all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 3.57 MiB | November 01 2012 | |||
1 | Attestation Statements | November 01 2012 | ||||||
1 | Cover Letter(s) | November 01 2012 | ||||||
1 | Cover Letter(s) | November 01 2012 | ||||||
1 | External Photos | November 01 2012 | ||||||
1 | Internal Photos | November 01 2012 | ||||||
1 | ID Label/Location Info | November 01 2012 | ||||||
1 | ID Label/Location Info | November 01 2012 | ||||||
1 | Operational Description | November 01 2012 | ||||||
1 | RF Exposure Info | November 01 2012 | ||||||
1 | Test Report | November 01 2012 | ||||||
1 | Test Setup Photos | November 01 2012 |
1 | User Manual | Users Manual | 3.57 MiB | November 01 2012 |
1 11N Long Range Multi-Function Gigabit Client Bridge ECB350 11N Long Range Multi-Function Gigabit Client Bridge V1.0 1 Table of Contents 1 1.1 1.2 1.3 1.4 Introduction ..................................................................................................................................................................5 Features and Benefits.............................................................................................................................................5 Package Contents...................................................................................................................................................6 System Requirements.............................................................................................................................................6 Applications.............................................................................................................................................................7 2 Before you Begin .........................................................................................................................................................8 2.1 Considerations for Wireless Installation ..................................................................................................................8 2.2 Computer Settings (Windows XP/Windows 7) ........................................................................................................9 2.3 Apple Mac X OS ...................................................................................................................................................12 2.4 Hardware Installation ............................................................................................................................................13 3 Configuring Your Client Bridge.................................................................................................................................15 3.1 Default Settings.....................................................................................................................................................15 3.2 Web Configuration ................................................................................................................................................16 4 Status ..........................................................................................................................................................................18 Save/Reload .........................................................................................................................................................18 4.1 4.2 Main ......................................................................................................................................................................19 4.3 Connection Status.................................................................................................................................................21 4.4 Wireless Client List ...............................................................................................................................................22 4.5 System Log...........................................................................................................................................................23 5 System ........................................................................................................................................................................24 5.1 Operation Mode ....................................................................................................................................................24 5.2 IP Settings.............................................................................................................................................................25 Spanning Tree Setting ..........................................................................................................................................26 5.3 6 Router .........................................................................................................................................................................28 6.1 WAN Settings........................................................................................................................................................28 Static IP.............................................................................................................................................................28 6.1.1 6.1.2 DHCP ................................................................................................................................................................31 2 PPPoE...............................................................................................................................................................33 6.1.3 PPTP.................................................................................................................................................................35 6.1.4 LAN Settings .........................................................................................................................................................37 6.2 VPN Pass Through ...............................................................................................................................................38 6.3 Port Forwarding ....................................................................................................................................................39 6.4 6.5 Port Triggering ......................................................................................................................................................41 6.6 DMZ ......................................................................................................................................................................43 6.7 MAC Filter.............................................................................................................................................................44 6.8 IP Filter..................................................................................................................................................................45 6.9 URL Filter..............................................................................................................................................................47 7 Wireless ......................................................................................................................................................................48 7.1 Wireless Network ..................................................................................................................................................48 7.2 Wireless Security ..................................................................................................................................................52 7.3 Site Survey............................................................................................................................................................55 7.4 Wireless MAC Filter ..............................................................................................................................................59 7.5 Wireless Advanced ...............................................................................................................................................60 7.6 WPS (Wi-Fi Protected Setup) ...............................................................................................................................62 7.7 WDS Link Settings ................................................................................................................................................64 8 Management ...............................................................................................................................................................66 8.1 Administration .......................................................................................................................................................66 8.2 Management VLAN...............................................................................................................................................67 8.3 SNMP Settings......................................................................................................................................................68 Backup/Restore ....................................................................................................................................................70 8.4 Firmware Upgrade ................................................................................................................................................71 8.5 8.6 Time Setting..........................................................................................................................................................72 8.7 Log........................................................................................................................................................................73 8.8 Diagnosis ..............................................................................................................................................................74 8.9 LED Control ..........................................................................................................................................................75 8.10 Logout...................................................................................................................................................................76 8.11 Reset.....................................................................................................................................................................77 9 Building a Wireless Network .....................................................................................................................................78 3 9.1 Client Bridge Mode ...............................................................................................................................................78 Access Point Mode ...............................................................................................................................................78 9.2 9.3 Access Point Mode with WDS Function (WDS AP mode).....................................................................................80 9.4 WDS Bridge Mode ................................................................................................................................................81 9.5 Repeater mode .....................................................................................................................................................82 Appendix A FCC Interference Statement......................................................................................................................83 Appendix B IC Interference Statement .........................................................................................................................84 Appendix C CE Interference Statement........................................................................................................................86 4 Revision History Version 1.0 Date 2011/12/15 Notes First Release 5 1 Introduction The ECB350 is a multi-functioned 802.11b/g/n product with 8 major multi-functions. It is designed to operate in every working environment for enterprises. The ECB350 is a Wireless Network device that delivers up to 6x faster speeds and 7x extended coverage than 802.11b/g devices. The ECB350 supports use in the home network with superior throughput, performance, and unparalleled wireless range. To protect data during wireless transmissions, the ECB350 encrypts all wireless transmissions through WEP data encryption and supports WPA/WPA2 encryption. Its MAC address filter allows users to select stations to access the network. The ECB350 is an ideal product to ensure network safety for both home and enterprise environments. 1.1 Features and Benefits Features High Speed Data Rate Up to 300Mbps 10/100/1000 Fast Ethernet IEEE 802.11n draft Compliant and backward compatible with 802.11b/g Multi-Function Point-to-Point or Point-to-Multipoint Wireless Connectivity Support Multiple SSID (up to 4) in AP mode Benefits Capable of handling heavy data payloads such as HD multimedia streaming. Support up to 1000Mbps networking speed. Fully compatible with IEEE 802.11b/g/n devices. Allowing users to select Access Point, Client Bridge, WDS AP, WDS Bridge, WDS Station, Universal Repeater, Router or Client Router mode in various applications. Allows transfer of data from building to building. Allows clients to access different networks through a single access point and assign different policies and functions for each 6 WPA2/WPA/ IEEE 802.1x support MAC address filtering in AP mode User isolation support (AP mode) Power-over-Ethernet (IEEE802.3af) Save User Settings SSID through the built in software. Powerful data security. Ensuring secure network connection. Protecting the private network between client users. Flexible Access Point locations and saving cost. Firmware upgrade does not delete user settings. SNMP Remote Configuration Management Allows remote connection to configure or manage the ECB350 easily. QoS (WMM) support Enhanced user performance and density. 1.2 Package Contents The ECB350 package contains the following items (all items must be in package to issue a refund):
ECB350
12V/1A 100V~240V Power Adapter
RJ-45 Ethernet LAN Cable
CD-ROM with User's Manual
Quick Guide 1.3 System Requirements The following are the minimum system requirements in order configure the device.
Computer with an Ethernet interface or Wireless Network function.
Windows, Mac OS or Linux based operating systems
Web-Browsing Application (example: Internet Explorer, FireFox, Safari, or other similar software) 7 1.4 Applications The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:
a) Difficult-to-Wire Environments There are many situations where wires cannot be laid easily. Historic buildings, older buildings, multiple buildings, and/or open areas make the installation of a Wired LAN impossible, impractical, and/or expensive. b) Temporary Workgroups Consider situations in open areas such as parks, athletic arenas, exhibition centers, temporary offices, and construction sites where one wants a temporary Wireless LAN established and easily removed. c) The Ability to Access Real-Time Information Doctors/Nurses, Point-of-Sale Employees, and/or Warehouse Workers can access real-time information while dealing with patients, serving customers, and/or processing information. d) Frequently Changed Environments Show rooms, meeting rooms, retail stores, and manufacturing sites where the network connection needs to frequently be taken down. e) Small Office and Home Office (SOHO) Networks SOHO users need a cost-effective, easy and quick installation of a small network. f) Wireless Extensions to Ethernet Networks Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs. g) Wired LAN Backup Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks. h) Training/Educational Facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning. 8 2 Before you Begin This section will guide you through the installation process. Placement of the ENGENIUS ECB350 is very important to maximize the ECB350s performance. Avoid placing the ECB350 in an enclosed space such as a closet, cabinet, or wardrobe. 2.1 Considerations for Wireless Installation The operating distance of all wireless devices cannot be pre-determined due to a number of unknown obstacles in the environment that the device is deployed. in. These could be the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through. Here are some key guidelines to ensure that you have the most optimal wireless range.
Keep the number of walls and/or ceilings between the ECB350 and other network devices to a minimum. Each wall and/or ceiling can reduce the signal strength, resulting in lower signal strength.
Building materials makes a difference. A solid metal door and/or aluminum stubs may have a significant negative effect on the signal strength of the ECB350. Locate your wireless devices carefully so the signal can pass through a drywall and/or open doorways. Materials such as glass, steel, metal, concrete, water (example: fish tanks), mirrors, file cabinets and/or brick can also lower your wireless signal strength. Interferences can also come from your other electrical devices and/or appliances that generate RF noise. The most usual types are microwaves, or cordless phones.
9 2.2 Computer Settings (Windows XP/Windows 7) In order to use the ECB350, you must first configure the TCP/IPv4 connection of your computer system.
Click Start button and open Control Panel. Windows XP Windows 7 10
In Windows XP, click Network Connections In Windows 7, click View Network Status and Tasks in the Network and Internet section, then select Change adapter settings
Right click on Local Area Connection and select Properties
Select Internet Protocol Version 4 (TCP/IPv4) and select Properties 11
Select Use the following IP address and enter IP address and subnet mask then click OK. Note: Ensure that the IP address and subnet mask are on the same subnet as the device. For example: Device IP address: 192.168.1.1 PC IP address: 192.168.1.2 192.168.1.254 PC subnet mask: 255.255.255.0 12 Apple Mac X OS 2.3
Go to System Preferences (can be opened in the Applications folder or selecting it in the Apple Menu)
Select Network in the Internet & Network section
Highlight Ethernet
Enter IP address and subnet mask then press OK Note: Ensure that the IP address and subnet mask are on the same subnet as the device. For example: Device IP address: 192.168.1.1 In Configure IPv4, select Manually PC IP address: 192.168.1.2 192.168.1.254 PC subnet mask: 255.255.255.0
Click Apply when done. 13 2.4 Hardware Installation 1. Ensure that the computer in use has an Ethernet Card (RJ-45 Ethernet Port). For more information, verify with our computer user manual. 2. Connect one end of the Category 5 Ethernet cable into RJ-45 port of the ECB350 and the other end to the RJ-45 port on the computer that will use the ECB350. Ensure that the cable is securely connected to both the ECB350 and the Computer. 3. Connect the Power Adaptor DC Inlet to the DC-IN port of the ECB350 and the Power Adaptor to the electrical out. Once both connections are secure, verify the following:
a) Ensure that the POWER light is on (it will be green). b) Ensure that the WLAN light is on (it will be green). c) Ensure that the LAN (Computer/ECB350 Connection) light is on (it will be green). d) Once all three lights are on, proceed to setting up the computer. This diagram depicts the hardware configuration. 14 Front Panel Rear Panel Front Panel LED Lights Rear Panel DC IN Reset Button Ethernet Port DC IN for Power. One click for reset the device. Press over 10 seconds for reset to factory default. Ethernet port for RJ-45 cable. LED lights for Wireless, Ethernet port and Power. 3 Configuring Your Client Bridge This section will show you how to configure the device using the web-based configuration interface. 3.1 Default Settings Please use your Ethernet port or wireless network adapter to connect the Client Bridge. Default Settings IP Address Username / Password Operation Mode 192.168.1.1 admin / admin Client Bridge 15 16 3.2 Web Configuration
Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.1.1 Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address.
The default username and password are admin. Once you have entered the correct username and password, click the Login button to open the web-base configuration page.
If successful, you will see the ECB350 User Menu. 17 18 4 Status The Status section contains the following options: Main, Wireless Client List and System Log. The following sections describe these options. 4.1 Save/Reload This page lets you save and apply the settings shown under Unsaved changes list, or cancel the unsaved changes and revert to the previous settings that were in effect. 19 4.2 Main Clicking the Main link under the Status menu or clicking Home at the top-right of the Web Configurator shows status information about the current operating mode.
- The System Information section shows general system information such as device name, MAC address, current time, firmware version and management VLAN ID (Note: VLAN ID is only in Access Point and WDS AP mode).
- The LAN Settings section shows Local Area Network setting such as the LAN IP address, subnet mask, and DNS address.
- The WAN Settings section shows WAN setting such as the MAC Address, Connection Type, Connection Status, IP Address, Subnet Mask, and DNS Address. Note: WAN Settings is only in Client Router and Router mode. 20
- The Current Wireless Settings section shows wireless information such as operating mode, frequency and channel. Since the ECB350 supports multiple-SSIDs, information about each SSID, such as its ESSID and security settings, are displayed (Note: Profile Settings is only in Access Point, WDS AP and Router mode). 21 4.3 Connection Status Click on the Connection Status link under the Status menu. This page displays the current status of the network, including Network Type, SSID, BSSID, Connection Status, Wireless Mode, Current Channel, Security, Data Rate, Noise Level and Signal Strength. Note: Only in Client Bridge, Client Router, WDS Station and Repeater mode. 22 4.4 Wireless Client List Clicking the Wireless Client List link under the Status menu displays the list of clients associated to the ECB350, along with the MAC addresses and signal strength for each client. Clicking the [Refresh] button updates (refreshes) the client list. Note: Only in Access Point, WDS AP, Repeater and Router mode. 23 4.5 System Log The ECB350 automatically logs (records) events of possible interest in its internal memory. To view the logged information, click the System Log link under the Status menu. If there is not enough internal memory to log all events, older events are deleted from the log. When powered down or rebooted, the log will be cleared. Update the log. Clear the log. System Log Refresh Clear 24 5 System 5.1 Operation Mode The ECB350 supports 8 operating modes: Access Point, Client Bridge, WDS AP, WDS Bridge, WDS Station, Universal Repeater, Router and Client Router. Enter a name for the device. The name you type appears in SNMP management. This name is not the SSID and is not broadcast to other devices. Use the radio button to select an operating mode. Operation Mode Save & Apply / Cancel Click [Save & Apply] to confirm the changes or [Cancel] to cancel and return previous settings. System Properties Device Name 25 IP Settings 5.2 This page allows you to modify the device's IP settings. Note: Only in Access Point, Client Bridge, WDS AP, WDS Bridge, WDS Station and Repeater mode. Select whether the device IP address will use the static IP address specified in the IP Address field or be obtained automatically when the device connects to a DHCP server. The IP Address of this device. The IP Subnet Mask of this device. The Default Gateway of this device. Leave it blank if you are unsure of this setting. The primary / secondary DNS address for this device. IP Settings IP Network Setting IP Address IP Subnet Mask Default Gateway Primary / Secondary DNS 26 5.3 Spanning Tree Setting This page allows you to modify the Spanning Tree settings. Enabling Spanning Tree protocol will prevent network loops in your LAN network. Note: Only in Access Point, Client Bridge, WDS AP, WDS Bridge, WDS Station and Repeater mode. Enable or disable the Spanning Tree function. Specify Bridge Hello Time, in seconds. This value determines how often the device sends hello packets to communicate information about the topology throughout the entire Bridged Local Area Network. Specify Bridge Max Age, in seconds. If another bridge in the spanning tree does not send a hello packet for a long period of time, it is assumed to be dead. Specify Bridge Forward Delay, in seconds. Forwarding delay time is the time spent in each of the Listening and Learning states before the Forwarding state is entered. This delay is provided so that when a new bridge comes onto a busy network, it looks at some traffic before participating. Spanning Tree Spanning Tree Status Bridge Hello Time Bridge Max Age Bridge Forward Delay 27 Priority Accept / Cancel Specify the Priority number. Smaller number has greater priority. Click [Accept] to confirm the changes or [Cancel] to cancel and return previous settings. 28 6 Router This section is only available for AP Router Mode and Client Router Mode. 6.1 WAN Settings There are four types of WAN connections: Static IP, DHCP, PPPoE and PPTP. Please contact your ISP to find out which settings you should choose. 6.1.1 Static IP If your ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Secondary DNS (if available) of your ISP provider. 29 Static IP Internet Connection Type Select Static IP to begin configuration of the Static IP connection. Account Name Domain Name MTU Enter the account name provided by your ISP. Enter the domain name provided by your ISP. Specify the Maximum Transmit Unit size. It is recommended you accept the default setting of Auto. Otherwise, packets will be fragmented downstream if the MTU is set too high or too low, which impacts network performance. In extreme cases, an MTU setting that is too low can prevent the ECB350 from establishing some connections. Assign an IP address Manually. Specify an IP addresss subnet mask. Specify the gateway of your network. Specify the primary DNS servers IP address. Specify the second DNS servers IP address. Check to Enable to recognize pings on the ECB350 WAN interface or Disable to block pings on the ECB350 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers. Click Accept to confirm the changes or Cancel to cancel and return previous settings. IP Address IP Subnet Mask Gateway IP Address Primary DNS Secondary DNS Discard Ping on WAN Accept / Cancel Note: Clicking Accept does not apply the changes. To apply them, use Status > Save/Load (see section 4.1). 30 31 6.1.2 DHCP Select DHCP as your WAN connection type to obtain an IP address automatically. You will need to enter account name as your hostname and, optionally, DNS information. DHCP Internet Connection Type Select DHCP to begin configuration of the DHCP connection. Account Name Domain Name MTU Enter the account name provided by your ISP. Enter the domain name provided by your ISP. Specify the Maximum Transmit Unit size. It is recommended you accept the default setting of Auto. Otherwise, packets will be fragmented downstream if the MTU is set too high or too low, which impacts network performance. In extreme cases, an MTU setting that is too low can prevent the ECB350 from establishing some connections. Click this radio button to obtain the DNS automatically from the DHCP server. Click the radio button to set up the Primary DNS and Secondary DNS servers manually. Check to Enable to recognize pings on the ECB350 WAN interface or Disable to block pings on the ECB350 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers. Click Accept to confirm the changes or Cancel to cancel and return previous settings. 32 Get Automatically From ISP Use These DNS Servers Discard Ping on WAN Accept / Cancel 33 6.1.3 PPPoE Select Point to Point Protocol over Ethernet (PPPoE) if your ISP uses a PPPoE connection. Your ISP will provide you with a username and password. This selection is typically used for DSL services. Remove your PPPoE software from your computer, as it is not needed and will not work with your ECB350. PPPoE 34 Internet Connection Type MTU Login Password Service Name Connect on Demand Keep Alive Select PPPoE to begin configuration of the PPPoE connection. Specify the Maximum Transmit Unit size. It is recommended you accept the default setting of Auto. Otherwise, packets will be fragmented downstream if the MTU is set too high or too low, which impacts network performance. In extreme cases, an MTU setting that is too low can prevent the ECB350 from establishing some connections. Enter the Username provided by your ISP. Enter the Password provided by your ISP. Enter the Service Name provided by your ISP. Select the radio button to specify the maximum idle time. Internet connection will disconnect when it reach the maximum idle time, but it will automatically connect when user tries to access the network. Select whether to keep the Internet connection always on, or enter a redial period once the internet lose connection. Get Automatically From ISP Click this radio button to obtain the DNS automatically from the DHCP server. Use These DNS Servers Discard Ping on WAN Click the radio button to set up the Primary DNS and Secondary DNS servers manually. Check to Enable to recognize pings on the ECB350 WAN interface or Disable to block pings on the ECB350 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers. Click Accept to confirm the changes or Cancel to cancel and return previous settings. Accept / Cancel 35 6.1.4 PPTP Select PPTP as your WAN connection type if your ISP uses a Point-to-Point-Tunneling Protocol (PPTP) connection. You will need to provide the IP address, subnet mask, default gateway (optional), DNS (optional), server IP, username, and password provided by your ISP. PPTP 36 Internet Connection Type MTU IP Address Subnet Mask Default Gateway PPTP Server Username Password Service Name Connect on Demand Keep Alive Select PPTP to begin configuration of the PPTP connection. Specify the Maximum Transmit Unit size. It is recommended you accept the default setting of Auto. Otherwise, packets will be fragmented downstream if the MTU is set too high or too low, which impacts network performance. In extreme cases, an MTU setting that is too low can prevent the ECB350 from establishing some connections. Enter the WAN port IP address. Enter the WAN IP subnet mask. Enter the WAN gateway IP address. Enter the IP address of the PPTP server. Enter the Username provided by your ISP. Enter the Password provided by your ISP. Enter the Service Name provided by your ISP. Select the radio button to specify the maximum idle time. Internet connection will disconnect when it reach the maximum idle time, but it will automatically connect when user tries to access the network. Select whether to keep the Internet connection always on, or enter a redial period once the internet lose connection. Get Automatically From ISP Click this radio button to obtain the DNS automatically from the DHCP server. Use These DNS Servers Discard Ping on WAN Click the radio button to set up the Primary DNS and Secondary DNS servers manually. Check to Enable to recognize pings on the ECB350 WAN interface or Disable to block pings on the ECB350 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers. Click Accept to confirm the changes or Cancel to cancel and return previous settings. Accept / Cancel 37 6.2 LAN Settings This page allows you to modify the device's LAN settings. LAN Settings IP Address IP Subnet Mask Use Router As DHCP Server Check this option to enable the internal DHCP server. Starting /Ending IP Address The range of IP addresses of the DHCP server will allocate to LAN device. WINS Server IP Accept / Cancel The LAN IP Address of this device. The LAN Subnet Mask of this device. Enter the IP address of the WINS server. Click Accept to confirm the changes or Cancel to cancel and return previous settings. 38 6.3 VPN Pass Through VPN Passthrough allows a secure virtual private network (VPN) connection between two computers. Enabling the options on this page opens a VPN port and enables connections to pass through the ECB350 without interruption. 39 6.4 Port Forwarding Port forwarding can be used to open a port or range of ports to a device on your network. Using port forwarding, you can set up public services on your network. When users from the Internet make certain requests on your network, the ECB350 can forward those requests to computers equipped to handle the requests. If, for example, you set the port number 80
(HTTP) to be forwarded to IP address 192.168.1.150, all HTTP requests from outside users are forwarded to 192.168.1.150. Enables or disables the Port Forwarding feature. Enter a name or description to help you identify this entry. Select a protocol for the application. Choices are Both, TCP, and UDP. The port range that the server is running on the local computer. The local IP address of the computer the server is hosted on. Click Add to add port forwarding rule or Cancel to discard the settings Click Accept to confirm the changes or Cancel to cancel and return previous settings. 40 Port Forwarding Port Forwarding Service Name Protocol Start / End Port IP Address Add / Cancel Accept / Cancel 41 6.5 Port Triggering If you use Internet applications which use non-standard connections or port numbers, you may find that they do not function correctly because they are blocked by the devices firewall. Port Triggering will be required for these applications to work. Enables or disables the Port Triggering feature. Enter a name or description to help you identify this entry. This is the outgoing (outbound) port numbers for this application. Select whether the application uses TCP, UDP or Both types of protocols for outbound transmissions. These are the inbound (incoming) ports for this application. Select whether the application uses TCP, UDP or Both types of protocols for inbound transmissions. Click Add to add port forwarding rule or Cancel to discard the settings Click Accept to confirm the changes or Cancel to cancel and return previous settings. 42 Port Triggering Port Triggering Service Name Trigger Port Trigger Type Forwarded Port Public Type Add / Cancel Accept / Cancel 43 6.6 DMZ If you have a computer that cannot run Internet applications properly from behind the ECB350, you can allow the computer to have unrestricted Internet access. Enter the IP address of that computer as a Demilitarized Zone (DMZ) host with unrestricted Internet access. Adding a client to the DMZ may expose that computer to a variety of security risks, so use this option as a last resort. DMZ DMZ Hosting DMZ Address Accept / Cancel Enables or disables the DMZ function. Enter an IP address of the computer that will have unlimited Internet access. Click Accept to confirm the changes or Cancel to cancel and return previous settings. 44 6.7 MAC Filter You can choose whether to Deny or Allow only those devices listed in the MAC Filtering table to access the Internet. MAC Filter MAC Filter Deny all clients with MAC addresses listed below to access the network Allow all clients with MAC addresses listed below to access the network Enables or disables the MAC Filter function. When selected, the computers listed in the MAC Filter table will be Denied to access the Internet. When selected, only the computers listed in the MAC Filter table will be Allowed to access the Internet. 45 IP Filter 6.8 You can choose whether to Deny or Allow only devices with those IP Addresses listed on the IP Filter Table from accessing certain ports. This can be used to control which Internet applications the computers can access. Note: You will need to have knowledge of what Internet port numbers each application uses. IP Filter 46 IP Filter Deny all clients with IP addresses listed below to access the network Allow all clients with IP addresses listed below to access the network Enables or disables the IP Filter function. When selected, the computers listed in the IP Filter table will be Denied to access the Internet. When selected, only the computers listed in the IP Filter table will be Allowed to access the Internet. 47 6.9 URL Filter You can deny access to certain websites by blocking keywords in the URL web address. For example, gamer has been added to the URL Filter Table. Any web address that includes gamer will be blocked. 48 7 Wireless 7.1 Wireless Network This page shows the current status of the device's Wireless settings. Access Point / WDS AP / Router mode:
49 Wireless Network (Access Point / WDS AP / Router mode) Wireless Mode Channel HT Mode Wireless mode supports 802.11b/g/n mixed mode. The default channel bandwidth is 20/40MHz. The larger the channel, the better the transmission quality and speed. Select upper or lower channel. Your selection may affect the Auto channel function. Select the channel and frequency appropriate for your countrys regulation. Check this option to enable auto-channel selection. AP Detection can select the best channel to use by scanning nearby areas for Access Points. Configure up to four different SSIDs. If many client devices will be accessing the network, you can arrange the devices into SSID groups. Click [Edit] to configure the profile and check whether you want to enable extra SSID. Restricted client to communicate with different VID by selecting the radio button. Click [Accept] to confirm the changes or [Cancel] to cancel and return previous settings. Extension Channel Channel / Frequency Auto AP Detection Current Profile Profile Isolation Accept / Cancel SSID Profile 50 SSID Profile SSID VLAN ID Suppressed SSID Specify the SSID for the current profile. Specify the VLAN tag for the current profile. Check this option to hide the SSID from clients. If checked, the SSID will not appear in the site survey. Click the appropriate radio button to allow or prevent communication between client devices. See the Wireless Security section. Click [Save] to accept the changes or [Cancel] to cancel and return previous settings. Station Separation Wireless Security Save / Cancel Client Bridge / Client Router / WDS Station / Repeater mode:
51 Wireless Network (Client Bridge / Client Router / WDS Station / Repeater mode) Wireless Mode SSID Wireless mode supports 802.11b/g/n mixed mode. The SSID is a unique named shared amongst all the points of the wireless network. The SSID must be identical on all points of the wireless network and cannot exceed 32 characters. You may specify an SSID or select one from the Site Survey. Click on Site Survey to search the existing Access Points. Specify the BSSID (Access Points MAC address). The encryption is using. Its must the same as Access Points encryption. Click [Accept] to confirm the changes or [Cancel] to cancel and return previous settings. Site Survey Preferred BSSID Wireless Security Accept / Cancel 52 7.2 Wireless Security The Wireless Security section lets you configure the ECB350's security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2, and WPA Mixed. We strongly recommend you use WPA2-PSK. WEP Encryption:
Select Open System or Shared Key. ASCII: regular text (recommended) HEX: for advanced users Select the desired option, and ensure the wireless clients use the same setting. Choices are 64, 128, 152-bit password lengths. Select the key you wish to be the default. Transmitted data is ALWAYS encrypted using the Default Key; the other Keys are for decryption only. You must enter a Key Value for the Default Key. Enter the key value or values you wish to use. Only the Key selected as Default is required. The WEP Encryption Auth Type Input type Key Length Default Key Encryption Key #
53 others are optional. WPA-PSK (WPA Pre-Shared Key) Encryption:
WPA-PSK (WPA Pre-Shared Key) Encryption Encryption Passphrase Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings. Wireless clients must use the same key to associate the device. If using passphrase format, the Key must be from 8 to 63 characters in length. Group Key Update Interval Specify how often, in seconds, the group key changes. WPA Encryption: Only in Access Point / WDS AP / Router mode 54 WPA Encryption Encryption Radius Server Radius Port Radius Secret Group Key Update Interval Specify how often, in seconds, the group key changes. Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings. Enter the IP address of the Radius Server Enter the port number used for connections to the Radius server. Enter the secret required to connect to the Radius server. Note: 802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11g. 55 7.3 Site Survey Use this feature to scan nearby Access Points. Note: Only in Client Bridge, Client Router and Repeater mode. 1. Click Site Survey. 2. Scanning the nearby Access Points 56 3. Access Point list after site survey Site Survey (Client Bridge / Client Router / Repeater mode) 57 BSSID SSID Channel Signal Level (dBm) Type Security Refresh Access Point's wireless MAC address. SSID that the Access Point is broadcasting. Channel that the Access Point is using. Signal strength from the Access Point to your station. The band that the Access Point is using. Encryption method that the Access Point is using to secure data over the WLAN. Click Refresh to rescan nearby Access Point. 4. Select an Access Point and click that Access Points BSSID. 5. Enter the correct security setting. 58 59 7.4 Wireless MAC Filter Wireless MAC Filters are used to allow or deny network access to wireless clients according to their MAC addresses. You can manually add a MAC address to restrict the permission to access ECB350. The default setting is Disable Wireless MAC Filter. Note: Only in Access Point, WDS AP and Router mode. Wireless Filter (Access Point / WDS AP / Router mode) ACL Mode Determines whether network access is granted or denied to clients whose MAC addresses appear in the MAC Address table on this page. Choices are Disable, Deny MAC in the list, or Allow MAC in the list. Enter the MAC address of the wireless client. Click Add to add the MAC address to the MAC Address table. Delete the selected entries. Click Apply to apply the changes. MAC Address Add Delete Apply 60 7.5 Wireless Advanced This page allows you to configure wireless advance settings. It is recommended the default settings are used unless the user has experience with these functions. Wireless Advanced 61 Data Rate RTS/CTS Threshold Distance Aggregation Select a data rate from the drop-down list. The data rate affects throughput. If you select a low data rate value, for example, the throughput is reduced but the transmission distance increases. Specify the threshold package size for RTC/CTS. A small number causes RTS/CTS packets to be sent more often and consumes more bandwidth. Specify the distance between Access Points and clients. Longer distances may drop high-speed connections. Merges data packets into one packet. This option reduces the number of packets, but increases packet sizes. Check this option to enable wireless traffic shaping. Traffic shaping regulates the flow of packets leaving an interface to deliver improved Quality of Service. Wireless Traffic Shaping Incoming Traffic Limit Specify the wireless transmission speed used for downloading. Outgoing Traffic Limit Specify the wireless transmission speed used for uploading. Accept / Cancel Click [Accept] to confirm the changes or [Cancel] to cancel and return previous settings. 62 7.6 WPS (Wi-Fi Protected Setup) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi networks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable security. Note: Only in Access Point, WDS AP and Router mode. Wi-Fi Protected Setup (WPS) 63 WPS WPS Current Status Self Pin Code SSID Authentication Mode Passphrase Key WPS Via Push Button WPS Via PIN Select Enable or Disable the WPS feature. Shows whether the WPS function is Configured or unConfigured. Configured means that WPS has been used to authorize connection between the device and wireless clients. The PIN code of this device. The SSID (wireless network name) used when connecting using WPS. Shows the encryption method used by the WPS process. This is the passphrase key that is randomly generated during the WPS process. It is required if wireless clients that do not support WPS attempts to connect to the wireless network. Click this button to initialize WPS feature using the push button method. Enter the PIN code of the wireless device and click this button to initialize WPS feature using the PIN method. 64 7.7 WDS Link Settings Using WDS (Wireless Distribution System) to connect Access Point wirelessly, and in doing so extend a wired infrastructure to locations where cabling is not possible or inefficient to implement. Note that compatibility between different brands and models is not guaranteed. It is recommended that the WDS network be created using the same models for maximum compatibility. Also note that all Access Points in the WDS network needs to use the same Channel and Security settings. To create a WDS network, please enter the MAC addresses of the Access Points that you want included in the WDS. There can be a maximum of four access points. Note: Only in WDS AP and WDS Bridge mode. Enter the Access Points MAC address to which you want to extend the wireless area. WDS Link Settings MAC Address 65 Mode Accept / Cancel Select Disable or Enable from the drop-down list. Click [Accept] to confirm the changes or [Cancel] to cancel and return previous settings. 66 8 Management 8.1 Administration This page allows you to change the system password and to configure remote access. By default, the user name is admin and the password is: admin. Password can contain 0 to 12 alphanumeric characters and are case sensitive. Note: Remote Access is only in AP Router and Client Router mode. Enter a new username for logging in to the Web Configurator. Enter a new password for logging in to the Web Configurator. Re-enter the new password for confirmation. Click Save/Apply to apply the changes or Cancel to return previous settings. Change Password Name Password Confirm Password Save/Apply / Cancel Remote Access (only in AP Router and Client Router mode) Remote Management Remote Upgrade Remote Management Port Enable or disable remote management. Specify whether the firmware can be upgraded remotely. If remote management is enabled, enter the port number to be used for remote management. For example: If you specify the port number 8080, enter http://<IP address>:8080 to access the device Web Configurator. 67 8.2 Management VLAN This page allows you to assign a VLAN tag to the packets. A VLAN is a group of computers on a network whose software has been configured so that they behave as if they were on a separate Local Area Network (LAN). Computers on VLAN do not have to be physically located next to one another on the LAN. Note: Only in Access Point and WDS AP mode. Management VLAN (Only in Access Point mode) Management VLAN ID Accept / Cancel If your network includes VLANs and if tagged packets need to pass through the Access Point, enter the VLAN ID. Otherwise, click No VLAN tag. Click Accept to confirm the changes or Cancel to cancel and return previous settings. Note:
1. If you reconfigure the Management VLAN ID, you may lose your connection to the ECB350. Verify that the DHCP server supports the reconfigured VLAN ID and then reconnect to the ECB350 using the new IP address. 2. Clicking Accept does not apply the changes. To apply them, use Status > Save/Load (see section 4.1). 68 8.3 SNMP Settings This page allows you to assign the contact details, location, community name and trap settings for SNMP. This is a networking management protocol used to monitor network-attached devices. SNMP allows messages (called protocol data units) to be sent to various parts of a network. Upon receiving these messages, SNMP-compatible devices (called agents) return data stored in their Management Information Bases. Enable or disable SNMP feature. Specify the contact details of the device Specify the location of the device. Specify the password for access the SNMP community for read only access. Specify the password for access to the SNMP community with read/write access. SNMP SNMP Enable/Disable Contact Location Community Name (Read Only) Community Name
(Read/Write) 69 Trap Trap Destination Address Trap Destination Community Name Specify the IP address of the computer that will receive the SNMP traps. Specify the password for the SNMP trap community. 70 8.4 Backup/Restore This page allows you to save the current device configurations. When you save the configurations, you also can re-load the saved configurations into the device through the [Restore Saved Settings from A File]. If extreme problems occur you can use the [Revert to Factory Default Settings] to set all configurations to its original default settings. Click [Backup] to save the current configured settings. To restore settings that have been previously backed up, click [Browse], select the file, and click [Restore]. Click [Factory Default] button to restore the ECB350 to its factory default settings. Backup/Restore Save A Copy of Current Settings Restore Saved Settings from A File Revert to Factory Default Settings 71 8.5 Firmware Upgrade This page allows you to upgrade the device's firmware. To perform the Firmware Upgrade:
1. Click the [Browse] button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the [Upload] button to commence the firmware upgrade. Note: The device is unavailable during the upgrade process, and must restart when the upgrade is completed. Any connections to or through the device will be lost. 72 8.6 Time Setting This page allows you to set the system time. Time Manually Set Date and Time Manually specify the date and time. Automatically Get Date and Time Select a time zone from the drop-down list and check whether you want to enter the IP address of an NTP server or use the default NTP server. 73 8.7 Log This page allows you to setup Syslog and local log functions. Log Enable or disable the syslog function. Syslog Log Server IP Address Enter the IP address of the log server. Enable or disable the local log service. Local Log Click Save/Apply to apply the changes or Cancel to return previous settings. Save/Apply / Cancel 74 8.8 Diagnosis This page allows you to ascertain connection quality and trace the routing table to the target. Enter the IP address you would like to search. Enter the packet size of each ping. Enter the number of times you want to ping. Click [Start Ping] to begin pinging. Enter an IP address or domain name you want to trace. Click [Start Traceroute] to begin the trace route operation. Diagnosis Target IP Ping Packet Size Number of Pings Start Ping Traceroute Target Start Traceroute 75 8.9 LED Control This page allows you to control LED on/off for Power, LAN interface and WLAN interface. 76 8.10 Logout Click [Logout] in Management menu to logout. 77 8.11 Reset In some circumstances it may be required to force the device to reboot. Click on [Reboot the Device] to reboot. 78 9 Building a Wireless Network With its ability to operate in various operating modes, your ECB350 is the ideal device around which you can build your WLAN. This chapter describes how to build a WLAN around your ECB350 using this devices operating modes. 9.1 Client Bridge Mode In Client Bridge Mode, the ECB350 acts as a wireless dongle that connects to an Access Point to gain wireless access to the Internet. This mode requires you to connect the Ethernet port on your PC to the ECB350 LAN port. If you use the client bridge operating mode, use the ECB350 Site Survey feature to scan for Access Points within range. When you find an Access Point, configure the ECB350 to use the same SSID and Security Password as the Access Point to associate with it. 9.2 Access Point Mode In Access Point Mode, ECB350 behaves likes a central connection for stations or clients that support IEEE 802.11b/g/n 79 networks. Stations and client must be configured to use the same SSID and security password to associate with the ECB350. The ECB350 supports four SSIDs at the same time for secure guest access. 80 9.3 Access Point Mode with WDS Function (WDS AP mode) The ECB350 also supports WDS AP mode. This operating mode allows wireless connections to the ECB350 using WDS technology. In this mode, configure the MAC addresses in both Access Points to enlarge the wireless area by enabling WDS Link settings. WDS supports four AP MAC addresses. 81 9.4 WDS Bridge Mode In WDS Bridge Mode, the ECB350 can wirelessly connect different LANs by configuring the MAC address and security settings of each ECB350 device. Use this mode when two wired LANs located a small distance apart want to communicate with each other. The best solution is to use the ECB350 to wirelessly connect two wired LANs, as shown in the following figure. WDS Bridge Mode can establish four WDS links, creating a star-like network. Note: WDS Bridge Mode is unlike Access Point. Access Points linked by WDS are using the same frequency channel, more Access Points connected together may lower throughput. Please be aware to avoid loop in your wireless connection, otherwise enable Spanning Tree Function. 82 9.5 Repeater mode Repeater is used to regenerate or replicate signals that are weakened or distorted by transmission over long distances and through areas with high levels of electromagnetic interference (EMI). Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Increase the separation between the equipment and receiver.
- Reorient or relocate the receiving antenna.
-
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Note: The country code selection is for non-US model only and is not available to all US model. Per FCC regulation, all WiFi product marketed in US must fixed to US operation channels only. 83 84 Appendix B IC Interference Statement Industry Canada statement:
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage prjudiciable, et (2) ce dispositif doit accepter tout brouillage reu, y compris un brouillage susceptible de provoquer un fonctionnement indsirable. IMPORTANT NOTE:
Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. NOTE IMPORTANTE: (Pour l'utilisation de dispositifs mobiles) Dclaration d'exposition aux radiations:
Cet quipement est conforme aux limites d'exposition aux rayonnements IC tablies pour un environnement non contrl. Cet quipement doit tre install et utilis avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. This device has been designed to operate with a diople antenna have a maximum gain of [5] dB. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. This radio transmitter (IC: 10103A-ECB350 / Model: ECB350) has been approved by Industry Canada to operate with the antenna type, maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this users manual, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. Ce dispositif a t conu pour fonctionner avec une antenne ayant un gain maximal de diople antenne avec dB [5]. Une antenne gain plus lev est strictement interdite par les rglements d'Industrie Canada. L'impdance d'antenne requise est de 50 ohms. 85 Conformment la rglementation d'Industrie Canada, le prsent metteur radio peutfonctionner avec une antenne d'un type et d'un gain maximal (ou infrieur) approuv pourl'metteur par Industrie Canada. Dans le but de rduire les risques de brouillage radiolectrique l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que lapuissance isotrope rayonne quivalente (p.i.r.e.) ne dpasse pas l'intensit ncessaire l'tablissement d'une communication satisfaisante. Le prsent metteur radio (IC: 10103A-ECB350 / Modle: ECB350) a t approuv par Industrie Canada pour fonctionner avec les types d'antenne numrs ci-dessous et ayant un gain admissible maximal et l'impdance requise pour chaque type d'antenne. Les types d'antenne non inclus dans cette liste, ou dont le gain est suprieur au gain maximal indiqu, sont strictement interdits pour l'exploitation de l'metteur. 86 Appendix C CE Interference Statement Europe EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC:
- EN60950-1:2006 A11:2009+A1:2010
- Safety of Information Technology Equipment
- EN50385 : 2002
- Generic standard to demonstrate the compliance of electronic and electrical apparatus with the basic restrictions related to human exposure to electromagnetic fields (0 Hz - 300 GHz)
- EN 300 328 V1.7.1: 2006-10
- Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation techniques; Harmonized EN covering essential requirements under article 3.2 of the R&TTE Directive
- EN 301 489-1 V1.8.1: 2008-04
- Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements
- EN 301 489-17 V2.1.1 2009-05
- Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries, except in France and Italy where restrictive use applies. In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services. This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 2483.5 MHz. For detailed information the end-user should contact the national spectrum authority in France. 87 0560 esky [Czech]
Dansk [Danish]
Deutsch [German]
Eesti [Estonian]
English Espaol [Spanish]
[Greek]
Franais [French]
Italiano [Italian]
Latviski [Latvian]
Lietuvi [Lithuanian]
[Jmno vrobce] tmto prohlauje, e tento [typ zazen] je ve shod se zkladnmi poadavky a dalmi pslunmi ustanovenmi smrnice 1999/5/ES. Undertegnede [fabrikantens navn] erklrer herved, at flgende udstyr [udstyrets typebetegnelse] overholder de vsentlige krav og vrige relevante krav i direktiv 1999/5/EF. Hiermit erklrt [Name des Herstellers], dass sich das Gert [Gertetyp] in bereinstimmung mit den grundlegenden Anforderungen und den brigen einschlgigen Bestimmungen der Richtlinie 1999/5/EG befindet. Kesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tp = type of equipment] vastavust direktiivi 1999/5/E phinuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele stetele. Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Por medio de la presente [nombre del fabricante] declara que el [clase de equipo] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
[name of manufacturer] [type of equipment]
1999/5/. Par la prsente [nom du fabricant] dclare que l'appareil [type d'appareil] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio]
conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar o [name of manufacturer / izgatavotja nosaukums] deklar, ka [type of equipment /
iekrtas tips] atbilst Direktvas 1999/5/EK btiskajm prasbm un citiem ar to saisttajiem noteikumiem. iuo [manufacturer name] deklaruoja, kad is [equipment type] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in overeenstemming is met de essentile eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma mal-
tiijiet essenzjali u ma provvedimenti orajn relevanti li hemm fid-Dirrettiva 1999/5/EC. Alulrott, [gyrt neve] nyilatkozom, hogy a [... tpus] megfelel a vonatkoz alapvet kvetelmnyeknek s az 1999/5/EC irnyelv egyb elrsainak. Niniejszym [nazwa producenta] owiadcza, e [nazwa wyrobu] jest zgodny z zasadniczymi wymogami oraz pozostaymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
[Nome do fabricante] declara que este [tipo de equipamento] est conforme com os requisitos essenciais e outras disposies da Directiva 1999/5/CE.
[Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi relevantnimi doloili direktive 1999/5/ES.
[Meno vrobcu] tmto vyhlasuje, e [typ zariadenia] spa zkladn poiadavky a vetky prslun ustanovenia Smernice 1999/5/ES.
[Valmistaja = manufacturer] vakuuttaa tten ett [type of equipment = laitteen tyyppimerkint] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen. Hrmed intygar [fretag] att denna [utrustningstyp] str I verensstmmelse med de vsentliga egenskapskrav och vriga relevanta bestmmelser som framgr av direktiv 1999/5/EG. 88 Nederlands [Dutch]
Malti [Maltese]
Magyar [Hungarian]
Polski [Polish]
Portugus
[Portuguese]
Slovensko [Slovenian]
Slovensky [Slovak]
Suomi [Finnish]
Svenska [Swedish]
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2012-01-11 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2012-01-11
|
||||
1 | Applicant's complete, legal business name |
EnGenius Technologies
|
||||
1 | FCC Registration Number (FRN) |
0021371836
|
||||
1 | Physical Address |
1580 Scenic Avenue
|
||||
1 |
Costa Mesa, CA
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@curtis-straus.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
A8J
|
||||
1 | Equipment Product Code |
ECB350
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
M**** L******
|
||||
1 | Title |
General Manager
|
||||
1 | Telephone Number |
888.7******** Extension:
|
||||
1 | Fax Number |
714.4********
|
||||
1 |
m******@engeniustech.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
G******** C******
|
||||
1 | Physical Address |
No. 19, Hwa Ya 2nd Rd., Kwei Shan Hsiang
|
||||
1 |
Taoyuan Hsien, 333
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
g******@tw.bureauveritas.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
N**** C****
|
||||
1 | Physical Address |
No. 19, Hwa Ya 2nd Rd., Kwei Shan Hsiang
|
||||
1 |
Taoyuan Hsien, 333
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
n******@tw.bureauveritas.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 11n Multi-Function Client Bridge | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power listed is the maximum combined conducted output power. End-users and responsible parties must be provided with operating and installation instructions to ensure RF exposure compliance. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 | Name |
R******** C****
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.5270000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC