Air Live Router WL-5450AP User Manual
Here you can view all the pages of manual Air Live Router WL-5450AP User Manual. The Air Live manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 21
21 Advanced Settings It is not recommended that settings in this page to be changed unless advanced users want to change to meet their wireless environment for optimal performance Authentication Type To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless PC can join any network and receive any messages that are not encrypted. With Shared Key authentication,...
Page 22
22 mode. Fragment Threshold Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. If your 802.11g Wireless LAN PC Card often transmit large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346. The default value is 2346. RTS Threshold RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. “Hidden Node” is a situation in which two...
Page 23
23 Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the access point). Data Rate By default, the unit adaptively selects the highest possible rate for transmission. Select the basic rates to be used among the following options: Auto, 1, 2, 5.5, 11or 54 Mbps. For most networks the default setting is Auto which is the best choice. When Auto is enabled the transmission rate...
Page 24
24 Security Here you can configure the security of your wireless network. Selecting different method will enable you to have different level of security. Please note that by using any encryption, by which data packet is encrypted before transmission to prevent data packets from being eavesdropped by unrelated people, there may be a significant degradation of the data throughput on the wireless link. Encryption: None (Encryption is set to None by default.) If Use 802.1x Authentication is...
Page 25
25 Set WEP key ƒ Click the Set WEP Keys will prompt you a window to set 64bitor 128bit Encryption. ƒ Select HEX if you are using hexadecimal numbers (0-9, or A-F). Select ASCII if you are using ASCII characters (case-sensitive). ƒ Ten hexadecimal digits or five ASCII characters are needed if 64-bit WEP is used; 26 hexadecimal digits or 13 ASCII characters are needed if 128-bit WEP is used. Encryption: WPA (TKIP) WPA (TKIP): If WPA is selected, users will have to select the...
Page 26
26 change automatically. The default is 86400 seconds. Enable Pre-Authentication The two most important features beyond WPA to become standardized through 802.11i/WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency. Preauthentication provides a way to establish a PMK security association before a client associates. The advantage is that the client reduces the time that its disconnected to the network. Authentication RADIUS Server Port: Enter the...
Page 27
27 Access Control When Enable Wireless Access Control is checked, only those clients whose wireless MAC addresses listed in the access control list can access this Access Point. If the list contains no entries with this function being enabled, then no clients will be able to access this Access Point. Wireless Access Control Mode Select the Access Control Mode from the pull-down menu. Disable: Select to disable Wireless Access Control Mode. Allow Listed: Only the stations shown in the...
Page 28
28 Site Survey Site survey displays all the active Access Points and IBSS in the neighborhood. When you are in the client mode, you can select one AP to associate. Press Refresh to get the latest information. WDS Setting To enable WDS function will let this AP enter “Bridge Mode”. Two APs in bridge modes can communicate with each other through wireless interface. That is, two stations associated to different AP in bridge mode can communicate with each other. † Enable WDS Check...
Page 29
29 Add WDS AP MAC Address: Enter the MAC Address for the Access Point to establish WDS Comment: You may enter up to 20 characters as a remark to the previous MAC Address. Apply Changes Press to save the new settings on the screen. Reset Press to discard the data you have entered since last time you press Apply Change. Set Security Click to set the WDS security, please refer to the previous Wireless Security Setup section (Page 27). Show Statistics Click to show the detailed...
Page 30
30 TCP/IP Basic In this page, you can change the TCP/IP settings of this Access Point, select to enable/disable the DHCP Client, 802.1d Spanning Tree, and Clone MAC Address. IP Address This field can be modified only when DHCP Client is disabled. If your system manager assigned you static IP settings, then you will have to enter the information provided. Subnet Mask Enter the information provided by your system manager. Default Gateway Enter the information provided by your system...