TP-Link Auranet EAP115-Wall Скачать руководство пользователя страница 40

 

37 

 

Wireless Settings 

 

Figure 6-4 Wireless Settings 

Channel/Frequency: 

Displays the channel number and the operating frequency. If you 
want to change them, please refer to

 

5.1.1 Wireless Basic Settings

. 

Channel Width: 

Displays the spectral width of the radio channel used by the device. 
If you want to change it, refer to 

5.1.1 Wireless Basic Settings

. 

IEEE802.11 Mode: 

Displays the radio standard used for operation of your device. If you 
want to change it, refer t

5.1.1 Wireless Basic Settings

Max TX Rate: 

Displays the maximum data rate at which the device should 
transmit wireless packets. 

Transmit Power: 

Displays the maximum average transmit power of the device. If you 
want to change it, refer t

5.1.1 Wireless Basic Settings

 

LAN Information 

 

Figure 6-5 LAN Information 

MAC Address: 

Displays the MAC address of the device.

 

IP Address: 

Displays the IP address of the device.

 

Subnet Mask: 

Displays the subnet mask of the device.

 

Содержание Auranet EAP115-Wall

Страница 1: ...REV1 0 0 1910011922 User Guide EAP115 Wall...

Страница 2: ...9 5 1 3 Wireless Advanced Settings 13 5 1 4 Load Balance 14 5 2 Portal 15 5 2 1 Portal Configuration 16 5 2 2 Free Authentication Policy 20 5 3 MAC Filtering 22 5 4 Scheduler 25 5 5 QoS 28 5 5 1 AP ED...

Страница 3: ...4 7 1 2 Log Settings 45 7 2 Web Server 46 7 3 Management Access 47 7 4 LED ON OFF 48 7 5 Wi Fi Control 48 7 6 SSH 49 7 7 Management VLAN 50 7 8 SNMP 50 Chapter 8 System 53 8 1 User Account 53 8 2 Time...

Страница 4: ...or small and medium business Celling lamp appearance and easily mounting design with chassis make the EAP easy to be installed on a wall or ceiling and blend in with most interior decorations With two...

Страница 5: ...2 Chapter 2 Network Topology A typical network topology for EAP115 Wall is shown below Figure 2 1 Typical Topology...

Страница 6: ...ent subnet with the EAPs The EAP can be managed by the EAP Controller software which is a management software specially designed for the TP Link EAP devices on a local wireless network allowing you to...

Страница 7: ...ynamic Host Configuration Protocol Before you access the web interface of the EAP please make sure the DHCP server works properly Typically a router acts as the DHCP server Follow the steps below to l...

Страница 8: ...lect Static to configure IP address manually Fallback IP If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds the fallback IP will work as the IP address of the device Af...

Страница 9: ...6 Chapter 5 Wireless Wireless page consisting of Wireless Settings Portal MAC Filtering Scheduler QoS and Rogue AP Detection is shown below Figure 5 1 Wireless Page...

Страница 10: ...7 5 1 Wireless Settings Following is the page of Wireless Settings Figure 5 2 Wireless Settings Page...

Страница 11: ...ptions include 20MHz 40MHz and 20 40MHz this device automatically selects 20MHz or 40MHz and 20MHz will be used if 40MHz is not available According to IEEE 802 11n standard using a channel width of 40...

Страница 12: ...r and will reduce longevity of the device Select a certain transmit power is enough to achieve the best performance 5 1 2 SSIDs SSIDs can work together with switches supporting 802 1Q VLAN The EAP can...

Страница 13: ...curity modes as the details are in the following introduction Select None and the hosts can access the wireless network without password Portal Portal provides authentication service for the clients w...

Страница 14: ...lected You can configure four keys in advance and select one as the present valid key Wep Key Format Select the wep key format as ASCII or Hexadecimal ASCII ASCII format stands for any combination of...

Страница 15: ...ng is Auto which can select TKIP Temporal Key Integrity Protocol or AES Advanced Encryption Standard automatically based on the wireless station s capability and request AES is more secure than TKIP a...

Страница 16: ...Key Integrity Protocol or AES Advanced Encryption Standard automatically based on the wireless station s capability and request AES is more secure than TKIP and TKIP is not supported in 802 11n mode I...

Страница 17: ...y default RTS Threshold When the RTS threshold is activated all the stations and APs follow the Request to Send RTS protocol When the station is to send packets it will send a RTS to AP to inform the...

Страница 18: ...st need temporary access to the wireless network Such clients have to log into a web page to establish verification after which they will access the network as guests What s more you can customize the...

Страница 19: ...ol and click the Login button 2 Local Password Users are required to enter the preset password which are saved in the EAP 3 External RADIUS Server Users are required to enter the preset user name and...

Страница 20: ...list to customize the parameter Redirect Disable by default Redirect specifies that the portal should redirect the newly authenticated clients to the configured URL Redirect URL If you enable the Red...

Страница 21: ...Timeout Redirect Redirect URL and Portal Customization External RADIUS Server External RADIUS Server provides two types of portal customization Local Web Portal and External Web Portal The authentica...

Страница 22: ...al RADIUS Server RADIUS Server IP Enter the IP address of the RADIUS server Port Enter the port for authentication service RADIUS Password Enter the shared secret of RADIUS server to log in to the RAD...

Страница 23: ...n to the RADIUS server Portal Customization Select External Web Portal External Web Portal URL Enter the authentication login page s URL which is provided by the remote portal server Please refer to N...

Страница 24: ...for free authentication policy Leaving the field empty means all IP addresses can be visited When External Radius Server is configured and External Web Portal is selected please set the IP address an...

Страница 25: ...me is Policy 1 Clients with IP address range 192 168 2 0 24 are able to visit IP range 10 10 10 0 24 Policy 1 is enabled Click to edit the policy Click to delete the policy 5 3 MAC Filtering MAC Filte...

Страница 26: ...roup Follow the steps below to add MAC groups Step 1 Click two tables will be shown Figure 5 19 Station MAC Group Step 2 Click and fill in a name for the MAC group Figure 5 20 Add a Group Step 3 Selec...

Страница 27: ...ering Association SSID Name Displays the SSID of the wireless network Band Displays the frequency band the wireless network operates at MAC Group Name Select a MAC group from the drop down list to all...

Страница 28: ...e radio Figure 5 23 Scheduler Page Settings Scheduler Check the box to enable Scheduler Association Mode Select Associated with SSID AP you can perform configurations on the SSIDs AP The display of Sc...

Страница 29: ...cheduler Profile Configuration Step 2 Click and input a profile name for the rule Figure 5 25 Add a Profile Step 3 Select one profile and click and configure the recurring schedule for the rule Figure...

Страница 30: ...rop down list Profile name is configured in Scheduler Profile Configuration Action Select Radio On Off to turn on off the wireless network during the time interval set for the profile 2 Associated wit...

Страница 31: ...rmal use we recommend you keep the default values for the EAP devices and station EDCA Enhanced Distributed Channel Access Figure 5 29 QoS Page Wi Fi Multimedia WMM By default WMM is enabled After WMM...

Страница 32: ...y Most traditional IP data is sent to this queue Data 3 Background Lowest priority queue high throughput Bulk data that requires maximum throughput and is not time sensitive is sent to this queue FTP...

Страница 33: ...he transmission queue By default the priority from high to low is Data 0 Data 1 Data 2 and Data 3 The priority may be changed if you reset the EDCA parameters Data 0 Voice Highest priority queue minim...

Страница 34: ...lient station has the right to initiate transmissions onto the wireless medium WM towards the EAP device The valid values are multiples of 32 between 0 and 8192 No Acknowledgement Select Enable to spe...

Страница 35: ...P Detection Check the box to enable Rogue AP Detection then click Save 5 6 2 Rogue AP List detected Information about the detected rogue APs is displayed in the list By default the status of the detec...

Страница 36: ...tes at Channel The channel on which the rogue AP is currently broadcasting Security Displays the enabling or disabling of the security mode of the wireless network Beacon Interval The beacon interval...

Страница 37: ...is in the Trusted AP List will not be detected as a rogue You can also backup a list and save it in your PC Figure 5 36 Download Backup Trusted AP List Save Action Select Download PC to AP to import...

Страница 38: ...t 6 1 AP AP List on the Monitoring page displays the device name its MAC address and the number of clients Below the AP List the AP s detailed information will be shown including Device Information Wi...

Страница 39: ...ware version of the device If you want to upgrade the firmware please refer to 8 5 Firmware Upgrade System Time Displays the system time of the device If you want to adjust the system time please refe...

Страница 40: ...de Displays the radio standard used for operation of your device If you want to change it refer to 5 1 1 Wireless Basic Settings Max TX Rate Displays the maximum data rate at which the device should t...

Страница 41: ...isplays the wireless Client Connection Quality CCQ CCQ refers to the ratio of current effective transmission bandwidth and the theoretically maximum available bandwidth CCQ reflects the actual link co...

Страница 42: ...adio Traffic and you can monitor the data transmission status of the wireless network Figure 6 8 Radio Traffic Rx Tx Packets Displays the total amount of packets received sent by the wireless network...

Страница 43: ...lients Displays the number of clients connected to the SSID If you want to get more information about these clients please refer to 5 1 2 SSIDs SSID Broadcast Displays the enabling or disabling of SSI...

Страница 44: ...t to modify it please refer to 5 1 2 SSIDs Down Byte Displays the throughput of the downstream data Up Byte Displays the throughput of the upstream data 6 3 Client From User List you can monitor the s...

Страница 45: ...eless packets Down Byte Displays the throughput of the downstream data Up Byte Displays the throughput of the upstream data Active Time Displays the amount of time the client has been connected to the...

Страница 46: ...tual link condition Rate Mbps Displays the data rate at which the authenticated client transmits wireless packets Down Byte Displays the throughput of the downstream data Up Byte Displays the throughp...

Страница 47: ...ware software as well as system issues and monitors system events With the help of system log you can get informed of system running status and detect the reasons for failure Following is the page of...

Страница 48: ...one where these parameters can be configured Enable Auto Mail Enable Server and Enable Nvram Figure 7 3 Log Settings Enable Auto Mail If Auto Mail Feature is enabled system logs will be sent to a mail...

Страница 49: ...The recipient will receive the system logs sent by the device every 5 hours Enable Server System logs can also be sent to a server After Enable Server is enabled the following content will be shown F...

Страница 50: ...et the session timeout time If you do nothing with the web management page within the timeout time the system will log out automatically Please login again if you want to go back to web management pag...

Страница 51: ...the device MAC1 MAC4 Enter the MAC addresses of the PCs which are authorized to log in the device 7 4 LED ON OFF LED ON OFF function allows you to control the LED When this function is enabled you can...

Страница 52: ...established on application and transport layers SSH encrypted connection is similar to a telnet connection but essentially the old telnet remote management method is not safe because the password and...

Страница 53: ...onitoring network performance detecting and analyzing network error configuring network devices and so on When networks function properly SNMP can perform the functions of statistics configuration and...

Страница 54: ...only has the read only right of the device s SNMP information The community name can be considered a group password The default setting is public Get Source Defines the IP address for example 10 10 1...

Страница 55: ...hich means all hosts can read and write the SNMP information of this device NOTE Defining community can allow management systems in the same community to communicate with the SNMP Agent The community...

Страница 56: ...setup Figure 8 1 User Account Page Old User Name Password Enter the present user name and password of the admin account to get the permission of modification New User Name Password Enter a new user na...

Страница 57: ...P server or synchronize the system time with the PC s clock The device supports DST Daylight Saving Time Figure 8 2 Time Settings 8 2 1 Time Settings Figure 8 3 Time Settings Click the button and the...

Страница 58: ...mber from the drop down list in time format HH MM SS Primary Secondary NTP Server If you ve selected Get GMT from an NTP server please input the primary NTP sever address and an alternative NTP server...

Страница 59: ...t Sunday in September 02 00 First Sunday in April 03 00 Recurring Mode Figure 8 6 Recurring Mode Mode Select Recurring Mode The configuration is recurring in use Time Offset Specify the time adding in...

Страница 60: ...ckup Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file To prevent the settings from being lost we recommend that you back up th...

Страница 61: ...atest system file Click Browse to choose the firmware file Click Upgrade to upgrade the devices NOTE 1 Please select the proper software version that matches your hardware to upgrade 2 To avoid damage...

Страница 62: ...duct names are trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as transl...

Страница 63: ...om that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with part 15 of the FCC Rules Operation is subject to the following tw...

Страница 64: ...distance 20cm between the radiator your body D claration d exposition aux radiations Cet quipement est conforme aux limites d exposition aux rayonnements IC tablies pour un environnement non contr l...

Страница 65: ...he product When there is no power button the only way to completely shut off power is to disconnect the product or the power adapter from the power source Don t disassemble the product or make repairs...

Страница 66: ...or Waste electrical and electronic equipment WEEE This means that this product must be handled pursuant to European directive 2012 19 EU in order to be recycled or dismantled to minimize its impact on...

Страница 67: ...adio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not...

Страница 68: ...ations The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co located or operating in conjunction with any othe...

Страница 69: ...nditions 5 This device may not cause interference and 6 This device must accept any interference including interference that may cause undesired operation of the device Le pr sent appareil est conform...

Страница 70: ...he only way to completely shut off power is to disconnect the product or the power adapter from the power source Don t disassemble the product or make repairs yourself You run the risk of electric sho...

Страница 71: ...te electrical and electronic equipment WEEE This means that this product must be handled pursuant to European directive 2012 19 EU in order to be recycled or dismantled to minimize its impact on the e...

Отзывы: