Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Planet Technology WAP-1966 manuale d’uso - BKManuals

Planet Technology WAP-1966 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Planet Technology WAP-1966. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Planet Technology WAP-1966 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Planet Technology WAP-1966 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Planet Technology WAP-1966 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Planet Technology WAP-1966
- nome del fabbricante e anno di fabbricazione Planet Technology WAP-1966
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Planet Technology WAP-1966
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Planet Technology WAP-1966 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Planet Technology WAP-1966 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Planet Technology in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Planet Technology WAP-1966, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Planet Technology WAP-1966, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Planet Technology WAP-1966. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    22Mbps Wir e les s Access Poin t / Bridge W A P-1966 User ’ s Manual[...]

  • Pagina 2

    Co p y right Copyright  2003 by PLANE T T echnology Corp . A ll righ t s r eserved . No par t of t his publication ma y be reproduced, t r ansmit t ed, t r anscribed, s t ored in a ret r ieval system, or translated into any language or compu t er language , in any form or by any means , electronic, mechanical , magne t ic, optical , chemical, ma[...]

  • Pagina 3

    Federal Communication Commission (FCC) Radiation Exposu r e Statement This equipment complies w ith FCC radia t ion e x posure set f orth for an uncontrolled envi r onment. In orde r to avoid the possibility of e x ceeding the FCC r adio f r equency e x posure limi t s , human p r o x imity to the an t enna shall not be less than 20 cm(8 inches) du[...]

  • Pagina 4

    T A BLE OF CONTENTS C H A P T ER 1 IN T RODUC T I O N ................................................................................................. .1 1.1 P ACKAGE C ON T ENTS ........................................................................................................ .1 1.2 S YSTEM R EQUIREME N TS ..................................[...]

  • Pagina 5

    C H A P T ER 6 T ROUBLES H OO T IN G ...................................................................................... . 51[...]

  • Pagina 6

    - 1 - Chapter 1 I ntroduction Thank you for purchasing W AP-1966. This device features the latest innovation w ireless technolog y making the w ireless net w orking w orld happened . This manual guides you on ho w to ins t all and properl y use t he W A P-1966 in o r der t o t ake full advan t age of i t s fea t u r es. 1.1 Package Con t ents M ake[...]

  • Pagina 7

    - 2 - Point-to- M ul t iPoint) • Provi d e W indo w s-bas e d c o n f iguration utili t y an d W eb Con f igur a ti o n 1.4 Speci f ica t ion S t andard IEEE 802. 1 1b Compliant Signal T ype DSSS (Direct Sequence S pread S pect r um ) M odulation QPSK / BPSK / CCK / PBCC Port One 10/100BASE-T X Antenna 1 x Dipole Antenna Da t a Encryption 64 bit [...]

  • Pagina 8

    - 3 - Chapter 2 H ard w a re Installation Before you p r oceed w ith the ins t allation, it is necessary that you have enough info r ma t ion about the W A P-1966 . 1. Locate an optimum location for the W A P-1966. T h e be s t place f or your WAP-1966 is usually at the center of your w ireless net w ork, w ith line of sight to all of your mobile s[...]

  • Pagina 9

    - 4 - Chapter 3 C onf i guring the Wire l ess A c ce s s Po i nt 3.1 Configur e t h rough Web Br o w s er W eb configura t ion provides a user-f r iendly graphical user in t erface ( w eb pages ) to manage you r W A P-1966 . An AP w ith an assigned I P address (e . g. http: // 192.168.1 . 1) w ill allo w you to monito r and con f igure via w eb bro[...]

  • Pagina 10

    - 5 - The default pass w ord for administrator (login name is “ admin ” ) is “ admin ” . Y ou can change the Pass w ord in this step . Click “ N e x t> ” . Step 2. Set the SSID and Channel Enter the SSID of your W LAN and select t he f r equency channel. Click “ Ne x t> ” . Step 3. Set Encr y ption Y ou can enable W E P encryp[...]

  • Pagina 11

    - 6 - Please click the “ Res t art ” but t on to save the set t ings and r es t art W A P - 1966. In t he follo w ing w e b page , please click “ Close ” to close t he Setup W i z ard w indo w . 3.1.2 S t atus: Y ou can check your W A P - 1966 se t tings and s t a t us in this screen . Y ou can click the “ V ie w Log ” button , and t he[...]

  • Pagina 12

    - 7 - 3.1.3 Basic Settings: Y ou can set t he A P Name , ESSID, Channel and W E P function to this Access P oint. A f te r con f iguration, please click A pply to save you r settings. AP Name : The host name of the W A P-1966. This can be any name f or you to easily identify this access point. SSID : The SSID is the name shared among all poin t s i[...]

  • Pagina 13

    - 8 - I P address : This address is a unique numbe r s that identi f ies a computer or device on the WAN o r LAN. These numbe r s a r e usually sho w n in grou p s sepa r ated by periods, for e x ample: 123.123.23 . 2. Subnet Mask : Subne t s allo w net w ork tra ff ic bet w een hos t s t o be se p arated based on t he net w ork's con f igurat[...]

  • Pagina 14

    - 9 - AP Mode: WAP-1966 has f ou r opera t ion modes. By default, it is set to A P mode . A P: This mode is set t o WA P -1966 by default . This connec t s your w ireless PCs t o a w ired net w ork. In most cases, no change is necessar y . Up to 63 w ireless clien t s can be connected through W A P-1966 . AP Client : A WAP - 1966 se t to A P Client[...]

  • Pagina 15

    - 10 - and 2432 . This value should remain at i t s default setting of 2 , 432. Should you encounter inconsisten t da t a f lo w , only minor modifica t ions are recommended. Fragmen t ation Threshold: This field is used to specify the fragmen t ation threshold . Ente r a value bet w een 256 and 2346. If you e x perience a high p acket error rate, [...]

  • Pagina 16

    - 11 - Password : Enter the ne w pass w ord in the " AP Pass w ord Ne w " field and again in the ne x t field to con f irm . Click on " A pply" to execu t e t he pass w ord change . The Pass w ord is case - sensi t ive, and can be made up o f any keyboa r d characte r s. The ne w pass w ord mus t be bet w een 0 and 15 characte r[...]

  • Pagina 17

    - 12 - Enable/D i sable: Enable or disable 802 . 1 X authentication of W A P-1966. Encr y ption K e y: Select one of the Encryp t ion key leng t h options. I t should be set t he same leng t h as W EP ke y . Select one of the Encryp t ion key li f etime options. Once the lifetime e x pires, t he Encryption key w ill be rene w ed by RADIUS serve r .[...]

  • Pagina 18

    - 13 - devices on a net w ork. It is commonly used f or net w ork administrato r s to communica t e w ith mul t iple devices (hub, s w itch, rou t er …… ) for configuring and moni t oring w hile convenien t fo r troubleshoo t ing bu t no miscellaneous pla t form conside r ation. The built - in SN MP is an agent, w hich w atches t he s t a t us [...]

  • Pagina 19

    - 14 - 4. Please click “ Finish ” t o complete the so f t w are ins t allation . 3.2.2 22M A P Utili t y c onfiguration A f ter ins t alling utilit y , you can f ound the icon on your desktop, please double click this icon to run t he configura t ion u t ilit y and select each option to se t up you r Access Point as you need . A ft er settings [...]

  • Pagina 20

    - 15 - 3.2. 2 .1 Link Information W hen the configuration utility s t ar t s, it w ill sho w you the fi r s t option “ Link Information ” . Y ou can view the fi r st A ccess Point ’ s curren t set t ing . Note: If you have many WAP - 1966, all the WAP - 1966s w ill list in “ A vailable AP ” . Y ou can select the W A P-1966 t hat you w ant[...]

  • Pagina 21

    - 16 - Basic Sett i ngs : ESSID : ESSID is used by all w ireless devices w ithin the w ireless net w ork . The ESSID value mus t be the same on all s t ations and A ccess poin t s in this W LAN. Channel : Select the appropriate channel f r om the list provided to cor r espond w ith your ne tw or k settings, bet w een 1 and 13 (in ETSI). All w irele[...]

  • Pagina 22

    - 17 - T ransm i ssion Ra t es: Y ou may select transmission rate t o “ 1-2 M bps ” , “ 1-2-5 . 5- 1 1 M bps ” or “ 1-2-5.5- 1 1-22 M bps ” . Preamble T y p e: The preamble defines the length of t he CRC block f or communication bet w een the Access Point and roaming Net w ork C ard. Long preamble ensure the net w o r k card to communic[...]

  • Pagina 23

    - 18 - A ntenna T ransmi t power : Used to control the transmit po w er of the WAP-1966. Four options are available: 100%, 50%, 25% and 12.5% . 3.2. 2 .3 I P Settings DHCP : DHC P is a p r otocol for dynamically assigning I P addresses to net w orked compu t ers. W ith DHC P , a compute r can au t omatically be given an e x clusive I P add r ess ea[...]

  • Pagina 24

    - 19 - 3.2. 2 .4 WEP Settings Da t a Encr y ption : Select this option w hen you w ant to enable W EP f unction. A uth. Mode : Open A uthentication: W i t h t his set t ing , any s t ation in the W LAN can receives and transmi t s da t a f r om the A ccess Point (null authentication). Shared A uthenticat i on : W i t h this set t ing, only s t atio[...]

  • Pagina 25

    - 20 - 3.2. 2 .5 8 02 . 1x Settings 802.1X Funct i on: Enable or disable 802.1 X authentica t ion o f WAP-1966. Encr y ption K e y: Select one of the Encryp t ion key leng t h options. I t should be set t he same leng t h as W EP ke y . Select one of the Encryp t ion key li f etime options. Once the lifetime e x pires, t he Encryption key w ill be [...]

  • Pagina 26

    - 21 - Chapter 4 8 0 2. 1 X A uthenticat i on Setup 4.1 8 02. 1 X Infra s tructure An 802.1 X Infrastructu r e is composed o f three majo r componen t s: Authenticato r , Au t hen t ication serve r , and Supplicant. A uthentication server: An entity tha t provides an authentication service to an authenticator . This service determines, from the cre[...]

  • Pagina 27

    - 22 - 5. The RADIUS server r esponds to the clien t w ith i t s digi t al certifica t e. 6. The client validates the digi t al cer t ificate, and replies i t s o w n digi t al cer t ifica t e to t he R A DIUS serve r . 7. The RADIUS server valida t es client ’ s digi t al cer t ificate. 8. The client and RADIUS se r ver derive encryption keys. 9[...]

  • Pagina 28

    - 23 - 6. Enter the info r ma t ion tha t you w ant for your Ce r tifica t e Service, and click “ Next ” to continue . 7. Go to S t art > Program > A dministra t ive Tools > Certif i cate A uthori t y . 8. Right-click on the “ Poli c y S etting ” , select “ new ” . 9. Select “ Certi f ica t e to Issue ” . 10. Selec t “ A [...]

  • Pagina 29

    - 24 - 11. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 12. Right-click on domain, and select ” Properties ” to con t inue. 13. Selec t “ Group Pol i cy ” tab and click “ Properties ” to con t inue .[...]

  • Pagina 30

    - 25 - 14. Go to “ Compu t er Configuration ” > “ Securi t y Settings ” > “ Public K e y Policies ” 15. Right-click “ A utomatic Certificate Request S etting ” , and select “ New ” 16. Click “ A utomatic Certif i cate Request ... ”[...]

  • Pagina 31

    - 26 - 17. The Au t oma t ic C erti f icate Request Setup W iza r d w ill guide you th r ough the Automa t ic Certi f icate Request setup , simply click “ Next ” th r ough to t he last step. 18. Click “ Fin i sh ” to complete the Au t omatic Certi f icate Request Setup 19. Go to Start > Run , and type “ command ” and click “ Enter [...]

  • Pagina 32

    - 27 - Setting In t ernet Authenticat i on Service 24. Go to Start > Program > A dministrative Tools > Inte r net A uthentication Service . 25. Right-click “ Cl i ent ” , and select “ N e w C l ient ” . 26. En t er the IP address of W AP-1966 in the Client address te x t field, a memorable name for W A P-1966 in t he Cl i ent-Vendo[...]

  • Pagina 33

    - 28 - 27. Click “ F i nish ” . 28. In the Inte r net Authentication Service, right - click “ R emo t e A ccess Pol i cies ” 29. Selec t “ New Remote A ccess Pol i cy ” . 30. Selec t “ D a y - A nd-Time-Restriction ” , and click “ A dd ” to continue .[...]

  • Pagina 34

    - 29 - 31. Unless you w ant to specif y the active dura t ion for 802.1 X authentication, click “ OK ” to accept for having 802.1 x authentication enabled a t all times. 32. Selec t “ Grant remo t e access pe r miss i on ” , and click “ Next ” to continue.[...]

  • Pagina 35

    - 30 - 33. C lic k “ Edit Profile ” . For TLS Authenticat i on Setup (Steps 34 ~ 35 ) 34. Selec t “ A uthentication ” Tab. 35. Enable “ Extensible A uthentication Protocol ” , and select “ Smart C ard or other Cert i ficate ” f or TLS au t hen t ication. Click “ OK ” . Then go t o step 38.[...]

  • Pagina 36

    - 31 - For M D5 Authentication S e t up (Steps 36 ~ 37 ) 36. Selec t “ A uthentication ” Tab. 37. Enable “ Extensible A uthentication Protocol ” . Select “ MD5-Challenge ” and enable “ E ncr y pted A uthentication (CH A P) ” for MD5 authentication. Click “ OK ” .[...]

  • Pagina 37

    - 32 - 38. Selec t “ Internet A uthentication Service (Local) ” , click on “ Action ” f r om t op panel. Then click “ Register Service i n A ctive Directory ” . 39. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers. 40. Right click on the domain, and select “ Properties ” . 41. Selec t ?[...]

  • Pagina 38

    - 33 - 42. Go to “ Computer Conf i guration ” > “ Windows S ettings ” > “ Securi t y Settings ” > “ A ccount Policies ” > “ Password Pol i c i es ” . D ouble click on “ S t ore password us i ng reversib l e enc r y ption for all users in the domain ” .[...]

  • Pagina 39

    - 34 - 43. Click “ Define this poli c y s etting ” , select “ E nab l ed ” , and click “ OK ” to continue . 44. Go to Start > Program > A dministrative Tools > A ctive Director y Users and Computers . 45. Go to Users . R ight - click on the use r tha t you are granting access, and selec t “ Propert i es ” . 46. Go to “ A [...]

  • Pagina 40

    - 35 - 48. Go to the “ Dial-in ” tab , and check “ A llo w access ” op t ion for Remote Access Pe r mission and “ No Call-back ” for Callback Options. Then click “ OK ” .[...]

  • Pagina 41

    - 36 - 4.3 A uthenticator Setup 1. For E A P-MD5 Au t hen t ication, W E P key must be set previously. Go t o Bas i c Sett i ngs. Enable W E P key, and en t er a desired key s t ring. Y ou can skip this step if using E A P-TLS Authen t ication . 2. Click on 802.1X for detailed con f iguration. 3. Enable 802 . 1 X Authentica t ion by selecting “ E[...]

  • Pagina 42

    - 37 - by RADIUS server. 5. Enter the IP address, Port number, and Shared Secret K e y used by the Primar y Rad i us Server . 6. En t er the IP address, Por t number, and S hared Secre t K e y used by the Secondar y Radius Server. 7. Click “ A pp ly ” . The 802.1 x settings w ill t ake effect r igh t af t er W A P-1966 reboo t s i t self. Y ou [...]

  • Pagina 43

    - 38 - 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith . 6. Select “ Da t a encr y ption (WEP enabled ) ” option, but leave othe r op t ions unselected .[...]

  • Pagina 44

    - 39 - 7. Enter the net w ork key in “ N e t w ork k ey ” t e x t bo x . The string must be t he same as the fi r st set o f W E P key w hich you set t o W A P-1966. 8. Click “ OK ” . 9. Select “ A uthentication ” tab. 10. Selec t “ Enab l e ne t work access contro l using IEEE 802.1X ” to enable 802 . 1 x authentica t ion. 11. Sele[...]

  • Pagina 45

    - 40 - 13. W hen w ireless client has associated w ith W A P - 19665, a user authentica t ion notice appears in system tray. Click on t he notice to con t inue. 14. En t er the user name , pass w ord and the logon domain t hat your account belongs. 15. Click “ OK ” to comple t e the valida t ion process. 4.4.2 E A P-TLS A u thentication Get Dig[...]

  • Pagina 46

    - 41 - dialog bo x w ill prompt you t o enter user name and pass w ord . 2. Enter a valid user name and password , then click “ OK ” t o continue . 3. Select “ Reques t a certificate ” , and click “ Next ” to con t inue. 4. Select “ User Certificate request ” , and click “ Next ” t o continue.[...]

  • Pagina 47

    - 42 - 5. Click “ Submit > ” to con t inue. 6. The Certi f icate Service is no w processing the cer t ificate request.[...]

  • Pagina 48

    - 43 - 7. The cer t ifica t e is issued by t he server, click “ Install t his certificate ” t o do w nload and sto r e the certi f icate t o your local compu t er. 8. Click “ Y es ” to s t ore the certifica t e to your local computer . 9. Certi f icate is no w installed. Wireless Adapter S etup 1. Go to S t art > Control P anel, double -[...]

  • Pagina 49

    - 44 - 2. Right-click on the W ireless Net w ork Connection w hich using W L - 3555. 3. Click “ Properties ” to open up the P r oper t ies setting w indo w . 4. Click on the “ Wireless Ne t work ” t ab. 5. Click “ Properties ” of one a v ailable w ireless net w ork, w hich you w ant to associate w ith .[...]

  • Pagina 50

    - 45 - 6. Select “ The k e y is provided for me automatica l ly ” option. 7. Click “ OK ” . 8. Click “ A uthentication ” tab 9. Select “ Enable ne t work access control using IEEE 802 . 1X ” op t ion t o enable 802.1 x authen t ica t ion.[...]

  • Pagina 51

    - 46 - 10. Selec t “ Smart Card or other Certificate ” from the drop-do w n list bo x for EAP type. 11. Click “ OK ” . 12. W hen w ireless client has associated w ith W A P - 1966, W i ndo w s X P w ill prompt you to select a certi f icate f or w ireless net w ork connec t ion. If you only have one certi f ica t e in local compute r , syste[...]

  • Pagina 52

    - 47 - 14. M ake su r e this cer t ificate is issued by correct server, and click “ OK ” to complete the au t hentica t ion process.[...]

  • Pagina 53

    - 48 - Chapter 5 A ppl i cation This chapter describe the four opera t ing mode of your W A P-1966 . The four w orking modes of W A P-1966 are Access P oint , Access Point Client M ode, W ireless Bridge mode and M ultiple B r idge mode. 5.1 A ccess Point mode W i t h t his mode, you r W ireless net w ork connection could act as follo w ing. Any of [...]

  • Pagina 54

    - 49 - 5.3 W ireles s Bridge mode The W i r eless Bridge mode help to make the t w o Ethernet ne tw orks connected w ithout any w ire. W i t h t w o W A P-1966s in this mode, the tw o LANs in dis t ance can communica t e to each o t he r . This could be deployed if the net w orks are hard to make t he w ire in bet w een. Please be noted, please key[...]

  • Pagina 55

    - 50 - transmission rate t o communicate w ith each othe r . In a la r ge net w ork, please consider using management device to r educe the net w ork broadcast to the w ireless net w ork. 5.5 Repeat e r mode W hen W A P-1966 w orks in repeater mode, i t w ill repeat the w ireless signal from A P to w ireless client or from w ireless client to A P .[...]

  • Pagina 56

    Chapter 6 Troubleshooting This chapter gives ti p s on ho w to configure the communication so f t w are. This chapter p r ovides solutions to problems usually encounte r ed du r ing the ins t allation and operation of the Wireless Network Access Point . Read t he descrip t ion belo w to solve your problems. Can I run an applicat i on from a remote [...]

  • Pagina 57

    - 52 - An integra t ed w ireless and w ired LAN is called an Infrast r uc t ure configura t ion . Inf r astructu r e is applicable to enterp r ise scale f or w ireless access to cent r al da t abase, or w ireless application for mobile w orke r s. What is Roaming? Roaming is the ability of a por t able compu t er user t o communicate con t inuously[...]