio to wirelessly connect Connector to other 802.11 a networks. In order to improve the RF signal radiation of your antenna, proper antenna installation is necessary.
  • Page 12 POE (Power over Ethernet) Injector Figure 1-2 Power over Ethernet injector RJ-45 port used to connect to the 10/100 Base T complied T o E t h e r n e t device such as switch, router or PC.
  • Page 13 Contact the appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available. The Halo Series Radio and POE injector can be damaged by incorrect power application. Read and carefully follow the installation instructions before connecing the system to its power source.
  • Page 14: Hardware Installation

    1-6 Hardware Installation The Halo Series Radio is a radio device, so it is susceptible to common causes of interference that can reduce throughput and range. Follow these basic guidelines to ensure the best possible performance: IF IFthere is any other 5.2-5.8 GHz RF device deployed around the outdoor radio, try to set the channel to a non-overlapping one.
  • Page 15 Connect the Ethernet Cable The Halo Series Radio supports 10/100M Ethernet connections. Attach your SFTP/ SSTP cat.5 Ethernet cable with waterproof connector to the RJ-45 connector on the ODU enclosure. Then connect the other end of the cable to the “To ODU” side on POE injector.
  • Page 16 Attached the antenna You can attach the proper antenna to the N-type connector on the Halo Series Radio. Ensure that all connections are sealed with an appropriate “tar type” sealant. Every Halo includes two packages of Coax-Seal.
  • Page 17: Chapter 2. Antenna And Rf Tutorial

    Contact the appropriate electrical inspection authority or an electrician if you are uncertain that suitable grounding is available. Mounting the 802.11a Halo Series Radio The outdoor radio is usually installed on a rooftop, tower, wall, or a suitable flat surface.
  • Page 18 In practice, even omni-directional antennas take advantage of directionality by focusing their sensitivity and power in the horizontal plane. Rather than waste performance by sending signals into space or into the ground, the horizontal omni-directional antenna redirects its power and sensitivity from these directions, increasing performance in the horizontal plane.
  • Page 19 In setting up the Wireless Interactive system, either vertical or horizontal polarization can be used, as long as polarization is the same at both ends of each link. For any given pair of line-of-sight antennas, it is essential that they both have the same polarization.
  • Page 20 configuration and be prepared to move or elevate the antennas. Radio Horizon (Maximum Line-of-Sight Range) In visual terms, the horizon is the point in the distance where an object drops out of sight because it is blocked by the earth’s curvature. If the observer or object is elevated, the visual horizon is extended, that is, the object can be seen at a greater distance before it drops out of view.
  • Page 21 Antenna Height and Radio Horizon Graph If the radio horizon is well within maximum communication range of the system, this graph provides a reasonable guide for antenna height. However, as maximum range of the system is approached, results are less reliable because of atmospheric effects and other unpredictable phenomena.
  • Page 22 operator if a link can be established and give a reasonable “a priori” estimate of the performance of the system. In addition to this, the RSS level allows the operator to do a quick check on the integrity of the system installation by verifying that the received RSS level is close to the calculated value.
  • Page 23 The loss of each pair of connectors on all cables must be included to determine the total signal loss (attenuation) between the antenna and ODU. Other Considerations – Antenna Grounding WARNING: VERY IMPORTANT INFORMATION As an elevated metal object with a wire connection below, an antenna is an excellent lightning attractor, and an effective ground must be provided to deflect lightning strikes to ground.
  • Page 24: Chapter 3. Basic Installation And Security

    FE ATURE FACTORY DEFAULT SETTINGS User Name (case sensitive) admin Password (case sensitive) password Radio Name Halo Country / Region United States Router Mode Bridge I P Type static I P I P Address 192.168.1.1 IP Subnet Mask 255.255.255.0...
  • Page 25: Wireless Security Options

    3-2 Wireless Security Options To make wireless networking as safe and easy as possible, this radio provides several network security features, but requires specific programming and setup. Security Precautions The following is a complete list of recommended security precautions that can be taken to help ensure a secure network.
  • Page 26: Installing The Radio As An Ap (Access Point)

    3-3 Installing the radio as an AP (Access Point) Before installing, you should make sure that Ethernet network is working perfectly. You will be connecting the radio to the Ethernet network so that computers with 10/100 Fast Ethernet adapters will communicate with other computers on the Ethernet. 1.
  • Page 27 3. Clicking Login now, it will navigate you into this radio’s homepage-----General Information will be shown below. Figure: 3-2 AP general information...
  • Page 28: Chapter 4. General Information

    Access Point administrator for identification purposes. Unique, memorable names are helpful, especially if you are employing multiple access points on the same network. The default name is HALO. Short for Media Access Control address, a hardware address that uniquely MAC Address identifies each node of a network.
  • Page 29 WEP should be used to protect this communication mode. Inter- building This is the Halo’s own brand of WDS mode. In this mode, the AP will automatically connect to another Halo Radio which is set to inter-building mode, without manually entering MAC address for each other.
  • Page 30: Connection

    Connection Under the Information heading, click the connection link to view the connection status shown below. This information is useful for identifying clients on the network. Figure: 4-1 AP connection status If the wireless access point is rebooted, the table data is lost until the wireless access point rediscovers the devices.
  • Page 31 Field Description Wired Ethernet Packets The number of packets sent since the AP was restarted. The number of bytes sent since the AP was Bytes restarted. Wireless Unicast Packets The Unicast packets sent since the AP was restarted. Broadcast Packets The Broadcast packets sent since the AP was restarted.
  • Page 32: Chapter 5. Added Functionalities

    Chapter 5. Added Functionalities 5 -1 T im e S e r ve r By click Basic Settings, the “Basic Settings” will appear shown below. The AP allows you to synchronize the time between your network and time server by using an NTP Time Server.
  • Page 33: Bridge /Router Mode

    From the system setup, click IP Settings, you’ll be navigated into the WAN/LAN Settings. Figure: 5-2 AP WAN/LAN settings The Halo Series Radio can be configured in bridge mode or router mode. Bridge Mode In Bridge Mode, the AP will act as a pass-through bridging your network, by associating with various devices.
  • Page 34: Any Ip

    5 - 3 A n y I P If the IP address has slipped your mind, any IP functionality can offer peace of mind. Enabling any IP, you’ll feel free to enter IP Address, IP Subnet Mask and Gateway, enjoying internet surf. Please refer to the diagram below.
  • Page 35: Understanding Radius Settings

    5-4 Understanding RADIUS Settings RADIUS is a server for remote user authentication and accounting. It can be used on any network that needs a centralized authentication and/or accounting service for its workstations. From the system Setup, click Radius Settings, the RADIUS Settings will display as below. Figure: 5-3 AP Radius settings You will also have to fill in the following Radius server settings: •...
  • Page 36: Http Redirect

    The Radius Accounting option can be enabled so that you can track various information like who connected to the network, when they connected, how long they were connected, how much network traffic they generated, and so on. 5-5 HTTP Redirect Enabling HTTP redirect,...
  • Page 37: Firewall Management

    5-6 Firew all Manage ment Today’s companies rely on highly networked, secure computing environments to efficiency and safely conduct business. Firewalls are a key component of any secure network. Firewalls are configured to allow “desired” traffic in and to keep “undesired” traffic out. This radio (access point) is also qualified for firewall management.
  • Page 38 IP Range Start This specifies the starting-point of your specific IP addresses. IP Range End This specifies the ending-point of your specific IP addresses. Protocol This is optional, TCP, DCP, ICMP or *. Select which protocol you want to perform “Allow” or “Deny”.
  • Page 39: Virtual Server

    5 -7 V ir tu a l S e r ver Virtual server can only be enabled while the radio is in router mode. The radio (which is set as an AP) distinguishes by acting as a virtual server. This most cost-effective server virtualization technology is engineered for heterogeneous network.
  • Page 40 Private IP This specifies the IP Address at your LAN. Protocol Type This field is optional. Select TCP or UDP. Private Port This specifies your LAN port. Public Port This specifies your WAN port. Schedule You can set a time-limit when your AP acts as a virtual server, by enabling “from”. Alternatively, if you desire your AP to always act as a virtual server, please enable “always”.
  • Page 41: Chapter 6. Wireless Setup

    Chapter 6. Wireless Setup 6-1 Basic Settings The versatile Halo Series Radio provides up to five operating modes for your various purposes. Figure: 6-1 Basic Settings Operating Mode AP is capable of five operating modes: access point, station adapter, wireless bridge, wireless repeater, and wireless inter-building.
  • Page 42: Vap / Vlan Settings

    Inter-building This is the Halo’s own brand of WDS mode. In this mode, the AP will automatically connect to another Halo Radio which is set to inter-building mode, without manually entering MAC address for each other. This creates a unique link to Halo radios only.
  • Page 43 Under this mode, this radio can behave as (up to) 8 virtual Wireless LAN infrastructures. You can specify unique SSIDs for these virtual infrastructures. For example, VLAN1 contains ETH1 and STA1, VLAN2 contains ETH2 and STA2, and so on. However, they all share the same AP and undertake different tasks.
  • Page 44 Figure 6-2 VAP / VLAN Settings You can configure each profile by clicking “Edit”. Such configuration as configuring profile name, SSID, enabling “broadcast SSID”, or doing security. Figure 6-3 Security profile for Vap x...
  • Page 45: Understanding Wep/Wpa Security Options

    6-3 Understanding WEP/WPA Security Options Field Description You have two authentication options. Network • Open System: Authentication No authentication is imposed on the radio. However, if the 802.1x option is configured, authentication of connections can be performed by a RADIUS server. •...
  • Page 46 Figure 6-4 Security profile with WEP encryption Figure 6-5 Security profile with WPA-PSK...
  • Page 47 Figure 6-6 Security profile with WPA2-PSK Figure 6-7 Security profile with WPA-PSK & WPA2-PSK...
  • Page 48: Access Control

    6 - 4 A c c e s s C o n t r o l Authentication by username and password is only part of the story. Many times you want to let people in based on something other than who they are. Something such as where they are coming from.
  • Page 49: Smart Wds

    Figure: 6-9 WDS mode Local MAC Address This field provides the MAC address. Remote MAC Address Enter the MAC Address of your desired devices connected to the AP in WDS Mode. Uplink Speed Limit You can specify the transmission rate between the AP and other devices by entering a value in uplink speed limit.
  • Page 50 Figure: 6-10 Advanced Wireless Settings Wi-Fi Multi-media (WMM) Currently interest and demand for multimedia applications and advanced capabilities is growing quickly. In the residential market, Voice over Internet Protocol (VoIP), video streaming, music streaming, and interactive gaming are among the fastest growing applications.
  • Page 51 Super G and wireless parameters Enabling Super G, your transmission rate could reach up to 108Mbps. The following describes the advanced wireless parameters. Field Description The packet size used to determine whether it should use RTS Threshold the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) or the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism for packet transmission.
  • Page 52: Chapter 7. Managing And Testing Your Ap

    Chapter 7. Managing and Testing Your AP 7 -1 S it e Su r v e y Figure: 7-1 Site survey Site Survey provides you with a table of adjacent APs discovered by your radio when it acts as a station. In terms of each connected AP, Site Survey offers you their network information, including SSID, BSSID, RSSI, channel mode, connection status and encryption.
  • Page 53: Link Test

    7-2 Link Test To optimize the communication on your LAN, the Link Test is designed to test the parameters that indicate communication quality. Figure: 7-2 Link test RF Cable Loss (0-10) This indicates RF loss in cables, ranging from 0 to 10. Local Antenna Gain (0-99) This indicates extended coverage provided by the local AP, for an existing 802.11a wireless local area network (WLAN), ranging from 0 to 99.
  • Page 54: Chapter 8. Management

    Chapter 8. Management 8-1 Change Password Figure: 8-1 Change Password Here you can make adjustments to your current or default password. Take the following steps to change the password: 1. Enter your currently-used password in the Current Password field. 2. Enter your new password in the New Password field. 3.
  • Page 55: Remote Management

    8 - 2 R e m o t e M a n a g e m e n t Figure: 8-2 Remote Management Secure Shell (SSH) is a program that provides a cryptographically secure replacement for Telnet that is considered the de-facto protocol for remote logins. SSH runs in the Application Layer of the TCP/IP stack.
  • Page 56 Take the following steps to manage this radio via SSH: From the Putty Configuration, enter the IP address in host name field and port number in port field. Also, select SSH as protocol. Figure: 8-3 Putty configuration utility Press Open, and the screen below should appear. Figure: 8-4 Putty configuration page...
  • Page 57 The login name is admin and password is the default password. After successful login, the screen should prompt Halo>. In this example, the Halo is the radio name. Enter help to display the SSH command help. SNMP SNMP (simple network management protocol) is a distributed-management protocol.
  • Page 58: Upgrade Firmware

    8 - 3 U p g r a d e F i r m w a r e When uploading software to the AP Access Point, it is important not to interrupt the Web browser by closing the window, clicking a link, or loading a new page.
  • Page 59: Backup / Restore Settings

    8-4 Backup / Restore Settings Figure: 8-6 Backup / Restore Settings Backup Allows you to save all of the radio’s settings in a file that can be stored on any computer. Retrieve Retrieve button allows you to retrieve your backup files. Restore This button can be used to clear ALL data and restore ALL settings to the factory default values.
  • Page 60: Event Log

    8 - 5 Ev e n t L o g If you have a SysLog server on your LAN, enable the SysLog option. Event Log offers you activity log information. Figure: 7-7 Event log • SysLog Server IP address: The radio will send all the SysLog to the specified IP address if SysLog option is enabled. Default: 0.0.0.0 •...
  • Page 61: Eboot Ap

    8 - 6 R e b o o t A P If you want to reboot AP, click Yes and then apply. AP will reboot.
  • Page 62: Chapter 9. Troubleshooting

    To successfully use the radios, engineers must be able to troubleshoot the system effectively. This section will show you how a Halo Series Radio could be analyzed when you are experiencing link problems. The four main reasons that a link may not work are list as below: •...
  • Page 63: Connection Issues

    interference coming from. It will also show the frequencies and the level of signal detected. Avoiding Interference When a source of interference is identified and when the level and frequencies are known, the next step is to avoid the interference. Some of the following actions can be performed: Switch the RF channel away from the interference source.
  • Page 64: Configuration Issues

    Make sure that you are using one of the following Web browsers: - Microsoft Internet Explorer version 5.0 or later - Netscape version 5.0 or later. 3. Ensure that you are not using a proxy server for the connection with your Web browser.
  • Page 65 another unit. The interference can be checked by changing the frequency and then seeing if another channel works better. Or you can change the polarization of the antenna as a way of avoiding the interfering signal. To know in advance how much interference is present in a given environment, a spectrum analyzer can be attached to a temporary antenna for measuring the signal levels on all available channels.

Table of Contents