Air Live WLA-5000AP User's Guide

Browse online or download User's Guide for Networking Air Live WLA-5000AP. Air Live WLA-5000AP User`s guide [en] User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - WLA-5000AP

User’s Guide WLA-5000AP Access Point Mode

Page 2 - Copyright Statement

9 1.4 Set up the device The 802.11A/G ACCESS POINT can be managed remotely by a PC through either the wired or wireless network. To do this, the WLA-

Page 3 - Regulatory Information

102 2. Install the WLA-5000AP 802.11 A/G Access Point This section describes the installation procedure for the WLA-5000AP. It starts with a summary

Page 4 - Table of Contents

11 2.3 Configuration steps This section describes configuration required for the WLA-5000AP before it can work properly in your network. First, it

Page 5

122.4 Set up a wireless client as a DHCP client The following will give detailed steps of how to configure a PC or a wireless client to “obtain IP a

Page 6 - 802.11 A/G Access Point

132.5 A look at the front panel The LEDs on the front of the 802.11A/G ACCESS POINT reflect the operational status of the unit. The status of the LA

Page 7 - 1.2 Features

143 3. Basic Configuration of the 802.11A/G ACCESS POINT This section describes the basic configuration procedure for the 802.11A/G ACCESS POINT. I

Page 8 - 1.3.1 AS AN ACCESS POINT

15If you are logging on for the first time, you should use the factory default password setting “airlive”. The password is always displayed as a stri

Page 9

163.1.2 DEVICE IP SETTINGS The Device IP Settings screen allows you to configure the IP address and subnet of the device. Although you can rely on

Page 10 - 1.4 Set up the device

17Again, as a reminder, it is recommended that your 802.11A/G ACCESS POINT should be assigned a static IP address in order to make it easy for you to

Page 11 - A/G Access Point

18Note: The available channels are different from country to country and for different WLAN mode. Security Policy: You can select different secur

Page 12 - 2.3 Configuration steps

1Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether

Page 13

19 802.1x allows users to leverage a RADIUS server to do association authentications. You can also enable dynamic WEP keys (64, 128, 152-bit) to hav

Page 14

20the interval is, the better the security is. 60 seconds is a reasonable time, and it is used by default. WPA Wi-Fi Protected Access (WPA) requir

Page 15 - 802.11A/G ACCESS POINT

213.2 Advanced settings The advanced settings tab on the top row of the window allows you to perform modifications that normally you may not need to

Page 16 - 3.1 Setup wizard

223.2.2 SYSTEM MANAGEMENT Clicking the System Management button to configure system related parameters to for the 802.11A/G ACCESS POINT. Manageme

Page 17 - 3.1.2 DEVICE IP SETTINGS

233.2.3 MAC FILTERING SETTINGS The 802.11A/G ACCESS POINT allows you to define a list of MAC addresses that are allowed or denied to access the wirel

Page 18 - 3.1.3 WIRELESS SETTINGS

243.2.4 WIRELESS SETTINGS Beacon Interval: The 802.11A/G ACCESS POINT broadcasts beacon frames regularly to announce its existence. The beacon Interv

Page 19

253.2.5 OPERATIONAL MODE The 802.11A/G ACCESS POINT can be configured to operate in one of the following three modes as mentioned previously in Chapt

Page 20

263.2.6 RADIUS SETTINGS Radius servers provide centralized authentication services to wireless clients. Two Radius servers can be defined: one acts a

Page 21

27IEEE 802.1x EAP authentication is enabled by selecting the Security Policy as 802.1x or WPA, and this selection is in the Wireless Settings under S

Page 22 - 3.2 Advanced settings

284 4. Manage the WLA-5000AP 802.11A/G Access Point This Chapter covers other management aspects of your WLA-5000AP 802.11A/G ACCESS POINT:  Check

Page 23 - 3.2.2 SYSTEM MANAGEMENT

2Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits fo

Page 24 - 3.2.3 MAC FILTERING SETTINGS

294.2 System Log The WLA-5000AP 802.11A/G ACCESS POINT maintains a system log that you can use to track events that have occurred in the system. Such

Page 25 - 3.2.4 WIRELESS SETTINGS

30 4.4 Bridge Table The bridge table shows all MAC entries learned from the wired LAN interface, wireless clients, and WDS peers (if running in the W

Page 26 - 3.2.5 OPERATIONAL MODE

31Step 2 To update the 802.11A/G ACCESS POINT firmware, first download the firmware from the distributor’s web site to your local disk, and then from

Page 27 - 3.2.6 RADIUS SETTINGS

324.7 Factory Default You can reset the configuration of your 802.11A/G ACCESS POINT to the factory default settings. To do it: Step 1 Select Facto

Page 28

33 4.9 What if you forgot the password? If you forgot the password, the only way to recover is to clear the device configuration and return the unit

Page 29 - 802.11A/G Access Point

34Specification Product Name IEEE 802.11a/g SOHO Access Point Control Number CA8-4 OS Linux® 2.4.18 Standard • IEEE 802.11a/b/g • IEE

Page 30 - 4.3 Wireless Client Table

3Table of Contents 1. INTRODUCING THE WLA-5000AP 802.11 A/G ACCESS POINT 5 1.1 OVERVIEW 5 1.2 FEATURES 6 1.3 NETWORK CONFIGURATION EXAMPLES 7 1.3.1

Page 31 - 4.5 Firmware Upgrade

44.1 DEVICE INFORMATION 28 4.2 SYSTEM LOG 29 4.3 WIRELESS CLIENT TABLE 29 4.4 BRIDGE TABLE 30 4.5 FIRMWARE UPGRADE 30 4.6 CONFIGURATION SAVE AND REST

Page 32

51 1. Introducing the WLA-5000AP 802.11 A/G Access Point 1.1 Overview The WLA-5000AP 802.11A/G ACCESS POINT is an access-point based on IEEE 802.

Page 33 - 4.8 Reboot System

61.2 Features  Compliant with draft 802.11a, 802.11b and 802.11g standards with roaming capability.  Support of the standard access point mode f

Page 34

71.3 Network configuration examples A group of wireless stations communicating with each other is called a Basic Service Set (BSS) and is identified

Page 35 - Specification

81.3.2 AS A STAND-ALONE REPEATER The purpose of a repeater is to expand an existing infrastructure BSS. When configured to operate in the Repeater

Comments to this Manuals

No comments