Air Live Router WL-5450AP User Manual
Have a look at the manual Air Live Router WL-5450AP User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 15 Air Live manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
![](/img/blank.gif)
21 Advanced Settings It is not recommended that settings in this page to be changed unless advanced users want to change to meet their wireless environment for optimal performance Authentication Type To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless PC can join any network and receive any messages that are not encrypted. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network. Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. If the Access Point is using Open System, then the wireless adapter will need to be set to the same authentication mode. Shared Key is used when both the sender and the recipient share a secret key. Select Auto for the network adapter to select the Authentication mode automatically depending on the Access Point Authentication
![](/img/blank.gif)
22 mode. Fragment Threshold Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. If your 802.11g Wireless LAN PC Card often transmit large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346. The default value is 2346. RTS Threshold RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. “Hidden Node” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other. When a station starts data transmission with the Access Point, it might not notice that the other station is already using the wireless medium. When these two stations send data at the same time, they might collide when arriving simultaneously at the Access Point. The collision will most certainly result in a loss of messages for both stations. Thus, the RTS Threshold mechanism provides a solution to prevent data collisions. When you enable RTS Threshold on a suspect “hidden station”, this station and its Access Point will use a Request to Send (RTS). The station will send an RTS to the Access Point, informing that it is going to transmit the data. Upon receipt, the Access Point will respond with a CTS message to all station within its range to notify all other stations to defer transmission. It will also confirm the requestor station that the Access Point has reserved it for the time-frame of the requested transmission. If the “Hidden Node” problem is an issue, please specify the packet size. The RTS mechanism will be activated if the data size exceeds the value you set.. The default value is 2347. Warning: Enabling RTS Threshold will cause redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor modifications of this value are recommended. Beacon Interval Beacon Interval is the amount of time between beacon transmissions.
![](/img/blank.gif)
23 Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the access point). Data Rate By default, the unit adaptively selects the highest possible rate for transmission. Select the basic rates to be used among the following options: Auto, 1, 2, 5.5, 11or 54 Mbps. For most networks the default setting is Auto which is the best choice. When Auto is enabled the transmission rate will select the optimal rate. If obstacles or interference are present, the system will automatically fall back to a lower rate. Preamble Type A preamble is a signal used in wireless environment to synchronize the transmitting timing including Synchronization and Start frame delimiter. In a noisy network environment, the Preamble Type should be set to Long Preamble. The Short Preamble is intended for applications where minimum overhead and maximum performance is desired. If in a noisy network environment, the performance will be decreased. Broadcast SSID Select enabledto allow all the wireless stations to detect the SSID of this Access Point. IAPP IAPP (Inter Access Point Protocol) is designed for the enforcement of unique association throughout a ESS (Extended Service Set) and a secure exchange of station’s security context between current access point (AP) and new AP during handoff period. 802.11g Protection The 802.11g standard includes a protection mechanism to ensure mixed 802.11b and 802.11g operation. If there is no such kind of mechanism exists, the two kinds of standards may mutually interfere and decrease network’s performance. Apply Change Press to save the new settings on the screen. Reset Press to discard the data you have entered since last time you press Apply Change.
![](/img/blank.gif)
24 Security Here you can configure the security of your wireless network. Selecting different method will enable you to have different level of security. Please note that by using any encryption, by which data packet is encrypted before transmission to prevent data packets from being eavesdropped by unrelated people, there may be a significant degradation of the data throughput on the wireless link. Encryption: None (Encryption is set to None by default.) If Use 802.1x Authentication is selected, the RADIUS Server will proceed to check the 802.1x Authentication. Encryption: WEP If WEP is selected, users will have to Set WEP keys either manually, or select to Use 802.1x Authentication to make the RADIUS server to issue the WEP key dynamically.
![](/img/blank.gif)
25 Set WEP key ƒ Click the Set WEP Keys will prompt you a window to set 64bitor 128bit Encryption. ƒ Select HEX if you are using hexadecimal numbers (0-9, or A-F). Select ASCII if you are using ASCII characters (case-sensitive). ƒ Ten hexadecimal digits or five ASCII characters are needed if 64-bit WEP is used; 26 hexadecimal digits or 13 ASCII characters are needed if 128-bit WEP is used. Encryption: WPA (TKIP) WPA (TKIP): If WPA is selected, users will have to select the Authentication modes between Enterprise (RADIUS) and Personal (Pre-shared Key). Pre-shared Key Pre-Shared-Key serves as a password. Users may key in a 8 to 63 characters string to set the password or leave it blank, in which the 802.1x Authentication will be activated. Make sure the same password is used on clients end. There are two formats for choice to set the Pre-shared key, i.e. Passphrase and Hex. If Hexis selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 characters) format is recommended. Group Key Life Time Enter the number of seconds that will elapse before the group key
![](/img/blank.gif)
26 change automatically. The default is 86400 seconds. Enable Pre-Authentication The two most important features beyond WPA to become standardized through 802.11i/WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency. Preauthentication provides a way to establish a PMK security association before a client associates. The advantage is that the client reduces the time that its disconnected to the network. Authentication RADIUS Server Port: Enter the RADIUS Server’s port number provided by your ISP. The default is 1812. IP Address: Enter the RADIUS Server’s IP Address provided by your ISP. Password: Enter the password that the AP shares with the RADIUS Server. Apply Change Press to save the new settings on the screen. Reset Press to discard the data you have entered since last time you press Apply Change.
![](/img/blank.gif)
27 Access Control When Enable Wireless Access Control is checked, only those clients whose wireless MAC addresses listed in the access control list can access this Access Point. If the list contains no entries with this function being enabled, then no clients will be able to access this Access Point. Wireless Access Control Mode Select the Access Control Mode from the pull-down menu. Disable: Select to disable Wireless Access Control Mode. Allow Listed: Only the stations shown in the table can associate with the AP. Deny Listed: Stations shown in the table won’t be able to associate with the AP. MAC Address Enter the MAC Address of a station that is allowed to access this Access Point. Comment You may enter up to 20 characters as a remark to the previous MAC Address. Apply Changes Press to save the new settings on the screen. Reset Press to discard the data you have entered since last time you press Apply Change. Delete Selected To delete clients from access to this Access Point, you may firstly check the Select checkbox next to the MAC address and Comments, and press Delete Selected. Delete All To delete all the clients from access to this Access Point, just press Delete All without selecting the checkbox. Reset If you have made any selection, press Resetwill clear all the select mark.
![](/img/blank.gif)
28 Site Survey Site survey displays all the active Access Points and IBSS in the neighborhood. When you are in the client mode, you can select one AP to associate. Press Refresh to get the latest information. WDS Setting To enable WDS function will let this AP enter “Bridge Mode”. Two APs in bridge modes can communicate with each other through wireless interface. That is, two stations associated to different AP in bridge mode can communicate with each other. † Enable WDS Check the checkbox to enable WDS, all of the WDS settings in this screen can be enabled only when WDS or AP+WDS is selected in Wireless Basic Settings screen (See page 19).
![](/img/blank.gif)
29 Add WDS AP MAC Address: Enter the MAC Address for the Access Point to establish WDS Comment: You may enter up to 20 characters as a remark to the previous MAC Address. Apply Changes Press to save the new settings on the screen. Reset Press to discard the data you have entered since last time you press Apply Change. Set Security Click to set the WDS security, please refer to the previous Wireless Security Setup section (Page 27). Show Statistics Click to show the detailed information for each WDS AP. Current WDS AP List The added Access Points for participating WDS with this Access Point are shown. Delete Selected You can delete the WDS Access Points listed above by marking the checkbox. Delete All You can delete all of the WDS Access Points listed above. Reset Press to discard the data you have entered since last time you press Apply Change.
![](/img/blank.gif)
30 TCP/IP Basic In this page, you can change the TCP/IP settings of this Access Point, select to enable/disable the DHCP Client, 802.1d Spanning Tree, and Clone MAC Address. IP Address This field can be modified only when DHCP Client is disabled. If your system manager assigned you static IP settings, then you will have to enter the information provided. Subnet Mask Enter the information provided by your system manager. Default Gateway Enter the information provided by your system manager. DHCP Select Disable, Client or Server from the pull-down menu. Disable: Select to disable DHCP server function. Client: Select to automatically get the LAN port IP address from ISP (For ADSL/Cable Modem). Server: Select to enable DHCP server function. DHCP Client Range WL-5060AP IP addresses continuing from 192.168.100.1 to 192.168.100.253 Show Client Click to show Active DHCP Client table.