WLM2-G54Users Guide
5the Syslog server as a part of its administra-tive utilities, it is possible to use additional off-the-shelf Syslog server software.5.5 Easy Support
6system can be set with authenticated securityso that only the authorized tenants can accessthe network. Buffalo’s wireless solution canbe used as an
7mands. With a wireless LAN, any changes inthe factory’s machine layout can be com-pleted quickly. Wireless flexibility offersinstallation and opera
87.2 Environmental ResistanceThe WLM2-G54 AP’s high durability designallows resistance to environmental conditionslike temperature changes. Since it
95. After finding an AirStation, select Admin /Set IP address.6. Either enter the IP and Subnet Maskaddress in the boxes or select DHCP.7. Leave the P
108.6 Input Parameters Through theClient Manager1. Click the "Management" to open the nextpage.2. Click the "Time Settings" menu o
11possible to use any other off-the-shelfsoftware. Note: If the AirStation is alreadyconnected by Telnet or Client Manager, youcannot log in from th
12Manager or Terminal Software setupscreen.4. When login prompt appears, enter “root”as a default login name.5. Input "?"/press "Enter&
139.3 Time SettingsInput the correct time manually or input theNTP server on your network. Using NTPServer: Check ON box in NTP. Specify theNTP serve
14This enables reporting to the syslog server.Check the "ON" box if you want the systemlogs to be sent to the log server. The setupfor the
15Data forwarding can be delayed by a presetlength of time. The delay time value may befrom 4~30 seconds. The default value is 5seconds.9.5.4 “Hello
169.6.3 Routing Table EntriesSet routing information recognition andelimination. Check the item to be eliminated;then click "Delete Checked Ite
179.9.2 List of the Wireless PCsDisplays the PCs that are communicating withthe WLM2-G54. Check the "registration" boxand click the "c
184. You will need the Wireless MAC address ofthe target WLM2-G54. Enter its MACaddress in the field labeled"MAC Address of AirStation (Wireless
19Configure EAP in the Security/802.11gscreen. Note: For MAC Access Restriction, do notcheck the "Enable" box until you have set upAuthori
209.11.3 Interval of Checking ConnectionInterval timer to check connection withdestination host.9.11.4 Retry CountThe number of times a retry will be
2110.2.1 Unit Information(see previous page)Parameters used in the WLM2-G54:1. Model Name: The AirStation model nameand firmware version number2. AirS
22log related to the setup history from abrowser or Telnet session is recorded.10.2.5 Ping TestThe WLM2-G54 issues a ping test to thetarget PC in orde
23Additional InformationFor more information, please consult one of the following:• The on-line help system of your AirStation wireless system - for i
24Appendix A - Intelligent Access Point (WLM2-G54) SpecificationsFrequency Band 2.4GHz channel supportOperating Channels 11 channels; 20 MHz BW1:2412,
iWarning ...
25Appendix B - TroubleshootingThis appendix is divided into followingsections with each with it’s own specifictroubleshooting tips:• LED Activity on s
26Client: A PC or a workstation on a network.CRC (Cyclic Redundancy Check):Calculation method used to check theaccuracy of a digital transmission over
27of information that is sent in packets acrossthe Internet or Intranet.Infrastructure: A wireless network or othersmall network in which the wireles
28ROM (Read Only Memory): Permanentmemory.Router: A device that can connect individualLANs and remote sites to a server.Roaming: The ability to use a
29Notes:
30Notes:
Buffalo Technology Technical SupportWebUSAhttp://www.buffalotech.com/wirelessEUROPE http://www.buffalo-technology.comCHINA http://www.buffalo-china.c
ii9.4.2 Syslog Setup ...
iiiWarningThis section explains the symbols, signs and terminology used inthis manual.The following terminology is used in this manual to distinguishb
1PART I1.0 Introduction IThe WLM2-G54 protects customers’investments over the long term. Buffalo’s newWLAN product, WLM2-G54, is theIEEE802.11g-based
25.0 FeaturesThe Buffalo AirStation Intelligent access pointprovides the features necessary in today’sbusiness environment, with a high level ofreliab
3TKIP – Temporal Key Integrity Protocol is anadvanced encryption method using the RC4algorithm. Instead of using the sequential IV, arandom IV will b
45.2.3 Spanning Tree (IEEE802.1d)Network looping often results in repeatedpacket transmission, which causes overloadsand interruption of communicatio
Comments to this Manuals