Zte ZXR10 3800-8 User manual

ZXR10 WAS (V1.0) IP Wireless Access System
W140A Outdoor Wireless Access
Point/Bridge
User’s Manual
ZTE CORPORATION

ZXR10 WAS (V1.0) IP Wireless Access System
W140A Outdoor Wireless Access Point/Bridge
User’s Manual
Manual Version 20040325-R1.0
Product Version V1.0
Copyright © 2003 ZTE Corporation
All rights reserved.
No part of this documentation may be excerpted, reproduced, translated, annotated or
duplicated, in any form or by any means without the prior written permission of ZTE
Corporation.
ZTE CORPORATION
ZTE Plaza, Keji Road South, Hi-Tech Industrial Park, Nanshan District, Shenzhen, P.R.China
Website: http://www.zte.com.cn
Postcode: 518057
Customer Support Center: (+86755) 26771900 800-9830-9830
Fax: (+86755) 26770801
Email: support@zte.com.cn
* * * *
S.N.: sjzl20040367

FAX:+86-755-26770160
Suggestions and Feedback
To improve the quality of ZTE product documentation and offer better services to our customers, we hope
you can give us your suggestions and comments on our documentation and fax this form to
+86-755-26770160; or mail to “Marketing center 3rd floor ZTE Plaza, Keji Road South, Hi-Tech Industrial
Park, Nanshan District, Shenzhen, P. R. China”. Our postcode is 518057.
Document name ZXR10 WAS (V1.0) IP Wireless Access System W140A Outdoor Wireless Access Point/Bridge
User’s Manual
Product version V1.0 Document version 20040325-R1.0
Equipment installation time
Your information
Name Company
Postcode Company address
Telephone E-mail
Presentation: How is information presented? (Introductions, procedures, illustrations, others)
□ Good □Fair □Average □ Poor □Bad
Accessibility: Can you find the information you want? (Table of contents, Index, headings,
numbering, others)
□ Good □Fair □Average □ Poor □Bad
Your evaluation
of this
documentation
Intelligibility: Can you understand it when you find it? (Language, vocabulary, readability, others)
□ Good □Fair □Average □ Poor □Bad
Presentation:
Accessibility:
Your suggestions
for improvement
of this
documentation
Intelligibility:
Your other
suggestions on
ZTE product
documentation


Preface
About This Manual
This manual is applicable to the ZXR10 WAS (V1.0) IP Wireless Access System
W140A Outdoor Wireless Access Point/Bridge (W140A for short below).
The ZXR10 WAS IP wireless access system is a proprietary product of ZTE
Corporation. It consists of a series of wireless access network products, such as
wireless network card, wireless Access Point (AP), wireless router, DSL 2-in-1 wireless
router and outdoor wireless access point/bridge.
This manual introduces the function features, installation, operation, use and
maintenance of the W140A, so it serves as instructions to the W140A. This manual
consists of 6 chapters and 2 appendixes.
Chapter 1, Safety Precautions, introduces the safety precautions of this product and
safety symbols used in this manual.
Chapter 2, Overview, presents functions, features and technical parameters of the
W140A.
Chapter 3, Structure and Principle, describes structure and principle of W140A.
Chapter 4, Installation and Debugging, deals with the installation and debugging
methods of the W140A.
Chapter 5, Command Line Configuration, covers the command line configurations of
the W140A.
Chapter 6: WEB configuration, presents the web configurations of W140A.
Chapter 7, Maintenance, puts forward the daily maintenance and version upgrade
methods of the W140A.
Appendix A, Packing, Transportation and Storage, outlines the packaging method,
storage conditions and transportation precautions of the W140A.
Appendix B, Making of Ethernet cables, introduces the power supply mode of W140A
Ethernet and making of Ethernet cables.
Conventions

Four striking symbols are used throughout this manual to emphasize important and
critical information during operation:
Danger, Warning, Caution and Note statements are
used throughout this manual to emphasize important and critical information. You must
read these statements to help ensure safety and to prevent product damage. The
statements are defined below.
Statement: The actual product may differ from what is described in this
manual due to frequent update of ZTE products and fast development of
technologies. Please contact the local ZTE office for the latest updating
information of the product.

-i-
Contents
1 Safety Precautions...................................................................................................................................1-1
1.1 Safety Precautions..........................................................................................................................1-1
1.2 Symbol Description........................................................................................................................1-2
2 Overview..................................................................................................................................................2-1
2.1 Preface............................................................................................................................................2-1
2.2 Functions and Features...................................................................................................................2-1
2.3 Technical Characteristics and Parameters ......................................................................................2-2
3 Structure and Principle...........................................................................................................................3-1
3.1 Structure and Working Principle ....................................................................................................3-1
3.1.1 Hardware Structure .............................................................................................................3-1
3.1.2 Software Structure...............................................................................................................3-1
3.2 Units/Components.......................................................................................................................... 3-2
3.3 Networking Modes......................................................................................................................... 3-3
4 Installation and Debugging....................................................................................................................4-1
5 Command Line Configuration...............................................................................................................5-1
5.1 Overview........................................................................................................................................5-1
5.2 User Mode...................................................................................................................................... 5-3
5.3 Privileged Mode.............................................................................................................................5-4
5.3.1 Command to Test Network Connectivity ............................................................................5-4
5.3.2 Command to Save Configurations to Flash.........................................................................5-4
5.3.3 Command to Reset Software...............................................................................................5-4
5.3.4 Command to Enter Configure Mode...................................................................................5-5
5.3.5 Command to Exit Privileged Mode..................................................................................... 5-5

-ii-
5.3.6 Command to Exit TELNET Configuration......................................................................... 5-5
5.4 Configure Mode............................................................................................................................. 5-5
5.4.1 Commands to Configure Wireless Access-Bridge.............................................................. 5-5
5.4.2 Command to Configure Bridge Information....................................................................... 5-6
5.4.3 Commands to Configure DHCP Server .............................................................................. 5-7
5.4.4 Discover commands............................................................................................................ 5-8
5.4.5 Commands to Configure 802.1X Parameters ..................................................................... 5-9
5.4.6 Command to Set User Password in Privileged Mode ....................................................... 5-12
5.4.7 Command to Delete Filtration Rules ................................................................................ 5-12
5.4.8 Command to Exit Configuration Mode ............................................................................ 5-13
5.4.9 Commands to Configure IAPP (Load-balance) ................................................................ 5-13
5.4.10 Interface Skip.................................................................................................................. 5-14
5.4.11 Commands to Configure Layer 2 Isolation..................................................................... 5-15
5.4.12 Commands to Configure IP network Parameters............................................................ 5-15
5.4.13 Command to Configure Log Print Information .............................................................. 5-16
5.4.14 Command to Configure MAC Filter............................................................................... 5-17
5.4.15 Command to Configure MAC Address Authentication .................................................. 5-18
5.4.16 Command to Configure Users ........................................................................................ 5-18
5.4.17 Commands to Configure Radius Server ......................................................................... 5-19
5.4.18 Command to Configure SNMP Module ......................................................................... 5-21
5.4.19 Command to Manage Telnet Idle Timeout ..................................................................... 5-25
5.4.20 Commands to Upload/download TFTP Files.................................................................. 5-25
5.4.21 Commands to Configure VLAN ..................................................................................... 5-26
5.4.22 Show Commands ............................................................................................................5-27
5.5 Ethernet Interface Configuration Mode .......................................................................................5-33
5.5.1 Configurations in the Ethernet Interface Mode................................................................. 5-33

-iii-
5.5.2 Command to Exit the Ethernet Interface Configuration Mode .........................................5-33
5.5.3 Command to Configure Ethernet interface IP addresses...................................................5-33
5.5.4 Command to Configure MAC filter for the Ethernet Interface .........................................5-34
5.6 Wireless Interface Configuration Mode .......................................................................................5-34
5.6.1 Command to Configure 80211b-related Parameters for the Wireless Interface................5-34
5.6.2 Command to Exit Wireless Interface Configuration Mode...............................................5-36
5.6.3 Command to Enable Link Integrity Detection ..................................................................5-37
5.6.4 WEP Configuration of the Wireless Interface ...................................................................5-37
5.6.5 Command to Configure MAC Filter in Wireless Interface Configuration........................5-38
5.6.6 Command to Configure Authentication Mode in Wireless Interface Configuration.........5-39
6 WEB Configuration................................................................................................................................6-1
6.1 Overview........................................................................................................................................6-1
6.2 Opening the login WEB page.........................................................................................................6-2
6.3 Main menu of WEB configuration.................................................................................................6-4
6.3.1 Home page (basic product information)..............................................................................6-4
6.3.2 Stations page .......................................................................................................................6-5
6.3.3 Statistics Page......................................................................................................................6-6
6.3.4 Load Balance page ..............................................................................................................6-6
6.3.5 SNMP page .........................................................................................................................6-7
6.3.6 Security page.....................................................................................................................6-12
6.3.7 Save page ..........................................................................................................................6-15
6.3.8 Reboot page.......................................................................................................................6-15
6.3.9 Advanced options page .....................................................................................................6-16
6.3.10 Accounts page .................................................................................................................6-23
6.4 Interfaces page .............................................................................................................................6-23
6.4.1 Ethernet Interface page .....................................................................................................6-24

-iv-
6.4.2 Wireless Interface page..................................................................................................... 6-25
6.5 Data submission flow for WEB configuration............................................................................. 6-27
7 Maintenance............................................................................................................................................ 7-1
7.1 Maintenance Descriptions ............................................................................................................. 7-1
7.2 Daily Maintenance......................................................................................................................... 7-2
7.3 Version Loading and Upgrade ....................................................................................................... 7-2
7.3.1 TFTP File Loading Commands........................................................................................... 7-3
Appendix A Package, Transportation and Storage................................................................................ A-1
A.1 Package ........................................................................................................................................ A-1
A.2 Transportation .............................................................................................................................. A-1
A.3 Storage ......................................................................................................................................... A-2
Appendix B Making of Ethernet Cable ...................................................................................................B-1
B.1 W140A System Application Modes ..............................................................................................B-1
B.2 Making of Ethernet Cables ...........................................................................................................B-2
B.2.1 Making of Straight Through Ethernet Cables (RJ45).........................................................B-2
B.2.2 Making of Straight Through Power Supply Ethernet Cables (C-RJ45-001)......................B-2
B.2.3 Making of Crossover Ethernet Cables (RJ45J) ..................................................................B-3
B.2.4 Ethernet Cable Label..........................................................................................................B-4

-i-
A List of Figures
Fig. 3.1-1 Appearance of W140A .....................................................................................................3-1
Fig. 3.1-2 W140A Software Structure...............................................................................................3-2
Fig. 3.2-1 W140A Rear Control Panel ..............................................................................................3-2
Fig. 3.3-1 Building Small Wireless LAN..........................................................................................3-3
Fig. 3.3-2 Building Internet Wireless Access Network with AC, Indoor AP and Outdoor Bridge....3-4
Fig. 3.3-3 Wireless Bridge Mode ......................................................................................................3-5
Fig. 4.1-1 Telnet to W140A ..............................................................................................................5-3
Fig. 5.1-1 Path diagram of WEB configuration ................................................................................6-2
Fig. 5.2-1 Login page for WEB configuration ..................................................................................6-3
Fig. 5.2-2 Alert box for prompting that someone has already logged in for WEB configuration.....6-3
Fig. 5.2-3 Alert box for prompting that the entered user name and password are incorrect .............6-4
Fig. 5.3-1 Home page (basic product information) ...........................................................................6-5
Fig. 5.3-2 Stations page.....................................................................................................................6-5
Fig. 5.3-3 Statistics page ................................................................................................................... 6-6
Fig. 5.3-4 Load Balance page ...........................................................................................................6-7
Fig. 5.3-5 Submenu for SNMP configuration ...................................................................................6-8
Fig. 5.3-6 Access mode configuration page of the SNMP module ...................................................6-8
Fig. 5.3-7 Access host configuration page of the SNMP module .....................................................6-9
Fig. 5.3-8 Community configuration page of the SNMP module ...................................................6-10
Fig. 5.3-9 System information configuration page of the SNMP module.......................................6-10
Fig. 5.3-10 Trap configuration page of the SNMP module............................................................. 6-11
Fig. 5.3-11 Trap sink configuration page of the SNMP module .....................................................6-12
Fig. 5.3-12 Submenu of security configuration...............................................................................6-12

-ii-
Fig. 5.3-13 MAC authentication configuration page ...................................................................... 6-13
Fig. 5.3-14 MAC filter rule configuration page.............................................................................. 6-14
Fig. 5.3-15 Stations Isolation page ................................................................................................. 6-14
Fig. 5.3-16 Save page ..................................................................................................................... 6-15
Fig. 5.3-17 Reboot page.................................................................................................................. 6-16
Fig. 5.3-18 Submenu of advanced options configuration ............................................................... 6-16
Fig. 5.3-19 Submenu of DHCP module.......................................................................................... 6-17
Fig. 5.3-20 DHCP server configuration page ................................................................................. 6-17
Fig. 5.3-21 IP pool page.................................................................................................................. 6-18
Fig. 5.3-22 802.11x configuration page.......................................................................................... 6-19
Fig. 5.3-23 Submenu of RADIUS server configuration ................................................................. 6-19
Fig. 5.3-24 ISP configuration page ................................................................................................. 6-20
Fig. 5.3-25 Authentication Server configuration page.................................................................... 6-21
Fig. 5.3-26 Accounting Server configuration page......................................................................... 6-21
Fig. 5.3-27 DNS configuration page............................................................................................... 6-22
Fig. 5.3-28 VLAN configuration Page ........................................................................................... 6-22
Fig. 5.3-29 Account configuration page .........................................................................................6-23
Fig. 5.4-1 Submenu for interface configuration.............................................................................. 6-23
Fig. 5.4-2 Submenu for Ethernet interface configuration ............................................................... 6-24
Fig. 5.4-3 IP address configuration page of Ethernet interface....................................................... 6-24
Fig. 5.4-4 Submenu for wireless interface configuration ............................................................... 6-25
Fig. 5.4-5 802.11b parameter configuration page of wireless interface.......................................... 6-25
Fig. 5.4-6 WEP configuration page of wireless interface ............................................................... 6-26
Fig. 5.4-7 Link integrity configuration page of wireless interface ................................................. 6-27
Fig. 5.5-1 The page for entering the password of privileged user .................................................. 6-28
Fig. 5.5-2 The page indicating that the privileged user password is incorrect................................ 6-28

-iii-
Fig. 5.5-3 A message indicating successful data submission ..........................................................6-29
Fig. 5.5-4 A message indicating failure in data submission............................................................6-29
Figure B.1-1 W140A System Application........................................................................................ B-1
Figure B.2-1 Straight through Ethernet label ...................................................................................B-4
Figure B.2-2 Label of the Straight Through Power Supply Ethernet Cable..................................... B-4
Figure B.2-3 Crossover Ethernet Cable Label ................................................................................. B-5


-i-
A list of Tables
Table 1.2-1 Safety Symbols and Descriptions...................................................................................1-3
Table 2.3-1 W140A Technical Indices ..............................................................................................2-3
Table B.2-1 Connections of Straight Through Ethernet Cables (RJ45) ........................................... B-2
Table B.2-2 Connections of Straight Through Power Supply Ethernet Cables (C-RJ45-001)......... B-3
Table B.2-3 Connections of Crossover Ethernet Cables (RJ45J)..................................................... B-3


1-1
1 Safety Precautions
This chapter introduces the safety precautions of this product and safety symbols used
in this manual.
1.1 Safety Precautions
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1)This device may not cause harmful interference,and
(2)this device must accept any interference received, including interference that
may cause undesired operation.
To assure continued compliance, (example –use only shielded interface cables when
connecting to computer or peripheral devices). Any changes or modifications not
expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
NOTE: This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This equipment is with high temperature and voltage, so only the professional

ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
1-2
personnel who had passed the training can install, operate and maintain it.
ZTE assumes no responsibility for consequences resulting from violation of general
specifications for safety operations or of safety rules for design, production and use of
equipment.
1.2 Symbol Description
See Table 1.2-1 for the safety symbols used in this manual, which serves to remind the
readers of the safety precautions to be taken when the equipment is installed, operated
and maintained.

Chapter Error! Style not defined. Error! Style not defined.
1-3
Table 1.2-1 Safety Symbols and Descriptions
Safety Symbol Meaning
Call for notice
Call for antistatic measures
Warn against electric shock
Caution against scald
Warn against laser
Caution against microwave
Four types of safety levels are available: danger, warning, caution and note. To the
right of a safety symbol is the text description of its safety level. Under the symbol is
the detailed description about its contents. The formats are as follows.
Danger:
Indicates an imminently hazardous situation which, if not avoided, will result in death
or serious injury. This signal word is to be limited to the most extreme situations.
Warning:
Indicates a potentially hazardous situation which, if not avoided, could result in death
or serious injury.
Caution:
Indicates a potentially hazardous situation which, if not avoided, could result in minor
or moderate injury. It may also be used to alert against unsafe practices.

ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
1-4
Note:
A Note statement is used to notify people of installation, operation, or maintenance
information that is important, but not hazard-related.
Tips:
Indicates a suggestion or hint to make things easier or more productive for the reader
Other manuals for ZXR10 3800-8
15
Table of contents
Other Zte Wireless Access Point manuals
Popular Wireless Access Point manuals by other brands

MikroTik
MikroTik RBD25G-5HPacQD2HPnD quick guide

ZyXEL Communications
ZyXEL Communications NWA-3100 user guide

Acksys
Acksys WiFi AirBox V2 Series Quick installation guide

Ruckus Wireless
Ruckus Wireless ZoneFlex 7372 How to set up

Bosslan
Bosslan BOSSW221 manual

D-Link
D-Link DAP-1360 Quick installation guide