Professional Documents
Culture Documents
Yf-Ubc2458apcpe Manual Abg
Yf-Ubc2458apcpe Manual Abg
Yf-Ubc2458apcpe Manual Abg
11abgOutdoorAP/Bridge/Client
ModelNo.YFUBC2458AP/YFUBC2458CPE
YF-UBC2458AP
YF-UBC2458CPE
802.11a/b/g
Outdoor AP/Bridge/Client
Users Manual
These two standards work by transmitting high-speed digital data over a radio wave utilizing OFDM
(Orthogonal Frequency Division Multiplexing) technology. OFDM works by splitting the radio signal into
multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver.
OFDM reduces the amount of cross talk (interference) in signal transmissions. The AP will automatically
sense the best possible connection speed to ensure the greatest speed and range possible. The 802.11g and
802.11a offers the most advanced network security features available today, including: WPA, TKIP, AES and
Pre-Shared Key mode.
Roaming
Infrastructure mode also supports roaming capabilities for mobile users. Roaming means that you can move
your wireless PC within your network and the access points will pick up the wireless PC's signal, providing
that they both share the same channel and SSID. Before enabling you consider roaming, choose a feasible
radio channel and optimum access point position. Proper access point positioning combined with a clear radio
signal will greatly enhance performance.
Network Layout
The AP Access Point has been designed for use with 802.11a or 802.11g and 802.11b products. With
802.11g products communicating with the 802.11b standard, products using these standards can
communicate with each other. The Access point is compatible with 802.11a or 802.11g and 802.11b adapters,
such at the PC Cards for your laptop computers, PCI Card for your desktop PC, and USB Adapters for when
you want to enjoy USB connectivity. These wireless products can also communicate with a 802.11g or
802.11b wireless Print Server. When you wish to connect your wired network with your wireless network, the
Access Points network port can be used to connect to any of switches or routers.
Installation Considerations
The AP lets you access your network, using a wireless connection, from virtually anywhere within its operating
range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that
the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of
materials and background RF (radio frequency) noise in your home or business. The key to maximizing
wireless range is to follow these basic guidelines:
z
Keep your product away (at least 3-6 feet or 1-2 meters) from electrical devices or appliances that
generate RF noise.
Keep the number of walls and ceilings between the AP and other network devices to a minimum - each
wall or ceiling can reduce your APs range from 3-90 feet (1-30 meters.) Position your devices so that
the number of walls or ceilings is minimized.
Be aware of the direct line between network devices. A wall that is 1.5 feet thick(0.5 meters), at a
45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet
(14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead
of at an angle) for better reception.
Building materials can impede the wireless signal - a solid metal door or aluminum studs may have a
negative effect on range. Try to position wireless devices and computers with wireless adapters so that
the signal passes through drywall or open doorways and not other materials.
Step 2:
Insert an Ethernet cable (Out) to LAN port of the YF-UBC2458AP/CPE and another Ethernet cable (In) to the
network adapter in the computer; you will use it to configure the YF-UBC2458AP/CPE.
(Note: The LAN Port on the YF -UBC2458AP/CPE is Auto-MDI/MDIX. Meaning you can use a
straight-through or crossover Ethernet cable to the LAN Port.)
Logging In Click OK (there is NO default user name or password, just leave the field blank).
3.2 Information
Under the main web page you will see the configuration menu pages for :
Information, Stations, Wireless, WDS, Security, Filtering, Admin and Advanced.
The Information windows displays the settings of the NSK-UBC2458AP/CPE AP/WDS (Bridge), the
AP/WDS (Bridge) Name, MAC Address, firmware version, SSID, Current transmit rate, Current channel,
10
3.3 Stations
This is to display the list of MAC addresses and some RF related information of available stations that have
associated to the Access Point in the area.
11
12
3.4.4 SSID
(Access point mode only) SSID (Service Set Identifier) is the name designated for a specific wireless
local area network (WLAN) and provided by Access Point. Clients that want to connect to the WLAN
through the access point must set their SSID to the same as that of Access Point. (Default: oem_ag;
Range: 1-32 characters could be input).
13
Super Mode
Function
Disabled
14
3.4.10 Channel
This is the radio channel that the Access Point will use which represents a narrow band of radio
frequency. It is important that the frequencies do not overlap to impact the data packets transmission
quality. To avoid interference within the network with multiple APs, set each AP to use one of the 3
channels (e.g. channel 1) and then the other AP to be one of the other 2 channels (e.g. channel 5 or
channel 10). Note that 802.11b and 802.11g use only 2.4 GHz channels and 802.11a only 5.0 GHz
channels. All devices on the network must share the same channel. (Default: 5.200 GHz CH40 for
802.11a)
15
Asia :
Europe :
3.5 WDS
Wireless Distribution System (WDS), when (WDS) is enabled, this Access Point functions as a wireless
bridge and is able to wirelessly communicate with other Access Points. Please note that WDS is incompatible
with WPA both features cannot be used at the same time. After entering all necessary information, please
click [Save] for completing setting.
16
17
18
WPA :
WPA addresses all known vulnerabilities in WEP, the original, less secure 40 or 104-bit encryption
scheme in the IEEE 802.11 standard. WPA also provides user authentication, since WEP lacks any
means of authentication. Designed to secure present and future version of IEEE 802.11 devices,
WPA is subset of the 802.11i specification. WPA replaces WEP with a strong new encryption
technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also
provides a scheme of mutual authentication using either IEEE 802.11x / Extensible Authentication
Protocol (EAP) authentication or pre-shared key (PSK) technology. It can be implemented
immediately and inexpensively as a software or firmware upgrade to most existing Wi-Fi Certified
Access points and client Devices with minimal degradation in network performance. WPA offers
standards-based, Wi-Fi Certified security. It assures users that the Wi-Fi certified devices they buy
will be cross-vendor compatible. When properly installed, WPA provides a high level of assurance to
enterprises, small businesses and home users that data will remain protected an that only
authorized users may access their networks.
WPA2 :
WPA2 is the second generation of WPA security; providing enterprise and consumer WiFi users with
a high level of assurance that only authorized users can access their wireless networks. WPA2 is the
certified interoperable version of the full IEEE 820.11i specification. Like WPA, WPA2 supports IEEE
802.11x / EAP authentication or PSK technology. It also included a new advanced encryption
mechanism using the Counter-Mode / CBC-MAC Protocol (CCMP) called the Advanced Encryption
Standard (AES).
Note: When you select WPA, WPA2 or WPA2 only, you must select TKIP, AES, or Auto from the
19
pull-down menu.
- TKIP : Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1.1 that fixed unknown
security problems in WEPs implementation of the RC4 stream cipher. TKIP scrambled the keys using
a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys havent been
tampered with.
- AES : Advanced Encryption Standard is the U.S. governments next-generation cryptography algorithm,
which will replace DES and 3DES. AES works at multiple network layers simultaneously and support
128, 192 and 256 bit keys.
- TKIP and AES : If clients support both the TKIP and AES standards, then this would be the strongest
cipher type to use and combine both the TKIP and AES security.
3.6.1.4 PSK
PSK is the pre-shared key mode of WPA which does not require the inclusion of a RADIUS server in your
network. The user needs to enter a pass phrase in this field. The pass phrase is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Make sure you enter key exactly the same on all other wireless clients. Leave blank to enable 802.1X
Authentication. (Default: password)
20
21
22
3.6.3.3 Authentication
Select Open to communicate the key across the network.
Select Shared Key to limit communication to only those devices that share the same WEP settings.
(Default: Open)
Open : Open system Authentication involves a two-step authentication transaction sequence. The
first step in the sequence is the identity assertion and request fro authentication. The second step in
the sequence is the authentication result. If it is successful, the station shall be mutually
authenticated. Open system authentication does not provide authentication. It provides identification
using the wireless adapters MAC address. Open system authentication is used when no
authentication is required.
Shared Key : Shared Key Authentication supports authentication of stations as either a member of
those who know a shared secret key or a member of those who do not. Shared Key Authentication is
not secure. It verified that an authentication-initiating station has knowledge of a shared secret. This
is similar to pre-shared key authentication for Internet Protocol Security (IPSec).
23
3.7 Filtering
On this page you can enable MAC Filtering. If enabled, only the MAC addresses entered into the 'MAC
address' boxes are allowed to associate to this Access Point. Note that you can cut and paste the addresses
from the 'Station List' page into the MAC address boxes. Any new settings will not take effect until the device
is rebooted.
24
25
3.8.1 Reboot
Click Reboot to apply the system settings and restart the YF-UBC2458AP/CPE.
26
saved to your hard drive and click [Upload] after you have selected the settings file to start firmware
upgrading job.
27
3.8.5 IP setting
28
3.8.6 Security
29
3.9.5 802.11d
Check this box to enable support for sending regional information to the stations. (Default: Disable)
30
31
4. AP Client Mode
4.1 Information
This screen displays the settings information of the NSK-UBC2458AP/CPE for AP Client, such as the AP
Client name, MAC Address, firmware version, SSID of AP, BSSID of AP, Current transmit rate, Current
channel, Security and IP address.
32
33
34
Super Mode
Function
Disabled
4.3.8 Channel
This is the radio channel that the Access Point will use which represents a narrow band of radio
frequency. It is important that the frequencies do not overlap to impact the data packets transmission
quality. To avoid interference within the network with multiple APs, set each AP to use one of the 3
channels (e.g. channel 1) and then the other AP to be one of the other 2 channels (e.g. channel 5 or
channel 10). Note that 802.11b and 802.11g use only 2.4 GHz channels and 802.11a only 5.0 GHz
channels. All devices on the network must share the same channel. (Default: 5.200 GHz CH40 for
802.11a)
35
36
Disable)
Note : any client, that does not support the WPA standard, could not be able to authenticate with WPA
enabled.
WPA :
WPA addresses all known vulnerabilities in WEP, the original, less secure 40 or 104-bit encryption
scheme in the IEEE 802.11 standard. WPA also provides user authentication, since WEP lacks any
means of authentication. Designed to secure present and future version of IEEE 802.11 devices,
WPA is subset of the 802.11i specification. WPA replaces WEP with a strong new encryption
technology called Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). It also
provides a scheme of mutual authentication using either IEEE 802.11x / Extensible Authentication
Protocol (EAP) authentication or pre-shared key (PSK) technology. It can be implemented
immediately and inexpensively as a software or firmware upgrade to most existing Wi-Fi Certified
Access points and client Devices with minimal degradation in network performance. WPA offers
standards-based, WiFi Certified security. It assures users that the Wi-Fi certified devices they buy
will be cross-vendor compatible. When properly installed, WPA provides a high level of assurance to
enterprises, small businesses and home users that data will remain protected an that only
authorized users may access their networks.
WPA2 :
WPA2 is the second generation of WPA security; providing enterprise and consumer WiFi users with
a high level of assurance that only authorized users can access their wireless networks. WPA2 is the
certified interoperable version of the full IEEE 820.11i specification. Like WPA, WPA2 supports IEEE
802.11x / EAP authentication or PSK technology. It also included a new advanced encryption
mechanism using the Counter-Mode / CBC-MAC Protocol (CCMP) called the Advanced Encryption
Standard (AES).
37
Note: When you select WPA, WPA2 or WPA2 only, you must select TKIP, AES, or Auto from the
pull-down menu.
- TKIP : Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1.1 that fixed unknown
security problems in WEPs implementation of the RC4 stream cipher. TKIP scrambled the keys using
a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys havent been
tampered with.
- AES : Advanced Encryption Standard is the U.S. governments next-generation cryptography algorithm,
which will replace DES and 3DES. AES works at multiple network layers simultaneously and support
128, 192 and 256 bit keys.
- TKIP and AES : If clients support both the TKIP and AES standards, then this would be the strongest
cipher type to use and combine both the TKIP and AES security.
4.4.1.4 PSK
PSK is the pre-shared key mode of WPA which does not require the inclusion of a RADIUS server in your
network. The user needs to enter a pass phrase in this field. The pass phrase is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Make sure you enter key exactly the same on all other wireless clients. Leave blank to enable 802.1X
Authentication. (Default: password)
38
39
4.4.2.3 Authentication
Select Open to communicate the key across the network.
Select Shared Key to limit communication to only those devices that share the same WEP settings.
(Default: Open)
Open : Open system Authentication involves a two-step authentication transaction sequence. The
first step in the sequence is the identity assertion and request fro authentication. The second step in
the sequence is the authentication result. If it is successful, the station shall be mutually
authenticated. Open system authentication does not provide authentication. It provides identification
using the wireless adapters MAC address. Open system authentication is used when no
authentication is required.
Shared Key : Shared Key Authentication supports authentication of stations as either a member of
those who know a shared secret key or a member of those who do not. Shared Key Authentication is
not secure. It verified that an authentication-initiating station has knowledge of a shared secret. This
is similar to pre-shared key authentication for Internet Protocol Security (IPSec).
40
4.5.1 Reboot
Click Reboot to apply the system settings and restart the NSK-UBC2458AP/CPE.
41
42
4.5.5 IP Setting
43
44
45
4.6.5 802.11d
Check this box to enable support for sending regional information to the stations. (Default: Disable)
46
47