User Manual

________
Table of Contents
1
INTRODUCTION................................................................................................................................5
1.1
F
EATURES
&
B
ENEFITS
.................................................................................................................5
1.2
P
ACKAGE
C
ONTENTS
....................................................................................................................6
1.3
B
RIDGE
/AP
D
ESCRIPTION
.............................................................................................................6
1.4
S
YSTEM
R
EQUIREMENTS
...............................................................................................................6
1.5
A
PPLICATIONS
...............................................................................................................................7
1.6
N
ETWORK
C
ONFIGURATION
..........................................................................................................7
a)
Ad-hoc (peer-to-peer) Mode..........................................................................................................................7
b)
Infrastructure Mode........................................................................................................................................8
2
UNDERSTANDING THE HARDWARE...........................................................................................9
2.1
H
ARDWARE
I
NSTALLATION
...........................................................................................................9
2.2
IP
A
DDRESS
C
ONFIGURATION
.......................................................................................................9
3
CLIENT BRIDGE MODE – WEB CONFIGURATION................................................................11
3.1
L
OGGING
I
N
................................................................................................................................11
3.2
S
YSTEM
.......................................................................................................................................13
3.2.1
A
DMINISTRATOR
S
ETTINGS
.........................................................................................................13
3.2.1.1
S
AVE
C
ONFIGURATION TO A
F
ILE
...........................................................................................15
3.2.1.2
R
ESTORE THE
C
ONFIGURATION FROM A
F
ILE
.........................................................................15
3.2.1.3
S
WITCH
D
EVICE TO
AP
M
ODE
................................................................................................15
3.2.2
F
IRMWARE
U
PGRADE
..................................................................................................................16
3.2.3
S
YSTEM
R
EBOOT AND
R
ESTORE
S
ETTINGS TO
D
EFAULT
.............................................................18
3.2.3.1
S
YSTEM
R
EBOOT
....................................................................................................................18
3.2.3.2
R
ESTORE
S
ETTINGS TO
D
EFAULT
...........................................................................................19
3.2.4
S
YSTEM
T
IME
C
ONFIGURATION
..................................................................................................19
3.3
W
IRELESS
....................................................................................................................................21
3.3.1
SSID
C
ONFIGURATION
................................................................................................................21
3.3.2
W
IRELESS
802.11
A
C
ONFIGURATION
..........................................................................................22
3.3.2.1
802.11
A
I
NFRASTRUCTURE
/
A
D
-
HOC
M
ODE
..........................................................................22
3.3.3
W
IRELESS
802.11
B
C
ONFIGURATION
..........................................................................................23
3.3.3.1
802.11
B
I
NFRASTRUCTURE
/
A
D
-
HOC
M
ODE
..........................................................................23
3.3.4
W
IRELESS
802.11
G
C
ONFIGURATION
..........................................................................................24
3.3.4.1
802.11
G
I
NFRASTRUCTURE
/
A
D
-
HOC
M
ODE
..........................................................................24
3.3.5
W
IRELESS
S
ECURITY
...................................................................................................................25
3.3.5.1.1
WEP
(W
IRED
E
QUIVALENT
P
RIVACY
) ...................................................................................25
3.3.5.1.2
WPA/WPA2
P
ERSONAL
(W
I
-F
I
P
ROTECTED
A
CCESS
) ........................................................26
3.3.6
A
DVANCED
W
IRELESS
S
ETTINGS
................................................................................................27
3.3.7
SNMP .........................................................................................................................................28
3.4
LAN
S
ETTINGS
(S
TATIC
/
DHCP) ...............................................................................................29
3.5
S
TATISTICS
..................................................................................................................................30
3.6
L
OGS
...........................................................................................................................................31
4
ACCESS POINT MODE – WEB CONFIGURATION ..................................................................33
4.1
L
OGGING
I
N
................................................................................................................................33
4.2
S
YSTEM
.......................................................................................................................................34
4.2.1
A
DMINISTRATOR
S
ETTINGS
.........................................................................................................34
4.2.1.1
S
AVE
C
ONFIGURATION TO A
F
ILE
...........................................................................................34
4.2.1.2
R
ESTORE THE
C
ONFIGURATION FROM A
F
ILE
.........................................................................35
4.2.1.3
S
WITCH
D
EVICE TO
B
RIDGE
M
ODE
........................................................................................35
4.2.2
F
IRMWARE
U
PGRADE
..................................................................................................................36
4.2.3
S
YSTEM
R
EBOOT AND
R
ESTORE
S
ETTINGS TO
D
EFAULT
.............................................................37
4.2.3.1
S
YSTEM
R
EBOOT
....................................................................................................................38
4.2.3.2
R
ESTORE
S
ETTINGS TO
D
EFAULT
...........................................................................................38