3Com 802.11g 54Mbps Wireless LAN Building to Building Bridge User’s Guide Version 2.0 Outdoor: 3CRWEASYG73 Indoor: Part No.
Com Corporation 350 Campus Drive Marlborough MA USA 01752-3064 Copyright © 2005, 3Com Technologies. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Technologies.
CONTENTS ABOUT THIS GUIDE 1 2 3 3Com Corporation 5 Purpose 5 Prerequisite Skills and Knowledge 5 Conventions Used in this Document 6 3Com Corporation Technical Support 6 INTRODUCTION 7 Product Overview 7 Operating Modes 8 INSTALLING THE WIRELESS BRIDGE 9 Overview 9 Scope of Delivery 9 Hardware Installation Installing the 3CRWE920G73 Indoor Wireless Bridge Installing the 3CRWEASYG73 Outdoor Wireless Bridge Installing the 3CRWEASYG73/3CRWE920G73 Antenna Antenna Specification Connect
4 Wireless 43 Security 45 WDS links 48 Device Management 52 Device Information 52 System Access 53 STP 55 Time 56 SNMP 57 System tools 59 Backup/Restore 59 Upgrade 62 Reboot 65 Reset 65 Event Logs 66 Event Log Status 66 Event Log Setup 67 Event Log Filter 68 System Status 69 Statics 69 STP 71 STP Statics 71 STP Port 72 TROUBLESHOOTING Reset to Factory Default procedure 73 73 Setting IP Address Using 3Com Wireless Infrastructure Device Manager 73 Hardware and
ABOUT THIS GUIDE Purpose This document provides information and procedures on hardware installation, setup, configuration, and management of the 3Com Corporation 802.11g Wireless Bridge. Prerequisite Skills and Knowledge To use this document effectively, you should have a working knowledge of Local Area Networking (LAN) concepts and wireless Internet access infrastructures.
Conventions Used in this Document Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions. Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device. Warning Information that alerts you to potential personal injury.
1 INTRODUCTION Thank you for choosing the 3Com Corporation 802.11g Wireless LAN Building to Building Bridge. This manual will give you a short introduction to the device and its hardware and show you how to install and set up the Wireless Bridge. Product Overview Maximum Wireless Throughput The 3Com Corporation 802.11g Wireless Bridge offers the fastest wireless throughput in the 2.4GHz frequency band and delivers a data transmission rate up to 54Mbps, which is faster than any 802.11b Bridge.
Operating Modes The 3Com Corporation 802.11g Wireless Bridge can work in point-to-point and point-to-multipoint bridge modes: In these modes the Wireless Bridge connects two or more wired networks, for example networks in different buildings with no wired connections. You will need a 3Com 802.11g 54Mbps Building to Building Bridge on both sides of the connection. In this case, the Wireless Bridge acts as a network bridge between wireless and wired networks.
2 INSTALLING THE WIRELESS BRIDGE Overview This chapter provides installation instructions for the hardware and software components of the 3Com Corporation 802.11g Wireless Bridge. It also includes the following information: ♦ Package content ♦ Hardware installation ♦ Software installation Scope of Delivery Please ensure that the package is complete before beginning with the installation. The package should include the following: 3Com Corporation ♦ 3Com 802.
Hardware Installation Installing the 3CRWE920G73 Indoor Wireless Bridge On a flat surface 1. Find a surface that is clear of debris. 2. Set the bridge down on its four rubber feet. On a wall 1. Use the mounting template as a guide to make two marks 7.40cm (2.91 inches) apart on the wall. Use the vertical line on the template to ensure that the placement of the marks is plumb to the wall. 2. Drill holes at the marks.
On an acoustical ceiling 1. Attach the mounting bracket to the back of the bridge with two number 6 panhead screws. 2. Align the T-rail grips with the ceiling T-rail, and adjust them so that they grip the T-rails securely. 3. Tighten the screws on each T-rail grip. After installation, there may be some play in the fit of the T-rail grips if the T-rails are very narrow. If necessary, add a shim to achieve a secure grip.
Connect the antenna 1. Connect one end of the antenna cable to the antenna. 2. Connect the free end of the antenna cable to the connection on the bridge. Follow the instructions that come with the antenna and follow these general guidelines: 3Com Corporation ♦ For best performance, place the antenna using the mounting hardware provided with the antenna. Outdoor placement is especially important if the building is of metal construction or has metal siding.
3Com Corporation ♦ Position the antenna so that there are minimal obstacles between it and any other antenna with which it will communicate. While maintaining a direct line of sight between antennas is not strictly necessary, such an arrangement helps to ensure a strong signal. Ensure that access is available for routing the antenna cable from the antenna to the bridge. ♦ Make certain that the antenna and antenna mast are appropriately grounded.
Installing the 3CRWEASYG73 Outdoor Wireless Bridge Mount the Unit to a Mast Follow the instructions that come with the bridge mounting hardware and follow the general guidelines listed below. NOTE: Mast should extend above bridge 1 meter (3 ft) Recommended Pole Diameter = 2” – 2.5” Maximum Pole Diameter = 3” Bridge may be installed to freestanding or roof mounted mast 3Com Corporation ♦ For best performance, place the antenna outdoors using the mounting hardware provided with the antenna.
Align and Polarize the Units For optimal performance, position the antenna so that there are minimal obstacles between it and any other antenna with which it will communicate. While maintaining a direct line of sight between antennas is not strictly necessary, such a configuration helps to ensure a strong signal. As mentioned earlier, this is not always possible in long distance configurations.
Installing the 3CRWEASYG73/3CRWE920G73 Antenna The installation of indoor wireless links requires technical expertise. At the very least, you should be able to: • Install and configure the network components, such as the 3Com wireless bridge hardware. • Understand, or have a working knowledge of, installation procedures for network operating systems using Microsoft Windows. • Mount the indoor antenna. Antenna installation must be provided by professional installers.
Antenna Specification The following antennas and cables are available from 3Com Corporation: ♦ Antennas 3CWE492 2.5dBi ceiling mount 3CWE490 4 dBi Omni-directional 3CWE491 8 dBi Omni-directional 3CWE498 8 dBi sector panel 3CWE495 13 dBi Sector-Panel Directional 3CWE496 18 dBi Sector-Panel Directional 3CWE497 4dBi bi-directional Antenna Cables: NOTE: Because of power level restrictions, use of the 3CWE495 13dBi and 3CWE496 18dBi antennas is not allowed in some countries.
Connect to the Power Source and the Local Network 3CRWE920G73 Indoor Wireless Bridge Connect a twisted pair CAT5 Ethernet cable from the ”To Hub/Switch” port of the PoE Adapter to a free port on the hub or switch within the local network 3CRWEASYG73 Outdoor Wireless Bridge 3Com Corporation Page 18
LED Indicators After the correct connection, the power LED and the LAN link LED of the 3CRWE920G73 indoor bridge should light up. On the front of the Wireless Bridge you will find three LEDs. POWER WIRELESS ETHERNET 1. 2. 3.
Software Installation Insert the installation CD-ROM delivered with the 3Com WLAN Building to Building Bridge into your CD-ROM drive The installation wizard starts automatically and will guide you through the rest of the installation process. If the installation wizard does not start automatically, run “setup.exe” from the root directory of the installation CD.
Find your New Wireless Bridge To find your new Wireless Bridge, open the 3Com Wireless Infrastructure Device Manager (WIDMAN) utility. On start up, the dialog box will look like the Figure below: Click the ‘Refresh’ button and the 3Com Wireless Infrastructure Device Manager (WIDMAN) utility will begin to discover devices. After finding the new Wireless Bridge, it will appear in the list box. Choose the Wireless Bridge in the list box, and then click the ‘Configure…’ button.
After setting up a correct IP address for the device, you will be able to configure it through the WEB UI. The first time you configure the Wireless Bridge, you will see an initial Settings page. In this page, you will setup the username/password for administrator access. And you will select Country, antenna and cable Settings on this page as well. NOTE:1. Default USERNAME and PASSWORD are both ‘admin’. 2. Antenna and Cable settings only apply to indoor bridge.
Using the Diagnostic Utility The Diagnostic Utility will help you review the status of 3Com wireless bridge, do a site survey for discovering wireless device around the wireless bridge. The Diagnostic Utility must be installed on a computer that: ♦ Has a working Ethernet adapter. ♦ Is running one of the Windows operating systems of Win2000 and Win XP. ♦ Is on the same subnet as the wireless bridge. The device to be diagnosed using the Diagnostic Utility must be: ♦ Connected to power.
Figure 2 – Diagnostic Utility Main Page On the SysInfo page, you will see the system uptime, bridge MAC address and the Firmware version number.
To check the system performance information, click the Performance tab. Figure 3 – System Performances The Performance tab displays the CPU and memory usage information.
To check the WDS link information, click the WDS Info tab. Figure 4 – WDS Information On the WDS Info tab select a WDS link from the drop down menu to see statistics for that link. If there is no WDS link for the wireless bridge, the list box will be empty.
To check the interface statistics, click the Interface Info tab. Figure 5 – Interfaces Information The Interface Info page, displays the Ethernet and Wireless interface information of the wireless bridge.
To scan other wireless sites around the wireless bridge, click the Site Survey tab. On this page, click the Refresh button to scan the wireless site. NOTE: Doing a site survey will break all WDS links on the wireless bridge. An SNMP write privilege community string is required to do scanning. This can be input in the pop up dialog. Figure 6 – Site Survey The Site Survey page displays all other wireless sites.
3 WIRELESS BRIDGE CONFIGURATION Initialization The first login During initial power up and first login, you will need to configure the basic parameters of the bridge, such as the username, password and domain: 1. Connect a computer directly to the Bridge using standard Category 5 (CAT5) UTP Ethernet cable. 2. Open a Web browser on the computer. 3. In the Address or Location field: enter the IP address of a Bridge on the network. For example if the IP address is 192.168.1.1, type: http://192.168.1.
Accessing the Web Manager Interface To log in to the Wireless Bridge configuration interface, launch your browser and enter the IP address of your Wireless Bridge in the address field. The network identification dialogue appears: Figure 8 – Login Page Enter the administrator name and password, and then press the Login button.
Setup Wizard To easily configure your bridge step-by-step, click the Setup Wizard in the top menu bar. In this wizard you are able to configure these settings: ♦ Specify the SSID; ♦ Select the radio channel; ♦ Choose the security (None, WEP Security, TKIP PSK or AES PSK); Wireless Setup You can now enter the SSID and choose the radio channel: Figure 10 – Wireless Settings Wireless Network name (SSID) – specify the unique name for your wireless bridge.
Security Setup Choose the security method to protect your bridge connection. You can select WEP, WPA-PSK (TKIP), WPA-PSK (AES) or No security for your device. If no security is needed, simply choose the None radio button: Figure 11 – Security Settings Back – return to the previous wizard page. Next – continue the bridge setup process. Cancel – cancel the bridge setup process.
WEP To choose WEP encryption, select the Wired Equivalent Privacy (WEP) radio button. You can now choose key length and other Security. Figure 12 – WEP Encryption Settings Key Length – choose the shared Key length from the drop-down menu [64-bits (10 characters)/128-bits (26 characters)]. Key Format –choose the Key Format from the drop-down menu [Hex/ ASCII]. Pre-Shared Key – specify the shared secret. 5 colon-separated HEX (0-9, A-F, and a-f) pairs (e.g.
WDS Links Setup Figure 15 – WDS Links Settings Select the bridges whose channel is the same as your bridge, and then click Next button. Back – return to the previous wizard page. Next – continue the bridge setup process. Cancel – cancel the bridge setup process. NOTE: All WDS links use the same security settings.
Setup Finished After all configurations are completed, click the Finish button to complete the Setup Wizard. Figure 16 – Confirm Settings This Page shows the settings summary of Setup Wizard configuration. Back – return to the previous wizard page. Finished – to complete the setup wizard. Cancel – cancel the bridge setup process.
Device Summary General The General data for the bridge is displayed here. This page has the device information of the bridge, which is shown in the picture below. Figure 17 – General Information Device Name – specify new name value used for user authentication in the system [1-60 characters]. Location Password – specify new password value used for user authentication in the system [1-60 characters]. Contact – specify the name of the person/company responsible for the wireless bridge [1- 60 characters].
Internet This page shows all the current Internet setting information of this bridge. From the shown information, you can see which static IP or DHCP Server this bridge is using and other detailed information. Figure 18 – Internet Information LAN IP Address - Display IP address of this bridge. LAN Subnet Mask - Show subnet mask of the IP address. LAN Default Gateway - Show the gateway IP address of this bridge. DHCP Server - Show if the DHCP server is enabled.
Wireless The Wireless tab shows the wireless configuration information. Figure 19 – Wireless Information Country – Shows that this bridge is set for the standards of the chosen country. This item is read only. Wireless network name (SSID) – is a unique name for your wireless network [1-32 symbols]. The default SSID is “3Com” but you should change this to a personal wireless network name. The SSID is important to identify bridge to bridge connections when choosing TKIP PSK or AES PSK as the security type.
specified RTS threshold trigger the RTS/CTS mechanism. The NIC transmits packets smaller than this threshold without using RTS/CTS [[0-2347] default: 2347 (2347 means that RTS is disabled)]. Fragmentation Threshold (bytes) – the fragmentation threshold, specified in bytes, determines whether packets will be fragmented and at what size. On an 802.11 wireless LAN, packets exceeding the fragmentation threshold are fragmented, i.e., split into, smaller units suitable for the circuit size.
Save Configuration Save Configuration takes the changes you have made and loads them to the bridge so they are active. If you do not use the Save Configuration operation, and direct reboot device. All the changes you have done will be lost and no changes will be applied to the bridge.
Internet Settings IP Setup The IP Setup Configuration described below is required for device management. IP addresses can either be retrieved from a DHCP server or configured manually. Figure 22 – IP Settings If the Static IP radio button is selected, the static IP settings are displayed as follow: Figure 23 – Static IP Settings IP Address – specify the bridge’s IP address [digit and dots]. Subnet Mask – specify the bridge’s subnet mask [digit and dots].
DHCP Server If you want to use the internal DHCP server, first go to the Internet Settings IP Setup page to set the IP address to Static. It is strongly recommended that IP address setting is in the range of the DHCP server. Figure 24 – DHCP Server Setup Page Click the button On to enable the DHCP server. IP Pool Start Address – the first IP address in the range of addresses that you want to assign. IP Pool Start Address – the last IP address in the range of addresses that you want to assign.
Wireless Settings Wireless The Wireless Setup consists of two pages: Radio and Advanced. Radio part shows the basic settings of radio channel, and Advanced page shows the advanced information. (e.g. Beacon Interval is 100) Figure 25 – Wireless Setup Radio 17 Country – Shows this bridge is set to the regulatory requirements of that country. This item is read only.
Before changing radio settings manually, verify that these settings comply with government regulations. At all times, it is the responsibility of the end-user to ensure that the installation complies with local radio regulations. Refer to the appendix, Regulatory Domain section. Broadcast SSID – when selected, your bridge’s SSID is visible in the networks list while scanning the available networks for wireless client. When unselected, the bridge’s SSID is not visible in the available network list.
Fragmentation Threshold (bytes) – the fragmentation threshold, identifies in bytes, whether packets will be fragmented and at what size. On an 802.11 wireless LAN, packets exceeding the fragmentation threshold are fragmented, i.e., split into, smaller units suitable for the circuit size. Packets smaller than the specified fragmentation threshold value are not fragmented [[256-2346] default: 2346 (2346 means that fragmentation is disabled)]. Cancel – restore all previous values.
WEP WEP is a data privacy mechanism based on a 64-bit or 128-bit shared key algorithm as described in the IEEE 802.11 standard. Static WEP uses a symmetric scheme where the same key and algorithm are used for both encryption and decryption of data. The radio button Use WEP Encryption defines if encryption will be used or not. To enable WEP encryption, select this radio button.
WPA-PSK (AES) Advanced Encryption Standard, a symmetric 128-bit block data encryption technique. AES works at multiple network layers simultaneously. Figure 30 – WPA-PSK (AES) Settings Phrase – Setting the WPA-PSK (AES) key for encrypting data. 8 to 63 characters support. This value must be the same as the one on remote bridge.
WDS links The Wireless Bridge supports WDS (Wireless Distribution System) to act as bridges or repeaters. Choose the WDS Links menu if you want to setup bridge links between different bridges. The figure below shows all the bridges status: Figure 31 – WDS Links Status Table Peer address – displays the MAC address of the bridge. Name – specify the name of chosen WDS Link. SSID – is a unique name for your wireless network [1-32 characters].
Figure 32 – WDS Links Status Table Enable – select to add the Wireless Bridges to Wireless Distribution System. Peer address – displays the MAC address of the bridge. Name – specify the name of chosen WDS Link. SSID – displays the SSID of the bridge. Data Rates – displays the data rates that the bridge transmits data. RSSI – displays indicator for the signal strength of the link between the remote and local bridges. Note: usually 0 ~ -40 are perfect, the worst is around -90.
Add Bridge in WDS manually: When a WDS bridges is not shown in the WDS table automatically you can add it manually by entering the MAC address of the remote Bridge. And then click on the Add WDS Links button. Follow the example to see how to configure a WDS. Case 1 – Bridge with WDS (Wireless Bridge) Create the Wireless Bridge between two wired networks: BRIDGE1 can be configured to forward all data to BRIDGE2. BRIDGE1 and BRIDGE2 need to be changed to Bridge1 and Bridge2.
Case 2 – Bridge with WDS (Wireless Repeater) This example shows a configuration where one bridge relays all traffic wirelessly from one bridge to another bridge. In the picture below Station1 is connected to the wired LAN2 via Bridge2. Bridge1 act as a repeater between Bridge2 and Bridge3. Choose the Wireless MAC address Bridge2 and Bridge3 in the Bridge1 Web interface WDS Links menu under the Configuration.
Device Management Device Information You can use the Device Information to identify the bridge for yourself and other information of these devices which is shown in the picture below. Figure 33 – The device information of this bridge. Device Name – specify new name value used for user authentication in the system [1-60 characters]. Location Password – specify new password value used for user authentication in the system [1-60 characters].
System Access Use the Systems Access menu to change the name and password of the Administrator and User for any further configuration changes. Figure 34 – Change Administrator’s Name and Password Name – specify new name value used for user authentication in the system [3-16 characters]. New Password – specify new password value used for user authentication in the system [3-16 characters]. Confirm Password – re-enter the new password to verify its accuracy. Apply– Apply administrator’s password.
Figure 35 – Change User’s Name and Password Name – specify new name value used for user authentication in the system [3-16 characters]. New Password – specify new password value used for user authentication in the system [3-16 characters]. Confirm Password – re-enter the new password to verify its accuracy. Apply– Apply administrator’s password. Keep in mind that the Reset button will set the username and password back to default.
STP Set STP (Spanning Tree Protocol) parameters. Click the radio box button On to enable or button OFF to disable the STP function. If ON Status is enabled, you will then need setup the Forward Delay, Hello Time, Max Age and Priority for this device. Figure 36 – STP settings Page Forward Delay – is the time intervals (in seconds) in which all devices transmit a configuration message when this device becomes the root.
Time Displays the time setting of the Wireless Bridge. If this feature is not necessary, check the None radio box button. The Figure below shows Setting Time Manually Information: Figure 37 – Set Time Manually None – deny setting Wireless Bridge time manually. Setting Time manually – enable setting Wireless Bridge time manually. The format of the setting time is year/month/day hourminute:second, such as 2000/01/01 20:01:30.
SNMP SNMP is another way to manage the Wireless Bridge. In particular it provides the ability to send trap messages with notifications or alarms to a management system. You can configure the SNMP agent in Wireless Bridge to send SNMP traps to one or more SNMP managers. We provide two versions SNMP Management way, SNMP V1 and SNMP V3. SNMP V3 is more security than V1.
If you add one host address in this list, the device will send out SNMP Trap information to this host. To add a host into this list, specify the SNMP manager IP address. And then click the Add button. To delete a host from the SNMP Trap Host list, select the host IP address that should be deleted, and then click the Delete button.
System tools Backup/Restore Backup/Restore Configuration via HTTP Figure 41– Backup/Restore configuration via HTTP Click the Browser button to select a configuration file and then click the Restore button to upload it to the device by HTTP protocol. Or click the backup button to download the configuration file from device.
Backup/Restore Configuration via TFTP Before you backup or restore system configuration via TFTP, you should be sure that the TFTP Server which you assigned is in service first. If it is not, the backup or restore will not be successful and could damage the bridge. Figure 42 – Backup/Restore configuration via TFTP TFTP Server IP Address - The TFTP Server’s IP Address. File Name The configure file’s name you backup or restore. Apply - Apply the TFTP Server Settings. Backup - Backup system configuration.
Backup/Restore Configuration via FTP Before you backup or restore system configuration via FTP, you should be sure that the FTP Server which you assigned is in service first. If it is not, the backup or restore will not be successful and may damage the bridge. Figure 43 – Backup/Restore configuration via FTP FTP Server IP Address - The FTP Server’s IP Address. File Name - The configure file’s name you backup or restore. User Name - This user point to the ftp server account. Password - User’s password.
Upgrade Attention: To upgrade your bridge firmware, please use the original image 3Com Corporation provided. Upgrade Firmware via HTTP Figure 44 – Firmware Upgrade via HTTP Click Browse Button and select the firmware file. Then the Upgrade button will be active automatically and click it. After you confirm upgrade, Firmware Upgrade will begin and this page will jump to the page shown below which will show the upgrade process.
Upgrade Firmware via TFTP Before you upgrade firwware image via TFTP, you should be sure that the TFTP Server which you assigned is in service first. If it is not, the upgrade will not be successful and may damage the bridge. Figure 46 – Firmware Upgrade via TFTP TFTP Server IP Address - The TFTP Server’s IP Address. File Name - The configure file’s name you backup or restore. Apply - Apply the TFTP Server Settings. Upgrade - Upgrade System software.
Upgrade Firmware via FTP Before you upgrade via FTP, you should be sure that the FTP Server which you assigned is in service first. If it is not, the upgrade will not be successful and may damage the bridge. Figure 47 – Upgrade Firmware via FTP FTP Server IP Address - The FTP Server’s IP Address. File Name - The configure file’s name you backup or restore. User Name - This user point to the ftp server account. Password - User’s password. Apply - Apply the FTP Server Settings.
Reboot Figure 48 – Reboot Wireless Bridge Click Reboot button, the device will reboot after you confirm. Reboot will power down and power up the Bridge. It will not reset any configuration settings. Reset Figure 49 – Reset Wireless Bridge Click Reset button, the device will reset after you confirm – CAUTION: All configuration settings will be reset to factory.
Event Logs Event Log Status The event log system informs about internal services and provides debug messages in case of malfunctions or network problems. The trace system can help operators to locate miss configurations and system errors. Use the Event Log menu to view current Syslog messages in case of troubleshooting of one of the services: Figure 50– Event Log Status Clear – delete all displayed logged messages.
Event Log Setup This page provides two functions, first one is that you can backup up system logs via TFTP by setting the TFTP Server IP and file name manually. Second one is system logs can be automatically backup to an log server by setting the Remote Log Server. Figure 51– Event Log Setup TFTP Server IP Address - The TFTP Server’s IP Address. File Name - The configure file’s name you backup or restore. Apply - Apply the TFTP Server Settings. Backup - Backup system logs via TFTP.
Event Log Filter This page provides two filters, first one can filter logs by Logs Category. Second one can filter logs by Logs level. You could make the kernel to generate the event logs that you are interested, by selecting the combinations of check boxes in category and level. Figure 52– Event Log Filter Apply - Apply the Logs Filter Settings.
System Status Statics Interface Statistics Use the Interface Statistics menu for a summary of interface statistics. Figure 53 – Interface Statistics Interface – indicates a unique name for each interface. Status – shows the current operational state of the interface [up/down]. InOctets – indicates the amount of received bytes on the interface, including framing characters. InUcast – totals unicast frames received at the port excluding discards.
Wireless Statistics Use the Wireless Statistics menu to view information regarding data traffic for the Wireless interface. Figure 54 – Wireless Statistics Transmitted Fragments – displays the total of transmitted fragmented frames. Transmitted Multicasts – displays the total of transmitted multicast frames. Transmitted Frame Count – displays count of successfully transmitted MSDU (MAC Service Data Units). Failed Packets – displays the total of not transmitted MSDU.
WEP Undecryptable – displays the number of not decrypted frames. Refresh – Refresh local page and all the statistics. STP STP Statics This page shows the status of STP (Spanning Tree Protocol) function. Figure 55 – Spanning Tree Protocol Status 3Com Corporation STP Status – is the spanning tree function of this system was enabled or disabled. STP Version – is the STP version number. Time Since Topology Change - is the time since the spanning tree was last reconfigured.
Bridge FW Delay - is the time (in seconds) that all devices will wait before changing states when this device becomes the root. Root Cost - is the cost for a packet to travel to the root in the current Spanning Tree configuration. The slower the media, the higher the cost. This is 0 if your bridge is the root device. Root Port - is the index of the port on this switch that is closest to the root. This switch communicates with the root device through this port. This is 0 if your bridge is the root device.
4 TROUBLESHOOTING This section will help you locate problems related to setup. The most common installation problems relate to IP Addressing. IP Address management is fundamental. It is suggested that you create a chart to document and validate the IP addresses for your WLAN bridges. If the password is lost or forgotten, you will need to reset the Wireless Bridge to default values. The Reset Default procedure resets configuration settings, but does not change the current wireless bridge Image.
Initializing the IP Address using 3Com Wireless Infrastructure Device Manager After discovering the wireless bridge, you may use the 3Com Wireless Infrastructure Device Manager (WIDMAN) to configure the IP address for the wireless bridge. Once the IP Address has been assigned, use the HTTP Interface to complete the configuration. Use the following procedure to initialize the wireless bridge IP Address. 1. Open the 3Com Wireless Infrastructure Device Manager (WIDMAN), discover the wireless bridge. 2.
5 SPECIFICATIONS Regulatory domains Mexico is included in the Americas regulatory domain; however, channels 1 through 8 are for indoor use only while channels 9through 11 can be used indoors and outdoors. Users are responsible for ensuring that the channel set configuration compiles with the regulatory standards of Mexico. France is included in the EMEA regulatory domain; however, only channels 10 through 13 can be used in France.
Hardware Specification Interface Ethernet Interface Wireless 10/100 base-T RJ-45 Ethernet port for connection to LAN Standard Data Rate Indoor: 3CRWE920G73 Antenna connector Outdoor: 3CRWEASYG73 Integrated Antenna IEEE 802.11b & 802.11g simultaneously (2.4GHz ISM band) 1, 2, 5.
Software Specification 3Com Corporation ♦ Support 802.11g, Wi-Fi complaint ♦ Wireless Bridge with Point-to-Point and Point-to Multi-Point connections ♦ Support WDS ♦ Supports WPA-PSK, with TKIP or AES (Advanced Encryption Standard) encryption ♦ 64/128 bit WEP ♦ DHCP Server/Client ♦ Hide SSID Broadcast ♦ Web Management Interface ♦ NTP Client ♦ SNMP Management (MIBII, 802.
6 GLOSSARY Symbols: 802.11: 802.11 is a family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). The original specification provides for an Ethernet Media Access Controller (MAC) and several physical layer (PHY) options, the most popular of which uses GFSK modulation at 2.4GHz, enabling data rates of 1 or 2Mbps.
G gateway: A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.
area served. the most popular e-mail products, Eudora. It's also built into the Netscape and Microsoft Internet Explorer browsers. L PPP: PPP (Point-to-Point Protocol) is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. PPP uses the Internet protocol (IP) (and is designed to handle others). It is sometimes considered a member of the TCP/IP suite of protocols.
purposes. PPTP: Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet. Effectively, a corporation uses a wide-area network as a single large local area network. This kind of interconnection is known as a virtual private network (VPN).
and FTP protocols allow to request specific files from remote computers, but not to actually be logged on as a user of that computer. U UAM: Universal Access Method is the current recommended methodology for providing secure web-based service presentment, authentication, authorization and accounting of users is a WISP network. This methodology enables any standard Wi-Fi enabled TCP/IP device with a browser to gain access to the WISP network.
REGULATORY INFORMATION The 3Com 802.11g Wireless LAN Building-to-Building Bridge must be installed and used in strict accordance with the manufacturer’s instructions as described in the user documentation that comes with the product. This device complies with the following radio frequency and safety standards.
Professional installation instruction 1. Installation personal This product is designed for specific application and needs to be installed by a qualified personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting. 2. Installation location The product shall be installed at a location where the radiating antenna can be kept 20 cm from nearby person in normal operation condition to meet regulatory RF exposure requirement. 3.