Altai C1N Super Wifi Cpe/Ap Configuration Manual For Firmware Version 1.0.0.X
Altai C1N Super Wifi Cpe/Ap Configuration Manual For Firmware Version 1.0.0.X
doc
Version 1.0
Date: 16-Aug-2012
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Disclaimer
All specifications are subject to change without prior notice. Altai Technologies assumes no
responsibilities for any inaccuracies in this document or for any obligation to update information
in this document. This document is provided for information purposes only. Altai Technologies
reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Table of Contents
1
INTRODUCTION ........................................................................................................................................ 8
GLOSSARY .............................................................................................................................................. 51
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Table of Figures
FIGURE 1
FIGURE 2
FIGURE 3
FIGURE 4
FIGURE 5
FIGURE 6
FIGURE 7
FIGURE 8
FIGURE 9
FIGURE 10
FIGURE 11
FIGURE 12
FIGURE 13
FIGURE 14
FIGURE 15
FIGURE 16
FIGURE 17
FIGURE 18
FIGURE 19
FIGURE 20
FIGURE 21
FIGURE 22
FIGURE 23
FIGURE 24
FIGURE 25
FIGURE 26
FIGURE 27
FIGURE 28
FIGURE 29
FIGURE 30
FIGURE 31
FIGURE 32
FIGURE 33
FIGURE 34
FIGURE 35
FIGURE 36
FIGURE 37
FIGURE 38
FIGURE 39
FIGURE 40
FIGURE 41
FIGURE 42
FIGURE 43
FIGURE 44
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Manual Conventions
Bold
Italic
_____
Courier
[]
{}
|
>
NOTE: This message denotes neutral or positive information that calls out important points
to the text. A note provides information that applies only in special cases.
Caution: Cautions call special attention to hazards that can cause system damage or
data corruption, to a lesser degree than warnings.
Warnings: Warnings call special attention to hazards that can cause system damage,
data corruption, personal injury, or death.
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
1 INTRODUCTION
This manual is to summarize how to perform configuration for the ALTAI C1n Super WiFi
CPE/AP through web-admin interface.
3 GETTING START
3.1
C1n Super WiFi CPE/AP can be connected with your PC in wired mode or in wireless mode. In
the followings, wired mode will be introduced. This is because the configurations are similar in
wireless mode, unless SSID has to be configured in both C1n Super WiFi CPE/AP and PC.
RJ-45 Ethernet Cable Straight Cable has to be used if C1n Super WiFi CPE/AP and your
PC are connected by a switch or a hub.
RJ-45 Ethernet Cable Crossover Cable has to be used if C1n Super WiFi CPE/AP and
your PC are connected directly.
Please kindly refer to the Altai C1n Super WiFi CPE/AP Installation Guide.
Start Network Configuration on your PC.
For Windows XP user,
1. Click the start menu and choose Control Panel.
2. Click Network Connections.
Figure 1
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 2
Figure 3
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
10. Click OK when you finish setting and close the Window.
Figure 4
3.2
CHECK ACCESS
ping utility of DOS mode is a handy tool to check the access to the C1n Super WiFi
CPE/AP.
1. Go to DOS mode by typing cmd in Run.
2. Type command:
ping 192.168.1.20
The C1n Super WiFi CPE/AP shall respond to your ping request if it has a correct
connection with your PC.
NOTE: Using the same PC to ping different C1n Super WiFi CPE/AP may cause ping failure.
This is because the C1n Super WiFi CPE/AP have the same default IP address but different
MAC addresses. You need to type a command arp d in DOS mode to clear ARP table on
PC before each ping.
The C1n can be accessed through a Web Browser, for example, Internet Explorer (IE).
1. Open an IE session and type the IP address of the C1n Super WiFi CPE/AP. Example:
http://192.168.1.20, where 192.168.1.20 is the C1ns IP address. The C1n default IP
Address is 192.168.1.20. Note: the release version 1.0.0.16 only supports http format
URL link.
10
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
2. A window will pop up, as shown in Figure 5. Enter the user name and password in the
corresponding fields. The default User Name and Password are shown in Table 1.
They are case sensitive.
Default Password
altai
wag
Default User Name and Password for logging in C1n Super WiFi CPE/AP
Figure 5
11
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
3. A Menu Bar is located on the left hand side of the IE window. Different configurations
can be chosen through the menu bar.
4.2
The running version can be checked by selecting About under Administration in the menu bar.
In Figure 7 Version of C1n Super WiFi CPE, it shows:
Firmware Version: v1.2.0.0
12
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 7
13
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
4.3
The Password and System Name can be configured by selecting System under Configuration
in the menu bar, as shown in Figure 8 System Configuration
Figure 8
System Configuration
The User Name and Password for login are mentioned in Section 4.1, but only password can be
changed by entering a new string in the field of Password. Note: it is need to re-enter to
confirm the password. Please press Change Password button to store the new password.
The System Name is the name of the C1n Super WiFi CPE/AP.
4.4
NTP CONFIGURATION
NTP is a network time protocol for the AP to synchronize the system time. There is no NTP
server IP address by default. If NTP is needed, IP address of the NTP server must be added and
C1n will synchronize with the NTP server. This measure is useful to maintain the network and
make sure all APs using the same system time by setting the same NTP server.
14
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 9
NTP Configuration
SNMP CONFIGURATION
In the SNMP Manager, the administrator can change the Read Community and Write
Community. Access Subnet IP and Access Subnet Mask can be configured to specify the
C1ns SNMP Manger. Notification Server IP addresses can be added for SNMP control. They
are parameters used for SNMP control between Altai C1n and AWMS system.
By enabling SNMP Manager ACL mode, the C1n will only be managed by the AWMS which IP
is located in the ACL list with correct Read Community, Write Community and SNMP IP
address.
It also supports SNMP Manager Access Control List which allows user to configure a list of
allowed SNMP manager IPs for managing the C1n. When the SNMP manger ACL mode is
enabled, only SNMP request generated from the any of configured SNMP manger on the ACL
will be handled.
15
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 10
SNMP Configuration
4.6
TELNET
Administrator can login to the C1n Super WiFi CPE/AP by telnet command in Command
Prompt via Ethernet or WiFi. For example, to telnet C1n with IP address of 192.168.1.20; telnet
command is telnet 192.168.1.20 2223.
NOTE: The telnet port number is limited at 2223.
4.7
The default setting for the Network Operation Mode is Switch Mode. If the C1n Super WiFi
CPE/AP is set to Switch Mode, it acts as a switch and routes traffic between the DS and wireless
clients accordingly. When it is in Gateway mode, it acts as a gateway and the Local IP Address
16
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
and Local IP Address Mask information must be entered to specify the C1n local interface for
serving the wireless client.
In Switch mode, VLAN mode is by default disabled and clients in different SSID under the
same C1n can communicate with each other. However, if VLAN is enabled, each SSID can be
edited with a specific VLAN tag value. Only clients with same VLAN tag in same or different
SSID can communicate. Moreover, in this mode, DHCPS, NAT and PPPoE configuration have
no effort.
However, in Gateway mode, the DHCPS, NAT and PPPoE configurations can be configured but
the VLAN has no effort.
In Switch mode,
In Gateway mode
VLAN is disabled
17
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
4.8
SWITCH MODE
Figure 11
Figure 12
18
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 13
NOTE: By enabling DHCP client, IP address of C1n CPE/AP is hard to predict after
rebooting the C1n. Administrator can use default IP address 192.168.1.20 to access the
web-admin to maintain C1n.
19
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
NOTE: DNS Auto Update can only be enabled when DHCP client is enabled. If the
DNS Auto Update is enabled, it must be used in conjugation with either the DHCP Client or the
PPPoE Mode being enabled. If both the DHCP Client and the PPPoE Mode are disabled then the
DNS Auto Update must also be set to Disabled.
20
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
4.9
GATEWAY MODE
In Gateway mode, by clicking Network Configuration in the System page, users can configure
the WAN and LAN settings.
Figure 14
21
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 15
PPPoE Configuration
NOTE: The DNS Auto Update should be set to Disable when using PPPoE. User need
to configure the DNS server IP address manually.
PPPoE Active Mode, Max Idle Time and Redial Period can be configured.
When Connect on Demand is selected, PPPoE will establish the connection with the remote
access concentrator only when hosts in the local subnet need to access the internet. If the
parameter is set Keep Alive, PPPoE will establish the connection with the remote access
concentrator upon boot-up.
Default setting of Max Idle Time is 30 minutes. Only when PPPoE works under Connect on
Demand mode, it will be disconnected if PPPoE connection has been idle for the Max Idle
Time.
When last attempt failed, C1n CPE/AP will attempt to establish the PPPoE connection at Redial
Period.
22
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 16
23
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
When the DHCP Server Mode sets to Relay, the C1n will redirect all DHCP requests from the
wireless clients to a backend DHCP server with IP address specified by the Relay Server IP
Address.
1. Configure the Relay Server IP Address, see Figure 17.
2. Reboot the C1n
Figure 17
When the DHCP Server Mode sets to Disabled, the C1n will neither be a DHCP server nor a
DHCP Relay and hence the wireless clients CANNOT get IP addresses from the C1n CPE/AP to
access the Internet. Instead, each wireless client should set a fixed static IP address which is in
the same network domain as the C1n.
24
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 18
25
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 19
DMZ Configuration
26
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 20
27
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
4.11.1 Service Set IDentifier (SSID) and Virtual Access Point (VAP)
In order for the C1n CPE/AP and mobile clients to communicate, they must all be configured to
use the same SSID for communication both at the VAP and clients ends. SSID broadcast can be
enabled or disabled by selecting Suppress SSID. Suppress SSID is used to prevent unauthorized
users scanning for SSID while still allowing users who know the correct SSID to connect.
NOTE: Suppress SSID can be enabled only when C1n works under AP mode.
4.11.2 Wireless Mode and Radio Frequency
Altai C1n Super WiFi CPE/AP can offer 2.4GHz radio access, the following tables list the
operation mode and available frequency under the particularly wireless mode. Default setting of
AP mode radio is working on 2.4GHz 300Mbps (802.11ng HT40) and default channel is
channel 3 (2422MHz).
2.4GHz Radio Mode
802.11b
802.11b/g
802.11ng HT20
802.11ng HT40
Data Rate
11Mbps
54Mbps
130Mbps
300Mbps
Channels
1,2,3,4,5,6,7,8,9,10,11
1,2,3,4,5,6,7,8,9,10,11
1,2,3,4,5,6,7,8,9,10,11
3,4,5,6,7,8,9
Table 2
Radio Frequency
2412MHz-2462MHz
2412MHz-2462MHz
2412MHz-2462MHz
2422MHz-2452MHz
28
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Signal level
1(Weakest)
2
3
4
5
6
7
8
PWR
LAN
Table 3
SS1
Blink
On
On
On
On
On
On
On
SS2
Off
Off
Blink
On
On
On
On
On
SS3
Off
Off
Off
Off
Blink
On
On
On
SS4
Off
Off
Off
Off
Off
Off
Blink
On
The LED Signal indicator range could be configured from web page. The 4 signal level input
should be in ascending order form left to right. The value range of these 4 signal level is
-94~-10dBm. The default setting of LED signal threshold is -94, -80, -73 and -65. The 8
displayed signal levels are classified as:
Signal level
1(Weakest)
2
3
4
5
6
7
8
Signal range
-94 to -88
-87 to -81
-80 to -77
-76 to -73
-72 to -69
-68 to -65
-65 to -60
-60 to -55
Table 4
SS1
Blink
On
On
On
On
On
On
On
SS2
off
Off
Blink
On
On
On
On
On
SS3
off
Off
Off
Off
Blink
On
On
On
SS4
Off
Off
Off
Off
Off
Off
Blink
On
29
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Beacon Interval: Default setting is 100 ms. The C1n AP transmits beacons for each supported
BSS, with each BSS using the same beacon interval. The beacon interval is a value between 25
and 1000 ms. The following table showed is the best suggested interval worked with the current
operated APs. Note that it is not suggested to change the parameters in Advanced Radio Settings
unless you are experienced administrators.
Number of active
VAPs
1
2
3
4
Table 5
DTIM: Default setting is 1. The DTIM interval, also known as the data beacon rate, denotes the
frequency at which AP beacon will include a DTIM. This frequency is measured in the number
of beacon intervals, and is a value between 1 and 255.
Multicast Rate: This option allows Multicast packets to be sent in higher rates (up to the 54
Mbps) than commonly used (1 Mbps at IEEE 802.11b mode, 6 Mbps at IEEE 802.11g/a mode).
This is ALTAI's C1n proprietary feature thus it may be incompatible with the devices from other
vendors. Both C1n based devices the sender (Station) and the receiver (Access Point) must have
the same Multicast Rate configured in order to achieve better multicast packet throughput
performance
Short Preamble: Default setting is "Enabled". Short preamble usage is only available for
802.11b. If this option is set to "Enabled", both short and long preamble are used. Only long
preambles are used when Short Preamble is set to Disabled.
Protection Mode: Default setting is "None". C1n turns off CTS protection under protection
mode disabled. C1n will turns on CTS protection when Protection Mode is set to always. If
Protection Mode is set to "Auto", the C1n dynamically turns on and off CTS protection
depending on whether there are any 802.11b STAs associated/any traffic from associated
802.11b STAs.
Short Slot Time: Default setting is "disable". In 802.11g mode, if this feature is enabled, the
C1n advertises and uses 9 us slot times until the first client associates that cannot support 9 us.
Then, C1n advertises and uses 20 us slot times until all the stations that cannot support 9 us have
timed out. If it is disabled, the C1n only uses long slot times. In 802.11b mode only long slot
times are used.
QoS: Default setting is "Enabled". If QoS Mode is set to "Disabled", all traffic has equal priority
and equal chance of being delivered in a timely manner. When congestion occurs, all traffic has
an equal chance of being dropped. If QoS Mode is set to "Enabled", the QoS implementation is
based on WMM, which is a subset of the 802.11e draft. It prioritizes traffic between the
AP/Bridge and wireless client device/peer bridge device, on a per VAP basis. This control
enables QoS for 2.4GHz radios.
30
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 21
31
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 22
Station Mode
System Mode
NAT mode
Gateway mode
Station mode
Disabled
WDS mode
Switch mode
Station mode
Enabled
MAT mode
Switch mode
Station mode
Disabled
Table 6
32
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 23
Figure 24
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 25
AP mode Setting
34
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 26
35
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 27
36
ACL
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 28
After selecting Open or Shared-Key for Authentication Mode, WEP for Cipher Mode, the WEP
key settings can be defined as shown in Figure 29.
37
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 30
WPA-AES Settings
RADIUS server is used for authentication. C1n can store separate RADIUS server address for
each VAP. It is only visible when the Authentication Mode is set to WPA. The default setting
of RADIUS server port is 1812. RADIUS secret shared password between the RADIUS server
and C1n CPE/AP. A password up to 128 characters long can be added. The VLAN IP address
and VLAN Subnet Mask configured on the VAP security web page will be used only when C1n
runs in the following conditions.
1. C1n Super WiFi CPE/AP runs in switch mode and VLAN is enabled.
2. The VAP does not belong to native VLAN.
3. The authentication mode is WPA
38
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 31
WPA-TKIP Settings
Figure 32
WPA-PSK Settings
39
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
System Log allows C1n sending system log messages into a System Log server instantaneously
to the IP address of the System Log Server. Administrator could choose either Local System
Log Server or Remote System Log Server. When System Log To Local is enabled, the system
message is send to Local System Log Server and listed on the Web-Admin Interface. Click the
Browser button will load the system messages stored in the AP buffer. By typing remote
System Log server IP address in System Log to Remote IP field, C1n will send System
messages to remote server.
Figure 33
40
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
4.13 REBOOT
System reboot of C1n CPE/AP can be chosen by selecting Reboot under Administration in the
menu bar. It is required to select Reboot Device to confirm this action, as shown in Figure 34
Reboot Window.
When the C1n CPE/AP is rebooting, a message Please wait Device is Rebooting is
shown on the window, as shown in Figure 35 C1n is Rebooting. It will take about 20 seconds
for C1n to boot up.
Figure 34
Reboot Window
41
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 35
C1n is Rebooting
42
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 36
address
retained,
please
type
For hardware reset, a reset button can be found next to the Ethernet port on C1n. First, make
sure the C1n is already powered up. Then, press and hold the C1n reset button until the power
LED turns off. Hardware reset will reset the C1n to factory default without retaining IP
address.
43
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
SYSTEM
The statistics can be monitored by selecting System under Status in the menu bar. All details
are shown on the window, as shown in Figure .
Figure 37
When C1n works as a Access Point, the status of each VAP can be shown by clicking Vap under
the field of 2.4GHz Radio, as shown in Figure .
44
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 38
5.2
2.4GHZ STATISTICS
The 2.4GHz radio statistics can be monitored by selecting 2.4GHz Statistics under the field of
Status in the menu bar, as shown in Figure .
The Address Lease Table shows the Client MAC Address, Client IP Address of each end user.
Figure 39
45
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
5.3
The 2.4GHz radio association can be monitored by selecting 2.4GHz Association Client under
the field of Status in the menu bar. The 2.4GHz Association Table shows the ID, Mac Address,
RSSI, and VAP of each station as shown in Figure . A more detailed 2.4GHz Association
Statistic of each station can be brought up by selecting the related Mac Address as shown in
Figure 41.
Status
ID
Mac Address
RSSI
VAP
Description
Station ID, a number randomly generated by C1n
to represent a mobile client
Station Mac Address
Receiver Signal Strength
Virtual Access Point ID Number that the mobile
client associates to
Table 8
Figure 40
46
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 41
5.4
2.4GHZ ASSOCIATION AP
The 2.4GHz radio association can be monitored by selecting 2.4GHz Association Client under
the field of Status in the menu bar.
Figure 42
47
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Follow the steps below to perform the Firmware Update with a firmware image file (.bin) in
local directory through HTTP or HTTPS.
1. Click the Browse bottom to bring up a file chooser dialog which you can specify the
name and location of the firmware image you want to import.
2. Click the Update Firmware bottom to start uploading the new firmware from the local
directory, see Figure .
3. If the firmware upgrade is successful, a window will appear as Figure 44 Successful
Firmware Update - Web-admin. C1n Super WiFi CPE/AP will reboot automatically.
4. Type in URL with http://<ip address of C1n>, note http can not link to the web admin
of C1n under the new firmware version.
5. After the C1n reboots, check the firmware version by selecting About under the field of
Administrations in the menu bar, as discussed in Section 4.2, to ensure the expected
firmware is uploaded.
6. Select Factory Default under the field Administrations in the menu bar and click Reset
to Factory Default (address retained) or Reset to Factory Default to make the default
settings effective. Note: If press Reset to Factory Default with address retained, the IP
address of C1n web-admin will not be changed after rebooting the AP. While Reset to
Factory Default is chosen, IP address of C1n Super WiFi CPE/AP will be changed into
192.168.1.20 .
7. Click the icon REBOOT AP to reboot the C1n Super WiFi CPE/AP.
Warning: The C1n Access Point will not be working properly if there is some mistaken in the
upgrade process. You are NOT advised to perform firmware upgrade if you have not received
any training from ALTAI or its partners.
48
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Figure 43
Figure 44
49
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Make sure your computer LAN Connection IP address is configured as 192.168.1.2. The IP
address of your LAN can be found in LAN connection status.
First, click Start -> Control Panel -> Network Connections. Double click on Local Area
Connection. Under General tab, the Status should be displayed as Connected. If not, please
check the network cable connection or replace the network cable.
Then, click on Support tab. Address type should be Manually Configured and it shows the IP
address.
If the ping result appears request timed out, please verify the network cable connection.
Q2) Why C1n CPE mode cannot associate to my AP?
Verify the SSID, authentication and cipher mode are correctly configured.
Make sure the AP side MAC address filter has included the C1n 2.4GHz radio MAC
address or the filter is disabled.
Verify the network cable between C1n and laptop is working properly.
50
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Q3) Why my laptop cannot access to Internet through C1n CPE mode?
Check if WDS is enabled on AP side. If WDS is not enabled and it is not used, WDS
should be disabled on C1n. Otherwise, WDS should be enabled on AP side. Please notice
that WDS has to be enabled for certain applications.
51
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
8 GLOSSARY
802.1q IEEE 802.1Q was a project in the IEEE 802 standards process to develop a mechanism
to allow multiple bridged networks to transparently share the same physical network link
without leakage of information between networks (i.e. trunking). IEEE 802.1Q is also the
name of the standard issued by this process, and in common usage the name of the encapsulation
protocol used to implement this mechanism over Ethernet networks. This protocol allows for
individual VLANs to communicate with one another with the use of a layer-3 (network) router.
802.11 802.11 refers to a family of specifications developed by the IEEE for wireless LAN
technology. 802.11 specifies an over-the-air interface between a wireless client and a base
station or between two wireless clients. The IEEE accepted the specification in 1997.
802.11a An extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in
the 5GHz band. 802.11a uses an Orthogonal Frequency Division Multiplexing (OFDM)
encoding scheme rather than Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence
Spread Spectrum.
802.11b Also referred to as 802.11 High Rate or Wi-Fi. It is an extension to 802.11 that
applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1
Mbps) in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b was a 1999 ratification to the
original 802.11 standard, allowing wireless functionality comparable to Ethernet.
802.11e A supplement to the IEEE 802.11 wireless LAN (WLAN) specification for
enhancements to the 802.11 Medium Access Control (MAC) to improve and manage Quality of
Service (QoS), provide Classes of Service (CoS), and enhanced security and authentication
mechanisms.
802.11g The 802.11g specification is a standard for Wireless Local Area Networks (WLANs)
that offers transmission over relatively short distances at up to 54 megabits per second (Mbps),
compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. Networks
employing 802.11g operate at radio frequencies between 2.400 GHz and 2.4835 GHz, the same
band as 802.11b. But the 802.11g specification employs Orthogonal Frequency Division
Multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed.
Computers or terminals set up for 802.11g can fall back to speeds of 11 Mbps. This feature
makes 802.11b and 802.11g devices compatible within a single network. Modification of an
802.11b access point to 802.11g compliance usually involves only a firmware upgrade.
802.11i A supplement to the IEEE 802.11 wireless LAN (WLAN) specification for enhanced
security through the use of stronger encryption protocols such as the Temporal Key Integrity
Protocol (TKIP) and AES Counter-Mode Cipher Block Chaining Message Authentication Code
Protocol (AES-CCMP). These protocols provide replay protection, cryptographically keyed
integrity checks, and key derivation based on the IEEE 802.1X port authentication standard.
ACL Access Control List: It is a table that tells a computer operating system which access
rights each user has to a particular system object, such as a file directory or individual file.
ad-hoc mode An 802.11 networking framework in which devices or stations communicate
directly with each other, without the use of an Access Point (AP). Ad-hoc mode is also
referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is
useful for establishing a network where wireless infrastructure does not exist or where services
are not required.
52
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
EIRP Effective Isotropic Radiated Power: Term for the expression of the performance of an
antenna in a given direction relative to the performance of a theoretical (isotropic) antenna and is
expressed in watts or dBW. EIRP is the sum of the power sent to the antenna plus antenna
gain.
encryption The conversion of information into a scrambled form that effectively disguises it
to prevent unauthorized access. Every encryption scheme uses some well-defined algorithm,
which is reversed at the receiving end by an opposite algorithm in a process known as
decryption.
Ethernet Baseband LAN specification invented by Xerox Corporation and developed jointly
by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use CSMA/CD and
run over a variety of cable types at 10 Mbps. Ethernet is similar to the IEEE 802.3 series of
standards.
FastRoamingTM The Trapeze Mobility System feature that quickly hands off a roaming user's
credentials. Mobility Exchanges in a Trapeze Mobility Domain pass each other this vital user
information to permit seamless roaming.
This allows 802.1X and non-802.1X,
MAC-authenticated devices, such as 802.11 phones, to roam quickly between Mobility
Exchanges.
FCC Federal Communications Commission: U.S. government agency that supervises, licenses,
and controls electronic and electromagnetic transmission standards. The FCC Rules in Title 47
of the Code of Federal Regulations govern telecommunications in the United States. Wireless
LANs must comply with Part 15 of the FCC rules, which are written specifically for RF devices.
firmware Software instructions set permanently or semipermanently in ROM.
FHSS Frequency Hopping Spread Spectrum: One of two types of spread spectrum radio
technology used in wireless LAN (WLAN) transmissions. The FHSS technique modulates the
data signal with a narrowband carrier signal that hops in a predictable sequence from
frequency to frequency as a function of time over a wide band of frequencies. Interference is
reduced, because a narrowband interferer affects the spread spectrum signal only if both are
transmitting at the same frequency at the same time. The transmission frequencies are
determined by a spreading (hopping) code. The receiver must be set to the same hopping code
and must listen to the incoming signal at the proper time and frequency to receive the signal.
FPGA
Field Programmable Gate Array: An FPGA is a specially made digital semiconductor
often used for prototyping. With an FPGA, a design engineer is able to program electrical
connections on site for a specific application, without paying thousands of dollars to have the
chip manufactured in mass quantities.
FTP File Transfer Protocol: Defined in RFC 959, it is a Application protocol that is part of the
TCP/IP protocol stack, used for transferring files between network nodes.
gateway In the IP community, an older term referring to a routing device. Today, the term
router is used to describe nodes that perform this function, and gateway refers to a
special-purpose device that performs an application-layer conversion of information from one
protocol stack to another.
handoff
The process of transferring the handling of that cellular call to the new base station.
54
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
PoE Power over Ethernet: A technology, defined in the developing IEEE 802.3af standard, to
deliver dc power over twisted-pair Ethernet data cables rather than power cords. The electrical
current, which enters the data cable at the power-supply end and comes out at the device end, is
kept separate from the data signal so neither interferes with the other.
Remote Bridge
RF Radio Frequency: Any frequency within the electromagnetic spectrum associated with
radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic
field is created that then is able to propagate through space. Many wireless technologies are
based on RF field propagation.
RFC Request For Comments: Document series used as the primary means for communicating
information about the Internet. Some RFCs are designated by the IAB as Internet standards.
Most RFCs document protocol specifications, such as Telnet and FTP, but some are humorous
or historical. RFCs are available online from numerous sources.
shared key authentication Shared key authentication supports authentication of STAs as
either a member of those who know a shared secret key or a member of those who do not.
Shared key authentication accomplishes this with the use of the WEP privacy mechanism.
Therefore, this authentication scheme is only available if the WEP option is implemented. The
required secret, shared key is presumed to have been delivered to participating STAs via a
secure channel that is independent of IEEE 802.11. During the shared key authentication
exchange, both the challenge and the encrypted challenge are transmitted. This facilitates
unauthorized discovery of the pseudorandom number (PRN) sequence for the key/IV pair used
for the exchange. Implementations should therefore avoid using the same key/IV pair for
subsequent frames.
56
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
SNMP Simple Network Management Protocol: SNMP forms part of the Internet Protocol
suite, as defined by the Internet Engineering Task Force (IETF). It is a Network management
protocol used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and
control network devices, and to manage configurations, statistics collection, performance, and
security.
SNMP2 Simple Network Management Protocol Version 2: Version 2 of the popular network
management protocol.
SNMP2 supports centralized as well as distributed network
management strategies, and includes improvements in the SMI, protocol operations,
management architecture, and security.
SSID Service Set Identifier: A 32-character (maximum) unique identifier attached to the
header of packets sent over a WLAN that acts as a password when a mobile device tries to
connect to the Basic Service Set.
STP Spanning-Tree Protocol: Bridge protocol that uses the spanning-tree algorithm, enabling
a learning bridge to dynamically work around loops in a network topology by creating a
spanning tree. Bridges exchange BPDU messages with other bridges to detect loops, and then
remove the loops by shutting down selected bridge interfaces. Refers to both the IEEE 802.1
Spanning-Tree Protocol standard and the earlier Digital Equipment Corporation Spanning-Tree
Protocol upon which it is based. The IEEE version supports bridge domains and allows the
bridge to construct a loop-free topology across an extended LAN. The IEEE version generally
is preferred over the Digital version.
subnet mask A 32-bit address mask used in IP to identify the bits of an IP address that are
used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only
those selected by the mask.
telnet The standard terminal emulation protocol within the TCP/IP protocol stack. Defined
in RFC 854, it is a method of remote terminal connection, enabling users to log in to remote
networks and use those resources as if they were locally connected.
throughput Rate of information arriving at, and possibly passing through, a particular point in
a network system.
VAP Virtual Access Point: It is a logical entity that exists within a physical Access Point (AP).
When a single physical AP supports multiple Virtual APs, each Virtual AP appears to stations
(STAs) to be an independent physical AP, even though only a single physical AP is present.
VLAN Virtual LAN: Group of devices on one or more LANs that are configured (using
management software) so that they can communicate as if they were attached to the same wire,
when in fact they are located on a number of different LAN segments. Because VLANs are
based on logical instead of physical connections, they are extremely flexible.
VLAN tag It works by tagging each frame, i.e. an Ethernet header extension that enlarges the
header from 14 to 18 bytes. The VLAN tag contains the VLAN ID and priority.
WDS can preserve the MAC address of client packets across links between accent points. WDS
have to be enabled when repeater AP WDS is enabled.
57
Commercially Confidential
C1n_Configuration_Manual_-_fm_1.0.0.x_for_US_&_Canada_20130116.doc
WEP Wired Equivalent Privacy: A security protocol for wireless local area networks
(WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of
security as that of a wired LAN. LANs are inherently more secure than WLANs because
LANs are somewhat protected by the physicalities of their structure, having some or all part of
the network inside a building that can be protected from unauthorized access. WLANs, which
are over radio waves, do not have the same physical structure and therefore are more vulnerable
to tampering. WEP aims to provide security by encrypting data over radio waves so that it is
protected as it is transmitted from one end point to another. However, it has been found that
WEP is not as secure as once believed. WEP is used at the two lowest layers of the OSI model
- the data link and physical layers; it therefore does not offer end-to-end security.
Wi-Fi Wireless Fidelity: Wi-Fi is a label for devices conforming to the IEEE 802.11b standard
for WLAN. The IEEE 802.11b standard has been published by the IEEE, which does not
perform conformance testing. In order to establish such a conformance testing process, the
Wi-Fi Alliance (formerly known as WECA) has been formed, which tests devices for
conformance with the IEEE 802.11b standard and issues the Wi-Fi label for conforming devices.
WME Wireless Multimedia Extensions: Also known as Wi-Fi Multimedia (WMM), it is a
Wi-Fi Alliance interpretability certification, based on the IEEE 802.11e draft standard. It
provides basic Quality of service (QoS) features to IEEE 802.11 networks. WMM prioritizes
traffic according to 4 AC (Access Categories) - voice, video, best effort and background.
However, it does not provide guaranteed throughput. It is suitable for simple applications that
require QoS, such as Wi-Fi Voice over IP (VoIP) phone.
WPA Wi-Fi Protected Access: WPA was created by the Wi-Fi Alliance in 2002, in part out of
impatience with the slow-moving IEEE 802.11i standard. The industry consortiums
consensus was that an alternative to WEP was needed quickly, and WPA was the result. To
avoid multiple standards and conflicts later on, WPA was designed from the get-go to be
compatible with IEEE 802.11i and was based on its early draft specifications.
58
Commercially Confidential