Gemtek - P520 - UG - v2
Gemtek - P520 - UG - v2
P-520
User’s Guide
Revision 2.4 September 22, 2005
Notice
Gemtek Systems reserves the right to change specifications without prior notice.
While the information in this manual has been compiled with great care, it may not be deemed an assurance of
product characteristics. Gemtek Systems shall be liable only to the degree specified in the terms of sale and
delivery.
The reproduction and distribution of the documentation and software supplied with this product and the use of its
contents is subject to written authorization from Gemtek Systems.
Trademarks
The product described in this book is a licensed product of Gemtek Systems Holding BV.
Microsoft, Windows 95, Windows 98, Windows Millennium Edition, Windows NT, Windows 2000, Windows XP,
and MS-DOS are registered trademarks of the Microsoft Corporation.
Contents
Copyright ............................................................................................................................................. 3
Notice .................................................................................................................................................. 3
Trademarks ......................................................................................................................................... 3
National Radio Regulations................................................................................................................. 3
FCC Warning....................................................................................................................................... 4
R&TTE Compliance Statement ........................................................................................................... 4
CONTENTS ............................................................................................................................................ 5
ABOUT THIS GUIDE.............................................................................................................................. 7
Purpose ............................................................................................................................................... 7
Prerequisite Skills and Knowledge...................................................................................................... 7
Conventions Used in this Document ................................................................................................... 7
Help Us to Improve this Document! .................................................................................................... 7
Service & Support ............................................................................................................................... 7
Gemtek Systems Technical Support................................................................................................... 7
CHAPTER 1 – INTRODUCTION ............................................................................................................ 8
Product Overview ................................................................................................................................ 8
Management Options .......................................................................................................................... 9
Web Interface...................................................................................................................................9
SNMP Management ........................................................................................................................9
Gemtek Management System .........................................................................................................9
P-520 Features.................................................................................................................................... 9
Operating Modes............................................................................................................................... 10
Antenna Diversity .............................................................................................................................. 11
CHAPTER 2 – INSTALLATION ........................................................................................................... 13
The Packaging Contents ................................................................................................................... 13
System Requirements ....................................................................................................................... 13
Hardware Introduction ....................................................................................................................... 14
Front Panel: LEDs .........................................................................................................................14
Rear Panel .....................................................................................................................................15
A Look Inside .................................................................................................................................16
Hardware Installation......................................................................................................................... 18
Attaching the Access Point to the Wall..........................................................................................18
Removing the Access Point from the Wall ....................................................................................19
Initialization........................................................................................................................................ 20
Software Introduction: KickStart ....................................................................................................20
Access your P-520 Access Point...................................................................................................20
Reset to the Factory Default Settings ............................................................................................... 23
CHAPTER 3 – QUICK SETUP ............................................................................................................. 25
Setup Wizard..................................................................................................................................... 25
CHAPTER 4 – REFERENCE MANUAL............................................................................................... 34
Web Interface .................................................................................................................................... 34
Configuration ..................................................................................................................................... 36
Configuration | Settings Summary .................................................................................................36
Configuration | Identity ...................................................................................................................36
Configuration | Local Area Network | Network Setup ....................................................................37
Configuration | Local Area Network | Virtual LAN..........................................................................38
Configuration | Wireless | Basic Settings.......................................................................................39
bold Menu commands, buttons and input fields are displayed in bold
code File names, directory names, form names, and system-generated output
such as error messages are displayed in constant-width type
<value> Placeholder for certain values, e.g. user inputs
Chapter 1 – Introduction
Thank you for choosing the Gemtek Systems 54Mbps Operator Access Point model P-520.
The Gemtek Systems P-520 is a Carrier-Grade Wi-Fi Access Point designed to provide reliable and
secure wireless access to an operator network or enterprise LAN. Theft-proof mounted to a wall or
ceiling the access point can be fully configured and controlled from a central management system
minimizing the need for an engineer to physically access the unit once it has been installed.
Product Overview
High Performance for Maximum Coverage
The Gemtek Systems P-520 Operator Access Point provides quality connectivity for Wi-Fi networks.
Designed to support even the largest of Hot Spots, this AP combines high receiver sensitivity and
proven antenna technology to maximize coverage.
Total Management
The P-520 Operator Access Point simplifies the set-up, operation, control and management of public
access networks. The AP can be remotely managed via HTTP or SNMP. Auto-channel selection and
integrated site survey utilities help administrators to optimize cell planning.
Security
P-520 supports various state-of-the-art security mechanisms like WPA, Access Control Lists,
802.1x/EAP authentication and Layer 2 User Isolation. The User Isolation feature can effectively
prevent peer-to-peer communication between client stations. The AP is designed for wall mount with
integrated theft-protection.
Management Options
There are several managing and monitoring interfaces available to the operator to configure and
manage the P-520 on your network:
Web-browser Interface
SNMP Management (SNMP v1, v2c)
Gemtek Management System (GMS)
This user manual provides detailed description of Web and SNMP management option.
Web Interface
The Web-browser interface (also known as the HTTP interface) provides easy access to configuration
settings and network statistics from any computer in the network. Use the Web browser interface
through your LAN (switch, hub, etc.), over the Internet, or with a “crossover” Ethernet cable connected
directly to your computer’s Ethernet Port.
SNMP Management
In addition to the Web interface, you can also manage and configure a P-520 using the Simple
Network Management Protocol (SNMP). SNMP enables network administrators to manage network
performance, find and solve network problems, and plan for network growth.
In order to manage the device you have to provide your Network Management
System software with adequate MIB files. Please consult your management
software manuals on how to do that.
P-520 Features
IEEE 802.11g/b Access Point,
Wi-Fi certified
Integrated high-gain diversity antennas
Adjustable output power, up to 20dBm
Power-over-Ethernet support, IEE 802.3af compliant
Theft protection system
802.1x/EAPoLAN
WPA (PSK, TKIP)
Seamless roaming (IAPP support)
Virtual local area network support (VLAN)
Remote management, remote updates
Layer 2 Isolation (disable peer-to-peer traffic)
ACL (Access Control List)
DHCP client
Remote software update
SNMPv1, SNMPv2, incl. traps, MIB-II, IEEE-802.11, Gemtek general Private MIB
Operating Modes
The P-520 Access Point can work in different operating modes:
Access Point with WDS (Wireless Bridge and Wireless Repeater) mode:
A WDS (Wireless Distribution System) allows you to create a wireless network infrastructure.
Normally, the access points must be connected with a wire (LAN), which is generally an Ethernet
connection in business applications. Once connected, these access points create wireless cells
allowing a wireless connection. The WDS feature allows the access points to be wirelessly connected
to another access point, eliminating the need to the wired connection between them. Two WDS
configurations are described in the following pictures: wireless bridge and wireless repeater.
Wireless Bridge:
The first use of the WDS, Wireless Bridge mode is to create the wireless bridge between two or
more wired networks, for example networks in different buildings with no wired connections between
them. All APs in a WDS have to be configured for the same radio channel and must be configured
with their WDS partner AP BSSIDs (MAC addresses). The data being transported is bridged
transparently; i.e., the data received by the LAN station is identical to data that would be received if
both LAN stations had been connected to the same LAN subnet.
Antenna Diversity
The P-520 Operator Access Point uses antenna diversity to select the best reception signal at the two
integrated antennas. Antenna diversity counters the adverse effects of multi-path fading and antenna
pattern nulls and reduces the packet error rate.
The main antenna (at internal connector J4) is used for transmission whereas both antennas, main
and aux, can receiving signals. Receive diversity examines only packets directed at the AP. A count
of frames received consecutively with FCS errors is compared to the configured threshold value.
When this value is reached, the receive antenna used is switched to the other antenna. If a directed
frame is received without errors the error count is reset back to zero.
Wireless Repeater:
The other use of the WDS, Wireless Repeater mode is to extend wireless area coverage between
wired and wireless networks. This mode is normally used in large, open areas, where pulling a wire is
prohibited or not cost effective and in residential circumstances. By settings up the BSSIDs (MAC
addresses) between AP’s WDS partners, stations can intersect with any AP of this BSSID and move
between the coverage of both APs.
In both cases, the P-520 acts as a network bridge between wireless and wired networks. All data
received by the P-520 on its wireless or Ethernet interface is broadcast on the wireless interface to all
connected devices that are authorized in the ACL (access control list).
Chapter 2 – Installation
This chapter provides installation instructions for the hardware and software components of the P-520
Operator Access Point. It also includes the following information:
The Packaging Contents
System Requirements
Hardware Introduction
Hardware Installation
If any of these items are missing or damaged, please contact your reseller or
Gemtek Systems sales representative.
System Requirements
The management of the P-520 is independent of your operating system. You will need a computer
that is connected to the same IP network as the P-520 (via Ethernet) and the HTML browser (e.g.
Internet Explorer, Netscape, Opera).
A Windows operating system is required for installing and using the KickStart utility delivered with the
product CD.
For setting up the integrated 802.1x/EAP based access control function, you need to provide a
connection to a Gemtek Systems access controller or a 3rd party RADIUS server.
Hardware Introduction
Front Panel: LEDs
The Operator Access Point has three LED’s located on its front.
1. Power LED
Rear Panel
P520
1. MAC Address of the P-520
This label shows the Wireless LAN MAC which
MAC:00904B111698 1
coincide with LAN MAC address of the device. You
can determine the Wireless LAN MAC address by
using the KickStart.
A Look Inside
Open the housing of the Access Point by pressing the spring latches on the bottom back side of the
access point as shown:
Looking inside the P-520 you will find some important points:
1. Power Connector Plug for external 5V DC
1 2 3 6
power supply. For use only when Power-over-
Ethernet is not available. We advise to use either
the external 5V power supply OR Power-over-
Ethernet but not both in parallel.
You can feed the Ethernet cable, external power supply or antenna cable for additional external
antennas in two ways:
Through the top cable inlet
Through the bottom cable inlet
Hardware Installation
Carefully select the ideal position for your Access Point by considering the following
recommendations:
The length of the Ethernet cable that connects the Access Point to the network must not exceed
100 meters.
Place the Access Point in a dry, clean location as far from the ground as possible, such as at the
top of a wall, keeping clear of metal obstructions.
Place the Access Point away from transformers, heavy-duty motors, fluorescent lights, microwave
ovens, refrigerators, or other equipment that could cause radio signal interference.
Locate the AP(s) so that the primary lobe provides coverage where it is required.
Don't cover the Access Point with material that absorbs the radio signal (e.g. wooden paneling,
walls).
Step 4 Move the housing slightly downward and press until the spring latch is locked in place.
The P-520 Access Point is now securely mounted onto the wall and cannot be
removed without special tools.
Step 5 Open the housing of the Access Point and connect an Ethernet cable to the RJ45
socket. Run the cable to the desired cable inlet then close the housing.
Step 6 Connect the twisted pair LAN cable to a Power-over-Ethernet device (switch or
injector). At least the power LED and the LAN link LED should light up.
Step 2 Release the housing from the wall-mounting clamp by carefully pressing the spring
latch in the center of the device (unit 5 in the
Figure 4 – Looking Inside the P-520) using the point of the disassembling tool:
Initialization
The following paragraphs describe how to access the web configuration interface of the Gemtek
Systems P-520. After unpacking and connecting the product for the first time it responds to either the
default IP address 192.168.2.2/255.255.255.0 or to a dynamic IP address given by your local DHCP
server. In the later case you need to locate the dynamic IP address of the P-520 with the KickStart
utility.
Step 2 Select your access point and right click. Select Open WEB item to launch the web
management interface through the http connection:
Step 3 Enter the P-520 administrator login details to access the web management interface.
The default administrator log on settings for all access point interfaces are:
User Name: admin
Password: admin01
Step 4 After successful administrator log on you will see the main page of the access point’s
web interface:
In the center of the screen a menu is displayed with links to the six different setup areas:
Configuration
Status
Setup Wizard
Update
Home
Contact
If you have mis-configured your device in such a way that you cannot get access to modify its
parameters via your Web browser you have two options to reset the device back to its factory default
settings.
Method one requires access to the internal Reset Button (item 3, in
Figure 4 – Looking Inside the P-520) as described in chapter: Hardware Introduction.
The second option is using the KickStart utility provided on the product CD. Note, that the
KickStart utility finds you access point is in the different subnet than your computer. To reset the
AP using KickStart follow the guideline below:
Step 1 Find you P-520 according the Ethernet MAC (Media Access Control) address in the
Found Devices table. The Ethernet MAC address is the serial number of the P-520
decremented by 1 (in hexadecimal).
Step 2 Select your access point and right click. Select Reset to Default item to set your
device back to the factory defaults.
Step 3 Enter the P-520 administrator login details as requested and click OK:
Step 4 After successful administrator log on your access point will set back to the default
status.
Refer to the appendix, section: C) Factory Defaults Values for the P-520 Access
Point for a detailed list of factory default values.
You can reset your AP even if the administrator password is lost. Use the KickStart utility to access
your AP with the default administrator account (login: admin, password: admin01). Follow the
guidelines below:
This default access function is available only 1 minute after the access point reboot.
Step 1 Find you P-520 according the IP address or Ethernet MAC (Media Access Control)
address in the Found Devices table. The Ethernet MAC address is the serial number
of the P-520 decremented by 1 (in hexadecimal).
Step 2 Select your access point and right click. Select Default Access item to access your
device with default administrator settings.
Step 3 Enter the Temporary IP Address for your AP, e.g. 192.168.2.28 (address should be
from the same subnet as local host) and click the OK:
Step 4 After successful entry of a temporary IP address you can access your access point with
the default administrator login. The access point system configuration (except
temporary IP address) is left unchanged.
Setup Wizard
To easily configure your access point step-by-step, choose the Setup Wizard from the main menu.
With this wizard you are able to configure the following settings:
Select the country and regulatory domain in which you will use the access point
Specify IP addresses (static or dynamic)
Define the radio policy (802.11b, 802.11g or Mixed)
Specify the network name (SSID) and the radio channel
Choose the wireless security settings (No encryption, WEP, WPA)
Configure the administrator’s password
Click Setup Wizard on the top menu and follow the instructions of the Basic Setup Wizard. Click the
Next button and a new page with country selection appears.
IP Address – specify the access point’s IP address [digit and dots]. When shipped from the factory or
reset to factory settings, the AP defaults to a static IP address of 192.168.2.2.
Subnet Mask – specify the access point’s subnet mask [digit and dots]. When shipped from the
factory or reset to factory settings, the AP defaults to a subnet mask of 255.255.255.0.
Gateway – specify the IP address of the access point’s gateway [digit and dots]. When shipped from
the factory or reset to factory settings, the AP defaults to a gateway IP address of 192.168.2.1.
Select Dynamic radio button, if need that IP address should be assigned by the DHCP server. The
static IP settings are displayed but have no affect on the network configuration:
Changing the radio policy could result in a loss of your connection when you are
using a wireless connection.
Mixed – select the mixed radio policy that allows both 802.11b and 802.11g modes.
G-only – select the 802.11g mode to connect 802.11g clients only.
B-only – select the 802.11b mode to connect 802.11g clients only.
Back – click return to the previous wizard page.
Next – click to continue the access point setup process.
Cancel – click to cancel the access point setup process.
To continue the setup wizard click the Next button.
Wireless Network Name (SSID) – specify the unique name for your wireless network.
Radio Channel – select the channel that the access point uses to transmit and receive information.
Back – click return to the previous wizard page.
Next – click to continue the access point setup process.
Cancel – click to cancel the access point setup process.
More about SSID and Radio channel settings see the respective chapter:
Configuration | Wireless | Basic Settings
Step 5 Security
Choose the security method to protect your data that only authorized network users could access the
network. You can choose WEP, WPA or No security for your device.
If no security is needed, simply choose the No Security radio button:
Key Length – choose the shared secret’s Key length from drop-down list [64-bits (10 characters)/
128-bits (26 characters)].
Network Key – specify the shared secret. 5 colon-separated HEX (0-9, A-F, and a-f) pairs (e.g.
00:AC:01:35:FF) for the 64-bits WEP encryption; 13 colon-separated HEX (0-9, A-F, and a-f) pairs
(e.g. 00:11:22:33:44:55:66:77:88:99:AA:BB:CC) for the 128-bits WEP encryption.
If you want to choose WPA encryption, just select the Wi-Fi Protected Access (WPA) radio button in
the Security page and click the Next button to configure the WPA encryption settings. You can now
specify the WPA password phrase:
Password – enter the new password value used for user authentication in the system [4-32 symbols].
Confirm Password – re-enter the new password to verify its accuracy.
Back – click to return to the main wizard page.
Next – click to continue the access point setup process.
Cancel – click to cancel the access point setup process.
The following paragraphs describe capabilities and configuration parameters of the web management
interface of the P-520 Operator Access Point. When the access point is installed you can access and
configure the device using a standard web browser.
This chapter includes the following subsections:
Configuration – to configure essential access point settings: identity, network setup, VLAN,
wireless settings, advanced wireless settings, wireless security, unauthorized configuration
settings, download/upload backup configuration, reset device to defaults, SNMP Traps, setup
GMS agent, NTP settings, automatic device reboot.
Status – to view the system summary, interface statistics, wireless settings, event reporting, to
find connected clients.
Setup Wizard – quick device setup wizard.
Update - device firmware update wizard.
Home – click and you will be redirected to the main Status Overview page.
Contact – click to view contact information.
Web Interface
The main menu of the web management is displayed at the top of the page after successfully logging
into the system (see the figure below). From this menu all essential configuration pages can be
accessed.
By default the Status menu is activated and the current AP Status Overview page is displayed.
Configuration
Configuration – identity data of the access point:
Settings Summary – the summary of main access point settings
Identity – name, location, operator of the access point
Local Area Network – network interface configuration:
Network Setup – IP address, netmask, gateway, Dynamic IP (DHCP)
Virtual LAN – VLAN settings
Wireless - wireless interface configuration:
Basic Settings – country selection, IAPP, SSID, band, channel selection and other settings
WDS Links – configuration of Wireless distribution Systems (bridge links)
Advanced settings – advanced wireless settings
Security – access point security settings:
Wireless Security – configure wireless security settings:
Client Isolation – deny or grant access between clients
Access Control List (ACL) – access control default policy, static ACL, access control
by MAC address
RADIUS Servers – RADIUS servers IP, port and other settings
Wired Equivalent Privacy (WEP) – WEP security
802.1x Security – 802.1X network authentication
Wi-Fi Protected Access (WPA) – WPA security (encryption and authentication)
Management Security – configure access of your access point
System – access point system settings:
Backup/Restore – reset configuration to factory defaults values and/or reboot, download or/and
upload system backup configuration
GMS Agent – setup the GMS agent to communicate with GMS server
SNMP Traps – SNMP traps settings
NTP Settings – configure the NTP service
Automatic Reboot – configure the automatic P520 reboot.
Status
Statistics/Usage – view system status:
Status Overview – the summary of the access point status
Interface Statistics – Local Loopback, LAN Ethernet, Internal Radio, WAN Ethernet statistic
Wireless Statistics – wireless statistics
Event Reporting – the log of important events
Clients – scan for access points and connected clients:
Wireless Clients – connected users’ statistics list
Access Points – discover access points with internal radio
WDS Links – WDS links’ statistics
Setup Wizard
Update
In the following sections, short references for all menu items are presented.
Configuration
Configuration | Settings Summary
The Settings Summary page shows important information of the P-520: its IP address, SSID, wireless
security settings and access control status. The page is not configurable but displays the current
system configuration only.
Configuration | Identity
The identity data of the access point are displayed here. You can use the first three fields Name,
Location, Contact to describe the access point. These fields do not influence the behavior of the
access point. But are for information purposes only.
IP Address – specify the access point’s IP address [digit and dots]. When shipped from the factory or
reset to factory settings, the AP defaults to a static IP address of 192.168.2.2.
Subnet Mask – specify the access point’s subnet mask [digit and dots]. When shipped from the
factory or reset to factory settings, the AP defaults to a subnet mask of 255.255.255.0.
Gateway – specify the IP address of the access point’s gateway [digit and dots]. When shipped from
the factory or reset to factory settings, the AP defaults to a gateway IP address of 192.168.2.1.
If you change the IP address manually, make sure that the chosen IP address is
unused and belongs to the same IP subnet as your wired LAN, otherwise you will
loose the connection to the P-520 from your current PC. If you enable the DHCP
client via a Web browser, the browser will loose the connection after rebooting,
because the IP address assigned by the DHCP server is not predictable.
If Dynamic is selected the static IP settings are displayed but have no affect on the network
configuration. The dynamic IP address and gateway address as assigned by the DHCP server are
applied to the system after restart.
To find your P-520 with dynamic IP settings use a utility such as Gemtek Systems
KickStart.
To define a VLAN membership on the access point, select the checkbox and enter the VLAN
identifier:
VLAN id – specify the ID for your VLAN network [1 to 4094]. Wireless client devices connected to the
AP are grouped into this VLAN.
Cancel – restore all previous values.
Apply – save changed configuration.
When VLAN is enabled you can view this interface statistic in Status | Interface Statistics page.
There you can see such parameters as interface status, InOctets, InUcast, InMcast, OutOctets,
OutUcast and OutMcast.
Country – click on the select country… link and choose from drop-down list the country in which you
will use the AP. According to the country chosen the regulatory domain settings change. You are not
allowed to select radio channels and RF output power values other the permitted values for your
country and regulatory domain. See also appendix B) Regulatory Domain/Channels.
Regulatory Domain – displays the regulatory domain according selected country [ETSI/FCC]. Not
configurable.
IAPP – select this checkbox to enable seamless roaming of client stations between P-520 APs.
By using the Inter-Access Point Protocol (IAPP) roaming, a client can be hand-over between access
points when changing its physical location. The IAPP protocol is used to ensure all relevant session
information is delivered to the new AP to which the client is moving. IAPP roaming is compatible with
other Gemtek Systems products.
Look at the scheme for more details about IAPP roaming:
RADIUS Server
AP1 AP2
IAPP Roaming
Client
The wireless client is switched from AP1 to AP2 when entering the coverage area of the new access
point (AP2). The roaming is performed without client re-authentication. The IAPP protocol ensures to
inform the old AP1 of the new client association. The AP1 then stops the client RADIUS session, and
the AP2 starts the client’s session with the RADIUS.
IAPP roaming requires that all access points share the same SSID.
Wireless Network Name (SSID) – is a unique name for your wireless network [1-32 symbols]. The
default SSID is "P520" but you should change this to a personal wireless network name. The SSID is
important for client stations when connecting to the access point. All client stations must have their
client SSID settings configured and must use the same SSID.
Band – click on the change policy… link and choose the policy of internal radio mode [Mixed/G-
only/B-only].
Changing the radio policy could result in a loss of your connection when you are
using a wireless connection.
Radio Channel – select the channel that the access point uses to transmit and receive information.
Multiple frequency channels are used to avoid interference between nearby access points. If you wish
to operate more than one access point in overlapping coverage areas, we recommend a distance of
at least four channels between the chosen channels. For example, for three access points in close
proximity choose channels 1, 6 and 11.
Before changing radio settings manually, verify that these settings comply with your
national regulations. At all times, it is the responsibility of the end-user to ensure
that the installation complies with local radio regulations. Refer to the appendix, B)
Regulatory Domain/Channels for more details.
Click on the autochannel… link and a pop-up window with auto channel settings will appear. You can
now select a list of preferred channels:
The auto-channel function is a great technique to minimize interference between access points. With
auto-channel selection enabled the P-520 will regularly scan the air for neighboring access points and
selects the channel with the least expected interference. The range of scanned channels can be
limited by the administrator.
Do not use auto-channels when using WDS, otherwise the access points will not be
able to communicate between each other wirelessly.
PRISM Nitro™ – increases the performance in 802.11g and mixed-mode environments. The Nitro
technology provides up to 50% more throughput in g-only networks; up to 300% more in mixed-mode
(802.11b and 802.11g) networks by eliminating collisions and employing packet bursting technology.
A maximum of 140Mbps throughput can be reached by selecting a packet burst lengths of 1500µs:
Off – switch off PRISM Nitro™,
Minimum – burst length is 650 µs,
Medium – burst length is 1000 µs,
Maximum – burst length is 1500 µs;
Broadcast SSID – when selected your AP’s SSID is visible during network scans on a wireless
station. When unselected, the AP’s SSID is not visible and not broadcasted to wireless stations.
Domain Max Output Power – indicates the maximal output power according selected regulatory
domain. Cannot be modified.
Antenna Gain – is the gain of the connected antenna in relation to an isotropic radiated power (dBi).
Cannot be modified.
Wireless Card Output Power – select the wireless card output power in dBm. Wireless card output
power list will vary according selected regulatory domain.
Total Output Power (EIRP) – is the maximum radiated output power of the antenna (strength of the
radio signal transmitted). Cannot be modified. It is also referred to as the maximum EIRP (Effective
Isotropic Radiated Power) value (dBm). The higher is the number, the stronger the signal is.
Cancel – restore all previous values.
Apply – save changed configuration.
Enable – select if need to add the access point to Wireless Distribution System.
Peer address – displays the MAC address of the access point.
Name – specify the name of chosen WDS Link.
When the required WDS Link is selected, enter the name of chosen WDS Link:
OK – saves added new WDS Link in the WDS Links for internal radio table.
Cancel – close the Add Wireless Distribution Link window without saving information.
AP2
Wired LAN
Wired LAN
Step 1 Choose the wireless MAC address of AP2 in the web configuration interface of AP1,
menu WDS Links.
Step 2 Choose the wireless MAC address of AP1 in the web configuration interface of AP2,
menu WDS Links.
Step 3 Select the same radio channel and the data rates for both APs using the Wireless
Settings menu.
AP1
Wired LAN
AP3
WDS Link
Step 1 Choose the wireless MAC address AP2 and AP3 in the AP1 Web interface WDS
Links menu under the Configuration.
Step 2 Choose the wireless MAC address AP1 in the AP2 Web interface WDS Links menu
under the Configuration.
Step 3 Choose the wireless MAC address AP1 in the AP3 Web interface WDS Links menu
under the Configuration.
Step 4 Select the same radio channel for both APs using the Wireless Settings menu under
the Configuration.
Operational Rate Set – this setting specifies the set of Supported and Basic data rates at which the
station may transmit data. Each rate shall be within the range from 2 to 127, corresponding to data
rates in increments of 500 kb/s from 1 Mb/s to 63.5 Mb/s, and shall be supported for receiving data.
This value is reported in transmitted Beacon, Probe Request, Probe Response, Association Request,
Association Response, Reassociation Request, and Reassociation Response frames, and is used to
determine whether a BSS with which the station desires to synchronize is suitable.
Operational rate set is defined as hexadecimal string where highest bit of each digit represents if
Supported rate is the Basic rate (basic rate = supported rate | 0x80, where “|” means “bitwise or”
operation).
Beacon Period – this setting specifies the amount of time between beacons in milliseconds. A beacon is a
packet broadcast by the access point to synchronize the wireless network.
RTS Threshold – this setting specifies the maximum packet size beyond which the Wireless LAN
Card invokes its RTS/CTS mechanism. Packets that exceed the specified RTS threshold trigger the
RTS/CTS mechanism. The NIC transmits packets smaller than this threshold without using RTS/CTS
[[0-2347] default: 2347 (2347 means that RTS is disabled)].
Fragmentation Threshold – the fragmentation threshold, specified in bytes, determines whether
packets will be fragmented and at what size. On an 802.11 wireless LAN, packets exceeding the
fragmentation threshold are fragmented, i.e., split into, smaller units suitable for the circuit size.
Packets smaller than the specified fragmentation threshold value are not fragmented [[256-2346]
default: 2346 (2346 means that fragmentation is disabled)].
Enable TX and RX Diversity – choose this option to enable or disable the antenna diversity.
Use the antenna diversity to select the best reception signal at the two integrated antennas. The
main antenna is used for transmission whereas both antennas, primary and secondary, can receive
signals. Receive diversity examines only packets directed at the AP. A count of frames received
consecutively with FCS errors is compared to the configured threshold value. When this value is
reached, the receive antenna used is switched to the other antenna. If a directed frame is received
without errors the error count is reset back to zero.
If the antenna diversity option is enabled, the Antenna Used To Transmit and Antenna
Used To Receive settings have no effect.
Antenna Used To Transmit – choose the single antenna for transmitting [primary/secondary].
Antenna Used To Receive – choose the single antenna for receiving [primary/secondary].
Cancel – to restore all previous values.
Apply – to save changed configuration.
You can further create your own access list if you need to define special access rules for specific
network devices. The access control list is based on the network device's MAC address. In the
access control table, you need only specify the network device MAC address and its access policy
(accept/reject) with the new rule.
Add – click to add ACL rule.
Delete – click to remove selected ACL rule.
Back – to return to the main Wireless Security Settings page.
Cancel – to restore all previous values.
Apply – to save changed configuration.
Click the Add button to add new ACL rule and new pop-up window Add a Client appears. The
definition of new rules is shown in the following example:
MAC Address – specify the MAC address of the device you want to add to the ACL. The format is a
list of colon separated hexadecimal numbers (for example: 00:00:78:0A:CD:FF).
Access – select the permission of the rule to determine whether the specified network device shall be
accepted or rejected by the access point.
OK – saves added new ACL rule into configuration.
Cancel – close the Add a Client window without saving information.
Click the Delete button to remove desired ACL rule, and new pop-up window Delete Clients appears.
You can select the MAC addresses that should be deleted as shown on the following example:
RADIUS is an authentication, authorization and accounting (AAA) system. RADIUS enables operators
to maintain a very large database of users. By using RADIUS, operators can implement policy-based
management of their subscriber base. RADIUS further enables the collection of usage data (e.g.
amount of time, amount of transferred bytes, and session time) for accounting purposes.
Use the Configuration | Security | Wireless Security| RADIUS Servers menu to configure the
RADIUS servers’ list and settings. By default there is no RADIUS server on the system:
Re-authentication Time – specify the number of seconds after which the access point re-
authenticates client stations [0-2147483647]. The default value is 3600 seconds. If 0 is entered it
means that stations will not have to re-authenticate as long as they are connected.
IP address – displays RADIUS server’s IP address.
Port Number – displays RADIUS server’s port number.
Type – displays RADIUS server’s type.
Add – click to add RADIUS server.
Delete – click to remove selected RADIUS server.
Back – to return to the main Wireless Security Settings page.
Cancel – to restore all previous values.
Apply – to save changed configuration.
In the default configuration no RADIUS servers are define on the system. Click the Add button to add
new RADIUS server and new pop-up window Add RADIUS server appears. You can define the
RADIUS server’s parameters as shown on the following example:
Secret – specify the shared secret string that is used to encrypt data frames used for RADIUS servers
[4-64 symbols].
Confirm Secret – re-enter the RADIUS secret to verify its accuracy.
OK – saves added new RADIUS server into configuration.
Cancel – close the window without saving information.
Click the Delete button to delete desired RADIUS server, and new pop-up window Delete RADIUS
Servers appears. You can select the RADIUS server that should be deleted as shown on the
following example:
Enter the encryption key to be used to encrypt and decrypt wireless traffic:
64-bits – specify pre-shared key as 5 colon-separated HEX (0-9, A-F, and a-f) pairs (e.g.
00:AC:01:35:FF).
128-bits – specify pre-shared key as 13 colon-separated HEX (0-9, A-F, and a-f) pairs (e.g.
00:11:22:33:44:55:66:77:88:99:AA:BB:CC).
Back – return to the main Wireless Security Settings page.
Cancel – restore all previous values.
Apply – save changed configuration.
The same encryption key must also be entered into the WLAN card configuration of
the mobile clients.
Use the Configuration | Security | Wireless Security| 802.1x Security menu to setup the 802.1X
security settings. This security always uses dynamic WEP keys which length you can choose by
simply selecting the radio button.
To enable 802.1x security, select the checkbox and choose the desired Key Size and settings for
Rekeying:
Key Size and Group Rekeying unavailable when using WEP security.
Pre-shared Key – specify the pre-shared key for WPA security [8-63 characters].
Re-enter Pre-shared Key – re-enter pre-shared key to verify its accuracy.
The pre-shared key must match the one configured on your WLAN client stations.
WPA with RADIUS server makes use of external AAA (RADIUS) server to generate and exchange
dynamic WPA keys between P-520 and the client stations. To configure WPA with a RADIUS server
select the WPA with RADIUS server security method radio button and enter the Group Key Rekey
settings:
New Password – specify new password value used for user authentication in the system [4-32
characters].
Confirm Password – re-enter the new password to verify its accuracy.
Change Password – changes new specified administrator’s password.
The password is also the SNMP Read-write community string. If the password is
changed the SNMP community string will be changed as well.
Use Lock Access Point to prevent modifications to the current device configuration.
Backup Configuration allows you to download the current system configuration and save to a file.
Simply click the Backup button and specify the file location and name.
Use GMS System – select this checkbox to enable association of the device with GMS server.
Use Persistent – select the checkbox to make a persistent connection to the GMS server. If enabled,
the connection to the GMS server will be kept persistent; if disabled, the connection will be
established and subsequently closed after all server responses are processed for every heartbeat
notification.
Timeout – specify the maximum number of seconds to wait for a response from the GMS server
before considering the connection as having timed out. Default: 60 seconds.
IP address – specify the IP multicast group address to listen on during automatic GMS server
discovery. Default: 224.0.6.128.
Port – specify the port to bind to when listening on an IP multicast group during automatic GMS
server discovery [1-56635]. Default: 45144.
Interface Name – specify the name of the interface to bind to when listening on an IP multicast group
during automatic GMS server discovery [default: br0]. The interface is optional, but it is highly
recommended to define it. If no interface is provided, GMS agent will try to bind on all interfaces. This
will succeed only if default or multicast route is configured on the system. Otherwise GMS agent will
keep trying to bind and report errors to system log.
It is not recommended to change default multicast settings. In case incorrect
settings are specified, the device will not be able to discover the GMS server
location.
Certificate Path – specify the name of GMS client certificate PKCS12 file [file name]. It should be
stored in /usr/etc/ directory on device.
Password – specify the password for certificate PKCS12 file [string]. Only used if the certificate key is
encrypted.
Identifier – specify the unique identifier used for client authentication [all ASCI characters].
Use Alarms – select the checkbox if need to enable the alarm gathering.
Level – specify the message level [emergency/alert/critical/error/warning/notice/info/debug].
Messages that have this level or any level of greater importance are considered alarms and are
reported to the RCMS agent. Default – errors.
URL – specify the URL of the GMS server that heartbeat notifications are sent to (and, subsequently,
server responses are read from and processed)
Interval – specify the interval, in seconds, between subsequent heartbeat notifications. Default: 30.
You can configure the device monitoring specifying the Object Identifier (OID) and the name of the
statistic to gather the information from. Simply click Add button under the table and specify settings:
To add a new trap host IP address for P-520 click the Add button and a new pop-up window Add
Trap Host IP Address appears:
To add the NTP host, click Add button under the NTP server’s table and a new pop-up window Add
NTP Server appears:
Click the Delete button to delete desired NTP hosts and a new pop-up window Delete NTP Server
appears. You can select the hosts’ IP addresses that should be deleted as shown on the following
example:
Enable Automatic Reboot – select this option if you want to activate Automatic Reboot function
and specify settings.
Reboot date (yyyy-mm-dd) – specify the reboot date value [year-month-day].
Reboot time (hh:mm) – specify the reboot time [hours:minutes].
Reboot every (hours) – specify the time period in hours for every next reboot [0-1000].
Cancel – click the button to cancel changes.
Apply – click the button to save automatic reboot settings.
Status
Status | Statistics/Usage | Status Overview
Use the Status | Statistics/Usage | Status Overview menu for a summary of status information of
your access point.
Uptime – indicates the time, expressed in hours, minutes and seconds since last reboot
[hours:minutes:seconds].
Wireless Clients – indicates the total number of currently connected client stations. Click on the
hyperlink Status | Clients | Wireless Clients to see more details for individual clients.
Packets Sent – indicates the data volume transmitted to the wireless LAN since reboot.
Packets Received – indicates the volume of data received since reboot.
Last Log – indicates the time when the access point has sent the most recent event message.
Highest Priority – shows the priority level of the last event
[Emergency/Alert/Critical/Error/Warning/Notice/Info/Debug].
RTS Success Count – displays the total of successfully received RTS packets.
RTS Failure Count – displays total of not received RTS packets.
ACK Failure Count – displays total of expected but not received ACK (acknowledgement) frames.
Received Fragment Count – displays total of each successfully received MPDU (MAC Protocol Data
Unit) of type Data or Management.
Received Multicasts Count – displays the total of MSDU, received with the multicast bit set in the
destination MAC address.
FCS Errors – displays count of FCS (Frame Check Sequence) errors in received MPDU.
WEP Undecryptable – displays the number of not decrypted frames.
Facility – indicates the unique identifier of the facility that generated the event. A facility can be a
hardware device, a protocol, or a module of the system software.
[Kernel/User/Security/Clock/LogAudit/LogAlert/System/Network/Wlan/management]
ID – indicates an internal number for the event.
Description – indicates description of the event.
Count – indicates the number of times this event has occurred.
Occurrence – indicates time when this event has occurred, in months, days and
hours:minutes:seconds since the access point was started.
Peer address – displays the MAC address of the remote WDS access point/bridge.
Name – shows the name of the WDS Link.
SSID – displays the SSID of the access point.
Data Rates – displays the data rates.
Channel – displays the radio channel for transmit and receive
Age – shows the age in seconds of the last information received from the remote AP. The age is reset
to 0 if any activity of this access point is detected.
RSSI – displays the Received Signal Strength Indication (RSSI) of the remote access point.
Update
We recommend to regularly check for new Software updates on the Gemtek
Systems website: http://www.gemtek-systems.com
To update your device firmware, use only the original Gemtek System firmware image and click the
update button on main menu. New Update Wizard pop-up window appears.
When the upload is completed successfully a confirmation message and the access point restarts.
Do not switch off and do not disconnect the P-520 from the power supply during the
firmware update process as this can damage the device.
Introduction
Another way to configure and monitor the access point (P-520) via a TCP/IP network is SNMP
(Simple Network Management Protocol).
SNMP is an application layer protocol that facilitates the exchange of management information
between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP)
protocol suite. SNMP enables network administrators to manage network performance, find and solve
network problems, and plan for network growth.
The SNMP agent and management information base (MIB) reside on the access point. To configure
SNMP on the AP, you define the relationship between the Network Management System (NMS) and
the SNMP agent (our AP). The SNMP agent contains MIB and Gemtek Systems private MIB
variables whose values the SNMP manager can request or change. A NMS can get a value from an
agent or store a value into the agent. The agent gathers data from the MIB, the repository for
information about device parameters and network data. The agent can also respond to a manager’s
requests to get or set data.
In order to manage the device you have to provide your Network Management
System software with adequate MIB files. Please consult your management
software manuals on how to do that.
SNMP Versions
The access point supports the following versions of SNMP:
SNMPv1—The Simple Network Management Protocol: A Full Internet Standard, defined in RFC
1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.)
Security is based on community strings.
Both SNMPv1 and SNMPv2c use a community-based form of security. The community of managers
able to access the agent's MIB is defined by an IP address access control list and password.
The Access Controller implementation of SNMP supports all MIB II variables (as described in RFC
1213) and defines all traps using the guidelines described in RFC 1215.The traps described in this
RFC are:
coldStart
A coldStart trap signifies that the SNMP entity, acting in an agent role, is reinitializing itself
and that its configuration may have been altered.
WarmStart
A WarmStart trap signifies that the SNMP entity, acting in an agent role, is reinitializing itself
and that its configuration is unaltered.
authenticationFailure
An authenticationFailure trap signifies that the SNMP entity, acting in an agent role, has
received a protocol message that is not properly authenticated.
linkDown
A linkDown trap signifies that the SNMP entity, acting in an agent role, recognizes a failure in
one of the communication links represented in the agent's configuration.
linkUp
A linkUp trap signifies that the SNMP entity, acting in an agent role, recognizes that one of
the communication links represented in the agent's configuration has come up.
SNMP Agent
The SNMP agent is integrated in your P-520 and responds to SNMP manager requests as follows:
Get a MIB variable—The SNMP agent begins this function in response to a request from the
SNMP manager. The agent retrieves the value of the requested MIB variable and responds to the
manager with that value.
Set a MIB variable—The SNMP agent begins this function in response to a message from the
SNMP manager. The SNMP agent changes the value of the MIB variable to the value requested
by the manager.
The SNMP agent also sends unsolicited trap messages to notify an SNMP manager that a significant
event has occurred (e.g. authentication failures) on the agent.
The SNMP Read-write community string is also the administrator’s password. If the
password is changed the SNMP community string will be changed as well.
P-520
get-request, get-next-reguest, get-bulk, set-request
get-response, traps
MIB
SNMP Agent
SNMP Manager
Appendix
B) Regulatory Domain/Channels
Configuration:
Identity
Name name
Location location
Contact contact information
Wireless
Basic Wireless Settings
Country US
Regulatory Domain FCC
Wireless Network Name (SSID) P520
Band Mixed
Radio Channel 6
PRISM Nitro™ Maximum
Broadcast SSID Selected
Advanced Wireless Settings
Operational Rate Set 82848B0C129618243048606C
Beacon Period 100
RTS Threshold 2347
Fragmentation Threshold 2346
Security
Wireless Security | Client Isolation
Use Client Isolation Not Selected
Wireless Security | Access Control
List (ACL)
Enable Access Control List Not Selected
BI Burundi NG Nigeria
KH Cambodia NU Niue
CM Cameroon NF Norfolk island
CA Canada MP Northern Mariana islands
CV Cape Verde NO Norway
KY Cayman islands OM Oman
CF Central African republic PK Pakistan
TD Chad PW Palau
CL Chile PS Palestinian territory, occupied
CN China PA Panama
CX Christmas island PG Papua new guinea
CC Cocos (keeling) islands PY Paraguay
CO Colombia PE Peru
KM Comoros PH Philippines
CG Congo PN Pitcairn
CD Congo, the democratic republic of the PL Poland
CK Cook islands PT Portugal
CR Costa Rica PR Puerto Rico
CI Côte d'ivoire QA Qatar
HR Croatia RE Réunion
CU Cuba RO Romania
CY Cyprus RU Russian federation
CZ Czech republic RW Rwanda
DK Denmark SH Saint Helena
DJ Djibouti KN Saint Kitts and Nevis
DM Dominica LC Saint Lucia
DO Dominican republic PM Saint Pierre and Miquelon
EC Ecuador VC Saint Vincent and the grenadines
EG Egypt WS Samoa
SV El Salvador SM San Marino
GQ Equatorial guinea ST Sao tome and Principe
ER Eritrea SA Saudi Arabia
EE Estonia SN Senegal
ET Ethiopia SC Seychelles
FK Falkland islands (malvinas) SL Sierra Leone
FO Faroe islands SG Singapore
FJ Fiji SK Slovakia
FI Finland SI Slovenia
FR France SB Solomon islands
GF French Guiana SO Somalia
PF French Polynesia ZA South Africa
TF French southern territories GS South Georgia and the south
sandwich islands
GA Gabon ES Spain
GM Gambia LK Sri Lanka
GE Georgia SD Sudan
DE Germany SR Suriname
GH Ghana SJ Svalbard and Jan Mayan
GI Gibraltar SZ Swaziland
GR Greece SE Sweden
GL Greenland CH Switzerland
GD Grenada SY Syrian Arab republic
GP Guadeloupe TW Taiwan, province of china
GU Guam TJ Tajikistan
GT Guatemala TZ Tanzania, united republic of
GN Guinea TH Thailand
GW Guinea-Bissau TL Timor-leste
GY Guyana TG Togo
HT Haiti TK Tokelau
HM Heard island and McDonald islands TO Tonga
VA Holy see (Vatican city state) TT Trinidad and Tobago
HN Honduras TN Tunisia
HK Hong Kong TR Turkey
HU Hungary TM Turkmenistan
IS Iceland TC Turks and Caicos islands
IN India TV Tuvalu
ID Indonesia UG Uganda
IR Iran, Islamic republic of UA Ukraine
IQ Iraq AE United Arab emirates
IE Ireland GB United kingdom
IL Israel US United states
IT Italy UM United states minor outlying islands
JM Jamaica UY Uruguay
JP Japan UZ Uzbekistan
JO Jordan VU Vanuatu
KZ Kazakhstan Vatican city state see holy see
KE Kenya VE Venezuela
KI Kiribati VN Viet nam
KP Korea, democratic people's republic VG Virgin islands, British
of
KR Korea, republic of VI Virgin islands, u.s.
KW Kuwait WF Wallis and Futuna
KG Kyrgyzstan EH Western Sahara
LA Lao people's democratic republic YE Yemen
LV Latvia YU Yugoslavia
LB Lebanon Zaire see Congo, the democratic
republic of the
LS Lesotho ZM Zambia
LR Liberia ZW Zimbabwe
LY Libyan Arab Jamahiriya
$ tftp <P-520_IP_address>
tftp> bin
tftp> put <fimage_p520.gsi.1.20.0319_16y> <password>
Sent 1377280 bytes in 51.6 seconds
tftp> quit
$
Glossary
D
Symbols: Datagram Self-contained, independent entity
of data carrying sufficient information to be
10BASET 10 Mbps/baseband/twisted pair. routed from the source to the destination
The IEEE standard for twisted pair Ethernet.
computer without reliance on earlier
802.11b The IEEE standards for the definition exchanges between this source and
of the Wireless high-speed (11Mbit) protocol destination computer and the transporting
for wireless communication. network." a self-contained, independent entity
of data carrying sufficient information to be
A routed from the source to the destination
computer without reliance on earlier
Authorization the process of determining what exchanges between this source and
types of activities a user is permitted to destination computer and the transporting
undertake. Usually, authorization is in the network. The term has generally been
context of authentication: once you have replaced by “packet”.
authenticated a user, they may be authorized
for different types of access or activity. DHCP Dynamic Host Configuration Protocol. A
service that lets clients on a LAN request
Authentication - Authentication is the process of configuration information, such as IP host
determining whether someone or something is, in
addresses, from a server.
fact, who or what it is declared to be.
DNS Domain Name System. The distributed
B name/address mechanism used in the
Internet. It comprises distributed online
backbone The primary connectivity databases that contain mappings between
mechanism of a hierarchical distributed human-readable names and IP addresses,
system. All systems, which have connectivity and servers, which provide translation services
to an intermediate system on the backbone, to client applications.
are assured of connectivity to each other. This
does not prevent systems from setting up Domain A part of the DNS naming hierarchy.
private arrangements with each other to Syntactically, an Internet domain name
bypass the backbone for reasons of cost, consists of a sequence of names (labels)
performance, or security. separated by periods (dots), e.g.,
“machine.company.com”. See DNS.
bandwidth Technically, the difference, in Hertz
(Hz), between the highest and lowest
frequencies of a transmission channel. E
However, as typically used, the amount of data Ethernet A common, 10Mbps local area
that can be sent through a given
network technology invented by Xerox
communications circuit. For example, typical
Corporation at the Palo Alto Research Center.
Ethernet has a bandwidth of 100Mbps.
Ethernet is a best-effort delivery system that
bps bits per second. A measure of the data uses CSMA/CD technology. Ethernet can be
transmission rate. run over thin wire coaxial cable (10BASE2),
thick wire coaxial cable (10BASE5), twisted
pair cable (10BASET), or fiber optic cable.
EIRP Effective Isotropic Radiated Power
Technical value that evaluates the strength of
receive signals
EPROM – EPROM (erasable programmable
read-only memory) is programmable read-only
memory (programmable ROM) that can be
erased and re-used.
F I
filter A device that selectively sorts signals and ICMP Internet Control Message Protocol. The
passes through a desired range of signals TCP/IP protocol used to handle errors and
while suppressing the others. This kind of filter control messages at the IP layer. ICMP is part
is used to suppress noise or to separate of the IP protocol. Gateways, routers and
signals into bandwidth channels. hosts use ICMP to send reports of problems
about datagrams back to the original source
firewall A system or combination of systems that sent the datagram.
that enforces a boundary between two or more
networks. interface One of the physical ports on the
router, including the Ethernet and
FLASH A new memory technology, which asynchronous ports.
combines the nonvolatile features of EPROM’s
with the easy in-system reprogramming of interface type The type (Ethernet or Point-to-
conventional volatile RAM. See EPROM. Point) of one of the interfaces on the router.
internet A collection of networks
G interconnected by a set of routers, which allow
gateway The original Internet term for what is them to function as a single, large virtual
network.
now called router or more precisely, IP router.
In modern usage, the term “gateway” and Internet (note the capital “I”) The largest
“application gateway” refers to systems, which internet in the world consisting of large
perform translation from some native protocol, national backbone networks (such as MILNET,
or physical data format to another. Examples NSFNET, and CREN) and a myriad of regional
include electronic mail gateways, which and local campus networks all over the world.
translate between X.400 and RFC 822 mail The Internet is a multiprotocol network, but
message formats. See router. generally carries TCP/IP.
M P
MAC (Media Access Control) The unique packet The unit of data sent across a network.
hardware number of a device connected to a “Packet” is a generic term used to describe
shared media. On an Ethernet it is the same units of data at all levels of the protocol stack,
interface as the Ethernet address. but it is most correctly used to describe
application data units. See datagram, frame.
metric A concept used to describe the cost of a
route across a network, the distance to the policy Organization-level rules governing
destination at the remote end of the route, or acceptable use of computing resources,
the capacity of the route. security practices, and operational procedures.
MIB A management information base (MIB) is POP3: POP3 (Post Office Protocol 3) is the
a formal description of a set of network objects most recent version of a standard protocol for
that can be managed using the Simple receiving e-mail. POP3 is a client/server
Network Management Protocol (SNMP). There protocol in which e-mail is received and held
are MIBs (or more accurately, MIB extensions) for you by your Internet server. Periodically,
for each set of related network entities that can you (or your client e-mail receiver) check your
be managed. mail-box on the server and download any mail.
POP3 is built into the Netmanage suite of
N Internet products and one of the most popular
e-mail products, Eudora. It's also built into the
name resolution The process of mapping a Netscape and Microsoft Internet Explorer
name into the corresponding address. See browsers.
DNS.
PPP: PPP (Point-to-Point Protocol) is a
NAT Network Address Translation, an Internet protocol for communication between two
standard that enables a local-area network computers using a serial interface, typically a
(LAN to use one set of IP addresses for personal computer connected by phone line to
internal traffic and a second set of addresses a server. PPP uses the Internet protocol (IP)
for external traffic. A NAT box located where (and is designed to handle others). It is
the LAN meets the Internet makes all sometimes considered a member of the
necessary IP address translations. NAT is TCP/IP suite of protocols. Relative to the Open
used for two main tasks – to provide a type of Systems Interconnection (OSI) reference
firewall by hiding internal IP addresses and model, PPP provides layer 2 (data-link layer)
enable a company to use more internal IP service. Essentially, it packages your
addresses. Since they're used internally only, computer's TCP/IP packets and forwards them
there's no possibility of conflict with IP to the server where they can actually be put on
addresses used by other companies and the Internet.
organizations.
PPP is a full-duplex protocol that can be used
network A computer network is a data on various physical media, including twisted
communications system, which interconnects pair or fiber optic lines or satellite
computer systems at various different sites. A transmission. It uses a variation of High Speed
network may be composed of any combination Data Link Control (HDLC) for packet
of LANs or WANs. encapsulation.
network address The network portion of an IP PPP is usually preferred over the earlier de
address. For a class A network, the network facto standard Serial Line Internet Protocol
address is the first byte of the IP address. For (SLIP) because it can handle synchronous as
a class B network, the network address is the well as asynchronous communication. PPP
first two bytes of the IP address. For a class C can share a line with other users and it has
network, the network address is the first three error detection that SLIP lacks. Where a
bytes of the IP address. In each case, the choice is possible, PPP is preferred.
remainder is the host address. In the Internet,
assigned network addresses are globally
unique. See IP address.
node An addressable device attached to a
computer network. See host, router.
Router On the Internet, a router is a device or, topology A network topology shows the
in some cases, software in a computer, that computers and the links between them. A
determines the next network point to which a network layer must know the current network
packet should be forwarded toward its topology to be able to route packets to their
destination. The router is connected to at least final destination.
two networks and decides which way to send
each information packet based on its current U
understanding of the state of the networks it is
connected to. UDP User Datagram Protocol. A transport
layer protocol in the TCP/IP suite of protocols.
S UDP, like TCP, uses IP for delivery; however,
unlike TCP, UDP provides for exchange of
server A network device that provides services datagrams without acknowledgements or
to client stations. Examples include file servers guaranteed delivery.
and print servers.
service A term used with the router to refer to
a connection to another port on (another)
URL Uniform Resource Locator. A standard
format for specifying the name, type and
router, used to access dialup modems, hosts
location of documents and resources on an
that do not support TCP/IP and other
Internet. The syntax is type://host.domain
asynchronous devices.
:port/path/filename, where type specifies the
SNMP A Simple Network Management type of document or resource (e.g. http is a file
Protocol. The Internet standard protocol on a WWW server; file is a file on an
developed to manage nodes on an IP network. anonymous FTP server; Telnet is a connection
See MIB. to a Telnet-based service). See WWW.
Index
Hardware Introduction
A Look inside, 16
Access Point with WDS MAC address, 15
wireless bridge, 10, 11 High perfomance, 8
wireless repeater, 12
Access your AP, 20 I
ACL, 47
IAPP Roaming Scheme, 39
Advanced Wireless Settings, 46
Identity, 36
Antenna Gain, 41
Installation
AP mode, 10
attach AP to the wall, 18
auto-channel, 41
hardware, 18
automatic reboot, 63
remove AP from the wall, 19
Introduction
B kickstart utility, 20
Backup/Restore, 55 software, 20
Basic rate, 46 IP address, 20, 26, 37, 50
Basic Wireless Settings, 39 ISO Country Codes, 79
Beacon period, 46
K
C KickStart utility, 20
Cable inlet, 16, 17
Configuration, 84 L
LAN, 14, 85
D LED, 14, 85
Default, 49 Location ID, 79
Defaults, 16, 40, 47
configuration, 77 M
LAN, 77
MAC, 15, 37, 47, 48, 67, 68
security, 77
Management, 8
wireless, 77
Management options, 9
DHCP, 38, 84
Management Options
Domain, 84
GMS, 9
download system configuration, 56
SNMP, 9
Web-browser, 9
E Management Security, 54
Ethernet Socket, 16 MIB, 73
MMCX Antenna Connectors, 16
F
N
Factory Defaults, 77
reset, 23 Network Setup, 37
Fragmentation threshold, 46 NTP, 61
G O
Gateway, 26, 38 Operating mode, 10
GMS, 9 Operational rate set, 46
Agent, 56
P
H P-520 features, 9
Hardware introduction Packaging contents, 13
LEDs, 14 Power Connector Plug, 16
Security, 29 W
802.11x, 52
WEP, 31, 51 WDS Configuration
WPA, 31, 53 wireless bridge, 44
Settings Summary, 36 Web interface management, 9
Setup wizard, 25 Web interface menu, 34
SNMP, 9, 71 WEP, 25, 30, 53
SNMP management, 9 Wi-Fi compilance, 8
SNMP Traps, 60 WPA, 25, 31, 53
SSID, 68
Statistics