Home

LevelOne 300Mbps 2.4GHz

image

Contents

1. System Wireless Firewall Utilities Status 1 D i Ts j LN Overview General Config Security Y Repeater Advanced Access Control Site Survey N Home gt Wireless gt VAP Config VAP Configuration Profile Name IVAP 1 VAP Disable 9 Enable Profile Name 1 ESSID 200 1 VLAN ID 9 Disable Enable VLAN ID Ft 1 4084 VAP Configuration Page VAP 1 shown 20 The desired VAP profile can be selected from the drop down menu of Profile Name and VAP 1 configuration will serve as an example for all other VAPs Before proceeding further please make sure that the VAP field is Enable afterwards enter an ESSID to represent the WLAN associated with AP s VAP 1 It is suggested that Profile Name is used to describe what this particular VAP will be used for otherwise leave it as default VLAN ID can be chosen at another time Click SAVE to save all changes up to this point and Reboot the system to apply these revised settings Congratulations After reboot the AP can start to work with these revised settings 21 Article IV Adding Virtual Access Points EAP 200 possesses the feature of multi ESSID namely it can behave as multiple virtual access points providing different levels of services fro
2. Hyper Terminal is used please set the parameters as 115200 8 None 1 None ax teling Bite bel second Cusa rm Panty Hane Heroe Deisi Cancri App The console interface looks like the screenshot below displaying the current LAN IP address the instructions to reset device to default v login When resetting the device to default from the console interface key in reset2def for login and password Confirm yes and EAP 200 will begin the reset process SYSTEM IP 192 166 10 1 25 Enter resetzedet twice to E E E h actory default login Password Do you really want to set t actory default and reboot ye When the login prompt reappears the device has completed the reset to default process and the LAN IP is reset to 192 168 1 1 Copying Feature Control Profile Check customized objects Check customized pages objects Configuration file tmp hosta cat can t open tmp status s start syslogd CHH osif stop Stopping OSIF br port 3 tathDap entering disabled state loctl IEEESO0211 SETHMLME Invalid argument Could not connect to kernel driver ioctl IEEESDUZz11 IOCTL SETHLHE Invalid argumant Using interface athOapO with hwaddr 00 00 33 93 and ssid 1 br port 3 ath ap entering forwarding state 12 packet recei
3. Time Device Time 1970 01 01 01 39 09 Time Zone GMT 08 00 Taipei Time Enable NTP 9 Manually set up Set Date Month Set Time _ System Information Page System Information For maintenance purpose it is highly recommended to have the following information stated as clearly as possible gt Name The system name used to identify this system gt Description Further information about the system e g device model firmware version and active date gt Location The information on geographical location of the system for the administrator to locate the system easily Time gt Device Time Display the current time of the system gt Time Zone Select an appropriate time zone from the drop down list box gt Time Synchronize the system time by NTP server or manual setup 37 7 Enable NTP By selecting Enabled NTP EAP 200 can synchronize its system time with the NTP server automatically While this method is chosen at least one NTP server s IP address or domain name must be provided Time Device Time 2000 01 03 04 32 49 Time Zone GMT 08 00 Taipei Time 9 Enable NTP O Manually set up NTP Time Configuration Fields Generally networks would have a common NTP server internal or external If there is use that one otherwise locate a nearby NTP server on the web 2 Manually set up By selecting Manually se
4. WPA PSK WPA PSK Wi Fi Protected Access Pre shared Key is a pre shared key authentication method a special mode of WPA VAP Overview General VAP Config 4 Security Repeater Advanced Access Control Y Site Survey gt AP gt Security Security Settings Profile Name VAP 1 Security Type WPA PSK v Cipher Suite TKIP WPA Pre shared Key Type PSK Hex 64 chars Passphrase 8 63 chars 0 0 0 0 0 0 00 0 Group Key Update Period second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed gt Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 53 gt WPA RADIUS If this option is selected the RADIUS authentication and data encryption will be both enabled Overview Y General Y VAP Config Security Repeater Advanced Access Control Y Site Survey Home gt Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Group Key Update Period 600 second s roman eee Host o EK Domain Name IP Address Authentication Port 1812 Secret Kev
5. 70 Section 7 04 7 4 Utilities The administrator can maintain the system on this page Change Password Backup amp Restore System Upgrade Reboot and Upload Certificate a 7 4 1 Change Password To protect the Web Management Interface from unauthorized access it is highly recommended to change the administrator s password to a secure password Only alpha numeric characters are allowed and it is also recommended to make use of a combination of both numeric and alphabetic characters Change Password Backup amp Restore System Upgrade Reboot Home gt Utilities gt Change Password Change Password admin Old Password New Password up to 32 characters Re enter New Password Change Password Page The administrator can change password on this page Enter the original password admin and new password and then re enter the new password in the Re enter New Password field Click SAVE to save the new password b 7 4 2 Backup amp Restore This function is used to backup and restore the EAP 200 settings The EAP 200 can also be restored to factory defaults using this function It can be used to duplicate settings to other access points backup settings of this system and then restore on another AP Change Password N Backup amp Restore System Upgrade Reboot Upload Certificate h Home Utilities Config Save amp Restore Configuration Backup amp Restore Reset to Default
6. Es RII RII 78 NENNT TT Em 79 SOMIT T m 80 TO ONE HO 5 re chee ee 81 About 4ipnet The LevelOne Secure WLAN Controller series is powered by 4ipnet LevelOne is partnered with 4ipnet to deliver most feature rich product yet simple deployment in wireless networking infrastructure solution 4ipnet is a leading provider of wireless networking solution for manageable reliable and secure wireless access In an effort to meet changing market demands at the least possible cost 4ipnet delivers a diverse array of turnkey high performance products and mission critical applications to bring reliability and manageability to increasingly complex wireless networks 4ipnet s complete WLAN infrastructure solution portfolio addresses the needs of different network e operation environments ranging from the ISP to the SOHO with an emphasis on simplified network deployment centralized network management and enhanced network performance Article I Before You Start Section 1 01 1 1 Preface This manual is intended for system integrators field engineers and network administrators to set up LevelOne s EAP 200 802 11n b g 2 4GHz MIMO Access Point in their network environments contains step by step procedures and visual examples to guide MIS staff or individuals with basic network system knowledge to comp
7. T Accounting Service 9 Disable Enable Accounting Interim Update Interval leo second s Security Settings WPA RADIUS WPA Settings o Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed o Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds RADIUS Server Settings Primary Secondary o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes opecify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period 54 e 7 2 5 Repeater To extend wireless network coverage EAP 200 supports 3 options of Repeater type None WDS or Universal Repeater selecting None will turn off this function Universal Repeater If Universal Repeater is selected please provide the SSID of upper bound AP for uplink connection Security Type None WEP or WPA PSK can be configured for this Repeater connection Please note the security
8. gt WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 26 e 802 1 When 802 1X Authentication is selected RADIUS authentication and enhanced dynamic WEP are provided VAP Overview General VAP Config Y Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type 802 1 Dynamic Disable Enable WEP Key Length 2 64 bits CO 128 bits Rekeying Period 300 second s RADIES Server S Ft Domain IP Address Authentication Port 1812 F Secret Key Accounting Service Disable Enable Accounting Port ba Accounting Interim Update Interval second s Security Settings 802 1X Authentication Dynamic WEP Settings o Dynamic WEP For 802 1X security type Dynamic WEP is always enabled to automatically generate WEP keys for encryption WEP Key Length Select from 64 bits or 128 bits key length o Rekeying Period time interval for the dynamic WEP key to be updated the time unit is in second RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Serv
9. Backup System Settings Backup amp Restore Page e Reset to Default Click Resetto load the factory default settings of EAP 200 A pop up Page will appear to reconfirm the request to reboot the system Click OK to proceed or click Cancel to cancel the reboot request Message from webpage P This action will reboot the system Dio vou want bo continue Reboot Confirmation Prompt gt Awarning message as displayed below will appear during the reboot period The system power must be kept turn on before the completion of the reboot process gt The System Overview page will appear upon the completion of reboot e Backup System Settings Click Backup to save the current system settings to a local disk such as the hard disk drive HDD of a local computer or a compact disc CD e Restore System Settings Click Browse to search for a previously saved backup file and then click Upload to restore the settings The backup file will replace the active configuration file currently running on the system After network parameters have been reset restored the network settings of the administrator PC may need to be changed to ensure that the IP address of the administrator PC is on the same subnet mask as the EAP 200 72 7 4 3 System Upgrade The EAP 200 provides a web firmware upload upgrade feature The administrator can download the latest firmware from the website and save it on the administrator s PC To upgrade
10. Wireless gt Security Security Settings Profile Name VAP 1 Security Type WPA RADIUS Cipher Suite TKIP WPA Group Key Update Period 600 second s DENEN dall o EK Domain Name IP Address Authentication Port 1812 Accounting Service 9 Disable Enable Accounting Interim Update Interval leo second s Security Settings WPA RADIUS WPA Settings o Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed o Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes opecify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period When these configurations are finished and MAC restriction is not needed click SAVE and then Reboot the system Otherwise click on the Overview tab and proceed with the ne
11. gt DHCP This configuration type is applicable when the system is connected to a network with the presence of a DHCP server all related IP information required will be provided by the DHCP server automatically e Layer 2 STP If the EAP 200 is set up to bridge other network components this option can be enabled to prevent undesired loops because broadcasting storm may occur in a multi switch environment where broadcast packets are forwarded in an endless loop between switches Moreover a broadcast storm may consume most of available system resources in addition to available bandwidth Thus enabling the Layer 2 STP can lower such undesired occurrence and derive the best available data path for network communication 97 c 7 1 3 Management The management services e g VLAN for Management SNMP and System log can be configured here General Network Interface Management GRE Tunnel CAPWAP Home gt System gt Management Services Management Services VLAN for Management Disable Enable VLANID _ 1 4094 SNMP Configuration 9 Disable Enable community String Trap Disable Enable SS Een Mg 9 Disable Enable SYSLOG Server IP Server Port i4 SYSLOG Level Management Services Page e VLAN for Management When it is enabled management traffics from the system will be tagged with a VLAN ID In other words administrator who wants to access the WMI must send management traffics with th
12. 0 0 v address Masks 0 0 0 0 70 3 Action Block 9 Pass gt gt To move a specific rule Mv in Setting column of firewall list will lead to the following page for reordering confirmation After SAVE button is clicked and system reboot the order of rules will be updated 6 Firewall List Home gt Firewall gt Move rule Move Rule 1 Before After ID 1 20 Please make sure all desired rules state of rule are checked and saved in overview page the rule will be ID Move to enforced upon system reboot Firewall List Service V Advanced Home gt Firewall gt Firevall List Layer 2 Firewall Settings Enable Layer 2 Firewall Disable 9 Enable No State Action Name EtherType Remark Setting 1 DROP CDP and VTP IEEE 8023 Del Ed In Mv 2 0 STP BPDU IEEE 8023 Del Ed In Mv 3 DROP GARP IEEE 8023 Del Ed In Mv 4 0 DROP RIP IPv4 Del Ed In Mv 5 DROP HSRP IPv4 Del Ed In Mv 6 0 DROP OSPF IPv4 Del Ed In Mv 7 Del Ed In Mv 8 Del Ed In Mv 9 Del Ed In Mv 10 Del Ed In Mv First Prev Next Last total 20 68 b 7 3 2 Service The administrator can add or delete firewall service here the services in this list will become options to choose in firewall rule when EtherType is IPv4 EAP 200 provides a list of rules to block or pass traffics of layer 3 or above protocols These services are available to choose from drop down list of layer2 fi
13. 4 Advanced Home gt Firewall Firewall List Layer 2 Firewall Settings Remove rule 1 To edit a specific rule Ed in Setting column of firewall list will lead to the following page for detail configuration From this page the rule can be edited from scratch or an existing rule for revision Firewall List Service ies nced Home gt Firewall List gt Rule Config Layer 2 Firewall Configuration Rule ID 1 EtherType 802 3 Interface 9 From To DSAP SSAP iu ie IPv4 0800 Destination 2 MAC 01 00 0 ____________ Action 9 Block Pass Remark gt Rule ID The numbering of this specific rule will decide its priority among available firewall rules in the table Rule name The rule name can be specified here EtherType The drop down list will provide the available types of traffics subject to this rule Interface It can indicate inbound outbound direction with desired interfaces Service when EtherType is IPv4 Select the available upper layer protocols services from the drop down list DSAP SSAP when EtherType is IEEE 802 3 The value can be further specified for the fields in 802 2 LLC frame header Type when EtherType is IEEE802 3 The field can be used to indicate the type of encapsulated traffics 66 gt gt VLAN ID when EtherType is 802 1 Q The VLAN ID is
14. QoS The application must support WMM WMM shall be enabled on EAP 200 WMM shall be enabled in the wireless adapter on client s computer APP IAPP Inter Access Point Protocol is a protocol by which access points share information about the stations that are connected to them By enabling this function the system will automatically broadcast information of associated wireless stations to its peer access points This will help wireless stations roam smoothly among IAPP enabled access points in the same wireless LAN e Multicast Broadcast Rate Bandwidth configuration for multicast broadcast packets If your wireless clients require larger or smaller bandwidth for sending multicast broadcast packets the administrator can customize the EAP700 s multicast broadcast bandwidth here 58 g 7 2 7 Access Control On this page the network administrator can restrict the total number of clients connected to the EAP 200 as well as specify particular MAC addresses that can or cannot access the device Overview General VAP Config Security Repeater Advanced Control Site Survey gt AP gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type Disable Access Control Access Control Settings Page e Maximum Number of Clients EAP 200 supports various methods of authenticating clients for wirel
15. Setup to configure the WEP setting for associating with the target AP Cip wep 00 11 A3 08 09 56 o 5d 40 WEP The following configuration box will then appear at the bottom of the screen Security settings configured here must be the same as the target AP 63 Motell l If you set WEP security for Universal Repeater the security of AP will also change to WEP and use the same settings WEP Key Type 9 Open Shared Auto WEP Key Length 9 64 bits 128 bits 152 bits WEP Key Format 9 ASCH Hex WEP Key Index WEP Keys WPA PSK Click Setup to configure the WPA PSK setting for associating with the target AP 0A 1F D4 39 10 74 11 54 52 WPA PSK The following configuration box will then appear at the bottom of the screen Information provided here must be consistent with the security settings of the target AP Cip psk Pre shared Cipher TKIP ane PSK Hex 64 chars Passphrase 8 63 chars 64 Section 7 03 7 3 Firewall The system provides an added security feature Layer2 Firewall in addition to typical AP security Layer2 Firewall offers a firewall function that is tailored specifically for Layer2 traffics providing another choice of shield against possible security threats coming from going to WLAN AP interfaces hence besides firewall policies configured on gateways this extra security feature will assist to mitigate possible security breach This section provides informat
16. Syslog Level Select the desired level of received events from the drop down menu 4 d 7 1 4 GRE Tunnel When GRE tunnel is created between EAP 200 and the controller EAP 200 can be logically deployed into the Controller s managed network regardless of its physical location If the tunnel is created from WHG series controllers all of the configuration should be performed on the Controller side It is meaningless to configure GRE tunnel settings from the EAP 200 side Once the settings are applied from the Controller side the applied settings such as Key string will be passed to the corresponding EAP 200 and its WMI page will automatically open to confirm the changes Click Restart link and EAP 200 will restart to activate the tunnel A new window will automatically open and display the tunnel settings from the AP side which is passed from the Controller Click the Reboot link to apply and activate the settings to AP Please refer to your WHG manual for more information regarding AP management with tunnels General Network Interface Management GRE Tunnel CAPWAP Home gt System gt Management Services GRE Tunnel Configuration GRE Tunnel Disable 9 Enable Kv Interface 1 v VAP3 v VAP4 v VAPS v v VAP7 v VAPS WDS1 v WDS2 WDS3 WDS4 e GRE Tunnel To enable click Enable of GRE Tunnel gt Remote IP Enter the IP address of the Controller gt Key Setup a password for t
17. all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any 3 denied MAC address to connect to the system temporarily by checking Enable 30 Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type ACL Deny List 9 Disable Q Enable 9Disable Enable MAC ACL Deny List 3l 4 RADIUS ACL Authenticate incoming MAC addresses by an external RADIUS server When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS server Please note that each VAP MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration Overview Y General 1 Config Y Security Repeater Adwa need Access Control Site Survey h Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type 5 ACL v my wr eror These settings will also apply to security settings which use RADIUS Server for this VAP Host o Domain Name IP Address Authentication Port 1812 1 65535 Secondary RADIUS Server Host Authentication Port EE RADIUS ACL Click SAVE and Reboot upon completing the related configurations
18. on the Network Interface tab to begin configuration of the network settings General Network Interface Monge 1 GRE Tunnel CAPWAP 7 Home gt System gt Network Interface Network Settings Mode 9 Static DHCP IP Address 192 168 1 1 T Netmask 255 255 0 0 Default Gateway 192 168 1 2 Primary DNS Server 192 168 1 2 Alternate DNS Server fe Layer STP 9 Disable Enable Network Settings Page If the deployment decides the AP will be getting dynamic IP Addresses from the connected network set Mode to DHCP otherwise set Mode to Static and fill in the required fields marked with a red asterisk IP Address Netmask Gateway and Primary DNS Server with the appropriate values for the network Click SAVE when you are finished to save changes that have been made Step 3 Configure the AP s Wireless General Settings Click on the Wireless icon followed by the General tab On this page we only need to choose the Band and Channel that we wish to use gt _ System WIFEIESS E p Firewall Utilities VAP Overview General Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt General Band Short Preamble Short Guard Interval Channel Width Channel Max Transmit Rate Transmit Power ACK Timeout 100 100 500ms Beacon Interval On this page select the Band with which the AP is to broadcast its
19. provided to associate with certain VLAN tagging traffics Priority when EtherType is 802 1 Q It denotes the priority level with associated VLAN traffics Encapsulated Type when EtherType is 802 1 Q It can be used to indicate the type of encapsulated traffics Opcode when EtherType is ARP RARP This list can be used to specify the ARP Opcode in ARP header Source MAC Address Mask indicates the source MAC IP Address Mask indicates the source IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Destination MAC Address Mask indicates the destination MAC IP Address Mask indicates the destination IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Action The rule can be chosen to be Block or Pass Remark The note of this rule can be specified here When the configuration for firewall rule is provided please click SAVE and Reboot system to let the firewall rule take effort To insert a specific rule In in Setting column of firewall list will lead to the following page for detail configuration with rule ID for the current inserted rule From this page the rule can be edited form scratch or from an existing rule for revision Firewall List Service Advanced Home gt Firewall List gt Rule Config Layer 2 Firewall Configuration Rule ID Interface O From 9 To WAPI Service ALL IP Address Mask 0 0 0
20. signal General Settings 1802 119 802 11 tin Disable 9 Enable Disable Enable 20 MHz aus Mj i auro i 0 to 255 Auto Unit 4 micro seconds Wireless General Settings Page Stalus The rest of the fields are optional and can be configured at another time Click SAVE if any changes have been made 19 Step 4 Configuring Wireless Coverage VAP 1 To setup the AP s wireless access refer to the following VAP 1 configuration other VAP configuration can refer to the same setup steps as done for VAP 1 Click on the Overview tab to proceed gt System Wireless Firewall Utilities Status A g n IEEE E 1 VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 200 1 Enabled None Disabled Edit 2 EAP200 2 Disabled None Disabled Edit 3 EAP 200 3 Disabled None Disabled Edit 4 EAP200 4 Disabled None Disabled Edit 5 EAP200 5 Disabled None Disabled Edit 6 EAP200 6 Disabled None Disabled Edit 7 EAP200 7 Disabled None Disabled Edit 8 200 8 Disabled None Disabled Edit Virtual AP Overview Page On this page click the hyperlink in the row and column that corresponds with VAP 1 s State This will bring up the following page c
21. the system firmware click Browse to choose the new firmware file you downloaded onto your PC and then click Upload to execute the process There will be a prompt confirmation message appearing to notify the administrator to restart the system after a successful firmware upgrade Please restart the system after upgrading the firmware Change Password Backup amp Restore System Upgrade Reboot Home Utilities System Upgrade System Upgrade Current Version Current Build Number System Upgrade Page e tis recommended to check the firmware version number before proceeding further Please make sure you have the correct firmware file Note Firmware upgrade may sometimes result in the loss of some data Please ensure that all necessary settings are written down before upgrading the firmware e During firmware upgrade please do not turn off the power This may permanently damage the system 73 d 7 4 4 Reboot This function allows the administrator to restart the EAP 200 safely The process shall take about three minutes Click Reboot to restart the system Please wait for the blinking timer to complete its countdown before accessing the system s Web Management Interface again The System Overview page will appear after reboot successfully Occasionally it is necessary to reboot the EAP 200 to ensure that parameter changes are submitted Change Password 1 Backup amp Restore System Upgrade Rebaoot Upload Cer
22. this manner undesired loops may form to lower overall WLAN performance To prevent such occurrence please make sure Layer 2 STP is enabled To turn on this feature please click on the System and then Network Interface tab Genera Network Interface N Management GRE Tunnel CAPWAP Home gt System gt Network Interface Network Settings static DHCP IP Address 192 168 1 1 Netmask 255 255 0 0 m Default Gateway 192 168 1 2 Primary DNS Server 192 168 1 2 T Alternate DNS Server fo Layer STP 9 Disable Enable Network Settings Page Please select Enable in the field labeled Layer2 STP This will prevent data from looping or a broadcast storm Click SAVE when completed and then Reboot to allow updated settings to take effect Article VII Web Management Interface Configuration This chapter will guide the user through the EAP 200 s detailed settings The following table shows all the User Interface UI functions of LevelOne s EAP 200 Enterprise Access Point The Web Management Interface WMI is the page where the status is displayed control is issued and parameters are configured In the Web Management Interface there are two main interface areas Main Menu and Working Area The Working Area occupies the major area of the WMI displayed in the center of the interface Itis also referred to as the configuration page The Main Menu on the top of the WMI allows the administrator t
23. type configured here shall follow upper bound AP s for intended connection VAP Overview General Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Repeater Config Repeater Settings The SSID of Upper Bound AP O P Current wireless channel of the system is set at 1 Repeater connection may fail if the system is set to connect to upper AP with different channels Security Type Repeater Settings Universal Repeater o The SSID of Upper Bound AP Specify the SSID of the upper bound AP that the system is used to extend that AP s wireless service coverage o Security Type None WEP or WPA PSK 55 WDS If WDS is selected EAP 200 can support up to 4 WDS links to its peer APs Security Type None WEP or WPA PSK can be configured to decide which encryption to be used for WDS connections respectively Please fill in remote peer s MAC address and click SAVE to proceed if setting revision is necessary CLEAR button is used to clear the contents in the above WDS connection list VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Repeater Config Repeater Settings Repeater Type l WES WDS Profile Security type Repeater Settings WDS o WES Enable WES o MAC Address To remote peer s MAC address o WDS Click on Enable to enable the respective WDS links click on Delete to remove
24. 3 e logout simply click on the Logout button at the upper right hand corner of the interface to return to the Administrator Login Page Click OK to logout Logout Help Logout Message from webpage Eg eo Are vou sure to logoff Please follow the following steps to change the administrator s password c 9 System Wireless Firewall Utilities Status Change Password Backup a Restore 1 System Upgrade Reboot Upload Certificate Y Home gt Utilities gt Change Password Change Password Name admin Old Password New Password up to 32 characters Re enter New Password Change Password Page gt Click on the Utilities main menu button and then select the Change Password tab gt Enter the old password and then a new password with a length of up to 32 characters and retype it in the Re enter New Password field Congratulation Now LevelOne s EAP 200 is installed and configured successfully It is strongly recommended to make a backup copy of configuration settings e After the EAP 200 s network configuration is completed please remember to change the IP Address of your PC Connection Properties back to its original settings in order to ensure that your PC functions properly in its real network environments Article III Connect your AP to your Network The following instructions depict how to establish the wireless coverage of your networ
25. 5 EAP200 5 Disabled None Disabled Edit EAP200 6 Disabled None Disabled Edit 7 200 7 Disabled None Disabled Edit 8 EAP200 8 Disabled None Disabled Edit VAP Overview Page 45 e State The hyperlink showing Enable or Disable connects to the VAP Configuration page ND NI NI A N Ys Overview N General vAP Config Security Repeater N Advanced N Access Control Site Survey 1 Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable 9 Enable 1 EAP200 1 VLAN ID 9 Disable Enable VLAN ID 1 4094 Profile Name ESSID VAP State Page eSecurity Type The hyperlink showing the security type connects to the Security Settings Page EX Nas VAP Overview General 1 VAP Config i Access Control Site Survey Home gt Wireless gt Security Security Repeater Advanced Security Settings Profile Name VAP 1 Security Type VAP Security Type Page 46 ACL The hyperlink showing Allow or Disable connects to the Access Control Settings Page T Security h Repeater Advanced Access Control F Overview Genera Config Site Survey Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients 32 Range 1 32 Access Control Type Disable Access Control VAP MAC ACL Pag
26. 9 dBm Site EN A Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 e LAN Interface a Status Profile Security Online MAC Address 00 1F D4 83 96 01 Name BSSID ESSID fud Clients e RE IP Address VAP 1 00 1F D4 83 96 02 EAP 1 None 0 Subnet Mask 255 255 0 0 VAP 2 O06 1F D4 83 36 02 EAP 2 Mone 29 Gateway VAP 3 0A 1F D4 83 96 02 EAP 3 None GRE Tunnel Status Connected Remote IP 192 168 3 3 Key 12345 System Overview Page 6 Table 3 Status Page s Organizational Layout System Name Firmware Version Build Number System Location Device Time System Up Time MAC Address LAN Interface E ri Gateway MAC Address Band Channel Radio Status Tx Power Profile Name Security Type Online Clients GRE Tunnel Remote IP Key Description The system name of the EAP 200 The present firmware version of the EAP 200 The present firmware build number of the EAP 200 The location of the EAP 200 The site of the EAP 200 The system time of the EAP 200 The time that the system has been rebooted in operation The MAC address of the LAN Interface The IP address of the LAN Interface The Subnet Mask of the LAN Interface The Gateway of the LAN Interface The MAC address of the RF Card The band in use The channel specified Transmit Power level of RF card The profile name of AP Basic Service Set ID Extended Service Set I
27. A RADIUS 25 e None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure Overview General VAP Config Security 5 Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism with key length selected from 64 bit 128 bit or 152 bit Overview General VAP Config Security Repeater Advanced Access Control Y Site Survey 7 Home gt Wireless gt Security Security Settings Profile Name Security Type WEP v Note The WEP keys are global setting for all virtual APs The key value will apply to all VAPs 802 11 Authentication 9 Open System Shared Key Auto WEP Key Length 9 64 bits 128 bits 152 bits WEP Key Format 9 ASCII Hex WEP Key Index WEP Keys Security Settings WEP gt 802 11 Authentication Select from Open System Shared Key or Auto gt WEP Key Length Select from 64 bit 128 bit 152 bit key length gt WEP Key Format Select from ASCII or Hex format for the WEP key gt WEP Key Index Select a key index from 1 through 4 The WEP key index is a number that specifies which WEP key is used for the encryption of wireless frames during data transmission
28. D Security type of the Virtual AP The number of online clients The status of GRE Tunnel The status of connection or Disabled The IP Address of AC The password for the connection b 7 5 2 Associated Clients The administrator can remotely oversee the status of all associated clients on this page When a low SNR is found here the administrator can tune the corresponding parameters or investigate the settings of associated clients to improve network communication performance Overview Associated Clients Repeater Event Log Home gt Status gt Wireless Clients Associated Client Status Client List Associated VAP ESSID MAC Address SNR dB Idle Time secs Disconnect Associated Client Status Page e Associated VAP The name of a VAP Virtual Access Point that the client is associated with e ESSID The Extended Service Set ID which the client is associated with e MAC Address The MAC address of associated clients e SNR The Signal to Noise Ratio of respective client s association e Idle Time Time period that the associated client is inactive the time unit is in second e Disconnect Upon clicking Kick the client will be disconnected with the system 78 c 7 5 3 Repeater The administrator can review detailed information of the repeater function on this page Information of repeater s status mode and encryption is provided Overview Clients Repeater Event Log Home gt Status gt Repeater Inform
29. S _____________ ___ ___ ___ ____________ ______ 37 gi A CC 39 Fees NE m 40 yu DM PDT NN m 42 TER VV EME 2 m 43 TONNO ta T 45 ELE ORAE 45 SC NN 48 200 NONI UU 50 EP CCIE IR RERO RR THE 51 git M CS MNA 55 7 2 6 57 7 2 7 ACCESS Control RRRRRRRRRRRRRRRRRRRRRRRRRERRRMRMMMMMMMMMMMMMMMMMMMEKFEPPSH SmERARRMAWMMRMRRARRRRRMRRRRREKEERFESESRZAARWAM 59 JA 63 Ts TE 65 FA MV Wy A TE 65 729 Foe E 69 VAI RO PNAC 70 JI LE E 71 71 TA Ws AC IO o 12 73 74 _____6 _____________ 6068 _ 75 Tey SS __ _____ _ ___ 76 NAV Ra S MN c m 76 AUC
30. Security Type Security Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism based on a 64 bit 128 bit or 152 bit shared key algorithm VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey A Home gt Wireless gt Security Security Settings Profile Name Security Type WEP v Note The WEP keys are global setting for all virtual amp Ps The key value will apply to all VAPs 802 11 Authentication 9 Open System shared Key Auto WEP Key Length 9 64 bits O 128 bits O 152 bits WEP Key Format ASci Hex WEP Key Index WEP Keys Security Settings WEP 5 VAP Overview Home gt 802 11 Authentication Select from Open System Shared Key or Auto WEP Key Length Select from 64 bit 128 bit 152 bit key length WEP Key Format Select from ASCII or Hex format for the WEP key WEP Key Index Select a key index from 1 4 The WEP key index is a number that specifies which WEP key will be used for the encryption of wireless frames during data transmission WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 802 1X When 802 1X Authentication is selected RADIUS authentication and Dynamic WEP are provided General Config Y Security Repeater Advanced Access Control Site Survey 3 AD 2 KT gt Securit Security Settings Profil
31. US ACL 62 h 7 2 8 Site Survey Sit Survey is a useful tool to provide information about the surrounding wireless environment available APs are shown with their respective SSID MAC Address Channel Rate setting Signal reading and Security type The administrator can click Setup or Connect to configure the wireless connection according to the mentioned readings when Repeater Type is Universal Repeater MAC Address Chamnma Kali S HOT Security STi Connect Q 1F DA 00 2b 56 54 43 None 28 12 04 00 2 56 1 54 I None Connect Site Survery Page If Universal Repeater function is enabled the system can scan and display all surrounding available access points APs The administrator can then select an AP to for connection to extend its wireless service coverage on this page MAC Address The MAC address of the respective AP Rate The transmitting rate of the respective AP Signal The encryption type used by the respective AP ww VV Setup Connect SSID The SSID Service Set ID of the AP found in this system s coverage area Channel The channel number currently used by the respective AP or repeater o Connect Click Connect to associate with the respective AP directly no further configuration is required 893 00 02 2 7 1 54 4 o Setup Click Setup to configure security settings for associating with the respective AP WEP Click
32. X and Wi Fi Protected Access WPA and WPA2 By pushing a purposely built button the WES Press n Connect feature makes it easy to bridge wireless links of multiple EAP 200s for forming wider wireless network coverage EAP 200 also features multiple ESSIDs with VLAN tags and multiple Virtual APs great for enterprise applications such as separating the traffics of different departments using different ESSIDs The PoE LAN port can receive power from Power over Ethernet PoE sourcing device Its metal case is IP50 anti dust compliant which means that EAP 200 is well suited to WLAN deployment in industrial environments PoE Switch fs te aaucu WDS Link ontraller ff s Mies gt o EAP2 00 ESSID 1 EAP200 ESSID 2 FQ MA 4 A m uU SA RN N Wired and Wireless Network Layout with EAP 200s Section 2 02 2 2 Deployment Topology m pace 12 148 1 1 2 L 192 164 1 Wireless Laptop ga V2 148 1 18 di Wireless Laptop A S Em RN T h a la F Zi ls a h a amp Vm i uM gt S 182 148 11 1027148 1 18 192 148 1 17 12 106 1 10 Wired Desktopi Whe 192 148 1 13 1 Wireles Lablop A EC mA 192108 132 1 Wired Desktops Common Network Layout with EAP 200s This above deployment scenario illustrates a deployment example using three
33. access points AP 1 AP 2 and AP 3 e Three EAP 200 systems construct a network comprising of wired and wireless segments e AP 2 plays the role of a wireless bridge e All devices share the same DHCP server 192 168 1 1 Section 2 03 2 3 Hardware Description This section depicts the hardware information including all panel description Connector Panel 7 6 gt 4 3 2 1 EAP 200 Connector Panel URN c IN DN NN DNI NK Amen pe ene ran we 5 set Han pues Attach the power adapter here Antenna Panel EAP 200 Antenna Panel Antenna Connector Attach the antennas here The system supports one HF interface with two SMA connectors LED Panel EAP 200 Enterprise Access Point EAP 200 LED Panel 1 Power LED LED ON indicates power on OFF indicates power off LAN LED LED ON indicates LAN cable connected OFF indicates no connection BLINKING indicates transmitting data 3 WLAN LED LED ON indicates wireless ready WDS LED LED ON indicates WDS ready WES LED saus indicate WES status WES Start LED Green OFF and then LED Red OFF and then SLOWLY BLINKING SLOWLY WES Negotiate BLINKING NORMALLY BLINKING NORMALLY Green Red WES Negotiate Timeout WES Negotiate Timeout Timeout LED LED Gren ON ON LED Red LED Re ON WES Success LED Red LED EL ON WES Fail LED Green ON LED Red ON n USB LED Disabled for future usage only 2 4 Ha
34. ation Repeater Information e amp Universal Repeater SSID Cip AP Status Enabled TX Rate 48 Mbits SNR 16 TX Count 69 Bytes TX Error 0 Packets Encryption Mone Repeater Status Page 9 d 7 5 4 Event Log The Event Log provides the records of system activities The administrator can monitor the system status by checking this log Overview Home Associated Clients Repeater Event Log Status gt Event Log Event Log 0 14 syslogd started BusyBox v1 12 4 1 00 0 1 00 00 14 syslog athOapO IEEE 802 11 Fetching hardware channel rate support not supported Event Log Page In the log each line represents an event record in each line there are 4 fields e Date Time The time amp date when the event happened e Hostname Indicates which host recorded this event Note that all events on this page are local events so the hostname in this field is always the same However in remote SYSLOG service this field will help the administrator identify which event is from this EAP 200 e Process name Indicate the event generated by the running instance e Description Description of the event To save the file locally click SAVE LOG to clear all of the records click CLEAR 80 Section 7 06 7 6 Online Help The Help button is at the upper right corner of the display screen Click Help for the Online Help window and then click the hyperlink of the relevant information needed Lo
35. cluded e g network administrator s computer 60 MAC ACL Deny List When selecting MAC ACL Deny List all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Disable VAP Overview N General n VAP Config N Security N Repeater N Adva nced Access Control Site Survey N Home gt Wireless gt Access Control Access Control Settings Profile Name 1 Maximum Number of Clients Range 1 32 Access Control Type MAC ACL Deny List v MAC Address State Deny List 61 gt RADIUS ACL Authenticate incoming MAC addresses by an external RADIUS When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration Overview General Config Security Repeater Adva ned Access Control Site Survey b Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type Poma Senar E deir Tide settings will also apply to security settings which use RADIUS Server for this Host Kk Domain Name IP Address Authentication Port 1 65535 RADI
36. e e Advanced Settings The advanced settings hyperlink connects to the Advanced Wireless Settings Page VAP Overview General 1 Config Security 1 Advanced os Control Site Survey Home gt Wireless gt Advanced Advanced Wireless Settings Profile Name RTS Threshold 1 2346 Fragment Threshold 256 2346 DTIM period 1 15 Broadcast SSID Disable 9 Enable Wireless Station Isolation 9 Disable O Enable WMM 9 Disable O Enable IAPP 9 Disable O Enable Multicast Broadcast Rate VAP Advanced Settings Page 47 b 7 2 2 General AP s general wireless settings can be configured here Overview General Config Security Repeater Advanced Access Control Site Survey Home 255 gt Genera Wire General Settings Band 802 119 802 11 iin Short Preamble Disable 9 Enable Short Guard Interval Disable 9 Enable Channel Width Channel Max Transmit Rate Transmit Power ACK Timeout 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500 5 AP General Settings Band Select an appropriate wireless band 802 11b 802 119 802 11b 802 11g 802 119 802 11 select Disable if the wireless function is not required gt 11n Enable 802 11n network only Short Preamble The short preamble with a 56 bit synchronization field can improve WLAN transmissi
37. e On this Page you can make entries to the Name Description and Location fields as well as set the device s time ww Wireless Firewall Utilities Status General Network Interface Management GRE Tunnel CAPWAP Home gt System gt General System Information 200 Desciption Location Time Device Time S 1970 01 01 00 47 28 Time Zone GMT 08 00 Taipei he Time 9 Enable NTP O Manually set up NTP Server 1 T NTP Server 2 System Information Page There are two methods of setting up the time Manual indicated by the option Set Date amp Time and NTP The default is Manual and requires individual setup every time the system starts up Simply choose a time zone and set the time accordingly When finished click SAVE Time Zone GMT 08 00 jTaipei v Time Enable NTP 2 Manually set up Set Date Ba IMIvonth pay Set Time Bour sec Manually Time Setup The alternative is NTP Upon selecting NTP under the Time field the configuration changes to allow up to two NTP servers Simply enter a local NTP server s IP Address if available or search online for an NTP server nearest you Set the time zone and click SAVE Time Zone GIVIT 2 08 DO JTaipei Time 9 Enable NTP O Manually set up NTP Setup Step 2 Configuring the AP s Network Settings 17 While still on this Page click
38. e Name VAP 1 Security Type 802 1X v Dynamic WEP Disable Enable WEP Key Length 9 64 bits 128 bits second s Primary RADIUS Server jos Domain Name IP Address Authentication Port 1812 i Secret Key Accounting Service Disable Enable Accounting Port 1813 Accounting Interim Update Interval second s Sever S egy Domain Name IP Address Security Settings 802 1X Authentication gt Dynamic WEP Settings O Dynamic WEP For 802 1X security tyoe Dynamic WEP is always enabled to automatically generate WEP keys for encryption WEP Key Length Select from 64 bit or 128 bit key length Re keying Period The time interval for the dynamic WEP key to be updated the time unit is in second RADIUS Server Settings Primary Secondary Host Enter the IP address or domain name of the RADIUS server Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 Secret Key The secret key for the system to communicate with the RADIUS server Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server 52 o Accounting Port The port number used by the RADIUS server for accounting purposes opecify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period
39. e drop down menu of Profile Name Choose Enable for the VAP field Pick a descriptive Profile Name and an appropriate ESSID for clients to associate to A VLAN ID can be provided to indicate the traffics through this particular It may allow further management control e g access rights and Internet usage etc of each VAP with a management gateway Click SAVE and then Reboot for the changes to take effect 23 Article V Secure Your AP Different VAP may require different level of security These instructions will guide the user through setting up different types of security for a particular VAP Simply repeat the following steps for other VAP with security requirement Step 1 Ensure the intended VAP is Enabled gt System Wireless Firewall Utilities Status LI 1 i ry 1 as NI z a JOP Overview General VAP Config Security Repeater Advanced Access Control Site Survey gt Wireless gt VAP Overviev VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 200 1 Enabled None Disabled Edit 2 200 2 Disabled None Disabled Edit 3 200 3 Disabled None Disabled Edit 4 EAP200 4 Disabled Mone Disabled Edit 5 EAP200 5 Disabled None Disabled Edit 6 200 6 Disabled None Disabled Edit 7 200 7 Disabled None Disabled Edit 8 200 8 Disabled None Disabled Edit VAP Overview Page On the VAP Overview page check t
40. e same VLAN ID such as connecting to a specific VAP with the same VLAN ID Enter a value between 1 and 4094 for the VLAN ID if the option is enabled 40 e SNMP Configuration By enabling SNMP function the administrator can obtain the system information remotely SNMP Configuration Disable Enable Community String Trap Disable Enable SNMP Configuration Fields gt Enable Disable Enable or Disable this function gt Community String The community string is required when accessing the Management Information Base MIB of the system o Read Enter the community string to access the MIB with Read privilege o Write Enter the community string to access the MIB with Write privilege gt Trap When enabled events on Cold Start Interface UP amp Down and Association amp Disassociation can be reported to an assigned server o Enable Disable Enable or Disable this function o Server IP Address Enter the IP address of the assigned server for receiving the trap report e System Log By enabling this function specify an external SYSLOG server to accept SYSLOG messages from the system remotely WV steam Lan Disable 9 Enable SYSLOG Server IP 192 168 1 254 Server Port SYSLOG Level System Log Fields Enable Disable Enable or Disable this function Server IP The IP address of the Syslog server that will receive the reported events Server Port The port number of the Syslog server
41. ended coverage For regular indoor deployments please keep the default setting Beacon Interval ms The entered amount of time indicates how often the beacon signal will be sent from the access point Due to RF regulation in different nations available values in the above table will differ Table 2 RF Configurations under normal circumstances in certain countries 802 11a 802 11b 802 119 802 116 802 119 802 11 802 11 802 11 802 119 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 1 2 3 4 5 6 7 8 9 10 11 12 13 5 5 5 49 6M 9M 12M 18M 24M 36M 48M 54M 1M 2M 5 5M 11M 6M 9M 12M 18M 24M 36M 48M 54M Auto Lowest Low Medium High Highest 1M 2M 5 5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 6M 9M 12M 18M 24M 36M 48M 54M 50 15 1M 2M 5 5M 11M 12M 18M 24M 36M 48M 54M 50 15 c 7 2 3 VAP Configuration This section provides configuration of each Virtual Access Point with settings such as Profile Name ESSID and VLAN ID VAP Overview General Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Config VAP Con
42. ess LAN access The default policy is unlimited access without any authentication required To restrict the station number of wireless connections simply change the Maximum Number of Stations to a desired number For example while the number of stations is set to 20 only 20 stations are allowed to connect to the specified VAP 27 e Access Control Type The administrator can restrict the wireless access of client devices based on their MAC addresses gt Disable Access Control When Disable is selected there is no restriction for client devices to access the system gt MAC ACL Allow List When selecting MAC ACL Allow List only the client devices identified by their MAC addresses listed in the Allow List allowed MAC granted with access the system The administrator can temporarily block any allowed MAC address by checking Disable until the administrator re Enables the listed MAC Site Survey VAP Overview General Y VAP Config Security Repeater Y Advanced Y Access Control Home Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type ACL Allow List v No MAC Address State 1 Disable Enable 2 9 Disable Enable MAC Allow List An empty Allow List means that there is no allowed MAC address Make sure at least the Note MAC of the management system is in
43. figuration Profile Name Disable 9 Enable Profile Mame VAP 1 ESSID EAP200 1 VLAN ID 9 Disable Enable VLAN ID 1 4094 VAP Configuration Page To enable specific VAP select the VAP from the drop down list of Profile Name The basic settings of each VAP are collected in the profile as follows VAP Enable or Disable this VAP e Profile Name The profile name of specific VAP for identity management purposes e ESSID ESSID Extended Service Set ID serves as an identifier for clients to associate with the specific VAP be coupled with different service level like a variety of wireless security types e VLAN ID EAP 200 supports tagged VLANs virtual LANs To enable VLAN function each VAP shall be given a unique VLAN ID with valid values ranging from 1 to 4094 50 d 7 2 4 Security EAP 200 supports various wireless authentication and data encryption methods in each VAP profile With this the administrator can provide different service levels to clients The security type includes None WEP 802 1X WPA PSK and WPA RADIUS e None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure VAP overview V General V VAP Config Security Repeater V Advanced Access Control N Site Survey N Home gt Wireless gt Security Security Settings Profile Name VAP 1
44. ger than this threshold will be fragmented sent with several pieces instead of one chunk before transmission A smaller value results in smaller frames but allows a larger number of frames in transmission A lower Fragment Threshold setting can be useful in areas where communication is poor or disturbed by a serious amount of radio interference e DTIM Period Input the DTIM Interval that is generated within the periodic beacon at a specified frequency Higher DTIM will let the wireless client save energy more but the throughput will be lowered e Broadcast SSID Disabling this function will prevent the system from broadcasting its SSID If broadcast of the SSID is disabled only devices that have the correct SSID can connect to the system e Wireless Station Isolation By enabling this function all stations associated with the system are isolated and can only communicate with the system 5 e WMM The default is Disable Wi Fi Multimedia WMM is a Quality of Service QoS feature that prioritizes wireless data packets based on four access categories voice video best effort and background Applications without WMM and applications that do not require QoS are assigned to the best effort category which receives a lower priority than that of voice and video Therefore WMM decides which data streams are more important and assigns them a higher traffic priority This option works with WMM capable clients only To receive the benefits of WMM
45. gout 7 Help Online Help Corner 8
46. he connection e Interface Select a VAP or WDS that its traffic will pass through the GRE Tunnel between APs and controller For how to enable VAP items please refer the section 7 2 3 VAP Configuration for reference 42 e 7 1 5 CAPWAP CAPWAP is a standard interoperable protocol that enables a controller to manage a collection of wireless access points There are 5 ways of discovery DNS SRV DHCP option Broadcast Multicast and Static 2 A B ENDS General Network Interface Management GRE Tunnel Home gt System gt capwap CAPWAP Configuration CAPWAP Disable Enable Certificate Date Check Disable O Enable Manage Certificates DNS SRV Discovery Disable Enable Domain Name Suffix DHCP Option Discovery Disable Enable Broadcast Discovery Disable Enable Multicast Discovery Disable Enable Pri AC Address Remark 1 2 Certificate Date Check To enable this item select Enable and click Manage Certificates to enter the page of Upload Certificate Please refer to the section 7 4 4 Upload Certificate e DNS SRV Discovery The way of using DNS SRV to discover acess controller gt Domain Name Suffix Enter the suffix of the access controller such as example com e DHCP Option Discovery The way of using DHCP option to discover access controller Broadcast Discovery The way of using Broadcast to discove
47. he table to confirm the VAP State If itis Enabled skip to Step 2 If not click on to proceed with VAP Configuration for that particular VAP VAP Overview Config Security Repeater Advanced Access Control Y Site Survey 1 Home Wire ess gt VAP Config VAP Configuration Profile Name Disable Enable Profile Name VAP 1 ESSID EAP200 1 VLAN ID Disable Enable VLANID fF 1 4094 VAP Configuration Page VAP 1 as shown for example Select Enable for the VAP field and click SAVE Click the Overview tab to return to the previous table 24 to begin the next step Step 2 Configure Security Settings for your VAP The following instructions will guide the user to set up wireless security with a specific If only restricted access of certain MAC addresses is desired skip to the Step3 MAC restriction can be coupled with wireless security to provide extra protection First click on the corresponding cell in the column labeled Security Type This hyperlink will direct the user to the following Security Settings page VAP Overview General Y VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings Page VAP 1 as shown for example Select the desired Security Type from the drop down menu which includes None WEP 802 1X WPA PSK and WP
48. ice Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes opecify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period 2 e WPA PSK Provide shared key authenticaiton in WPA data encryption 4 Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name 1 Security WPA PSK w Cipher Suite TKIP WPA Pre shared Key Type PsK Hex 64 chars 9 Passphrase 8 63 chars Group Key Update Period second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed gt Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 28 e WPA RADIUS Authenticate users by RADIUS and provide WPA data encryption VAP Overview General VAP Config Security Repeater Y Advanced Access Control Y Site Survey Home gt
49. ion in the following functions Firewall Settings Service and Advanced Firewall Settings a 7 3 1 Firewall List It provides an overview of firewall rules in the system 6 default rules with up to total 20 firewall rules are available for configuration Firewall List Service Y Advanced Home gt Firewall gt Firewall List Layer 2 Firewall Settings Enable Layer 2 Firewall Disable 9 Enable Mo State Action Name EtherType Remark Setting 1 DROP CDP IEEE 8023 Del Ed In Mv 2 DROP STP IEEE 8023 Del Ed In Mv 3 DROP GARP IEEE 8023 Del Ed In Mv Firewall List Page From the overview table each rule is designated with the following field No The numbering will decide the priority to let system carry out the available firewall rules in the tables e State The check marks will enable the respective rules Action DROP denotes a block rule ACCEPT denotes a pass rule Name It shows the name of rule EtherType It denotes the type of traffics subject to this rule Remark shows the note of this rule Setting 4 actions are available Del denotes to delete the rule Ed denotes to edit the rule In denotes to insert a rule and Mv denotes to move the rule 65 To delete a specific rule Del in Setting column of firewall list will lead to the following page for removal confirmation After SAVE button is clicked and system reboot the rule will be removed Firewall List Service
50. k The AP will connect to the network through its LAN port and provide wireless access to your network After having prepared the EAP 200 s hardware for configuration set the TCP IP settings of administrator s computer to have a static IP Address of 192 168 1 10 and Subnet Mask of 255 255 255 0 Step 1 Configuring the AP s System Information gt Enter the AP s default IP Address 192 168 1 1 into the URL of a web browser gt Login via using Username admin and Password admin The WMI appears as shown below gt mg System Wireless Firewall Utilities Status x si 5 Overview Associated Clients Repeater Event Log Home gt Status gt System Overviei System Overview g gt System e Radio Status System Mame Enterprise Access Point MAC Address 00 1F D4 83 95 02 Firmware Version Band 802 11g n Build Number Channel 1 Location TX Power 19 dBm Site Device Time 1970 01 01 08 00 30 System Up Time Odays 0 00 30 LAN Interface AP Status Profile gt Security Online MAC Address 00 1F D4 83 96 01 Name BSSID ESSID e Clients amp PE IP Address VAP 1 00 1F D4 83 96 02 EAP 1 None 0 Subnet Mask 255 255 0 0 VAP 2 06 1F D4 83 96 02 EAP 2 None 0 Gateway VAP 3 0A 1F D4 83 96 02 EAP 3 None 0 Q GRE Tunnel Status Connected Remote IP 192 165 3 3 Key 12345 Web Management Interface Main Page System Overview From here click on the System icon to arrive at the following pag
51. lete the installation Section 1 02 1 2 Document Conventions Hepresents essential steps actions or messages that should not be ignored Noe Contains related information that corresponds to a topic amd nd Indicates that clicking this button will save the changes you made but you must reboot the system upon the completion of all configuration settings for the changes to take effect Indicates that clicking this button will clear what you have set before the settings are applied Section 1 03 1 3 Package Content The standard package of EAP 200 includes e LevelOne EAP 200 x1 e Quick Installation Guide QIG x1 e CD ROM with User s Manual and QIG x1 e Console Cable x1 e Ethernet Cable x1 e Power Adapter DC 12V x1 e Antenna 2 e Screw Pack x1 e Ground Cable x1 It is recommended to keep the original packing materials for possible future shipment when repair or maintenance is required Any returned product should be packed in its original packaging to prevent damage during delivery Article II System Overview and Getting Started Section 2 01 2 1 Introduction of LevelOne EAP 200 The LevelOne EAP 200 Enterprise Access Point embedded with 802 11 n b g 2 4GHz MIMO radio in dust proof metal housing is designed for wireless connectivity in enterprise or industrial environments of all dimensions EAP 200 makes the wireless communication fast secure and easy It supports business grade security such as 802 1
52. level nas H EE m evelOne EAP 200 Enterprise Access Point User Manual V1 00 N CAJ 4 Go Table of Contents yon 3 LPE e SERERE 3 1 2 Document 5 sess esses sess esses esses sess esee 3 4 System Overview Getting Started eee eee eee eee eerte ee eee essen esteso et eneetnoee 5 2 3 Introdueaon of LevelOne 200 iso bos Pob dn dd opo 5 2A Deployment Topology 6 5 0 Hardware 7 24 Hardware DOCS NOM TIRE 9 2E Console BEES Me NE RE 10 2 6 Access Web Management Interface eese eee nennen nennen enne seen sette entes 12 Connect your AP to your Network 4 eee essen eee eee eee en este en sete ense tenete ene esten nete ense eaae 16 Adding Virtual Access Points cccssccsssssssccsssccsssccessccessccssssccessccesscsesscsesscesssesessecessssensecs 22 Secure YOUFP XP aoo 24 Create a WDS Bridge between two APS 33 Web Management Interface Configuration eee eee ee eee eere eene 35 FM ESA SC TW oa c 37 VE
53. m the same physical AP device Please click on the Wireless icon to review the VAP Overview page gt gt X system Wireless Utilities Stalus Firewall Ys m A f ew General VAP Config X Security Repeater Advanced Access Control 4 Site Survey Home Wireless gt VAP Overvie AT i X FT VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 200 1 Enabled None Disabled Edit 2 200 2 Disabled None Disabled Edit 3 EAP200 3 Disabled None Disabled Edit 4 EAP200 4 Disabled None Disabled Edit 5 200 5 Disabled None Disabled Edit 6 EAP200 6 Disabled None Disabled Edit j 200 7 Disabled None Disabled Edit 8 200 8 Disabled None Disabled Edit VAP Overview Page To proceed with specific VAP configuration click on the corresponding cell in the State column and the row of the VAP the particular VAP s Configuration page will then appear for further configuration gt System Wireless Firewall Utilities Status Overview General WAP Config Security Repeater Advanced 4 Access Control Site Survey Home gt Wireless gt VAP Config VAP Configuration Profile Name 1 v VAP Profile Name ESSID VLAN ID Q Disable 9 Enable VAP 1 IEAP200 1 Disable Enable VLAN ID POR 4094 VAP Configuration Page VAP 1 shown 22 Please select the desired VAP profile from th
54. ng example IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Please note that the IP Address used should not overlap with the IP Addresses of Note d other device within the same network e aunch the web browser on your PC and enter the IP Address of the EAP 200 192 168 1 1 at the address field and then press Enter The following Administrator Login Page will then appear Enter admin for both the Username and Password fields and then click Login Username admin Password Administrator Login Page e After a successful login into EAP 200 a System Overview page of the Web Management Interface WMI will appear _ 4 Overview Associated Cliente Wi Home gt Status gt System Overview gt System System Name Enterprise Access Point Firmware Version Build Number Location Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 e LAN Interface MAC Address 00 1F D4 83 96 01 IP Address Subnet Mask 255 255 0 0 Gateway GRE Tunnel Connected Remote IP 192 168 3 3 Status T Firewall System Overview Radio Status MAC Address 00 1 04 83 96 02 Utilities Band 802 11g n Channel 1 TX Power 19 dBm AP Status Profile Name VAP 1 BSSID VAP 2 Security Online Type Clients None 0 0 GRE The Web Management Interface System Overview Page 1
55. o traverse to various management functions of the system The management functions are grouped into branches System Wireless Firewall Utilities and Status Table 1 EAP 200 s Function Organization OPTION FUNCTION General Network Interface Management GRE Tunnel CAPWAP VAP Overview General VAP Configuration Wireless Security Repeater Advanced Access Control Site Survey Firewall List Service upana _ amp Restore smemo _ Upgrade _ Rm sd cei _____ Certificate _____ _____ Associated Clients 35 ____________ Event Log Note On each configuration page the user may Click SAVE to save the changes but the user must reboot the system upon the completion of all configurations for the changes to take effect Upon clicking SAVE the following message will appear Some modification has been saved and will take effect after Reboot All online users will be disconnected during reboot or restart 36 Section 7 01 7 1 System Upon clicking on the System button users can work on this section for general configurations of the devices e g Time Setup Network Configurations and System Logs This section includes the following functions General Network Interface Management GRE Tunnel and CAPWAP a 7 1 1 General General Interface Management GRE Tunnel gt System gt General System Information EAP2O00 E Descipion Location
56. on efficiency Select Enable to use Short Preamble or Disable to use Long Preamble with a 128 bit synchronization field Short Guard Interval available when Band is 802 119 802 11 The guard interval is the space between symbols characters being transmitted to eliminate inter symbol interference In order to further boost throughput with 802 11n short guard interval is half of what it used to be please select Enable to use Short Guard Interval or Disable to use normal Guard Interval Channel Width available when Band is 802 11g 802 11n Double channel bandwidth to 40 MHz is supported to enhance throughput Channel Select the appropriate channel from the drop down menu to correspond with your network settings for example Channel 1 11 is available in North American and Channel 1 13 in Europe or choose the default Auto Max Transmit Rate The maximum wireless transmit rate can be selected from the drop down menu The system will use the highest possible rate when Auto is selected Transmit Power The signal strength transmitted from the system can be selected among Auto Highest High Medium Low and Lowest from the drop down menu ACK Timeout It indicates a period of time that the system waits for an Acknowledgement frame sent back from a station without retransmission In other words upon timeout if the Acknowledgement frame is still not received the frames will be retransmitted This option can be used to tune network performance for ext
57. r access controller e Multicast Discovery way of using muticast to discover access controller e Static Discovery The way of using Static approach to discover access controller gt Address The IP address of access controller If it can not discover the first AC it will try to discover the second AC 43 Upload Certificate Manage Certificates 44 Section 7 02 7 2 Wireless This section includes the following functions VAP Overview General VAP Configuration Security Repeater Advanced Access Control and Site Survey EAP 200 supports up to eight Virtual Access Points VAPs Each VAP can have its own settings e g ESSID VLAN ID security settings etc With such VAP capabilities different levels of service can be configured to meet network requirements a 7 2 1 VAP Overview An overall status is collected on this page including ESSID State Security Type MAC ACL and Advanced Settings where EAP 200 features 8 VAPs with respective settings In this table please click on the hyperlink to further configure each individual VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 200 1 Enabled None Disabled Edit 2 EAP200 2 Disabled None Disabled Edit 3 EAP200 3 Disabled None Disabled Edit 4 EAP200 4 Disabled None Disabled Edit
58. rdware Installation Please follow the steps mentioned below to install the hardware of EAP 200 1 Place the EAP 200 at the best location The best location for EAP 200 is usually at the center of your intended wireless network 2 Connect the EAP 200 to your network device Connect one end of the Ethernet cable to LAN port of EAP 200 and the other end of the cable to a switch a router or a hub 200 is then connected to your existing wired LAN network 3 There are two ways to supply power over to EAP 200 a Connect the DC power adapter to the EAP 200 power socket b EAP 200 LAN port is capable of transmitting DC currents Connect an IEEE 802 3af compliant PSE device e g a PoE switch to the LAN port of EAP 200 with the Ethernet cable Now the Hardware Installation is complete e Please only use the power adapter supplied with the EAP 200 package Using a different power adapter may damage this system e double verify the wired connection between EAP 200 and you switch router hub please also check the LED status indicator of the respective network devices Section 2 04 2 5 Console Interface Via this port to enter the console interface for the administrator to check the IP address of EAP 200 and reset the device to default if the admin password is forgotten 1 In order to connect to the console port of EAP 200 a console modem cable and a terminal simulation program such as the Hyper Terminal are needed 2
59. rewall rule edit page with Ether Type to be IPv4 The first 28 entries are default services and the administrator can add delete any extra desired services There are 28 firewall services available in default settings these default services cannot be deleted but can be disabled If changes are made please click SAVE to save the settings before leaving this page Firewall List Service Advanced Home gt Firewall gt Service Config Mo 10 Name ALL ALL TCP ALL UDP ALL ICMP FIP HTTP HTTPS POP3 SMTP DHCP Firewall Service Description Delete ALL TCP Source Part 065535 Destination Port 065535 UDP Source Port 065535 Destination Port 0 655535 ICMP TCP UDP Destination Port 20 21 TCP UDP Destination Port 80 TCP UDP Destination Port 443 TCP Destination Port 110 TCP Destination Port 25 UDP Destination Port 67 68 First Prev Next Last total 28 Add Firewall Service Page 69 c 7 3 3 Advanced Advanced firewall settings are used to supplement the firewall rules providing extra security enhancement against DHCP and ARP traffics traversing the available interfaces of system Firewall List Y Service 4dvanced Home gt Firewall gt Advanced Advanced Firewall Settings Trust Interface 1 1 1 1 1 1 1 VAPI VAP2 VAPS VAPG DHCP Snooping 9 Disable Enable ARP Inspection 9 Disable Enable Force DHCP Disable Enable Trus
60. t List Broadcast Disable Enable Static Trust List Disable Enable Trust Interface Each VAP interface can be checked individually to mark as trusted interfaces security enforcements on DHCP ARP like DHCP snooping and ARP inspection will be carried out on non trusted interfaces DHCP Snooping When enabled DHCP packets will be validated against possible threats like DHCP starvation attack in addition the trusted DHCP server IP MAC can be specified to prevent rouge DHCP server ARP Inspection When enabled ARP packets will be validated against ARP spoofing o Force DHCP option when enabled the AP only learns MAC IP pair information through DHCP packets Since devices configured with static IP address does not send DHCP traffic therefore any clients with static IP address will be blocked from internet access unless its MAC IP pair is listed and enabled on the Static Trust List o Trust List Broadcast can be enabled to let other AP with L2 firewall feature learn the trusted MAC IP pairs to issue ARP requests o Static Trust List can be used to add MAC or MAC IP pairs of devices that are trusted to issue ARP request Other network nodes can still send their ARP requests however if their IP appears in the static list with different MAC their ARP requests will be dropped to prevent eavesdropping If any settings are made please click SAVE to save the configuration before leaving this page
61. t up the administrator can manually set the system date and time Time Device Time 2000 01 03 04 32 49 Time Zone Time O Enable NTP 9 Manually set up Set Time 5 Manual Time Configuration Fields Set Date Select the appropriate Year Month and Day from the drop down menu Set Time Select the appropriate Hour Min and Sec from the drop down menu 38 b 7 1 2 Network Interface On this page the network settings of the device can be configured fields with a red asterisk i e IP Address Netmask Default Gateway and Primary DNS Server are mandatory General Network Interface Management GRE Tunnel CAPWAP Home System gt Network Interface Network Settings Mode Static DHCP IP Address Netmask 255 255 0 0 Default Gateway Primary DNS Server Alternate DNS Server fo Layer STP 9 Disable Enable Network Settings Page e Mode Determine the way to obtain the IP address by DHCP or Static gt Static The administrator can manually set up the static LAN IP address All required fields are marked with a red asterisk o IP Address The IP address of the LAN port o Netmask The Subnet mask of the LAN port o Default Gateway The Gateway IP address of the LAN port o Primary DNS Server The IP address of the primary DNS Domain Name System server o Alternate DNS Server The IP address of the substitute DNS server
62. them o Security Type None WEP or WPA PSK 26 f 7 2 6 Advanced The advanced wireless settings for the EAP 200 s VAP Virtual Access Point profiles allow customization of data transmission settings The administrator can tune the following parameters to improve network communication performance if a poor connection occurs Overview General Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Advanced Advanced Wireless Settings Profile Name VAP 1 RTS Threshold 2346 1 2346 Fragment Threshold 2346 256 2346 DTIM period 1 1 15 Broadcast 5510 Disable amp Enable Wireless Station Isolation Disable Enable WMM Disable Enable Disable Enable Multicast Broadcast Rate 11M Advanced Wireless Settings Page e RTS Threshold Enter a value between 1 and 2346 RTS Request to Send Threshold determines the packet size at which the system issues a request to send RTS before sending the fragment to prevent the hidden node problem The RTS mechanism will be activated if the data size exceeds the value provided A lower RTS Threshold setting can be useful in areas where many client devices are associating with EAP 200 or in areas where the clients are far apart and can detect only EAP 200 but not each other eFragmentation Threshold Enter a value between 256 and 2346 The default is 2346 A packet size lar
63. tificate Home gt Utilities gt Reboot Reboot the System Reboot may take several minutes to complete The Admin Login Page will be shown after system boots up Reboot Page 74 e 7 4 4 Upload Certificate This function is used to setup the advanced configuration for the CAPWAP to manage Certificates Change Password Backup amp Restore System Upgrade Reboot Y Upload Certificate Home gt Utilities gt Upload Certificate Upload Certificate Upload Private Key Upload Certificate File Name se Upload Trusted Certificate File Name Bene gt Certificate It provides Certificate security for CAPWAP to ensures the safety between Access Controller and WAP Use Default Certificate Click Use Default Certificate to use the default certificate and key 75 Section 7 05 7 5 Status This page is used to view the current condition and state of the system and includes the following functions Overview Associated Clients Repeater and Event Log a 7 5 1 Overview The System Overview page provides an overview of the system status for the administrator Repeater Event Log Overview Associated Clients Home gt Status gt System Overview System Overview gt System ____ ___ _ Radio Status System Name Enterprise Access Point MAC Address 00 1F D4 83 96 02 Firmware Version Band 802 119g4n Build Number Channel 1 Location TX Power 1
64. to take effect 32 Article VI Create a WDS Bridge between two APs WDS link creation will assist to extend network coverage where running wires is not an option effectively transferring the traffics to the other end of WLAN LAN through the EAP 200 Since this is a peer to peer connection both EAP 200s will be configured by the same way Step 1 Make sure the Band and Channel are matched between the WDS peers In order to create a valid WDS link the two EAP 200s must be configured to use the same channel and band for their wireless settings Click the Wireless icon and then General tab to go to the following page system Firewall Utilities Status VAP Overview General Config Security Repeater Advanced Access Control Site Survey eral Settings D HA D Un n Gi Band 802 119 802 11n 1 11n Short Preamble Q Disable 9 Enable Short Guard Interval Disable Enable Channel Width 20 MHz Mi Channel 1 w Max Transmit Rate Auto Transmit Power Auto w ACK Timeout 0 0 255 O Auto Unit 4 micro seconds Beacon Interval 1100 100 500ms Wireless General Settings Please make sure both APs are using the same Band and Channel in order to establish a successful WDS link Click SAVE if any changes have been made 33 Step 2 Prevent Loops if Connecting Many APs When many APs are linked in
65. ve r pd ath apt log en Ho such file or directory ewErom Wetwork is down rR m m un n ou D rErom Network is down DE messages they ll go to dev null rR 12 packet receive r Warning Mo sour c H rm m DO Fh Ly Ch nent 3 Received 0 ri Im im er O broadcast 3 ata art WES pid 546 try _ wrapper sh ttys 115200 wt100 SYSTEM IP 192 160 Enter set t actory default login 11 Section 2 05 2 6 Access Web Management Interface LevelOne EAP 200 supports web based configuration Upon the completion of hardware installation EAP 200 can be configured through a PC by using its web browser such as Mozilla Firefox 2 0 and higher or Internet Explorer version 6 0 and higher The default values of the EAP 200 s LAN IP Address and Subnet Mask are IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Enterprise Access Point Windows Internet Explore Ko co E File Edit View Favorites Tools Help Enterprise Access Point Example of entering EAP 200 s default IP Address into a web browser e o access the web management interface WMI connect the administrator PC to the LAN port of EAP 200 via an Ethernet cable Then set a static IP Address on the same subnet mask as the EAP 200 in TCP IP settings of your PC such as the followi
66. xt step 29 Step 3 Configuring MAC ACL Access Control List Clicking on the hyperlink corresponding with intended VAP in the MAC ACL column the user will be brought to the Access Control Settings page VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type Disable Access Control Access Control Settings Page Please choose among Disable Allow Deny and RADIUS ACL from the drop down menu of Access Control Type 1 Disable Access Control This means that there is no restriction for client devices to access the system 2 MAC ACL Allow List This means that only the client devices identified by their MAC addresses listed in the Allow List allowed MAC addresses is granted with access to the system The administrator can temporarily block any allowed MAC address by checking Disable until the administrator renews the listed MAC Overview General Security Repeater Advanced foe Control Site Survey Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type ACL Allow List v MAC Address MAC ACL Allow List State MAC ACL Deny List This means that

Download Pdf Manuals

image

Related Search

Related Contents

Catalogo Geral pags. 1 a 35  Samsung 24" Curved Monitor SE510  TV-NAVI KIT取扱説明書  

Copyright © All rights reserved.
Failed to retrieve file