Page 36 / 69 Scroll up to view Page 31 - 35
30
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Wireless
Wireless-G Ethernet Bridge with 5-Port Switch
Wireless
Use the
Wireless
screen, shown in Figure 7-14, to customize advanced wireless settings and clone a MAC
address onto the Bridge.
Advanced Wireless
Transmission Rate - The default setting is
Auto
. The range is from 1 to 54Mbps.The rate of data transmission
should be set depending on the speed of your wireless network. You can select from a range of transmission
speeds, or you can keep the default setting,
Auto
, to have the Bridge automatically use the fastest possible
data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection
speed between the Bridge and another wireless-equipped device.
Authentication Type - The default setting is
Auto
. The choices are
Auto
,
Open
, and
Shared
. This setting
allows the Bridge to authenticate communication with the wireless devices in your network. With the Shared
key setting, all wireless devices must have the same WEP keys so that the Bridge and the client can
authenticate each other and start transmitting data. With the Open system setting, any device can join a
network without performing any security check. Using the Auto setting, the Bridge will automatically detect
whether a wireless device uses shared key or open system authentication, and then it will transmit data using
the appropriate authentication type.
RTS Threshold - This value should remain at its default setting of
2347
. The range is 0-2347 bytes. Should
you encounter inconsistent data flow, only minor modifications are recommended. If a network packet is
smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends
Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame.
After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the
right to begin transmission.
Fragmentation Threshold - This value should remain at its default setting of
2346
. The range is 256-2346
bytes. It specifies the maximum size for a packet before data is fragmented into multiple packets. If you
experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the
Fragmentation Threshold too low may result in poor network performance. Only minor modifications of this
value are recommended.
MAC Address
Cloning Mode - You can clone the MAC address of any network device onto the Bridge. To disable MAC
address cloning, keep the default setting,
Disable
. To use the MAC cloning feature, select
Enable
.
If you have enabled MAC cloning, then select
Auto
if you want to clone the MAC address of the device
Figure 7-14: Wireless Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 37 / 69
31
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Wireless
Wireless-G Ethernet Bridge with 5-Port Switch
currently connected to the Bridge’s LAN port. The Bridge will actively scan for a new MAC address to be
cloned whenever you disconnect and re-connect multiple devices to the Bridge through its LAN port. Select
Manual
if you want to specify a MAC address in the
Enter MAC Address
field. This is useful when the Bridge
is connected to multiple devices through the switch.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
Cancel
button to cancel your changes. Click the
Help
button for
additional on-screen information.
Switch Tab
These screens allow you to configure settings for the managed switch feature. The settings in the Switch tabs
should only be modified by advanced users.
Spanning Tree Protocol
This screen allows you to configure the Spanning Tree Protocol settings for the managed switch feature.
Spanning Tree
STP - Select
Enable
to enable the Spanning Tree Daemon or
Disable
to disable the Spanning Tree Daemon.
Max Age - Enter the timeout period for the information in each Hello message received from others.
Hello Time - Enter the Hello message broadcast interval. The Spanning Tree Hello message is used to
exchange the topology information between each Spanning Tree Daemon
Forward Delay - The bridge will start from the the block state and then change to listening, learning , then
forwarding. It will only forward packets in the forwarding state. Enter the delay defined by the time spent in
the listening and learning state.
Click the
Apply Global Setting
button to save your settings globally.
STP Table - For ports 1 through 6.
Priority - The priority of this port. The smaller the priority value, the higher the priority. If two ports form a
loop, the port with higher priority value will change to block state, thus break the loop.
Figure 7-15: Spanning Tree Protocol Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 38 / 69
32
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Wireless
Wireless-G Ethernet Bridge with 5-Port Switch
Cost - The path cost to forward packets from this port, it's usually inversely proportional to the speed of the
port.
State - The STP state determined by the Spanning Tree protocol. They are Blocking, Listening, Learning and
Forwarding. This is determined by the STP Daemon.
Click the
Apply Port Setting
button to save your settings per port. Click the
Cancel
button to cancel your
changes. Click the
Refresh
button to refresh your screen. Click the
Help
button for additional on-screen
information.
QOS
This screen is used to configure the Quality of Service (QOS), Storm Filtering, and Flow Control settings for the
managed switch feature.
Global QOS Mode - There are 4 output queues per port with different priority. This QOS setting will let user
choose between a more evenly distributed Weighted Fair Queue or a strict Priority scheme. With Priority
scheme, the packets in the higher priority queue will always be forwarded first. With Weighted Fair Queue, the
switch will forward the packets with a 8:4:2:1 ratio.
Diff Serv Map - Select which bit in the packets' diff serv field to map to IP Diff Serv priority.
802.1p PRI Map - Select which bit in the packets' 802.1p priority field to map to 802.1p priority.
Click the
Apply Global Setting
button to save your global settings.
QOS Port Setting - Ports 1 through 5 are the wired ports. Port 6 is the wireless port.
QOS Priority - Select how to determine the QOS priority of each packet.
IP Diff Serv - It will use the IPv4 Diff Serv/Tos field to determine the QOS priority if the packet is an IP packet.
Otherwise, the lowest priority will be used.
802.1p - It will use the VLAN Priority Field to determine the QOS priority. Otherwise, the lowest priority will be
used.
Critical/High/Medium/Low - This setting will set all packets coming into this port to this priority value. Critical
is the highest and Low is the lowest.
Ingress Rate Mode - This is used for rate limiting. We can limit packet rate entering a specific port. This mode
will choose which packets will be limited. The limit will be set in the
Ingress Rate
field.
Figure 7-16: QOS Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 39 / 69
33
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Wireless
Wireless-G Ethernet Bridge with 5-Port Switch
All Packets - This rate limit will be applied to all packets.
Flooded - This rate limit will be applied to
Flooded unicast
and
Multicast and Broadcast
packets.
Multicast - This rate limit will be applied to
Multicast and Broadcast
packets.
Broadcast - This rate limit will be applied to
Broadcast packets
only.
Ingress Rate - This setting allows you to choose the input data rate for a port. Packets exceeding this rate will
be dropped.
Egress Rate - This setting let user choose the output data rate for a port. Packets exceeding this rate will be
dropped.
Flow Control - When this feature is enabled, the wired LAN ports will exchange control packets with the
connected port before sending packets. If the other end is not able to process more packets , our sending port
will hold the packets. The mechanism will ensure that packets will not be lost on the wire. But it can still
cause congestion in other part of the network, so please use this with caution.
Click the
Apply Port Setting
button to save your settings per port. Click the
Cancel
button to cancel your
changes. Click the
Refresh
button to refresh your screen. Click the
Help
button for additional on-screen
information.
Switch Table
Use this screen to configure the switch address table settings for the managed switch feature, and to add or
delete static address table entries. Global ATU Setting is a global switch address table setting. Address Learning
is used to determine if the switch should automatically learn the mac address for the packets; the default is
enabled. Age Timer is is used to determine the idle time out of each address entry.
New Address Entry -Mac Address is the destination mac address. Output Port Vector is the output ports where
the packet should be routed to if there is a mac address match. Note, the packets can be routed to more than
1 port. The static address entry will be locked in the table and does not idle the timeout. To add entries, select
the port’s check box and click the
Add New Entry
button. To delete entries, select the port’s check box and
click the
Delete Selected Entry
button.
Static Address Table - This lists the static MAC address entries and the output port vector settings.
Address Table Dump - This is a complete dump of the address table, including both the dynamic learned
entries and static entries. If there is a topology change, click the
Flush Table
to button to remove all the
Figure 7-17: Switch Table Tab
Downloaded from
www.Manualslib.com
manuals search engine
Page 40 / 69
34
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Wireless
Wireless-G Ethernet Bridge with 5-Port Switch
dynamic learned entries to force it to learn again. It will only dump at most 64 entries per page. If there are
already 64 entries, use
Get Next Page
to get more pages.
Life Remaining - This is the life remaining before an idle time out. The value is 0-15. If the switch received any
packets with the same destination MAC address, then the life value will reset to 15. If the life value decreases
to 0, then it will be removed from the table. The idle timeout is configured in the Age Timer field.
A static address entry will appear as locked or locked multicast in the address table. An entry might also be
added by the bridge when certain protocol (eg. spanning tree) is enabled. That entry will have a management
subtitle.
VLAN
This screen is used to configure the 802.1q VLAN and port based VLAN feature, and to add and delete individual
802.1q VLAN entries.
Global VLAN Setting
Disable - This will disable all VLAN function.
802.1q Check - In this 802.1q mode, when a packet comes in, the switch will parse for it's VLAN tag first. If
the packet does not have a VLAN tag, the default VID of the inport will be used as its VLAN ID. If the final VLAN
ID is not listed in the VLAN table, this packet will be dropped. Otherwise, the switch will search the switch
address table for the egress (output) port. Once the egress port is determined, the member option will be
used to determine if the switch will add or remove the tag or drop the packets.
802.1q Secure - This is similar to the
802.1q Check
mode. But if the incoming port is not a member of this
VLAN ID, this packet will also be dropped.
Port Based - Each port has an outport vector that can be configured below. Packets can only exit the ports
that are enabled in the outport vector.
Click the
Apply Global Setting
button to save your global settings.
Port Based VLAN Setting
This is to set the Port Based VLAN Map. For each port, if the output field is checked, then packets are allowed
to exit that port. Packets are not allowed to enter and exit the same port.
Figure 7-18: VLAN Tab
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top