DLB70XX WLAN Dual Outdoor Radio User Manual Version 1.0.0 (11.08.
Table of Contents Preface ..................................................................................................................................................................................... 4 FCC Information.................................................................................................................................................................... 4 Electronic Emission Notices.............................................................................................
Advanced Settings .............................................................................................................................................................. 31 Authentication Type...............................................................................................................................................................................31 Fragment Threshold.....................................................................................................................
Auto Discovery Tool ............................................................................................................................................................. 66 Discover ................................................................................................................................................................................................66 Setup IP ......................................................................................................................
Preface FCC Information Electronic Emission Notices This device complies with CFR 47 Part 15 of the FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operation. FCC Frequency Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to CFR47 Part 15.
be familiar with the concepts and terminology of wireless local area networks. NOTE: Only those antennas that are of the same type and with lesser gain than those that are certified with this device may be used legally by the installer.
Quick Start Guides Simple Access Point (Dual AP) The DLB70XX series have two wireless radios: one 802.11A and one 802.11B/G. Sometimes it is desirable to provide customers with all three wireless standards, so this example shows how to create a bridged Access Point using both the 802.11A radio and the 802.11B/G radio. The Operation Mode needs to be set to Bridge. This bridges both wireless interfaces and the ethernet interface.
Follow the same steps for wlan2. In the Wireless > wlan2 > Basic Settings section: uncheck “Disable Wireless LAN Interface” checkbox. Set the Mode to “AP”. Assign the SSID. For this example we used DLB_AP_A since this is the 802.11A interface. For ease of management, it might be beneficial to change the LAN IP address to reside on the same subnet as the other PCs in your bridged network.
5G Backhaul (WDS) / 2.4G AP (Bridged) 5G Backhaul (WDS) / 2.4G AP (Routed) 5G AP Client / 2.4G AP Dual Backhaul with STP Access Point Client Mode This device can be configured as a wireless Ethernet adapter. In this mode, the device can connect to the other wireless stations (Ad-Hoc network type) or Access Point (Infrastructure network type) and you don’t need to install any driver. In “Basic Settings” page, change the Mode to “Client” mode.
The alternative way to configure is as follows: In the “Wireless Site Survey” page, select one of the SSIDs you want to connect and then press “Connect” button to establish the link. 2 1 3 If the link is established successfully it will show the message “Connect successfully”. Then press “OK”. Then you can check the linking information in “Status” page.
encryption before step1 and all the settings must be as same as the Access Point or Station. For more information about the detail authentication and data encryption settings, please refer the security section. Authentication Type In client mode, the device also supports two Authentication Types “Open system” and “Shared Key”. Although the default setting is “Auto”, not every Access Points can support “Auto” mode.
Wireless Setup Initial Configuration There are two ways to configure the device, one is through web-browser, and the other is through Secure Shell CLI interface. To access the configuration interfaces, make sure you are using a computer connected to the same network as the device. The default IP address of the device is 192.168.2.254, and the subnet-mask is 255.255.255.0. The device has three operation modes (Router/Bridge/WISP).
Router In this operation mode, the wired Ethernet (WAN) port is used to connect with an ADSL/Cable modem and the wireless NIC is used for your private WLAN. The NAT is enabled between the 2 NICs, and all the wireless clients share the same public IP address through the WAN port to the ISP. The default IP configuration for the WAN port is static IP. You can access the web server of device through the default WAN IP address 172.1.1.1 and modify the setting base on your ISP requirement.
AP Client This mode provides the capability to connect with another AP using infrastructure/Ad-hoc networking types. With bridge operation mode, you can directly connect the wired Ethernet port to your PC and the device becomes a wireless adapter. And with WISP operation mode, you can connect the wired Ethernet port to a hub/switch and all the PCs connecting with the hub/switch can share the same public IP address from your ISP.
WLAN 1 Wireless Configuration Basic Settings Disable Wireless LAN Interface Disable the wireless interface of device Band The device supports 2.4GHz(B), 2.4GHz(G) and 2.4GHz(B+G) mixed modes. Mode The radio of the device supports different modes as follows: AP The radio of the device acts as an Access Point to serves all wireless clients to join a wireless local network. Client Support Infrastructure and Ad-hoc network types to act as a wireless adapter.
Network Type Infrastructure This type requires the presence of 802.11b/g Access Point. All communication is done via the Access Point. Ad Hoc This type provides a peer-to-peer communication between wireless stations. All the communication is done from Client to Client without any Access Point involved. Ad Hoc networking must use the same SSID and channel for establishing the wireless connection. In client mode, the device can not support the Router mode functions including Firewall and WAN settings.
2 3 4 5 6 7 8 9 10 11 12 13 14 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 2484 Americas, EMEA, Japan, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, Israel, and China Americas, EMEA, Japan, and China Americas, EMEA, Japan, and China EMEA and Japan only EMEA and
Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LANs. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation. NOTE: Any unreasonable value change from the default settings will reduce the throughput of the device. Authentication Type The device supports two Authentication Types “Open system” and “Shared Key”.
ACK Timing This is the amount of time that a station will wait for the ACK response after sending a wireless frame to a remote station. This is roughly transmission time (round-trip) + processing time on the remote station and can vary depending on environment. Generally a trial and error approach is best for finding optimum timing and should only be changed on longer wireless links.
Tx Burst Mode Not applicable for WLAN 1. Transmit Power The device supports four transmission output power levels 250, 200, 150 and 100mW for CCK (802.11b) mode and two transmission output power levels 100 and 50mW for OFDM (802.11g) mode. You can adjust the power level to change the coverage of the device. Every wireless station located within the coverage of the device also needs to have the high power radio.
Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need. Encryption Wired Equivalent Privacy (WEP) is implemented in this device to prevent unauthorized access to your wireless network.
• 128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. The Default Tx Key field determines which of the four keys you want to use in your WLAN environment. WEP Encryption with 802.1x Setting The device supports an external RADIUS Server that can secure networks against unauthorized access. If you use the WEP encryption, you can also use the RADIUS server to check the admission of the users.
WPA Authentication Mode The WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and that access to their network is restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode. This device supports two WPA modes: Enterprise (RADIUS) In this mode authentication is achieved via a WPA RADIUS Server. You need a RADIUS or other authentication server on the network.
• If your network topology has a loop, you need to enable the 802.1d Spanning Tree function. • You don’t need to add all MAC address of devices existing in your network to the WDS AP List. The WDS AP List only needs to specify the MAC address of devices you need to directly connect to. • The bandwidth of the device is limited. Bandwidth will be shared between bridging devices. WDS Network Topology In this section, we will demonstrate the WDS network topologies and WDS AP List configuration.
WDS2 WDS3 WDS4 WDS5 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 No No No No Ring topology 24 Device Entries of WDS AP List WDS1 WDS2 WDS3 WDS4 WDS5 The MAC Addresses of WDS2 and WDS5 The MAC Addresses of WDS1 and WDS3 The MAC Addresses of WDS2 and WDS4 The MAC Addresses of WDS3 and WDS5 The MAC Addresses of WDS4 and WDS1 Spanning Tree Protocol Required Yes Yes Yes Yes Yes
Mesh topology Device Entries of WDS AP List WDS1 WDS2 WDS3 WDS4 WDS5 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS4 Spanning Tree Protocol Required Yes Yes Yes Yes Yes Wireless Repeater A Wireless Repeater can be used to increase the coverage area of another device (Parent AP).
Description Entries of WDS AP List Access Point Repeater The MAC Address of Repeater The MAC Address of Access Point Spanning Tree Protocol Required Yes Yes Wireless Bridge As a Wireless Bridge the device can establish a wireless connection between two or more Wired LANs. When you decide to use the WDS as a Wireless Bridge, please refer the following instructions for configuration. In AP mode, enable the WDS function.
27
WLAN 2 Wireless Configuration Basic Settings Disable Wireless LAN Interface Disable the wireless interface of device Band The device supports 2.4GHz(B), 2.4GHz(G) and 2.4GHz(B+G) mixed modes. Mode The radio of the device supports different modes as follows: AP The radio of the device acts as an Access Point to serves all wireless clients to join a wireless local network. Client Support Infrastructure and Ad-hoc network types to act as a wireless adapter.
Network Type Infrastructure This type requires the presence of 802.11b/g Access Point. All communication is done via the Access Point. Ad Hoc This type provides a peer-to-peer communication between wireless stations. All the communication is done from Client to Client without any Access Point involved. Ad Hoc networking must use the same SSID and channel for establishing the wireless connection. In client mode, the device can not support the Router mode functions including Firewall and WAN settings.
34 5170 36 5180 38 5190 40 5200 42 5210 44 5220 46 5230 48 5240 52 5260 56 5280 60 5300 64 5320 149 5745 153 5765 157 5785 161 5805 When set to “Auto”, the device will find the least-congested channel for use.
Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LANs. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation. NOTE: Any unreasonable value change from the default settings will reduce the throughput of the device. Authentication Type The device supports two Authentication Types “Open system” and “Shared Key”.
bytes. Beacon Interval The beacon interval is the amount of time between access point beacons in milliseconds. The default beacon interval is 100. ACK Timing This is the amount of time that a station will wait for the ACK response after sending a wireless frame to a remote station. This is roughly transmission time (round-trip) + processing time on the remote station and can vary depending on environment.
Turbo Mode Not applicable for WLAN 2. Aggregation Mode This is a proprietary Ralink (802.11a chipset in the DLB70xx) aggregation setting that allows for jumbo frames consisting of multiple smaller frames that increases throughput between Ralink stations. Tx Burst Mode This is a proprietary Ralink (802.11a chipset in the DLB70xx) burst setting and allows very small networks (1~3 clients) to transmit at higher speeds. In larger networks, this will result in degraded performance.
Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need. Encryption Wired Equivalent Privacy (WEP) is implemented in this device to prevent unauthorized access to your wireless network.
• 64-bit WEP Encryption: 64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars. • 128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. The Default Tx Key field determines which of the four keys you want to use in your WLAN environment. WEP Encryption with 802.
WPA Authentication Mode The WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and that access to their network is restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode. This device supports two WPA modes: Enterprise (RADIUS) In this mode authentication is achieved via a WPA RADIUS Server. You need a RADIUS or other authentication server on the network.
Access Control WDS Settings Wireless Distribution System (WDS) uses wireless media to communicate with the other devices, like the Ethernet does. This function allows one or more remote LANs to connect with the local LAN. To do this, you must set these devices in the same channel and set the MAC address of other devices you want to communicate with in the WDS AP List and then enable the WDS.
Connecting Profile If you enable the connecting profile in client mode, the system will check the preferred SSID and BSSID in a fixed period. If preferred APs are found, the radio will try to connect to them one by one regardless of the signal quality and strength. Please note that checking the preferred APs will have a significant impact on throughput. All the profiles share the same security settings.
39
TCP/IP Configuration Configuring LAN Interface Configuring DHCP Server To use the DHCP server inside the device, please make sure there is no other DHCP server that exists in the same network as the device. Enable the DHCP Server option and assign the client range of IP addresses as shown in the following page. When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will be set to the IP address of device.
Static IP You can get the IP configuration data of the Static-IP from your ISP. You will need to fill in IP address, subnet mask, gateway address, and one of the DNS addresses. 41 IP Address The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier outside of your local network.
42 Default Gateway The IP address of Default Gateway provided by your ISP or MIS. The Default Gateway is the intermediate network device that has knowledge of the network IDs of the other networks in the Wide Area Network, so it can forward the packets to other gateways until they are delivered to the one connected to the specified destination. DNS 1~3 The IP addresses of DNS provided by your ISP. DNS (Domain Name Server) is used to map domain names to IP addresses.
DHCP Client (Dynamic IP) All IP configuration data besides DNS will be obtained from the DHCP server when DHCP-Client WAN Access Type is selected. DNS 1~3 The IP addresses of DNS provided by your ISP. DNS (Domain Name Server) is used to map domain names to IP addresses. The DNS maintains central lists of domain name/IP addresses and maps the domain names in your Internet requests to other servers on the Internet until the specified web site is found.
User Name The account provided by your ISP Password The password for your account. Connect Type “Continuous “: connect to ISP permanently “Manual”: Manually connect/disconnect to ISP “On-Demand”: Automatically connect to ISP when the user needs to access the Internet. Idle Time The number of minutes of inactivity before disconnecting from ISP. This setting is only available when “Connect on Demand” connection type is selected.
IP Address The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier outside of your local network. Subnet Mask The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
Clone MAC address for Static IP WAN access type: Clone MAC address for PPPoE WAN access type: 46
Clone MAC address for PPTP WAN access type: Physical LAN interface MAC address clone: 47
VPN Pass-through This functionality lets the device Pass-through the VPN packets including PPTP/ L2TP/IPsec VPN Connection. Check the VPN Pass-through in WAN Interface of TCP/IP Page that you want and then click Apply Changes button. Static Route Setup You can set the routing information to let the Router know what routing is correct if it cannot learn automatically through other means.
Router (R1) in Default Gateway field then click Apply Change button. Enter IP Address of Network 4, Subnet Mask and IP Address of Router (R2) in Default Gateway field then click Apply Change button. In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1/2 to transmit and receive the route information with other Routers.
In the Dynamic Routing Table there are two routings for Network 3 and Network 4 50
Firewall Configuration Configuring LAN to WAN Firewall The device supports three kinds of filter Port Filtering, IP Filtering and MAC Filtering. All the entries in current filter table are used to restrict certain types of packets from your local network through the device. Use of such filters can be helpful in securing or restricting your local network. Port Filtering When you enable the Port Filtering function, you can specify a single port or port ranges in the current filter table.
WAN. Configuring Port Forwarding (Virtual Server) This function allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind the device's NAT firewall. The most often used port numbers are shown in the following table.
Configuring DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (email) servers and DNS servers. All inbound packets will be redirected to the computer you set. It also is useful if you run some applications (e.g. Internet games) that use uncertain incoming ports. 53 Enable DMZ Enables the DMZ.
Configuring VPN 54
Management Configuration Quality of Service (QoS) QoS allows you to specify some rules, to ensure the quality of service in your network, such as Bandwidth Priority to allocate bandwidth. This function can be helpful in shaping and queuing traffic from LAN (WLAN) to WAN or LAN to WLAN, but not WLAN to WLAN. Enable the QoS and then fill in the Bandwidth Ratio (H/M/L). The device has three Bandwidth Priorities High, Medium and Low.
QoS Enabled Bandwidth Borrowed Max Throughput Bandwidth Ratio (H/M/L) Apply Changes Select this check box to enable quality of service. Select this check box to allow a rule to borrow unused bandwidth. Bandwidth borrowing is decided by priority of the rules. Higher priority will get the remaining bandwidth first. Enter the value of max throughput in kbps that you want to allocate for one rule. The value should between 1200 kbps and 24000 kbps. You can specify the ratio of priority in these fields.
the rules. This table can handle 50 rules at most. An example for usage For example, there are three users in your network. User A wants to browse the websites to retrieve information. User B wants to use FTP connection to download a large file. User C wants to use software phone to connect with customer. Since VoIP traffic is sensitive to variations in delay (jitter), you can set High priority for User C. However, because the FTP transmission may take a long time, you can set Low priority for User B.
NOTE: Only device on Client mode or WISP mode this functionality can take effective. Parameter Definition Label Upstream Data Rate Upstream Latency Upstream Burst Packet Downstream Data Rate Downstream Latency Downstream Burst Packet Description Speed of transmit data that from Ethernet interface to Wireless interface. Similar a waiting time the data queuing- time. Similar a buffer the data will into the buffer while the data is transmit or receive.
Following Table describes the SNMP configuration parameters Label System Community String System Name System Location System Contact Trap Receiver IP Address Trap Receiver Community String Description This is password sent with each trap to the SNMP Manager. Type the Name which is name of device. Type the Location which is location of device Type the Name which is person or group when the device has problem can find they. Type the IP Address which is address of SNMP Manager.
1.3.6.1.4.1.99.1 - Mode 1.3.6.1.4.1.99.2 - SSID 1.3.6.1.4.1.99.3 - Channel 1.3.6.1.4.1.99.4 - Band 1.3.6.1.4.1.99.5 - RSSI 1.3.6.1.4.1.99.6 - Active_Clients 1.3.6.1.4.1.99.7 - Active_Clients_List 1.3.6.1.4.1.99.
Upgrade Firmware Firmware Types The firmware for this device is divided into 2 parts, one is web pages firmware the other is application firmware, usually named g120webpage.bin and g120linux.bin. To upgrade the firmware, we suggest the user first upgrade the application firmware then the web pages firmware. Upgrading Firmware The Web-Browser upgrading interface is the simplest and safest way to upgrade the firmware.
To save & restore configuration data of device, just enter the target filename with full path to your local host then you can back up the configuration data to local host or restore configuration data to the device. Password The Web-Browser interface has password protection. To disable the Web-Browser password protection just leave the “User Name” field to blank then click the “Apply Changes” button.
Using CLI Menu Start a SSH(Secure Shell) client session to login to the device The SSH server daemon inside the device uses TCP port 22. User must use SSH client utility such as Putty to login to the device. The default password for user “root” is either “qwert” or “zplus12320400” depending on your firmware version. Once the user has logged in to the device, then the password can be changed by CLI command. Execute CLI program This program won’t execute automatically when user logs in to the device.
Menu Tree List Password The SSH Configuration interface has password protection. Please note that this password is separate from the web configuration password.
65
Auto Discovery Tool Auto Discovery can be used to find out how many devices are in your local area network The name of the tool is WirelessConf.exe. c d e f g h i Discover After pressing this button, you will see how many devices are in your network and you would see the basic information about these devices, such as: • SSID • IP Address • Subnet Mask • Channel number • MAC Address Setup IP After you press the Setup IP button, you will see Setup IP Address window.
Detail If you want to see more detailed information, you could press the Detail button, and then you will see the Detail Information window.
WDS If the device you selected is in WDS mode or AP+WDS mode, you can press the WDS button and then you will see the WDS List window. Active Clients After pressing the Active Clients button, you will see the WLAN AP Active Clients window. with information, such as: Connect to Web Server If you want connect to device’s web server you can press the Connect to Web Server button, or double-click on the device.