all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
AP mode User Manual | Users Manual | 2.50 MiB | ||||
1 2 |
|
Bridge mode User Manual | Users Manual | 2.38 MiB | ||||
1 2 | Cover Letter(s) | |||||||
1 2 | External Photos | |||||||
1 2 | ID Label/Location Info | |||||||
1 2 | ID Label/Location Info | |||||||
1 2 | Internal Photos | |||||||
1 2 | Test Report | |||||||
1 2 | Parts List/Tune Up Info | |||||||
1 2 | Cover Letter(s) | |||||||
1 2 | ID Label/Location Info | |||||||
1 2 | ID Label/Location Info | |||||||
1 2 | Cover Letter(s) | |||||||
1 2 | Test Setup Photos | |||||||
1 2 | Cover Letter(s) |
1 2 | AP mode User Manual | Users Manual | 2.50 MiB |
The information contained in this manual has been verified at the time of this manual's printing. The manufacturer reserves the right to make any changes and improvements in the product described in this manual at any time and without notice. All registered trademarks are the property of their respective owners. Copyright 2003 All rights reserved. No reproduction of this document in any form is permitted without prior written authorization from the manufacturer. 3 Chapter 1: Introduction The WP-300U acts as a high performance 802.11g access point and also support bridge mode to enable multiple wired Ethernet client access to wireless environments. The WP-300U also provides convenient WLAN access to office/family users with connection speeds up to 54Mbps. Support Wi-Fi Protected Access standard to provide higher level of security for network data and communication. Optional 802.3af capability enriches possible application for installation. The WP-300U is also fully compatible with IEEE 802.11b standard, so it connects with all existing 802.11b-compliant devices. 1.1 Features
Easy to use Web Browser-Based configuration
Built-in high speed RISC CPU for better performance. It will help for better third-party review comment and benefit the sell-through
Compact size for home user
Detachable SMA type antenna
Acts as the workgroup bridge between wired Ethernet clients and wireless 802.11g
Support latest WPA security feature (Bridge mode support WPA PSK only) 1.2 Package Contents Before installing the WP-300U, please verify that you have all the items listed as below. If any of the items are missing or damaged, please contact us. Also be sure you have all the necessary tools and cabling before installing the WP-300U. 4 The Package includes:
One WP-300U
Power adapter
Users Guide( Wireless Access Point & Workgroup Bridge)
Warronty Card
Quick Install Guide 1.3 Description of Hardware The following figures show the back panels of this Access Point:
Reset Button While the user has the trouble of negotiation with WirelessLAN, pressing the Reset button for system refresh, pressing the Reset button for system reset to default settings. LAN Ports For linking computers or other Ethernet devices, e.g. a hub/switch Uplink/PC Switch For connect to the Ethernet port of hub/switch,select the switch to Uplink. If not, switch to PC. Power (DC 5V) Used to connect the external power adapter supplied with the Access Point. Note that only the supplied adapter should be used. 5 1.4 LEDs The LEDs are indicators of switch activity and performance. Table 1 shows the location of the LEDs. You can check each connection by viewing the port status indicators shown in the following table. LED Power Status Description Green, On Power is supplied to the device Off Power is disconnected WLAN Green, On WLAN On Link/Activity LAN Link/Act Blinking transmitting data to the wireless LAN Off Green, On from the Access Point No data transferred Good Link Blinking Receiving/transmitting data at 100M Table 1: LEDs Indicators 6 Chapter 2: Installation 2.1 Making a Connection 1. 2. 3. Connect to a hub/switch Use a standard Ethernet RJ-45 cable. Check the Link/Act LED of LAN port on front panel, it must be on. If not, to ensure that the cable is connected properly. Connect the power adapter. Attention:
1. The cable distance between the Router and PC/hub/
Switch should not exceed 100 meters. 2. Make sure the wiring is correct. In10Mbps operation, Category 3/4/5 cable can be used for connection. To reliably operate your network at 100Mbps, you must use Category 5 cable, or better Data Grade. 2.1.1 Setup Uplink-PC slide switch 1. For connecting to a hub/switch, select the switch to Uplink. 2. For connecting to a PC, select the switch to PC. 7 2.2 Verify the IP address setting Your need to configure your PC s network settings to an IP address. Computer use IP addresses to communicate with each other across a network, such as the Internet. 1. From the taskbar, click the Start button, select Settings > Control Panel. From there, double-click the Network connections icon. 2. Right click the Local Area Connection icon Properties , select the TCP/IP line for the appli-
cable Ethernet adapter. Then, click the Properties button. 3. Click the IP Address tab page, select USE the following IP address, type 192.168.1.1~192.168. 1.254 ( but, 192.168.1.240 for this Access Point use) in the IP Address field and 255.255.255.0 in the Subnet Mask field, then click OK button. 8 2.3 Setup the Access Point under Windows Start Setup... 1. After getting the correct connection, start the web browser and type 192.168.1.240 in the address field. Press Enter. 2. Enter the factory default User name field and Password field are blank and click OK button. 9 2.3.1 Information Basic information about this access point. NOTE: You may have to reload this page to see the current settings. Figure 1: Information 10 2.3.2 Associations This is a list of MAC addresses of stations that have associ-
ated to the access point. NOTE: You may have to reload this page to see the current settings. Figure 2: Associations 11 2.3.3 Wireless Configuration On this page you can configure the basic 802.11g access point settings. Any new settings will not take effect until the access point is rebooted. Figure 3: Wireless Configuration Visibility Status
When Invisibility is selected, the AP is protected against discovery by wireless sniffers, and all wireless clients must explicitly know and use the SSID. PHY Profiles
These profiles control a number of settings for 12 overall wireless network usage. Their meanings are self-explanatory. For more details, please see Intersil documentation.
Wireless Network Name (SSID) This is the name of the access point on the wireless network. Stations that associate to this access point may have to know this name.
Channel IThis is the radio channel that the access point will operate on. If you experience interference (e.g. lost connections or slow data transfers) you may need to try different channels to see which is the best. Channels 1-11 are in the 2.4 GHz band.
Transmission rate (Mbits/s) This is the speed at which the access point will transmit data. Normally you should select best here, although if your wireless network is unusually noisy or quiet you may which to use a fixed low or high rate. 13 2.3.4 Access Control On this page you can enable Access Control. If enabled, only the MAC addresses entered into the MAC address boxes are allowed to associate to this AP. Note that you can cut and paste the addresses from the Station List page into the MAC address boxes. These changes are effective immediately. Figure 4: Access Control 14 2.3.5 Advanced Wireless On this page you can configure the advanced 802.11g access point settings. Any new settings will not take effect until the access point is rebooted. Figure 5: Advanced Wireless
Maximum associated stations This the maximum number of wireless stations that can be associated at any one time. 15
Fragmentation threshold Transmitted wireless packets larger than this size will be fragmented to maintain performance in noisy wireless networks.
RTS threshold Transmitted wireless packets larger than this size will use the RTS/CTS protocol to (a) maintain performance in noisy wireless networks and (b) prevent hidden nodes from degrading performance.
Beacon period Access point beacons are sent out periodically. This is the number of milliseconds between each beacon.
DTIM interval This is the number of beacons per DTIM (Delivery Traffic Indication Message), e.g. 1 means send a DTIM with each beacon, 2 means with every 2nd beacon, etc.
Maximum burst time This is also known as PRISM Nitro (tm) technology. The technology uses fully standards-
compliant methods that eliminate collisions in mixed-
mode networks, while greatly increasing the performance of both pure 802.11g and mixed 802. 11b/g networks. The setting is for the amount of time the radio will be reserved to send data without requiring an ACK. This number is in units of microseconds. A typical value would be 650 microseconds. When this number is zero, bursting is 16 disabled.
Enable PSM buffer Turn this on to enable support for stations in power save mode. 17 2.3.6 Security and Encryption Settings On this page you can set the 802.11g security and encryp-
tion options. Any new settings will not take effect until the access point is rebooted. Figure 6-1: Security and Encryption Settings(1) 18 Figure 6-2: Security and Encryption Settings(2)
WPA configuration Enable WPA Authenticator to require stations to use high grade encryption and authentication.
WPA Enable.
PSK Pass-phrase: Leave blank if stations will be sup-
plied a key by the 1X Authentication Server. Choose a pass-phrase between 8 and 63 characters.
WPA Multicast Cipher Type: Currently TKIP is the only permitted setting. 19
WPA Pairwise Cipher Type: Currently TKIP is the only permitted setting.
WPA Group Key Update Interval.
802.1X configuration When 802.1X authentication is enabled then the AP will authenticate clients via a remote RADIUS server.
802.1X Enable.
Authentication timeout(mins).
RADIUS server IP address.
RADIUS server port number.
RADIUS server shared secret.
MAC Address Authentication.
WEP configuration WEP is the wireless encryption standard. To use it you must enter the same key(s) into the access point and the wireless stations. For 64 bit keys you must enter 10 hex digits into each key box. For 128 bit keys you must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. If you leave a key box blank then this means a key of all zeros.
Enable WEP : Check this box to enable WEP. For the most secure use of WEP, also select Deny Unencrypted Data and set Authentication to Shared Key when WEP is enabled.
WEP key lengths: Select the key size. This length applies to all keys.
WEP key.
Default WEP key to use: Select the key to be used 20 as the default key. Data transmissions are always en-
crypted using the default key. The other keys can only be used to decrypt received data.
Deny unencrypted data: Select this to require peers to use encryption. This is only effective when WEP is enabled
Authentication: Open allows anyone to authenti-
cate to this access point. Shared key allows only sta-
tions that know the key(s) to authenticate. Both allows a station to use either mode. 21 2.3.7 IP Settings On this page you can configure the IP address used by the Web server running on this access point. For static mode, the IP address settings are given here. For DHCP mode, these set-
tings are supplied by a DHCP server on your network. Any new IP settings will not take effect until the access point is rebooted. Figure 7: IP Settings
IP Address Mode Select DHCP to get the IP settings from a DHCP server on your network. Select Static to use the IP settings specified on this page. 22
Default IP Address Type the IP address of your Access Point.
Default subnet mask The subnet mask specifies the network number portion of an IP address. The factory default is 255.255. 255.0.
Default gateway This is the IP address of the gateway that connects you to the internet.
Access point name This is the name that the access point will use to identify itself to external configuration and IP-address-
finding programs. This is not the same as the SSID. It is okay to leave this blank if you are not using these programs. 23 2.3.8 Administration On this page you can change the password, reboot the access point, or reset all settings to their factory defaults. If you have changed any settings it is necessary to reboot the access point for the new settings to take effect. Figure 8: Administration
User name This is the user name that you must type when logging in to these web pages.
administrator password This is the password that you must type when logging in to these web pages. You must enter the same 24 password into both boxes, for confirmation.
Commands
Reboot access point.
Reset to factory defaults.
Upgrade firmware The upload may take up to 60 seconds. 25 2.3.9 Help This is where some helpful information will go. There is nothing here right now. Figure 9: Help 26 Appendix I Specifications Standard support IEEE802.3, IEEE802.3u, IEEE802.11b, IEEE802.11g Interface Wireless IEEE 802.11b/g One 10/100 Mbps RJ-45 port Max. Band width Ethernet:
Full Duplex: 200Mbps (100BaseTX), 20 Mbps(10BaseT) Half Duplex: 100Mbps (100BaseTX), 10 Mbps(10BaseT) Wireless: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps, Auto Fall-Back SDRAM 1Mbit Flash 4Mbit Diagnostic LEDs Unit:
WLAN:
LAN:
Power (Green) 100M Link/Activity (Green) 100M Link/Act (Green) Wireless Radio Data Rate: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps Signal Frequency: 2.4Ghz to 2.5Ghz OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK, CCK Encryption: 64bit and 128bit WEP data encryption Channel:
America/FCC: 2.412~2.462 GHz (11 channels) Europe CE/ETSI: 2.412~2.472 GHz (13 channels) Japan: 2.412~2.484 GHz (14 channels) France: 2.457~2.472 GHz(4 channels) Spain: 2.457~2.462 GHz (2 channels) RF Power Output: 16 dBm@ 11Mbps/ 12dBm @54 Mbps
(typical) 27 Receiver Sensitivity: 54Mbps OFDM, 10% PER, -68dBm 11Mbps CCK, 8% PER, -84dBm Wireless Setting SSID Channel Selection Transmission Rate (Best, 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1) in Mbps Intersil PHY profiles
802.11g Max Performance,
802.11g only
802.11b/g Mixed
802.11b/g Mixed with Long Preamble
802.11b for Wi-Fi certification
802.11b only Fragment Threshold RTS Threshold Wireless Security WEP setting WEP Enabled (On or Off) WEP key Length(64-bit, 128 -bit) Default WEP key to use (1-4) WEP key (10 or 26 hex digits) Deny unencrpted data (On or Off) Authentication (Open, Shared Key, Both) WPA setting WPA Enabled (On or Off) PSK (up to 63 charactersof text) WPA Muticast Cipher Type (TKIP-WPA, None) WPA Pairwise Cipher Type (TKIP-WPA, None) Software / Firmware AP and Bridge mode support (Need different firmware) DHCP Client 28 WPA Support (Bridge mode support WPA PSK only) MAC Cloning (WLAN Card, Ethernet Client) Web-based configuration via popular browser (MS IE, Netscape...) Firmware download and upgrade via web server Reset to default by web server or hardware button Forwarding Mode Antenna Gain Max 1.91 dB store and foreard 29 Appendix II Glossary 802.11 standard 802.11, or IEEE 802.11, is a type of radio technology used for wireless local area networks (WLANs). It is a standard that has been developed by the IEEE (Institute of Electrical and Elec-
tronic Engineers), http://standards.ieee.org. The IEEE is an in-
ternational organization that develops standards for hundreds of electronic and electrical technologies. The organization uses a series of numbers, like the Dewey Decimal system in libraries, to differentiate between the various technology families. The 802 subgroup (of the IEEE) develops standards for local and wide area networks with the 802.11 section reviewing and creating standards for wireless local area networks. Wi-Fi , 802.11, is composed of several standards operating in different radio frequencies: 802.11b is a standard for wireless LANs operating in the 2.4 GHz spectrum with a bandwidth of 11 Mbps. Another standard, 802.11g, is for WLANS operating in the 2.4 GHz frequency but with a bandwidth of 54 Mbps. 30 802.11b International standard for wireless networking that operates in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and provides a throughput of up to 11 Mbps. This is a very commonly used frequency. Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth devices, all work within the 2.4 GHz frequency band. 802.11g Similar to 802.11b, but this standard provides a throughput of up to 54 Mbps. It also operates in the 2.4 GHz frequency band but uses a different radio technology in order to boost overall bandwidth. Access point A wireless LAN transceiver or base station that can connect a wired LAN to one or many wireless devices. Access points can also bridge to each other. There are various types of access points and base stations used in both wireless and wired networks. These include bridges, hubs, switches, routers and gateways. The differences between them are not always precise, because certain capabilities associ-
ated with one can also be added to another. For example, a router can do bridging, and a hub may also be a switch. But they are all involved in making sure data is transferred from one location to another. A bridge connects devices that all use the same kind of protocol. A router can connect networks that use differing protocols. It also reads the addresses included in the packets and routes them to the appropriate computer station, working with any other routers in the network to choose the best path to send the pack-
ets on. A wireless hub or access point adds a few capabilities 31 such as roaming and provides a network connection to a variety of clients, but it does not allocate bandwidth. A switch is a hub that has extra intelligence: It can read the address of a packet and send it to the appropriate computer station. A wireless gate-
way is an access point that provides additional capabilities such as NAT routing, DHCP, firewalls, security, etc. AES (Advanced Encryption Standard) A chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compared with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hard-
ware level. DHCP Dynamic Host Configuration Protocol. This protocol automati-
cally configures the TCP/IP settings of every computer on your home network. Encryption key An alphanumeric (letters and/or numbers) series that enables data to be encrypted and then decrypted so it can be safely shared among members of a network. WEP uses an encryption key that automatically encrypts outgoing wireless data. On the receiving side, the same encryption key enables the computer to automatically decrypt the information so it can be read. Ethernet A standard for computer networks. Ethernet networks are con-
32 nected by special cables and hubs, and move data around at up to 100 million bits per second (Mbps). ESSID The identifying name of an 802.11 wireless network. When you specify your correct ESSID in your client setup you ensure that you connect to your wireless network rather than another network in range. (See SSID.) The ESSID can be called by dif-
ferent terms, such as Network Name, Preferred Network, SSID or Wireless LAN Service Area. Gateway In the wireless world, a gateway is an access point with addi-
tional software capabilities such as providing NAT and DHCP. Gateways may also provide VPN support, roaming, firewalls, various levels of security, etc. IEEE802.11 A set of specifications for LANs from The Institute of Electrical and Electronics Engineers (IEEE). Most wired networks con-
form to 802.3, the specification for CSMA/CD based Ethernet networks or 802.5, the specification for token ring networks. 802.11 defines the standard for wireless LANs encompassing three incompatible (non-interoperable) technologies: Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS) and Infrared. WECAs focus is on 802.11b, an 11 Mbps high-rate DSSS standard for wireless networks. IP Address IP stands for Internet Protocol. An IP address consists of a series of four numbers separated by periods, that identifies an single, unique Internet computer host. Example: 192.34.45.8. 33 ISP Gateway Address (see ISP for definition). The ISP Gateway Address is an IP address for the Internet router located at the ISPs office. This address is required only when using a cable or DSL modem. ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations. LAN Local Area Network. A LAN is a group of computers and de-
vices connected together in a relatively small area (such as a house or an office). Your home network is considered a LAN. MAC Every wireless 802.11 device has its own specific MAC ad-
dress hard-coded into it. This unique identifier can be used to provide security for wireless networks. When a network uses a MAC table, only the 802.11 radios that have had their MAC ad-
dresses added to that networks MAC table will be able to get onto the network. MAC Address MAC stands for Media Access Control. A MAC address is the hardware address of a device connected to a network. Peer-to-peer network A wireless or wired computer network that has no server or central hub or router. All the networked PCs are equally able to act as a network server or client, and each client computer can talk to all the other wireless computers without having to go through an access point or hub. However, since there is no cen-
tral base station to monitor traffic or provide Internet access, the 34 various signals can collide with each other, reducing overall performance. SSID A 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mo-
bile device tries to connect to the BSS. (Also called ESSID.) The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plain text from a packet, it does not supply any security to the network. An SSID is also referred to as a Network Name because essentially it is a name that identifies a wireless network. Subnet Mask A subnet mask, which may be a part of the TCP/IP informa-
tion provided by your ISP, is a set of four numbers configured like an IP address. It is used to create IP address numbers used only within a particular network (as opposed to valid IP address numbers recognized by the Internet. TCP/IP Transmission Control Protocol/Internet Protocol. This is the standard protocol for data transmission over the Internet. TKIP The TKIP (Temporal Key Integrity Protocol), pronounced tee-
kip, is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP used to secure 802.11 wireless LANs.TKIP provides per-packet key mixing, a message 35 integrity check and a re-keying mechanism, thus fixing the flaws of WEP. WAN A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network. A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network . WEP WEP (Wired Equivalent Privacy) is 802.11s optional encryp-
tion standard implemented in the MAC layer that most radio network interface card (NIC) and access point vendors support. Basic wireless security provided by Wi-Fi. In some instances, WEP may be all a home or small-business user needs to protect wireless data. WEP is available in 40-bit (also called 64-bit), or in 108-bit (also called 128-bit) encryption modes. As 108-bit en-
cryption provides a longer algorithm that takes longer to decode, it can provide better security than basic 40-bit (64-bit) encryption. Wi-Fi An interoperability certification for wireless local area net-
work (LAN) products based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. WLAN Also referred to as LAN. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. 36 WPA WPA is a standards-based, interoperable security specification that utilizes Temporal Key Integrity Protocol to provide im-
proved over-the-air encryption of wireless data. 37
1 2 | Bridge mode User Manual | Users Manual | 2.38 MiB |
The information contained in this manual has been verified at the time of this manual's printing. The manufacturer reserves the right to make any changes and improvements in the product described in this manual at any time and without notice. All registered trademarks are the property of their respective owners. Copyright 2003 All rights reserved. No reproduction of this document in any form is permitted without prior written authorization from the manufacturer. 3 Chapter 1: Introduction The WP-300U acts as a high performance 802.11g access point and also support bridge mode to enable multiple wired Ethernet client access to wireless environments. The WP-300U also provides convenient WLAN access to office/family users with connection speeds up to 54Mbps. Support Wi-Fi Protected Access standard to provide higher level of security for network data and communication. Optional 802.3af capability enriches possible application for installation. The WP-300U is also fully compatible with IEEE 802.11b standard, so it connects with all existing 802.11b-compliant devices. 1.1 Features
Easy to use Web Browser-Based configuration
Built-in high speed RISC CPU for better performance. It will help for better third-party review comment and benefit the sell-through
Compact size for home user
Detachable SMA type antenna
Acts as the workgroup bridge between wired Ethernet clients and wireless 802.11g
Support latest WPA security feature (Bridge mode support WPA PSK only) 1.2 Package Contents Before installing the WP-300U, please verify that you have all the items listed as below. If any of the items are missing or damaged, please contact us. Also be sure you have all the necessary tools and cabling before installing the WP-300U. 4 The Package includes:
One WP-300U
Power adapter
Users Guide( Wireless Access Point & Workgroup Bridge)
Warronty Card
Quick Install Guide 1.3 Description of Hardware The following figures show the back panels of the WP-300U:
Reset Button While the user has the trouble of negotiation with WirelessLAN, pressing the Reset button for system refresh, pressing the Reset button for system reset to default settings. LAN Ports For linking computers or other Ethernet devices, e.g. a hub/switch Uplink/PC Switch For connect to the Ethernet port of hub/switch,select the switch to Uplink. If not, switch to PC. Power (DC 5V) Used to connect the external power adapter supplied with the Access Point. Note that only the supplied adapter should be used. 5 1.4 LEDs The LEDs are indicators of switch activity and performance. Table 1 shows the location of the LEDs. You can check each connection by viewing the port status indicators shown in the following table. LED Power Status Description Green, On Power is supplied to the device Off Power is disconnected WLAN Green, On WLAN On Link/Activity LAN Link/Act Blinking transmitting data to the wireless LAN Off Green, On from the Access Point No data transferred Good Link Blinking Receiving/transmitting data at 100M Table 1: LEDs Indicators 6 Chapter 2: Installation 2.1 Making a Connection 1. 2. 3. Connect to a PC Use a standard Ethernet RJ-45 cable. Check the Link/Act LED of LAN port on front panel, it must be on. If not, to ensure that the cable is connected properly. Connect the power adapter. Attention:
1. The cable distance between the Router and PC/hub/
Switch should not exceed 100 meters. 2. Make sure the wiring is correct. In 10Mbps operation, Category 3/4/5 cable can be used for connection. To reliably operate your network at 100Mbps, you must use Category 5 cable, or better Data Grade. 2.1.1 Setup Uplink-PC slide switch 1. For connecting to a PC, select the switch to PC. 2. For connecting to a hub/switch, select the switch to Uplink. 7 2.2 Verify the IP address setting Your need to configure your PC s network settings to an IP address. Computer use IP addresses to communicate with each other across a network, such as the Internet. 1. From the taskbar, click the Start button, select Settings > Control Panel. From there, double-click the Network connections icon. 2. Right click the Local Area Connection icon Properties , select the TCP/IP line for the appli-
cable Ethernet adapter. Then, click the Properties button. 3. Click the IP Address tab page, select USE the following IP address, type 192.168.1.1~192.168. 1.254 ( but, 192.168.1.240 for this Access Point use) in the IP Address field and 255.255.255.0 in the Subnet Mask field, then click OK button. 8 2.3 Setup the Workgroup Bridge under Windows Start Setup... 1. After getting the correct connection, start the web browser and type 192.168.1.240 in the address field. Press Enter. 2. Enter the factory default User name field and Password field are blank and click OK button. 9 2.3.1 Information Basic information about this bridge. NOTE: You may have to reload this page to see the current settings. Figure 1: Information 10 2.3.2 Basic Wireless On this page you can configure the basic 802.11g wireless settings. Any new settings will not take effect until the bridge is rebooted. Figure 2: Basic Wireless
Wireless Network Type Select Infrastructure to connect to a wireless access point, select Ad-hoc to connect to another bridge or wireless station.
Wireless Network Name (SSID) 11 This is the name of the wireless access point that this bridge will associate to. Leave this field blank to associate to any access point. Desired BSSID
This provides manual selection for the desired Access Point to join with. The SSID for the Access Point still has to match. You can copy and paste the desired MAC address from the Info page. Channel
This is the radio channel that is used in ad-hoc mode. This setting has no effect in infrastructure mode. If you experience interference (e.g. lost connections or slow data transfers) you may need to try different channels to see which is the best. Transmission rate (Mbits/s)
This is the speed at which the bridge will transmit data. Normally you should select best here, although if your wireless network is unusually noisy or quiet you may which to use a fixed low or high rate.
Wireless Mode Wireless mode allows the user to select whether this Bridge will connect to an 802.11g only network, an 802.11b only network, or both types of networks. 12 2.3.3 Security and Encryption Settings On this page you can set the 802.11g security and encryp-
tion options. Any new settings will not take effect until the bridge is rebooted. Figure 3: Security and Encryption Settings 13
WPA configuration Enable WPA Authenticator to require stations to use high grade encryption and authentication.
WPA Enable.
PSK: Enter a text pass phrase up to 63 characters.
WPA Multicast Cipher Type: Currently TKIP is the only permitted setting.
WPA Pairwise Cipher Type: Currently TKIP is the only permitted setting.
WPA Group Key Update Interval.
WEP configuration WEP is the wireless encryption standard. To use it you must enter the same key(s) into the bridge and the access point. For 64 bit keys you must enter 10 hex digits into each key box. For 128 bit keys you must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. If you leave a key box blank then this means a key of all zeros.
Enable WEP : Check this box to enable WEP. For the most secure use of WEP, also select Deny Unencrypted Data and set Authentication to Shared Key when WEP is enabled.
WEP key lengths: Select the WEP key size. This length applies to all keys.
Default WEP key to use: Select the key to be used as the default key. Data transmissions are always en-
crypted using the default key. The other keys can only be used to decrypt received data.
WEP key. 14
Deny unencrypted data: SSelect this to require peers to use encryption. This is only effective when WEP is enabled.
Authentication: Select the type of authentication used when connecting to an access point. Open is used if anyone can connect to the AP. Shared key is used if both devices must know the encryption key. 15 2.3.4 Advanced On this page you can configure the advanced 802.11g wireless settings. Any new settings will not take effect until the bridge is rebooted. Figure 4: Advanced 16
Cloning Mode This feature controls the MAC Address of the Bridge as seen by other devices (wired or wireless). If set to Ethernet Client, the MAC Address from the first Ethernet client that transmits data through the Bridge will be used. This setting is useful when connected to an Xbox or if there is only one Ethernet device connected to the bridge. When multiple Ethernet devices are connected to the Bridge, it may not be obvious which MAC Address is being used. If set to WLAN Card, the MAC Address of the WLAN Card (typically written on the back of the card) will be used. When multiple Ethernet devices are connected to the Bridge, the MAC Address of the Bridge will not change.
Fragmentation threshold Transmitted wireless packets larger than this size will be fragmented to maintain performance in noisy wireless networks.
RTS threshold Transmitted wireless packets larger than this size will use the RTS/CTS protocol to (a) maintain performance in noisy wireless networks and (b) prevent hidden nodes from degrading performance.
Maximum burst time This is also known as PRISM Nitro (tm) technology. The technology uses fully standards-
compliant methods that eliminate collisions in mixed-
17 802.11g and mixed mode networks, while greatly increasing the performance of both pure 802. 11b/g networks. The setting is for the amount of time the radio will be reserved to send data without requiring an ACK. This number is in units of microseconds. The optimized value for 802.11g only networks is 1400, and the optimized value for 802.11g + 802.11b mixed mode networks is 650. When this number is zero, bursting is disabled. 18 2.3.5 Administration On this page you can configure the IP address used by the Web server running on this bridge. For static mode, the IP address settings are given here. For DHCP mode, these settings are supplied by a DHCP server on your network. You can also change the password, reboot the bridge, or reset all settings to their factory defaults. If you have changed any settings it is necessary to reboot the bridge for the new set-
tings to take effect. Figure 5-1: Administration (1) 19 Figure 5-2: Administration (2)
Device name This is the name that the bridge will use to identify itself to external configuration and IP-address-finding programs. This is not the same as the SSID. It is okay to leave this blank if you are not using these programs.
IP settings
IP Address Mode: Select DHCP to get the IP set-
tings from a DHCP server on your network. Select Static to use the IP settings specified on this page. 20
Default IP address: Type the IP address of your bridge.
Default subnet mask: The subnet mask specifies the network number portion of an IP address. The fac-
tory default is 255.255.255.0.
Default gateway: This is the IP address of the gate-
way that connects you to the internet. The factory default is 192.168.1.1.
Security
User name: This is the user name that you must type when logging in to these web pages.
Administrator password: This is the password that you must type when logging in to these web pages. You must enter the same password into both boxes, for confirmation.
Commands
Reboot bridge.
Reset to factory defaults.
Upgrade firmware The upload may take up to 60 seconds. 21 2.3.6 Help This is where some helpful information will go. There is nothing here right now. 22 Appendix I Specifications Standard support IEEE802.3, IEEE802.3u, IEEE802.11b, IEEE802.11g Interface Wireless IEEE 802.11b/g One 10/100 Mbps RJ-45 port Max. Band width Ethernet:
Full Duplex: 200Mbps (100BaseTX), 20 Mbps(10BaseT) Half Duplex: 100Mbps (100BaseTX), 10 Mbps(10BaseT) Wireless: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps, Auto Fall-Back SDRAM 1Mbit Flash 4Mbit Diagnostic LEDs Unit:
WLAN:
LAN:
Power (Green) 100M Link/Activity (Green) 100M Link/Act (Green) Wireless Radio Data Rate: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps Signal Frequency: 2.4Ghz to 2.5Ghz OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK, CCK Encryption: 64bit and 128bit WEP data encryption Channel:
America/FCC: 2.412~2.462 GHz (11 channels) Europe CE/ETSI: 2.412~2.472 GHz (13 channels) Japan: 2.412~2.484 GHz (14 channels) France: 2.457~2.472 GHz(4 channels) Spain: 2.457~2.462 GHz (2 channels) RF Power Output: 16 dBm@ 11Mbps/ 12dBm @54 Mbps
(typical) 23 Receiver Sensitivity: 54Mbps OFDM, 10% PER, -68dBm 11Mbps CCK, 8% PER, -84dBm Wireless Setting SSID Channel Selection Transmission Rate (Best, 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1) in Mbps Intersil PHY profiles
802.11g Max Performance,
802.11g only
802.11b/g Mixed
802.11b/g Mixed with Long Preamble
802.11b for Wi-Fi certification
802.11b only Fragment Threshold RTS Threshold Wireless Security WEP setting WEP Enabled (On or Off) WEP key Length(64-bit, 128 -bit) Default WEP key to use (1-4) WEP key (10 or 26 hex digits) Deny unencrpted data (On or Off) Authentication (Open, Shared Key, Both) WPA setting WPA Enabled (On or Off) PSK (up to 63 charactersof text) WPA Muticast Cipher Type (TKIP-WPA, None) WPA Pairwise Cipher Type (TKIP-WPA, None) Software / Firmware AP and Bridge mode support (Need different firmware) DHCP Client 24 WPA Support (Bridge mode support WPA PSK only) MAC Cloning (WLAN Card, Ethernet Client) Web-based configuration via popular browser (MS IE, Netscape...) Firmware download and upgrade via web server Reset to default by web server or hardware button Forwarding Mode Antenna Gain Max 1.91 dB store and foreard 25 Appendix II Glossary 802.11 standard 802.11, or IEEE 802.11, is a type of radio technology used for wireless local area networks (WLANs). It is a standard that has been developed by the IEEE (Institute of Electrical and Elec-
tronic Engineers), http://standards.ieee.org. The IEEE is an in-
ternational organization that develops standards for hundreds of electronic and electrical technologies. The organization uses a series of numbers, like the Dewey Decimal system in libraries, to differentiate between the various technology families. The 802 subgroup (of the IEEE) develops standards for local and wide area networks with the 802.11 section reviewing and creating standards for wireless local area networks. Wi-Fi , 802.11, is composed of several standards operating in different radio frequencies: 802.11b is a standard for wireless LANs operating in the 2.4 GHz spectrum with a bandwidth of 11 Mbps. Another standard, 802.11g, is for WLANS operating in the 2.4 GHz frequency but with a bandwidth of 54 Mbps. 26 802.11b International standard for wireless networking that operates in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and provides a throughput of up to 11 Mbps. This is a very commonly used frequency. Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth devices, all work within the 2.4 GHz frequency band. 802.11g Similar to 802.11b, but this standard provides a throughput of up to 54 Mbps. It also operates in the 2.4 GHz frequency band but uses a different radio technology in order to boost overall bandwidth. Access point A wireless LAN transceiver or base station that can connect a wired LAN to one or many wireless devices. Access points can also bridge to each other. There are various types of access points and base stations used in both wireless and wired networks. These include bridges, hubs, switches, routers and gateways. The differences between them are not always precise, because certain capabilities associ-
ated with one can also be added to another. For example, a router can do bridging, and a hub may also be a switch. But they are all involved in making sure data is transferred from one location to another. A bridge connects devices that all use the same kind of protocol. A router can connect networks that use differing protocols. It also reads the addresses included in the packets and routes them to the appropriate computer station, working with any other routers in the network to choose the best path to send the pack-
ets on. A wireless hub or access point adds a few capabilities 27 such as roaming and provides a network connection to a variety of clients, but it does not allocate bandwidth. A switch is a hub that has extra intelligence: It can read the address of a packet and send it to the appropriate computer station. A wireless gate-
way is an access point that provides additional capabilities such as NAT routing, DHCP, firewalls, security, etc. AES (Advanced Encryption Standard) A chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compared with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hard-
ware level. DHCP Dynamic Host Configuration Protocol. This protocol automati-
cally configures the TCP/IP settings of every computer on your home network. Encryption key An alphanumeric (letters and/or numbers) series that enables data to be encrypted and then decrypted so it can be safely shared among members of a network. WEP uses an encryption key that automatically encrypts outgoing wireless data. On the receiving side, the same encryption key enables the computer to automatically decrypt the information so it can be read. Ethernet A standard for computer networks. Ethernet networks are con-
28 nected by special cables and hubs, and move data around at up to 100 million bits per second (Mbps). ESSID The identifying name of an 802.11 wireless network. When you specify your correct ESSID in your client setup you ensure that you connect to your wireless network rather than another network in range. (See SSID.) The ESSID can be called by dif-
ferent terms, such as Network Name, Preferred Network, SSID or Wireless LAN Service Area. Gateway In the wireless world, a gateway is an access point with addi-
tional software capabilities such as providing NAT and DHCP. Gateways may also provide VPN support, roaming, firewalls, various levels of security, etc. IEEE802.11 A set of specifications for LANs from The Institute of Electrical and Electronics Engineers (IEEE). Most wired networks con-
form to 802.3, the specification for CSMA/CD based Ethernet networks or 802.5, the specification for token ring networks. 802.11 defines the standard for wireless LANs encompassing three incompatible (non-interoperable) technologies: Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS) and Infrared. WECAs focus is on 802.11b, an 11 Mbps high-rate DSSS standard for wireless networks. IP Address IP stands for Internet Protocol. An IP address consists of a series of four numbers separated by periods, that identifies an single, unique Internet computer host. Example: 192.34.45.8. 29 ISP Gateway Address (see ISP for definition). The ISP Gateway Address is an IP address for the Internet router located at the ISPs office. This address is required only when using a cable or DSL modem. ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations. LAN Local Area Network. A LAN is a group of computers and de-
vices connected together in a relatively small area (such as a house or an office). Your home network is considered a LAN. MAC Every wireless 802.11 device has its own specific MAC ad-
dress hard-coded into it. This unique identifier can be used to provide security for wireless networks. When a network uses a MAC table, only the 802.11 radios that have had their MAC ad-
dresses added to that networks MAC table will be able to get onto the network. MAC Address MAC stands for Media Access Control. A MAC address is the hardware address of a device connected to a network. Peer-to-peer network A wireless or wired computer network that has no server or central hub or router. All the networked PCs are equally able to act as a network server or client, and each client computer can talk to all the other wireless computers without having to go through an access point or hub. However, since there is no cen-
tral base station to monitor traffic or provide Internet access, the 30 various signals can collide with each other, reducing overall performance. SSID A 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mo-
bile device tries to connect to the BSS. (Also called ESSID.) The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plain text from a packet, it does not supply any security to the network. An SSID is also referred to as a Network Name because essentially it is a name that identifies a wireless network. Subnet Mask A subnet mask, which may be a part of the TCP/IP informa-
tion provided by your ISP, is a set of four numbers configured like an IP address. It is used to create IP address numbers used only within a particular network (as opposed to valid IP address numbers recognized by the Internet. TCP/IP Transmission Control Protocol/Internet Protocol. This is the standard protocol for data transmission over the Internet. TKIP The TKIP (Temporal Key Integrity Protocol), pronounced tee-
kip, is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP used to secure 802.11 wireless LANs.TKIP provides per-packet key mixing, a message 31 integrity check and a re-keying mechanism, thus fixing the flaws of WEP. WAN A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network. A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network . WEP WEP (Wired Equivalent Privacy) is 802.11s optional encryp-
tion standard implemented in the MAC layer that most radio network interface card (NIC) and access point vendors support. Basic wireless security provided by Wi-Fi. In some instances, WEP may be all a home or small-business user needs to protect wireless data. WEP is available in 40-bit (also called 64-bit), or in 108-bit (also called 128-bit) encryption modes. As 108-bit en-
cryption provides a longer algorithm that takes longer to decode, it can provide better security than basic 40-bit (64-bit) encryption. Wi-Fi An interoperability certification for wireless local area net-
work (LAN) products based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. WLAN Also referred to as LAN. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. 32 WPA WPA is a standards-based, interoperable security specification that utilizes Temporal Key Integrity Protocol to provide im-
proved over-the-air encryption of wireless data. 33
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2004-10-19 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 2004-04-23 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2004-10-19
|
||||
1 2 |
2004-04-23
|
|||||
1 2 | Applicant's complete, legal business name |
LITE-ON Technology Corp.
|
||||
1 2 | FCC Registration Number (FRN) |
0014765044
|
||||
1 2 | Physical Address |
Bldg. C, 90, Chien 1 Rd., Chung-Ho
|
||||
1 2 |
New Taipei City,, N/A 23585
|
|||||
1 2 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
T******@TIMCOENGR.COM
|
||||
1 2 |
m******@ccsemc.com
|
|||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
PPQ
|
||||
1 2 | Equipment Product Code |
WP300UP
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
T****** W******
|
||||
1 2 | Title |
Deputy Director(R & D Division)
|
||||
1 2 | Telephone Number |
86-22******** Extension:
|
||||
1 2 | Fax Number |
86-22********
|
||||
1 2 |
t******@liteon.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
1 2 | Yes | |||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11g WIRELESS ACCESS POINT/WORKGROUP BRIDGE | ||||
1 2 | 802.11g Wireless Access Point / Workgroup Bridge | |||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 | Original Equipment | |||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output power listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 2 | Output power listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation and transmitter operating conditions for satisfying RF exposure compliance. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
SPORTON International Inc
|
||||
1 2 |
Compliance Certification Services Inc.
|
|||||
1 2 | Name |
K******** L******
|
||||
1 2 |
K******** C********
|
|||||
1 2 | Telephone Number |
886-2******** Extension:
|
||||
1 2 |
88622********
|
|||||
1 2 | Fax Number |
886-2********
|
||||
1 2 |
88622********
|
|||||
1 2 |
k******@sporton.com.tw
|
|||||
1 2 |
k******@cclab.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.0523000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0523000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC