Planet Technology Switch WAP 4060PE User Manual

54/108Mbps Super G Wireless LAN  
Managed Access Point  
WAP-4060PE  
Users Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
R&TTE Compliance Statement  
This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE  
EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and  
telecommunication terminal Equipment and the mutual recognition of their conformity  
(R&TTE)  
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications  
Terminal Equipment and Satellite Earth Station Equipment) As of April 8,2000.  
Safety  
This equipment is designed with the utmost care for the safety of those who install and use it.  
However, special attention must be paid to the dangers of electric shock and static electricity  
when working with electrical equipment. All guidelines of this and of the computer manufac-  
ture must therefore be allowed at all times to ensure the safe use of the equipment.  
Revision  
Users Manual for PLANET 802.11g Wireless LAN Managed Access Point  
Model: WAP-4060PE  
Rev: 1.0 (January, 2005)  
Part No. EM-WAP4060  
iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TABLE OF CONTENTS  
CHAPTER 1 INTRODUCTION.......................................................................... 1  
1.1 Package Contents........................................................................................... 1  
1.2 System Requirements .................................................................................... 1  
1.3 Features ........................................................................................................... 1  
1.4 Physical Details............................................................................................... 2  
1.5 Specification.................................................................................................... 3  
1.6 Wireless Performance .................................................................................... 4  
CHAPTER 2 INSTALLATION ........................................................................... 6  
2.1 General Installation......................................................................................... 6  
2.2 Using PoE (Power over Ethernet).................................................................. 6  
CHAPTER 3 ACCESS POINT SETUP.............................................................. 7  
3.1 Overview .......................................................................................................... 7  
3.2 Setup using the Windows Utility ................................................................... 7  
3.2.1 Main Screen............................................................................................. 7  
3.2.2 Setup Procedure...................................................................................... 8  
3.3 Setup using a Web Browser .......................................................................... 8  
3.3.1 Setup Procedure...................................................................................... 8  
3.4 Access Control.............................................................................................. 10  
3.4.1 Trusted Wireless Stations...................................................................... 10  
3.5 Security Profiles............................................................................................ 12  
3.5.1 VLAN Configuration Screen................................................................... 14  
3.6 Configure Security Profile............................................................................ 16  
3.6.1 Profile Data ............................................................................................ 16  
3.6.2 Security Settings .................................................................................... 16  
3.6.3 Security Settings - None ........................................................................ 17  
3.6.4 Radius MAC Authentication................................................................... 17  
3.6.5 UAM....................................................................................................... 19  
3.6.6 Security Settings - WEP......................................................................... 21  
3.6.7 Security Settings - WPA-PSK ................................................................ 23  
3.6.8 Security Settings - WPA-802.1x............................................................. 24  
3.6.9 Security Settings - 802.1x ...................................................................... 27  
3.7 System Screen .............................................................................................. 29  
3.8 2.4GHz Wireless ............................................................................................ 30  
3.8.1 Basic Settings Screen............................................................................ 30  
3.8.2 Advanced Settings................................................................................. 33  
CHAPTER 4 PC AND SERVER CONFIGURATION....................................... 36  
4.1 Overview ........................................................................................................ 36  
4.2 Using WEP..................................................................................................... 36  
4.3 Using WPA-PSK ............................................................................................ 36  
4.4 Using WPA-802.1x......................................................................................... 37  
4.5 802.1x Server Setup (Windows 2000 Server) ............................................. 37  
4.5.1 Windows 2000 Domain Controller Setup............................................... 38  
4.5.2 Services Installation............................................................................... 38  
4.5.3 DHCP server configuration .................................................................... 39  
4.5.4 Certificate Authority Setup ..................................................................... 41  
4.5.5 Internet Authentication Service (Radius) Setup..................................... 44  
4.5.6 Grant Remote Access for Users............................................................ 45  
4.6 802.1x Client Setup on Windows XP........................................................... 46  
4.6.1 Client Certificate Setup .......................................................................... 46  
i
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.6.2 802.1x Authentication Setup.................................................................. 49  
4.7 Using 802.1x Mode (without WPA).............................................................. 52  
CHAPTER 5 OPERATION AND STATUS ...................................................... 53  
5.1 Operation ....................................................................................................... 53  
5.2 Status Screen ................................................................................................ 53  
5.3.1 Statistics Screen .................................................................................... 55  
5.3.2 Profile Status.......................................................................................... 56  
5.3.3 Activity Log............................................................................................. 57  
5.3.4 Station List ............................................................................................. 58  
CHAPTER 6 MANAGEMENT.......................................................................... 59  
6.1 Overview ........................................................................................................ 59  
6.2 Admin Login Screen ..................................................................................... 59  
6.3 Auto Config/Update ...................................................................................... 60  
6.4 Config File...................................................................................................... 62  
6.5 Log Settings (Syslog) ................................................................................... 64  
6.6 Rogue APs ..................................................................................................... 64  
6.7 SNMP.............................................................................................................. 65  
6.8 Upgrade Firmware......................................................................................... 67  
APPENDIX ASPECIFICATIONS ................................................................... 68  
APPENDIX B TROUBLESHOOTING ............................................................ 70  
APPENDIX C COMMAND LINE INTERFACE............................................... 71  
C.1 Using the CLI - Telnet .................................................................................. 71  
C.2 Using the CLI - Serial Port ........................................................................... 71  
C.3 Command Reference.................................................................................... 72  
ii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Introduction  
1
WAP-4060PE is an IEEE 802.11g Wireless Access Point with PoE. Catering to the enterprise  
demands, WAP-4060PE enhances security and management features, including multiple  
SSIDs, VLAN support, WPA support, RADIUS MAC authentication, rogue AP detection, and so  
on. The LAN port of WAP-4060PE is 802.3af compliant. Therefore, it can be installed anywhere  
without the constraint on power socket. Provided with one reversed-polarity SMA male connec-  
tor, WAP-4060PE is easy to connect external antenna and booster to extend the wireless  
distance.  
1.1 Package Contents  
Make sure that you have the following items:  
n
n
n
n
n
WAP-4060PE  
Dipole Antenna  
Quick Installation Guide  
Users manual CD-ROM  
Power Adapter  
If any of the above items are missing, contact your supplier as soon as  
possible.  
Note:  
1.2 System Requirements  
Before installation, please check the following requirements with your equipment.  
n
n
n
Pentium Based (And Above) IBM-Compatible PC System  
CD-ROM drive  
Windows 98/ME/2000/XP Operating System with TCP/IP protocol  
1.3 Features  
n Wireless LAN IEEE802.11g and IEEE802.11b compliant  
n Support PoE port (IEEE802.3af compliant)  
n Support IEEE802.11d standard (Worldwide mode)  
n Strong network security with 802.1X authentication, and 64/128-bit WEP encryption  
n Supports WPA (Wi-Fi Protected Access) for both 802.1x and WPA-PSK  
n One detachable reverse-polarity SMA connectors can connect to external antenna for  
expanding connection distance  
n Super G mode efficiently raises the data transfer rate up to 108Mbps  
n Five operation modes selectable: AP / AP Client / Wireless Bridge / Multiple Bridge / Re-  
peater  
n Adjustable output power level  
n Support Multiple SSIDs, Multiple SSID isolation, 802.1Q VLAN, RADIUS MAC authentica-  
tion, Rogue AP detection, Access Control  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
n Provide Windows-base utility, Web, and CLI (Command Line Interface) Configuration  
n SNMP support  
1.4 Physical Details  
Front panel  
STATUS  
On - Error condition.  
Off - Normal operation.  
Blinking - During start up, and when the Firmware is being upgraded.  
On - Normal operation.  
POWER  
LAN  
Off - No power  
On - The LAN (Ethernet) port is active.  
Off - No active connection on the LAN (Ethernet) port.  
Flashing - Data is being transmitted or received via the correspond-  
ing LAN (Ethernet) port.  
WLAN  
On - Idle  
Off - Error- Wireless connection is not available.  
Flashing - Data is being transmitted or received via the Wireless  
access point. Data includes "network traffic" as well as user data.  
Rear panel  
One dipole antenna is supplied. Best results are usually obtained  
with the antenna in a vertical position.  
ANT  
DB9 female RS232 port.  
CONSOLE  
This button has two (2) functions:  
RESET Button  
Reboot. When pressed and released, the WAP-4060PE will  
reboot (restart).  
Reset to Factory Defaults. This button can also be used to  
clear ALL data and restore ALL settings to the factory default  
values.  
To Clear All Data and restore the factory default values:  
1. Power Off the WAP-4060PE.  
2. Hold the Reset Button down while you Power On the device.  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Continue holding the Reset Button until the Status (Red) LED  
blinks TWICE.  
4. Release the Reset Button.  
The factory default configuration has now been restored, and  
the WAP-4060PE is ready for use.  
Use a standard LAN cable (RJ45 connectors) to connect this port  
to a 10BaseT or 100BaseT hub on your LAN.  
LAN (PoE)  
Power port  
Connect the supplied power adapter here.  
1.5 Specification  
Standard  
IEEE 802.11b, 802.11g  
Signal Type  
DSSS (Direct Sequence Spread Spectrum)  
OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK,  
CCK  
Modulation  
Port  
10/100Mbps RJ-45 port * 1, 802.3af compliant  
Reverse SMA male * 1  
Antenna Connector  
18dBm  
Output Power  
11 Mbps (CCK): -85dBm  
5.5 Mbps (QPSK): - 89dBm  
802.11b  
1, 2 Mbps (BPSK): - 90dBm  
(typically @PER < 8% packet size 1024 and  
@25ºC + 5ºC)  
54 Mbps: -72dBm  
48 Mbps: - 72dBm  
36 Mbps: -76dBm  
24 Mbps: -79dBm  
Sensitivity  
18 Mbps: -82dBm  
802.11g  
12 Mbps: -86dBm  
9 Mbps: -89dBm  
6 Mbps: -90dBm  
(typically @PER < 8% packet size 1024 and  
@25ºC + 5ºC)  
Operating Mode  
Security  
AP, AP Client, Wireless Bridge, Multiple Bridge, Repeater  
Open, shared, WPA, and WPA-PSK authentication  
802.1x support  
EAP-TLS, EAP-TTLS, PEAP  
Block inter-wireless station communication  
Block SSID broadcast  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web based configuration  
RADIUS Accounting  
RADIUS-On feature  
RADIUS Accounting update  
CLI  
Management  
Message Log  
Access Control list file support  
Configuration file Backup/Restore  
Statistics support  
Device discovery program  
Windows Utility  
Super G mode Up to 108Mbps  
802.11g  
802.11b  
Up to 54Mbps (6/9/12/18/24/36/48/54)  
Up to 11Mbps (1/2/5.5/11)  
Data Rate  
Dimensions (L x W x  
H)  
150 x 102 x 30mm  
210g  
Weight  
Operating temperature: 0 40 degree C  
Storage temperature: -20 70 degree C  
Relative humanity: 0% 90% (non-condensing)  
Environmental  
Specification  
Power Requirement 24V DC, 0.5A  
Electromagnetic  
FCC, CE  
Compatibility  
1.6 Wireless Performance  
The following information will help you utilizing the wireless performance, and operating cov-  
erage of WAP-4060PE.  
1. Site selection  
To avoid interferences, please locate WAP-4060PE and wireless clients away from trans-  
formers, microwave ovens, heavy-duty motors, refrigerators, fluorescent lights, and other  
industrial equipments. Keep the number of walls, or ceilings between AP and clients as  
few as possible; otherwise the signal strength may be seriously reduced. Place WAP-  
4060PE in open space or add additional WAP-4060PE as needed to improve the cover-  
age.  
2. Environmental factors  
The wireless network is easily affected by many environmental factors. Every environ-  
ment is unique with different obstacles, construction materials, weather, etc. It is hard to  
determine the exact operating range of WAP-4060PE in a specific location without testing.  
3. Antenna adjustment  
The bundled antenna of WAP-4060PE is adjustable. Firstly install the antenna pointing  
straight up, then smoothly adjust it if the radio signal strength is poor. But the signal re-  
ception is definitely weak in some certain areas, such as location right down the antenna.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Moreover, the original antenna of WAP-4060PE can be replaced with other external an-  
tennas to extend the coverage. Please check the specification of the antenna you want to  
use, and make sure it can be used on WAP-4060PE.  
4. WLAN type  
If WAP-4060PE is installed in an 802.11b and 802.11g mixed WLAN, its performance will  
reduced significantly. Because every 802.11g OFDM packet needs to be preceded by an  
RTS-CTS or CTS packet exchange that can be recognized by legacy 802.11b devices.  
This additional overhead lowers the speed. If there are no 802.11b devices connected, or  
if connections to all 802.11b devices are denied so that WAP-4060PE can operate in  
11g-only mode, then its data rate should actually 54Mbps and 108Mbps in Super G mode.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Installation  
2.1 General Installation  
2
Before you proceed with the installation, it is necessary that you have enough informa-  
tion about the WAP-4060PE.  
1. Locate an optimum location for the WAP-4060PE. The best place for your WAP-  
4060PE is usually at the center of your wireless network, with line of sight to all of your  
mobile stations.  
2. Assemble the antenna to WAP-4060PE. Try to place them to a position that can best  
cover your wireless network. The antennas position will enhance the receiving sensitivity.  
3. Connect RJ-45 cable to WAP-4060PE. Connect this WAP-4060PE to your LAN  
switch/hub or a single PC.  
4. Plug in power adapter and connect to power source. After power on, WAP-4060PE  
will start to operate.  
Note: ONLY use the power adapter supplied with the WAP-4060PE. Otherwise, the  
product may be damaged.  
2.2 Using PoE (Power over Ethernet)  
The LAN port of WAP-4060PE supports PoE. Before you proceed with the PoE instal-  
lation, please make sure the PoE adapter or switch is 802.3af compliant.  
1. Do not connect the supplied power adapter to the WAP-4060PE.  
2. Connect one end of a standard (category 5) LAN cable to the Ethernet port on the WAP-  
4060PE.  
3. Connect the other end of the LAN cable to the powered Ethernet port on a suitable PoE  
Adapter or switch. (IEEE 802.3af compliant)  
4. Connect the unpowered Ethernet port on the PoE adapter to your Hub or switch.  
5. Connect the power supply to the PoE adapter and power up.  
6. Check the LEDs on the WAP-4060PE to see it is drawing power via the Ethernet  
connection.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Access Point Setup  
3.1 Overview  
3
This chapter describes the setup procedure to make the WAP-4060PE a valid device  
on your LAN, and to function as an Access Point for your Wireless Stations.  
The WAP-4060PE can be configured using either the supplied Windows utility or the  
Web Browser  
3.2 Setup using the Windows Utility  
A simple Windows setup utility is supplied on the CD-ROM. This utility can be used to assign a  
suitable IP address to the WAP-4060PE. Using this utility is recommended, because it can  
locate the WAP-4060PE even if it has an invalid IP address.  
1.  
2.  
Insert the Users Manual and Utility CD into the CD-ROM drive.  
Once the menu screen appears, click on the WAP-4060PE Managerhyperlink for  
installation. If the menu screen does not appear, you can click the Start button and  
choose Run. When the dialog box appears, enter E:\Utility\setup.exe (Assume Eis  
your CD-ROM drive). Follow the prompts to complete the installation.  
3.  
After the installation completes, you can start this utility from Start>Program  
Files>Planet>WAP-4060PE Manager.  
3.2.1 Main Screen  
When the utility is executed, it searches the network for all active WAP-4060PE, and lists them  
on screen, as shown by the example below.  
Wireless Access Points  
The main panel displays a list of all Wireless Access Points found on the network. For each  
Access Point, the following data is shown:  
The device name of the WAP-4060PE.  
Name  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
The IP address for the WAP-4060PE.  
IP address  
The hardware or physical address of the WAP-4060PE.  
MAC Address  
IEEE Standard  
The wireless standard or standards used by the WAP-4060PE (e.g.  
802.11b, 802.11g)  
The current Firmware version installed in the WAP-4060PE.  
FW Version  
Description  
Any extra information for the WAP-4060PE, entered by the administrator.  
Note: If the desired device is not listed, check that the device is installed and powered on, then  
update the list by clicking the Refresh button.  
Buttons  
Click this button to update the Wireless Access Point device listing  
after changing the name or IP Address.  
Refresh  
When clicked, additional information about the selected device will  
be displayed.  
Detail Info  
Web Management  
Set IP Address  
Exit  
Use this button to connect to the WAP-4060PEs Web-based  
management interface.  
Click this button if you want to change the IP Address of the Wire-  
less Access Point.  
Exit the Management utility program by clicking this button.  
3.2.2 Setup Procedure  
1.  
2.  
3.  
Select the desired Wireless Access Point from the list.  
Click the Set IP Address button.  
If prompted, enter the user name and password. The default values are adminfor the  
User Name, and passwordfor the Password.  
4.  
5.  
Ensure the IP address, Network Mask, and Gateway settings are correct for your LAN.  
Save any changes.  
The initial IP address setup is now completed. You can click on the Web Manage-  
mentbutton to access the web interface of WAP-4060PE for more configurations.  
3.3 Setup using a Web Browser  
Your Browser must support JavaScript. The configuration program has been tested on the  
following browsers:  
Netscape V4.08 or later  
Internet Explorer V4 or later  
3.3.1 Setup Procedure  
Before proceeding, please install the WAP-4060PE in your LAN, as described previ-  
ously.  
1. Use a PC which is already connected to your LAN, and start the Web browser.  
2. In the Address box, enter the IP address of the WAP-4060PE you want to cobnfig-  
ure.  
3. You should then see a login prompt, which will ask for a User Name and Password.  
Enter admin for the User Name, and password for the Password.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
These are the default values. The password can and should be changed. Always  
enter the current user name and password, as set on the Admin Login screen.  
4. You will then see the Status screen, which displays the current settings and status.  
No data input is possible on this screen.  
5. From the menu, check the following screens, and configure as necessary for your  
environment. Details of these screens and settings are described in the following  
subsections of this chapter.  
Access Control - MAC level access control.  
Security Profiles - Wireless security.  
System - Identification, location, and Network settings  
Wireless - Basic & Advanced  
6. You may also need to set the admin password and administration connection  
options. These are on the Admin Login screen accessed from the Management  
menu. See Chapter 6 for details of the screens and features available on the  
Management menu.  
7. Use the Apply/Restart button on the menu to apply your changes and restart the  
Wireless Access Point.  
If you can't connect:  
It is likely that your PCs IP address is incompatible with the WAP-4060PEs  
IP address. This can happen if your LAN does not have a DHCP Server.  
The default IP address of the Wireless Access Point is 192.168.0.228, with  
a Network Mask of 255.255.255.0.  
If your PCs IP address is not compatible with this, you must change your  
PCs IP address to an unused value in the range 192.168.0.1 ~  
192.168.0.254, with a Network Mask of 255.255.255.0.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4 Access Control  
This feature allows you to block certain access from unknown or distrusted wireless  
stations.  
Click Access Control on the menu to view a screen like the following.  
Data - Access Control Screen  
Use this checkbox to Enable or Disable this feature as desired.  
Enable  
Warning: Ensure your own PC is in the "Trusted Wireless Sta-  
tions" list before enabling this feature.  
This table lists any Wireless Stations you have designated as  
"Trusted". If you have not added any stations, this table will be  
empty. For each Wireless station, the following data is displayed:  
Trusted Sta-  
tions  
MAC Address - the MAC or physical address of each Wire-  
less station.  
Connected - this indicates whether or not the Wireless sta-  
tion is currently associates with this Access Point.  
Buttons  
To change the list of Trusted Stations (Add, Edit, or Delete a  
Wireless Station or Stations), click this button. You will then see  
the Trusted Wireless Stations screen, described below.  
Modify List  
To upload a list of Trusted Stations from a file on your PC, click  
this button.  
Read from File  
Write to File  
To download the current list of Trusted Stations from the WAP-  
4060PE to a file on your PC, click this button.  
3.4.1 Trusted Wireless Stations  
To change the list of trusted wireless stations, use the Modify List button on the Ac-  
cess Control screen. You will see a screen like the sample below.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Trusted Wireless Stations  
Here lists ass Wireless Stations which you have designated  
as Trusted.  
Trusted Wireless  
Stations  
Here lists all Wireless Stations detected by the WAP-4060PE,  
which you have not designated as "Trusted".  
Other Wireless  
Stations  
The name assigned to the Trusted Wireless Station. Use this  
when adding or editing a Trusted Station.  
Name  
The MAC (physical) address of the Trusted Wireless Station.  
Use this when adding or editing a Trusted Station.  
Address  
Buttons  
<<  
Add a Trusted Wireless Station (move from the "Other Sta-  
tions" list).  
Select an entry (or entries) in the "Other Stations" list, and  
click the " << " button.  
Enter the Address (MAC or physical address) of the  
wireless station, and click the "Add " button.  
Delete a Trusted Wireless Station from the list (move to the  
"Other Stations" list).  
>>  
Select an entry (or entries) in the "Trusted Stations" list.  
Click the " >> " button.  
Select all of the Stations listed in the "Other Stations" list.  
Select All  
De-select any Stations currently selected in the "Other Sta-  
tions" list.  
Select None  
To change an existing entry in the "Trusted Stations" list,  
select it and click this button.  
Edit  
1. Select the Station in the "Trusted Station" list.  
2. Click the "Edit" button. The address will be copied to the  
"Address" field, and the "Add" button will change to "Up-  
date".  
3. Edit the address (MAC or physical address) as required.  
4. Click "Update" to save your changes.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
To add a Trusted Station which is not in the "Other Wireless  
Stations" list, enter the required data and click this button.  
Add  
Clear the Name and Address fields.  
Clear  
3.5 Security Profiles  
Security Profiles contain the SSID and all the security settings of this WAP-4060PE.  
Up to eight (8) Security Profiles can be defined.  
Up to four (4) Security Profiles can be enabled at one time, allowing up to 4 differ-  
ent SSIDs to be used simultaneously.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Security Profiles Screen  
Profile  
All available profiles are listed. For each profile, the following  
data is displayed:  
Profile List  
* (star sign)  
If displayed before the name of the profile, this indicates  
the profile is currently enabled. If not displayed, the profile  
is currently disabled.  
Profile Name  
The current profile name is displayed.  
[SSID]  
The current SSID associated with this profile.  
Security System  
The current security system (e.g. WPA-PSK) is displayed.  
[Frequency Band]  
The Wireless Band (2.4 GHz) for this profile is displayed.  
Buttons  
Enable - enable the selected profile.  
Configure - change the settings for the selected profile.  
Disable - disable the selected profile.  
Primary Profile  
Select the primary profile for 802.11b and 802.11g AP mode.  
Only enabled profiles are listed. The SSID associated with  
this profile will be broadcast if the "Broadcast SSID" setting on  
the Basic screen is enabled.  
802.11b/g AP  
Mode  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Select the primary profile for 802.11b and 802.11g Bridge  
Mode. This setting determines the SSID and security settings  
used for the Bridge connection to the remote AP.  
802.11b/g Bridge  
Mode  
Isolation  
None  
If this option is selected, wireless clients using different pro-  
files (different SSIDs) are not isolated, so they will be able to  
communicate with each other.  
If this option is selected, wireless clients using different pro-  
files (different SSIDs) are isolated from each other, so they  
will NOT be able to communicate. They will still be able to  
communicate with other clients using the same profile, unless  
the "Wireless Separation" setting on the "Advanced" screen  
has been enabled.  
Isolate all  
This option is only useful if the hubs/switches on your LAN  
support the VLAN (802.1Q) standard.  
Use VLAN  
When VLAN is used, you must select the desired VLAN for  
each security profile when configuring the profile. (If VLAN is  
not selected, the VLAN setting for each profile is ignored.)  
Click the Configure VLAN button to configure the IDs used by  
each VLAN. See below for further details.  
3.5.1 VLAN Configuration Screen  
This screen is accessed via the Configure VLAN button on the Security Profiles screen.  
The settings on this screen will be ignored unless the Use VLAN option on the  
Security Profiles screen is selected.  
If using the VLAN option, these setting determine which VLAN traffic is assigned to.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - VLAN Configuation Screen  
VLAN Client Traffic  
Each profile is listed, whether currently enabled or not. You can  
Profile  
assign traffic from each profile (SSID) to a different VLAN if de-  
sired. To assign multiple profiles to the same VLAN, just enter the  
same VLAN ID for each profile.  
Enter the desired VLAN ID, as used on your network. IDs must be  
in the range 1 ~ 4095. These IDs must match the IDs used by  
other network devices.  
VLAN ID  
VLAN AP Traffic  
Traffic generated by this AP will not have a VLAN tag (no VLAN  
No VLAN Tag  
ID).  
If selected, each packet generated by this AP will be sent over  
each active VLAN, as defined in the client VLAN table above. This  
requires that each packet be replicated (up to 8 times). This has a  
detrimental effect on performance, so should only be used if  
necessary.  
Replicate…  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If selected, you can enter the desired VLAN ID. Normally, this ID  
should be one of the client VLAN IDs defined above.  
Specified  
VLAN ID  
3.6 Configure Security Profile  
This screen is displayed when you select a Profile on the Security Profiles screen, and  
click the Configure button.  
3.6.1 Profile Data  
Enter the desired settings for each of the following:  
Enter a suitable name for this profile.  
Profile Name  
SSID  
Enter the desired SSID. Each profile must have an unique  
SSID.  
Displays the wireless band for this profile.  
Wireless Band  
3.6.2 Security Settings  
Select the desired option, and then enter the settings for the selected method.  
The available options are:  
None - No security is used. Anyone using the correct SSID can connect to your  
network.  
WEP - The 802.11b standard. Data is encrypted before transmission, but the  
encryption system is not very strong.  
WPA-PSK - Like WEP, data is encrypted before transmission. WPA is more  
secure than WEP, and should be used if possible. The PSK (Pre-shared Key)  
must be entered on each Wireless station. The 256Bit encryption key is derived  
from the PSK, and changes periodically.  
WPA-802.1x - This version of WPA requires a Radius Server on your LAN to  
provide the client authentication according to the 802.1x standard. Data transmis-  
sions are encrypted using the WPA standard.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If this option is selected:  
This WAP-4060PE must have a "client login" on the Radius Server.  
Each user must have a "user login" on the Radius Server.  
Each user's wireless client must support 802.1x and provide the login data  
when required.  
All data transmission is encrypted using the WPA standard. Keys are auto-  
matically generated, so no key input is required.  
802.1x - This uses the 802.1x standard for client authentication, and WEP for data  
encryption. If possible, you should use WPA-802.1x instead, because WPA en-  
cryption is much stronger than WEP encryption.  
If this option is selected:  
This WAP-4060PE must have a "client login" on the Radius Server.  
Each user must have a "user login" on the Radius Server.  
Each user's wireless client must support 802.1x and provide the login data  
when required.  
All data transmission is encrypted using the WEP standard. You only have to  
select the WEP key size; the WEP key is automatically generated.  
3.6.3 Security Settings - None  
No security is used. Anyone using the correct SSID can connect to your network.  
The only settings available from this screen are Radius MAC Authentication and  
UAM (Universal Access Method).  
3.6.4 Radius MAC Authentication  
Radius MAC Authentication provides for MAC address checking which is centralized  
on your Radius server. If you don't have a Radius Server, you cannot use this feature.  
Using MAC authentication  
5. Ensure the WAP-4060PE can login to your Radius Server.  
Add a RADIUS client on the RADIUS server, using the IP address or name of  
the WAP-4060PE, and the same shared key as pre-configured.  
Ensure the WAP-4060PE has the correct address, port number, and shared  
key for login to your Radius Server. These parameters are entered either on  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
the Security page, or the Radius-based MAC authentication sub-screen, de-  
pending on the security method used.  
On the WAP-4060PE, enable the Radius-based MAC authentication feature  
on the screen below.  
6. Add Users on the Radius server as required. The username must be the MAC  
address of the Wireless client you wish to allow, and the password must be blank.  
7. When clients try to associate with the WAP-4060PE, their MAC address is passed  
to the Radius Server for authentication.  
If successful, xx:xx:xx:xx:xx:xx MAC authenticationis entered in the log, and  
client station status would show as authenticatedon the station list table;  
If not successful, xx:xx:xx:xx:xx:xx MAC authentication failedis entered in  
the log, and station status is shown as authenticatingon the station list table.  
Radius-based MAC authentication Screen  
This screen will look different depending on the current security setting. If you have  
already provided the address of your Radius server, you won't be prompted for it again.  
Otherwise, you must enter the details of your Radius Server on this screen.  
Data - Radius-based MAC Authentication Screen  
Enable this if you want to use Radius-based MAC authentica-  
tion.  
Enable ...  
If this field is visible, enter the name or IP address of the Ra-  
dius Server on your network.  
Radius Server  
Address  
If this field is visible, enter the port number used for connec-  
tions to the Radius Server.  
Radius Port  
If this field is visible, it displays the name used for the Client  
Login on the Radius Server. This Login name must be created  
on the Radius Server.  
Client Login  
Name  
If this field is visible, it is used for the Client Login on the Ra-  
dius Server. Enter the key value to match the value on the  
Radius Server.  
Shared Key  
WEP Key  
If this field is visible, it is for the WEP key used to encrypt data  
transmissions to the Radius Server. Enter the desired key  
value in HEX, and ensure the Radius Server has the same  
value.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If this field is visible, select the desired key index. Any value  
can be used, provided it matches the value on the Radius  
Server.  
WEP Key Index  
3.6.5 UAM  
UAM (Universal Access Method) is intended for use in Internet cafes, Hot Spots, and  
other sites where the WAP-4060PE is used to provide Internet Access.  
If enabled, then HTTP (TCP, port 80) connections are checked. (UAM only works on  
HTTP connections; all other traffic is ignored.) If the user has not been authenticated,  
Internet access is blocked, and the user is re-directed to another web page. Typically,  
this web page is on your Web server, and explains how to pay for and obtain Internet  
access.  
To use UAM, you need a Radius Server for Authentication. The "Radius Server Setup"  
must be completed before you can use UAM. The required setup depends on whether  
you are using Internalor Externalauthentication.  
Internal authentication uses the web page built in the WAP-4060PE.  
External authentication uses a web page on your Web server. Generally, you  
should use External authentication, as this allows you to provide relevant and help-  
ful information to users.  
UAM authentication - Internal  
1. Ensure the WAP-4060PE can login to your Radius Server.  
Add a RADIUS client on RADIUS server, using the IP address or name of the  
WAP-4060PE, and the same shared key as pre-configured.  
Ensure the WAP-4060PE has the correct address, port number, and shared  
key for login to your Radius Server. These parameters are entered either on  
the Security page, or the UAM sub-screen, depending on the security method  
used.  
2. Add users on your RADIUS server as required, and allow access by these users.  
3. Client PCs must have the correct Wireless settings in order to associate with the  
WAP-4060PE.  
4. When an associated client tries to use HTTP (TCP, port 80) connections, they will  
be re-directed to a user login page.  
5. The client (user) must then enter the user name and password, as defined on the  
Radius Server. (You must provide some system to let users know the correct  
name and password to use.)  
6. If the user name and password is correct, Internet access is allowed. Otherwise,  
the user remains on the login page.  
Clients which pass the authentication are listed as xx:xx:xx:xx:xx:xx WEB au-  
thenticationin the log table, and station status would show as Authenticated”  
on the station list table.  
If a client fails authentication, xx:xx:xx:xx:xx:xx WEB authentication failed”  
shown in the log, and station status is shown as Authenticatingon the sta-  
tion list table.  
UAM authentication - External  
1. Ensure the WAP-4060PE can login to your Radius Server.  
Add a RADIUS client on RADIUS server, using the IP address or name of the  
WAP-4060PE, and the same shared key as pre-configured.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ensure the WAP-4060PE has the correct address, port number, and shared  
key for login to your Radius Server. These parameters are entered either on  
the Security page, or the UAM sub-screen, depending on the security method  
used.  
2. On your Web Server, create a suitable welcome page. The welcome page must  
have a link or button to allow the user to input their user name and password on  
the uamlogon.htm page on the WAP-4060PE.  
3. On the WAP-4060PEs UAM screen, select External Web-based Authentication,  
and enter the URL for the welcome page on your Web server.  
4. Add users on your RADIUS server as required, and allow access by these users.  
5. Client PCs must have the correct Wireless settings in order to associate with the  
WAP-4060PE.  
6. When an associated client tries to use HTTP (TCP, port 80) connections, they will  
be re-directed to the welcome page on your Web Server.  
7. The client (user) must then enter the user name and password, as defined on the  
Radius Server. (You must provide some system to let users know the correct  
name and password to use.)  
8. If the user name and password is correct, Internet access is allowed.  
Otherwise, the user remains on the login page.  
Clients which pass the authentication are listed as xx:xx:xx:xx:xx:xx WEB au-  
thenticationin the log table, and station status would show as Authenticated”  
on the station list table.  
If a client fails authentication, xx:xx:xx:xx:xx:xx WEB authentication failedis  
shown in the log, and station status is shown as Authenticatingon the sta-  
tion list table.  
UAM Screen  
The UAM screen will look different depending on the current security setting. If you  
have already provided the address of your Radius server, you won't be prompted for it  
again.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - UAM Screen  
Enable this if you want to use this feature. See the section above  
Enable  
for details of using UAM.  
If selected, then when a user first tries to access the Internet,  
they will be blocked, and re-directed to the built-in login page.  
The logon data is then sent to the Radius Server for authentica-  
tion.  
Internal  
Web-based  
Authentication  
If selected, then when a user first tries to access the Internet,  
they will be blocked, and re-directed to the URL below. This  
needs to be on your own local Web Server. The page must also  
link back to the built-in login page on this device to complete the  
login procedure.  
External  
Web-based  
Authentication  
Enter the URL of the page on your local Web Server. When  
users attempt to access the Internet, they will see this page, but  
are not logged in.  
Login URL  
Enter the URL of the page on your local Web Server you wish  
users to see if their login fails. (This may be the same URL as  
the Login URL).  
Login Failure  
URL  
3.6.6 Security Settings - WEP  
This is the 802.11b standard. Data is encrypted before transmission, but the encryption  
system is not very strong.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - WEP Screen  
WEP  
Select the desired option, and ensure your Wireless stations  
have the identical setting:  
Data  
Encryption  
64 Bit Encryption - Keys are 10 Hex (5 ASCII) characters.  
128 Bit Encryption - Keys are 26 Hex (13 ASCII) charac-  
ters.  
152 Bit Encryption - Keys are 32 Hex (16 ASCII) charac-  
ters.  
Normally, you can leave this at Automatic, so that Wireless  
Stations can use either method ("Open System" or "Shared  
Key".).  
Authentication  
If you wish to use a particular method, select the appropriate  
value - "Open System" or "Shared Key". All Wireless stations  
must then be set to use the same method.  
Select "Hex" or "ASCII" depending on your input method. (All  
keys are converted to Hex, ASCII input is only for convenience.)  
Key Input  
Key Value  
Enter the key values you want to use. The default key, selected  
by the radio button, is required. The other keys are optional.  
Other stations must have matching key values.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Use this to generate a key or keys, instead of entering them  
directly. Enter a word or group of printable characters in the  
Passphrase box and click the "Generate Key" button to auto-  
matically configure the WEP Key(s).  
Passphrase  
The current status is displayed.  
Radius MAC  
Authentication  
Click the "Configure" button to configure this feature if required.  
The current status is displayed.  
UAM  
Click the "Configure" button to configure this feature if required.  
3.6.7 Security Settings - WPA-PSK  
Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and  
should be used if possible. The PSK (Pre-shared Key) must be entered on each Wire-  
less station. The 256Bit encryption key is derived from the PSK, and changes  
frequently.  
Data - WPA-PSK Screen  
WPA-PSK  
Enter the key value. Data is encrypted using a 256Bit key  
derived from this key. Other Wireless Stations must use the  
same key.  
Network Key  
Select the desired option. Other Wireless Stations must use  
the same method.  
WPA Encryption  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TKIP - Unicast (point-to-point) transmissions are en-  
crypted using TKIP, and multicast (broadcast)  
transmissions are not encrypted.  
TKIP + 64 bit WEP - Unicast (point-to-point) transmis-  
sions are encrypted using TKIP, and multicast  
(broadcast) transmissions are encrypted using 64 bit  
WEP.  
TKIP + 128 bit WEP - Unicast (point-to-point) trans-  
missions are encrypted using TKIP, and multicast  
(broadcast) transmissions are encrypted using 128 bit  
WEP.  
AES - CCMP - CCMP is the most common sub-type of  
AES (Advanced Encryption System). Most systems will  
simply say "AES". If selected, both Unicast (point-to-  
point) and multicast (broadcast) transmissions are en-  
crypted using AES.  
AES CCMP + TKIP - If selected, Unicast (point-to-  
point) uses AES-CCMP and multicast (broadcast)  
transmissions are encrypted using TKIP.  
This refers to the key used for broadcast transmissions.  
Enable this if you want the keys to be updated regularly.  
Group Key Update  
Key Lifetime  
This field determines how often the Group key is dynami-  
cally updated. Enter the desired value.  
If enabled, the Group key will be updated whenever any  
member leaves the group or disassociates from the WAP-  
4060PE.  
Update Group key  
when any member-  
ship terminates  
The current status is displayed. This will always be "Dis-  
abled", because Radius MAC Authentication is not available  
with WPA-PSK.  
Radius MAC  
Authentication  
The current status is displayed. This will always be "Dis-  
abled", because UAM is not available with WPA-PSK. The  
Configure button for this feature will also be disabled.  
UAM  
3.6.8 Security Settings - WPA-802.1x  
This version of WPA requires a Radius Server on your LAN to provide the client au-  
thentication according to the 802.1x standard. Data transmissions are encrypted using  
the WPA standard.  
If this option is selected:  
This WAP-4060PE must have a "client login" on the Radius Server.  
Each user must have a "user login" on the Radius Server. Normally, a Certifi-  
cate is used to authenticate each user.  
Each user's wireless client must support 802.1x.  
All data transmission is encrypted using the WPA standard. Keys are auto-  
matically generated, so no key input is required.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - WPA-802.1x Screen  
WPA-802.1x  
Enter the name or IP address of the Radius Server on your  
network.  
Radius Server  
Address  
Enter the port number used for connections to the Radius  
Server.  
Radius Port  
This read-only field displays the current login name, which is  
the same as the name of the WAP-4060PE. The Radius  
Server must be configured to accept this login.  
Client Login Name  
This is used for the Client Login on the Radius Server. Enter  
Shared Key  
the key value to match the Radius Server.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Select the desired option. Other Wireless Stations must use  
the same method.  
WPA Encryption  
TKIP - Unicast (point-to-point) transmissions are en-  
crypted using TKIP, and multicast (broadcast)  
transmissions are not encrypted.  
TKIP + 64 bit WEP - Unicast (point-to-point) transmis-  
sions are encrypted using TKIP, and multicast  
(broadcast) transmissions are encrypted using 64 bit  
WEP.  
TKIP + 128 bit WEP - Unicast (point-to-point) transmis-  
sions are encrypted using TKIP, and multicast  
(broadcast) transmissions are encrypted using 128 bit  
WEP.  
AES - CCMP - CCMP is the most common sub-type of  
AES (Advanced Encryption System). Most systems will  
simply say "AES". If selected, both Unicast (point-to-point)  
and multicast (broadcast) transmissions are encrypted  
using AES.  
AES - TKIP - If selected, Unicast (point-to-point) uses  
AES-CCMP and multicast (broadcast) transmissions are  
encrypted using TKIP.  
This refers to the key used for broadcast transmissions.  
Enable this if you want the keys to be updated regularly.  
Group Key Update  
Key Lifetime  
This field determines how often the Group key is dynamically  
updated. Enter the desired value.  
If enabled, the Group key will be updated whenever any  
member leaves the group or disassociates from the WAP-  
4060PE.  
Update Group key  
when any mem-  
bership  
terminates  
Enable this if you want this WAP-4060PE to send accounting  
data to the Radius Server.  
Radius Account-  
ing  
If enabled, the port used by your Radius Server must be  
entered in the Radius Accounting Port" field.  
If Radius accounting is enabled, you can enable this and  
enter the desired update interval. This WAP-4060PE will then  
send updates according to the specified time period.  
Update Report  
every ...  
The current status is displayed. This will always be "Dis-  
abled", because Radius MAC Authentication is not available  
with WPA-802.1x. The Configure button for this feature will  
also be disabled.  
Radius MAC  
Authentication  
The current status is displayed. This will always be "Dis-  
abled", because UAM is not available with WPA-802.1x. The  
Configure button for this feature will also be disabled.  
UAM  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.6.9 Security Settings - 802.1x  
This uses the 802.1x standard for client authentication, and WEP for data encryption. If  
possible, you should use WPA-802.1x instead, because WPA encryption is much  
stronger than WEP encryption.  
If this option is selected:  
This WAP-4060PE must have a "client login" on the Radius Server.  
Each user must have a "user login" on the Radius Server. Normally, a Certifi-  
cate is used to authenticate each user.  
Each wireless client must support 802.1x.  
All data transmission is encrypted using the WEP standard. You only have to  
select the WEP key size; the WEP key is automatically generated.  
Data - 802.1x Screen  
802.1x  
Enter the name or IP address of the Radius Server on  
your network.  
Radius Server Ad-  
dress  
Enter the port number used for connections to the Radius  
Server.  
Radius Port  
This read-only field displays the current login name, which  
is the same as the name of the WAP-4060PE. The Radius  
Server must be configured to accept this login.  
Client Login Name  
This is used for the Client Login on the Radius Server.  
Shared Key  
Enter the key value to match the Radius Server.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Select the desired option:  
WEP Key Size  
64 Bit - Keys are 10 Hex (5 ASCII) characters.  
128 Bit - Keys are 26 Hex (13 ASCII) characters.  
152 Bit - Keys are 32 Hex (16 ASCII) characters.  
Click this if you want the WEP keys to be automatically  
generated.  
Dynamic WEP Key  
The key exchange will be negotiated. The most widely  
supported protocol is EAP-TLS.  
The following Key Exchange setting determines how  
often the keys are changed.  
Both Dynamic and Static keys can be used simultane-  
ously, allowing clients using either method to use the  
WAP-4060PE.  
This setting if only available if using Dynamic WEP Keys. If  
you want the Dynamic WEP keys to be updated regularly,  
enable this and enter the desired lifetime (in minutes).  
Key Exchange  
Enable this if some wireless clients use a fixed (static)  
WEP key, using EAP-MD5.  
Static WEP Key  
(EAP-MD5)  
Note: both Dynamic and Static keys can be used simulta-  
neously, allowing clients using either method to use the  
WAP-4060PE.  
WEP Key  
Enter the WEP key according to the WEP Key Size set-  
ting above. Wireless stations must use the same key.  
Select the desired index value. Wireless stations must use  
the same key index.  
WEP Key Index  
Radius Accounting  
Enable this if you want this WAP-4060PE to send account-  
ing data to the Radius Server.  
If enabled, the port used by your Radius Server must be  
entered in the Radius Accounting Port field.  
If Radius accounting is enabled, you can enable this and  
enter the desired update interval. This WAP-4060PE will  
then send updates according to the specified time period.  
Update Report  
every ...  
The current status is displayed.  
Radius MAC  
Authentication  
Click the Configure button to configure this feature if  
required.  
The current status is displayed.  
UAM  
Click the Configure button to configure this feature if  
required.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.7 System Screen  
Click System on the menu to view a screen like the following.  
Data - System Screen  
Identification  
Enter a suitable name for this WAP-4060PE.  
Access Point  
Name  
If desired, you can enter a description for the WAP-4060PE.  
Select the country or domain matching your current location.  
Description  
Country Do-  
main  
IP Address  
Select this option if you have a DHCP Server on your LAN, and  
you want the WAP-4060PE to obtain an IP address automati-  
cally.  
DHCP Client  
If selected, the following data must be entered.  
Fixed  
IP Address - The IP Address of this device. Enter an unused  
IP address from the address range on your LAN.  
Subnet Mask - The Network Mask associated with the IP  
Address above. Enter the value used by other devices on  
your LAN.  
Gateway - The IP Address of your Gateway or Router. Enter  
the value used by other devices on your LAN.  
DNS - Enter the DNS (Domain Name Server) used by PCs  
on your LAN.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WINS  
If your LAN has a WINS server, you can enable this to have  
this AP register with the WINS server.  
Enable WINS  
Enter the name or IP address of your WINS server.  
WINS Server  
Name/IP Ad-  
dress  
3.8 2.4GHz Wireless  
There are two configuration screens available:  
Basic Settings  
Advanced  
3.8.1 Basic Settings Screen  
The settings on this screen must match the settings used by Wireless Stations.  
Click Basic on the menu to view a screen like the following.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Basic Settings Screen  
Operation  
Select the desired option:  
Wireless Mode  
Disable - select this if for some reason you do not want this  
AP to transmit or receive at all.  
802.11b and 802.11g - this is the default setting, and will  
allow connections by both 802.11b and 802.1g wireless sta-  
tions.  
802.11b - if selected, only 802.11b clients are allowed.  
802.11g wireless stations will only be able to connect if they  
are fully backward compatible with the 802.11b standard.  
802.11g - only 802.11g clients are allowed. If you only have  
802.11g, selecting this option may provide a performance  
improvement over using the default setting.  
Dynamic Super 802.11g (108Mbps) - This uses Packet  
Bursting, FastFrame, Compression, and Channel Bonding  
(using 2 channels) to increase throughput. Only clients sup-  
porting the "Atheros Super G" mode can connect at  
108Mbps, and they will only use this speed when necessary.  
However, this option is backward compatible with 802.11b  
and (standard) 802.11g.  
Static Super 802.11g (108Mbps) - This uses Packet Burst-  
ing, FastFrame, Compression, and Channel Bonding (using  
2 channels) to increase throughput.  
Because "Channel Bonding" is always used, this method is  
NOT compatible with 802.11b and (standard) 802.11g. Only  
clients supporting the "Atheros Super G" mode can connect  
at 108Mbps; they will always connect at this speed. Select  
this option only if all wireless stations support this "Atheros  
Super G" mode.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Both Bridge mode and AP mode can be used simultaneously,  
unless AP mode is "Client/Repeater". Select the desired AP  
mode:  
AP Mode  
None (disable) - Disable AP mode. Use this if you want this  
WAP-4060PE to act as Bridge only.  
Access Point - operate as a normal Access Point  
Client/Repeater - act as a client or repeater for another  
Access Point. If selected, you must provide the address  
(MAC address) of the other AP in the Repeater AP MAC  
Address field. In this mode, all traffic is sent to the specified  
AP.  
Note: If using Client/Repeater mode, you cannot use Bridge  
Mode.  
This is not required unless the AP Mode is "Client/Repeater". In  
this mode, you must provide the MAC address of the other AP in  
this field. You can either enter the MAC address directly, or, if the  
other AP is on-line and broadcasting its SSID, you can click the  
"Select AP" button and select from a list of available APs.  
Repeater AP  
MAC Address  
If Disabled, no SSID is broadcast.  
Broadcast  
SSID  
If enabled, you must select the security profile whose SSID is to  
be broadcast. This can be done in the "Security Profiles" screen.  
The SSID will then be broadcast to all Wireless Stations. Sta-  
tions which have no SSID (or a "null" value) can then adopt the  
correct SSID for connections to this Access Point.  
Both Bridge mode and AP mode can be used simultaneously,  
unless AP mode is "Client/Repeater". Select the desired Bridge  
mode:  
Bridge Mode  
None (disable) - Disable Bridge mode. Use this if you want  
this WAP-4060PE to act as an AP only.  
Point-to-Point Bridge (PTP) - Bridge to a single AP. You  
must provide the MAC address of the other AP in the PTP  
Bridge AP MAC Address field.  
Point-to-Multi-Point Bridge (PTMP) - Select this only if this  
AP is the "Master" for a group of Bridge-mode APs. The  
other Bridge-mode APs must be set to Point-to-Point Bridge  
mode, using this AP's MAC address. They then send all traf-  
fic to this "Master".  
If required, you can specify the MAC addresses of the APs  
which are allowed to connect to this AP in PTMP mode. To  
specify the allowed APs:  
1.Enable the checkbox "In PTMP mode, only allow specified  
APs".  
2.Click the button "Set PTMP APs".  
3.On the resulting sub-screen, enter the MAC addresses of  
the allowed APs.  
This is not required unless the Bridge Mode is "Point-to-Point  
Bridge (PTP)". In this case, you must enter the MAC address of  
the other AP in this field.  
PTP Bridge AP  
MAC Address  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
This is only functional if using Point-to-Multi-Point Bridge (PTMP)  
mode. If enabled, you can specify the MAC addresses of the  
APs which are allowed to connect to this AP. To specify the  
allowed APs:  
In PTMP mode,  
only allow  
specified APs  
1. Enable this checkbox  
2. Click the button "Set PTMP APs".  
3. On the resulting sub-screen, enter the MAC addresses of the  
allowed APs.  
Use this to open a sub-window where you can specify the MAC  
addresses of the APs which are allowed to connect to this AP.  
This is only functional if using Point-to-Multi-Point Bridge (PTMP)  
mode and you has enabled the checkbox "In PTMP mode, only  
allow specified APs".  
Set PTMP APs  
Parameters  
Channel No  
If "Automatic" is selected, the WAP-4060PE will select the  
best available Channel.  
If you experience interference (shown by lost connections  
and/or slow data transfers) you may need to experiment with  
manually setting different channels to see which is the best.  
This displays the current channel used by the WAP-4060PE.  
Current Chan-  
nel No.  
3.8.2 Advanced Settings  
Clicking the Advanced link on the menu will result in a screen like the following.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Advanced Settings Screen  
Basic Rate  
The Basic Rate is used for broadcasting. It does not  
Basic Rate  
determine the data transmission rate, which is determined  
by the "Mode" setting on the Basic screen.  
Select the desired option.  
Do NOT select the "802.11g" or "ODFM" options unless  
ALL of your wireless clients support this. 802.11b clients  
will not be able to connect to the WAP-4060PE if either of  
these modes is selected.  
Options  
If enabled, each Wireless station using the WAP-4060PE  
is invisible to other Wireless stations. In most business  
situations, this setting should be Disabled.  
Wireless Separation  
Enable this setting if you want to use this mode, and your  
Wireless stations also support this mode.  
Worldwide Mode  
(802.11d)  
Parameters  
This determines how quickly a Wireless Station will be  
considered "Disassociated" with this AP, when no traffic is  
received. Enter the desired time period.  
Disassociated Time-  
out  
Enter the preferred setting between 256 and 2346. Nor-  
mally, this can be left at the default value.  
Fragmentation  
Beacon Interval  
Enter the preferred setting between 20 and 1000. Nor-  
mally, this can be left at the default value.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Enter the preferred setting between 256 and 2346. Nor-  
mally, this can be left at the default value.  
RTS/CTS Threshold  
Preamble Type  
Select the desired option. The default is "Long". The  
"Short" setting takes less time when used in a good envi-  
ronment.  
Select the desired power output. Higher levels will give a  
greater range, but are also more likely to cause interfer-  
ence with other devices.  
Output Power Level  
Antenna Selection  
WAP-4060PE has only 1 antenna, there is only 1 option  
available.  
802.11b  
Select the desired option. The default is CTS-only.  
Enable or disable this setting as required.  
Protection Type  
Short Slot Time  
Protection Mode  
The Protection system is intended to prevent older  
802.11b devices from interfering with 802.11g transmis-  
sions. (Older 802.11b devices may not be able to detect  
that an 802.11g transmission is in progress.) Normally,  
this should be left at "Auto".  
Select the desired option. The default is 11 Mbps.  
Protection Rate  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4  
PC and Server Configuration  
4.1 Overview  
4
All Wireless Stations need to have settings which match the Wireless Access Point.  
These settings depend on the mode in which the WAP-4060PE is being used.  
If using WEP or WPA-PSK, it is only necessary to ensure that each Wireless  
station's settings match those of the WAP-4060PE, as described below.  
For WPA-802.1x and 802.1x modes, configuration is much more complex. The  
Radius Server must be configured correctly, and setup of each Wireless station is  
also more complex.  
4.2 Using WEP  
For each of the following items, each Wireless Station must have the same settings as  
the WAP-4060PE.  
Mode  
On each PC, the mode must be set to Infrastructure.  
This must match the value used on the WAP-4060PE.  
The default value is wireless  
SSID (ESSID)  
Note: The SSID is case sensitive.  
Wireless  
Security  
Each Wireless station must be set to use WEP data encryp-  
tion.  
The Key size (64 bit, 128 bit, 152 bit) must be set to match the  
WAP-4060PE.  
The keys values on the PC must match the key values on the  
WAP-4060PE.  
Note:  
On some systems, the key sizes may be shown as 40bit, 104bit,  
and 128bit instead of 64 bit, 128 bit and 152bit. This difference  
arises because the key input by the user is 24 bits less than the  
key size used for encryption.  
4.3 Using WPA-PSK  
For each of the following items, each Wireless Station must have the same settings as  
the WAP-4060PE.  
Mode  
On each PC, the mode must be set to Infrastructure.  
This must match the value used on the WAP-4060PE.  
The default value is wireless  
SSID (ESSID)  
Note: The SSID is case sensitive.  
On each client, Wireless security must be set to WPA-PSK.  
Wireless  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security  
The Pre-shared Key entered on the WAP-4060PE must also  
be entered on each Wireless client.  
The Encryption method (e.g. TKIP, AES) must be set to  
match the WAP-4060PE.  
4.4 Using WPA-802.1x  
This is the most secure and most complex system.  
802.1x mode provides greater security and centralized management, but it is more  
complex to configure.  
Wireless Station Configuration  
For each of the following items, each Wireless Station must have the same settings as  
the WAP-4060PE.  
Mode  
On each PC, the mode must be set to Infrastructure.  
This must match the value used on the WAP-4060PE.  
The default value is wireless  
SSID (ESSID)  
Note: The SSID is case sensitive.  
Each client must obtain a Certificate which is used for authentica-  
tion for the Radius Server.  
802.1x  
Authentica-  
tion  
Typically, EAP-TLS is used. This is a dynamic key system, so keys  
do NOT have to be entered on each Wireless station.  
802.1x  
Encryption  
However, you can also use a static WEP key (EAP-MD5); the  
WAP-4060PE supports both methods simultaneously.  
Radius Server Configuration  
If using WPA-802.1x mode, the Radius Server on your network must be configured as  
follow:  
It must provide and accept Certificates for user authentication.  
There must be a Client Login for the WAP-4060PE itself.  
The WAP-4060PE will use its Default Name as its Client Login name. (However,  
your Radius server may ignore this and use the IP address instead.)  
The Shared Key, set on the Security Screen of the WAP-4060PE, must match the  
Shared Secret value on the Radius Server.  
Encryption settings must be correct.  
4.5 802.1x Server Setup (Windows 2000 Server)  
This section describes using Microsoft Internet Authentication Server as the Radius  
Server, since it is the most common Radius Server available that supports the EAP-  
TLS authentication method.  
The following services on the Windows 2000 Domain Controller (PDC) are also re-  
quired:  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
dhcpd  
dns  
rras  
webserver (IIS)  
Radius Server (Internet Authentication Service)  
Certificate Authority  
4.5.1 Windows 2000 Domain Controller Setup  
1. Run dcpromo.exe from the command prompt.  
2. Follow all of the default prompts, ensure that DNS is installed and enabled during  
installation.  
4.5.2 Services Installation  
1. Select the Control Panel - Add/Remove Programs.  
2. Click Add/Remove Windows Components from the left side.  
3. Ensure that the following components are activated (selected):  
Certificate Services. After enabling this, you will see a warning that the com-  
puter cannot be renamed and joined after installing certificate services. Select  
Yes to select certificate services and continue  
World Wide Web Server. Select World Wide Web Server on the Internet In-  
formation Services (IIS) component.  
From the Networking Services category, select Dynamic Host Configuration  
Protocol (DHCP), and Internet Authentication Service (DNS should already be  
selected and installed).  
4. Click Next.  
5. Select the Enterprise root CA, and click Next.  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. Enter the information for the Certificate Authority, and click Next.  
7. Click Next if you don't want to change the CA's configuration data.  
8. Installation will warn you that Internet Information Services are running, and must  
be stopped before continuing. Click Ok, then Finish.  
4.5.3 DHCP server configuration  
1. Click on the Start - Programs - Administrative Tools - DHCP  
2. Right-click on the server entry as shown, and select New Scope.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Click Next when the New Scope Wizard Begins.  
4. Enter the name and description for the scope, click Next.  
5. Define the IP address range. Change the subnet mask if necessary. Click Next.  
6. Add exclusions in the address fields if required. If no exclusions are required,  
leave it blank. Click Next.  
7. Change the Lease Duration time if preferred. Click Next.  
8. Select Yes, I want to configure these options now, and click Next.  
9. Enter the router address for the current subnet. The router address may be left  
blank if there is no router. Click Next.  
10. For the Parent domain, enter the domain you specified for the domain controller  
setup, and enter the server's address for the IP address. Click Next.  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
11. If you don't want a WINS server, just click Next.  
12. Select Yes, I want to activate this scope now. Click Next, then Finish.  
13. Right-click on the server, and select Authorize. It may take a few minutes to com-  
plete.  
4.5.4 Certificate Authority Setup  
1. Select Start - Programs - Administrative Tools - Certification Authority.  
2. Right-click Policy Settings, and select New - Certificate to Issue.  
3. Select Authenticated Session and Smartcard Logon (select more than one by  
holding down the Ctrl key). Click OK.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Select Start - Programs - Administrative Tools - Active Directory Users and Com-  
puters.  
5. Right-click on your active directory domain, and select Properties.  
6. Select the Group Policy tab, choose Default Domain Policy then click Edit.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7. Select Computer Configuration - Windows Settings - Security Settings - Public Key  
Policies, right-click Automatic Certificate Request Settings - New - Automatic Cer-  
tificate Request.  
8. When the Certificate Request Wizard appears, click Next.  
9. Select Computer, then click Next.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
10. Ensure that your certificate authority is checked, then click Next.  
11. Review the policy change information and click Finish.  
12. Click Start - Run, type cmd and press enter.  
Enter secedit /refreshpolicy machine_policy  
This command may take a few minutes to take effect.  
4.5.5 Internet Authentication Service (Radius) Setup  
1. Select Start - Programs - Administrative Tools - Internet Authentication Service  
2. Right-click on Clients, and select New Client.  
3. Enter a name for the access point, click Next.  
4. Enter the IP address of the WAP-4060PE, and set the shared secret, as entered  
on the Security Profile screen of the WAP-4060PE.  
5. Click Finish.  
6. Right-click on Remote Access Policies, select New Remote Access Policy.  
7. Assuming you are using EAP-TLS, name the policy eap-tls, and click Next.  
8. Click Add...  
If you don't want to set any restrictions and a condition is required, select Day-And-  
Time-Restrictions, and click Add...  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9. Click Permitted, then OK. Select Next.  
10. Select Grant remote access permission. Click Next.  
11. Click Edit Profile... and select the Authentication tab. Enable Extensible Authenti-  
cation Protocol, and select Smart Card or other Certificate. Deselect other  
authentication methods listed. Click OK.  
12. Select No if you don't want to view the help for EAP. Click Finish.  
4.5.6 Grant Remote Access for Users  
1. Select Start - Programs - Administrative Tools- Active Directory Users and Com-  
puters.  
2. Double click on the user who you want to enable.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Select the Dial-in tab, and enable Allow access. Click OK.  
4.6 802.1x Client Setup on Windows XP  
Windows XP ships with a complete 802.1x client implementation. If using Windows  
2000, you can install SP3 (Service Pack 3) to gain the same functionality.  
If you don't have either of these systems, you must use the 802.1x client software  
provided with your wireless adapter. Refer to the documentation of your wireless  
adapter for setup instructions.  
The following instructions assume that:  
You are using Windows XP  
You are connecting to a Windows 2000 server for authentication.  
You already have a login (User name and password) on the Windows 2000 server.  
4.6.1 Client Certificate Setup  
1. Connect to a network which doesn't require port authentication.  
2. Start your Web Browser. In the Address box, enter the IP address of the Windows  
2000 Server, followed by /certsrv  
3. You will be prompted for a user name and password. Enter the User name and  
Password assigned to you by your network administrator, and click OK.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. On the first screen (below), select Request a certificate, click Next.  
5. Select User certificate request and select User Certificate, the click Next.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. Click Submit.  
7. A message will be displayed, then the certificate will be returned to you.  
Click Install this certificate.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8. . You will receive a confirmation message. Click Yes.  
9. Certificate setup is now complete.  
4.6.2 802.1x Authentication Setup  
1. Open the properties for the wireless connection, by selecting Start - Control Panel  
- Network Connections.  
2. Right Click on the Wireless Network Connection, and select Properties.  
3. Select the Authentication Tab, and ensure that Enable network access control  
using IEEE 802.1X is selected, and Smart Card or other Certificate is selected  
from the EAP type.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Encryption Settings  
The Encryption settings must match the APs (WAP-4060PE) on the Wireless network  
you want to join.  
Windows XP will detect any available Wireless networks, and allow you to config-  
ure each network independently.  
Your network administrator can advise you of the correct settings for each network.  
802.1x networks typically use EAP-TLS. This is a dynamic key system, so there is  
no need to enter key values.  
Enabling Encryption  
To enable encryption for a wireless network, follow this procedure:  
1. Click on the Wireless Networks tab.  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2. Select the wireless network from the Available Networks list, and click Configure.  
3. Select and enter the correct values, as advised by your Network Administrator.  
For example, to use EAP-TLS, you would enable Data encryption, and click the  
checkbox for the setting: The key is provided for me automatically, as shown be-  
low.  
Setup for Windows XP and 802.1x client is now complete.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.7 Using 802.1x Mode (without WPA)  
The procedures are similar to using WPA-802.1x.  
The only difference is that on your client, you must NOT enable the setting: The key is  
provided for me automatically.  
Instead, you must enter the WEP key manually, ensuring it matches the WEP key  
used on the Access Point.  
Note:  
On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP  
key is shown as "104 bit". This difference arises because the key input by the user is  
24 bits less than the key size used for encryption.  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5  
Operation and Status  
5.1 Operation  
5
Once both the WAP-4060PE and the PCs are configured, operation is automatic.  
However, you may need to perform the following operations on a regular basis.  
If using the Access Control feature, update the Trusted PC database as required.  
(See Access Control in Chapter 3 for details.)  
If using 802.1x mode, update the User Login data on the Windows 2000 Server,  
and configure the client PCs, as required.  
5.2 Status Screen  
Use the Status link on the main menu to view this screen.  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Status Screen  
Access Point  
Access Point Name  
MAC Address  
Domain  
The current name will be displayed.  
The MAC (physical) address of the WAP-4060PE.  
The region or domain, as selected on the System screen.  
The version of the firmware currently installed.  
Firmware Version  
TCP/IP  
The IP Address of the WAP-4060PE.  
IP Address  
The Network Mask (Subnet Mask) for the IP Address  
above.  
Subnet Mask  
Enter the Gateway for the LAN segment to which the WAP-  
4060PE is attached (the same value as the PCs on that  
LAN segment).  
Gateway  
This indicates whether the current IP address was obtained  
from a DHCP Server on your network.  
DHCP Client  
It will display "Enabled" or "Disabled".  
Wireless  
The Channel currently in use is displayed.  
The current mode (e.g. 802.11g) is displayed.  
The current Access Point mode is displayed.  
The current Bridge mode is displayed.  
Channel/Frequency  
Wireless Mode  
AP Mode  
Bridge Mode  
Security Profiles  
Name  
This displays the current name of each security profile.  
This displays the SSID associated with the profile.  
This indicates whether or not the profile is enabled.  
SSID  
Status  
Buttons  
Click this to open a sub-window where you can view Statis-  
tics on data transmitted or received by the WAP-4060PE.  
Statistics  
Click this to open a sub-window which displays further  
details about each security profile.  
Profile Status  
Log  
Click this to open a sub-window where you can view the  
activity log.  
Click this to open a sub-window where you can view the list  
of all current Wireless Stations using the WAP-4060PE.  
Stations  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.1 Statistics Screen  
This screen is displayed when the 2.4GHz Statistics button on the Status screen is  
clicked. It shows details of the traffic flowing through the WAP-4060PE.  
Data - Statistics Screen  
System Up Time  
This indicates the time period which the system has been  
running since the last restart or reboot.  
System Up Time  
2.4GHz Wireless  
Authentication  
The number of "Authentication" packets received. Authentica-  
tion is the process of identification between the AP and the  
client.  
The number of "Deauthentication" packets received.  
Deauthentication is the process of ending an existing  
authentication relationship.  
Deauthentication  
Association  
The number of "Association" packets received. Association  
creates a connection between the AP and the client. Usually,  
clients associate with only one AP at any time.  
The number of "Disassociation" packets received. Disasso-  
ciation breaks the existing connection between the AP and  
the client.  
Disassociation  
Reassociation  
The number of "Reassociation" packets received. Reassocia-  
tion is the service that enables an established association  
(between AP and client) to be transferred from one AP to  
another (or the same) AP.  
Wireless  
MSDU  
Number of valid Data packets transmitted to or received from  
Wireless Stations, at application level.  
Number of valid Data packets transmitted to or received from  
Wireless Stations, at driver level.  
Data  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Number of Broadcast packets transmitted to or received from  
Wireless Stations, using Multicast transmission.  
Multicast Packets  
Management  
Control  
Number of Management packets transmitted to or received  
from Wireless Stations.  
Number of Control packets transmitted to or received from  
Wireless Stations.  
5.3.2 Profile Status  
The Profile Status screen is displayed when the Profile Status button on the Status  
screen is clicked.  
For each profile, the following data is displayed:  
The name you gave to this profile; if you didn't change the  
name, the default name is used.  
Name  
The SSID assigned to this profile.  
SSID  
Indicates whether or not the SSID is broadcast.  
The Wireless band used by this profile.  
Indicates whether or not this profile is enabled.  
Broadcast SSID  
Band  
Status  
The number of wireless stations currently using accessing this  
WAP-4060PE using this profile.  
Clients  
If the profile is disabled, this will always be zero.  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.3 Activity Log  
This screen is displayed when the Log button on the Status screen is clicked.  
Data - Activity Log  
Data  
The system date and time is displayed.  
Current Time  
Log  
The Log shows details of the connections to the WAP-  
4060PE.  
Buttons  
Update the data on screen.  
Refresh  
Save the log to a file on your pc.  
Save to file  
Clear Log  
This will delete all data currently in the Log. This will make it  
easier to read new messages.  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.4 Station List  
This screen is displayed when the Stations button on the Status screen is clicked.  
Data - Station List Screen  
Station List  
The name of each Wireless Station is displayed. If the name is  
not known, "unknown" is displayed for the name.  
Name  
The MAC (physical) address of each Wireless Station is  
displayed.  
MAC Address  
The mode of each Wireless Station.  
Mode  
SSID  
This displays the SSID used the Wireless station. Because the  
WAP-4060PE supports multiple SSIDs, different PCs could  
connect using different SSIDs.  
This indicates the current status of each Wireless Station.  
Update the data on screen.  
Status  
Refresh Button  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6  
Management  
6.1 Overview  
6
This Chapter covers the following features, available on the WAP-4060PEs Manage-  
ment menu.  
Admin Login  
Auto Config/Update  
Config File  
Log Settings  
Rogue APs  
SNMP  
Upgrade Firmware  
6.2 Admin Login Screen  
The Admin Login screen allows you to assign a password to the WAP-4060PE. This  
password limits access to the configuration interface. The default password is pass-  
word. It is recommended to change it for security consideration.  
Data - Admin Login Screen  
Login  
Enter the login name for the Administrator.  
User Name  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If you wish to change the Admin password, check this  
field and enter the new login password in the fields  
below.  
Change Admin Pass-  
word  
Enter the desired login password.  
New Password  
Re-enter the desired login password.  
Repeat New Password  
Admin Connections  
If checked, then Admin connections via the Wireless  
interface will not be accepted.  
Allow Admin connec-  
tions via wired  
Ethernet only  
Enable this to allow admin connections via HTTP. If  
enabled, you must provide a port number in the field  
below. Either HTTP or HTTPS must be enabled.  
Enable HTTP  
Enter the port number to be used for HTTP connections  
to this device. The default value is 80.  
HTTP Port Number  
Enable HTTPS  
Enable this to allow admin connections via HTTPS  
(secure HTTP). If enabled, you must provide a port  
number in the field below. Either HTTP or HTTPS must  
be enabled.  
Enter the port number to be used for HTTPS connec-  
tions to this device. The default value is 443.  
HTTPS Port Number  
Enable Telnet  
If desired, you can enable this option. If enabled, you will  
able to connect to this AP using a Telnet client. You will  
have to provide the same login data (user name, pass-  
word) as for a HTTP (Web) connection.  
6.3 Auto Config/Update  
The Auto Config/Update screen provides two features:  
Auto Config - The Access Point will configure itself by copying data from another  
(compatible) Access Point.  
Auto Update - The Access Point will update it Firmware by downloading the  
Firmware file from your FTP Server.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Auto Config/Update Screen  
Admin Connections  
If checked, this AP will perform Auto Configuration the  
next time it restarts.  
Perform Auto  
Configuration on this  
AP next restart  
The wired LAN (NOT the Wireless LAN) will be  
searched for compatible APs.  
If a compatible AP is found, its configuration is  
copied. If more than one compatible AP exists,  
the first one found is used.  
Some data cannot be copied:  
o
The IP address is not copied, and will  
not change.  
o
The operating mode (Repeater, Bridge,  
etc) is not copied, and will not change.  
Note: This checkbox is automatically disabled, so the  
Auto-configuration is only performed once.  
If checked, this AP will respond to "Auto Configuration"  
requests it receives. If not checked, "Auto Configuration"  
requests will be ignored.  
Respond to Auto-  
configuration request  
by other AP  
If enabled, the login name and password on this AP is  
supplied to the AP making the Auto-configuration re-  
quest. If disabled, the AP making the Auto-configuration  
request will keep its existing login name and password.  
Provide login name  
and password  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If enabled, the "Respond to Auto-configuration" setting  
on this AP is supplied to the AP making the Auto-  
configuration request. If disabled, the AP making the  
Auto-configuration request will keep its existing setting.  
Provide "Respond to  
Auto-configuration"  
setting  
Auto Update  
If enabled, this AP will check to see if a Firmware (FW)  
upgrade is available on the specified FTP Server. If  
enabled:  
Check for Firmware  
upgrade  
Enter the desired time interval (in days) between  
checks.  
Select the desired option for installation (see next  
item).  
Provide the FTP server information.  
Select the desired option:  
Install...  
Install FW if different version found  
If selected, and the firmware file at the specified lo-  
cation is different to the current installed version, the  
FW will be installed. This allows "Downgrades" -  
installing an older version of the FW to replace the  
current version.  
Install later version only  
If selected, the firmware file at the specified location  
will only be installed if it is a later version.  
Enter the address (domain name or IP address) of the  
FTP Server.  
FTP Server address  
Firmware pathname  
FTP Login Name  
FTP Password  
Enter the full path (including the FW filename) to the FW  
file on the FTP Server.  
Enter the login name required to gain access to the FTP  
Server.  
Enter the password for the login name above.  
6.4 Config File  
This screen allows you to Backup (download) the configuration file, and to restore  
(upload) a previously saved configuration file.  
You can also set the WAP-4060PE back to its factory default settings.  
To reach this screen, select Config File in the Management section of the menu.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Config File Screen  
Backup  
Once you have the WAP-4060PE working properly, you  
should back up the settings to a file on your computer. You  
can later restore the settings from this file, if necessary.  
Save a copy of  
current settings  
To create a backup file of the current settings:  
Click Back Up.  
If you don't have your browser set up to save  
downloaded files automatically, locate where you want  
to save the file, rename it if you like, and click Save.  
Restore  
To restore settings from a backup file:  
1. Click Browse.  
Restore saved  
settings from a file  
2. Locate and select the previously saved backup file.  
3. Click Restore  
Defaults  
To erase the current settings and restore the original factory  
default settings, click Set to Defaults button.  
Revert to factory  
default settings  
Note:  
This will terminate the current connection. The WAP-  
4060PE will be unavailable until it has restarted.  
By default, the WAP-4060PE will act as a DHCP client,  
and automatically obtain an IP address. You will need to  
determine its new IP address in order to re-connect.  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5 Log Settings (Syslog)  
If you have a log server on your LAN, this screen allows you to configure the WAP-  
4060PE to send log data to your log server.  
Data - Log Settings Screen  
Select the desired Option:  
Syslog Server  
Disable - Syslog server is not used.  
Broadcast - Syslog data is broadcast. Use this  
option if different PCs act as the Syslog server at dif-  
ferent times.  
Send to specified Syslog Server - Select this if the  
same PC is always used as the Syslog server. If se-  
lected, you must enter the server address in the field  
provided.  
Enter the name or IP address of your Syslog Server.  
Syslog Server Address  
Select the desired severity level. Events with a severity  
level equal to or higher (i.e. lower number) than the  
selected level will be logged.  
Minimum Severity  
Level  
6.6 Rogue APs  
A "Rouge AP" is an Access Point which should not be in use, and so can be consid-  
ered to be providing unauthorized access to your LAN.  
This WAP-4060PE can assist to locate 2 types of Rogue APs:  
APs which have Wireless security disabled.  
APs which are not in the list of valid APs which you have entered.  
When a Rogue AP is located, it is recorded in the log. If using SNMP, you can also  
choose to have detection of a Rogue AP generate an SNMP trap.  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - Rogue AP Screen  
Enable Detection  
To use this feature, enable the "Enable Rogue AP De-  
tection" checkbox, and select the desired wireless band  
and time interval.  
Enable Detection  
Select the desired Wireless band to scan to Rogue APs  
and enter the desired time interval between each scan.  
Scan  
If using SNMP, checking this option will generate a  
SNMP trap whenever a Rogue AP is detected. If not  
using SNMP, do not enable this option.  
Detection generates  
SNMP Trap  
Rogue Detection  
No Security  
If checked, any AP operating with security disabled is  
considered to be a Rogue AP.  
If checked, any AP not listed in the "Legal AP List" is  
considered to be a Rogue AP. If checked, you must  
maintain the Legal AP List.  
Not in Legal AP List  
Define Legal AP List  
Click this button to open a sub-screen where you can  
modify the "Legal AP List". This list must contain all  
known APs, so must be kept up to date.  
6.7 SNMP  
SNMP (Simple Network Management Protocol) is only useful if you have a SNMP  
program on your PC. To reach this screen, select SNMP in the Management section  
of the menu.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data - SNMP Screen  
General  
Use this to enable or disable SNMP as required  
Enable SNMP  
Community  
Enter the community string, usually either "Public" or "Private".  
Select the desired option:  
Access Rights  
Read-only - Data can be read, but not changed.  
Read/Write - Data can be read, and setting changed.  
Managers  
The IP address of the manager station is not checked.  
Any Station  
Only this station  
The IP address is checked, and must match the address you  
enter in the IP address field provided.  
If selected, you must enter the IP address of the required  
station.  
Traps  
Traps are not used.  
Disable  
Broadcast  
Select this to have Traps broadcast on your network. This  
makes them available to any PC.  
Select this to have Trap messages sent to the specified PC  
only. If selected, you must enter the IP Address of the desired  
PC.  
Send to  
Select the desired option, as supported by your SNMP Man-  
agement program.  
Trap version  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.8 Upgrade Firmware  
The firmware (software) in the Wireless Access Point can be upgraded using your Web  
Browser.  
You must first download the upgrade file, and then select Upgrade Firmware in the Manage-  
ment section of the menu. You will see a screen like the following.  
To perform the Firmware Upgrade:  
1. Click the Browse button and navigate to the location of the upgrade file.  
2. Select the upgrade file. Its name will appear in the Upgrade File field.  
3. Click the Upgrade button to commence the firmware upgrade.  
Note: The WAP-4060PE is unavailable during the upgrade process, and must restart  
when the upgrade is completed. Any connections to or through the WAP-4060PE will  
be lost.  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A  
Specifications  
A
Model  
WAP-4060PE  
Standard  
IEEE 802.11b, 802.11g  
Signal Type  
DSSS (Direct Sequence Spread Spectrum)  
OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK,  
CCK  
Modulation  
Port  
10/100Mbps RJ-45 port * 1, 802.3af compliant  
Reverse SMA male * 1  
Antenna Connector  
Output Power  
18dBm  
11 Mbps (CCK): -85dBm  
5.5 Mbps (QPSK): - 89dBm  
802.11b  
1, 2 Mbps (BPSK): - 90dBm  
(typically @PER < 8% packet size 1024 and  
@25ºC + 5ºC)  
54 Mbps: -72dBm  
48 Mbps: - 72dBm  
36 Mbps: -76dBm  
24 Mbps: -79dBm  
Sensitivity  
18 Mbps: -82dBm  
802.11g  
12 Mbps: -86dBm  
9 Mbps: -89dBm  
6 Mbps: -90dBm  
(typically @PER < 8% packet size 1024 and  
@25ºC + 5ºC)  
Operating Mode  
Security  
AP, AP Client, Wireless Bridge, Multiple Bridge, Repeater  
Open, shared, WPA, and WPA-PSK authentication  
802.1x support  
EAP-TLS, EAP-TTLS, PEAP  
Block inter-wireless station communication  
Block SSID broadcast  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web based configuration  
RADIUS Accounting  
RADIUS-On feature  
RADIUS Accounting update  
CLI  
Management  
Message Log  
Access Control list file support  
Configuration file Backup/Restore  
Statistics support  
Device discovery program  
Windows Utility  
Super G mode Up to 108Mbps  
802.11g  
802.11b  
Up to 54Mbps (6/9/12/18/24/36/48/54)  
Up to 11Mbps (1/2/5.5/11)  
Data Rate  
Dimensions (L x W x  
H)  
150 x 102 x 30mm  
210g  
Weight  
Operating temperature: 0 40 degree C  
Storage temperature: -20 70 degree C  
Relative humanity: 0% 90% (non-condensing)  
Environmental Specifi-  
cation  
Power Requirement  
24V DC, 0.5A  
FCC, CE  
Electromagnetic  
Compatibility  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B  
Troubleshooting  
B
Problem 1: Can't connect to the WAP-4060PE to configure it.  
Check the following:  
Solution 1:  
The WAP-4060PE is properly installed, LAN connections are OK,  
and it is powered ON. Check the LEDs for port status.  
Ensure that your PC and the WAP-4060PE are on the same  
network segment. (If you don't have a router, this must be the  
case.)  
If your PC is set to "Obtain an IP Address automatically" (DHCP  
client), restart it.  
You can use the following method to determine the IP address of  
the WAP-4060PE, and then try to connect using the IP address,  
instead of the name.  
To Find the Access Point's IP Address  
1. Open a MS-DOS Prompt or Command Prompt Window.  
2. Use the Ping command to pingthe WAP-4060PE. Enter ping  
followed by the Default Name of the WAP-4060PE.  
e.g.  
ping PL003318  
3. Check the output of the ping command to determine the IP ad-  
dress of the WAP-4060PE.  
If your PC uses a Fixed (Static) IP address, ensure that it is using an  
IP Address which is compatible with the WAP-4060PE. (If no DHCP  
Server is found, the WAP-4060PE will default to an IP Address and  
Mask of 192.168.0.228 and 255.255.255.0.) On Windows PCs, you  
can use Control Panel-Network to check the Properties for the  
TCP/IP protocol.  
Problem 2: My PC can't connect to the LAN via the WAP-4060PE.  
Check the following:  
Solution 2  
The SSID and WEP settings on the PC match the settings on the  
WAP-4060PE.  
On the PC, the wireless mode is set to "Infrastructure"  
If using the Access Control feature, the PC's name and address  
is in the Trusted Stations list.  
If using 802.1x mode, ensure the PC's 802.1x software is config-  
ured correctly.  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C  
Command Line Interface  
C
If desired, the Command Line Interface (CLI) can be used for configuration. This  
creates the possibility of creating scripts to perform common configuration changes.  
The CLI requires either a Telnet connection or a physical connection from your PC to  
the serial port (RS232 port) on the WAP-4060PE.  
C.1 Using the CLI - Telnet  
1. Start your Telnet client, and establish a connection to the WAP-4060PE.  
e.g.  
Telnet 192.168.0.228  
2. You will be prompted for the user name and password. Enter the same login name  
and password as used for the HTTP (Web) interface.  
The default values are admin for the User Name, and password for the Password.  
3. Once connected, you can use any of the commands listed in the following Com-  
mand Reference.  
C.2 Using the CLI - Serial Port  
1. Use a standard serial port cable to connect your PC to the serial (RS232) port on  
the WAP-4060PE.  
2. Start your communications program. For example, in Windows, use Hyper-  
Terminal. (This program may not be installed. If so, you can install it using Start -  
Settings - Control Panel - Add or Remove Programs. Then select Windows Setup  
or Add/Remove Windows Components, depending on your version of Windows.)  
3. Configure the connection properties:  
Name - use a suitable name, such as AP”  
Portor Connect Using- Select the Serial Port that the cable is con-  
nected to. (Do not select your modem.)  
Port Settings - Use 9600, N, 8, 1, with hardware flow control, as shown below.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Use the Connectcommand to start the connection.  
5. You will be prompted for a user name and password.  
Enter the current user name and password for the AP you are connecting to.  
The default values are admin for the User Name, and password for the Password.  
6. You will then see the prompt, and can use any of the commands listed in the  
following Command Reference.  
C.3 Command Reference  
The following commands are available.  
?
Display CLI Command List  
Temporary factory admin  
config wlanX  
admin  
config wlan  
config profile  
del acl  
config profile  
Delete Access Control List  
Delete Encryption key  
Find BSS  
del key  
find bss  
find channel  
find all  
Find Available Channel  
Find All BSS  
format  
Format flash filesytem  
Update boot rom image  
Software update via FTP  
bootrom  
ftp  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get 11gonly  
Display 11g Only Allowed  
Display 11g Optimization Level  
Display Overlapping BSS Protection  
Display Access Control List  
Display Aging Interval  
get 11goptimize  
get 11goverlapbss  
get acl  
get aging  
get antenna  
Display Antenna Diversity  
Display Association Table  
Display Authentication Type  
Display Auto Channel Select  
get association  
get authentication  
get autochannelse-  
lect  
get basic11b  
Display Basic 11b Rates  
get basic11g  
Display Basic 11g Rates  
get beaconinterval  
Display Beacon Interval  
get burstSeqThresh-  
old  
Display Max Number of frames in a Burst  
get burstTime  
get calibration  
get cckTrigHigh  
Display Burst Time  
Display Noise And Offset Calibration Mode  
Display Higher Trigger Threshold for CCK Phy Errors for  
ANI Control  
get cckTrigLow  
Display Lower Trigger Threshold for CCK Phy Errors for  
ANI Control  
get cckWeakSigThr  
Display ANI Parameter for CCK Weak Signal Detection  
Threshold  
get channel  
get cipher  
Display Radio Channel  
Display Encryption cipher  
Display Compression scheme  
Display Compression Window Size  
Display Current AP Configuration  
Display Country Code  
get compproc  
get compwinsize  
get config  
get countrycode  
get ctsmode  
get ctsrate  
Display CTS mode  
Display CTS rate  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get ctstype  
Display CTS type  
get domainsuffix  
get dtim  
Display Domain Name Server suffix  
Display Data Beacon Rate (DTIM)  
Display Adaptive Noise Immunity Control On/Off  
Display Encryption Mode  
get enableANI  
get encryption  
get extendedchan-  
mode  
Display Extended Channel Mode  
get firStepLvl  
Display ANI Parameter for FirStepLevel  
Display Fragment Threshold  
get fragmentthresh-  
old  
get frequency  
get gateway  
get gbeaconrate  
get gdraft5  
Display Radio Frequency (MHz)  
Display Gateway IP Address  
Display 11g Beacon Rate  
Display 11g Draft 5.0 compatibility  
Display Group Key Update Interval (in Seconds)  
Display Hardware Revisions  
Display Host IP Address  
get groupkeyupdate  
get hardware  
get hostipaddr  
get ipaddr  
Display IP Address  
get ipmask  
Display IP Subnet Mask  
get keyentrymethod  
get keysource  
get login  
Display Encryption Key Entry Method  
Display Source Of Encryption Keys  
Display Login User Name  
get minimumrate  
get nameaddr  
get nf  
Display Minimum Rate  
Display IP address of name server  
Display Noise Floor  
get noiseImmunityLvl Display ANI Parameter for Noise Immunity Level  
get ofdmTrigHigh  
Display Higher Trigger Threshold for OFDM Phy Errors for  
ANI Control  
get ofdmTrigLow  
Display Lower Trigger Threshold for OFDM Phy Errors for  
ANI Control  
get ofdmWeakSigDet Display ANI Parameter for OFDM Weak Signal Detection  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get overRidetxpower  
get operationMode  
get power  
Display Tx power override  
Display Operation Mode  
Display Transmit Power Setting  
get quietAckCtsAllow Display if Ack/Cts frames are allowed during quiet period  
get quietDuration  
get quietOffset  
get radiusname  
get radiusport  
get rate  
Display Duration of quiet period  
Display Offset of quiet period into the beacon period  
Display RADIUS server name or IP address  
Display RADIUS port number  
Display Data Rate  
get remoteAp  
get hwtxretries  
get swtxretries  
get rtsthreshold  
get shortpreamble  
get shortslottime  
get sntpserver  
get softwareretry  
get spurImmunityLvl  
get ssid  
Display Remote Ap's Mac Address  
Display HW Transmit Retry Limit  
Display SW Transmit Retry Limit  
Display RTS/CTS Threshold  
Display Short Preamble Usage  
Display Short Slot Time Usage  
Display SNTP/NTP Server IP Address  
Display Software Retry  
Display ANI Parameter for Spur Immunity Level  
Display Service Set ID  
get ssidsuppress  
get station  
Display SSID Suppress Mode  
Display Station Status  
get SuperG  
Display SuperG Feature Status  
Display Access Point System Name  
Display Telnet Mode  
get systemname  
get telnet  
get timeout  
Display Telnet Timeout  
get tzone  
Display Time Zone Setting  
get updateparam  
get uptime  
Display Vendor Default Firmware Update Params  
Display UpTime  
get watchdog  
Display Watchdog Mode  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get wds  
Display WDS Mode  
get wep  
Display Encryption Mode  
get wirelessmode  
get 80211d  
Display Wireless LAN Mode  
Display 802.11d mode  
get http  
Display http Enable/Disable  
get HttpPort  
get https  
Display http port number  
Display https Enable/Disable  
Display https port number  
get HttpsPort  
get syslog  
Display syslog Disable/Broadcast/Unicast  
Display syslog Severity level  
Display unicast syslog server IP/name  
Display Management only via LAN Enable/Disable  
Display Rogue AP Detection Enable/Disable  
get syslogSeverity  
get syslogServer  
get manageOnlyLan  
get roguedetect  
get rogueinteval  
Display Minutes of every Rogue AP Detection(Range: 3 ~  
99)  
get rogueband  
get roguetype  
Display Rogue AP Detection band(s)  
Display Rogue AP definition  
get roguesnmp  
get roguelegal  
get autoConfig  
get autoResponse  
Display Rogue AP Detection SNMP Trap Enable/Disable  
Display Legal AP List of Rogue AP  
Display Auto Config Enable/Disable  
Display Respond to Auto Config request Enable/Disable  
get autoChan-  
geName  
Display Provide admin login name and password  
Enable/Disable  
get autoSetResp  
Display Provide respond to Auto Config request  
Enable/Disable  
get autoUpdate  
Display Auto Update Enable/Disable  
get autoUpgradeOnly Display Install later version only Enable/Disable  
get autoUpdateInter-  
val  
Display Auto Update Interval(1~31days)  
get ftpServer  
Display FTP Server address  
Display Firmware Pathname  
get fwPathname  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get ftpLogin  
Display FTP Login Name  
Display FTP Password  
get ftpPassword  
get activeCurrentPro- Display active Current Profile  
file  
get profileName  
get profileVlanId  
Display Profile Name  
Display Profile VLAN ID  
get APPrimaryProfile Display AP Primary Profile  
get WDSPrimaryPro- Display WDS Primary Profile  
file  
get securityMode  
get Accounting  
get Accountingport  
get keyValue  
Display Security Mode  
Display Accounting Enable/Disable  
Display Accounting port number  
Display Encryption Key Value  
get keyLength  
get keyIndex  
Display Encryption Key Length  
Display Encryption Key Index  
get UAM  
Display UAM Authentication Enable/Disable  
Display UAM Authentication Method  
Display UAM Authentication Login URL  
Display UAM Authentication Login Fail URL  
get UAMMethod  
get UAMLoginURL  
get UAMLogin-  
FailURL  
get macAuth  
Display Mac Authentication Enable/Disable  
Display SNMP Mode  
get snmpMode  
get snmpCommunity Display SNMP Community Name  
get snmpAccess-  
Right  
Display SNMP Access Right  
Display SNMP Any Station Mode  
Display SNMP Station Addr  
get snmpAnySta-  
Mode  
get snmpStationI-  
PAddr  
get trapMode  
Display Trap Mode  
get trapVersion  
get trapSendMode  
Display Trap Version  
Display Trap Send Mode  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
get trapRecvIp  
get wdsMacList  
Display Trap Receiver IP  
Display WDS Mac Address List  
Display Wireless Client Enable/Disable  
get enableWireless-  
Client  
get isolationType  
get winsEnable  
Display Isolation Type  
Display WINS Server Enable/Disable  
Display IP address of WINS server  
get winsserveraddr  
get wirelessSeparate Display wireless seprate Mode  
get description  
get dhcpmode  
get wlanstate  
help  
Display Access Point Description  
Display dhcp mode  
Display wlan state  
Display CLI Command List  
Disable reboot during radar detection  
list directory  
Lebradeb  
ls  
mem  
system memory statistics  
Network Performance  
Network Performance Server  
Ping  
np  
ns  
ping  
radar!  
Simulate radar detection on current channel  
Reboot Access Point  
reboot  
rm  
Remove file  
run  
Run command file  
Logoff  
quit  
set 11gonly  
set 11goptimize  
set 11goverlapbss  
set acl  
Set 11g Only Allowed  
Set 11g Optimization Level  
Set Overlapping BSS Protection  
Set Access Control List  
Set Aging Interval  
set aging  
set antenna  
Set Antenna  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set authentication  
Set Authentication Type  
set autochannelse-  
lect  
Set Auto Channel Selection  
set basic11b  
Set Use of Basic 11b Rates  
Set Use of Basic 11g Rates  
Modify Beacon Interval  
set basic11g  
set beaconinterval  
set burstSeqThresh-  
old  
Set Max Number of frames in a Burst  
set burstTime  
set calibration  
set cckTrigHigh  
Set Burst Time  
Set Calibration Period  
Set Higher Trigger Threshold for CCK Phy Errors For ANI  
Control  
set cckTrigLow  
Set Lower Trigger Threshold for CCK Phy Errors For ANI  
Control  
set cckWeakSigThr  
Set ANI Parameter for CCK Weak Signal Detection  
Threshold  
set channel  
Set Radio Channel  
set cipher  
Set Cipher  
set compproc  
set compwinsize  
set countrycode  
set ctsmode  
set ctsrate  
Set Compression Scheme  
Set Compression Window Size  
Set Country Code  
Set CTS Mode  
Set CTS Rate  
set ctstype  
Set CTS Type  
set domainsuffix  
set dtim  
Set Domain Name Server Suffix  
Set Data Beacon Rate (DTIM)  
Turn Adaptive Noise Immunity Control On/Off  
Set Encryption Mode  
set enableANI  
set encryption  
set extendedchan-  
mode  
Set Extended Channel Mode  
set factorydefault  
set firStepLvl  
Restore to Default Factory Settings  
Set ANI Parameter for FirStepLevel  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set fragmentthresh-  
old  
Set Fragment Threshold  
set frequency  
set gateway  
Set Radio Frequency (MHz)  
Set Gateway IP Address  
Set 11g Beacon Rate  
set gbeaconrate  
set groupkeyupdate  
set gdraft5  
Set Group Key Update Interval (in Seconds)  
Set 11g Draft 5.0 compatibility  
Set Host IP address  
set hostipaddr  
set ipaddr  
Set IP Address  
set ipmask  
Set IP Subnet Mask  
set keyentrymethod  
set keysource  
set login  
Select Encryption Key Entry Method  
Select Source Of Encryption Keys  
Modify Login User Name  
Set Minimum Rate  
set minimumrate  
set nameaddress  
Set Name Server IP address  
set noiseImmunityLvl Set ANI Parameter for Noise Immunity Level  
set ofdmTrigHigh  
Set Higher Trigger Threshold for OFDM Phy Errors for ANI  
Control  
set ofdmTrigLow  
Set Lower Trigger Threshold for OFDM Phy Errors for ANI  
Control  
set ofdmWeakSigDet Set ANI Parameter for OFDM Weak Signal Detection  
set overRidetxpower  
set operationMode  
set password  
Set Tx power override  
Set operation Mode  
Modify Password  
set passphrase  
set power  
Modify Passphrase  
Set Transmit Power  
set quietAckCtsAllow Allow Ack/Cts frames during quiet period  
set quietDuration  
set quietOffset  
set radiusname  
Duration of quiet period  
Offset of quiet period into the beacon period  
Set RADIUS name or IP address  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set radiusport  
set radiussecret  
set rate  
Set RADIUS port number  
Set RADIUS shared secret  
Set Data Rate  
set rate  
Set Data Rate  
set rate  
Set Data Rate  
set rate  
Set Data Rate  
set rate  
Set Data Rate  
set regulatorydomain Set Regulatory Domain  
set remoteAP  
set hwtxretries  
set swtxretries  
set rtsthreshold  
set shortpreamble  
set shortslottime  
set sntpserver  
set softwareretry  
set spurImmunityLvl  
set ssid  
Set Remote AP's Mac Address  
Set HW Transmit Retry Limit  
Set SW Transmit Retry Limit  
Set RTS/CTS Threshold  
Set Short Preamble  
Set Short Slot Time  
Set SNTP/NTP Server IP Address  
Set Software Retry  
Set ANI Parameter for Spur Immunity Level  
Set Service Set ID  
set ssidsuppress  
set SuperG  
Set SSID Suppress Mode  
Super G Features  
set systemname  
set telnet  
Set Access Point System Name  
Set Telnet Mode  
set timeout  
Set Telnet Timeout  
set tzone  
Set Time Zone Setting  
set updateparam  
set watchdog  
set wds  
Set Vendor Default Firmware Update Parameters  
Set Watchdog Mode  
Set WDS Mode  
set wep  
Set Encryption Mode  
set wlanstate  
Set wlan state  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set wirelessmode  
set 80211d  
Set Wireless LAN Mode  
Set 802.11d mode  
set http  
Set http Enable/Disable  
set HttpPort  
Set http port number  
set https  
Set https Enable/Disable  
set HttpsPort  
set syslog  
Set https port number  
Set syslog Disable/Broadcast/Unicast  
Set syslog Severity level  
set syslogSeverity  
set syslogServer  
set manageOnlyLan  
set roguedetect  
set rogueinteval  
set rogueband  
set roguetype  
set roguesnmp  
set roguelegal  
Set unicast syslog server IP/name  
Set Management only via LAN Enable/Disable  
Set Rogue AP Detection Enable/Disable  
Set Minutes of every Rogue AP Detection(Range: 3 ~ 99)  
Set Rogue AP Detection band(s)  
Set Rogue AP definition  
Set Rogue AP Detection SNMP Trap Enable/Disable  
Add/Delete one AP MAC/OUI into/from Rogue AP Legal  
List  
set autoConfig  
Set Auto Config Enable/Disable  
set autoResponse  
Set Respond to Auto Config request Enable/Disable  
set autoChan-  
geName  
Set provide admin login name and password  
Enable/Disable  
set autoSetResp  
set autoUpdate  
Set Provide respond to Auto Config request Enable/Disable  
Set Auto Update Enable/Disable  
set autoUpgradeOnly Set Install later version only Enable/Disable  
set autoUpdateInter-  
val  
Set Auto Update Interval(1~31days)  
set ftpServer  
Set FTP Server address  
Set Firmware Pathname  
Set FTP Login Name  
Set FTP Password  
set fwPathname  
set ftpLogin  
set ftpPassword  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set activeCurrentPro- Set active Current Profile  
file  
set profileName  
set profileVlanId  
Set Profile Name  
Set Profile Vlan Id  
set APPrimaryProfile Set AP's Primary Profile  
set WDSPrimaryPro- Set WDS's Primary Profile  
file  
set securityMode  
set Accounting  
set Accountingport  
set keyValue  
Set Security Mode  
Set Accounting Enable/Disable  
Set Accounting port number  
Set Encryption Key Value  
set keyLength  
set keyIndex  
Set Encryption Key Length  
Set Encryption Key Index  
set UAM  
Set UAM Authentication Enable/Disable  
Set UAM Authentication Method  
Set UAM Authentication Login URL  
Set UAM Authentication Login Fail URL  
set UAMMethod  
set UAMLoginURL  
set UAMLogin-  
FailURL  
set macAuth  
Set Mac Authentication Enable/Disable  
Set SNMP Mode  
set snmpMode  
set snmpCommunity Set SNMP Community Name  
set snmpAccess-  
Right  
Set SNMP Access Right  
set snmpAnySta-  
Mode  
Set SNMP Any Station Mode  
Set SNMP Station Address  
set snmpStationI-  
PAddr  
set trapMode  
Set Trap Mode  
set trapVersion  
set trapSendMode  
set trapRecvIp  
set description  
Set Trap Version  
Set Trap Send Mode  
Set Trap Receiver IP  
Set Access Point Description  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
set dhcpMode  
set wdsMacList  
Set Dhcp Mode  
Set WDS Mac Address List  
Set Wireless Client Enable/Disable  
set enableWireless-  
Client  
set isolationType  
set winsEnable  
Set Isolation Type  
Set WINS Server Enable/Disable  
Set WINS Server IP address  
set winsServerAddr  
set wirelessSeparate Set wireless separate Mode  
set sdSet  
set sdAdd  
set sdDel  
start wlan  
stop wlan  
timeofday  
version  
Set debug level  
Add debug level  
Del debug level  
Start the current wlan  
Stop the current wlan  
Display Current Time of Day  
Software version  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Peavey Guitar 410TXF User Manual
Peavey Music Mixer PZS 140 User Manual
Pelonis Electric Heater HC 0113 User Manual
Philips Car Stereo System MCD2160 User Manual
Philips Headphones SHC8545 00 User Manual
Philips Universal Remote RC4370 User Manual
Philips Universal Remote SRU3003 27 User Manual
Pioneer TV DVD Combo V5000 User Manual
Planet Technology Switch FNSW 4800v2 User Manual
Psion Teklogix Laptop 7530 G2 User Manual