Air Live Router WL-5460AP User Manual
Have a look at the manual Air Live Router WL-5460AP User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 15 Air Live manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
3.9 Wireless Security Here you can configure the security of your wireless network. Selecting different method will enable you to have different level of security. Please note that by using any encryption, by which data packet is encrypted before transmission to prevent data packets from being eavesdropped by unrelated people, there may be a significant degradation of the data throughput on the wireless link. WL-5460AP provides WEP, WPA-PSK (TKIP), WPA2-PSK (AES) and WPA2-PSK (AES) security policy. WEP WEP allows you to use data encryption to secure your data from being eavesdropped by malicious people. It allows 2 types of key: 64 (WEP64) and 128 (WEP128). You can configure up to 4 keys using either ASCII or Hexadecimal format. Key Settings: The length of a WEP64 key must be equal to 5 bytes and a WEP128 key is 13 bytes Default Tx Key: You have to specify which of the four keys will be active. Once you enable the WEP function, please make sure that both the WL-5460AP and the wireless client stations use the same key. Some wireless client cards only allow Hexadecimal digits for WEP keys. Please note that when configuring WEP keys, a WEP128 ASCII key looks like “This is a key”(13 characters), while a WEP128 Hex key looks like “546869732069732061206b6579”(26 HEX) (hexadecimal notation are 0-9 and A-F).
WPA-PSK (TKIP) / WPA-PSK (AES) Wi-Fi Protected Access (WPA) with Pre-Shared Key (PSK) provides better security than WEP keys. It does not require a RADIUS server in order to provide association authentication, but you do have to enter a shared key for the authentication purpose. The encryption key is generated automatically and dynamically. There are two encryption types TKIP and CCMP (AES). While CCMP provides better security than TKIP, some wireless client stations may not be equipped with the hardware to support it. Pre-shared Key: This is an ASCII string with 8 to 63 characters. Please make sure that both the WL-5460AP and the wireless client stations use the same key. Group Key Life Time: A group key is used for multicast/broadcast data, and the re-key interval is time period that the system will change the group key periodically. The shorter the interval is, the better the security is. The default is 300 sec.
WPA2-PSK (AES) Enter the Pre-shared Key to initiate WPA2 security. All devices try to access the network should have the matching encryption key. Pre-shared Key: This is an ASCII string with 8 to 63 characters. Please make sure that both the WL-5460AP and the wireless client stations use the same key. Encryption Type: There are two encryption types TKIP and CCMP (AES). While CCMP provides better security than TKIP, some wireless client stations may not be equipped with the hardware to support it. Group key Life Time: A group key is used for multicast/broadcast data, and the re-key interval is time period that the system will change the group key periodically. The shorter the interval is, the better the security is. The default is 300 sec.
802.1X (Radius) Authentication by the remote server (RADIUS Server). Security: You can select None, WEP, WPA (TKIP), WPA (AES), WPA2 (AES), WPA2 Mixed method for data encryption. ~ WEP: 802.1x Authentication is enabled and the RADIUS Server will proceed to check the 802.1x Authentication, and make the RADIUS server to issue the WEP key dynamically. You can select WEP 64bits or WEP 128bits for data encryption. ~ WPA (TKIP) / WPA (AES): WPA-RADIUS authentication use WPA (Wi-Fi Protect Access) data encryption for 802.1x authentication. WPA is an encryption standard proposed by WiFi for advance protection by utilizing a password key (TKIP) or certificate. It is more secure than WEP encryption. ~ WPA2-AES / WPA2-Mixed: The two most important features beyond WPA to become standardized through 802.11i/WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency. Pre-authentication provides a way to establish a PMK security association before a client associates. The advantage is that the client reduces the time that its disconnected to the network. Authentication RADIUS Server: Enter the RADIUS Server IP address and Password provided by your ISP.
~ Port: Enter the RADIUS Server’s port number provided by your ISP. The default is 1812. ~ IP Address: Enter the RADIUS Server’s IP Address provided by your ISP. ~ Password: Enter the password that the AP shares with the RADIUS Server. Accounting RADIUS Server: Enter the Accounting RADIUS Server IP address and Password provided by your ISP.
3.10 Advanced Wireless Settings When click on Advanced Setup button under client mode, a pop-up window appears and show parameter as follow: Fragmentation: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. If your 802.11g Wireless LAN PC Card often transmit large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346. The default value is 2346. RTS Threshold: RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. “Hidden Node” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other. When a station starts data transmission with the Access Point, it might not notice that the other station is already using the wireless medium. When these two stations send data at the same time, they might collide when arriving simultaneously at the Access Point. The collision will most certainly result in a loss of messages for both stations. Thus, the RTS Threshold mechanism provides a solution to prevent data collisions. When you enable RTS Threshold on a suspect “hidden station”, this station and its Access Point will use a Request to Send (RTS). The station will send an RTS to the Access Point, informing that it is going to transmit the data. Upon receipt, the Access Point will respond with a CTS message to all station within its range to notify all other stations to defer
transmission. It will also confirm the requestor station that the Access Point has reserved it for the time-frame of the requested transmission. If the “Hidden Node” problem is an issue, please specify the packet size. The RTS mechanism will be activated if the data size exceeds the value you set.. The default value is 2347. Warning: Enabling RTS Threshold will cause redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor modifications of this value are recommended. Beacon Interval: Beacon Interval is the amount of time between beacon transmissions. Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the access point). Data Rate: By default, the unit adaptively selects the highest possible rate for transmission. Select the basic rates to be used among the following options: Auto, 1, 2, 5.5, 11or 54 Mbps. For most networks the default setting is Auto which is the best choice. When Auto is enabled the transmission rate will select the optimal rate. If obstacles or interference are present, the system will automatically fall back to a lower rate. Preamble Type: A preamble is a signal used in wireless environment to synchronize the transmitting timing including Synchronization and Start frame delimiter. In a noisy network environment, the Preamble Type should be set to Long Preamble. The Short Preamble is intended for applications where minimum overhead and maximum performance is desired. If in a noisy network environment, the performance will be decreased. Broadcast SSID: Select enabled to allow all the wireless stations to detect the SSID of this Access Point. IAPP: IAPP (Inter Access Point Protocol) is designed for the enforcement of unique association throughout a ESS (Extended Service Set) and a secure exchange of station’s security context between current access point (AP) and new AP during handoff period. 802.11g Protection: The 802.11g standard includes a protection mechanism to ensure mixed 802.11b and 802.11g operation. If there is no such kind of mechanism exists, the two kinds of standards may mutually interfere and decrease network’s performance. Tx Power Level: For countries that impose limit on WLAN output power, it might be necessary to reduce TX (transmit) power. There are 7 TX Power Levels to choose from —
select a level to make sure that the output power measured at the antenna end will not exceed the legal limit in your country. Enable WatchDog: Check and enable this watch dog function. Watch Interval: Setup the interval time for watch dog function between 1 to 60 mins. Watch Host: Enter the watch dog host ip address. Ack timeout: When a packet is sent out from one wireless station to the other, it will waits for an Acknowledgement frame from the remote station. If the ACK is NOT received within that timeout period then the packet will be re-transmitted resulting in reduced throughput. If the ACK setting is too high then throughput will be lost due to waiting for the ACK Window to timeout on lost packets. By having the ability to adjust the ACK setting we can effectively optimize the throughput over long distance links. This is especially true for 802.11a and 802.11g networks You can set as default for auto adjustment.
3.11 Access Control When Enable Wireless Access Control is checked, only those clients whose wireless MAC addresses listed in the access control list can access this Access Point. If the list contains no entries with this function being enabled, then no clients will be able to access this Access Point. Wireless Access Control Mode: Select the Access Control Mode from the pull-down menu. ~ Disable: Select to disable Wireless Access Control Mode. ~ Allow Listed: Only the stations shown in the table can associate with the AP. ~ Deny Listed: Stations shown in the table won’t be able to associate with the AP. MAC Address: Enter the MAC Address of a station that is allowed to access this Access Point. Comment: You may enter up to 20 characters as a remark to the previous MAC Address.
3.12 QoS Traffic Control What is Traffic Control QoS? Traffic Control is a great tool to control the bandwidth of the WISP subscribers. Therefore, the WISP operators can offer different class of connection speeds for different subscription fees - just like the ADSL service! The AirLive advance firmware can control the bandwidth by Interface or IP/MAC. What type of Traffic Bandwidth Control does the E11 firmware offer? The E11 firmware’s Traffic Bandwidth limits the “Maximum Data Rate”. There are 2 types of Traffic Control it offers. Interface Control The interface QoS controls the data rate at the WLAN and LAN interfaces. Therefore, all traffics are controlled the same way. This type of traffic control is suitable when AP is used as a Client AP in “Client Mode” and WISP mode. So WISP can control the maximum data rate Individual IP/MAC Control The AP can set the maximum data rate for each IP or MAC addresses. This type of traffic control is most suitable for outdoor AP in “AP” or “Gateway” mode. What is the Output Rate? The “Output Rate” is the data speed out of an interface. There are 3 types Output Rate supported by the AP