Online Help
Organization of the Configuration Web:
System |
AP |
WDS |
Scan |
Utilities |
Status |
System Information |
Overview |
Overview |
Scan Settings |
Admin Password |
Overview |
Network |
General |
RF Settings |
Scan Result |
Config Backup & Restore |
Antennas |
Management |
VAP Config |
WDS Config |
|
System Upgrade |
Clients |
|
Security |
WDS Discovery |
|
Reboot |
WDS List |
|
Advanced |
|
|
|
Event Log |
|
Access Control |
|
|
|
|
System
System > System Information
- Fields "Name", "Description", and "Location" are used for mnemonic purpose. It is recommended to have different values in each AP you have.
- Time settings allow the 's system time synchronized with NTP server or manually set. When NTP server is used, NTP server1 must be filled; and if FQDN (full qualified domain name) is used, the DNS server setting must also be activated.
System > Network Settings
- LAN Interface configuration: Determine the way to obtain the IP address, by DHCP or manually set.
- DHCP client: The option is provided when the users have a DHCP server in the wired or wireless network; Please make sure the network connectivity are correct. The following IP address/Netmask/Gateway setting should become no effect.
- Static setting: Static setting is set these parameters manually. The basic parameters need to provide such as IP address, subnet mask and Gateway.
- Primary and secondary DNS server: If any other host addresses of management service are given in FQDN format (full qualified domain name), ensure at least one of these DNS server’s IP addresses is correct.
- Layer 2 STP: Depending on the configuration of the (including wired and wireless settings), when it is configured to bridge several networks, we need to enable STP.
System > Management Services
For easier maintenance, SNMP and remote syslog services are provided in the . The will be managed remotely in a centralized manner.
- SNMP: By enabling this SNMP service, the remote SNMP manager could obtain 's system status.
- Syslog: By enabling this service, specify a remote syslog server which could accept system log messages from remotely. Thus, by reading the syslog message in the remote server, review activities of all installed s in the network.
AP
AP > Virtual AP Overview
- An overall status is collected in this page; as in the figure, the has 4 virtual APs (VAP), each has its own settings. In the table, we can click on the "Advanced Setting" to have detailed configuration of these VAPs respectively.
AP > General Settings
The item in this page is for AP's RF settings and will be applied to all VAPs.
Normally, the available RF configurations can be illustrated as:
Mode |
Channel |
Rate |
Power |
Disable |
NA |
NA |
NA |
802.11a |
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140,149, 153, 157, 161 |
1M, 2M, 5.5M, 11M, 12M, 18M, 24M, 36M, 48M, 54M |
Auto, Lowest, Low, Medium, High, Highest |
802.11b |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 |
1M, 2M, 5.5M, 11M |
802.11b+802.11g |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 |
1M, 2M, 5.5M, 11M, 12M, 18M, 24M, 36M, 48M, 54M |
However, due to RF regulation in different nation, available values in the above table differ. Change from the "Country Selection" to find these available values from the drop-down list.
AP > VAP Configuration
To enable each VAP in the , we need to configure each VAP individually and the settings of each are collected as its profile.
- Profile Setting: Enable or disable virtual AP settings.
- Profile Name: Give the profile an identity for management purpose.
- ESSID: Indicate the ESSID which the clients used to connect to the VAP. ESSID will determine the service type of a client which assigned to the specified VAP.
- VLAN ID: The supports tagged VLAN. To enable VLAN function, each VAP needs a unique VLAN ID; valid values are from 1 to 4094.
AP > Security Settings
The supports various user authentication and data encryption in each VAP's profile, and thus we can depend on the needs to provide different service levels to clients. The security type includes:
- None: No authentication required. This is the default setting ass shown in above figure.
- WEP: Support key length of 64/128/152 bits.
- 802.1X: Provide RADIUS authentication and enhanced WEP.
- WPA-PSK: Provide shared key authentication in WPA data encryption.
- WPA-RADIUS: Authenticate user by RADIUS in WPA data encryption.
AP > Advanced Wireless Settings
Mostly, the default settings should meet general requirements. If occasionally we need tune or debug the wireless network, we may take the following parameters for that purpose.
- Beacon Interval: This interval specifies the time interval, in milliseconds. Between each beacon frame is transmitted. The default value is 100, valid from 25 to 500ms.
- RTS Threshold: To control station access to medium and to alleviate this effect of the hidden terminal problem, we can tune this RTS threshold value. It should have a value among 1-2346 and is default to 2346.
- Fragmentation Threshold: A unicast frame larger than this threshold will be fragmented before the transmission. If significant numbers of collisions are occurring, we can try to take a smaller value of the fragmentation threshold to see if it helps.
- Broadcast SSID: Disable this item will prevent the from broadcasting its SSID publicly.
- Station Isolation: By enabling this item, all stations in the same 's coverage area can not communicate with each other.
- WMM: To decide which data streams are most important and assign them a higher traffic priority, we may enable this feature. Its default value is "disable".
- IAPP: To provide a better roaming capability for the stations among APs nearby the , we can enable this item. Its default value is "disable".
AP > Access Control Settings
The supports various methods of authenticating clients for using wireless LAN. The default policy is unlimited connections without any authentication required. To restrict the station number of wireless connections, just change the Maximum number of stations to a desired number. For example, while the number of station is set to 20, only 20 stations are allowed to connect to this VAP.
For MAC ACL control, the supported methods include:
- Disable: No MAC address check required.
- Allow List: Deny all except allowed ones in the list.
- Deny List: Allow all except denied ones in the list.
- RADIUS ACL: Authenticate the incoming MAC address by RADIUS.
The one selected in the Access Control Type is the activated policy while the rest ones will be omitted.
WDS
The configurations under this category apply to all virtual AP in this device.
WDS > RF Settings
The shared secret is used to discover remote WDS peer, both ends must share the same key, otherwise the remote peer will ignore the request.
To use WDS discovery, both peers must equipped this feature; For example, the remote one is also an .
Each WDS interface has its own RF settings, normally, valid combination of RF parameters configuration would like the following table; however, the available values of each item will be affected by the RF regulation which is configured in AP's RF settings.
Mode |
Channel |
Rate |
Power |
Disable |
NA |
NA |
NA |
802.11a |
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140,149, 153, 157, 161 |
1M, 2M, 5.5M, 11M, 12M, 18M, 24M, 36M, 48M, 54M |
Auto, Lowest, Low, Medium, High, Highest |
802.11b |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 |
1M, 2M, 5.5M, 11M |
802.11b+802.11g |
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 |
1M, 2M, 5.5M, 11M, 12M, 18M, 24M, 36M, 48M, 54M |
Country: Due to the RF regulation of each country, the above values may changes after the country specified.
WDS > WDS Link Overview
The figure provides an overall status of all the WDS links.
- Item: Corresponding profiles of each WDS interface
- Status: Enable or Disable the plan
- MAC address: Remote peer's MAC address
- Signal quality: none or other signal
- Security: Disable or WEP
- Delete: Remove profiles by checkbox selection and click on Delete to remove them.
- Edit: To change the individual settings of each WDS profile, click on Edit to modify the settings.
WLAN > WDS Link Settings
For each WDS link profile, we need remote peer's MAC address and the authentication method for establishing a connection to the peer.
- WDS profile: Total 8 profiles available for , use the drop-down menu to select one to configure.
- WDS setting: Enable or Disable the specified WDS link
- MAC Address of Remote AP: For each link, give the remote peer's MAC address here. May also get this address by WDS Discovery. Please refer to WDS discovery for detail.
- Security:
- None: No authentication required to establish the WDS link, not recommended.
- WEP: Establish the WDS link in WEP authentication which must provide key length, format and the key itself respectively.
WLAN > WDS Discovery
- provides easy-to-use peer discovery feature provided that both ends must have the same 'shared secret'; please refer to WDS RF settings for the shared secret. The remote peer must also have the same 'Scan' feature equipped. To start WDS discovery, select WDS interface number and then click on the Discover Now button.
- If the local WDS is in remote peer's coverage area, the information of remote peer will be listed as in the figure. Click on the Connect button, the MAC address of remote peer will be retrieved locally for WDS connection.
Scan
The provides this Scan feature for users to figure out the wireless status as it is from the view of the VAPs. It probes the WLAN and retrieves the information from clients, thus, they can compare the result to the VAP's settings to avoid unexpected setting conflict and to tune the corresponding parameters. This section provides information on the following functions: Config and Reset.
In the , this job is done by a stand-alone antenna, thus it will act no harm to the normal traffic on the WDS or AP connections.
Scan > Scan Configuration
- Scanning: Enable or Disable scan settings.
- Scanning Interval: The time interval used to trigger the scanning. It takes 86400 seconds as the default setting.
Scan > Scan Result
- The result table records the latest scan result. Still, the user could click the Scan Now button again to trigger the result immediately. Take the result to compare with the AP's setting and status and to tune necessary AP settings.
Utilities
Utilities > Change Password
The password will be verified before entering this Web interface. The login ID is "admin".
Utilities > Configuration Save & Restore
The settings of this AP can be backed up to a file. This file can be saved for future use. It can be used to duplicate settings to the other access points (backup settings and then restore in another AP).
Utilities > System Upgrade
Please make sure you have the correct firmware file. During firmware update, please don't turn off the power. This may permanent damage this AP.
Utilities > Reboot
At this page, you can reboot remotely.
Status
Status > System Overview
This section provides an overview of the system for the administrator.
System's overall status, for individual setting/status, we need check them in each configuration page.
The description of the table is as follows:
Item |
Description |
Firmware Version |
The present firmware version. |
System Name |
The system name. |
Device Time |
The network time server that the system is set to align. |
System Up Time |
The system time is shown as the local time. |
LAN Interface |
MAC Address |
The MAC address of LAN Interface |
IP Address |
The IP address of the LAN Interface |
Subnet Mask |
The Subnet Mask of the LAN Interface |
RF Card |
MAC Address |
The MAC address of RF Card |
Band |
The RF band(a,b or g) used |
Channel |
The channel specified |
AP |
The RF module used for AP |
WDS |
The RF module used for WDS link |
SCAN |
The RF module used to probe other nearby APs |
Virtual AP Profiles |
BSSID |
Basic Service Set ID |
ESSID |
Extended Service Set ID |
VAP |
Virtual AP, the supports total 4 APs |
Status > Mini-PCI Slots
Indicate the role(AP, WDS or Scan) and MAC address of each RF interface.
Status > Associated Clients
List all associated clients from all the VAPs. We can take this table to manage the clients and take the signal strength for debug purpose.
Status > Event Log
Event log provides the system activities records. We can monitor the system status by checking this log.
In the log, normally, each line represents an event record; and in each line, there are 4 fields:
- Date/Time: The time & date when the event happened
- Hostname: Indicate which host records this event. Note that all events in this page are local events, so events of this field are all the same. However in remote syslog service, this field will help us to identify which event is from this . Please refer to section Management Service.
- Process Name (with square brackets): Indicate the event generated by this running instance
- Description: Description of this event
To save the file locally or clear all the records, press Save or Clear button respectively.