Accton Technology AC1200 Dualband Outdoor AP, 802.11ac Outdoor Dual Band Access Point User Manual rev 3
Accton Technology Corp Dualband Outdoor AP, 802.11ac Outdoor Dual Band Access Point rev 3
User Manual rev 3.pdf
Quick Star t Guide 802.11ac Outdoor Stand‐Alone Access Point SkyFire™ AC1200 and SkyFire™ AC866 www.ignitenet.com Brand : IgniteNet & Edge‐CorE The AC1200 and the AC866 are single‐ and dual‐band access points (APs) that are housed in a waterproof enclosure for mounting outdoors. The units include a built‐ in mounting bracket for attaching to a 1.5 to 6‐inch pole and they can be powered through their Ethernet cable connection from a power injector module that is installed indoors. The Outdoor Stand‐Alone Access Points include these models: ◆ ◆ ◆ ◆ ◆ ◆ ◆ SF‐AC1200 — dual‐band w/integrated 5 GHz antenna and 2x RP‐SMA (2.4 GHz) SF‐AC1200‐1 — dual‐band w/ 2x RP‐SMA (5 GHz) and 2x RP‐SMA (2.4 GHz) SF‐AC1200‐2 — dual‐band w/integrated 5 GHz antenna and 2.4 GHz antenna ECWO5320 —802.11ac Outdoor Dual Band Access Point ECWO5320‐L —802.11ac Outdoor Dual Band Access Point SF‐AC866 — single‐band w/integrated 5 GHz antenna SF‐AC866‐1 — single‐band w/ 2x RP‐SMA (5 GHz) Note: For Safety and Regulatory information, refer to the Safety and Regulatory Information document included with the AP. – Section I GettingStarted This section provides an overview of the access point, and introduces some basic concepts about wireless networking. It also describes the basic settings required to access the management interface. This section includes these chapters: ◆ “Introduction” on page 12 – 12 – Introduction The access point (AP) runs software that includes a network management agent. The agent offers a variety of management options, including SNMP and a web‐ based interface. The AP can also be accessed via Telnet or SSH for configuration using a command line interface (CLI). Configuration Options The access point’s web agent allows you to configure AP parameters, monitor wireless connections, and display statistics using a standard web browser such as Internet Explorer 9.x or later, Mozilla Firefox 5 or later, and Google Chrome 35 or later. The AP’s web management interface can be accessed from any computer attached to the network. The CLI program can be accessed remotely by a Telnet or Secure Shell (SSH) connection over the network. The CLI is used primarily for technical support. The AP’s management agent also supports SNMP (Simple Network Management Protocol). This SNMP agent permits the AP to be managed from any computer in the network using network management software. The AP’s web interface, console interface, and SNMP agent allow you to perform management functions such as: ◆ Set management access user names and passwords ◆ Configure IP settings ◆ Configure SNMP parameters ◆ Configure 2.4 GHz and 5 GHz radio settings ◆ Control access through wireless security settings ◆ Filter packets using Access Control Lists (ACLs) ◆ Download system firmware ◆ Download or upload configuration files ◆ Display system information and statistics – 13 – Chapter 1 | Introduction Network Connections Network Connections Prior to accessing the AP’s management agent through a network connection, you must first configure it with a valid IP address, subnet mask, and default gateway using the web interface, or the DHCP protocol. The AP has a static default management address of 192.168.2.1 and a subnet mask of 255.255.255.0. If the AP’s default IP address is not compatible with your network or a DHCP server is not available, the AP’s IP address must be configured manually through the web interface. First connect to the AP’s Ethernet 1 port and log in to the web interface, as described in “Connecting to the Web Interface” on page 13. Follow the steps described in “Setup Wizard” on page 15 to select your country and specify one of the configuration methods. Then configure the AP with an IP address that is compatible with your network as described under “LAN Settings” on page 33. Once the AP’s IP settings are configured for your network, you can access the AP’s management agent from anywhere within the attached network. The AP can be managed by any computer using a web browser, or from a network computer using SNMP network management software. Connecting to the Web Interface The AP offers a user‐friendly web‐based management interface for the configuration of all the unit’s features. Any PC directly attached to the unit can access the management interface using a web browser, such as Internet Explorer 9.x or later, Mozilla Firefox 5 or later, and Google Chrome 35 or later. You may want to make initial configuration changes by connecting a PC directly to the AP’s LAN port. The AP has a default management IP address of 192.168.2.1 and a subnet mask of 255.255.255.0. You must set your PC IP address to be on the same subnet as the AP (that is, the PC and AP addresses must both start with192.168.2.x). To access the AP’s web management interface, follow these steps: 1. Use your web browser to connect to the management interface using the default IP address of 192.168.2.1. 2. Log in to the interface by entering the default user name “root” with the password “admin123”, then click Login. – 14 – Chapter 1 | Introduction Connecting to the Web Interface Note: It is strongly recommended to change the default user name and password the first time you access the web interface. For information on changing user names and passwords, see “User Accounts” on page 57. Figure 1: Login Page – 15 – Chapter 1 | Introduction Setup Wizard Setup Wizard The Setup Wizard is designed to help you configure the basic settings required to get the AP up and running. Step 1 Select Your Country – Select the access point’s country of operation from the drop‐ down menu. You must set the AP’s country code to be sure that the radios operate according to permitted local regulations. That is, setting the country code restricts operation of the AP to the radio channels and transmit power levels permitted for wireless networks in the specified country. Figure 2: Select Your Country Caution: You must set the country code to the country of operation. Setting the country code ensures that the radios operate within the local regulations specified for wireless networks. Note: The country code selection is for non‐US models only and is not available to all US models. Per FCC regulation, all Wi‐Fi products marketed in the US must be fixed to US operation channels only. – 16 – Chapter 1 | Introduction Setup Wizard Step 2 Select Setup Method – Select Easy Setup to set basic wireless network access and guest network access parameters, or Advanced Setup to specify networking modes for an AP bridge, AP router, or manual configuration. Figure 3: Select Setup Method Step 3 Configure Settings ◆ Easy Setup — Basic wireless network and guest network access parameters. Specify the name and password for the wireless network and guest network. The Networking Mode is set to AP Router as described under Advanced Setup. Figure 4: Easy Setup ■ Wireless Network Setup — Set the name and password for the primary wireless network. A password must be specified to protect the network from unauthorized access. – 17 – Chapter 1 | Introduction Setup Wizard ■ ◆ Guest Network Setup — Set the name and password for the guest wireless network. This creates a second SSID for guest users, limiting their access only to the Internet. Advanced Setup — Networking modes for AP Bridge, AP Router, or manual configuration. Figure 5: Advanced Setup ■ AP Bridge Mode — Configures an interface as attached to the WAN (that is, the Internet). In the following figure, Ethernet Port 0 and Ethernet Port 1 are both attached to the WAN. Traffic from these interfaces is directly bridged into the Internet. (This is also called bridge to Internet.) Figure 6: Bridge to Internet ■ AP Router Mode — Configures an interface as a member of the LAN. In the following figure, Ethernet Port 1, Wireless LAN 0 (5 GHz Radio), and Wireless LAN 1 (2.4 GHz Radio) are all included in the LAN. Traffic from these interfaces is routed across the access point through Ethernet Port 0 to the Internet. (This is also called route to Internet.) Note: Single‐band access points only support one WLAN. – 18 – Chapter 1 | Introduction Main Menu Figure 7: Route to Internet ■ Manual Mode — Allows all configuration parameters to be manually configured. Any wired module or radio module may be logically placed on the WAN and LAN side of the access point. Main Menu The web interface Main Menu provides access to all the configuration settings available for the AP. To configure settings, click the relevant Main Menu item. Each Main Menu item is summarized below with links to the relevant section in this guide where the configuration parameters are described in detail: ◆ Dashboard — The dashboard shows basic settings for the AP, including Internet status, local network settings, wireless radio status, and traffic graphs. See “Status Information” on page 22. ◆ Network — Configures Internet, Ethernet, LAN, and Hotspot settings. See “Network Settings” on page 28. ◆ Wireless — Configures 5 GHz Radio, 2.4 GHz Radio, and VLAN settings. See “Wireless Settings” on page 37 ◆ System — Configures System (designation and location), Maintenance (such as view log, firmware upgrade, and reset), User Accounts, and Services (management access methods). – 19 – Chapter 1 | Introduction Main Menu Dashboard After logging in to the web interface, the dashboard displays. The dashboard shows basic settings for the AP, including Internet status, local network settings, wireless radio status, and traffic graphs. Figure 8: The Dashboard Common Web Page The list below describes the common buttons found on most of the web Buttons management pages: ◆ Save – Applies the new parameters and saves them to temporary RAM memory. Also displays a message at the top of the screen to inform you that the changes have not yet been saved to Flash memory. The running configuration will not be saved upon a reboot unless you click the “Apply” button. Figure 9: Set Configuration Changes ◆ Apply – Saves the current configuration so that it is retained after a restart. ◆ Revert – Cancels the newly entered settings and restores the originals. ◆ Welcome > Logout – Open the Welcome list and click Logout to end the web management session. ◆ Welcome > View Users – Open the Welcome list and click View Users to open the User Accounts menu. – 20 – Chapter 1 | Introduction Main Menu – 20 – Section II Web Configuration This section provides details on configuring the access point using the web browser interface. This section includes these chapters: ◆ “Status Information” on page 22 ◆ “Network Settings” on page 28 ◆ “Wireless Settings” on page 37 ◆ “System Settings” on page 52 – 21 – 2 Status Information The Dashboard displays information on the current system configuration, including Internet status, local network settings, wireless radio status, and traffic graphs. Status Information includes the following sections: ◆ “System and Product Information” on page 22 ◆ “Internet Status” on page 22 ◆ “Local Networks” on page 24 ◆ “Wireless Status” on page 25 ◆ “Traffic Graphs” on page 27 System and Product Information The System and Product Info section shows descriptive information about the AP. Figure 10: System and Product Information The following items are displayed in this section: ◆ The model name of the unit. ◆ The software version number. ◆ The serial number of the physical access point. ◆ Length of time the management agent has been up. ◆ The last 1‐minute, 5‐minute and 15‐minute CPU load average. Internet Status The Internet Status section shows information about the Internet connection. – 22 – Chapter 2 | Status Information Internet Status Figure 11: Internet Status The following items are displayed in this section: ◆ Internet Source — The Ethernet port connected to the Internet. By default, this is Ethernet Port 0. ◆ Ports bridged to Internet — Additional interfaces attached directly to the Internet. (See Configure Settings – “Step 3” on page 16 for a more detailed description.) ◆ IP Address — IP address of the Internet connection. ◆ Gateway — IP address of the gateway router used to pass traffic between this device and other network segments. ◆ DNS — The IP address of the Domain Name Server on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. ◆ Hotspot Status — Shows if the hotspot is enabled or disabled, and the ports on which this service is enabled. ◆ Options — Includes showing the ARP cache, showing DHCP leases, or renewing DHCP leases. Figure 12: Options – 23 – Chapter 2 | Status Information Local Networks Figure 13: ARP Table Figure 14: DHCP Leases Local Networks The Local Networks section shows information about the local network connection. Figure 15: Local Networks The following items are displayed in this section: ◆ Name — Shows information on the name of the local network, whether static or dynamic configuration is used, and the network mask. ◆ DHCP Server — Shows if DHCP service is enabled on this network. ◆ Members — Shows the ports and wireless radios attached to this network. ◆ Port Status — Shows the status of the Ethernet ports, including link up state, MAC address, speed, and duplex mode. – 24 – Chapter 2 | Status Information Wireless Status Wireless Status The Wireless Status section shows information about the radio settings and associated clients. Figure 16: Wireless Status The following items are displayed in this section: ◆ 1. 2. Radio # — Indicates the 5 GHz or 2.4 GHz wireless interface. ■ Radio Status — Shows if the wireless interface is enabled or disabled. ■ Op Mode — Shows if the unit is configured to operate as an access point (manually configured), an AP in bridge mode, or an AP in router mode. ■ Channel — The radio channel the access point uses to communicate with wireless clients. The available channels depend on the 802.11 Mode1, Channel Bandwidth1, and Country Code settings2. ■ IEEE Mode — The 802.11 wireless LAN standards supported by the access point. See “Radio Settings” on page 37. See “Setup Wizard” on page 15. – 25 – Chapter 2 | Status Information Wireless Status ◆ ■ Tx Power — The power of the radio signals transmitted from the access point. ■ Total Clients — The total number of clients attached to this interface. SSID # — Service set identifier. Clients that want to connect to the wireless network through an access point must set their SSIDs to the same as that of the access point. ■ Network Name — A unique identifier for the local wireless network. ■ Security — Shows whether or not security has been enabled. ■ Associated clients — Shows detailed information about clients. ■ Name — Client name. ■ MAC Address — The MAC address of the wireless client. ■ IP Address — The IP address assigned to the wireless client. ■ Signal — Signal strength (TX/RX) in dBm. ■ Duration — The time the wireless client has been associated. ■ Tx Rate — The data transmit rate to the wireless client. ■ Rx Rate — The data receive rate from the wireless client. ■ Tx Bytes — The number of transmitted bytes to this client. ■ Rx Bytes — The number of received bytes from this client ■ Tx Packets — The number of transmitted packets to this client. ■ Rx Packets — The number of received packets from this client. – 26 – Chapter 2 | Status Information Traffic Graphs Traffic Graphs The Traffic Graphs section shows the data rate for the Ethernet ports and wireless interfaces. Figure 17: Traffic Graphs – 27 – 3 Network Settings This chapter describes basic network settings on the access point. It includes the following sections: ◆ “Internet Settings” on page 28 ◆ “Ethernet Settings” on page 31 ◆ “LAN Settings” on page 33 ◆ “Hotspot Settings” on page 34 Internet Settings The Internet Settings page configures the basic Internet settings for the AP, such as the source port, IP aliases, as well as the host name and maximum MTU size. Figure 18: Internet Settings The following items are displayed on this page: ◆ Internet Source — The Ethernet port used to access the Internet. (Default: Ethernet Port 0; Options: Ethernet Port 0‐1) ◆ IP Address Mode — The method used to provide an IP address for the Internet access port. (Default: DHCP; Options: DHCP, static IP, PPPoE) ■ DHCP — Configuration options displayed for DHCP are shown in Figure 18, “Internet Settings", on page 28. – 28 – Chapter 3 | Network Settings Internet Settings ■ Static IP — To configure a static IP address for the selected Ethernet interface, the following items must be specified. Figure 19: IP Address Mode – Static IP ■ IP Address — Specifies an IP address for the access point. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.1) ■ Subnet Mask — Indicates the local subnet mask. (Default: 255.255.255.0) ■ Default Gateway — The IP address of the default gateway, which is used if the requested destination address is not on the local subnet. If you have management stations, DNS, RADIUS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided. ■ Addl DNS Server — The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. If you have a DNS servers located on the local network, type the IP address in the text fields provided. – 29 – Chapter 3 | Network Settings Internet Settings ■ PPPoE — To obtain an IP address for the selected Ethernet interface using PPPoE, the following items must be specified. Figure 20: IP Address Mode – PPPoE ◆ ■ User Name — The user name specified by the service provider. (Range: 1‐32 characters) ■ Password — The password specified by the service provider. (Range: 1‐32 characters) ■ Service Name — The service name assigned for the PPPoE connection. The service name is normally optional, but may be required by some service providers. (Range: 1‐32 alphanumeric characters) IP Aliases — Adds a static IPv4 address under which the access point can also be reached. Figure 21: IP Alias ◆ MTU Size — Sets the size of the maximum transmission unit (MTU) for packets sent on this interface. (Range: 1400‐1500 bytes; Default 1500 bytes) – 30 – Chapter 3 | Network Settings Ethernet Settings Ethernet Settings The Ethernet Settings page configures the network behavior of the Ethernet ports, indicating that a port provides an Internet connection for wireless clients attached to the local network (routed to the Internet), is bridged directly to the Internet, connected to the guest network, or provides hotspot service. The following items are common for all pages under Ethernet Settings: ◆ Status — Enables or disables this port. (Default: ON) ◆ Auto‐negotiation — Enables or disables auto‐negotiation for a given interface. (Default: ON) 1000BASE‐T does not support forced mode. Auto‐negotiation should always be used to establish a connection over any 1000BASE‐T port. When auto‐negotiation is enabled, the access point will negotiate the best settings for a link based on advertised capabilities. Figure 22: Ethernet Settings – Internet Source The following status message is displayed if an interface is connected to the Internet: ◆ “This port is the internet source for this product. Configure Internet Settings” If more than one interface is connected to the Internet, only the last configured interface is used. – 31 – Chapter 3 | Network Settings Ethernet Settings Figure 23: Ethernet Settings – Network Behavior The following items are displayed on this page: ◆ Network Behavior — For the Ethernet port which is not providing Internet access, one of the following connection methods must be specified. (Default: Route to Internet) ■ Bridge to Internet — Configures an interface to be attached to the WAN. Traffic from this interface is directly bridged into the Internet. (See Figure 6, “Bridge to Internet", on page 17.) If an Ethernet port is bridged to the Internet, management access cannot be made by a direct connection to this port. However, if another Ethernet port or radio interface is within the LAN (routed to the Internet) the access point can be managed through this interface by a PC which is configured with IP address in the same subnet. ■ Route to Internet — Configures an interface to be a member of the LAN. Traffic from this interface is routed across the access point and out through an interface which is bridged to the Internet. (See Figure 7, “Route to Internet", on page 18.) By default, Ethernet Port 1 is routed to Internet, allowing management access via a direct connection to a PC configured with an address in the same subnet. ■ Network Name — The network to be routed. The default is “Default local network” as displayed under LAN Settings – Local Networks. ■ Add to Guest Network — This port can only access the guest network. ■ Hotspot Controlled — This port can only access hotspot services. ■ Configure Hotspot — Opens the Hotspot Settings page. – 32 – Chapter 3 | Network Settings LAN Settings LAN Settings The LAN Settings page configures the LAN settings for the local network and guest network, including IP interface setting, DHCP server settings, STP administrative status, and UPnP administrative status. Figure 24: Network – LAN Settings The following items are displayed on this page: ◆ Members — The interfaces attached to the local area network. ◆ IP Address — Specifies the IP address for the local network or guest network. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.2.1) ◆ Subnet Mask — Indicates the local subnet mask. (Default: 255.255.255.0) ◆ MTU Size — Sets the size of the maximum transmission unit (MTU) for packets sent on this network. ◆ DHCP Server — Enables/disables DHCP on this network. (Default: Enabled) ■ DHCP Start — First address in the address pool. (Range: 1‐256; Default: x.x.x.100) ■ DHCP Max — Maximum number of addresses in the address pool. (Range: 1‐255; Default: 150) – 33 – Chapter 3 | Network Settings Hotspot Settings ◆ STP — Enables or disables processing of Spanning Tree Protocol messages. (Default: Disabled) ◆ UPnP — Enables or disables Universal Plug‐and‐Play broadcast messages. (Default: Disabled) Hotspot Settings The Hotspot Settings page can configure Internet access to the general public in places such as coffee houses, libraries and hospitals. Specific access rights may also be defined through a RADIUS server. Figure 25: Hotspot Settings (Network Settings) The following items are displayed on this page: ◆ Network IP — Specifies the IP address for the hotspot. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.182.1) ◆ Network Mask — Network mask for the associated IP subnet. This mask identifies the host address bits used for routing to specific subnets. ◆ DHCP Start — Starting number of (last numeric field) in address pool. (Range: 1‐254; Default: 10) ◆ DHCP End — Ending number of (last numeric field) in address pool. (Range: 1‐254; Default: 254) ◆ DHCP Lease Time — The duration that an IP address is assigned to a DHCP client. (Range: 600‐43200 seconds; Default: 600 seconds) – 34 – Chapter 3 | Network Settings Hotspot Settings ◆ DNS 1 — The IP address of the primary Domain Name Server on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. ◆ DNS 2 — The secondary DNS server available to DHCP clients. ◆ DNS Domain Name — The domain name used to resolve incomplete host names via the Domain Name System. (Range: 1‐32 characters) Figure 26: Hotspot Settings (RADIUS Settings) The following items are displayed on this page: ◆ Radius Server 1 — IP address or host name of the primary RADIUS server. ◆ Radius Server 2 — IP address or host name of the secondary RADIUS server. ◆ Radius Shared Secret — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Range: 1‐255 characters). ◆ Radius Auth Port — RADIUS server UDP port used for authentication messages. (Range: 1‐65535, Default: 1812) ◆ Radius Acct Port — RADIUS server UDP port used for accounting messages. (Range: 1‐65535, Default: 1813) ◆ Local ID — Local RADIUS server identifier. ◆ Local Name — Local RADIUS server name ◆ Operation ID — Local RADIUS server operation identifier. – 35 – Chapter 3 | Network Settings Hotspot Settings Figure 27: Hotspot Settings (Captive Portal Settings) The following items are displayed on this page: ◆ Captive Portal URL — Host name of Internet service portal for the hotspot. The captive portal forces a hotspot client to access a welcome web page (normally used for authentication) before gaining further access to the Internet. The welcome page may require authentication and/or payment. ◆ Captive Portal Secret — The password used for logging into the hotspot. ◆ Walled Garden — A list of web sites to which unauthenticated users are allowed to navigate. ◆ Auth White List — A list of MAC addresses that are allowed to bypass the captive portal to access the internet. – 36 – 4 Wireless Settings This chapter describes wireless settings on the access point. It includes the following sections: ◆ “Radio Settings” on page 37 ◆ “VLAN Settings” on page 50 Radio Settings The IEEE 802.11 wireless interfaces include configuration options for radio signal characteristics and wireless security features. The access point can operate in several radio modes, 802.11a/a+n/AC (5 GHz) or 802.11b+g/b+g+n (2.4 GHz). Supported modes depend on the access point model. Note that the dual‐band access points can operate at 2.4 GHz and 5 GHz at the same time. The web interface identifies the radio configuration pages as: ◆ Radio 0 — the 5 GHz 802.11a/n/AC radio interface ◆ Radio 1 — the 2.4 GHz 802.11b/g/n radio interface Each radio supports 8 virtual access point (VAP) interfaces based on the SSIDs, referred to as VAP 0 ~ VAP 7. Each VAP functions as a separate access point, and can be configured with its own Service Set Identification (SSID) and security settings. However, most radio signal parameters apply to all VAP interfaces. Traffic to specific VAPs can be segregated based on user groups or application traffic. The clients associate with each VAP in the same way as they would with separate physical access points. The AP supports up to a total of 127 wireless clients across all VAP interfaces per radio. – 37 – Chapter 4 | Wireless Settings Radio Settings Figure 28: Radio Settings (Physical Radio Settings) The following items are displayed on this page: ◆ Status — Enables or disables the wireless service on this interface. ◆ Mode — Selects the mode in which the AP will function. ■ Access Point (Auto‐WDS) — The VAP operates as an access point in WDS mode, which accepts connections from APs in Client WDS mode. (This is the default setting.) In this mode, the AP provides services to clients as a normal access point. WDS is used to automatically search for and connect to other AP nodes using the same SSID and security settings. ■ Client — The AP can provide a wireless connection to another AP. In this mode, it can pass information from or to locally wired hosts, but does not provide services to any wireless clients. ■ Client WDS — The AP provides services to clients as a normal access point, and operates as a client station in WDS mode, which can connect to other access points in Auto‐WDS mode. Connection to another AP can be made automatically by other access points operating in Auto‐WDS mode. ◆ DFS — Dynamic Frequency Selection can be used to detect and avoid interference with Radar systems operating in the 5 GHz range (UNII channels 52‐64 and 100‐140). If radar is detected, the AP will alter the channel it is operating on and tell associated stations the channel to which it is moving. This allows stations to re‐associate with minimum interruption. (This parameter is only applicable to the 5 GHz radio, and is enabled by default.) ◆ 802.11 Mode — Defines the radio operation mode. ■ Radio 0 (5 GHz Radio) — Default: 11a+n; Options: 11a, 11a+n, 11AC ■ Radio 1 (2.4 GHz Radio) — Default: 11b+g; Options: 11b+g, 11b+g+n – 38 – Chapter 4 | Wireless Settings Radio Settings ◆ Channel Bandwidth — The AP options for channel bandwidth include 5, 10, 20, 40 and 80 MHz. Using 20 MHz gives an 802.11g connection a speed of 54 Mbps and an 802.11n connection a speed of up to 108 Mbps, and ensures backward compliance for slower 802.11b devices. Setting the channel bandwidth to 40 MHz provides a connection speed for 802.11n of up to 300 Mbps. Using a channel bandwidth of 80MHz provides a connection speed up to 866.7 Mbps. (Default: 20 MHz; Range: 5 MHz, 10 MHz, 20 MHz, 40 MHz, 80MHz) ◆ Channel — The radio channel that the access point uses to communicate with wireless clients. When multiple access points are deployed in the same area, set the channel on neighboring access points at least five channels apart to avoid interference with each other. For example, for 11g/n 20 MHz mode you can deploy up to three access points in the same area using channels 1, 6, 11. Note that wireless clients automatically set the channel to the same as that used by the access point to which it is linked. (The available channels are dependent on the 802.11 Mode, Channel Bandwidth, and Country Code settings.) Selecting Auto enables the access point to automatically select an unoccupied radio channel. (Default: Auto) Table 1: Radio Channels Radio 0 (5 GHz) Radio 1 (2.4 GHz) Radio Channelsa Frequency (GHz) Radio Channels Frequency (GHz) Auto Auto scan Auto Auto scan 36 5.180 2.412 40 5.200 2.417 44 5.220 2.422 48 5.240 2.427 149 5.745 2.432 153 5.765 2.437 157 5.785 2.422 161 5.805 2.447 165 5.825 2.452 10 2.457 11 2.462 a. Supported channels depend on the 802.11 mode and channel bandwidth. – 39 – Chapter 4 | Wireless Settings Radio Settings Figure 29: Radio Settings (Wireless Network Configuration) The following items are displayed on this page: General Settings ◆ Status — Enables or disables the wireless service on this VAP. ◆ SSID — The name of the basic service set provided by a Virtual Access Point (VAP) interface. Clients that want to connect to the network through the access point must set their SSID to the same as that of the access point’s VAP interface. (Default: ACN0.# (where # is 0‐7) for 5 GHz, ACN1.# (where # is 0‐7) for 2.4 GHz; Range: 1‐32 characters) ◆ Broadcast — The SSID can be broadcast at regular intervals so that wireless stations searching for a network connection can discover it. This allows wireless clients to dynamically discover and roam between WLANs. This feature also makes it easier for hackers to break into your home network. Because SSIDs are not encrypted, it is easy to grab one by snooping the WLAN looking for SSID broadcast messages coming from the AP. (Default: Enabled) ◆ Client Isolation — If enabled, wireless clients can talk to the LAN, and reach the Internet if such connection is available, but they cannot communicate with one another. (Default Disabled) – 40 – Chapter 4 | Wireless Settings Radio Settings ◆ WMM — Sets the WMM operational mode on the access point. When enabled, the parameters for each Access Category (AC) queue will be employed on the access point and QoS capabilities advertised to WMM‐enabled clients. (Default: Enabled) When enabled, WMM must be supported on any device trying to associated with the access point. Devices that do not support this feature will not be allowed to associate with the access point. Wireless networks offer an equal opportunity for all devices to transmit data from any type of application. Although this is acceptable for most applications, multimedia applications (with audio and video data) are particularly sensitive to the delay and throughput variations that result from this “equal opportunity” wireless access method. For multimedia applications to run well over a wireless network, a Quality of Service (QoS) mechanism is required to prioritize traffic types and provide an “enhanced opportunity” wireless access method. The access point implements QoS using the Wi‐Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time. WMM employs techniques that are a subset of the IEEE 802.11e QoS standard and it enables the access point to inter‐operate with both WMM‐enabled clients and other devices that may lack any WMM functionality. Access Categories — WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags (see Figure 2, “WMM Access Categories", on page 41). The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WMM allows the priority levels to be configured to match any network‐ wide QoS policy. WMM also specifies a protocol that access points can use to communicate the configured traffic priority levels to QoS‐enabled wireless clients. Table 2: WMM Access Categories Access Category WMM Designation Description 802.1D Tags AC_VO (AC3) Voice Highest priority, minimum delay. Time‐sensitive data such as VoIP (Voice over IP) calls. 7, 6 AC_VI (AC2) Video High priority, minimum delay. Time‐sensitive data such as streaming video. 5, 4 AC_BE (AC0) Best Effort Normal priority, medium delay and throughput. Data only affected by long delays. Data from applications or devices that lack QoS capabilities. 0, 3 AC_BK (AC1) Background Lowest priority. Data with no delay or throughput requirements, such as bulk data transfers. 2, 1 – 41 – Chapter 4 | Wireless Settings Radio Settings WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. When the access point forwards traffic, WMM adds data packets to four independent transmit queues, one for each AC, depending on the 802.1D priority tag of the packet. Data packets without a priority tag are always added to the Best Effort AC queue. From the four queues, an internal “virtual” collision resolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the same collision resolution mechanism is used externally to determine which device has access to the wireless medium. For each AC queue, the collision resolution mechanism is dependent on two timing parameters: ◆AIFSN (Arbitration Inter‐Frame Space Number), a number used to calculate the minimum time between data frames ◆CW (Contention Window), a number used to calculate a random backoff time After a collision detection, a backoff wait time is calculated. The total wait time is the sum of a minimum wait time (Arbitration Inter‐Frame Space, or AIFS) determined from the AIFSN, and a random backoff time calculated from a value selected from zero to the CW. The CW value varies within a configurable range. It starts at CWMin and doubles after every collision up to a maximum value, CWMax. After a successful transmission, the CW value is reset to its CWMin value. Figure 30: WMM Backoff Wait Times Time CWMin High Priority CWMax AIFS Random Backoff Minimum Wait Time Random Wait Time CWMin Low Priority CWMax AIFS Random Backoff Minimum Wait Time Random Wait Time For high‐priority traffic, the AIFSN and CW values are smaller. The smaller values equate to less backoff and wait time, and therefore more transmit opportunities. – 42 – Chapter 4 | Wireless Settings Radio Settings Security Settings ◆ Method — Sets the wireless security method for each VAP, including association mode, encryption, and authentication. (Default: No Security) ■ No Security — The VAP broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection. ■ WEP Open System — The VAP broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection. ■ Key — WEP is used to encrypt data transmitted between wireless clients and the VAP. WEP uses static shared keys (fixed‐length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. WEP is the security protocol initially specified in the IEEE 802.11 standard for wireless communications. Unfortunately, WEP has been found to be seriously flawed and cannot be recommended for a high level of network security. For more robust wireless security, the access point provides Wi‐Fi Protected Access (WPA) and WPA2 for improved data encryption and user authentication. Be sure that the WEP shared keys are the same for each client in the wireless network. All clients share the same keys, which are used for data encryption. For 64‐bit WEP, string length must be 5 ASCII characters (letters and numbers) or 10 hexadecimal digits. For 128‐bit WEP, string length must be 13 ASCII characters (letters and numbers) or 26 hexadecimal digits. ■ WPA‐PSK — For enterprise deployment, WPA requires a RADIUS authentication server to be configured on the wired network. However, for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre‐shared password for network access. The Pre‐Shared Key mode uses a common password for user authentication that is manually entered on the access point and all wireless clients. The PSK mode uses the same TKIP packet encryption and key management as WPA in the enterprise, providing a robust and manageable alternative for small networks. ■ Encryption — Data encryption uses one of the following methods: ■ CCMP (AES) — AES‐CCMP is used as the multicast encryption cipher. AES‐CCMP is the standard encryption cipher required for WPA2. (This is the default setting.) ■ TKIP — TKIP is used as the multicast encryption cipher. – 43 – Chapter 4 | Wireless Settings Radio Settings ■ ■ Auto: TKIP + CCMP (AES) — The encryption method used by the client is discovered by the access point. Key — WPA is used to encrypt data transmitted between wireless clients and the VAP. WPA uses static shared keys (fixed‐length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. String length must be 8 to 63 ASCII characters (letters and numbers). No special characters are allowed. ■ WPA2‐PSK: Clients using WPA2 with a Pre‐shared Key are accepted for authentication. WPA was introduced as an interim solution for the vulnerability of WEP pending the ratification of the IEEE 802.11i wireless security standard. In effect, the WPA security features are a subset of the 802.11i standard. WPA2 includes the now ratified 802.11i standard, but also offers backward compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK modes of operation and support for TKIP encryption. Refer to WPA‐PSK for a description of encryption methods and the key. ■ WPA‐EAP — WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. A RADIUS server is used for authentication, and can also be used for accounting. Refer to WPA‐PSK for a description of encryption methods. RADIUS Settings A RADIUS server must be specified for the access point to implement IEEE 802.1X network access control and Wi‐Fi Protected Access (WPA) wireless security. In addition, you can configure a RADIUS Accounting server to receive user‐ session accounting information from the access point. RADIUS Accounting can be used to provide valuable information on user activity in the network. This guide assumes that you have already configured RADIUS server(s) to support the access point. Configuration of RADIUS server software is beyond the scope of this guide, refer to the documentation provided with the RADIUS server software. ■ Radius Auth Server — Specifies the IP address or host name of the RADIUS authentication server. ■ Radius Auth Port — The UDP port number used by the RADIUS server for authentication messages. (Range: 1024‐65535; Default: 1812) – 44 – Chapter 4 | Wireless Settings Radio Settings ■ ■ Radius Auth Secret — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS authentication server. Do not use blank spaces in the string. (Maximum length: 255 characters) ■ Radius Acct Server — Specifies the IP address or host name of the RADIUS accounting server. ■ Radius Acct Port — The UDP port number used by the RADIUS server for accounting messages. (Range: 1024‐65535; Default: 1813) ■ Radius Acct Secret — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS accounting server. Do not use blank spaces in the string. (Maximum length: 255 characters) WPA2‐EAP —WPA was introduced as an interim solution for the vulnerability of WEP pending the ratification of the IEEE 802.11i wireless security standard. In effect, the WPA security features are a subset of the 802.11i standard. WPA2 includes the now ratified 802.11i standard, but also offers backward compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK modes of operation and support for TKIP encryption. A RADIUS server is used for authentication, and can also be used to accounting. Refer to WPA‐PSK for a description of encryption methods. Refer to WPA‐EAP for a information on configuring the RADIUS server. ◆ Access Control List — Wireless clients can be authenticated for network access by checking their MAC address against the local database configured on the access point. (Default: OFF) ■ Policy — The MAC list can be configured to either allow or deny network access to specified clients. (Default: Allow all MACs on list) ■ Filtered MACs — Enter a physical address for each client. Enter six pairs of hexadecimal digits separated by colons, and followed by an optional comment; for example, 00:90:D1:12:AB:89 John Smith’s PC Network Settings ◆ Network Behavior — One of the following connection methods must be specified. (Default: Route to Internet) ■ Bridge to Internet — Configures an interface as attached to the WAN. Traffic from this interface is directly bridged into the Internet. (See Figure 6, “Bridge to Internet", on page 17.) – 45 – Chapter 4 | Wireless Settings Radio Settings ■ Route to Internet — Configures an interface as a member of the LAN. Traffic from this interface is routed across the access point and out through an interface which is bridged to the Internet. (See Figure 7, “Route to Internet", on page 18.) ■ Network Name — The network to be routed. The default is “Default local network” as displayed under LAN Settings – Local Network. ■ Add to Guest Network — This interface can only support the guest network. ■ Hotspot Controlled — This interface can only support hotspot services. ■ ■ Configure Hotspot — Opens Hotspot Settings page. VLAN Tag Traffic — Tags any packets passing from this VAP (virtual access point) to the associated Ethernet port as configured under “VLAN Settings” on page 50. (Range: 3‐4095) ◆ Limit Upload — Enables rate limiting of traffic from the VAP interface as it is passed to the wired network. You can set a maximum rate in Kbytes per second. (Range: 256‐10048576 Kbytes per second; Default: OFF) ◆ Limit Download — Enables rate limiting of traffic from the wired network as it is passed to the VAP interface. You can set a maximum rate in kbytes per second. (Range: 256‐10048576 Kbytes per second; Default: OFF) Advanced Settings ◆ 802.11 Rates — The minimum data rate at which the AP transmits packets on the wireless interface. Table 3: 802.11 Data Rates Option Rate (Max) Coding Method Auto Auto Based on signal strength 1M 1 Mbps CKK √ 2M 2 Mbps CKK √ 5.5M 5.5 Mbps CKK √ 11M 11 Mbps CKK √ √ 6M 6 Mbps OFDM √ √ 9M 9 Mbps OFDM √ √ 12M 12 Mbps OFDM √ √ 18M 18 Mbps OFDM √ √ 24M 24 Mbps OFDM √ √ 36M 36 Mbps OFDM √ √ – 46 – Radio 0 (5 GHz) √ Radio 1 (2.4 GHz) √ Chapter 4 | Wireless Settings Radio Settings Table 3: 802.11 Data Rates (Continued) Option Rate (Max) Coding Method 48M 48 Mbps OFDM √ √ 54M 54 Mbps OFDM √ √ MCS0 15 Mbps BPSK, single stream √ √ MCS1 30 Mbps QPSK, single stream √ √ MCS2 45 Mbps QPSK, single stream √ √ MCS3 60 Mbps 16‐QAM, single stream √ √ MCS4 90 Mbps 16‐QAM, single stream √ √ MCS5 120 Mbps 64‐QAM, single stream √ √ MCS6 135 Mbps 64‐QAM, single stream √ √ MCS7 150 Mbps 64‐QAM, single stream √ √ MCS8 30 Mbps BPSK, double stream √ √ MCS9 60 Mbps QPSK, double stream √ √ MCS10 90 Mbps QPSK, double stream √ √ MCS11 120 Mbps 16‐QAM, double stream √ √ MCS12 180 Mbps 16‐QAM, double stream √ √ MCS13 240 Mbps 64‐QAM, double stream √ √ MCS14 270 Mbps 64‐QAM, double stream √ √ MCS15 300 Mbps 64‐QAM, double stream √ √ NSS1‐MCS0 32.5 Mbps 256‐QAM, single stream √ NSS1‐MCS1 65 Mbps 256‐QAM, single stream √ NSS1‐MCS2 97.5 Mbps 256‐QAM, single stream √ NSS1‐MCS3 130 Mbps 256‐QAM, single stream √ NSS1‐MCS4 195 Mbps 256‐QAM, single stream √ NSS1‐MCS5 260 Mbps 256‐QAM, single stream √ NSS1‐MCS6 292.5 Mbps 256‐QAM, single stream √ NSS1‐MCS7 325 Mbps 256‐QAM, single stream √ NSS1‐MCS8 390 Mbps 256‐QAM, single stream √ NSS1‐MCS9 433.3 Mbps 256‐QAM, single stream √ NSS2‐MCS0 65 Mbps 256‐QAM, double stream √ NSS2‐MCS1 130 Mbps 256‐QAM, double stream √ NSS2‐MCS2 195 Mbps 256‐QAM, double stream √ NSS2‐MCS3 260 Mbps 256‐QAM, double stream √ NSS2‐MCS4 390 Mbps 256‐QAM, double stream √ – 47 – Radio 0 (5 GHz) Radio 1 (2.4 GHz) Chapter 4 | Wireless Settings Radio Settings Table 3: 802.11 Data Rates (Continued) Option Rate (Max) Coding Method Radio 0 (5 GHz) NSS2‐MCS5 520 Mbps 256‐QAM, double stream √ NSS2‐MCS6 585 Mbps 256‐QAM, double stream √ NSS2‐MCS7 650 Mbps 256‐QAM, double stream √ NSS2‐MCS8 780 Mbps 256‐QAM, double stream √ NSS2‐MCS9 866.7 Mbps 256‐QAM, double stream √ Radio 1 (2.4 GHz) ◆ Tx Streams — Specifies a single stream at 20MHz or a dual stream at 20MHz and 40MHz for signal transmission. (Options: 1, 2; Default 1) ◆ Rx Streams — Specifies a single stream at 20MHz or a dual stream at 20MHz and 40MHz for signal reception. (Options: 1, 2; Default 1) ◆ Tx Power — Adjusts the power of the radio signals transmitted from the access point. The higher the transmission power, the farther the transmission range. Power selection is not just a trade off between coverage area and maximum supported clients. You also have to ensure that high‐power signals do not interfere with the operation of other radio devices in the service area. (Default: 17 dBm for 5 GHz radio, 27 dBm for 2.4 GHz radio) Table 4: Tx Power Power Radio 0 (5 GHz) Radio 1 (2.4 GHz) 0 dBM (1 mW) √ √ 4dBM (2 mW) √ √ 5 dBM (3 mW) √ √ 7 dBM (5 mW) √ √ 8 dBM (6 mW) √ √ 9 dBM (7 mW) √ √ 10 dBM (10 mW) √ √ 11 dBM (12 mW) √ √ 12 dBM (15 mW) √ √ 13 dBM (19 mW) √ √ 14 dBM (25 mW) √ √ 15 dBM (31 mW) √ √ 16 dBM (39 mW) √ √ 17 dBM (50 mW) √ √ 18 dBM (63 mW) √ 19 dBM (79 mW) √ – 48 – Chapter 4 | Wireless Settings Radio Settings Table 4: Tx Power (Continued) Power Radio 0 (5 GHz) Radio 1 (2.4 GHz) 20 dBM (100 mW) √ 21 dBM (125 mW) √ 22 dBM (158 mW) √ 23 dBM (199 mW) √ 24 dBM (251 mW) √ 25 dBM (316 mW) √ 26 dBM (398 mW) √ 27 dBM (501 mW) √ ◆ ACK Timeout — Sets the acknowledgement timeout, which is used primarily for long‐distance connections. This timeout is used to make an adjustment for link distance. It is based on the amount of time, in microseconds, that it should take to transmit a frame to the other end of the link, be processed by the receiving device, and have the ACK frame created and returned to the sending device. (Range: 0‐255 microseconds; Default: 0 microseconds) ◆ Fragmentation Thresh. — Sets the maximum frame size above which packets are fragmented. This reduces the time required to transmit the frame, and therefore reduces the probability that it will be corrupted (at the cost of more data overhead). (Range: 256‐2346 bytes; Default: 2346 bytes) ◆ RTS Threshold — Sets the packet size threshold at which a Request to Send (RTS) signal must be sent to a receiving station prior to the sending station starting communications. The access point sends RTS frames to a receiving station to negotiate the sending of a data frame. After receiving an RTS frame, the station sends a CTS (clear to send) frame to notify the sending station that it can start sending data. If the RTS threshold is set to 1, the access point always sends RTS signals. If set to 2346, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled. The access points contending for the medium may not be aware of each other. The RTS/CTS mechanism can solve this “Hidden Node Problem.” (Range: 1‐2346 bytes: Default: 2346 bytes) ◆ SGI — The 802.11n draft specifies two guard intervals: 400ns (short) and 800ns (long). Support of the 400ns Short Guard Interval is optional for transmit and receive. The purpose of a guard interval is to introduce immunity to propagation delays, echoes, and reflections to which digital data is normally very sensitive. Enabling the SGI sets it to 400ns. (Default: Disabled) – 49 – Chapter 4 | Wireless Settings VLAN Settings ◆ STBC — Space‐time Block Coding sends multiple copies of the same data over a number of antennas, using the various received versions to improve the reliability of data transfer. The transmitted signal may traverse a difficult environment with scattering, reflection, and refraction which may then be further corrupted by thermal noise in the receiver, so some of the received copies will be better than others. This redundancy results in a higher chance of being able to use one or more of the received copies to correctly decode the received signal. (Default: Disabled) ◆ AMPDU — Enables or disables the use of Aggregated MAC Protocol Data Units. Physical layer (PHY) data rate improvements do not increase real throughput beyond a point because of 802.11 protocol overheads. The main media access control feature that provides a performance improvement is aggregation. Aggregation of MAC protocol data units (MPDUs) is referred to as MPDU aggregation or (A‐MPDU). (Default: Enabled) VLAN Settings VLANs (virtual local area networks) are turned off by default. If turned on they will automatically tag any packets passed to the LAN port from the relevant VAP (virtual access point). The access point can employ VLAN tagging to control access to network resources and increase security. VLANs separate traffic passing between the access point, associated clients, and the wired network. You can configure a VLAN for up to 13 VAP interfaces. Note the following points about the access point’s VLAN support: ◆ If an Ethernet LAN port on the access point is assigned a VLAN ID, any traffic entering that port must be also tagged with the same VLAN ID. ◆ A management VLAN can be used for managing the access point through remote management tools, such as the web interface, SSH, Telnet or SNMP. The access point can be configured to only accept management traffic that is tagged with the specified management VLAN ID. This ID must be assigned to the Ethernet ports or radio interfaces which are designated to handle management traffic. ◆ Wireless clients associated to the access point can be assigned to a VLAN. Wireless clients are assigned to the VLAN for the VAP interface with which they are associated. The access point only allows traffic tagged with correct VLAN IDs to be forwarded to associated clients on each VAP interface. ◆ When VLAN support is enabled on the access point, traffic passed to the wired network is tagged with the appropriate VLAN ID. When an Ethernet port on the access point is configured as a VLAN member, traffic received from the wired – 50 – Chapter 4 | Wireless Settings VLAN Settings network must also be tagged with the same VLAN ID. Received traffic that has an unknown VLAN ID or no VLAN tag is dropped. ◆ When VLAN support is disabled, the access point does not tag traffic passed to the wired network and ignores the VLAN tags on any received frames. Note: Before enabling VLAN tagging on the access point, be sure to configure the attached network switch port to support tagged VLAN frames for the VLAN IDs configured on the access point. Otherwise, connectivity to the access point will be lost when you enable the VLAN feature. Figure 31: Configuring VLANs The following items are displayed on this page: ◆ VLAN ID — A VLAN identifier to be assigned. (Range: 3‐4095) (VLAN 1 and 2 are reserved for internal use.) ◆ Ports — The Ethernet ports assigned to the specified VLAN. ◆ SSIDs — The SSID of a VAP configured to be a member of the specified VLAN. This option is configured under Radio Settings (Network Settings – Network Behavior). – 51 – 5 SystemSettings This chapter describes maintenance settings on the access point. It includes the following sections: ◆ “System Settings” on page 53 ◆ “Maintenance” on page 54 ◆ “User Accounts” on page 57 ◆ “Services” on page 57 – 52 – Chapter 5 | System Settings System Settings System Settings The System Settings page is used to configure general descriptive information about the access point, such as the system identification name, its geographic coordinates, and local time. Figure 32: System Settings The following items are displayed on this page: ◆ Device Name — An alias for the AP, enabling the device to be uniquely identified on the network. (Default: none; Range: 0‐50 characters) ◆ Device Latitude — The geographic latitude of the access point, given in degrees and minutes. (Range: ‐90 to +90 degrees) ◆ Device Longitude — The geographic longitude of the access point, given in degrees and minutes. (Range: ‐180 to +180 degrees) ◆ Enable reset button — Enables or disables the hardware reset button. ◆ Local Time — The local time, given as day of week, month, time, year. ◆ Configure Network Time — Links to the Network Time (NTP) section on the Services page. – 53 – Chapter 5 | System Settings Maintenance Maintenance The Maintenance page supports general maintenance tasks including displaying the system log, rebooting the device, restoring factory defaults, backing up or restoring configuration settings, and upgrading firmware. Figure 33: Maintenance Displaying The access point saves event and error messages to a local system log database. System Logs The log messages include the date and time, device name, message type, and message details. Figure 34: System Log – 54 – Chapter 5 | System Settings Maintenance Rebooting the The Reboot page allows you to reboot the access point. Access Point Figure 35: Rebooting the Access Point Resetting the The Reset page allows you to reset the access point to the factory defaults. Note Access Point that all user configured information will be lost. You will have to re‐enter the default user name and password to re‐gain management access to this device. Figure 36: Resetting to Defaults Note: It is also possible to reboot or reset the access point by inserting a pin in the pin hole labeled “RESET” on the connector panel of the access point and: ◆ ◆ press 2 seconds to reboot the access point; press 10 seconds to reset the access point to the factory defaults. – 55 – Chapter 5 | System Settings Maintenance Backing Up The Backup function allows you to back up the access point’s configuration to a Configuration management workstation. In Windows, a GNU Zip (*.tar.gz) file will be stored in the Settings Downloads folder. This is a sample file name: backup‐ACN‐AP‐2014‐06‐27.tar.gz Restoring The Restore page allows you to upload configuration settings from a management Configuration workstation. The specified file must be one that was previously backed up from the Settings access point. Figure 37: Restoring Configuration Settings Upgrading Firmware You can upgrade new access point software from a local file on the management workstation. New software may be provided periodically from your distributor. After upgrading new software, you must reboot the access point to implement the new code. Until a reboot occurs, the access point will continue to run the software it was using before the upgrade started. The access point supports dual software images, so if newly loaded software is corrupted, the alternate image will be used on the next reboot. Configuration settings are stored separately from the software, so the current settings will always be used for any new software. However, note that if the current configurtion settings are corrupted, the system defaults will be used. Figure 38: Upgrading Firmware – 56 – Chapter 5 | System Settings User Accounts User Accounts The User Accounts page allows you to control management access to the switch based on manually configured user names and passwords. Figure 39: User Accounts The following items are displayed on this page: ◆ Username — The name of the user. (Range: 3‐15 ASCII characters, no special characters) ◆ Password — The user password. (Range: 3‐15 ASCII characters, case sensitive, no special characters) Services The Services page allows you to control remote management access to the switch and to configure of NTP time servers. Remote Management The SSH, Telnet, Web, and SNMP management interfaces are enabled and open to Settings access from the Internet. To provide more security, specific services can be disabled and management access prevented from the Internet. SSH The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol uses generated public keys to encrypt all data transfers passing between the access point and SSH‐enabled management station clients and ensures that data traveling over the network arrives unaltered. Clients can then securely use the local user name and password for access authentication. Note that SSH client software needs to be installed on the management station to access the access point for management via the SSH protocol. – 57 – Chapter 5 | System Settings Services Figure 40: SSH Server Settings The following items are displayed on this page: ◆ SSH Server — Enables or disables SSH access to the access point. (Default: Enabled) ◆ Port — Sets the TCP port number for the SSH server on the access point. (Range: 1‐65535; Default: 22) ◆ Allow SSH from WAN — Allows SSH management access from the WAN. Telnet Telnet is a remote management tool that can be used to configure the access point from anywhere in the network. However, note that Telnet is not secure from hostile attacks. Figure 41: Telnet Server Settings The following items are displayed on this page: ◆ Telnet Server — Enables or disables Telnet access to the access point. (Default: Enabled) ◆ Port — Sets the TCP port number for the Telnet server on the access point. (Range: 1‐65535; Default: 23) ◆ Allow Telnet from WAN — Allows Telnet management access from the WAN. Web server A Web browser provides the primary method of managing the access point. Both HTTP and HTTPS service can be accessed independently. If you enable HTTPS, you must indicate this in the URL: https://device:port_number] When you start HTTPS, the connection is established in this way: – 58 – Chapter 5 | System Settings Services ◆ The client authenticates the server using the server’s digital certificate. ◆ The client and server negotiate a set of security protocols to use for the connection. ◆ The client and server generate session keys for encrypting and decrypting data. ◆ The client and server establish a secure encrypted connection. ◆ A padlock icon should appear in the status bar for most browsers. Figure 42: Web Server Settings The following items are displayed on this page: ◆ HTTP Port — The TCP port to be used by the HTTP Web browser interface. (Range: 1‐65535; Default: 80) ◆ Allow HTTP from WAN — Allows HTTP management access from the WAN. ◆ HTTPS Port — The TCP port to be used by the HTTPS Web browser interface. (Range: 1‐65535; Default: 443) ◆ Allow HTTPS from WAN — Allows HTTPS management access from the WAN. Network Time Network Time Protocol (NTP) allows the access point to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the access point enables the system log to record meaningful dates and times for event entries. If the clock is not set, the access point will only record the time from the factory default set at the last bootup. The access point acts as an NTP client, periodically sending time synchronization requests to specified time servers. The access point will attempt to poll each server in the configured sequence. – 59 – Chapter 5 | System Settings Services Figure 43: NTP Settings The following items are displayed on this page: ◆ Local Time — Displays the local time as day of week, month, hour:minute:second, year, based on Universal Time Coordinates. ◆ NTP Service — Enables or disables sending of requests for time updates. (Default: Enabled) ◆ NTP Servers — Sets the host names for time servers. The switch attempts to update the time from the first server, if this fails it attempts an update from the next server in the sequence. To configure additional servers, click the “+” button to open a new edit field. ◆ Time Zone — To display a time corresponding to your local time, choose one of the predefined time zones from the scroll‐down list. SNMP Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a network. It is typically used to configure these devices for proper operation in a network environment, as well as to monitor them to evaluate performance or detect potential problems. Figure 44: SNMP Settings The following items are displayed on this page: ◆ SNMP Server — Enables or disables SNMP on the access point. (Default: Enabled) – 60 – Chapter 5 | System Settings Services ◆ Contact — Administrator responsible for the access point. ◆ Community String — A community string that acts like a password and permits access to the SNMP protocol. (Range: 1‐32 characters, case sensitive; Default: public) The default string “public” provides read‐only access to the access point’s Management Information (MIB) database. ◆ Allow SNMP from WAN — Allows SNMP management access from the WAN. – 61 – Section III Appendices This section provides additional information and includes these items: ◆ “Troubleshooting” on page 62 – 61 – A Troubleshooting Problems Accessing the Management Interface Table 5: Troubleshooting Chart Symptom Action Cannot connect using Telnet, web browser, or SNMP software ◆ ◆ ◆ ◆ ◆ ◆ ◆ Forgot or lost the password ◆ Be sure the AP is powered up. Check network cabling between the management station and the AP. Check that you have a valid network connection to the AP and that intermediate switch ports have not been disabled. Be sure you have configured the AP with a valid IP address, subnet mask and default gateway. Be sure the management station has an IP address in the same subnet as the AP’s IP. If you are trying to connect to the AP using a tagged VLAN group, your management station, and the ports connecting intermediate switches in the network, must be configured with the appropriate tag. If you cannot connect using Telnet, you may have exceeded the maximum number of concurrent Telnet/SSH sessions permitted. Try connecting again at a later time. Reset the AP to factory defaults using its Reset button. Using System Logs If a fault does occur, refer to the Quick Start Guide to ensure that the problem you encountered is actually caused by the AP. If the problem appears to be caused by the AP, follow these steps: 1. Enable SNMP in the System > Servcies menu. 2. Enable SNMP access from the WAN when connecting from a remote location. 3. Repeat the sequence of commands or other actions that lead up to the error. 4. Make a list of the commands or circumstances that led to the fault. Also make a list of any error messages displayed. 5. Record all relevant system settings. – 62 – Chapter A | Troubleshooting Using System Logs 6. Display the log file through the System > Maintenance menu, and copy the information from the log file. 7. Contact your distributor’s service engineer, and send a detailed description of the problem, along with all of the information mentioned in the above steps. – 63 – – 64 – Quick Start Guide Follow the steps in this guide to install the AP in your network. Caution: The planning and installation of the AP requires professional personnel that are trained in the installation of radio transmitting equipment. The user is responsible for compliance with local regulations concerning items such as antenna power, use of lightning arrestors, grounding, and radio mast or tower construction. Therefore, it is recommended to consult a professional contractor knowledgeable in local radio regulations prior to equipment installation. 1. Unpack the AP Unpack the AP and check the package contents. ◆ Outdoor Stand‐Alone Access Point SkyFire AC1200 or SkyFire AC866 ◆ Pole‐mounting kit — includes two steel‐band clamps ◆ PoE power injector with power cord — either US, Continental Europe or UK ◆ Documentation —Quick Start Guide and Regulatory and Safety Information 2. Mount the AP After planning your installation, mount the unit on a pole, mast, or tower using the included two steel‐band clamps. Also, for models that require external antennas, install the antennas near the AP and attach the RF coaxial cables to the appropriate connectors on the AP. Pole Mounting – 2 – Feed the steel‐band clamps through the integrated pole‐mount bracket points on the back of the AP. Fasten the steel‐band clamps around the pole to secure the AP to the pole. Quick Start Guide Attach External Antennas Remove the front port cover by pushing the locking tab up and then sliding the cover off. Connect external antennas to the AP’s 5 GHz RP‐SMA connectors using RF coaxial cable provided in the antenna package. Connect external antennas to the AP’s 2.4 GHz RP‐SMA connectors using RF coaxial cable provided in the antenna package. Note: The number of available 2.4 GHz or 5 GHz external antenna connectors depends on the specific model. 3. Connect Cables Connect outdoor‐rated Ethernet cable to the 1000BASE‐T RJ‐45 ETH0 (PoE) port on the unit. Connect outdoor‐rated Category 5e or better cable to the left‐side RJ‐45 ETH0 (PoE) port. (Optional) Connect a local LAN switch or computer to the right‐side ETH1 100BASE‐TX RJ‐45 port. Pass the cables through the access holes at the bottom of the AP. Replace the port cover on the AP and push the locking tab down to secure it in place. 4. Connect Power Install the PoE power injector indoors. Connect the power injector to the Ethernet cable from the AP, to a port on a local LAN switch, and then to an AC power source. Caution: The power injector module is designed for indoor use only. Never mount the power injector outside with the AP unit. – 3 – Quick Start Guide Connect the Ethernet cable from the AP to the “POE” port on the power injector. Connect Ethernet cable from the “LAN” port on the power injector to a LAN switch. Connect the power cord to a nearby AC power source (100‐240 VAC, 50/60 Hz). Note: Connecting the Ethernet cable from the AP to the injector module powers on the unit. 5. Verify AP Operation Verify basic AP operation by checking the system LEDs. The power LED should be on green, the ETH0 port LED on/blinking green, and the 2.4GHz/5GHz wireless LED on/blinking green (2.4 GHz) or blue (5 GHz). – 4 – 2.4GHz/5GHz signal strength LEDs. 2.4GHz/5GHz link/activity LED. ETH1 port link/activity LED. ETH0 (PoE) port link/activity LED. Power LED. Quick Start Guide 6. Connect to the Web The stand‐alone APs offer a web‐based management interface for the User Interface configuration of all the unit’s features. You can make initial configuration changes by connecting a PC directly to the AP’s ETH1 RJ‐45 port. The AP has a default management IP address of 192.168.2.1 and a subnet mask of 255.255.255.0. You must set your PC IP address to be on the same subnet as the AP (that is, the PC and AP addresses must both start 192.168.2.x). Log in to the web interface using the default settings: ◆ Login Name — root ◆ Password — admin123 For more information on stand‐alone AP configuration using the web interface, refer to the Management Guide. – 5 – Quick Start Guide Hardware Specifications Item Specification Chassis Size (H x W x D:) 283 x 94 x 50 mm (11.14 x 3.7 x 1.97 inches) Weight 762 g (1.68 lb) Temperature Operating: ‐20 °C to 65 °C (‐4 °F to 149 °F) Storage: ‐30 °C to 80 °C (‐22 °F to 176 °F) Humidity Operating: 15% to 95% (non‐condensing) Waterproof/Dustproof IP55 Network Interfaces Ports ETH0 (PoE) RJ‐45 Port: 1000BASE‐T, passive PoE ETH1 RJ‐45 Port: 100BASE‐TX 2.4 GHz Radio IEEE 802.11b/g/n 5 GHz Radio IEEE 802.11a/n/ac Radio Frequencies 2412 ~ 2472 MHz 5745 ~ 5825 MHz (China) 5180 ~ 5320 MHz (ETSI) 5500 ~ 5700 MHz (ETSI) Power Supply PoE Input Power 24 VDC, 1.0 A Power Consumption 24 W maximum Power Injector Module 100‐240 VAC, 50‐60 Hz, auto‐sensing Regulatory Compliances Radio EN 300 328 V1.8.1:2012 EN 301 893 V1.7.1:2012 EN 301 489‐1 V1.9.2 (2011‐09) EN 301 489‐7 V1.3.1:2005 FCC Part 15C 15.247/15.207 (2.4‐2.4835GHz, 5.725‐5.850GHz) FCC Part 15E 15.407 (5.150GHz‐5.250GHz) Emissions EN 55022 2010+AC:2011 EN 61000‐3‐2 2006+A1:2009+A2:2009 FCC Class B Part 15 Immunity EN 55024 : 2010 EN 61000‐4‐2 : 2009 – 6 – Quick Start Guide Federal Communication Commission Interference Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: ( 1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: ‐ ‐ ‐ ‐ Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter. For operation within 5.15 ~ 5.25GHz / 5.47 ~5.725GHz frequency range, it is restricted to indoor environment. The band from 5600‐5650MHz will be disabled by the software during the manufacturing and cannot be changed by the end user. This device meets all the other requirements specified in Part 15E, Section 15.407 of the FCC Rules. Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Note: The country code selection is for non‐US model only and is not available to all US model. Per FCC regulation, all WiFi product marketed in US must fixed to US operation channels only. – 7 – Quick Start Guide Professional installation instruction 1. Installation personal This product is designed for specific application and needs to be installed by a qualified personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting. 2. Installation location The product shall be installed at a location where the radiating antenna can be kept 20cm from nearby person in normal operation condition to meet regulatory RF exposure requirement. 3. External antenna Use only the antennas which have been approved by the applicant. The non‐approved antenna(s) may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC limit and is prohibited. 4. Installation procedure Please refer to user’s manual for the detail. 5. Warning Please carefully select the installation position and make sure that the final output power does not exceed the limit set force in relevant rules. The violation of the rule could lead to serious federal penalty. To professional installer : Installer must disable UNII band 1 by tool when you install this device for outdoor usage for complying with FCC rule. 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、 加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用, 並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電機須忍受合法通信或工業、 科學及醫療用電波輻射性電機設備之干擾。 此器材須經專業安裝並限用於固定式點對點操作。 本器材須經專業工程人員安裝及設定,始得設置使用,且不得直接販售給一般消費者。 「電磁波曝露量MPE標準值1mW/cm2,送測產品實測值為 0.736 mW/cm2」 – 8 –
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Author : tting Create Date : 2015:04:24 11:59:20+08:00 Modify Date : 2015:04:23 22:41:42-07:00 Has XFA : No XMP Toolkit : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03 Producer : Acrobat Distiller 7.0 (Windows) Creator Tool : PScript5.dll Version 5.2 Metadata Date : 2015:04:23 22:41:42-07:00 Format : application/pdf Title : Microsoft Word - SF-AC1200 & SF-AC866 Manual_20150424 Creator : tting Document ID : uuid:7cb70e3f-5a1a-4ac8-a910-567d5d33446c Instance ID : uuid:79f00b9c-7b74-4d53-b08b-250811f503da Page Count : 63EXIF Metadata provided by EXIF.tools