Lancom WLC-4006 User manual

LANCOM WLC-4006
LANCOM WLC-4025

© 2007 LANCOM Systems GmbH, Wuerselen (Germany). All rights reserved.
While the information in this manual has been compiled with great care, it may not be deemed an assurance of product
characteristics. LANCOM Systems shall be liable only to the degree specified in the terms of sale and delivery.
The reproduction and distribution of the documentation and software included with this product is subject to written per-
mission by LANCOM Systems. We reserve the right to make any alterations that arise as the result of technical develop-
ment.
All explanations and documents for registration of the products you find in the appendix of this documentation, if they
were present at the time of printing.
Trademarks
Windows®, Windows Vista™, Windows XP®and Microsoft®are registered trademarks of Microsoft, Corp.
The LANCOM Systems logo, LCOS and the name LANCOM are registered trademarks of LANCOM Systems GmbH. All other
names mentioned may be trademarks or registered trademarks of their respective owners.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http://www.openssl.org/.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
Subject to change without notice. No liability for technical errors or omissions.
LANCOM Systems GmbH
Adenauerstr. 20/B2
52146 Wuerselen
Germany
www.lancom.eu
Wuerselen, September 2007
110550/0907

LANCOM WLC-4006 - LANCOM WLC-4025
Preface
3
EN
Preface
Thank you for your confidence in us!
The WLAN Controllers LANCOM WLC-4025 and LANCOM WLC-4006 are
state-of-the-art hardware components for medium-scale WLAN-installation
management that is just as simple as it is secure. All settings are entered just
once into a central profile in the WLAN Controller—the rest is pure and simple
"Plug&Play". New Access Points are found automatically. All of the configura-
tion settings required for optimized wireless network operations, such as the
channel settings and security policies, are automatically transferred to all of
the Access Points. Operations are also monitored centrally (e.g. background
scanning) by the WLAN Controller.
Greatly simplified WLAN management offers significant costs savings. WLAN
networks are extended easily and securely simply by "plugging in" new access
points. Even remote sites can be seamlessly integrated—any IP connection
will do. Smaller sites also benefit from the RADIUS/EAP server integrated into
the LANCOM WLAN Controller.
At the same time the LANCOM WLAN Controllers ensure maximum security as
all of the LANCOM Access Points in the network strictly observe corporate
security policies automatically. Potential security loopholes are eliminated by
permanent monitoring across all company sites.
Special highlights of the LANCOM WLAN Controller include, among others:
"Smart controller" for application-related or user-related WLAN network-
ing
No separate cabling necessary—any IP connection will do
"Split management" for LANCOM WLAN Routers
Automatic discovery and commissioning of access points and WLAN rout-
ers
Central administration of WLAN configuration profiles
Monitoring and assurance of encryption and QoS policy
Integrated RF optimization
Full support of VLAN, RADIUS and 802.x/EAP functions
Integrated router, firewall and VPN gateway
Scalable by adding Controllers; redundancy included
Unparalleled operational reliability which prevents "single points of fail-
ure"

LANCOM WLC-4006 - LANCOM WLC-4025
Preface
4
EN
Security settings
To maximize the security available from your product, we recommend that you
undertake all of the security settings (e.g. firewall, encryption, access protec-
tion) that were not already activated when you purchased the product. The
LANconfig Wizard 'Security Settings' will help you with this task. Further infor-
mation is also available in the chapter 'Security settings'.
We would additionally like to ask you to refer to our Internet site
www.lancom.eu for the latest information about your product and technical
developments, and also to download our latest software versions.
User manual and reference manual
The documentation of your device consists of the following parts:
Installation guide
User manual
Reference manual
You are now reading the user manual. It contains all information you need to
put your device into operation. It also contains all of the important technical
specifications.
The reference manual can be found on the LANCOM product CD as an Acrobat
(PDF) document. It is designed as a supplement to the user manual and goes
into detail on topics that apply to a variety of models. These include, for exam-
ple:
The system design of the operating system LCOS
Configuration
Management
Diagnosis
Security
Routing and WAN functions
Firewall
Quality of Service (QoS)
Virtual Private Networks (VPN)
Virtual Local Networks (VLAN)
Wireless networks (WLAN)
Backup solutions
Further server services (DHCP, DNS, charge management)

LANCOM WLC-4006 - LANCOM WLC-4025
Preface
5
EN
This documentation was created by …
... several members of our staff from a variety of departments in order to
ensure you the best possible support when using your LANCOM product.
In case you encounter any errors, or just want to issue critics enhancements,
please do not hesitate to send an email directly to:
Our online services www.lancom.eu are available to you around the
clock should you have any queries regarding the topics discussed in
this manual or require any further support. The area 'Support' will
help you with many answers to frequently asked questions (FAQs).
Furthermore, the knowledgebase offers you a large reserve of infor-
mation. The latest drivers, firmware, utilities and documentation are
constantly available for download.
In addition, LANCOM support is available. For telephone numbers and
contact addresses of LANCOM support, please see the enclosed leaf-
let or the LANCOM Systems website.
Information symbols
Very important instructions. Failure to observe this may result in damage.
Important instruction that should be observed.
Additional information that may be helpful but which is not required.

LANCOM WLC-4006 - LANCOM WLC-4025
Contents
6
EN
Contents
1 Introduction 10
1.1 Centralized WLAN management 10
1.1.1 The CAPWAP standard 11
1.1.2 Smart controller technology 11
1.1.3 Communication between the Access Point and the WLAN
Controller 14
1.1.4 Zero-touch management 17
1.1.5 Split management 17
1.2 Just what can your LANCOM WLAN Controller do? 17
2 Installation 20
2.1 Package content 20
2.2 System requirements 20
2.2.1 Configuring the LANCOM devices 20
2.2.2 Operating access points in managed mode 21
2.3 Introducing the LANCOM WLAN Controller 21
2.3.1 Status displays 21
2.3.2 LC display 27
2.3.3 Device connectors 27
2.3.4 Hardware installation 29
2.4 Software installation 30
2.4.1 Starting Software Setup 30
2.4.2 Which software should I install? 31
3 Basic configuration 32
3.1 Which information is necessary? 32
3.1.1 TCP/IP settings 32
3.1.2 Configuration protection 34
3.2 Instructions for LANconfig 34
3.3 Instructions for WEBconfig 36
3.4 TCP/IP settings to workstation PCs 41

LANCOM WLC-4006 - LANCOM WLC-4025
Contents
7
EN
4 Configuring the WLAN Controller 43
4.1 Basic settings for the LANCOM WLAN Controller 43
4.1.1 Setting the time on the LANCOM WLAN Controller 44
4.1.2 Generating a default configuration 44
4.1.3 Assigning the default configuration to the new Access
Points 48
4.2 Extended settings 49
4.2.1 General settings 49
4.2.2 Profiles 50
4.2.3 List of Access Points 56
4.2.4 Options for the WLAN Controller 58
4.3 Further configuration details 61
4.3.1 Accept new Access Points into the WLAN infrastructure
manually 61
4.3.2 Manually removing Access Points from the WLAN infra-
structure 63
4.3.3 Inheritance of parameters 64
4.3.4 Backing up the certificates 65
4.3.5 Backing up and restoring further files from the SCEP-CA
67
4.3.6 Backup solutions 68
4.3.7 Load balancing between WLAN Controllers 73
4.3.8 Dynamic VLAN assignment 73
4.3.9 Checking WLAN clients with RADIUS (MAC filter) 75
4.3.10 Deactivating Access Points or permanently removing
them from the WLAN infrastructure 76
4.4 Displays and commands in LANmonitor 77
4.5 Configuring the Access Points 79

LANCOM WLC-4006 - LANCOM WLC-4025
Contents
8
EN
5 Security settings 81
5.1 Security for the Wireless LAN 81
5.1.1 Closed network 81
5.1.2 Access control via MAC address 82
5.1.3 LANCOM Enhanced Passphrase Security 82
5.1.4 Encryption of the data transfer 82
5.1.5 802.1x / EAP 83
5.1.6 IPSec over WLAN 83
5.2 Tips for handling keys 84
5.3 The security settings wizard 84
5.3.1 Wizard for LANconfig 85
5.3.2 Wizard for WEBconfig 85
5.4 The firewall wizard 85
5.4.1 Wizard for LANconfig 86
5.4.2 Configuration under WEBconfig 86
5.5 The security checklist 87
6 Setting up Internet access 91
6.1 Instructions for LANconfig 92
6.2 Instructions for WEBconfig 93
7 Linking two networks 94
7.1 What information is necessary? 94
7.1.1 General information 95
7.1.2 Settings for the TCP/IP router 96
7.1.3 Settings for NetBIOS routing 97
7.2 Instructions for LANconfig 97
7.3 1-Click-VPN for networks (site-to-site) 98
7.4 Instructions for WEBconfig 100

LANCOM WLC-4006 - LANCOM WLC-4025
Contents
9
EN
8 Providing dial-in access 101
8.1 Which information is required? 101
8.1.1 General information 101
8.1.2 Settings for TCP/IP 102
8.1.3 Settings for NetBIOS routing 102
8.2 Settings for the dial-in computer 103
8.3 Instructions for LANconfig 103
8.4 1-Click-VPN for LANCOM Advanced VPN Client 104
8.5 Instructions for WEBconfig 105
9 Appendix 106
9.1 Performance and characteristics 106
9.2 Contact assignment 107
9.2.1 Ethernet interface 10/100Base-TX 107
9.2.2 Configuration interface (Outband) 107
9.3 Declaration of conformity 108
10 Index 109

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
10
EN
1Introduction
1.1 Centralized WLAN management
The widespread use of wireless Access Points and wireless routers has made
accessing networks in businesses, universities and other organizations con-
siderably more convenient and flexible.
Yet in spite of the numerous advantages WLAN infrastructures offer, there are
still a number of unsettled issues:
All wireless Access Points must be configured and require appropriate
monitoring in order to recognize unwelcome WLAN clients, etc. The
administration of the Access Points, especially for larger WLAN infrastruc-
tures with the appropriate security mechanisms, requires advanced qual-
ifications and experience on the part of those responsible, and it ties up
considerable resources in the IT departments.
The manual customization of the configurations in the Access Points when
changes are made to the WLAN infrastructure can be time-consuming,
with the result that different configurations can be present in the WLAN
at the same time.
Combined utilization of the shared communications medium (air) requires
effective coordination of the Access Points to avoid frequency interference
and optimize network performance.
Access Points in public places pose a potential security risk because the
devices themselves and also the security-related data in them, such as
passwords, etc., are susceptible to theft. In addition, rogue Access Points
may be able to connect to the LAN unnoticed, bypassing the security pol-
icies that are in place.
Centralized WLAN management is the solution to these problems. The config-
uration of the Access Point is then no longer carried out in the devices them-
selves but by a central authority instead, the WLAN Controller. The WLAN
Controller authenticates the Access Points and transmits the correct configu-
ration to the approved devices. This allows for convenient configuration of the
WLAN from a central point and the changes to the configuration affect all of
the Access Points simultaneously. As the configuration provided by the WLAN
Controller is generally not stored in the Access Point's flash memory but in
RAM, security-related data cannot fall into the hands of unauthorized persons
in the event that devices are stolen. Only in "self-sufficient" operation (’Self-
sufficient operation’ →Page 53) is the configuration optionally saved for a

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
11
EN
defined period to flash memory (in an area that cannot be read out with
LANconfig or other tools).
1.1.1 The CAPWAP standard
The CAPWAP protocol (Control And Provisioning of Wireless Access Points)
introduced by the IETF (Internet Engineering Task Force) is a draft standard for
the centralized management of large WLAN infrastructures.
CAPWAP uses two channels for data transfer:
Control channel, encrypted with DTLS. This channel is used to exchange
administration information between the WLAN Controller and the Access
Point.
Datagram Transport Layer Security (DTLS) is an encryption protocol
based on TLS but, in contrast to TLS itself, it can be used for transfers
over less reliable transport protocols such as UDP. DTLS therefore
combines the advantages of the high security provided by TLS with the
fast transfer via UDP. This also makes DTLS suitable for the transfer of
VoIP packets (unlike TLS) because, even after the loss of a packet, the
subsequent packets can be authenticated again.
Data channel, optionally also encrypted with DTLS. The payload data from
the WLAN is transferred through this channel from the Access Point via
the WLAN Controller into the LAN—encapsulated in the CAPWAP proto-
col.
1.1.2 Smart controller technology
In a decentralized WLAN structure with stand-alone Access Points (operating
as so-called "rich access points") all functions for data transfer take place in
the PHY layer, the control functions in the MAC layer, and the management
functions are integrated in the Access Points. Centralized WLAN management
divides these tasks among two different devices:
The central WLAN Controller assumes the administration tasks.
The decentralized Access Points handle the data transfer at the PHY layer
and the MAC functions.
A RADIUS or EAP server can be added as a third component for authenti-
cation of WLAN clients (which can also be the case in stand-alone
WLANs).

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
12
EN
CAPWAP describes three different scenarios for the relocation of WLAN func-
tions to the central WLAN Controller.
Remote MAC: In this case, all of the WLAN functions are transferred from
the Access Point to the WLAN Controller. Here, the Access Points only
serve as "extended antennas" without independent intelligence.
Split MAC: With this variant, only a portion of the WLAN functions are
transferred to the WLAN Controller. Normally, realtime applications will
continue to be processed in the Access Point; the non-realtime applica-
tions are processed via the central WLAN Controller.
Management
Authentication
Realtime MAC
Non-realtime MAC
PHY layer
Antenna
Management
Authentication
Realtime MAC
Non-realtime MAC
PHY layer
Antenna
Management
Authentication
Realtime MAC
Non-realtime MAC
PHY layer
Antenna
Management
Authentication
Non-realtime MAC
Realtime MAC
PHY layer
Antenna

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
13
EN
Local MAC: The third possibility provides for complete management and
monitoring of the WLAN data traffic directly in the Access Points. The only
information exchanged between the Access Point and the WLAN
Controller are messages to ensure a uniform configuration of the Access
Points and to manage the network .
Smart Controller Technology from LANCOM Systems uses the local MAC pro-
cedure. Thanks to the reduction of centralized tasks, these WLAN infrastruc-
tures offer optimum scalability. At the same time, infrastructure of this type
prevents the WLAN Controller from becoming a central bottleneck that has to
process large portions of the overall data traffic. In remote MAC and split MAC
architectures, all payload data is forced to run centrally via the WLAN
Controller. However, in local MAC architectures data can alternatively be
directly released from the Access Points into the LAN, so providing high-per-
formance data transfer. This makes WLAN Controllers from LANCOM suitable
for WLANs adhering to the IEEE 802.11n standard, so offering significantly
higher bandwidths than conventional WLANs. During the release into the
Management
Authentication
Realtime MAC
Non-realtime MAC
PHY layer
Antenna
Management
Authentication
Realtime MAC
Non-realtime MAC
PHY layer
Antenna

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
14
EN
LAN, data can also be directly routed into special VLANs, which makes it very
easy to set up closed networks, such as for guest access accounts.
1.1.3 Communication between the Access Point and the WLAN
Controller
As of firmware version LCOS 7.20 there is a difference between
LANCOM Access Points (e. g. the LANCOM L-54ag) and LANCOM
Wireless Routers (e. g. the LANCOM 1811 Wireless) with regard to the
ex-factory standard settings in the WLAN modules. In the following
specifications, the general term Access Point will be used for the most
part.
Communication between an Access Point and the WLAN Controller is always
initiated by the Access Point. In the following cases, the devices search for a
WLAN Controller that can assign a configuration to them:
A LANCOM Access Point has the factory settings and is not yet configured.
In these settings the WLAN modules are deactivated; the Access Point
searches for a WLAN Controller in the LAN.
A LANCOM Access Point is already configured; at least one WLAN module
is manually set to operate as 'managed' (’Configuring the Access Points’
→Page 79). The Access Point searches for a WLAN Controller in the LAN
on behalf of the one or more corresponding WLAN modules.
A LANCOM Wireless Router is already configured; the operating mode is
manually set to 'managed' for at least one WLAN module. The wireless
router searches for a WLAN Controller in the LAN on behalf of the one or
more corresponding WLAN modules.
CAPWAP tunneling and layer-3 roaming
From one of the later LCOS versions, LANCOM WLAN Controllers also support transfer of the
payload data through a CAPWAP tunnel.
This allows selected applications such as VoIP to be routed via the central WLAN
Controller, for example. If WLAN clients change to a different radio cell, the underlying IP
connection will not be interrupted because it continues to be managed by the central
WLAN Controller (layer-3 roaming). In this way, mobile SIP telephones can easily roam
even during a call.
Managing data streams centrally can also make configuring VLANs at the switch ports
unnecessary in environments with numerous VLANs because all CAPWAP tunnels are cen-
trally managed on the WLAN Controller.

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
15
EN
The Access Point sends a "discovery request message" at the beginning of
communication to determine the available WLAN Controllers. This request is
sent as a broadcast. However, because in some structures a potential WLAN
Controller cannot be reached by a broadcast, special addresses from addi-
tional WLAN Controllers can also be entered into the configuration of the
Access Points.
DNS names of WLAN Controllers can also be resolved. All Access
Points with LCOS 7.22 or higher have the default name 'WLC-Address'
pre-configured so that a DNS server can resolve this name to a
LANCOM WLAN Controller. This also makes it possible to reach WLAN
Controllers that are not located in the same network, without having
to configure the Access Points.
From the available WLAN Controllers, the Access Point selects the best one
and queries it for the structure of the DTLS connection. For the Access Point,
the "best" WLAN Controller is the one with the least load, i.e., the lowest ratio
of managedAccess Points compared to the maximum possible Access Points.
In case of two or more equally "good" WLAN Controllers, the Access Point
selects the nearest one in the network, i.e., the one with the fastest response
time.
The WLAN Controller then uses an internal random number to determine a
unique and secure session key which it uses to protect the connection to the
Access Point. The WLAN Controller also automatically creates a self-signed
certificate for the Access Point with which it can later uniquely identify itself
to the WLAN Controller.
The Access Point is provided with the configuration for the integrated SCEP
client via the secure DTLS connection – the Access Point is then able to retrieve
its certificate from the SCEP CA via SCEP. Once this is done, the assigned con-
figuration is transferred to the Access Point.
SCEP stands for Simple Certificate Encryption Protocol; CA for Certifi-
cation Authority. Refer to the LCOS reference manual for further infor-
mation about digital certificates, CAs and SCEP.

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
16
EN
Authentication and configuration can both be carried out either automatically
or only with a corresponding entry of the Access Point's MAC address in the
AP table of the WLAN Controller. If the Access Point's WLAN modules were
deactivated at the beginning of the DTLS communication, these will be acti-
vated after successful transfer of the certificate and configuration (provided
they are not explicitly deactivated in the configuration).
The management and configuration data will then be transferred via the CAP-
WAP tunnel. The payload data from the WLAN client is then released in the
Access Point directly into the LAN and transferred, for example, to the server.
DTLS request
Access Point WLAN Controller
Certificate
Configuration
SCEP configuration
Management and configuration
Access Point
WLAN Controller
CAPWAP tunnel
Server
WLAN client
Payload
data
CAPWAP tunnel for payload data*
* Not yet available with early shipments
Payload data

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
17
EN
1.1.4 Zero-touch management
With their ability to automatically assign a certificate and configurations to
the requesting Access Points, LANCOM WLAN Controllers implement true
"zero-touch management". New Access Points now only need to be con-
nected to the LAN—no further configuration is necessary. This simplification
to only having to install devices reduces the workload for IT departments,
especially in decentralized structures, because no special IT or WLAN expertise
is required for the setup at the remote locations.
1.1.5 Split management
LANCOM Access Points can locate your WLAN Controller in distant net-
works—a simple IP connection, e. g., via a VPN path is all that is needed. As
the WLAN Controllers only influence the WLAN part of the configuration in the
Access Point, all other functions can be managed separately. This division of
the configuration tasks makes LANCOM WLAN Controllers perfect for building
a company-wide WLAN infrastructure at the headquarters that includes all
branch and home offices connected to it.
1.2 Just what can your LANCOM WLAN Controller do?
The following table provides a comparison of the properties and functions of
your device depending on the model.
LANCOM
WLC-
4006
LANCOM
WLC-
4025
WLAN controlling
Number of managed devices 6 25
Automatic detection of WLAN controllers by the LANCOM Access Points or WLAN routers ✔✔
Automatic or manual authentication of the Access Points ✔✔
Communication between controller and Access Points via simple IP connection with
CAPWAP
✔✔
Encryption of the control data with DTLS, including HW crypto accelerator ✔✔
Inheritance of configuration profiles, also multi-level ✔✔
Self-sufficient operations for continued operation even when the connection to the
WLAN Controller is interrupted.
✔✔

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
18
EN
Advanced routing and forwarding (ARF) with customized DHCP, DNS, routing, firewall
and VPN functions for these networks, assignment of the networks to SSIDs in the WLAN
profile via VLAN IDs.
16
networks
16
networks
Dynamic VLAN assignment for target user groups based on MAC addresses, BSSID or
SSID by means of an external RADIUS server.
✔✔
Integrated RADIUS server for MAC address list management ✔✔
Integrated EAP server for authentication of 802.1x clients using EAP-TLS, EAP-TTLS,
PEAP, MSCHAP or MSCHAPv2.
✔✔
Proxy mode for external RADIUS/EAP servers (forwarding and realm handling) ✔✔
802.11e / WME: Automatic VLAN tagging (802.1p) in the Access Points. Conversion to
DiffServ attributes in the WLAN controller, provided it is used as a layer-3 router
✔✔
Fast roaming via PMK caching and pre-authentication ✔✔
Further applications
Internet access ✔✔
LAN-LAN coupling over VPN ✔✔
RAS server (over VPN) ✔✔
IP router ✔✔
DHCP and DNS server (for each ARF network) ✔✔
N:N mapping for routing networks with the same IP-address ranges over VPN ✔✔
Configuring one LAN port as WAN port ✔✔
Policy-based routing ✔✔
NAT Traversal (NAT-T) ✔✔
PPPoE servers ✔✔
Layer 2 QoS tagging ✔✔
802.1p ✔✔
WAN connections
Connection for DSL modem ✔✔
LANCOM
WLC-
4006
LANCOM
WLC-
4025

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 1: Introduction
19
EN
LAN connection
Uplink interface for connection to the LAN.
Alternatively switchable as a LAN interface or as a WAN interface for connecting an SDSL
modem.
11
Separate Fast Ethernet LAN ports, individually switchable, e.g., as LAN switch or sepa-
rate DMZ ports; auto crossover.
Alternatively switchable as a WAN interface for connecting SDSL modems.
44
Security functions
IPSec encryption via external software (VPN client) ✔✔
5 integrated VPN tunnels for secure network connections ✔✔
DTLS and IPSec encryption via hardware ✔✔
IP masquerading (NAT, PAT) to conceal individual LAN workstations behind a single pub-
lic IP address.
✔✔
Stateful-inspection firewall ✔✔
Firewall filter for blocking individual IP addresses, protocols and ports ✔✔
MAC address filter regulates, for example, LAN-workstation access to the IP routing
function
✔✔
Protection of the configuration from brute-force attacks. ✔✔
Configuration
Configuration with LANconfig or via web browser; additional terminal mode for Telnet or
equivalent terminal programs; SNMP interface and TFTP server function.
✔✔
Serial configuration interface ✔✔
FirmSafe for no-risk firmware updates ✔✔
Optional software extensions
LANCOM WLAN Controller 12 Option for managing up to 12 access points ✔
LANCOM WLAN Controller 50 option for managing up to 50 Access Points ✔
LANCOM
WLC-
4006
LANCOM
WLC-
4025

LANCOM WLC-4006 - LANCOM WLC-4025
Chapter 2: Installation
20
EN
2 Installation
This chapter will assist you to quickly install hardware and software. First,
check the package contents and system requirements. The device can be
installed and configured quickly and easily if all prerequisites are fulfilled.
2.1 Package content
Before beginning with the installation, please check that nothing is missing
from your package. Along with the device itself, the box should contain the
following accessories:
If anything is missing, please contact your retailer or the address stated on the
delivery slip of the unit.
2.2 System requirements
2.2.1 Configuring the LANCOM devices
Computers that connect to a LANCOM must meet the following minimum
requirements:
Operating system that supports TCP/IP, e.g. Windows Vista™,
Windows XP, Millennium Edition (Me), Windows 2000, Windows 98,
Linux, BSD Unix, Apple Mac OS, OS/2.
LANCOM
WLC-4006
LANCOM
WLC-4025
Cable for integrated power supply ✔
Power adapter ✔
CAT5 LAN connector cable (green connectors) ✔✔
Connector cable for the configuration interface ✔✔
Rubber base, 19” mounting kit ✔
LANCOM CD ✔✔
Printed Installation Guide ✔✔
Printed User Manual ✔✔
Printed Reference Manual ✔
Other manuals for WLC-4006
1
This manual suits for next models
1
Table of contents
Other Lancom Network Hardware manuals
Popular Network Hardware manuals by other brands

Dell
Dell VxRail P670F Installation and service manual

INSIGHT
INSIGHT DLP SENSOR 300 Hardware installation guide

Nexcom
Nexcom NSA 7146 user manual

Matrix Switch Corporation
Matrix Switch Corporation MSC-HD84AAL product manual

BlueNet Video
BlueNet Video BB01 instruction manual

CheckMK
CheckMK Rail2 Mark I manual

HP
HP X1600 - StorageWorks Network Storage System 5.4TB SAS Model NAS... user guide

TechnoSpark Systems
TechnoSpark Systems NMEA 2000 Wifi Replicator user manual

ADTRAN
ADTRAN NetVanta 8044M Specifications

Nexcom
Nexcom FTA 5180 Series user manual

Cocoon
Cocoon HE190087 instruction manual

Enttec
Enttec Storm 8 Quick start manual