User Manual Outdoor Long Range 802.
Table of Contents 1. Introduction................................................................................................................................. 4 1.1 Product Introduction ......................................................................................................... 5 1.2 Package Content................................................................................................................ 6 1.3 Product Features ...........................................................
4.4.1 Device Information .............................................................................................. 88 4.4.2 Wireless Information ............................................................................................ 89 4.4.3 LAN Information ................................................................................................. 89 4.4.4 Wireless Client Table ........................................................................................... 90 4.4.5 System LOG....
1. Introduction Thank you for purchasing Loopcomm product. At loopcomm we strive to provide you with the highest quality products through innovation and advanced technology. We pride ourselves on delivering products that outperform the competition and go beyond your expectations. If you have any questions please feel free to contact us. We’d love to hear from you and thank you for your support! Email: support@loopcomm.com Website: www.loopcomm.
1.1 Product Introduction Loopcomm LP-2596K is an Outdoor Long Range 5GHz Wireless AP/CPE/Bridge that provides wide coverage of network connection in existing environment. It can operate up to 300Mbps data rate by supporting IEEE 802.11a/n standard and with full WEP, WPA/WPA2 data security, Wireless LAN Access Control List and TKIP/AES encryption, It keeps the data transmission safe in any network connection mode.
1.2 Package Content The package content includes the following items, shown from left to right as figure.
1.3 Product Features Wireless Standards : IEEE 802.11a/n Data transmission rate up to 300 Mbps at 40 MHz bandwidth Operation Mode: Access Point/Client/WDS Access Point/WDS Client/AP Router/Wireless ISP Reliable data security including WEP, WPA/WPA2, WPA-PSK/RADIUS, and WPA2-PSK/RADIUS with TKIP/AES encryption. Support SNMP V2 management, SSH, NTP, and Telnet.
1.4.2 Bridge Mode Since the antenna characteristics for LP-2596K is directional with high gain design, it can transmit RF signal for several miles. Based on this point, LP-2596K is greatly used to bridge at long distance transmission for point to point applications like IP surveillance, networking company.
1.5 Product Outline Introduction 1.5.1 Front view 1.5.
1.5.3 LED Indication LED Indicator Secondary Main Signal Strength Status Description ON The LP-2596K is powered ON. OFF The LP-2596K is powered OFF. ON Port linked. OFF No connection. Blink ON Data is being transmitted or received on the Secondary Ethernet port. Port linked. OFF No connection. Blink Data is being transmitted or received on the Main Ethernet port. It stands for connection quality of Station mode or AP mode.
1.5.4 I/O Interface Item Main Secondary Reset Button Earth Ground Description It mainly used as Power over Ethernet (PoE) port, which allows the router powered up by PoE adapter when the connection is established by RJ-45 Cat.5 cable. It supports auto-sensing on 10/100M speed, half/ full duplex, and complies with IEEE 802.3/ 802.3u respectively. The Secondary Ethernet port allows users to connect to another device through RJ-45 Cat.5 cable.
1.5.5 Mounting Options Pole Mount Use cable tie and make it pass through the one of middle holes to fix and tie on the pole. Wall Mount Please fix the screws into the wall and hang LP-2596K on the corresponding screws.
2. Hardware Installation 2.1 Connection overview 2.2 Installation Steps 1. Take off the water-proof sliding cover. 2. Connect the Main Ethernet port of LP-2596K with a RJ-45 cable. Note. LP-2596K built in PoE pass through function on Secondary Ethernet port. It means the Secondary Ethernet port is able to provide 24V power for a secondary device if this function enabled on Web Configuration (Please refer to the statement on Advanced Setting of Radio menu).
3. Make the water-proof sliding cover well installed. 4. Connect PoE Injector to LP-2596K shown on diagram. DC: Plug in the DC jack of 24V/1A power adapter PoE port: Connect other end of Main Ethernet cable to PoE port. LAN port: Connect Ethernet cable from PoE injector to your computer/laptop for Web configuration. Reset button: It allows user to remotely reset the system of LP-2596K. Note. 1. There is no software driver or utility installation needed. 2. RJ-45 8P8C Ethernet cable is required. 3.
2.3 IP Surveillance Example – Scenario for IP surveillance The following figure indicates the basic setup to implement IP surveillance with a pair of LP2596K. The remote monitoring image can be delivered to local NVR via the high powered, long distance transmission by LP-2596K.
3. Software Configuration 3.1 System Requirements - Microsoft Windows XP/Vista/7/8, Mac iOS, Linux A Web Browser supports HTTP such as Internet Explorer, Google Chrome, Safari, and Mozilla Firefox etc. 3.2 Easy Installation Network Connection Setup: The default IP of LP-2596K is 192.168.1.200. You have to make sure your computer is on the same network segment as LP-2596K before connecting to LP-2596K Configuration. Example: In the Windows 7 operating system 1. 2. 3. 4. Press Start and enter ncpa.
3.3 Get started with LP-2596K 1. Open Web browser and enter 192.168.1.200 in the URL field of Web browser. 2. Enter “admin” as default user name, and “admin” as default password. After successful login , you can see the Loopcomm web page.
4. Software Features 4.1 Operation Mode In Operation Mode you will find wireless and WAN settings. The LP- 2596K wireless settings are dependent on the wireless operation mode you choose. To access wireless settings, click on the “Setup” button. In Operation Mode there are 6 types, they are 4.1.1 Access Point It Connects to an internal network (LAN) and broadcasts a wireless network connection (WLAN). When operating in the Access Point mode, LP- 2596K becomes the center hub of the wireless network.
Fields Description Network SSID It is the wireless network name. User can use the default SSID or change it. Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself. Channel Select the wireless communication frequency/channel from pull-down menu.
Security Settings Security settings allow you to use encryption to secure your data. There are 4 Encryption Modes in Security Settings. They are WEP, WPA, WPA2, and WPA-Mixed. Functions are same for all Modes, below example is for WEP and WPA Encryption. Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address.
Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Pre-Authentication Select Pre-Authentication as Personal or Enterprise. Encryption Type TKIP: Temporal Key Integrity Protocol (TKIP) for data Encryption. TKIP utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. AES: Advanced Encryption Standard (AES) for data encryption. AES utilized a symmetric 128-bit block data encryption.
Advanced Settings Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation. The default and recommended beacon interval is 100 milliseconds.
Aggregation A part of the 802.11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source, destination end points, and traffic class (QoS) into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame.
Access Control This page allows administrator to have Access Control by entering MAC address of client stations. When this function is Enabled, MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet. Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature.
Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address. Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address. Fields Description Quality of Service Enable/Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address Type then Enter the IP Address of the device/PC connected to the router.
4.1.2 Client It acts as a wireless client, to connect a remote segment to an existing WLAN Note: Depending on the mode you choose, applicable settings will be enabled/ disabled automatically. Press setup, then below Screen is displayed. Press OK to continue, then below page is displayed.
Fields Description Remote AP SSID Select Site Survey option then it will Scan & displays the SSID List, Choose one SSID from the list. Enable Wireless Disable SSID Broadcasting Enable Isolated Lock to AP Mac Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Enter MAC address of the access point to which the client will be locked & connected. Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself.
Site Survey You could configure AP Client parameters here. Click Rescan to browse more networks then select the SSID and press associate then close the page. Note: Enter the SSID Password, if necessary. Security Settings Security settings allow you to use encryption to secure your data. There are 4 Encryption Modes in Security Settings. They are WEP, WPA, WPA2, and WPA-Mixed. Functions are same for all Modes, below example is for WEP and WPA Encryption.
Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address. Open system authentication is used when no authentication is required. Shared Key: It verifies that an authentication-initiating station has knowledge of a shared secret. The 802.
Fields Description RADIU Server IP Address Enter the RADIU Server’s IP Address provided by your ISP. RADIU Server Port Enter the RADIUS Server’s port number provided by your ISP. RADIU Server Password Enter the RADIUS Server’s Password provided by your ISP. EAP Reauthorization Period EAP- Session timeout interval for 802.1x re-authorization setting. Session timeout interval unit is seconds. RSN Reauthorization Enable/Disable the function to access.
Advanced Settings Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation. The default and recommended beacon interval is 100 milliseconds.
Aggregation A part of the 802.11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source, destination end points, and traffic class (QoS) into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame.
Access Control This page allows administrator to have Access Control by entering MAC address of client stations. When this function is Enabled, MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet. Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature.
4.1.3 WDS Access Point It acts as the main base station for a Wireless Distribution System mesh network Note: Depending on the mode you choose, applicable settings will be enabled/ disabled automatically. Press setup, then below Screen is displayed. Press OK to continue, then below page is displayed.
Fields Description Network SSID It is the wireless network name. User can use the default SSID or change it. Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself. Channel Select the wireless communication frequency/channel from pull-down menu.
Functions are same for all Modes, below example is for WEP and WPA Encryption. Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address. Open system authentication is used when no authentication is required. Shared Key: It verifies that an authentication-initiating station has knowledge of a shared secret. The 802.
Encryption Type Pre-shared Key TKIP: Temporal Key Integrity Protocol (TKIP) for data Encryption. TKIP utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. AES: Advanced Encryption Standard (AES) for data encryption. AES utilized a symmetric 128-bit block data encryption. AUTO: Auto is the default Encryption Type. It will change automatically to fulfill client’s requirement. User can enter Maximum number of Key Length.
Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation. The default and recommended beacon interval is 100 milliseconds.
Aggregation A part of the 802.11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source, destination end points, and traffic class (QoS) into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame.
Access Control This page allows administrator to have Access Control by entering MAC address of client stations. When this function is Enabled, MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet. Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature.
Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address. Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address. Fields Description Quality of Service Enable/Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address, then Enter the IP Address of the device/PC connected to the router.
4.1.4 WDS Client It acts as a remote base station in a Wireless Distribution System mesh network Note: Depending on the mode you choose, applicable settings will be enabled/ disabled automatically. Press setup, then below Screen is displayed. Press OK to continue, then below page is displayed.
Fields Description Remote AP SSID Select Site Survey option then it will Scan & displays the SSID List, Choose one SSID from the list. Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Enter MAC address of the access point to which the client will be locked and connected. Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself. Select the wireless communication frequency/channel from pull-down menu.
Site Survey You could configure AP Client parameters here. Click Rescan to browse more networks then select the SSID and press associate then close the page. Note: Enter the SSID Password, if necessary. Security Settings Security settings allow you to use encryption to secure your data. There are 4 Encryption Modes in Security Settings. They are WEP, WPA, WPA2, and WPA-Mixed. Functions are same for all Modes, below example is for WEP and WPA Encryption.
Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address. Open system authentication is used when no authentication is required. Shared Key: It verifies that an authentication-initiating station has knowledge of a shared secret. The 802.
Fields Description RADIU Server IP Address Enter the RADIU Server’s IP Address provided by your ISP. RADIU Server Port Enter the RADIUS Server’s port number provided by your ISP. RADIU Server Password Enter the RADIUS Server’s Password provided by your ISP. EAP Reauthorization Period EAP- Session timeout interval for 802.1x re-authorization setting. Session timeout interval unit is seconds RSN Reauthorization Enable/Disable the function to access.
Advanced Settings Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation. The default and recommended beacon interval is 100 milliseconds.
Aggregation A part of the 802.11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source, destination end points, and traffic class (QoS) into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame.
Access Control This page allows administrator to have Access Control by entering MAC address of client stations. When this function is Enabled, MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet. Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature.
4.1.5 AP Router It connects an external network (WAN) with an internal network (LAN/WLAN), to allow cross-communication Note: Depending on the mode you choose, applicable settings will be enabled/ disabled automatically. Press setup, then below Screen is displayed. Press OK to continue, then below page is displayed.
Fields Description Network SSID It is the wireless network name. User can use the default SSID or change it. Enable Wireless Disable SSID Broadcasting Enable Isolated Radio Mode Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself. Channel Select the wireless communication frequency/channel from pull-down menu.
Security Settings Security settings allow you to use encryption to secure your data. There are 4 Encryption Modes in Security Settings. They are WEP, WPA, WPA2, and WPA-Mixed. Functions are same for all Modes, below example is for WEP and WPA Encryption. Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address.
Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Pre-Authentication Select Pre-Authentication as Personal or Enterprise. Encryption Type TKIP: Temporal Key Integrity Protocol (TKIP) for data Encryption. TKIP utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. AES: Advanced Encryption Standard (AES) for data encryption. AES utilized a symmetric 128-bit block data encryption.
Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. Advanced Settings Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation.
DTIM (Delivery Traffic Indication Map) This is the Delivery Traffic Indication Map. It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame. You can change the value from 1 to 255. The AP will check the buffered data according to this value. For example, selecting “1” means to check the buffered data at every beacon.
Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature. Allow Listed: When this option is selected, no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet. Deny Listed: When this option is selected, all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet.
Fields Description WAN Connection Type Select DHCP from pull down menu Host Name Enter the Host Name of DHCP server. The default value is empty. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. Static Mode (fixed IP) Fields Description WAN Connection Type Select Static Mode from pull down menu. IP Address Enter the IP address. IP Subnet Mask Enter the subnet mask for WAN interface.
Fields Description WAN connection Type Select PPPoE from pull down menu User Name If you select the PPPoE support on WAN interface, Enter the user name to login the PPPoE server Provided by ISP Password If you select the PPPoE support on WAN interface, Enter the password to login the PPPoE server Provided by ISP Verify Password Enter the same password again for verification. Save: Cancel Click Save to change the new settings. Click cancel to clear the entered settings.
Fields Description Remote Management Select Enable or Disable for remote management function. Ping from WAN Select Disable or Enable for Ping permit from WAN. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. DHCP Server Settings Fields Description DHCP Server Select Server to access the feature.
Fields Description DMZ Settings Enable or Disable the DMZ function. DMZ IP Address To support DMZ in your firewall design, Enter IP address of DMZ host that can be access from the WAN interface. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. Virtual Server Settings Virtual server feature allows users to make servers on your LAN accessible to internet users.
Protocol There are 3 options, TCP&UDP, TCP or UDP. IP Address Enter the IP address to which the data packets can be forwarded from WAN. The IP address should be hosted in LAN behind the NAT firewall. Port Range Enter the port range to which data packets can be forwarded. Comment Make a comment for the Virtual Server policy. Add Cancel Click Add to change the new settings. Click cancel to clear the entered settings.
Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet. Fields Description Filtering Enable/Disable the function to Port Filter Protocol Specify the protocol TCP&UDP, TCP or UDP. Port Range Enter the specific Port range to be denied. Comment Make a comment for the Port Filtering policy. Add Cancel Click Add to change the new settings. Click cancel to clear the entered settings.
Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address. Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address. Fields Description Quality of Service Enable/Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address, then Enter the IP Address of the device/PC connected to the router.
4.1.6 Wireless ISP A Wireless Internet Service Provider (WISP) is an internet Service Provider with a network based on wireless networking. Note: Depending on the mode you choose, applicable settings will be enabled/ disabled automatically. Press setup, then below Screen is displayed. Press OK to continue, then below page is displayed.
Fields Description Regulatory Domain Select the country from pull down menu. Network SSID It is the wireless network name. User can use the default SSID or change it. Enable Wireless Disable SSID Broadcasting Enable Isolated Radio Mode Enable Wireless Option SSID will be hidden, only users who know the SSID can associate with this network. User cannot Ping. Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 “Auto” option selects the mode by itself.
Data Rate Defines the data rate (in Mbps) at which the device should transmit wireless packets. You can fix a specific data rate between MCS 0 and MCS 7 (or MCS 15 for 2x2 chain devices). Transmit Power Defines the maximum average transmit output power (in dBm) of the device. The transmit power level maximum is limited according to country regulations.
Fields Description Select Encryption Select the Encryption Mode from the pull down menu. Authentication Open System: Open system authentication provides identification for using the wireless adapter's MAC address. Open system authentication is used when no authentication is required. Shared Key: It verifies that an authentication-initiating station has knowledge of a shared secret. The 802.
Fields Description RADIU Server IP Address Enter the RADIU Server’s IP Address provided by your ISP. RADIU Server Port Enter the RADIUS Server’s port number provided by your ISP. RADIU Server Password Enter the RADIUS Server’s Password provided by your ISP. EAP Reauthorization Period EAP- Session timeout interval for 802.1x re-authorization setting. Session timeout interval unit is seconds RSN Reauthorization Enable/Disable the function to access.
Advanced Settings Fields Description RTS/CTS Threshold Determines the packet size of a transmission and, through the use of an AP, helps control traffic flow. The range is 0-2347 bytes. Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network. The beacon interval is the time interval between beacons sending by this unit in AP or AP+WDS operation. The default and recommended beacon interval is 100 milliseconds. This is the Delivery Traffic Indication Map.
Short GI (Guard Interval) A GI is a period of time between symbol transmission that allows reflections (from multipath) from the previous data transmission to settle before transmitting a new symbol. The 802.11n draft specifies two guard intervals: 400ns (short) and 800ns (long). Support of the 400ns GI is optional for transmit and receive. The purpose of a guard interval is to introduce immunity to propagation delays, echoes, and reflections to which digital data is normally very sensitive.
Fields Description Wireless Access Control Mode The Selections are: Disable: Disable the wireless ACL feature. Allow Listed: When this option is selected, no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet. Deny Listed: When this option is selected, all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet.
Host Name Enter the Host Name of DHCP server. The default value is empty. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. Static Mode (fixed IP) Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address IP Subnet Mask Enter the IP address. Enter the subnet mask for WAN interface. Gateway IP address Enter the default gateway for WAN interface outgoing data packets.
Password Verify Password If you select the PPPoE support on WAN interface, Enter the password to login the PPPoE server provided by ISP. Enter the same password again for verification. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings.
Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. DHCP Server Settings Fields Description DHCP Server Select Server to access the feature Lease Time From The Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address. At the end of the Lease Time, the lease is either renewed or a new IP is issued by the DHCP server. The amount of time is in units of seconds.
DMZ IP Address To support DMZ in your firewall design, Enter IP address of DMZ host that can be access from the WAN interface. Save Cancel Click Save to change the new settings. Click cancel to clear the entered settings. Virtual Server Settings Virtual server feature allows users to make servers on your LAN accessible to internet users. Normally, Internet users would not be able to access a server on your LAN because of native NAT protection.
Fields Description Filtering Enable/Disable the function to IP Filter Protocol Specify protocol, TCP&UDP, TCP or UDP. IP Address Enter the specific IP Address to be denied. Comment Make a comment for the IP Filtering policy. Add Cancel Click Add to change the new settings. Click cancel to clear the entered settings. Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet.
Fields Description Filtering Select Enable or Disable the Mac Filtering function. Mac Address Enter the specific MAC address to be denied. Comment Make a comment for the filtering policy. Add Cancel Click Add to change the new settings. Click cancel to clear the entered settings. Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address. Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address.
4.2 System Configuration Select the System Configuration menu from the top of your screen to access IP. The system configuration includes Device IP Settings, Time Settings, Password Settings, System Management, Ping Watchdog, Firmware Upgrade, Configuration Save and Restore, Factory Default, Reboot System. 4.2.1 Device IP Settings All settings besides Wireless and WAN functions are in this category. Fields Description IP Address Enter the IP Address for the Device.
4.2.2 Time Settings System Configuration ->Time Settings It synchronizes the date & time of PC to device. Enable NTP (Network time protocol) for clock synchronization to device. If NTP is not enabled then user must enter the date and time manually. Fields Description Enable NTP Enable NTP so that time & date will be updated correctly even after reboot. Server Name Enter the NTP server Name NTP request interval NTP updating time interval. By default its 24.
4.2.3 Password Settings This settings helps to change password to restrict from unauthorized access. To change password, please go to “System Configuration” -> “Password Settings” menu. Fields Description Current Password Enter the password of the device. New Password Enter your new password to which you want to change. Re-enter New Password For confirmation, enter the new password again. Save & Change It saves and changes to New Password.
4.2.4 System Management System Configuration -> System Management In this page, administrator can change the management parameters and disable/enable management interface. Fields Description Device Name Enter the Device Name POE Pass Through UPnP It allows Secondary Ethernet port to provide 24V power for a secondary device when it’s enabled. Administrator can enable or disable the UPnP function Syslog This option enables the registration routine of system log (syslog) messages.
4.2.5 Ping Watchdog System Configuration -> Ping Watchdog This menu allows to configure system to reboot on kernel panic, when an IP address does not respond, or in case the system has locked up. Software watchdog timer is used to provide the last option, so in very rare cases (caused by hardware malfunction) it can lock up by itself. There is a hardware watchdog device available in all Router BOARD PowerPC which can reboot the system in any case.
4.2.6 Firmware Upgrade System Configuration -> Firmware Upgrade Upgrade the device firmware to obtain new functionality. It takes about 1minute to upload new version. Click the Browse button to select the path and filename for the firmware, and then click the UPGRADE button to upgrade firmware. Note: Please do not off the power or remove the Ethernet cable connected to LP-2596K when firmware upgrade is in process. Otherwise, it will probably cause system crash.
4.2.8 Factory Default System Configuration -> Factory Default This Feature is used to reset the current configuration setting to the factory default configuration settings. Click YES to go ahead and restore the configuration to the factory default. 4.2.9 Reboot Whenever you use the Web configuration to change system settings, the changes are initially placed in temporary storage. These changes will be lost if the device is reset or turn off.
4.3 Tools There are two features in Tools they are Network Ping & Network Traceroute 4.3.1 Network Ping Network Ping is used to provide a basic connectivity test between the requesting host and a destination host. This is done by using the Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host.
4.3.2 Network Traceroute Once the Network Ping has been used to determine basic connectivity, the Network traceroute can used to determine more specific information about the path to the destination host including the route the packet takes and the response time of these intermediate hosts. If you execute the Traceroute command on a source device, it sends IP packets toward the destination with Time To Live (TTL) values that increment up to the maximum specified hop count.
4.4 Device Status Click on the “Device Status” on the top menu bar, It is used to monitor the status of the device. It provides information on device status, wireless information, LAN Information, wireless client table and system log. 4.4.1 Device Information Device Status Device Information It presents the status of LP-2596K Firmware devices, memory utilization and ARP Table.
4.4.2 Wireless Information This page shows the wireless information of LP- 2596K device, such as current operation mode, wireless traffic, error packets, device SSID, Band, channel, and encryption used, Transmit Power. 4.4.3 LAN Information This page shows the LAN information of LP- 2596K device, such as Physical Address, IP Address, Network Mask, Default Gateway and DHCP details.
4.4.4 Wireless Client Table This feature displays the currently connected MAC address of Wi-Fi clients 4.4.5 System LOG This page is used to view system logs. The System Log displays the system activities, login, and system error report. 4.5 LOGOUT Please make sure to Logout after you finish all settings.
5.Compliance Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.