Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
2
Table of Contents
1 INTRODUCTION................................................................................................................................... 5
1.1 F
EATURES AND BENEFITS ...........................................................................................................5
1.2 P
ACKAGE CONTENTS .................................................................................................................6
1.3 S
AFETY GUIDELINES ..................................................................................................................7
1.4 S
YSTEM REQUIREMENTS ............................................................................................................7
1.5 A
PPLICATIONS ...........................................................................................................................7
1.6 N
ETWORK CONFIGURATION.........................................................................................................8
2 UNDERSTANDING THE HARDWARE................................................................................................. 9
2.1 H
ARDWARE INSTALLATION...........................................................................................................9
2.2 IP
ADDRESS CONFIGURATION .....................................................................................................9
3 WEB CONFIGURATION......................................................................................................................11
3.1 L
OGGING IN.............................................................................................................................11
3.2 S
YSTEM..................................................................................................................................12
3.2.1 S
TATUS...................................................................................................................................13
3.2.2 S
CHEDULE ..............................................................................................................................13
3.2.3 E
VENT LOG.............................................................................................................................14
3.2.4 S
TATISTICS..............................................................................................................................15
3.2.5 W
IRELESS OPERATING MODES..................................................................................................16
3.2.5.1 S
WITCHING BETWEEN OPERATING MODES..................................................................................16
3.2.5.2 A
CCESS POINT OPERATING MODE ............................................................................................17
3.2.5.2.1 S
TATUS...................................................................................................................................17
3.2.5.2.2 B
ASIC.....................................................................................................................................17
3.2.5.2.3 A
DVANCED..............................................................................................................................19
3.2.5.2.4 W
IRELESS SECURITY MODE......................................................................................................20
3.2.5.2.4.1 S
ECURITY DISABLED................................................................................................................20
3.2.5.2.4.2 WEP
(WIRED EQUIVALENT PRIVACY).........................................................................................21
3.2.5.2.4.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY ...............................................................22
3.2.5.2.4.4 WPA
RADIUS (802.1X)..........................................................................................................23
3.2.5.2.5 WPS
(WI-FI PROTECTED SETUP) .............................................................................................24
3.2.5.2.6 C
LIENT LIST ............................................................................................................................26
3.2.5.2.7 VLAN ....................................................................................................................................26
3.2.5.2.8 WMM
(WIRELESS MULTIMEDIA)................................................................................................26
3.2.5.3 C
LIENT BRIDGE OPERATING MODE............................................................................................28
3.2.5.3.1 S
TATUS...................................................................................................................................28
3.2.5.3.2 B
ASIC.....................................................................................................................................28
3.2.5.3.3 W
IRELESS SECURITY MODE......................................................................................................30
3.2.5.3.3.1 S
ECURITY DISABLED................................................................................................................30
3.2.5.3.3.2 WEP
(WIRED EQUIVALENT PRIVACY).........................................................................................30
3.2.5.3.3.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY ...............................................................32
3.2.5.3.3.4 WPA
RADIUS (802.1X)..........................................................................................................33
3.2.5.3.4 AP
PROFILE............................................................................................................................34
3.2.5.3.5 C
LIENT LIST ............................................................................................................................35
3.2.5.3.6 WMM
(WIRELESS MULTIMEDIA)................................................................................................35
3.2.5.4 WDS
OPERATING MODE..........................................................................................................37
3.2.5.4.1 S
TATUS...................................................................................................................................37
3.2.5.4.2 B
ASIC.....................................................................................................................................37
3.2.5.4.3 A
DVANCED..............................................................................................................................39
3.2.5.4.4 W
IRELESS SECURITY MODE......................................................................................................40
3.2.5.4.4.1 S
ECURITY DISABLED................................................................................................................40
3.2.5.4.4.2 WEP
(WIRED EQUIVALENT PRIVACY).........................................................................................41
3.2.5.4.4.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY ...............................................................42
3.2.5.4.4.4 WPA
RADIUS (802.1X)..........................................................................................................43
3.2.5.4.5 C
LIENT LIST ............................................................................................................................44
3.2.5.4.6 WMM
(WIRELESS MULTIMEDIA)................................................................................................45
3.2.5.5 R
EPEATER OPERATING MODE...................................................................................................45