Airlink101 Network Router APO1000 User Manual

Wireless G 2.4GHz 500mW Outdoor AP  
Model: APO1000/APO1010  
User’s Manual  
V.1.0  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.5 Backup / Restore and Reset to Factory ..................................................................................................69  
4.3.6 Firmware Upgrade......................................................................................................................................70  
4.3.7 Network Utility .............................................................................................................................................71  
4.3.8 Reboot..........................................................................................................................................................72  
4.4 SYSTEM STATUS ....................................................................................................................................................73  
4.4.1 System Overview........................................................................................................................................73  
4.4.2 WDS Link Status.........................................................................................................................................75  
4.4.3 Extra Information ........................................................................................................................................76  
4.4.4 Event Log.....................................................................................................................................................78  
CHAPTER 5. CPE MODE CONFIGURATION..........................................................................................................79  
5.1 EXTERNAL NETWORK CONNECTION .....................................................................................................................79  
5.1.1 Network Requirement................................................................................................................................79  
5.1.2 Configure WAN Setup................................................................................................................................81  
5.1.3 Configure DDNS Setup..............................................................................................................................84  
5.1.4 Configure LAN IP........................................................................................................................................85  
5.2 ACCESS POINT ASSOCIATION................................................................................................................................87  
5.2.1 Wireless General Setup.............................................................................................................................87  
5.2.2 Wireless Advanced Setup .........................................................................................................................90  
5.2.3 Site Survey ..................................................................................................................................................93  
5.3 SYSTEM MANAGEMENT.........................................................................................................................................94  
5.3.1 Configure Management.............................................................................................................................94  
5.3.2 Configure System Time .............................................................................................................................96  
5.3.3 Configure UPnP..........................................................................................................................................97  
5.3.4 Configure SNMP Setup .............................................................................................................................98  
5.3.5 Backup / Restore and Reset to Factory ................................................................................................ 100  
5.3.6 Firmware Upgrade.................................................................................................................................... 101  
5.3.7 Network Utility ........................................................................................................................................... 102  
5.3.8 Reboot........................................................................................................................................................ 103  
5.4 ACCESS CONTROL LIST....................................................................................................................................... 104  
5.4.1 IP Filter Setup............................................................................................................................................ 104  
5.4.2 MAC Filter Setup ...................................................................................................................................... 106  
5.5 RESOURCE SHARING .......................................................................................................................................... 107  
5.5.1 DMZ............................................................................................................................................................ 107  
5.5.2 Virtual Server (Port Forwarding)............................................................................................................. 108  
5.6 SYSTEM STATUS .................................................................................................................................................. 110  
5.6.1 System Overview...................................................................................................................................... 110  
5.6.2 DHCP Clients ............................................................................................................................................ 113  
5.6.3 Extra Info.................................................................................................................................................... 114  
5.6.4 Event Log................................................................................................................................................... 116  
CHAPTER 6. CLIENT BRIDGE + UNIVERSAL REPEATER CONFIGURATION ............................................ 117  
6.1 EXTERNAL NETWORK CONNECTION ................................................................................................................... 117  
6.1.1 Network Requirement.............................................................................................................................. 117  
6.1.2 Configure LAN IP...................................................................................................................................... 118  
6.2 ACCESS POINT ASSOCIATION.............................................................................................................................. 120  
6.2.1 Configure Wireless General Setting ...................................................................................................... 120  
6.2.2 Wireless Advanced Setup ....................................................................................................................... 122  
6.2.3 Site Survey ................................................................................................................................................ 125  
6.3 WIRELESS LAN NETWORK CREATION................................................................................................................ 126  
6.3.1 AP Setup.................................................................................................................................................... 126  
6.3.2 MAC Filter Setup ...................................................................................................................................... 132  
6.4 SYSTEM MANAGEMENT....................................................................................................................................... 133  
6.4.1 Configure Management........................................................................................................................... 133  
6.4.2 Configure System Time ........................................................................................................................... 135  
6.4.3 Configure UPnP........................................................................................................................................ 136  
6.4.4 Configure SNMP Setup ........................................................................................................................... 137  
6.4.5 Backup / Restore and Reset to Factory ................................................................................................ 139  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.6 Firmware Upgrade.................................................................................................................................... 140  
6.4.7 Network Utility ........................................................................................................................................... 141  
6.4.8 Reboot........................................................................................................................................................ 142  
6.5 SYSTEM STATUS .................................................................................................................................................. 143  
6.5.1 System Overview...................................................................................................................................... 143  
6.5.2 Associated Clients Status........................................................................................................................ 146  
6.5.3 DHCP Clients ............................................................................................................................................ 147  
6.5.4 Extra Information ...................................................................................................................................... 148  
6.5.5 Event Log................................................................................................................................................... 150  
CHAPTER 7. COMMAND LINE INTERFACE(CLI) ............................................................................................... 151  
7.1 ACCESSING THE CLI WITH TELNET ..................................................................................................................... 151  
7.2 USING THE CLI.................................................................................................................................................... 152  
APPENDIX A. WINDOWS TCP/IP SETTINGS..................................................................................................... 154  
APPENDIX B. WEB GUI VALID CHARACTERS ................................................................................................ 156  
APPENDIX C. NETWORK MANAGER PRIVILEGES ........................................................................................ 160  
APPENDIX D. ENABLING UPNP IN WINDOWS XP.......................................................................................... 161  
TECHNICAL SUPPORT............................................................................................................................................. 163  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1. System Overview  
1.1 Introduction  
The 802.11 b/g compliant Airlink101® APO1000/APO1010 is an outdoor wireless access point that can be used for five  
different purposes in three different modes. In the AP mode, it can be deployed either as traditional fixed wireless Access  
Point(AP), or combination of AP and WDS(AP+WDS). In the WDS mode, it’s only used to expand or bridge Ethernet networks  
and deployed as a main base, relay based or remote base station. In the CPE (Customer Premises Equipment) mode, it  
connects to Wireless Internet Service Provider’s (WISP) outdoor network via wireless WAN gateway to access to Internet. In  
the Client Bridge + Universal Repeater mode, it connects to Wireless Internet Service Provider’s (WISP) outdoor network via  
wireless or wired bridge to access to Internet  
The die-cast sealed APO1000/APO1010 is compact in size and compliant with IP68 weatherproof standard. It comes with a  
mounting kit to mount on pole or wall. It is suitable for both indoor and outdoor usage with its 500mW output power, which is  
higher than a typical indoor AP (100mW).  
Features:  
1. Access Point : It can be deployed as a traditional fixed wireless Access Point  
2. Repeater: To expand wireless service by repeating prior AP  
3. WDS : It can be used to expand Ethernet network via wireless WDS Link  
4. AP+WDS: Not only to extend Ethernet network, but also provide wireless access to the expanded network  
5. CPE (Customer Premises Equipment): It is a wireless gateway with NAT and DHCP Server functions to connects to  
Wireless Internet Service Provider's (WISP)  
6. Client Bridge + Universal Repeater : It is a wireless repeater or bridge to connects to Wireless Internet Service  
Provider's (WISP)  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.2 System Concept  
The APO1000/APO1010 is not only designed and used as traditional outdoor AP, but also with rich features tailored for WISP  
applications. The two-level management capability and access control ease WISP and owners to maintain and manage  
wireless network in a more controllable fashion. Main applications are listed as follows with illustration:  
1. Wireless CPE for Multi Dwelling Unit/Multi Tenant Unit (MDU/MTU) complexes including apartments, dormitories, and  
office complexes.  
2. Outdoor Access Point for school campuses, enterprise campuses, or manufacture plants.  
3. Indoor Access Point for hotels, factories, or warehouses where industrial grade devices are preferred.  
4. Public hotspot operation for café, parks, convention centers, shopping malls, or airports.  
5. Wireless coverage for indoor and outdoor grounds in private resorts, home yards, or gulf course communities.  
APO1000/  
APO1010  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.3 Applications in Wireless Network  
APO1000/APO1010 is a multiple mode system which can be configured either as a wireless gateway or an access point as  
desired. It also can be used as WDS link for Ethernet network expansion. This section depicts different applications in AP  
Mode, WDS Mode, and CPE Mode and Client Bridge + Universal Repeater Mode.  
Configuration in AP Mode (including Access Point + WDS)  
An access point can be either a main, relay or remote base station. A main base station is typically connected to a wired  
network via the Ethernet port. A relay base station relays data between main base stations and relay stations or remote  
base stations with clients. A remote base station is the end point to accept connections from wireless clients and pass  
data upwards to a network wirelessly.  
Î
Example 1 : Access Point without WDS  
9
It can be deployed as a tradition fixed wireless Access Point  
APO1000/APO1010  
Î
Example 2 : Access Point with WDS  
9
It can be deployed as a tradition fixed wireless Access Point and provides WDS link to expand network  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
APO1000/APO1010  
APO1000/APO1010  
Configuration in WDS Mode (Pure WDS)  
An access point can be either a main, relay or remote base station. A main base station is typically connected to a wired  
network via the Ethernet port. A relay base station relays data between main base stations and relay stations or remote  
base stations with clients. A remote base station is the end point to accept connections from wireless clients and pass  
data upwards to a network wirelessly. In this mode, it can support single or multiple WDS links and no wireless clients  
can associate with it though.  
Î
Example 1 : Point-to-Point  
APO1000/APO1010  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
APO1000/APO1010  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Example 2 : Point-to-Multi-Point  
APO1000/APO1010  
Î
Example 3 : Multi-Point Repeating bridge  
APO1000/APO1010  
Configuration in CPE Mode  
It can be used as an Outdoor Customer Premises Equipment (CPE) to receive wireless signal over last mile application,  
helping WISPs deliver wireless broadband Internet service to residents and business customers. In the CPE mode,  
APO1000/APO1010 is a gateway enabled with NAT and DHCP Server functions. The wired clients connected to  
APO1000/APO1010 are in different subnet from those connected to Main Base Station, and, in CPE mode, it does not  
accept wireless association from wireless clients.  
APO1000/APO1010  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuration in Client Bridge + Universal Repeater Mode  
It can be used as an Client Bridge + Universal Repeater to receive wireless signal over last mile applications, helping  
WISPs deliver wireless broadband Internet service to new residential and business customers. In this mode,  
APO1000/APO1010 is enabled with DHCP Server functions. The wired clients of APO1000/APO1010 are in the same  
subnet from Main Base Station and it accepts wireless connections from client devices.  
APO1000/APO1010  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.4 Product Benefit  
500mW at 2.4Ghz Output Power  
Topology : Point to Point ; Point to Multi Point  
Operation Modes :  
Î
Î
Î
Î
Access Point Mode : Pure Access Point Function and Access Point /Bridge(WDS) Function  
WDS Mode  
CPE Mode (Router Client )  
Client Bridge + Universal Repeater Mode  
Security with WEP, WPA/WPA2-PSK, and WPA/WPA2-RADIUS  
Over load current protection  
Integrated Power over Ethernet (PoE)  
8 Multiple B-SSID capability  
Business-class security and central management  
Weather-Proof Housing  
VLAN tag over WDS  
Client Isolation through Layer 2 VLAN technology  
Two administrator accounts for manager authorities  
APO1000/APO1010 outdoor high power WiFi Bridge is the point of connection to Wireless Outdoor Network for service  
provider deploying last mile services to business or residential broadband subscribers.. Network administrators can create  
multiple subscriber service tier using per-subscriber rate limiting features, and manage centrally. APO1000/APO1010 outdoor  
bridge utilizes a 500mW output Tx Power to connect to the WiFi mesh or WDS infrastructure and provides the subscriber with  
an Ethernet connection for a local access.  
APO1000/APO1010 outdoor high power Bridge supports four operational modes, the AP mode, the WDS mode, the CPE  
mode and the Client Bridge + Universal Repeater mode, respectively with built-in remote management features.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.5 Specification  
Wireless Architecture Mode  
Î
AP Mode  
9
Pure AP Mode  
It can be deployed as a tradition fixed wireless Access Point  
It allow wireless clients or Stations(STA ) to access  
9
AP/WDS Mode  
This enables the wireless interconnection of Access Point in an IEEE802.11 network .and accept wireless  
clients at the same time  
WDS Mode  
Î
9
9
This enables the wireless interconnection of Access Point in an IEEE802.11 network.  
It allows a wireless network to be expanded using multiple access point without the need for a wired backbone  
to link them.  
9
9
This also be referred to as repeater mode.  
It can’t allow wireless clients or Stations (STA) to associate.  
Î
Î
CPE Mode  
WiFi connection as WAN , in CPE mode , the device run as DHCP server to assign IP address to clients out of a  
private IP address pool behind a NAT  
Client Bridge + Universal RepeaterMode  
9
9
A wireless repeater and bridge with DHCP server enabled, clients on the same subnet as host AP(Primary  
Router).  
6. Networking  
Support Static IP, Dynamic IP(DHCP Client) and PPPoE on WiFi WAN Connection  
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Support PPTP/L2TP/IP Sec Pass Through  
PPPoE Reconnect – Always On , On demand, Manual  
MAC Cloning  
DHCP Server  
802.3 Bridging  
Masquerading (NAT)  
Proxy DNS  
Dynamic DNS  
NTP Client  
Virtual DMZ  
Virtual Server (IP / Port Forwarding)  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
Support MAC Filter  
Support IP Filter  
Bandwidth traffic Shaping  
7. Wireless Feature  
Transmission power control : 9 Levels  
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Channel selection : Manual or Auto  
No of associated clients per AP : 32  
Setting for max no associated clients : Yes  
No. of ESSID (Virtual AP) : 8  
No. of Max. WDS setting : 8  
Preamble setting : Short/ Long  
Setting for 802.11b/g mix, 802.11b only or 802.11g only  
Setting for transmission speed  
Dynamic Wireless re-transmission  
IEEE802.11f IAPP (Inter Access Point Protocol), hand over users to another AP  
IEEE 802.11i Preauth (PMKSA Cache )  
IEEE 802.11h -Transmission Power Control  
IEEE 802.11d -Multi country roaming  
Authentication/ Encryption (Wireless Security)  
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Layer 2 User Isolation  
Blocks client to client discovery within a specified VLAN  
WEP 64/ 128/ 152 Bits  
EAP-TLS + Dynamic WEP  
EAP-TTLS + Dynamic WEP  
PEAP/ MS-PEAP+Dynamic WEP  
WPA (PSK +TKIP)  
WPA (802.1x certification + TKIP)  
802.11i WPA2 (PSK + CCMP/ AES)  
802.11i WPA2 (802.1x certification + CCMP/ AES)  
Setting for TKIP/ CCMP/ AES key’s refreshing period  
Hidden ESSID support  
Setting for “Deny ANY “ connection request  
MAC Address filtering (MAC ACL)  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
No. of registered RADIUS servers : 2  
VLAN assignment on BSSID  
Support VLAN tag over WDS  
Quality of Service  
Î
Î
Î
Î
DiffServ/ ToS  
IEEE802.1p/ CoS  
IEEE 802.1Q Tag VLAN priority control  
IEEE802.11e WMM  
System Administration  
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Intuitive Web Management Interface  
Password Protected Access  
Firmware upgrade via Web  
Reset to Factory Defaults  
Profiles Configuration Backup and Restore  
Two administrator accounts  
Remote Link Test  
Full Statistics and Status Reporting  
SNMP Traps to a list of IP Address  
NTP Time Synchronization  
Even Log  
Support SNMP v1,v2c, v3  
Support MIB II  
CLI access via Telnet and SSH  
Administrative Access : HTTP/ HTTPS  
UPnP (Universal Plug and Play)  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2. Basic Installation  
2.1 Hardware Installation  
2.1.1 Package Contents  
The standard package contents of APO1000/APO1010:  
APO1000/APO1010  
x 1  
x 1  
x 1  
x 1  
x 1  
Quick Installation Guide  
CD-ROM (with User Manual and QIG)  
PSE with AC Cable  
Mounting Kit  
It is highly recommended to use all the supplies in the package instead of substituting any components by other  
suppliers to guarantee best performance.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.1.2 Panel Function Descriptions  
¾ APO1000  
Front Panel  
Rear Panel  
1. Reset Button :  
System reboot button press until LED flashed and release for system reboot or for reset  
to factory default press, LED flashes keep pressing until LED becomes static  
2. Power :  
Red LED ON indicates power on, and OFF indicates power off  
Yellow LED ON indicates Low Signal (CPE Mode)  
3. Signal Strength :  
4. Signal Strength :  
5. Signal Strength :  
6. WLAN :  
Green LED ON indicates Normal Signal (CPE Mode) or (WDS Mode only)  
Green LED ON indicates High Signal (CPE Mode) or (AP Mode only)  
Green LED BLINKING indicates Wireless ON, and BLINKING quickly indicates Wireless  
Transmit quickly.  
7. Ethernet :  
Green LED ON indicates connection, OFF indicates no connection  
8. PoE Connector :  
For connecting to PSE  
9. N-Type Connector :  
For connecting to N-Type antenna  
In CPE Mode, the LED 3 ON indicates the signal Low ( Signal <= 10 RSSI); the LED 3 and 4 ON indicate the  
signal Normal (10 < Signal <=40 RSSI); the LED 3, 4 and 5 ON indicate the signal High ( Signal > 40 ).  
Only LED 4 ON indicates the operating mode is WDS Mode; only LED 5 ON indicates the operating mode is  
AP Mode.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾ APO1010  
Front Panel  
Rear Panel  
1. Reset Button :  
System reboot button press until LED flashed and release for system reboot or for reset  
to factory default press, LED flashes keep pressing until LED becomes static  
2. Power :  
Red LED ON indicates power on, and OFF indicates power off  
Yellow LED ON indicates Low Signal (CPE Mode)  
3. Signal Strength :  
4. Signal Strength :  
5. Signal Strength :  
6. WLAN :  
Green LED ON indicates Normal Signal (CPE Mode) or (WDS Mode only)  
Green LED ON indicates High Signal (CPE Mode) or (AP Mode only)  
Green LED BLINKING indicates Wireless ON, and BLINKING quickly indicates Wireless  
Transmit quickly.  
7. Ethernet :  
Green LED ON indicates connection, OFF indicates no connection  
For connecting to PSE  
8. PoE Connector :  
In CPE Mode, the LED 3 ON indicates the signal Low ( Signal <= 10 RSSI); the LED 3 and 4 ON indicate the  
signal Normal (10 < Signal <=40 RSSI); the LED 3, 4 and 5 ON indicate the signal High ( Signal > 40 ).  
Only LED 4 ON indicates the operating mode is WDS Mode; only LED 5 ON indicates the operating mode is  
AP Mode.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.1.3 Hardware Installation Steps  
Please follow the steps mentioned below to install the hardware of APO1000/APO1010:  
¾ APO1000  
Front Panel  
Rear Panel  
Î
Î
Î
Î
Connect N-type antenna to the N-type connector on the rear panel.  
Connect Power Injector to the PoE connector on the front panel.  
Connect an Ethernet cable to the Power Injector and the other end to a computer.  
Source power to Power Injector in order to supply power to APO1000.  
¾ APO1010  
Front Panel  
Rear Panel  
Î
Î
Î
Connect Power Injector to the PoE connector on the front panel.  
Connect an Ethernet cable to the Power Injector and the other end to a computer.  
Source power to Power Injector in order to supply power to APO1010.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2 Web Management Interface Instructions  
APO1000/APO1010 supports web-based configuration. Upon the completion of hardware installation, APO1000/APO1010  
can be configured through a COMPUTER by using its web browser such as Internet Explorer or Mozilla Firefox.  
1. Default IP Address : 192.168.2.254  
2. Default IP Netmask : 255.255.255.0  
3. Default User Name and Password :  
The default user name and password for both root manager account and admin manager account are as follows:  
Client Bridge +  
Universal Repeater Mode  
Mode  
CPE Mode  
AP Mode  
WDS Mode  
Root  
Admin  
Root  
Root  
Account  
Root  
Account  
Management Account  
Account Account Account  
User Name  
Password  
root  
admin  
admin  
root  
root  
root  
default  
default  
default  
default  
Step  
IP Segment Set-up for Administrator's Computer  
Set the IP segment of the administrator's computer to be in the same range as APO1000/APO1010 for accessing the  
system. Do not duplicate the IP Address used here with IP Address of APO1000/APO1010 or any other device within the  
network  
Example of Segment :  
The valid range is 1 ~ 254 and 192.168.2.254 shall be avoided because it is already assigned to APO1000/APO1010.  
192.168.2.10 is used in the example below.  
Î
Î
IP Address : 192.168.2.10  
IP Netmask : 255.255.255.0  
Launch Web Browser  
Launch web browser to access the web management interface of system by entering the default IP Address,  
http://192.168.2.254, in the URL field, and then press Enter.  
System Login  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The network manager Login Page then appears.  
Enter “root” for user name and “default” for password, and then click OK to login to the system; the root manager  
account is used as an example here.  
Login Success  
System Overview page will appear after successful login.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3. AP Mode Configuration  
When AP mode is chosen, the system can be configured as an Access Point. This section provides detailed explanation for  
users to configure in the AP mode with help of illustrations. In the AP mode, functions listed in the table below are also  
available from the Web-based GUI interface.  
Option  
System  
Wireless  
Utilities  
Status  
Operating Mode  
General Settings  
Profiles Settings  
System Overview  
LAN  
Advanced Settings  
Virtual AP  
Firmware Upgrade  
Network Utility  
Reboot  
Clients  
Management  
Time Server  
WDS List  
Extra Info  
Event Log  
Functions  
WDS Setup  
SNMP  
UPNP  
Table 3-1: AP Mode Functions  
3.1 External Network Connection  
3.1.1 Network Requirement  
Normally, APO1000/APO1010 connects to a wired LAN and provides a wireless connection point to associate with wireless  
client as shown in Figure 3-1. Then, Wireless clients could access to LAN or Internet by associating themselves with  
APO1000/APO1010 set in AP mode.  
APO1000/APO1010  
Figure 3-1 Access Point on a Wired LAN Configuration  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.1.2 Configure LAN IP  
Here are the instructions to setup the local IP Address and Netmask.  
Please click on System -> LAN and follow the below setting.  
Mode : Check either “Static IP” or “Dynamic IP” button as desired to set up the system IP of LAN port .  
Static IP : The administrator can manually setup the LAN IP address when static IP is preferred.  
Î
9
9
9
IP Address : The IP address of the LAN port; default IP address is 192.168.1.254  
IP Netmask : The Subnet mask of the LAN port; default Netmask is 255.255.255.0  
IP Gateway : The default gateway of the LAN port; default Gateway is 192.168.1.1  
Î
Dynamic IP : This configuration type is applicable when the APO1000/APO1010 is connected to a network with  
presence of a DHCP server. All related IP information will be provided by the DHCP server automatically.  
9
Hostname : The Hostname of the LAN port  
DNS : Check either “No Default DNS Server” or “Specify DNS Server IP” button as desired to set up the system DNS.  
Î
Î
Primary : The IP address of the primary DNS server.  
Secondary : The IP address of the secondary DNS server.  
802.1d Spanning Tree  
The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS  
interfaces from wds0 to wds7. The Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE  
Standard 802.1d.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APO1000/APO1010  
APO1000/APO1010  
Click Save button to save your changes. Click Reboot button to activate your changes  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2 Wireless LAN Network Creation  
The network manager can configure related wireless settings, General Settings, Advanced Settings, Virtual AP(VAP)  
Setting, Security Settings, and MAC Filter Settings.  
3.2.1 Wireless General Setup  
The administrator can change the data transmission, channel and output power settings for the system. Please click on  
Wireless -> General Setup and follow the below setting.  
MAC address : The MAC address of the Wireless interface is displayed here.  
Band Mode : Select an appropriate wireless band; bands available are 801.11b, 802.11g and 802.11b+802.11g.  
Transmit Rate Control : Select the desired rate from the drop-down list; the options are auto or ranging from 1 to  
54Mbps for the 802.11g and 802.11b/g modes, or 1 to 11Mbps for the 802.11b mode.  
Country : Select the desired Country code from the drop-down list; the options are US, ETSI or Japan.  
Channel : The channel range will be changed by selecting different country code. The channel range from 1 to 11 for US  
country code, or 1 to 13 for ETSI country code, or 1 to 14 for JP country code.  
Tx Power : You can adjust the output power of the system to get the appropriate coverage for your wireless network.  
Select the LEVEL 1 to LEVEL 9 that you need for your environment. If you are not sure from which setting to choose,  
then use the default LEVEL 9 setting.  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
general settings and will be applied to all VAPs.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2.2 Wireless Advanced Setup  
To achieve optimal wireless performance, it is necessary to tweak advance setting per requirements properly, not necessary  
higher the better or lower.  
The administrator can change the RTS threshold and fragmentation threshold settings for the system. Please click on  
Wireless -> Advanced Setup and follow the below setting.  
Slot Time : Slot time is in the range of 1~1489 and set in unit of microsecond. The default value is 20 microsecond.  
Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time  
decreases the overall back-off, which increases throughput. Back-off, which is a multiple of the slot time, is the random  
length of time a station waits before sending a packet on the LAN. For a sender and receiver own right of the channel the  
shorter slot time help manage shorter wait time to re-transmit from collision because of hidden wireless clients or other  
causes. When collision sources can be removed sooner and other senders attempting to send are listening the  
channel(CSMA/CA) the owner of the channel should continue ownership and finish their transmission and release the  
channel. Then, following ownership of the channel will be sooner for the new pair due to shorter slot time. However, when  
long duration of existing collision sources and shorter slot time exist the owners might experience subsequent collisions.  
When adjustment to longer slot time can’t improve performance then RTS/CTS could supplement and help improve  
performance.  
ACK Timeout : ACK timeout is in the range of 1~372 and set in unit of microsecond. The default value is 48  
microsecond.  
All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will  
resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK  
Timeout”.  
ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment. ACK  
Timeout makes significant influence in performance of long distance radio link. If ACK Timeout is set too short, transmitter  
will start to “Resend” packet before ACK is received, and throughputs become low due to excessively high re-  
transmission.  
ACK Timeout is best determined by distance between the radios, data rate of average environment. The Timeout value is  
calculated based on round-trip time of packet with a little tolerance, So, if experiencing re-transmissions or poor  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
performance the ACK Timeout could be made longer to accommodate.  
RTS/CTS  
Adjustment of RTS Threshold can be done to turn on RTS. CTS Timeout will take effect only when RTS is turned on.  
Unlike wired Ethernet, radio transmission may begin with a RTS (Request to Send) frame, and receiver responds with a CTS  
(Clear to Send) frame. The RTS/CTS mechanism is called Channel Cleaning, all stations that received CTS will back off for  
certain period of time, multiple of the slot time.  
Each CTS packet has a NAV (Network Allocation Vector) number n, the channel is reserved for sender and receiver for  
additional n-millisecond. The NAV guarantees the channel is free of interference in next n-millisecond. The last packet of ACK  
will set NAV to zero, indicated that connection is done and free the channel to others.  
CTS Timeout : CTS Timeout is in the range of 1~744 and set in unit of microsecond. The default value is 48  
microsecond.  
CTS Timeout will take effect only when RTS is turned on. Adjustment of RTS Threshold can be done to turn on RTS.  
When hidden wireless stations are present in the wireless network RTS can be considered to turn on to minimize  
collisions and increase performance. Ensure CTS timeout is long enough to avoid frequent re-transmission of RTS.  
Slot Time and ACK/CTS Timeout settings for long distance links. It is important to tweak settings to achieve the  
optimal result based on requirement.  
RSSI Threshold : RSSI Threshold is in the range of -128~127.The default value is 24.  
RSSI is defined as Received Signal Strength Indication, when the received signal strength from peer is below this  
threshold, the peer will be consider as disconnected. Set the threshold higher will make roaming happen earlier, set lower  
will allow weak signal peer to connect. In normal situation, the longer distance the lower signal strength will be sensed  
between peers people could consider to lower RSSI threshold to have bigger coverage from the AP or AP client  
perspective. If it doesn’t work well then people could consider to jack up RSSI threshold to have stable smaller coverage  
and leave AP clients in longer distance to associate with closer AP.  
Beacon Interval : Beacon Interval is in the range of 1~5000 and set in unit of millisecond. The default value is 100  
msec.  
Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is  
broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal  
strength, time stamp, support data rate.  
All the radio stations received beacon recognizes the existence of such AP, and may proceed next actions if the  
information from AP matches the requirement. Beacon is sent on a periodic basis, the time interval can be adjusted.  
By increasing the beacon interval, you can reduce the number of beacons and associated overhead, but that will likely  
delay the association and roaming process because stations scanning for available access points may miss the beacons.  
You can decrease the beacon interval, which increases the rate of beacons. This will make the association and roaming  
process very responsive; however, the network will incur additional overhead and throughput will go down.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DTIM Interval : The DTIM interval is in the range of 1~15. The default is 15.  
DTIM is defined as Delivery Traffic Indication Message. It is used to notify the wireless stations, which support power  
saving mode, when to wake up to receive multicast frame. DTIM is necessary and critical in wireless environment as a  
mechanism to fulfill power-saving synchronization.  
A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered  
multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame  
after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless  
throughput in multicast applications.  
Fragment Threshold : The Fragment Threshold is in the range of 256~2346 byte. The default is 2346 byte.  
Each Wi-Fi packet can be divided into smaller packets, marked with a sequential fragment number and re-assemble in  
the receiving ends. The purpose is to make a short frame, instead of long frame, transmitting by radio in a heavy noisy  
environment. Because of sending smaller frames, corruptions are much less likely to occur. The pros is obvious, the cons  
is the overhead for transmission. So, in a clean environment, higher fragment threshold can be an option to increase  
throughput.  
Fragmentation will be triggered by setting the Fragment Threshold, usually in Byte-length. Only when the frame size is  
over the Threshold, fragmentation will take place automatically.  
RTS Threshold : RTS Threshold is in the range of 1~2346 byte. The default is 2346 byte.  
The main purpose of enabling RTS by changing RTS threshold is to reduce possible collisions due to hidden wireless  
clients. RTS in AP will be enabled automatically if the packet size is larger than the Threshold value. By default, RTS is  
disabled in a normal environment supports non-jumbo frames.  
Short Preamble : By default, it’s “Enable”. To Disable is to use Long 128-bit Preamble Synchronization field.  
The preamble is used to signal "here is a train of data coming" to the receiver. The short preamble provides 72-bit  
Synchronization field to improve WLAN transmission efficiency with less overhead.  
Tx Burst : By default, it’s “Enable”. To Disable is to deactivate Tx Burst.  
With TX burst enabled, AP will send many packets in a burst, without collision detection and RTS/CTS for each packet.  
TX Burst have better throughput but cause interference with other APs in channel.  
802.11g Protection Mode : By default, it’s “Enable”. To Disable is to deactivate 802.11g Protection Mode.  
Protection mode use RTS/CTS to prevent interference with other APs and 802.11b peers, and disabling it will save  
transmission time used by RTS/CTS. RTS/CTS threshold is effective only when 802.11g protection mode is made  
enable.  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
advanced settings and will be applied to all VAPs.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2.3 Create Virtual AP(VAP)  
The APO1000/APO1010 support broadcasting multiple SSIDs, allowing the creation of Virtual Access Points, partitioning a  
single physical access point into 8 logical access points, each of which can have a different set of security, VLAN tag(ID) and  
network settings. Figure 3-2 shows multiple SSIDs with different security type and VLAN settings.  
APO1000/APO1010  
Figure 3-2 Multiple SSIDs with different Security Type and VLAN Tag  
3.2.3.1 Virtual AP Overview  
The administrator can view all of the Virtual AP's settings via this page.  
Please click on Wireless -> Virtual AP Setup and the Virtual AP Overview Page appears.  
VAP : Indicate the system's available Virtual AP  
ESSID : Indicate the ESSID of the respective Virtual AP  
Status : Indicate the Status of the respective Virtual AP. The VAP0 always On  
Security Type : Indicate an used security type of the respective Virtual AP  
MAC Filter : Indicate an used MAC filter of the respective Virtual AP  
MAC Filter Setup : Click “Setup” button to configure Virtual AP's MAC filter.  
VAP Edit : Click “Edit” button to configure Virtual AP's settings, including security type.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2.3.2 Virtual AP Setup  
For each Virtual AP, administrators can configure SSID, VLAN ID(Tag), SSID broadcasting, Maximum number of client  
associations, security type settings.  
Click Edit button on the VAP Edit column, and then a Virtual AP setup page appears.  
ESSID : Extended Service Set ID, When clients are browsing for available wireless networks, this is the SSID that will  
appear in the list. ESSID will determine the service type available to AP clients associated with the specified VAP.  
Enable VAP : By default, it’s “Disable” for VAP1 ~ VAP7. The VAP0 always enabled.  
Select “Enable” to activate VAP or click “Disable” to deactivate this function  
Hidden SSID : By default, it’s “Disable.  
Enable this option to stop the SSID broadcast in your network. When disabled, people could easily obtain the SSID  
information with the site survey software and get access to the network if security is not turned on. When enabled,  
network security is enhanced. It’s suggested to enable it after AP security settings are archived and setting of AP clients  
could make to associate to it.  
Client Isolation : By default, it’s “Disable.  
Select “Enable”, all clients will be isolated from each other, which means they can’t reach each other.  
WMM : By default, it’s “Disable.  
Select “Enable”, then packets with WMM QoS will take higher priority.  
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. However, it  
does not provide guaranteed throughput. Packets with QoS header including Diffserv/IP ToS and 802.1p will be mapped  
into 4 Access Categories of WMM, packets without QoS header will be assigned to the Best Effort queue. Please refer to  
the table below for mapping from 802.1p and ToS mapping to WMM:  
Data Transmitted  
Clients to AP  
IP  
802.1P  
Queue  
Priority  
Description  
ToS Priority  
High throughput. Bulk data that requires maximum  
throughput and is not time-sensitive is sent to this queue  
(FTP data, for example).  
0x08  
1, 2  
AC_BK  
Background.  
Low  
0x20  
Medium throughput and delay. Most traditional IP data is  
sent to this queue  
AC_BE  
AC_VI  
Best Effort  
Video  
0, 3  
Medium  
High  
0x28  
4, 5  
Minimum delay. Time-sensitive video data is automatically  
sent to this queue  
0xa0  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
0x30  
0xe0  
0x88  
0xb8  
Time-sensitive data like VoIP and streaming media are  
automatically sent to this queue  
AC_VO  
Voice  
6, 7  
High  
IAPP Support : By default, it’s “Disable.  
Inter Access-Point Protocol is designed to enforce unique association throughout an ESS(Extended Service Set) and to  
enforce secure exchange of station's security context between current access point (AP) and new AP during hand off  
period.  
IAPP supported only for WPA-PSK/WPA2-PSK, WPA-Enterprise/WPA2-Enterprise and 802.1X security type.  
Maximum Clients : The default value is 32. You can enter the number of wireless clients that can associate to a  
particular SSID. When the number of client is set to 5, only 5 clients at most are allowed to connect to this VAP.  
VLAN ID(Tag) : By default, it’s selected “Disable”.  
This system supports tagged Virtual LAN(VLAN). A valid number of 0 to 4094 can be entered after it’s enabled. If your  
network utilize VLANs you could tie a VLAN ID to a specific SSID, and packets from/to wireless clients belonging to that  
SSID will be tagged with that VLAN ID. This enables security of wireless applications by applying VLAN ID.  
Security Type : Select the desired security type from the drop-down list; the options are Disable, WEP, WPA-PSK,  
WPA2-PSK, WPA-Enterprise, WPA2-Enterprise and WEP 802.1X.  
Î
Î
Disable : Data are unencrypted during transmission when this option is selected.  
WEP : Wired Equivalent Privacy(WEP) is a data encryption mechanism based on a 64-bit, 128-bit or 152-bit shared  
key.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Key Length  
64-bit  
Hex  
ASCII  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
Î
WPA-PSK/WPA2-PSK : WPA or WPA2 Algorithms enable the system to access the network by using the WPA-PSK  
protected access.  
9
9
Cipher Suite : By default, it is TKIP. Select either AES or TKIP cipher suites  
Group Key Update Period : By default, it is 600 seconds. This time interval for rekeying GTK,  
broadcast/multicast encryption keys, in seconds. Entering the time-length is required.  
9
Master Key Update Period : By default, it is 83400 seconds. This time interval for rekeying GMK, master key to  
generate GTKs, in seconds. Enter the time-length required.  
9
9
Key Type : Select either ASCII or HEX format for the Pre-shared Key.  
Pre-shared Key : Enter the pre-shared key; the format shall go with the selected key type.  
Pre-shared key can be entered with either a 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters.  
Î
WPA-Enterprise/WPA2-Enterprise: The RADIUS authentication and encryption will apply if either one is selected.  
9
WPA General Settings :  
Cipher Suite : By default, it is TKIP. Select either AES or TKIP cipher suites  
Group Key Update Period : By default, it’s 600 seconds. This time interval for rekeying GTK,  
broadcast/multicast encryption keys, in seconds. Entering the time-length is required.  
Master Key Update Period : By default, it’s 83400 seconds. This time interval for rekeying GMK, master  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
key to generate GTKs, in seconds. Enter the time-length required.  
EAP Reauth Period :; By default, it’s 3600 seconds; 0 second is to disable EAP Re-authentication.  
9
Main and secondary Authentication RADIUS Server Settings :  
Authentication Server : Enter the IP address of the Authentication RADIUS server.  
Port : By default, it’s 1812. The port number used to communicate with RADIUS server.  
Shared secret : A secret key used between system and RADIUS server. Supports 1 to 64 characters.  
Accounting Server : Enable or Disable accounting features in RADIUS server.  
9
Main or Secondary Accounting RADIUS Server Settings :  
Accounting Server : Enter the IP address of the Accounting RADIUS server.  
Port : By default, it’s 1813. The port number used to communicate with RADIUS server.  
Shared Secret : A secret key used between system and Accounting RADIUS server. Supports 1 to 64  
characters.  
Î
WEP 802.1X : When WEP 802.1x Authentication is enabled, please refer to the following Dynamic WEP and  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RADIUS settings to complete configuration.  
Dynamic WEP Settings :  
9
W
E
P Key length : The available options are 64 bits or 128 bits. The system will automatically generate WEP  
encryption keys.  
WEP Key Update Period : By default, it’s 300 seconds; 0 not to rekey.  
EAP Reauth Period : By default, it’s 3600 seconds; 0 second is to disable EAP Re-authentication.  
9
Main and Secondary Authentication RADIUS Server Settings :  
Authentication Server : Enter the IP address of the Authentication RADIUS server.  
Port : By default, it’s 1812. The port number used to communicate with RADIUS server.  
Shared secret : A secret key used between system and RADIUS server. Supports 1 to 64 characters.  
Accounting Server : Enable or Disable accounting features in RADIUS server.  
9
Main and secondary Accounting RADIUS Server Settings :  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Accounting Server : Enter the IP address of the Accounting RADIUS server.  
Port : By default, it’s 1813. The port number used to communicate with RADIUS server.  
Shared Secret : A secret key used between system and Accounting RADIUS server. Supports 1 to 64  
characters.  
Click Save button to save your changes. Click Reboot button to activate your changes  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.2.4 MAC Filter Setup  
Continued from the 3.2.3.1 Virtual AP Overview section, Click Setup button on the MAC Filter Setup column, and then a  
Virtual AP MAC Filter setup page appears. The administrator can allow or reject clients to access each Virtual AP.  
MAC Filter Setup : By default, it’s “Disable”. Options are Disabled, Only Deny List MAC or Only Allow List MAC.  
Click Save button to save your change.  
Two ways to set the MAC filter rules :  
Î
Only Allow List MAC.  
The wireless clients in the MAC Filter List will be allowed to access to Access Point; All others will be denied.  
Only Deny List MAC.  
Î
The wireless clients in the MAC Filter List will be denied to access to Access Point; All others will be allowed.  
MAC Address : Enter MAC address (e.g. aa:bb:cc:00:00:0a) and click “Add” button, then the MAC address should  
display in the MAC Filter List.  
There are a maximum of 20 clients allowed in this MAC Filter List. The MAC addresses of the wireless clients can be added  
and removed to the list using the Add and Delete buttons.  
Click Reboot button to activate your changes  
MAC Access Control is the weakest security approach. WPA or WPA2 security method is highly recommended.  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3 Wireless Network Expansion  
The administrator could create WDS Links to expand wireless network. When WDS is enabled, access point functions as a  
wireless bridge and is able to communicate with other access points via WDS links. A WDS link is bidirectional and both  
side must support WDS. Access points know each other by MAC Address. In other words, each access point needs  
to include MAC address of its peer. Ensure all access points are configured with the same channel and own same  
security type settings.  
Figure 3-3 shows Point to Multiple Points with different VLAN settings  
APO1000/APO1010  
Figure 3-3 Point to Multiple Points with different VLAN Tag  
Please click on Wireless -> WDS Setup and follow the below setting.  
Note that VLAN ID in the WDS MAC List setting will only be tagged to egress packets on the wired Ethernet port.  
Ensure to match VLAN ID used on the network of the peer. WDS link won’t carry tags at all.  
WMM : By default, it’s “Disable.  
Select “Enable”, then packets with WMM QoS will take higher priority.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. However, it  
does not provide guaranteed throughput. Packets with QoS header including Diffserv/IP ToS and 802.1p will be mapped  
into 4 Access Categories of WMM, packets without QoS header will be assigned to the Best Effort queue. Please refer to  
the table below for mapping from 802.1p and ToS mapping to WMM:  
Data Transmitted  
Clients to AP  
IP  
802.1P  
Queue  
Priority  
Description  
ToS Priority  
High throughput. Bulk data that requires maximum  
throughput and is not time-sensitive is sent to this queue  
(FTP data, for example).  
0x08  
1, 2  
AC_BK  
Background.  
Low  
0x20  
Medium throughput and delay. Most traditional IP data is  
sent to this queue  
AC_BE  
AC_VI  
Best Effort  
Video  
0, 3  
Medium  
High  
0x28  
4, 5  
Minimum delay. Time-sensitive video data is automatically  
sent to this queue  
0xa0  
0x30  
0xe0  
0x88  
Time-sensitive data like VoIP and streaming media are  
automatically sent to this queue  
AC_VO  
Voice  
6, 7  
High  
0xb8  
Security Type : Option is “Disabled”, “WEP” or “AES” from drop-down list. Needs the same type to build WDS links.  
Security type takes effect when WDS is enabled.  
Î
WEP Key : Enter HEX or ASCII WEP key at different length as shown below. This system supports up to 4 sets of  
WEP keys.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Key Length  
Hex  
ASCII  
64-bit  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
Î AES Key : Enter 32 HEX characters AES key.  
WDS MAC List  
Î
Î
Î
Enable : Click Enable to create WDS link.  
WDS Peer's MAC Address : Enter the MAC address of WDS peer.  
VLAN ID : By default, it’s disabled(space) with no VLAN ID. When desired, this system supports tagged VLAN from  
0 to 4094.  
Î
Description : Description of WDS link.  
The WDS link needs to be set at same Channel and with same Security Type.  
Click Save button to save your changes. Click Reboot button to activate your changes  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4 System Management  
3.4.1 Configure Management  
Administrator could specify geographical location of the system via instructions in this page. Administrator could also enter  
new Root and Admin passwords and allow multiple login methods.  
Please click System -> Management and follow the below settings.  
System Information  
Î
Î
Î
System Name : Enter a desired name or use the default one.  
Description : Provide description of the system.  
Location : Enter geographical location information of the system. It helps administrator to locate the system easier.  
The system supports two management accounts, root and admin. The network manager is assigned with full administrative  
privileges, when logging in as root user, to manage the system in all aspects. While logging in as an admin user, only subset  
of privileges is granted such as basic maintenance. For example, root user can change passwords for both root and admin  
account, and admin user can only manage its own. For more information about covered privileges for these two accounts,  
please refer to Appendix C. Network manager Privileges.  
Root Password : Log in as a root user and is allowed to change its own, plus admin user’s password.  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
Admin Password : Log in as a admin user and is allowed to change its own,  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Admin Login Methods : Only root user can enable or disable system login methods and change services port.  
Î
Î
Î
Î
Enable HTTP : Check to select HTTP Service.  
HTTP Port : The default is 80 and the range is between 1 ~ 65535.  
Enable Telnet : Check to select Telnet Service  
Telnet Port : The default is 23 and the range is between 1 ~ 65535.  
Click Save button to save your changes. Click Reboot button to activate your changes  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.2 Configure System Time  
System time can be configured via this page, and manual setting or via a NTP server is supported.  
Please click on System -> Time Server and follow the below setting.  
Local Time : Display the current system time.  
NTP Client : To synchronize the system time with NTP server.  
Î
Î
Î
Î
Enable : Check to select NTP client.  
Default NTP Server : Select the NTP Server from the drop-down list.  
Time Zone : Select a desired time zone from the drop-down list.  
Daylight saving time : Enable or disable Daylight saving.  
If the system time from NTS server seems incorrect, please verify your network settings, like default Gateway  
and DNS settings  
Click Save button to save your changes. Click Reboot button to activate your changes  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.3 Configure UPnP  
Universal Plug and Play(UPnP) is an architecture to enable pervasive peer-to-peer network connectivity between PCs,  
intelligent devices and appliances when UPnP is supported. UPnP works on TCP/IP network to enable UPnP devices to  
connect and access to each other, very well adopted in home networking environment.  
UPnP : By default, it’s “Disable”. Select “Enable” or “Disable” of UPnP Service.  
Click Save button to save changes and click Reboot button to activate changes  
For UPnP to work in Windows XP, the “APO1000” or “APO1010”must be available in “My Network Places.  
If these devices are not available, you should verify that the correct components and services are loaded in Windows XP.  
Please refer to Appendix D. Using UPnP on Windows XP  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.4 Configure SNMP Setup  
SNMP is an application-layer protocol that provides a message format for communication between SNMP manager and  
agent. By enabling SNMP function, the administrator can obtain the system information remotely.  
Please click on System -> SNMP Setup and follow the below setting.  
SNMP v2c Enable: Check to enable SNMP v2c.  
Î
Î
ro community : Set a community string to authorize read-only access.  
rw community : Set a community string to authorize read/write access.  
SNMP v3 Enable: Check to enable SNMP v3.  
SNMPv3 supports the highest level SNMP security.  
Î
Î
Î
Î
SNMP ro user : Set a community string to authorize read-only access.  
SNMP ro password : Set a password to authorize read-only access.  
SNMP rw user : Set a community string to authorize read/write access.  
SNMP rw password : Set a password to authorize read/write access.  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SNMP Trap : Events such as cold start, interface up & down, and association & disassociation will report to an assigned  
server.  
Î
Î
Community : Set a community string required by the remote host computer that will receive trap messages or  
notices send by the system.  
IP : Enter the IP addresses of the remote hosts to receive trap messages.  
Click Save button to save changes and click Reboot button to activate.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.5 Backup / Restore and Reset to Factory  
Backup current configuration, restore prior configuration or reset back to factory default configuration can be executed via this  
page.  
Please click on Utilities -> Profile Setting and follow the below setting.  
Save Settings To PC : Click Save button to save the current configuration to a local disk.  
Load Settings from PC : Click Browse button to locate a configuration file to restore, and then click Upload button to  
upload.  
Reset To Factory Default : Click Default button to reset back to the factory default settings and expect Successful  
loading message. Then, click Reboot button to activate.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.6 Firmware Upgrade  
Firmware is the main software image that system needs to respond to requests and to manage real time operations.  
Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 8 minutes to upgrade due to  
complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade  
button to upgrade.  
1. To prevent data loss during firmware upgrade, please back up current settings before proceeding  
2. Do not interrupt during firmware upgrade including power on/off as this may damage system.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.7 Network Utility  
The administrator can diagnose network connectivity via the PING utility.  
Please click on Utilities -> Network Utility and follow the below setting.  
Ping : This utility will help ping other devices on the network to verify connectivity. Ping utility, using ICMP packets,  
detects connectivity and latency between two network nodes. As result of that, packet loss and latency time are available  
in the Result field while running the PING test.  
Î
Destination IP/Domain : Enter desired domain name, i.e. www.google.com, or IP address of the destination, and  
click ping button to proceed. The ping result will be shown in the Result field.  
Î
Count : By default, it’s 5 and the range is from 1 to 50. It indicates number of connectivity test.  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.4.8 Reboot  
This function allows user to restart system with existing or most current settings when changes are made. Click Reboot  
button to proceed and take around three minutes to complete.  
A reminder will be available for remaining time to complete. If power cycle is necessary, please wait till completion of the  
reboot process.  
The System Overview page appears upon the completion of reboot.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.5 System Status  
This section breaks down into subsections of System Overview, Associated Clients Status, WDS Link Status, Extra  
Information and Event Log.  
3.5.1 System Overview  
Display detailed information of System, Network, LAN and Wireless in the System Overview page.  
System : Display information of the system.  
Î
Î
Î
Î
Î
Î
Î
Î
System Name : The name of the system.  
Operating Mode : The mode currently in service.  
Location : Deployed geographical location.  
Description : A description of the system.  
Firmware Version : The current installed firmware version.  
Firmware Date : The build time of installed firmware.  
Device Time : The current time of the system.  
System Up Time : The time period that system has been in service since last reboot.  
Network Information : Display information of the Network.  
Î
Î
Î
Î
Mode : Supports Static or Dynamic modes on the LAN interface.  
IP Address : The management IP of system. By default, it’s 192.168.10.100.  
IP Netmask : The network mask. By default, it’s 255.255.255.0.  
IP Gateway : The gateway IP address and by default, it’s 192.168.10.1.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Primary DNS : The primary DNS server in service.  
Secondary DNS : The secondary DNS server in service.  
LAN Information : Display total received and transmitted statistics on the LAN interface.  
Î
Î
Î
Î
Î
MAC Address : The MAC address of the LAN port.  
Receive bytes : The total received packets in bytes on the LAN port.  
Receive packets : The total received packets of the LAN port.  
Transmit bytes : The total transmitted packets in bytes of the LAN port.  
Transmit packets : The total transmitted packets of the LAN port.  
Wireless VAP Information : Display total received and transmitted statistics on available Virtual AP.  
Î
Î
Î
Î
Î
MAC Address : The MAC address of the Wireless port. Different MAC address on each Virtual AP  
Receive bytes :The total received packets in bytes on the Wireless port.  
Receive packets : The total received packets on the Wireless port.  
Transmit bytes : The total transmitted packets in bytes on the Wireless port.  
Transmit packets : The total transmitted packets on the Wireless port.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.5.2 Associated Clients Status  
It displays ESSID, on/off Status, Security Type, total number of wireless clients associated with all Virtual AP.  
VAP Information : Highlights key VAP information.  
Î
Î
Î
Î
Î
VAP : Available VAP from VAP0 to VAP7.  
ESSID : Display name of ESSID for each VAP.  
Status : On/Off  
Security Type : Display chosen security type; WEP, WPA/WPA2-PSK, WPA/WPA2-Enterprise.  
Clients : Display total number of wireless connections for each VAP.  
VAP Clients : Display all associated clients on each Virtual AP.  
Î
Î
Î
Î
MAC Address : MAC address of associated clients.  
RSSI : RSSI of from associated clients..  
Last TX Time : Last inactive time period in seconds for a wireless connection.  
Disconnect : Click “Delete” button to manually disconnect a wireless client in a Virtual AP.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.5.3 WDS Link Status  
On/Off Status, peers MAC Address, Received Signal Strength Indicator (RSSI) and Last TX Time for each WDS are available.  
WDS : Maximum supported WDS links.  
Status : On/Off.  
MAC Address : Display MAC address of WDS peer.  
RSSI : Indicate the RSSI of WDS links.  
Last TX Time : Last inactive time period in seconds on WDS links.  
If display “0” RSSI, you need to check WDS configuration. Things to verify are MAC Address, Channel and  
Security type. Also, adjust antenna angle and Tx Power. If display unexpected RSSI, In a long distance  
application, you might need to adjust Slot time, ACK/CTS timeout, and/or RTS threshold.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.5.4 Extra Information  
Users could pull out information such as Route table, ARP table, MAC table, Bridge table or STP available in the drop-down  
list from system. The “Refresh” button is used to retrieve latest table information.  
Route table information : Select “Route table information” on the drop-down list to display route table.  
APO1000/APO1010 could be used as a L2 or L3 device. It doesn’t support dynamic routing protocols such as RIP or  
OSPF. Static routes to specific hosts, networks or default gateway are set up automatically according to the IP  
configuration of system's interfaces. When used as a L2 device, it could switch packets and, as L3 device, it’s capable of  
being a gateway to route packets inward and outward.  
ARP table Information : Select “ARP Table Information” on the drop-down list to display ARP table.  
ARP associates each IP address to a unique hardware address (MAC) of a device. It is important to have a unique IP  
address as final destination to switch packets to.  
Bridge table information : Select “Bridge Table information” on the drop-down list to display bridge table.  
Bridge table will show Bridge ID and STP's Status on the each Ethernet bridge and its attached interfaces, the Bridge  
Port should be attached to some interfaces (e.g. eth0, ath0~ath7 and ath0.wds0~ath0.wds7).  
Bridge MAC information : Select “Bridge MACs Information” on the drop-down list to display MAC table.  
This table displays local MAC addresses associated with wired or wireless interfaces, but also remember non-local MAC  
addresses learned from wired or wireless interfaces.  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ageing timers will be reset when existing MAC addresses in table are learned again or added when new MAC addresses  
are seen from wired or wireless interfaces as well. When time runs out for a particular entry, it will be pruned from the  
table. In that situation, switching packet to that particular MAC address will be dropped.  
Bridge STP Information : Select “Bridge STP Information” on the drop-down list to display a list of bridge STP  
information.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.5.5 Event Log  
The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool  
when issues are experienced in system.  
Time: The date and time when the event occurred.  
Facility: It helps users to identify source of events such “System” or “User”  
Severity: Severity level that a specific event is associated such as “info”, “error”, “warning”, etc.  
Message: Description of the event.  
Click Refresh button to renew the log, or click Clear button to clear all the record.  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4. WDS Mode Configuration  
Please refer to illustrations of the section 1.3 for possible applications in the WDS mode. This section provides detailed  
explanation for users to configure in the WDS mode with help of illustrations. In the WDS mode, functions listed in the table  
below are also available from the Web-based GUI interface.  
Option  
System  
Wireless  
Utilities  
Status  
Operating Mode  
General Settings  
Management  
System Overview  
LAN  
Advanced Settings  
WDS Setup  
Profiles Settings  
WDS Status  
Extra Info  
Functions  
Time Server  
Firmware Upgrade  
SNMP  
UPnP  
Network Utility  
Reboot  
Event Log  
Table 4-1: WDS Mode Functions  
4.1 External Network Connection  
4.1.1 Network Requirement  
You could expand your Ethernet network via WDS link. In this mode, the APO1000/APO1010 connects directly to a wired  
LAN, and wirelessly bridges to a remote access point via a WDS link as shown in Figure 4-1. In the mode, it can’t associate  
with any wireless clients.  
APO1000/APO1010  
e
4-1 Point to Point Configuration  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.1.2 Configure LAN IP  
Here are the instructions for how to setup the local IP Address and Netmask.  
Please click on System -> LAN and follow the below setting.  
Î
Î
Mode : Check either “Static IP” or “Dynamic IP” button as desired to set up the system IP of LAN port .  
Static IP : The administrator can manually setup the LAN IP address when static IP is available/ preferred.  
9
9
9
IP Address : The IP address of the LAN port; default IP address is 192.168.10.100  
IP Netmask : The Subnet mask of the LAN port; default Netmask is 255.255.255.0  
IP Gateway : The default gateway of the LAN port; default Gateway is 192.168.10.1  
Î
Dynamic IP : This configuration type is applicable when the APO1000/APO1010 is connected to a network with the  
presence of a DHCP server; all related IP information will be provided by the DHCP server automatically.  
Î
Hostname : The Hostname of the LAN port  
DNS : Check either “No Default DNS Server” or “Specify DNS Server IP” button as desired to set up the system DNS.  
Î
Î
Primary : The IP address of the primary DNS server.  
Secondary : The IP address of the secondary DNS server.  
Î
802.1d Spanning Tree  
The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS  
interfaces from wds0 to wds7. The Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE  
Standard 802.1d.  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APO1000/APO1010  
APO1000/APO1010  
Click Save button to save your changes. Click Reboot button to activate your changes  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.2 Wireless Network Expansion  
The network manager can configure related wireless settings, General Settings, Advanced Settings, Virtual AP Setting  
and Security Settings.  
4.2.1 Wireless General Setup  
The administrator can change the data transmission, channel and output power settings for the system. Please click on  
Wireless -> General Setup and follow the below setting.  
MAC address : The MAC address of the Wireless interface is displayed here.  
Band Mode : Select an appropriate wireless band; bands available are 801.11b, 802.11g and 802.11b+802.11g.  
Transmit Rate Control : Select the desired rate from the drop-down list; the options are auto or ranging from 1 to  
54Mbps for 802.11g and 802.11b/g modes, or 1 to 11Mbps for 802.11b mode.  
Country : Select the desired Country code from the drop-down list; the options are US, ETSI or Japan.  
Channel : The channel range will be changed by selecting different country code. The channel range from 1 to 11 for US  
country code, or 1 to 13 for ETSI country code, or 1 to 14 for JP country code.  
The Channel 14 for Japan only used on IEEE802.11b only  
Tx Power : You can adjust the output power of the system to get the appropriate coverage for your wireless network.  
Select the LEVEL 1 to LEVEL 9 you needed for your environment. If you are not sure of which setting to choose, then  
keep the default setting, LEVEL 9.  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
general settings and will be applied to all WDS links.  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.2.2 Wireless Advanced Setup  
To achieve optimal wireless performance, it is necessary to tweak advance setting per requirements properly, not necessary  
higher the better or lower.  
The administrator can change the RTS threshold and fragmentation threshold settings for the system. Please click on  
Wireless -> Advanced Setup and follow the below setting.  
Slot Time : Slot time is in the range of 1~1489 and set in unit of microsecond. The default value is 20 microsecond.  
Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time  
decreases the overall back-off, which increases throughput. Back-off, which is a multiple of the slot time, is the random  
length of time a station waits before sending a packet on the LAN. For a sender and receiver own right of the channel the  
shorter slot time help manage shorter wait time to re-transmit from collision because of hidden wireless clients or other  
causes. When collision sources can be removed sooner and other senders attempting to send are listening the  
channel(CSMA/CA) the owner of the channel should continue ownership and finish their transmission and release the  
channel. Then, following ownership of the channel will be sooner for the new pair due to shorter slot time. However, when  
long duration of existing collision sources and shorter slot time exist the owners might experience subsequent collisions.  
When adjustment to longer slot time can’t improve performance then RTS/CTS could supplement and help improve  
performance.  
ACK Timeout : ACK timeout is in the range of 1~372 and set in unit of microsecond. The default value is 48  
microsecond.  
All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will  
resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK  
Timeout”.  
ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment. ACK  
Timeout makes significant influence in performance of long distance radio link. If ACK Timeout is set too short, transmitter  
will start to “Resend” packet before ACK is received, and throughputs become low due to excessively high re-  
transmission.  
ACK Timeout is best determined by distance between the radios, data rate of average environment. The Timeout value is  
calculated based on round-trip time of packet with a little tolerance, So, if experiencing re-transmissions or poor  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
performance the ACK Timeout could be made longer to accommodate.  
RTS/CTS  
Adjustment of RTS Threshold can be done to turn on RTS. CTS Timeout will take effect only when RTS is turned on.  
Unlike wired Ethernet, radio transmission may begin with a RTS (Request to Send) frame, and receiver responds with a CTS  
(Clear to Send) frame. The RTS/CTS mechanism is called Channel Cleaning, all stations that received CTS will back off for  
certain period of time, multiple of the slot time.  
Each CTS packet has a NAV (Network Allocation Vector) number n, the channel is reserved for sender and receiver for  
additional n-millisecond. The NAV guarantees the channel is free of interference in next n-millisecond. The last packet of ACK  
will set NAV to zero, indicated that connection is done and free the channel to others.  
CTS Timeout : CTS Timeout is in the range of 1~744 and set in unit of microsecond. The default value is 48  
microsecond.  
CTS Timeout will take effect only when RTS is turned on. Adjustment of RTS Threshold can be done to turn on RTS.  
When hidden wireless stations are present in the wireless network RTS can be considered to turn on to minimize  
collisions and increase performance. Ensure CTS timeout is long enough to avoid frequent re-transmission of RTS.  
Slot Time and ACK/CTS Timeout settings for long distance links. It is important to tweak settings to achieve the  
optimal result based on requirement.  
RSSI Threshold : RSSI Threshold is in the range of -128~127.The default value is 24.  
RSSI is defined as Received Signal Strength Indication, when the received signal strength from peer is below this  
threshold, the peer will be consider as disconnected. Set the threshold higher will make roaming happen earlier, set lower  
will allow weak signal peer to connect. In normal situation, the longer distance the lower signal strength will be  
sensed between peers people could consider to lower RSSI threshold to have bigger coverage from the AP or  
AP client perspective. If it doesn’t work well then people could consider to jack up RSSI threshold to have  
stable smaller coverage and leave AP clients in longer distance to associate with closer AP.  
Beacon Interval : Beacon Interval is in the range of 1~5000 and set in unit of millisecond. The default value is 100  
msec.  
Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is  
broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal  
strength, time stamp, support data rate.  
All the radio stations received beacon recognizes the existence of such AP, and may proceed next actions if the  
information from AP matches the requirement. Beacon is sent on a periodic basis, the time interval can be adjusted.  
By increasing the beacon interval, you can reduce the number of beacons and associated overhead, but that will likely  
delay the association and roaming process because stations scanning for available access points may miss the beacons.  
You can decrease the beacon interval, which increases the rate of beacons. This will make the association and roaming  
process very responsive; however, the network will incur additional overhead and throughput will go down.  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DTIM Interval : The DTIM interval is in the range of 1~15. The default is 15.  
DTIM is defined as Delivery Traffic Indication Message. It is used to notify the wireless stations, which support power  
saving mode, when to wake up to receive multicast frame. DTIM is necessary and critical in wireless environment as a  
mechanism to fulfill power-saving synchronization.  
A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered  
multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame  
after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless  
throughput in multicast applications.  
Fragment Threshold : The Fragment Threshold is in the range of 256~2346 byte. The default is 2346 byte.  
Each Wi-Fi packet can be divided into smaller packets, marked with a sequential fragment number and re-assemble in  
the receiving ends. The purpose is to make a short frame, instead of long frame, transmitting by radio in a heavy noisy  
environment. Because of sending smaller frames, corruptions are much less likely to occur. The pros is obvious, the cons  
is the overhead for transmission. So, in a clean environment, higher fragment threshold can be an option to increase  
throughput.  
Fragmentation will be triggered by setting the Fragment Threshold, usually in Byte-length. Only when the frame size is  
over the Threshold, fragmentation will take place automatically.  
RTS Threshold : RTS Threshold is in the range of 1~2346 byte. The default is 2346 byte.  
The main purpose of enabling RTS by changing RTS threshold is to reduce possible collisions due to hidden wireless  
clients. RTS in AP will be enabled automatically if the packet size is larger than the Threshold value. By default, RTS is  
disabled in a normal environment supports non-jumbo frames.  
Short Preamble : By default, it’s “Enable”. To Disable is to use Long 128-bit Preamble Synchronization field.  
The preamble is used to signal "here is a train of data coming" to the receiver. The short preamble provides 72-bit  
Synchronization field to improve WLAN transmission efficiency with less overhead.  
Tx Burst : By default, it’s “Enable”. To Disable is to deactivate Tx Burst.  
With TX burst enabled, AP will send many packets in a burst, without collision detection and RTS/CTS for each packet.  
TX Burst have better throughput but cause interference with other APs in channel.  
802.11g Protection Mode : By default, it’s “Enable”. To Disable is to deactivate 802.11g Protection Mode.  
Protection mode use RTS/CTS to prevent interference with other APs and 802.11b peers, and disabling it will save  
transmission time used by RTS/CTS. RTS/CTS threshold is effective only when 802.11g protection mode is made  
enable.  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
advanced settings and will be applied to all WDS links.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.2.3 WDS Setup  
The administrator could create WDS Links to expand wireless network. When WDS is enabled, access point functions as a  
wireless bridge and is able to communicate with other access points via WDS links. A WDS link is bidirectional and both  
side must support WDS. Access points know each other by MAC Address. In other words, each access point needs  
to include MAC address of its peer. Ensure all access points are configured with the same channel and own same  
security type settings.  
Figure 4-2 shows Point to Multiple Points with different VLAN settings  
APO1000/APO1010  
Figure 4-2 Point to Multiple Points with different VLAN Tag  
Please click on Wireless -> WDS Setup and follow the below setting.  
Note that VLAN ID in the WDS MAC List setting will only be tagged to egress packets on the wired Ethernet port.  
Ensure to match VLAN ID used on the network of the peer. WDS link won’t carry tags at all.  
WMM : By default, it’s “Disable.  
Select “Enable”, then packets with WMM QoS will take higher priority.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. However, it  
does not provide guaranteed throughput. Packets with QoS header including Diffserv/IP ToS and 802.1p will be mapped  
into 4 Access Categories of WMM, packets without QoS header will be assigned to the Best Effort queue. Please refer to  
the table below for mapping from 802.1p and ToS mapping to WMM:  
Data Transmitted  
Clients to AP  
IP  
802.1P  
Queue  
Priority  
Description  
ToS Priority  
High throughput. Bulk data that requires maximum  
throughput and is not time-sensitive is sent to this queue  
(FTP data, for example).  
0x08  
1, 2  
AC_BK  
Background.  
Low  
0x20  
Medium throughput and delay. Most traditional IP data is  
sent to this queue  
AC_BE  
AC_VI  
Best Effort  
Video  
0, 3  
Medium  
High  
0x28  
4, 5  
Minimum delay. Time-sensitive video data is automatically  
sent to this queue  
0xa0  
0x30  
0xe0  
0x88  
Time-sensitive data like VoIP and streaming media are  
automatically sent to this queue  
AC_VO  
Voice  
6, 7  
High  
0xb8  
Security Type : Option is “Disabled”, “WEP” or “AES” from drop-down list. Needs the same type to build WDS links.  
Security type takes effect when WDS is enabled.  
Î
WEP Key : Enter HEX or ASCII WEP key at different length as shown below. This system supports up to 4 sets of  
WEP keys.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
Key Length  
64-bit  
Hex  
ASCII  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
Î AES Key : Enter 32 HEX characters AES key.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WDS MAC List  
Î
Î
Î
Enable : Click Enable to create WDS link.  
WDS Peer's MAC Address : Enter the MAC address of WDS peer.  
VLAN ID : By default, it’s disabled(space) with no VLAN ID. When desired, this system supports tagged VLAN from  
0 to 4094.  
Î
Description : Description of WDS link.  
The WDS link needs to be set at same Channel and Security Type.  
Click Save button to save your changes. Click Reboot button to activate your changes  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3 System Management  
4.3.1 Configure Management  
Administrator could specify geographical location of the system via instructions in this page. Administrator could also enter  
new Root and Admin passwords and allow multiple login methods.  
Please click System -> Management and follow the below settings.  
System Information  
Î
Î
Î
System Name : Enter a desired name or use the default one.  
Description : Provide description of the system.  
Location : Enter geographical location information of the system. It helps administrator to locate the system easier.  
The system supports two management accounts, root and admin. The network manager is assigned with full administrative  
privileges, when logging in as root user, to manage the system in all aspects. While logging in as an admin user, only subset  
of privileges is granted such as basic maintenance. For example, root user can change passwords for both root and admin  
account, and admin user can only manage its own. For more information about covered privileges for these two accounts,  
please refer to Appendix C. Network manager Privileges.  
Root Password : Log in as a root user and is allowed to change its own, plus admin user’s password.  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
Admin Password : Log in as a admin user and is allowed to change its own,  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Admin Login Methods : Only root user can enable or disable system login methods and change services port.  
Î
Î
Î
Î
Enable HTTP : Check to select HTTP Service.  
HTTP Port : The default is 80 and the range is between 1 ~ 65535.  
Enable HTTPS : Check to select HTTPS Service  
HTTPS Port : The default is 443 and the range is between 1 ~ 65535.  
If you already have an SSL Certificate, please click “UploadKey” button to select the file and upload it.  
Î
Î
Î
Î
Enable Telnet : Check to select Telnet Service  
Telnet Port : The default is 23 and the range is between 1 ~ 65535.  
Enable SSH : Check to select SSH Service  
SSH Port : Please The default is 22 and the range is between 1 ~ 65535.  
Click “GenerateKey” button to generate RSA private key. The “host key footprint” gray blank will display content  
of RSA key.  
Click Save button to save your changes. Click Reboot button to activate your changes  
Without a valid certificate, users may encounter the following problem in IE7 when they try to access system's Web GUI  
(https://192.168.2.254). There will be a “Certificate Error”, because the browser treats system as an illegal website.  
Click “Continue to this website” to access the system's Web GUI. The system's Overview page will appear.  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.2 Configure System Time  
System time can be configured via this page, and manual setting or via a NTP server is supported.  
Please click on System -> Time Server and follow the below setting.  
Local Time : Display the current system time.  
NTP Client : To synchronize the system time with NTP server.  
Î
Î
Î
Î
Enable : Check to select NTP client.  
Default NTP Server : Select the NTP Server from the drop-down list.  
Time Zone : Select a desired time zone from the drop-down list.  
Daylight saving time : Enable or disable Daylight saving.  
If the system time from NTS server seems incorrect, please verify your network settings, like default Gateway  
and DNS settings  
Click Save button to save your changes. Click Reboot button to activate your changes  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.3 Configure UPnP  
Universal Plug and Play(UPnP) is an architecture to enable pervasive peer-to-peer network connectivity between PCs,  
intelligent devices and appliances when UPnP is supported. UPnP works on TCP/IP network to enable UPnP devices to  
connect and access to each other, very well adopted in home networking environment.  
UPnP : By default, it’s “Disable”. Select “Enable” or “Disable” of UPnP Service.  
Click Save button to save changes and click Reboot button to activate changes  
For UPnP to work in Windows XP, the “APO1000” or “APO1010” must be available in “My Network Places”.  
If these devices are not available, you should verify that the correct components and services are loaded in Windows XP.  
Please refer to Appendix D. Using UPnP on Windows XP  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.4 Configure SNMP Setup  
SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and  
agents. By enabling SNMP function, the administrator can obtain the system information remotely.  
Please click on System -> SNMP Setup and follow the below setting.  
SNMP v2c Enable : Check to enable SNMP v2c.  
Î
Î
ro community : Set a community string to authorize read-only access.  
rw community : Set a community string to authorize read/write access.  
SNMP v3 Enable: Check to enable SNMP v3.  
SNMPv3 supports the highest level SNMP security.  
Î
Î
Î
Î
SNMP ro user : Set a community string to authorize read-only access.  
SNMP ro password : Set a password to authorize read-only access.  
SNMP rw user : Set a community string to authorize read/write access.  
SNMP rw password : Set a password to authorize read/write access.  
SNMP Trap : Events such as cold start, interface up & down, and association & disassociation will report to an assigned  
server.  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Community : Set a community string required by the remote host computer that will receive trap messages or  
notices send by the system.  
IP : Enter the IP addresses of the remote hosts to receive trap messages.  
Click Save button to save changes and click Reboot button to activate.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.5 Backup / Restore and Reset to Factory  
Backup current configuration, restore prior configuration or reset back to factory default configuration can be executed via this  
page.  
Please click on Utilities -> Profile Setting and follow the below setting.  
Save Settings to PC : Click Save button to save the current configuration to a local disk.  
Load Settings from PC : Click Browse button to locate a configuration file to restore, and then click Upload button to  
upload.  
Reset To Factory Default : Click Default button to reset back to the factory default settings and expect Successful  
loading message. Then, click Reboot button to activate.  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.6 Firmware Upgrade  
Firmware is the main software image that system needs to respond to requests and to manage real time operations.  
Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 8 minutes to upgrade due to  
complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade  
button to upgrade.  
1. To prevent data loss during firmware upgrade, please back up current settings before proceeding.  
2. Do not interrupt during firmware upgrade including power on/off as this may damage system.  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.7 Network Utility  
The administrator can diagnose network connectivity via the PING utility.  
Please click on Utilities -> Network Utility and follow the below setting.  
Ping : This utility will help ping other devices on the network to verify connectivity. Ping utility, using ICMP packets,  
detects connectivity and latency between two network nodes. As result of that, packet loss and latency time are available  
in the Result field while running the PING test.  
Î
Destination IP/Domain : Enter desired domain name, i.e. www.google.com, or IP address of the destination, and  
click ping button to proceed. The ping result will be shown in the Result field.  
Î
Count : By default, it’s 5 and the range is from 1 to 50. It indicates number of connectivity test.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3.8 Reboot  
This function allows user to restart system with existing or most current settings when changes are made. Click Reboot  
button to proceed and take around three minutes to complete.  
A reminder will be available for remaining time to complete. If power cycle is necessary, please wait till completion of the  
reboot process.  
The System Overview page appears upon the completion of reboot.  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.4 System Status  
This section breaks down into subsections of System Overview, WDS Link Status, Extra Information and Event Log.  
4.4.1 System Overview  
Detailed information on System, Network, LAN Information and Wireless Information can be reviewed via this page.  
System : Display the information of the system.  
Î
Î
Î
Î
Î
Î
Î
Î
System Name : The name of the system.  
Operating Mode : The mode currently in service.  
Location : The reminding note on the geographical location of the system.  
Description : The reminding note of the system.  
Firmware Version : The current firmware version installed.  
Firmware Date : The build time of the firmware installed.  
Device Time : The current time of the system.  
System Up Time : The time period that system has been in service since last reboot.  
Network Information : Display the information of the Network.  
Î
Î
Î
Î
Î
Î
Mode : Supports Static or Dynamic modes on the LAN interface.  
IP Address : The management IP of system. By default, it’s 192.168.10.100.  
IP Netmask : The network mask. By default, it’s 255.255.255.0.  
IP Gateway : The gateway IP address and by default, it’s 192.168.10.1.  
Primary DNS : The primary DNS server in service.  
Secondary DNS : The secondary DNS server in service.  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LAN Information : Display total received and transmitted statistics on the LAN interface.  
Î
Î
Î
Î
Î
MAC Address : The MAC address of the LAN port.  
Receive bytes : The total received packets in bytes on the LAN port.  
Receive packets : The total received packets of the LAN port.  
Transmit bytes : The total transmitted packets in bytes of the LAN port.  
Transmit packets : The total transmitted packets of the LAN port.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.4.2 WDS Link Status  
On/Off Status, peers MAC Address, Received Signal Strength Indicator(RSSI) and Last TX Time for each WDS are available.  
WDS : Maximum supported WDS links.  
Status : On/Off.  
MAC Address : Display MAC address of WDS peer.  
RSSI : Indicate the RSSI of WDS links.  
Last TX Time : Last inactive time period in seconds on WDS links.  
If display “0” RSSI, you need to check WDS configuration. Things to verify are MAC Address, Channel and  
Security type. Also, adjust antenna angle and Tx Power. If display unexpected RSSI, In a long distance  
application, you might need to adjust Slot time, ACK/CTS timeout, and/or RTS threshold.  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.4.3 Extra Information  
Users could pull out information such as Route table, ARP table, MAC table, Bridge table or STP available in the drop-down  
list from system. The “Refresh” button is used to retrieve latest table information.  
Route table information : Select “Route table information” on the drop-down list to display route table.  
APO1000/APO1010 could be used as a L2 or L3 device. It doesn’t support dynamic routing protocols such as RIP or  
OSPF. Static routes to specific hosts, networks or default gateway are set up automatically according to the IP  
configuration of system's interfaces. When used as a L2 device, it could switch packets and, as L3 device, it’s capable of  
being a gateway to route packets inward and outward.  
ARP table Information : Select “ARP Table Information” on the drop-down list to display ARP table.  
ARP associates each IP address to a unique hardware address (MAC) of a device. It is important to have a unique IP  
address as final destination to switch packets to.  
Bridge table information : Select “Bridge Table information” on the drop-down list to display bridge table.  
Bridge table will show Bridge ID and STP's Status on the each Ethernet bridge and its attached interfaces, the Bridge  
Port should be attached to some interfaces (e.g. eth0, ath0.wds0~ath0.wds7).  
Bridge MAC information : Select “Bridge MACs Information” on the drop-down list to display MAC table.  
This table displays local MAC addresses associated with wired or wireless interfaces, but also remember non-local MAC  
addresses learned from wired or wireless interfaces.  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ageing timers will be reset when existing MAC addresses in table are learned again or added when new MAC addresses  
are seen from wired or wireless interfaces as well. When time runs out for a particular entry, it will be pruned from the  
table. In that situation, switching packet to that particular MAC address will be discontinued.  
Bridge STP Information : Select “Bridge STP Information” on the drop-down list to display a list of bridge STP  
information.  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.4.4 Event Log  
The Event log displays system events when system is up and running. Also, it becomes very useful as troubleshooting tool  
when issues are experienced in system.  
Time: The date and time when the event occurred.  
Facility: It helps users to identify source of events such “System” or “User”  
Severity: Severity level that a specific event is associated such as “info”, “error”, “warning”, etc.  
Message: Description of the event.  
Click Refresh button to renew the log, or click Clear button to clear all the record.  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5. CPE Mode Configuration  
When CPE mode is chosen, the system can be configured as a Customer Premises Equipment(CPE). This section provides  
detailed explanation for users to configure in the CPE mode with help of illustrations. In the CPE mode, functions listed in the  
table below are also available from the Web-based GUI interface.  
OPTION  
System  
Wireless  
Advance  
Utilities  
Status  
Operating Mode  
General Setup  
DMZ  
Profiles Settings  
System Overview  
WAN  
LAN  
Advanced Setup  
Site Survey  
IP Filter Setup  
MAC Filter Setup  
Virtual Server  
Firmware Upgrade  
Network Utility  
Reboot  
DHCP Clients  
Extra Info  
DDNS  
Event Log  
Functions  
Management  
Time Server  
SNMP  
UPNP  
Table 5-1: CPE Mode Functions  
5.1 External Network Connection  
5.1.1 Network Requirement  
It can be used as an Outdoor Customer Premises Equipment (CPE) to receive wireless signal over last mile application,  
helping WISPs deliver wireless broadband Internet service to residents and business customers. In the CPE mode,  
APO1000/APO1010 is a gateway enabled with NAT and DHCP Server functions. The wired clients connected to  
APO1000/APO1010 are in different subnet from those connected to Main Base Station, and, in CPE mode, it does not  
accept wireless association from wireless clients.  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APO1000/APO1010  
Figure 5-1 CPE mode configuration  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.1.2 Configure WAN Setup  
There are three connection types for the WAN port : Static IP, Dynamic IP and PPPoE.  
Please click on System -> WAN and follow the below setting.  
In CPE mode, the WAN Port is the Wireless interface.  
Î
Î
Mode : By default, it’s “Static IP”. Check “Static IP”, “Dynamic IP” or “PPPoE” to set up system WAN IP.  
Static IP : Users can manually setup the WAN IP address with a static IP provided by WISP.  
9
9
9
IP Address : The IP address of the WAN port. By default, the IP address is 192.168.1.254  
IP Netmask : The Subnet mask of the WAN port. By default, the Netmask is 255.255.255.0  
IP Gateway : The default gateway of the WAN port. By default, the Gateway is 192.168.1.1  
Î
Dynamic IP : Please consult with WISP for correct wireless settings to associate with WISP AP before a dynamic IP,  
along with related IP settings including DNS can be available from DHCP server. If IP Address is not assigned,  
please double check with your wireless settings and ensure successful association. Also, you may go to WAN  
Information” in the Overview page to click Release button to release IP address and click Renew button to renew  
IP address again.  
9
Hostname : The Hostname of the WAN port  
Î
PPPoE : To create wireless PPPoE WAN connection to a PPPoE server in network.  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
User Name : Enter User Name for PPPoE connection  
Password : Enter Password for PPPoE connection  
Reconnect Mode :  
9
9
Always on – A connection to Internet is always maintained.  
On Demand – A connection to Internet is made as needed.  
When Time Server is enabled at the “On Demand” mode, the “Reconnect Mode” will turn out “Always on”.  
9
Manual – Click the “Connect” button on “WAN Information” in the Overview page to connect to the Internet.  
Î
Î
Idle Time : Time to last before disconnecting PPPoE session when it is idle. Enter preferred Idle Time in minutes.  
MTU : By default, it’s 1492 bytes. MTU stands for Maximum Transmission Unit. Consult with WISP for a correct MTU  
setting.  
DNS : Check “No Default DNS Server” or “Specify DNS Server IP” radial button as desired to set up system DNS.  
Î
Î
Primary : The IP address of the primary DNS server.  
Secondary : The IP address of the secondary DNS server.  
MAC Clone : The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification. Some ISPs  
require you to register a MAC address in order to access to Internet. If not, you could use default MAC or clone MAC  
from a PC.  
Î
Keep  
Default MAC Address : Keep the default MAC address of WAN port on the system.  
Î
Clone MAC Address : If you want to clone the MAC address of the PC, then click the Clone MAC Address button.  
The system will automatically detect your PC's MAC address.  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The Clone MAC Address field will display MAC address of the PC connected to system. Click “Save” button can  
make clone MAC effective.  
Î
Manual MAC Address : Enter the MAC address registered with your ISP.  
Bandwidth : Administrator can control download and upload bandwidth. Default is Disable  
Î
Î
Upload : The range is from 256 to 8192 in Kbits  
Download : The range is from 256 to 8192 in Kbits  
Click Save button to save your changes. Click Reboot button to activate your changes  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.1.3 Configure DDNS Setup  
Dynamic DNS allows you to map domain name to dynamic IP address.  
Please click on System -> DDNS Setup and follow the below setting.  
Enabled: By default, it’s “Disable. The mapping domain name won’t change when dynamic IP changes. The beauty of it  
is no need to remember the dynamic WAP IP while accessing to it.  
Service Provider: Select the preferred Service Provider from the drop-down list including dyndns, dhs, ods and tzo  
Hostname: Host Name that you register to Dynamic-DNS service and export.  
User Name & Password: User Name and Password are used to login DDNS service.  
Click Save button to save your changes. Click Reboot button to activate your changes  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.1.4 Configure LAN IP  
Here are the instructions for how to setup the local IP Address and Netmask.  
Please click on System -> LAN and follow the below setting.  
LAN IP : The administrator can manually setup the LAN IP address.  
Î
Î
IP Address : The IP address of the LAN port; default IP address is 192.168.10.100  
IP Netmask : The Subnet mask of the LAN port; default Netmask is 255.255.255.0  
Î
802.1d Spanning Tree  
The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface. The  
Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE Standard 802.1d.  
DHCP Server : Devices connected to the system can obtain an IP address automatically when this service is enabled.  
Î
Î
DHCP : Check Enable button to activate this function or Disable to deactivate this service.  
Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to  
clients. The default range IP address is 192.168.10.101 to 192.168.10.254, the netmask is 255.255.255.0  
Î
DNS1 IP : Enter IP address of the first DNS server; this field is required.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
Î
DNS2 IP : Enter IP address of the second DNS server; this is optional.  
WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server; this is optional.  
Domain : Enter the domain name for this network.  
Lease Time : The IP addresses given out by the DHCP server will only be valid for the duration specified by the  
lease time. Increasing the time ensure client operation without interruptions, but could introduce potential conflicts.  
Lowering the lease time will avoid potential address conflicts, but might cause more interruptions to the client while it  
will acquire new IP addresses from the DHCP server. Default is 86400 seconds  
Click Save button to save your changes. Click Reboot button to activate your changes  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.2 Access Point Association  
5.2.1 Wireless General Setup  
The administrator can change the data transmission, channel and output power settings for the system. Please click on  
Wireless -> General Setup and follow the below setting.  
ESSID : Assign Service Set ID for the wireless system.  
Band Mode : Select an appropriate wireless band; bands available are 801.11b, 802.11g and 802.11b+802.11g.  
Transmit Rate Control : Select the desired rate from the drop-down list; the options are auto or ranging from 1 to  
54Mbps for 802.11g and 802.11b/g modes, or 1 to 11Mbps for 802.11b mode.  
Country : Select the desired Country code from the drop-down list; the options are US, ETSI or Japan.  
Channel : The channel range will be changed by selecting different country code. The channel range from 1 to 11 for US  
country code, or 1 to 13 for ETSI country code, or 1 to 14 for JP country code.  
Tx Power : You can adjust the output power of the system to get the appropriate coverage for your wireless network.  
Select the LEVEL 1 to LEVEL 9 you needed for your environment. If you are not sure of which setting to choose, then  
keep the default setting, LEVEL 9.  
Security Type : Select the desired security type from the drop-down list; the options are Disabled WEP, WPA-PSK and  
WPA2-PSK.  
Î
Disable : Data are unencrypted during transmission when this option is selected.  
Î
WEP : Wired Equivalent Privacy(WEP) is a data encryption mechanism based on a 64-bit, 128-bit or 152-bit shared  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
key. The WEP key configured here must be exactly the same as the key on the access point that this system is  
associated with.  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
Key Length  
Hex  
ASCII  
64-bit  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
Î
WPA-PSK (or WPA2-PSK) : WPA (or WPA2)Algorithms, allows the system accessing the network by using the  
WPA-PSK protected access.  
9
9
9
Cipher Suite : Select either AES or TKIP for the Cipher Suite.  
Key Type : Select either ASCII or HEX format for the Pre-shared Key.  
Pre-shared Key : Enter the pre-shared key; the format shall go with the selected key type.  
Pre-shared key can be entered with either a 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters.  
Click Save button to save your changes. Click Reboot button to activate your changes.  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.2.2 Wireless Advanced Setup  
To achieve optimal wireless performance, it is necessary to tweak advance setting per requirements properly, not necessary  
higher the better or lower.  
The administrator can change the RTS threshold and fragmentation threshold settings for the system. Please click on  
Wireless -> Advanced Setup and follow the below setting.  
Slot Time : Slot time is in the range of 1~1489 and set in unit of microsecond. The default value is 20 microsecond.  
Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time  
decreases the overall back-off, which increases throughput. Back-off, which is a multiple of the slot time, is the random  
length of time a station waits before sending a packet on the LAN. For a sender and receiver own right of the  
channel the shorter slot time help manage shorter wait time to re-transmit from collision because of hidden  
wireless clients or other causes. When collision sources can be removed sooner and other senders  
attempting to send are listening the channel(CSMA/CA) the owner of the channel should continue ownership  
and finish their transmission and release the channel. Then, following ownership of the channel will be sooner  
for the new pair due to shorter slot time. However, when long duration of existing collision sources and shorter  
slot time exist the owners might experience subsequent collisions. When adjustment to longer slot time can’t  
improve performance then RTS/CTS could supplement and help improve performance.  
ACK Timeout : ACK timeout is in the range of 1~372 and set in unit of microsecond. The default value is 48  
microsecond.  
All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will  
resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK  
Timeout”.  
ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment. ACK  
Timeout makes significant influence in performance of long distance radio link. If ACK Timeout is set too short, transmitter  
will start to “Resend” packet before ACK is received, and throughputs become low due to excessively high re-  
transmission.  
ACK Timeout is best determined by distance between the radios, data rate of average environment. The Timeout value is  
calculated based on round-trip time of packet with a little tolerance, So, if experiencing re-transmissions or poor  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
performance the ACK Timeout could be made longer to accommodate.  
RTS/CTS  
Adjustment of RTS Threshold can be done to turn on RTS. CTS Timeout will take effect only when RTS is turned on.  
Unlike wired Ethernet, radio transmission may begin with a RTS (Request to Send) frame, and receiver responds with a CTS  
(Clear to Send) frame. The RTS/CTS mechanism is called Channel Cleaning, all stations that received CTS will back off for  
certain period of time, multiple of the slot time.  
Each CTS packet has a NAV (Network Allocation Vector) number n, the channel is reserved for sender and receiver for  
additional n-millisecond. The NAV guarantees the channel is free of interference in next n-millisecond. The last packet of ACK  
will set NAV to zero, indicated that connection is done and free the channel to others.  
CTS Timeout : CTS Timeout is in the range of 1~744 and set in unit of microsecond. The default value is 48  
microsecond.  
CTS Timeout will take effect only when RTS is turned on. Adjustment of RTS Threshold can be done to turn on RTS.  
When hidden wireless stations are present in the wireless network RTS can be considered to turn on to minimize  
collisions and increase performance. Ensure CTS timeout is long enough to avoid frequent re-transmission of RTS.  
Slot Time and ACK/CTS Timeout settings for long distance links. It is important to tweak settings to achieve the  
optimal result based on requirement.  
Fragment Threshold : The Fragment Threshold is in the range of 256~2346 byte. The default is 2346 byte.  
Each Wi-Fi packet can be divided into smaller packets, marked with a sequential fragment number and re-assemble in  
the receiving ends. The purpose is to make a short frame, instead of long frame, transmitting by radio in a heavy noisy  
environment. Because of sending smaller frames, corruptions are much less likely to occur. The pros is obvious, the cons  
is the overhead for transmission. So, in a clean environment, higher fragment threshold can be an option to increase  
throughput.  
Fragmentation will be triggered by setting the Fragment Threshold, usually in Byte-length. Only when the frame size is  
over the Threshold, fragmentation will take place automatically.  
RTS Threshold : RTS Threshold is in the range of 1~2346 byte. The default is 2346 byte.  
The main purpose of enabling RTS by changing RTS threshold is to reduce possible collisions due to hidden wireless  
clients. RTS in AP will be enabled automatically if the packet size is larger than the Threshold value. By default, RTS is  
disabled in a normal environment supports non-jumbo frames.  
Short Preamble : By default, it’s “Enable”. To Disable is to use Long 128-bit Preamble Synchronization field.  
The preamble is used to signal "here is a train of data coming" to the receiver. The short preamble provides 72-bit  
Synchronization field to improve WLAN transmission efficiency with less overhead.  
Tx Burst : By default, it’s “Enable”. To Disable is to deactivate Tx Burst.  
With TX burst enabled, AP will send many packets in a burst, without collision detection and RTS/CTS for each packet.  
TX Burst have better throughput but cause interference with other APs in channel.  
WMM : By default, it’s “Disable.  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Select “Enable”, then packets with WMM QoS will take higher priority.  
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. However, it  
does not provide guaranteed throughput. Packets with QoS header including Diffserv/IP ToS and 802.1p will be mapped  
into 4 Access Categories of WMM, packets without QoS header will be assigned to the Best Effort queue. Please refer to  
the table below for mapping from 802.1p and ToS mapping to WMM:  
Data Transmitted  
Clients to AP  
IP  
802.1P  
Queue  
Priority  
Description  
ToS Priority  
High throughput. Bulk data that requires maximum  
throughput and is not time-sensitive is sent to this queue  
(FTP data, for example).  
0x08  
1, 2  
AC_BK  
Background.  
Low  
0x20  
Medium throughput and delay. Most traditional IP data is  
sent to this queue  
AC_BE  
AC_VI  
Best Effort  
Video  
0, 3  
Medium  
High  
0x28  
4, 5  
Minimum delay. Time-sensitive video data is automatically  
sent to this queue  
0xa0  
0x30  
0xe0  
0x88  
Time-sensitive data like VoIP and streaming media are  
automatically sent to this queue  
AC_VO  
Voice  
6, 7  
High  
0xb8  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
advanced settings and will be applied to all VAPs.  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.2.3 Site Survey  
Use this tool to scan and locate WISP Access Points and select one to associate with.  
Please click on Wireless -> Site Survey. Below depicts an example for site survey.  
ESSID : Available Extend Service Set ID of surrounding Access Points.  
MAC Address : MAC addresses of surrounding Access Points.  
Channel : Channel numbers used by all found Access Points.  
Signal Level : Received signal strength of all found Access Points.  
Security Type : Security type by all found Access Points.  
Setup : Click “Select” button to configure settings and associate with chosen AP.  
While clicking “Select” button in the Site Survey Table, the “ESSID” and “Security Type” will apply in the  
Wireless General Setup. However, more settings are needed including Security Key.  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3 System Management  
5.3.1 Configure Management  
Administrator could specify geographical location of the system via instructions in this page. Administrator could also enter  
new Root and Admin passwords and allow multiple login methods.  
Please click System -> Management and follow the below settings.  
System Information  
Î
Î
Î
System Name : Enter a desired name or use the default one.  
Description : Provide description of the system.  
Location : Enter geographical location information of the system. It helps administrator to locate the system easier.  
The system supports two management accounts, root and admin. The network manager is assigned with full administrative  
privileges, when logging in as root user, to manage the system in all aspects. While logging in as an admin user, only subset  
of privileges is granted such as basic maintenance. For example, root user can change passwords for both root and admin  
account, and admin user can only manage its own. For more information about covered privileges for these two accounts,  
please refer to Appendix C. Network manager Privileges.  
Root Password : Log in as a root user and is allowed to change its own, plus admin user’s password.  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
Admin Password : Log in as a admin user and is allowed to change its own,  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Admin Login Methods : Only root user can enable or disable system login methods and change services port.  
Î
Î
Î
Î
Enable HTTP : Check to select HTTP Service.  
HTTP Port : The default is 80 and the range is between 1 ~ 65535.  
Enable HTTPS : Check to select HTTPS Service  
HTTPS Port : The default is 443 and the range is between 1 ~ 65535.  
If you already have an SSL Certificate, please click “UploadKey” button to select the file and upload it.  
Î
Î
Î
Î
Enable Telnet : Check to select Telnet Service  
Telnet Port : The default is 23 and the range is between 1 ~ 65535.  
Enable SSH : Check to select SSH Service  
SSH Port : Please The default is 22 and the range is between 1 ~ 65535.  
Click “GenerateKey” button to generate RSA private key. The “host key footprint” gray blank will display content  
of RSA key.  
Click Save button to save your changes. Click Reboot button to activate your changes  
Without a valid certificate, users may encounter the following problem in IE7 when they try to access system's Web GUI  
(https://192.168.2.254). There will be a “Certificate Error”, because the browser treats system as an illegal website.  
Click “Continue  
to this website” to access the system's Web GUI. The system's Overview page will appear.  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.2 Configure System Time  
System time can be configured via this page, and manual setting or via a NTP server is supported.  
Please click on System -> Time Server and follow the below setting.  
Local Time : Display the current system time.  
NTP Client : To synchronize the system time with NTP server.  
Î
Î
Î
Î
Enable : Check to select NTP client.  
Default NTP Server : Select the NTP Server from the drop-down list.  
Time Zone : Select a desired time zone from the drop-down list.  
Daylight saving time : Enable or disable Daylight saving.  
If the system time from NTS server seems incorrect, please verify your network settings, like default Gateway  
and DNS settings  
Click Save button to save your changes. Click Reboot button to activate your changes  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.3 Configure UPnP  
Universal Plug and Play(UPnP) is an architecture to enable pervasive peer-to-peer network connectivity between PCs,  
intelligent devices and appliances when UPnP is supported. UPnP works on TCP/IP network to enable UPnP devices to  
connect and access to each other, very well adopted in home networking environment.  
UPnP : By default, it’s “Disable”. Select “Enable” or “Disable” of UPnP Service.  
Click Save button to save changes and click Reboot button to activate changes  
For UPnP to work in Windows XP, the “APO1000” or “APO1010” must be available in “My Network Places.  
If these devices are not available, you should verify that the correct components and services are loaded in Windows XP.  
Please refer to Appendix D. Using UPnP on Windows XP  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.4 Configure SNMP Setup  
SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and  
agents. By enabling SNMP function, the administrator can obtain the system information remotely.  
Please click on System -> SNMP Setup and follow the below setting.  
SNMP v2c Enable: Check to enable SNMP v2c.  
Î
Î
ro community : Set a community string to authorize read-only access.  
rw community : Set a community string to authorize read/write access.  
SNMP v3 Enable: Check to enable SNMP v3.  
SNMPv3 supports the highest level SNMP security.  
Î
Î
Î
Î
SNMP ro user : Set a community string to authorize read-only access.  
SNMP ro password : Set a password to authorize read-only access.  
SNMP rw user : Set a community string to authorize read/write access.  
SNMP rw password : Set a password to authorize read/write access.  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SNMP Trap : Events such as cold start, interface up & down, and association & disassociation will report to an assigned  
server.  
Î
Î
Community : Set a community string required by the remote host computer that will receive trap messages or  
notices send by the system.  
IP : Enter the IP addresses of the remote hosts to receive trap messages.  
Click Save button to save changes and click Reboot button to activate.  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.5 Backup / Restore and Reset to Factory  
Backup current configuration, restore prior configuration or reset back to factory default configuration can be executed via this  
page.  
Please click on Utilities -> Profile Setting and follow the below setting.  
Save Settings to PC : Click Save button to save the current configuration to a local disk.  
Load Settings from PC : Click Browse button to locate a configuration file to restore, and then click Upload button to  
upload.  
Reset To Factory Default : Click Default button to reset back to the factory default settings and expect Successful  
loading message. Then, click Reboot button to activate.  
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.6 Firmware Upgrade  
Firmware is the main software image that system needs to respond to requests and to manage real time operations.  
Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 8 minutes to upgrade due to  
complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade  
button to upgrade.  
1. To prevent data loss during firmware upgrade, please back up current settings before proceeding.  
2. Do not interrupt during firmware upgrade including power on/off as this may damage system.  
101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.7 Network Utility  
The administrator can diagnose network connectivity via the PING utility.  
Please click on Utilities -> Network Utility and follow the below setting.  
Ping : This utility will help ping other devices on the network to verify connectivity. Ping utility, using ICMP packets,  
detects connectivity and latency between two network nodes. As result of that, packet loss and latency time are available  
in the Result field while running the PING test.  
Î
Destination IP/Domain : Enter desired domain name, i.e. www.google.com, or IP address of the destination, and  
click ping button to proceed. The ping result will be shown in the Result field.  
Î
Count : By default, it’s 5 and the range is from 1 to 50. It indicates number of connectivity test.  
102  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.3.8 Reboot  
This function allows user to restart system with existing or most current settings when changes are made. Click Reboot  
button to proceed and take around three minutes to complete.  
A reminder will be available for remaining time to complete. If power cycle is necessary, please wait till completion of the  
reboot process.  
The System Overview page appears upon the completion of reboot.  
103  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.4 Access Control List  
5.4.1 IP Filter Setup  
Allows to create deny or allow rules to filter ingress or egress packets from specific source and/or to destination IP address on  
wired (LAN) or Wireless (WAN) ports. Filter rules could be used to filter unicast or multicast packets on different protocols as  
shown in the IP Filter Setup. Important to note that IP filter rules has precedence over Virtual server rules.  
Please click on Advance -> IP Filter Setup and follow the below setting.  
Source Address/Mask : Enter desired source IP address and netmask; i.e. 192.168.2.10/32.  
Source Port : Enter a port or a range of ports as start:end; i.e. port 20:80  
Destination Address/Mask : Enter desired destination IP address and netmask; i.e. 192.168.1.10/32  
Destination Port : Enter a port or a range of ports as start:end; i.e. port 20:80  
In/Out : Applies to Ingress or egress packets  
Protocol : Supports TCP, UDP or ICMP.  
Listen : Click Yes radial button to match TCP packets only with the SYN flag.  
Active : Deny to drop and Pass to allow per filter rules  
Interface : The interface that a filter rule applies  
All packets are allowed by default. Deny rules could be added to the filter list to filter out unwanted packets and  
leave remaining allowed.  
Click “Save” button to add IP filter rule. Total of 20 rules maximum allowed in the IP Filter List. All rules can be edited or  
removed from the List. Click Reboot button to activate your changes.  
When you create rules in the IP Filter List, the prior rules maintain higher priority. To allow limited access from a subnet to a  
destination network manager needs to create allow rules first and followed by deny rules. So, if you just want one IP address  
to access the system via telnet from your subnet, not others, the Example 1 demonstrates it, not rules in the Example 2.  
104  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾
Example 1 : Create a higher priority rule to allow IP address 192.168.2.2 Telnet access from LAN port first, and deny  
Telnet access from remaining IP addresses in the same subnet.  
Source  
IP/Mask  
Destination  
Rule  
In/Out Protocol Listen Action Side  
Port  
IP/Mask  
Port  
22  
1
2
192.168.2.2/32  
192.168.2.0/24  
192.2.254/32  
In  
In  
TCP  
TCP  
n
n
Pass  
Deny  
LAN  
LAN  
192.168.2.254/32  
22  
¾
Example 2 : All Telnet access to the system from the IP addresses of subnet 192.168.2.x works with the rule 1 of  
Example 2. The rule 2 won’t make any difference.  
Source  
IP/Mask  
Destination  
Rule  
In/Out Protocol Listen Action Side  
Port  
IP/Mask  
Port  
22  
1
2
192.168.2.0/24  
192.168.2.2/32  
192.168.2.254/32  
192.2.254/32  
In  
In  
TCP  
TCP  
n
n
Deny  
pass  
LAN  
LAN  
22  
105  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.4.2 MAC Filter Setup  
Allows to create MAC filter rules to allow or deny unicast or multicast packets from limited number of MAC addresses.  
Important to note that MAC filter rules have precedence over IP Filter rules.  
Please click on Advance -> MAC Filter Setup and follow the below setting.  
MAC Filter Rule : By default, it’s “Disable”. Options are Disabled, Only Deny List MAC or Only Allow List MAC. Click  
Save button to save your change.  
Two ways to set the Access Control List:  
Î
Only Allow List MAC.  
The wireless clients in the MAC Filter List will be allowed to access to Access Point; All others will be denied.  
Only Deny List MAC.  
Î
The wireless clients in the MAC Filter List will be denied to access to Access Point; All others will be allowed.  
MAC Address : Enter MAC address (e.g. aa:bb:cc:00:00:0a) and click “Add” button, then the MAC address should  
display in the MAC Filter List.  
There are a maximum of 20 clients allowed in this MAC Filter List. The MAC addresses of the wireless clients can be added  
and removed to the list using the Add and Delete buttons.  
Click Reboot button to activate your changes  
106  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.5 Resource Sharing  
5.5.1 DMZ  
DMZ is commonly work with the NAT functionality as an alternative of Virtual Server(Port Forwarding) while wanting all ports  
of DMZ host visible to Internet users. Virtual Server rules have precedence over the DMZ rule. In order to use a range of ports  
available to access to different internal hosts Virtual Server rules are needed.  
Please click on Advance -> DMZ and follow the below setting.  
DMZ : By default, it’s Disable”. Check Enable radial button to enable DMZ.  
IP Address : Enter IP address of DMZ host and only one DMZ host is supported.  
Click Save button to save your changes. Click Reboot button to activate your changes.  
107  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.5.2 Virtual Server (Port Forwarding)  
“Virtual Server” can also referred to as “Port Forward” as well and used interchangeably. Resources in the network can be  
exposed to the Internet users in a controlled manner including on-line gaming, video conferencing or others via Virtual Server  
setup. Don’t repeat ports’ usage to avoid confusion.  
Please click on Advance -> Virtual Server and follow the below setting.  
Virtual Server : By Default, It’s “Disable. Check Enable radial button to enable Virtual Server.  
Description : Enter appropriate message for resource sharing via Virtual Server.  
Private IP : Enter corresponding IP address of internal resource to share.  
Protocol Type : Select appropriate sessions, TCP or UDP, from shared host via multiple private ports.  
Private Port : A port or a range of ports may be specified as start:end; i.e. port 20:80  
Public Port : A port or a range of ports may be specified as start:end; i.e. port 20:80  
The Private Port and Public Port can be different. However, total number of ports need to be the same.  
Example : Public Port is 11 to 20 and the Private Port can be a 10 ports range.  
Click “Add” button to add Virtual Server rule to List. Total of maximum 20 rules are allowed in this List. All rules can be edited  
or removed from the List. Click Reboot button to activate your changes. While creating multiple Virtual Server rules, the prior  
rules have higher priority. The Virtual server rules have precedence over the DMZ one while both rules exist. Example 1 and  
2 demonstrate proper usage of DMZ and Virtual Server rules.  
¾
Example 1 : All connections should be redirected to 192.168.2.12 while DMZ is enabled. Since Virtual Server rules  
have precedence over the DMZ rule all connections to TCP port 22 will be directed to TCP port 22 of 192.168.2.10  
and remaining connections to port TCP 20~80 will be redirected to port TCP 20~80 of 192.168.2.11  
DMZ Enabled : 192.168.2.12  
Rule Protocol  
Private IP  
192.168.2.10  
192.168.2.11  
Private Port  
22  
Public Port  
22  
1
2
TCP  
TCP  
20:80  
20:80  
108  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾
Example 2 : All connections should be redirected to 192.168.2.12 while DMZ is enabled. Since Virtual Server rules  
have precedence over the DMZ rule all other connections to TCP port 20~80 will be redirected to port 20~80 of  
192.168.2.11. The rule 2 won’t take effect.  
DMZ Enabled : 192.168.2.12  
Rule Protocol  
Private IP  
192.168.2.11  
192.168.2.10  
Private Port  
20:80  
Public Port  
20:80  
1
2
TCP  
TCP  
22  
22  
109  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.6 System Status  
This section breaks down into subsections of System Overview, DHCP Clients, Extra Information and Event Log.  
5.6.1 System Overview  
Detailed information on System, WAN Information, LAN Information and Wireless Station Information can be reviewed  
via this page.  
System : Display the information of the system.  
Î
Î
Î
Î
Î
Î
Î
Î
System Name : The name of the system.  
Operating Mode : The mode currently in service.  
Location : The reminding note on the geographical location of the system.  
Description : The reminding note of the system.  
Firmware Version : The current firmware version installed.  
Firmware Date : The build time of the firmware installed.  
Device Time : The current time of the system.  
System Up Time : The time period that system has been in service since last reboot.  
WAN Information : Display the information of the WAN interface.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The WAN port specified Dynamic IP, the Release and Renew button will be show-up, click Release button to release IP  
address of WAN port, Renew button to renew IP address through DHCP server.  
The WAN port specified PPPoE, and the Connect and DisConnect button will be show up. Click “Connect” button to  
assigned IP address from PPPoE server, “DisConnect” button to release IP address of WAN port.  
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Î
Mode : Supports Static, Dynamic, and PPPoE modes.  
Reconnect Mode : The current reconnect mode of the PPPoE.  
MAC Address : The MAC address of the WAN port.  
IP Address : The IP address of the WAN port.  
IP Netmask : The IP netmask of the WAN port.  
IP Gateway : The gateway IP address of the WAN port.  
Primary DNS : The primary DNS server in service.  
Secondary DNS : The secondary DNS server in service.  
Receive bytes : The total received packets in bytes on the WAN port.  
Receive packets : The total received packets of the WAN port.  
Transmit bytes : The total transmitted packets in bytes of the WAN port.  
Transmit packets : The total transmitted packets of the WAN port.  
Wireless Station Information : Display the information of the associated AP.  
Î
Î
Î
ESSID : Display Extended Service Set ID of the associated AP currently.  
Security : Display security type of the associated AP currently.  
Status : Display connection status of the associated AP currently.  
111  
Download from Www.Somanuals.com. All Manuals Search And Download.  
If the system associate with AP, the BSSID, RSSI and Last Rx Time will be show up. Below depicts the examples for  
associated AP of Wireless Information.  
Î
Î
Î
BSSID : Indicate the Basic Service Set ID of the associated AP  
RSSI : Indicate the RSSI of the associated AP.  
Last Rx Time : Indicate the last receive packet of the associated AP  
LAN Information : Display total received and transmitted statistics on the LAN interface.  
Î
Î
Î
Î
Î
Î
Î
MAC Address : The MAC address of the LAN port.  
IP Address : The IP address of the LAN port.  
IP Netmask : The IP netmask of the LAN port.  
Receive bytes : The total received packets in bytes on the LAN port.  
Receive packets : The total received packets of the LAN port.  
Transmit bytes : The total transmitted packets in bytes of the LAN port.  
Transmit packets : The total transmitted packets of the LAN port.  
112  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.6.2 DHCP Clients  
Users could retrieve DHCP server and DHCP clients’ IP/MAC address via this page.  
IP address : IP addresses to LAN devices by DHCP server.  
MAC Address : MAC addresses of LAN devices.  
Expired In : Shows how long the leased IP address will expire.  
113  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.6.3 Extra Info  
Users could pull out information such as Route table, ARP table, MAC table, Bridge table or STP available in the drop-down  
list from system. The “Refresh” button is used to retrieve latest table information.  
Netstat Information : Select “NetStatus Information” on the drop-down list, the connection track list should show-up,  
the list can be updated using the Refresh button.  
NetStatus will show all connection track on the system, the information include Protocol, Live Time, Status ,  
Source/Destination IP address and Port.  
Route table information : Select “Route table information” on the drop-down list to display route table.  
APO1000/APO1010 could be used as a L2 or L3 device. It doesn’t support dynamic routing protocols such as RIP or  
OSPF. Static routes to specific hosts, networks or default gateway are set up automatically according to the IP  
configuration of system's interfaces. When used as a L2 device, it could switch packets and, as L3 device, it’s capable of  
being a gateway to route packets inward and outward.  
ARP table Information : Select “ARP Table Information” on the drop-down list to display ARP table.  
ARP associates each IP address to a unique hardware address (MAC) of a device. It is important to have a unique IP  
address as final destination to switch packets to.  
114  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Bridge table information : Select “Bridge Table information” on the drop-down list to display bridge table.  
Bridge table will show Bridge ID and STP's Status on the each Ethernet bridge and its attached interfaces, the Bridge  
Port should be attached to some interfaces.  
Bridge MAC information : Select “Bridge MACs Information” on the drop-down list to display MAC table.  
This table displays local MAC addresses associated with wired or wireless interfaces, but also remember non-local MAC  
addresses learned from wired or wireless interfaces.  
Ageing timers will be reset when existing MAC addresses in table are learned again or added when new MAC addresses  
are seen from wired or wireless interfaces as well. When time runs out for a particular entry, it will be pruned from the  
table. In that situation, switching packet to that particular MAC address will be discontinued.  
Bridge STP Information : Select “Bridge STP Information” on the drop-down list to display a list of bridge STP  
information.  
115  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5.6.4 Event Log  
The Event log displays system events when system is up and running. Also, it becomes very useful as troubleshooting tool  
when issues are experienced in system.  
Time: The date and time when the event occurred.  
Facility: It helps users to identify source of events such “System” or “User”  
Severity: Severity level that a specific event is associated such as “info”, “error”, “warning”, etc.  
Message: Description of the event.  
Click Refresh button to renew the log, or click Clear button to clear all the record.  
116  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6. Client Bridge + Universal Repeater  
Configuration  
When Client Bridge + Universal Repeater mode is activated, the system can be configured as an Access Point and Client  
Station simultaneously. This section provides information in configuring the Client Bridge + Universal Repeater mode with  
graphical illustrations. APO1000/APO1010 provides functions as stated below where they can be configured via a user-  
friendly web based interface.  
Option  
System  
Wireless  
Utilities  
Status  
Operating Mode  
General Setup  
Profiles Settings  
System Overview  
LAN  
Advanced Setup  
AP Setup  
Firmware Upgrade  
Network Utility  
Reboot  
Clients  
DHCP Clients  
Extra Info  
Management  
Time Server  
Functions  
MAC FIlter  
SNMP  
UPNP  
Site Survey  
Event Log  
Table 6-1: Client Bridge + Universal Repeater Mode Functions  
6.1 External Network Connection  
6.1.1 Network Requirement  
It can be used as an Client Bridge or Universal Repeater to receive wireless signal over last mile applications, helping WISPs  
deliver wireless broadband Internet service to new residential and business customers. In this mode, APO1000/APO1010 is  
enabled with DHCP Server functions. The wired clients of APO1000/APO1010 are in the same subnet from Main Base  
Station and it accepts wireless connections from client devices.  
APO1000/APO1010  
Figure 6-1 Client Bridge + Universal Repeater mode Configuration  
When the APO1000/APO1010 configured as an Access Point and Client Station simultaneously, the Wireless  
General and Advanced Setup also used simultaneously. But the Security Type can be different. In the other  
word, the channel or other settings will be the same between APO1000/APO1010 to Main Base Station and  
wireless client to APO1000/APO1010, but security type can be different.  
117  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.1.2 Configure LAN IP  
Here are the instructions for how to setup the local IP Address and Netmask.  
Please click on System -> LAN and follow the below setting.  
Mode : Check either “Static IP” or “Dynamic IP” button as desired to set up the system IP of LAN port .  
Î Static IP : The administrator can manually setup the LAN IP address when static IP is available/ preferred.  
9
9
9
IP Address : The IP address of the LAN port; default IP address is 192.168.2.254  
IP Netmask : The Subnet mask of the LAN port; default Netmask is 255.255.255.0  
IP Gateway : The default gateway of the LAN port; default Gateway is 192.168.2.1  
Î Dynamic IP : This configuration type is applicable when the APO1000/APO1010 is connected to a network with the  
presence of a DHCP server; all related IP information will be provided by the DHCP server automatically.  
9
Hostname : The Hostname of the LAN port  
DNS : Check either “No Default DNS Server” or “Specify DNS Server IP” button as desired to set up the system DNS.  
Î
Î
Primary : The IP address of the primary DNS server.  
Secondary : The IP address of the secondary DNS server.  
118  
Download from Www.Somanuals.com. All Manuals Search And Download.  
802.1d Spanning Tree  
The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface. The  
Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE Standard 802.1d.  
DHCP Setup : Devices connected to the system can obtain an IP address automatically when this service is enabled.  
Î DHCP : Check Enable button to activate this function or Disable to deactivate this service.  
Î Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to  
clients. The default range IP address is 192.168.2.10 to 192.168.2.70, the netmask is 255.255.255.0  
Î DNS1 IP : Enter IP address of the first DNS server; this field is required.  
Î DNS2 IP : Enter IP address of the second DNS server; this is optional.  
Î WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server; this is optional.  
Î Domain : Enter the domain name for this network.  
Î Lease Time : The IP addresses given out by the DHCP server will only be valid for the duration specified by the  
lease time. Increasing the time ensure client operation without interruptions, but could introduce potential conflicts.  
Lowering the lease time will avoid potential address conflicts, but might cause more interruptions to the client while it  
will acquire new IP addresses from the DHCP server. Default is 86400 seconds  
Click Save button to save your changes. Click Reboot button to activate your changes  
119  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.2 Access Point Association  
6.2.1 Configure Wireless General Setting  
The administrator can change the data transmission, channel and output power settings for the system. Please click on  
Wireless -> General Setup and follow the below setting.  
ESSID : Assign Service Set ID for the wireless system.  
Band Mode : Select an appropriate wireless band; bands available are 801.11b, 802.11g and 802.11b+802.11g.  
Transmit Rate Control : Select the desired rate from the drop-down list; the options are auto or ranging from 1 to  
54Mbps for 802.11g and 802.11b/g modes, or 1 to 11Mbps for 802.11b mode.  
Country : Select the desired Country code from the drop-down list; the options are US, ETSI or Japan.  
Channel : The channel range will be changed by selecting different country code. The channel range from 1 to 11 for US  
country code, or 1 to 13 for ETSI country code, or 1 to 14 for JP country code.  
Tx Power : You can adjust the output power of the system to get the appropriate coverage for your wireless network.  
Select the LEVEL 1 to LEVEL 9 you needed for your environment. If you are not sure of which setting to choose, then  
keep the default setting, LEVEL 9.  
Security Type : Select the desired security type from the drop-down list; the options are Disabled WEP, WPA-PSK and  
WPA2-PSK.  
Î
Î
Disable : Data are unencrypted during transmission when this option is selected.  
WEP : Wired Equivalent Privacy(WEP) is a data encryption mechanism based on a 64-bit, 128-bit or 152-bit shared  
key. The WEP key configured here must be exactly the same as the key on the access point that this system is  
associated with.  
120  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
Key Length  
Hex  
ASCII  
64-bit  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
Î
WPA-PSK (or WPA2-PSK) : WPA (or WPA2)Algorithms, allows the system accessing the network by using the  
WPA-PSK protected access.  
9
9
9
Cipher Suite : Select either AES or TKIP for the Cipher Suite.  
Key Type : Select either ASCII or HEX format for the Pre-shared Key.  
Pre-shared Key : Enter the pre-shared key; the format shall go with the selected key type.  
Pre-shared key can be entered with either a 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters.  
Click Save button to save your changes. Click Reboot button to activate your changes. The items in this page are for AP's RF  
general settings and will be applied to Station and Repeater AP. The “Security Type” settking will be applied to Station.  
121  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.2.2 Wireless Advanced Setup  
To achieve optimal wireless performance, it is necessary to tweak advance setting per requirements properly, not necessary  
higher the better or lower.  
The administrator can change the RTS threshold and fragmentation threshold settings for the system. Please click on  
Wireless -> Advanced Setup and follow the below setting.  
Slot Time : Slot time is in the range of 1~1489 and set in unit of microsecond. The default value is 20 microsecond.  
Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time  
decreases the overall back-off, which increases throughput. Back-off, which is a multiple of the slot time, is the random  
length of time a station waits before sending a packet on the LAN. For a sender and receiver own right of the channel the  
shorter slot time help manage shorter wait time to re-transmit from collision because of hidden wireless clients or other  
causes. When collision sources can be removed sooner and other senders attempting to send are listening the  
channel(CSMA/CA) the owner of the channel should continue ownership and finish their transmission and release the  
channel. Then, following ownership of the channel will be sooner for the new pair due to shorter slot time. However, when  
long duration of existing collision sources and shorter slot time exist the owners might experience subsequent collisions.  
When adjustment to longer slot time can’t improve performance then RTS/CTS could supplement and help improve  
performance.  
ACK Timeout : ACK timeout is in the range of 1~372 and set in unit of microsecond. The default value is 48  
microsecond.  
All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will  
resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK  
Timeout”.  
ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment. ACK  
Timeout makes significant influence in performance of long distance radio link. If ACK Timeout is set too short, transmitter  
will start to “Resend” packet before ACK is received, and throughputs become low due to excessively high re-  
transmission.  
ACK Timeout is best determined by distance between the radios, data rate of average environment. The Timeout value is  
calculated based on round-trip time of packet with a little tolerance, So, if experiencing re-transmissions or poor  
performance the ACK Timeout could be made longer to accommodate.  
122  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RTS/CTS  
Adjustment of RTS Threshold can be done to turn on RTS. CTS Timeout will take effect only when RTS is turned on.  
Unlike wired Ethernet, radio transmission may begin with a RTS (Request to Send) frame, and receiver responds with a CTS  
(Clear to Send) frame. The RTS/CTS mechanism is called Channel Cleaning, all stations that received CTS will back off for  
certain period of time, multiple of the slot time.  
Each CTS packet has a NAV (Network Allocation Vector) number n, the channel is reserved for sender and receiver for  
additional n-millisecond. The NAV guarantees the channel is free of interference in next n-millisecond. The last packet of ACK  
will set NAV to zero, indicated that connection is done and free the channel to others.  
CTS Timeout : CTS Timeout is in the range of 1~744 and set in unit of microsecond. The default value is 48  
microsecond.  
CTS Timeout will take effect only when RTS is turned on. Adjustment of RTS Threshold can be done to turn on RTS.  
When hidden wireless stations are present in the wireless network RTS can be considered to turn on to minimize  
collisions and increase performance. Ensure CTS timeout is long enough to avoid frequent re-transmission of RTS.  
Slot Time and ACK/CTS Timeout settings for long distance links. It is important to tweak settings to achieve the  
optimal result based on requirement.  
RSSI Threshold : RSSI Threshold is in the range of -128~127.The default value is 24.  
RSSI is defined as Received Signal Strength Indication, when the received signal strength from peer is below this  
threshold, the peer will be consider as disconnected. Set the threshold higher will make roaming happen earlier, set lower  
will allow weak signal peer to connect. In normal situation, the longer distance the lower signal strength will be sensed  
between peers people could consider to lower RSSI threshold to have bigger coverage from the AP or AP client  
perspective. If it doesn’t work well then people could consider to jack up RSSI threshold to have stable smaller coverage  
and leave AP clients in longer distance to associate with closer AP.  
Beacon Interval : Beacon Interval is in the range of 1~5000 and set in unit of millisecond. The default value is 100  
msec.  
Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is  
broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal  
strength, time stamp, support data rate.  
All the radio stations received beacon recognizes the existence of such AP, and may proceed next actions if the  
information from AP matches the requirement. Beacon is sent on a periodic basis, the time interval can be adjusted.  
By increasing the beacon interval, you can reduce the number of beacons and associated overhead, but that will likely  
delay the association and roaming process because stations scanning for available access points may miss the beacons.  
You can decrease the beacon interval, which increases the rate of beacons. This will make the association and roaming  
process very responsive; however, the network will incur additional overhead and throughput will go down.  
DTIM Interval : The DTIM interval is in the range of 1~15. The default is 15.  
DTIM is defined as Delivery Traffic Indication Message. It is used to notify the wireless stations, which support power  
123  
Download from Www.Somanuals.com. All Manuals Search And Download.  
saving mode, when to wake up to receive multicast frame. DTIM is necessary and critical in wireless environment as a  
mechanism to fulfill power-saving synchronization.  
A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered  
multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame  
after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless  
throughput in multicast applications.  
Fragment Threshold : The Fragment Threshold is in the range of 256~2346 byte. The default is 2346 byte.  
Each Wi-Fi packet can be divided into smaller packets, marked with a sequential fragment number and re-assemble in  
the receiving ends. The purpose is to make a short frame, instead of long frame, transmitting by radio in a heavy noisy  
environment. Because of sending smaller frames, corruptions are much less likely to occur. The pros is obvious, the cons  
is the overhead for transmission. So, in a clean environment, higher fragment threshold can be an option to increase  
throughput.  
Fragmentation will be triggered by setting the Fragment Threshold, usually in Byte-length. Only when the frame size is  
over the Threshold, fragmentation will take place automatically.  
RTS Threshold : RTS Threshold is in the range of 1~2346 byte. The default is 2346 byte.  
The main purpose of enabling RTS by changing RTS threshold is to reduce possible collisions due to hidden wireless  
clients. RTS in AP will be enabled automatically if the packet size is larger than the Threshold value. By default, RTS is  
disabled in a normal environment supports non-jumbo frames.  
Short Preamble : By default, it’s “Enable”. To Disable is to use Long 128-bit Preamble Synchronization field.  
The preamble is used to signal "here is a train of data coming" to the receiver. The short preamble provides 72-bit  
Synchronization field to improve WLAN transmission efficiency with less overhead.  
Tx Burst : By default, it’s “Enable”. To Disable is to deactivate Tx Burst.  
With TX burst enabled, AP will send many packets in a burst, without collision detection and RTS/CTS for each packet.  
TX Burst have better throughput but cause interference with other APs in channel.  
Change these settings as described here and click Save button to save your changes. Click Reboot button to activate your  
changes. The items in this page are for AP's RF advanced settings and will be applied to Station and Repeater AP.  
124  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.2.3 Site Survey  
Use this tool to scan and locate WISP Access Points and select one to associate with.  
Please click on Wireless -> Site Survey. Below depicts an example for site survey.  
ESSID : Available Extend Service Set ID of surrounding Access Points.  
MAC Address : MAC addresses of surrounding Access Points.  
Channel : Channel numbers used by all found Access Points.  
Signal Level : Received signal strength of all found Access Points.  
Security Type : Security type by all found Access Points.  
Setup : Click “Select” button to configure settings and associate with chosen AP.  
While clicking “Select” button in the Site Survey Table, the “ESSID” and “Security Type” will apply in the  
Wireless General Setup. However, more settings are needed including Security Key.  
125  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.3 Wireless LAN Network Creation  
The network manager can configure related wireless settings, AP Setup, Security Settings, and MAC Filter Settings.  
6.3.1 AP Setup  
Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations, security type settings and  
MAC Filter settings.  
ESSID : Extended Service Set ID, When clients are browsing for available wireless networks, this is the SSID that will  
appear in the list. ESSID will determine the service type available to AP clients associated with the specified repeater AP.  
Enable AP : By default, it’s “Enable” repeater AP.  
Select “Enable” to activate repeater AP or click “Disable” to deactivate this function  
Hidden SSID : By default, it’s “Disable.  
Enable this option to stop the SSID broadcast in your network. When disabled, people could easily obtain the SSID  
information with the site survey software and get access to the network if security is not turned on. When enabled,  
network security is enhanced. It’s suggested to enable it after AP security settings are archived and setting of AP clients  
could make to associate to it.  
Client Isolation : By default, it’s “Disable.  
Select “Enable”, all clients will be isolated from each other, which means they can’t reach each other.  
WMM : By default, it’s “Disable.  
Select “Enable”, then packets with WMM QoS will take higher priority.  
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. However, it  
does not provide guaranteed throughput. Packets with QoS header including Diffserv/IP ToS and 802.1p will be mapped  
into 4 Access Categories of WMM, packets without QoS header will be assigned to the Best Effort queue. Please refer to  
the table below for mapping from 802.1p and ToS mapping to WMM:  
126  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data Transmitted  
Clients to AP  
IP  
802.1P  
Queue  
AC_BK  
AC_BE  
AC_VI  
Priority  
Low  
Description  
ToS Priority  
High throughput. Bulk data that requires maximum  
throughput and is not time-sensitive is sent to this queue  
(FTP data, for example).  
0x08  
1, 2  
Background.  
Best Effort  
Video  
0x20  
Medium throughput and delay. Most traditional IP data is  
sent to this queue  
0, 3  
Medium  
High  
0x28  
4, 5  
Minimum delay. Time-sensitive video data is automatically  
sent to this queue  
0xa0  
0x30  
0xe0  
0x88  
Time-sensitive data like VoIP and streaming media are  
automatically sent to this queue  
AC_VO  
Voice  
6, 7  
High  
0xb8  
Maximum Clients : The default value is 32. You can enter the number of wireless clients that can associate to a  
particular SSID. When the number of client is set to 5, only 5 clients at most are allowed to connect to this VAP.  
Security Type : Select the desired security type from the drop-down list; the options are Disable, WEP, WPA-PSK,  
WPA2-PSK, WPA-Enterprise, WPA2-Enterprise and WEP 802.1X.  
Î
Î
Disable : Data are unencrypted during transmission when this option is selected.  
WEP : Wired Equivalent Privacy(WEP) is a data encryption mechanism based on a 64-bit, 128-bit or 152-bit shared  
key.  
9
9
9
Key Length : The available options are 64 bits, 128 bits or 152 bits.  
WEP auth Method : Enable the desired option among Open system and Shared.  
Key Index : key index is used to designate the WEP key during data transmission. 4 different WEP keys can be  
entered at the same time, but only one is chosen.  
9
WEP Key # : Enter HEX or ASCII format WEP key value; the system supports up to 4 sets of WEP keys.  
Key Length  
64-bit  
Hex  
ASCII  
10 characters  
26 characters  
32 characters  
5 characters  
13 characters  
16 characters  
128-bit  
152-bit  
127  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
WPA-PSK/WPA2-PSK : WPA or WPA2 Algorithms enable the system to access the network by using the WPA-PSK  
protected access.  
9
9
Cipher Suite : By default, it is TKIP. Select either AES or TKIP cipher suites  
Group Key Update Period : By default, it is 600 seconds. This time interval for rekeying GTK,  
broadcast/multicast encryption keys, in seconds. Entering the time-length is required.  
9
Master Key Update Period : By default, it is 83400 seconds. This time interval for rekeying GMK, master key to  
generate GTKs, in seconds. Enter the time-length required.  
9
9
Key Type : Select either ASCII or HEX format for the Pre-shared Key.  
Pre-shared Key : Enter the pre-shared key; the format shall go with the selected key type.  
Pre-shared key can be entered with either a 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters.  
Î
WPA-Enterprise/WPA2-Enterprise: The RADIUS authentication and encryption will apply if either one is selected.  
9
WPA General Settings :  
Cipher Suite : By default, it is TKIP. Select either AES or TKIP cipher suites  
Group Key Update Period : By default, it’s 600 seconds. This time interval for rekeying GTK,  
broadcast/multicast encryption keys, in seconds. Entering the time-length is required.  
Master Key Update Period : By default, it’s 83400 seconds. This time interval for rekeying GMK, master  
key to generate GTKs, in seconds. Enter the time-length required.  
EAP Reauth Period :; By default, it’s 3600 seconds; 0 second is to disable EAP Re-authentication.  
128  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9
Main and secondary Authentication RADIUS Server Settings :  
Authentication Server : Enter the IP address of the Authentication RADIUS server.  
Port : By default, it’s 1812. The port number used to communicate with RADIUS server.  
Shared secret : A secret key used between system and RADIUS server. Supports 1 to 64 characters.  
Accounting Server : Enable or Disable accounting features in RADIUS server.  
9
Main or Secondary Accounting RADIUS Server Settings :  
Accounting Server : Enter the IP address of the Accounting RADIUS server.  
Port : By default, it’s 1813. The port number used to communicate with RADIUS server.  
Shared Secret : A secret key used between system and Accounting RADIUS server. Supports 1 to 64  
characters.  
129  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
WEP 802.1X : When WEP 802.1x Authentication is enabled, please refer to the following Dynamic WEP and  
RADIUS settings to complete configuration.  
9
Dynamic WEP Settings :  
WEP Key length : The available options are 64 bits or 128 bits. The system will automatically generate  
WEP encryption keys.  
WEP Key Update Period : By default, it’s 300 seconds; 0 not to rekey.  
EAP Reauth Period : By default, it’s 3600 seconds; 0 second is to disable EAP Re-authentication.  
9
Main and Secondary Authentication RADIUS Server Settings :  
Authentication Server : Enter the IP address of the Authentication RADIUS server.  
Port : By default, it’s 1812. The port number used to communicate with RADIUS server.  
Shared secret : A secret key used between system and RADIUS server. Supports 1 to 64 characters.  
Accounting Server : Enable or Disable accounting features in RADIUS server.  
130  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9
Main and secondary Accounting RADIUS Server Settings :  
Accounting Server : Enter the IP address of the Accounting RADIUS server.  
Port : By default, it’s 1813. The port number used to communicate with RADIUS server.  
Shared Secret : A secret key used between system and Accounting RADIUS server. Supports 1 to 64  
characters.  
Click Save button to save your changes. Click Reboot button to activate your changes  
131  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.3.2 MAC Filter Setup  
The administrator can allow or reject clients to access repeater AP.  
Please click Wireless -> MAC Filter and follow the below settings.  
MAC Filter Setup : By default, it’s “Disable”. Options are Disabled, Only Deny List MAC or Only Allow List MAC.  
Click Save button to save your change.  
Two ways to set the MAC filter rules :  
Î
Only Allow List MAC.  
The wireless clients in the MAC Filter List will be allowed to access to Access Point; All others will be denied.  
Only Deny List MAC.  
Î
The wireless clients in the MAC FIlter List will be denied to access to Access Point; All others will be allowed.  
MAC Address : Enter MAC address (e.g. aa:bb:cc:00:00:0a) and click “Add” button, then the MAC address should  
display in the MAC Filter List.  
There are a maximum of 20 clients allowed in this MAC Filter List. The MAC addresses of the wireless clients can be added  
and removed to the list using the Add and Delete buttons.  
Click Reboot button to activate your changes  
MAC Access Control is the weakest security approach. WPA or WPA2 security method is highly recommended.  
132  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4 System Management  
6.4.1 Configure Management  
Administrator could specify geographical location of the system via instructions in this page. Administrator could also enter  
new Root and Admin passwords and allow multiple login methods.  
Please click System -> Management and follow the below settings.  
System Information  
Î
Î
Î
System Name : Enter a desired name or use the default one.  
Description : Provide description of the system.  
Location : Enter geographical location information of the system. It helps administrator to locate the system easier.  
The system supports two management accounts, root and admin. The network manager is assigned with full administrative  
privileges, when logging in as root user, to manage the system in all aspects. While logging in as an admin user, only subset  
of privileges is granted such as basic maintenance. For example, root user can change passwords for both root and admin  
account, and admin user can only manage its own. For more information about covered privileges for these two accounts,  
please refer to Appendix C. Network manager Privileges.  
Root Password : Log in as a root user and is allowed to change its own, plus admin user’s password.  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
Admin Password : Log in as a admin user and is allowed to change its own,  
Î
Î
New Password : Enter a new password if desired  
Check New Password : Enter the same new password again to check.  
133  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Admin Login Methods : Only root user can enable or disable system login methods and change services port.  
Î
Î
Î
Î
Enable HTTP : Check to select HTTP Service.  
HTTP Port : The default is 80 and the range is between 1 ~ 65535.  
Enable HTTPS : Check to select HTTPS Service  
HTTPS Port : The default is 443 and the range is between 1 ~ 65535.  
If you already have an SSL Certificate, please click “UploadKey” button to select the file and upload it.  
Î
Î
Î
Î
Enable Telnet : Check to select Telnet Service  
Telnet Port : The default is 23 and the range is between 1 ~ 65535.  
Enable SSH : Check to select SSH Service  
SSH Port : Please The default is 22 and the range is between 1 ~ 65535.  
Click “GenerateKey” button to generate RSA private key. The “host key footprint” gray blank will display  
content of RSA key.  
Click Save button to save your changes. Click Reboot button to activate your changes  
Without a valid certificate, users may encounter the following problem in IE7 when they try to access system's Web GUI  
(https://192.168.2.254). There will be a “Certificate Error”, because the browser treats system as an illegal website.  
Click “Continue to this website” to access the system's Web GUI. The system's Overview page will appear.  
134  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.2 Configure System Time  
System time can be configured via this page, and manual setting or via a NTP server is supported.  
Please click on System -> Time Server and follow the below setting.  
Local Time : Display the current system time.  
NTP Client : To synchronize the system time with NTP server.  
Î
Î
Î
Î
Enable : Check to select NTP client.  
Default NTP Server : Select the NTP Server from the drop-down list.  
Time Zone : Select a desired time zone from the drop-down list.  
Daylight saving time : Enable or disable Daylight saving.  
If the system time from NTS server seems incorrect, please verify your network settings, like default Gateway  
and DNS settings  
Click Save button to save your changes. Click Reboot button to activate your changes  
135  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.3 Configure UPnP  
Universal Plug and Play(UPnP) is an architecture to enable pervasive peer-to-peer network connectivity between PCs,  
intelligent devices and appliances when UPnP is supported. UPnP works on TCP/IP network to enable UPnP devices to  
connect and access to each other, very well adopted in home networking environment.  
UPnP : By default, it’s “Disable”. Select “Enable” or “Disable” of UPnP Service.  
Click Save button to save changes and click Reboot button to activate changes  
For UPnP to work in Windows XP, the “APO1000”or “APO1010” must be available in “My Network Places”  
If these devices are not available, you should verify that the correct components and services are loaded in Windows XP.  
Please refer to Appendix D. Using UPnP on Windows XP  
136  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.4 Configure SNMP Setup  
SNMP is an application-layer protocol that provides a message format for communication between SNMP manager and  
agent. By enabling SNMP function, the administrator can obtain the system information remotely.  
Please click on System -> SNMP Setup and follow the below setting.  
SNMP v2c Enable: Check to enable SNMP v2c.  
Î
Î
ro community : Set a community string to authorize read-only access.  
rw community : Set a community string to authorize read/write access.  
SNMP v3 Enable: Check to enable SNMP v3.  
SNMPv3 supports the highest level SNMP security.  
Î
Î
Î
Î
SNMP ro user : Set a community string to authorize read-only access.  
SNMP ro password : Set a password to authorize read-only access.  
SNMP rw user : Set a community string to authorize read/write access.  
SNMP rw password : Set a password to authorize read/write access.  
137  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SNMP Trap : Events such as cold start, interface up & down, and association & disassociation will report to an assigned  
server.  
Î
Î
Community : Set a community string required by the remote host computer that will receive trap messages or  
notices send by the system.  
IP : Enter the IP addresses of the remote hosts to receive trap messages.  
Click Save button to save changes and click Reboot button to activate.  
138  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.5 Backup / Restore and Reset to Factory  
Backup current configuration, restore prior configuration or reset back to factory default configuration can be executed via this  
page.  
Please click on Utilities -> Profile Setting and follow the below setting.  
Save Settings To PC : Click Save button to save the current configuration to a local disk.  
Load Settings from PC : Click Browse button to locate a configuration file to restore, and then click Upload button to  
upload.  
Reset To Factory Default : Click Default button to reset back to the factory default settings and expect Successful  
loading message. Then, click Reboot button to activate.  
139  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.6 Firmware Upgrade  
Firmware is the main software image that system needs to respond to requests and to manage real time operations.  
Firmware upgrades are sometimes required to include new features or bugs fix. It takes around 8 minutes to upgrade due to  
complexity of firmware. To upgrade system firmware, click Browse button to locate the new firmware, and then click Upgrade  
button to upgrade.  
1. To prevent data loss during firmware upgrade, please back up current settings before proceeding  
2. Do not interrupt during firmware upgrade including power on/off as this may damage system.  
140  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.7 Network Utility  
The administrator can diagnose network connectivity via the PING utility.  
Please click on Utilities -> Network Utility and follow the below setting.  
Ping : This utility will help ping other devices on the network to verify connectivity. Ping utility, using ICMP packets,  
detects connectivity and latency between two network nodes. As result of that, packet loss and latency time are available  
in the Result field while running the PING test.  
Î
Destination IP/Domain : Enter desired domain name, i.e. www.google.com, or IP address of the destination, and  
click ping button to proceed. The ping result will be shown in the Result field.  
Î
Count : By default, it’s 5 and the range is from 1 to 50. It indicates number of connectivity test.  
141  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.4.8 Reboot  
This function allows user to restart system with existing or most current settings when changes are made. Click Reboot  
button to proceed and take around three minutes to complete.  
A reminder will be available for remaining time to complete. If power cycle is necessary, please wait till completion of the  
reboot process.  
The System Overview page appears upon the completion of reboot.  
142  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5 System Status  
This section breaks down into subsections of System Overview, Associated Clients Status, DHCP Client List, Extra  
Information and Event Log.  
6.5.1 System Overview  
Display detailed information of System, Network, LAN and Wireless in the System Overview page.  
System : Display the information of the system.  
Î
Î
Î
Î
Î
Î
Î
Î
System Name : The name of the system.  
Operating Mode : The mode currently in service.  
Location : The reminding note on the geographical location of the system.  
Description : The reminding note of the system.  
Firmware Version : The current firmware version installed.  
Firmware Date : The build time of the firmware installed.  
Device Time : The current time of the system.  
System Up Time : The time period that system has been in service since last reboot.  
Network Information : Display the information of the Network.  
Î
Î
Mode : Supports Static or Dynamic modes on the LAN interface.  
IP Address : The management IP of system. By default, it’s 192.168.2.254.  
143  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
Î
IP Netmask : The network mask. By default, it’s 255.255.255.0.  
IP Gateway : The gateway IP address and by default, it’s 192.168.2.1.  
Primary DNS : The primary DNS server in service.  
Secondary DNS : The secondary DNS server in service.  
LAN Information : Display the detailed receive and transmit statistics of LAN interface.  
Î
Î
Î
Î
Î
MAC Address : The MAC address of the LAN port.  
Receive bytes : The total received packets in bytes on the LAN port.  
Receive packets : The total received packets of the LAN port.  
Transmit bytes : The total transmitted packets in bytes of the LAN port.  
Transmit packets : The total transmitted packets of the LAN port.  
Wireless Station Information : Display the information of the associated AP.  
Î
Î
Î
ESSID : Display Extended Service Set ID of the associated AP currently.  
Security : Display security type of the associated AP currently.  
Status : Display connection status of the associated AP currently.  
If the system associated with AP, the BSSID, RSSI and Last Rx Time will be show up. Below depicts the examples for  
associated AP of Wireless Information.  
144  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Î
Î
Î
Î
Î
Î
Î
Î
BSSID : Indicate the Basic Service Set ID of the associated AP.  
RSSI : Indicate the RSSI of the associated AP.  
Last Rx Time : Indicate the last receive packet of the associated AP.  
MAC Address : The MAC address of the Wireless Station port.  
Receive bytes : The total received packets in bytes on the Wireless Station port.  
Receive packets : The total received packets on the Wireless Station port.  
Transmit bytes : The total transmitted packets in bytes on the Wireless Station port.  
Transmit packets : The total transmitted packets on the Wireless Station port.  
Wireless AP Information : Display the detailed receive and transmit statistics of Wireless AP.  
Î
Î
Î
Î
Î
MAC Address : The MAC address of the Wireless AP port.  
Receive bytes : The total received packets in bytes on the Wireless AP port.  
Receive packets : The total received packets on the Wireless AP port.  
Transmit bytes : The total transmitted packets in bytes on the Wireless AP port.  
Transmit packets : The total transmitted packets on the Wireless AP port.  
145  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5.2 Associated Clients Status  
It's display all associated clients on repeater AP.  
MAC Address : MAC address of associated clients.  
RSSI : RSSI of from associated clients..  
Last TX Time : Last inactive time period in seconds for a wireless connection.  
Disconnect : Click “Delete” button to manually disconnect a wireless client in a repeater AP.  
146  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5.3 DHCP Clients  
Users could retrieve DHCP server and DHCP clients’ IP/MAC address via this page.  
IP address : IP addresses to LAN devices by DHCP server.  
MAC address : MAC addresses of LAN devices.  
Expired In : Shows how long the leased IP address will expire.  
147  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5.4 Extra Information  
Users could pull out information such as Route table, ARP table, MAC table, Bridge table or STP available in the drop-down  
list from system. The “Refresh” button is used to retrieve latest table information.  
Route table information : Select “Route table information” on the drop-down list to display route table.  
APO1000/APO1010 could be used as a L2 or L3 device. It doesn’t support dynamic routing protocols such as RIP or  
OSPF. Static routes to specific hosts, networks or default gateway are set up automatically according to the IP  
configuration of system's interfaces. When used as a L2 device, it could switch packets and, as L3 device, it’s capable of  
being a gateway to route packets inward and outward.  
ARP table Information : Select “ARP Table Information” on the drop-down list to display ARP table.  
ARP associates each IP address to a unique hardware address (MAC) of a device. It is important to have a unique IP  
address as final destination to switch packets to.  
Bridge table information : Select “Bridge Table information” on the drop-down list to display bridge table.  
Bridge table will show Bridge ID and STP's Status on the each Ethernet bridge and its attached interfaces, the Bridge  
Port should be attached to some interfaces (e.g. eth0, ath0 and ath8).  
Bridge MAC information : Select “Bridge MACs Information” on the drop-down list to display MAC table.  
This table displays local MAC addresses associated with wired or wireless interfaces, but also remember non-local MAC  
addresses learned from wired or wireless interfaces.  
148  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ageing timers will be reset when existing MAC addresses in table are learned again or added when new MAC addresses  
are seen from wired or wireless interfaces as well. When time runs out for a particular entry, it will be pruned from the  
table. In that situation, switching packet to that particular MAC address will be dropped.  
Bridge STP Information : Select “Bridge STP Information” on the drop-down list to display a list of bridge STP  
information.  
149  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.5.5 Event Log  
The Event log displays system events when system is up and running. Also, it becomes very useful as a troubleshooting tool  
when issues are experienced in system.  
Time: The date and time when the event occurred.  
Facility: It helps users to identify source of events such “System” or “User”  
Severity: Severity level that a specific event is associated such as “info”, “error”, “warning”, etc.  
Message: Description of the event.  
Click Refresh button to renew the log, or click Clear button to clear all the record.  
150  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7. Command Line Interface(CLI)  
Help, showinfo, pwinfo, set, reboot, default and password functions are available via Telnet session.  
7.1 Accessing the CLI with Telnet  
Follow these steps to access CLI via Telnet in the Window XP:  
Î
Î
Click Start -> Run, and type “cmd” in the “Run” field. The DOS command window appears.  
Enter “telnet 192.168.10.100” to connect with system.  
Î
Enter username and password, which are root and root by default, in the Telnet session,  
151  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.2 Using the CLI  
After accessing the CLI, the administrator can use command on the system.  
Using help command : Display all commands and descriptions  
Using showinfo command : Display System and LAN informations  
Using set command : Type set command to change IP address, netmask , gateway and operating mode.  
152  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using reboot command : Restart the system  
Using default command : Restore system default settings  
Using password command : Change root password  
153  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A. Windows TCP/IP Settings  
Windows XP  
1. Click Start -> Settings -> Control Panel, and then “Control Panel” window appears. Click on “Network  
Connections”, and then “Network Connections” window appears.  
2. Click right on “Local Area Connection”, and select Properties.  
154  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. In Local Area Connection Properties” window, select “Internet Protocol (TCP/IP)” and click on Properties button.  
4. Select “Use the following IP address”, and type in  
IP address : 192.168.2.100  
Subnet mask : 255.255.255.0  
155  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B. WEB GUI Valid Characters  
Table B  
Block  
WEB GUI Valid Characters  
Field  
Valid Characters  
LAN  
IP Address  
IP Format; 1-254  
IP Netmask  
IP Gateway  
Primary  
128.0.0.0 ~ 255.255.255.252  
IP Format; 1-254  
IP Format; 1-254  
Secondary  
Hostname  
IP Format; 1-254  
Length : 32  
0-9, A-Z, a-z  
@ - _ .  
WAN  
Manual MAC Address  
IP Address  
12 HEX chars  
IP Format; 1-254  
IP Netmask  
128.0.0.0 ~ 255.255.255.255  
IP Format; 1-254  
IP Gateway  
Hostname  
Length : 32  
0-9, A-Z, a-z  
@ - _ .  
User name  
Password  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
MTU  
576 ~ 1492  
Idle Time  
Primary  
0 ~ 60 minutes  
IP Format; 1-254  
IP Format; 1-254  
Secondary  
Hostname  
DDNS  
Length : 32  
0-9, A-Z, a-z  
@ - _ .  
User Name  
Password  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
DHCP Server  
Start IP  
IP Format; 1-254  
IP Format; 1-254  
IP Format; 1-254  
IP Format; 1-254  
End IP  
DNS1 IP / DNS2 IP  
WINS IP  
156  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Domain  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Lease Time  
600 ~ 99999999 Seconds  
Table B  
WEB GUI Valid Characters (continued)  
Block  
Management  
Field  
Valid Characters  
System Name  
Description  
Location  
Length : 32  
0-9, A-Z, a-z  
Space  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Length : 40  
0-9, A-Z, a-z  
Space  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Length : 32  
0-9, A-Z, a-z  
Space  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
New Password  
Length : 4 ~ 30  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Check New Password  
Length : 4 ~ 30  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
HTTP Port  
HTTPS Port  
Telnet Port  
1 ~ 65535  
1 ~ 65535  
1 ~ 65535  
1 ~ 65535  
SSH Port  
SNMP  
RO community  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
RW community  
RO user  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
Length : 31  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
RO password  
RW user  
Length : 8 ~ 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
Length : 31  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
157  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Block  
Field  
Valid Characters  
RW password  
Length : 8 ~ 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
Community  
IP  
Length : 32  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] ; ` , . =  
IP Format; 1-254  
Table B  
Block  
WEB GUI Valid Characters (continued)  
Field  
Valid Characters  
General Setup  
(CPE Mode)  
ESSID  
Length : 31  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
WEP Key  
10, 26, 32 HEX chars  
Pre-shared Key  
Slot Time  
8 ~ 63 ASCII chars; 64 HEX chars  
1 ~ 1489  
Advanced Setup  
ACK Timeout  
1 ~ 372  
CTS Timeout  
1 ~ 744  
RSSI Threshold  
Beacon Interval  
DTIM Interval  
-128 ~ 127  
1 ~ 5000  
1 ~ 15  
Fragment Threshold  
256 ~ 2346  
1 ~ 2346  
RTS Threshold  
ESSID  
Virtual AP Setup  
Length : 31  
0-9, A-Z, a-z  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Maximum Clients  
VLAN ID  
1 ~ 32  
0 ~ 4094  
WEP Key  
10, 26, 32 HEX chars; 5, 13, 16 ASCII chars  
10 ~ 99999999 seconds; default is 600  
10 ~ 99999999 seconds; default is 83400  
8 ~ 63 ASCII chars; 64 HEX chars  
IP Format; 1-254  
Group Key Update  
Master Key Update  
Pre-Shared Key  
Authentication Server  
Authentication Port  
1 ~ 65535  
158  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Block  
Field  
Valid Characters  
Shared Secret  
1 ~ 64 characters  
EAP Reauth Period  
Accounting Server  
Accounting Port  
300 ~ 99999999; default is 3600, 0 is disable  
IP Format; 1-254  
1 ~ 65535  
WEP Key Update  
0 ~ 99999999 ; default is 300, 0 is disable  
Table B  
WEB GUI Valid Characters (continued)  
Block  
WDS Setup  
Field  
Valid Characters  
Peer's MAC Address  
VLAN ID  
12 HEX chars  
0 ~ 4094 ; Space is disable  
Description  
Length : 32  
0-9, A-Z, a-z  
Space  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
WEP Key  
10, 26, 32 HEX chars  
AES Key  
32 HEX chars  
IP Filter  
Source Address  
IP Format; 1-254  
Source Mask  
0 ~ 32  
Source Port  
1 ~ 65535  
IP Format; 1-254  
0 ~ 32  
Destination Address  
Destination Mask  
Destination Port  
MAC address  
Description  
1 ~ 65535  
MAC Filter  
MAC Format; 12 HEX chars  
Virtual Server  
Length : 32  
0-9, A-Z, a-z  
space  
~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . =  
Private IP  
IP Formate; 1-254  
1 ~ 65535  
Private Port  
Public Port  
IP Address  
1 ~ 65535  
DMZ  
IP Format; 1-254  
159  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C. Network Manager Privileges  
There are two system management accounts for maintaining the system; namely, the root and admin accounts are with  
different levels of privileges. The root manager account is empowered with full privilege to Read & Write while the admin  
manager account is Read only.  
The following table display CPE admin account’s privileges.  
Main Menu  
Sub Menu  
Group  
Admin Privilege  
Operating Mode  
WAN  
Read  
Read  
LAN  
Read & Write  
Read  
System Information  
Root Password  
Admin Password  
Login Methods  
Read  
Management  
System  
Read & Write  
Read  
DDNS  
Time  
Read & Write  
Read & Write  
Read  
SNMP Setup  
UPNP  
Read & Write  
General  
Advanced  
Site Survey  
Read  
Read  
Read  
Wireless  
Advance  
DMZ  
Read  
Read  
Read  
Read  
IP Filter  
MAC Filter  
Virtual Server  
Read & Write  
Read  
Backup Settings  
Restore Settings  
Reset to Default  
Profile Settings  
Read  
Utilities  
System Upgrade  
Network Utility  
Reboot  
Read  
Read & Write  
Read & Write  
160  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix D. Enabling UPnP in Windows XP  
1. Open the “Add/Remove Programscontrol panel, and then click on “Add/Remove Windows Componentsin the  
sidebar. Scroll down and find “Networking Services, highlight it, and then click Details.  
2. In the “Networking Services” window, ensure “Internet Gateway Deviceand “UPnP User Interfaceoptions are  
checked. If they are not, check to enable them, as shown below, and click Ok to continue.  
161  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Next, in the “Control panel”, open the “Administrative Toolsand then open “Services. Scroll down until you find the  
SSDP Discovery Interface. If the Status is not Started, double-click on SSDP Discovery Interface to open the service  
properties. Change the startup type to Automatic, then close the properties. Now, right-click on SSDP Discovery  
Services, and choose Start from the pop-up menu. The SSDP Discovery Service will then be running and start each time  
you boot.  
4. After enabling UPnP and starting the SSDP Discovery Service, it may take few minutes for the APO1000/APO1010 to be  
discovered and appear in your “My Network Places.  
162  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Technical Support  
Toll Free: 1-888-746-3238  
Web Site: www.airlink101.com  
*Theoretical maximum wireless signal rate derived from IEEE standard 802.11. Actual data throughput will vary. Network conditions and  
environmental factors, including volume of network traffic, building materials and construction, mix of wireless products used, radio  
frequency interference (e.g., cordless telephones and microwaves) as well as network overhead lower actual data throughput rate.  
Compatibility with draft 802.11n devices from other manufactures is not guaranteed. Specifications are subject to change without notice.  
Photo of product may not reflect actual content. All products and trademarks are the property of their respective owners. Copyright ©2010  
Airlink101®  
163  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Acer Laptop 3020 Series User Manual
Acoustic Energy Projector LT25 User Manual
Addonics Technologies Computer Hardware RTM2233EU3 User Manual
AEG Power Supply Protect A500 User Manual
Amana Range AGG200AA User Manual
American DJ DJ Equipment Saga User Manual
American Standard Door Framed By Pass Shower User Manual
AMX Stereo Receiver HDMI UTPRO 0808 User Manual
Beckett Water Gardening Plumbing Product G325AG20 User Manual
Beko Styling Iron BKK 1174 SD User Manual