Yf-Ubc2458apcpe Manual Abg

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

IEEE802.

11abgOutdoorAP/Bridge/Client

ModelNo.YFUBC2458AP/YFUBC2458CPE

User Manual and Installation Guide

YF-UBC2458AP
YF-UBC2458CPE
802.11a/b/g
Outdoor AP/Bridge/Client

Users Manual

- Index 1. Wireless Technology ................................................................................................................................6


1.1 Standard ..............................................................................................................................................6
1.2 Planning your Wireless Network ........................................................................................................6
2. Connecting The NSK-UBC2458AP/CPE Wireless Outdoor Access Point To Your Network.................9
3. AP/ WDS (Bridge) Mode Configuration ................................................................................................10
3.1 Login Web page................................................................................................................................10
3.2 Information .......................................................................................................................................10
3.3 Stations .............................................................................................................................................11
3.4 Wireless Basic ..................................................................................................................................12
3.4.1 Wireless Model..........................................................................................................................13
3.4.2 Wireless On/Off ....................................................................................................................13
3.4.3 Visibility Status .........................................................................................................................13
3.4.4 SSID...........................................................................................................................................13
3.4.5 Transmission rate (Mbits/s) .......................................................................................................13
3.4.6 802.11 Mode ..............................................................................................................................14
3.4.7 Super Mode................................................................................................................................14
3.4.8 Adaptive Radio Selection ..........................................................................................................15
3.4.9 Auto Channel Select ..................................................................................................................15
3.4.10 Channel ....................................................................................................................................15
3.5 WDS .................................................................................................................................................16
3.5.1 Enable WDS ..............................................................................................................................17
3.5.2 AP MAC address .......................................................................................................................17
3.6 Security Setup...................................................................................................................................17
3.6.1 WPA Setup ................................................................................................................................18
3.6.1.1 WPA Enable .......................................................................................................................18
3.6.1.2 WPA Mode .........................................................................................................................18
3.6.1.3 Cipher Type ........................................................................................................................19
3.6.1.4 PSK.....................................................................................................................................20
3.6.1.5 WPA Group Key Update Interval.......................................................................................20
3.6.2 802.1X Setup .............................................................................................................................20
3.6.2.1 802.1X enable: ....................................................................................................................21
3.6.2.2 Authentication timeout (mins) ............................................................................................21
3.6.2.3 RADIUS server IP address .................................................................................................21
3.6.2.4 RADIUS server port number ..............................................................................................21
3.6.2.5 RADIUS server shared secret .............................................................................................21

3.6.2.6 MAC Address Authentication.............................................................................................22


3.6.3 Wire Equivalent Privacy (WEP) Setup......................................................................................22
3.6.3.1 Enable WEP........................................................................................................................22
3.6.3.2 Default WEP key to use......................................................................................................23
3.6.3.3 Authentication.....................................................................................................................23
3.6.3.4 WEP key lengths.................................................................................................................23
3.6.3.5 Valid Key............................................................................................................................24
3.7 Access Control Setup........................................................................................................................24
3.7.1 Enable access control.................................................................................................................25
3.7.2 MAC Address ............................................................................................................................25
3.8 Administration setup.........................................................................................................................26
3.8.1 Reboot........................................................................................................................................26
3.8.2 Reset Configuration ...................................................................................................................26
3.8.3 Firmware Upgrade .....................................................................................................................26
3.8.4 Device name ..............................................................................................................................27
3.8.5 IP setting ....................................................................................................................................28
3.8.5.1 IP Address Mode ................................................................................................................28
3.8.5.2 Default IP address...............................................................................................................28
3.8.5.3 Default subnet mask............................................................................................................28
3.8.5.4 Default gateway ..................................................................................................................28
3.8.6 Security ......................................................................................................................................29
3.8.6.1 User name ...........................................................................................................................29
3.8.6.2 Administrator password ......................................................................................................29
3.9 Advanced Setup ................................................................................................................................29
3.9.1 Fragmentation threshold ............................................................................................................30
3.9.2 RTS threshold ............................................................................................................................30
3.9.3 Beacon period ............................................................................................................................30
3.9.4 DTIM interval............................................................................................................................30
3.9.5 802.11d ......................................................................................................................................30
3.9.6 Transmit Power..........................................................................................................................31
3.9.7 Antenna selection.......................................................................................................................31
3.9.8 Act Timeout ...............................................................................................................................31
4. AP Client Mode ......................................................................................................................................32
4.1 Information .......................................................................................................................................32
4.2 Access Points ....................................................................................................................................33
4.3 Basic Wireless ..................................................................................................................................33
4.3.1 Wireless Model..........................................................................................................................33

4.3.2 Wireless On/Off.........................................................................................................................33


4.3.3 Wireless Mode ...........................................................................................................................33
4.3.4 Wireless Network Name (SSID)................................................................................................34
4.3.5 Transmission rate (Mbits/s) .......................................................................................................34
4.3.6 802.11 Mode ..............................................................................................................................34
4.3.7 Super Mode................................................................................................................................35
4.3.8 Channel......................................................................................................................................35
4.4 Security Setup...................................................................................................................................36
4.4.1 WPA Configuration ...................................................................................................................36
4.4.1.1 WPA Enable .......................................................................................................................37
4.4.1.2 WPA Mode .........................................................................................................................38
4.4.1.3 Cipher Type ........................................................................................................................38
4.4.1.4 PSK.....................................................................................................................................38
4.4.2 Wire Equivalent Privacy (WEP) Configuration.........................................................................38
4.4.2.1 Enable WEP........................................................................................................................39
4.4.2.2 Default WEP Key To Use...................................................................................................39
4.4.2.3 IP Authentication ................................................................................................................40
4.4.2.4 WEP Key Lengths ..............................................................................................................40
4.4.2.5 Valid Key............................................................................................................................40
4.5 Administration setup.........................................................................................................................41
4.5.1 Reboot........................................................................................................................................41
4.5.2 Reset Configuration ...................................................................................................................41
4.5.3 Firmware Upgrade .....................................................................................................................42
4.5.4 Device name ..............................................................................................................................42
4.5.5 IP setting ....................................................................................................................................43
4.5.5.1 IP Address Mode ................................................................................................................43
4.5.5.2 Default IP Address..............................................................................................................43
4.5.5.3 Default Subnet Mask ..........................................................................................................44
4.5.5.4 Default Gateway .................................................................................................................44
4.5.6 Security ......................................................................................................................................44
4.5.6.1 User Name ..........................................................................................................................44
4.5.6.2 Administrator Password......................................................................................................45
4.6 Advanced Setup ................................................................................................................................45
4.6.1 Fragmentation threshold ............................................................................................................45
4.6.2 RTS threshold ............................................................................................................................45
4.6.3 Beacon period ............................................................................................................................45
4.6.4 DTIM interval............................................................................................................................46

4.6.5 802.11d ......................................................................................................................................46


4.6.6 Transmit Power..........................................................................................................................46
4.6.7 Antenna selection.......................................................................................................................46
4.6.8 Act Timeout ...............................................................................................................................47

1. The Wireless Technology


1.1 Standard
The Wireless Access Point utilizes the 802.11b, 802.11g or 802.11a standards. The IEEE 802.11g standard is
an extension of the 802.11b standard. It increases the data rate up to 54 Mbps (108Mbps in Super G mode)
within the 2.4GHz band, utilizing OFDM technology. This means that in most environments, within the
specified range of this device, you will be able to transfer large files quickly or even watch a movie in MPEG
format youre your network without noticeable delays. The IEEE 802.11a standard is based on 5.8 GHz band
with data rate up to 54 Mbps (108 Mbps in Turbo mode) to have a better clean wireless band away from
interference.

These two standards work by transmitting high-speed digital data over a radio wave utilizing OFDM
(Orthogonal Frequency Division Multiplexing) technology. OFDM works by splitting the radio signal into
multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver.
OFDM reduces the amount of cross talk (interference) in signal transmissions. The AP will automatically
sense the best possible connection speed to ensure the greatest speed and range possible. The 802.11g and
802.11a offers the most advanced network security features available today, including: WPA, TKIP, AES and
Pre-Shared Key mode.

U11.2 Planning Your Wireless Network


Network Topology
A wireless network is a group of computers, each equipped with one wireless adapter. Computers in a
wireless network must be configured to share the same radio channel. Several PCs equipped with wireless
cards or adapters can communicate with one another to form an ad-hoc network. The wireless adapters also
provide users access to a wired network when using an access point or wireless router. An integrated
wireless and wired network is called an infrastructure network. Each wireless PC in an infrastructure network
can talk to any computer in a wired network infrastructure via the access point or wireless router. An
infrastructure configuration extends the accessibility of a wireless PC to a wired network, and may double the
effective wireless transmission range for two wireless adapter PCs. Since an access point is able to forward
data within a network, the effective transmission range in an infrastructure network may be doubled.

Roaming
Infrastructure mode also supports roaming capabilities for mobile users. Roaming means that you can move
your wireless PC within your network and the access points will pick up the wireless PC's signal, providing
that they both share the same channel and SSID. Before enabling you consider roaming, choose a feasible

radio channel and optimum access point position. Proper access point positioning combined with a clear radio
signal will greatly enhance performance.

Network Layout
The AP Access Point has been designed for use with 802.11a or 802.11g and 802.11b products. With
802.11g products communicating with the 802.11b standard, products using these standards can
communicate with each other. The Access point is compatible with 802.11a or 802.11g and 802.11b adapters,
such at the PC Cards for your laptop computers, PCI Card for your desktop PC, and USB Adapters for when
you want to enjoy USB connectivity. These wireless products can also communicate with a 802.11g or
802.11b wireless Print Server. When you wish to connect your wired network with your wireless network, the
Access Points network port can be used to connect to any of switches or routers.

Installation Considerations
The AP lets you access your network, using a wireless connection, from virtually anywhere within its operating
range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that
the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of
materials and background RF (radio frequency) noise in your home or business. The key to maximizing
wireless range is to follow these basic guidelines:
z

Keep your product away (at least 3-6 feet or 1-2 meters) from electrical devices or appliances that
generate RF noise.

Keep the number of walls and ceilings between the AP and other network devices to a minimum - each
wall or ceiling can reduce your APs range from 3-90 feet (1-30 meters.) Position your devices so that
the number of walls or ceilings is minimized.

Be aware of the direct line between network devices. A wall that is 1.5 feet thick(0.5 meters), at a
45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet
(14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead
of at an angle) for better reception.

Building materials can impede the wireless signal - a solid metal door or aluminum studs may have a
negative effect on range. Try to position wireless devices and computers with wireless adapters so that
the signal passes through drywall or open doorways and not other materials.

Network Topology AP Mode and Client Mode

Network Topology Repeater Mode

Network Topology Wireless Bridge (WDS) Point to Multi-Point Mode

2. Connecting The YF-UBC2458AP and YF-UBC2458CPE To Your Network


Step 1:
First, connect the POE injector with two Ethernet cable and the power adapter, then plug the other end of the
power adapter to a wall outlet or power strip.

Step 2:
Insert an Ethernet cable (Out) to LAN port of the YF-UBC2458AP/CPE and another Ethernet cable (In) to the
network adapter in the computer; you will use it to configure the YF-UBC2458AP/CPE.
(Note: The LAN Port on the YF -UBC2458AP/CPE is Auto-MDI/MDIX. Meaning you can use a
straight-through or crossover Ethernet cable to the LAN Port.)

3. AP/ WDS (Bridge) Mode Configuration


3.1 Login Web Page
To access the web control interface, please open a browser window and type in the factory default IP address
in the URL : 192.168.62.240.

Using the Web-based Management Setup


There are only a few basic steps you need to complete to set up the wireless bridge for your network. The
Setup web page takes you through configuration procedures for the radio channel selection, IP configuration,
and wireless security.

Logging In Click OK (there is NO default user name or password, just leave the field blank).

3.2 Information
Under the main web page you will see the configuration menu pages for :
Information, Stations, Wireless, WDS, Security, Filtering, Admin and Advanced.

The Information windows displays the settings of the NSK-UBC2458AP/CPE AP/WDS (Bridge), the
AP/WDS (Bridge) Name, MAC Address, firmware version, SSID, Current transmit rate, Current channel,

10

Security and IP address.

3.3 Stations
This is to display the list of MAC addresses and some RF related information of available stations that have
associated to the Access Point in the area.

11

3.4 Wireless Basic


This is to show the wireless basic setting for the user to choose the options for their wireless application:

12

3.4.1 Wireless Model


Change wireless mode for AP/WDS (Bridge) or AP Client. Here please select AP/WDS (Bridge).
3.4.2 Wireless On/Off
This is to Select On or Off switch of the radio card. By selecting OFF all wireless functions of the Access
Point will turn disabled. (Default: ON)

3.4.3 Visibility Status


This is for Visible or Invisible the SSID during broadcasting. When the Invisible is selected, the SSID will
not be broadcasted in the beacons, so the clients has to know the networking name (SSID) to associate
with this Access Point. Enabling this feature the SSID will broadcast the SSID across the network.

3.4.4 SSID
(Access point mode only) SSID (Service Set Identifier) is the name designated for a specific wireless
local area network (WLAN) and provided by Access Point. Clients that want to connect to the WLAN
through the access point must set their SSID to the same as that of Access Point. (Default: oem_ag;
Range: 1-32 characters could be input).

3.4.5 Transmission rate (Mbits/s)


This option indicates the transmission rate of the AP/WDS (Bridge).The Transmission rate is the rate at
which the access point transmits uni-cast packets on the wireless interface. The maximum transmission
distance is affected by the data rate. The lower the data rate, the longer the transmission distance.
(Options: Best (automatic), 54 (108), 48( 96), 36 (72), 24 (48), 18 (36), 12 (24), 9 (18), 6 (12), 11, 5.5, 2, 1
Mbps; Default : Best (automatic).

13

3.4.6 802.11 Mode


This setting controls the types of 802.11 wireless clients or stations that can connect to this AP. The
wireless mode allows the user to select whether this AP will connect to an 802.11b only network, an
820.11g only network, an both 820.11b/g network on an 802.11a only network. The Default setting is
802.11a only.

3.4.7 Super Mode


Super mode is supported when the AP is using Atheros radio card. The normal 802.11a and 802.11g
wireless operation mode provides connections up to 54Mbps. Turbo mode is an enhanced mode (not
regulated in IEEE 802.11a and 802.11g) that provides a higher data rate of up to 108Mbps. Enabling
Turbo Mode allows the wireless bridge to provide connections up to 108Mbps. (Default: Super A/G with
Dynamic Turbo)

Super Mode

Function

Disabled

Standard 802.11a/g does NOT support enhanced capabilities.

Super A/G without Turbo

Capable of Packet Bursting, Fast Frames, Compression, No Turbo Mode

Super A/G with Static Turbo

Capable of Packet Bursting, Fast Frames, Compression, and Static Turbo


Mode. This setting is not backwards compatible with non-Turbo (legacy)
devices. Static turbo mode is always on and is only enabled when all
devices on the wireless network are configured with Super A/G and Static
Turbo enabled.

Super A/G with Dynamic Turbo

Capable of Packet Bursting, Fast Frames, Compression and Dynamic


Turbo Mode. This setting is backwards compatible with non-Turbo (legacy)
devices. Dynamic Turbo mode is only enabled when all devices on the
wireless network are configured with Super A/G and Dynamic Turbo
enabled.

14

3.4.8 Adaptive Radio Selection


Check this box to enable Adaptive Radio feature in Dynamic Turbo mode. When this feature is enabled,
Access Point stays out of turbo mode whenever it detects any non-turbo traffic on adjacent channels.
(Default: Enable)

3.4.9 Auto Channel Select


This is to enable the wireless AP/Bridge to automatically select an unoccupied radio channel or the best
channel at start up. This may take up to 20 seconds and no clients will be able to associate during this
period. (Default: Enable)

3.4.10 Channel
This is the radio channel that the Access Point will use which represents a narrow band of radio
frequency. It is important that the frequencies do not overlap to impact the data packets transmission
quality. To avoid interference within the network with multiple APs, set each AP to use one of the 3
channels (e.g. channel 1) and then the other AP to be one of the other 2 channels (e.g. channel 5 or
channel 10). Note that 802.11b and 802.11g use only 2.4 GHz channels and 802.11a only 5.0 GHz
channels. All devices on the network must share the same channel. (Default: 5.200 GHz CH40 for
802.11a)

15

802.11b/g Channel Frequency Ranges : 2.4 GHz 2.497 GHz


Americas :

Wireless Channels 1-11

Asia :

Wireless Channels 1-14

Europe :

Wireless Channels 1-13

3.5 WDS
Wireless Distribution System (WDS), when (WDS) is enabled, this Access Point functions as a wireless
bridge and is able to wirelessly communicate with other Access Points. Please note that WDS is incompatible
with WPA both features cannot be used at the same time. After entering all necessary information, please
click [Save] for completing setting.

16

3.5.1 Enable WDS


Check this box to enable this access point to communicate with other Access Points over WDS links, as a
Bridge. (Default: Disable)
3.5.2 AP MAC Address
Enter the MAC address of the Access Points in your network that will serve as bridges to wirelessly connect
multiple networks. Your can specify the MAC addresses of up to six other WDS/capable Access Points.

3.6 Security Setup


If you wish to use encryption for your 802.11g and 802.11a network, the YF-UBC-2458AP/CPE offers WEP
and WPA security. By default the encryption is disabled. You can change the encryption settings for
more secure wireless communication from Security and Encryption settings web page. After entering all
figures, please click [Save] to complete the setting.

17

3.6.1 WPA Configuration


Over the WEP, WPA improves the data encryption through the temporal key integrity protocol (TKIP). TKIP
scrambled the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the
keys havent been tampered with.
WEP regulates access to a wireless network based on a computers hardware-specific MAC address, which
is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system
to ensure that only authorized network users can access the network.

3.6.1.1 WPA Enable


Enable WPA Authenticator to require stations to use high grade encryption and authentication. (Default:
Disable)
Note : any client, that does not support the WPA standard, could not be able to authenticate with WPA
enabled.

3.6.1.2 WPA Mode


Select the WPA Mode. (Default: WPA)

18

WPA :
WPA addresses all known vulnerabilities in WEP, the original, less secure 40 or 104-bit encryption
scheme in the IEEE 802.11 standard. WPA also provides user authentication, since WEP lacks any
means of authentication. Designed to secure present and future version of IEEE 802.11 devices,
WPA is subset of the 802.11i specification. WPA replaces WEP with a strong new encryption
technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also
provides a scheme of mutual authentication using either IEEE 802.11x / Extensible Authentication
Protocol (EAP) authentication or pre-shared key (PSK) technology. It can be implemented
immediately and inexpensively as a software or firmware upgrade to most existing Wi-Fi Certified
Access points and client Devices with minimal degradation in network performance. WPA offers
standards-based, Wi-Fi Certified security. It assures users that the Wi-Fi certified devices they buy
will be cross-vendor compatible. When properly installed, WPA provides a high level of assurance to
enterprises, small businesses and home users that data will remain protected an that only
authorized users may access their networks.

WPA2 :
WPA2 is the second generation of WPA security; providing enterprise and consumer WiFi users with
a high level of assurance that only authorized users can access their wireless networks. WPA2 is the
certified interoperable version of the full IEEE 820.11i specification. Like WPA, WPA2 supports IEEE
802.11x / EAP authentication or PSK technology. It also included a new advanced encryption
mechanism using the Counter-Mode / CBC-MAC Protocol (CCMP) called the Advanced Encryption
Standard (AES).

3.6.1.3 Cipher Type


If you selected EAP you will need to select the cipher type for TKIP, AES or Auto. (Default: TKIP)

Note: When you select WPA, WPA2 or WPA2 only, you must select TKIP, AES, or Auto from the

19

pull-down menu.

- TKIP : Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1.1 that fixed unknown
security problems in WEPs implementation of the RC4 stream cipher. TKIP scrambled the keys using
a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys havent been
tampered with.

- AES : Advanced Encryption Standard is the U.S. governments next-generation cryptography algorithm,
which will replace DES and 3DES. AES works at multiple network layers simultaneously and support
128, 192 and 256 bit keys.

- TKIP and AES : If clients support both the TKIP and AES standards, then this would be the strongest
cipher type to use and combine both the TKIP and AES security.

3.6.1.4 PSK
PSK is the pre-shared key mode of WPA which does not require the inclusion of a RADIUS server in your
network. The user needs to enter a pass phrase in this field. The pass phrase is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Make sure you enter key exactly the same on all other wireless clients. Leave blank to enable 802.1X
Authentication. (Default: password)

3.6.1.5 WPA Group Key Update Interval


Select the interval during which the group key will be valid and user need to enter a figure in this field.
The default value of 3600 is recommended.

3.6.2 802.1X Configuration


IEEE 802.1x is a standard framework for network access control that uses a central RADIUS server for
user authentication. This control feature prevents unauthorized access to the network by requiring an
802.1x client application to submit user credentials for authentication. The 802.1x standard uses the
Extensible Authentication Protocol (EAP) to pass user credentials (either digital certificates, user names
and passwords, or other) from the client to the RADIUS server. Client authentication is then verified on the
RADIUS server before the access point grants client access to the network. Only the Access Point could
work with 802.1x standard with the RADIUS Server.

20

3.6.2.1 802.1X enable:


You can enable 802.1x as optionally supported or as required to enhance the security of the wireless
network. (Default: Disable)

3.6.2.2 Authentication timeout (mins)


Within this time, Default: 60

3.6.2.3 RADIUS server IP address


Enter the IP address of the Radius server. (Default: 0.0.0.0)

3.6.2.4 RADIUS server port number


Enter the Radius port on your AP dedicated to the RADIUS server. (Default: 1812)

3.6.2.5 RADIUS server shared secret


Enter the Radius secret phrase. (Default: radius_shared)

21

3.6.2.6 MAC Address Authentication


Default: Enable.

3.6.3 Wire Equivalent Privacy (WEP) Configuration


WEP provides a basic level of security, preventing unauthorized access to the network and encrypting data
transmitted between wireless bridge units. WEP uses static shared keys (fixed-length hexadecimal) that are
manually configured on all units in the wireless bridge network.

3.6.3.1 Enable WEP


Enable or disable the wireless bridge to use either WEP for data encryption. If WEP encryption is
selected and enabled, you must configure at least one encryption key on the wireless bridge. (Default:
Disable)

22

3.6.3.2 Default WEP key to use


Select the key 1-4 to be used as the default key. Data transmissions are always encrypted using the
default key. The other keys can only be used to decrypt received data. (Default: WEP Key 1)

3.6.3.3 Authentication
Select Open to communicate the key across the network.
Select Shared Key to limit communication to only those devices that share the same WEP settings.
(Default: Open)

Open : Open system Authentication involves a two-step authentication transaction sequence. The
first step in the sequence is the identity assertion and request fro authentication. The second step in
the sequence is the authentication result. If it is successful, the station shall be mutually
authenticated. Open system authentication does not provide authentication. It provides identification
using the wireless adapters MAC address. Open system authentication is used when no
authentication is required.

Shared Key : Shared Key Authentication supports authentication of stations as either a member of
those who know a shared secret key or a member of those who do not. Shared Key Authentication is
not secure. It verified that an authentication-initiating station has knowledge of a shared secret. This
is similar to pre-shared key authentication for Internet Protocol Security (IPSec).

3.6.3.4 WEP key lengths


For 64 bit keys you must enter 10 hex digits into each key box; for 128 bit keys you must enter 26 hex
digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. If you leave a key
box blank, then this means a key of all zeros. (Default: 64 bit (10 hex digits))

23

3.6.3.5 Valid Key


Select the 1st through the 4th key for the active keys.

3.7 Filtering
On this page you can enable MAC Filtering. If enabled, only the MAC addresses entered into the 'MAC
address' boxes are allowed to associate to this Access Point. Note that you can cut and paste the addresses
from the 'Station List' page into the MAC address boxes. Any new settings will not take effect until the device
is rebooted.

24

3.7.1 Enable MAC Filtering


Check this box to enable MAC Filtering. (Default: Disable)

3.7.2 MAC Address


Enter the MAC addresses that you wish to include in your filters list, and click [Save].

25

3.8 Administration setup


On this page you can configure the IP address used by the Web server running on this device. For "static"
mode, the IP address settings are given here. For "DHCP" mode, these settings are supplied by a DHCP
server on your network. You can also change the password, reboot the device, or reset all settings to their
factory defaults. If you have changed any settings it is necessary, to reboot the device for the new settings to
take effect.

3.8.1 Reboot
Click Reboot to apply the system settings and restart the YF-UBC2458AP/CPE.

3.8.2 Reset Configuration


Click Reset Configuration to return the YF-UBC2458AP/CPE to its factory default settings and the device
will reboot. Note that the IP address of the device will also be rest and it may be necessary to change the
address in your browser to access this website again.

3.8.3 Firmware Upgrade


This function is for the user to upgrade the firmware. Browse for the firmware upgrade file that you have

26

saved to your hard drive and click [Upload] after you have selected the settings file to start firmware
upgrading job.

3.8.4 Device name


This is the name that the device will use to identify itself to external configuration and IP-address-finding
programs. This is not the same as the SSID. It is okay to leave this blank if you are not using these
programs. (Default: 802.11a/g AP)

27

3.8.5 IP setting

3.8.5.1 IP Address Mode


There are two options: Static or DHCP. To select Static is to use the IP settings specified on this page.
To select 'DHCP' is to get the IP settings from a DHCP server on your network.

3.8.5.2 Default IP address


The IP address is the IP address of the wireless bridge. Valid IP address consists of four decimal
numbers, 0 to 255, separated by periods. (Default: 192.168.62.240)

3.8.5.3 Default subnet mask


The mask that identifies the host address bits used for routing to specific subnets. (Default:
255.255.255.0)

3.8.5.4 Default gateway


The default gateway is the IP address of the router for the wireless bridge, which is used if the requested
destination address is not on the local subnet. (Default: 192.168.62.1)

28

3.8.6 Security

3.8.6.1 User name


Enter a user name. The default setting is null.

3.8.6.2 Administrator password


This is the password that you must type when logging in to these web pages. You must enter the same
password into both boxes, for confirmation

3.9 Advanced Setup

29

3.9.1 Fragmentation threshold


The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented.
Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is default setting.

3.9.2 RTS threshold


This value should remain at its default setting of 2346. If you encounter inconsistent data flow, only minor
modifications to the value range between 256 and 2346 are recommended.

3.9.3 Beacon period


Beacons are packets sent by an access point to synchronize a network. Specify a beacon interval value.
The default (100) is recommended.

3.9.4 DTIM interval


(Delivery Traffic Indication Message) Select a setting between 1 and 255. 1 is the default setting. DTIM is a
countdown informing clients of the next window for listening to broadcast and multicast messages.

3.9.5 802.11d
Check this box to enable support for sending regional information to the stations. (Default: Disable)

30

3.9.6 Transmit Power


Normally the wireless transmitter operates at Full power. In some circumstances, however, there might be
a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent
transmissions from reaching beyond your corporate/home office or designated wireless area.
Select the level of Transmit Power: Full / Half / Quarter / Eighth / Min. (Default: Full)

3.9.7 Antenna Selection


Select antenna of non-MiMo radios for testing. The valid values are 0(auto-switching), 1(antenna 1) and
2(antenna 2).

3.9.8 Act Timeout


ACK Timeout default value is 20, the effective distance is 0 Km. Please consult Contrast Forms to setup
ACK Timeout values.

31

4. AP Client Mode

4.1 Information
This screen displays the settings information of the NSK-UBC2458AP/CPE for AP Client, such as the AP
Client name, MAC Address, firmware version, SSID of AP, BSSID of AP, Current transmit rate, Current
channel, Security and IP address.

4.2 Access Points


This is to display the list of MAC addresses and some RF related information of available Access Points
that have associated to this AP Client in the area.

32

4.3 Basic Wireless

4.3.1 Wireless Model


Change wireless mode for AP/WDS (Bridge) or AP Client. Here please select AP Client.

4.3.2 Wireless On/Off


This is to select On or Off switch of the radio card. By Selecting OFF will turn disable all wireless
functions of AP Client. (Default: ON)

4.3.3 Wireless Mode


Select 'Infrastructure' is to connect to a wireless (AP) Access Point, and select 'Ad-hoc' is to connect to

33

another bridge or wireless station. (Default: Infrastructure)


4.3.4 Wireless Network Name (SSID)
SSID (Service Set Identifier) is the name designated for a specific wireless local area network (WLAN)
and provided by Access Point. Clients that want to connect to the WLAN through the access point must
set their SSID to the same as that of Access Point. (Default: oem_ag; Range: 1-32 characters could be
input).

4.3.5 Transmission rate (Mbits/s)


This option indicates the transmission rate of the AP Client.The Transmission rate is the rate at which the
access point transmits uni-cast packets on the wireless interface. The maximum transmission distance is
affected by the data rate. The lower the data rate, the longer the transmission distance. (Options: Best
(automatic), 54 (108), 48( 96), 36 (72), 24 (48), 18 (36), 12 (24), 9 (18), 6 (12), 11, 5.5, 2, 1 Mbps; Default :
Best (automatic).

4.3.6 802.11 Mode


This setting controls the types of 802.11 wireless clients or stations that can connect to this AP. The
wireless mode allows the user to select whether this AP will connect to an 802.11b only network, an
820.11g only network, an both 820.11b/g network on an 802.11a only network. The Default setting is
802.11a only.

34

4.3.7 Super Mode


Super mode is supported when the AP is using Atheros radio card. The normal 802.11a and 802.11g
wireless operation mode provides connections up to 54Mbps. Turbo mode is an enhanced mode (not
regulated in IEEE 802.11a and 802.11g) that provides a higher data rate of up to 108Mbps. Enabling
Turbo Mode allows the wireless bridge to provide connections up to 108Mbps. (Default: Super A/G with
Dynamic Turbo)

Super Mode

Function

Disabled

Standard 802.11a/g does NOT support enhanced capabilities.

Super A/G without Turbo

Capable of Packet Bursting, Fast Frames, Compression, No Turbo Mode

Super A/G with Static Turbo

Capable of Packet Bursting, Fast Frames, Compression, and Static Turbo


Mode. This setting is not backwards compatible with non-Turbo (legacy)
devices. Static turbo mode is always on and is only enabled when all
devices on the wireless network are configured with Super A/G and Static
Turbo enabled.

Super A/G with Dynamic Turbo

Capable of Packet Bursting, Fast Frames, Compression and Dynamic


Turbo Mode. This setting is backwards compatible with non-Turbo (legacy)
devices. Dynamic Turbo mode is only enabled when all devices on the
wireless network are configured with Super A/G and Dynamic Turbo
enabled.

4.3.8 Channel
This is the radio channel that the Access Point will use which represents a narrow band of radio
frequency. It is important that the frequencies do not overlap to impact the data packets transmission
quality. To avoid interference within the network with multiple APs, set each AP to use one of the 3
channels (e.g. channel 1) and then the other AP to be one of the other 2 channels (e.g. channel 5 or
channel 10). Note that 802.11b and 802.11g use only 2.4 GHz channels and 802.11a only 5.0 GHz
channels. All devices on the network must share the same channel. (Default: 5.200 GHz CH40 for
802.11a)

35

4.4 Security Setup


If you wish to use encryption for your 802.11g and 802.11a network, the NSK-UBC-2458AP/CPE offers
WEP and WPA security. By default the encryption is disabled. You can change the encryption settings
for more secure wireless communication from Security and Encryption settings web page. After entering all
figures, please click [Save] to complete the setting.

4.4.1 WPA Configuration


Over the WEP, WPA improves the data encryption through the temporal key integrity protocol (TKIP). TKIP
scrambled the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the
keys havent been tampered with.
WEP regulates access to a wireless network based on a computers hardware-specific MAC address, which
is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system
to ensure that only authorized network users can access the network.

4.4.1.1 WPA Enable


Enable WPA Authenticator to require stations to use high grade encryption and authentication. (Default:

36

Disable)
Note : any client, that does not support the WPA standard, could not be able to authenticate with WPA
enabled.

4.4.1.2 WPA Mode


Select the WPA Mode. (Default: WPA)

WPA :
WPA addresses all known vulnerabilities in WEP, the original, less secure 40 or 104-bit encryption
scheme in the IEEE 802.11 standard. WPA also provides user authentication, since WEP lacks any
means of authentication. Designed to secure present and future version of IEEE 802.11 devices,
WPA is subset of the 802.11i specification. WPA replaces WEP with a strong new encryption
technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also
provides a scheme of mutual authentication using either IEEE 802.11x / Extensible Authentication
Protocol (EAP) authentication or pre-shared key (PSK) technology. It can be implemented
immediately and inexpensively as a software or firmware upgrade to most existing Wi-Fi Certified
Access points and client Devices with minimal degradation in network performance. WPA offers
standards-based, WiFi Certified security. It assures users that the Wi-Fi certified devices they buy
will be cross-vendor compatible. When properly installed, WPA provides a high level of assurance to
enterprises, small businesses and home users that data will remain protected an that only
authorized users may access their networks.

WPA2 :
WPA2 is the second generation of WPA security; providing enterprise and consumer WiFi users with
a high level of assurance that only authorized users can access their wireless networks. WPA2 is the
certified interoperable version of the full IEEE 820.11i specification. Like WPA, WPA2 supports IEEE
802.11x / EAP authentication or PSK technology. It also included a new advanced encryption
mechanism using the Counter-Mode / CBC-MAC Protocol (CCMP) called the Advanced Encryption
Standard (AES).

37

4.4.1.3 Cipher Type


If you selected EAP you will need to select the cipher type for TKIP, AES or Auto. (Default: TKIP)

Note: When you select WPA, WPA2 or WPA2 only, you must select TKIP, AES, or Auto from the
pull-down menu.

- TKIP : Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1.1 that fixed unknown
security problems in WEPs implementation of the RC4 stream cipher. TKIP scrambled the keys using
a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys havent been
tampered with.

- AES : Advanced Encryption Standard is the U.S. governments next-generation cryptography algorithm,
which will replace DES and 3DES. AES works at multiple network layers simultaneously and support
128, 192 and 256 bit keys.

- TKIP and AES : If clients support both the TKIP and AES standards, then this would be the strongest
cipher type to use and combine both the TKIP and AES security.

4.4.1.4 PSK
PSK is the pre-shared key mode of WPA which does not require the inclusion of a RADIUS server in your
network. The user needs to enter a pass phrase in this field. The pass phrase is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Make sure you enter key exactly the same on all other wireless clients. Leave blank to enable 802.1X
Authentication. (Default: password)

4.4.2 Wire Equivalent Privacy (WEP) Configuration


WEP provides a basic level of security, preventing unauthorized access to the network and encrypting
data transmitted between wireless bridge units. WEP uses static shared keys (fixed-length hexadecimal)
that are manually configured on all units in the wireless bridge network.

38

4.4.2.1 Enable WEP


Enable or disable the wireless bridge to use either WEP for data encryption. If WEP encryption is
selected and enabled, you must configure at least one encryption key on the wireless bridge. (Default:
Disable)

4.4.2.2 Default WEP Key To Use


Select the key 1-4 to be used as the default key. Data transmissions are always encrypted using the
default key. The other keys can only be used to decrypt received data. (Default: WEP Key 1)

39

4.4.2.3 Authentication
Select Open to communicate the key across the network.
Select Shared Key to limit communication to only those devices that share the same WEP settings.
(Default: Open)

Open : Open system Authentication involves a two-step authentication transaction sequence. The
first step in the sequence is the identity assertion and request fro authentication. The second step in
the sequence is the authentication result. If it is successful, the station shall be mutually
authenticated. Open system authentication does not provide authentication. It provides identification
using the wireless adapters MAC address. Open system authentication is used when no
authentication is required.

Shared Key : Shared Key Authentication supports authentication of stations as either a member of
those who know a shared secret key or a member of those who do not. Shared Key Authentication is
not secure. It verified that an authentication-initiating station has knowledge of a shared secret. This
is similar to pre-shared key authentication for Internet Protocol Security (IPSec).

4.4.2.4 WEP Key Lengths


Select 64 bit (10 hex digits), 128 bit (26 hex digits). (Default: 64 bit (10 hex digits))

4.4.2.5 Valid Key


Select the 1st through the 4th key be the active key.

40

4.5 Administration setup


On this page you can configure the IP address used by the Web server running on this device. For "static"
mode, the IP address settings are given here. For "DHCP" mode, these settings are supplied by a DHCP
server on your network. You can also change the password, reboot the device, or reset all settings to their
factory defaults. If you have changed any settings it is necessary to reboot the device for the new settings to
take effect.

4.5.1 Reboot
Click Reboot to apply the system settings and restart the NSK-UBC2458AP/CPE.

4.5.2 Reset Configuration


Click Reset Configuration to return the NSK-UBC2458AP/CPE to its factory default settings.

41

4.5.3 Firmware Upgrade


Browse for the configuration settings that you have saved to your hard drive. Click Upload after you have
selected the settings file.

4.5.4 Device name


This is the name that the device will use to identify itself to external configuration and IP-address-finding
programs. This is not the same as the SSID. It is okay to leave this blank if you are not using these
programs. (Default: 802.11a/g AP)

42

4.5.5 IP Setting

4.5.5.1 IP Address Mode


Select 'DHCP' to get the IP settings from a DHCP server on your network. Select 'Static' to use the IP
settings specified on this page.

4.5.5.2 Default IP Address


The IP address of the wireless bridge. Valid IP address consist of four decimal number, 0 to 255,
separated by periods. (Default: 192.168.62.240)

43

4.5.5.3 Default Subnet Mask


The mask that identifies the host address bits used for routing to specific subnets. (Default:
255.255.255.0)

4.5.5.4 Default Gateway


The default gateway is the IP address of the router for the wireless bridge, which is used if the requested
destination address is not on the local subnet. (Default: 192.168.62.1)
4.5.6 Security

4.5.6.1 User name


Enter a user name. The default setting is null.

4.5.6.2 Administrator password


This is the password that you must type when logging in to these web pages. You must enter the same
password into both boxes, for confirmation

44

4.6 Advanced Setup

4.6.1 Fragmentation threshold


The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented.
Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is default setting.

4.6.2 RTS threshold


This value should remain at its default setting of 2346. If you encounter inconsistent data flow, only minor
modifications to the value range between 256 and 2346 are recommended.

4.6.3 Beacon period


Beacons are packets sent by an access point to synchronize a network. Specify a beacon interval value.
The default (100) is recommended.

45

4.6.4 DTIM interval


(Delivery Traffic Indication Message) Select a setting between 1 and 255. 1 is the default setting. DTIM is a
countdown informing clients of the next window for listening to broadcast and multicast messages.

4.6.5 802.11d
Check this box to enable support for sending regional information to the stations. (Default: Disable)

4.6.6 Transmit Power


Normally the wireless transmitter operates at Full power. In some circumstances, however, there might be
a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent
transmissions from reaching beyond your corporate/home office or designated wireless area.
Select the level of Transmit Power: Full / Half / Quarter / Eighth / Min. (Default: Full)

4.6.7 Antenna selection


Select antenna of non-MiMo radios for testing. The valid values are 0(auto-switching), 1(antenna 1) and
2(antenna 2).

46

4.6.8 Act Timeout


ACK Timeout default value is 20, the effective distance is 0 Km. Please consult Contrast Forms to setup
ACK Timeout values.

47

You might also like