all | frequencies |
|
|
|
|
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|---|---|---|---|
manuals | photos | labels |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
Manual | Users Manual | 2.57 MiB | ||||
1 2 |
|
UserMan | Users Manual | 2.65 MiB | March 19 2004 | |||
1 2 |
|
UserMan rev | Users Manual | 2.38 MiB | ||||
1 2 |
|
Int Photos | Internal Photos | 826.89 KiB | ||||
1 2 |
|
Photos | Internal Photos | 446.77 KiB | ||||
1 2 |
|
Ext Photos and Antennas | External Photos | 1012.20 KiB | ||||
1 2 |
|
Photos | External Photos | 1.10 MiB | ||||
1 2 |
|
Loc | ID Label/Location Info | 27.14 KiB | March 19 2004 | |||
1 2 |
|
Smpl | ID Label/Location Info | 116.86 KiB | March 19 2004 | |||
1 2 |
|
Cover Letter | Cover Letter(s) | 36.78 KiB | ||||
1 2 |
|
Test Report | Test Report | 3.86 MiB | ||||
1 2 |
|
Test Setup | Test Setup Photos | 352.31 KiB | ||||
1 2 | AntSpec | Operational Description | March 19 2004 | confidential | ||||
1 2 | BlkDia | Block Diagram | March 19 2004 | confidential | ||||
1 2 |
|
ConfiReq | Cover Letter(s) | 207.48 KiB | March 19 2004 | |||
1 2 |
|
ConfiReq rev | Cover Letter(s) | 206.28 KiB | ||||
1 2 | OpDes | Operational Description | March 19 2004 | confidential | ||||
1 2 | PartList | Parts List/Tune Up Info | March 19 2004 | confidential | ||||
1 2 |
|
Photos | Test Setup Photos | 374.75 KiB | ||||
1 2 |
|
RFExp | RF Exposure Info | 220.49 KiB | March 19 2004 | |||
1 2 | Schem | Schematics | March 19 2004 | confidential | ||||
1 2 |
|
TestRpt1 802 11b | Test Report | 290.53 KiB | January 04 2004 | |||
1 2 |
|
TestRpt1 802 11g | Test Report | 284.26 KiB | January 04 2004 | |||
1 2 |
|
TestRpt2 802 11b | Test Report | 1.83 MiB | January 04 2004 | |||
1 2 |
|
TestRpt2 802 11g | Test Report | 1.66 MiB | January 04 2004 |
1 2 | Manual | Users Manual | 2.57 MiB |
TABLE OF CONTENTS CHAPTER 1 INTRODUCTION.............................................................................................. 1 Features of your Wireless Access Point ........................................................................... 1 Package Contents............................................................................................................... 3 Physical Details .................................................................................................................. 3 CHAPTER 2 INSTALLATION ............................................................................................... 5 Requirements ..................................................................................................................... 5 Procedure ........................................................................................................................... 5 CHAPTER 3 ACCESS POINT SETUP................................................................................... 7 Overview ............................................................................................................................ 7 Setup using the Windows Utility ...................................................................................... 7 Setup using a Web Browser.............................................................................................. 9 System Screen .................................................................................................................. 12 Access Control Screen..................................................................................................... 14 2.4GHz Wireless Screens ................................................................................................ 17 Basic Settings Screen....................................................................................................... 17 Security Settings .............................................................................................................. 19 Advanced Settings ........................................................................................................... 25 CHAPTER 4 PC AND SERVER CONFIGURATION........................................................ 27 Overview .......................................................................................................................... 27 Using WEP ....................................................................................................................... 27 Using WPA-PSK............................................................................ ~
802.1x Mode - Overview ............................................................... ~
802.1x Server Setup (Windows 2000 Server) ................................................................ 29 802.1x Client Setup on Windows XP.............................................................................. 39 CHAPTER 5 OPERATION AND STATUS ......................................................................... 46 Operation ......................................................................................................................... 46 Status Screen.................................................................................................................... 46 CHAPTER 6 OTHER SETTINGS & FEATURES .............................................................. 51 Overview .......................................................................................................................... 51 Admin Login Screen........................................................................................................ 51 Config File........................................................................................................................ 53 Firmware Upgrade .......................................................................................................... 54 APPENDIX A SPECIFICATIONS........................................................................................ 55 Wireless Access Point ...................................................................................................... 55 APPENDIX B TROUBLESHOOTING................................................................................. 59 Overview .......................................................................................................................... 59 General Problems ............................................................................................................ 59 APPENDIX C WINDOWS TCP/IP ....................................................................................... 61 Overview .......................................................................................................................... 61 Checking TCP/IP Settings - Windows 9x/ME: ............................................................. 61 Checking TCP/IP Settings - Windows NT4.0................................................................ 63 Checking TCP/IP Settings - Windows 2000 .................................................................. 66 Checking TCP/IP Settings - Windows XP..................................................................... 68 Wireless LANs ................................................................................................................. 69
! |wqC
! |wqC i P/N: 9560N90001 Copyright Document Version: 1.1 All trademarks and trade names are the properties of their respective owners. 2004. All Rights Reserved. ii Chapter 1 Introduction 1 This Chapter provides an overview of the Wireless Access Point's features and capabilities. Congratulations on the purchase of your new Wireless Access Point. The Wireless Access Point links your 802.11g or 802.11b Wireless Stations to your wired LAN. The Wireless stations and devices on the wired LAN are then on the same network, and can communicate with each other without regard for whether they are connected to the network via a Wireless or wired connection. Figure 1: Wireless Access Point The auto-sensing capability of the Wireless Access Point allows packet transmission up to 54Mbps for maximum throughput, or automatic speed reduction to lower speeds when the environment does not permit maximum throughput. Features of your Wireless Access Point The Wireless Access Point incorporates many advanced features, carefully designed to provide sophisticated functions while being easy to use. Standards Compliant. The Wireless Router complies with the IEEE802.11g (DSSS) specifications for Wireless LANs. Supports both 802.11b and 802.11g Wireless Stations. The 802.11g standard provides for backward compatibility with the 802.11b standard, so both 802.11b and 802.11g Wireless stations can be used simultaneously. 802.1x Support. Support for 802.1x mode is included, providing for the industrial-
strength wireless security of 802.1x authentication and authorization. Radius Client Support. The Wireless Access Point can login to your existing Radius Server (as a Radius client). 1 Wireless Access Point User Guide Dynamic WEP key Support. In 802.1x mode, either fixed or Dynamic WEP keys can be used. Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web Browser. WEP support. Support for WEP (Wired Equivalent Privacy) is included. Both 64 Bit and 128 Bit keys are supported. WPA support. Support for WPA is included. WPA is more secure than WEP, and should be used if possible. Access Control. The Access Control feature can ensure that only trusted Wireless Stations can use the Wireless Access Point to gain access to your LAN. Simple Configuration. If the default settings are unsuitable, they can be changed quickly and easily. DHCP Client Support. Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request. The Wireless Access Point can act as a DHCP Client, and obtain an IP address and related information from your existing DHPC Server. NetBIOS & WINS Support. Support for both NetBIOS broadcast and WINS (Win-
dows Internet Naming Service) allows the Wireless Access Point to easily fit into your existing Windows network. Password - protected Configuration. Optional password protection is provided to prevent unauthorized users from modifying the configuration data and settings. 2 Introduction Package Contents The following items should be included:
Wireless Access Point Power Adapter Quick Start Guide CD-ROM containing the on-line manual If any of the above items are damaged or missing, please contact your dealer immediately. Physical Details Front Panel LEDs Status Power LAN Figure 2: Front Panel On - Error condition. Off - Normal operation. Blinking - During start up, and when the Firmware is being upgraded. On - Normal operation. Off - No power On - The LAN (Ethernet) port is active. Off - No active connection on the LAN (Ethernet) port. Flashing - Data is being transmitted or received via the corresponding LAN (Ethernet) port. Wireless LAN On - Idle Off - Error- Wireless connection is not available. Flashing - Data is being transmitted or received via the Wireless access point. Data includes "network traffic" as well as user data. 3 Wireless Access Point User Guide Rear Panel Antenna Console port Reset Button Figure 3 Rear Panel One antenna (aerial) is supplied. Best results are usually obtained with the antenna in a vertical position. DB9 female RS232 port. This button has two (2) functions:
Reboot. When pressed and released, the Wireless Access Point will reboot (restart). Reset to Factory Defaults. This button can also be used to clear ALL data and restore ALL settings to the factory default values. To Clear All Data and restore the factory default values:
1. Power Off the Access Point 2. Hold the Reset Button down while you Power On the Access Point. 3. Continue holding the Reset Button until the Status (Red) LED blinks TWICE. 4. Release the Reset Button. The factory default configuration has now been restored, and the Access Point is ready for use. Ethernet Power port Use a standard LAN cable (RJ45 connectors) to connect this port to a 10BaseT or 100BaseT hub on your LAN. Connect the supplied power adapter here. 4 Chapter 2 Installation 2 This Chapter covers the physical installation of the Wireless Access Point. Requirements Requirements:
TCP/IP network Ethernet cable with RJ-45 connectors Installed Wireless network adapter for each PC that will be wirelessly connected to the network Procedure 1. Select a suitable location for the installation of your Wireless Access Point. To maximize reliability and performance, follow these guidelines:
Use an elevated location, such as wall mounted or on the top of a cubicle. Place the Wireless Access Point near the center of your wireless coverage area. If possible, ensure there are no thick walls or metal shielding between the Wireless Access Point and Wireless stations. Under ideal conditions, the Wireless Access Point has a range of around 150 meters (450 feet). The range is reduced, and transmission speed is lower, if there are any obstructions between Wireless devices. Figure 4: Installation Diagram 5 Wireless Access Point User Guide 2. Use a standard LAN cable to connect the Ethernet port on the Wireless Access Point to a 10/100BaseT hub on your LAN. 3. Connect the supplied power adapter to the Wireless Access Point and a convenient power outlet, and power up. 4. Check the LEDs:
The Status LED should flash, then turn OFF. The Power, WLAN, and LAN LED should be ON. For more information, refer to Front Panel LEDs in Chapter 1. 6 Chapter 3 Access Point Setup 3 This Chapter provides details of the Setup process for Basic Operation of your Wireless Access Point. Overview This chapter describes the setup procedure to make the Wireless Access Point a valid device on your LAN, and to function as an Access Point for your Wireless Stations. Wireless Stations may also require configuration. For details, see Chapter 4 - Wireless Station Configuration. The Wireless Access Point can be configured using either the supplied Windows utility or your Web Browser Setup using the Windows Utility A simple Windows setup utility is supplied on the CD-ROM. This utility can be used to assign a suitable IP address to the Wireless Access Point. Using this utility is recommended, because it can locate the Wireless Access Point even if it has an invalid IP address. Insert the supplied CD-ROM in your drive. Installation 1. 2. Run the SETUP.exe program in the root folder. 3. Follow the prompts to complete the installation. Main Screen Start the program by using the icon created by the setup program. When run, the program searches the network for all active Wireless Access Points, then lists them on screen, as shown by the example below. Figure 5: Management utility Screen 7 Wireless Access Point User Guide IP. The IP address for the Wireless Access Point. Wireless Access Points On the center of the screen is a list of all Wireless Access Points found on the network. For each device, the following data is shown:
Server Name. The Server Name is shown on a sticker on the base of the device. MAC. The hardware or physical address of the Wireless Access Point. SSID. The SSID setting for the Wireless Access Point. (The SSID is case sensitive.) Channel. The current channel used by the Wireless Access Point. Version. The current version number for the Wireless Access Point. Description. Any extra information for the Wireless Access Point. Note: If the desired Wireless Access Point is not listed, check that the device is installed and ON, then Refresh the list. Buttons Refresh. Click this button to update the Wireless Access Point device listing after chang-
ing the name or IP Address. Web Management. You can use this button to connect the Wireless Access Point to do some setup using web browser. Set IP Address. Click this button if you want to change the IP Address of the device. Exit. Exit the Management utility program by clicking this button. Setup Procedure 1. Select the desired Wireless Access Point. 2. Click the Set IP Address button. 3. If prompted, enter the user name and password. The default values are admin for the User Name, and a blank Password 4. Ensure the IP address, Network Mask, and Gateway are correct for your LAN. Save any changes. 5. Click the Web Management button to connect to the selected Wireless Access Point using your Web Browser. If prompted, enter the User Name and Password again. 6. Configure the following screens, using the on-line help if necessary. The following section also provides more details about each of these screens. Wireless Security Password 7. Setup is now complete. 8 Setup Setup using a Web Browser Your Browser must support JavaScript. The configuration program has been tested on the following browsers:
Netscape V4.08 or later Internet Explorer V4 or later Setup Procedure Before commencing, install the Wireless Access Point in your LAN, as described previously. 1. Check the Wireless Access Point to determine its Default Name. This is shown on a label on the base or rear, and is in the following format:
SCxxxxxx Where xxxxxx is a set of 6 Hex characters ( 0 ~ 9, and A ~ F ). 2. Use a PC which is already connected to your LAN, either by a wired connection or another Access Point. Until the Wireless Access Point is configured, establishing a Wireless connection to it may be not possible. If your LAN contains a Router or Routers, ensure the PC used for configuration is on the same LAN segment as the Wireless Access Point. 3. Start your Web browser. 4. In the Address box, enter "HTTP://" and the Default Name of the Wireless Access Point e.g. HTTP://SC2D631A 5. You should then see a login prompt, which will ask for a User Name and Password. Enter admin for the User Name, and password for the Password. These are the default values. The password (but not the user name) can and should be changed. Always enter the current password, as set on the Admin Login screen. Figure 6: Password Dialog 6. You will then see the Status screen, which displays the current settings and status. No data input is possible on this screen. 9 7. From the menu, select and configure the following options, as described in the following Wireless Access Point User Guide sections:
System Access Control 2.4GHz Wireless Basic Security Advanced Management 8. Setup of the Wireless Access Point is now complete. Wireless stations must now be set to match the Wireless Access Point. See Chapter 4 for details. If you can't connect:
It is likely that your PCs IP address is incompatible with the Wireless Access Points IP address. This can happen if your LAN does not have a DHCP Server. The default IP address of the Wireless Access Point is 192.168.0.100, with a Network Mask of 255.255.255.0. If your PCs IP address is not compatible with this, you must change your PCs IP address to an unused value in the range 192.168.0.1 ~ 192.168.0.254, with a Net-
work Mask of 255.255.255.0. See Appendix C - Windows TCP/IP for details for this procedure. 10 Status Screen When you first connect, you will see the Status screen. This displays the current settings and status of the Wireless Access Point. No data can be input on this screen. Setup Figure 7: Status Screen For further details of this screen, refer to Status Screen in Chapter 5. 11 Wireless Access Point User Guide System Screen Click System on the menu to view a screen like the following. Figure 8: System Screen Data - System Screen Identification Access Point Name Description Enter a suitable name for this Access Point. If desired, you can enter a description for the Access Point. Country Domain Select the country or domain matching your current location. MAC Address The read-only field shows the current MAC Address. IP Address DHCP Client Fixed Select this option if you have a DHCP Server on your LAN, and you wish the Access Point to obtain an IP address automatically. If selected, the following data must be entered. IP Address - The IP Address of this device. Enter an unused IP address from the address range on your LAN. Subnet Mask - The Network Mask associated with the IP Address above. Enter the value used by other devices on your LAN. Gateway - The IP Address of your Gateway or Router. Enter the value used by other devices on your LAN. DNS - Enter the DNS (Domain Name Server) used by PCs on your LAN. 12 Setup If your LAN has a WINS server, you can enable this to have this AP register with the WINS server. Enter the name or IP address of your WINS server. If desired, you can enable this option. If enabled, you will able to connect to this AP using a Telnet client. You will have to provide the same login data (user name, password) as for a HTTP (Web) connec-
tion. WINS Enable WINS WINS Server Name/IP Ad-
dress Telnet Enable Telnet Management 13 Wireless Access Point User Guide Access Control Screen This feature can be used to block access to your LAN by unknown or untrusted wireless sta-
tions. Click Access Control on the menu to view a screen like the following. Figure 9: Access Control Screen Data - Access Control Screen Enable Use this checkbox to Enable or Disable this feature as desired. Warning ! Ensure you own PC is in the "Trusted Wireless Stations"
list before enabling this feature.. Trusted Stations This table lists any Wireless Stations you have designated as "Trusted". If you have not added any stations, this table will be empty. For each Wireless station, the following data is displayed:
MAC Address - the MAC or physical address of each Wire-
less station. Connected - this indicates whether or not the Wireless station is currently associates with this Access Point. Buttons Modify List Read from File Write to File To change the list of Trusted Stations (Add, Edit, or Delete a Wireless Station or Stations), click this button. To upload a list of Trusted Stations from a file on your PC, click this button. To download the current list of Trusted Stations from the Access Point to a file on your PC, click this button. 14 Setup Trusted Wireless Stations This feature can be used to block access to your LAN by unknown or untrusted wireless sta-
tions., use the Modify List button on the Access Control screen. You will see a screen like the sample below. Figure 10: Trusted Wireless Stations Data - Trusted Wireless Stations Trusted Wireless Stations This lists any Wireless Stations which you have designated as Trusted. Other Wireless Stations This list any Wireless Stations detected by the Access Point, which you have not designated as "Trusted". Address Buttons
<<
>>
Edit Used when adding or editing a Trusted Station, to display or enter the address (MAC or physical address) of the Wireless station. Used to add Wireless stations to the Trusted Wireless Station list. Select the desired Station or Stations in the Other Wireless Stations list, then click this button. Used to delete Wireless stations from the Trusted Wireless Station list. Select the desired Station or Stations in the Trusted Wireless Sta-
tions list, then click this button. Used to edit an existing Wireless Station:
1. Select a station in the Trusted Wireless Stations list 2. Click the Edit button. The data from the selected station is copied to the Address field, and the Add button changes to Up-
date. 3. Edit the address as required. 4. Click the Update button to save your changes, or Clear if you do not wish to save. 15 Wireless Access Point User Guide Add Clear To add a Trusted Station which is not in the "Other Wireless Sta-
tions" list, enter the required data and click this button. Clear the Address field. If editing, this also cancels the edit and changes the Update button back to Add. 16 Setup 2.4GHz Wireless Screens There are 3 configuration screens available:
Basic Security Advanced Basic Settings Screen The settings on this screen must match the settings used by Wireless Stations. Click Basic on the menu to view a screen like the following. Figure 11: Basic Settings Screen Data - Basic Settings Screen Operation Wireless Mode Select the desired option:
Disable - select this if for some reason you do not this AP to transmit or receive at all. 802.11b and 802.11g - this is the default, and will allow connec-
tions by both 802.11b and 802.1g wireless stations. 802.11b - if selected, only 802.11b connections are allowed. 802.11g wireless stations will only be able to connect if they are fully backward-compatible with the 802.11b standard. 802.11g - only 802.11g connections are allowed. If you only have 802.11g, selecting this option may provide a performance im-
provement over using the default setting. Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. Dynamic Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. Static Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. 17 Wireless Access Point User Guide Operating Mode Remote AP MAC Address Channel No Current Channel No. SSID Broadcast SSID Select the desired mode:
Wireless Access Point - operate as a normal Access Point Client Access Point - act as a client for another Access Point. If selected, you must provide the address (MAC address) of the other Access Point (Remote AP). Repeater Access Point - act as a repeater for another Access Point. If selected, you must provide the address (MAC address) of the other Access Point (Remote AP). This is not required unless the Operating Mode is "Client Access Point"
or "Repeater Access Point". In either of these modes, you must provide the MAC address of the other AP in this field. You can either enter the MAC address directly, or, if the other AP is on-line, you can click the
"Select AP" button and select from a list of available APs. If "Automatic" is selected, the Wireless Access Point will self-select a Wireless Channel. If you experience interference (shown by lost connections and/or slow data transfers) you may need to experiment with different channels to see which Channel is the best. This displays the current channel used by the Access Point. Enter the desired SSID. Wireless Stations must use the same SSID. Note: The SSID is case sensitive. If Enabled, the SSID will be broadcast to all Wireless Stations. Stations which have no SSID (or a "null" value) can then adopt the correct SSID for connections to this Access Point. 18 Setup Security Settings The Security screen is accessed from the main menu, and it provides 5 options as below:
None WEP WPA-PSK WPA-802.1x 802.1X Security Settings - None If "None" is selected, no security is used, and there are no settings to configure. Security Settings - WEP Selecting the WEP option will result in a screen like the following. Data - WEP Screen WEP Data Encryption Figure 12: WEP Settings Select the desired option:
64 Bit Encryption - Keys are 10 Hex (5 ASCII) characters. 128 Bit Encryption - Keys are 26 Hex (13 ASCII) charac-
ters. 19 Wireless Access Point User Guide Authentication Key Input Key 1.. Key 4 Passphrase Normally, you can leave this at Automatic, so that Wireless Stations can use either method ("Open System" or "Shared Key".). If you wish to use a particular method, select the appropriate value - "Open System" or "Shared Key". All Wireless stations must then be set to use the same method. Select "Hex" or "ASCII" depending on your input method. (All keys are converted to Hex, ASCII input is only for conven-
ience.) Enter the key value you wish to use. Other stations must have the same key. Use this to generate a key or keys, instead of entering them directly. Enter a word or group of printable characters in the Passphrase box and click the "Generate Key" button to auto-
matically configure the WEP Key(s). If encryption strength is set to 64 bit, then each of the four key fields will be populated with key values. If encryption strength is set to 128 bit, then only the selected WEP key field will be given a key value. Security Settings - WPA-PSK Selecting the WPA-PSK option will result in a screen like the following. Figure 13: WPA-PSK Settings Data - WPA-PSK Screen WPA-PSK Network Key WPA Encryption Enter the key value. Data is encrypted using this key. Other Wireless Stations must use the same key. Select the desired option. Other Wireless Stations must use the same method. 20 Setup Pairwise Key Update This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime Group Key Update Key Lifetime Group key update when any membership terminated This field determines how often Pairwise keys are dynamically updated. Enter the desired value. This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. This field determines how often the Group key is dynamically updated. Enter the desired value. If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. Security Settings - WPA-802.1x This version of WPA requires that you have a Radius Server on your LAN. Selecting the WPA-802.1x option will result in a screen like the following. Figure 14: WPA-802.1x Settings Data - WPA-802.1x Screen WPA-802.1x Radius Server Enter the name or IP address of the Radius Server on your network. Radius Port Enter the port number used for connections to the Radius Server. 21 Wireless Access Point User Guide Client Login Name This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. Shared Key This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. WPA Encryption Select the desired option. Other Wireless Stations must use the same method. TKIP - Unicast (point-to-point) transmissions are en-
crypted using TKIP, and multicast (broadcast) transmissions are not encrypted. TKIP + 64 bit WEP - Unicast (point-to-point) transmis-
sions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 64 bit WEP. TKIP + 128 bit WEP - - Unicast (point-to-point) transmis-
sions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 128 bit WEP. Pairwise Key Up-
date This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime This field determines how often Pairwise keys are dynamically updated. Enter the desired value. Group Key Update This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime This field determines how often the Group key is dynamically updated. Enter the desired value. Group key update when any member-
ship terminated Radius Accounting If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port" field. Update Report every ... If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. 22 Security Settings - 802.1x 802.1x can only be used if you have a Radius Server on your LAN. Selecting the 802.1x option will result in a screen like the following. Setup Figure 15: 802.1x Settings Data - 802.1x Screen 802.1x Radius Server Address Radius Port Client Login Name Enter the name or IP address of the Radius Server on your network. Enter the port number used for connections to the Radius Server. This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. Shared Key This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. WEP Key Size Select the desired option:
64 Bit Encryption - Keys are 10 Hex (5 ASCII) charac-
ters. 128 Bit Encryption - Keys are 26 Hex (13 ASCII) characters. Key Exchange Key Lifetime Enable this if you want the keys to be updated regularly. This field determines how often keys are dynamically updated. Enter the desired value. 23 Wireless Access Point User Guide Radius Accounting Update Report every ... Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port" field. If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. 24 Advanced Settings Click the Advanced link on the menu will result in a screen like the following. Setup Figure 16: Advanced Settings Data - Advanced Settings Screen Basic Rate Basic Rate Selection Wireless Separation Parameters Disassociated Timeout The Basic Rate is used for broadcasting. It does not determine the data transmission rate, which is determined by the "Mode"
setting on the Basic screen. Select the desired option:
Auto-negotiate - This is the default, and will normally give the best results. Fixed Rate - If you don't use to use "Auto-negotiate", you must also select the desired speeds. If enabled, then each Wireless station using the Access Point is invisible to other Wireless stations. In most business situations, this setting should be Disabled. This determines how quickly a Wireless Station will be consid-
ered "Disassociated" with this AP, when no traffic is received. Enter the desired time period. Fragmentation Beacon Interval Enter the preferred setting between 256 and 2346. Enter the preferred setting between 0 and 3000. 25 Wireless Access Point User Guide RTS/CTS Threshold Enter the preferred setting between 256 and 2346. Output Power Level Select the desired power output. Higher levels will give a greater range, but are also more likely to cause interference with other devices. Preamble Type Select the desired preamble type. Antenna Selection 802.11b Protection Type Short Slot Time If your Access Point has only 1 antenna, there is only 1 option available. If your Access Point has 2 antennae, select the option which gives the best results in your location. Select the desired option. Enable or disable this setting as required. Protection Mode Normally, this should be left at "Auto". Protection Rate Select the desired option. 26 Chapter 4 PC and Server Configuration This Chapter details the PC Configuration required for each PC on the local LAN. 4 Overview All Wireless Stations need to have settings which match the Wireless Access Point. These settings depend on the mode in which the Access Point is being used. If using WEP or WPA-PSK, it is only necessary to ensure that each Wireless station's settings match those of the Wireless Access Point, as described below. For WPA-802.1x and 802.1x modes, configuration is much more complex. The Radius Server must be configured correctly, and setup of each Wireless station is also more com-
plex. Using WEP For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode On each PC, the mode must be set to Infrastructure. SSID (ESSID) Wireless Security This must match the value used on the Wireless Access Point. The default value is default Note! The SSID is case sensitive. Each Wireless station must be set to use WEP data encryption. The Key size (64 bit or 128 bit) must be set to match the Access Point. The keys values on the PC must match the key values on the Access Point. Note:
On some systems, the "64 bit" key is shown as "40 bit" and "128 bit" is shown as "104 bit". This difference arises because the key input by the user is 24 bits less than the key size used for encryption. 27 Wireless Access Point User Guide Using WPA-802.1x This is the most secure and most complex system. 802.1x mode provides greater security and centralized management, but it is more complex to configure. Wireless Station Configuration For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode On each PC, the mode must be set to Infrastructure. SSID (ESSID) 802.1x Authentication This must match the value used on the Wireless Access Point. The default value is default Note! The SSID is case sensitive. Each client must obtain a Certificate which is used for authentication for the Radius Server. 802.1x Encryption Typically, EAP-TLS is used. This is a dynamic key system, so keys do NOT have to be entered on each Wireless station. Radius Server Configuration If using WPA-802.1x mode, the Radius Server on your network must be configured as follow:
There must be a Client Login for the Wireless Access Point itself. It must provide and accept Certificates for user authentication. The Wireless Access Point will use its Default Name as its Client Login name. The Shared Key, set on the Security Screen of the Access Point, must match the Shared Secret value on the Radius Server. Encryption settings must be correct. 28 PC and Server Configuration 802.1x Server Setup (Windows 2000 Server) dhcpd dns rras This section describes using Microsoft Internet Authentication Server as the Radius Server, since it is the most common Radius Server available that supports the EAP-TLS authentication method. The following services on the Windows 2000 Domain Controller (PDC) are also required:
webserver (IIS) Radius Server (Internet Authentication Service) Certificate Authority Windows 2000 Domain Controller Setup 1. Run dcpromo.exe from the command prompt. 2. Follow all of the default prompts, ensure that DNS is installed and enabled during installa-
tion. Services Installation 1. Select the Control Panel - Add/Remove Programs. 2. Click Add/Remove Windows Components from the left side. 3. Ensure that the following components are activated (selected):
Certificate Services. After enabling this, you will see a warning that the computer cannot be renamed and joined after installing certificate services. Select Yes to select certificate services and continue World Wide Web Server. Select World Wide Web Server on the Internet Information Services (IIS) component. From the Networking Services category, select Dynamic Host Configuration Protocol
(DHCP), and Internet Authentication Service (DNS should already be selected and in-
stalled). 29 Wireless Access Point User Guide Figure 17: Components Screen 4. Click Next. 5. Select the Enterprise root CA, and click Next. 6. Enter the information for the Certificate Authority, and click Next. Figure 18: Certification Screen 30 PC and Server Configuration Figure 19: CA Screen 7. Click Next if you don't want to change the CA's configuration data. 8. Installation will warn you that Internet Information Services are running, and must be stopped before continuing. Click Ok, then Finish. DHCP server configuration 1. Click on the Start - Programs - Administrative Tools - DHCP 2. Right-click on the server entry as shown, and select New Scope. Figure 20: DHCP Screen 3. Click Next when the New Scope Wizard Begins. 4. Enter the name and description for the scope, click Next. 5. Define the IP address range. Change the subnet mask if necessary. Click Next. 31 Wireless Access Point User Guide Figure 21:IP Address Screen 6. Add exclusions in the address fields if required. If no exclusions are required, leave it blank. Click Next. 7. Change the Lease Duration time if preferred. Click Next. 8. Select Yes, I want to configure these options now, and click Next. 9. Enter the router address for the current subnet. The router address may be left blank if there is no router. Click Next. 10. For the Parent domain, enter the domain you specified for the domain controller setup, and enter the server's address for the IP address. Click Next. Figure 22: DNS Screen 11. If you don't want a WINS server, just click Next. 12. Select Yes, I want to activate this scope now. Click Next, then Finish. 13. Right-click on the server, and select Authorize. It may take a few minutes to complete. 32 PC and Server Configuration Certificate Authority Setup 1. Select Start - Programs - Administrative Tools - Certification Authority. 2. Right-click Policy Settings, and select New - Certificate to Issue. Figure 23: Certificate Authority Screen 3. Select Authenticated Session and Smartcard Logon (select more than one by holding down the Ctrl key). Click OK. Figure 24: Template Screen 4. Select Start - Programs - Administrative Tools - Active Directory Users and Computers. 5. Right-click on your active directory domain, and select Properties. 33 Wireless Access Point User Guide 6. Select the Group Policy tab, choose Default Domain Policy then click Edit. Figure 25: Active Directory Screen Figure 26: Group Policy Tab 7. Select Computer Configuration - Windows Settings - Security Settings - Public Key Poli-
cies, right-click Automatic Certificate Request Settings - New - Automatic Certificate Request. 34 PC and Server Configuration Figure 27: Group Policy Screen 8. When the Certificate Request Wizard appears, click Next. 9. Select Computer, then click Next. Figure 28: Certificate Template Screen 10. Ensure that your certificate authority is checked, then click Next. 11. Review the policy change information and click Finish. 12. Click Start - Run, type cmd and press enter. Enter secedit /refreshpolicy machine_policy This command may take a few minutes to take effect. 35 Wireless Access Point User Guide Internet Authentication Service (Radius) Setup 1. Select Start - Programs - Administrative Tools - Internet Authentication Service 2. Right-click on Clients, and select New Client. Figure 29: Service Screen 3. Enter a name for the access point, click Next. 4. Enter the address or name of the Wireless Access Point, and set the shared secret, as entered on the Security Settings of the Wireless Access Point. 5. Click Finish. 6. Right-click on Remote Access Policies, select New Remote Access Policy. 7. Assuming you are using EAP-TLS, name the policy eap-tls, and click Next. 8. Click Add... If you don't want to set any restrictions and a condition is required, select Day-And-Time-
Restrictions, and click Add... Figure 30: Attribute Screen 9. Click Permitted, then OK. Select Next. 10. Select Grant remote access permission. Click Next. 36 11. Click Edit Profile... and select the Authentication tab. Enable Extensible Authentication Protocol, and select Smart Card or other Certificate. Deselect other authentication meth-
ods listed. Click OK. PC and Server Configuration 12. Select No if you don't want to view the help for EAP. Click Finish. Figure 31: Authentication Screen 37 Wireless Access Point User Guide Remote Access Login for Users 1. Select Start - Programs - Administrative Tools- Active Directory Users and Computers. 2. Double click on the user who you want to enable. 3. Select the Dial-in tab, and enable Allow access. Click OK. Figure 32: Dial-in Screen 38 PC and Server Configuration 802.1x Client Setup on Windows XP Windows XP ships with a complete 802.1x client implementation. If using Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality. If you don't have either of these systems, you must use the 802.1x client software provided with your wireless adapter. Refer to your vendor's documentation for setup instructions. The following instructions assume that:
You are using Windows XP You are connecting to a Windows 2000 server for authentication. You already have a login (User name and password) on the Windows 2000 server. Client Certificate Setup 1. Connect to a network which doesn't require port authentication. 2. Start your Web Browser. In the Address box, enter the IP address of the Windows 2000 Server, followed by /certsrv e.g http://192.168.0.2/certsrv 3. You will be prompted for a user name and password. Enter the User name and Password assigned to you by your network administrator, and click OK. Figure 33: Connect Screen 4. On the first screen (below), select Request a certificate, click Next. 39 Wireless Access Point User Guide Figure 34: Wireless CA Screen 5. Select User certificate request and select User Certificate, the click Next. Figure 35: Request Type Screen 6. Click Submit. 40 PC and Server Configuration Figure 36: Identifying Information Screen 7. A message will be displayed, then the certificate will be returned to you. Click Install this certificate. Figure 37:Certificate Issued Screen 8. You will receive a confirmation message. Click Yes. 41 Wireless Access Point User Guide Figure 38: Root Certificate Screen 9. Certificate setup is now complete. 802.1x Authentication Setup 1. Open the properties for the wireless connection, by selecting Start - Control Panel -
Network Connections. 2. Right Click on the Wireless Network Connection, and select Properties. 3. Select the Authentication Tab, and ensure that Enable network access control using IEEE 802.1X is selected, and Smart Card or other Certificate is selected from the EAP type. Figure 39: Authentication Tab Encryption Settings The Encryption settings must match the APs (Access Points) on the Wireless network you wish to join. Windows XP will detect any available Wireless networks, and allow you to configure each network independently. 42 PC and Server Configuration Your network administrator can advise you of the correct settings for each network. 802.1x networks typically use EAP-TLS. This is a dynamic key system, so there is no need to en-
ter key values. Enabling Encryption To enable encryption for a wireless network, follow this procedure:
1. Click on the Wireless Networks tab. Figure 40: Wireless Networks Screen 2. Select the wireless network from the Available Networks list, and click Configure. 3. Select and enter the correct values, as advised by your Network Administrator. For example, to use EAP-TLS, you would enable Data encryption, and click the checkbox for the setting The key is provided for me automatically, as shown below. 43 Wireless Access Point User Guide Figure 41: Properties Screen Setup for Windows XP and 802.1x client is now complete. 44 PC and Server Configuration Using 802.1x Mode (without WPA) This is very similar to using WPA-802.1x. The only difference is that on your client, you must NOT enable the setting The key is provided for me automatically. Instead, you must enter the WEP key manually, ensuring it matches the WEP key used on the Access Point. Figure 42: Properties Screen Note:
On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is shown as "104 bit". This difference arises because the key input by the user is 24 bits less than the key size used for encryption. 45 Chapter 5 Operation and Status 5 This Chapter details the operation of the Wireless Access Point and the status screens. Operation Once both the Wireless Access Point and the PCs are configured, operation is automatic. However, you may need to perform the following operations on a regular basis. If using the Access Control feature, update the Trusted PC database as required. (See Access Control in Chapter 3 for details.) If using 802.1x mode, update the User Login data on the Windows 2000 Server, and configure the client PCs, as required. Status Screen Use the Status link on the main menu to view this screen. Figure 43: Status Screen 46 Operation and Status Data - Status Screen Access Point Access Point Name The current name will be displayed. MAC Address The MAC (physical) address of the Wireless Access Point. Domain This is the region for which this Wireless Access Point is licensed for use. Firmware Version The version of the firmware currently installed. TCP/IP IP Address Subnet Mask Gateway DHCP Client The IP Address of the Wireless Access Point. The Network Mask (Subnet Mask) for the IP Address above. Enter the Gateway for the LAN segment to which the Wireless Access Point is attached (the same value as the PCs on that LAN segment). This indicates whether the current IP address was obtained from a DHCP Server on your network. It will display "Enabled" or "Disabled". 2.4GHz Wireless SSID The current SSID. Channel/Frequency The Channel currently in use is displayed. Wireless Mode The current wireless mode is displayed. Operating Mode The current operational mode is displayed. Authentication This displays the current Authentication setting. Encryption Access Control The current Encryption setting is displayed. This indicates whether the Access Control feature is Enabled or Disabled.. Buttons Log Stations Click this to open a sub-window where you can view the activity log. Click this to open a sub-window where you can view the list of all current Wireless Stations using the Access Point. 2.4GHz Statistics Click this to open a sub-window where you can view Statistics on data transmitted or received by the Access Point. 47 Wireless Access Point User Guide Activity Log This screen is displayed when the Log button on the Status screen is clicked. Figure 44: Activity Log Screen Data - Activity Log Data Current Time The system date and time is displayed. Log Buttons Refresh Save to file Clear Log The Log shows details of the existing connections to the Wireless Access Point. Update the data on screen. Save the log to a file on your pc. This will delete all data currently in the Log. This will make it easier to read new messages. 48 Station List This screen is displayed when the Stations button on the Status screen is clicked. Operation and Status Figure 45 Station List Screen Data - Station List Screen Station List MAC Address The MAC (physical) address of each Wireless Station is displayed. Mode Status The mode of each Wireless Station. The current status of each Wireless Station is displayed. Refresh Button Update the data on screen. 49 Wireless Access Point User Guide Statistics Screen This screen is displayed when the 2.4GHzStatistics button on the Status screen is clicked. It shows details of the traffic flowing through the Wireless Access Point. Figure 46: Statistics Screen Data - Statistics Screen System Up Time System Up Time This indicates how long the system has been running since the last restart or reboot. 2.4GHz Wireless Authentication Deauthentication Association Disassociation Reassociation Wireless MSDU Data Number of Data transmitted to and received from Wireless Stations. Multicast Packets Number of Broadcast packets transmitted to and received from Wireless Stations, using Multicast transmission. Management Control 50 Chapter 6 Other Settings & Features This Chapter explains when and how to use the Wireless Access Point's
"Management" Features. 6 Overview This Chapter covers the following features, available on the Wireless Access Points Manage-
ment menu. Admin Login Config File Upgrade Firmware Admin Login Screen The Admin Login screen allows you to assign a password to the Wireless Access Point. This password limits access to the configuration interface. The default password is password. It is recommended that this be changed, using this screen. Figure 47: Admin Login Screen Data - Admin Login Screen User Name Enter the user name here New Password Enter the new password here Repeat New Password Re-enter the new password in this field. You will be prompted for the password when you connect, as shown below. 51 Wireless Access Point User Guide Figure 48: Password Dialog Enter admin for the User Name. Enter the Wireless Access Points password, as set on the Admin Login screen above. 52 Other Settings & Features Config File This screen allows you to Backup (download) the configuration file, and to restore (upload) a previously-saved configuration file. You can also set the Wireless Access Point back to its factory default settings. To reach this screen, select Config File in the Management section of the menu. Figure 49: Config File Screen Data - Config File Screen Backup Save a copy of cur-
rent settings Click the Backup button to download the current settings to a file on your PC. Restore Restore saved settings from a file Defaults Revert to factory default settings If you have a previously-saved configuration file, you can use this to restore those settings by uploading the file. 1. Click the Browse button and navigate to the location of the configuration file. 2. Select the upgrade file. Its name will appear in the File field. 3. Click the Restore button to commence the upload. 4. The Wireless Access Point will need to restart, and will be unavailable during the restart. All exiting connections will be broken. Use this to set the Wireless Access Point back to its factory default settings. Click Set to Defaults to start the procedure. The Wireless Access Point will need to restart, and will be unavailable during the restart. All exiting connections will be broken. 53 Wireless Access Point User Guide Firmware Upgrade The firmware (software) in the Wireless Access Point can be upgraded using your Web Browser. You must first download the upgrade file, and then select Upgrade Firmware in the Manage-
ment section of the menu. You will see a screen like the following. Figure 50: Firmware Upgrade Screen To perform the Firmware Upgrade:
1. Click the Browse button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Upgrade button to commence the firmware upgrade. The Wireless Access Point is unavailable during the upgrade process, and must restart when the upgrade is completed. Any connections to or through the Wireless Access Point will be lost. 54 Appendix A Specifications Wireless Access Point Hardware Specifications A CPU Radio-on-Chip DRAM Flash ROM LAN port 11G AR2312 AR2112 8 Mbytes (Expand to 64MB) 2 Mbytes (Expand to 8MB) 1 x Auto-MDIX RJ 45 for 10/100Mbps Ethernet Embedded Atheros solution Network Standard IEEE 802.11b (Wi-Fi) and IEEE 802.11g compliance OFDM; 802.11b: CCK (11 Mbps, 5.5 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps) Operating Frequencies 2.412.2.497 GHz Operating Channels 802.11g: 13 for North America, 13 for Europe (ETSI), 14 for Japan 802.11b: 11 for North America, 14 for Japan, 13 for Europe (ETSI) Operating temperature Storage temperature Power Adapter 0~55J
-20J ~70J DC 12V/1.2A Dimensions Wireless Specifications 141mm (W) x 100mm (D) x 27mm (H) Receive Sensitivity at 11Mbps min. -85dBm Receive Sensitivity at 5.5Mbps min. -89dBm Receive Sensitivity at 2Mbps Receive Sensitivity at 1Mbps Maximum Receive Level Transmit Power Modulation Throughput Operating Range min. -90dBm min. -93dBm min. -5dBm 18 dBm Direct Sequence Spread Spectrum BPSK / QPSK / CCK Up to 19 Mbps Indoors 55 Wireless Access Point User Guide Software Specifications 30 Meters (100ft.) @ 11Mbps 50 Meters (165ft.) @ 5.5Mbps 70 Meters (230ft.) @ 2Mbps 9 1Meters (300ft.) @ 1Mbps Outdoors 152 Meters (500ft.) @ 11Mbps 270 Meters (885ft.) @ 5.5Mbps 396 Meters (1300ft.) @ 2 Mbps 457 Meters (1500ft.) @ 1 Mbps Feature Wireless Operation Mode Security Management IEEE 802.11g/11b compliance Details Access point support Roaming supported Supper G (up to 108Mbps) Auto Sensing Open System / Share Key authentication Wireless Channels Support Automatic Wireless Channel Selection Antenna selection Tx Power Adjustment Country Selection Preamble Type: long or short support RTS Threshold Adjustment Fragmentation Threshold Adjustment Beacon Interval Adjustment SSID assignment Common AP Repeater Client AP Open, shared, WPA, and WPA-PSK authentication EAP-TLS, EAP-TTLS, PEAP Block inter-wireless station communication Block SSID broadcast Web based configuration RADIUS Accounting RADIUS-On feature RADIUS Accounting update CLI Message Log 802.1x support 56 Appendix A - Specifications Access Control list file support Configuration file Backup/Restore Statistics support Device discovery program Windows Utility DHCP client WINS client Other Features Firmware Upgrade HTTP, FTP network protocol download 57 Wireless Access Point User Guide FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communica-
tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver Increase the separation between the equipment and receiver. is connected. Consult the dealer or an experienced radio/TV technician for help. To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
(Example - use only shielded interface cables when connecting to computer or peripheral devices). FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 58 Appendix B Troubleshooting Overview B This chapter covers some common problems that may be encountered while using the Wireless Access Point and some possible solutions to them. If you follow the suggested steps and the Wireless Access Point still does not function properly, contact your dealer for further advice. General Problems Problem 1:
Solution 1:
Can't connect to the Wireless Access Point to configure it. Check the following:
The Wireless Access Point is properly installed, LAN connections are OK, and it is powered ON. Check the LEDs for port status. Ensure that your PC and the Wireless Access Point are on the same network segment. (If you don't have a router, this must be the case.) If your PC is set to "Obtain an IP Address automatically" (DHCP client), restart it. You can use the following method to determine the IP address of the Wireless Access Point, and then try to connect using the IP address, in-
stead of the name. To Find the Access Point's IP Address 1. Open a MS-DOS Prompt or Command Prompt Window. 2. Use the Ping command to ping the Wireless Access Point. Enter ping followed by the Default Name of the Wireless Access Point. e.g. ping SC003318 3. Check the output of the ping command to determine the IP address of the Wireless Access Point, as shown below. Figure 51: Ping If your PC uses a Fixed (Static) IP address, ensure that it is using an IP Address which is compatible with the address of the Wireless Access Point.
(The default IP Address and Mask of the Wireless Access Point is 192.168.0.100 and 255.255.255.0.) On Windows PCs, you can use Control Panel-Network to check the Properties for the TCP/IP protocol. 59 Wireless Access Point User Guide Problem 2: My PC can't connect to the LAN via the Wireless Access Point. Solution 2 Check the following:
The SSID and WEP settings on the PC match the settings on the Wire-
less Access Point. On the PC, the wireless mode is set to "Infrastructure"
If using the Access Control feature, the PC's name and address is in the Trusted Stations list. If using 802.1x mode, ensure the PC's 802.1x software is configured correctly. See Chapter 4 for details of setup for the Windows XP 802.1x client. If using a different client, refer to the vendor's documentation. 60 Appendix C Windows TCP/IP Overview C Normally, no changes need to be made. By default, the Wireless Access Point will act as a DHCP client, automatically obtaining a suitable IP Address (and related information) from your DHCP Server. If using Fixed (specified) IP addresses on your LAN (instead of a DHCP Server), there is not need to change the TCP/IP of each PC. Just configure the Wireless Access Point to match your existing LAN. The following sections provide details about checking the TCP/IP settings for various types of Windows, should that be necessary. Checking TCP/IP Settings - Windows 9x/ME:
1. Select Control Panel - Network. You should see a screen like the following:
Figure 52: Network Configuration 2. Select the TCP/IP protocol for your network card. 3. Click on the Properties button. You should then see a screen like the following. 61 Wireless Access Point User Guide Figure 53: IP Address (Win 95) Ensure your TCP/IP settings are correct, as follows:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using "Specify an IP Address"
If your PC is already configured, do NOT change the settings on the IP Address tab shown in Figure 53 above. On the Gateway tab, enter the Wireless Access Point's IP address in the New Gateway field and click Add. Your LAN administrator can advise you of the IP Address they assigned to the Wireless Access Point. Figure 54: Gateway Tab On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search Order list is empty, enter the DNS address provided by your ISP in the fields beside the Add button, then click Add. 62 Appendix C - Windows TCP/IP Figure 55: DNS Tab (Win 95/98) Checking TCP/IP Settings - Windows NT4.0 1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as shown below. Figure 56: Windows NT4.0 - TCP/IP 2. Click the Properties button to see a screen like the one below. 63 Wireless Access Point User Guide Figure 57: Windows NT4.0 - IP Address 3. Select the network card for your LAN. 4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify an IP Address, as explained below. Obtain an IP address from a DHCP Server This is the default Windows setting. Using this method is recommended. By default, the Wireless Access Point will act as a DHCP Server. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Specify an IP Address If your PC is already configured, check with your network administrator before making the following changes. 1. The Default Gateway must be set to the IP address of the Wireless Access Point. To set this:
Click the Advanced button on the screen above. On the following screen, click the Add button in the Gateways panel, and enter the Wireless Access Point's IP address, as shown in Figure 58 below. If necessary, use the Up button to make the Wireless Access Point the first entry in the Gateways list. 64 Appendix C - Windows TCP/IP Figure 58 - Windows NT4.0 - Add Gateway 2. The DNS should be set to the address provided by your ISP, as follows:
Click the DNS tab. On the DNS screen, shown below, click the Add button (under DNS Service Search Order), and enter the DNS provided by your ISP. Figure 59: Windows NT4.0 - DNS 65 Wireless Access Point User Guide Checking TCP/IP Settings - Windows 2000 1. Select Control Panel - Network and Dial-up Connection. 2. Right click the Local Area Connection icon and select Properties. You should see a screen like the following:
Figure 60: Network Configuration (Win 2000) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 61: TCP/IP Properties (Win 2000) 66 Appendix C - Windows TCP/IP 5. Ensure your TCP/IP settings are correct:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check your ISP's documentation before making the following changes. Enter the Wireless Access Point's IP address in the Default gateway field and click OK. If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK. 67 Wireless Access Point User Guide Checking TCP/IP Settings - Windows XP 1. Select Control Panel - Network Connection. 2. Right click the Local Area Connection and choose Properties. You should see a screen like the following:
Figure 62: Network Configuration (Windows XP) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 63: TCP/IP Properties (Windows XP) 68 Appendix C - Windows TCP/IP 5. Ensure your TCP/IP settings are correct. Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, do NOT change the settings on the screen shown in Figure 63 above, unless advised to do so by your network administrator. You can enter the Wireless Access Point's IP address in the Default gateway field and click OK. Your LAN administrator can advise you of the IP Address they assigned to the Wire-
less Access Point. If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK. Wireless LANs Wireless networks have their own terms and jargon. It is necessary to understand many of these terms in order to configure and operate a Wireless LAN. Modes Wireless LANs can work in either of two (2) modes:
Ad-hoc Infrastructure Ad-hoc Mode Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Sta-
tions (e.g. notebook PCs with wireless cards) communicate directly with each other. Infrastructure Mode In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations
(e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations can then access all LAN resources. Access Points can only function in "Infrastructure" mode, and can communicate only with Wireless Stations which are set to "Infrastructure" mode. SSID/ESSID BSS/SSID A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). 69 Wireless Access Point User Guide Using the same SSID is essential. Devices with different SSIDs are unable to communi-
cate with each other. However, some Access Points allow connections from Wireless Stations which have their SSID set to any or whose SSID is blank ( null ). ESS/ESSID A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form an Extended Service Set (ESS). Different Access Points within an ESS can use different Channels. To reduce interference, it is recommended that adjacent Access Points SHOULD use different channels. As Wireless Stations are physically moved through the area covered by an ESS, they will automatically change to the Access Point which has the least interference or best perform-
ance. This capability is called Roaming. (Access Points do not have or require Roaming capabilities.) Channels The Wireless Channel sets the radio frequency used for communication. Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a Channel which provides the least interference and best performance. For 802.11g, 11 channels are available in the USA and Canada., but 11channels are available in North America if using 802.11b. If using multiple Access Points, it is better if adjacent Access Points use different Channels to reduce interference. The recommended Channel spacing between adjacent Access Points is 5 Channels (e.g. use Channels 1 and 6, or 6 and 11). In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access Point. If more than one Access Point can be used, the one with the strongest signal is used. (This can only happen within an ESS.) If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the same Channel. However, most Wireless stations will still scan all Channels to see if there is an existing "Ad-hoc" group they can join. WEP WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is transmitted. This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless unless the receiver can decrypt it. If WEP is used, the Wireless Stations and the Wireless Access Point must have the same settings. WPA-PSK Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption key is derived from the PSK, and changes frequently. 70 Appendix C - Windows TCP/IP WPA-802.1x WPA-802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when required. All data transmission is encrypted using the WPA standard. Keys are automatically gener-
ated, so no key input is required. 802.1x This uses the 802.1x standard for client authentication, and WEP for data encryption. If possible, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when required. All data transmission is encrypted using the WEP standard. You only have to select the WEP key size; the WEP key is automatically generated. 71
1 2 | UserMan | Users Manual | 2.65 MiB | March 19 2004 |
TABLE OF CONTENTS CHAPTER 1 INTRODUCTION.............................................................................................. 1 Features of your Wireless Access Point ........................................................................... 1 Package Contents............................................................................................................... 3 Physical Details .................................................................................................................. 3 CHAPTER 2 INSTALLATION ............................................................................................... 5 Requirements ..................................................................................................................... 5 Procedure ........................................................................................................................... 5 CHAPTER 3 ACCESS POINT SETUP................................................................................... 7 Overview ............................................................................................................................ 7 Setup using the Windows Utility ...................................................................................... 7 Setup using a Web Browser.............................................................................................. 9 System Screen .................................................................................................................. 12 Access Control Screen..................................................................................................... 14 2.4GHz Wireless Screens ................................................................................................ 17 Basic Settings Screen....................................................................................................... 17 Security Settings .............................................................................................................. 19 Advanced Settings ........................................................................................................... 25 CHAPTER 4 PC AND SERVER CONFIGURATION........................................................ 27 Overview .......................................................................................................................... 27 Using WEP ....................................................................................................................... 27 Using WPA-PSK............................................................................ ~
802.1x Mode - Overview ............................................................... ~
802.1x Server Setup (Windows 2000 Server) ................................................................ 29 802.1x Client Setup on Windows XP.............................................................................. 39 CHAPTER 5 OPERATION AND STATUS ......................................................................... 46 Operation ......................................................................................................................... 46 Status Screen.................................................................................................................... 46 CHAPTER 6 OTHER SETTINGS & FEATURES .............................................................. 51 Overview .......................................................................................................................... 51 Admin Login Screen........................................................................................................ 51 Config File........................................................................................................................ 53 Firmware Upgrade .......................................................................................................... 54 APPENDIX A SPECIFICATIONS........................................................................................ 55 Wireless Access Point ...................................................................................................... 55 APPENDIX B TROUBLESHOOTING................................................................................. 59 Overview .......................................................................................................................... 59 General Problems ............................................................................................................ 59 APPENDIX C WINDOWS TCP/IP ....................................................................................... 61 Overview .......................................................................................................................... 61 Checking TCP/IP Settings - Windows 9x/ME: ............................................................. 61 Checking TCP/IP Settings - Windows NT4.0................................................................ 63 Checking TCP/IP Settings - Windows 2000 .................................................................. 66 Checking TCP/IP Settings - Windows XP..................................................................... 68 Wireless LANs ................................................................................................................. 69
! |wqC
! |wqC i P/N: 9560N90001 Copyright Document Version: 1.1 All trademarks and trade names are the properties of their respective owners. 2004. All Rights Reserved. ii Chapter 1 Introduction 1 This Chapter provides an overview of the Wireless Access Point's features and capabilities. Congratulations on the purchase of your new Wireless Access Point. The Wireless Access Point links your 802.11g or 802.11b Wireless Stations to your wired LAN. The Wireless stations and devices on the wired LAN are then on the same network, and can communicate with each other without regard for whether they are connected to the network via a Wireless or wired connection. Figure 1: Wireless Access Point The auto-sensing capability of the Wireless Access Point allows packet transmission up to 54Mbps for maximum throughput, or automatic speed reduction to lower speeds when the environment does not permit maximum throughput. Features of your Wireless Access Point The Wireless Access Point incorporates many advanced features, carefully designed to provide sophisticated functions while being easy to use. Standards Compliant. The Wireless Router complies with the IEEE802.11g (DSSS) specifications for Wireless LANs. Supports both 802.11b and 802.11g Wireless Stations. The 802.11g standard provides for backward compatibility with the 802.11b standard, so both 802.11b and 802.11g Wireless stations can be used simultaneously. 802.1x Support. Support for 802.1x mode is included, providing for the industrial-
strength wireless security of 802.1x authentication and authorization. Radius Client Support. The Wireless Access Point can login to your existing Radius Server (as a Radius client). 1 Wireless Access Point User Guide Dynamic WEP key Support. In 802.1x mode, either fixed or Dynamic WEP keys can be used. Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web Browser. WEP support. Support for WEP (Wired Equivalent Privacy) is included. Both 64 Bit and 128 Bit keys are supported. WPA support. Support for WPA is included. WPA is more secure than WEP, and should be used if possible. Access Control. The Access Control feature can ensure that only trusted Wireless Stations can use the Wireless Access Point to gain access to your LAN. Simple Configuration. If the default settings are unsuitable, they can be changed quickly and easily. DHCP Client Support. Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request. The Wireless Access Point can act as a DHCP Client, and obtain an IP address and related information from your existing DHPC Server. NetBIOS & WINS Support. Support for both NetBIOS broadcast and WINS (Win-
dows Internet Naming Service) allows the Wireless Access Point to easily fit into your existing Windows network. Password - protected Configuration. Optional password protection is provided to prevent unauthorized users from modifying the configuration data and settings. 2 Introduction Package Contents The following items should be included:
Wireless Access Point Power Adapter Quick Start Guide CD-ROM containing the on-line manual If any of the above items are damaged or missing, please contact your dealer immediately. Physical Details Front Panel LEDs Status Power LAN Figure 2: Front Panel On - Error condition. Off - Normal operation. Blinking - During start up, and when the Firmware is being upgraded. On - Normal operation. Off - No power On - The LAN (Ethernet) port is active. Off - No active connection on the LAN (Ethernet) port. Flashing - Data is being transmitted or received via the corresponding LAN (Ethernet) port. Wireless LAN On - Idle Off - Error- Wireless connection is not available. Flashing - Data is being transmitted or received via the Wireless access point. Data includes "network traffic" as well as user data. 3 Wireless Access Point User Guide Rear Panel Antenna Console port Reset Button Figure 3 Rear Panel One antenna (aerial) is supplied. Best results are usually obtained with the antenna in a vertical position. DB9 female RS232 port. This button has two (2) functions:
Reboot. When pressed and released, the Wireless Access Point will reboot (restart). Reset to Factory Defaults. This button can also be used to clear ALL data and restore ALL settings to the factory default values. To Clear All Data and restore the factory default values:
1. Power Off the Access Point 2. Hold the Reset Button down while you Power On the Access Point. 3. Continue holding the Reset Button until the Status (Red) LED blinks TWICE. 4. Release the Reset Button. The factory default configuration has now been restored, and the Access Point is ready for use. Ethernet Power port Use a standard LAN cable (RJ45 connectors) to connect this port to a 10BaseT or 100BaseT hub on your LAN. Connect the supplied power adapter here. 4 Chapter 2 Installation 2 This Chapter covers the physical installation of the Wireless Access Point. Requirements Requirements:
TCP/IP network Ethernet cable with RJ-45 connectors Installed Wireless network adapter for each PC that will be wirelessly connected to the network Procedure 1. Select a suitable location for the installation of your Wireless Access Point. To maximize reliability and performance, follow these guidelines:
Use an elevated location, such as wall mounted or on the top of a cubicle. Place the Wireless Access Point near the center of your wireless coverage area. If possible, ensure there are no thick walls or metal shielding between the Wireless Access Point and Wireless stations. Under ideal conditions, the Wireless Access Point has a range of around 150 meters (450 feet). The range is reduced, and transmission speed is lower, if there are any obstructions between Wireless devices. Figure 4: Installation Diagram 5 Wireless Access Point User Guide 2. Use a standard LAN cable to connect the Ethernet port on the Wireless Access Point to a 10/100BaseT hub on your LAN. 3. Connect the supplied power adapter to the Wireless Access Point and a convenient power outlet, and power up. 4. Check the LEDs:
The Status LED should flash, then turn OFF. The Power, WLAN, and LAN LED should be ON. For more information, refer to Front Panel LEDs in Chapter 1. 6 Chapter 3 Access Point Setup 3 This Chapter provides details of the Setup process for Basic Operation of your Wireless Access Point. Overview This chapter describes the setup procedure to make the Wireless Access Point a valid device on your LAN, and to function as an Access Point for your Wireless Stations. Wireless Stations may also require configuration. For details, see Chapter 4 - Wireless Station Configuration. The Wireless Access Point can be configured using either the supplied Windows utility or your Web Browser Setup using the Windows Utility A simple Windows setup utility is supplied on the CD-ROM. This utility can be used to assign a suitable IP address to the Wireless Access Point. Using this utility is recommended, because it can locate the Wireless Access Point even if it has an invalid IP address. Insert the supplied CD-ROM in your drive. Installation 1. 2. Run the SETUP.exe program in the root folder. 3. Follow the prompts to complete the installation. Main Screen Start the program by using the icon created by the setup program. When run, the program searches the network for all active Wireless Access Points, then lists them on screen, as shown by the example below. Figure 5: Management utility Screen 7 Wireless Access Point User Guide IP. The IP address for the Wireless Access Point. Wireless Access Points On the center of the screen is a list of all Wireless Access Points found on the network. For each device, the following data is shown:
Server Name. The Server Name is shown on a sticker on the base of the device. MAC. The hardware or physical address of the Wireless Access Point. SSID. The SSID setting for the Wireless Access Point. (The SSID is case sensitive.) Channel. The current channel used by the Wireless Access Point. Version. The current version number for the Wireless Access Point. Description. Any extra information for the Wireless Access Point. Note: If the desired Wireless Access Point is not listed, check that the device is installed and ON, then Refresh the list. Buttons Refresh. Click this button to update the Wireless Access Point device listing after chang-
ing the name or IP Address. Web Management. You can use this button to connect the Wireless Access Point to do some setup using web browser. Set IP Address. Click this button if you want to change the IP Address of the device. Exit. Exit the Management utility program by clicking this button. Setup Procedure 1. Select the desired Wireless Access Point. 2. Click the Set IP Address button. 3. If prompted, enter the user name and password. The default values are admin for the User Name, and a blank Password 4. Ensure the IP address, Network Mask, and Gateway are correct for your LAN. Save any changes. 5. Click the Web Management button to connect to the selected Wireless Access Point using your Web Browser. If prompted, enter the User Name and Password again. 6. Configure the following screens, using the on-line help if necessary. The following section also provides more details about each of these screens. Wireless Security Password 7. Setup is now complete. 8 Setup Setup using a Web Browser Your Browser must support JavaScript. The configuration program has been tested on the following browsers:
Netscape V4.08 or later Internet Explorer V4 or later Setup Procedure Before commencing, install the Wireless Access Point in your LAN, as described previously. 1. Check the Wireless Access Point to determine its Default Name. This is shown on a label on the base or rear, and is in the following format:
SCxxxxxx Where xxxxxx is a set of 6 Hex characters ( 0 ~ 9, and A ~ F ). 2. Use a PC which is already connected to your LAN, either by a wired connection or another Access Point. Until the Wireless Access Point is configured, establishing a Wireless connection to it may be not possible. If your LAN contains a Router or Routers, ensure the PC used for configuration is on the same LAN segment as the Wireless Access Point. 3. Start your Web browser. 4. In the Address box, enter "HTTP://" and the Default Name of the Wireless Access Point e.g. HTTP://SC2D631A 5. You should then see a login prompt, which will ask for a User Name and Password. Enter admin for the User Name, and password for the Password. These are the default values. The password (but not the user name) can and should be changed. Always enter the current password, as set on the Admin Login screen. Figure 6: Password Dialog 6. You will then see the Status screen, which displays the current settings and status. No data input is possible on this screen. 9 7. From the menu, select and configure the following options, as described in the following Wireless Access Point User Guide sections:
System Access Control 2.4GHz Wireless Basic Security Advanced Management 8. Setup of the Wireless Access Point is now complete. Wireless stations must now be set to match the Wireless Access Point. See Chapter 4 for details. If you can't connect:
It is likely that your PCs IP address is incompatible with the Wireless Access Points IP address. This can happen if your LAN does not have a DHCP Server. The default IP address of the Wireless Access Point is 192.168.0.100, with a Network Mask of 255.255.255.0. If your PCs IP address is not compatible with this, you must change your PCs IP address to an unused value in the range 192.168.0.1 ~ 192.168.0.254, with a Net-
work Mask of 255.255.255.0. See Appendix C - Windows TCP/IP for details for this procedure. 10 Status Screen When you first connect, you will see the Status screen. This displays the current settings and status of the Wireless Access Point. No data can be input on this screen. Setup Figure 7: Status Screen For further details of this screen, refer to Status Screen in Chapter 5. 11 Wireless Access Point User Guide System Screen Click System on the menu to view a screen like the following. Figure 8: System Screen Data - System Screen Identification Access Point Name Description Enter a suitable name for this Access Point. If desired, you can enter a description for the Access Point. Country Domain Select the country or domain matching your current location. MAC Address The read-only field shows the current MAC Address. IP Address DHCP Client Fixed Select this option if you have a DHCP Server on your LAN, and you wish the Access Point to obtain an IP address automatically. If selected, the following data must be entered. IP Address - The IP Address of this device. Enter an unused IP address from the address range on your LAN. Subnet Mask - The Network Mask associated with the IP Address above. Enter the value used by other devices on your LAN. Gateway - The IP Address of your Gateway or Router. Enter the value used by other devices on your LAN. DNS - Enter the DNS (Domain Name Server) used by PCs on your LAN. 12 Setup If your LAN has a WINS server, you can enable this to have this AP register with the WINS server. Enter the name or IP address of your WINS server. If desired, you can enable this option. If enabled, you will able to connect to this AP using a Telnet client. You will have to provide the same login data (user name, password) as for a HTTP (Web) connec-
tion. WINS Enable WINS WINS Server Name/IP Ad-
dress Telnet Enable Telnet Management 13 Wireless Access Point User Guide Access Control Screen This feature can be used to block access to your LAN by unknown or untrusted wireless sta-
tions. Click Access Control on the menu to view a screen like the following. Figure 9: Access Control Screen Data - Access Control Screen Enable Use this checkbox to Enable or Disable this feature as desired. Warning ! Ensure you own PC is in the "Trusted Wireless Stations"
list before enabling this feature.. Trusted Stations This table lists any Wireless Stations you have designated as "Trusted". If you have not added any stations, this table will be empty. For each Wireless station, the following data is displayed:
MAC Address - the MAC or physical address of each Wire-
less station. Connected - this indicates whether or not the Wireless station is currently associates with this Access Point. Buttons Modify List Read from File Write to File To change the list of Trusted Stations (Add, Edit, or Delete a Wireless Station or Stations), click this button. To upload a list of Trusted Stations from a file on your PC, click this button. To download the current list of Trusted Stations from the Access Point to a file on your PC, click this button. 14 Setup Trusted Wireless Stations This feature can be used to block access to your LAN by unknown or untrusted wireless sta-
tions., use the Modify List button on the Access Control screen. You will see a screen like the sample below. Figure 10: Trusted Wireless Stations Data - Trusted Wireless Stations Trusted Wireless Stations This lists any Wireless Stations which you have designated as Trusted. Other Wireless Stations This list any Wireless Stations detected by the Access Point, which you have not designated as "Trusted". Address Buttons
<<
>>
Edit Used when adding or editing a Trusted Station, to display or enter the address (MAC or physical address) of the Wireless station. Used to add Wireless stations to the Trusted Wireless Station list. Select the desired Station or Stations in the Other Wireless Stations list, then click this button. Used to delete Wireless stations from the Trusted Wireless Station list. Select the desired Station or Stations in the Trusted Wireless Sta-
tions list, then click this button. Used to edit an existing Wireless Station:
1. Select a station in the Trusted Wireless Stations list 2. Click the Edit button. The data from the selected station is copied to the Address field, and the Add button changes to Up-
date. 3. Edit the address as required. 4. Click the Update button to save your changes, or Clear if you do not wish to save. 15 Wireless Access Point User Guide Add Clear To add a Trusted Station which is not in the "Other Wireless Sta-
tions" list, enter the required data and click this button. Clear the Address field. If editing, this also cancels the edit and changes the Update button back to Add. 16 Setup 2.4GHz Wireless Screens There are 3 configuration screens available:
Basic Security Advanced Basic Settings Screen The settings on this screen must match the settings used by Wireless Stations. Click Basic on the menu to view a screen like the following. Figure 11: Basic Settings Screen Data - Basic Settings Screen Operation Wireless Mode Select the desired option:
Disable - select this if for some reason you do not this AP to transmit or receive at all. 802.11b and 802.11g - this is the default, and will allow connec-
tions by both 802.11b and 802.1g wireless stations. 802.11b - if selected, only 802.11b connections are allowed. 802.11g wireless stations will only be able to connect if they are fully backward-compatible with the 802.11b standard. 802.11g - only 802.11g connections are allowed. If you only have 802.11g, selecting this option may provide a performance im-
provement over using the default setting. Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. Dynamic Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. Static Super 802.11g (108Mbps) - select this only if all wireless stations support this mode. 17 Wireless Access Point User Guide Operating Mode Remote AP MAC Address Channel No Current Channel No. SSID Broadcast SSID Select the desired mode:
Wireless Access Point - operate as a normal Access Point Client Access Point - act as a client for another Access Point. If selected, you must provide the address (MAC address) of the other Access Point (Remote AP). Repeater Access Point - act as a repeater for another Access Point. If selected, you must provide the address (MAC address) of the other Access Point (Remote AP). This is not required unless the Operating Mode is "Client Access Point"
or "Repeater Access Point". In either of these modes, you must provide the MAC address of the other AP in this field. You can either enter the MAC address directly, or, if the other AP is on-line, you can click the
"Select AP" button and select from a list of available APs. If "Automatic" is selected, the Wireless Access Point will self-select a Wireless Channel. If you experience interference (shown by lost connections and/or slow data transfers) you may need to experiment with different channels to see which Channel is the best. This displays the current channel used by the Access Point. Enter the desired SSID. Wireless Stations must use the same SSID. Note: The SSID is case sensitive. If Enabled, the SSID will be broadcast to all Wireless Stations. Stations which have no SSID (or a "null" value) can then adopt the correct SSID for connections to this Access Point. 18 Setup Security Settings The Security screen is accessed from the main menu, and it provides 5 options as below:
None WEP WPA-PSK WPA-802.1x 802.1X Security Settings - None If "None" is selected, no security is used, and there are no settings to configure. Security Settings - WEP Selecting the WEP option will result in a screen like the following. Data - WEP Screen WEP Data Encryption Figure 12: WEP Settings Select the desired option:
64 Bit Encryption - Keys are 10 Hex (5 ASCII) characters. 128 Bit Encryption - Keys are 26 Hex (13 ASCII) charac-
ters. 19 Wireless Access Point User Guide Authentication Key Input Key 1.. Key 4 Passphrase Normally, you can leave this at Automatic, so that Wireless Stations can use either method ("Open System" or "Shared Key".). If you wish to use a particular method, select the appropriate value - "Open System" or "Shared Key". All Wireless stations must then be set to use the same method. Select "Hex" or "ASCII" depending on your input method. (All keys are converted to Hex, ASCII input is only for conven-
ience.) Enter the key value you wish to use. Other stations must have the same key. Use this to generate a key or keys, instead of entering them directly. Enter a word or group of printable characters in the Passphrase box and click the "Generate Key" button to auto-
matically configure the WEP Key(s). If encryption strength is set to 64 bit, then each of the four key fields will be populated with key values. If encryption strength is set to 128 bit, then only the selected WEP key field will be given a key value. Security Settings - WPA-PSK Selecting the WPA-PSK option will result in a screen like the following. Figure 13: WPA-PSK Settings Data - WPA-PSK Screen WPA-PSK Network Key WPA Encryption Enter the key value. Data is encrypted using this key. Other Wireless Stations must use the same key. Select the desired option. Other Wireless Stations must use the same method. 20 Setup Pairwise Key Update This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime Group Key Update Key Lifetime Group key update when any membership terminated This field determines how often Pairwise keys are dynamically updated. Enter the desired value. This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. This field determines how often the Group key is dynamically updated. Enter the desired value. If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. Security Settings - WPA-802.1x This version of WPA requires that you have a Radius Server on your LAN. Selecting the WPA-802.1x option will result in a screen like the following. Figure 14: WPA-802.1x Settings Data - WPA-802.1x Screen WPA-802.1x Radius Server Enter the name or IP address of the Radius Server on your network. Radius Port Enter the port number used for connections to the Radius Server. 21 Wireless Access Point User Guide Client Login Name This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. Shared Key This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. WPA Encryption Select the desired option. Other Wireless Stations must use the same method. TKIP - Unicast (point-to-point) transmissions are en-
crypted using TKIP, and multicast (broadcast) transmissions are not encrypted. TKIP + 64 bit WEP - Unicast (point-to-point) transmis-
sions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 64 bit WEP. TKIP + 128 bit WEP - - Unicast (point-to-point) transmis-
sions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 128 bit WEP. Pairwise Key Up-
date This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime This field determines how often Pairwise keys are dynamically updated. Enter the desired value. Group Key Update This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. Key Lifetime This field determines how often the Group key is dynamically updated. Enter the desired value. Group key update when any member-
ship terminated Radius Accounting If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port" field. Update Report every ... If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. 22 Security Settings - 802.1x 802.1x can only be used if you have a Radius Server on your LAN. Selecting the 802.1x option will result in a screen like the following. Setup Figure 15: 802.1x Settings Data - 802.1x Screen 802.1x Radius Server Address Radius Port Client Login Name Enter the name or IP address of the Radius Server on your network. Enter the port number used for connections to the Radius Server. This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. Shared Key This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. WEP Key Size Select the desired option:
64 Bit Encryption - Keys are 10 Hex (5 ASCII) charac-
ters. 128 Bit Encryption - Keys are 26 Hex (13 ASCII) characters. Key Exchange Key Lifetime Enable this if you want the keys to be updated regularly. This field determines how often keys are dynamically updated. Enter the desired value. 23 Wireless Access Point User Guide Radius Accounting Update Report every ... Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port" field. If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. 24 Advanced Settings Click the Advanced link on the menu will result in a screen like the following. Setup Figure 16: Advanced Settings Data - Advanced Settings Screen Basic Rate Basic Rate Selection Wireless Separation Parameters Disassociated Timeout The Basic Rate is used for broadcasting. It does not determine the data transmission rate, which is determined by the "Mode"
setting on the Basic screen. Select the desired option:
Auto-negotiate - This is the default, and will normally give the best results. Fixed Rate - If you don't use to use "Auto-negotiate", you must also select the desired speeds. If enabled, then each Wireless station using the Access Point is invisible to other Wireless stations. In most business situations, this setting should be Disabled. This determines how quickly a Wireless Station will be consid-
ered "Disassociated" with this AP, when no traffic is received. Enter the desired time period. Fragmentation Beacon Interval Enter the preferred setting between 256 and 2346. Enter the preferred setting between 0 and 3000. 25 Wireless Access Point User Guide RTS/CTS Threshold Enter the preferred setting between 256 and 2346. Output Power Level Select the desired power output. Higher levels will give a greater range, but are also more likely to cause interference with other devices. Preamble Type Select the desired preamble type. Antenna Selection 802.11b Protection Type Short Slot Time If your Access Point has only 1 antenna, there is only 1 option available. If your Access Point has 2 antennae, select the option which gives the best results in your location. Select the desired option. Enable or disable this setting as required. Protection Mode Normally, this should be left at "Auto". Protection Rate Select the desired option. 26 Chapter 4 PC and Server Configuration This Chapter details the PC Configuration required for each PC on the local LAN. 4 Overview All Wireless Stations need to have settings which match the Wireless Access Point. These settings depend on the mode in which the Access Point is being used. If using WEP or WPA-PSK, it is only necessary to ensure that each Wireless station's settings match those of the Wireless Access Point, as described below. For WPA-802.1x and 802.1x modes, configuration is much more complex. The Radius Server must be configured correctly, and setup of each Wireless station is also more com-
plex. Using WEP For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode On each PC, the mode must be set to Infrastructure. SSID (ESSID) Wireless Security This must match the value used on the Wireless Access Point. The default value is default Note! The SSID is case sensitive. Each Wireless station must be set to use WEP data encryption. The Key size (64 bit or 128 bit) must be set to match the Access Point. The keys values on the PC must match the key values on the Access Point. Note:
On some systems, the "64 bit" key is shown as "40 bit" and "128 bit" is shown as "104 bit". This difference arises because the key input by the user is 24 bits less than the key size used for encryption. 27 Wireless Access Point User Guide Using WPA-802.1x This is the most secure and most complex system. 802.1x mode provides greater security and centralized management, but it is more complex to configure. Wireless Station Configuration For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode On each PC, the mode must be set to Infrastructure. SSID (ESSID) 802.1x Authentication This must match the value used on the Wireless Access Point. The default value is default Note! The SSID is case sensitive. Each client must obtain a Certificate which is used for authentication for the Radius Server. 802.1x Encryption Typically, EAP-TLS is used. This is a dynamic key system, so keys do NOT have to be entered on each Wireless station. Radius Server Configuration If using WPA-802.1x mode, the Radius Server on your network must be configured as follow:
There must be a Client Login for the Wireless Access Point itself. It must provide and accept Certificates for user authentication. The Wireless Access Point will use its Default Name as its Client Login name. The Shared Key, set on the Security Screen of the Access Point, must match the Shared Secret value on the Radius Server. Encryption settings must be correct. 28 PC and Server Configuration 802.1x Server Setup (Windows 2000 Server) dhcpd dns rras This section describes using Microsoft Internet Authentication Server as the Radius Server, since it is the most common Radius Server available that supports the EAP-TLS authentication method. The following services on the Windows 2000 Domain Controller (PDC) are also required:
webserver (IIS) Radius Server (Internet Authentication Service) Certificate Authority Windows 2000 Domain Controller Setup 1. Run dcpromo.exe from the command prompt. 2. Follow all of the default prompts, ensure that DNS is installed and enabled during installa-
tion. Services Installation 1. Select the Control Panel - Add/Remove Programs. 2. Click Add/Remove Windows Components from the left side. 3. Ensure that the following components are activated (selected):
Certificate Services. After enabling this, you will see a warning that the computer cannot be renamed and joined after installing certificate services. Select Yes to select certificate services and continue World Wide Web Server. Select World Wide Web Server on the Internet Information Services (IIS) component. From the Networking Services category, select Dynamic Host Configuration Protocol
(DHCP), and Internet Authentication Service (DNS should already be selected and in-
stalled). 29 Wireless Access Point User Guide Figure 17: Components Screen 4. Click Next. 5. Select the Enterprise root CA, and click Next. 6. Enter the information for the Certificate Authority, and click Next. Figure 18: Certification Screen 30 PC and Server Configuration Figure 19: CA Screen 7. Click Next if you don't want to change the CA's configuration data. 8. Installation will warn you that Internet Information Services are running, and must be stopped before continuing. Click Ok, then Finish. DHCP server configuration 1. Click on the Start - Programs - Administrative Tools - DHCP 2. Right-click on the server entry as shown, and select New Scope. Figure 20: DHCP Screen 3. Click Next when the New Scope Wizard Begins. 4. Enter the name and description for the scope, click Next. 5. Define the IP address range. Change the subnet mask if necessary. Click Next. 31 Wireless Access Point User Guide Figure 21:IP Address Screen 6. Add exclusions in the address fields if required. If no exclusions are required, leave it blank. Click Next. 7. Change the Lease Duration time if preferred. Click Next. 8. Select Yes, I want to configure these options now, and click Next. 9. Enter the router address for the current subnet. The router address may be left blank if there is no router. Click Next. 10. For the Parent domain, enter the domain you specified for the domain controller setup, and enter the server's address for the IP address. Click Next. Figure 22: DNS Screen 11. If you don't want a WINS server, just click Next. 12. Select Yes, I want to activate this scope now. Click Next, then Finish. 13. Right-click on the server, and select Authorize. It may take a few minutes to complete. 32 PC and Server Configuration Certificate Authority Setup 1. Select Start - Programs - Administrative Tools - Certification Authority. 2. Right-click Policy Settings, and select New - Certificate to Issue. Figure 23: Certificate Authority Screen 3. Select Authenticated Session and Smartcard Logon (select more than one by holding down the Ctrl key). Click OK. Figure 24: Template Screen 4. Select Start - Programs - Administrative Tools - Active Directory Users and Computers. 5. Right-click on your active directory domain, and select Properties. 33 Wireless Access Point User Guide 6. Select the Group Policy tab, choose Default Domain Policy then click Edit. Figure 25: Active Directory Screen Figure 26: Group Policy Tab 7. Select Computer Configuration - Windows Settings - Security Settings - Public Key Poli-
cies, right-click Automatic Certificate Request Settings - New - Automatic Certificate Request. 34 PC and Server Configuration Figure 27: Group Policy Screen 8. When the Certificate Request Wizard appears, click Next. 9. Select Computer, then click Next. Figure 28: Certificate Template Screen 10. Ensure that your certificate authority is checked, then click Next. 11. Review the policy change information and click Finish. 12. Click Start - Run, type cmd and press enter. Enter secedit /refreshpolicy machine_policy This command may take a few minutes to take effect. 35 Wireless Access Point User Guide Internet Authentication Service (Radius) Setup 1. Select Start - Programs - Administrative Tools - Internet Authentication Service 2. Right-click on Clients, and select New Client. Figure 29: Service Screen 3. Enter a name for the access point, click Next. 4. Enter the address or name of the Wireless Access Point, and set the shared secret, as entered on the Security Settings of the Wireless Access Point. 5. Click Finish. 6. Right-click on Remote Access Policies, select New Remote Access Policy. 7. Assuming you are using EAP-TLS, name the policy eap-tls, and click Next. 8. Click Add... If you don't want to set any restrictions and a condition is required, select Day-And-Time-
Restrictions, and click Add... Figure 30: Attribute Screen 9. Click Permitted, then OK. Select Next. 10. Select Grant remote access permission. Click Next. 36 11. Click Edit Profile... and select the Authentication tab. Enable Extensible Authentication Protocol, and select Smart Card or other Certificate. Deselect other authentication meth-
ods listed. Click OK. PC and Server Configuration 12. Select No if you don't want to view the help for EAP. Click Finish. Figure 31: Authentication Screen 37 Wireless Access Point User Guide Remote Access Login for Users 1. Select Start - Programs - Administrative Tools- Active Directory Users and Computers. 2. Double click on the user who you want to enable. 3. Select the Dial-in tab, and enable Allow access. Click OK. Figure 32: Dial-in Screen 38 PC and Server Configuration 802.1x Client Setup on Windows XP Windows XP ships with a complete 802.1x client implementation. If using Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality. If you don't have either of these systems, you must use the 802.1x client software provided with your wireless adapter. Refer to your vendor's documentation for setup instructions. The following instructions assume that:
You are using Windows XP You are connecting to a Windows 2000 server for authentication. You already have a login (User name and password) on the Windows 2000 server. Client Certificate Setup 1. Connect to a network which doesn't require port authentication. 2. Start your Web Browser. In the Address box, enter the IP address of the Windows 2000 Server, followed by /certsrv e.g http://192.168.0.2/certsrv 3. You will be prompted for a user name and password. Enter the User name and Password assigned to you by your network administrator, and click OK. Figure 33: Connect Screen 4. On the first screen (below), select Request a certificate, click Next. 39 Wireless Access Point User Guide Figure 34: Wireless CA Screen 5. Select User certificate request and select User Certificate, the click Next. Figure 35: Request Type Screen 6. Click Submit. 40 PC and Server Configuration Figure 36: Identifying Information Screen 7. A message will be displayed, then the certificate will be returned to you. Click Install this certificate. Figure 37:Certificate Issued Screen 8. You will receive a confirmation message. Click Yes. 41 Wireless Access Point User Guide Figure 38: Root Certificate Screen 9. Certificate setup is now complete. 802.1x Authentication Setup 1. Open the properties for the wireless connection, by selecting Start - Control Panel -
Network Connections. 2. Right Click on the Wireless Network Connection, and select Properties. 3. Select the Authentication Tab, and ensure that Enable network access control using IEEE 802.1X is selected, and Smart Card or other Certificate is selected from the EAP type. Figure 39: Authentication Tab Encryption Settings The Encryption settings must match the APs (Access Points) on the Wireless network you wish to join. Windows XP will detect any available Wireless networks, and allow you to configure each network independently. 42 PC and Server Configuration Your network administrator can advise you of the correct settings for each network. 802.1x networks typically use EAP-TLS. This is a dynamic key system, so there is no need to en-
ter key values. Enabling Encryption To enable encryption for a wireless network, follow this procedure:
1. Click on the Wireless Networks tab. Figure 40: Wireless Networks Screen 2. Select the wireless network from the Available Networks list, and click Configure. 3. Select and enter the correct values, as advised by your Network Administrator. For example, to use EAP-TLS, you would enable Data encryption, and click the checkbox for the setting The key is provided for me automatically, as shown below. 43 Wireless Access Point User Guide Figure 41: Properties Screen Setup for Windows XP and 802.1x client is now complete. 44 PC and Server Configuration Using 802.1x Mode (without WPA) This is very similar to using WPA-802.1x. The only difference is that on your client, you must NOT enable the setting The key is provided for me automatically. Instead, you must enter the WEP key manually, ensuring it matches the WEP key used on the Access Point. Figure 42: Properties Screen Note:
On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is shown as "104 bit". This difference arises because the key input by the user is 24 bits less than the key size used for encryption. 45 Chapter 5 Operation and Status 5 This Chapter details the operation of the Wireless Access Point and the status screens. Operation Once both the Wireless Access Point and the PCs are configured, operation is automatic. However, you may need to perform the following operations on a regular basis. If using the Access Control feature, update the Trusted PC database as required. (See Access Control in Chapter 3 for details.) If using 802.1x mode, update the User Login data on the Windows 2000 Server, and configure the client PCs, as required. Status Screen Use the Status link on the main menu to view this screen. Figure 43: Status Screen 46 Operation and Status Data - Status Screen Access Point Access Point Name The current name will be displayed. MAC Address The MAC (physical) address of the Wireless Access Point. Domain This is the region for which this Wireless Access Point is licensed for use. Firmware Version The version of the firmware currently installed. TCP/IP IP Address Subnet Mask Gateway DHCP Client The IP Address of the Wireless Access Point. The Network Mask (Subnet Mask) for the IP Address above. Enter the Gateway for the LAN segment to which the Wireless Access Point is attached (the same value as the PCs on that LAN segment). This indicates whether the current IP address was obtained from a DHCP Server on your network. It will display "Enabled" or "Disabled". 2.4GHz Wireless SSID The current SSID. Channel/Frequency The Channel currently in use is displayed. Wireless Mode The current wireless mode is displayed. Operating Mode The current operational mode is displayed. Authentication This displays the current Authentication setting. Encryption Access Control The current Encryption setting is displayed. This indicates whether the Access Control feature is Enabled or Disabled.. Buttons Log Stations Click this to open a sub-window where you can view the activity log. Click this to open a sub-window where you can view the list of all current Wireless Stations using the Access Point. 2.4GHz Statistics Click this to open a sub-window where you can view Statistics on data transmitted or received by the Access Point. 47 Wireless Access Point User Guide Activity Log This screen is displayed when the Log button on the Status screen is clicked. Figure 44: Activity Log Screen Data - Activity Log Data Current Time The system date and time is displayed. Log Buttons Refresh Save to file Clear Log The Log shows details of the existing connections to the Wireless Access Point. Update the data on screen. Save the log to a file on your pc. This will delete all data currently in the Log. This will make it easier to read new messages. 48 Station List This screen is displayed when the Stations button on the Status screen is clicked. Operation and Status Figure 45 Station List Screen Data - Station List Screen Station List MAC Address The MAC (physical) address of each Wireless Station is displayed. Mode Status The mode of each Wireless Station. The current status of each Wireless Station is displayed. Refresh Button Update the data on screen. 49 Wireless Access Point User Guide Statistics Screen This screen is displayed when the 2.4GHzStatistics button on the Status screen is clicked. It shows details of the traffic flowing through the Wireless Access Point. Figure 46: Statistics Screen Data - Statistics Screen System Up Time System Up Time This indicates how long the system has been running since the last restart or reboot. 2.4GHz Wireless Authentication Deauthentication Association Disassociation Reassociation Wireless MSDU Data Number of Data transmitted to and received from Wireless Stations. Multicast Packets Number of Broadcast packets transmitted to and received from Wireless Stations, using Multicast transmission. Management Control 50 Chapter 6 Other Settings & Features This Chapter explains when and how to use the Wireless Access Point's
"Management" Features. 6 Overview This Chapter covers the following features, available on the Wireless Access Points Manage-
ment menu. Admin Login Config File Upgrade Firmware Admin Login Screen The Admin Login screen allows you to assign a password to the Wireless Access Point. This password limits access to the configuration interface. The default password is password. It is recommended that this be changed, using this screen. Figure 47: Admin Login Screen Data - Admin Login Screen User Name Enter the user name here New Password Enter the new password here Repeat New Password Re-enter the new password in this field. You will be prompted for the password when you connect, as shown below. 51 Wireless Access Point User Guide Figure 48: Password Dialog Enter admin for the User Name. Enter the Wireless Access Points password, as set on the Admin Login screen above. 52 Other Settings & Features Config File This screen allows you to Backup (download) the configuration file, and to restore (upload) a previously-saved configuration file. You can also set the Wireless Access Point back to its factory default settings. To reach this screen, select Config File in the Management section of the menu. Figure 49: Config File Screen Data - Config File Screen Backup Save a copy of cur-
rent settings Click the Backup button to download the current settings to a file on your PC. Restore Restore saved settings from a file Defaults Revert to factory default settings If you have a previously-saved configuration file, you can use this to restore those settings by uploading the file. 1. Click the Browse button and navigate to the location of the configuration file. 2. Select the upgrade file. Its name will appear in the File field. 3. Click the Restore button to commence the upload. 4. The Wireless Access Point will need to restart, and will be unavailable during the restart. All exiting connections will be broken. Use this to set the Wireless Access Point back to its factory default settings. Click Set to Defaults to start the procedure. The Wireless Access Point will need to restart, and will be unavailable during the restart. All exiting connections will be broken. 53 Wireless Access Point User Guide Firmware Upgrade The firmware (software) in the Wireless Access Point can be upgraded using your Web Browser. You must first download the upgrade file, and then select Upgrade Firmware in the Manage-
ment section of the menu. You will see a screen like the following. Figure 50: Firmware Upgrade Screen To perform the Firmware Upgrade:
1. Click the Browse button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Upgrade button to commence the firmware upgrade. The Wireless Access Point is unavailable during the upgrade process, and must restart when the upgrade is completed. Any connections to or through the Wireless Access Point will be lost. 54 Appendix A Specifications Wireless Access Point Hardware Specifications A CPU Radio-on-Chip DRAM Flash ROM LAN port 11G AR2312 AR2112 8 Mbytes (Expand to 64MB) 2 Mbytes (Expand to 8MB) 1 x Auto-MDIX RJ 45 for 10/100Mbps Ethernet Embedded Atheros solution Network Standard IEEE 802.11b (Wi-Fi) and IEEE 802.11g compliance OFDM; 802.11b: CCK (11 Mbps, 5.5 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps) Operating Frequencies 2.412.2.497 GHz Operating Channels 802.11g: 13 for North America, 13 for Europe (ETSI), 14 for Japan 802.11b: 11 for North America, 14 for Japan, 13 for Europe (ETSI) Operating temperature Storage temperature Power Adapter 0~55J
-20J ~70J DC 12V/1.2A Dimensions Wireless Specifications 141mm (W) x 100mm (D) x 27mm (H) Receive Sensitivity at 11Mbps min. -85dBm Receive Sensitivity at 5.5Mbps min. -89dBm Receive Sensitivity at 2Mbps Receive Sensitivity at 1Mbps Maximum Receive Level Transmit Power Modulation Throughput Operating Range min. -90dBm min. -93dBm min. -5dBm 18 dBm Direct Sequence Spread Spectrum BPSK / QPSK / CCK Up to 19 Mbps Indoors 55 Wireless Access Point User Guide Software Specifications 30 Meters (100ft.) @ 11Mbps 50 Meters (165ft.) @ 5.5Mbps 70 Meters (230ft.) @ 2Mbps 9 1Meters (300ft.) @ 1Mbps Outdoors 152 Meters (500ft.) @ 11Mbps 270 Meters (885ft.) @ 5.5Mbps 396 Meters (1300ft.) @ 2 Mbps 457 Meters (1500ft.) @ 1 Mbps Feature Wireless Operation Mode Security Management IEEE 802.11g/11b compliance Details Access point support Roaming supported Supper G (up to 108Mbps) Auto Sensing Open System / Share Key authentication Wireless Channels Support Automatic Wireless Channel Selection Antenna selection Tx Power Adjustment Country Selection Preamble Type: long or short support RTS Threshold Adjustment Fragmentation Threshold Adjustment Beacon Interval Adjustment SSID assignment Common AP Repeater Client AP Open, shared, WPA, and WPA-PSK authentication EAP-TLS, EAP-TTLS, PEAP Block inter-wireless station communication Block SSID broadcast Web based configuration RADIUS Accounting RADIUS-On feature RADIUS Accounting update CLI Message Log 802.1x support 56 Appendix A - Specifications Access Control list file support Configuration file Backup/Restore Statistics support Device discovery program Windows Utility DHCP client WINS client Other Features Firmware Upgrade HTTP, FTP network protocol download 57 Wireless Access Point User Guide FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communica-
tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver Increase the separation between the equipment and receiver. is connected. Consult the dealer or an experienced radio/TV technician for help. To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
(Example - use only shielded interface cables when connecting to computer or peripheral devices). FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 58 Appendix B Troubleshooting Overview B This chapter covers some common problems that may be encountered while using the Wireless Access Point and some possible solutions to them. If you follow the suggested steps and the Wireless Access Point still does not function properly, contact your dealer for further advice. General Problems Problem 1:
Solution 1:
Can't connect to the Wireless Access Point to configure it. Check the following:
The Wireless Access Point is properly installed, LAN connections are OK, and it is powered ON. Check the LEDs for port status. Ensure that your PC and the Wireless Access Point are on the same network segment. (If you don't have a router, this must be the case.) If your PC is set to "Obtain an IP Address automatically" (DHCP client), restart it. You can use the following method to determine the IP address of the Wireless Access Point, and then try to connect using the IP address, in-
stead of the name. To Find the Access Point's IP Address 1. Open a MS-DOS Prompt or Command Prompt Window. 2. Use the Ping command to ping the Wireless Access Point. Enter ping followed by the Default Name of the Wireless Access Point. e.g. ping SC003318 3. Check the output of the ping command to determine the IP address of the Wireless Access Point, as shown below. Figure 51: Ping If your PC uses a Fixed (Static) IP address, ensure that it is using an IP Address which is compatible with the address of the Wireless Access Point.
(The default IP Address and Mask of the Wireless Access Point is 192.168.0.100 and 255.255.255.0.) On Windows PCs, you can use Control Panel-Network to check the Properties for the TCP/IP protocol. 59 Wireless Access Point User Guide Problem 2: My PC can't connect to the LAN via the Wireless Access Point. Solution 2 Check the following:
The SSID and WEP settings on the PC match the settings on the Wire-
less Access Point. On the PC, the wireless mode is set to "Infrastructure"
If using the Access Control feature, the PC's name and address is in the Trusted Stations list. If using 802.1x mode, ensure the PC's 802.1x software is configured correctly. See Chapter 4 for details of setup for the Windows XP 802.1x client. If using a different client, refer to the vendor's documentation. 60 Appendix C Windows TCP/IP Overview C Normally, no changes need to be made. By default, the Wireless Access Point will act as a DHCP client, automatically obtaining a suitable IP Address (and related information) from your DHCP Server. If using Fixed (specified) IP addresses on your LAN (instead of a DHCP Server), there is not need to change the TCP/IP of each PC. Just configure the Wireless Access Point to match your existing LAN. The following sections provide details about checking the TCP/IP settings for various types of Windows, should that be necessary. Checking TCP/IP Settings - Windows 9x/ME:
1. Select Control Panel - Network. You should see a screen like the following:
Figure 52: Network Configuration 2. Select the TCP/IP protocol for your network card. 3. Click on the Properties button. You should then see a screen like the following. 61 Wireless Access Point User Guide Figure 53: IP Address (Win 95) Ensure your TCP/IP settings are correct, as follows:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using "Specify an IP Address"
If your PC is already configured, do NOT change the settings on the IP Address tab shown in Figure 53 above. On the Gateway tab, enter the Wireless Access Point's IP address in the New Gateway field and click Add. Your LAN administrator can advise you of the IP Address they assigned to the Wireless Access Point. Figure 54: Gateway Tab On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search Order list is empty, enter the DNS address provided by your ISP in the fields beside the Add button, then click Add. 62 Appendix C - Windows TCP/IP Figure 55: DNS Tab (Win 95/98) Checking TCP/IP Settings - Windows NT4.0 1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as shown below. Figure 56: Windows NT4.0 - TCP/IP 2. Click the Properties button to see a screen like the one below. 63 Wireless Access Point User Guide Figure 57: Windows NT4.0 - IP Address 3. Select the network card for your LAN. 4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify an IP Address, as explained below. Obtain an IP address from a DHCP Server This is the default Windows setting. Using this method is recommended. By default, the Wireless Access Point will act as a DHCP Server. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Specify an IP Address If your PC is already configured, check with your network administrator before making the following changes. 1. The Default Gateway must be set to the IP address of the Wireless Access Point. To set this:
Click the Advanced button on the screen above. On the following screen, click the Add button in the Gateways panel, and enter the Wireless Access Point's IP address, as shown in Figure 58 below. If necessary, use the Up button to make the Wireless Access Point the first entry in the Gateways list. 64 Appendix C - Windows TCP/IP Figure 58 - Windows NT4.0 - Add Gateway 2. The DNS should be set to the address provided by your ISP, as follows:
Click the DNS tab. On the DNS screen, shown below, click the Add button (under DNS Service Search Order), and enter the DNS provided by your ISP. Figure 59: Windows NT4.0 - DNS 65 Wireless Access Point User Guide Checking TCP/IP Settings - Windows 2000 1. Select Control Panel - Network and Dial-up Connection. 2. Right click the Local Area Connection icon and select Properties. You should see a screen like the following:
Figure 60: Network Configuration (Win 2000) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 61: TCP/IP Properties (Win 2000) 66 Appendix C - Windows TCP/IP 5. Ensure your TCP/IP settings are correct:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check your ISP's documentation before making the following changes. Enter the Wireless Access Point's IP address in the Default gateway field and click OK. If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK. 67 Wireless Access Point User Guide Checking TCP/IP Settings - Windows XP 1. Select Control Panel - Network Connection. 2. Right click the Local Area Connection and choose Properties. You should see a screen like the following:
Figure 62: Network Configuration (Windows XP) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 63: TCP/IP Properties (Windows XP) 68 Appendix C - Windows TCP/IP 5. Ensure your TCP/IP settings are correct. Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. Restart your PC to ensure it obtains an IP Address from the Wireless Access Point. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, do NOT change the settings on the screen shown in Figure 63 above, unless advised to do so by your network administrator. You can enter the Wireless Access Point's IP address in the Default gateway field and click OK. Your LAN administrator can advise you of the IP Address they assigned to the Wire-
less Access Point. If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK. Wireless LANs Wireless networks have their own terms and jargon. It is necessary to understand many of these terms in order to configure and operate a Wireless LAN. Modes Wireless LANs can work in either of two (2) modes:
Ad-hoc Infrastructure Ad-hoc Mode Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Sta-
tions (e.g. notebook PCs with wireless cards) communicate directly with each other. Infrastructure Mode In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations
(e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations can then access all LAN resources. Access Points can only function in "Infrastructure" mode, and can communicate only with Wireless Stations which are set to "Infrastructure" mode. SSID/ESSID BSS/SSID A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). 69 Wireless Access Point User Guide Using the same SSID is essential. Devices with different SSIDs are unable to communi-
cate with each other. However, some Access Points allow connections from Wireless Stations which have their SSID set to any or whose SSID is blank ( null ). ESS/ESSID A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form an Extended Service Set (ESS). Different Access Points within an ESS can use different Channels. To reduce interference, it is recommended that adjacent Access Points SHOULD use different channels. As Wireless Stations are physically moved through the area covered by an ESS, they will automatically change to the Access Point which has the least interference or best perform-
ance. This capability is called Roaming. (Access Points do not have or require Roaming capabilities.) Channels The Wireless Channel sets the radio frequency used for communication. Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a Channel which provides the least interference and best performance. For 802.11g, 13 channels are available in the USA and Canada., but 11channels are available in North America if using 802.11b. If using multiple Access Points, it is better if adjacent Access Points use different Channels to reduce interference. The recommended Channel spacing between adjacent Access Points is 5 Channels (e.g. use Channels 1 and 6, or 6 and 11). In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access Point. If more than one Access Point can be used, the one with the strongest signal is used. (This can only happen within an ESS.) If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the same Channel. However, most Wireless stations will still scan all Channels to see if there is an existing "Ad-hoc" group they can join. WEP WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is transmitted. This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless unless the receiver can decrypt it. If WEP is used, the Wireless Stations and the Wireless Access Point must have the same settings. WPA-PSK Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption key is derived from the PSK, and changes frequently. 70 Appendix C - Windows TCP/IP WPA-802.1x WPA-802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when required. All data transmission is encrypted using the WPA standard. Keys are automatically gener-
ated, so no key input is required. 802.1x This uses the 802.1x standard for client authentication, and WEP for data encryption. If possible, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when required. All data transmission is encrypted using the WEP standard. You only have to select the WEP key size; the WEP key is automatically generated. 71
1 2 | UserMan rev | Users Manual | 2.38 MiB |
802.11g / 802.11b / WPA Wireless Access Point User's Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION ............................................................................................. 1 Features of your Wireless Access Point........................................................................... 1 Package Contents .............................................................................................................. 4 Physical Details.................................................................................................................. 4 CHAPTER 2 INSTALLATION............................................................................................... 6 Requirements..................................................................................................................... 6 Procedure ........................................................................................................................... 6 CHAPTER 3 ACCESS POINT SETUP .................................................................................. 9 Overview ............................................................................................................................ 9 Setup using the Windows Utility...................................................................................... 9 Setup using a Web Browser............................................................................................ 12 Access Control ................................................................................................................. 14 Security Profiles............................................................................................................... 16 Security Profile Screen.................................................................................................... 19 System Screen .................................................................................................................. 35 Wireless Screens .............................................................................................................. 37 Basic Settings Screen....................................................................................................... 37 Advanced Settings ........................................................................................................... 40 CHAPTER 4 PC AND SERVER CONFIGURATION ....................................................... 42 Overview .......................................................................................................................... 42 Using WEP....................................................................................................................... 42 Using WPA-PSK.............................................................................................................. 43 Using WPA-802.1x .......................................................................................................... 44 802.1x Server Setup (Windows 2000 Server)................................................................ 45 802.1x Client Setup on Windows XP ............................................................................. 55 Using 802.1x Mode (without WPA) ............................................................................... 61 CHAPTER 5 OPERATION AND STATUS......................................................................... 62 Operation ......................................................................................................................... 62 Status Screen.................................................................................................................... 62 CHAPTER 6 ACCESS POINT MANAGEMENT............................................................... 69 Overview .......................................................................................................................... 69 Admin Login Screen........................................................................................................ 69 Auto Config/Update ........................................................................................................ 71 Config File........................................................................................................................ 73 Log Settings (Syslog) ....................................................................................................... 75 Rogue APs........................................................................................................................ 76 SNMP ............................................................................................................................... 77 Upgrade Firmware.......................................................................................................... 78 i APPENDIX A SPECIFICATIONS ....................................................................................... 79 Wireless Access Point...................................................................................................... 79 APPENDIX B TROUBLESHOOTING ................................................................................ 83 Overview .......................................................................................................................... 83 General Problems............................................................................................................ 83 APPENDIX C WINDOWS TCP/IP....................................................................................... 85 Overview .......................................................................................................................... 85 Checking TCP/IP Settings - Windows 9x/ME:............................................................. 85 Checking TCP/IP Settings - Windows NT4.0 ............................................................... 87 Checking TCP/IP Settings - Windows 2000.................................................................. 89 Checking TCP/IP Settings - Windows XP .................................................................... 91 APPENDIX D ABOUT WIRELESS LANS.......................................................................... 93 Overview .......................................................................................................................... 93 Wireless LAN Terminology............................................................................................ 93 APPENDIX E COMMAND LINE INTERFACE ................................................................ 96 Overview .......................................................................................................................... 96 Command Reference....................................................................................................... 97 P/N: 9560N90101 Copyright 2005. All Rights Reserved. Document Version: 1.34 All trademarks and trade names are the properties of their respective owners. ii Chapter 1 Introduction 1 This Chapter provides an overview of the Wireless Access Point's features and capabilities. Congratulations on the purchase of your new Wireless Access Point. The Wireless Access Point links your 802.11g or 802.11b Wireless Stations to your wired LAN. The Wireless stations and devices on the wired LAN are then on the same network, and can communicate with each other without regard for whether they are connected to the network via a Wireless or wired connection. Figure 1: Wireless Access Point The auto-sensing capability of the Wireless Access Point allows packet transmission up to 54Mbps for maximum throughput, or automatic speed reduction to lower speeds when the environment does not permit maximum throughput. Features of your Wireless Access Point The Wireless Access Point incorporates many advanced features, carefully designed to provide sophisticated functions while being easy to use. Standards Compliant. The Wireless Router complies with the IEEE802.11g (DSSS) specifications for Wireless LANs. Supports both 802.11b and 802.11g Wireless Stations. The 802.11g standard provides for backward compatibility with the 802.11b standard, so both 802.11b and 802.11g Wireless stations can be used simultaneously. 108Mbps Wireless Connections. On both the 2.4GHz (802.11b & 802.11g) and 5GHz
(802.11a) bands, 108Mbps connections are available to compatible clients. Bridge Mode Support. The Wireless Access Point can operate in Bridge Mode, con-
necting to another Access Point. Both PTP (Point to Point) and PTMP (Point to Multi-
1 Wireless Access Point User Guide Point) Bridge modes are supported. And you can even use both Bridge Mode and Access Point Mode simultaneously!
Client/Repeater Access Point. The Wireless Access Point can operate as a Client or Repeater Access Point, sending all traffic received to another Access Point. Simple Configuration. If the default settings are unsuitable, they can be changed quickly and easily. DHCP Client Support. Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request. The Wireless Access Point can act as a DHCP Client, and obtain an IP address and related information from your existing DHPC Server. Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web Browser. Security Features Security Profiles. For maximum flexibility, wireless security settings are stored in Security Profiles. Up to 8 Security profiles can be defined, and up to 4 used as any time. Multiple SSIDs. Because each Security Profile has it own SSID, and up to 4 Security Profiles can be active simultaneously, multiple SSIDs are supported. Different clients can connect to the Wireless Access Point using different SSIDs, with different security set-
tings. Multiple SSID Isolation. If desired, PCs and devices connecting using different SSIDs can be isolated from each other. VLAN Support. The 802.1Q VLAN standard is supported, allowing traffic from differ-
ent sources to be segmented. Combined with the multiple SSID feature, this provides a powerful tool to control access to your LAN. WEP support. Support for WEP (Wired Equivalent Privacy) is included. Both 64 Bit and 128 Bit keys are supported. WPA support. Support for WPA is included. WPA is more secure than WEP, and should be used if possible. Both TKIP and AES encryption methods are supported. 802.1x Support. Support for 802.1x mode is included, providing for the industrial-
strength wireless security of 802.1x authentication and authorization. Radius Client Support. The Wireless Access Point can login to your existing Radius Server (as a Radius client). Radius MAC Authentication. You can centralize the checking of Wireless Station MAC addresses by using a Radius Server. Rogue AP Detection. The Wireless Access Point can detect unauthorized (Rouge) Access Points on your LAN. Access Control. The Access Control feature can check the MAC address of Wireless clients to ensure that only trusted Wireless Stations can use the Wireless Access Point to gain access to your LAN. Password - protected Configuration. Optional password protection is provided to prevent unauthorized users from modifying the configuration data and settings. Advanced Features Auto Configuration. The Wireless Access Point can perform self-configuration by copying the configuration data from another Access Point. This feature is enabled by de-
fault. 2 Introduction Auto Update. The Wireless Access Point can automatically update its firmware, by downloading and installing new firmware from your FTP server. Command Line Interface. If desired, the command line interface (CLI) can be used for configuration. This provides the possibility of creating scripts to perform common con-
figuration changes. NetBIOS & WINS Support. Support for both NetBIOS broadcast and WINS (Win-
dows Internet Naming Service) allows the Wireless Access Point to easily fit into your existing Windows network. Radius Accounting Support. If you have a Radius Server, you can use it to provide accounting data on Wireless clients. Syslog Support. If you have a Syslog Server, the Wireless Access Point can send its log data to your Syslog Server. SNMP Support. SNMP (Simple Network Management Protocol) is supported, allowing you to use a SNMP program to manage the Wireless Access Point. UAM Support. The Wireless Access Point supports UAM (Universal Access Method), making it suitable for use in Internet cafes and other sites where user access time must be accounted for. WDS Support. Support for WDS (Wireless Distribution System) allows the Wireless Access Point to act as a Wireless Bridge. Both Point-to-Point and Multi-Point Bridge modes are supported. 3 Wireless Access Point User Guide Package Contents The following items should be included:
Wireless Access Point Power Adapter Quick Start Guide CD-ROM containing the on-line manual and setup utility. If any of the above items are damaged or missing, please contact your dealer immediately. Physical Details Front Panel LEDs Figure 2: Front Panel On - Error condition. Off - Normal operation. Blinking - During start up, and when the Firmware is being upgraded. On - Normal operation. Off - No power On - The LAN (Ethernet) port is active. Off - No active connection on the LAN (Ethernet) port. Flashing - Data is being transmitted or received via the corresponding LAN (Ethernet) port. On - Idle Off - Error- Wireless connection is not available. Flashing - Data is being transmitted or received via the Wireless access point. Data includes "network traffic" as well as user data. Status Power LAN Wireless LAN 4 Introduction Rear Panel Antenna Console port Reset Button Figure 3 Rear Panel One antenna (aerial) is supplied. Best results are usually obtained with the antenna in a vertical position. DB9 female RS232 port. This button has two (2) functions:
Reboot. When pressed and released, the Wireless Access Point will reboot (restart). Reset to Factory Defaults. This button can also be used to clear ALL data and restore ALL settings to the factory default values. To Clear All Data and restore the factory default values:
1. Power Off the Access Point 2. Hold the Reset Button down while you Power On the Access Point. 3. Continue holding the Reset Button until the Status (Red) LED blinks TWICE. 4. Release the Reset Button. The factory default configuration has now been restored, and the Access Point is ready for use. Ethernet Power port Use a standard LAN cable (RJ45 connectors) to connect this port to a 10BaseT or 100BaseT hub on your LAN. Connect the supplied power adapter here. 5 Chapter 2 Installation 2 This Chapter covers the physical installation of the Wireless Access Point. Requirements Requirements:
TCP/IP network Ethernet cable with RJ-45 connectors Installed Wireless network adapter for each PC that will be wirelessly connected to the network Procedure 1. Select a suitable location for the installation of your Wireless Access Point. To maximize reliability and performance, follow these guidelines:
Use an elevated location, such as wall mounted or on the top of a cubicle. Place the Wireless Access Point near the center of your wireless coverage area. If possible, ensure there are no thick walls or metal shielding between the Wireless Access Point and Wireless stations. Under ideal conditions, the Wireless Access Point has a range of around 150 meters (450 feet). The range is reduced, and transmission speed is lower, if there are any obstructions between Wireless devices. Figure 4: Installation Diagram 2. Use a standard LAN cable to connect the Ethernet port on the Wireless Access Point to a 10/100BaseT hub on your LAN. 6 Installation 3. Connect the supplied power adapter to the Wireless Access Point and a convenient power outlet, and power up. NOTE: If you wish to use PoE (Power over Ethernet), refer to the following section. 4. Check the LEDs:
The Status LED should flash, then turn OFF. The Power, Wireless LAN, and LAN LEDs should be ON. For more information, refer to Front Panel LEDs in Chapter 1. Using PoE (Power over Ethernet) The Wireless Access Point supports PoE (Power over Ethernet). To use PoE:
1. Do not connect the supplied power adapter to the Wireless Access Point. 2. Connect one end of a standard (category 5) LAN cable to the Ethernet port on the Wire-
less Access Point. 3. Connect the other end of the LAN cable to the powered Ethernet port on a suitable PoE Adapter. (24V DC, 500mA) 4. Connect the unpowered Ethernet port on the PoE adapter to your Hub or switch. 5. Connect the power supply to the PoE adapter and power up. 6. Check the LEDs on the Wireless Access Point to see it is drawing power via the Ethernet connection. Figure 5: Using PoE (Power over Ethernet) 7 Chapter 3 Access Point Setup 3 This Chapter provides details of the Setup process for Basic Operation of your Wireless Access Point. Overview This chapter describes the setup procedure to make the Wireless Access Point a valid device on your LAN, and to function as an Access Point for your Wireless Stations. Wireless Stations may also require configuration. For details, see Chapter 4 - Wireless Station Configuration. The Wireless Access Point can be configured using either the supplied Windows utility or your Web Browser Setup using the Windows Utility A simple Windows setup utility is supplied on the CD-ROM. This utility can be used to assign a suitable IP address to the Wireless Access Point. Using this utility is recommended, because it can locate the Wireless Access Point even if it has an invalid IP address. Installation 1. 2. 3. Follow the prompts to complete the installation. Insert the supplied CD-ROM in your drive. If the utility does not start automatically, run the SETUP program in the root folder. Main Screen Start the program by using the icon created by the setup program. When run, the program searches the network for all active Wireless Access Points, then lists them on screen, as shown by the example below. 9 Wireless Access Point User Guide Figure 6: Management utility Screen Wireless Access Points The main panel displays a list of all Wireless Access Points found on the network. For each Access Point, the following data is shown:
Server Name IP address MAC Address IEEE Standard The wireless standard or standards used by the Wireless Access Point The Server Name is shown on a sticker on the base of the device. The IP address for the Wireless Access Point. The hardware or physical address of the Wireless Access Point. FW Version Description
(e.g. 802.11b, 802.11g) The current Firmware version installed in the Wireless Access Point. Any extra information for the Wireless Access Point, entered by the administrator. Note: If the desired Wireless Access Point is not listed, check that the device is installed and ON, then update the list by clicking the Refresh button. Buttons Refresh Detail Info Web Management Set IP Address Exit Click this button to update the Wireless Access Point device listing after changing the name or IP Address. When clicked, additional information about the selected Access Point will be displayed. Use this button to connect to the Wireless Access Point's Web-
based management interface. Click this button if you want to change the IP Address of the Wireless Access Point. Exit the Management utility program by clicking this button. 10 Setup Setup Procedure 1. Select the desired Wireless Access Point. 2. Click the Set IP Address button. 3. If prompted, enter the user name and password. The default values are admin for the User Name, and password for the Password. 4. Ensure the IP address, Network Mask, and Gateway are correct for your LAN. Save any changes. 5. Click the Web Management button to connect to the selected Wireless Access Point using your Web Browser. If prompted, enter the User Name and Password again. 6. Check the following screens, and configure as necessary for your environment. Use the on-line help if necessary. The later sections in this Chapter also provides more details about each of these screens. Access Control - MAC level access control. Security Profiles - Wireless security. System - Identification, location, and Network settings Wireless - Basic & Advanced 7. You may also wish to set the admin password and administration connection options. These are on the Admin Login screen accessed from the Management menu. See Chapter 6 for details of the screens and features available on the Management menu. 8. Use the Apply/Restart button on the menu to apply your changes and restart the Wireless Access Point. Setup is now complete. Wireless stations must now be set to match the Wireless Access Point. See Chapter 4 for details. 11 Wireless Access Point User Guide Setup using a Web Browser Your Browser must support JavaScript. The configuration program has been tested on the following browsers:
Netscape V4.08 or later Internet Explorer V4 or later Setup Procedure Before commencing, install the Wireless Access Point in your LAN, as described previously. 1. Check the Wireless Access Point to determine its Default Name. This is shown on a label on the base or rear, and is in the following format:
SCxxxxxx Where xxxxxx is a set of 6 Hex characters ( 0 ~ 9, and A ~ F ). 2. Use a PC which is already connected to your LAN, either by a wired connection or an-
other Access Point. Until the Wireless Access Point is configured, establishing a Wireless connection to it may be not possible. If your LAN contains a Router or Routers, ensure the PC used for configuration is on the same LAN segment as the Wireless Access Point. 3. Start your Web browser. 4. HTTP://SC2D631A In the Address box, enter "HTTP://" and the Default Name of the Wireless Access Point e.g. 5. You should then see a login prompt, which will ask for a User Name and Password. Enter admin for the User Name, and password for the Password. These are the default values. The password can and should be changed. Always enter the current user name and password, as set on the Admin Login screen. Figure 7: Password Dialog 6. You will then see the Status screen, which displays the current settings and status. No data input is possible on this screen. See Chapter 5 for details of the Status screen. 12 Setup 7. From the menu, check the following screens, and configure as necessary for your envi-
ronment. Details of these screens and settings are described in the following sections of this chapter. Access Control - MAC level access control. Security Profiles - Wireless security. System - Identification, location, and Network settings Wireless - Basic & Advanced 8. You may also wish to set the admin password and administration connection options. These are on the Admin Login screen accessed from the Management menu. See Chapter 6 for details of the screens and features available on the Management menu. 9. Use the Apply/Restart button on the menu to apply your changes and restart the Wireless Access Point. Setup is now complete. Wireless stations must now be set to match the Wireless Access Point. See Chapter 4 for details. If you can't connect:
It is likely that your PCs IP address is incompatible with the Wireless Access Points IP address. This can happen if your LAN does not have a DHCP Server. The default IP address of the Wireless Access Point is 192.168.0.228, with a Network Mask of 255.255.255.0. If your PCs IP address is not compatible with this, you must change your PCs IP address to an unused value in the range 192.168.0.1 ~ 192.168.0.254, with a Network Mask of 255.255.255.0. See Appendix C - Windows TCP/IP for details for this procedure. 13 Wireless Access Point User Guide Access Control This feature can be used to block access to your LAN by unknown or untrusted wireless stations. Click Access Control on the menu to view a screen like the following. Figure 8: Access Control Screen Data - Access Control Screen Enable Use this checkbox to Enable or Disable this feature as desired. Warning ! Ensure your own PC is in the "Trusted Wireless Stations"
list before enabling this feature. Trusted Stations This table lists any Wireless Stations you have designated as
"Trusted". If you have not added any stations, this table will be empty. For each Wireless station, the following data is displayed:
MAC Address - the MAC or physical address of each Wire-
less station. Connected - this indicates whether or not the Wireless station is currently associates with this Access Point. Buttons Modify List Read from File Write to File To change the list of Trusted Stations (Add, Edit, or Delete a Wireless Station or Stations), click this button. You will then see the Trusted Wireless Stations screen, described below. To upload a list of Trusted Stations from a file on your PC, click this button. To download the current list of Trusted Stations from the Access Point to a file on your PC, click this button. 14 Trusted Wireless Stations To change the list of trusted wireless stations, use the Modify List button on the Access Control screen. You will see a screen like the sample below. Setup Figure 9: Trusted Wireless Stations Data - Trusted Wireless Stations Trusted Wireless Stations Other Wireless Stations Name This lists any Wireless Stations which you have designated as Trusted. This list any Wireless Stations detected by the Access Point, which you have not designated as "Trusted". The name assigned to the Trusted Wireless Station. Use this when adding or editing a Trusted Station. The MAC (physical) address of the Trusted Wireless Station. Use this when adding or editing a Trusted Station. Address Buttons
<<
>>
Select All Select None Add a Trusted Wireless Station to the list (move from the "Other Stations" list). Select an entry (or entries) in the "Other Stations" list, and click the " << " button. Enter the Address (MAC or physical address) of the wireless station, and click the "Add " button. Delete a Trusted Wireless Station from the list (move to the "Other Stations" list). Select an entry (or entries) in the "Trusted Stations" list. Click the " >> " button. Select all of the Stations listed in the "Other Stations" list. De-select any Stations currently selected in the "Other Stations"
list. 15 Wireless Access Point User Guide Edit Add Clear To change an existing entry in the "Trusted Stations" list, select it and click this button. 1. Select the Station in the "Trusted Station" list. 2. Click the "Edit" button. The address will be copied to the
"Address" field, and the "Add" button will change to "Update". 3. Edit the address (MAC or physical address) as required. 4. Click "Update" to save your changes. To add a Trusted Station which is not in the "Other Wireless Stations" list, enter the required data and click this button. Clear the Name and Address fields. Security Profiles Security Profiles contain the SSID and all the security settings for Wireless connections to this Access Point. Up to eight (8) Security Profiles can be defined. Up to four (4) Security Profiles can be enabled at one time, allowing up to 4 different SSIDs to be used simultaneously. Figure 10: Security Profiles Screen 16 Setup Data - Security Profiles Screen Profile Profile List All available profiles are listed. For each profile, the following data is displayed:
*
If displayed before the name of the profile, this indicates the profile is currently enabled. If not displayed, the profile is cur-
rently disabled. Profile Name The current profile name is displayed.
[SSID]
The current SSID associated with this profile. Security System The current security system (e.g. WPA-PSK ) is displayed.
[Band]
The Wireless Band (2.4 GHz, 5GHz) for this profile is dis-
played. Profiles may be assigned to either or both Wireless Bands. Buttons Primary Profile 802.11b/g AP Mode 802.11b/g Bridge Mode Isolation None Isolate all Use VLAN Enable - Enable the selected profile. Configure - Change the settings for the selected profile. Disable - Disable the selected profile. Select the primary profile for 802.11b and 802.11g (2.4 GHz band) AP mode. Only enabled profiles are listed. The SSID associated with this profile will be broadcast if the "Broadcast SSID" setting on the Basic screen is enabled. Select the primary profile for 802.11b and 802.11g (2.4 GHz band) Bridge Mode. This setting determines the SSID and security settings used for the Bridge connection to the remote AP. If this option is selected, wireless clients using different profiles
(different SSIDs) are not isolated from each other, so they will be able to communicate with each other. If this option is selected, wireless clients using different profiles
(different SSIDs) are isolated from each other, so they will NOT be able to communicate with each other. They will still be able to communicate with other clients using the same profile, unless the
"Wireless Separation" setting on the "Advanced" screen has been enabled. This option is only useful if the hubs/switches on your LAN sup-
port the VLAN (802.1Q) standard. When VLAN is used, you must select the desired VLAN for each security profile when configuring the profile. (If VLAN is not selected, the VLAN setting for each profile is ignored.) Click the Configure VLAN button to configure the IDs used by each VLAN. See below for further details. 17 Wireless Access Point User Guide VLAN Configuration Screen This screen is accessed via the Configure VLAN button on the Security Profiles screen. The settings on this screen will be ignored unless the Use VLAN option on the Security Profiles screen is selected. If using the VLAN option, these setting determine which VLAN traffic is assigned to. Figure 11: VLAN Configuration Data - VLAN Configuation Screen Profile VLAN ID Each profile is listed by name. Enter the ID for the required VLAN. All traffic using this profile will be assigned to this VLAN. 18 Security Profile Screen This screen is displayed when you select a Profile on the Security Profiles screen, and click the Configure button. Setup Figure 12: Security Profile Screen Profile Data Enter the desired settings for each of the following:
Profile Name SSID Wireless Band Enter a suitable name for this profile. Enter the desired SSID. Each profile must have a unique SSID. Select the wireless band or bands for this profile. If your Wireless Access Point only has a single band, then only 1 option is available. Security Settings Select the desired option, and then enter the settings for the selected method. The available options are:
None - No security is used. Anyone using the correct SSID can connect to your network. WEP - The 802.11b standard. Data is encrypted before transmission, but the encryption system is not very strong. WPA-PSK - Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption key is derived from the PSK, and changes fre-
quently. WPA-802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is selected:
19 Wireless Access Point User Guide This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when re-
quired. All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key input is required. 802.1x - This uses the 802.1x standard for client authentication, and WEP for data encryp-
tion. If possible, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when re-
quired. All data transmission is encrypted using the WEP standard. You only have to select the WEP key size; the WEP key is automatically generated. 20 Security Settings - None Setup Figure 13: Wireless Security - None No security is used. Anyone using the correct SSID can connect to your network. The only settings available from this screen are Radius MAC Authentication and UAM
(Universal Access Method). Radius MAC Authentication Radius MAC Authentication provides for MAC address checking which is centralized on your Radius server. If you don't have a Radius Server, you cannot use this feature. Using MAC authentication 1. Ensure the Wireless Access Point can login to your Radius Server. Add a RADIUS client on the RADIUS server, using the IP address or name of the Wireless Access Point, and the same shared key as entered on the Wireless Access Point. Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your Radius Server. These parameters are entered either on the Security page, or the Radius-based MAC authentication sub-screen, depending on the security method used. On the Access Point, enable the Radius-based MAC authentication feature on the screen below. 2. Add Users on the Radius server as required. The username must be the MAC address of the Wireless client you wish to allow, and the password must be blank. 3. When clients try to associate with the Access Point, their MAC address is passed to the Radius Server for authentication. If successful, xx:xx:xx:xx:xx:xx MAC authentication is entered in the log, and client station status would show as authenticated on the station list table;
If not successful, xx:xx:xx:xx:xx:xx MAC authentication failed is en-
tered in the log,, and station status is shown as authenticating on the station list table. 21 Wireless Access Point User Guide Radius-based MAC authentication Screen This screen will look different depending on the current security setting. If you have already provided the address of your Radius server, you won't be prompted for it again. Otherwise, you must enter the details of your Radius Server on this screen. Figure 14: Radius-based MAC Authentication Screen Data - Radius-based MAC Authentication Screen Enable ... Radius Server Address Radius Port Enable this if you wish to Radius-based MAC authentication. If this field is visible, enter the name or IP address of the Radius Server on your network. If this field is visible, enter the port number used for connections to the Radius Server. If this field is visible, it displays the name used for the Client Login on the Radius Server. This Login name must be created on the Radius Server. If this field is visible, it is used for the Client Login on the Radius Server. Enter the key value to match the value on the Radius Server. If this field is visible, it is for the WEP key used to encrypt data transmissions to the Radius Server. Enter the desired key value in HEX, and ensure the Radius Server has the same value. If this field is visible, select the desired key index. Any value can be used, provided it matches the value on the Radius Server. Client Login Name Shared Key WEP Key WEP Key Index 22 Setup UAM UAM (Universal Access Method) is intended for use in Internet cafes, Hot Spots, and other sites where the Access Point is used to provide Internet Access. If enabled, then HTTP (TCP, port 80) connections are checked. (UAM only works on HTTP connections; all other traffic is ignored.) If the user has not been authenticated, Internet access is blocked, and the user is re-directed to another web page. Typically, this web page is on your Web server, and explains how to pay for and obtain Internet access. To use UAM, you need a Radius Server for Authentication. The "Radius Server Setup" must be completed before you can use UAM. The required setup depends on whether you are using Internal or External authentication. External authentication uses a web page on your Web server. Generally, you should use External authentication, as this allows you to provide relevant and helpful information to users. Internal authentication uses the web page built into the Wireless Access Point. UAM authentication - Internal 1. Ensure the Wireless Access Point can login to your Radius Server. Add a RADIUS client on RADIUS server, using the IP address or name of the Wire-
less Access Point, and the same shared key as entered on the Wireless Access Point. Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your Radius Server. These parameters are entered either on the Secu-
rity page, or the UAM sub-screen, depending on the security method used. 2. Add users on your RADIUS server as required, and allow access by these users. 3. Client PCs must have the correct Wireless settings in order to associate with the Wireles Access Point. 4. When an associated client tries to use HTTP (TCP, port 80) connections, they will be re-
directed to a user login page. 5. The client (user) must then enter the user name and password, as defined on the Radius Server. (You must provide some system to let users know the correct name and password to use.) If the user name and password is correct, Internet access is allowed. Otherwise, the user remains on the login page. Clients which pass the authentication are listed as xx:xx:xx:xx:xx:xx WEB au-
thentication in the log table, and station status would show as Authenticated on the station list table. If a client fails authentication, xx:xx:xx:xx:xx:xx WEB authentication failed shown in the log, and station status is shown as Authenticating on the sta-
tion list table. 6. UAM authentication - External 1. Ensure the Wireless Access Point can login to your Radius Server. Add a RADIUS client on RADIUS server, using the IP address or name of the Wire-
less Access Point, and the same shared key as entered on the Wireless Access Point. Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your Radius Server. These parameters are entered either on the Secu-
rity page, or the UAM sub-screen, depending on the security method used. 2. On your Web Server, create a suitable welcome page. The welcome page must have a link or button to allow the user to input their user name and password on the uamlogon.htm page on the Access Point. 23 Wireless Access Point User Guide 3. On the Access Points UAM screen, select External Web-based Authentication, and enter the URL for the welcome page on your Web server. 4. Add users on your RADIUS server as required, and allow access by these users. 5. Client PCs must have the correct Wireless settings in order to associate with the Wireless Access Point. 6. When an associated client tries to use HTTP (TCP, port 80) connections, they will be re-
directed to the welcome page on your Web Server. They must then click the link or button in order to reach the Access Points login page. 7. The client (user) must then enter the user name and password, as defined on the Radius 8. Server. (You must provide some system to let users know the correct name and password to use.) If the user name and password is correct, Internet access is allowed. Otherwise, the user remains on the login page. Clients which pass the authentication are listed as xx:xx:xx:xx:xx:xx WEB au-
thentication in the log table, and station status would show as Authenticated on the station list table. If a client fails authentication, xx:xx:xx:xx:xx:xx WEB authentication failed is shown in the log, and station status is shown as Authenticating on the station list table. UAM Screen The UAM screen will look different depending on the current security setting. If you have already provided the address of your Radius server, you won't be prompted for it again. Figure 15: UAM Screen Data - UAM Screen Enable Internal Web-based Authentication Enable this if you wish to use this feature. See the section above for details of using UAM. If selected, then when a user first tries to access the Internet, they will be blocked, and re-directed to the built-in login page. The logon data is then sent to the Radius Server for authentication. 24 Setup External Web-based Authentication Login URL Login Failure URL If selected, then when a user first tries to access the Internet, they will be blocked, and re-directed to the URL below. This needs to be on your own local Web Server. The page must also link back to the built-
in login page on this device to complete the login procedure. Enter the URL of the page on your local Web Server you wish users to see when they attempt to access the Internet, but are not logged in. Enter the URL of the page on your local Web Server you wish users to see if their login fails. (This may be the same URL as the Login URL). Security Settings - WEP This is the 802.11b standard. Data is encrypted before transmission, but the encryption system is not very strong. Figure 16: WEP Wireless Security 25 Wireless Access Point User Guide Data - WEP Screen WEP Data Encryption 64 Bit Encryption - Keys are 10 Hex (5 ASCII) characters. 128 Bit Encryption - Keys are 26 Hex (13 ASCII) characters. 152 Bit Encryption - Keys are 32 Hex (16 ASCII) characters. Select the desired option, and ensure your Wireless stations have the same setting:
Normally, you can leave this at Automatic, so that Wireless Stations can use either method ("Open System" or "Shared Key".). If you wish to use a particular method, select the appropriate value -
"Open System" or "Shared Key". All Wireless stations must then be set to use the same method. Select "Hex" or "ASCII" depending on your input method. (All keys are converted to Hex, ASCII input is only for convenience.) Enter the key values you wish to use. The default key, selected by the radio button, is required. The other keys are optional. Other stations must have matching key values. Use this to generate a key or keys, instead of entering them directly. Enter a word or group of printable characters in the Passphrase box and click the "Generate Key" button to automatically configure the WEP Key(s). The current status is displayed. Click the "Configure" button to configure this feature if required. The current status is displayed. Click the "Configure" button to configure this feature if required. Authentication Key Input Key Value Passphrase Radius MAC Authentication UAM 26 Security Settings - WPA-PSK Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption key is derived from the PSK, and changes frequently. Setup Figure 17: WPA-PSK Wireless Security Data - WPA-PSK Screen WPA-PSK Network Key WPA Encryption Enter the key value. Data is encrypted using a 256Bit key derived from this key. Other Wireless Stations must use the same key. Select the desired option. Other Wireless Stations must use the same method. TKIP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are not encrypted. TKIP + 64 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) trans-
missions are encrypted using 64 bit WEP. TKIP + 128 bit WEP - Unicast (point-to-point) transmis-
sions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 128 bit WEP. AES - CCMP - CCMP is the most common sub-type of AES (Advanced Encryption System). Most systems will 27 Wireless Access Point User Guide simply say "AES". If selected, both Unicast (point-to-point) and multicast (broadcast) transmissions are encrypted using AES. AES - TKIP - If selected, Unicast (point-to-point) uses AES-CCMP and multicast (broadcast) transmissions are en-
crypted using TKIP. This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. This field determines how often Pairwise keys are dynamically updated. Enter the desired value. This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. This field determines how often the Group key is dynamically updated. Enter the desired value. If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. The current status is displayed. This will always be "Disabled", because Radius MAC Authentication is not available with WPA-
PSK. The Configure button for this feature will also be disabled. The current status is displayed. This will always be "Disabled", because UAM is not available with WPA-PSK. The Configure button for this feature will also be disabled. Pairwise Key Update Key Lifetime Group Key Update Key Lifetime Update Group key when any membership terminates Radius MAC Authentication UAM 28 Setup Security Settings - WPA-802.1x This version of WPA requires a Radius Server on your LAN to provide the client authentica-
tion according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Normally, a Certificate is used to authenticate each user. See Chapter4 for details of user configuration. Each user's wireless client must support 802.1x. All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key input is required. Figure 18: WPA-802.1x Wireless Security 29 Wireless Access Point User Guide Data - WPA-802.1x Screen WPA-802.1x Radius Server Address Radius Port Client Login Name Shared Key WPA Encryption Pairwise Key Update Key Lifetime Group Key Update Key Lifetime Update Group key when any member-
ship terminates Radius Accounting Enter the name or IP address of the Radius Server on your network. Enter the port number used for connections to the Radius Server. This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. Select the desired option. Other Wireless Stations must use the same method. TKIP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are not encrypted. TKIP + 64 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmis-
sions are encrypted using 64 bit WEP. TKIP + 128 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmis-
sions are encrypted using 128 bit WEP. AES - CCMP - CCMP is the most common sub-type of AES
(Advanced Encryption System). Most systems will simply say
"AES". If selected, both Unicast (point-to-point) and multicast
(broadcast) transmissions are encrypted using AES. AES - TKIP - If selected, Unicast (point-to-point) uses AES-
CCMP and multicast (broadcast) transmissions are encrypted using TKIP. This refers to the key used for point-to-point transmissions. Enable this if you want the keys to be updated regularly. This field determines how often Pairwise keys are dynamically updated. Enter the desired value. This refers to the key used for broadcast transmissions. Enable this if you want the keys to be updated regularly. This field determines how often the Group key is dynamically updated. Enter the desired value. If enabled, the Group key will be updated whenever any member leaves the group or disassociates from the Access Point. Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port" field. 30 Setup Update Report every ... Radius MAC Authentication UAM If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. The current status is displayed. This will always be "Disabled", because Radius MAC Authentication is not available with WPA-
802.1x. The Configure button for this feature will also be disabled. The current status is displayed. This will always be "Disabled", because UAM is not available with WPA-802.1x. The Configure button for this feature will also be disabled. 31 Wireless Access Point User Guide Security Settings - 802.1x This uses the 802.1x standard for client authentication, and WEP for data encryption. If possi-
ble, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is selected:
This Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Normally, a Certificate is used to authenticate each user. See Chapter4 for details of user configuration. Each user's wireless client must support 802.1x. All data transmission is encrypted using the WEP standard. You only have to select the WEP key size; the WEP key is automatically generated. Figure 19: 802.1x Wireless Security 32 Setup Data - 802.1x Screen 802.1x Radius Server Address Radius Port Client Login Name Shared Key WEP Key Size Dynamic WEP Key Enter the name or IP address of the Radius Server on your network. Enter the port number used for connections to the Radius Server. This read-only field displays the current login name, which is the same as the name of the Access Point. The Radius Server must be configured to accept this login. This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server. Select the desired option:
Click this if you want the WEP keys to be automatically gener-
ated. The key exchange will be negotiated. The most widely 64 Bit - Keys are 10 Hex (5 ASCII) characters. 128 Bit - Keys are 26 Hex (13 ASCII) characters. 152 Bit - Keys are 32 Hex (16 ASCII) characters. supported protocol is EAP-TLS. The following Key Exchange setting determines how often the keys are changed. Both Dynamic and Static keys can be used simultaneously, allowing clients using either method to use the Access Point. This setting if only available if using Dynamic WEP Keys. If you want the Dynamic WEP keys to be updated regularly, enable this and enter the desired lifetime (in minutes). Enable this if some wireless clients use a fixed (static) WEP key, using EAP-MD5. Note that both Dynamic and Static keys can be used simultane-
ously, allowing clients using either method to use the Access Point. Enter the WEP key according to the WEP Key Size setting above. Wireless stations must use the same key. Select the desired index value. Wireless stations must use the same key index. Enable this if you want this Access Point to send accounting data to the Radius Server. If enabled, the port used by your Radius Server must be entered in the Radius Accounting Port field. If Radius accounting is enabled, you can enable this and enter the desired update interval. This Access Point will then send updates according to the specified time period. Key Exchange Static WEP Key
(EAP-MD5) WEP Key WEP Key Index Radius Accounting Update Report every ... 33 Wireless Access Point User Guide Radius MAC Authentication UAM The current status is displayed. Click the Configure button to configure this feature if required. The current status is displayed. Click the Configure button to configure this feature if required. 34 System Screen Click System on the menu to view a screen like the following. Setup Figure 20: System Screen Enter a suitable name for this Access Point. Data - System Screen Identification Access Point Name Description Country Domain Select the country or domain matching your current location. IP Address DHCP Client If desired, you can enter a description for the Access Point. Fixed WINS Enable WINS Select this option if you have a DHCP Server on your LAN, and you wish the Access Point to obtain an IP address automatically. If selected, the following data must be entered. IP Address - The IP Address of this device. Enter an unused IP address from the address range on your LAN. Subnet Mask - The Network Mask associated with the IP Address above. Enter the value used by other devices on your LAN. Gateway - The IP Address of your Gateway or Router. Enter the value used by other devices on your LAN. DNS - Enter the DNS (Domain Name Server) used by PCs on your LAN. If your LAN has a WINS server, you can enable this to have this AP register with the WINS server. 35 Wireless Access Point User Guide WINS Server Name/IP Address Enter the name or IP address of your WINS server. 36 Setup Wireless Screens There are two (2) configuration screens available:
Basic Settings Advanced Basic Settings Screen The settings on this screen must match the settings used by Wireless Stations. Click Basic on the menu to view a screen like the following. Figure 21: Basic Settings Screen Data - Basic Settings Screen Operation Wireless Mode Select the desired option:
Disable - select this if for some reason you do not this AP to transmit or receive at all. 802.11b and 802.11g - this is the default, and will allow connec-
tions by both 802.11b and 802.1g wireless stations. 802.11b - if selected, only 802.11b connections are allowed. 802.11g wireless stations will only be able to connect if they are fully backward-compatible with the 802.11b standard. 802.11g - only 802.11g connections are allowed. If you only have 802.11g, selecting this option may provide a performance im-
provement over using the default setting. Dynamic Super 802.11g (108Mbps) - This uses Packet Bursting, FastFrame, Compression, and Channel Bonding (using 2 chan-
nels) to increase throughput. Only clients supporting the "Atheros Super G" mode can connect at 108Mbps, and they will only use 37 Wireless Access Point User Guide this speed when necessary. However, this option is backward-
compatible with 802.11b and (standard) 802.11g. Static Super 802.11g (108Mbps) - This uses Packet Bursting, FastFrame, Compression, and Channel Bonding (using 2 chan-
nels) to increase throughput. Because "Channel Bonding" is always used, this method is NOT compatible with 802.11b and (standard) 802.11g. Only clients supporting the "Atheros Super G" mode can connect at 108Mbps; they will always connect at this speed. Select this op-
tion only if all wireless stations support this "Atheros Super G"
mode. Both Bridge mode and AP mode can be used simultaneously, unless AP mode is "Client/Repeater". Select the desired AP mode:
None (disable) - Disable AP mode. Use this if you want to act a Bridge only. Access Point - operate as a normal Access Point Client/Repeater - act as a client or repeater for another Access Point. If selected, you must provide the address (MAC address) of the other AP in the Repeater AP MAC Address field. In this mode, all traffic is sent to the specified AP. Note: If using Client/Repeater mode, you cannot use Bridge Mode. This is not required unless the AP Mode is "Client/Repeater". In this mode, you must provide the MAC address of the other AP in this field. You can either enter the MAC address directly, or, if the other AP is on-line and broadcasting its SSID, you can click the "Select AP"
button and select from a list of available APs. If Disabled, no SSID is broadcast. If enabled, you must select the security profile whose SSID is to be broadcast. This can be done the "Security Profiles" screen. The SSID will then be broadcast to all Wireless Stations. Stations which have no SSID (or a "null" value) can then adopt the correct SSID for connec-
tions to this Access Point. AP Mode Repeater AP MAC Address Broadcast SSID 38 Setup Both Bridge mode and AP mode can be used simultaneously, unless AP mode is "Client/Repeater". Select the desired Bridge mode:
None (disable) - Disable Bridge mode. Use this if you want to act a AP only. Point-to-Point Bridge (PTP) - Bridge to a single AP. You must provide the MAC address of the other AP in the PTP Bridge AP MAC Address field. Point-to-Multi-Point Bridge (PTMP) - Select this only if this AP is the "Master" for a group of Bridge-mode APs. The other Bridge-mode APs must be set to Point-to-Point Bridge mode, us-
ing this AP's MAC address. They then send all traffic to this
"Master". If required, you can specify the MAC addresses of the APs which are allowed to connect to this AP in PTMP mode. To specify the allowed APs:
1. Enable the checkbox "In PTMP mode, only allow specified APs". 2. Click the button "Set PTMP APs". 3. On the resulting sub-screen, enter the MAC addresses of the allowed APs. This is not required unless the Bridge Mode is "Point-to-Point Bridge
(PTP)". In this case, you must enter the MAC address of the other AP in this field. This is only functional if using Point-to-Multi-Point Bridge (PTMP) mode. If enabled, you can specify the MAC addresses of the APs which are allowed to connect to this AP. To specify the allowed APs:
1. Enable this checkbox 2. Click the button "Set PTMP APs". 3. On the resulting sub-screen, enter the MAC addresses of the allowed APs. Use this to open a sub-window where you can specify the MAC addresses of the APs which are allowed to connect to this AP. This is only functional if using Point-to-Multi-Point Bridge (PTMP) mode and you have enabled the checkbox "In PTMP mode, only allow specified APs". If "Automatic" is selected, the Access Point will select the best available Channel. If you experience interference (shown by lost connections and/or slow data transfers) you may need to experiment with manually setting different channels to see which is the best. This displays the current channel used by the Access Point. Bridge Mode PTP Bridge AP MAC Address In PTMP mode, only allow specified APs Set PTMP APs Parameters Channel No Current Channel No. 39 Wireless Access Point User Guide Advanced Settings Clicking the Advanced link on the menu will result in a screen like the following. Figure 22: Advanced Settings Data - Advanced Settings Screen Basic Rate Basic Rate The Basic Rate is used for broadcasting. It does not determine the data transmission rate, which is determined by the "Mode"
setting on the Basic screen. Select the desired option. Do NOT select the "802.11g" or "ODFM" options unless ALL of your wireless clients support this. 802.11b clients will not be able to connect to the Access Point if either of these modes is selected. Options Wireless Separation Worldwide Mode
(802.11d) If enabled, then each Wireless station using the Access Point is invisible to other Wireless stations. In most business situations, this setting should be Disabled. Enable this setting if you wish to use this mode, and your Wireless stations support this mode. 40 Setup This determines how quickly a Wireless Station will be consid-
ered "Disassociated" with this AP, when no traffic is received. Enter the desired time period. Enter the preferred setting between 256 and 2346. Normally, this can be left at the default value. Enter the preferred setting between 20 and 1000. Normally, this can be left at the default value. Enter the preferred setting between 256 and 2346. Normally, this can be left at the default value. Select the desired option. The default is "Long". The "Short"
setting takes less time when used in a good environment. Select the desired power output. Higher levels will give a greater range, but are also more likely to cause interference with other devices. If your Access Point has only 1 antenna, there is only 1 option available. If your Access Point has 2 antennae, select the option which gives the best results in your location. Select the desired option. The default is CTS-only. Enable or disable this setting as required. The Protection system is intended to prevent older 802.11b devices from interfering with 802.11g transmissions. (Older 802.11b devices may not be able to detect that a 802.11g transmission is in progress.) Normally, this should be left at
"Auto". Select the desired option. The default is 11 Mbps. Parameters Disassociated Timeout Fragmentation Beacon Interval RTS/CTS Threshold Preamble Type Output Power Level Antenna Selection 802.11b Protection Type Short Slot Time Protection Mode Protection Rate 41 Chapter 4 PC and Server Configuration This Chapter details the PC Configuration required for each PC on the local LAN. 4 Overview All Wireless Stations need to have settings which match the Wireless Access Point. These settings depend on the mode in which the Access Point is being used. If using WEP or WPA-PSK, it is only necessary to ensure that each Wireless station's settings match those of the Wireless Access Point, as described below. For WPA-802.1x and 802.1x modes, configuration is much more complex. The Radius Server must be configured correctly, and setup of each Wireless station is also more com-
plex. Using WEP For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode SSID (ESSID) Wireless Security On each PC, the mode must be set to Infrastructure. This must match the value used on the Wireless Access Point. The default value is wireless Note! The SSID is case sensitive. Each Wireless station must be set to use WEP data encryption. The Key size (64 bit, 128 bit, 152 bit) must be set to match the Access Point. The keys values on the PC must match the key values on the Access Point. Note:
On some systems, the key sizes may be shown as 40bit, 104bit, and 128bit instead of 64 bit, 128 bit and 152bit. This difference arises be-
cause the key input by the user is 24 bits less than the key size used for encryption. 42 PC and Server Configuration Using WPA-PSK For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode SSID (ESSID) Wireless Security On each PC, the mode must be set to Infrastructure. This must match the value used on the Wireless Access Point. The default value is wireless Note! The SSID is case sensitive. On each client, Wireless security must be set to WPA-PSK. The Pre-shared Key entered on the Access Point must also be entered on each Wireless client. The Encryption method (e.g. TKIP, AES) must be set to match the Access Point. 43 Wireless Access Point User Guide Using WPA-802.1x This is the most secure and most complex system. 802.1x mode provides greater security and centralized management, but it is more complex to configure. Wireless Station Configuration For each of the following items, each Wireless Station must have the same settings as the Wireless Access Point. Mode SSID (ESSID) 802.1x Authentication 802.1x Encryption On each PC, the mode must be set to Infrastructure. This must match the value used on the Wireless Access Point. The default value is wireless Note! The SSID is case sensitive. Each client must obtain a Certificate which is used for authentication for the Radius Server. Typically, EAP-TLS is used. This is a dynamic key system, so keys do NOT have to be entered on each Wireless station. However, you can also use a static WEP key (EAP-MD5); the Wireless Access Point supports both methods simultaneously. Radius Server Configuration If using WPA-802.1x mode, the Radius Server on your network must be configured as follow:
There must be a Client Login for the Wireless Access Point itself. It must provide and accept Certificates for user authentication. The Wireless Access Point will use its Default Name as its Client Login name. (How-
ever, your Radius server may ignore this and use the IP address instead.) The Shared Key, set on the Security Screen of the Access Point, must match the Shared Secret value on the Radius Server. Encryption settings must be correct. 44 PC and Server Configuration 802.1x Server Setup (Windows 2000 Server) dhcpd dns rras This section describes using Microsoft Internet Authentication Server as the Radius Server, since it is the most common Radius Server available that supports the EAP-TLS authentication method. The following services on the Windows 2000 Domain Controller (PDC) are also required:
webserver (IIS) Radius Server (Internet Authentication Service) Certificate Authority Windows 2000 Domain Controller Setup 1. Run dcpromo.exe from the command prompt. 2. Follow all of the default prompts, ensure that DNS is installed and enabled during installa-
tion. Services Installation 1. Select the Control Panel - Add/Remove Programs. 2. Click Add/Remove Windows Components from the left side. 3. Ensure that the following components are activated (selected):
Certificate Services. After enabling this, you will see a warning that the computer cannot be renamed and joined after installing certificate services. Select Yes to select certificate services and continue World Wide Web Server. Select World Wide Web Server on the Internet Information Services (IIS) component. From the Networking Services category, select Dynamic Host Configuration Protocol
(DHCP), and Internet Authentication Service (DNS should already be selected and in-
stalled). 45 Wireless Access Point User Guide Figure 23: Components Screen 4. Click Next. 5. Select the Enterprise root CA, and click Next. 6. Enter the information for the Certificate Authority, and click Next. Figure 24: Certification Screen 46 PC and Server Configuration Figure 25: CA Screen 7. Click Next if you don't want to change the CA's configuration data. 8. Installation will warn you that Internet Information Services are running, and must be stopped before continuing. Click Ok, then Finish. DHCP server configuration 1. Click on the Start - Programs - Administrative Tools - DHCP 2. Right-click on the server entry as shown, and select New Scope. Figure 26: DHCP Screen 3. Click Next when the New Scope Wizard Begins. 4. Enter the name and description for the scope, click Next. 5. Define the IP address range. Change the subnet mask if necessary. Click Next. 47 Wireless Access Point User Guide Figure 27:IP Address Screen 6. Add exclusions in the address fields if required. If no exclusions are required, leave it blank. Click Next. 7. Change the Lease Duration time if preferred. Click Next. 8. Select Yes, I want to configure these options now, and click Next. 9. Enter the router address for the current subnet. The router address may be left blank if there is no router. Click Next. 10. For the Parent domain, enter the domain you specified for the domain controller setup, and enter the server's address for the IP address. Click Next. Figure 28: DNS Screen 11. If you don't want a WINS server, just click Next. 12. Select Yes, I want to activate this scope now. Click Next, then Finish. 13. Right-click on the server, and select Authorize. It may take a few minutes to complete. 48 Certificate Authority Setup 1. Select Start - Programs - Administrative Tools - Certification Authority. 2. Right-click Policy Settings, and select New - Certificate to Issue. PC and Server Configuration Figure 29: Certificate Authority Screen 3. Select Authenticated Session and Smartcard Logon (select more than one by holding down the Ctrl key). Click OK. Figure 30: Template Screen 4. Select Start - Programs - Administrative Tools - Active Directory Users and Computers. 5. Right-click on your active directory domain, and select Properties. 49 Wireless Access Point User Guide 6. Select the Group Policy tab, choose Default Domain Policy then click Edit. Figure 31: Active Directory Screen Figure 32: Group Policy Tab 7. Select Computer Configuration - Windows Settings - Security Settings - Public Key Policies, right-click Automatic Certificate Request Settings - New - Automatic Certificate Request. 50 PC and Server Configuration Figure 33: Group Policy Screen 8. When the Certificate Request Wizard appears, click Next. 9. Select Computer, then click Next. Figure 34: Certificate Template Screen 10. Ensure that your certificate authority is checked, then click Next. 11. Review the policy change information and click Finish. 12. Click Start - Run, type cmd and press enter. Enter secedit /refreshpolicy machine_policy This command may take a few minutes to take effect. 51 Wireless Access Point User Guide Internet Authentication Service (Radius) Setup 1. Select Start - Programs - Administrative Tools - Internet Authentication Service 2. Right-click on Clients, and select New Client. Figure 35: Service Screen 3. Enter a name for the access point, click Next. 4. Enter the address or name of the Wireless Access Point, and set the shared secret, as entered on the Security Settings of the Wireless Access Point. 5. Click Finish. 6. Right-click on Remote Access Policies, select New Remote Access Policy. 7. Assuming you are using EAP-TLS, name the policy eap-tls, and click Next. 8. Click Add... If you don't want to set any restrictions and a condition is required, select Day-And-Time-
Restrictions, and click Add... Figure 36: Attribute Screen 9. Click Permitted, then OK. Select Next. 10. Select Grant remote access permission. Click Next. 52 11. Click Edit Profile... and select the Authentication tab. Enable Extensible Authentication Protocol, and select Smart Card or other Certificate. Deselect other authentication meth-
ods listed. Click OK. PC and Server Configuration 12. Select No if you don't want to view the help for EAP. Click Finish. Figure 37: Authentication Screen 53 Wireless Access Point User Guide Remote Access Login for Users 1. Select Start - Programs - Administrative Tools- Active Directory Users and Computers. 2. Double click on the user who you want to enable. 3. Select the Dial-in tab, and enable Allow access. Click OK. Figure 38: Dial-in Screen 54 PC and Server Configuration 802.1x Client Setup on Windows XP Windows XP ships with a complete 802.1x client implementation. If using Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality. If you don't have either of these systems, you must use the 802.1x client software provided with your wireless adapter. Refer to your vendor's documentation for setup instructions. The following instructions assume that:
You are using Windows XP You are connecting to a Windows 2000 server for authentication. You already have a login (User name and password) on the Windows 2000 server. Client Certificate Setup 1. Connect to a network which doesn't require port authentication. 2. Start your Web Browser. In the Address box, enter the IP address of the Windows 2000 Server, followed by /certsrv e.g http://192.168.0.2/certsrv 3. You will be prompted for a user name and password. Enter the User name and Password assigned to you by your network administrator, and click OK. Figure 39: Connect Screen 4. On the first screen (below), select Request a certificate, click Next. 55 Wireless Access Point User Guide Figure 40: Wireless CA Screen 5. Select User certificate request and select User Certificate, the click Next. Figure 41: Request Type Screen 6. Click Submit. 56 PC and Server Configuration Figure 42: Identifying Information Screen 7. A message will be displayed, then the certificate will be returned to you. Click Install this certificate. Figure 43:Certificate Issued Screen 8. You will receive a confirmation message. Click Yes. 57 Wireless Access Point User Guide Figure 44: Root Certificate Screen 9. Certificate setup is now complete. 802.1x Authentication Setup 1. Open the properties for the wireless connection, by selecting Start - Control Panel -
Network Connections. 2. Right Click on the Wireless Network Connection, and select Properties. 3. Select the Authentication Tab, and ensure that Enable network access control using IEEE 802.1X is selected, and Smart Card or other Certificate is selected from the EAP type. Figure 45: Authentication Tab Encryption Settings The Encryption settings must match the APs (Access Points) on the Wireless network you wish to join. Windows XP will detect any available Wireless networks, and allow you to configure each network independently. 58 PC and Server Configuration Your network administrator can advise you of the correct settings for each network. 802.1x networks typically use EAP-TLS. This is a dynamic key system, so there is no need to enter key values. Enabling Encryption To enable encryption for a wireless network, follow this procedure:
1. Click on the Wireless Networks tab. Figure 46: Wireless Networks Screen 2. Select the wireless network from the Available Networks list, and click Configure. 3. Select and enter the correct values, as advised by your Network Administrator. For example, to use EAP-TLS, you would enable Data encryption, and click the checkbox for the setting The key is provided for me automatically, as shown below. 59 Wireless Access Point User Guide Figure 47: Properties Screen Setup for Windows XP and 802.1x client is now complete. 60 PC and Server Configuration Using 802.1x Mode (without WPA) This is very similar to using WPA-802.1x. The only difference is that on your client, you must NOT enable the setting The key is pro-
vided for me automatically. Instead, you must enter the WEP key manually, ensuring it matches the WEP key used on the Access Point. Figure 48: Properties Screen Note:
On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is shown as "104 bit". This difference arises because the key input by the user is 24 bits less than the key size used for encryption. 61 Chapter 5 Operation and Status 5 This Chapter details the operation of the Wireless Access Point and the status screens. Operation Once both the Wireless Access Point and the PCs are configured, operation is automatic. However, you may need to perform the following operations on a regular basis. If using the Access Control feature, update the Trusted PC database as required. (See Access Control in Chapter 3 for details.) If using 802.1x mode, update the User Login data on the Windows 2000 Server, and configure the client PCs, as required. Status Screen Use the Status link on the main menu to view this screen. Figure 49: Status Screen 62 Operation and Status Data - Status Screen Access Point Access Point Name MAC Address Domain Firmware Version TCP/IP IP Address Subnet Mask Gateway DHCP Client Wireless Channel/Frequency Wireless Mode AP Mode Bridge Mode Security Profiles Name SSID Status Buttons Statistics Profile Status Log Stations The current name will be displayed. The MAC (physical) address of the Wireless Access Point. The region or domain, as selected on the System screen. The version of the firmware currently installed. The IP Address of the Wireless Access Point. The Network Mask (Subnet Mask) for the IP Address above. Enter the Gateway for the LAN segment to which the Wireless Access Point is attached (the same value as the PCs on that LAN segment). This indicates whether the current IP address was obtained from a DHCP Server on your network. It will display "Enabled" or "Disabled". The Channel currently in use is displayed. The current mode (e.g. 802.11g) is displayed. The current Access Point mode is displayed. The current Bridge mode is displayed. This displays the current name of each security profile. This displays the SSID associated with the profile. This indicates whether or not the profile is enabled. Click this to open a sub-window where you can view Statistics on data transmitted or received by the Access Point. Click this to open a sub-window which displays further details about each security profile. Click this to open a sub-window where you can view the activity log. Click this to open a sub-window where you can view the list of all current Wireless Stations using the Access Point. 63 Wireless Access Point User Guide Statistics Screen This screen is displayed when the 2.4GHz Statistics button on the Status screen is clicked. It shows details of the traffic flowing through the Wireless Access Point. Figure 50: Statistics Screen Data - Statistics Screen System Up Time System Up Time This indicates how long the system has been running since the last restart or reboot. 2.4GHz Wireless Authentication Deauthentication Association Disassociation Reassociation Wireless MSDU Data The number of "Authentication" packets received. Authentication is the process of identification between the AP and the client. The number of "Deauthentication" packets received. Deauthentica-
tion is the process of ending an existing authentication relationship. The number of "Association" packets received. Association creates a connection between the AP and the client. Usually, clients associ-
ate with only one (1) AP at any time. The number of "Disassociation" packets received. Disassociation breaks the existing connection between the AP and the client. The number of "Reassociation" packets received. Reassociation is the service that enables an established association (between AP and client) to be transferred from one AP to another (or the same) AP. Number of valid Data packets transmitted to or received from Wireless Stations, at application level. Number of valid Data packets transmitted to or received from Wireless Stations, at driver level. 64 Operation and Status Multicast Packets Management Control Number of Broadcast packets transmitted to or received from Wireless Stations, using Multicast transmission. Number of Management packets transmitted to or received from Wireless Stations. Number of Control packets transmitted to or received from Wire-
less Stations. 65 Wireless Access Point User Guide Profile Status The Profile Status screen is displayed when the Profile Status button on the Status screen is clicked. Figure 51: Profile Screen For each profile, the following data is displayed:
Name SSID Broadcast SSID Band Status Clients The name you gave to this profile; if you didn't change the name, the default name is used. The SSID assigned to this profile. Indicates whether or not the SSID is broadcast. The Wireless band ( 2.4 GHz or 5 GHz ) used by this profile. Indicates whether or not this profile is enabled or currently used. The number of wireless stations currently using accessing this Access Point using this profile. If the profile is disabled, this will always be zero. 66 Activity Log This screen is displayed when the Log button on the Status screen is clicked. Operation and Status Figure 52: Activity Log Screen The system date and time is displayed. The Log shows details of the connections to the Wireless Access Point. Update the data on screen. Save the log to a file on your pc. This will delete all data currently in the Log. This will make it easier to read new messages. Data - Activity Log Data Current Time Log Buttons Refresh Save to file Clear Log 67 Wireless Access Point User Guide Station List This screen is displayed when the Stations button on the Status screen is clicked. Figure 53 Station List Screen Data - Station List Screen Station List Name MAC Address Mode SSID Status Refresh Button The name of each Wireless Station is displayed. If the name is not know, "unknown" is displayed for the name. The MAC (physical) address of each Wireless Station is displayed. The mode of each Wireless Station. This displays the SSID used the Wireless station. Because the Wire-
less Access Point supports multiple SSIDs, different PCs could connect using different SSIDs. This indicates the current status of each Wireless Station. Update the data on screen. 68 Chapter 6 Access Point Management This Chapter explains when and how to use the Wireless Access Point's
"Management" Features. 6 Overview This Chapter covers the following features, available on the Wireless Access Points Man-
agement menu. Admin Login Auto Config/Update Config File Log Settings Rogue APs SNMP Upgrade Firmware Admin Login Screen The Admin Login screen allows you to assign a password to the Wireless Access Point. This password limits access to the configuration interface. The default password is password. It is recommended that this be changed, using this screen. Figure 54: Admin Login Screen Data - Admin Login Screen Login User Name Enter the login name for the Administrator. 69 Wireless Access Point User Guide Change Admin Password New Password Repeat New Password Admin Connections Allow Admin connections via wired Ethernet only Enable HTTP HTTP Port Number Enable HTTPS HTTPS Port Number Enable Telnet If you wish to change the Admin password, check this field and enter the new login password in the fields below. Enter the desired login password. Re-enter the desired login password. If checked, then Admin connections via the Wireless interface will not be accepted. Enable this to allow admin connections via HTTP. If enabled, you must provide a port number in the field below. Either HTTP or HTTPS must be enabled. Enter the port number to be used for HTTP connections to this device. The default value is 80. Enable this to allow admin connections via HTTPS (secure HTTP). If enabled, you must provide a port number in the field below. Either HTTP or HTTPS must be enabled. Enter the port number to be used for HTTPS connections to this device. The default value is 443. If desired, you can enable this option. If enabled, you will able to connect to this AP using a Telnet client. You will have to provide the same login data (user name, password) as for a HTTP (Web) connection. 70 Other Settings & Features Auto Config/Update The Auto Config/Update screen provides two (2) features:
Auto Config - The Access Point will configure itself by copying data from another
(compatible) Access Point. Auto Update - The Access Point will update it Firmware by downloading the Firmware file from your FTP Server. Figure 55: Auto Config/Update Screen Data - Auto Config/Update Screen Admin Connections Perform Auto Configu-
ration on this AP next restart If checked, this AP will perform Auto Configuration the next time it restarts. The wired LAN (NOT the Wireless LAN) will be searched for compatible APs. If a compatible AP is found, its configuration is cop-
ied. If more than one compatible AP exists, the first one found is used. Some data cannot be copied:
o The IP address is not copied, and will not change. o The operating mode ( Repeater, Bridge, etc) is not copied, and will not change. Note: This checkbox is automatically disabled, so the Auto-
configuration is only performed once. 71 Wireless Access Point User Guide Respond to Auto-
configuration request by other AP Provide login name and password Provide "Respond to Auto-configuration"
setting Auto Update Check for Firmware upgrade Install... If checked, this AP will respond to "Auto Configuration"
requests it receives. If not checked, "Auto Configuration"
requests will be ignored. If enabled, the login name and password on this AP is sup-
plied the the AP making the Auto-configuration request. If disabled, the AP making the Auto-configuration request will keep its existing login name and password. If enabled, the "Respond to Auto-configuration" setting on this AP is supplied the the AP making the Auto-configuration request. If disabled, the AP making the Auto-configuration request will keep its existing setting. If enabled, this AP will check to see if a Firmware (FW) upgrade is available on the specified FTP Server. If enabled:
Enter the desired time interval (in days) between checks. Select the desired option for installation (see next item). Provide the FTP server information. Select the desired option:
Install FW if different version found If selected, then if the firmware file at the specified loca-
tion is different to the current installed version, the FW will be installed. This allows "Downgrades" - installing an older version of the FW to replace the current version. Install later version only If selected, then the firmware file at the specified location will only be installed if it is a later version. FTP Server address Firmware pathname FTP Login Name FTP Password Enter the address (domain name or IP address) of the FTP Server. Enter the full path (including the FW filename) to the the FW file on the FTP Server. Enter the login name required to gain access to the FTP Server. Enter the password for the login name above. 72 Other Settings & Features Config File This screen allows you to Backup (download) the configuration file, and to restore (upload) a previously-saved configuration file. You can also set the Wireless Access Point back to its factory default settings. To reach this screen, select Config File in the Management section of the menu. Figure 56: Config File Screen Data - Config File Screen Backup Save a copy of cur-
rent settings Once you have the Access Point working properly, you should back up the settings to a file on your computer. You can later restore the Access Point's settings from this file, if necessary. To create a backup file of the current settings:
Click Back Up. If you don't have your browser set up to save downloaded files automatically, locate where you want to save the file, rename it if you like, and click Save. Restore Restore saved settings from a file To restore settings from a backup file:
1. Click Browse. 2. Locate and select the previously saved backup file. 3. Click Restore 73 Wireless Access Point User Guide Defaults Revert to factory default settings To erase the current settings and restore the original factory default settings, click Set to Defaults button. Note!
This will terminate the current connection. The Access Point will be unavailable until it has restarted. By default, the Access Point will act as a DHCP client, and automatically obtain an IP address. You will need to deter-
mine its new IP address in order to re-connect. 74 Other Settings & Features Log Settings (Syslog) If you have a Syslog Server on your LAN, this screen allows you to configure the Access Point to send log data to your Syslog Server. Figure 57: Log Settings (Syslog) Screen Data - Log Settings Screen Syslog Server Select the desired Option:
Disable - Syslog server is not used. Broadcast - Syslog data is broadcast. Use this option if different PCs act as the Syslog server at different times. Send to specified Syslog Server - Select this if the same PC is always used as the Syslog server. If selected, you must enter the server address in the field provided. Syslog Server Address Minimum Severity Level Enter the name or IP address of your Syslog Server. Select the desired severity level. Events with a severtiy level equal to or higher (i.e. lower number) than the selected level will be logged. 75 Wireless Access Point User Guide Rogue APs A "Rouge AP" is an Access Point which should not be in use, and so can be considered to be providing unauthorized access to your LAN. This Access Point can assist to locate 2 types of Rogue APs:
APs which have Wireless security disabled. APs which are not in the list of valid APs which you have provided. When a Rogue AP is located, it is recorded in the log. If using SNMP, you can also choose to have detection of a Rogue AP generate an SNMP trap. Figure 58: Rogue AP Detection Screen Data - Rogue AP Screen Enable Detection Enable Detection Scan Detection generates SNMP Trap Rogue Detection No Security Not in Legal AP List Define Legal AP List To use this feature, enable the "Enable Rogue AP Detection"
checkbox, and select the desired wireless band and time interval. Select the desired Wireless band to scan to Rogue APs and enter the desired time interval between each scan. If using SNMP, checking this option will cause a SNMP trap to be generated whenever a Rogue AP is detected. If not using SNMP, do not enable this option. If checked, then any AP operating with security disabled is considered to be a Rogue AP. If checked, then any AP not listed in the "Legal AP List" is considered to be a Rogue AP. If checked, you must maintain the Legal AP List. Click this button to open a sub-screen where you can modify the "Legal AP List". This list must contain all known APs, so must be kept up to date. 76 Other Settings & Features SNMP SNMP (Simple Network Management Protocol) is only useful if you have a SNMP program on your PC. To reach this screen, select SNMP in the Management section of the menu. Figure 59: SNMP Screen Data - SNMP Screen General Enable SNMP Community Access Rights Use this to enable or disable SNMP as required Enter the community string, usually either "Public" or "Private". Select the desired option:
Read-only - Data can be read, but not changed. Read/Write - Data can be read, and setting changed. Managers Any Station Only this station Traps Disable Broadcast Send to Trap version The IP address of the manager station is not checked. The IP address is checked, and must match the address you enter in the IP address field provided. If selected, you must enter the IP address of the required station. Traps are not used. Select this to have Traps broadcast on your network. This makes them available to any PC. Select this to have Trap messages sent to the specified PC only. If selected, you must enter the IP Address of the desired PC. Select the desired option, as supported by your SNMP Management program. 77 Wireless Access Point User Guide Upgrade Firmware The firmware (software) in the Wireless Access Point can be upgraded using your Web Browser. You must first download the upgrade file, and then select Upgrade Firmware in the Manage-
ment section of the menu. You will see a screen like the following. Figure 60: Firmware Upgrade Screen To perform the Firmware Upgrade:
1. Click the Browse button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Upgrade button to commence the firmware upgrade. The Wireless Access Point is unavailable during the upgrade process, and must restart when the up-
grade is completed. Any connections to or through the Wireless Access Point will be lost. 78 Appendix A Specifications A Wireless Access Point Hardware Specifications CPU Radio-on-Chip DRAM Flash ROM LAN port Wireless Interface Operating temperature Storage temperature Power Adapter Dimensions Wireless Specifications Receive Sensitivity at 11Mbps Receive Sensitivity at 5.5Mbps Receive Sensitivity at 2Mbps Receive Sensitivity at 1Mbps Maximum Receive Level Transmit Power Modulation Throughput AR2312 AR2112 8 Mbytes 2 Mbytes 1 x Auto-MDIX RJ 45 for 10/100Mbps Ethernet Embedded Atheros solution Network Standard IEEE 802.11b (Wi-Fi) and IEEE 802.11g compliance OFDM; 802.11b: CCK (11 Mbps, 5.5 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps) Operating Frequencies 2.412.2.497 GHz Operating Channels 802.11g: 11 for North America, 13 for Europe (ETSI), 14 for Japan 802.11b: 11 for North America, 13 for Europe (ETSI), 14 for Japan 0 C to 40 C
-20 C to 70 C 24VDC 500ma 141mm (W) x 100mm (D) x 27mm (H) min. -85dBm min. -89dBm min. -90dBm min. -93dBm min. -5dBm 18 dBm Direct Sequence Spread Spectrum BPSK / QPSK / CCK Up to 19 Mbps 79 Wireless Access Point User Guide Operating Range 802.11b Indoors:
Outdoors:
802.11g Indoors:
Outdoors:
30 Meters (100ft.) @ 11Mbps 50 Meters (165ft.) @ 5.5Mbps 70 Meters (230ft.) @ 2Mbps 9 1Meters (300ft.) @ 1Mbps 152 Meters (500ft.) @ 11Mbps 270 Meters (885ft.) @ 5.5Mbps 396 Meters (1300ft.) @ 2 Mbps 457 Meters (1500ft.) @ 1 Mbps 30 Meters (98ft.) @ 54Mbps 33 Meters (108ft.) @ 48Mbps 37 Meters (121ft.) @ 36Mbps 46 Meters (151ft.) @ 24Mbps 62 Meters (203ft.) @ 18Mbps 68 Meters (223ft.) @ 12Mbps 78 Meters (256ft.) @ 9Mbps 92 Meters (302ft.) @ 6Mbps 100 Meters (328ft.) @ 54Mbps 295 Meters (968ft.) @ 11Mbps 420 Meters (1378ft.) @ 6 Mbps IEEE 802.11g/11b compliance Software Specifications Details Feature Access point support Wireless Roaming supported Super G (up to 108Mbps) Auto Sensing Open System / Share Key authentication Wireless Channels Support Automatic Wireless Channel Selection Antenna selection Tx Power Adjustment Country Selection Preamble Type: long or short support RTS Threshold Adjustment Fragmentation Threshold Adjustment 80 Operation Mode Security Management Other Features Appendix A - Specifications 802.1x support Beacon Interval Adjustment SSID assignment Common AP, Client/Repeater AP Peer-to-Peer Bridge, Point-to-Multi-Point Bridge Bridge mode can be used simultaneously with Common AP mode. Open, shared, WPA, and WPA-PSK authentication EAP-TLS, EAP-TTLS, PEAP Block inter-wireless station communication Block SSID broadcast Web based configuration RADIUS Accounting RADIUS-On feature RADIUS Accounting update CLI Message Log Access Control list file support Configuration file Backup/Restore Statistics support Device discovery program Windows Utility DHCP client WINS client Rogue AP detection Auto-config Auto firmware update Firmware Upgrade HTTP, FTP network protocol download 81 Wireless Access Point User Guide FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communica-
tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver Increase the separation between the equipment and receiver. is connected. Consult the dealer or an experienced radio/TV technician for help. To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
(Example - use only shielded interface cables when connecting to computer or peripheral devices). FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 82 Appendix B Troubleshooting Overview B This chapter covers some common problems that may be encountered while using the Wireless Access Point and some possible solutions to them. If you follow the suggested steps and the Wireless Access Point still does not function properly, contact your dealer for further advice. General Problems Problem 1:
Solution 1:
Can't connect to the Wireless Access Point to configure it. Check the following:
The Wireless Access Point is properly installed, LAN connections are OK, and it is powered ON. Check the LEDs for port status. Ensure that your PC and the Wireless Access Point are on the same network segment. (If you don't have a router, this must be the case.) If your PC is set to "Obtain an IP Address automatically" (DHCP client), restart it. You can use the following method to determine the IP address of the Wireless Access Point, and then try to connect using the IP address, in-
stead of the name. To Find the Access Point's IP Address 1. Open a MS-DOS Prompt or Command Prompt Window. 2. Use the Ping command to ping the Wireless Access Point. Enter ping followed by the Default Name of the Wireless Access Point. e.g. ping SC003318 3. Check the output of the ping command to determine the IP address of the Wireless Access Point, as shown below. Figure 61: Ping If your PC uses a Fixed (Static) IP address, ensure that it is using an IP Address which is compatible with the Wireless Access Point. (If no DHCP Server is found, the Wireless Access Point will default to an IP Address and Mask of 192.168.0.228 and 255.255.255.0.) On Windows PCs, you can use Control Panel-Network to check the Properties for the TCP/IP protocol. Problem 2: My PC can't connect to the LAN via the Wireless Access Point. 83 Wireless Access Point User Guide Solution 2 Check the following:
The SSID and WEP settings on the PC match the settings on the Wire-
less Access Point. On the PC, the wireless mode is set to "Infrastructure"
If using the Access Control feature, the PC's name and address is in the Trusted Stations list. If using 802.1x mode, ensure the PC's 802.1x software is configured correctly. See Chapter 4 for details of setup for the Windows XP 802.1x client. If using a different client, refer to the vendor's documentation. 84 Appendix C Windows TCP/IP Overview C Normally, no changes need to be made. By default, the Wireless Access Point will act as a DHCP client, automatically obtaining a suitable IP Address (and related information) from your DHCP Server. If using Fixed (specified) IP addresses on your LAN (instead of a DHCP Server), there is no need to change the TCP/IP of each PC. Just configure the Wireless Access Point to match your existing LAN. The following sections provide details about checking the TCP/IP settings for various types of Windows, should that be necessary. Checking TCP/IP Settings - Windows 9x/ME:
1. Select Control Panel - Network. You should see a screen like the following:
Figure 62: Network Configuration 2. Select the TCP/IP protocol for your network card. 3. Click on the Properties button. You should then see a screen like the following. 85 Wireless Access Point User Guide Figure 63: IP Address (Win 95) Ensure your TCP/IP settings are correct, as follows:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows settings. To work correctly, you need a DHCP server on your LAN. Using "Specify an IP Address"
If your PC is already configured for a fixed (specified) IP address, no changes are required.
(The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs.) 86 Appendix B - Troubleshooting Checking TCP/IP Settings - Windows NT4.0 1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as shown below. Figure 64: Windows NT4.0 - TCP/IP 2. Click the Properties button to see a screen like the one below. Figure 65: Windows NT4.0 - IP Address 87 Wireless Access Point User Guide 3. Select the network card for your LAN. 4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify an IP Address, as explained below. Obtain an IP address from a DHCP Server This is the default Windows setting. This is the default Windows settings. To work correctly, you need a DHCP server on your LAN. Using "Specify an IP Address"
If your PC is already configured for a fixed (specified) IP address, no changes are required.
(The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs.) 88 Appendix B - Troubleshooting Checking TCP/IP Settings - Windows 2000 1. Select Control Panel - Network and Dial-up Connection. 2. Right click the Local Area Connection icon and select Properties. You should see a screen like the following:
Figure 66: Network Configuration (Win 2000) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 67: TCP/IP Properties (Win 2000) 89 Wireless Access Point User Guide 5. Ensure your TCP/IP settings are correct:
Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. This is the default Windows settings. To work correctly, you need a DHCP server on your LAN. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured for a fixed (specified) IP address, no changes are required.
(The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs.) 90 Appendix B - Troubleshooting Checking TCP/IP Settings - Windows XP 1. Select Control Panel - Network Connection. 2. Right click the Local Area Connection and choose Properties. You should see a screen like the following:
Figure 68: Network Configuration (Windows XP) 3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following. Figure 69: TCP/IP Properties (Windows XP) 91 Wireless Access Point User Guide 5. Ensure your TCP/IP settings are correct. Using DHCP To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. To work correctly, you need a DHCP server on your LAN. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured for a fixed (specified) IP address, no changes are required.
(The Administrator should configure the Wireless Access Point with a fixed IP address from the same address range used on the PCs.) 92 Appendix D About Wireless LANs Overview D Wireless networks have their own terms and jargon. It is necessary to understand many of these terms in order to configure and operate a Wireless LAN. Wireless LAN Terminology Modes Wireless LANs can work in either of two (2) modes:
Ad-hoc Infrastructure Ad-hoc Mode Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Sta-
tions (e.g. notebook PCs with wireless cards) communicate directly with each other. Infrastructure Mode In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations
(e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations can then access all LAN resources. Access Points can only function in "Infrastructure" mode, and can communicate only with Wireless Stations which are set to "Infrastructure" mode. SSID/ESSID BSS/SSID A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). Using the same SSID is essential. Devices with different SSIDs are unable to communi-
cate with each other. However, some Access Points allow connections from Wireless Stations which have their SSID set to any or whose SSID is blank ( null ). ESS/ESSID A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form an Extended Service Set (ESS). Different Access Points within an ESS can use different Channels. To reduce interference, it is recommended that adjacent Access Points SHOULD use different channels. 93 Wireless Access Point User Guide As Wireless Stations are physically moved through the area covered by an ESS, they will automatically change to the Access Point which has the least interference or best perform-
ance. This capability is called Roaming. (Access Points do not have or require Roaming capabilities.) Channels The Wireless Channel sets the radio frequency used for communication. Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a Channel which provides the least interference and best performance. If using multiple Access Points, it is better if adjacent Access Points use different Chan-
nels to reduce interference. The recommended Channel spacing between adjacent Access Points is 5 Channels (e.g. use Channels 1 and 6, or 6 and 11). In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access Point. If more than one Access Point can be used, the one with the strongest signal is used. (This can only happen within an ESS.) If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the same Channel. However, most Wireless stations will still scan all Channels to see if there is an existing "Ad-hoc" group they can join. WEP WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is transmitted. This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless unless the receiver can decrypt it. If WEP is used, the Wireless Stations and the Wireless Access Point must have the same settings. WPA-PSK Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption key is derived from the PSK, and changes frequently. WPA-802.1x WPA-802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. If this option is used:
The Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the authentication data when required. This is normally done via a digital certificate, so no user action is required. All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key input is required. 94 Appendix B - Troubleshooting 802.1x This uses the 802.1x standard for client authentication, and WEP for data encryption. If possi-
ble, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is used:
The Access Point must have a "client login" on the Radius Server. Each user must have a "user login" on the Radius Server. Each user's wireless client must support 802.1x and provide the login data when required. All data transmission is encrypted using the WEP standard. You only have to select the WEP key size; the WEP key is automatically generated. 95 Appendix E Command Line Interface Overview E If desired, the Command Line Interface (CLI) can be used for configuration. This creates the possibility of creating scripts to perform common configuration changes. The CLI requires either a Telnet connection or a physical connection from your PC to the serial port (RS232 port) on the Wireless Access Point. Using the CLI - Telnet 1. Start your Telnet client, and establish a connection to the Access Point. e.g. Telnet 192.168.0.228 2. You will be prompted for the user name and password. Enter the same login name and password as used for the HTTP (Web) interface. The default values are admin for the User Name, and password for the Password. 3. Once connected, you can use any of the commands listed in the following Command Reference. Using the CLI - Serial Port 1. Use a standard serial port cable to connect your PC to the serial (RS232) port on the Wireless Access point. 2. Start your communications program. For example, in Windows, use HyperTerminal. (This program may not be installed. If so, you can install it using Start - Settings - Control Panel
- Add or Remove Programs. Then select Windows Setup or Add/Remove Windows Com-
ponents, depending on your version of Windows.) 3. Configure the connection properties:
Name - use a suitable name, such as AP Port or Connect Using - Select the Serial Port that the cable is connected to.
(Do not select your modem.) Port Settings - Use 9600, N, 8, 1, with hardware flow control, as shown below. 96 Appendix C - Windows TCP/IP Figure 70: CLI Port Settings 4. Use the Connect command to start the connection. 5. You will be prompted for a user name and password. Enter the current user name and password for the AP you are connecting to. The default values are admin for the User Name, and password for the Password. 6. You will then see the prompt, and can then use any of the commands listed in the follow-
ing Command Reference. Command Reference The following commands are available.
?
admin config wlan config profile del acl del key find bss find channel find all format bootrom ftp Display CLI Command List Temporary factory admin config wlanX config profile Delete Access Control List Delete Encryption key Find BSS Find Available Channel Find All BSS Format flash filesytem Update boot rom image Software update via FTP 97 Wireless Access Point User Guide get 11gonly Display 11g Only Allowed get 11goptimize Display 11g Optimization Level get 11goverlapbss Display Overlapping BSS Protection get acl get aging get antenna Display Access Control List Display Aging Interval Display Antenna Diversity get association Display Association Table get authentication Display Authentication Type get autochannelselect Display Auto Channel Select get basic11b get basic11g Display Basic 11b Rates Display Basic 11g Rates get beaconinterval Display Beacon Interval get burstSeqThreshold Display Max Number of frames in a Burst get burstTime get calibration Display Burst Time Display Noise And Offset Calibration Mode get cckTrigHigh Display Higher Trigger Threshold for CCK Phy Errors for ANI Control get cckTrigLow Display Lower Trigger Threshold for CCK Phy Errors for ANI Control get cckWeakSigThr Display ANI Parameter for CCK Weak Signal Detection Threshold get channel get cipher Display Radio Channel Display Encryption cipher get compproc Display Compression scheme get compwinsize Display Compression Window Size get config Display Current AP Configuration get countrycode Display Country Code get ctsmode get ctsrate get ctstype Display CTS mode Display CTS rate Display CTS type get domainsuffix Display Domain Name Server suffix get dtim get enableANI get encryption Display Data Beacon Rate (DTIM) Display Adaptive Noise Immunity Control On/Off Display Encryption Mode get extendedchanmode Display Extended Channel Mode 98 Appendix C - Windows TCP/IP get firStepLvl Display ANI Parameter for FirStepLevel get fragmentthreshold Display Fragment Threshold get frequency get gateway Display Radio Frequency (MHz) Display Gateway IP Address get gbeaconrate Display 11g Beacon Rate get gdraft5 Display 11g Draft 5.0 compatibility get groupkeyupdate Display Group Key Update Interval (in Seconds) get hardware Display Hardware Revisions get hostipaddr Display Host IP Address get ipaddr get ipmask Display IP Address Display IP Subnet Mask get keyentrymethod Display Encryption Key Entry Method get keysource Display Source Of Encryption Keys get login Display Login User Name get minimumrate Display Minimum Rate get nameaddr Display IP address of name server get nf Display Noise Floor get noiseImmunityLvl Display ANI Parameter for Noise Immunity Level get ofdmTrigHigh Display Higher Trigger Threshold for OFDM Phy Errors for ANI Control get ofdmTrigLow Display Lower Trigger Threshold for OFDM Phy Errors for ANI Control get ofdmWeakSigDet Display ANI Parameter for OFDM Weak Signal Detection get overRidetxpower Display Tx power override get operationMode Display Operation Mode get power Display Transmit Power Setting get quietAckCtsAllow Display if Ack/Cts frames are allowed during quiet period get quietDuration Display Duration of quiet period get quietOffset Display Offset of quiet period into the beacon period get radiusname Display RADIUS server name or IP address get radiusport Display RADIUS port number get rate get remoteAp get hwtxretries Display Data Rate Display Remote Ap's Mac Address Display HW Transmit Retry Limit 99 Wireless Access Point User Guide get swtxretries Display SW Transmit Retry Limit get rtsthreshold Display RTS/CTS Threshold get shortpreamble Display Short Preamble Usage get shortslottime Display Short Slot Time Usage get sntpserver Display SNTP/NTP Server IP Address get softwareretry Display Software Retry get spurImmunityLvl Display ANI Parameter for Spur Immunity Level get ssid Display Service Set ID get ssidsuppress Display SSID Suppress Mode get station get SuperG Display Station Status Display SuperG Feature Status get systemname Display Access Point System Name get telnet get timeout get tzone Display Telnet Mode Display Telnet Timeout Display Time Zone Setting get updateparam Display Vendor Default Firmware Update Params get uptime get watchdog get wds get wep Display UpTime Display Watchdog Mode Display WDS Mode Display Encryption Mode get wirelessmode Display Wireless LAN Mode get 80211d get http get HttpPort get https get HttpsPort get syslog Display 802.11d mode Display http Enable/Disable Display http port number Display https Enable/Disable Display https port number Display syslog Disable/Broadcast/Unicast get syslogSeverity Display syslog Severity level get syslogServer Display unicast syslog server IP/name get manageOnlyLan Display Management only via LAN Enable/Disable get roguedetect Display Rogue AP Detection Enable/Disable get rogueinteval Display Minutes of every Rogue AP Detection(Range: 3 ~ 99) 100 Appendix C - Windows TCP/IP get rogueband get roguetype get roguesnmp get roguelegal Display Rogue AP Detection band(s) Display Rogue AP definition Display Rogue AP Detection SNMP Trap Enable/Disable Display Legal AP List of Rogue AP get autoConfig Display Auto Config Enable/Disable get autoResponse Display Respond to Auto Config request Enable/Disable get autoChangeName Display Provide admin login name and password Enable/Disable get autoSetResp Display Provide respond to Auto Config request Enable/Disable get autoUpdate Display Auto Update Enable/Disable get autoUpgradeOnly Display Install later version only Enable/Disable get autoUpdateInterval Display Auto Update Interval(1~31days) get ftpServer Display FTP Server address get fwPathname Display Firmware Pathname get ftpLogin Display FTP Login Name get ftpPassword Display FTP Password get activeCurrentProfile Display active Current Profile get profileName Display Profile Name get profileVlanId Display Profile VLAN ID get APPrimaryProfile Display AP Primary Profile get WDSPrimaryProfile Display WDS Primary Profile get securityMode Display Security Mode get Accounting Display Accounting Enable/Disable get Accountingport Display Accounting port number get keyValue get keyLength get keyIndex get UAM Display Encryption Key Value Display Encryption Key Length Display Encryption Key Index Display UAM Authentication Enable/Disable get UAMMethod Display UAM Authentication Method get UAMLoginURL Display UAM Authentication Login URL get UAMLoginFailURL Display UAM Authentication Login Fail URL get macAuth Display Mac Authentication Enable/Disable get snmpMode Display SNMP Mode 101 Wireless Access Point User Guide get snmpCommunity Display SNMP Community Name get snmpAccessRight Display SNMP Access Right get snmpAnyStaMode Display SNMP Any Station Mode get snmpStationIPAddr Display SNMP Station Addr get trapMode Display Trap Mode get trapVersion Display Trap Version get trapSendMode Display Trap Send Mode get trapRecvIp Display Trap Receiver IP get wdsMacList Display WDS Mac Address List get enableWirelessClient Display Wireless Client Enable/Disable get isolationType Display Isolation Type get winsEnable Display WINS Server Enable/Disable get winsserveraddr Display IP address of WINS server get wirelessSeparate Display wireless seprate Mode get description get dhcpmode get wlanstate help Lebradeb ls mem np ns ping radar!
reboot rm run quit Display Access Point Description Display dhcp mode Display wlan state Display CLI Command List Disable reboot during radar detection list directory system memory statistics Network Performance Network Performance Server Ping Simulate radar detection on current channel Reboot Access Point Remove file Run command file Logoff set 11gonly Set 11g Only Allowed set 11goptimize Set 11g Optimization Level set 11goverlapbss Set Overlapping BSS Protection 102 Appendix C - Windows TCP/IP set acl set aging set antenna Set Access Control List Set Aging Interval Set Antenna set authentication Set Authentication Type set autochannelselect Set Auto Channel Selection set basic11b set basic11g Set Use of Basic 11b Rates Set Use of Basic 11g Rates set beaconinterval Modify Beacon Interval set burstSeqThreshold Set Max Number of frames in a Burst set burstTime set calibration Set Burst Time Set Calibration Period set cckTrigHigh Set Higher Trigger Threshold for CCK Phy Errors For ANI Control set cckTrigLow Set Lower Trigger Threshold for CCK Phy Errors For ANI Control set cckWeakSigThr Set ANI Parameter for CCK Weak Signal Detection Threshold set channel set cipher Set Radio Channel Set Cipher set compproc Set Compression Scheme set compwinsize Set Compression Window Size set countrycode Set Country Code set ctsmode set ctsrate set ctstype Set CTS Mode Set CTS Rate Set CTS Type set domainsuffix Set Domain Name Server Suffix set dtim set enableANI set encryption Set Data Beacon Rate (DTIM) Turn Adaptive Noise Immunity Control On/Off Set Encryption Mode set extendedchanmode Set Extended Channel Mode set factorydefault Restore to Default Factory Settings set firStepLvl Set ANI Parameter for FirStepLevel set fragmentthreshold Set Fragment Threshold set frequency set gateway Set Radio Frequency (MHz) Set Gateway IP Address 103 Wireless Access Point User Guide set gbeaconrate Set 11g Beacon Rate set groupkeyupdate Set Group Key Update Interval (in Seconds) set gdraft5 Set 11g Draft 5.0 compatibility set hostipaddr Set Host IP address set ipaddr set ipmask Set IP Address Set IP Subnet Mask set keyentrymethod Select Encryption Key Entry Method set keysource Select Source Of Encryption Keys set login Modify Login User Name set minimumrate Set Minimum Rate set nameaddress Set Name Server IP address set noiseImmunityLvl Set ANI Parameter for Noise Immunity Level set ofdmTrigHigh Set Higher Trigger Threshold for OFDM Phy Errors for ANI Control set ofdmTrigLow Set Lower Trigger Threshold for OFDM Phy Errors for ANI Control set ofdmWeakSigDet Set ANI Parameter for OFDM Weak Signal Detection set overRidetxpower Set Tx power override set operationMode Set operation Mode set password Modify Password set passphrase Modify Passphrase set power Set Transmit Power set quietAckCtsAllow Allow Ack/Cts frames during quiet period set quietDuration Duration of quiet period set quietOffset Offset of quiet period into the beacon period set radiusname Set RADIUS name or IP address set radiusport Set RADIUS port number set radiussecret Set RADIUS shared secret set rate set rate set rate set rate set rate Set Data Rate Set Data Rate Set Data Rate Set Data Rate Set Data Rate set regulatorydomain Set Regulatory Domain 104 Appendix C - Windows TCP/IP set remoteAP set hwtxretries set swtxretries Set Remote AP's Mac Address Set HW Transmit Retry Limit Set SW Transmit Retry Limit set rtsthreshold Set RTS/CTS Threshold set shortpreamble Set Short Preamble set shortslottime Set Short Slot Time set sntpserver Set SNTP/NTP Server IP Address set softwareretry Set Software Retry set spurImmunityLvl Set ANI Parameter for Spur Immunity Level set ssid Set Service Set ID set ssidsuppress Set SSID Suppress Mode set SuperG Super G Features set systemname Set Access Point System Name set telnet set timeout set tzone Set Telnet Mode Set Telnet Timeout Set Time Zone Setting set updateparam Set Vendor Default Firmware Update Parameters set watchdog Set Watchdog Mode set wds set wep Set WDS Mode Set Encryption Mode set wlanstate Set wlan state set wirelessmode Set Wireless LAN Mode set 80211d set http set HttpPort set https set HttpsPort set syslog Set 802.11d mode Set http Enable/Disable Set http port number Set https Enable/Disable Set https port number Set syslog Disable/Broadcast/Unicast set syslogSeverity Set syslog Severity level set syslogServer Set unicast syslog server IP/name set manageOnlyLan Set Management only via LAN Enable/Disable set roguedetect Set Rogue AP Detection Enable/Disable 105 Wireless Access Point User Guide set rogueinteval Set Minutes of every Rogue AP Detection(Range: 3 ~ 99) set rogueband set roguetype set roguesnmp set roguelegal Set Rogue AP Detection band(s) Set Rogue AP definition Set Rogue AP Detection SNMP Trap Enable/Disable Add/Delete one AP MAC/OUI into/from Rogue AP Legal List set autoConfig Set Auto Config Enable/Disable set autoResponse Set Respond to Auto Config request Enable/Disable set autoChangeName Set provide admin login name and password Enable/Disable set autoSetResp Set Provide respond to Auto Config request Enable/Disable set autoUpdate Set Auto Update Enable/Disable set autoUpgradeOnly Set Install later version only Enable/Disable set autoUpdateInterval Set Auto Update Interval(1~31days) set ftpServer Set FTP Server address set fwPathname Set Firmware Pathname set ftpLogin Set FTP Login Name set ftpPassword Set FTP Password set activeCurrentProfile Set active Current Profile set profileName Set Profile Name set profileVlanId Set Profile Vlan Id set APPrimaryProfile Set AP's Primary Profile set WDSPrimaryProfile Set WDS's Primary Profile set securityMode Set Security Mode set Accounting Set Accounting Enable/Disable set Accountingport Set Accounting port number set keyValue set keyLength set keyIndex set UAM Set Encryption Key Value Set Encryption Key Length Set Encryption Key Index Set UAM Authentication Enable/Disable set UAMMethod Set UAM Authentication Method set UAMLoginURL Set UAM Authentication Login URL set UAMLoginFailURL Set UAM Authentication Login Fail URL set macAuth Set Mac Authentication Enable/Disable 106 set snmpMode Set SNMP Mode set snmpCommunity Set SNMP Community Name set snmpAccessRight Set SNMP Access Right set snmpAnyStaMode Set SNMP Any Station Mode set snmpStationIPAddr Set SNMP Station Address set trapMode Set Trap Mode set trapVersion Set Trap Version set trapSendMode Set Trap Send Mode set trapRecvIp Set Trap Receiver IP set description set dhcpMode Set Access Point Description Set Dhcp Mode set wdsMacList Set WDS Mac Address List set enableWirelessClient Set Wireless Client Enable/Disable set isolationType Set Isolation Type set winsEnable Set WINS Server Enable/Disable set winsServerAddr Set WINS Server IP address set wirelessSeparate Set wireless separate Mode set sdSet set sdAdd set sdDel start wlan stop wlan timeofday version Set debug level Add debug level Del debug level Start the current wlan Stop the current wlan Display Current Time of Day Software version Appendix C - Windows TCP/IP 107
1 2 | Int Photos | Internal Photos | 826.89 KiB |
APPENDIX A. Photographs of EUT REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A1 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A2 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A3 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A4 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A5 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A6 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A7 OF A8 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A8 OF A8 ISSUED DATE : Apr. 27, 2005
1 2 | Photos | Internal Photos | 446.77 KiB |
ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 5 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 6 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 7 of 11
1 2 | Ext Photos and Antennas | External Photos | 1012.20 KiB |
APPENDIX A. Photographs of EUT REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A1 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A2 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A3 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A4 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A5 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 OMNI Antenna (3CWE591) / 6dBi for 2.4GHz SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A6 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 Panel Antenna (3CWE598) / 8dBi for 2.4GHz SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A7 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 Hallway Antenna (3CWE597) / 4dBi for 2.4GHz SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A8 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A9 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 Ceiling Antenna (3CWE592) / 3dBi for 2.4GHz SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A10 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 High Gain Panel Antenna (3CWE596) / 18dBi for 2.4GHz SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A11 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A12 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A13 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A14 OF A15 ISSUED DATE : Apr. 27, 2005 REPORT NO. : 531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 PAGE NUMBER : A15 OF A15 ISSUED DATE : Apr. 27, 2005
1 2 | Photos | External Photos | 1.10 MiB |
ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Appendix A. Pictures ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 1 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 2 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 3 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 4 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 5 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 6 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 7 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 8 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 9 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 10 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 11 of 11
1 2 | Loc | ID Label/Location Info | 27.14 KiB | March 19 2004 |
FCC ID Label Location for AP51GA FCC ID Label
1 2 | Smpl | ID Label/Location Info | 116.86 KiB | March 19 2004 |
Model No.:
Serial No. Server Name:
Polarity:o@
th Par 18 of the FCC rules. Operation s subject.
(1) This device may not cause harm!
ist accept any interference ecelved cause undesited operation, NOTES:
1.3t @ > H7d4506 & HRs SRE WB > EPO37. 2.8 AR OG SH RAR TR RS BAK. SPH RE eARE. 4AM Z FAR. 5.22: +0.2mm SHAR AE/APSIGA CP HE)
#st_|9320N90001
1 2 | Cover Letter | Cover Letter(s) | 36.78 KiB |
Class II Change Letter Dated this 2005/5/12 Declare Company: SerComm Corporation FCC ID: P27AP51GA Class II change filing To whom it may concern, We, Sporton International Inc., is a NVLAP accredited Lab in Taiwan who was authorized by the applicant/manufacturer, SerComm Corporation to handle all the processes. The applicant would like to file Class II change for an Office Connect Wireless 108Mbps 11g PoE Access Point since 4 new antennas has been added. No. 1 2 3 4 5 Brand Name 3COM 3COM 3COM 3COM 3COM Model Name 3CWE591 3CWE592 3CWE596 3CWE597 3CWE598 Antenna Type Gain (dBi) OMNI Ceiling Panel Hallway Panel 6.00 3.00 18.00 4.00 8.00 EIRP power, Harmonic, Spurious Emission and Bandedge Emission has been re-tested due to this change. Sincerely yours, Signature
:
Name/Title : Dr. Alan Lane / Vice General Manager Sporton International Inc., Tel : 886-3-327-3456 ext.588 Fax: 886-3-318-0055 E-mail: alan@sporton.com.tw
1 2 | Test Report | Test Report | 3.86 MiB |
FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 FCC TEST REPORT CATEGORY : Mobile PRODUCT NAME : Office Connect Wireless 108Mbps 11g PoE Access Point FCC ID. : P27AP51GA FILING TYPE : Certification BRAND NAME : 3COM MODEL NAME : WL-529 APPLICANT : SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. MANUFACTURER : SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. ISSUED BY : SPORTON INTERNATIONAL INC. 6F, No. 106, Sec. 1, Hsin Tai Wu Rd., His Chih, Taipei Hsien, Taiwan, R.O.C. Statements:
The test result in this report refers exclusively to the presented test model / sample. Without written approval of SPORTON International Inc., the test report shall not be reproduced except in full. Certificate or Test Report could not be used by the applicant to claim the product endorsement by CNLA and any agency of U.S. government. The test equipment used to perform the test is calibrated and traceable to NML/ROC or NIST/USA. 1190 ILAC MRA SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Table of Contents Report No.: FR531712 HISTORY OF THIS TEST REPORT .....................................................................................................................II CERTIFICATE OF COMPLIANCE.......................................................................................................................III 1. GENERAL DESCRIPTION OF EQUIPMENT UNDER TEST...........................................................................1 1.1. Applicant .........................................................................................................................................................................................1 1.2. Manufacturer...................................................................................................................................................................................1 1.3. Basic Description of Equipment under Test....................................................................................................................................1 1.4. Features of Equipment under Test .................................................................................................................................................1 1.5. Antenna Description........................................................................................................................................................................2 1.6. Table for Carrier Frequencies .........................................................................................................................................................2 2. TEST CONFIGURATION OF THE EQUIPMENT UNDER TEST.....................................................................3 2.1. Connection Diagram of Test System ..............................................................................................................................................3 2.2. The Test Mode Description.............................................................................................................................................................4 2.3. Description of Test Supporting Units ..............................................................................................................................................4 3. GENERAL INFORMATION OF TEST ..............................................................................................................5 3.1. Test Facility.....................................................................................................................................................................................5 3.2. Standards for Methods of Measurement.........................................................................................................................................5 3.3. Frequency Range Investigated .......................................................................................................................................................5 3.4. Test Distance ..................................................................................................................................................................................5 3.5. Test Software..................................................................................................................................................................................5 4. LIST OF MEASUREMENTS .............................................................................................................................6 4.1. Summary of the Test Results..........................................................................................................................................................6 5. TEST RESULT ..................................................................................................................................................7 5.1. Test of Maximum Peak Conducted Output Power..........................................................................................................................7 5.2. Test of Band Edges Emission.........................................................................................................................................................9 5.3. Test of Spurious Radiated Emission.............................................................................................................................................13 5.4. Antenna Requirements .................................................................................................................................................................71 5.5. RF Exposure .................................................................................................................................................................................72 6. LIST OF MEASURING EQUIPMENTS USED................................................................................................77 7. COMPANY PROFILE......................................................................................................................................78 7.1. Certificate of Accreditation ............................................................................................................................................................78 7.2. Test Location ................................................................................................................................................................................78 8. CNLA CERTIFICATE OF ACCREDITATION.................................................................................................79 APPENDIX A. PHOTOGRAPHS OF EUT .............................................................................................. A1 ~ A46 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255:
Page No. Issued Date
: i
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 HISTORY OF THIS TEST REPORT Received Date: Mar. 18, 2005 Test Date: Apr. 02, 2005 Original Report Issue Date: Apr. 26, 2005 Report No.: FR531712 No additional attachment. Additional attachment were issued as following record:
Attachment No. Issue Date Description SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255:
Page No. Issued Date
: ii
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 CERTIFICATE OF COMPLIANCE with 47 CFR FCC Part 15 Subpart C PRODUCT NAME : Office Connect Wireless 108Mbps 11g PoE Access Point BRAND NAME : 3COM MODEL NAME : WL-529 APPLICANT : SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. MANUFACTURER : SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. I HEREBY CERTIFY THAT:
The measurements shown in this test report were made in accordance with the procedures given in ANSI C63.4-2003 and all test are performed according to 47 CFR FCC Part 15 Subpart C. Testing was carried out on Apr. 02, 2005 at SPORTON International Inc. LAB. Dr. Alan Lane Vice General Manager Sporton International Inc. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255:
Page No. Issued Date
: iii
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 1. General Description of Equipment under Test 1.1. Applicant SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. 1.2. Manufacturer SerComm Corporation 8F, No. 3-1, YuanQu St., NanKang, Taipei 115, Taiwan, R.O.C. 1.3. Basic Description of Equipment under Test This product is a Wireless Access Point / Ethernet Bridge with 802.11b/g wireless solution. The technical data has been listed on section Features of Equipment under Test . This EUT is able to be powered by POE or adapter. 1.4. Features of Equipment under Test Modulation Type IEEE 802.11g IEEE 802.11b Maximum Data Rate Frequency Range Number of Channels Antenna Type Max. Output Power Power Supply Chipset Used
: Direct Sequence Spread Spectrum (DSSS for 802.11b) Orthogonal Frequency Division Multiplexing (OFDM for 802.11g)
: BPSK 6Mbps, 9Mbps QPSK 12Mbps, 18Mbps 16QAM 24Mbps, 36Mbps 64QAM 48Mbps, 54Mbps
: DBPSK 1Mbps DQPSK 2Mbps CCK 5.5Mbps, 11Mbps
: 802.11b (11Mbps), 802.11g (54Mbps)
: 2.4 2.4835 GHz for 11b/g
: 11 maximum (for 11b/11g)
: See section 1.5 for details
: 802.11b: 17.80dBm, 802.11g: 15.70dBm
: 48 VDC from POE / 100-240 VAC from Adapter
: BBP/MAC = Atheros AR5212; Transceiver = Atheros AR2112 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 1 of 79
: Apr. 26, 2005 1.5. Antenna Description FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 No. Brand Name Model Name Antenna Type Gain (dBi) 1 2 3 4 5 3COM 3COM 3COM 3COM 3COM 3CWE591 3CWE592 3CWE596 3CWE597 3CWE598 OMNI Ceiling Panel Hallway Panel 6.00 3.00 18.00 4.00 8.00 1.6. Table for Carrier Frequencies Channel Frequency Channel Frequency Channel Frequency 01 02 03 04 2412 MHz 2417 MHz 2422 MHz 2427 MHz 05 06 07 08 2432 MHz 2437 MHz 2442 MHz 2447 MHz 09 10 11
-
2452 MHz 2457 MHz 2462 MHz
-
SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 2 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 2. Test Configuration of the Equipment under Test 2.1. Connection Diagram of Test System POE Mode ANT 1 1. RF Cable, 0.5m, Double Shielding 2. RJ-45, 3m, No-shielding 3. RJ-45, 10m, No-shielding Adapter Mode ANT 2 1 1. ANT. Cable, 1.9m, No-Shielding 2. ANT. Cable, 0.2m, No-shielding 3. RJ-45, 10m, No-shielding 4. Adapter Cable, 2.80m, No-shielding SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 EUT 2 POE 3 EUT 3 Remote Workstation 4 Adapter Remote Workstation Page No. Issued Date
: 3 of 79
: Apr. 26, 2005 2.2. The Test Mode Description FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 1. This test report is class II change for adding 4 types of antennas. Only revised Spurious Radiated Emission was shown in this test report. 2. For DSSS modulation, CCK (11 Mbps) is the worst case on all test items. 3. For OFDM modulation, BPSK (6 Mbps) is the worst case on all test items. 4. According to ANSI C63.4-2003: If frequency range of EUT is more than 10 MHz, we have to test the lowest, middle and highest channels of EUT. 5. Spurious emission below 1GHz is independent of channel selection and modulation types. So only channel 06 with OFDM modulation was tested. 6. Spurious emission below 1GHz was tested on both POE and adapter powered configurations. 7. Antenna Configuration Test Modes:
Mode 1: ANT.1 (3CWE591) Mode 2: ANT.2 (3CWE592) Mode 3: ANT.3 (3CWE596) Mode 4: ANT.4 (3CWE597) 2.3. Description of Test Supporting Units Support unit Notebook Adapter POE Brand DELL UL 3COM Model No. FCC ID Data cable (m) D505 3C10224-US 61-0107-000 DoC
-
-
-
1.5
-
SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 4 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 3. General Information of Test 3.1. Test Facility Test Site Location
: No. 52, Hwa Ya 1st Rd., Hwa Ya Technology Park, Kwei-Shan Hsiag, Tao Test Site No Yuan Hsien, Taiwan, R.O.C.
: TEL 886-3-327-3456
: FAX 886-3-318-0055
: 03CH03-HY / CO04-HY 3.2. Standards for Methods of Measurement Here is the list of the standards followed in this test report. ANSI C63.4-2003 47 CFR FCC Part 15 Subpart C 3.3. Frequency Range Investigated Radiated emission test: from 30 MHz to 10th carrier harmonic. 3.4. Test Distance The test distance of radiated emission (30MHz~1GHz) test from antenna to EUT is 3 M. The test distance of radiated emission (1GHz~10th carrier harmonic) test from antenna to EUT is 3 M. 3.5. Test Software During testing, Channel & Power Controlling Software: This was provided by the manufacturer and is able to let the test engineer select the operating channel as well as the RF output power. The parameters for channel selection is trying to offer the test engineer the ability to fix the operating channel for testing, both normal data and continuously transmitting modes are allowed, and that for RF output power selection is for the setting of RF output power expected by the customer and is going to be fixed on the firmware of the final end product. Power Parameter Table Test Software Test Channel Test Frequency TX Power of DSSS TX Power of OFDM SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 CH 01 2412MHz 20.00 15.50 ART CH 06 2437MHz 20.00 15.50 CH 11 2462MHz 19.50 15.50 Page No. Issued Date
: 5 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 4. List of Measurements 4.1. Summary of the Test Results Applied Standard: 47 CFR FCC Part 15 Subpart C Paragraph FCC Section Description of Test 5.1 5.2 5.3 5.4 5.5 15.247(b)(3) Maximum Peak Conducted Output Power 15.247(d) Band Edges Emission 15.247(d) Spurious Radiated Emission 15.203/15.247(b)/(c) Antenna Requirement FCC 2.1091 Maximum Permissible Exposure Result Pass Pass Pass Pass Pass SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 6 of 79
: Apr. 26, 2005 5. Test Result FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.1. Test of Maximum Peak Conducted Output Power 5.1.1. Applicable Standard Section 15.247(b)(3): The maximum peak output power shall not exceed 1 watt (30dBm). Except as shown below, if transmitting antennas of directional gain greater than 6 dBi are used the peak output power from the intentional radiator shall be reduced below the above stated values by the amount in dB that the directional gain of the antenna exceeds 6 dBi. 5.1.2. Measuring Instruments Item 19, 21 of the table are on section 6. 5.1.3. Test Procedures and Test Instruments Setting 1. The transmitter output was connected to the peak power meter through an attenuator. 2. The filter and attenuator have the same peak value instrument parameters. 1. Repeated the 1 for the middle and highest channel of the EUT. 5.1.4. Test Setup Layout 5.1.5. Test Criteria All test results complied with the requirements of 15.247(b)(3). Measurement Uncertainty is 1.5dB. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 7 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.1.6. Test Result of Conducted Power
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Modulation Type DSSS Channel No. 01 DSSS DSSS OFDM OFDM OFDM 06 11 01 06 11 Frequency
(MHz) 2412 MHz 2437 MHz 2462 MHz 2412 MHz 2437 MHz 2462 MHz Output Power
(dBm) 17.80 17.60 17.60 15.70 15.20 15.60 Limits
(dBm) 18 18 18 18 18 18 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 8 of 79
: Apr. 26, 2005 5.2. Test of Band Edges Emission 5.2.1. Applicable Standard FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Section 15.247(d): In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement. In addition, radiated emissions that fall in the restricted bands, as defined in Section 15.205, must also comply with the radiated emission limits specified in Section 15.209. 5.2.2. Measuring Instruments Item 6~17 of the table is on section 6 for radiated measurement. 5.2.3. Description of Major Test Instruments Setting
Spectrum Analyzer Attenuation Center Frequency Span Frequency RB VB Detector Trace Sweep Time
: R&S FSP40 (Radiated Measurement)
: Auto
: 2412 MHz / 2462 MHz
: 100MHz
: 1 MHz for PK value / 1 MHz for AV value
: 1 MHz for PK value / 10 Hz for AV value
: Peak
: Max Hold
: Auto 5.2.4. Test Procedures and Test Instruments Setting Radiated Measurement 1. Configure the EUT according to ANSI C63.4. 2. The turntable was rotated by 360 degrees to determine the position of the highest radiation. 3. The height of the broadband receiving antenna was varied between one meter and four meters above ground to find the maximum emission field strength of both horizontal and vertical polarization. 4. For band edge emission, the antenna tower was scan (from 1 M to 4 M) and then the turn table was rotated (from 0 degree to 360 degrees) to find the maximum reading. 5. For band edge emission in restriction bands, use 10Hz VBW and 1MHz RBW for reading under AV and use 1MHz VBW and 1 MHz RBW for reading under PK. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 9 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.2.5. Test Setup Radiated Method Conducted Method 5.2.6. Test Criteria All test results complied with the requirements of 15.247(d). Measurement Uncertainty is 1x10-5. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 10 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.2.7. Test Result of Radiated Emission
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1 Level*
(dBuV/m) 69.51 Margin
(dB)
-4.49 Modulation Type DSSS DSSS DSSS DSSS OFDM OFDM OFDM OFDM Test Channel Freq.
(MHz) 01 01 11 11 01 01 11 11 2388.090 2388.090 2483.660 2483.660 2388.660 2388.660 2483.660 2483.660 50.83 70.76 48.37 72.31 52.22 72.25 52.89 Level*: The max field strength in the restricted bands. Mode 2 Modulation Type DSSS DSSS DSSS DSSS OFDM OFDM OFDM OFDM Test Channel Freq.
(MHz) 01 01 11 11 01 01 11 11 2389.990 2389.990 2486.890 2486.890 2389.990 2389.990 2483.660 2483.660 Level*
(dBuV/m) 64.03 47.92 61.30 44.90 71.71 50.86 64.22 47.50 Level*: The max field strength in the restricted bands. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255
-3.17
-5.63
-3.24
-1.69
-1.78
-1.75
-1.11 Margin
(dB)
-9.97
-6.08
-12.70
-9.10
-2.29
-3.14
-9.78
-6.50 Limit
(dBuV/m) Trace
(PK/AV) 74 54 74 54 74 54 74 54 PK AV PK AV PK AV PK AV Limit
(dBuV/m) Trace
(PK/AV) 74 54 74 54 74 54 74 54 PK AV PK AV PK AV PK AV Page No. Issued Date
: 11 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Level*
(dBuV/m) 65.96 Margin
(dB)
-8.04 Mode 3 Modulation Type DSSS DSSS DSSS DSSS OFDM OFDM OFDM OFDM Test Channel Freq.
(MHz) 01 01 11 11 01 01 11 11 2353.700 2353.700 2499.810 2499.810 2348.380 2348.380 2487.460 2487.460 52.34 64.29 46.01 63.89 52.74 67.91 47.97 Level*: The max field strength in the restricted bands. Mode 4 Modulation Type DSSS DSSS DSSS DSSS OFDM OFDM OFDM OFDM Test Channel Freq.
(MHz) 01 01 11 11 01 01 11 11 2389.990 2389.990 2486.890 2486.890 2389.990 2389.990 2483.660 2483.660 Level*
(dBuV/m) 67.39 48.92 60.96 44.32 69.03 49.87 60.30 46.10 Level*: The max field strength in the restricted bands. Limit
(dBuV/m) Trace
(PK/AV) 74 54 74 54 74 54 74 54 PK AV PK AV PK AV PK AV Limit
(dBuV/m) Trace
(PK/AV) 74 54 74 54 74 54 74 54 PK AV PK AV PK AV PK AV
-1.66
-9.71
-7.99
-10.11
-1.26
-6.09
-6.03 Margin
(dB)
-6.61
-5.08
-13.04
-9.68
-4.97
-4.13
-13.70
-7.90 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 12 of 79
: Apr. 26, 2005 5.3. Test of Spurious Radiated Emission 5.3.1. Applicable Standard FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Section 15.247(d): In any 100 kHz bandwidth outside the frequency band in which the spread spectrum or digitally modulated intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20 dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement. In addition, radiated emissions that fall in the restricted bands, as defined in Section 15.205, must also comply with the radiated emission limits specified in Section 15.209. 5.3.2. Measuring Instruments Please reference item 1~17 in chapter 6 for the instruments used for testing. 5.3.3. Description of Major Test Instruments Setting
Spectrum Analyzer Attenuation Start Frequency Stop Frequency RB / VB RB / VB
Test Receiver Attenuation Start Frequency Stop Frequency RB
: R&S FSP40
: Auto
: 1000 MHz
: 10th carrier harmonic
: 1 MHz / 1MHz for Peak
: 1 MHz / 10Hz for Average
: R&S ESCS 30
: Auto
: 30 MHz
: 1000 MHz
: 120 KHz for QP or PK 5.3.4. Test Procedures 1. Configure the EUT according to ANSI C63.4. 2. The EUT was placed on the top of the turntable 0.8 meter above ground. 3. The phase center of the receiving antenna mounted on the top of a height-variable antenna tower was placed 3 meters far away from the turntable. 4. Power on the EUT and all the supporting units. 5. The turntable was rotated by 360 degrees to determine the position of the highest radiation. 6. The height of the broadband receiving antenna was varied between one meter and four meters above ground to find the maximum emission field strength of both horizontal and vertical polarization. 7. For each suspected emission, the antenna tower was scan (from 1 M to 4 M) and then the turntable was rotated (from 0 degree to 360 degrees) to find the maximum reading. 8. Set the test-receiver system to Peak or CISPR quasi-peak Detect Function with specified bandwidth under Maximum Hold Mode. 9. For emission above 1GHz, use 1MHz VBW and RBW for peak reading. Then 1MHz RBW and 10Hz VBW for average reading in spectrum analyzer. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 13 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 10. If the emission level of the EUT in peak mode was 3 dB lower than the average limit specified, then testing will be stopped and peak values of EUT will be reported, otherwise, the emissions which do not have 3 dB margin will be repeated one by one using the quasi-peak method for below 1GHz and average method for above the 1GHz. the reported. 11. For testing above 1GHz, the emission level of the EUT in peak mode was 20dB higher than average limit
(that means the emission level in peak mode also complies with the limit in average mode), then testing will be stopped and peak values of EUT will be reported, otherwise, the emissions will be measured in average mode again and reported. 5.3.5. Test Setup Layout 5.3.6. Test Criteria All test results complied with the requirements of 15.247(d). Measurement Uncertainty is 2.26dB. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 14 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.3.7. Test Results for CH 06 / 2437 MHz (for emission below 1GHz)
POE Mode
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 15 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 16 of 79
: Apr. 26, 2005
(B) Polarization: Vertical FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 17 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 18 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
Adapter Mode
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 19 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 20 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 21 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 22 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.3.8. Test Results for CH 01 / 2412 MHz (for emission above 1GHz)
Modulation Type: DSSS
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 23 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 24 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
Item 2 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 25 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 26 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 27 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 28 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 29 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 30 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 31 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 32 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
Item 2 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 33 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 34 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 35 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 36 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 37 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 38 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.3.9. Test Results for CH 06 / 2437 MHz (for emission above 1GHz)
Modulation Type: DSSS
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 39 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 40 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
Item 2 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 41 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 42 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 43 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 44 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal Note:
Item 1 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 45 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 46 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 47 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 48 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
Item 2 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 49 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 50 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 51 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 52 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 53 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 54 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.3.10. Test Results for CH 11 / 2462 MHz (for emission above 1GHz)
Modulation Type: DSSS
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 55 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 56 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 57 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 58 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 59 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 60 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal Note:
Item 1 is on un-restricted band, so the limit is 20dBc for such emission. SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 61 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 62 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 63 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 64 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 2
(A) Polarization: Horizontal Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 65 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 66 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 3
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 67 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 2 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 68 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4
(A) Polarization: Horizontal SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 69 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
(B) Polarization: Vertical Note:
1. Item 1 is on un-restricted band, so the limit is 20dBc for such emission. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m) Corrected Reading: Probe Factor + Cable Loss + Read Level - Preamp Factor = Level SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 70 of 79
: Apr. 26, 2005 5.4. Antenna Requirements 5.4.1. Standard Applicable FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Section 15.203:
An intentional radiator shall be designed to ensure that no antenna other than that furnished by the responsible party shall be used with the device. The use of a permanently attached antenna or of an antenna that uses a unique coupling to the intentional radiator shall be considered sufficient to comply with the provisions of this Section. The manufacturer may design the unit so that a broken antenna can be replaced by the user, but the use of a standard antenna jack or electrical connector is prohibited. Section 15.247(b)/(c):
If transmitting antennas of directional gain greater than 6 dBi are used, the peak output power from the intentional radiator shall be reduced by the amount in dB that the directional gain of the antenna exceeds 6 dBi. If the intentional radiator is used exclusively for fixed, point-to-point operations may employ transmitting antennas with directional gain greater than 6 dBi provided the maximum peak output power of the intentional radiator is reduced by 1 dB for every 3 dB that the directional gain of the antenna exceeds 6 dBi. 5.4.2. Antenna Connected Construction There is inverse SMA antenna connector for all antennas. 5.4.3. Antenna Gain Gain of Antenna 2 and 4 is less than 6dBi. That of Antenna 1 and 3 is more than 6dBi. Therefore peak conducted power limit shall be degraded. Antenna report of manufacturer will have more detail antenna gain or antenna pattern. 5.4.4. Test Criteria All test results complied with the requirements of 15.203/15.247(b)/(c). SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 71 of 79
: Apr. 26, 2005 5.5. RF Exposure 5.5.1. Limit For Maximum Permissible Exposure (MPE) FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 This product can be classified as mobile device, so the 20cm separation distance warning is required. In this section, the power density at 20cm location is calculated to examine if it is lower than the limit.
(A) Limits for Occupational / Controlled Exposure Frequency Range
(MHz) Electric Field Strength (E) (V/m) Magnetic Field Strength (H) (A/m) Power Density (S)
(mW/ cm) Averaging Time
|E|,|H| or S
(minutes) 0.3-3.0 3.0-30 30-300 300-1500 1500-100,000 614 1842 / f 61.4 1.63 4.89 / f 0.163
(100)*
(900 / f)*
1.0 F/300 5 6 6 6 6 6
(B) Limits for General Population / Uncontrolled Exposure Frequency Range
(MHz) Electric Field Strength (E) (V/m) Magnetic Field Strength (H) (A/m) Power Density (S)
(mW/cm) Averaging Time
|E|,|H| or S
( minutes ) 0.3-1.34 1.34-30 30-300 300-1500 1500-100,000 614 824/f 27.5 1.63 2.19/f 0.073
(100)*
(180/f)*
0.2 F/1500 1.0 30 30 30 30 30 F = frequency in MHz
*Plane-wave equivalent power density 5.5.2. MPE Calculation Method E (V/m) GP 30 d Power Density: Pd (mW/cm) 2E 377 E Electric field (V/m) P Peak RF output power (mW) G EUT Antenna numeric gain (numeric) d Separation distance between radiator and human body (m) The formula can be changed to Pd From the peak EUT RF output power, the minimum mobile separation distance, d=20cm, as well as the gain of the used antenna, the RF power density can be obtained. GP 2 d 30 377 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 72 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 5.5.3. Calculated Result and Limit
Modulation Type: DSSS
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 Mode 2 6.00 6.00 6.00 3.98 3.98 3.98 17.80 17.60 17.60 60.26 57.54 57.54 0.0477 0.0456 0.0456 1 1 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 Mode 3 3.00 3.00 3.00 2.00 2.00 2.00 17.80 17.60 17.60 60.26 57.54 57.54 0.0240 0.0229 0.0229 1 1 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 18.00 18.00 18.00 63.10 63.10 63.10 17.80 17.60 17.60 60.26 57.54 57.54 0.7568 0.7227 0.7227 1 1 1 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 73 of 79
: Apr. 26, 2005 Mode 4 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 4.00 4.00 4.00 2.51 2.51 2.51 17.80 17.60 17.60 60.26 57.54 57.54 0.0301 0.0287 0.0287 1 1 1 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 74 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712
Modulation Type: OFDM
Temperature: 24C
Relative Humidity: 53%
Duty Cycle of the Equipment During the Test: 99%
Test Engineer: Wayne Hsu Mode 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 Mode 2 6.00 6.00 6.00 3.98 3.98 3.98 15.70 15.20 15.60 37.15 33.11 36.31 0.0294 0.0262 0.0288 1 1 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 Mode 3 3.00 3.00 3.00 2.00 2.00 2.00 15.70 15.20 15.60 37.15 33.11 36.31 0.0148 0.0132 0.0145 1 1 1 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 18.00 18.00 18.00 63.10 63.10 63.10 15.70 15.20 15.60 37.15 33.11 36.31 0.4666 0.4159 0.4560 1 1 1 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 75 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 Mode 4 Channel No. Antenna Gain (dBi) Antenna Gain
(numeric) Peak Output Power
(dBm) Peak Output Power ( mW ) Power Density (S)
(mW/cm) Limit of Power Density (S)
(mW/cm) 01 06 11 4.00 4.00 4.00 2.51 2.51 2.51 15.70 15.20 15.60 37.15 33.11 36.31 0.0186 0.0165 0.0181 1 1 1 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 76 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 6. List of Measuring Equipments Used Report No.: FR531712 Items Instrument Manufacturer Model No. Serial No. Characteristics Calibration Date 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 EMC Receiver R&S ESCS 30 100174 9kHz 2.75GHz Feb. 19, 2005 LISN LISN
(Support Unit) EMCO 3810/2NM 9703-1839 9kHz 30MHz Mar. 15, 2005 MessTec NNB-2/16Z 99041 9kHz 30MHz Apr. 09, 2004 EMI Filter LINDGREN LRE-2030 2651
< 450 Hz N/A RF Cable-CON UTIFLEX 3102-26886-4 CB044 9kHz 30MHz Apr. 21, 2004 3m Semi Anechoic Chamber Spectrum Analyzer Amplifier SIDT FRANKONIA SAC-3M 03CH03-HY 30MHz~1GHz 3m Jun. 21, 2004 R&S FSP40 100004 9KHZ~4GHz Aug. 31, 2004 Schaffner CPA9231A 18667 9KHz 2GHz Jan. 04, 2005 Biconical Antenna SCHWARZBECK VHBB 9124 Log Antenna SCHWARZBECK VUSLP 9111 301 221 30MHz 200MHz Jul. 23, 2004 200MHz -1GHz Jul. 23, 2004 RF Cable-R03m Jye Bao Amplifier MITEQ RG142 AFS44 CB021 30MHz~1GHz Dec. 02, 2004 879984 1GHz~26.5GHz Mar. 25, 2005 Horn Antenna COMPOWER AH-118 10092 1GHz 18GHz Feb. 18, 2005 Turn Table Antenna Mast HD HD DS 420 420/650/00 0 360 degree MA 240 240/560/00 1 m - 4 m N/A N/A Horn Antenna Schwarzbeck BBHA9170 154 15GHz~40GHz Jun. 09, 2004 17 RF Cable-HIGH SUCOFLES 106 Calibration Interval of instruments listed above is one year. SUHNER SN30094/6 1GHz~26.5GHz Mar. 05, 2005 Remark Conduction
(CO04-HY) Conduction
(CO04-HY) Conduction
(CO04-HY) Conduction
(CO04-HY) Conduction
(CO04-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) Radiation
(03CH03-HY) SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 77 of 79
: Apr. 26, 2005 7. Company Profile FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 SPORTON Lab. was established in 1986 with one shielded room: the first private EMI test facility, offering local manufacturers an alternative EMI test familial apart from ERSO. In 1988, one 3M and 10M/3M open area test site were setup and also obtained official accreditation from FCC, VCCI and NEMKO. In 1993, a Safety laboratory was founded and obtained accreditation from UL of USA, CSA of Canada and TUV
(Rhineland & PS) of Germany. In 1995, one EMC lab, including EMI and EMS test facilities was setup. In 1997, SPORTON Group has provided financial expense to relocate the headquarter to Orient Scientific Park in Taipei Hsien to offer more comprehensive, more qualified and better service to local suppliers and manufactures. In 1999, Safety Group and Component Group were setup. In 2001, SPORTON has established 3M/10M chamber in Hwa Ya Technology Park. 7.1. Certificate of Accreditation Taiwan USA EU Japan Canada BSMI, CNLA, DGT FCC, NVLAP, UL Nemko, TUV VCCI Industry Canada 7.2. Test Location TEL 02-2601-1640 FAX 02-2601-1695 ADD 6Fl., No. 106, Sec. 1, Shintai 5th Rd., Shijr City, Taipei, Taiwan 221, R.O.C. TEL 02-2696-2468 FAX 02-2696-2255 No. 52, Hwa Ya 1st Rd., Hwa Ya Technology Park, Kwei-Shan Hsiang, Tao Yuan Hsien, ADD Taiwan, R.O.C. TEL 03-327-3456 FAX 03-318-0055 SHIJR HWA YA LINKOU ADD No. 30-2, Dingfu Tsuen, Linkou Shiang, Taipei, Taiwan 244, R.O.C DUNGHU ADD No. 3, Lane 238, Kangle St., Neihu Chiu, Taipei, Taiwan 114, R.O.C. JUNGHE ADD 7Fl., No. 758, Jungjeng Rd., Junghe City, Taipei, Taiwan 235, R.O.C. NEIHU TEL 02-8227-2020 FAX 02-8227-2626 ADD 4Fl., No. 339, Hsin Hu 2nd Rd., Taipei 114, Taiwan, R.O.C. TEL 02-2794-8886 FAX 02-2794-9777 TEL 02-2631-4739 FAX 02-2631-9740 SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 78 of 79
: Apr. 26, 2005 FCC ID: P27AP51GA Issued on Apr. 26, 2005 Report No.: FR531712 8. CNLA Certificate of Accreditation Test Lab.
: Sporton International Inc. Accreditation Number Originally Accredited Effective Period Accredited Scope
:
:
:
:
1190 2003/12/15 2003/12/15~2006/12/14 47 CFR FCC Part 15 Subpart C (9kHz~40GHz) SPORTON International Inc. TEL : 886-2-2696-2468 FAX : 886-2-2696-2255 Page No. Issued Date
: 79 of 79
: Apr. 26, 2005
1 2 | Test Setup | Test Setup Photos | 352.31 KiB |
Mode 1 (3CWE591) FRONT VIEW REAR VIEW Mode 2 (3CWE592) FRONT VIEW REAR VIEW Mode 3 (3CWE596) FRONT VIEW REAR VIEW Mode 4 (3CWE597) FRONT VIEW REAR VIEW
1 2 | ConfiReq | Cover Letter(s) | 207.48 KiB | March 19 2004 |
8F, No.3-1, YuanQu St., NanKang, Taipei 115,Taiwan, R.O.C. Tel: 886-2-2655-3988 SerComm Corporation Fax: $86-2-6615-8898 Federal Communications Commission FCC ID:P27AP51GA Dear Sir:
This is to request confidentiality on information submitted for above application. We would like to request confidentiality on some exhibits we submitted for above original application for the reason of trade secret. If those exhibits are available for public inspection, any person who once gets the information contained in those exhibits will be able to design and to make the same products very easily. This is a very serious problem and huge loss for us, because we did invest so much on it. Please be not made the Exhibit Types listed below routinely available for public inspection:
PCB Layout + Schematics and Part List.
(Signature) (Printed) By: bo = By: Kevin Tseng Title: Manager Applicant: SERCOMM CORPORATION Address: 8F, No.3-1, YuanQu St., NanKang,, Taipei 115,Taiwan, R.O.C. Tel: _+886-2-26553988 Fax: _ +886-2-66158898 Date: FEB.18.2004
1 2 | ConfiReq rev | Cover Letter(s) | 206.28 KiB |
tU01
~r.;~[DII1\
SerCommCorporation Federal Communications Commission FCC ID:
Dear Sir:
~w, ~n3-I- "'.,anQu SL.NanKaog. Taipci 115:rai\f:ln, 1t.O.('. Tet: 886-2-26SS-3988
(lax: 886-2."15.8898 This is to request confidentiality on information submitted fur above application.We would like to request confidentiality on some exhibits we submitted for above original applicationfor the reason of trade secret. If those exhibits are available for public inspection, any person who once gets the infonnation contained in those exhibits will be able to design and to make the same products very easily. This is a very serious problem and huge loss for us, because we did invest so much on it. Please be not made the Exhibit Types listed below routinely available for public inspection:
PCB Layout, Schematics, Part lists, Operational description, and Block diagram By. k - ryBy. 4
. Title:
(Signature) KevinTseng
::7;-------
--
(Printed) Applicant;
serComm'coIporation Address:
8F,No.3~l)YuanQuSt.,Nankang.TaipeilIS, Taiwan,RO.C.
: +886-2v2655-3988 Fax: +886-2-2655-3765 Tel Date d S;"SS9099 01 N~MI~1 513 WO~~
0~:~t
~00~-Nnr-~t
1 2 | Photos | Test Setup Photos | 374.75 KiB |
ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 8 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 9 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 10 of 11 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH ETS Dr. Genz GmbH, Germany Registration number: W6M20402-5017 Page 11 of 11
1 2 | TestRpt1 802 11b | Test Report | 290.53 KiB | January 04 2004 |
ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH TEST - REPORT FCC Part 15 C for IEEE 802.11 b device FCC ID: P27AP51GA Test report no.:
W6M20402-5017-C-1 FCC ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH STORKOWER STRASSE 38C, D-15526 REICHENWALDE B. BERLIN PHONE +49-33631-888 00 FAX +49-33631-888 66 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH TABLE OF CONTENTS 1 1.1 1.2 1.3 1.4 1.5 1.6 2 2.1 2.2 2.3 2.4 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 General information Notes Testing laboratory Details of approval holder Application details Test item Test standards Technical test Summary of test results Test environment Test equipment utilized Test Procedure Test Results Peak Output Power De Facto Equivalent Isotropic Radiated Power RF Exposure Compliance Requirements Transmitter Radiated Emissions in Restricted Bands Spurious Emissions Minimum 6 dB Bandwidth Peak Power Spectral Density Spurious emissions related to AC power line ETS Dr. Genz GmbH, Germany Page 1 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1 1.1 General Information Notes The purpose of conformity testing is to increase the probability of adherence to the essential requirements or conformity specifications, as appropriate. The complexity of the technical specifications, however, means that full and thorough testing is impractical for both technical and economic reasons. Furthermore, there is no guarantee that a test sample which has Passed all the relevant tests conforms to a specification. Neither is there any guarantee that such a test sample will interwork with other genuinely open systems. The existence of the tests nevertheless provides the confidence that the test sample possesses the qualities as maintained and that is performance generally conforms to representative cases of communications equipment. The test results of this test report relate exclusively to the item tested as specified in 1.5. The test report may only be reproduced or published in full. Reproduction or publication of extracts from the report requires the prior written approval of the ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH. Specific Conditions:
Usage of the hereunder tested device in combination with other integrated or external antennas requires at least additional output power measurements, spurious emission measurements, conducted emission measurements (AC supply lines) and radio frequency exposure evaluations for each individual configuration performed, for certification by FCC. The test sample is able to work according IEEE 802.11 b,g. This report is related to FCC Part 15 C (DSSS device, IEEE 802.11b) only and do not cover requirements for other parts like FCC Part 15 C (e.g. for IEEE 802.11g). Tester:
10.03.2004 Date N. Kaspar ETS-Lab. Signature Name Technical responsibility for area of testing:
10.03.2004 Date Dr. Genz Signature Name ETS ETS Dr. Genz GmbH, Germany Page 2 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.2 1.2.1 Testing laboratory Location ELECTRONIC TECHNOLOGY SYSTEM DR. GENZ GMBH (ETS) Storkower Strae 38c D-15526 Reichenwalde b. Berlin Germany Telefon : +49 33631 888 00 Telefax : +49 33631 888 660 1.2.2 Details of accreditation status ACCREDITED TESTING LABORATORY DAR-REGISTRATION NUMBER: TTI-P-G 126/96 ACCREDITED COMPETENT BODY DAR-REGISTRATION NUMBER: BPT-ZE-026/96 FCC FILED TEST LABORATORY REG. NO. 96970 BLUETOOTH QUALIFICATION TEST FACILITY (BQTF) ACCREDITED BY BLUETOOTH QUALIFICATION REVIEW BOARD INDUSTRY CANADA FILED TEST LABORATORY REG. NO. IC 3470 A2LA ACCREDITED Certificate Number 1983-01 1.3 Details of approval holder Name Street Town Country Telephone Fax Contact
: SerComm Corporation
: 8F., No,3-1, YuanQu St., NanKang
: Taipei 115
: Taiwan, R.O.C
: +886 2 2655 3988
: +886 2 2655 3966
: Mr. Kevin Tseng ETS Dr. Genz GmbH, Germany Page 3 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.4 Application details Date of receipt of application Date of receipt of test item Date of test
: 04.02.2004
: 04.02.2004
: 04.02.2004 01.03.2004 1.5 Test item Description of test item Type identification Hardware Software Serial number Photos Technical data
: AP
: AP51GA
: 1.0
: 1.0
: without
: See Appendix A Frequency band Frequency ( ch A) Frequency (ch B) Frequency (ch C) Number of Channels Operating Modes Type of modulation
: 2.4GHz 2.4835GHz
: 2.412 GHz
: 2.437 GHz
: 2.462 GHz
: 11
: duplex, TDD
: DSSS Yes /
No Fixed point-to-point operation:
Antenna Type Antenna Connector Antenna gain Power supply Emission designator
: Dipole Antenna
: SMA Plug Reverse
: 1,8 dBi
: 12 V DC / 120 V AC/DC Adapter
: 11M5W7D ETS Dr. Genz GmbH, Germany Page 4 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Host device
: none Classification
:
Fixed Device Mobile Device (Human Body distance > 20cm Portable Device (Human Body distance < 20cm Transmitter Power (ch A) Power (ch B) Power (ch C) Unom
: Conducted: 17,87 dBm
: Conducted: 17,62 dBm
: Conducted: 17,62 dBm Manufacturer:
(if applicable) Name Street Town Country Additional information:
:
:
:
:
The sample is using WLAN technology according IEEE 802.11 b/ g. For this report the function according IEEE 802.11b is considered only. The scheme for frequency generation, spectrum spreading, receiver parameters, synchronization procedure, and other parameters are determined by the mentioned standard above. ETS Dr. Genz GmbH, Germany Page 5 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.6 Test standards Technical standard :
FCC RULES PART 15 / SUBPART C 15.247 2 2.1 Technical test Summary of test results No deviations from the technical specification(s) were ascertained in the course of the tests performed. or The deviations as specified in 2.5 were ascertained in the course of the tests performed. 2.2 Test environment Temperature
: 23oC Relative humidity content
: 20 ... 75 %
Air pressure
: 86 ... 103 kPa Details of power supply
: 120 V AC/DC Adapter Extrem conditions parameters:
: test voltage - extreme min.:
max:
-- V
-- V ETS Dr. Genz GmbH, Germany Page 6 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 2.3 Test equipment utilized No. ETS 0001 ETS 0002 ETS 0003 ETS 0004 ETS 0005 ETS 0006 ETS 0007 ETS 0008 ETS 0009 ETS 0010 ETS 0011 ETS 0012 ETS 0013 ETS 0014 ETS 0015 ETS 0016 ETS 0017 ETS 0018 ETS 0019 ETS 0020 ETS 0021 ETS 0022 ETS 0023 ETS 0024 ETS 0025 ETS 0026 ETS 0027 ETS 0028 ETS 0029 ETS 0030 ETS 0031 ETS 0032 ETS 0033 ETS 0034 ETS 0035 ETS 0036 ETS 0037 ETS 0038 ETS 0039 ETS 0040 ETS 0041 ETS 0042 ETS 0043 ETS 0044 ETS 0045 ETS 0046 Measurement device:
Test receiver Test receiver Test receiver Spectrum- and Network-Analyzer Test receiver Test receiver system Spectrum analyzer Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna mast Antenna mast Tripod Tripod Tripod Tripod Turn table Turn table Controller RF generator RF generator/ Amplifier RF generator/ Amplifier RF amplifier RF amplifier RF amplifier Absorbing clamp Artificial mains Artificial mains Artificial mains Artificial mains Artificial mains Stripe line Power supply Type:
ESHS 10 ESVP ESVS 10 FSMS 26 SMV 11 SME 12 PSA-65A Loop antenna Loop antenna Loop antenna van Veen/ Frame HK 116 HL 223 HL 025 HL 025 VHAP VHAP UHAP UHAP DP 21 DP 3 SAS-200/ 521 DP 1 AF 2 AF 2 STA 2 TT 1 DS 412 HD 050 SMG SMLR SMLM 10W 1000AM2 50W 1000 150L MDS 21 ESH3-Z5 ESH3-Z4 ESH3-Z6 NNB 11 NNB 111 IEC 801-3 LTS 006 Manufacturer:
Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz MEB MEB Avcom Siemens MEB MEB ETS Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Schwarzbeck Schwarzbeck Schwarzbeck Schwarzbeck MEB MEB A.H. Systeme / USA MEB MEB MEB Heinrich Deisel Heinrich Deisel C. Lorenz AG Berlebach ETS Heinrich Deisel Heinrich Deisel Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Amplifier Research Amplifier Research Amplifier Research Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz MEB MEB ETS RFT ETS Dr. Genz GmbH, Germany Page 7 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Blank plug-in Measurement device:
Power supply Power supply Power supply Power supply Oscilloscope Audio analyzer ECAT Control center EFT simulator No. ETS 0047 ETS 0048 ETS 0049 ETS 0050 ETS 0051 ETS 0052 ETS 0053 ETS 0054 ETS 0055 Module network coupler ETS 0056 ETS 0057 Module SURGE with DC coupler ETS 0058 ETS 0059 ETS 0060 ETS 0061 ETS 0062 ETS 0063 ETS 0064 ETS 0065 ETS 0066 ETS 0067 ETS 0068 ETS 0069 ETS 0070 ETS 0071 ETS 0072 ETS 0073 ETS 0074 ETS 0075 ETS 0076 ETS 0077 ETS 0078 ETS 0079 ETS 0080 ETS 0081 ETS 0082 ETS 0083 ETS 0084 ETS 0085 ETS 0086 ETS 0087 ETS 0088 ETS 0089 ETS 0090 ETS 0091 ETS 0092 ETS 0093 ETS 0094 ETS 0095 Capacitive coupling clamp Kikusui amplifier Xitron power analyzer Power/ Arb (Harm., Ramp) Reference impedance Blank plug-in Filter system IEC 1000-4-6 ESD-generator minizap EM Injection Clamp Calibration Fixture Filter system IEC 1000-4-6 EM Radiation Monitor PC Transfer set EMR-20 Video camera system Interphone system Audio noise meter RF milivoltmeter NF generator Feeding bridge A Audio/ Video Filter LCR meter Functional generator EMI Software EMI Software PC Novell network system Apple computer system Process controller Shielded room Anechoic chamber Climatic cell Color TV pattern generator Radio communication tester DECT type approval CTR06 RF signal generator DM-Coder Pulse Modulator Rear-panel connectors DECT system controller Type:
TG 20/ 1 TG 20/ 1 T 102 T 101b TDS 640A UPA 4 PCR 2000L IEC 801-2031 CF CDN EMR-20 EMR-20 KMB012 JS-1400 GSM 2 QRV 2 GF 22 SBA 1000 AV 55020 SR 720 MX-2020 ES-K1 ES-K10 Novell Performa 630 PSA 15 SR 1 AC 1 HC 4033 PM 5518-TX VPS CMS 54 TS 8930 SME 03 SME-B11 SM-B8 SME-B19 PSMD Manufacturer:
Statron Statron TPW TPW Tektronic Rohde&Schwarz Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV FCC/ EMV FCC/ EMV FCC/ EMV Wandel&Goltermann Wandel&Goltermann Kocom Jiuh Sheng MKD/ RFT MKD/ RFT Prcitronic ESP ETS SRS Maxcom Rohde&Schwarz Rohde&Schwarz Esotronic Macintosh Rohde&Schwarz Frankonia Frankonia Heraeus Philips Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz ETS Dr. Genz GmbH, Germany Page 8 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Manufacturer:
Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz ETS Rohde&Schwarz Rohde&Schwarz Avcom Avcom INCO Serute Dagatron Rohde&Schwarz Rohde&Schwarz Type:
Measurement device:
PSMD-B11 DECT Signaling unit TS 89RA Rack, 19", 36 HU CS 893BE System engineering and software TS 8930B Extension unit for basic version SME-06 RF signal generator SME-B11 DM-Coder SM-B8 Pulse modulator SM-B4 Pulse generator SME-B19 Rear-panel connectors SMP 22 High power synthesizer/ sweeper SMP-B11 Frequency extension SMP-B15 RF attenuator for SMP 22 TS 1220 DECT protocol tester TBR 22 PSM 2 Process controller Real time signaling unit PSMD-B2 PCM Realtime audio interface for PSMD-B3 PSMD-B4 Synthesizer Module PSA-Z2 Keyboard RF step attenuator RSG Glide path RF Millivoltmeter Insertion unit No. ETS 0096 ETS 0097 ETS 0098 ETS 0099 ETS 0100 ETS 0101 ETS 0102 ETS 0103 ETS 0104 ETS 0105 ETS 0106 ETS 0107 ETS 0108 ETS 0109 ETS 0110 ETS 0111 ETS 0112 ETS 0113 ETS 0114 ETS 0115 ETS 0116 ETS 0117 ETS 0118 Mixer ETS 0119 Mixer RF step attenuator ETS 0120 Oscilloscope ETS 0121 Oscilloscope ETS 0122 RF step attenuator ETS 0123 Tripod ETS 0124 Small components ETS 0125 Uninterruptible power supply ETS 0126 Uninterruptible power supply ETS 0127 Uninterruptible power supply ETS 0128 Uninterruptible power supply ETS 0129 Uninterruptible power supply ETS 0130 Telephone connection box ETS 0131 Frequency doubler ETS 0132 ETS 0133 Probe body ETS 0134 Mains filter ETS 0135 Measuring switching point ETS 0136 Attenuator ETS 0137 Multimeter ETS 0138 Multimeter ETS 0139 Multimeter ETS 0140 ETS 0141 ETS 0142 ETS 0143 ETS 0144 High voltage generator Sliding bridge Impedance converter Impedance converter URV 55 URV-Z2 MFC 1000 MFC 2000 TRI-50-20 EO 147A 5201 RBU STA 2 UPS - 1500 UPS - 1000 LC UPS - 1000 UPS - 500 Power saver TR-0616 P6015 MSF AK 11 33-6-34 YX-360TRA DT-9410 ST-9202 IP 6Wa J 573 TK 11 TK 12 Sendon Sendon Sendon Sendon Sendon Systel EMG Tektronix Erika Fiedler RFT Weinschel Mastech Diditec Standard TPW RFT RFT RFT ETS Dr. Genz GmbH, Germany Page 9 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Type:
TK 103 ESH2-Z2 21PT4301/00 ZAPD-21 HR07-720 NSG 500C NSG 506C (I) NSG 506C (II) SMG SMG NKS VTG 700 VTG 700 TOE 8815 PI 6001 D 403-A BK 4602 BK 4185 BK 4227 BK 4231 CAS TE I CTR 10 MFE III MFE IV TEH HNG III.1 Canton S Pluss Measurement device:
Probe Active probe Test TV Power divider Switcher Interference pulse generator Simulator for Load-Dump-Impulse Simulator for Load-Dump-Impulse Signal generator Signal generator Adjacent channel power meter TV and Sat-Signal generator TV and Sat Signal generator Programmable power supply Protective wire and isolation tester Filter system / consumer electronic Acoustic chamber Test head Simulator ear Simulator mouth Acoustic calibrator Communication Analysis System Acoustical test for DECT No. ETS 0145 ETS 0146 ETS 0147 ETS 0148 ETS 0149 ETS 0150 ETS 0151 ETS 0152 ETS 0153 ETS 0154 ETS 0155 ETS 0156 ETS 0157 ETS 0158 ETS 0159 ETS 0160 ETS 0161 ETS 0162 ETS 0163 ETS 0164 ETS 0165 ETS 0166 ETS 0167 ETS 0168 ETS 0169 Measurement - Frontend (analog) ETS 0170 Measurement - Frontend (digital) ETS 0171 ETS 0172 ETS 0173 ETS 0174 Measurement - Frontend line interface MFE V ETS 0175 ETS 0176 ETS 0177 ETS 0178 ETS 0179 ETS 0180 ETS 0181 ETS 0182 ETS 0183 ETS 0184 ETS 0185 ETS 0186 ETS 0187 ETS 0188 ETS 0189 ETS 0190 ETS 0191 ETS 0192 ETS 0193 Software Line interface (analog) Acoustic volt meter Feeding bridge B Open area test side Open area test side Artificial mains Test pin for protective wire Power supply Frequency counter Function generator Digital multimeter Power supply Power supply High voltage generator Spectrum Analyzer Function generator Sweep function generator Audio generator Vibration table Electronic test cradle Noise generator Speaker COPTZV5 COP 4 SBA 1000 30m 30m NNB01/RFZ PE 156-i MX-9300 MX-9300 MX-9300 MX-9300 DF 1730 FSEB MX 2020 7202 7101 N1-201-M Manufacturer:
MEB Rohde&Schwarz Philips MCL Wisi Schaffner Schaffner Schaffner Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Grundig Grundig Toellner SPS electronic Fiedler IAC Brel & Kjr Brel & Kjr Brel & Kjr Brel & Kjr HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics ESP ETS ETS ETS SPS electronic Maxcom Maxcom Maxcom Maxcom WJG TPW/RFT Rohde&Schwarz Maxcom Dagatron Dagatron Sandox ETS Dr. Genz GmbH, Germany Page 10 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
Hazardous live probe Hazardous live probe Ball pressure test apparatus Glow Wire tester Force indicator 50N Digital multimeter Thermo hygro recorder Digital thermometer Digital thermometer Digital thermometer Digital thermometer Digital thermometer / hygro meter Digital thermometer / hygro meter Digital thermometer Digital thermometer Digital thermometer High voltage test generator High voltage test accessories Socket-Outlet torque balance Unjointed Finger probe Flexible Finger probe Spring operated impact hammer No. ETS 0194 ETS 0195 ETS 0196 ETS 0197 ETS 0198 ETS 0199 ETS 0200 ETS 0201 ETS 0202 ETS 0203 ETS 0204 ETS 0205 ETS 0206 ETS 0207 ETS 0208 ETS 0209 ETS 0210 ETS 0211 Metallic ball ETS 0212 ETS 0213 ETS 0214 ETS 0215 ETS 0216 ETS 0217 Millivolt meter ETS 0218 ETS 0219 ETS 0220 ETS 0221 ETS 0222 ETS 0223 ETS 0224 ETS 0225 ETS 0226 ETS 0227 ETS 0228 ETS 0229 ETS 0230 ETS 0231 ETS 0232 ETS 0233 ETS 0234 ETS 0235 ETS 0236 ETS 0237 ETS 0238 ETS 0239 ETS 0240 ETS 0241 ETS 0242 RF probe Power sensor Insertion unit ISDN-S0-Analyzer ISDN Protocol Analyser GSM/ PCN/ PCS-Simul. GSM System Simulator SIM Simulator SIM Editor Vibration table Climatic chamber Radio Commun. Tester Radio Commun. Tester Testreceiver Radiation test source Direction coupler Power meter RF-network-analyser RF-amplifier RF-amplifier Field strong meter Isotr. field probe 40 GHz Isotr. field probe 1 GHz Pulse Generator Harmonics analyser Type:
PMM 208 AK-688 ad 170th ad 31th ad 90h 37950-10 ad 15th Type K ad 20th HA 3300 D HVGZ 312 F 37.13 P 10.05 P 10.01 P 22.50 F 53.32 P 10.06 P 10.11 T 10.02 T 03.14 P 10.31 URV 55 URV5-Z7 NRV-Z2 URV5-Z4 K1403 TE965 TS8915B FTA TIRA vib VT 4010 CMT 54 CMD 65 ESVS 30 VSQ 1 RK 100 NRVD 8752 C 100A100 100W1000M1 FM 2000 FP 2080 Kit FP 2000 Kit 4050 F 41B Manufacturer:
Dagatron Amarell KD Prima ama-digit ama-digit ama-digit Cole Parmer ama-digit Amarell ama-digit SPS electronic SPS electronic PTL PTL PTL PTL PTL PTL PTL PTL PTL PTL Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Siemens Tekelec Teleco. Rohde & Schwarz Rohde & Schwarz Orga Orga GenRad Vtsch Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz MEB MEB Rohde & Schwarz Hewlett Packard Amplifier Research Amplifier Research Amplifier Research Amplifier Research Amplifier Research PicoSecond PL Fluke ETS Dr. Genz GmbH, Germany Page 11 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
No. AC-clamp 1000 A ETS 0243 Burst generator ETS 0244 Load dump generator ETS 0245 Voltage drop simulator ETS 0246 ETS 0247 Microsecond generator ETS 0248 ETS 0249 ETS 0250 ETS 0252 ETS 0253 ETS 0254 ETS 0255 ETS 0256 ETS 0257 ETS 0258 ETS 0259 ETS 0260 ETS 0261 ETS 0262 ETS 0263 ETS 0264 ETS 0265 ETS 0267 ETS 0268 ETS 0270 ETS 0271 ETS 0272 ETS 0273 ETS 0274 ETS 0275 ETS 0276 ETS 0277 ETS 0278 ETS 0279 ETS 0280 ETS 0281 ETS 0282 ETS 0283 ETS 0284 ETS 0285 ETS 0286 ETS 0287 ETS 0288 ETS 0289 ETS 0290 ETS 0291 ETS 0292 ETS 0293 ETS 0294 Switch unit Coupling network Coupling clamp System controller Spectrum analyser RF generator RF generator RF generator Step attenuator Rubidium standard Power meter Power sensor Power sensor Switching unit Signaling unit Spectrum analyser Loop antenna RF signal generator RF signal generator RF signal generator Test receiver RF signal generator RF signal generator RF signal generator Power sensor Audio analyser Power sensor Power sensor Step attenuator Power meter Spectrum analyser RF bridge RF bridge Field probe Field probe Limiter Test receiver Artifical mains Audio generator Audio generator Loop antenna RF generator Artifical mains Biconical antenna Type:
80i 1000s EFT 200 LD 200 VDS 200 MPG 200 AN 200 CNA 200 ACC PSM 12 FSIQ SMIQ 03 SMIQ 03 SMP 03 RSP RSTU NRVD NRVD-Z1 NRVD-Z1 SSCU F 1048 HFRA 9150 SMT 03 SMP 02 SMP 04 ESI 40 SME 03 SME 03 SMY 01 NRV-Z51 UPL NRV-Z1 NRV-Z31 RSP NRVD FSM 86207 A 86205 A 11940 A 11941 A 11867 A ESHS 10 ESH2-Z5 TAG 101 TAG 101 HFH2-Z2 SMHU NNBM 8125 HK 116 Manufacturer:
Fluke EM-Test EM-Test EM-Test EM-Test EM-Test EM-Test EM-Test Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz DATUM GmbH Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Wird HAMEG Schwarzbeck Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Hewlett Packard Hewlett Packard Hewlett Packard Hewlett Packard Hewlett Packard Rohde & Schwarz Rohde & Schwarz Troneer Troneer Rohde & Schwarz Rohde & Schwarz Schwarzbeck Rohde & Schwarz ETS Dr. Genz GmbH, Germany Page 12 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH No. ETS 0295 ETS 0296 ETS 0297 ETS 0298 ETS 0299 ETS 0300 ETS 0301 ETS 0302 ETS 0303 ETS 0304 ETS 0305 ETS 0306 ETS 0307 ETS 0308 ETS 0309 ETS 0310 ETS 0311 ETS 0312 ETS 0313 ETS 0314 ETS 0315 ETS 0316 ETS 0317 ETS 0318 ETS 0319 ETS 0320 ETS 0321 ETS 0322 ETS 0323 ETS 0324 ETS 0325 ETS 0326 ETS 0327 ETS 0328 ETS 0330 ETS 0333 ETS 0334 ETS 0335 ETS 0336 ETS 0337 ETS 0338 ETS 0339 ETS 0340 ETS 0431 ETS 0432 ETS 0433 ETS 0434 ETS 0435 ETS 0436 Measurement device:
LPD antenna Oscilloscope Power pulse generator ICO tester DECT protocol tester RF amplifier Relay switch unit Data line CDN Telecom line CDN Test receiver Test receiver Function generator Commu. Sign. Analyzer Spectrum analyzer Anechoic chamber Anechoic chamber Anechoic chamber Climatic chamber Power sensor LPD antenna Biconical antenna Switcher Switcher Dial pulse/ DTMF tester Opto link Opto link RF Millivoltmeter Insertion unit DECT portable part DECT fix part DECT portable part DECT fix part Blue Unit BT Protocol tester Spectrum analyser turn table Controller BT Development kit LPD Antenna Professional Power Amplifier Coupling network Isolating Transformer Bluetooth test set AC Mains Adaptor RF Verstrkermatrix RF Verstrkermatrix Reserviert Tre HP-Filter HP-Filter Type:
HL 223 TDS 520 A IGUF 2910 TS 1232 TS 1220 75 A 250 RSU CM-I/O CD CM-TEL CD ESHS 10 ESVS 10 HP 33120A CSA 803 A R 3361A AC 2 AC 3 AC 4 VC 0033 NRV-Z51 HL 223 HK 116 Hr 07-720 Hr 07-720 210 GPIB 140 GPIB 140 URV 55 URV5-Z4 Gigaset 1000 Gigaset 1000 V 2.0 PTW 60 FSM DE 350 HD 100 CASIRA HL 223 SE-1200 KN002 KN003 TS8960 BS5733 RSU-ETS-BT RSU-ETS-CTR6 RSU-ETS-GSM H1G04G01 H1G04G01 Manufacturer:
Rohde & Schwarz Tektronix Schwarzbeck Rohde & Schwarz Rohde & Schwarz Amplifier Research Rohde & Schwarz Keytek Keytek Rohde & Schwarz Rohde & Schwarz Hewlett Packard Tektronix Advantest Frankonia Frankonia Frankonia Vtsch Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz WISI WISI HE NI NI Rohde & Schwarz Rohde & Schwarz SIEMENS SIEMENS Philipps Philipps Nokia Rohde & Schwarz Rohde & Schwarz Heinrich Deisel Heinrich Deisel CSR Rohde & Schwarz Wharfedale Pro ETS ETS Rohde & Schwarz Travel Emporium ETS ETS Microwave Microwave ETS Dr. Genz GmbH, Germany Page 13 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
HP-Filter HP-Filter Reserviert Tre Reserviert Tre Bluetooth Protcol Tester Nokia Tester for Bluetooth 1.1 IBM BT PC Card Sony BT DUN Modem RF-Attenuattor 6dB RF-Attenuattor 30dB KFZ-Bordnetznachbildung RF Power Amplifier Stubli Robot Stubli Robot Controller DASY 4 Measurement Server Control Pendant Compaq Computer Dabu Acquisition Electronis Dummy Probe Dosimetric E-Field Probe Dosimetric E-Field Probe Dosimetric H-Field Probe System Validation Kit System Validation Kit System Validation Kit System Validation Kit Probe Alignment Unit SAM Twin phantom No. ETS 0437 ETS 0438 ETS 0439 ETS 0440 ETS 0441 ETS 0442 ETS 0443 ETS 0444 ETS 0445 ETS 0446 ETS 0447 ETS 0448 ETS 0449 ETS 0450 ETS 0451 ETS 0452 ETS 0453 ETS 0454 ETS 0455 ETS 0456 ETS 0457 ETS 0458 ETS 0459 ETS 0460 ETS 0461 ETS 0462 ETS 0463 ETS 0464 ETS 0465 Mounting Device ETS 0466 ETS 0467 ETS 0468 ETS 0469 ETS 0470 ETS 0469 ETS 0470 ETS 0471 ETS 0472 ETS 0473 ETS 0474 ETS 0475 ETS 0476 ETS 0477 ETS 0478 ETS 0479 ETS 0480 ETS 0481 ETS 0482 ETS 0483 Dielectric Probe Kit Amplifier Dielectric Probe Kit Amplifier Validation Dipole 40GHz Standard Gain Horn mit 40GHz High Gain Antenna Verstrker Antenna GSM / UMTS System Simulator Antenna Verstrker Test receiver GPS-System(aktive GPS-antenne) Crystal filter Directional Coupler Universal Radio Communication T Type:
H0G408G1 H0G408G1 Manufacturer:
Microwave Microwave PTW 60 DTL - 1 BTPCN101 BTA- NW 1 50FH-006-300 50FH-030-300 LN-KFZ/200 AR 60S1G3 RX90B L CS/MBs&p Pentium IV 2 GHz DAE3V1 ET3DV6 ET3DV6 H3DV6 D900V2 D1800V2 D1900V2 D2450V2 LBV2 V4.0 V 3.1 HP 87300B CMU 200 85070C AM-1300-1103 85070C AM-1300-1103 R & S Nokia IBM / Motorola Sony JFK JFK R. Heine AR Amplifier Resarch Stubli Stubli Schmidt & Partner Stubli Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner R & S Agilent MITEQ Agilent MITEQ Frankonia R&S Frankonia BTA-H TS 8950 BTA-H AFS4-00101800-U MITEQ ESCS 30 4490 MQF 127.50-2400/F Vectron International R&S HOPF DB 3 22240-25 AT4560 AFD3010040-15-LN Miteq EMCO Flann Microwave Amplifier research ETS Dr. Genz GmbH, Germany Page 14 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 2.4 Test Procedure POWER LINE CONDUCTED INTERFERENCE: The procedure used was ANSI STANDARD C63.4-2000 using a 50H LISN (if necessary). Both lines were observed. The bandwidth of the spectrum analyzer was 10 kHz with an appropriate sweep speed. RADIATION INTERFERENCE: The test procedure used was ANSI STANDARD C63.4-2000 using a spectrum analyzer. The bandwidth of the spectrum analyzer was 100 kHz with an appropriate sweep speed. The analyzer was calibrated in dB above a microvolt at the output of the antenna. The resolution bandwidth was the 100 kHz and the video bandwidth was 300 kHz. The ambient temperature of the UUT was 23C with a humidity of 40 %. FORMULA OF CONVERSION FACTORS: The Field Strength at 3m was established by adding the meter reading of the spectrum analyzer (which is set to read in units of dBV) to the antenna correction factor supplied by the antenna manufacturer. The antenna correction factors are stated in terms of dB. Example:
Freq (MHz) 33 METER READING + ACF + CABLE LOSS (to the receiver) = FS 20 dBV + 10.36 dB + 6 dB = 36.36 dBV/m @3m ANSI STANDARD C63.4-2000 10.1.7 MEASUREMENT PROCEDURES: The UUT was placed on a table 80 cm high and with dimensions of 1m by 1.5m (non metallic table). The UUT was placed in the center of the table. The table used for radiated measurements is capable of continuous rotation. The spectrum was scanned from 30 MHz to 10th harmonic of the fundamental. Peak readings were taken in three (3) orthogonal planes and the highest readings. Measurements were made by ETS Dr. Genz GmbH at the registered open field test site located at Storkower Str. 38c, 15526 Reichenwalde, Germany. When an emission was found, the table was rotated to produce the maximum signal strength. At this point, the antenna was raised and lowered from 1m to 4m. The antenna was placed in both the horizontal and vertical planes. ETS Dr. Genz GmbH, Germany Page 15 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3 Test results (enclosure) TEST CASE Peak Output Power Equivalent radiated power Spurious Emissions radiated - Transmitter operating Spurious Emissions conducted - Transmitter operating Minimum 6 dB Bandwidth Peak Power Spectral Density Conducted Emission at (AC) Power Line Required Test passed Test failed ETS Dr. Genz GmbH, Germany Page 16 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.1 Peak Output Power (transmitter) This measurement applies to equipment with an integral antenna and to equipment with an antenna connector and equipped with an antenna as declared by the applicant. The power was measured with modulation (declared by the applicant). Test conditions Channel A Tnom= 23C Vnom = 120 V Measurement uncertainty
[dBm]
17,87 Conducted Power Channel B
[dBm]
17,62
< 3 dB Channel C
[dBm]
17,62 ETS Dr. Genz GmbH, Germany Page 17 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Test Conditions Signal Field strength TX highest power mode Tnom= 23C, Vnom = 120 V Frequency [MHz]
2437 Measurement uncertainty dBV/m 96,27
< 3 dB The diagrams for the field strength measurements are included in Appendix C. Limits:
Frequency MHz 902 928 2400-2483.5 MHz 5725-5850 MHz Power dBm 30 30 30 In case of employing transmitter antennas having antenna gain > 6 dBi and using fixed point-to point operation consider 15.247 (b)(4). Test equipment used:
ETS 0125, ETS 0340 ETS Dr. Genz GmbH, Germany Page 18 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.2 De facto Equivalent isotropic radiated power EIRP = max. conducted output power + antenna gain EIRP = 17.87 dBi + 1.8 dBi EIRP = 19.67 dBm Limit: EIRP = +36 dBm for Antenna gain < 6 dBi 3.2.1 Transmitter Integral Antenna:
At the transmitter the measurement was transacted with the modulation declared by the manufacturer and the maximum available output power of the EUT. In this arrangement the EUT fulfils the requirements of the FCC rules 15.247, subpart C, section b. This unit uses an external antenna without antenna cable. The antenna is connected by an unique RF connector (SMA inverse plug). 3.3 RF Exposure Compliance Requirements The test sample is a WLAN access point intended for fixed installation. FCC OET Bulletin 65 Edition 97.01 determines the equations for predicting RF fields and applicable limits. The prediction for power density in the far-field of the antenna can be made by use of the general equation below. This equation is generally accurate in the far-field but will over-predict power density in the near field, where it could be used for walking a worst case or conservative prediction. P G S = ---------
4 R2 S Power Density P Output power ERP R Distance D cable Loss AG Antenna Gain G= AG-D Item P D AG G R S Unit mW dB dBi cm mW/cm2 Value 61,2 1,51 20 0,018 Remarks Peak value Calculated Value Assumed value Calculated value ETS Dr. Genz GmbH, Germany Page 19 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Limits:
Limit for General Population / Uncontrolled Exposure Power Density Frequency
(MHz)
(mW/cm2) 1500 100.000 1,0 ETS Dr. Genz GmbH, Germany Page 20 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.4 Transmitter Radiated Emissions in Restricted Bands FCC Rules: 15.247 (c), 15.205, 15.209, 15.35 Radiated emission measurements were performed from 30 MHz to 26000 MHz. For radiated emission tests, the analyzer setting was as followings:
RES BW VID BW Frequency <1 GHz 100 kHz 100 kHz (Peak measurements) Frequency >1 GHz 1 MHz 1 MHz (Peak measurements) 1 MHz 1 MHz (Average measurements) Limits:
For frequencies below 1GHz :
Frequency of Emission
(MHz) 30 88 88 216 216 960 Above 960 Field strength
(microvolts/meter) Field Strength
(dB microvolts/meter) 100 150 200 500 40.0 43.5 46.0 54.0 For frequencies above 1GHz (Average measurements). Guidance on Measurement of DSSS Systems:
If the emission is pulsed, modify the unit for continuos operation , use the settings shown above, then correct the reading by subtracting the peak-average correction factor, derived from the appropriate duty cycle calculation. Here the correction was added to the limit instead subtracted from the reading. Duty cycle correction = 20 log (dwell time/100ms) For frequencies above 1GHz (Average measurements). Limit duty cycle correction No duty cycle correction was added to the reading. 54.0dBV/m For frequencies above 1GHz (Peak measurements). Limit + 20dB 54.0dBV/m + 20 dB= 74 dBV/m Remarks: See attached diagrams. Test equipment used: ETS 0125, ETS 0271 ETS Dr. Genz GmbH, Germany Page 21 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.5 Spurious emissions (tx) Spurious emission was measured with modulation (declared by manufacturer). In any 100 kHz bandwidth outside the frequency band in which the intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement. Attenuation below the general limits specified in 15.209(a) is not required. In addition, radiated emissions which fall in the restricted bands, as defined in 15.205(a), must also comply with the radiated emission limits specified in 15.209(a) (see 15.205(c)). FCC Rule: 15.247(c) , 15.35 For out of band emissions that are close to or that exceed the 20 dB attenuation requirement described in the specification, radiated measurements were performed at a 3 m separation distance to determine whether these emissions complied with the general radiated emission requirement. Limits:
For frequencies below 1GHz :
Max. reading 20 dB 96,27dBV/m- 20 dB= 76,27 dBV/m Guidance on Measurement of DSSS Systems:
If the emission is pulsed, modify the unit for continuos operation , use the settings shown above, then correct the reading by subtracting the peak-average correction factor, derived from the appropriate duty cycle calculation. Here the correction was added to the limit instead subtracted from the reading. Duty Cycle correction = 20 log (dwell time/100ms) For frequencies above 1GHz (Peak measurements). Limit = max. aver. reading-20dB +20dB(because Peak detector is used) 96,27dBV/m For frequencies above 1GHz (Average measurements). Max. reading 20 dB - duty cycle correction:
No duty cycle correction was added to the reading 96,27dBV/m - 20 dB=76,27dBV/m Remarks: See attached diagrams. Test equipment used: ETS 0125, ETS 0271 SAMPLE CALCULATION OF LIMIT. All results will be updated by an automatic measuring system in accordance with point 2.3. ETS Dr. Genz GmbH, Germany Page 22 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Calculation of test results:
Such factors like antenna correction, cable loss, external attenuation etc. are already included in the provided measurement results. This is done by using validated test software and calibrated test system according the accreditation requirements. The peak and average spurious emission plots was measured with the average limits. In the Table being listed the critical peak and average value and exhibit the compliance with the above calculated Limits. If in the columns correction factor states a value then the max. Field strength in the same row is corrected by a value gained from the Duty-Cycle Correction Factor. Summary table with radiated data of the test plots D corrections dB Freq. Used Ch. 1 2 2 4 5 6 2 2 4 5 6 1 4 5 1 1 1 1 1 1 6 6 6 6 6 11 11 11 Frequency Marker
[GHz]
0.152645 0.280 990.384 7735 11960 17796 331.481 989.285 7752 11631 17820 163.547 7984 11631 Polari-
zation H H H H V H V H V V H H H V Max. Field Strength
[dBV/m]
41,22 36.00 44.06 52.75 49.39 53.01 32.68 42.60 52.46 49.56 52.68 41.01 52.41 49.12 Compliance Limit
[dBV/m]
43,5 46.0 54 54 54 54 46 54 76.27 54 54 43.5 76.27 54 Detec-
tor P P P P P P P P P P P P P P BW Margin
[MHz]
0,1 0.1 0.1 1 1 1 0.1 0.1 1 1 1 0.1 1 1
[dB]
-2,28
-10,00
-9,94
-1.25
-4,61
-0.99
-13.32
-11.40
-23.41
-4.44
-1.32
-2.2.49
-23.86
-4.88 30 200 1 4 8 12 Freq. Frequency Range:
200 MHz 1:
2:
1000 MHz 4 GHz 3:
8 GHz 4:
12 GHz 5:
6:
17 GHz ETS Dr. Genz GmbH, Germany Page 23 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 7:
17 26,5 GHz All not in the table noted test results are more than 20 dB below the relevant limits. All other not noted test plots do not contain significant test results in relation to the limits. TEST RESULT (Transmitter): The unit DOES meet the FCC requirements. Comment: see attached diagrams Test equipment used: ETS 0125, ETS 0340, ETS 0271 ETS Dr. Genz GmbH, Germany Page 24 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.6 Minimum 6 dB Bandwidth The analyzer ResBW was set to 100 kHz. For each RF output channel investigated, the spectrum analyzer center frequency was set to the channel carrier. A PEAK reading was taken, two markers were set 6 dB below the maximum level on the right and the left side of the emission. The 6 dB bandwidth is the frequency difference between the two markers. 6 dB Bandwidth Test conditions Tnom= 23C Vnom = 120 V Channel A 11.463 MHz Channel B 11.463 MHz Channel C 10.862 MHz Measurement uncertainty
< 10 Hz Limits:
Frequency Range MHz 902 - 928 2400 2483,5 5725 5850 Limits min 500 kHz min 500 kHz min 500 kHz Test equipment used:
ETS 0125, ETS 0271 Comment:
see attached diagram ETS Dr. Genz GmbH, Germany Page 25 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.7 Peak Power Spectral Density Peak Power Spectral density is a measured at low, middle and high channel. The peak output power is measured with a measurement bandwidth of 10 MHz and displayed on diagram together with Peak Power Spectral Density result which was measured with a bandwidth of 3 kHz, appreciate frequency span and sweeptime. Test conditions Tnom= 23C Vnom = 120 V Peak Power Spectral Density (3kHz) Channel A
[dBm]
-8.46 Channel B
[dBm]
-9.14 Channel C
[dBm]
-8.35 Measurement uncertainty
< 3 Hz Limits:
Frequency Range MHz 902 - 928 2400 2483,5 5725 5850 dBm 8 8 8 Test equipment used:
Comment:
ETS 0125, ETS 0340 see attached diagrams ETS Dr. Genz GmbH, Germany Page 26 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.8 Conducted Emission at (AC) Power Line For an intentional radiator which is designed to be connected to the public utility (AC) power line, the radio frequency voltage that is conducted back onto the AC line on any frequency or frequencies within the band 150 kHz to 30 MHz shall not exceed the limits in the table bellows with this provision shall be based on the measurement of the radio frequency voltage between each power line and ground at the power terminals. This measurement was transact first with instrumentation using an average and peak detector and a 10 kHz bandwidth. If the peak detector achieves a calculated level, the measurement is repeated by an instrumentation using a quasi-peak detector. Frequency 150 kHz Level quasi-peak lower limit line average lower limit line Limits:
Frequency of Emission (MHz) Conducted Limit (dBuV) 0.15-0.5 0.5-5 5-30 Quasi Peak 66 to 56 56 60 Average 56 to 46 46 50 Test equipment used:
ETS 0003, ETS 0040, ETS 0109, ETS 0125 Comment:
see attached diagram ETS Dr. Genz GmbH, Germany Page 27 of 28 Registration number: W6M20402-5017-C-1 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Appendix A B C D E F G Pictures Peak Output Power Spurious Emissions radiated - Transmitter operating Spurious Emissions conducted - Transmitter operating Maximum 6 dB Bandwidth Peak Power Spectral Density Conducted Emission at (AC) Power Line ETS Dr. Genz GmbH, Germany Page 28 of 28 Registration number: W6M20402-5017-C-1
1 2 | TestRpt1 802 11g | Test Report | 284.26 KiB | January 04 2004 |
ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH TEST - REPORT FCC Part 15 C for IEEE 802.11 g device FCC ID: P27AP51GA Test report no.:
W6M20402-5017-C-2 FCC ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH STORKOWER STRASSE 38C, D-15526 REICHENWALDE B. BERLIN PHONE +49-33631-888 00 FAX +49-33631-888 66 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH TABLE OF CONTENTS 1 1.1 1.2 1.3 1.4 1.5 1.6 2 2.1 2.2 2.3 2.4 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 General information Notes Testing laboratory Details of approval holder Application details Test item Test standards Technical test Summary of test results Test environment Test equipment utilized Test Procedure Test Results Peak Output Power De Facto Equivalent Isotropic Radiated Power RF Exposure Compliance Requirements Transmitter Radiated Emissions in restricted Bands Spurious Emissions Minimum 6 dB Bandwidth Peak Power Spectral Density Spurious emissions related to AC power line ETS Dr. Genz GmbH, Germany Page 1 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1 1.1 General Information Notes The purpose of conformity testing is to increase the probability of adherence to the essential requirements or conformity specifications, as appropriate. The complexity of the technical specifications, however, means that full and thorough testing is impractical for both technical and economic reasons. Furthermore, there is no guarantee that a test sample which has Passed all the relevant tests conforms to a specification. Neither is there any guarantee that such a test sample will interwork with other genuinely open systems. The existence of the tests nevertheless provides the confidence that the test sample possesses the qualities as maintained and that is performance generally conforms to representative cases of communications equipment. The test results of this test report relate exclusively to the item tested as specified in 1.5. The test report may only be reproduced or published in full. Reproduction or publication of extracts from the report requires the prior written approval of the ELECTRONIC TECHNOLOGY SYSTEMS DR. GENZ GMBH. Specific Conditions:
Usage of the hereunder tested device in combination with other integrated or external antennas requires at least additional output power measurements, spurious emission measurements, conducted emission measurements (AC supply lines) and radio frequency exposure evaluations for each individual configuration performed, for certification by FCC. The test sample is able to work according IEEE 802.11 b,g. This report is related to FCC Part 15 E (OFDM device, IEEE 802.11g) only and do not cover requirements for other parts like FCC Part 15 C (e.g. for IEEE 802.11b). Tester:
10.03.2004 Date N. Kaspar ETS-Lab. Signature Name Technical responsibility for area of testing:
10.03.2004 Date Dr. Genz Signature Name ETS ETS Dr. Genz GmbH, Germany Page 2 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.2 1.2.1 Testing laboratory Location ELECTRONIC TECHNOLOGY SYSTEM DR. GENZ GMBH (ETS) Storkower Strae 38c D-15526 Reichenwalde b. Berlin Germany Telefon : +49 33631 888 00 Telefax : +49 33631 888 660 1.2.2 Details of accreditation status ACCREDITED TESTING LABORATORY DAR-REGISTRATION NUMBER: TTI-P-G 126/96 ACCREDITED COMPETENT BODY DAR-REGISTRATION NUMBER: BPT-ZE-026/96 FCC FILED TEST LABORATORY REG. NO. 96970 BLUETOOTH QUALIFICATION TEST FACILITY (BQTF) ACCREDITED BY BLUETOOTH QUALIFICATION REVIEW BOARD INDUSTRY CANADA FILED TEST LABORATORY REG. NO. IC 3470 A2LA ACCREDITED Certificate Number 1983-01 1.3 Details of approval holder Name Street Town Country Telephone Fax Contact
: SerComm Corporation
: 8F., No,3-1, YuanQu St., NanKang
: Taipei 115
: Taiwan, R.O.C
: +886 2 2655 3988
: +886 2 2655 3966
: Mr. Kevin Tseng ETS Dr. Genz GmbH, Germany Page 3 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.4 Application details Date of receipt of application Date of receipt of test item Date of test
: 04.02.2004
: 04.02.2004
: 04.02.2004 01.03.2004 1.5 Test item Description of test item Type identification Hardware Software Serial number Photos Technical data
: AP
: AP51GA
: 1.0
: 1.0
: without
: See Appendix A Frequency band Frequency ( ch A) Frequency (ch B) Frequency (ch C) Number of Channels Operating Modes Type of modulation
: 2.4GHz 2.4835GHz
: 2.412 GHz
: 2.437 GHz
: 2.462 GHz
: 11
: duplex; TDD
: DSSS-OFDM Yes /
No Fixed point-to-point operation:
Antenna type Antenna connector Antenna gain Power supply Emission designator Host device
: Dipole Antenna
: SMA Plug Reverse
: 1,8 dBi
: 120 V AC/DC Adapter
: 16M6W7D
: none ETS Dr. Genz GmbH, Germany Page 4 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Classification
:
Fixed Device Mobile Device (Human Body distance > 20cm Portable Device (Human Body distance < 20cm Transmitter Power (ch A) Power (ch B) Power (ch C) Unom
: Conducted: 15,76 dBm
: Conducted: 15,27 dBm
: Conducted: 15,64 dBm Manufacturer:
(if applicable) Name Street Town Country Additional information:
:
:
:
:
The test sample is using WLAN technology according IEEE 802.11 b/ g. For this report the function according IEEE 802.11g is considered only. The scheme for frequency generation, spectrum spreading, receiver parameters, synchronization procedure, and other parameters are determined by the mentioned standard above. ETS Dr. Genz GmbH, Germany Page 5 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 1.6 Test standards Technical standard :
FCC RULES PART 15 / SUBPART C 15.247 2 2.1 Technical test Summary of test results No deviations from the technical specification(s) were ascertained in the course of the tests performed. or The deviations as specified in 2.5 were ascertained in the course of the tests performed. 2.2 Test environment Temperature
: 23oC Relative humidity content
: 20 ... 75 %
Air pressure
: 86 ... 103 kPa Details of power supply
: 120 V AC/DC Adapter Extrem conditions parameters:
: test voltage - extreme min.:
max:
-- V
-- V ETS Dr. Genz GmbH, Germany Page 6 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 2.3 Test equipment utilized No. ETS 0001 ETS 0002 ETS 0003 ETS 0004 ETS 0005 ETS 0006 ETS 0007 ETS 0008 ETS 0009 ETS 0010 ETS 0011 ETS 0012 ETS 0013 ETS 0014 ETS 0015 ETS 0016 ETS 0017 ETS 0018 ETS 0019 ETS 0020 ETS 0021 ETS 0022 ETS 0023 ETS 0024 ETS 0025 ETS 0026 ETS 0027 ETS 0028 ETS 0029 ETS 0030 ETS 0031 ETS 0032 ETS 0033 ETS 0034 ETS 0035 ETS 0036 ETS 0037 ETS 0038 ETS 0039 ETS 0040 ETS 0041 ETS 0042 ETS 0043 ETS 0044 ETS 0045 ETS 0046 Measurement device:
Test receiver Test receiver Test receiver Spectrum- and Network-Analyzer Test receiver Test receiver system Spectrum analyzer Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna Antenna mast Antenna mast Tripod Tripod Tripod Tripod Turn table Turn table Controller RF generator RF generator/ Amplifier RF generator/ Amplifier RF amplifier RF amplifier RF amplifier Absorbing clamp Artificial mains Artificial mains Artificial mains Artificial mains Artificial mains Stripe line Power supply Type:
ESHS 10 ESVP ESVS 10 FSMS 26 SMV 11 SME 12 PSA-65A Loop antenna Loop antenna Loop antenna van Veen/ Frame HK 116 HL 223 HL 025 HL 025 VHAP VHAP UHAP UHAP DP 21 DP 3 SAS-200/ 521 DP 1 AF 2 AF 2 STA 2 TT 1 DS 412 HD 050 SMG SMLR SMLM 10W 1000AM2 50W 1000 150L MDS 21 ESH3-Z5 ESH3-Z4 ESH3-Z6 NNB 11 NNB 111 IEC 801-3 LTS 006 Manufacturer:
Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz MEB MEB Avcom Siemens MEB MEB ETS Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Schwarzbeck Schwarzbeck Schwarzbeck Schwarzbeck MEB MEB A.H. Systeme / USA MEB MEB MEB Heinrich Deisel Heinrich Deisel C. Lorenz AG Berlebach ETS Heinrich Deisel Heinrich Deisel Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Amplifier Research Amplifier Research Amplifier Research Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz MEB MEB ETS RFT ETS Dr. Genz GmbH, Germany Page 7 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Blank plug-in Measurement device:
Power supply Power supply Power supply Power supply Oscilloscope Audio analyzer ECAT Control center EFT simulator No. ETS 0047 ETS 0048 ETS 0049 ETS 0050 ETS 0051 ETS 0052 ETS 0053 ETS 0054 ETS 0055 Module network coupler ETS 0056 ETS 0057 Module SURGE with DC coupler ETS 0058 ETS 0059 ETS 0060 ETS 0061 ETS 0062 ETS 0063 ETS 0064 ETS 0065 ETS 0066 ETS 0067 ETS 0068 ETS 0069 ETS 0070 ETS 0071 ETS 0072 ETS 0073 ETS 0074 ETS 0075 ETS 0076 ETS 0077 ETS 0078 ETS 0079 ETS 0080 ETS 0081 ETS 0082 ETS 0083 ETS 0084 ETS 0085 ETS 0086 ETS 0087 ETS 0088 ETS 0089 ETS 0090 ETS 0091 ETS 0092 ETS 0093 ETS 0094 ETS 0095 Capacitive coupling clamp Kikusui amplifier Xitron power analyzer Power/ Arb (Harm., Ramp) Reference impedance Blank plug-in Filter system IEC 1000-4-6 ESD-generator minizap EM Injection Clamp Calibration Fixture Filter system IEC 1000-4-6 EM Radiation Monitor PC Transfer set EMR-20 Video camera system Interphone system Audio noise meter RF milivoltmeter NF generator Feeding bridge A Audio/ Video Filter LCR meter Functional generator EMI Software EMI Software PC Novell network system Apple computer system Process controller Shielded room Anechoic chamber Climatic cell Color TV pattern generator Radio communication tester DECT type approval CTR06 RF signal generator DM-Coder Pulse Modulator Rear-panel connectors DECT system controller Type:
TG 20/ 1 TG 20/ 1 T 102 T 101b TDS 640A UPA 4 PCR 2000L IEC 801-2031 CF CDN EMR-20 EMR-20 KMB012 JS-1400 GSM 2 QRV 2 GF 22 SBA 1000 AV 55020 SR 720 MX-2020 ES-K1 ES-K10 Novell Performa 630 PSA 15 SR 1 AC 1 HC 4033 PM 5518-TX VPS CMS 54 TS 8930 SME 03 SME-B11 SM-B8 SME-B19 PSMD Manufacturer:
Statron Statron TPW TPW Tektronic Rohde&Schwarz Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV Keytek/ EMV FCC/ EMV FCC/ EMV FCC/ EMV Wandel&Goltermann Wandel&Goltermann Kocom Jiuh Sheng MKD/ RFT MKD/ RFT Prcitronic ESP ETS SRS Maxcom Rohde&Schwarz Rohde&Schwarz Esotronic Macintosh Rohde&Schwarz Frankonia Frankonia Heraeus Philips Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz ETS Dr. Genz GmbH, Germany Page 8 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Manufacturer:
Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz ETS Rohde&Schwarz Rohde&Schwarz Avcom Avcom INCO Serute Dagatron Rohde&Schwarz Rohde&Schwarz Type:
Measurement device:
PSMD-B11 DECT Signaling unit TS 89RA Rack, 19", 36 HU CS 893BE System engineering and software TS 8930B Extension unit for basic version SME-06 RF signal generator SME-B11 DM-Coder SM-B8 Pulse modulator SM-B4 Pulse generator SME-B19 Rear-panel connectors SMP 22 High power synthesizer/ sweeper SMP-B11 Frequency extension SMP-B15 RF attenuator for SMP 22 TS 1220 DECT protocol tester TBR 22 PSM 2 Process controller Real time signaling unit PSMD-B2 PCM Realtime audio interface for PSMD-B3 PSMD-B4 Synthesizer Module PSA-Z2 Keyboard RF step attenuator RSG Glide path RF Millivoltmeter Insertion unit No. ETS 0096 ETS 0097 ETS 0098 ETS 0099 ETS 0100 ETS 0101 ETS 0102 ETS 0103 ETS 0104 ETS 0105 ETS 0106 ETS 0107 ETS 0108 ETS 0109 ETS 0110 ETS 0111 ETS 0112 ETS 0113 ETS 0114 ETS 0115 ETS 0116 ETS 0117 ETS 0118 Mixer ETS 0119 Mixer RF step attenuator ETS 0120 Oscilloscope ETS 0121 Oscilloscope ETS 0122 RF step attenuator ETS 0123 Tripod ETS 0124 Small components ETS 0125 Uninterruptible power supply ETS 0126 Uninterruptible power supply ETS 0127 Uninterruptible power supply ETS 0128 Uninterruptible power supply ETS 0129 Uninterruptible power supply ETS 0130 Telephone connection box ETS 0131 Frequency doubler ETS 0132 ETS 0133 Probe body ETS 0134 Mains filter ETS 0135 Measuring switching point ETS 0136 Attenuator ETS 0137 Multimeter ETS 0138 Multimeter ETS 0139 Multimeter ETS 0140 ETS 0141 ETS 0142 ETS 0143 ETS 0144 High voltage generator Sliding bridge Impedance converter Impedance converter URV 55 URV-Z2 MFC 1000 MFC 2000 TRI-50-20 EO 147A 5201 RBU STA 2 UPS - 1500 UPS - 1000 LC UPS - 1000 UPS - 500 Power saver TR-0616 P6015 MSF AK 11 33-6-34 YX-360TRA DT-9410 ST-9202 IP 6Wa J 573 TK 11 TK 12 Sendon Sendon Sendon Sendon Sendon Systel EMG Tektronix Erika Fiedler RFT Weinschel Mastech Diditec Standard TPW RFT RFT RFT ETS Dr. Genz GmbH, Germany Page 9 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Type:
TK 103 ESH2-Z2 21PT4301/00 ZAPD-21 HR07-720 NSG 500C NSG 506C (I) NSG 506C (II) SMG SMG NKS VTG 700 VTG 700 TOE 8815 PI 6001 D 403-A BK 4602 BK 4185 BK 4227 BK 4231 CAS TE I CTR 10 MFE III MFE IV TEH HNG III.1 Canton S Pluss Measurement device:
Probe Active probe Test TV Power divider Switcher Interference pulse generator Simulator for Load-Dump-Impulse Simulator for Load-Dump-Impulse Signal generator Signal generator Adjacent channel power meter TV and Sat-Signal generator TV and Sat Signal generator Programmable power supply Protective wire and isolation tester Filter system / consumer electronic Acoustic chamber Test head Simulator ear Simulator mouth Acoustic calibrator Communication Analysis System Acoustical test for DECT No. ETS 0145 ETS 0146 ETS 0147 ETS 0148 ETS 0149 ETS 0150 ETS 0151 ETS 0152 ETS 0153 ETS 0154 ETS 0155 ETS 0156 ETS 0157 ETS 0158 ETS 0159 ETS 0160 ETS 0161 ETS 0162 ETS 0163 ETS 0164 ETS 0165 ETS 0166 ETS 0167 ETS 0168 ETS 0169 Measurement - Frontend (analog) ETS 0170 Measurement - Frontend (digital) ETS 0171 ETS 0172 ETS 0173 ETS 0174 Measurement - Frontend line interface MFE V ETS 0175 ETS 0176 ETS 0177 ETS 0178 ETS 0179 ETS 0180 ETS 0181 ETS 0182 ETS 0183 ETS 0184 ETS 0185 ETS 0186 ETS 0187 ETS 0188 ETS 0189 ETS 0190 ETS 0191 ETS 0192 ETS 0193 Software Line interface (analog) Acoustic volt meter Feeding bridge B Open area test side Open area test side Artificial mains Test pin for protective wire Power supply Frequency counter Function generator Digital multimeter Power supply Power supply High voltage generator Spectrum Analyzer Function generator Sweep function generator Audio generator Vibration table Electronic test cradle Noise generator Speaker COPTZV5 COP 4 SBA 1000 30m 30m NNB01/RFZ PE 156-i MX-9300 MX-9300 MX-9300 MX-9300 DF 1730 FSEB MX 2020 7202 7101 N1-201-M Manufacturer:
MEB Rohde&Schwarz Philips MCL Wisi Schaffner Schaffner Schaffner Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Grundig Grundig Toellner SPS electronic Fiedler IAC Brel & Kjr Brel & Kjr Brel & Kjr Brel & Kjr HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics HEAD acoustics ESP ETS ETS ETS SPS electronic Maxcom Maxcom Maxcom Maxcom WJG TPW/RFT Rohde&Schwarz Maxcom Dagatron Dagatron Sandox ETS Dr. Genz GmbH, Germany Page 10 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
Hazardous live probe Hazardous live probe Ball pressure test apparatus Glow Wire tester Force indicator 50N Digital multimeter Thermo hygro recorder Digital thermometer Digital thermometer Digital thermometer Digital thermometer Digital thermometer / hygro meter Digital thermometer / hygro meter Digital thermometer Digital thermometer Digital thermometer High voltage test generator High voltage test accessories Socket-Outlet torque balance Unjointed Finger probe Flexible Finger probe Spring operated impact hammer No. ETS 0194 ETS 0195 ETS 0196 ETS 0197 ETS 0198 ETS 0199 ETS 0200 ETS 0201 ETS 0202 ETS 0203 ETS 0204 ETS 0205 ETS 0206 ETS 0207 ETS 0208 ETS 0209 ETS 0210 ETS 0211 Metallic ball ETS 0212 ETS 0213 ETS 0214 ETS 0215 ETS 0216 ETS 0217 Millivolt meter ETS 0218 ETS 0219 ETS 0220 ETS 0221 ETS 0222 ETS 0223 ETS 0224 ETS 0225 ETS 0226 ETS 0227 ETS 0228 ETS 0229 ETS 0230 ETS 0231 ETS 0232 ETS 0233 ETS 0234 ETS 0235 ETS 0236 ETS 0237 ETS 0238 ETS 0239 ETS 0240 ETS 0241 ETS 0242 RF probe Power sensor Insertion unit ISDN-S0-Analyzer ISDN Protocol Analyser GSM/ PCN/ PCS-Simul. GSM System Simulator SIM Simulator SIM Editor Vibration table Climatic chamber Radio Commun. Tester Radio Commun. Tester Testreceiver Radiation test source Direction coupler Power meter RF-network-analyser RF-amplifier RF-amplifier Field strong meter Isotr. field probe 40 GHz Isotr. field probe 1 GHz Pulse Generator Harmonics analyser Type:
PMM 208 AK-688 ad 170th ad 31th ad 90h 37950-10 ad 15th Type K ad 20th HA 3300 D HVGZ 312 F 37.13 P 10.05 P 10.01 P 22.50 F 53.32 P 10.06 P 10.11 T 10.02 T 03.14 P 10.31 URV 55 URV5-Z7 NRV-Z2 URV5-Z4 K1403 TE965 TS8915B FTA TIRA vib VT 4010 CMT 54 CMD 65 ESVS 30 VSQ 1 RK 100 NRVD 8752 C 100A100 100W1000M1 FM 2000 FP 2080 Kit FP 2000 Kit 4050 F 41B Manufacturer:
Dagatron Amarell KD Prima ama-digit ama-digit ama-digit Cole Parmer ama-digit Amarell ama-digit SPS electronic SPS electronic PTL PTL PTL PTL PTL PTL PTL PTL PTL PTL Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Rohde&Schwarz Siemens Tekelec Teleco. Rohde & Schwarz Rohde & Schwarz Orga Orga GenRad Vtsch Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz MEB MEB Rohde & Schwarz Hewlett Packard Amplifier Research Amplifier Research Amplifier Research Amplifier Research Amplifier Research PicoSecond PL Fluke ETS Dr. Genz GmbH, Germany Page 11 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
No. AC-clamp 1000 A ETS 0243 Burst generator ETS 0244 Load dump generator ETS 0245 Voltage drop simulator ETS 0246 ETS 0247 Microsecond generator ETS 0248 ETS 0249 ETS 0250 ETS 0252 ETS 0253 ETS 0254 ETS 0255 ETS 0256 ETS 0257 ETS 0258 ETS 0259 ETS 0260 ETS 0261 ETS 0262 ETS 0263 ETS 0264 ETS 0265 ETS 0267 ETS 0268 ETS 0270 ETS 0271 ETS 0272 ETS 0273 ETS 0274 ETS 0275 ETS 0276 ETS 0277 ETS 0278 ETS 0279 ETS 0280 ETS 0281 ETS 0282 ETS 0283 ETS 0284 ETS 0285 ETS 0286 ETS 0287 ETS 0288 ETS 0289 ETS 0290 ETS 0291 ETS 0292 ETS 0293 ETS 0294 Switch unit Coupling network Coupling clamp System controller Spectrum analyser RF generator RF generator RF generator Step attenuator Rubidium standard Power meter Power sensor Power sensor Switching unit Signaling unit Spectrum analyser Loop antenna RF signal generator RF signal generator RF signal generator Test receiver RF signal generator RF signal generator RF signal generator Power sensor Audio analyser Power sensor Power sensor Step attenuator Power meter Spectrum analyser RF bridge RF bridge Field probe Field probe Limiter Test receiver Artifical mains Audio generator Audio generator Loop antenna RF generator Artifical mains Biconical antenna Type:
80i 1000s EFT 200 LD 200 VDS 200 MPG 200 AN 200 CNA 200 ACC PSM 12 FSIQ SMIQ 03 SMIQ 03 SMP 03 RSP RSTU NRVD NRVD-Z1 NRVD-Z1 SSCU F 1048 HFRA 9150 SMT 03 SMP 02 SMP 04 ESI 40 SME 03 SME 03 SMY 01 NRV-Z51 UPL NRV-Z1 NRV-Z31 RSP NRVD FSM 86207 A 86205 A 11940 A 11941 A 11867 A ESHS 10 ESH2-Z5 TAG 101 TAG 101 HFH2-Z2 SMHU NNBM 8125 HK 116 Manufacturer:
Fluke EM-Test EM-Test EM-Test EM-Test EM-Test EM-Test EM-Test Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz DATUM GmbH Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Wird HAMEG Schwarzbeck Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz Hewlett Packard Hewlett Packard Hewlett Packard Hewlett Packard Hewlett Packard Rohde & Schwarz Rohde & Schwarz Troneer Troneer Rohde & Schwarz Rohde & Schwarz Schwarzbeck Rohde & Schwarz ETS Dr. Genz GmbH, Germany Page 12 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH No. ETS 0295 ETS 0296 ETS 0297 ETS 0298 ETS 0299 ETS 0300 ETS 0301 ETS 0302 ETS 0303 ETS 0304 ETS 0305 ETS 0306 ETS 0307 ETS 0308 ETS 0309 ETS 0310 ETS 0311 ETS 0312 ETS 0313 ETS 0314 ETS 0315 ETS 0316 ETS 0317 ETS 0318 ETS 0319 ETS 0320 ETS 0321 ETS 0322 ETS 0323 ETS 0324 ETS 0325 ETS 0326 ETS 0327 ETS 0328 ETS 0330 ETS 0333 ETS 0334 ETS 0335 ETS 0336 ETS 0337 ETS 0338 ETS 0339 ETS 0340 ETS 0431 ETS 0432 ETS 0433 ETS 0434 ETS 0435 ETS 0436 Measurement device:
LPD antenna Oscilloscope Power pulse generator ICO tester DECT protocol tester RF amplifier Relay switch unit Data line CDN Telecom line CDN Test receiver Test receiver Function generator Commu. Sign. Analyzer Spectrum analyzer Anechoic chamber Anechoic chamber Anechoic chamber Climatic chamber Power sensor LPD antenna Biconical antenna Switcher Switcher Dial pulse/ DTMF tester Opto link Opto link RF Millivoltmeter Insertion unit DECT portable part DECT fix part DECT portable part DECT fix part Blue Unit BT Protocol tester Spectrum analyser turn table Controller BT Development kit LPD Antenna Professional Power Amplifier Coupling network Isolating Transformer Bluetooth test set AC Mains Adaptor RF Verstrkermatrix RF Verstrkermatrix Reserviert Tre HP-Filter HP-Filter Type:
HL 223 TDS 520 A IGUF 2910 TS 1232 TS 1220 75 A 250 RSU CM-I/O CD CM-TEL CD ESHS 10 ESVS 10 HP 33120A CSA 803 A R 3361A AC 2 AC 3 AC 4 VC 0033 NRV-Z51 HL 223 HK 116 Hr 07-720 Hr 07-720 210 GPIB 140 GPIB 140 URV 55 URV5-Z4 Gigaset 1000 Gigaset 1000 V 2.0 PTW 60 FSM DE 350 HD 100 CASIRA HL 223 SE-1200 KN002 KN003 TS8960 BS5733 RSU-ETS-BT RSU-ETS-CTR6 RSU-ETS-GSM H1G04G01 H1G04G01 Manufacturer:
Rohde & Schwarz Tektronix Schwarzbeck Rohde & Schwarz Rohde & Schwarz Amplifier Research Rohde & Schwarz Keytek Keytek Rohde & Schwarz Rohde & Schwarz Hewlett Packard Tektronix Advantest Frankonia Frankonia Frankonia Vtsch Rohde & Schwarz Rohde & Schwarz Rohde & Schwarz WISI WISI HE NI NI Rohde & Schwarz Rohde & Schwarz SIEMENS SIEMENS Philipps Philipps Nokia Rohde & Schwarz Rohde & Schwarz Heinrich Deisel Heinrich Deisel CSR Rohde & Schwarz Wharfedale Pro ETS ETS Rohde & Schwarz Travel Emporium ETS ETS Microwave Microwave ETS Dr. Genz GmbH, Germany Page 13 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Measurement device:
HP-Filter HP-Filter Reserviert Tre Reserviert Tre Bluetooth Protcol Tester Nokia Tester for Bluetooth 1.1 IBM BT PC Card Sony BT DUN Modem RF-Attenuattor 6dB RF-Attenuattor 30dB KFZ-Bordnetznachbildung RF Power Amplifier Stubli Robot Stubli Robot Controller DASY 4 Measurement Server Control Pendant Compaq Computer Dabu Acquisition Electronis Dummy Probe Dosimetric E-Field Probe Dosimetric E-Field Probe Dosimetric H-Field Probe System Validation Kit System Validation Kit System Validation Kit System Validation Kit Probe Alignment Unit SAM Twin phantom No. ETS 0437 ETS 0438 ETS 0439 ETS 0440 ETS 0441 ETS 0442 ETS 0443 ETS 0444 ETS 0445 ETS 0446 ETS 0447 ETS 0448 ETS 0449 ETS 0450 ETS 0451 ETS 0452 ETS 0453 ETS 0454 ETS 0455 ETS 0456 ETS 0457 ETS 0458 ETS 0459 ETS 0460 ETS 0461 ETS 0462 ETS 0463 ETS 0464 ETS 0465 Mounting Device ETS 0466 ETS 0467 ETS 0468 ETS 0469 ETS 0470 ETS 0469 ETS 0470 ETS 0471 ETS 0472 ETS 0473 ETS 0474 ETS 0475 ETS 0476 ETS 0477 ETS 0478 ETS 0479 ETS 0480 ETS 0481 ETS 0482 ETS 0483 Dielectric Probe Kit Amplifier Dielectric Probe Kit Amplifier Validation Dipole 40GHz Standard Gain Horn mit 40GHz High Gain Antenna Verstrker Antenna GSM / UMTS System Simulator Antenna Verstrker Test receiver GPS-System(aktive GPS-antenne) Crystal filter Directional Coupler Universal Radio Communication T Type:
H0G408G1 H0G408G1 Manufacturer:
Microwave Microwave PTW 60 DTL - 1 BTPCN101 BTA- NW 1 50FH-006-300 50FH-030-300 LN-KFZ/200 AR 60S1G3 RX90B L CS/MBs&p Pentium IV 2 GHz DAE3V1 ET3DV6 ET3DV6 H3DV6 D900V2 D1800V2 D1900V2 D2450V2 LBV2 V4.0 V 3.1 HP 87300B CMU 200 85070C AM-1300-1103 85070C AM-1300-1103 R & S Nokia IBM / Motorola Sony JFK JFK R. Heine AR Amplifier Resarch Stubli Stubli Schmidt & Partner Stubli Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner Schmidt & Partner R & S Agilent MITEQ Agilent MITEQ Frankonia R&S Frankonia BTA-H TS 8950 BTA-H AFS4-00101800-U MITEQ ESCS 30 4490 MQF 127.50-2400/F Vectron International R&S HOPF DB 3 22240-25 AT4560 AFD3010040-15-LN Miteq EMCO Flann Microwave Amplifier research ETS Dr. Genz GmbH, Germany Page 14 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 2.4 Test Procedure POWER LINE CONDUCTED INTERFERENCE: The procedure used was ANSI STANDARD C63.4-2000 using a 50H LISN (if necessary). Both lines were observed. The bandwidth of the spectrum analyzer was 10 kHz with an appropriate sweep speed. RADIATION INTERFERENCE: The test procedure used was ANSI STANDARD C63.4-2000 using a spectrum analyzer. The bandwidth of the spectrum analyzer was 100 kHz with an appropriate sweep speed. The analyzer was calibrated in dB above a microvolt at the output of the antenna. The resolution bandwidth was the 100 kHz and the video bandwidth was 300 kHz. The ambient temperature of the UUT was 23C with a humidity of 40 %. FORMULA OF CONVERSION FACTORS: The Field Strength at 3m was established by adding the meter reading of the spectrum analyzer (which is set to read in units of dBV) to the antenna correction factor supplied by the antenna manufacturer. The antenna correction factors are stated in terms of dB. Example:
Freq (MHz) 33 METER READING + ACF + CABLE LOSS (to the receiver) = FS 20 dBV + 10.36 dB + 6 dB = 36.36 dBV/m @3m ANSI STANDARD C63.4-2000 10.1.7 MEASUREMENT PROCEDURES: The UUT was placed on a table 80 cm high and with dimensions of 1m by 1.5m (non metallic table). The UUT was placed in the center of the table. The table used for radiated measurements is capable of continuous rotation. The spectrum was scanned from 30 MHz to 10th harmonic of the fundamental. Peak readings were taken in three (3) orthogonal planes and the highest readings. Measurements were made by ETS Dr. Genz GmbH at the registered open field test site located at Storkower Str. 38c, 15526 Reichenwalde, Germany. When an emission was found, the table was rotated to produce the maximum signal strength. At this point, the antenna was raised and lowered from 1m to 4m. The antenna was placed in both the horizontal and vertical planes. ETS Dr. Genz GmbH, Germany Page 15 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3 Test results (enclosure) TEST CASE Peak Output Power Equivalent radiated power Spurious Emissions radiated - Transmitter operating Spurious Emissions conducted - Transmitter operating Minimum 6 dB Bandwidth Peak Power Spectral Density Conducted Emission at (AC) Power Line Required Test passed Test failed ETS Dr. Genz GmbH, Germany Page 16 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.1 Peak Output Power (transmitter) This measurement applies to equipment with an integral antenna and to equipment with an antenna connector and equipped with an antenna as declared by the applicant. The power was measured with modulation (declared by the applicant). Test conditions Channel A Tnom= 23C Vnom = 120 V Measurement uncertainty
[dBm]
15,76 Conducted Power Channel B
[dBm]
15,27
< 3 dB Channel C
[dBm]
15,64 Test Conditions Signal Field strength TX highest power mode Tnom= 23C, Vnom = 120 V Frequency [MHz]
2437 Measurement uncertainty dBV/m 86,53
< 3 dB The diagrams for the field strength measurements are included in Appendix C. Limits:
Frequency MHz 902 928 2400-2483.5 MHz 5725-5850 MHz Power dBm 30 30 30 In case of employing transmitter antennas having antenna gain > 6 dBi and using fixed point-to point operation consider 15.247 (b)(4). Test equipment used:
ETS 0125, ETS 0340 ETS Dr. Genz GmbH, Germany Page 17 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.2 De facto Equivalent isotropic radiated power EIRP = max. conducted output power + antenna gain EIRP = 15.76 dBi + 1.8 dBi EIRP = 17.56 dBm Limit: EIRP = +36 dBm for Antenna gain < 6 dBi 3.2.1 Transmitter Integral Antenna:
At the transmitter the measurement was transacted with the modulation declared by the manufacturer and the maximum available output power of the EUT. In this arrangement the EUT fulfils the requirements of the FCC rules 15.247, subpart C, section b. This unit uses an external antenna without antenna cable. The antenna is connected by an unique RF connector (SMA inverse plug). 3.3 RF Exposure Compliance Requirements FCC OET Bulletin 65 Edition 97.01 determines the equations for predicting RF fields and applicable limits. The prediction for power density in the far-field of the antenna can be made by use of the general equation below. This equation is generally accurate in the far-field but will over-predict power density in the near field, where it could be used for walking a worst case or conservative prediction. P G S = ---------
4 R2 S Power Density P Output power ERP R Distance D cable Loss AG Antenna Gain G= AG-D Item P D AG G R S Unit mW dB dBi cm mW/cm2 Value 37.7 1,51 20 0.011 Remarks Average value Measured value Peak gain Calculated Value Assumed value Calculated value ETS Dr. Genz GmbH, Germany Page 18 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Limits:
Limit for General Population / Uncontrolled Exposure Power Density Frequency
(MHz)
(mW/cm2) 1500 100.000 1,0 3.4 Transmitter Radiated Emissions in restricted Bands FCC Rules: 15.247 (c), 15.205, 15.209, 15.35 Radiated emission measurements were performed from 30 MHz to 26000 MHz. For radiated emission tests, the analyzer setting was as followings:
RES BW VID BW Frequency <1 GHz 100 kHz 100 kHz (Peak measurements) Frequency >1 GHz 1 MHz 1 MHz (Peak measurements) 1 MHz 1 MHz (Average measurements) Limits:
For frequencies below 1GHz :
Frequency of Emission
(MHz) 30 88 88 216 216 960 Above 960 Field strength
(microvolts/meter) Field Strength
(dB microvolts/meter) 100 150 200 500 40.0 43.5 46.0 54.0 For frequencies above 1GHz (Average measurements). 54.0dBV/m For frequencies above 1GHz (Peak measurements). Limit + 20dB 54.0dBV/m + 20 dB= 74 dBV/m Remarks: See attached diagrams. Test equipment used: ETS 0125, ETS 0271 ETS Dr. Genz GmbH, Germany Page 19 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Spurious emissions (tx) 3.5 Spurious emission was measured with modulation (declared by manufacturer). In any 100 kHz bandwidth outside the frequency band in which the intentional radiator is operating, the radio frequency power that is produced by the intentional radiator shall be at least 20dB below that in the 100 kHz bandwidth within the band that contains the highest level of the desired power, based on either an RF conducted or a radiated measurement. Attenuation below the general limits specified in 15.209(a) is not required. In addition, radiated emissions which fall in the restricted bands, as defined in 15.205(a), must also comply with the radiated emission limits specified in 15.209(a) (see 15.205(c)). FCC Rule: 15.247(c) , 15.35 For out of band emissions that are close to or that exceed the 20 dB attenuation requirement described in the specification, radiated measurements were performed at a 3 m separation distance to determine whether these emissions complied with the general radiated emission requirement. Limits:
For frequencies below 1GHz :
Max. reading 20 dB 86,53dBV/m- 20 dB=66,53 dBV/m Duty Cycle correction = 20 log (dwell time/100ms) For frequencies above 1GHz (Peak measurements). Limit = max. aver. reading-20dB +20dB(because Peak detector is used) 86,53dBV/m For frequencies above 1GHz (Average measurements). 86,53dBV/m - 20 dB=66,53dBV/m SAMPLE CALCULATION OF LIMIT. All results will be updated by an automatic measuring system in accordance with point 2.3. Calculation of test results:
Such factors like antenna correction, cable loss, external attenuation etc. are already included in the provided measurement results. This is done by using validated test software and calibrated test system according the accreditation requirements. The peak and average spurious emission plots was measured with the average limits. In the Table being listed the critical peak and average value an exhibit the compliance with the above calculated Limits. ETS Dr. Genz GmbH, Germany Page 20 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Summary table with radiated data of the test plots Freq. Used Ch. 1 1 2 5 5 6 7 1 2 6 7 1 2 4 5 6 7 1 1 1 1 1 1 1 6 6 6 6 11 11 11 11 11 11 Frequency Marker
[MHz]
162.5 148.9 990.381 7325 10525 17796 22800.00 174.433 990.381 17796 25597 163.878 990 7607 10525 17796 23000.00 Polari-
zation D corrections dB Max. Field Strength
[dBV/m]
Compliance Limit
[dBV/m]
H V H V H V H H H V H H H H V V V 42.05 40,46 50.92 52,00 51.33 53.17 52.00 41.59 50.84 53.47 53.40 40.93 51.36 52.49 51.76 53.27 52.80 43.5 43.5 54 54 66.53 54 54 43.5 54 54 66.53 43.5 54 54 66.53 54 54 Detec-
tor P P P P P P P P P P P P P P P P P BW Margin
[MHz]
0.1 0.1 0.1 1 1 1 1 0.1 0.1 1 1 0.1 0.1 1 1 1 1
[dB]
-1.45
-3.04
-3.08
-2.00
-15.00
-0.83 2.00
-1.91
-3.16
-0.53
-13.13
-2.57
-2.64
-1.51
-14.77
-0.73
-1.20 30 200 1 4 8 12 17 Freq. Frequency Range:
200 MHz 1:
1000 MHz 2:
3:
4 GHz 8 GHz 4:
12 GHz 5:
17 GHz 6:
7:
26,5 GHz All not in the table noted test results are more than 20 dB below the relevant limits. All other not noted test plots do not contain significant test results in relation to the limits. TEST RESULT (Transmitter): The unit DOES meet the FCC requirements. Comment: see attached diagrams Test equipment used: ETS 0125, ETS 0340, ETS 0271 ETS Dr. Genz GmbH, Germany Page 21 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.6 Minimum 6 dB Bandwidth The analyzer ResBW was set to 100 kHz. For each RF output channel investigated, the spectrum analyzer center frequency was set to the channel carrier. A PEAK reading was taken, two markers were set 6 dB below the maximum level on the right and the left side of the emission. The 6 dB bandwidth is the frequency difference between the two markers. 6 dB Bandwidth Test conditions Tnom= 23C Vnom = 120 V Channel A 16.593 MHZ Channel B 16.593 MHz Channel C 16.593 MHz Measurement uncertainty
< 10 Hz Limits:
Frequency Range MHz 902 - 928 2400 2483,5 5725 5850 Limits min 500 kHz min 500 kHz min 500 kHz Test equipment used:
ETS 0125, ETS 0271 Comment:
see attached diagram ETS Dr. Genz GmbH, Germany Page 22 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.7 Peak Power Spectral Density Peak Power Spectral density is measured at low, middle and high channel. The peak output power is measured with a measurement bandwidth of 10 MHz and displayed on diagram together with Peak Power Spectral Density result which was measured with a bandwidth of 3 kHz, appreciate frequency span and sweeptime. Test conditions Tnom= 23C Vnom = 120 V Peak Power Spectral Density (3kHz) Channel A
[dBm]
-22.10 Channel B
[dBm]
-21.19 Channel C
[dBm]
-19.29 Measurement uncertainty
< 3 Hz Limits:
Frequency Range MHz 902 - 928 2400 2483,5 5725 5850 dBm 8 8 8 Test equipment used:
Comment:
ETS 0125, ETS 0340 see attached diagrams ETS Dr. Genz GmbH, Germany Page 23 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH 3.8 Conducted Emission at (AC) Power Line For an intentional radiator which is designed to be connected to the public utility (AC) power line, the radio frequency voltage that is conducted back onto the AC line on any frequency or frequencies within the band 150 kHz to 30 MHz shall not exceed the limits in the table bellows with this provision shall be based on the measurement of the radio frequency voltage between each power line and ground at the power terminals. This measurement was transact first with instrumentation using an average and peak detector and a 10 kHz bandwidth. If the peak detector achieves a calculated level, the measurement is repeated by an instrumentation using a quasi-peak detector. Frequency 150 kHz Level quasi-peak lower limit line average lower limit line Limits:
Frequency of Emission (MHz) Conducted Limit (dBuV) 0.15-0.5 0.5-5 5-30 Quasi Peak 66 to 56 56 60 Average 56 to 46 46 50 Test equipment used:
ETS 0003, ETS 0040, ETS 0109, ETS 0125 Comment:
see attached diagram ETS Dr. Genz GmbH, Germany Page 24 of 25 Registration number: W6M20402-5017-C-2 ELECTRONIC TECHNOLOGY SYSTEMS DR.GENZ GMBH Appendix A B C D E F G Pictures Peak Output Power Spurious Emissions radiated - Transmitter operating Spurious Emissions conducted - Transmitter operating Maximum 6 dB Bandwidth Peak Power Spectral Density Conducted Emission at (AC) Power Line ETS Dr. Genz GmbH, Germany Page 25 of 25 Registration number: W6M20402-5017-C-2
1 2 | TestRpt2 802 11g | Test Report | 1.66 MiB | January 04 2004 |
Ref Lvl Ref Lvl 19 dBm 19 dBm 9 dB Offset 1MAX 10 0
-10
-20
-30
-40
-50
-60
-70
-80 Marker 1 [T1]
-37.37 dBm 2.40018036 GHz RBW VBW SWT 100 kHz 100 kHz 20 ms RF Att 20 dB Unit dBm 1 [T1] -37.37 dBm 2.40018036 GHz 1 [T1] 29.31 dB 6.85370741 MHz 1 A IN1 1MA 1 F1 6 MHz/
Span 60 MHz Center 2.4 GHz Title:
Date: 8.FEB.2004 21:04:33 11g ch1 co ndu cted b andedg e
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2005-07-22 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II Permissive Change |
2 | 2004-03-19 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2005-07-22
|
||||
1 2 |
2004-03-19
|
|||||
1 2 | Applicant's complete, legal business name |
Sercomm Corporation
|
||||
1 2 | FCC Registration Number (FRN) |
0015548027
|
||||
1 2 | Physical Address |
8F, No. 3-1, YuanQu St, NanKang
|
||||
1 2 |
Taipei
|
|||||
1 2 |
Taipei, N/A
|
|||||
1 2 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
h******@americanTCB.com
|
||||
1 2 |
t******@ets-bzt.com
|
|||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
P27
|
||||
1 2 | Equipment Product Code |
AP51GA
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
N****** W****
|
||||
1 2 | Title |
Engineer
|
||||
1 2 | Telephone Number |
886-2******** Extension:
|
||||
1 2 | Fax Number |
886-2********
|
||||
1 2 |
N******@SERCOMM.COM
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
Sporton International Inc.
|
||||
1 2 |
ETS Dr, Genz Taiwan PS Co., Ltd.
|
|||||
1 2 | Name |
J**** H******
|
||||
1 2 |
S**** C****
|
|||||
1 2 | Physical Address |
No. 52, Hwa Ya 1st Rd
|
||||
1 2 |
6F., No 58, Lane 188 Ruey Kuang Road, Neihu
|
|||||
1 2 |
Taoyuan Hsien, 333
|
|||||
1 2 |
Taipei, 114
|
|||||
1 2 |
Taiwan
|
|||||
1 2 |
South Korea
|
|||||
1 2 | Telephone Number |
+886 ******** Extension:
|
||||
1 2 |
+886-******** Extension:
|
|||||
1 2 | Fax Number |
+886 ********
|
||||
1 2 |
+886-********
|
|||||
1 2 |
t******@sporton.com.tw
|
|||||
1 2 |
s******@ets-bzt.com.tw
|
|||||
app s | Non Technical Contact | |||||
1 2 | Firm Name |
ETS Dr, Genz Taiwan PS Co., Ltd.
|
||||
1 2 | Name |
R**** H******
|
||||
1 2 | Physical Address |
6F., No 58, Lane 188 Ruey Kuang Road, Neihu
|
||||
1 2 |
Taipei, 114
|
|||||
1 2 |
South Korea
|
|||||
1 2 | Telephone Number |
+886-******** Extension:
|
||||
1 2 | Fax Number |
+886-********
|
||||
1 2 |
r******@ets-bzt.com.tw
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
1 2 | Yes | |||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Office Connect 108Mbps 11g PoE Access Point | ||||
1 2 | Wireless Internet Access Server Applicance | |||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Class II Permissive Change | ||||
1 2 | Original Equipment | |||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Power Output listed is Conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 2 | The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
SPORTON International Inc
|
||||
1 2 |
Eurofins Product Service GmbH
|
|||||
1 2 | Name |
K****** L********
|
||||
1 2 |
R****** K****
|
|||||
1 2 | Telephone Number |
886-2******** Extension:
|
||||
1 2 |
49-33********
|
|||||
1 2 | Fax Number |
886-2********
|
||||
1 2 |
49-33********
|
|||||
1 2 |
k******@sporton.com.tw
|
|||||
1 2 |
r******@eurofins.de
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 20 | 2412.00000000 | 2462.00000000 | 0.0650000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0650000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC