Home > Air Live > Router > Air Live Router WL-5460AP User Manual

Air Live Router WL-5460AP User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Air Live Router WL-5460AP User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 15 Air Live manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							3.9 Wireless Security 
    Here you can configure the security of your wireless network. Selecting different method 
    will enable you to have different level of security.    Please note that by using any encryption, 
    by which data packet is encrypted before transmission to prevent data packets from being 
    eavesdropped by unrelated people, there may be a significant degradation of the data 
    throughput on the wireless link.   
     
    WL-5460AP provides WEP, WPA-PSK (TKIP), 
    WPA2-PSK (AES) and WPA2-PSK (AES) 
    security policy. 
     
     
     
     
     
    WEP 
    WEP allows you to use data encryption to secure your data from being eavesdropped by 
    malicious people. It allows 2 types of key: 64 (WEP64) and 128 (WEP128). You can 
    configure up to 4 keys 
    using either ASCII or 
    Hexadecimal format. 
     
    Key Settings: The length 
    of a WEP64 key must be 
    equal to 5 bytes and a 
    WEP128 key is 13 bytes 
      
    Default Tx Key: You have 
    to specify which of the four 
    keys will be active.   
    Once you enable the WEP 
    function, please make sure 
    that both the WL-5460AP 
    and the wireless client 
    stations use the same key. 
     
     Some wireless client cards only allow Hexadecimal digits for WEP keys. Please 
    note that when configuring WEP keys, a WEP128 ASCII key looks like “This is a 
    key”(13 characters), while a WEP128 Hex key looks like 
    “546869732069732061206b6579”(26 HEX) (hexadecimal notation are 0-9 and 
    A-F).  
    						
    							WPA-PSK (TKIP) / WPA-PSK (AES) 
    Wi-Fi Protected Access (WPA) with Pre-Shared Key (PSK) provides better security than 
    WEP keys. It does not require a RADIUS server in order to provide association 
    authentication, but you do have to enter a shared key for the authentication purpose. The 
    encryption key is generated automatically and dynamically.   
    There are two encryption types TKIP and CCMP (AES). While CCMP provides better 
    security than TKIP, some wireless client stations may not be equipped with the hardware to 
    support it.   
     
     
     
     
    Pre-shared Key: This is an ASCII string with 8 to 63 characters. Please make sure that 
    both the WL-5460AP and the wireless client stations use the same key.   
    Group Key Life Time: A group key is used for multicast/broadcast data, and the re-key 
    interval is time period that the system will change the group key periodically. The shorter 
    the interval is, the better the security is. The default is 300 sec. 
      
    						
    							WPA2-PSK (AES) 
    Enter the Pre-shared Key to initiate WPA2 security. All devices try to access the network 
    should have the matching encryption key. 
     
    Pre-shared Key: This is an ASCII string with 8 to 63 characters. Please make sure that 
    both the WL-5460AP and the wireless client stations use the same key.   
    Encryption Type: There are two encryption types TKIP and CCMP (AES). While CCMP 
    provides better security than TKIP, some wireless client stations may not be equipped with 
    the hardware to support it.   
    Group key Life Time: A group key is used for multicast/broadcast data, and the re-key 
    interval is time period that the system will change the group key periodically. The shorter 
    the interval is, the better the security is. The default is 300 sec.  
    						
    							802.1X (Radius) 
    Authentication by the remote server (RADIUS Server). 
     
     
     
     
     
    Security: You can select None, WEP, WPA (TKIP), WPA (AES), WPA2 (AES), WPA2 Mixed 
    method for data encryption. 
    ~ WEP: 802.1x Authentication is enabled and the RADIUS Server will proceed to 
    check the 802.1x Authentication, and make the RADIUS server to issue the WEP 
    key dynamically. You can select WEP 64bits or WEP 128bits for data encryption. 
    ~ WPA (TKIP) / WPA (AES): WPA-RADIUS authentication use WPA (Wi-Fi Protect 
    Access) data encryption for 802.1x authentication. WPA is an encryption standard 
    proposed by WiFi for advance protection by utilizing a password key (TKIP) or 
    certificate. It is more secure than WEP encryption. 
    ~ WPA2-AES / WPA2-Mixed: The two most important features beyond WPA to 
    become standardized through 802.11i/WPA2 are: pre-authentication, which enables 
    secure fast roaming without noticeable signal latency. Pre-authentication provides a 
    way to establish a PMK security association before a client associates. The 
    advantage is that the client reduces the time that its disconnected to the network. 
    Authentication RADIUS Server: Enter the RADIUS Server IP address and Password 
    provided by your ISP.  
    						
    							~ Port: Enter the RADIUS Server’s port number provided by your ISP. The default is 
    1812. 
    ~ IP Address: Enter the RADIUS Server’s IP Address provided by your ISP. 
    ~ Password: Enter the password that the AP shares with the RADIUS Server. 
    Accounting RADIUS Server: Enter the Accounting RADIUS Server IP address and 
    Password provided by your ISP. 
      
    						
    							3.10 Advanced Wireless Settings 
    When click on Advanced Setup button under client mode, a pop-up window appears and 
    show parameter as follow: 
     
    Fragmentation: 
    Fragmentation 
    mechanism is 
    used for improving 
    the efficiency 
    when high traffic 
    flows along in the 
    wireless network. 
    If your 802.11g 
    Wireless LAN PC 
    Card often 
    transmit large files 
    in wireless 
    network, you can 
    enter new 
    Fragment 
    Threshold value to 
    split the packet. 
    The value can be 
    set from 256 to 
    2346. The default 
    value is 2346. 
     
    RTS Threshold: RTS Threshold is a mechanism implemented to prevent the “Hidden 
    Node” problem. “Hidden Node” is a situation in which two stations are within range of the 
    same Access Point, but are not within range of each other. Therefore, they are hidden 
    nodes for each other. When a station starts data transmission with the Access Point, it 
    might not notice that the other station is already using the wireless medium. When these 
    two stations send data at the same time, they might collide when arriving simultaneously at 
    the Access Point. The collision will most certainly result in a loss of messages for both 
    stations. 
    Thus, the RTS Threshold mechanism provides a solution to prevent data collisions. When 
    you enable RTS Threshold on a suspect “hidden station”, this station and its Access Point 
    will use a Request to Send (RTS). The station will send an RTS to the Access Point, 
    informing that it is going to transmit the data. Upon receipt, the Access Point will respond 
    with a CTS message to all station within its range to notify all other stations to defer  
    						
    							transmission. It will also confirm the requestor station that the Access Point has reserved it 
    for the time-frame of the requested transmission. 
    If the “Hidden Node” problem is an issue, please specify the packet size. The RTS 
    mechanism will be activated if the data size exceeds the value you set.. 
    The default value is 2347.   
     
    Warning: Enabling RTS Threshold will cause redundant network overhead that could 
    negatively affect the throughput performance instead of providing a remedy. 
     
    This value should remain at its default setting of 2347. Should you encounter inconsistent 
    data flow, only minor modifications of this value are recommended. 
     
    Beacon Interval: Beacon Interval is the amount of time between beacon transmissions. 
    Before a station enters power save mode, the station needs the beacon interval to know 
    when to wake up to receive the beacon (and learn whether there are buffered frames at the 
    access point). 
     
    Data Rate: By default, the unit adaptively selects the highest possible rate for transmission. 
    Select the basic rates to be used among the following options: Auto, 1, 2, 5.5, 11or 54 Mbps. 
    For most networks the default setting is Auto which is the best choice. When Auto is 
    enabled the transmission rate will select the optimal rate. If obstacles or interference are 
    present, the system will automatically fall back to a lower rate. 
     
    Preamble Type: A preamble is a signal used in wireless environment to synchronize the 
    transmitting timing including Synchronization and Start frame delimiter. In a noisy network 
    environment, the Preamble Type should be set to Long Preamble. The Short Preamble is 
    intended for applications where minimum overhead and maximum performance is desired. 
    If in a noisy network environment, the performance will be decreased. 
     
    Broadcast SSID: Select enabled to allow all the wireless stations to detect the SSID of this 
    Access Point. 
     
    IAPP: IAPP (Inter Access Point Protocol) is designed for the enforcement of unique 
    association throughout a ESS (Extended Service Set) and a secure exchange of station’s 
    security context between current access point (AP) and new AP during handoff period. 
     
    802.11g Protection: The 802.11g standard includes a protection mechanism to ensure 
    mixed 802.11b and 802.11g operation. If there is no such kind of mechanism exists, the two 
    kinds of standards may mutually interfere and decrease network’s performance. 
     
    Tx Power Level: For countries that impose limit on WLAN output power, it might be 
    necessary to reduce TX (transmit) power. There are 7 TX Power Levels to choose from —  
    						
    							select a level to make sure that the output power measured at the antenna end will not 
    exceed the legal limit in your country. 
     
    Enable WatchDog: Check and enable this watch dog function.
     
     
    Watch Interval: Setup the interval time for watch dog function between 1 to 60 mins. 
     
    Watch Host: Enter the watch dog host ip address. 
     
    Ack timeout: When a packet is sent out from one wireless station to the other, it will waits 
    for an Acknowledgement frame from the remote station. If the ACK is NOT received within 
    that timeout period then the packet will be re-transmitted resulting in reduced throughput. If 
    the ACK setting is too high then throughput will be lost due to waiting for the ACK Window 
    to timeout on lost packets. By having the ability to adjust the ACK setting we can effectively 
    optimize the throughput over long distance links. This is especially true for 802.11a and 
    802.11g networks 
    You can set as default for auto adjustment. 
     
      
    						
    							3.11 Access Control 
    When Enable Wireless Access Control is checked, only those clients whose wireless MAC 
    addresses listed in the access control list can access this Access Point. If the list contains 
    no entries with this function being enabled, then no clients will be able to access this 
    Access Point. 
     
     
    Wireless Access Control Mode: Select the Access Control Mode from the pull-down 
    menu. 
    ~ Disable: Select to disable Wireless Access Control Mode. 
    ~ Allow Listed: Only the stations shown in the table can associate with the AP.   
    ~ Deny Listed: Stations shown in the table won’t be able to associate with the AP.   
    MAC Address: Enter the MAC Address of a station that is allowed to access this Access 
    Point.  
    Comment: You may enter up to 20 characters as a remark to the previous MAC Address.   
      
    						
    							3.12 QoS Traffic Control 
     
    What is Traffic Control QoS? 
    Traffic Control is a great tool to 
    control the bandwidth of the WISP 
    subscribers.   Therefore, the 
    WISP operators can offer different 
    class of connection speeds for 
    different subscription fees - just  like 
    the ADSL service!  The AirLive 
    advance firmware can control the 
    bandwidth by Interface or 
    IP/MAC. 
     
    What type of Traffic Bandwidth Control does the E11 firmware offer? 
    The E11 firmware’s Traffic Bandwidth limits the “Maximum Data Rate”.    There are 2 types 
    of Traffic Control it offers. 
     
    Interface Control 
    The interface QoS controls the data rate at the 
    WLAN and LAN interfaces.    Therefore, all traffics 
    are controlled the same way.  This type of traffic 
    control is suitable when AP is used as a Client AP in 
    “Client Mode” and WISP mode.    So WISP can 
    control the maximum data rate   
     
     
     
    Individual IP/MAC Control 
    The AP can set the maximum data 
    rate for each IP or MAC addresses.   
    This type of traffic control is most 
    suitable for outdoor AP in “AP” or 
    “Gateway” mode. 
     
     
     
    What is the Output Rate? 
    The “Output Rate” is the data speed out of an interface.    There are 3 types Output Rate 
    supported by the AP  
    						
    All Air Live manuals Comments (0)

    Related Manuals for Air Live Router WL-5460AP User Manual