User manual ENGENIUS ECB-3220

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ENGENIUS ECB-3220. We hope that this ENGENIUS ECB-3220 user guide will be useful to you.


ENGENIUS ECB-3220 : Download the complete user guide (971 Ko)

Manual abstract: user guide ENGENIUS ECB-3220

Detailed instructions for use are in the User's Guide.

[. . . ] 11g Wireless Client Bridge/AP User's Manual Version: 1. 36 11g Wireless Client Bridge/AP Version 1. 36 Table of Contents 11g Wireless Client Bridge/AP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1. 1 1. 2 1. 3 1. 4 1. 5 1. 6 a) b) FEATURES & BENEFITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 PACKAGE CONTENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven't been tampered with. WPA Authentication Mode: Select the Personal (Pre-Shared Key) radio button. Pre-Shared Key: Enter the pass phrase here, this should be between 8 and 63 characters. This device will automatically restart once these changes have been applied. 26 11g Wireless Client Bridge/AP Version 1. 36 4. 4. 3. 4 WPA / WPA2 RADIUS Authentication Encryption: Select WPA or WPA2 from the drop-down list if your wireless network uses this encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven't been tampered with. This device will automatically restart once these changes have been applied. 27 11g Wireless Client Bridge/AP Version 1. 36 4. 4. 4 Site Survey Click on the Site Survey link under the Wireless menu. This page displays the list of Access Points in the coverage area and allows you to connect to them if you have the required credentials. The site survey table lists the following: o SSID: This is the unique name of the wireless network. o Channel: This indicates the current channel that the Access Point is operating on, along with the 802. 11 network type (B, G, or B+G). You may select the radio button of a specific Access Point and then click on the Conenct button. If the credentials of this device match that of the Access Point that you will be connected immediately, if not, you must specify the appropriate credentials. You may click on the Refresh button at any time to re-scan the area. 28 11g Wireless Client Bridge/AP Version 1. 36 5 Access Point Mode ­ Web Configuration 5. 1 Logging In To configure the Access Point through the web-browser, enter the IP address of the Bridge (default: 192. 168. 1. 2) into the address bar of the web-browser and press Enter. Make sure that the Access Point and your computers are on the same subnet. Refer to Chapter 2 in order to configure the IP address of your computer. Log in User nameadmin; Passwordadmin After logging in you will graphical user interface (GUI) of the Access Point. The navigation drop-down menu on left is divided into three main sections: 4. Management: This includes operation mode, status, statistics, logs, upgrade firmware, save/reload settings, and password. TCP/IP Settings: This includes the configuration of the LAN port and settings for the LAN IP, subnet mask, DHCP client, spanning tree and MAC cloning. Wireless: This includes the basic, advanced, security and site-survey settings for 6. The Access Point status page is also displayed once you have logged in. [. . . ] This device will automatically restart once these changes have been applied. 46 11g Wireless Client Bridge/AP Version 1. 36 5. 4. 4 Access Control Click on the Access Conrol link under the Wireless menu. On this page you can filter the MAC address by allowing or blocking access the network. Wireless Access Control Mode: You may choose to Disable, Allow Listed, or Deny Listed MAC address from associating with the network. By selecting Allow Listed, only the address listed in the table will have access to the network; all other clients will be blocked. On the other hand, selected Deny Listed, only the listed MAC address will be blocked from access the network; all other clients will have access to the network. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ENGENIUS ECB-3220




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ENGENIUS ECB-3220 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.