Contents
Chapter 1
Viewing the System Status .......................................................................... 10
Logging in...........................................................................................................................10
Logging out ........................................................................................................................10
Viewing the Home Page...................................................................................................10
To view the Home page .........................................................................................10
Chapter 2
Managing the System Configuration .......................................................... 13
Viewing the System Configuration .................................................................................13
Saving Changes........................................................................................................17
Managing System and Software Configurations ..........................................................17
Performing Software Upgrades .............................................................................17
Managing the System Configuration.....................................................................20
Exporting the Current Startup Configuration File ...............................................21
Importing a New System Configuration File........................................................22
Restore to the Factory Default Configuration File ..............................................22
Viewing the System Hardware Components.................................................................22
Debug Interface ................................................................................................................24
Chapter 3
Managing Network Interfaces ..................................................................... 26
Viewing the Network Interfaces Summary ...................................................................26
Managing the Ethernet Interface....................................................................................28
Managing the Wireless Interface....................................................................................30
Setting the Operational Channel ...........................................................................35
Setting the Transmission Power............................................................................35
Selecting the Interference Handling Mode ..........................................................36
Saving Changes........................................................................................................36
Automatic Channel Selection .................................................................................37
Self Backhaul .....................................................................................................................40
Bridge..................................................................................................................................48
Chapter 4
Viewing Associated Stations ........................................................................ 52
Viewing Stations ......................................................................................................52
Viewing Associated Stations ............................................................................................53
Viewing Specific Stations........................................................................................54
MAC Filtering......................................................................................................................59
QoS in WBS-2400..............................................................................................................61
Chapter 5
Managing System and Station Security ..................................................... 62
Introducing IEEE 802.11 and WBS-2400 Security Concepts......................................62
Security Modes: Authentication and Encryption Methods .................................62
Authentication Combinations .................................................................................63
Encryption Methods.................................................................................................64
Viewing the SSID-VLAN Pages ..............................................................................64
Configuring WEP Security.......................................................................................71