qpcom QP-WA354AG User manual

www.qpcom.com
User’s Manual
QP-WA354AG
802.11a/b/g Wireless
5-Port Access Point

FCC Certifications
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
yReorient or relocate the receiving antenna.
yIncrease the separation between the equipment and receiver.
yConnect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
yConsult the dealer or an experienced radio/TV technician for help.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void
the user’s authority to operate the equipment.
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) This device must
accept any interference received, including interference that may cause undesired operation.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of
20cm between the radiator and your body.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio
interference, in which case the user may be required to take adequate measures.
All trademarks and brand names are the property of their respective proprietors.
Specifications are subject to change without prior notification.

Table of Content
Introduction ............................................................................................................................ 1
FEATURES ............................................................................................................................. 1
APPLICATION......................................................................................................................... 2
PARTS NAMES AND FUNCTIONS ............................................................................................ 3
Hardware Connection............................................................................................................ 5
About the Operation Modes .................................................................................................. 6
AP MODE.............................................................................................................................. 6
CLIENT MODE (INFRASTRUCTURE)....................................................................................... 6
CLIENT MODE (AD-HOC)...................................................................................................... 7
BRIDGE MODE....................................................................................................................... 7
REPEATER ............................................................................................................................. 8
Configuration.......................................................................................................................... 9
LOGIN.................................................................................................................................... 9
STATUS.................................................................................................................................. 9
System............................................................................................................................. 10
Statistics.......................................................................................................................... 10
Active Client ................................................................................................................... 11
WIRELESS............................................................................................................................ 11
Basic Settings.................................................................................................................. 11
Advanced Settings........................................................................................................... 13
Security........................................................................................................................... 15
Access Control................................................................................................................ 17
TCP/IP................................................................................................................................19
Basic............................................................................................................................... 19
OTHER................................................................................................................................. 20
Upgrade Firmware......................................................................................................... 20
Reboot............................................................................................................................. 20
Save/Reload Settings....................................................................................................... 21
Password ........................................................................................................................ 23
System Log...................................................................................................................... 23

1
INTRODUCTION
This is an IEEE802.11a/b/g compliant 11 Mbps & 54 Mbps Ethernet Wireless Access
Point. The Wireless Access Point is equipped with five 10/100 M Auto-sensing Ethernet
ports for connecting to LAN and also for cascading to next Wireless Access Point.
This Access Point provides 64/128bit WEP encryption, WPA and IEEE802.1x which
ensures a high level of security to protects users’ data and privacy. The MAC Address
filter prevents the unauthorized MAC Addresses from accessing your Wireless LAN.
Your network security is therefore double assured.
The web-based management utility is provided for easy configuration that your wireless
network connection is ensured to be always solid and hassle free.
Features
•Five LAN ports for Wireless AP cascade
•Support WPA-PSK and WPA2-PSK
•Support AP client mode
•Support data rate automatic fallback
•Automatic channel selection
•Client access control
•Support 802.1x/Radius client with, TKIP, AES and TKIP_AES encryption
•Support IAPP
•Adjustable Tx power, Tx rate, and SSID broadcast
•Allow WEP 64/128 bit
•Web interface management
•Support System event log and statistics
•MAC filtering (For wireless only)
•Support wireless 802.11 SNMP management
•WatchDog timer to warm boot system

Application
Example 1
Example 2
2

Parts Names and Functions
1. Front Panel: (LED Indicators)
LED Status
Indicator Color Solid Flashing
1 Power Yellow Turns solid green when
the power is applied to
this device.
N/A.
2~6 LAN Yellow Turns solid Yellow when
the Ethernet cable is
connected the LAN port.
Receiving/
Sending data
7
WLAN Blue Turns solid Blue when
the power is applied to
this device.
Receiving/
Sending data
Table 1: LED Indicators
3

2. Rear Panel: Connection Ports
Port/button Functions
A (Factory)
RESET Press over 3 seconds to reboot this device.
Press for over 10 seconds to restore factory settings.
Performing the Factory Reset will erase all
previously entered device settings.
B~F LAN ports Use standard LAN cables (RJ45 connectors) to connect
your PCs to these ports.
If required, any port can be connected to another
hub. Any LAN port will automatically function as an
"Uplink" port when necessary.
G 12V DC Connects the power adapter plug
Table 2: Connection Ports
4

HARDWARE CONNECTION
Note: Before you starting hardware connection, you are advised to find an appropriate
location to place the Access Point. Usually, the best place for the Access Point is at the
center of your wireless network, with line of straight to all your wireless stations. Also,
remember to adjust the antenna; usually the higher the antenna is placed, the better will
be the performance.
1. Connect to your local area network: connect a Ethernet cable to one of the
Ethernet port (LAN1~LAN5) of this Wireless Access Point, and the other end to a
hub, switch, router, or another wireless access point.
2. Power on the device: connect the included AC power adapter to the Wireless Access
Point’s power port and the other end to a wall outlet.
3. Configure your PC: Make sure your local PC(s) has wireless network adapter(s)
installed.
5

ABOUT THE OPERATION MODES
This device provides four operational applications with AP, Bridge, Client (Ad-hoc),
Client (Infrastructure) and Repeater modes, which are mutually exclusive.
This device is shipped with configuration that is functional right out of the box. If you
want to change the settings in order to perform more advanced configuration or even
change the mode of operation, you can use the web-based utility provided by the
manufacturer as described in the following sections.
AP Mode
When acting as an access point, this device connects all the stations (PC/notebook with
wireless network adapter) to a wired network. All stations can have the Internet access if
only the Access Point has the Internet connection.
To set the operation mode to Access Point, please go to “Wireless JBasic Settings”, in
the “Mode” field click the down arrow bto select AP mode.
Client Mode (Infrastructure)
If set to Client (Infrastructure) mode, this device can work like a wireless station when it’s
connected to a computer so that the computer can send packets from wired end to wireless
interface.
To set the operation mode to Client (Infrastructure), please go to “Wireless JBasic
Settings”, in the “Mode” field click the down arrow bto select Client mode, and then
select “Network Type” as “Infrastructure”.
6

Client Mode (Ad-hoc)
If set to the Client (Ad-hoc) mode, this device can work like a wireless station when it is
connected to a computer so that the computer can send packets from wired end to wireless
interface. You can share files and printers between wireless stations (PC and laptop with
wireless network adapter installed).
To set the operation mode to Client (Ad-hoc), please go to “Wireless JBasic Settings”,
in the “Mode” field click the down arrow bto select Client mode, and then select
Network Type as “Ad-hoc”.
Bridge Mode
You will be able to connect two wireless LANs together under the Bridge mode. This only
works with another Wireless a/b/g Access Point. If enabled you must enter the MAC
address of that Wireless a/b/g Access Point.
To set the operation mode to Bridge mode, please go to “Wireless JBasic Settings”, in
the “Mode” field click the down arrow bto select Bridge mode.
7

Repeater
You will be able to repeat the wireless signal of the root access point. When enabled you
must enter the MAC address of the root access point.
To set the operation mode to Repeater mode, please go to “Wireless JBasic Settings”,
in the “Mode” field click the down arrow bto select Repeater mode.
8

CONFIGURATION
Login
1. Start your computer. Connect an Ethernet cable between your computer and the
Wireless Access Point.
2. Make sure your wired station is set to the same subnet as the Wireless Access Point,
i.e. 192.168.1.254
3. Start your WEB browser. In the Address box, enter the following:
HTTP://192.168.1.254
4. Enter admin in the Username column when you are prompted the login screen. No
password is required for the default setting.
The configuration menu is divided into four categories: Status, Wireless, TCP/IP,
and Other settings. Click on the desired setup item to expand the page in the main
navigation page. The setup pages covered in this utility are described below.
Status
In this screen, you can see the current settings and status of this Access Point. You
can change settings by selecting specific tab described in below.
9

System
System
Product Model Shows the product model name.
Firmware Version The current version of the firmware installed in this device.
Firmware Date Shows the firmware date.
Loader Version The SSID differentiates one WLAN from another, therefore,
all access points and all devices attempting to connect to a
specific WLAN must use the same SSID. It is case-sensitive
and must not exceed 32 characters. A device will not be
p
ermitted to join the BSS unless it can provide the unique
SSID. An SSID is also referred to as a network name because
essentially it is a name that identifies a wireless network.
Rome Driver Version Shows the Rome driver version.
Statistics
The Statistics table shows the packets sent/received over wireless and ethernet LAN
respectively.
10

Active Client
Shows the information of the devices that are currently associating with this Wireless
Access Point.
Wireless
Basic Settings
This page includes all primary and major parameters. Any parameter change will cause
the device to reboot for the new settings to take effect.
11

Alias Name The distinguishing name of this device, you
may change the default alias name by
entering a new one in this column.
Disable Wireless LAN Interface Check the box to disable the Wireless LAN
Interface, by so doing, you won’t be able to
make wireless connection with this Access
Point in the network you are located. In
other words, this device will not be visible
by any wireless station.
Band Choose a mode from the pull-down list.
•11b/g mixed: Select to allow both
wireless-b and wireless-g devices
on the network.
•11B only: Select to allow only
wireless-B devices on the network.
•11G only: Select to allow only
wireless-G devices on the network.
•11A only: Select to allow only
wireless-A devices on the network.
Mode This Wireless Access Point can support four
modes AP, Client, Bridge and Repeater.
Network Type When in Client mode, you can select
between Ad-Hoc and Infrastructure.
SSID The SSID differentiates one WLAN from
another; therefore, all access points and all
devices attempting to connect to a specific
WLAN must use the same SSID. It is case-
sensitive and must not exceed 32 characters.
A device will not be permitted to join the
12

BSS unless it can provide the unique SSID.
An SSID is also referred to as a network
name because essentially it is a name that
identifies a wireless network.
Channel Number Allow user to set the channel manually or
automatically.
If set channel manually, just select the
channel you want to specify.
If “Auto” is selected, user can set the
channel range to have Wireless Access Point
automatically survey and choose the channel
with best situation for communication.
The number of channels supported depends
on the region of this Access Point. All
stations communicating with the Access
Point must use the same channel.
Apply Changes Press to save the new settings on the screen.
Reset Press to discard the data you have entered
since last time you press Apply Change.
Advanced Settings
It is not recommended that settings in this page to be changed unless advanced users want
to change to meet their wireless environment for optimal performance
13

14
Fragment Threshold Fragmentation mechanism is used for improving the
efficiency when high traffic flows along in the wireless
network. If your 802.11g Wireless LAN PC Card often
transmit large files in wireless network, you can enter new
Fragment Threshold value to split the packet. The value
can be set from 256 to 2346. The default value is 2346.
RTS Threshold RTS Threshold is a mechanism implemented to prevent the
“Hidden Node” problem. “Hidden Node” is a situation in
which two stations are within range of the same Access
Point, but are not within range of each other. Therefore, they
are hidden nodes for each other. When a station starts data
transmission with the Access Point, it might not notice that
the other station is already using the wireless medium. When
these two stations send data at the same time, they might
collide when arriving simultaneously at the Access Point.
The collision will most certainly result in a loss of messages
for both stations.
Thus, the RTS Threshold mechanism provides a solution to
p
revent data collisions. When you enable RTS Threshold on
a suspect “hidden station”, this station and its Access Point
will use a Request to Send (RTS). The station will send an
RTS to the Access Point, informing that it is going to
transmit the data. Upon receipt, the Access Point will
respond with a CTS message to all station within its range to
notify all other stations to defer transmission. It will also
confirm the requestor station that the Access Point has
reserved it for the time-frame of the requested transmission.
If the “Hidden Node” problem is an issue, please specify the
packet size. The RTS mechanism will be activated if the data
size exceeds the value you set.. The default value is 2347.
Warning: Enabling RTS Threshold will cause redundant
network overhead that could negatively affect the
throughput performance instead of providing a remedy.
This value should remain at its default setting of 2347. Should you
encounter inconsistent data flow, only minor modifications of this
value are recommended.
Beacon Interval Beacon Interval is the amount of time between beacon
transmissions. Before a station enters power save mode, the
station needs the beacon interval to know when to wake up
to receive the beacon (and learn whether there are buffered
frames at the access point).
Data Rate By default, the unit adaptively selects the highest
p
ossible

15
rate for transmission. Select the basic rates to be used among
the following options: Auto, 1, 2, 5.5, 11or 54 Mbps. For
most networks the default setting is Auto which is the best
choice. When Auto is enabled the transmission rate will
select the optimal rate. If obstacles or interference are
p
resent, the system will automatically fall back to a lower
rate.
Preamble Type A preamble is a signal used in wireless environment to
synchronize the transmitting timing including
Synchronization and Start frame delimiter. In a “noisy”
network environment, the Preamble Type should be set to
Long Preamble. The Short Preamble is intended for
applications where minimum overhead and maximum
p
erformance is desired. If in a “noisy” network environment,
the performance will be decreased.
Hide SSID Select enabled to allow all the wireless stations to hide the
SSID of this router.
Tx Burst Select the check box to enable the Tx Burst function.
802.11g Protection The 802.11g standard includes a protection mechanism to ensure
mixed 802.11b and 802.11g operations. If there is no such kind of
mechanism exists, the two kinds of standards may mutually
interfere and decrease network’s performance.
AckTimeOut Maximum time, in microseconds, that the failover daemon
will wait for an ACK or NOACK message to be received
from the peer failover daemon. For each message the
failover daemon sends, the peer failover daemon sends an
ACK or NOACK message to indicate that the peer is still
functioning.
Default: 50 microseconds
Apply Change Press to save the new settings on the screen.
Reset Press to discard the data you have entered since last time
you press Apply Change.
Security
Here you can configure the security of your wireless network. Selecting different method
will enable you to have different level of security. Please note that by using any
encryption, by which data packet is encrypted before transmission to prevent data packets
from being eavesdropped by unrelated people, there may be a significant degradation of
the data throughput on the wireless link.

Authentication Type: Open System or Shared Key/Shared Key/Open System
If Open System or Shared Key/Shared Key/Open System is selected, users will have to
Set WEP keys with an encryption either WEP64 or WEP128. Only the Open System can
set the encryption to None (Without any WEP Key protection mechanism)
•HEX: If you are using hexadecimal numbers (0-9, or A-F).
•ASCII: If you are using ASCII characters (case-sensitive).
•Ten hexadecimal digits or five ASCII characters are needed if 64-bit WEP is used
•26 hexadecimal digits or 13 ASCII characters are needed if 128-bit WEP is used
Authentication Type: WPA-PSK/WPA2-PSK
If WPA-PSK/WPA2-PSK is selected, users will have to select the Encryption from the
pull-down list, TKIP, AES or TKIP_AES and then enter a passphrase.
16

Authentication Type: Open System with 802.1x/WPA-RADIUS/WPA2-RADIUS
If the Open System with 802.1x/WPA-RADIUS/WPA2-RADIUS is selected, users will
have to select the Encryption from the pull-down list, TKIP, AES or TKIP_AES and
configure a RADIUS server, the RADIUS Server will proceed to check the 802.1x
Authentication. Only the Open System with 802.1x can set the encryption to None
(Without any WEP Key protection mechanism)
Port Enter the RADIUS Server’s port number provided by your ISP. The
default is 1812
IP Address Enter the RADIUS Server’s IP Address provided by your ISP
Password Enter the password that the AP shares with the RADIUS Server
Apply Change Press to save the new settings on the screen.
Reset Press to discard the data you have entered since last time
you press Apply Change.
Access Control
17
When Enable Wireless Access Control is checked, only those clients whose wireless
MAC addresses listed in the access control list can access this Access Point. If the list
Table of contents
Other qpcom Wireless Access Point manuals
Popular Wireless Access Point manuals by other brands

Ruckus Wireless
Ruckus Wireless H510 Quick setup guide

Cisco
Cisco Meraki MR84 Hardware installation guide

SMC Networks
SMC Networks SMC EZ Connect g SMCWTK-G user guide

Ruckus Wireless
Ruckus Wireless Unleashed H320 Quick setup guide

Ubiquiti
Ubiquiti IsoStation AC quick start guide

Grandstream Networks
Grandstream Networks GWN7630LR Quick installation guide