EnGenius Technologies ECB350 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius Technologies ECB350, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius Technologies ECB350 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of EnGenius Technologies ECB350. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of EnGenius Technologies ECB350 should contain:
- informations concerning technical data of EnGenius Technologies ECB350
- name of the manufacturer and a year of construction of the EnGenius Technologies ECB350 item
- rules of operation, control and maintenance of the EnGenius Technologies ECB350 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius Technologies ECB350 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius Technologies ECB350, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius Technologies ECB350.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius Technologies ECB350 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    1 11N Long Range Multi-Func tion Gigabit CB / AP ECB350 11N Long Range Multi-Function Gigabit CB / AP V1.0[...]

  • Page 2

    1 T able of Content s 1 Introduction ....................................................................................................................................................................... 5 1.1 Features and Benefits .....................................................................................................................[...]

  • Page 3

    2 5.3 Connection Status ............................................................................................................................................................................................. 29 5.4 Wireless Client List ............................................................................................................[...]

  • Page 4

    3 8.6 WPS (Wi-Fi Protected Setup) ............................................................................................................................... ......................................... 70 8.7 WDS Link Settings .........................................................................................................................[...]

  • Page 5

    4 R evision His tor y V er sion Date Notes 1.0 2012/02/22 F irst R elease[...]

  • Page 6

    5 1 Introduction The ECB350 is a multi-function 802.11b/g/n product with 8 major mult i-functions. The ECB350 is designed to operat e in ever y working environment including enterprises. The ECB350 is a W ireless Network device that delivers up to 6x faster speeds an d 7x extended cov erage than 802.11b/g devices. The ECB350 suppor t s use in the h[...]

  • Page 7

    6 Suppor t Multiple S SID in AP mode (up to 4) Allow clients to access different networks thro ugh a single access point and assign different policies and functions for eac h SSID through the built in software. WP A/WP A2/IEEE 802.1x Suppor t Po w e r f u l d a t a s e c u r i t y . MAC Address Filtering in AP Mode Ensure a secure network connectio[...]

  • Page 8

    7 1.3 System Requirements The following are the minimum system r equir ement s in order conf igure the device.  Computer with an Ethernet interf ace or Wireless Network function  Windows OS (XP, Vista, 7), Mac OS, or Linux based operating systems  Web-Browsing Application (i.e.: Internet Explorer, FireFox, Safa ri, or other similar softwa [...]

  • Page 9

    8 f) W ireless Extensions to Ethernet Networks Extend network coverage wher e the network cannot reach (i.e .: There is no wired internet connection to reach certain location of the environment). g) W ired L AN Backup Implement wireless LANs to provide backup for mission-critical applic ations running on wired networks. h) T raining/Educational Fac[...]

  • Page 10

    9 2 Before you Begin This section will guide you through the installation pr ocess. Placement o f the ENGENIUS ECB350 is essential to maximize the ECB350’ s per formance. A void placing the ECB350 in an enclosed space such a s a closet, cabinet, or wardr obe. 2.1 Considerations for Wireless Installation The operating distance o f all wireless dev[...]

  • Page 11

    10 2.2 Computer Settings (Windows XP/Windows 7) In order t o use the ECB350, you mu st f ir st conf igure the T CP/IPv4 connection of your computer system.  Click Start button and open Control Panel . W indows XP W indows 7[...]

  • Page 12

    11  In Windows XP , click Network Connections  In Windows 7 , click View Network Status and Tasks in the Network and Internet section, then select Change adapter settings  Right click on Local Area Connection and select Properties[...]

  • Page 13

    12  Select “ Internet Protocol Version 4 (TCP/IPv4) ” and then select Properties  Select Use the following IP address and enter an IP address that is different from the ECB350 and subnet mask then click OK . Note: Ensure that the IP address and subnet mask are on the same subnet as the device. PC IP address: 192.168.1.2 – 192.168.1.255 [...]

  • Page 14

    13 2.3 Apple Mac X OS  Go to System Preferences (can be opened in the Applications folder o r selecting it in the Apple Menu)  Select Network in the Internet & Network section  Highlight Ethernet  In Configure IPv4 , select Manually  Enter an IP address that is different fr om the ECB350 an d subn et mask then press OK Note: Ensu[...]

  • Page 15

    14 2.4 Hardware Installation 1. Ensure that the computer in use has an Ethernet Controller (RJ-45 Ethernet Po rt). For more information, verify with your computer user manual. 2. Connect one end of the Category 5 Ethernet cable into th e RJ-45 port of the ECB350 an d the other end to the RJ-45 port of the computer that w ill use the ECB350. Ensure [...]

  • Page 16

    15 Front Panel Rear Panel Front P anel LED Lights LED lights for W ireless, Ethernet por t and P ower . R ear Pa nel DC IN DC IN for P ower . Re s e t B u t t o n One click for reset the device. Press over 10 seconds for r eset to factor y default. Ethernet por t for R J-45 cable. Ethernet Port[...]

  • Page 17

    16 3 Configuring Your Client Bridge This section will show you how to conf igure the de vice using the w eb-based conf iguration inter face. 3.1 Default Settings Please use your Ethern et por t or wireless network adapte r to connect the Client Bridge. Default Settings IP Address 192.168.1.1 Username / P asswor d admin / admin Operation Mode Client[...]

  • Page 18

    17 3.2 Web Configurat ion  Open a web browser (Internet Ex plorer/Firefox/Safari) and enter th e IP Address http://192.168.1.1 Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address.  The default username and password are admin . Once you have entered the correct username and password[...]

  • Page 19

    18  If successful, you will be logging in and see the ECB350 User Menu.[...]

  • Page 20

    19 4 Building a Wireless Network The ECB350 has the ability t o operate in v arious operating mode s. The ECB350 is the ideal device in which you can build your WL AN. This chapter describes how to build a WL AN ar ound y our ECB350 using the operating modes o f the ECB350. 4.1 Client Bridge Mode In Client Bridge Mode, the ECB350 act s as a wir ele[...]

  • Page 21

    20 4.2 Client Router Mode In the Client R outer Mode, the ECB350 gr ant s Internet access t o multiple L ANs. In this mode, the ECB350’ s internal Dynamic Host Conf iguration Protocol (DHCP) ser ver automatically allocat es ranges of IP a ddresses t o each L AN that will access the Internet thr ough the ECB350. This mode requir es you to connect [...]

  • Page 22

    21 4.3 Access Point Mode In Access P oint Mode, ECB350 behaves lik es a central connection for stations or client s that suppor t IEEE 802.11b/g/n networks. The stations and client s must be conf igured to use the same SSID and security p a ssword to a ssociate with the ECB350. The ECB350 suppor ts up to four SSIDs at the s ame time for secure gues[...]

  • Page 23

    22 4.4 Access Point Router Mode In Access P oint R outer Mode, ECB350 grants Int ernet access to multiple wireless client s. In this mode, the ECB350’ s internal Dynamic Host Conf iguration Protocol (DHCP) ser ver automatically allocat es ranges o f IP addr esses to each wir eless client that will access the Internet thr ough the ECB350. This mod[...]

  • Page 24

    23 4.5 WDS AP / WDS Station Mode The ECB350 also suppor ts WDS AP mode. This operating mo de allows wir eless connections to the ECB350 using WDS technology . In this mode, conf igure the MA C addresses in bo th Access P oints to enlar ge the wir eless area by enabling WDS Link settings. WDS sup por ts four AP MA C addr esses. Note : WDS St ation M[...]

  • Page 25

    24 4.6 WDS Bridge Mode In WDS Bridge Mode, the ECB350 can wi relessly connect differ ent L ANs by conf iguring the MAC addr ess and security settings of each ECB350 device. Use this mode when two wired LANs located a sm all distance ap ar t want to communicate with each other . The best solution is to use the ECB350 to wir elessly connect two wired[...]

  • Page 26

    25 4.7 Repeater mode R epeater is used to re generate or r eplicate signals that ar e weak ened or distorted by transm ission over long distances and through ar eas with high levels o f electr omagnetic interference (EMI).[...]

  • Page 27

    26 5 Status The Sta t u s section contains the following options: Main , W i reless Client List , and Sy s te m L o g . The following sections describe these options. 5.1 Save/Reload This page let s you save and apply the set tings shown under Unsaved changes list , or cancel the unsaved changes and revert them to the previous settings that were in[...]

  • Page 28

    27 5.2 Main Clicking the Main link under the Sta t u s menu or clicking Home at the top-right of the ECB350 P age shows the status information about the current o perating mode. - The S ystem Information section shows general system information such as Device Name, MAC Addr ess, Current T ime, F irmware V ersion, and Management VL AN ID ( Note: VL [...]

  • Page 29

    28 - The Current W ireless Settings section shows wireless information such as Operati ng Mode, Frequency , and Channel. Since the ECB350 suppor ts multiple-SSIDs, information about each SSID , the ESSID and security set tings, are displayed ( Note: Pro f ile Settings is only ap plicable in Access P oint, WDS AP , or R outer mode). Note: W AN Setti[...]

  • Page 30

    29 5.3 Connection Status Click on the Connection S tatus link under the Sta t u s menu. This page displays the current status o f the Network , including Network T ype, SSID , BSSID , Connection S tatus, W irele ss Mode, Current Channel, Securi ty , Data Rate, Noise Level, and Signal S trength. Note: Only applicable in Client Bridge, Client R outer[...]

  • Page 31

    30 5.4 Wireless Client List Clicking the W ireless Client List link under the Sta t us menu dis plays the list of client s associated t o the ECB350, along with the MAC a ddresses and sign al st rength for each client. Clicking Re f re s h updates the client list. Note: Only applicable in Access P oint, WDS AP , Repeater and R outer mode.[...]

  • Page 32

    31 5.5 System Log The ECB350 automatically logs (r ecords) event s o f possible inte rest in it s internal memor y . T o view the logged information, click the S ystem Log link under the Sta t us menu. If ther e is not enough internal me mor y to log all event s, older event s ar e deleted fr om the log. When powered down or reboot ed, the log will[...]

  • Page 33

    32 6 System 6.1 Operation Mode The ECB350 suppor ts 8 operating modes: Access P oint, C lient Bridge, WDS AP , WDS Bri dge, WDS S tation, Universal R epeater , R outer , and Client R outer . S ystem Proper ties Device Name Enter a name for the device. The name you type appears in SNMP management. This name is not the SSID and is not broa dcast to o[...]

  • Page 34

    33 6.2 IP Settings This page allows you t o modify the device ' s IP settings. Note: Only applicable in Access P oint, Client Bridge, WDS AP , WDS Bridge, WDS S t ation, and R epeater mode. IP Settings IP Network Setting Select whether the device IP addr ess will use th e static IP address specif ied in the IP Address f ield or be obtained aut[...]

  • Page 35

    34 6.3 Spanning Tree Setting This page allows you to modify the Spanning T r ee settings. Enabling Spanning T ree pr otocol will pr event network loops in your L AN network . Note: Only in Access P oint, Clie nt Bridge, WDS AP , WDS Bridge, WDS S tation, and R epeater mode. Spanning T ree Spanning T ree St atus Enable or disable the Spanning T ree [...]

  • Page 36

    35 so that when a new bridge comes onto a busy network , it analyzes data traff ic before participating. Priority Specify the Priority Number . A smaller number has great er priority . Accept / Cancel Click Accept to conf irm the changes or Cancel to cancel and return previous settings.[...]

  • Page 37

    36 7 Router This section is only applicable for AP Router Mode or Client R outer Mode . 7.1 WAN Settings There ar e four types o f W AN connections: S tatic IP , DHCP , PPP oE, and PPTP . Please contact your ISP to f ind out which settings you should choose. 7.1.1 Static IP If your ISP Provider ha s assign ed you a f ixed IP addr ess, enter the ass[...]

  • Page 38

    37[...]

  • Page 39

    38 S tatic IP Internet Connection T y pe Select S t atic IP to begin conf iguration of the S tatic IP connection. Account Name Enter the account name provided by your ISP . Domain Name Enter the domain name provided by your ISP . MTU Specify the Maximum T ransmit Unit (MTU) size. It is recommended that you accept the default setting of Aut o . Othe[...]

  • Page 40

    39 7.1.2 DHCP Select DHCP as your W AN connection type to obtain an IP addr ess automatically . Y ou will need to enter the account name as your hostname and, optionally , enter DNS information.[...]

  • Page 41

    40 DHCP Internet Connection T y pe Select DHCP to begin conf iguration o f the DHCP connection. Account Name Enter the account name provided by your ISP . Domain Name Enter the domain name provided by your ISP . MTU Specify the Maximum T ransmit Unit (MTU) size. It is recommended that you accept the default setting of Aut o . Other wise, pack ets w[...]

  • Page 42

    41 7.1.3 PPPoE Select P oint - to-P oint Protocol over Ethernet (PPP oE) if your ISP uses a PPPoE connection. Y our ISP will pr ovide you with a username and pa ssword. This selection is typically used for DSL ser vices. R emove your PPP oE soft ware fr om your computer , as it is not needed and will not work with your ECB350.[...]

  • Page 43

    42 PPP oE Internet Connection T y pe Select PPP oE to begin conf iguration of the PPP oE connection. MTU Specify the Maximum T ransmit Unit (MTU) size. It is recommended you accept the default setting of Auto . Other wise, pack et s will be fragmented downstream if the MTU is set too high or too low , which impacts network performance. In extreme c[...]

  • Page 44

    43 7.1.4 PPTP Select PPTP as your W AN connection type if your Internet Ser vice Provider (ISP) uses a P oint -to -P oint T unneling Prot ocol (PPTP) connection. Y ou will need to provide the IP a ddress, Subnet Mask , Default G at ewa y (Optional), DNS (Optional), Ser ver IP , Username, and P assw or d provided by your ISP .[...]

  • Page 45

    44 PPTP Internet Connection T y pe Select PPTP to begin conf iguration of the PPTP connection. MTU Specify the Maximum T ransmit Unit (MTU) size. It is recommended that you accept the default setting of Auto . Other wise, pack et s will be fragmented downstream if the MTU is set too high or too low , which impacts network performance. In extreme ca[...]

  • Page 46

    45 7.2 LAN Settings This page allows you t o modify the device ' s L AN settings. L AN Settings IP Address The L AN IP Address of this device. IP Subnet Mask The L AN Su bnet Mask o f this device. Use R outer As DHCP Ser ver Check this option to enable the Internal DHCP ser ver . S tarting /Ending IP Address The range of IP a ddresses o f the [...]

  • Page 47

    46 7.3 VPN Pass Through The VPN P assthr ough allows a secure vir tual private netw ork (VPN) connection between two computers. Enabling the options on this page opens a VPN por t and enables conne ctions to p ass thr ough the ECB350 without interruption.[...]

  • Page 48

    47 7.4 Port Forwarding P ort for warding can be used t o open a po rt or range of ports to a device on your network . Using por t for warding, you can set up public ser vices on your network . When users from the Internet mak e cer t ain requests on your network , the ECB350 can for ward those request s to comput ers equipped to handle the request [...]

  • Page 49

    48 Po r t F o r w a r d i n g Po r t F o r w a r d i n g Enables or disables the Port Forwarding feature. Ser vice Name Ent er a name or description to help you identify this entr y . Protocol Select a protocol for the application. Choices are Both , TC P , and UDP . Sta r t / E n d Po r t The por t range that the ser ver is running on the local co[...]

  • Page 50

    49 7.5 Port Triggering If you use Internet applications which use non-standard connections or port numbers, you may f ind that they do not function correctly because they ar e blocked by the device’ s f irewall. P or t T riggering will be requir ed for these applications to wo rk .[...]

  • Page 51

    50 P or t T rigger ing P or t T rigger ing Enables or disables the Port Triggering feature. Ser vice Name Enter a name or description to help you identify this entr y . T rigger Por t This is the outgoing (outbound) por t numbers for this applic ation. T rigger Type Select whether the application uses T CP , UDP or Bo th types o f protocols for out[...]

  • Page 52

    51 7.6 DMZ If you have a computer that cannot run Internet applicat ions pr operly fr om behind the ECB350, you can allow the computer to have unr es tricted Internet access. Enter the IP addr ess of that comput er as a Demilit arized Zone (DMZ) host with unrestricted Internet access. Adding a client to the DMZ may expose that comp ut er to a v ari[...]

  • Page 53

    52 7.7 MAC Filter Y ou can choose whether to Deny or Allo w only those devices listed in the MA C Filtering table to access the Int ernet. MAC Filter MAC Filter Enables or disables the MAC Filter function. Deny all client s with MAC addresses listed below to access the network When selected, the computers listed in the MAC Filter T able will be Den[...]

  • Page 54

    53 7.8 IP Filter Y ou can choose whether to Deny or Allow only devices with thos e IP Addres ses listed on the IP F ilter T able from accessing cer tain ports. This can be used to contr ol which Internet applications the computers can access. Note : Y ou will need to have knowledge of which Inte rnet port numbers each ap plication uses.[...]

  • Page 55

    54 IP Filter IP Filter Enables or disables the IP Filter function. Deny all client s with IP addresses listed below to access the network When selected, the computers listed in the IP Filter table will be Denied to access the Internet. Allow all clients with IP addresses listed below to access the network When selected, only the computers listed in[...]

  • Page 56

    55 7.9 URL Filter Y ou can deny access to certain websites by blocking k eywords in the URL web a ddr ess. For example, “ gamer ” has been a dded to th e URL F ilter T able. Any web addres s that includes “ gamer ” will be blocked.[...]

  • Page 57

    56 8 Wireless 8.1 Wireless Network This page displays the current st atus o f the W ireless settings of the ECB350. Access P oint / WDS AP / R outer mode:[...]

  • Page 58

    57 W ireless Network (Access Point / WDS AP / R outer mode) W ireless Mode W ireless mode suppor ts 802.11b/g/n mix ed mode. Channel HT Mode The default channel bandwid th is 20/40MHz. The la rger the channel, the better the transmission quality and speed. Extension Channel Select upper or lower channel. Y our select ion may affect the Auto channel[...]

  • Page 59

    58 SSID Prof ile SSID Prof ile SSID Specify the SSID for the current pr of ile. VL AN ID Specify the VL AN tag for the current pr of ile. Suppressed SSID Check this option to hide the SSI D from client s. If checked, the SSID will not appear in the site sur vey . S tation Separation Click the ap propriate ra dio button to allow or prevent communica[...]

  • Page 60

    59 Client Bridge / Client Router / WDS S tation / Repeater mode: W ireless Mode W ireless mode suppor ts 802.11b/g/n mix ed mode. SSID The SSID is a unique named shared amongst all th e points of the wir eless network . The SSID must be identical on all points of the wir eless network and cannot exceed 32 characters. Y ou may specif y an SSID or se[...]

  • Page 61

    60 8.2 Wireless Security The W ireless Security section let s you c onf igure the ECB350' s security modes: WEP , WP A-PSK , WP A2-PSK , WP A-PSK Mixed, WP A , WP A2, and WP A Mixed. W e strongly recommend you use WP A2-PSK. WEP Encryption: WEP Encr yption Auth T ype Select Open System or Shared Key . Input type ASCII : Regular Text (recommend[...]

  • Page 62

    61 Y ou must enter a Key V alue for the Default Key . Encr yption Key # Enter the ke y value or v alues you wish to use. On ly the Key selected a s Default is required. The others are optional. WPA-PSK (WPA Pre-Shared Key) Encryption: WP A-PSK (WP A Pre-Share d Key) Encr yption Encr yption Select the WPA encryption type you would like. Please ensur[...]

  • Page 63

    62 Note : 802.11n does not allow WEP/WP A-PSK TKIP/WP A2-PSK TKIP secu rity mode. The connection mode will automatically change from 802.11n to 802.11g. WPA Encryption: Only in Access Point / WDS AP / Router mode WP A Encr yption Encr yption Select the WPA encryption type you would like. Please ensure that your wireless clients use the same setting[...]

  • Page 64

    63 8.3 Site Survey Use this feature to scan nearby Access P oint s. Note: Only applicable in Client Bridge, Client R outer , or Repeater modes. 1. Click Site Sur vey .[...]

  • Page 65

    64 2. Scanning the nearby Access P oint s 3. The ECB350 will list the available access point s after site sur vey .[...]

  • Page 66

    65 Site Sur vey (Client Bridge / Client R outer / R epeater mode) BSSID Access Point's wireless MAC address. SSID SSID that the Access P oint is bro adca sting. Channel Channel that the Access P o int is using. Signal Level (dBm) your station. Signal strength from the Access P oin t to Ty p e The b and that the Access P oint is using. Security[...]

  • Page 67

    66 5. Enter the corr ect security setting.[...]

  • Page 68

    67 8.4 Wireless MAC Filter W ireless MA C Filters are used to allow or deny network acce ss to wir eless client s according to their MAC addr esses. Y ou can manually add a MA C addr ess to r estrict the pe rmission to access ECB350. The default setting is Disable W ireless MAC Filter . Note: Only applicable in Access P oint, WDS AP , and Router mo[...]

  • Page 69

    68 8.5 Wireless Advanced This page allows you to conf igure wirele ss adv ance settings. It is recommended th at the default settings are used unless the user has experienc e with more a dvanced networking featur es.[...]

  • Page 70

    69 W ireless Advanced Data Rat e Select a data rate fr om the drop-down list. The data rate a ffects thr oughput o f data in the ECB350. The lower the data rat e, the throughput will be lower , but so will the transmission dis tance. Tr a n s m i t P o w e r Set the power output of the wir eless signal. RTS / C TS Th r e s h o l d Specify the thres[...]

  • Page 71

    70 8.6 WPS (Wi-Fi Protected Setup) W i-Fi Protected Setup (WPS) featur e is following the W i-F i Alliance WPS standard and it ea ses the set up of security- enabled W i-Fi networks in the home and small o ff ice environment. It reduces the user steps requir ed to conf igure a network an d suppor ts two methods that are familiar to most consumers t[...]

  • Page 72

    71 W i-F i Protected Setup (WPS) WPS Select to Enable or Disable the WPS feature. WPS Current S t atus Shows whether the WPS function is Conf igured or unConf igured . When it is Conf igured, the WPS has been used to authorize connection between the device and wireless client s. Self Pin Code The PIN code o f this device. SSID The SSID (wireless ne[...]

  • Page 73

    72 8.7 WDS Link Settings Using WDS (W ireless Distribution System) will allow you to conn ect to Access P oints wir elessly . Doing so will extend the wired infrastructur e to locations wher e cabling is not possible or inef f icient to implement. Note: Compatibility betw een different brands and mo dels o f a ccess points is not guarant eed. It is[...]

  • Page 74

    73 WDS Link Settings MAC Addr ess Enter the Access Point’s MAC address to which you want to extend the wireless area. Mode Select Disable or Enable from the drop-down list. Accept / Cancel Click Accept to conf irm the changes or Cancel to cancel and return previous settings.[...]

  • Page 75

    74 9 Management 9.1 Administration This page allows you t o change the ECB350 pa ssword a s well as conf igure the device by remot e acce ss. By default, the username is admin and the pa ssword is: admin . The p asswor d can contain 0 to 12 alphanumeric characters and is case sensit ive. Note : Remote Access is only applicable in AP Router and Clie[...]

  • Page 76

    75 9.2 Management VLAN This page allows you t o assign a VL AN t ag to the p acket s. A VL AN is a group of comput ers on a network whose software has been conf igured so to behave a s if they wer e on a sepa rate Local Area Network (LAN). Computers on a VL AN do not have to be physically locat ed next to one another on the L AN. Note : Only applic[...]

  • Page 77

    76 9.3 SNMP Settings This page allows you t o assign the Cont act Details, Loca tion, Community Name, and T rap Settings for Simple Network Management Pr otocol (SNMP). This is a networking management pr otocol used t o monitor network attached devices. SNMP allows messages (called prot ocol data unit s) to be s e nt to v arious parts o f the netwo[...]

  • Page 78

    77 Community Name (R ead/Write) Specify the passwor d for the SNMP community with read/writ e access. Tr a p T rap Des tination Address Specify the IP address o f the computer that will receive the SNMP traps. T rap Des tination Community Name Specify the passwor d for the SNMP trap community .[...]

  • Page 79

    78 9.4 Backup/Restore This page allows you t o save the curren t device conf igurations. When you save th e conf igurations, you also can relo ad the saved conf igurations into the device through the R es tore Sav ed Settings from A F ile section. If extreme problems occur , or if the you have set the ECB350 wr ongly , you can use the F actor y Def[...]

  • Page 80

    79 9.5 Firmware Upgrade This page allows you t o upgrad e the f irmwar e o f the ECB350. To perform the Firmware Upgrade: 1. Click the Browse button and navigate the OS File System to the location of the upgrade file. 2. Select the upgrade file. The name of th e file will appear in the Upgrade File field. 3. Click the Upload button to commence th e[...]

  • Page 81

    80 9.6 Time Setting This page allows you t o set th e internal clock o f the ECB350. Ti me Manually Set Date and T ime Manually s pecif y the date and time. Automatically G et Dat e and Ti me Select a time zone from the drop-down list and check whether you want to enter the IP addr ess of an NTP server or use the default NTP ser ver to get have the[...]

  • Page 82

    81 9.7 Log This page allows you t o setup S yslog and local log functions o f the ECB350. Log Sys l o g Enable or disable the syslog function. Log Ser ver IP Address Enter the IP addr ess of the log ser ver . Local Log Enable or disable the local log ser v ice. Save/Apply / Canc el Click Save/A pply to apply the changes or Cancel to return previous[...]

  • Page 83

    82 9.8 Diagnostics This page allows you t o analyze the connection quality of the ECB350 and trace the r outing t able to a t arget in the network . Diagnosis Ta r g e t I P Ent er the IP address you w ould like to sear ch. Ping P acket Size Enter the p ack et size of each ping. Number of Pings Enter the number o f times you want to ping. Sta r t P[...]

  • Page 84

    83 9.9 LED Control This page allows you t o control LED for P ower , L AN inter face and WL AN inter face of the ECB350.[...]

  • Page 85

    84 9.10 Logout Click Logout in the Management menu to logout o f the ECB350 interf ace.[...]

  • Page 86

    85 9.11 Reset In some circumstances, it may be r equired to for ce the device to r eboot. Click on R eboot the Device to reboot the ECB350.[...]

  • Page 87

    86 Appendix A – FCC Interference Statement Federal Communication Commission Inter ference S tatement This equipment has been tested an d found to comply with the limits for a Class B di gital device, pursuant t o P ar t 15 of the FCC Rules. These limits are designed to pr ovide reasonable pr otecti on against harmful inter ference in a residentia[...]

  • Page 88

    87 Appendix B – IC Interference Statement Industr y Canada statement: This device complies with RSS-210 of the Industr y Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2 ) this de vice must accept any inter ference r e ceived, including inter fer ence that may cause und[...]

  • Page 89

    88 Ce dispositif a été conçu pour foncti onner avec une antenne ayant un gain maximal de diople antenne avec dB [5] . Une antenne à gain plus élevé est st rictement interdite par les règlement s d 'Indust ri e Canada. L'impédance d 'antenne requise est de 50 ohms. Conformément à la r églementation d 'Industri e Canada[...]

  • Page 90

    89 Appendix C – CE Interference Statement Europe – EU Declaration of Conformity This device complies with the essential r equ irements of the R&TTE Directive 1999/5/EC. The following test methods have been app lied in order to prove pr esumption of conformity with the essential requir ements o f the R&TTE Directive 1999/5/EC: - EN60950-[...]

  • Page 91

    90 This device may not be use d for setting up outdoor radio links in France and in some are as the RF out put power may be limited t o 1 0 m W E IR P in the frequenc y range of 245 4 – 2483.5 MHz. For det ailed information the end-user should c ontact th e national spectrum authority in France. 0560 [Jméno výrobce] tímto prohlašuje, že t en[...]

  • Page 92

    Hierbij verklaart [naam van de fabrikant] dat het to estel [type van toestel] in overeenstemming is met de esse ntiële eisen en de andere r e lev ante bep alingen van richtlijn 1999/5/EG . 91 Latviski [Latvian] Ar šo [name of manufacturer / izgatavot ā ja nos aukums] deklar ē , ka [type of equipment / iek ā rtas tips] atbils t Direk t ī va s [...]