Page 36 / 86 Scroll up to view Page 31 - 35
36
The following table describes the labels in this screen.
LABEL
DESCRIPTION
ESSID
The ESSID (Extended Service Set Identification) is a unique name to identify the
BIPAC-5100/5100W in the wireless LAN. Wireless stations associating to the
BIPAC-5100/5100W must have the same ESSID.
Enter a descriptive name (up to 32 characters).
Hide ESSID
Select
Yes
to hide the ESSID in so a station cannot obtain the ESSID through passive
scanning.
Select
No
to make the ESSID visible so a station can obtain the ESSID through
passive scanning.
Channel ID
The range of radio frequencies used by IEEE 802.11b wireless devices is called a
channel.
Select a channel from the drop-down list box.
RTS/CTS
Threshold
The RTS (Request To Send) threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the RTS/CTS
handshake. Setting this attribute to be larger than the maximum MSDU (MAC service
data unit) size turns off the RTS/CTS handshake. Setting this attribute to zero turns
on the RTS/CTS handshake.
Enter a value between 0 and 2432.
Fragmentation
The threshold (number of bytes) for the fragmentation boundary for directed
Page 37 / 86
37
Threshold
messages. It is the maximum data fragment size that can be sent.
Enter a value between 256 and 2432.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the
wireless network.
Select
Disable
to allow all wireless computers to communicate with the access points
without any data encryption.
Select
64-bit WEP
or
128-bit WEP
to use data encryption.
Key 1 to Key 4
The WEP keys are used to encrypt data. Both the BIPAC-5100/5100W and the
wireless stations must use the same WEP key for data transmission.
If you chose
64-bit WEP
, then enter any 5 ASCII characters or 10 hexadecimal
characters ("0-9", "A-F").
If you chose
128-bit WEP
, then enter 13 ASCII characters or 26 hexadecimal
characters ("0-9", "A-F").
You must configure all four keys, but only one key can be activated at any one time.
The default key is key 1.
IP Address
Enter the IP address of your BIPAC-5100/5100W in dotted decimal notation, for
example, 192.168.1.254 (factory default).
IP Subnet Mask
Type the subnet mask assigned to you by your ISP (if given).
RIP Direction
Select the RIP direction from
None
,
Both
,
In Only
and
Out Only
.
RIP Version
Select the RIP version from
RIP-1
,
RIP-2B
and
RIP-2M
.
Multicast
IGMP (Internet Group Multicast Protocol) is a session-layer protocol used to establish
membership in a multicast group. The BIPAC-5100/5100W supports both IGMP
version 1 (
IGMP-v1
) and
IGMP-v2
. Select
None
to disable it.
Back
Click
Back
to go to the main wireless LAN setup screen.
Apply
Click
Apply
to save your changes back to the BIPAC-5100/5100W.
Cancel
Click
Cancel
to begin configuring this screen afresh.
5.5 Configuring MAC Filter
The MAC filter screen allows you to configure the BIPAC-5100/5100W to give exclusive
access to up to 32 devices (Allow Association) or exclude up to 32 devices from accessing the
BIPAC-5100/5100W (Deny Association). Every Ethernet device has a unique MAC (Media
Access Control) address. The MAC address is assigned at the factory and consists of six pairs
of hexadecimal characters, for example, 00:AA:BB:00:00:02. You need to know the MAC
address of the devices to configure this screen.
To change your BIPAC-5100/5100W’s MAC filter settings, click Wireless LAN, MAC Filter to
open the MAC Filter screen. The screen appears as shown.
Page 38 / 86
38
The following table describes the labels in this menu.
LABEL
DESCRIPTION
Active
Select
Yes
from the drop down list box to enable MAC address filtering.
Action
Define the filter action for the list of MAC addresses in the MAC address filter table.
Select
Deny Association
to block access to the router, MAC addresses not listed will
be allowed to access the router. Select
Allow Association
to permit access to the
router, MAC addresses not listed will be denied access to the router.
MAC Address
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station that
are allowed or denied access to the BIPAC-5100/5100W in these address fields.
Back
Click
Back
to go to the main wireless LAN setup screen.
Apply
Click
Apply
to save your changes back to the BIPAC-5100/5100W.
Cancel
Click
Cancel
to begin configuring this screen afresh.
Page 39 / 86
39
Chapter 6
WAN Setup
802.11b is only supported for the BIPAC-5100W
This chapter describes how to configure WAN settings.
6.1 WAN Overview
A WAN (Wide Area Network) is an outside connection to another network or the Internet.
See the Wizard Setup chapter for more information on the fields in the WAN screens.
6.2 PPPoE Encapsulation
The BIPAC-5100/5100W supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is
an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a
broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up
connection using PPPoE.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for example Radius). PPPoE provides a login and
authentication method that the existing Microsoft Dial-Up Networking software can activate,
and therefore requires no new learning or procedures for Windows users.
One of the benefits of PPPoE is the ability to let you access one of multiple network services, a
function known as dynamic service selection. This enables the service provider to easily
create and offer new IP services for individuals.
Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires
no specific configuration of the broadband modem at the customer site.
By implementing PPPoE directly on the BIPAC-5100/5100W (rather than individual computers),
the computers on the LAN do not need PPPoE software installed, since the
BIPAC-5100/5100W does that part of the task. Furthermore, with NAT, all of the LANs’
computers will have access.
Page 40 / 86
40
6.3 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of
data from a remote client to a private server, creating a Virtual Private Network (VPN) using
TCP/IP-based networks.
PPTP supports on-demand, multi-protocol and virtual private networking over public networks,
such as the Internet.
6.4 Traffic Shaping
Traffic Shaping is an agreement between the carrier and the subscriber to regulate the
average rate and “burstiness” or fluctuation of data transmission over an ATM network. This
agreement helps eliminate congestion, which is important for transmission of real time data
such as audio and video connections.
Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells. This parameter
may be lower (but not higher) than the maximum line speed. 1 ATM cell is 53 bytes (424 bits),
so a maximum speed of 1 Mbps gives a maximum PCR of 2415 cells/sec. This rate is not
guaranteed because it is dependent on the line speed.
Sustained Cell Rate (SCR) is the mean cell rate of a bursty, on-off traffic source that can be
sent at the peak rate, and a parameter for burst-type traffic. SCR may not be greater than the
PCR; the system default is 0 cells/sec.
Maximum Burst Size (MBS) is the maximum number of cells that can be sent at the PCR. After
MBS is reached, cell rates fall below SCR until cell rate averages to the SCR again. At this
time, more cells (up to the MBS) can be sent at the PCR again.
The following figure illustrates the relationship between PCR, SCR and MBS.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top