Compex Systems 802.11N manual Bridge mode Firewall Configuration Settings, Spanning Tree Protocol

Page 67

Spanning Tree Protocol:

Multiple interconnected bridges create larger networks using the IEEE 802.1d Spanning Tree Protocol (STP), which is used for finding the shortest path within network and to eliminate loops from the topology.

If the STP is turned on, the Bridge device will communicate with other network devices by sending and receiving Bridge Protocol Data Units (BPDU). STP should be turned off (selected by default) when the device is the only bridge on the LAN or when there are no loops in the topology as there is no sense for the bridge to participate in the Spanning Tree Protocol in this case.

Bridge mode Firewall Configuration Settings

Firewall functionality on bridge interface can be enabled using the "Enable Firewall" option. Bridge Firewall rules can be configured, enabled or disabled while using Firewall configuration window which is opened with the "Configure" button.

Firewall entries can be specified by using the following criteria: Interface the interface (WLAN or LAN) where filtering of the incoming/passing-through packets is processed;

IP Type sets which particular L3 protocol type (ICMP, TCP, UDP, P2P) should be filtered;

Source IP/mask is the source IP of the packet (specified within the packet header), usually it is the IP of the host system which sends the packets;

Source Port is the source port of the TCP/UDP packet (specified within the packet header), usually it is the port of the host system application which sends the packets;

Destination IP/mask is the destination IP of the packet (specified within the packet header), usually it is the IP of the system which the packet is addressed to;

Destination Port is the destination port of the TCP/UDP packet (specified within the packet header), usually it is the port of the host system application which the packet is addressed to.

Comments is the informal field for the comment of the particular firewall entry. Few words about the particular firewall entry purpose are saved there usually.

On flag enables or disables the effect of the particular firewall entry. All the added

firewall entries are saved in system configuration file, however only the enabled firewall entries will be active during the system operation.

New Firewall entries can be saved by activating Apply button or discarded by activating Cancel button in the Firewall configuration window.

All the active firewall entries are stored in the FIREWALL chain of the ebtables filter table, while the device is operating in Bridge mode.

Click Apply Setting and Save Changes button to save the changes made in the Network page.

Image 67
Contents Page Trademark Information FCC Notice Declaration of Conformity Table of Contents Status System TabIntroduction Overview the ProductVirtual AP Multiple Ssid Highly Secured Wireless NetworkUConfig Utility Point-to-Point & Point-to-MultiPoint SupportAccess Point WDS Mode Station Mode Point-to-Point Station WDS ModeRouter Mode Repeater WDS Mode Device Panel Views and Descriptions Features Status and IndicationsAntenna Alignment Install the HardwareAntenna Alignment Installation Direction Mount the Unit on a Pole Setup RequirementsPrepare Unit to mount to a pole Page For Windows 95/98/98SE/ME/NT Configure the IP AddressStep Select the Use the following IP address radio button For Windows XP/2000Click on the OK button to close all windows Access with uConfig Access the Web InterfaceStep It then opens the device home page. The Status Access with a Web Browser Step Navigation How to save changesMain Menu Bar Basic Network Tab LAN SetupNetwork Modes Bridging and Routing Primary DNS IP optional Enable the radio Basic Wireless TabBasic Wireless Settings Wireless Mode Country Code Access Point Parameters SettingsWireless Profile Local AP-ESSIDRate Aggressiveness Channel Spectrum WidthChannel Frequency Data RateRemote AP-ESSID Station Parameters SettingsRemote AP Preferred MAC Channel Scan List Wireless Adapter modePreshared Key Wireless SecurityWPA or WPA2 Authentication Cipher TypeAccounting Port Authentication PortPrimary Radius Server IP Secondary Radius Server IPUser Password Station, Station WDS, Repeater WDS mode IdentityUser Name IEEE802.1x Key Rotation IEEE802.1x SettingsIEEE802.1x Key Length WEP Key Authentication TypeKey Type Current KeyVirtual Access Point VAP Long Range Parameters Setup Advance Wireless TabLong Range Parameters Noise Immunity Signal Strength Indicator RssiAdvanced Network Tab NAT Setup Spanning Tree SetupAdding an entry from Known Server Adding an entry from Custom Server Rule Type select By IP or By MAC Bandwidth ControlRouter Info Protocol version select RIPv1 or RIPv2 Firewall Setup Outbound Filtering Setup Page Services Tab Ping Watchdog Auto-RebootWeb Http Security Snmp SetupNTP Setup Engine ID Default isSSH Access Setup Telnet Access SetupSystem Log Setup System Tab Firmware UpgradeRead-Only Username Administrative and Read-only AccountEnable Read-Only Account Host NameDevice Maintenance Configuration ManagementStatus Reporting StatusMain WAN Setting LAN SettingRadio Wlan Local AP Statistics Station Connection Status InfoWlan Connected Status Channel WidthPage Appendix I Network Bridge ModeNetwork Mode Selections Bridge Mode Network SettingsPrimary/Secondary DNS IP Bridge IP AddressDhcp Fallback IP Spanning Tree Protocol Bridge mode Firewall Configuration SettingsAP-Router mode Network Settings Appendix II Wireless with Router ModePage Port Forwarding Settings IP of the host system which sends the packets Page Advanced Wireless Setting Appendix III- Advanced SettingsRate Aggressiveness Acknowledgement Timeout LED Thresholds Configuration Signal Strength LED SettingsSnmp Agent Appendix IV- ServicesSystem Log NTP Client, Web, Telnet, SSH Server

802.11N specifications

Compex Systems 802.11N solutions are designed to provide high-performance wireless networking, catering to the growing demand for faster and more reliable connectivity in various applications. The 802.11N standard, also known as Wi-Fi 4, significantly enhances the capabilities of previous Wi-Fi standards by utilizing advanced technologies and features.

One of the key characteristics of Compex Systems 802.11N products is their support for Multiple Input Multiple Output (MIMO) technology. MIMO allows the transmission of multiple data streams simultaneously, effectively improving throughput and range. This is especially useful in environments with high user density or physical obstructions, as it enhances the signal quality and minimizes interference.

Another significant feature is the use of Channel Bonding, which combines two adjacent channels to double the data rate. This capability enables users to experience higher speeds, typically reaching up to 600 Mbps under optimal conditions. The dual-band operation, supporting both 2.4 GHz and 5 GHz frequencies, further enhances flexibility and performance. The 2.4 GHz band offers broader coverage, while the 5 GHz band provides faster speeds with less congestion.

Compex Systems also incorporates advanced security protocols in their 802.11N solutions. With support for WPA2 encryption and robust authentication methods, users can ensure that their connections remain secure, protecting sensitive data from potential threats.

Quality of Service (QoS) is another critical feature, allowing network administrators to prioritize traffic according to application needs. This ensures that bandwidth-intensive applications, such as video streaming and online gaming, receive the necessary resources for optimal performance, even in a crowded network environment.

Designed for versatility, Compex Systems 802.11N devices can be employed in various scenarios, including enterprise, education, healthcare, and hospitality sectors. Their compact and durable designs make them suitable for deployment in both indoor and outdoor settings.

Overall, Compex Systems 802.11N solutions offer a comprehensive set of features and technologies aimed at providing robust, high-speed wireless connectivity. With MIMO, Channel Bonding, dual-band support, enhanced security, and QoS capabilities, these systems are well-suited to meet the demands of modern wireless networking environments.