TP-LINK EAP220 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach WLAN-Zugangspunkte TP-LINK EAP220 herunter. TP-Link EAP220 User Guide [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 70
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
User Guide
Wireless N Access Point
EAP110/EAP120/EAP220
REV1.0.0
1910011184
Seitenansicht 0
1 2 3 4 5 6 ... 69 70

Inhaltsverzeichnis

Seite 1 - User Guide

User Guide Wireless N Access Point EAP110/EAP120/EAP220 REV1.0.0 1910011184

Seite 2 - FCC STATEMENT (EAP110)

3 Chapter 1 Introduction 1.1 Overview of the EAP EAP series products provide wireless coverage solutions for small-medium business. They can either

Seite 3 - CE Mark Warning

4 Figure 1-1 Top View of the EAP LED Status Indication Solid green The device is working properly. Flashing red System errors. RAM, flash, Ether

Seite 4

5 EAP120/EAP220: Figure 1-3 Interface Panel of EAP120/EAP220 Please note that EAP110 does not have the CONSOLE port, POWER port and ON/OFF button. T

Seite 5 - NCC Notice & BSMI Notice

6 Passive PoE Adapter:  Power LED: The Power LED indicates the status of the electric current: green (0-0.8A), red (0.8A-1A).  POE Port: This po

Seite 6

7 Chapter 2 Network Topology A typical network topology for the EAP is shown below. Figure 2-1 Typical Topology To deploy an EAP in your local netw

Seite 7 - Convention

8 Chapter 3 Management Mode 300Mbps Wireless N Access Point EAP110 and Wireless N Gigabit Access Point EAP120/EAP220 can either work under the contr

Seite 8 - CONTENTS

9 TIPS: Proceed to the following chapters for information on using the EAP in standalone mode. EAP110 is taken as the example.

Seite 9

10 Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default,

Seite 10 - Chapter 1 Introduction

11 Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below.

Seite 11 - 1.2.2 Interface Panel

12 5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page

Seite 12 - EAP120/EAP220:

FCC STATEMENT (EAP110) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the F

Seite 13 - 1.2.3 Mounting Bracket

13 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Radio: Check the box to enable 2.4GHz Wireless Radio. Wireless

Seite 14 - Chapter 2 Network Topology

14 If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation

Seite 15 - Chapter 3 Management Mode

15 SSID Broadcast: Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless netw

Seite 16

16  Open System: After you select Open System, clients can pass the authentication and associate with the wireless network without password. Howe

Seite 17 - Chapter 4 Network

17  WPA-PSK: Pre-shared key of WPA.  WPA2-PSK: Pre-shared key of WPA2. Encryption: Select the encryption type, including Auto, TKIP, and AES. The

Seite 18 - Chapter 5 Wireless

18 Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity

Seite 19 - 5.1 Wireless Settings

19 Fragmentation Threshold: Specify the fragmentation threshold for packets. If the size of the packet is larger than the fragmentation threshold, th

Seite 20

20 Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSI

Seite 21 - 5.1.2 SSIDs

21 2. Local Password:Users are required to enter the preset user name and password, which are saved in the EAP. 3. External RADIUS Server:Users are

Seite 22 - Enterprise or WPA-PSK

22 Redirect URL: Enter the URL that a newly authenticated client will be directed to. Portal Customization: Select Local Web Portal, the authenticati

Seite 23 - WPA-Enterprise

FCC STATEMENT (EAP120&EAP220) This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 1

Seite 24 - WPA-PSK

23  Local Password Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Username: Enter the user name for

Seite 25

24 1. Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server

Seite 26 - 5.2 Portal

25 2. External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS

Seite 27 - 5.2.1 Portal Configuration

26 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a poli

Seite 28 - No Authentication

27 Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is

Seite 29

28  Settings Enable MAC Filtering: Check the box to enable MAC Filtering.  Station MAC Group Follow the steps below to add MAC groups. Step 1:

Seite 30 - External RADIUS Server

29 Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group mem

Seite 31 - Local Web Portal

30 Figure 5-23 Scheduler Page  Settings Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can p

Seite 32 - External Web Portal

31 Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Click and configure the recurring schedule for t

Seite 33

32  Scheduler Association This zone will display different contents based on your selection of association mode in Settings. 1. Associated with SS

Seite 34 - 5.3 MAC Filtering

National Restrictions(only for EAP220) This device is intended for home and office use in all EU countries (and other countries following the EU direc

Seite 35 - Station MAC Group

33 5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, the default valu

Seite 36 - 5.4 Scheduler

34 5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client statio

Seite 37

35 5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA

Seite 38 - Figure 5-26 Add a Rule

36 5.6 Rogue AP Detection A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system adm

Seite 39 - Scheduler Association

37 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 De

Seite 40 - 5.5 QoS

38 Beacon Interval: The beacon interval used by the rogue AP. Beacon frames are transmitted by an AP at regular intervals to announce the existence o

Seite 41 - 5.5.1 AP EDCA Parameters

39 Save Action: Select Download (PC to AP) to import a trusted AP list to the device. Select Backup (AP to PC) to copy the trusted AP list to your P

Seite 42

40 Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List

Seite 43 - 5.6 Rogue AP Detection

41 Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the

Seite 44 - 5.6.1 Settings

42  Wireless Settings Figure 6-4 Wireless Settings Region: Displays the region you’ve selected. Channel/Frequency: Displays the channel number and

Seite 45 - 5.6.3 Trusted AP List

IC STATEMENT This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe A est conforme à la norme NMB-003 du

Seite 46

43 LAN Port: Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port.  Client Figure 6-6 Client MAC: Displ

Seite 47 - Chapter 6 Monitoring

44 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) recei

Seite 48 - Device Information

45 6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 S

Seite 49 - LAN Information

46 Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs. Down(Byte): Displays the t

Seite 50 - LAN Traffic

47 SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the

Seite 51 - Radio Traffic

48 Active Time: Displays the amount of time the authenticated client has been connected to the root AP. Action: Click Unauthorize to stop giving aut

Seite 52 - 6.2 SSID

49 Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about

Seite 53 - 6.3 Client

50 Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configu

Seite 54

51 SMTP Server: Enter the IP address of the SMTP server. Enable Authentication: Generally users are required to log in to the SMTP server by entering

Seite 55 - Active Time:

52 Following is the page of Web Server. Figure 7-6 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure S

Seite 56 - Chapter 7 Management

●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 此為甲類資

Seite 57 - 7.1.2 Log Settings

53 Following is the page of Management Access. Figure 7-7 Management Access Page MAC Authentication: Check the box to enable MAC Authentication. Aft

Seite 58 - 7.2 Web Server

54 SSH (Secure Shell) is a security protocol established on application and transport layers. SSH-encrypted-connection is similar to a telnet connect

Seite 59 - 7.3 Management Access

55 Once the device has become an SNMP agent, it is able to receive and process request messages from SNMP manager. Following is the page of SNMP. Fi

Seite 60 - 7.5 SSH

56 Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write

Seite 61 - 7.6 SNMP

57 Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboo

Seite 62

58 Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP

Seite 63

59 Primary/Secondary NTP Server: If you’ve selected Get GMT from an NTP server, please input the primary NTP sever address and an alternative NTP ser

Seite 64 - Chapter 8 System

60  Recurring Mode Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time

Seite 65 - 8.2.1 Time Settings

61 8.4 Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the conf

Seite 66 - 8.2.2 Daylight Saving

62 NOTE: 1. Please select the proper software version that matches your hardware to upgrade. 2. To avoid damage, please do not turn off the device

Seite 67 - 8.3 Reboot/Reset

About this User Guide This User Guide is for EAP110, EAP120 and EAP220. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer

Seite 68 - 8.5 Firmware Upgrade

63 Appendix A: Specifications HARDWARE FEATURES Model EAP110 EAP120 EAP220 Interface Kensington lock slot RESET button ETHERNET: 10/100Mbps Ether

Seite 69

1 CONTENTS Chapter 1 Introduction .......

Seite 70 - Appendix A: Specifications

2 5.6.4 Download/Backup Trusted AP List ..................... 38 Chapter 6 Monitorin

Kommentare zu diesen Handbüchern

Keine Kommentare