Smc-networks ElliteConnect 2.4GHz/5GHz Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Sprzęt komputerowy Smc-networks ElliteConnect 2.4GHz/5GHz. SMC Networks ElliteConnect 2.4GHz/5GHz User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Outdoor Access Point/Bridge

38 TeslaIrvine, CA 92618Phone: (949) 679-8000EliteConnect™ Universal2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/BridgeThe easy way to make all

Strona 2 - Copyright

COMPLIANCESviiiSafety CompliancePower Cord SafetyPlease read the following safety information carefully before installing the wireless access point:WA

Strona 3 - LIMITED WARRANTY

System Configuration6-24CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to e

Strona 4

Advanced Configuration6-25CLI Commands for 802.1X Authentication – Use the 802.1X supported command from the global configuration mode to enable 802.1

Strona 5

System Configuration6-26Filter ControlThe wireless bridge can employ VLAN tagging support and network traffic frame filtering to control access to net

Strona 6 - EC Conformance Declaration

Advanced Configuration6-27traffic that has an unknown VLAN ID or no VLAN tag is dropped. When VLAN support is disabled, the wireless bridge does not t

Strona 7

System Configuration6-28Note: The specific configuration of RADIUS server software is beyond the scope of this guide. Refer to the documentation provi

Strona 8

Advanced Configuration6-29• Enable: Wireless bridge filters Ethernet protocol types based on the configuration of protocol types in the filter table.

Strona 9 - Community

System Configuration6-30you want to filter. To display the current settings, use the show filters command from the Exec mode.SNMPYou can use a network

Strona 10 - Safety Compliance

Advanced Configuration6-31SNMP – Enables or disables SNMP management access and also enables the wireless bridge to send SNMP traps (notifications). S

Strona 11 - OMPLIANCES

System Configuration6-32Trap Destination Community Name – The community string sent with the notification operation. (Maximum length: 23 characters; D

Strona 12

Advanced Configuration6-33AdministrationChanging the PasswordManagement access to the web and CLI interface on the wireless bridge is controlled throu

Strona 13 - (Germany):

COMPLIANCESixImportant! Before making connections, make sure you have the correct cord set. Check it (read the label on the cable) against the followi

Strona 14

System Configuration6-34CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode.Upgrading

Strona 15

Advanced Configuration6-35Before upgrading new software, verify that the wireless bridge is connected to the network and has been configured with a co

Strona 16

System Configuration6-36Firmware Upgrade Local – Downloads an operation code image file from the web management station to the wireless bridge using H

Strona 17

Advanced Configuration6-37Note: If you have upgraded system software, then you must reboot the wireless bridge to implement the new operation code.CLI

Strona 18

System Configuration6-38System Log The wireless bridge can be configured to send event and error messages to a System Log Server. The system clock can

Strona 19

Advanced Configuration6-39Logging Console – Enables the logging of error messages to the console.Logging Level – Sets the minimum severity level for e

Strona 20

System Configuration6-40CLI Commands for System Logging – To enable logging on the wireless bridge, use the logging on command from the global configu

Strona 21

Advanced Configuration6-41The wireless bridge acts as an SNTP client, periodically sending time synchronization requests to specific time servers. You

Strona 22

System Configuration6-42CLI Commands for SNTP – To enable SNTP support on the wireless bridge, from the global configuration mode specify SNTP server

Strona 23 - Introduction

Advanced Configuration6-43Wireless Distribution System (WDS)The IEEE 802.11 standard defines a WIreless Distribution System (WDS) for connections betw

Strona 24 - Package Checklist

COMPLIANCESxVeuillez lire à fond l'information de la sécurité suivante avant d'installer le wireless access point:AVERTISSEMENT: L’installat

Strona 25

System Configuration6-44Mode – The wireless bridge is set to operate as a Slave or Master unit:• Master Mode: In a point-to-multipoint network configu

Strona 26 - Hardware Description

Advanced Configuration6-45MAC Address – The physical layer address of the wireless bridge unit at the other end of the wireless link. (12 hexadecimal

Strona 27 - Ethernet Port

System Configuration6-46Bridge Aging Time – Changes the aging time for entries in the dynamic address table:• Ethernet: The time after which a learned

Strona 28 - Input Output

Advanced Configuration6-47CLI Commands for Bridging – The following example shows how to set the MAC address aging time for the wireless bridge.Spanni

Strona 29

System Configuration6-48device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root de

Strona 30

Advanced Configuration6-49Enable – Enables/disables STP on the wireless bridge. (Default: Enabled)Forward Delay – The maximum time (in seconds) this d

Strona 31 - Features and Benefits

System Configuration6-50Hello Time – Interval (in seconds) at which the root device transmits a configuration message. (Range: 1-10 seconds)• Default:

Strona 32 - System Defaults

Advanced Configuration6-51assigned to ports with slower media. (Path cost takes precedence over port priority.) • Range: 1-65535• Default: Ethernet in

Strona 33

System Configuration6-52Por t Fast (Fast Forwarding) – You can enable this option if an interface is attached to a LAN segment that is at the end of a

Strona 34

Advanced Configuration6-53CLI Commands for STP – The following example configures spanning tree paramters for the bridge and wireless port 5. AP(confi

Strona 35

COMPLIANCESxiBitte unbedingt vor dem Einbauen des Access Point die folgenden Sicherheitsanweisungen durchlesen (Germany):WARNUNG: Die Installation und

Strona 36

System Configuration6-54RSSI The RSSI value displayed on the RSSI page represents a signal to noise ratio. A value of 30 would indicate that the power

Strona 37 - Network Configuration

Advanced Configuration6-55RSSI – The RSSI value for a selected port can be displayed and a representative voltage output can be enabled.• Output Activ

Strona 38

System Configuration6-56Radio InterfaceThe IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wire

Strona 39 - Infrastructure Wireless LAN

Radio Interface6-57Radio Settings A (802.11a)The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 M

Strona 40

System Configuration6-58mode.SSID Broadcast – When enabled, the access point radio does not include its SSID in beacon messages. Nor does it respond t

Strona 41 - Bridge Link Topologies

Radio Interface6-59Auto Channel Select – Enables the wireless bridge to automatically select an unoccupied radio channel. (Default: Enabled)Transmit P

Strona 42

System Configuration6-60Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multi

Strona 43

Radio Interface6-61Maximum Associations – (Access point mode only) Sets the maximum number of clients that can be associated with the access point rad

Strona 44

System Configuration6-62AP(config)#interface wireless a 7-99Enter Wireless configuration commands, one per line.AP(if-wireless a)#description RD-AP#3

Strona 45 - Bridge Link Planning

Radio Interface6-63Radio Settings G (802.11g)The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the I

Strona 46

COMPLIANCESxiigegeben, wenn auch die an das Gerät angeschlossenen Geräte unter SELV-Bedingungen betrieben werden.•Stromkabel. Dies muss von dem Land,

Strona 47 - Antenna Height

System Configuration6-64with each other. For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1

Strona 48

Radio Interface6-65stop sending the SSID in beacon messages. Select a radio channel or set selection to Auto using the channel command. Set any other

Strona 49

System Configuration6-66Security (Bridge Mode)Wired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented for security in br

Strona 50 - Radio Interference

Radio Interface6-67Setting up IEEE 802.11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network.Be su

Strona 51 - Weather Conditions

System Configuration6-68Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the succes

Strona 52 - Grounding

Radio Interface6-69Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP. Also, a unique AES key can

Strona 53 - Hardware Installation

System Configuration6-70command. To view the current security settings, use the show interface wireless a command.Note: The index and length values us

Strona 54 - Mount the Unit

Radio Interface6-71CLI Commands for AES Security – From the 802.11a interface configuration mode, use the encryption command to enable AES encryption.

Strona 55

System Configuration6-72Security (Access Point Mode)A radio band set to access point mode is configured by default as an “open system,” which broadcas

Strona 56

Radio Interface6-73wireless clients. A summary of wireless security considerations is listed in the following table.Security MechanismClient Support I

Strona 57 - Connect External Antennas

xiiiTABLE OF CONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Package Checklist . . . . . . . . . . . . . . . . .

Strona 58

System Configuration6-74Note: Although a WEP static key is not needed for WEP over 802.1X, WPA over 802.1X, and WPA PSK modes, you must enable WEP enc

Strona 59 - Connect the Power Injector

Radio Interface6-75authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network.Aut

Strona 60

System Configuration6-76Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported

Strona 61 - Align Antennas

Radio Interface6-77four settings without having to update the client keys.Note: Key index and type must match that configured on the clients.The confi

Strona 62

System Configuration6-78show interface wireless a or show interface wireless g command.Note: The index and length values used in the key command must

Strona 63

Radio Interface6-79CLI Commands for WEP over 802.1X Security – From the 802.11a or 802.11g interface configuration mode, use the authentication comman

Strona 64

System Configuration6-80Wi-Fi Protected Access (WPA)WPA employs a combination of several technologies to provide an enhanced security solution for 802

Strona 65 - Initial Configuration

Radio Interface6-81when a RADIUS server has authenticated a user’s credentials will encryption keys be sent to the access point and client.Note: To im

Strona 66 - Initial Setup through the CLI

System Configuration6-82uses TKIP unicast data encryption keys for WPA clients and WEP unicast keys for WEP clients. The global encryption key for mul

Strona 67

Radio Interface6-83The WPA configuration parameters are described below:Authentication Type Setup – When using WPA, set the access point to communicat

Strona 68 - Setup Wizard

TABLE OF CONTENTSxivConnect External Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5Connect Cables to the Unit . . . . . . . . . .

Strona 69

System Configuration6-84• TKIP: TKIP provides data encryption enhancements including per-packet key hashing (that is, changing the encryption key on e

Strona 70

Radio Interface6-85The configuration settings for WPA are summarized below:CLI Commands for WPA Pre-shared Key Security – From the 802.11a or 802.11g

Strona 71

System Configuration6-86authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g

Strona 72

Status Information6-87Status InformationThe Status page includes information on the following items:AP StatusThe AP Status window displays basic syste

Strona 73

System Configuration6-88• System Up Time: Length of time the management agent has been up.• MAC Address: The physical layer address for this device.•

Strona 74

Status Information6-89• Radio Authentication Type: Shows the bridge is set as an open system.• 802.1X: Shows if IEEE 802.1X access control for wireles

Strona 75

System Configuration6-90Station StatusThe Station Status window shows wireless clients currently associated with the access point.The Station Status p

Strona 76

Status Information6-91• Associated: Shows if the station has been successfully associated with the access point. • Forwarding Allowed: Shows if the st

Strona 77 - Chapter 6

System Configuration6-92Event LogsThe Event Logs window shows the log messages generated by the wireless bridge and stored in memory.The Event Logs ta

Strona 78

Status Information6-93

Strona 79

TABLE OF CONTENTSxvEntering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Keywords and Arguments . . . . . . . . . . .

Strona 80 - System Identification

System Configuration6-94

Strona 81

7-1Chapter 7Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the wireless bridge via

Strona 82

Command Line Interface7-2gateway if you are managing the wireless bridge from a different IP subnet. For example:After you configure the wireless brid

Strona 83 - TCP / IP Settings

Entering Commands7-3Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Strona 84

Command Line Interface7-4Getting Help on CommandsYou can display a brief description of the help system by entering the help command. You can also dis

Strona 85

Entering Commands7-5The command “show interface ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword wit

Strona 86

Command Line Interface7-6Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display in

Strona 87

Entering Commands7-7Configuration CommandsConfiguration commands are used to modify wireless bridge settings. These commands modify the running config

Strona 88

Command Line Interface7-8Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain en

Strona 89 - PPPoE Settings

Command Groups7-9Command GroupsThe system commands can be broken down into the functional groups shown below.Command GroupDescription PageGeneral Bas

Strona 90

TABLE OF CONTENTSxviSystem Clock Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .7-28sntp-server ip . . . . . . . . . . . . . . . . . .

Strona 91

Command Line Interface7-10The access mode shown in the following tables is indicated by these abbreviations: GC (Global Configuration), IC-E (Ethernet

Strona 92

General Commands7-11Command Mode ExecExample Related Commands end (page 7-11)endThis command returns to the previous configuration mode.Default Settin

Strona 93

Command Line Interface7-12Example This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI sessi

Strona 94

General Commands7-13– Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop pinging.E

Strona 95

Command Line Interface7-14show historyThis command shows the contents of the command history buffer.Default Setting NoneCommand Mode ExecCommand Usage

Strona 96

System Management Commands7-15ExampleThe console port settings are fixed at the values shown below.System Management CommandsThese commands are used t

Strona 97

Command Line Interface7-16countryThis command configures the wireless bridge’s country code, which identifies the country of operation and sets the au

Strona 98

System Management Commands7-17Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand M

Strona 99

Command Line Interface7-18Example promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno p

Strona 100 - System Configuration

System Management Commands7-19system nameThis command specifies or modifies the system name for this device. Use the no form to restore the default sy

Strona 101 - Advanced Configuration

TABLE OF CONTENTSxviiWDS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-61wds channel . . . . . . . . . . . . . . . .

Strona 102 - Filter Control

Command Line Interface7-20ExamplepasswordAfter initially logging onto the system, you should set the password. Remember to record it in a safe place.

Strona 103

System Management Commands7-21Default Setting 80Command Mode Global ConfigurationExampleRelated Commandsip http server (page 7-21)ip http serverThis c

Strona 104

Command Line Interface7-22show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecExampleAP#show syst

Strona 105

System Logging Commands7-23show versionThis command displays the software version for the system.Default SettingNoneCommand Mode ExecExample System Lo

Strona 106

Command Line Interface7-24logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disa

Strona 107

System Logging Commands7-25Default Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of error message

Strona 108

Command Line Interface7-26Default Setting ErrorCommand Mode Global ConfigurationCommand Usage Messages sent include the selected level down to the Eme

Strona 109 - Administration

System Logging Commands7-27Default Setting 16Command Mode Global ConfigurationCommand Usage The command specifies the facility type tag sent in syslog

Strona 110

Command Line Interface7-28ExampleSystem Clock CommandsThese commands are used to configure SNTP and system clock settings on the wireless bridge.AP#sh

Strona 111

System Clock Commands7-29sntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command wi

Strona 112

CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for i

Strona 113

TABLE OF CONTENTSxviiidns server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-92ip address . . . . . . . . . . . . . . .

Strona 114 - System Log

Command Line Interface7-30sntp-server enableThis command enables SNTP client requests for time synchronization with NTP or SNTP time servers specified

Strona 115

System Clock Commands7-31sntp-server date-timeThis command sets the system clock.Default Setting 00:14:00, January 1, 1970Command Mode Global Configur

Strona 116

Command Line Interface7-32Command Usage The command sets the system clock back one hour during the specified period.Example This sets daylight savings

Strona 117

System Clock Commands7-33degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your

Strona 118

Command Line Interface7-34SNMP CommandsControls access to this wireless bridge from management stations using the Simple Network Management Protocol (

Strona 119

SNMP Commands7-35Default Setting • public - Read-only access. Authorized management stations are only able to retrieve MIB objects.• private - Read/wr

Strona 120

Command Line Interface7-36Example Related Commandssnmp-server location (page 7-38)snmp-server enable serverThis command enables SNMP management access

Strona 121

SNMP Commands7-37snmp-server host This command specifies the recipient of an SNMP notification. Use the no form to remove the specified host.Syntaxsnm

Strona 122

Command Line Interface7-38Example Related Commandssnmp-server enable server (page 7-36)snmp-server locationThis command sets the system location strin

Strona 123 - Spanning Tree Protocol (STP)

Flash/File Commands7-39show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleFlash/File CommandsThese commands are us

Strona 124

TABLE OF CONTENTSxixA Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . A-1B Specifications . . . . . . . . . . . . . . . . . . . .

Strona 125

Command Line Interface7-40bootfileThis command specifies the image used to start up the system.Syntaxbootfile <filename>filename - Name of the i

Strona 126

Flash/File Commands7-41copy This command copies a boot file, code image, or configuration file between the wireless bridge’s flash memory and a FTP/TF

Strona 127

Command Line Interface7-42•The destination file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (

Strona 128

Flash/File Commands7-43Default Setting NoneCommand Mode ExecCaution: Beware of deleting application images from flash memory. At least one application

Strona 129

Command Line Interface7-44Command Usage File information is shown below:Example The following example shows how to display all file information:Column

Strona 130

RADIUS Client7-45RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a c

Strona 131

Command Line Interface7-46Command Mode Global ConfigurationExample radius-server portThis command sets the RADIUS server network port. Syntaxradius-se

Strona 132 - Radio Interface

RADIUS Client7-47radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string>• secondary - Se

Strona 133 - Radio Settings A (802.11a)

Command Line Interface7-48Example radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS serve

Strona 134

Authentication7-49Example AuthenticationThe access point supports IEEE 802.1x access control for wireless clients. This control feature prevents unaut

Strona 135

TABLE OF CONTENTSxx

Strona 136

Command Line Interface7-50Client MAC addresses can also be used for authentication on the access point. For local MAC authentication, first define the

Strona 137

Authentication7-51802.1xThis command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to disable 802.1x

Strona 138

Command Line Interface7-52• When 802.1x is supported, the access point supports 802.1x authentication only for clients initiating the 802.1x authentic

Strona 139 - Radio Settings G (802.11g)

Authentication7-53Command Usage• The access point uses EAPOL (Extensible Authentication Protocol Over LANs) packets to pass dynamic unicast session an

Strona 140

Command Line Interface7-54Example802.1x session-timeoutThis command sets the time period after which a connected client must be re-authenticated. Use

Strona 141

Authentication7-55802.1x supplicantThis command sets the user name and password used for authentication of the access point when operating as a 802.1x

Strona 142 - Security (Bridge Mode)

Command Line Interface7-56Command ModeGlobal ConfigurationCommand Usage• Ethernet and WDS user names and passwords must be set before enabling the 802

Strona 143

Authentication7-57ExampleRelated Commandsaddress filter entry (page 7-57)show authentication (page 7-60)address filter entryThis command enters a MAC

Strona 144

Command Line Interface7-58ExampleRelated Commandsaddress filter default (page 7-56)show authentication (page 7-60)address filter deleteThis command de

Strona 145

Authentication7-59mac-authentication serverThis command sets address filtering to be performed with local or remote options. Use the no form to disabl

Strona 146

1-1Chapter 1IntroductionThe SMC EliteConnect Universal 2.4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge system consists of two models that p

Strona 147

Command Line Interface7-60mac-authentication session-timeoutThis command sets the interval at which associated clients will be re-authenticated with t

Strona 148 - Security (Access Point Mode)

WDS Commands7-61ExampleWDS CommandsThe commands described in this section are used to configure the WIreless Distribution System (WDS) forwarding tabl

Strona 149

Command Line Interface7-62wds channelThis command selects the radio band to be used for WDS forwarding (bridging).Syntaxwds channel <a | g | none&g

Strona 150

WDS Commands7-63Command ModeGlobal ConfigurationCommand Usage• You can only configure one MAC address per wireless port ID.• The Ethernet MAC address

Strona 151

Command Line Interface7-64show wdsThis command displays the current entries in the WDS forwarding table.Syntaxshow wdsCommand ModeExecExampleAP#show w

Strona 152

Bridge Commands7-65Bridge CommandsThe commands described in this section are used to set the MAC address table aging time and spanning tree parameters

Strona 153

Command Line Interface7-66bridge timeoutThis command sets the aging time for both the Ethernet port and the wireless interface.Syntaxbridge timeout &l

Strona 154

Bridge Commands7-67Default Setting Spanning tree is enabled.Command Mode Global ConfigurationCommand Usage The Spanning Tree Protocol (STP) can be use

Strona 155

Command Line Interface7-68Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) the

Strona 156

Bridge Commands7-69Command Mode Global ConfigurationCommand Usage This command sets the time interval (in seconds) at which the root device transmits

Strona 157

Introduction1-2In addition, both wireless bridge models offer full network management capabilities through an easy-to-use web interface, a command-lin

Strona 158

Command Line Interface7-70Command Usage This command sets the maximum time (in seconds) a device can wait without receiving a configuration message be

Strona 159

Bridge Commands7-71Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the highest pri

Strona 160

Command Line Interface7-72Command Usage • This command is used by the Spanning Tree Protocol to determine the best path between devices. Therefore, lo

Strona 161

Bridge Commands7-73• Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled.Example Relate

Strona 162

Command Line Interface7-74• Since end-nodes cannot cause forwarding loops, they can be passed through the spanning tree state changes more quickly tha

Strona 163 - Status Information

Bridge Commands7-75show bridgeThis command displays aging time and spanning tree settings for the Ethernet and wireless interfaces.Syntaxshow bridgeC

Strona 164

Command Line Interface7-76Filtering CommandsThe commands described in this section are used to control access to the management interface from the wir

Strona 165

Filtering Commands7-77Command UsageThis command can disable wireless-to-wireless communications between clients via the access point. However, it does

Strona 166 - Station Status

Command Line Interface7-78filter ethernet-type enableThis command checks the Ethernet type on all incoming and outgoing Ethernet packets against the p

Strona 167

Filtering Commands7-79filter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a

Strona 168 - Event Logs

Package Checklist1-3 • Outdoor pole-mounting bracket kit• Outdoor wall-mounting bracket kit• This User Guide Inform your dealer if there are

Strona 169

Command Line Interface7-80show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExamplePPPoE Com

Strona 170

PPPoE Commands7-81ip pppoeThis command enables Point-to-Point Protocol over Ethernet (PPPoE) on the Ethernet interface. Use the no form to disable PP

Strona 171 - Command Line Interface

Command Line Interface7-82Command Usage The access point uses a PPPoE connection, or tunnel, only for management traffic between the access point and

Strona 172

PPPoE Commands7-83Example Related Commandspppoe local ip (page 7-86)pppoe remote ip (page 7-86)pppoe ipcp dnsThis command requests allocation of IP ad

Strona 173 - Entering Commands

Command Line Interface7-84pppoe lcp echo-intervalThis command sets the Link Control Protocol (LCP) echo interval for the PPPoE tunnel.Syntaxpppoe lcp

Strona 174 - Getting Help on Commands

PPPoE Commands7-85pppoe lcp echo-failureThis command sets the Link Control Protocol (LCP) echo timeout for the PPPoE tunnel.Syntaxpppoe lcp echo-failu

Strona 175 - Using Command History

Command Line Interface7-86pppoe local ipThis command sets the local IP address for the PPPoE tunnel.Syntaxpppoe local ip <ip-address>ip-address

Strona 176 - Exec Commands

PPPoE Commands7-87Default Setting NoneCommand Mode Interface Configuration (Ethernet)Command Usage If the pppoe ip allocation mode is set to static, t

Strona 177 - Configuration Commands

Command Line Interface7-88Command Usage You must enter a user name with this command, and a password with the pppoe password command.Example Related C

Strona 178 - Command Line Processing

PPPoE Commands7-89pppoe service-nameThis command sets the service name for the PPPoE tunnel.Syntaxpppoe service-name <string>string - Service na

Strona 179 - Command Groups

Introduction1-4Hardware DescriptionEthernet PortRSSI Connector with Protective CapGrounding Point ScrewIntegrated AntennaBottom ViewTop View (SMC2888W

Strona 180 - General Commands

Command Line Interface7-90Example show pppoeThis command shows information about the PPPoE configuration.Command Mode Privileged ExecExample AP#(if-et

Strona 181

Ethernet Interface Commands7-91Ethernet Interface CommandsThe commands described in this section configure connection parameters for the Ethernet inte

Strona 182

Command Line Interface7-92Example To specify the 10/100Base-TX network interface, enter the following command:dns serverThis command specifies the add

Strona 183

Ethernet Interface Commands7-93Related Commands show interface ethernet (page 7-96)ip address This command sets the IP address for the (10/100Base-TX)

Strona 184

Command Line Interface7-94• You must assign an IP address to this device to gain management access over the network or to connect the wireless bridge

Strona 185 - System Management Commands

Ethernet Interface Commands7-95Command Usage • You must assign an IP address to this device to gain management access over the network or to connect t

Strona 186

Command Line Interface7-96Command Mode Interface Configuration (Ethernet)Command Usage This command allows you to disable the Ethernet port due to abn

Strona 187

Wireless Interface Commands7-97Example Wireless Interface CommandsThe commands described in this section configure connection parameters for the wire

Strona 188

Command Line Interface7-98dtim-period Configures the rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissionsIC

Strona 189

Wireless Interface Commands7-99interface wirelessThis command enters wireless interface configuration mode.Syntaxinterface wireless a• a - 802.11a rad

Strona 190

Hardware Description1-5Integrated High-Gain AntennaThe SMC2888W-S wireless bridge includes an integrated high-gain (17 dBi) flat-panel antenna for 5 G

Strona 191

Command Line Interface7-100Default Setting NoneCommand Mode Interface Configuration (Wireless)ExamplessidThis command configures the service set ident

Strona 192

Wireless Interface Commands7-101closed-systemThis command closes access to clients without a pre-configured SSID. Use the no form to disable this feat

Strona 193 - System Logging Commands

Command Line Interface7-102Command Mode Interface Configuration (Wireless)Command Usage The maximum transmission distance is affected by the data rate

Strona 194

Wireless Interface Commands7-103ExampleturboThis command sets the wireless bridge to an enhanced mode (not regulated in IEEE 802.11a) that provides a

Strona 195

Command Line Interface7-104beacon-interval This command configures the rate at which beacon signals are transmitted from the wireless bridge. Syntaxbe

Strona 196

Wireless Interface Commands7-105Default Setting 2Command Mode Interface Configuration (Wireless)Command Usage • The Delivery Traffic Indication Map (D

Strona 197

Command Line Interface7-106Default Setting 2346Command Mode Interface Configuration (Wireless)Command Usage • If the packet size is smaller than the p

Strona 198 - System Clock Commands

Wireless Interface Commands7-107Default Setting 2347Command Mode Interface Configuration (Wireless)Command Usage • If the threshold is set to 0, the w

Strona 199

Command Line Interface7-108Default Setting fullCommand Mode Interface Configuration (Wireless)Command Usage • The “min” keyword indicates minimum powe

Strona 200

Wireless Interface Commands7-109Example authenticationThis command defines the 802.11 authentication type allowed by the access point. Syntaxauthentic

Strona 201

Introduction1-6Power Injector ModuleThe wireless bridge receives power through its network cable connection using power-over-Ethernet technology. A po

Strona 202

Command Line Interface7-110encryption This command defines whether WEP or AES encryption is used to provide privacy for wireless communications. Use

Strona 203

Wireless Interface Commands7-111• AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryptio

Strona 204 - SNMP Commands

Command Line Interface7-112key This command sets the keys used for WEP and AES encryption. Use the no form to delete a configured key.Syntaxkey {wep &

Strona 205

Wireless Interface Commands7-113• To enable AES encryption, use the encryption command to specify the key type, and use the key command to configure a

Strona 206

Command Line Interface7-114Command Mode Interface Configuration (Wireless)Command Usage • If you use WEP key encryption, the wireless bridge uses the

Strona 207

Wireless Interface Commands7-115Command Usage • WPA enables the access point to support different unicast encryption keys for each client. However, th

Strona 208

Command Line Interface7-116wpa-clients This command defines whether Wi-Fi Protected Access (WPA) is required or optionally supported for client statio

Strona 209 - Flash/File Commands

Wireless Interface Commands7-117Example Related Commandswpa-mode (page 7-117)wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is t

Strona 210

Command Line Interface7-118Example Related Commandswpa-clients (page 7-116)wpa-preshared-key (page 7-118)wpa-preshared-key This command defines a Wi-F

Strona 211

Wireless Interface Commands7-119Example Related Commandswpa-clients (page 7-116)wpa-mode (page 7-117)wpa-psk-type This command defines the Wi-Fi Prote

Strona 212

Hardware Description1-7The power injector module automatically adjusts to any AC voltage between 100-240 volts at 50 or 60 Hz. No voltage range settin

Strona 213

Command Line Interface7-120shutdown This command disables the wireless interface. Use the no form to restart the interface.Syntax shutdownno shutdownD

Strona 214

Wireless Interface Commands7-121Example show stationThis command shows the wireless clients associated with the access point.Command Mode ExecAP#show

Strona 215 - RADIUS Client

Command Line Interface7-122Example IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful

Strona 216

VLAN Commands7-123DefaultEnabledCommand ModeGlobal ConfigurationCommand UsageThe current 802.11 standard does not specify the signaling required betwe

Strona 217

Command Line Interface7-124Note: Before enabling VLANs on the wireless bridge, you must configure the connected LAN switch port to accept tagged VLAN

Strona 218

VLAN Commands7-125ExampleRelated Commandsnative-vlanid (page 7-125)native-vlanid This command configures the native VLAN ID for the wireless bridge. S

Strona 219 - Authentication

Command Line Interface7-126

Strona 220

A-1Appendix ATroubleshootingCheck the following items before you contact local Technical Support.1. If wireless bridge units do not associate with eac

Strona 221

TroubleshootingA-23. If the wireless bridge cannot be configured using Telnet, a web browser, or SNMP software:• Be sure to have configured the wirele

Strona 222

B-1Appendix BSpecificationsGeneral SpecificationsMaximum Channels (Outdoor)802.11a:US & Canada: 9 (normal mode), 3 (turbo mode)Japan: 4 (normal mo

Strona 223

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strona 224 - 802.1x session-timeout

Introduction1-8System ConfigurationAt each location where a unit is installed, it must be connected to the local network using the power injector modu

Strona 225 - 802.1x supplicant

SpecificationsB-2Modulation Types802.11a: BPSK, QPSK, 16-QAM, 64-QAM802.11g: CCK, BPSK, QPSK, OFDM802.11b: CCK, BPSK, QPSKNetwork ConfigurationBridge

Strona 226

General SpecificationsB-3Network ManagementWeb-browser, Telnet, SNMPTemperatureOperating: -33 to 55 °C (-27.4 to 131 °F)Storage: -40 to 80 °C (-40 to

Strona 227

SpecificationsB-4Antenna Specifications17 dBi Integrated PanelFrequency Range5.150 - 5.850 GHzGain17 dBiVSWR1.8 : 1 maxPolarizationLinear, vertical/ho

Strona 228

Antenna SpecificationsB-5 17 dBi Integrated Panel Antenna Link Budget (5.825 GHz, Cable Loss 1 dB, Fade Margin 5 dB)Modulation/Rates Transmit Power(d

Strona 229

SpecificationsB-6

Strona 230

C-1Appendix CCables and PinoutsTwisted-Pair Cable AssignmentsFor 10/100BASE-TX connections, a twisted-pair cable must have two pairs of wires. Each wi

Strona 231 - WDS Commands

Cables and PinoutsC-210/100BASE-TX Pin AssignmentsUse unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-oh

Strona 232

Twisted-Pair Cable AssignmentsC-3Straight-Through WiringBecause the 10/100 Mbps Input port on the power injector uses an MDI pin configuration, you mu

Strona 233

Cables and PinoutsC-48-Pin DIN Connector PinoutThe Ethernet cable from the power injector connects to an 8-pin DIN connector on the wireless bridge. T

Strona 234

8-Pin DIN Connector PinoutC-58-Pin DIN to RJ-45 Cable WiringTo construct an extended Ethernet cable to connect from the power injector’s RJ-45 Output

Strona 235 - Bridge Commands

Features and Benefits1-9Features and Benefits• SMC2888W-S Slave units support a 5 GHz high-gain 17 dBi antenna• SMC2888W-M Master units support 5 GHz

Strona 236

Cables and PinoutsC-6

Strona 237

Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi

Strona 238

GlossaryGlossary-2Basic Service Set (BSS)A set of 802.11-compliant stations and an access point that operate as a fully-connected wireless network.Bea

Strona 239

GlossaryGlossary-3File Transfer Protocol (FTP)A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP)HTTP is a standard used to t

Strona 240

GlossaryGlossary-4Open SystemA security option which broadcasts a beacon signal including the access point’s configured SSID. Wireless clients can rea

Strona 241

GlossaryGlossary-5Simple Network Time Protocol (SNTP)SNTP allows a device to set its internal clock based on periodic updates from a Network Time Prot

Strona 242

GlossaryGlossary-6

Strona 243

Index-1AAdvanced Encryption Standard See AESAES 6-82configuring 6-68AES, configuring 6-66, 7-110authentication 6-16, 7-109configuring 6-16, 7-109MAC

Strona 244

IndexIndex-2filter 6-26, 7-56address 6-16, 7-56between wireless clients 6-28, 7-76local bridge 6-28, 7-76local or remote 6-16, 7-59management access 6

Strona 245

IndexIndex-3passwordconfiguring 6-33, 7-20management 6-33, 7-20PoE 4-8specifications B-2port prioritySTA 7-72Power over Ethernet See PoEpower supply,

Strona 246 - Filtering Commands

Introduction1-10System DefaultsThe following table lists some of the wireless bridge’s basic system defaults. To reset the bridge defaults, use the CL

Strona 247

IndexIndex-4Temporal Key Integrity Protocol See TKIPtime zone 6-41, 7-32TKIP 6-81, 7-114transmit power, configuring 6-59, 7-107trap destination 6-31,

Strona 249

SMC2888W-SSMC2888W-M

Strona 250 - PPPoE Commands

System Defaults1-11SNMP Status EnabledLocation nullContact ContactCommunity (Read Only) PublicCommunity (Read/Write) PrivateTraps EnabledTrap Destinat

Strona 251

Introduction1-12Wireless Interface 802.11aStatus EnabledSSID SMCTurbo Mode DisabledRadio Channel Default to first channelAuto Channel Select EnabledTr

Strona 252

System Defaults1-13Wireless Interface 802.11b/gStatus EnabledSSID SMCRadio Channel Default to first channelAuto Channel Select EnabledTransmit Power F

Strona 253

Introduction1-14

Strona 254

2-1Chapter 2Network ConfigurationThe Dual-band Outdoor Access Point / Bridge system provides access point or bridging services through either the 5 GH

Strona 255

Network Configuration2-2The 802.11b and 802.11g frequency band, which operates at 2.4 GHz, can easily encounter interference from other 2.4 GHz device

Strona 256

Access Point Topologies2-3Infrastructure Wireless LANThe access point function of the wireless bridge provides access to a wired LAN for 802.11a/b/g w

Strona 257

LIMITED WARRANTYiiCustomers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from S

Strona 258

Network Configuration2-4Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each acc

Strona 259

Bridge Link Topologies2-5Bridge Link TopologiesThe IEEE 802.11 standard defines a WIreless Distribution System (WDS) for bridge connections between BS

Strona 260

Network Configuration2-6Note: The external antennas offer longer range options using the 5 GHz radio, which makes this interface more suitable for br

Strona 261 - Ethernet Interface Commands

Bridge Link Topologies2-7Master withOmnidirectionalAntennaSlaveSlaveSlaveSlaveSlaveSlaveMaster withSector AntennaSlaveSlaveSlave

Strona 262

Network Configuration2-8

Strona 263

3-1Chapter 3Bridge Link PlanningThe SMC Dual-band Outdoor Access Point / Bridge supports fixed point-to-point or point-to-multipoint wireless links. A

Strona 264

Bridge Link Planning3-2This area is known as the first Fresnel Zone of the radio link. For a radio link not to be affected by obstacles along its path

Strona 265

Radio Path Planning3-3• Be sure there is enough clearance from buildings and that no building construction may eventually block the path.• Check the t

Strona 266

Bridge Link Planning3-4.Note that to avoid any obstruction along the path, the height of the object must be added to the minimum clearance required fo

Strona 267 - Wireless Interface Commands

Radio Path Planning3-5A wireless bridge link is deployed to connect building A to a building B, which is located three miles (4.8 km) away. Mid-way be

Strona 268

iiiCOMPLIANCESFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B

Strona 269

Bridge Link Planning3-6• The wireless bridge antennas at both ends of the link must be positioned with the same polarization direction, either horizon

Strona 270

Radio Path Planning3-7Weather ConditionsWhen planning wireless bridge links, you must take into account any extreme weather conditions that are known

Strona 271

Bridge Link Planning3-8Ethernet CablingWhen a suitable antenna location has been determined, you must plan a cable route form the wireless bridge outd

Strona 272

4-1Chapter 4Hardware InstallationBefore mounting antennas to set up your wireless bridge links, be sure you have selected appropriate locations for ea

Strona 273

Hardware Installation4-25. Align antennas at both ends of the link.Testing Basic Link OperationSet up the units over a very short range (15 to 25 feet

Strona 274

Mount the Unit4-33. Use the included nuts to tightly secure the wireless bridge to the bracket. Be sure to take account of the antenna polarization di

Strona 275

Hardware Installation4-4Mounting on Larger Diameter PolesIn addition, there is a method for attaching the pole-mounting bracket to a pole that is 2 to

Strona 276

Connect External Antennas4-52. Position the bracket in the intended location and mark the position of the three mounting screw holes.3. Drill three ho

Strona 277

Hardware Installation4-62. Connect the antenna to the bridge’s N-type connector.3. Apply weatherproofing tape to the antenna connectors to help preven

Strona 278

Connect Cables to the Unit4-7Connect Cables to the Unit1. Attach the Ethernet cable to the Ethernet port on the wireless bridge. Note: The Ethernet c

Strona 279

COMPLIANCESivWireless 5 GHz Band Statements:As the SMC2888W access point/bridge can operate in the 5150-5250 MHz frequency band it is limited by the F

Strona 280

Hardware Installation4-8Note: The wireless bridge’s Ethernet port does not support Power over Ethernet (PoE) based on the IEEE 802.3af standard. Do n

Strona 281

Align Antennas4-95. Check the LED on top of the power injector to be sure that power is being supplied to the wireless bridge through the Ethernet con

Strona 282

Hardware Installation4-10strong central main lobe and smaller side lobes. The object of the alignment process is to set the antenna so that it is rece

Strona 283

Align Antennas4-112. Pan the antenna horizontally back and forth while checking the RSSI voltage. If using the pole-mounting bracket with the unit, yo

Strona 284

Hardware Installation4-12

Strona 285

5-1Chapter 5Initial ConfigurationThe wireless bridge offers a variety of management options, including a web-based interface, a command line interface

Strona 286

Initial Configuration5-2Initial Setup through the CLIThe wireless bridge provides access to the CLI through a Telnet connection. You can open a Telnet

Strona 287

Initial Setup through the CLI5-3At the Exec prompt, type “country ?” to display the list of country codes. Check the code for your country, then enter

Strona 288

Initial Configuration5-4After configuring the wireless bridge’s IP parameters, you can access the management interface from anywhere within the attach

Strona 289

Using the Web-based Management Setup Wizard5-5The home page displays the Main Menu.Launching the Setup Wizard – To perform initial configuration, clic

Strona 290

COMPLIANCESv• This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically

Strona 291

Initial Configuration5-62. Radio Channel – You must enable radio communications for the 802.11a and 802.11g radios and set the operating channel.• 802

Strona 292 - IAPP Commands

Using the Web-based Management Setup Wizard5-7Turbo Mode – If you select Enable, the wireless bridge will operate in turbo mode with a data rate of up

Strona 293 - VLAN Commands

Initial Configuration5-8Note: Available channel settings are limited by local regulations which determine which channels are available.3. IP Configur

Strona 294

Using the Web-based Management Setup Wizard5-94. WDS – To set up a wireless bridge link, you must configure the WDS forwarding table by specifying the

Strona 295

Initial Configuration5-105. Security (802.11g) – Set the Authentication Type to “Open System” to allow open access without authentication, or “Shared

Strona 296

Using the Web-based Management Setup Wizard5-11hexadecimal or ASCII string of the appropriate length. The key can be entered as alphanumeric character

Strona 297 - Troubleshooting

Initial Configuration5-12

Strona 298

6-1Chapter 6System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 5 t

Strona 299 - Specifications

System Configuration6-2When the home page displays, click on Advanced Setup. The following page will display.The information in this chapter is organi

Strona 300

Advanced Configuration6-3Advanced ConfigurationThe Advanced Configuration pages include the following options.Menu Description PageSystem Configures b

Strona 301 - General Specifications

COMPLIANCESviOperation Using 5 GHz Channels in the European CommunityThe user/installer must use the provided configuration utility to check the curre

Strona 302 - Antenna Specifications

System Configuration6-4System IdentificationThe system information parameters for the wireless bridge can be left at their default settings. However,

Strona 303

Advanced Configuration6-5System Name – An alias for the wireless bridge, enabling the device to be uniquely identified on the network. (Default: Dual

Strona 304

System Configuration6-6CLI Commands for System Identification – Enter the global configuration mode and use the system name command to specify a new s

Strona 305 - Cables and Pinouts

Advanced Configuration6-7TCP / IP SettingsConfiguring the wireless bridge with an IP address expands your ability to manage the wireless bridge. A num

Strona 306 - 10/100BASE-TX Pin Assignments

System Configuration6-8DHCP Client (Enable) – Select this option to obtain the IP settings for the wireless bridge from a DHCP (Dynamic Host Configura

Strona 307 - Crossover Wiring

Advanced Configuration6-9• Default Gateway: The default gateway is the IP address of the router for the wireless bridge, which is used if the requeste

Strona 308 - 8-Pin DIN Connector Pinout

System Configuration6-10RadiusRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a centra

Strona 309

Advanced Configuration6-11Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.• IP Address

Strona 310

System Configuration6-12• Key: A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same tex

Strona 311 - Glossary

Advanced Configuration6-13to display the current settings for the primary and secondary RADIUS servers.PPPoE SettingsThe wireless bridge uses a Point-

Strona 312 - Glossary-2

COMPLIANCESviiDeclaration of Conformity in Languages of the European CommunityEnglish Hereby, SMC Networks, declares that this Radio LAN device is in

Strona 313 - Glossary-3

System Configuration6-14PPP over Ethernet – Enable PPPoE on the RJ-45 Ethernet interface to pass management traffic between the unit and a remote PPPo

Strona 314 - Glossary-4

Advanced Configuration6-15IP Allocation Mode – This field specifies how IP adresses for the PPPoE tunnel are configured on the RJ-45 interface. The al

Strona 315 - Glossary-5

System Configuration6-16AuthenticationWireless clients can be authenticated for network access by checking their MAC address against the local databas

Strona 316 - Glossary-6

Advanced Configuration6-17Ethernet Supplicant Setup – Allows the access point to act as an 802.1X supplicant so it can be authenticated through its Et

Strona 317

System Configuration6-18MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the netw

Strona 318

Advanced Configuration6-19Note: Client station MAC authentication occurs prior to the IEEE 802.1X authentication procedure configured for the access p

Strona 319

System Configuration6-20• Supported: The access point supports 802.1X authentication only for clients initiating the 802.1X authentication process (i.

Strona 320

Advanced Configuration6-21Local MAC Authentication – Configures the local MAC authentication database. The MAC database provides a mechanism to take c

Strona 321

System Configuration6-22• Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is

Strona 322 - SMC2888W-M

Advanced Configuration6-23command. To display the current settings, use the show authentication command from the Exec mode.AP(config)#mac-authenticati

Komentarze do niniejszej Instrukcji

Brak uwag

Kguard Enregistreurs vidéo numériques (DVR) manuels d'utilisation

La liste de Kguard Enregistreurs vidéo numériques (DVR) produits contient 2 manuels d'utilisation pour les modèles 2. Tous les guides d'utilisation en format pdf peuvent être téléchargés ou consultés en ligne.

Cliquez sur un alphabet ci-dessous pour faire défiler la liste complète des modèles commençant par cette lettre

Modèles Type de document
AR421-CKT001 Surveillance Combo Kit
Manuel de l'utilisateur   Kguard AR421-CKT001 Surveillance Combo Kit, 81 pages
EL421-4HW212B Surveillance Combo Kit
Manuel de l'utilisateur   Kguard EL421-4HW212B Surveillance Combo Kit, 114 pages