background image

Enable Wireless 
Network: 

Check the box to enable this wireless network, allowing the hosts 
connected to the wireless network to communicate with each other. 

Security Mode 

Following is the detailed introduction of security mode:

 WPA/WPA2 

and

 WPA-PSK/WPA2-

PSK

 

WPA-PSK/WPA2-PSK 

Based on pre-shared key. It is characterized by higher safety and simple settings, which 
suits for common households and small business. WPA-PSK has two versions: WPA-
PSK and WPA2-PSK.   

 

Figure 4-3 Security Mode WPA-PSK/WPA2-PSK 

Authentication 
Type: 

 

Auto

: Select WPA or WPA2 automatically based on the wireless 

station's capability and request. 

 

WPA-PSK

: Pre-shared key of WPA. 

 

WPA2-PSK

: Pre-shared key of WPA2. 

Encryption: 

Select the encryption type, including 

Auto

TKIP

, and 

AES

. The default 

setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or 
AES (Advanced Encryption Standard) automatically based on the wireless 
station's capability and request. AES is more secure than TKIP and TKIP 
is not supported in 802.11n mode. It is recommended to select AES as 
the encryption type. 

PSK Password: 

Configure the PSK password with ASCII or Hexadecimal characters. For 
ASCII, the length should be between 8 and 63 characters with 
combination of numbers, letters (case-sensitive) and common 
punctuations. For Hexadecimal, the length should be 64 characters (case-
insensitive, 0-9, a-f, A-F).   

Group Key 
Update Period: 

Specify the group key update period in seconds. The value can be either 
0 or 30-8640000 seconds. 

 

WPA/WPA2 

13 

Summary of Contents for AURANET CAP300-Outdoor

Page 1: ...REV1 0 0 1910012023 User Guide 300Mbps Wireless N Outdoor Access Point CAP300 Outdoor...

Page 2: ...duct names are trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as transl...

Page 3: ...V technician for help This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device must accept...

Page 4: ...ent appareil est conforme aux CNR d Industrie Canada applicables aux appareils radio exempts de licence L exploitation est autoris e aux deux conditions suivantes 5 l appareil ne doit pas produire de...

Page 5: ...power is to disconnect the product or the power adapter from the power source Don t disassemble the product or make repairs yourself You run the risk of electric shock and voiding the limited warranty...

Page 6: ...voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment WEEE This means that this product must be handled pursuant to European directive 2012 1...

Page 7: ...n 8 Wireless Parameter 8 Wireless Service 9 Wireless Client 10 Wireless 11 Wireless 11 WDS Settings 14 Advanced Settings 16 Network 19 Wireless MAC Filtering 19 VLAN Settings 20 System 21 AP Managemen...

Page 8: ...s or implied Users must take full responsibility for their application of any product Convention Some models featured in this guide may be unavailable in your country or region For local sales informa...

Page 9: ...usiness They can either work independently in FAT mode or be centrally managed by the wireless controller in FIT mode providing a flexible richly functional but easily configured enterprise grade wire...

Page 10: ...e wireless controller you can centrally manage the mass APs simply in a web browser In FAT mode you can log in to AP s webpage to manage the AP alone The FAT mode is used in a small wireless network T...

Page 11: ...Typical topology in FIT mode Figure 2 1 Typical Topology in FIT Mode NOTE The IP address of the wireless controller must be reachable for the CAPs in the network 4...

Page 12: ...FAT Mode In FAT mode you can log in to AP s webpage to manage the AP alone The FAT mode is used in a small wireless network Typical topology in FAT mode Figure 2 2 Typical Topology in FIT Mode 5...

Page 13: ...e device the IP address of your PC should be set in the same subnet addresses of the device The IP address is 192 168 0 x x is any number from 1 to 253 Subnet Mask is 255 255 255 0 2 Create a new user...

Page 14: ...Figure 2 4 Status TIPS Proceed to the following chapters for information on configuring the CAP in FAT mode 7...

Page 15: ...sion MAC address IP address system time and running time of the CAP If you want to modify the IP address of the CAP Please refer to AP Management To modify the system time please refer to Time Setting...

Page 16: ...vice Click the button to edit the corresponding wireless service entry You can change the SSID Network type and password Check or uncheck the status box to enable or disable the wireless service as ne...

Page 17: ...Wireless Client The wireless client table displays the information of the connected clients including their MAC address connected SSID and the connection time Figure 3 6 Wireless Client 10...

Page 18: ...the page to remind you to save the configuration Click Save when you finish all settings otherwise all the settings will be recovered to last saved settings at reboot or power off NOTE Proceed to the...

Page 19: ...s networks Office Network Functions as a normal wireless network Security Mode Select the security mode of wireless network If all the hosts are allowed to access the wireless network without password...

Page 20: ...A WPA2 PSK Pre shared key of WPA2 Encryption Select the encryption type including Auto TKIP and AES The default setting is Auto which can select TKIP Temporal Key Integrity Protocol or AES Advanced En...

Page 21: ...ased on the wireless station s capability and request AES is more secure than TKIP and TKIP is not supported in 802 11n mode It is recommended to select AES as the encryption type RADIUS Server Port E...

Page 22: ...tings Check the box and click OK The following figure will be shown Click Yes to enable the WDS feature There are two ways to select the root AP Scan or manually enter the parameters Scan Click the Sc...

Page 23: ...the AP s security configuration It is recommended that the security type is the same as your AP s security type Select the encryption type including None and WPA PSK WPA2 PSK The default setting is No...

Page 24: ...h another nearby access point Transmit Power You can use the slider or manually enter the transmit power value The maximum transmit power may vary among different countries or regions SSID Isolation W...

Page 25: ...h the AP will discard a connected client Values from 95 to 0 dBm are valid The default value is 75dBm It is recommended the maximum number is less than 40 dBm When the signal strength of the connected...

Page 26: ...power off Wireless MAC Filtering Wireless MAC Filtering feature uses MAC addresses to determine whether one host can access the wireless network or not Thereby it can effectively control the user acc...

Page 27: ...tton to delete the selected entry VLAN Settings In this section all the wireless network will be listed here Figure 5 4 VLAN List The CAP can add different VLAN tag to the clients which connect to the...

Page 28: ...re firmware upgrade and ping watch dog Figure 6 1 System Page If you have made any change of the parameters please click OK to make the configuration take effect There will be a blue bar at the top of...

Page 29: ...Set the default gateway of CAP The default setting is 255 255 255 0 You can change it according to the network need Manage VLAN Check the box to enable the manage VLAN Specify the Manage VLAN ID The...

Page 30: ...tect your device from unauthorized login Figure 6 3 Account Page Current User Name Password Enter the current user name and password of the admin account to get the permission of modification New User...

Page 31: ...P will send the system log to the specified IP address Time Setting System time represents the device system s notion of the passing of time System time is the standard time for Scheduler and other ti...

Page 32: ...firmware Restore Click Browse to locate and select the backup file then click Restore to import the file to recover the configurations Factory Restore Click Reset to restore your device to its factor...

Page 33: ...is a connection failure then the device will automatically reboot Ping Watch Dog is dedicated to continuously monitoring the connectivity to a specific host using the Ping tool The Ping tool sends IC...

Page 34: ...elay value should be at least 60 seconds as the device s initialization takes a considerable amount of time Lost Packets Count Enter the fail count of ICMP echo request If the device sends the specifi...

Reviews: