User Guide Wireless N Access Point EAP110/EAP120/EAP220 REV1.0.0 1910011184
3 Chapter 1 Introduction 1.1 Overview of the EAP EAP series products provide wireless coverage solutions for small-medium business. They can either
4 Figure 1-1 Top View of the EAP LED Status Indication Solid green The device is working properly. Flashing red System errors. RAM, flash, Ether
5 EAP120/EAP220: Figure 1-3 Interface Panel of EAP120/EAP220 Please note that EAP110 does not have the CONSOLE port, POWER port and ON/OFF button. T
6 Passive PoE Adapter: Power LED: The Power LED indicates the status of the electric current: green (0-0.8A), red (0.8A-1A). POE Port: This po
7 Chapter 2 Network Topology A typical network topology for the EAP is shown below. Figure 2-1 Typical Topology To deploy an EAP in your local netw
8 Chapter 3 Management Mode 300Mbps Wireless N Access Point EAP110 and Wireless N Gigabit Access Point EAP120/EAP220 can either work under the contr
9 TIPS: Proceed to the following chapters for information on using the EAP in standalone mode. EAP110 is taken as the example.
10 Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default,
11 Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below.
12 5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page
FCC STATEMENT (EAP110) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the F
13 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Radio: Check the box to enable 2.4GHz Wireless Radio. Wireless
14 If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation
15 SSID Broadcast: Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless netw
16 Open System: After you select Open System, clients can pass the authentication and associate with the wireless network without password. Howe
17 WPA-PSK: Pre-shared key of WPA. WPA2-PSK: Pre-shared key of WPA2. Encryption: Select the encryption type, including Auto, TKIP, and AES. The
18 Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity
19 Fragmentation Threshold: Specify the fragmentation threshold for packets. If the size of the packet is larger than the fragmentation threshold, th
20 Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSI
21 2. Local Password:Users are required to enter the preset user name and password, which are saved in the EAP. 3. External RADIUS Server:Users are
22 Redirect URL: Enter the URL that a newly authenticated client will be directed to. Portal Customization: Select Local Web Portal, the authenticati
FCC STATEMENT (EAP120&EAP220) This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 1
23 Local Password Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Username: Enter the user name for
24 1. Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server
25 2. External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS
26 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a poli
27 Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is
28 Settings Enable MAC Filtering: Check the box to enable MAC Filtering. Station MAC Group Follow the steps below to add MAC groups. Step 1:
29 Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group mem
30 Figure 5-23 Scheduler Page Settings Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can p
31 Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Click and configure the recurring schedule for t
32 Scheduler Association This zone will display different contents based on your selection of association mode in Settings. 1. Associated with SS
National Restrictions(only for EAP220) This device is intended for home and office use in all EU countries (and other countries following the EU direc
33 5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, the default valu
34 5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client statio
35 5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA
36 5.6 Rogue AP Detection A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system adm
37 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 De
38 Beacon Interval: The beacon interval used by the rogue AP. Beacon frames are transmitted by an AP at regular intervals to announce the existence o
39 Save Action: Select Download (PC to AP) to import a trusted AP list to the device. Select Backup (AP to PC) to copy the trusted AP list to your P
40 Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List
41 Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the
42 Wireless Settings Figure 6-4 Wireless Settings Region: Displays the region you’ve selected. Channel/Frequency: Displays the channel number and
IC STATEMENT This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe A est conforme à la norme NMB-003 du
43 LAN Port: Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port. Client Figure 6-6 Client MAC: Displ
44 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) recei
45 6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 S
46 Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs. Down(Byte): Displays the t
47 SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the
48 Active Time: Displays the amount of time the authenticated client has been connected to the root AP. Action: Click Unauthorize to stop giving aut
49 Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about
50 Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configu
51 SMTP Server: Enter the IP address of the SMTP server. Enable Authentication: Generally users are required to log in to the SMTP server by entering
52 Following is the page of Web Server. Figure 7-6 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure S
●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 此為甲類資
53 Following is the page of Management Access. Figure 7-7 Management Access Page MAC Authentication: Check the box to enable MAC Authentication. Aft
54 SSH (Secure Shell) is a security protocol established on application and transport layers. SSH-encrypted-connection is similar to a telnet connect
55 Once the device has become an SNMP agent, it is able to receive and process request messages from SNMP manager. Following is the page of SNMP. Fi
56 Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write
57 Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboo
58 Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP
59 Primary/Secondary NTP Server: If you’ve selected Get GMT from an NTP server, please input the primary NTP sever address and an alternative NTP ser
60 Recurring Mode Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time
61 8.4 Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the conf
62 NOTE: 1. Please select the proper software version that matches your hardware to upgrade. 2. To avoid damage, please do not turn off the device
About this User Guide This User Guide is for EAP110, EAP120 and EAP220. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer
63 Appendix A: Specifications HARDWARE FEATURES Model EAP110 EAP120 EAP220 Interface Kensington lock slot RESET button ETHERNET: 10/100Mbps Ether
1 CONTENTS Chapter 1 Introduction .......
2 5.6.4 Download/Backup Trusted AP List ..................... 38 Chapter 6 Monitorin
Kommentare zu diesen Handbüchern