Engenius ECB9500 Manual de Usario
Engenius
punto de acceso
ECB9500
Lee a continuación 📖 el manual en español para Engenius ECB9500 (71 páginas) en la categoría punto de acceso. Esta guía fue útil para 2 personas y fue valorada con 4.5 estrellas en promedio por 2 usuarios
Página 1/71

11N Wireless Gigabit
Multi-Function Client Bridge
User’s Manual
Version: 1.0

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
2
Table of Contents
1 INTRODUCTION ................................................................................................................................... 5
1.1 FEATURES AND BENEFITS ...........................................................................................................5
1.2 PACKAGE CONTENTS .................................................................................................................6
1.3 SAFETY GUIDELINES ..................................................................................................................7
1.4 SYSTEM REQUIREMENTS ............................................................................................................7
1.5 APPLICATIONS ...........................................................................................................................7
1.6 NETWORK CONFIGURATION.........................................................................................................8
2 UNDERSTANDING THE HARDWARE ................................................................................................. 9
2.1 HARDWARE INSTALLATION...........................................................................................................9
2.2 IP A CDDRESS ONFIGURATION .....................................................................................................9
3 WEB CONFIGURATION ......................................................................................................................11
3.1 LOGGING IN.............................................................................................................................11
3.2 SYSTEM..................................................................................................................................12
3.2.1 STATUS...................................................................................................................................13
3.2.2 SCHEDULE ..............................................................................................................................13
3.2.3 EVENT LOG.............................................................................................................................14
3.2.4 STATISTICS..............................................................................................................................15
3.2.5 WIRELESS OPERATING MODES..................................................................................................16
3.2.5.1 SWITCHING BETWEEN OPERATING ODESM ..................................................................................16
3.2.5.2 A CCESS POINT OPERATING MODE ............................................................................................17
3.2.5.2.1 STATUS...................................................................................................................................17
3.2.5.2.2 BASIC .....................................................................................................................................17
3.2.5.2.3 ADVANCED ..............................................................................................................................19
3.2.5.2.4 WIRELESS SECURITY MODE......................................................................................................20
3.2.5.2.4.1 SECURITY DISABLED ................................................................................................................20
3.2.5.2.4.2 WEP (WIRED EQUIVALENT PRIVACY).........................................................................................21
3.2.5.2.4.3 WPA I(W -FI PROTECTED A ) / P - KCCESS RE SHARED EY ...............................................................22
3.2.5.2.4.4 WPA XRADIUS (802.1 )..........................................................................................................23
3.2.5.2.5 WPS I(W -FI PROTECTED SETUP) .............................................................................................24
3.2.5.2.6 CLIENT LIST ............................................................................................................................26
3.2.5.2.7 VLAN ....................................................................................................................................26
3.2.5.2.8 WMM (WIRELESS MULTIMEDIA)................................................................................................26
3.2.5.3 C LIENT BRIDGE OPERATING MODE............................................................................................28
3.2.5.3.1 STATUS...................................................................................................................................28
3.2.5.3.2 BASIC .....................................................................................................................................28
3.2.5.3.3 WIRELESS SECURITY MODE......................................................................................................30
3.2.5.3.3.1 SECURITY DISABLED ................................................................................................................30
3.2.5.3.3.2 WEP (WIRED EQUIVALENT PRIVACY).........................................................................................30
3.2.5.3.3.3 WPA I(W -FI PROTECTED A ) / P - KCCESS RE SHARED EY ...............................................................32
3.2.5.3.3.4 WPA XRADIUS (802.1 )..........................................................................................................33
3.2.5.3.4 AP PROFILE............................................................................................................................34
3.2.5.3.5 CLIENT LIST ............................................................................................................................35
3.2.5.3.6 WMM (WIRELESS MULTIMEDIA)................................................................................................35
3.2.5.4 WDS OPERATING MODE ..........................................................................................................37
3.2.5.4.1 STATUS...................................................................................................................................37
3.2.5.4.2 BASIC .....................................................................................................................................37
3.2.5.4.3 ADVANCED ..............................................................................................................................39
3.2.5.4.4 WIRELESS SECURITY MODE......................................................................................................40
3.2.5.4.4.1 SECURITY DISABLED ................................................................................................................40
3.2.5.4.4.2 WEP (WIRED EQUIVALENT PRIVACY).........................................................................................41
3.2.5.4.4.3 WPA I(W -FI PROTECTED A ) / P - KCCESS RE SHARED EY ...............................................................42
3.2.5.4.4.4 WPA XRADIUS (802.1 )..........................................................................................................43
3.2.5.4.5 CLIENT LIST ............................................................................................................................44
3.2.5.4.6 WMM (WIRELESS MULTIMEDIA)................................................................................................45
3.2.5.5 R EPEATER OPERATING MODE...................................................................................................45

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
3
Table of Contents
3.2.5.5.1 STATUS...................................................................................................................................46
3.2.5.5.2 BASIC .....................................................................................................................................46
3.2.5.5.3 ADVANCED ..............................................................................................................................47
3.2.5.5.4 WIRELESS SECURITY MODE......................................................................................................49
3.2.5.5.4.1 SECURITY DISABLED ................................................................................................................49
3.2.5.5.4.2 WEP (WIRED EQUIVALENT PRIVACY).........................................................................................49
3.2.5.5.4.3 WPA I(W -FI PROTECTED A ) / P - KCCESS RE SHARED EY ...............................................................51
3.2.5.5.4.4 WPA XRADIUS (802.1 )..........................................................................................................52
3.2.5.5.5 CLIENT LIST ............................................................................................................................53
3.2.5.5.6 WMM (WIRELESS MULTIMEDIA)................................................................................................53
3.3 NETWORK ...............................................................................................................................54
3.3.1 STATUS...................................................................................................................................54
3.3.2 LAN / DHCP CLIENT, S ERVER..................................................................................................55
3.3.3 WAN (BRIDGE/ROUTER)..........................................................................................................56
3.3.3.1 WAN – STATIC IP ADDRESS ......................................................................................................56
3.3.3.2 WAN – DYNAMIC IP ADDRESS...................................................................................................57
3.3.3.3 WAN O– PPP E ......................................................................................................................58
3.3.3.4 WAN – PPTP.........................................................................................................................59
3.4 MANAGEMENT .........................................................................................................................60
3.4.1 ADMIN ....................................................................................................................................60
3.4.2 SNMP ...................................................................................................................................61
3.4.3 FIRMWARE UPGRADE ...............................................................................................................61
3.4.4 RESTORE TO FACTORY DEFAULT ...............................................................................................62
3.4.5 BACKUP SETTINGS...................................................................................................................63
3.4.6 RESTORE SETTINGS.................................................................................................................63
3.5 TOOLS ....................................................................................................................................64
3.5.1 TIME ZONE..............................................................................................................................64
3.5.2 POWER SAVING .......................................................................................................................65
3.5.3 DIAGNOSIS..............................................................................................................................65
3.5.4 RESET....................................................................................................................................65
APPENDIX A – SPECIFICATIONS................................................................................................................66
HARDWARE SUMMARY..................................................................................................................................66
RADIO SPECIFICATIONS ................................................................................................................................66
SOFTWARE FEATURES ..................................................................................................................................67
MANAGEMENT .............................................................................................................................................68
ENVIRONMENT & P HYSICAL...........................................................................................................................68
APPENDIX B – FCC INTERFERENCE STATEMENT...................................................................................69
INDEX............................................................................................................................................................70

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
4
Revision History
Version Date Notes
1.0 July 12, 2008 Initial Version

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
6
SSID) in AP mode administrator to assign different policies for specific
user groups.
WPA2/WPA/ IEEE 802.1x
support
Powerful data security
802.1x Supplicant support (CB
mode)
More powerful data security in Client Bridge mode
MAC address filtering in AP
mode
Ensures secure network connection
User isolation support (AP
mode)
Protect the private network between client users.
PPPoE function support (CR
mode)
Easy to access internet via ISP service
authentication
Power-over-Ethernet
(IEEE802.3af)
Flexible Access Point locations and cost savings
Keep personal setting Keep the latest setting when firmware upgrade
Support RSSI indicator bar (CB
mode)
Users can select the best signal to connect with AP
easily
SNMP Remote Configuration
Management
Help administrators to remotely configure or manage
the Access Point easily.
QoS (WMM) support Allow administrators to control connection bandwidth
and quality based on various rules.
1.2 Package Contents
Open the package carefully, and make sure that none of the items listed below are
missing. Do not discard the packing materials, in case of return; the unit must be shipped
in its original package.
h One Wireless N Multi-function Client Bridge
h One 12V/1.25A 90V~240V Power Adapter
h Three 2dBi 2.4GHz Dipole Antennas
h One CD-ROM with User’s Manual
h One Quick Guide

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
10
2. Select Internet Protocol (TCP/IP) and then click on the Properties button. This will
allow you to configure the TCP/IP settings of your PC/Notebook.
3. Select Use the following IP Address radio button and then enter the IP address
and subnet mask. You may follow the example below. Please Ensure that the IP
address and subnet mask are on the same subnet as the device.
For Example: Device IP address: 192.168.0.1(this is confusing; remove it)
PC IP address: 192.168.0.10
PC subnet mask: 255.255.255.0
4. Click on the OK button to close this window, and once again to close LAN properties
window.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
11
3 Web Configuration
3.1 Logging In
To configure the device through the web-browser, enter the IP address of the Bridge
(default: 192.168.0.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Enter admin for both the user name and password.
After logging in you will see the graphical user interface (GUI) of the device. The
navigation drop-down menu on left is divided into five main sections:
1. System: This menu includes the status, schedule, event log, and monitor.
2. Wireless: This menu includes status, basic, advanced, security, WPS, Client list,
VLAN, and WMM. Through this section, you can also change the device operating
mode, such as Access Point, Client Bridge, WDS, or repeater.
3. Network: This menu includes status, LAN, and WAN. .
4. Management: This menu includes the admin setup, SNMP, firmware upgrade, and
save/restore backup.
5. Tools: Displays the time zone, power saving, diagnostics, and device reset.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
12
3.2 System
Click on the System link on the navigation drop-
down menu. You will then see four options: Status,
Schedule, Event Log, and Monitor. Each option is
described in detail below.
I

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
13
3.2.1 Status
Click on the Status link under the System drop-down menu. The status page
displays a summary of current system settings. Information such as operating mode,
system up time, firmware version, serial number, kernel version and application
version are displayed in the ‘System’ section. LAN IP address, subnet mask, and
MAC address are displayed in the ‘LAN’ section. In the ‘WLAN’ section, the
frequency, channel is displayed. Since this device supports multiple-SSIDs, the
details of each SSID, such as ESSID and its security settings are displayed in the
‘SSID_#’ section.
3.2.2 Schedule
Click on the Schedule link in the navigation menu. Prior to setting schedule, time
zone must be set in the Tools menu. Schedules can be created to specify the
occasions to enforce the rules.
For example, if you want enable power saving on Mon-Fri from 3pm to 8pm, you
could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start
Time of 3pm and End Time of 8pm.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
14
Click on the Add button to add a new schedule. .
Schedule Description: Specify a name for the schedule.
Service: Select a service.
Days: Select the days at which you would like the schedule to be effective.
Time of Day: Place a check in the All Day box if you would like the schedule to be
active for 24 hours. If you do not use the 24 hours option, you may specify a start
time and end time.
Click on the Apply button to add this schedule into the list.
3.2.3 Event Log
Click on the Event Log link on the navigation menu. The device automatically
records important events in its internal memory. Order records will be over-written by
the latest ones when it is out of internal memory.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
16
3.2.5 Wireless Operating Modes
Click on the Wireless link on the navigation drop-down menu. In this section you
may select the operating mode of the device. Options available are: Access Point,
Client Bridge, WDS, or Repeater. Each operating mode is described in detail below.
3.2.5.1 Switching between Operating Modes
Each of the operating modes offers different features. In order to switch the operating
mode, select it from the drop down list.
A dialog box will appear to notify you that the system will restart in order for the
change to take effect. Click on the OK button to continue.
Please wait while the device counts down and restarts into the new operating mode.
Each of the operating modes is described in detail in this chapter. Refer to the
following sections for each operating mode:
o 3.2.5.2 Access Point Operating Mode
o 3.2.5.3 Client Bridge Operating Mode
o 3.2.5.4 WDS Bridge Operating Mode
o 3.2.5.5 Repeater Operating Mode

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
18
• Radio: Choose to Enable or Disable the wireless radio.
• Band: Select the IEEE 802.11 mode from the drop-down list. For example, if you are
sure that the wireless network will be using only IEEE 802.11g clients, then it is
recommended to select 802.11g only instead of 2.4 GHz B+G which will reduce the
performance of the wireless network. You may also select 802.11B+G+N. If all of the
wireless devices you want to connect with this router can connect in the same
transmission mode, you can improve performance slightly by choosing the
appropriate "Only" mode. If you have some devices that use a different transmission
mode, choose the appropriate "Mixed" mode.
• Mode: This drop-down list is fixed to AP as this is the Access Point operating mode.
• ESSID#: This device allows up for four SSIDs, select the SSID# that you would like to
configure from the drop-down list.
ESSID: The SSID is a unique named shared amongst all the points of the wireless
network. The SSID must be identical on all points of the wireless network and cannot
exceed 32 characters.
Auto Channel: The device can automatically select the clearest channel in the
environment. If auto channel is disabled, then you must select a channel from the
drop-down list.
Channel: Select a channel from the drop-down list. The channels available are
based on the country’s regulation. A wireless network uses specific channels in the
wireless spectrum to handle communication between clients. Some channels in your
area may have interference from other electronic devices. Choose the clearest
channel to help optimize the performance and coverage of your wireless network.
Click on the Apply button to save the changes.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
19
3.2.5.2.3 Advanced
Click on Advanced link under the Wireless drop-down menu. This page allows you
to configure the fragmentation threshold, RTS threshold, beacon period, transmit
power, DTIM interval, etc.
Fragment Threshold: Packets over the specified size will be fragmented in order to
improve performance on noisy networks. Specify a value between 256 and 65535.
The default value is 2346.
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to
maintain performance in noisy networks and preventing hidden nodes from
degrading the performance. Specify a value between 1 and 65535. The default value
is 2346.
Beacon Period: Beacons are packets sent by a wireless Access Point to
synchronize wireless devices. Specify a Beacon Period value between 20 and 1000.
The default value is set to 100 milliseconds.
DITM Interval: A DTIM is a countdown informing clients of the next window for
listening to broadcast and multicast messages. When the wireless Access Point has
buffered broadcast or multicast messages for associated clients, it sends the next
DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to
receive the broadcast and multicast messages. The default value is 1. Valid settings
are between 1 and 255.
Data Rate: You may select a data rate from the drop-down list, however, it is
recommended to select auto. This is also known as auto-fallback.
N Data Rate: You may select a data rate for 802.11n from the drop-down list,
however, it is recommended to select auto. This is also known as auto-fallback.
Channel Bandwidth: You may select a channel bandwidth in order to improve the
efficiency of the network, however, it is recommended to select Auto 20/40MHz. This
is also known as auto-fallback.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
20
Preamble Type: Select a short or long preamble. For optimum performance it is
recommended to also configure the client device as the same preamble type.
CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By
enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before
transmitting. It is recommended to select auto.
Tx Power: You may control the transmit output power of the device by selecting a
value from the drop-down list. This feature can be helpful in restricting the coverage
area of the wireless network.
Click on the Apply button to save the changes.
3.2.5.2.4 Wireless Security Mode
Click on the Security link under the Wireless drop-down menu. To protect your
privacy this mode supports several types of wireless security: WEP WPA, WPA2,
and 802.1x RADIUS. WEP is the original wireless encryption standard. WPA
provides a higher level of security. The following section describes the security
configuration in detail.
3.2.5.2.4.1 Security Disabled
Click on the Security link under the Wireless drop-down menu.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcasted of your signal coverage
. If encryption is set to NONE, users will be able to
access the AP without authentication. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select Disable from the drop-down list.
Click on the Apply button to save the changes.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
21
3.2.5.2.4.2 WEP (Wired Equivalent Privacy)
Click on the Security link under the Wireless drop-down menu.
WEP is an acronym for Wired Equivalent Privacy, and is a security protocol that
provides the same level of security for wireless networks as for a wired network.
WEP is less secure as compares to WPA encryption. To gain access to a WEP
network, you must know the key. The key is a string of characters that you use for
password. When using WEP, you must determine the level of encryption.
The type of encryption determines the key length. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX
(hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for
Information Interchange - alphanumeric characters) format. ASCII format is provided
so you can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change
keys easily. A default key is automatically generated when WEP is enabled.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
22
Encryption: Select WEP from the drop-down list.
Authentication Type: Select Open, or Shared Key. Authentication method from the
drop-down list. An open system allows any client to authenticate as long as it
conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends an
unencrypted challenge text string to any device attempting to communicate with the
AP. The device requesting authentication encrypts the challenge text and sends it
back to the access point. If the challenge text is encrypted correctly, the access point
allows the requesting device to authenticate. It is recommended to select Auto if you
are not sure which authentication type is used.
Key Length: Select a 64-bit or 128-bit WEP key length from the drop-down list.
Key Type: Select a key type from the drop-down list. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX
(hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for
Information Interchange - alphanumeric characters) format. ASCII format is provided
so you can enter a string that is easier to remember.
WEP Key 1-4: You may enter four different WEP keys.
Enable 802.1x Authentication: Place a check in this box if you would like to use
RADIUS authentication. This option works with a RADIUS Server to authenticate
wireless clients. Wireless clients should have established the necessary credentials
before attempting to authenticate to the Server through this Gateway. Furthermore, it
may be necessary to configure the RADIUS Server to allow this Gateway to
authenticate users. You will then be required to specify the RADIUS Server’s IP
address, port, and password.
Click on the Apply button to save the changes.
3.2.5.2.4.3 WPA (Wi-Fi Protected Access) / Pre-shared
Key
Click on the Security link under the Wireless drop-down menu.
WPA (Wi-Fi Protected Access) is designed to improve upon the security features of
WEP (Wired Equivalent Privacy). The technology is designed to work with existing
Wi-Fi products that have been enabled with WEP. WPA provides improved data
encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys
using a hashing algorithm and by adding an integrity checking feature which makes
sure that keys haven’t been tampered with.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
23
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select WPA pre-shared key from the drop-down list.
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list.
WPA Type: Select TKIP, AES, or WPA2 Mixed. The encryption algorithm used to
secure the data communication. TKIP (Temporal Key Integrity Protocol) provides
per-packet key generation and is based on WEP. AES (Advanced Encryption
Standard) is a very secure block based encryption. Note that, if the bridge uses the
AES option, the bridge can associate with the access point only if the access point is
also set to use only AES.
Pre-shared Key Type:: Select Passphrase from the drop-down list.
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric
characters in ASCII (American Standard Code for Information Interchange) format at
both ends of the wireless connection. It cannot be shorter than eight characters,
although for proper security it needs to be of ample length and should not be a
commonly known phrase. This phrase is used to generate session keys that are
unique for each wireless client.
Click on the Apply button to save the changes.
3.2.5.2.4.4 WPA RADIUS (802.1x)
Click on the Security link under the Wireless drop-down menu.
WPA encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the
security features of WEP (Wired Equivalent Privacy). The technology is designed to
work with existing Wi-Fi products that have been enabled with WEP. WPA provides
improved data encryption through the Temporal Integrity Protocol (TKIP), which
scrambles the keys using a hashing algorithm and by adding an integrity checking
feature which makes sure that keys haven’t been tampered with.
This option works with a RADIUS Server to authenticate wireless clients. Wireless
clients should have established the necessary credentials before attempting to
authenticate to the Server through this Gateway. Furthermore, it may be necessary
to configure the RADIUS Server to allow this Gateway to authenticate users.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
24
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select WPA pre-shared key from the drop-down list.
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list.
WPA Type: Select TKIP, AES, or WPA2 Mixed. The encryption algorithm used to
secure the data communication. TKIP (Temporal Key Integrity Protocol) provides
per-packet key generation and is based on WEP. AES (Advanced Encryption
Standard) is a very secure block based encryption. Note that, if the bridge uses the
AES option, the bridge can associate with the access point only if the access point is
also set to use only AES.
RADIUS Server IP Address: Specify the IP address of the RADIUS server.
RADIUS Server Port: Specify the port number of the RADIUS server, the default
port is 1812.
RADIUS Server Password: Specify the pass-phrase that is matched on the RADIUS
Server.
Click on the Apply button to save the changes.
3.2.5.2.5 WPS (Wi-Fi Protected Setup)
Click on the WPS link under the Wireless drop-down menu
WPS requires you to enter a PIN for the device press the configuration button on the
device. If the device supports Wi-Fi Protected Setup and has a configuration button,
you can add it to the network by pressing the configuration button on the device
There are several ways to add a wireless device to your network. Access to the
wireless network is controlled by a registrar. A registrar only allows devices onto the
wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
26
3.2.5.2.6 Client List
Click on the Client List link under the Wireless drop-down menu. This page displays
the list of Clients that are associated to the Access Point.
The MAC address and signal strength for each client is displayed. Click on the
Refresh button to refresh the client list
3.2.5.2.7 VLAN
Click on the VLAN link under the Wireless drop-down menu. A VLAN (Virtual LAN)
is a group of hosts with a common set of requirements that communicate as if they
were attached to the same wire, regardless of their physical location.
Virtual LAN: Choose to Enable or Disable the VLAN features.
SSID1 Tag: Specify the VLAN tag.
Click on the Apply button to save the changes.
3.2.5.2.8 WMM (Wireless Multimedia)
Click on the WMM link under the Wireless drop-down menu. WMM is Quality of
Service (QoS) for wireless and ensures that voice and video applications get priority
in order to run smoothly.
Specify the priority and then click on the Apply button.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
27

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
29
• Radio: Choose to Enable or Disable the wireless radio.
• Mode: This drop-down list is fixed to Client as this is the Client Bridge operating mode.
• Band: Select the IEEE 802.11 mode from the drop-down list. For example, if you are
sure that the wireless network will be using only IEEE 802.11g clients, then it is
recommended to select 802.11g only instead of 2.4 GHz B+G which will reduce the
performance of the wireless network. You may also select 802.11B+G+N. If all of the
wireless devices you want to connect with this router can connect in the same
transmission mode, you can improve performance slightly by choosing the
appropriate "Only" mode. If you have some devices that use a different transmission
mode, choose the appropriate "Mixed" mode.
• Site Survey: Click on the Site Survey button to view a list of Access Points in the area. The
Site Survey page displays information about devices within the 802.11b/g/n frequency.
Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and
operating mode are displayed. Select the desired device and then click on the Add to AP
Profile button.
SSID: The SSID is a unique named shared amongst all the points of the wireless
network. The SSID must be identical on all points of the wireless network and cannot
exceed 32 characters.
Status: Displays the current status of the device.
Channel: The channels available are based on the country’s regulation. A wireless
network uses specific channels in the wireless spectrum to handle communication
between clients. Some channels in your area may have interference from other
electronic devices.
Click on the Apply button to save the changes.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
30
3.2.5.3.3 Wireless Security Mode
Click on the Security link under the Wireless drop-down menu. To protect your
privacy this mode supports several types of wireless security: WEP WPA, WPA2,
and 802.1x RADIUS. WEP is the original wireless encryption standard. WPA
provides a higher level of security. The following section describes the security
configuration in detail.
3.2.5.3.3.1 Security Disabled
Click on the Security link under the Wireless drop-down menu.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select Disable from the drop-down list.
Click on the Apply button to save the changes.
3.2.5.3.3.2 WEP (Wired Equivalent Privacy)
Click on the Security link under the Wireless drop-down menu.
WEP is an acronym for Wired Equivalent Privacy, and is a security protocol that
provides the same level of security for wireless networks as for a wired network.
WEP is less secure as compares to WPA encryption. To gain access to a WEP
network, you must know the key. The key is a string of characters that you use for
password. When using WEP, you must determine the level of encryption.
The type of encryption determines the key length. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX
(hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for
Information Interchange - alphanumeric characters) format. ASCII format is provided
so you can enter a string that is easier to remember. The ASCII string is converted to

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
31
HEX for use over the network. Four keys can be defined so that you can change
keys easily. A default key is automatically generated when WEP is enabled.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select WEP from the drop-down list.
Authentication Type: Select Open, or Shared Key. Authentication method from the
drop-down list. An open system allows any client to authenticate as long as it
conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends an
unencrypted challenge text string to any device attempting to communicate with the
AP. The device requesting authentication encrypts the challenge text and sends it
back to the access point. If the challenge text is encrypted correctly, the access point
allows the requesting device to authenticate. It is recommended to select Auto if you
are not sure which authentication type is used.
Key Length: Select a 64-bit or 128-bit WEP key length from the drop-down list.
Key Type: Select a key type from the drop-down list. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
32
(hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for
Information Interchange - alphanumeric characters) format. ASCII format is provided
so you can enter a string that is easier to remember.
WEP Key 1-4: You may enter four different WEP keys.
Enable 802.1x Authentication: Place a check in this box if you would like to use
RADIUS authentication. This option works with a RADIUS Server to authenticate
wireless clients. Wireless clients should have established the necessary credentials
before attempting to authenticate to the Server through this Gateway. Furthermore, it
may be necessary to configure the RADIUS Server to allow this Gateway to
authenticate users. You will then be required to specify the RADIUS Server’s IP
address, port, and password.
Click on the Apply button to save the changes.
3.2.5.3.3.3 WPA (Wi-Fi Protected Access) / Pre-shared
Key
Click on the Security link under the Wireless drop-down menu.
WPA (Wi-Fi Protected Access) is designed to improve upon the security features of
WEP (Wired Equivalent Privacy). The technology is designed to work with existing
Wi-Fi products that have been enabled with WEP. WPA provides improved data
encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys
using a hashing algorithm and by adding an integrity checking feature which makes
sure that keys haven’t been tampered with.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Broadcast SSID: Select Enable or Disable from the drop-down list. This is the SSID
broadcast feature. When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then
they could connect to your network. When this is disabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further
configured in WMM under the Wireless drop-down menu.
Encryption: Select WPA pre-shared key from the drop-down list.

Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
33
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list.
WPA Type: Select TKIP, AES, or WPA2 Mixed. The encryption algorithm used to
secure the data communication. TKIP (Temporal Key Integrity Protocol) provides
per-packet key generation and is based on WEP. AES (Advanced Encryption
Standard) is a very secure block based encryption. Note that, if the bridge uses the
AES option, the bridge can associate with the access point only if the access point is
also set to use only AES.
Pre-shared Key Type:: Select Passphrase from the drop-down list.
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric
characters in ASCII (American Standard Code for Information Interchange) format at
both ends of the wireless connection. It cannot be shorter than eight characters,
although for proper security it needs to be of ample length and should not be a
commonly known phrase. This phrase is used to generate session keys that are
unique for each wireless client.
Click on the Apply button to save the changes.
3.2.5.3.3.4 WPA RADIUS (802.1x)
Click on the Security link under the Wireless drop-down menu.
WPA encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the
security features of WEP (Wired Equivalent Privacy). The technology is designed to
work with existing Wi-Fi products that have been enabled with WEP. WPA provides
improved data encryption through the Temporal Integrity Protocol (TKIP), which
scrambles the keys using a hashing algorithm and by adding an integrity checking
feature which makes sure that keys haven’t been tampered with.
This option works with a RADIUS Server to authenticate wireless clients. Wireless
clients should have established the necessary credentials before attempting to
authenticate to the Server through this Gateway. Furthermore, it may be necessary
to configure the RADIUS Server to allow this Gateway to authenticate users.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down
list.
Especificaciones del producto
Marca: | Engenius |
Categoría: | punto de acceso |
Modelo: | ECB9500 |
¿Necesitas ayuda?
Si necesitas ayuda con Engenius ECB9500 haz una pregunta a continuación y otros usuarios te responderán
punto de acceso Engenius Manuales

5 Octubre 2024

30 Septiembre 2024

17 Septiembre 2024

2 Septiembre 2024

29 Agosto 2024

28 Agosto 2024

26 Agosto 2024

22 Agosto 2024

17 Agosto 2024

16 Agosto 2024
punto de acceso Manuales
- punto de acceso HP
- punto de acceso Honeywell
- punto de acceso Allnet
- punto de acceso Allied Telesis
- punto de acceso Airlive
- punto de acceso Edimax
- punto de acceso Asus
- punto de acceso Renkforce
- punto de acceso Sitecom
- punto de acceso TP Link
- punto de acceso Fortinet
- punto de acceso DataVideo
- punto de acceso AVM
- punto de acceso Techly
- punto de acceso Totolink
- punto de acceso Cisco
- punto de acceso Steren
- punto de acceso Netis
- punto de acceso Draytek
- punto de acceso Devolo
- punto de acceso Linksys
- punto de acceso Buffalo
- punto de acceso Dahua Technology
- punto de acceso Macally
- punto de acceso Netgear
- punto de acceso LevelOne
- punto de acceso Dell
- punto de acceso Planet
- punto de acceso ZyXEL
- punto de acceso Zebra
- punto de acceso D-Link
- punto de acceso Aruba
- punto de acceso Tenda
- punto de acceso Ubiquiti Networks
- punto de acceso Trendnet
- punto de acceso Mikrotik
- punto de acceso EQ3
- punto de acceso Homematic IP
- punto de acceso Hawking Technologies
- punto de acceso INCA
- punto de acceso Crestron
- punto de acceso Grandstream
- punto de acceso Moog
- punto de acceso LigoWave
- punto de acceso Moxa
- punto de acceso StarTech.com
- punto de acceso Advantech
- punto de acceso Hercules
- punto de acceso Kingston
- punto de acceso Intellinet
- punto de acceso Lancom
- punto de acceso SMC
- punto de acceso Speco Technologies
- punto de acceso CradlePoint
- punto de acceso Silex
- punto de acceso Aerohive
- punto de acceso Bountiful
- punto de acceso V7
- punto de acceso WatchGuard
- punto de acceso Media-tech
- punto de acceso NUVO
- punto de acceso Cudy
- punto de acceso IP-COM
- punto de acceso Lindy
- punto de acceso Syscom
- punto de acceso Meru
- punto de acceso Amped Wireless
- punto de acceso Cambium Networks
- punto de acceso 3Com
- punto de acceso AMX
- punto de acceso Ruckus Wireless
- punto de acceso Bintec-elmeg
- punto de acceso Mach Power
- punto de acceso Brocade
- punto de acceso ICC
- punto de acceso Insteon
- punto de acceso Juniper
- punto de acceso Comtrend
- punto de acceso Premiertek
- punto de acceso Extreme Networks
- punto de acceso Atlantis Land
- punto de acceso Mojo
- punto de acceso FlyingVoice
- punto de acceso Luxul
Últimos punto de acceso Manuales

26 Octubre 2024

26 Octubre 2024

26 Octubre 2024

18 Octubre 2024

18 Octubre 2024

17 Octubre 2024

14 Octubre 2024

13 Octubre 2024

12 Octubre 2024

11 Octubre 2024