11a/b/g Wireless Workgroup Bridge User Guide
|
|
|
- Caitlin Stevenson
- 9 years ago
- Views:
Transcription
1 11a/b/g Wireless Workgroup Bridge User Guide Model: WL-560 3CRWE Part No. DUA AAA03 Published August 2005
2 3Com Corporation 350 Campus Drive Marlborough MA USA Copyright , 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change. 3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT or!license.txt. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you. UNITED STATES GOVERNMENT LEGEND If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following: All technical data and computer software are commercial in nature and developed solely at private expense. Software is delivered as Commercial Computer Software as defined in DFARS (June 1995) or as a commercial item as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR (Nov 1995) or FAR (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries. 3Com and the 3Com logo are registered trademarks of 3Com Corporation. Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc. All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations. Conserving energy, materials and natural resources in all operations. Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards. Maximizing the recyclable and reusable content of all products. Ensuring that all products can be recycled, reused and disposed of safely. Ensuring that all products are labelled according to recognized environmental standards. Improving our environmental record on a continual basis. End of Life Statement 3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components. Regulated Materials Statement 3Com products do not contain any hazardous or ozone-depleting material. Environmental Statement about the Documentation The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are vegetable-based with a low heavy-metal content.
3 CONTENTS ABOUT THIS GUIDE Conventions 2 Related Documentation 2 Accessing Online Documentation 3 Product Registration and Support 4 1 INTRODUCTION Product Features 5 Security 5 Wireless Network Standards 6 Network Configuration and Planning 7 Example Configurations 8 2 INSTALLING THE BRIDGE Unpacking the Bridge 9 Observing Safety Precautions 10 Deciding Where to Place the Bridge 11 Wall-Mounting the Bridge 11 Installing the Locking Bar 12 Placing the Bridge on a Flat Surface 13 Connecting the Bridge 14 Connecting to a Serial Device 14 Connecting to an Ethernet Device 15 About the Client List 15 Connecting to a Hub 15 Connecting to a Network Printer 16 Connecting to a Computer 16 Checking the LED Indicators 17 Attaching an External Antenna 18 Determining if You Need to Configure the Bridge 18 Using the 3Com Installation CD 21
4 3 CONFIGURING THE BRIDGE Using Secure Web Server Connection 23 Using the 3Com Wireless Infrastructure Device Manager 24 Using the Configuration Management System 27 Clearing and Applying System Configuration Settings 28 Changing System Properties 29 Setting IP Network Properties 30 Setting Wireless Network Properties 31 Manually Selecting Radio Channels 35 Setting Up an Ad-Hoc Network 35 Changing Wireless Security Settings 36 No Security (Open System) 36 40/64-bit WEP Key /128-bit WEP Key /152-bit WEP Key 37 Dynamic WEP with LEAP-Compatible Mode 37 TKIP 38 AES 38 Managing Certificates 39 Uploading a Trusted Root Certificate 39 Uploading a User Certificate 40 Viewing and Removing Certificates 40 Configuring Certificate Validation 40 Changing RADIUS Settings 41 Using the 802.1X Exception List 42 Adding a New MAC Address to the 802.1X Exception List 43 Changing SNMP Settings 43 Using the Access Control List 44 Configuring the Serial Port 45 Configuring Operation Mode 45 Configuring UART Settings 45 Configuring Network Serial Port Settings 46 Configuring the Serial Telnet Client 48 Applying Settings 49 Configuring System Log Settings 49 Setting the System Time 49 Setting the Time Manually 50
5 Enabling the SNTP Client 50 Resetting the Bridge 51 Restoring the Bridge to Factory Defaults 51 Upgrading the Bridge Firmware 52 Using FTP (default) 52 Using TFTP 52 Using HTTP 53 Changing the Administration Login Name and Password 53 Backing Up Configuration Settings and System Logs 53 Restoring a Configuration 54 Clearing the Ethernet Client List 55 Viewing Connection Status 56 Viewing System Summary 56 Viewing Event Logs 57 Logging Off the Web Interface 58 4 TROUBLESHOOTING Diagnosing Problems 59 Disconnecting the Bridge 61 Uninstalling Software and Documentation 61 Upgrading Bridge Firmware 62 A OBTAINING SUPPORT FOR YOUR 3COM PRODUCT Register Your Product to Gain Service Benefits 63 Solve Problems Online 63 Purchase Extended Warranty and Professional Services 64 Access Software Downloads 64 Contact Us 64 Telephone Technical Support and Repair 65 END USER LICENSE AGREEMENT REGULATORY INFORMATION
6
7 ABOUT THIS GUIDE This guide provides all the information you need to install and use the 3Com 11a/b/g Wireless Workgroup Bridge in its default state. The guide is intended for use by IT managers and experienced network installation and administration professionals who have a basic knowledge of current networking concepts. If the information in the release notes that are shipped with your product differ from the information in this guide, follow the instructions in the release notes. Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site:
8 2 ABOUT THIS GUIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Description Information note Caution Warning Information that describes important features or instructions. Information that alerts you to potential loss of data or potential damage to an application, system, or device. Information that alerts you to potential personal injury. Table 2 Text Conventions Convention Screen displays Syntax The words enter and type Keyboard key names Words in italics Description This typeface represents information as it appears on the screen. The word syntax means that you must evaluate the syntax provided and then supply the appropriate values for the placeholders that appear in angle brackets. Example: To change your password, use the following syntax: system password <password> In this example, you must supply a password for <password>. When you see the word enter in this guide, you must type something, and then press Return or Enter. Do not press Return or Enter when an instruction simply says type. If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example: Press Ctrl+Alt+Del Italics are used to: Emphasize a point. Denote a new term at the place where it is defined in the text. Identify menu names, menu commands, and software button names. Examples: From the Help menu, select Contents. Click OK. Related Documentation In addition to this guide, each Bridge documentation set includes the following:
9 Accessing Online Documentation 3 Quick Start Guide printed guide that describes basic installation. Online Help product help systems that describe how to use the Configuration Management System and 3Com Wireless Infrastructure Device Manager. Release Note printed note that describes important product information. README.TXT file text file located on the 3Com Installation CD that describes last-minute product information. Accessing Online Documentation The CD supplied with your Bridge contains the following online documentation: 3Com 11a/b/g Wireless Workgroup Bridge User Guide 3Com Wireless Infrastructure Device Manager Online Help 3Com 11a/b/g Wireless Workgroup Bridge Configuration Management System Online Help To access the online documentation from the CD: 1 Insert the 3Com Installation CD supplied with your Bridge in the CD-ROM drive. The setup menu appears. If it does not appear, you can start the setup menu from the Windows Start menu. For example: Start > Run > d:\setup.exe. 2 In the menu, click View the Documentation to view the Bridge User Guide. To view the online help, install and launch the Wireless Infrastructure Device Manager or Configuration Management System. See Chapter 3 for instructions.
10 4 ABOUT THIS GUIDE Product Registration and Support To register your product with 3Com, go to the following Web page: For support information, see Obtaining Support for Your 3Com Product on page 63 or log on to the 3Com Web site at and navigate to the product support page.
11 1 INTRODUCTION 3Com wireless technology has all of the benefits of a local area network (LAN) without the constraints and expense of network wiring. 3Com 11a/b/g Wireless LAN products provide easy, affordable, flexible ways to extend wireless networks to more users. This guide shows how you can use the 3Com 11a/b/g Wireless Workgroup Bridge in your office or classroom to connect groups of wired Ethernet client devices to your wireless LAN. Product Features Security The 3Com 11a/b/g Wireless Workgroup Bridge includes a robust suite of standards-based security features, and supports wireless network standards including a and g. To protect sensitive data broadcast over the radio, the Bridge supports 40/64-bit, 104/128-bit and 128/152-bit Wireless Equivalent Privacy (WEP) encryption. The Bridge strengthens this basic security mechanism with additional security features, including: MAC address access control lists IEEE 802.1X per-port user authentication with RADIUS server authentication support Temporal Key Integrity Protocol (TKIP) Advanced Encryption Standard (AES) Wi-Fi Protected Access (WPA), WPA-PSK (Pre-Shared Key) and WPA-NONE) Extensible Authentication Protocol (EAP) support: EAP-TLS, EAP-TTLS and PEAP
12 6 CHAPTER 1: INTRODUCTION Wireless Network Standards Understanding the characteristics of the a and g standards can help you make the best choice for your wireless implementation plans a Ratified in 2002, a is IEEE s more recent wireless standard. It operates at the 5 GHz band and supports data rates at up to 54 Mbps. Because there are fewer devices in the 5 GHz band, there s less potential for RF interference. However, because it is at an entirely different radio spectrum, it is not compatible with g. The higher spectrum provides about 50 m (164 ft) of coverage about half what g offers. Consider a when you need high throughput in a confined space and you are: Running high-bandwidth applications like voice, video, or multimedia over a wireless network that can benefit from a five-fold increase in data throughput. Transferring large files like computer-aided design files, preprint publishing documents or graphics files, such as MRI scans for medical applications, that demand additional bandwidth. Supporting a dense user base confined to a small coverage area. Because a has a greater number of non-overlapping channels, you can pack more wireless devices in a tighter space g g operates in the 2.4 GHz band at up to 54 Mbps. Ratified in 2003, it supports the widest coverage up to 100 m (328 ft). However, is subject to a greater risk of radio interference because it operates in the more popular 2.4 GHz band b operates at up to 11 Mbps and supports coverage up to 100 m (328 ft).
13 Network Configuration and Planning 7 Consider g when you need wider coverage and vendor compatibility and you are: Maintaining support for existing b users and the existing wireless investment while providing for expansion into g. Implementing a complete wireless LAN solution, including bridges, gateways, access points and clients; Wi-Fi certification guarantees compatibility among vendors. Providing access to hot spots in public spaces such as coffee shops or university cafeterias. Network Configuration and Planning The Bridge can operate in either infrastructure or ad-hoc mode, and can support a stand-alone wireless network configuration or an integrated configuration with 10/100 Mbps Ethernet LANs. Operating in infrastructure mode and connected to an Ethernet hub, a single Bridge can combine up to 16 client devices such as computers with network adapters and printers into a multiclient workgroup. The workgroup associates with the wired network through a wireless LAN access point such as the 3Com 11a/b/g Wireless LAN Access Point. Infrastructure configurations extend your wireless LAN to devices that would otherwise have to be connected to the wired network. Operating in ad-hoc mode, two or more Bridges can associate among themselves and communicate with one another at close range without an access point. You may wish to set up an ad-hoc network, for example, if a group is working away from the office, or if a group in the office needs to share files apart from the wired LAN.
14 POWER POWER WIRELESS WIRELESS ETHERNET ETHERNET.11a.11g a.11g a.11g CHAPTER 1: INTRODUCTION Example Configurations The following examples illustrate ways you can use the Bridge to configure Ethernet client devices into workgroups. (Details for setting up specific configurations are in Installing the Bridge on page 9.) Wireless Infrastructure Network You can connect several computers, including those with non-windows operating systems, and network printers, as shown in Figure 1. Figure 1 Wireless Infrastructure Network Access Point Hub 11a/b/g W ireless Workgroup Br idge Workgroup Ad-Hoc Network You can provide flexible wireless network association for small groups in areas that cannot be wired, as shown in Figure 2. Figure 2 Workgroup Ad-Hoc Network Hub 11a/b/ g Wireless Workgroup Brid ge Hub 11a/b/ g Wireless Workgroup Brid ge
15 2 INSTALLING THE BRIDGE This chapter contains the information you need to install and set up the Bridge. It covers the following topics: Unpacking the Bridge Observing Safety Precautions Deciding Where to Place the Bridge Connecting the Bridge Checking the LED Indicators Attaching an External Antenna Determining if You Need to Configure the Bridge Using the 3Com Installation CD Unpacking the Bridge Make sure that you have the following items, which are included with the Bridge: Power adapter and power cord. Standard Category 5 unshielded twisted pair (UTP) Ethernet cable. Locking bar (used for securing a wall-mounted installation). Rubber feet (four; used for a flat-surface installation). 3Com Installation CD. For wall-mounting installations, you need the following items, which are not included with the Bridge: Mounting screws. Plastic anchors (for drywall mounting). To secure the Bridge using the locking bar, you need a lock (not supplied).
16 10 CHAPTER 2: INSTALLING THE BRIDGE Figure 3 shows the front view of the Bridge, including the LEDs and connecting ports. It also shows the cradle, which is used to mount the Bridge to a wall or to install the Bridge on a flat surface. Figure 3 Bridge 11a/b/g Wireless Workgroup Bridge Power Port Serial Port Ethernet Port Cradle Observing Safety Precautions This equipment must be installed in compliance with local and national building codes, regulatory restrictions, and FCC rules. For the safety of people and equipment, only professional network personnel should install the Bridge. WARNING: To comply with FCC radio frequency (RF) exposure limits, a minimum body-to-antenna distance of 20 cm (8 in.) must be maintained when the Bridge is operational. WARNING: To avoid possible injury or damage to equipment, you must use either the provided power supply or power supply equipment that is safety certified according to UL, CSA, IEC, or other applicable national or international safety requirements for the country of use. All references to power supply in this document refer to equipment meeting these requirements.
17 Deciding Where to Place the Bridge 11 Deciding Where to Place the Bridge Place the Bridge in a dry, clean location near the hub, computer, or printer that will be connected to the Bridge. The location must have a power source and be within the following distance of a Wi-Fi compliant wireless LAN access point or ad-hoc wireless station: For a compatibility, place the Bridge within 50 m (164 ft) of a Wi-Fi compliant wireless LAN access point. For b/g compatibility, place the Bridge within 100 m (328 ft) of a Wi-Fi compliant wireless LAN access point. The location should be away from transformers, heavy-duty motors, fluorescent lights, microwave ovens, refrigerators, or other equipment that could cause radio signal interference. Wall-Mounting the Bridge The Bridge comes with a cradle for mounting on a wall. For additional security, the Bridge also comes with a locking bar, which can be used with a security lock (not provided) to lock the Bridge to the cradle after the Bridge is mounted to a wall. To wall-mount the bridge: 1 Route the power and Ethernet cables through the large opening in the cradle. Figure 4 shows a cable being routed under the cradle. Figure 4 Routing Cable Under the Cradle 2 Screw the cradle to a wall, as shown in Figure 5.
18 12 CHAPTER 2: INSTALLING THE BRIDGE Figure 5 Wall-Mounting the Bridge Cradle 3 Connect the power and Ethernet cables to the ports on the Bridge. 4 Snap the Bridge onto the cradle. Installing the Locking Bar For additional security, install the locking bar in the cradle after the Bridge is mounted to the wall. Use your own lock to secure it in place. To install the locking bar: 1 Insert the locking bar through the opening in the side of the cradle, as shown in Figure 6. Figure 6 Inserting the Locking Bar.11a.11g Push the locking bar through the opening until the hole on the locking bar is exposed.
19 Deciding Where to Place the Bridge 13 3 Insert a lock through the hole on the locking bar, and then close the lock to secure it in place, as shown in Figure 7. Figure 7 Securing the Locking Bar g.11a Placing the Bridge on a Flat Surface The Bridge comes with four rubber feet that can be used to install the Bridge on a flat surface such as a table or desktop. CAUTION: Do not place the Bridge on any type of metal surface. Select a location that is clear of obstructions and provides good reception. Remove the backing from the rubber feet and attach them to the bottom of the cradle. After the rubber feet are installed, place the Bridge on a flat surface.
20 14 CHAPTER 2: INSTALLING THE BRIDGE Connecting the Bridge The Bridge has power, Ethernet, and serial ports, as shown in Figure 8. Before connecting the Bridge to an Ethernet device, connect the power. Figure 8 Connecting the Power Power Cable Ethernet Cable Connecting to a Serial Device The Bridge can also be connected to a serial device, as shown in Figure 9. Serial cables come with a variety of connector sizes. If your connector is large and prevents the cradle from being attached to the Bridge, remove the end cap on the cradle. This allows the connector to extend through the cradle. Figure 9 Connecting a Serial Cable Serial Cable
21 POWER WIRELESS ETHERNET.11a.11g Connecting the Bridge 15 Connecting to an Ethernet Device The Bridge is designed to be connected to an Ethernet client device such as a hub, computer, or printer. CAUTION: To avoid the possibility of a transmission loop situation between the Bridge and an access point, which could disrupt network operation, do not connect a Bridge that is set in Wireless Client (Infrastructure) mode directly to the LAN (for example, through a wall port or through a hub that is connected directly to the LAN). About the Client List The Bridge supports up to 16 specific Ethernet client devices. It uses a client list of MAC addresses to keep track of specific devices that have been connected. After 16 different devices have been connected, the client list is full, and you must clear it before the next new device can associate with the network through the Bridge. To clear the list, you must access the Bridge s Configuration Management System. Details are in Clearing the Ethernet Client List on page 55. Connecting to a Hub You can supply network connections for up to 16 devices, such as computers and network printers, by connecting the Bridge to an Ethernet hub, as shown in Figure 10. Figure 10 Connecting to a Hub Access Point Hub Uplink Port 11a/b/g Wireless Workgroup Brid ge You can directly connect the Bridge to a hub that does not have an uplink (MDIX) port, without the need of an Ethernet crossover cable.
22 POWER WIRELESS ETHERNET POWER WIRELESS ETHERNET.11a.11g a.11g CHAPTER 2: INSTALLING THE BRIDGE Connecting to a Network Printer You can connect a network printer directly to the Bridge or to a hub that is connected to the Bridge. Used this way, the Bridge allows you to place network printers in areas that are not wired for Ethernet. 1 Configure the network printer as you would for connecting it to the wired LAN. For details on configuring the printer, see your printer documentation. 2 If necessary, configure the Bridge to associate with your access point. 3 Connect the Bridge to the power supply in its permanent location. 4 Connect the network printer directly to the Bridge as shown in Figure 11, or to a hub that is connected to the Bridge as shown in Connecting to a Hub on page 15. Figure 11 Connecting to a Network Printer Access Point 11a/b/ g Wireless Workgroup Brid ge Connecting to a Computer You can connect the Bridge directly to a computer through Ethernet as shown in Figure 12. Used this way, the Bridge can convert a desktop computer to a wireless computer. This connection also allows you to configure a Bridge before connecting it to another device. Figure 12 Connecting to a Computer Access Point 11a/b/ g Wireless Workgroup Bridge
23 Checking the LED Indicators 17 Checking the LED Indicators When the Bridge is connected to power, LEDs indicate activity as follows: Figure 13 LED Indicators.11a.11b/g Table 3 LED Descriptions LED Color Indicates Power Green Off The Bridge is powered up and operating normally. The Bridge is not receiving power or there is a fault with the power supply. 11a 11b/g Green (solid) Green (blinking) Off Green (solid) Green (blinking) Off The Bridge has an a 5 GHz radio band connection. The Bridge has WLAN frame transmission over the a 5 GHz radio band. No link is present. The Bridge has an g 2.4 GHz radio band connection. The Bridge has WLAN frame transmission over the g 2.4 GHz radio band. No link is present. 100 Green (solid) Green (blinking) Off 10 Green (solid) Green (blinking) Off The Bridge has a 100 Mbps Fast Ethernet connection. The Bridge has 100 Mbps Fast Ethernet activity. No link is present. The Bridge has a 10 Mbps Ethernet connection. The Bridge has 10 Mbps Ethernet activity. No link is present.
24 18 CHAPTER 2: INSTALLING THE BRIDGE Attaching an External Antenna The Bridge has two internal diversity dual-band antennas. If you want to increase the range of the Bridge, an external antenna can be attached to the external antenna connector on the Bridge. The 3Com-approved external antenna for this Bridge is the 3Com 2.4/5 GHz Omnidirectional Workgroup Bridge Antenna (3CWE501). For more information, go to Determining if You Need to Configure the Bridge If your network has a DHCP server and no special security requirements, you can most likely use the Bridge just as it is shipped from the factory. It takes approximately one to two minutes for the Bridge to determine if there is a DHCP server on the network. View the Bridge s default settings on page 20 to determine whether or not you need to configure the Bridge for your network. If the factory defaults meet your requirements, you can connect the Bridge as described in Connecting the Bridge on page 14. If your network does not have a DHCP server or is more complex, you may have to configure the Bridge and organize devices so that you can manage the wireless LAN easily and keep it secure. You can use the 3Com Wireless Infrastructure Device Manager (Widman) included on the 3Com Installation CD. For non-u.s. versions of the Bridge, you need to set the Country mode. This is done when you first open the Bridge s Configuration Management System. See Using the Configuration Management System on page 27 for instructions. Networks with a DHCP Server If your network has a DHCP server, an IP address is automatically assigned to the Bridge. It takes approximately one to two minutes for the Bridge to determine if there is a DHCP server on the network. Use the 3Com Wireless Infrastructure Device Manager (Widman) included on the 3Com Installation CD to locate the Bridge on the network and view its IP address. Alternatively, you can enter the Bridge s IP address into a Web browser on a computer on the same subnet to view the Bridge s system status or change its configuration. See Configuring the Bridge on page 23 for instructions.
25 Determining if You Need to Configure the Bridge 19 Networks without a DHCP Server If your network does not have a DHCP server, the Bridge uses a default IP address ( ) that is assigned at the factory. You can use that IP address to configure the Bridge, or you can assign a new IP address to the Bridge. To verify that the Bridge is using the default IP address assigned at the factory: 1 Connect a computer directly to the Bridge using the supplied standard Category 5 UTP Ethernet cable. See Figure 12 on page 16 for a connection diagram. 2 Enter the Bridge s default IP address ( ) into the computer s Web browser. If the Configuration Management System starts, the Bridge is using the factory assigned IP address. You can configure the Bridge with the following login information: Login name: admin Password: none (blank) See Configuring the Bridge on page 23 for detailed instructions. If the Configuration Management System does not start, the Bridge is on a different subnet than the computer. Install and start the 3Com Wireless Infrastructure Device Manager to discover the Bridge s IP address. See Using the 3Com Wireless Infrastructure Device Manager on page 24 for instructions.
26 20 CHAPTER 2: INSTALLING THE BRIDGE Bridge Default Settings Table 4 shows the Bridge configuration factory defaults. Table 4 Factory Default Settings Property Device Name Device Location Country Client Mode IP Network Setting IP Address Subnet Mask Gateway IP Address Network Mode Radio Mode Wireless LAN Service Area Channel Selection Default Setting 3Com WWB None (blank) For U.S. version, United States and Canada For non-u.s. version, set by the user Support multiple wired Ethernet clients Obtain IP address automatically Obtained automatically (with a DHCP server) (without a DHCP server) Obtained automatically (with a DHCP server) (without a DHCP server) Obtained automatically (with a DHCP server) (without a DHCP server) Wireless Client (Infrastructure) Auto Select Transmit Power 100% Antenna Selection Data Preamble Security Setting Attach to any WLAN Service Area (ESSID) automatically Automatic Best Channel (uses access point setting) Internal 802.1X Authentication State Disabled SNMP Access Control List Administration Login Name Administration Password TFTP Server IP Address FTP Server IP Address Long (if Network Mode is set to Ad-Hoc) Same as access point setting (if Network Mode is set to Wireless Client [Infrastructure]) Open System (no security) Enabled Disabled admin None (blank) None None
27 Using the 3Com Installation CD 21 Using the 3Com Installation CD The 3Com Installation CD contains the following tools and utilities: 3Com Wireless Infrastructure Device Manager An administration tool that helps you select 3Com wireless LAN devices and launch their configurations in your Web browser. 3Com 3CDaemon Server Tool A firmware upgrade tool that can act in four different capacities: As a TFTP Server, used for firmware upgrades as well as backup and restore functions. As a SysLog Server, which is necessary to view SysLog messages. As an optional TFTP Client. As an optional FTP Server. To use the 3Com Installation CD, you need a computer running one of the operating systems and browser listed in Table 5. Table 5 Supported Operating Systems and Browser Operating Systems Browser Windows XP Windows 2000 Windows NT 4.0 Windows Me Windows 98 Internet Explorer (latest version is recommended)
28 22 CHAPTER 2: INSTALLING THE BRIDGE To install one of the tools on your computer: 1 Turn on the computer. 2 Insert the 3Com Installation CD in the CD-ROM drive. The setup menu appears. If it does not appear, you can start the setup menu from the Windows Start menu. For example: Start > Run > d:setup.exe. 3 In the menu, click Tools and Utilities. 4 In the next screen, click the tool you want to install. 5 Follow the instructions on the screens to complete the installation. Reboot the computer if prompted to do so. 6 Launch the tool from the Windows Start menu. For details on using the Wireless Infrastructure Device Manager, see Using the 3Com Wireless Infrastructure Device Manager on page 24. For instructions on using the 3CDaemon Server Tool, see the application s online help.
29 3 CONFIGURING THE BRIDGE If the Bridge configuration that was set at the factory does not meet your network requirements, or if you want to customize the settings, you can use these tools to change the configuration: Table 6 Configuration Tools Configuration Tool 3Com Wireless Infrastructure Device Manager (Widman) 3Com 11a/b/g Wireless Workgroup Bridge Configuration Management System Description Helps you locate 3Com wireless LAN devices on the network, select a device and view its properties, and launch the device s configuration in your Web browser. See Using the 3Com Wireless Infrastructure Device Manager on page 24 for details. Resides on the Bridge and lets you configure the Bridge through your Web browser. The latest version of Internet Explorer is recommended. See Using the Configuration Management System on page 27 for details. Using Secure Web Server Connection The Bridge can be configured using Secure Socket Layer (SSL) technology, which is used to encrypt data exchanged between the computer and the Bridge during a configuration session. Without SSL enabled, data is exchanged in the form of plain text and can be intercepted during the configuration session. You must enable the HTTPS option to establish a secure session. See Web GUI Protocol in Table 9 on page 30 for instructions.
30 24 CHAPTER 3: CONFIGURING THE BRIDGE Using the 3Com Wireless Infrastructure Device Manager The 3Com Wireless Infrastructure Device Manager (Widman) helps you locate 3Com wireless LAN devices on the network, select a device and view its properties, and launch the Configuration Management System in your Web browser. The Wireless Infrastructure Device Manager must be installed on a computer that: Has a working Ethernet adapter. Is running Internet Explorer and one of the Windows operating systems listed in Using the 3Com Installation CD on page 21. Is on the same subnet as the Bridge. See Using the 3Com Installation CD on page 21 for installation instructions. The device to be configured using the Wireless Infrastructure Device Manager must be: Connected to a power source. Wired to the network, associating with the wireless network, or, in some cases with the Bridge, connected directly to the computer. If there is more than one device with the same name in the network (for example, 3Com WWB), make a note of the MAC address of the device you want to select so that you can identify it in the device manager. If you do not have a DHCP server on your network, it can take up to one minute for a device to become discovered after it has been powered up. To use the 3Com Wireless Infrastructure Device Manager: 1 Launch the device manager by selecting Start > Programs > 3Com Wireless > Wireless Infrastructure Device Manager. If you have more than one network adapter installed on your computer, you may be prompted to choose a network adapter. Choose the appropriate adapter and click OK. The Wireless Network Tree appears in the 3Com Wireless Infrastructure Device Manager window, as shown in Figure 14. The tree lists all WLAN service areas on the network and expands to show the 3Com wireless LAN devices that are associated to each service area. Devices
31 Using the 3Com Wireless Infrastructure Device Manager 25 in a different subnet than your computer are identified with exclamation points (!). You can refresh this display by clicking Refresh. You should refresh the display, for example, after you change a device IP address. Figure 14 Wireless Infrastructure Device Manager Wireless Network Tree 2 In the Wireless Network Tree, select the device you want to configure. If more than one wireless LAN device appears in the tree and you are not sure that you have selected the right one, click Properties and check the MAC address to verify that it is the one you want. 3 Click Configure. If the selected device is on the same subnet as your computer, the Configuration Management System main page appears in your Web browser. See Using the Configuration Management System on page 27, for details. If the selected device is on a different subnet, the device manager helps you to assign an IP address on the same subnet as your computer, as shown in Figure 15. You may accept the address offered or enter an address and click Next.
32 26 CHAPTER 3: CONFIGURING THE BRIDGE Figure 15 Wireless Infrastructure Device Manager Pre-IP Configuration 4 The next window prompts for an administrative password to allow the new IP address to be set. If this is the first time the device is being configured, leave the password field blank and click Next. The configuration main page appears in your Web browser. See Using the Configuration Management System on page 27 for details. Table 7 describes the functions of the buttons in the 3Com Wireless Infrastructure Device Manager window. Table 7 Infrastructure Device Manager Options Button Properties Configure Refresh Choose NIC Close Help Description Displays the following properties of the selected device: Device Name, Device Type, Wireless LAN Service Area (ESSID), IP Address, Subnet Mask, and MAC Address. Launches the Configuration Management System for the selected device. If the selected device is on a different subnet, you are prompted to assign an address on the same subnet as your computer. Scans the network and displays the connected 3Com 11a/b/g Wireless LAN devices. If your computer has more than one network interface card installed, allows you to choose which card to use. Closes the device manager window and ends the session. Launches the device manager help page in your browser.
33 Using the Configuration Management System 27 Using the Configuration Management System The 3Com11a/b/g Wireless Workgroup Bridge Configuration Management System resides on the Bridge and lets you configure the Bridge through your Web browser. To use the Configuration Management System, the computer you are using to connect to the Bridge must be located on the same subnet as the Bridge. There are two ways to access the Configuration Management System: Enter the IP address of the Bridge in your computer s Web browser. Start the 3Com Wireless Infrastructure Device Manager, locate the Bridge, and then click Configure. For non-u.s. versions of the Bridge, when you first open the Configuration Management System you are prompted to select the country in which the Bridge is operating. Select the country in which the Bridge is installed to ensure compliance with local regulations, and then click Apply. When you first open the Configuration Management System, you are prompted for a user name and password: User name admin Password blank (press Enter) The Configuration Management System displays the Connection Status page, as detailed in Table 8. Table 8 Connection Status Page Property Description Default Value Connection The MAC address of the associated N/A access point. Network Type The type of network for which the Bridge is configured: Wireless Wireless Client (Infrastructure) Client (Infrastructure) or Ad-hoc (Peer-to-Peer). SSID The Service Set ID. If this field displays Auto Select, it means the Bridge automatically associated with the access point that has the strongest signal. Auto Select
34 28 CHAPTER 3: CONFIGURING THE BRIDGE Table 8 Connection Status Page (continued) Radio Mode Current Channel Security Rx Data Rate (Mbps) Tx Data Rate (Mbps) Link Quality Received Signal Strength Activity (Packets Rx) Activity (Packets Tx) The way in which the Bridge selects a radio band. The channel over which the Bridge is communicating with clients. The type of security for which the Bridge is configured. The most recent data reception rate. The most recent data transmission rate. The normalized transmitted data rate (that is, the current data rate over the maximum data rate). Link Quality is shown in Wireless Client (Infrastructure) mode only. The strength of the radio signal that the Bridge detects. Received Signal Strength is shown in Wireless Client (Infrastructure) mode only. The number of packets the Bridge has received. The number of packets the Bridge has transmitted. Auto-Select Varies Open System (no security) N/A N/A N/A N/A N/A N/A IP Address The IP address of the Bridge. Varies Clearing and Applying System Configuration Settings The pages in the Configuration Management System have two buttons: Clear and Apply. Clear returns the settings to the values they were when you last clicked Apply. Apply stores the settings permanently in the nonvolatile flash memory. After you click Apply, the new settings take effect and you can see the changes on the System Summary page. CAUTION: Your changes are lost if you forget to click Apply before moving to a new configuration page.
35 Changing System Properties 29 Changing System Properties Under System Configuration, click System Properties. The System Properties page displays the properties of the selected Bridge. You can change properties by entering a value in a field (see Table 9). When you are finished, click Apply. Table 9 describes the properties. Table 9 System Properties Page Property Description Default Value Device Name This name appears in the System 3Com WWB Summary window. You can change the default name to one of your choice. Device Location If you use the default device name, None entering the location is optional. Client Mode This setting allows the Bridge to support single or multiple Ethernet clients attached to the Bridge. Support Single Wired Ethernet Client is used only when the Bridge is used for replacement of a 3Com Ethernet Client Bridge. Select a MAC option: Support multiple wired Ethernet clients Capture: Each time the Bridge is powered on, it captures its MAC address from the first packet it receives on the Ethernet port. The Bridge detects and uses the same MAC address as the device plugged into the Ethernet port. The Bridge uses the previously captured MAC address upon power-on until the first packet is received on the Ethernet port. Dynamic: The Bridge changes its MAC address each time the device plugged into the Ethernet port changes. The Bridge detects the MAC address of the device plugged into the Ethernet port and uses that as its own. The Bridge uses the built-in MAC address upon power-on until a packet is received on the Ethernet port. Built-in: The Bridge uses the manufacturing radio MAC address as default.
36 30 CHAPTER 3: CONFIGURING THE BRIDGE Table 9 System Properties Page Web GUI Protocol WidMan RSSI Monitor Support This setting allows users to enable the secure data exchange scheme over SSL during a configuration session. HTTPS enables SSL technology. HTTP disables SSL technology. When enabled, WidMan shows a graph of the signal strength received by the Bridge over time. To view the RSSI monitor, click the device icon on WidMan, click Properties, and then click RSSI Monitor. Enabling RSSI monitoring on WidMan is helpful when making antenna adjustments. You can ensure optimal device placement and orientation based on the signal strength shown on WidMan. HTTP Disable Setting IP Network Properties Under System Configuration, click IP Network. The IP Network Properties page appears, where you can change the settings shown in Table 10. If you change the IP address and click Apply, you cannot continue to configure the device using the old IP address. Therefore, you must do the following steps after changing the IP address: 1 Close your browser. 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh. 3 Select the device and click Configure to start a new configuration session. Table 10 describes the IP Network properties.
37 Setting Wireless Network Properties 31 Table 10 IP Network Properties Page Setting Description Default IP Network Setting IP Address Subnet Mask Gateway IP Address This setting allows you to change the IP address of the device. To let the device get an IP address automatically from a DHCP server, select Obtain an IP address automatically and click Apply. To specify an IP address, select Specify an IP address, enter the IP address parameters in the spaces provided, and click Apply. When Specify an IP address is selected, enter the IP address in the space provided, and click Apply. When Specify an IP address is selected, enter the Subnet Mask in the space provided, and click Apply. When Specify an IP address is selected, enter the Gateway IP Address in the space provided, and click Apply. Obtain an IP address automatically N/A N/A N/A Setting Wireless Network Properties Under System Configuration, click Wireless Network. The Wireless Network Properties page appears, where you can select different wireless settings, as described in Table 11. When you are finished, click Apply. The Bridge supports Dynamic and Static Turbo modes and boosts throughput up to 108 Mbps. The Dynamic Turbo mode allows automatic switching between normal and turbo modes without modification by the user. The feature increases throughput when bandwidth demands are high. When bandwidth demands are low and at regular intervals, normal mode allows legacy connectivity and new associations. The Dynamic Turbo mode connection between the Bridge and the access point may turn to normal mode connection if another wireless station associates with the access point in normal mode. The Static Turbo mode operates by using two radio channels and does not switch to normal mode. Static Turbo mode must be configured by the user on both the access point and the station.
38 32 CHAPTER 3: CONFIGURING THE BRIDGE Table 11 Wireless Network Page Setting Description Default Network Mode Radio Mode Select Wireless Client (Infrastructure) to associate with an access point. Select Ad-hoc (Peer-to-Peer) to join or form an ad-hoc network. See Network Configuration and Planning on page 7 for information on selecting the best Radio Mode for your network. Select Auto Select to have the Bridge select the best Radio Mode automatically. Select a to set the Bridge to operate with either a mode or a Dynamic Turbo mode. Dynamic Turbo mode is entered only when the channel is set to 40, 48, 56, 153, or 161 for a networks. Select a Turbo to set the Bridge to operate with a Static Turbo mode. Do not select this mode unless the access point you intend to associate with is running in a Static Mode. Select b/802.11g to set the Bridge to operate with either b/g mode or g Dynamic Turbo mode. Dynamic Turbo mode is entered only when the channel is set to 6 for g networks. Select g Turbo to set the Bridge to operate with g Static Turbo mode. Do not select this mode unless the access point you intend to associate with is running in g Static mode. Wireless Client (Infrastructure) Auto Select
39 Setting Wireless Network Properties 33 Table 11 Wireless Network Page (continued) Wireless LAN Service Area Select Attach to any WLAN Service Area (ESSID) automatically to allow the Bridge to associate with any access point without specifying the ESSID. In this mode, the Bridge uses the ESSID of the access point with the best signal strength. This mode is not available when the network mode is Ad-hoc (Peer-to-Peer). Select Specify the Wireless LAN Service Area to allow the Bridge to associate only with access points with the same service area. You may enter the WLAN service area name or select it from the list. You must specify the WLAN service area when the network mode is Ad-hoc (Peer-to-Peer). To maintain a wireless association, the WLAN service area on a Bridge and the access point with which it is associated must match exactly. Therefore, if the Bridge is set to Specify the WLAN Service Area and you change the access point WLAN service area, make sure to also change the Bridge WLAN service area. Attach to any WLAN Service Area (ESSID) automatically
40 34 CHAPTER 3: CONFIGURING THE BRIDGE Table 11 Wireless Network Page (continued) Channel Selection Transmit Power Antenna Selection If Radio Mode is set to Auto Select, you do not have the following options to choose from. When the network mode is Wireless Client (Infrastructure), a user may have the Bridge automatically select an appropriate channel by using Automatic Best Channel or specify the channels by using Specify Channel. When the network mode is Ad-hoc (Peer-to-Peer) you may specify channel selection as follows: Automatic Best Channel When this option is enabled, the Bridge scans the primary channels. If the Bridge is establishing a new ad-hoc network, it chooses the channel with the least number of packets. If the Bridge is joining an existing ad-hoc network, it selects the channel in use. Specify Channel Click the button preceding this option and enter the Advanced Wireless Network page. On this page, you can choose channels from the Channel list. This option specifies the level of transmission power. Select one of the values (100%, 50%, 25%, 12%, min) from the drop-down menu. Decrease the Transmit Power setting if more than one Bridge is using the same channel frequency. Select an antenna for the radio signal: Internal this default setting should be used in most circumstances. External and one internal antenna this setting automatically determines which antenna is best for sending packets to individually attached clients. Choose this setting if the Bridge is located in a place that is surrounded or hindered by metal paths or walls. 100% Internal
41 Manually Selecting Radio Channels 35 Table 11 Wireless Network Page (continued) Data Preamble To increase performance, click Short (Enhanced performance). When equipment that does not support short preamble is also being used, click Long (Wi-Fi Interoperable). Note: The Data Preamble option is only available in b/g ad-hoc mode. Long Manually Selecting Radio Channels On the Advanced Wireless Network page, you can manually select the radio channels. The bridge only looks for the best SSID that matches one of the specified channels. Setting Up an Ad-Hoc Network Operating in ad-hoc mode, two or more Bridges can associate among themselves to form an ad-hoc network without the intervention of an access point. You may wish to set up an ad-hoc network, for example, if a group is working away from the office, or if a group in the office needs to share files apart from the wired LAN. CAUTION: To ensure correct operation, the settings on the two Bridges must match exactly. To avoid the possibility of losing wireless association while you are configuring, 3Com recommends that you connect the Bridge directly to the computer. 1 Connect the first Bridge to power and use the Ethernet cable to connect it to the computer. 2 Use the 3Com Wireless Infrastructure Device Manager to select the Bridge and launch the Configuration Management System. 3 Under System Configuration, click Wireless Network. 4 In the Wireless Network page: a b c Locate the Network Mode field and select Ad-hoc (Peer-to-Peer). Specify the Wireless LAN Service Area and the Channel Selection as described in Setting Wireless Network Properties on page 31. Set the Data Preamble. To increase performance, select Short (Enhanced performance). When equipment that does not support short preamble is also being used, select Long (Wi-Fi Interoperable). When you are finished, click Apply.
42 36 CHAPTER 3: CONFIGURING THE BRIDGE Security settings default to Open System (no security). Optionally, you can set different security settings as described in Changing Wireless Security Settings on page When you are finished, click Apply. 6 End the browser session. 7 Repeat steps 1 6 with the second Bridge. Make sure you configure Bridge settings to match exactly. When you are finished, click Apply and end the browser session. 8 Connect the Ethernet devices to the Bridges. If you use hubs, make sure that the Bridges are connected through the hub uplink ports. Changing Wireless Security Settings Under System Configuration, click Wireless Security. The Wireless Security Settings page appears, where you can select the type of security to be used on the Bridge. The Bridge can be configured to support three types of data encryption: WEP, TKIP, and AES. After selecting a data encryption type, you can select an authentication type. The following sections describe the settings. To maintain wireless association, the settings on clients and the access points they associate with (or other members of an ad-hoc network) must match exactly. No Security (Open System) 40/64-bit WEP Key No security policy is used. Network communications could be intercepted by unintended recipients. This option encrypts the wireless transmissions to protect data, but still allows communication among compatible wireless LAN clients and access points from third-party manufacturers that are Wi-Fi certified. This type of security requires you to set up encryption in one of the following ways: String (3Com Passphrase) For use only with other 3Com 11a/b/g wireless devices, an encryption string is a case-sensitive string of characters between 6 and 30 characters long. To enter the string, select Enter a string to generate WEP keys. Then type any combination of letters and numbers in the space provided and select Apply.
43 Changing Wireless Security Settings 37 WEP Key May be in ASCII or HEX. Hexadecimal keys are sequences of hexadecimal digits arranged into four keys. A hexadecimal digit may be a letter from A to F or a number from 0 to 9. This type of encryption is compatible with equipment from other manufacturers that use Wi-Fi certified 40-bit encryption. To enter the keys, select Specify WEP keys and which to use. In the WEP keys window, enter all the keys in the provided spaces, then select a radio button in the Selected Key column to specify which key to use and select Apply. 104/128-bit WEP Key This option can be used with other 3Com 11a/b/g Wireless LAN devices and with equipment from certain manufacturers that also support 104/128-bit WEP key encryption. It provides a higher level of security than the 40/60-bit WEP key (Wi-Fi) option and uses a more complicated type of encryption. This type of security requires you to set up encryption using a string or WEP keys as described in 40/64-bit WEP Key on page 36. To create or modify WEP keys, click the Specify WEP keys and which key to use option. 128/152-bit WEP Key This option can be used with other 3Com 11a/b/g Wireless LAN devices and with equipment from certain manufacturers that also support 128/152-bit WEP key encryption. It provides a higher level of security than the 104/128-bit WEP Key option and uses a more complicated type of encryption. This type of security requires you to set up encryption using a string or WEP keys as described in 40/64-bit WEP Key on page 36. To create or modify WEP keys, click the Specify WEP keys and which key to use option. Dynamic WEP with LEAP-Compatible Mode LEAP (Lightweight Extensible Authentication Protocol) is a security scheme based on the 802.1X authentication framework. It provides mutual authentication between the RADIUS server and the Bridge, and generates dynamic per-user, per-session WEP keys. To use dynamic WEP with LEAP-compatible mode, you must have: A RADIUS server set up on the network An account created on the RADIUS server
44 38 CHAPTER 3: CONFIGURING THE BRIDGE To configure dynamic WEP with LEAP-compatible mode: 1 On the Wireless Security page, click Dynamic WEP with LEAP-compatible mode. 2 In User name, type the user name for your RADIUS account. 3 In Password, type the password for your RADIUS account. 4 Click Apply. TKIP The Temporal Key Integrity Protocol (TKIP) option improves data encryption over WEP scheme by dynamically updating the encryption keys every 10,000 packets. TKIP provides per-packet key mixing, a message integrity check, and a re-keying mechanism. To use TKIP: 1 On the Wireless Security page, select TKIP. 2 Select WPA-PSK for home network or WPA for the scenarios where RADIUS servers are employed: WPA-PSK (in infrastructure mode) or WPA-NONE (in ad-hoc mode): Enter a pass-phrase key or hexadecimal key. The key can be generated based on a pass-phrase or a sequence of manually entered 64 hexadecimals. The 64 hexadecimals can be automatically generated by selecting Generate a Random Key. WPA: Select an authentication type, and enter a user name and a password for TTLS and PEAP, or select a user certificate for TLS. If you select LEAP-compatible mode, enter the user name and password for your RADIUS account. These options are not available in ad-hoc mode. 3 Select Apply. AES The Advanced Encryption Standard (AES) option uses the highest security cipher for data encryption. To use AES: 1 On the Wireless Security page, select AES. 2 Select WPA-PSK for home network or WPA for the scenarios where RADIUS servers are employed: WPA-PSK (in infrastructure mode) or WPA-NONE (in ad-hoc mode): Enter a pass-phrase key or hexadecimal key. The key can be generated based on a pass-phrase or a sequence of manually entered 64
45 Managing Certificates 39 hexadecimals. The 64 hexadecimals can be automatically generated by selecting Generate a Random Key. WPA: Select an authentication type, and enter a user name and a password for TTLS and PEAP, or select a user certificate for TLS. If you select LEAP-compatible mode, enter the user name and password for your RADIUS account. These options are not available in ad-hoc mode. 3 Select Apply. Managing Certificates Under System Configuration, click Certificate Management. The Certificate Management page appears where you can manage certificates and set options of certificate validation. If you have a RADIUS server on the network and you want to use the TLS authentication method, you need to upload the certificates to the Bridge. There are two types of certificates: trusted root certificate and user certificate. Trusted root certificates are required for TLS with the option Validate server certificate enabled, while user certificates are mandatory to TLS. Uploading a Trusted Root Certificate You need to copy certificates to the computer in which you configure the Bridge with a Web browser before you can upload them to the Bridge. You can upload up to 64 trusted root certificates. To upload a trusted root certificate: 1 Under Trusted root certificate, click Add, and then enter the Upload Trusted Root Certificate page. 2 In File Name, type the file name manually, or click Browse to select a trusted root certificate stored on your local computer. Click Open to upload the certificate. 3 In Description, type a brief description for the certificate. This can help you identify this specific certificate, if there are other trusted root certificates on the system. 4 Click Upload. When a trusted root certificate is uploaded successfully, it appears in the list on the Certificate Management page.
46 40 CHAPTER 3: CONFIGURING THE BRIDGE Uploading a User You can upload up to eight user certificates. To upload a user certificate: Certificate 1 Under User certificate, click Add, and then enter the Upload Trusted Root Certificate page. 2 In File Name, type the file name manually, or click Browse to select a trusted root certificate stored on your local computer. Click Open to upload the certificate. 3 In File Password, type the password for the user certificate. Normally, we set the password for protecting the private key when we export the user certificate from the Web browser. If you are not sure about the password, contact the person responsible for generating certificates in your organization. 4 In Description, type a unique description for the certificate. This is the certificate nickname that you need to select on either the AES or TKIP page. 5 Click Upload. When a user certificate is uploaded successfully, it appears in the list on the Certificate Management page. Viewing and Removing Certificates Click View to view a certificate, or click Remove to delete a certificate. The certificate that you just removed disappears from the certificate list. CAUTION: Removing a certificate that is used for authentication will cause authentication to fail. Configuring Certificate Validation The following table lists the options for validating certificates from the RADIUS server. To enable an option, select the corresponding check box. Table 12 Certificate Validation Options Setting Validate server certificate Validate server certificate time Server s name must end with Description Select to enable validation of server certificate. Select to check the validity period of the RADIUS server certificate. If certificate has already expired, the Bridge will reject the certificate and authentication will fail. Select this check box, and then type the characters with which the server name ends to verify the information in the certificate s subject name field.
47 Changing RADIUS Settings 41 Changing RADIUS Settings Under System Configuration, click RADIUS. The RADIUS page appears, where you can set the primary and secondary RADIUS Server settings. This page allows for configuration of a Remote Access Dial-in User Service (RADIUS) server for authentication purposes in 802.1X networks. You can change the settings by entering values in the fields as described in Table 13. When you are finished, select Apply.
48 42 CHAPTER 3: CONFIGURING THE BRIDGE Table 13 RADIUS Authentication Server Settings Setting 802.1X Authenticator State Primary RADIUS Server Primary RADIUS Port Primary RADIUS Secret Secondary RADIUS Server Secondary RADIUS Port Secondary RADIUS Secret Description Enable or disable RADIUS authentication by selecting Enable or Disable. Enter the IP address of the primary RADIUS Authentication Server. Make sure this address matches the address set in the RADIUS Authentication software. Enter the port number of the primary RADIUS Authentication Server. Make sure this number matches the number set in the RADIUS Authentication software. The default port is Enter the password of the primary RADIUS Authentication Server. Make sure this password matches the password set in the RADIUS Authentication software. Enter the IP address of the secondary RADIUS Authentication Server. Make sure this address matches the address set in the RADIUS Authentication software. Enter the port number of the secondary RADIUS Authentication Server. Make sure this number matches the number set in the RADIUS Authentication software. The default port is Enter the password of the secondary RADIUS Authentication Server. Make sure this password matches the password set in the RADIUS Authentication software. Using the 802.1X Exception List Use the 802.1X Exception List page to allow Ethernet clients to bypass 802.1X authentication. The default state is Disabled. To build the 802.1X Exception List: 1 Under System Configuration, click RADIUS. 2 On the RADIUS page, click Click here to specify MAC addresses to bypass 802.1X authentication. 3 On the 802.1X Exception List page, click Add. The 802.1X Exception List New MAC page appears. 4 In MAC Address, type the MAC address of the client you want to add to the 802.1X Exception List, and then click the Add. 5 For each client that you want to add to the 802.1X Exception List, repeat steps 3 and 4. 6 On the 802.1X Exception List page, click Enable in 802.1x Exception State.
49 Changing SNMP Settings 43 7 Click Apply. To delete one or more clients from the 802.1X Exception List: 1 On the 802.1X Exception List page, select the check box for the client or clients that you want to delete. 2 Click Delete. 3 Click Apply. Adding a New MAC Address to the 802.1X Exception List Use the New MAC page to add a client to the 802.1X Exception List. 1 In MAC address, type the MAC address of the client you want to add to the 802.1X Exception List. 2 Click Add. 3 To add another client, repeat steps 3 and 4 in Using the 802.1X Exception List startin on page When finished, click Apply on the 802.1X Exception List page. Changing SNMP Settings Under System Configuration, click SNMP to display and change settings for the Simple Network Management Protocol. To communicate with the Bridge, the SNMP agent must first be enabled and the Network Management Station must submit a valid community string for authentication. Select SNMP Enable and enter data into the fields as described below. When you are finished, click Apply. Table 14 SNMP Settings Setting SNMP Contact Community Name (Read Only) Community Name (Read/Write) Description Enables or disables SNMP. Sets the location string that describes the system location. Maximum length: 255 characters. Specifies a community string with read-only access. Authorized management stations are able to retrieve MIB objects. Maximum length: 23 characters. Specifies a community string with read-write access. Authorized management stations are able to both retrieve and modify MIB objects. Maximum length: 23 characters.
50 44 CHAPTER 3: CONFIGURING THE BRIDGE Table 14 SNMP Settings (continued) Trap Destination IP Address Trap Destination Community Name Enter the IP address of the trap manager that will receive these messages. Enter the community name of the trap manager that will receive these messages. Using the Access Control List Under System Configuration, click Access Control List. The Access Control List page appears where you can allow or prohibit access to the wireless network from Ethernet clients. Follow these steps to build the Access Control List: 1 Under System Configuration, click Access Control List. 2 On the Access Control List page, click Add. The Access Control List New ACL page appears. 3 On the New ACL page, enter the MAC address of the client you want to add to the Access Control List, select the permission type, and click the Add button to substantially add it. 4 Repeat steps 2 and 3 for each client. 5 Select the System Default Mode: Allow allows the client to access the Bridge. Deny prohibits the client from accessing the Bridge. CAUTION: With the Allow option of the System Default Mode selected, the Bridge allows all Ethernet frames except those carrying the MAC addresses that are specified in the Access Control List and have the permission type Deny. Similarly, with the Deny option of the System Default Mode selected, the Bridge denies all Ethernet frames except those carrying the MAC addresses that are specified in the Access Control List and have the permission type Allow. Make sure that the MAC address of the computer through which you are configuring the Bridge is not specified in the Access Control List with the permission type Deny if you want to set the access control type to Allow. If you want to set the Access Control Type to Deny, make sure that the MAC address of the computer is included in the Access Control List with the permission type Allow. Failure to do so results in access to the Bridge being blocked; the Bridge will no longer be configurable through the computer.
51 Configuring the Serial Port 45 6 Click Apply. To delete one or more clients from the Access Control List: 1 Select the client or clients. 2 Click Delete. 3 Click Apply. Configuring the Serial Port Configuring Operation Mode Under System Configuration, click Serial Port to set up operation of network serial port or serial telnet client. Attach your computer to both the Ethernet port and the serial port on the Bridge, and then configure the Bridge through the computer. Refer to Table 15 for the available settings. Table 15 Serial Port Settings Setting Description Default Operation Mode Select Enable to enable serial port Disable function. Select Disable to enable CLI console function. Serial Port Mode Enable network serial port or serial telnet client N/A Configuring UART Settings A Universal Asynchronous Receiver/Transmitter (UART) is the fundamental hardware for serial communication, controlling the speed and method of data transfer of the serial port. For proper operation, it is imperative that these settings always match the settings of the device to which the bridge is connected via the RS-232 port. There are two groups of parameters that need to be configured to accomplish this task: UART Settings and Flow Control Settings. Flow control is the process of adjusting the flow of data from one device to another to ensure that the receiving device can handle all of the incoming data. Table 16 UART Settings Setting Description Default Baud Rate The baud rate indicates the data 9600 transfer rate of the serial port.
52 46 CHAPTER 3: CONFIGURING THE BRIDGE Table 16 UART Settings Setting Description Default Data Bits The data bits setting determines the 8 number of bits used to transmit a character. Parity The parity determines the parity None checking scheme. Stop Bits The stop bits setting determines the 1 number of bits used to represent an end of a character. Flow Control Flow control is the process of adjusting the flow of data from one device to another to ensure the receiving device can handle all of the incoming data. None Configuring Network Serial Port Settings Applications utilizing a network serial port between an RS-232 interface and a wireless device use a TCP/IP socket connection. Any program that uses standard TCP/IP network sockets may be used to communicate with the serial port of the Bridge. Once a socket is established to the Bridge, any data written to the socket is sent out the serial port of the Bridge. At the same time, any data received by the serial port of the Bridge is returned via the socket connection. The Bridge network serial port may be used in two modes: Server Mode TCP Listen Port Client Mode TCP Connect Port In Server Mode, the Bridge waits for a TCP/IP socket connection to be made by the network program with which it will communicate. Server Mode should be used if you have a central server that expects to open a TCP/IP socket connection to the Bridge. In Client Mode, the Bridge establishes a socket connection to the IP address and port number specified in the configuration. Client Mode should be used if your system expects the Bridge to open a TCP/IP socket connection to a central server. For Server Mode, click Server Mode and enter the port number to which the Bridge connects in the List on port field. The default port number is 4000.
53 Configuring the Serial Port 47 For Client Mode, select Client Mode and enter the IP address and port number to which the Bridge connects. The default port number is The parameters Line Length, Timeout and Delimiter control the serial-to-network packet conversion process. Most users will not need to change them. These parameters control the way that data received on the serial port is divided into Ethernet packets. The serial packets are sent to a serial network connection. Line Length As data arrives on the serial port it is accumulated in a buffer in the Bridge. The Line length parameter sets the maximum size for this buffer. When the number of characters in the buffer reaches the Line length value the entire buffer is sent as the data in a single network packet. The value of Line length can range from 1 to 1,408 bytes. The default value is 1,408. Do not use values of line length less than 5 with a serial baud rate of 115,200 or greater. Timeout Often serial data arrives in small bursts of characters. When the Bridge receives a burst of data it will wait for a certain period of time for additional data to be received. If additional data is received, it is added to the receive buffer, and the Bridge begins to wait again. If additional data is not received for longer than the period specified by the Timeout value, then the buffer of characters received is sent in a single network packet, and the process begins again. The value of timeout is in units of milliseconds, and should be specified in 10 millisecond increments. The valid range for timeout is from 10 (0.01 second) to 65,000 (650 seconds). The default value is 10. Delimiters Some serial devices transmit and receive data in a known structure. In these cases, there are often special characters that the transmitting device uses to indicate a complete message has been sent. These characters are referred to as delimiters. You can specify up to five different delimiting characters to the Bridge. When the Bridge adds one of these characters to its buffer of serial received characters, it will immediately send that buffer as a network packet. The value of delimiters is specified as a list of hexadecimal values separated by spaces. You may specify up to five different delimiter
54 48 CHAPTER 3: CONFIGURING THE BRIDGE values. For example, if you want to use the delimiter 41375, you must type the following hex values: 0x34 0x31 0x33 0x37 0x35 If you are unsure of the hex value for your delimiter character, consult the Web page for reference. Configuring the Serial Telnet Client Telnet is a method to connect and remotely log-in to a host computer or network device. The host computer or device must be running a telnet server for this service to be available. Once the telnet session is established from the Bridge, any data received on the serial port of the Bridge is sent to the telnet host. At the same time, any data returned from the host is sent to the serial port on the Bridge. Typically, the serial port of the Bridge is connected to a serial terminal or a computer that is running terminal emulation software. To configure the serial telnet client, you must select one of the following telnet connection methods: Wait for Keystroke This method establishes a connection to a specific telnet host when you press a key on the telnet terminal window. When the telnet connection is closed, the Bridge will wait for a keystroke before reconnecting. If you select the Wait for Keystroke method, you also need to configure the following: Connect to IP - Type the IP address of the telnet host to which you want to connect Connect to Port - Type the telnet port number Command Prompt - This method provides a telnet prompt to the serial terminal. From the telnet prompt, you can start a telnet session to any computer or device that is accessible on the network and is capable of accepting telnet connections. To establish a telnet connection, type the command open followed by the IP address of the host computer or device. The IP address may optionally be followed by the TCP port number on which to open the connection. If the port number is omitted, the default telnet port number of 23 is used.
55 Configuring System Log Settings 49 Applying Settings After you set the UART settings, network serial port settings or serial telnet client settings, click Apply to apply them. Configuring System Log Settings Under System Configuration, click System Log. The System Log page appears where you can set syslog options. Table 17 System Log Settings Setting Description Default Syslog Server The IP address of the syslog server on the network Syslog Port The port number that the syslog server 514 uses to received log data Syslog Level Select the highest log level that you Error want the Bridge to record. Options include (from the highest to lowest): Emergency - System is unusable Alert - Action must be taken immediately Critical - Critical condition Error - Error condition Warning - Warning condition Notice - Normal, but significant condition Informational - Informational messages Debug - Debug-level message CLI Logging Select Enable to record all CLI Enable commands. Web Audit Logging Select Enable to record all operations executed on the Web interface. Enable Setting the System Time Under System Configuration, click SNTP. The SNTP page appears where you can set time relevant options. There are two ways you can set the system time on the Bridge: By setting the time manually By enabling the built-in Simple Network Time Protocol (SNTP) client
56 50 CHAPTER 3: CONFIGURING THE BRIDGE If you enable the SNTP client, you need to specify at least one SNTP server from which the Bridge will retrieve the time. Supported SNTP versions are v1.0 and v2.0. Setting the Time To set the time manually: Manually 1 In SNTP Client, click Disable. 2 In Set Time, type the current year, month, day, hour, and minute. For the hour option, use the 24-hour clock format (for example, 13:00 for 1:00 PM). 3 In Time Zone, select the correct time zone for your location. Selecting the correct time zone ensures that the time recorded in the system logs are synchronized with your local time. 4 If the time zone you selected is currently implementing daylight saving time (DST), click Enable in Daylight Saving, and then set the time period during which DST will be in effect. 5 Click Apply to save your changes. The DST option is only available if the time zone you selected is known to implement daylight saving time. Enabling the SNTP Client When an SNTP server is specified, the Bridge will attempt to query the system time from this server every 60 seconds. To enable the SNTP client: 1 In SNTP Client, click Enable. 2 In Primary Server, type the IP address of the SNTP server from which the Bridge will get its system time. 3 In Primary Port, type the port number used by the SNTP server for communicating with clients. 4 To set a secondary SNTP server, specify the IP address and port in Secondary Server and Secondary Port, respectively. Specifying a secondary SNTP server is optional. The Bridge will only attempt to query the time from the secondary SNTP server if it cannot connect to the primary SNTP server. 5 Click Apply to save your changes.
57 Resetting the Bridge 51 Resetting the Bridge If the Bridge stops responding correctly, you can perform a reset, which disrupts the network association temporarily, but does not affect Bridge configuration settings that have already been applied with Apply. To reset the Bridge, under Tools, click Reset Wireless Workgroup Bridge. In the next page, click Reset. The Bridge can also be reset using the Wireless Infrastructure Device Manager (Widman). Right-click the Bridge in Widman, and then select Reset. Restoring the Bridge to Factory Defaults You can restore Bridge settings to the defaults that were set at the factory either manually or through software. To restore the settings manually, insert a pointed object (such as the end of a straightened paper clip) into the reset hole on the back of the Bridge, and hold for five seconds. The reset hole is accessible with the Bridge in the cradle, as shown in Figure 16, or with the Bridge out of the cradle. Figure 16 Manually Resetting the Bridge in the Cradle Reset Hole RESET To restore the settings through software: 1 Under Tools, click Restore Factory Defaults. 2 Click Restore.
58 52 CHAPTER 3: CONFIGURING THE BRIDGE If the Bridge was using an IP address setting other than the default, restoring the factory defaults will change the IP address. If you want to continue configuring the Bridge, do the following: 1 Close your browser. 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh. 3 Select the device and click Configure to start a new configuration session. Upgrading the Bridge Firmware You can download firmware updates or updates to the Configuration Management System from the 3Com Web site and install these on the Bridge. Options for upgrading the system include using a Trivial File Transfer Protocol (TFTP) server or File Transfer Protocol (FTP) server. The Bridge acts as a TFTP or FTP client to receive the download. Alternatively, you an use the HTTP option and upload the firmware from a downloaded file placed on your computer. Using FTP (default) The general instructions for installing the upgrade using FTP are: 1 Under Tools, click Upgrade System. Using TFTP 2 Select FTP. 3 Enter the IP address of the FTP server where the upgrade files are located. 4 Enter the user name, password, path and filename in the appropriate fields. 5 Click Upgrade. The general instructions for installing the upgrade using TFTP are: 1 Under Tools, click Upgrade System. 2 Select TFTP. 3 Enter the file name for the firmware. 4 Enter the IP address of the TFTP server where the upgrade files are located. 5 Click Upgrade.
59 Changing the Administration Login Name and Password 53 Using HTTP The general instructions for installing the upgrade using HTTP are: 1 Under Tools, click Upgrade System. 2 Select HTTP. 3 Click Browse to locate the downloaded firmware file. 4 Click Upgrade to start the upgrade process. The upgrade takes place through the HTTP protocol from the local computer. Changing the Administration Login Name and Password 3Com recommends that you set a password to protect against unauthorized access. After you set the password, you must enter it each time you launch the configuration for the device. Under Tools, click Change Administration Password. The Change Administration Password page appears. Use this page to change the login name and administration password for the device. Enter the current password and new password in the spaces provided and click Save. Backing Up Configuration Settings and System Logs As part of system maintenance, you should save and back up the configurations of individual Bridges, in case you need to reload them in the future. The backup saves all the parameters of the selected Bridge in a file on your computer. The file can be used later to restore the configuration on this or another bridge. If you want to keep a record of the system logs on the Bridge, you can also back them up using the same Backup page of the Web interface. To back up the configuration file or system logs: 1 Under Tools, click Backup. 2 In Backup Type, specify whether you want to back up the Configuration File or the System Log File. If you are backing up the configuration file, specify whether you want to back up the Complete Configuration or the Basic Configuration in Configuration File Type. Complete configuration includes the following information: User name and password
60 54 CHAPTER 3: CONFIGURING THE BRIDGE Device name Device location IP address settings Access control list Basic configuration, on the other hand, includes the same set of information, except the IP address settings. 3 Click the backup method that you want to use. Available options include FTP, TFTP, and HTTP. If you clicked FTP, you need to provide the following information: FTP Server IP Address IP address of the FTP server to which the backup file will be saved User name and password Your logon information to the FTP server. This account must have write permission to the server. Path File path on the FTP server to which to save the backup File Name File name that you want to assign to the backup If you clicked TFTP, you need to provide the following information: File Name File name that you want to assign to the backup TFTP Server IP Address IP address of the TFTP server to which the backup file will be saved. Before backing up via TFTP, verify that the TFTP service on the target server is running. If you clicked HTTP, you do not need to provide additional information. When you click Backup Now, a File Download/Save As dialog box will appear. Specify a location on your local computer where you want to save the backup, and then click Save. 4 Click Backup Now. Restoring a Configuration If you previously saved a copy of the configuration file, you can restore the Bridge settings in this configuration file by uploading this to the Bridge. CAUTION: Restoring a previously saved configuration file will override some of your current settings.
61 Clearing the Ethernet Client List 55 To restore a previously saved configuration file: 1 Under Tools, click Restore. 2 Click the backup method that you want to use. Available options include FTP, TFTP, and HTTP. If you clicked FTP, you need to provide the following information: FTP Server IP Address IP address of the FTP server from which the backup file will be copied. The backup file must exist on this FTP server. User name and password Your logon information to the FTP server Path File path to (or location of) the backup file on the FTP server File Name File name of the backup file that you want to restore If you clicked TFTP, you need to provide the following information: File Name File name of the backup file that you want to restore TFTP Server IP Address IP address of the TFTP server from which the backup file will be copied. Before backing up via TFTP, verify that the TFTP service on th target server is running. If you clicked HTTP, the backup file must either be on the computer that you are using to access the Web interface or on a network location that can be accessed from the computer. Click Browse, select the backup file, and then click Open. 3 Click Restore. The settings in the backup file are restored and applied to the Bridge. This operation may cause the Bridge to reboot. If the Bridge was using an IP address setting other than the one contained in the backup file, restoring the configuration will change the IP address. If you want to continue configuring the Bridge, do the following: 1 Close your browser. 2 Return to the 3Com Wireless Infrastructure Device Manager, and then click Refresh. 3 Select the device and click Configure to start a new configuration session. Clearing the Ethernet Client List A maximum of 16 clients (for example, computers and printers) can associate with the Bridge. The Bridge keeps track of these clients based
62 56 CHAPTER 3: CONFIGURING THE BRIDGE on a list of their MAC addresses. You can configure the Bridge to remove from the list any client that has been inactive for three minutes (aging time). This three-minute aging time is not configurable. To enable or disable the aging timer: 1 Launch the Configuration Management System. 2 Under System Status, click Ethernet Client List. 3 Enable or disable the MAC address aging timer on the Bridge. Click Enable if you want the Bridge to automatically disconnect clients that have been idle for three minutes. Clicking this option ensures that idle clients are purged from the client list and that new clients will be able to associate with the Bridge (if there are available client slots). Click Disable if you want to Bridge to maintain connection with all clients, including those that have been idle for three minutes. Clicking this option prevents new clients from associating with the Bridge when the list is already full. 4 Click Apply. You can also clear the client list manually by clicking Clear Client List. Clients that remain connected to the Bridge are added to the list automatically when they next interact with the network. Viewing Connection Status Under System Summary, click Connection Status to view a summary of the Bridge s current connection information. See Table 8 on page 27 for details. Viewing System Summary Under System Summary, you can view the following information: Table 18 System Summary Page Property Description Default Value Device Name Device Location The name assigned to the Bridge. You can change the default name to one of your choice by clicking System Properties under System Configuration. If you use the default device name, entering the location is optional. 3Com WWB None
63 Viewing Event Logs 57 Table 18 System Summary Page (continued) Country Code The Country Code determines the available channels and transmission power level based on regulatory restrictions in the county where the Bridge is installed. Transmit Power The level of transmission power (100%, 50%, 25%, 12%, or Min). You can change this setting by clicking Wireless Network under System Configuration. Varies 100% MAC Address The MAC address of the Bridge. N/A Serial Number The serial number of the Bridge. N/A Firmware Version The version of firmware the Bridge is N/A currently using. DHCP Client Determines if the Bridge obtains its On IP address from the DHCP server on the network. IP Address The IP address of the Bridge. You can change this address by clicking IP Network under System Configuration. Varies Subnet Mask Data Preamble System Up Time The subnet mask address of the Bridge. You can change this address by clicking IP Network under System Configuration. The data preamble setting (Short [Enhanced performance] or Long [Wi-Fi Interoperable]). To change this setting, click Wireless Network under System Configuration. The elapsed time since the Bridge booted up. Varies Long Day 0, 0:00:00 Click Refresh to update the information. Viewing Event Logs To view event logs generated by Bridge, click Event Log List on the menu. Events recorded in the table are shown chronologically, starting from the latest event. Information shown for each event includes: Time when the event occurred Severity level For descriptions of the various severity (log) levels, see Configuring System Log Settings on page 49 Description of the event
64 58 CHAPTER 3: CONFIGURING THE BRIDGE The events table can display up to 500 events. When the number of events reaches this limit and new events occur, the system will automatically delete older events so that it can record newer events. Logging Off the Web Interface To prevent unauthorized users from accessing the Web interface and modifying the Bridge settings, make sure you always log off after using the Web interface. To log off of the Configuration Management System, click the Log Off button at the bottom of the menu.
65 4 TROUBLESHOOTING Diagnosing Problems If you have difficulty with the Bridge, try the solutions in the following table. Table 19 Troubleshooting Symptom 16 devices have been connected to the Bridge, either simultaneously or sequentially. After connecting another device, the new device cannot associate with the network. Solution(s) The Bridge supports up to 16 specific clients (for example, computers and printers) and keeps track of them using a client list of MAC addresses. After the client limit is reached, you must clear the client list to allow a new client to associate. For example, in a hub configuration with 16 clients connected, if you disconnect a desktop computer and connect a laptop in its place, you must clear the client list to establish network association. 1 Disconnect a client by unplugging its Ethernet cable from the hub. 2 Use the 3Com Wireless Infrastructure Device Manager to select the Bridge and launch its Configuration Management System. 3 Under System Configuration, click Ethernet Client List. The Ethernet Client List page appears. Click Clear Client List. 4 Connect the new client by plugging its Ethernet cable into the hub.
66 60 CHAPTER 4: TROUBLESHOOTING Table 19 Troubleshooting (continued) After you change the IP address, after you restore a backup configuration, or after you reset the Bridge to factory defaults, the Configuration Management System stops responding and you cannot continue configuring the Bridge. The Bridge cannot associate with an access point. The Wireless Network Tree does not appear in the 3Com Wireless Infrastructure Device Manager window. The Bridge has a yellow exclamation point (!) next to it in the Wireless Infrastructure Device Manager. Two Bridges cannot communicate in ad-hoc mode. If you change the IP address and click Apply, you cannot continue to configure the device using the old IP address. Similarly, after you restore a backup configuration or reset the Bridge to factory defaults, the IP address setting may be changed. To recover from this situation and continue configuring the Bridge: 1 Close your browser. 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh. 3 Select the device and click Configure to start a new configuration session and set its IP address. Adjust the position of the Bridge to improve reception. Launch the Bridge Configuration Management System and make sure the security settings on the Bridge match those on the access point. Verify that you are using the correct network adapter. In the device manager window, click Choose NIC. Select the network adapter for the network you want to scan, and click OK. The Bridge is on a different subnet than the computer attempting to configure it. To recover from this situation and continue configuring the Bridge: 1 Close your browser. 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh. 3 Select the device and click Configure to start a new configuration session. 4 Make sure the subnet address matches that of the computer. Adjust the positions of the Bridges to improve reception. To ensure correct operation in ad-hoc mode, the settings on the two Bridges must match exactly. Launch the Bridge Configuration Management System and make sure that the Wireless LAN Service Area, channel selections, Data Preamble setting, and security setting are the same on both Bridges.
67 Disconnecting the Bridge 61 Table 19 Troubleshooting (continued) You are running Windows NT. After you connect the Bridge, your computer cannot obtain a valid IP address. Access to the Bridge through Ethernet is blocked because of incorrect settings in the Access Control List. The Bridge configuration settings may not be compatible with the network. If they are not, and your Windows NT computer is set up to obtain its IP address from a DHCP server, the Bridge is unable to associate with the network to obtain the IP address. To work around this, set a static IP address on your computer. Then set the Bridge configuration to match the network. When the Bridge is able to associate, reset your computer to obtain its IP address from the DHCP server. If the Bridge should also obtain its IP settings from the DHCP server, make sure this is configured properly on the IP Network page and applied just before ending the session. Restore the Bridge to factory default settings (see Restoring the Bridge to Factory Defaults on page 51). The factory default setting for the Access Control List is disabled. After the factory default settings are restored, the Bridge can be accessed through Ethernet again. Disconnecting the Bridge To disconnect the Bridge: CAUTION: Disconnecting the Bridge ends the network association. To avoid possible data loss, exit all networking applications on connected devices before you disconnect the Bridge. 1 Unplug the Bridge Ethernet cable from the hub or other device. 2 Unplug the Bridge power cord. Uninstalling Software and Documentation If you want to uninstall the 3Com 11a/b/g Wireless Workgroup Bridge software and documentation, you can either use the standard operating system procedure for removing programs or use the following shortcut: 1 From the Windows Start menu, select Start > Programs > 3Com Wireless > Uninstall 3Com Wireless Infrastructure Device Manager. 2 When prompted to confirm, click OK.
68 62 CHAPTER 4: TROUBLESHOOTING Upgrading Bridge Firmware Firmware is the software that is installed on the Bridge at the factory. Some problems can be solved by installing a new version of the firmware. For details on how to download a firmware update from the 3Com customer support Web site and install it on your Bridge, see Upgrading the Bridge Firmware on page 52.
69 A OBTAINING SUPPORT FOR YOUR 3COM PRODUCT 3Com offers product registration, case management, and repair services through esupport.3com.com. You must have a user name and password to access these services, which are described in this appendix. Register Your Product to Gain Service Benefits To take advantage of warranty and other service benefits, you must first register your product at: 3Com esupport services are based on accounts that are created or that you are authorized to access. Solve Problems Online The 3Com Knowledgebase helps you to troubleshoot 3Com products. This query-based interactive tool is located at: It contains thousands of technical solutions written by 3Com support engineers.
70 64 APPENDIX A: OBTAINING SUPPORT FOR YOUR 3COM PRODUCT Purchase Extended Warranty and Professional Services To enhance response times or extend your warranty benefits, you can purchase value-added services such as 24x7 telephone technical support, software upgrades, onsite assistance, or advanced hardware replacement. Experienced engineers are available to manage your installation with minimal disruption to your network. Expert assessment and implementation services are offered to fill resource gaps and ensure the success of your networking projects. For more information on 3Com Extended Warranty and Professional Services, see: Contact your authorized 3Com reseller or 3Com for additional product and support information. See the table of access numbers later in this appendix. Access Software Downloads You are entitled to bug fix / maintenance releases for the version of software that you initially purchased with your 3Com product. To obtain access to this software, you need to register your product and then use the Serial Number as your login. Restricted Software is available at: To obtain software releases that follow the software version that you originally purchased, 3Com recommends that you buy an Express or Guardian contract, a Software Upgrades contract, or an equivalent support contract from 3Com or your reseller. Support contracts that include software upgrades cover feature enhancements, incremental functionality, and bug fixes, but they do not include software that is released by 3Com as a separately ordered product. Separately orderable software releases and licenses are listed in the 3Com Price List and are available for purchase from your 3Com reseller. Contact Us 3Com offers telephone, Internet, and access to technical support and repair services. To access these services for your region, use the appropriate telephone number, URL, or address from the table in the next section.
71 Contact Us 65 Telephone Technical Support and Repair To obtain telephone support as part of your warranty and other service benefits, you must first register your product at: When you contact 3Com for assistance, please have the following information ready: Product model name, part number, and serial number A list of system hardware and software, including revision level Diagnostic error messages Details about recent configuration changes, if applicable To send a product directly to 3Com for repair, you must first obtain a return materials authorization number (RMA). Products sent to 3Com without authorization numbers clearly marked on the outside of the package will be returned to the sender unopened, at the sender s expense. If your product is registered and under warranty, you can obtain an RMA number online at First-time users must apply for a user name and password. Telephone numbers are correct at the time of publication. Find a current directory of 3Com resources by region at: Country Telephone Number Country Telephone Number Asia, Pacific Rim Telephone Technical Support and Repair Australia Hong Kong India Indonesia Japan Malaysia New Zealand or or Pakistan Philippines P.R. of China Singapore S. Korea Taiwan Thailand You can also obtain support in this region at this address: [email protected] or Or request a repair authorization number (RMA) by fax using this number:
72 66 APPENDIX A: OBTAINING SUPPORT FOR YOUR 3COM PRODUCT Country Telephone Number Country Telephone Number Europe, Middle East, and Africa Telephone Technical Support and Repair From anywhere in these regions, call: +44 (0) From the following countries, call the appropriate number: Austria Belgium Denmark Finland France Germany Hungary Ireland Israel Italy You can also obtain support in this region using this URL: Luxembourg Netherlands Norway Poland Portugal South Africa Spain Sweden Switzerland U.K Latin America Telephone Technical Support and Repair Antigua Argentina Aruba Bahamas Barbados Belize Bermuda Bonaire Brazil Cayman Chile Colombia Costa Rica Curacao Ecuador Dominican Republic COM COM AT&T AT&T AT&T AT&T AT&T You can also obtain support in this region in the following ways: Guatemala Haiti Honduras Jamaica Martinique Mexico Nicaragua Panama Paraguay Peru Puerto Rico Salvador Trinidad and Tobago Uruguay Venezuela Virgin Islands Spanish speakers, enter the URL: AT&T AT&T CARE AT&T AT&T AT&T AT&T AT&T AT&T Portuguese speakers, enter the URL: English speakers in Latin America should send to: [email protected] US and Canada Telephone Technical Support and Repair All locations: Network Jacks; Wired or Wireless Network Interface Cards: All other 3Com products
73 END USER LICENSE AGREEMENT Customer shall take all steps necessary to protect Wind River's and its licensors' proprietary rights in the Run-Time Module and to ensure that each Run-Time Module distributed by Customer will be accompanied by a localized copy of an End User License Agreement. Such End User License Agreement shall prohibit the End User from: (i) copying the Run-Time Module, except for archive purposes consistent with the End User's archive procedures; (ii) transferring the Run-Time Module to a third party apart from the Target Application; (iii) modifying, decompiling, disassembling, reverse engineering or otherwise attempting to derive the Source Code of the Run-Time Module; (iv) exporting the Run-Time Module or underlying technology in contravention of applicable U.S. and foreign export laws and regulations; and (v) using the Run-Time Module other than in connection with operation of the Target Application. In addition, the End User License Agreement shall: (i) state that the Run-Time Module is licensed, not sold and that Customer and its licensors retain ownership of all copies of the Run-Time Module; (ii) expressly disclaim all implied warranties, including without limitation the implied warranties of merchantability, fitness for a particular purpose, title and non-infringement; (iii) exclude liability for any special, indirect, punitive, incidental and consequential damages; and (iv) require that any further distribution of the Run-Time Module be subject to the same restrictions set forth herein. The End User License Agreement shall also state that, with respect to the Run-Time Module, Wind River and its licensors are third party beneficiaries of the End User License Agreement and that the provisions related to the Run-Time Module are made expressly for the benefit of, and are enforceable by, Wind River and its licensors.
74
75 REGULATORY INFORMATION GENERAL STATEMENTS The 3Com 11a/b/g Wireless Workgroup Bridge, Model WL-560 (3CRWE675075), must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. This product contains encryption. It is unlawful to export out of the U.S. without obtaining a U.S. Export License. This product does not contain any user serviceable components. Any unauthorized product changes or modifications will invalidate 3Com's warranty and all applicable regulatory certifications and approvals. Only antennas specified for your region by 3Com can be used with this product. The use of external amplifiers or non-3com antennas may invalidate regulatory certifications and approvals. CAUTION: EXPOSURE TO RADIO FREQUENCY RADIATION US - RADIO FREQUENCY REQUIREMENTS This device generates and radiates radio-frequency energy. In order to comply with FCC radio-frequency exposure guidelines for an uncontrolled environment, this equipment must be installed and operated while maintaining a minimum body to antenna distance of 20 cm (approximately 8 in.). The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canada's website This product must maintain a minimum body to antenna distance of 20 cm. Under these conditions this product will meet the Basic Restriction limits of 1999/519/EC [Council Recommendation of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz)]. This device must not be co-located or operated in conjunction with any other antenna or transmitter. This device is for indoor use only when using channels 36, 40, 44 or 48 in the 5.15 to 5.25 GHz frequency range. High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and/or damage this device. US FEDERAL COMMUNICATIONS COMMISSION (FCC) EMC COMPLIANCE This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/tv technician for help. The user may find the following booklet prepared by the Federal Communications Commission helpful: The Interference Handbook US MANUFACTURER'S FCC DECLARATION OF CONFORMITY This booklet is available from the U.S. Government Printing Office, Washington, D.C Stock No Com is not responsible for any radio or television interference caused by unauthorized modification of the devices included with this 3Com 11a/b/g Wireless Workgroup Bridge. Model WL-560 (3CRWE675075), or the substitution or attachment of connecting cables and equipment other than specified by 3Com. The correction of interference caused by such unauthorized modification, substitution or attachment will be the responsibility of the user. Changes or modifications not expressly approved by 3Com could void the user's authority to operate this equipment. 3Com Corporation 350 Campus Drive Marlborough, MA , USA (508) Date: Aug 5, 2004
76 Declares that the Product: Brand Name: 3Com Corporation Model Number: WL-560 Equipment Type: 11a/b/g Wireless Workgroup Bridge Complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. 3Com 11a/b/g Wireless Workgroup Bridge Model WL-560 INDUSTRY CANADA - RF COMPLIANCE INDUSTRY CANADA - EMISSIONS COMPLIANCE STATEMENT This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. L ' utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l' utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. The term IC before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Pour empecher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit etre utilize a l'interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal. Si le matriel (ou son antenne d'emission) est installe a l'exterieur, il doit faire l'objet d'une licence. High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and/or damage this device. This Class B digital apparatus complies with Canadian ICES-003. AVIS DE CONFORMITÉ À LA RÉGLEMENTATION D'INDUSTRIE CANADA Cet appareil numérique de la classe B est confirm à la norme NMB-003 du Canada. SAFETY COMPLIANCE NOTICE This device has been tested and certified according to the following safety standards and is intended for use only in Information Technology Equipment which has been tested to these or other equivalent standards: UL Standard (3rd Edition) CAN/CSA C22.2 No IEC EN 60950
77 EU COMPLIANCE Usage restrictions apply. See documentation. Equipment may be operated in AT BE CY CZ DK EE FI FR DE GR HU IE IT LV LT LU MT NL PL PT SK SI ES SE GB IS LI NO CH BG RO TR Intended use: IEEE a/b/g radio LAN device NOTE: To ensure product operation is in compliance with local regulations, select the country in which the product is installed. Refer to Configuring the Bridge starting on page 23. English Finnish Dutch French Swedish Danish German Greek Italian Spanish Hereby, 3Com Corporation, declares that this RLAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. 3Com Corporation vakuuttaa täten että RLAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Hierbij verklaart 3Com Corporation dat het toestel RLAN device in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG Bij deze verklaart 3Com Corporation dat deze RLAN device voldoet aan de essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC. Par la présente 3Com Corporation déclare que l'appareil RLAN device est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE Par la présente, 3Com Corporation déclare que ce RLAN device est conforme aux exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui lui sont applicables. Härmed intygar 3Com Corporation att denna RLAN device står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. Undertegnede 3Com Corporation erklærer herved, at følgende udstyr RLAN device overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF Hiermit erklärt 3Com Corporation, dass sich dieser/diese/dieses RLAN device in Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi) Hiermit erklärt 3Com Corporation die Übereinstimmung des Gerätes RLAN device mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EG. (Wien) ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ 3Com Corporation ΔΗΛΩΝΕΙ ΟΤΙ RLAN device ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ Con la presente 3Com Corporation dichiara che questo RLAN device è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Por medio de la presente 3Com Corporation declara que el RLAN device cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE
78 Portuguese Malti Estonian Hungarian Slovak Czech Slovene Lithuanian Latvian EU - RESTRICTIONS FOR USE IN THE 2.4GHZ BAND EU - RESTRICTIONS FOR USE IN THE 5GHZ BAND 3Com Corporation declara que este RLAN device está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Hawnhekk, 3Com Corporation, jiddikjara li dan RLAN device jikkonforma mal-tiijiet essenzjali u ma provvedimenti orajn relevanti li hemm fid-dirrettiva 1999/5/EC Käesolevaga kinnitab 3Com Corporation seadme RLAN device vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. Alulírott, 3Com Corporation nyilatkozom, hogy a RLAN device megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. 3Com Corporation týmto vyhlasuje, ze RLAN device spĺňa základné po_iadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. 3Com Corporation tímto prohlašuje, ze tento RLAN device je ve shodě se základními pozadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Šiuo 3Com Corporation deklaruoja, kad šis RLAN device atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Šiuo 3Com Corporation deklaruoja, kad šis RLAN device atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Ar šo 3Com Corporation deklarē, ka RLAN device atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. A copy of the signed Declaration of Conformity can be downloaded from the Product Support Web page for the 3Com 11a/b/g Wireless Workgroup Bridge. Model WL-560 (3CRWE675075) at Also available at This device may be operated indoors or outdoors in all countries of the European Community using the 2.4GHz band: Channels 1-13, except where noted below. In Italy, the end-user must apply for a license from the national spectrum authority to operate this device outdoors. In Belgium, outdoor operation is only permitted using the GHz band: Channel 13. In France, outdoor operation is only permitted using the GHz band: Channels 1-7. Allowed Frequency Bands Allowed Channel Numbers Countries GHz 36, 40, 44, 48 Austria GHz 36, 40, 44, 48, 52, 56, 60, & GHz 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140 Cyprus, Czech Republic, France, Hungary, Slovakia Belgium, Bulgaria, Denmark, Estonia, Finland, Germany, Greece, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovenia, Spain, Sweden, Switzerland, U.K. This device may be not be operated outdoors when using the bands MHz (Channels 36, 40, 44, 48, 52, 56, 50, 64). In Italy, the end-user must apply for a license from the national spectrum authority to operate this device outdoors. To remain in conformance with European spectrum usage laws for Wireless LAN operation, the above 5GHz channel limitations apply. The user should check the current channel of operation. If operation is occurring outside of the allowable frequencies as listed above, the user must cease operating the 11a/b/g Wireless Workgroup Bridge at that location and consult the local technical support staff responsible for the wireless network.
79 The 5GHz Turbo mode feature is not allowed for operation in any European Community country. This device must not be operated in ad-hoc mode using channels in the 5GHz bands in the European Community. Ad-hoc mode provides a direct communication between two client devices without a Wireless LAN Access Point. This device must be used with Access Points that have employed and activated a radar detection feature required for European Community operation in the 5GHz bands. This device will operate under the control of the Access Point in order to avoid operating on a channel occupied by any radar system in the area. The presence of nearby radar operation may result in temporary interruption in communications of this device. The Access Point's radar detection feature will automatically restart operation on a channel free of radar. You may consult with the local technical support staff responsible for the wireless network to ensure the Access Point device(s) are properly configured for European Community operation. BRAZIL RF COMPLIANCE Este equipamento opera em caráter secundário, isto é, não tem direito a proteção contra interferência prejudicial, mesmo de estações do mesmo tipo, e não causar interferência a sistema operando em caráter primário.
80
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
N600 WiFi USB Adapter
Model WNDA3100v3 User Manual December 2014 202-11470-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
N300 WiFi Range Extender WN2000RPT User Manual
N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,
WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015
WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 10/2015 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup Password www.zyxel.com 1234 Copyright 2014 ZyXEL
Link Link sys E3000 sys RE1000
User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
IEEE 802.11b WLAN PC Card
IEEE 802.11b WLAN PC Card User s Guide Version: 1.3 August 2001 Please install the Utility/Driver first before inserting the PCMCIA Card. FCC Class B Radio Frequency Interference Statement The manufacturer
User Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350
USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................
WUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter User Guide Model No. WMP54G Copyright and Trademarks Specifications are subject to change without notice. Linksys is a
OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771)
OfficeConnect Internet Firewall 25 Internet Firewall DMZ QuickStart Guide (3C16770, 3C16771) Checking Package Contents Getting Started Thank you for purchasing the OfficeConnect Internet Firewall. The
Preparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP
RouteFinder SOHO SOHO Security Appliance EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP Quick Start Guide RouteFinder RF825 Series Quick Start Guide RouteFinder SOHO Security Appliance
AC1200 WiFi Range Extender
Model EX6200 User Manual February 2014 202-11298-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
USER GUIDE Cisco Small Business
USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.
Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a
Installation Guide Wireless 4-Port USB Sharing Station 1 GUWIP204 Part No. M1172-a 2011 IOGEAR. All Rights Reserved. PKG-M1172-a IOGEAR, the IOGEAR logo, MiniView, VSE are trademarks or registered trademarks
User Manual. PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400. PePWave Mesh Connector Indoor Series: MC 200, E200, 400
User Manual PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400 PePWave Mesh Connector Indoor Series: MC 200, E200, 400 PePWave Surf AP Series: Surf AP 200-X, E200-X, 400-X PePWave Surf
PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400
PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Outdoor Series: Surf AP 200/400-X, PolePoint 400-X, Surf 400-DX User Manual Document Rev. 1.2 July 07 COPYRIGHT & TRADEMARKS
10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
User Guide. Guide d utilisation Guida dell'utente Benutzerhandbuch Guía del usuario Guia do Usuário WNA-100. Wireless Network Adapter
WNA-100 Wireless Network Adapter User Guide Guide d utilisation Guida dell'utente Benutzerhandbuch Guía del usuario Guia do Usuário www.xerox.com/office/wna Copyright 2007 Xerox Corporation. All Rights
Cisco Aironet Wireless Bridges FAQ
Cisco Aironet Wireless Bridges FAQ Document ID: 16041 Contents Introduction What is the Cisco Aironet Wireless Bridge? What are the different platforms of wireless bridges that Cisco offers? Where can
2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
NetComm Wireless NP920 Dual Band WiFi USB Adapter. User Guide
NetComm Wireless NP920 Dual Band WiFi USB Adapter User Guide Contents Preface... 3 Important Safety Instructions... 3 Introduction... 4 Overview... 4 Features... 4 Package Contents... 5 Minimum System
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Nighthawk AC1900 WiF Range Extender
Nighthawk AC1900 WiF Range Extender Model EX7000 User Manual December 2014 202-11469-01 350 East Plumeria Drive San Jose, CA 95134 USA Nighthawk AC1900 WiF Range Extender Support Thank you for selecting
Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP
Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP This guide is intended to help you quickly and easily install your High Power Wireless Ethernet Converter. For more setup and configuration
Wireless Access Point AT-WA7400. Installation Guide. PN 613-000487 RevA
Wireless Access Point AT-WA7400 Installation Guide PN 613-000487 RevA Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission
ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide
ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide Version 3.60 3/2005 Table of Contents 1 Introducing the ZyAIR... 3 2 Hardware Connections... 4 2.1 Side Panel and Connections... 4 2.2
ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual
ALL0237R Wireless N 300Mbit Access Point/Repeater User s Manual ALLNET ALL0237R User Manual Table of Contents About the Device... 3 Minimum System Requirements... 5 Package Contents... 5 Device Overview...
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256
DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user documentation
Ethernet Radio Configuration Guide
Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834
Wireless-G Business PCI Adapter with RangeBooster
Wireless-G Business PCI Adapter with RangeBooster USER GUIDE BUSINESS SERIES Model No. WMP200 Wireless Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice.
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
AC1900, N900, and N450 WiFi Cable Data Gateways
AC1900, N900, and N450 WiFi Cable Data Gateways Models C6300BD, CG4500BD, and CG3000Dv2 User Manual March 2015 202-11434-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting
EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.
EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5
Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
How To Set up and Configure the WNA-100 Wireless Network Adapter
How To Set up and Configure the WNA-100 Wireless Network Adapter Section 1: Set up and Connect the Adapter to a Computer, Then Configure the Computer to Communicate With the Adapter Before the adapter
AC750 WiFi Range Extender
Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
PCMCIA Wireless LAN Card User s Manual
PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card
FWS WiTDM Series KWA-O8800-I User Manual
FWS WiTDM Series KWA-O8800-I User Manual Date: 2009 / 04 / 23 Version: 1.0 1 Copyright This user s manual and the software described in it are copyrighted with all rights reserved. No part of this publication
Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA
Quick Start Guide Cisco SPA232D Mobility Enhanced ATA Package Contents Analog Telephone Adapter Ethernet Cable Phone Cable Power Adapter Quick Start Guide Product CD-ROM Welcome Thank you for choosing
OfficeConnect Wireless 11g Access Point User Guide 3CRWE454G72
OfficeConnect Wireless 11g Access Point User Guide 3CRWE454G72 http://www.3com.com/ Part No. DUA0045-4AAA01 Rev. 01 Published July 2003 3Com Corporation 5500 Great America Parkway Santa Clara, California
HG658c Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.
HG658c Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658c Home Gateway V100R001 User Guide Issue 01 Date 2012-10-19 Part Number 202537 Huawei Technologies Co., Ltd. provides customers with comprehensive
USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER. Model# EA8500
USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER Model# EA8500 Table of Contents Product overview EA8500.....................................1 Setting Up Your Router Where to find more help.........................
WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012
WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright
Setting up Digi Connect Wi-SP or Digi ConnectPort TS W Devices On a Secured Wireless Network for use with Veriteq viewlinc
Setting up Digi Connect Wi-SP or Digi ConnectPort TS W Devices On a Secured Wireless Network for use with Veriteq viewlinc Contents Before You Start the Installation...2 Introduction...2 Veriteq vnet and
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Installation Guide. Wireless N Access Point EAP110/EAP120/EAP220
Installation Guide Wireless N Access Point EAP110/EAP120/EAP220 CONTENTS Network Topology 01 Hardware Overview 02 Hardware Installation 05 1. Installation Requirements... 05 2. Mounting Bracket... 05
RC8021 Indoor Camera Installation Guide
RC8021 Indoor Camera Installation Guide P/N: 957YL502GJ Document Version: 1.0 Copyright 2011. All Rights Reserved. All trademarks and trade names are the properties of their respective owners i Package
Golden N Wireless Mini USB Adapter. Model # AWLL6075 User s Manual. Rev. 1.2
Golden N Wireless Mini USB Adapter Model # AWLL6075 User s Manual Rev. 1.2 Table of Contents 1. Introduction...2 1.1 Package Contents...2 1.2 Features...2 2. Install the Wireless Adapter...3 3. Connect
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Access Point with Power Over Ethernet WIRELESS WAP54GP. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with Power Over Ethernet User Guide Model No. WAP54GP Copyright and Trademarks Specifications are subject to change without
User s Manual. Wireless LAN Access Point. Model No.: SP918GK http://www.micronet.info
User s Manual Wireless LAN Access Point Model No.: SP918GK http://www.micronet.info Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4
N300 WiFi Range Extender
Model EX2700 User Manual July 2014 202-11395-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on
User Manual. EtherUSB
User Manual EtherUSB USB Ethernet Access Point for PDA V 2.0 Clarinet Systems, Inc. Clarinet Systems, Inc. http://www.clarinetsys.com Page 1 Publication Revision No. Control Table Rev. No. Date Contents
Wireless N 300 Mini USB Adapter. Model # AWLL6086 User s Manual. Rev. 1.0
Wireless N 300 Mini USB Adapter Model # AWLL6086 User s Manual Rev. 1.0 Table of Contents 1. Introduction...2 1.1 Package Contents...2 1.2 Features...2 2. Install the Wireless Adapter...3 3. Install the
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Chapter 1 Connecting the Router to the Internet
Chapter 1 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to set up your wireless ADSL
Setting Up and Connecting the Wireless-G Ethernet Bridge
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Ethernet Bridge User Guide Model No. WET54G v3 Copyright and Trademarks Specifications are subject to change without notice. Linksys
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A
1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other
ZyAIR B-4000. Hot Spot Gateway. Quick Installation Guide Version 1.04 March 2004
Hot Spot Gateway Quick Installation Guide Version 1.04 March 2004 Table of Contents 1 Introducing the ZyAIR... 3 1.1 Rear Panel Connections... 3 1.2 The Front Panel LEDs... 3 1.3 Factory Defaults... 4
Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17
Contents Section A Networking Basics...................................... 1 1 Learning the Basics............................................. 3 Selecting a network connection........................................
HIGH PERFORMANCE WIRELESS ADAPTER
Product User Guide 4x4 MIMO Wi-Fi 802.11n 5G High performance wireless adapter HIGH PERFORMANCE WIRELESS ADAPTER 1 Table of Content 1. PRODUCT OVERVIEW... 6 1.1 Introduction... 6 1.2 Application... 6 1.3
Chapter 3 Management. Remote Management
Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described
Wireless LAN Outdoor Bridge Solution
309-2273-001AA.fm Page 1 Monday, February 3, 2003 4:54 PM Quick Start Guide Wireless LAN Outdoor Bridge Solution 3CRWEASY96A Outdoor solution for secure long-distance wireless connections The 3Com Wireless
Quick Start Guide. Cisco Small Business. 300 Series Managed Switches
Quick Start Guide Cisco Small Business 300 Series Managed Switches Welcome Thank you for choosing the Cisco 300 Series Managed Switch, a Cisco Small Business network communications device. This device
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
N300 WiFi Range Extender
Model WN3000RP User Manual September 2014 202-11409-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
Network User s Guide
Network User s Guide Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Multi-function Print Server This Network User s Guide provides useful information of wired and wireless network
3Com Wireless 7760 11 a/b/g PoE Access Point 3CRWE776075 / WL-561
3Com Wireless 7760 11 a/b/g PoE Access Point 3CRWE776075 / WL-561 www.3com.com 10015003 Rev. AA March 2006 3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064 Copyright 2006, 3Com Corporation.
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
AC750 WiF Range Extender
Model EX3700 User Manual May 2015 202-11487-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on
DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245
DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 E Data Projector Wireless Function Guide Be sure to read the precautions in the User s Guide (Basic Operations) that comes with the Data Projector. Be sure
Wireless-N Range Extender. User Manual
Wireless-N Range Extender User Manual Version A1.0, June 19, 2012 Preface This manual provides information related to the installation and operation of this Wireless-N Range Extender. The individual reading
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Unified Access Point (AP) Administrator s Guide
Unified Access Point (AP) Administrator s Guide Product Model : DWL-3500AP DWL-8500AP Unified Wired & Wireless Access System Release 2.1 February 2008 Copyright 2008. All rights reserved. D-Link Unified
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Quick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA
Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register your product, get help, access the latest downloads and user manuals, and join our community. We
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-10524-05 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,
Wireless N150 Access Point WN604
Wireless N150 Access Point WN604 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA July 2013 202-10623-03 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,
Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0
Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
Wireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b/g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
Chapter 1 Installing the Gateway
Chapter 1 Installing the Gateway This chapter describes how to set up the wireless voice gateway on your Local Area Network (LAN), connect to the Internet, and perform basic configuration. For information
Quick Installation Guide
0, Total 18 Quick Installation Guide Sep, 2013 1, Total 18 Thank you for purchasing Enterprise High Gain Outdoor CPE. This manual will instruct you how to configure and manage this CPE, enable you to use
TL-PS310U Single USB 2.0 Port MFP and Storage Server
TL-PS310U Single USB 2.0 Port MFP and Storage Server Rev: 2.0.0 1910010313 Contents Chapter 1 Introduction... 1 1.1 Product Overview...1 1.2 Network Management...1 1.3 Components and Features...1 1.4 Hardware
