Accton Technology AC866 5GHz Outdoor AP, 802.11ac Outdoor 5GHz Access Point User Manual SF AC866 FCC Manual 20150506

Accton Technology Corp 5GHz Outdoor AP, 802.11ac Outdoor 5GHz Access Point SF AC866 FCC Manual 20150506

User Manual rev.pdf

Download: Accton Technology AC866 5GHz Outdoor AP, 802.11ac Outdoor 5GHz Access Point User Manual SF AC866 FCC Manual 20150506
Mirror Download [FCC.gov]Accton Technology AC866 5GHz Outdoor AP, 802.11ac Outdoor 5GHz Access Point User Manual SF AC866 FCC Manual 20150506
Document ID2605963
Application IDqnBFPRZvFE7TiyW0ZDCNAg==
Document DescriptionUser Manual rev.pdf
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize139.8kB (1747525 bits)
Date Submitted2015-05-06 00:00:00
Date Available2015-10-30 00:00:00
Creation Date2015-05-06 14:38:28
Producing SoftwareAcrobat Distiller 7.0 (Windows)
Document Lastmod2015-05-06 16:35:08
Document TitleMicrosoft Word - SF-AC866 FCC Manual_20150506
Document CreatorPScript5.dll Version 5.2
Document Author: tting

Quick Star t Guide
www.ignitenet.com
Brand : IgniteNet
The AC866 is 5GHz Outdoor/Indoor AP access points (APs) that are housed in a
waterproof enclosure for mounting outdoors. The units include a built‐ in
mounting bracket for attaching to a 1.5 to 6‐inch pole and they can be powered
through their Ethernet cable connection from a power injector module that is
installed indoors.
The Outdoor Stand‐Alone Access Points include these models:
◆ SF‐AC866 ‐ 5GHz Outdoor/Indoor AP
Note: For Safety and Regulatory information, refer to the Safety and Regulatory
Information document included with the AP.
–
Section I
GettingStarted
This section provides an overview of the access point, and introduces some basic
concepts about wireless networking. It also describes the basic settings required to
access the management interface.
This section includes these chapters:
◆
“Introduction” on page 12
– 12 –
Introduction
The access point (AP) runs software that includes a network management agent.
The agent offers a variety of management options, including SNMP and a web‐
based interface. The AP can also be accessed via Telnet or SSH for configuration
using a command line interface (CLI).
Configuration Options
The access point’s web agent allows you to configure AP parameters, monitor
wireless connections, and display statistics using a standard web browser such as
Internet Explorer 9.x or later, Mozilla Firefox 5 or later, and Google Chrome 35 or
later. The AP’s web management interface can be accessed from any computer
attached to the network.
The CLI program can be accessed remotely by a Telnet or Secure Shell (SSH)
connection over the network. The CLI is used primarily for technical support.
The AP’s management agent also supports SNMP (Simple Network Management
Protocol). This SNMP agent permits the AP to be managed from any computer in
the network using network management software.
The AP’s web interface, console interface, and SNMP agent allow you to perform
management functions such as:
◆
Set management access user names and passwords
◆
Configure IP settings
◆
Configure SNMP parameters
◆
Configure 5 GHz radio settings
◆
Control access through wireless security settings
◆
Filter packets using Access Control Lists (ACLs)
◆
Download system firmware
◆
Download or upload configuration files
◆
Display system information and statistics
– 13 –
Chapter 1 | Introduction
Network Connections
Network Connections
Prior to accessing the AP’s management agent through a network connection, you
must first configure it with a valid IP address, subnet mask, and default gateway
using the web interface, or the DHCP protocol.
The AP has a static default management address of 192.168.2.1 and a subnet mask
of 255.255.255.0. If the AP’s default IP address is not compatible with your network
or a DHCP server is not available, the AP’s IP address must be configured manually
through the web interface.
First connect to the AP’s Ethernet 1 port and log in to the web interface, as
described in “Connecting to the Web Interface” on page 13. Follow the steps
described in “Setup Wizard” on page 15 to select your country and specify one of
the configuration methods. Then configure the AP with an IP address that is
compatible with your network as described under “LAN Settings” on page 33.
Once the AP’s IP settings are configured for your network, you can access the AP’s
management agent from anywhere within the attached network. The AP can be
managed by any computer using a web browser, or from a network computer using
SNMP network management software.
Connecting to the Web Interface
The AP offers a user‐friendly web‐based management interface for the
configuration of all the unit’s features. Any PC directly attached to the unit can
access the management interface using a web browser, such as Internet Explorer
9.x or later, Mozilla Firefox 5 or later, and Google Chrome 35 or later.
You may want to make initial configuration changes by connecting a PC directly to
the AP’s LAN port. The AP has a default management IP address of 192.168.2.1 and
a subnet mask of 255.255.255.0. You must set your PC IP address to be on the same
subnet as the AP (that is, the PC and AP addresses must both start with192.168.2.x).
To access the AP’s web management interface, follow these steps:
1. Use your web browser to connect to the management interface using the
default IP address of 192.168.2.1.
2. Log in to the interface by entering the default user name “root” with the
password “admin123”, then click Login.
– 14 –
Chapter 1 | Introduction
Connecting to the Web Interface
Note: It is strongly recommended to change the default user name and password
the first time you access the web interface. For information on changing user
names and passwords, see “User Accounts” on page 57.
Figure 1: Login Page
– 15 –
Chapter 1 | Introduction
Setup Wizard
Setup Wizard
The Setup Wizard is designed to help you configure the basic settings required to
get the AP up and running.
Step 1 Select Your Country – Select the access point’s country of operation from the drop‐
down menu. You must set the AP’s country code to be sure that the radios operate
according to permitted local regulations. That is, setting the country code restricts
operation of the AP to the radio channels and transmit power levels permitted for
wireless networks in the specified country.
Figure 2: Select Your Country
Caution: You must set the country code to the country of operation. Setting the
country code ensures that the radios operate within the local regulations specified
for wireless networks.
Note: The country code selection is for non‐US models only and is not available to
all US models. Per FCC regulation, all Wi‐Fi products marketed in the US must be
fixed to US operation channels only.
– 16 –
Chapter 1 | Introduction
Setup Wizard
Step 2 Select Setup Method – Select Easy Setup to set basic wireless network access and
guest network access parameters, or Advanced Setup to specify networking modes
for an AP bridge, AP router, or manual configuration.
Figure 3: Select Setup Method
Step 3 Configure Settings
◆
Easy Setup — Basic wireless network and guest network access parameters.
Specify the name and password for the wireless network and guest network.
The Networking Mode is set to AP Router as described under Advanced Setup.
Figure 4: Easy Setup
■
Wireless Network Setup — Set the name and password for the primary
wireless network. A password must be specified to protect the network
from unauthorized access.
– 17 –
Chapter 1 | Introduction
Setup Wizard
■
◆
Guest Network Setup — Set the name and password for the guest wireless
network. This creates a second SSID for guest users, limiting their access
only to the Internet.
Advanced Setup — Networking modes for AP Bridge, AP Router, or manual
configuration.
Figure 5: Advanced Setup
■
AP Bridge Mode — Configures an interface as attached to the WAN (that is,
the Internet). In the following figure, Ethernet Port 0 and Ethernet Port 1 are
both attached to the WAN. Traffic from these interfaces is directly bridged
into the Internet. (This is also called bridge to Internet.)
Figure 6: Bridge to Internet
■
AP Router Mode — Configures an interface as a member of the LAN. In the
following figure, Ethernet Port 1, Wireless LAN 0 (5 GHz Radio), and Wireless
LAN 1 (2.4 GHz Radio) are all included in the LAN. Traffic from these
interfaces is routed across the access point through Ethernet Port 0 to the
Internet. (This is also called route to Internet.)
Note: Single‐band access points only support one WLAN.
– 18 –
Chapter 1 | Introduction
Main Menu
Figure 7: Route to Internet
■
Manual Mode — Allows all configuration parameters to be manually
configured. Any wired module or radio module may be logically placed on
the WAN and LAN side of the access point.
Main Menu
The web interface Main Menu provides access to all the configuration settings
available for the AP.
To configure settings, click the relevant Main Menu item. Each Main Menu item is
summarized below with links to the relevant section in this guide where the
configuration parameters are described in detail:
◆
Dashboard — The dashboard shows basic settings for the AP, including
Internet status, local network settings, wireless radio status, and traffic graphs.
See “Status Information” on page 22.
◆
Network — Configures Internet, Ethernet, LAN, and Hotspot settings. See
“Network Settings” on page 28.
◆
Wireless — Configures 5 GHz Radio, 2.4 GHz Radio, and VLAN settings. See
“Wireless Settings” on page 37
◆
System — Configures System (designation and location), Maintenance (such as
view log, firmware upgrade, and reset), User Accounts, and Services
(management access methods).
– 19 –
Chapter 1 | Introduction
Main Menu
Dashboard
After logging in to the web interface, the dashboard displays. The dashboard shows
basic settings for the AP, including Internet status, local network settings, wireless
radio status, and traffic graphs.
Figure 8: The Dashboard
Common Web Page The list below describes the common buttons found on most of the web
Buttons management pages:
◆
Save – Applies the new parameters and saves them to temporary RAM
memory. Also displays a message at the top of the screen to inform you that the
changes have not yet been saved to Flash memory. The running configuration
will not be saved upon a reboot unless you click the “Apply” button.
Figure 9: Set Configuration Changes
◆
Apply – Saves the current configuration so that it is retained after a restart.
◆
Revert – Cancels the newly entered settings and restores the originals.
◆
Welcome > Logout – Open the Welcome list and click Logout to end the web
management session.
◆
Welcome > View Users – Open the Welcome list and click View Users to open
the User Accounts menu.
– 20 –
Chapter 1 | Introduction
Main Menu
– 20 –
Section II
Web Configuration
This section provides details on configuring the access point using the web
browser interface.
This section includes these chapters:
◆
“Status Information” on page 22
◆
“Network Settings” on page 28
◆
“Wireless Settings” on page 37
◆
“System Settings” on page 52
– 21 –
2
Status Information
The Dashboard displays information on the current system configuration, including
Internet status, local network settings, wireless radio status, and traffic graphs.
Status Information includes the following sections:
◆
“System and Product Information” on page 22
◆
“Internet Status” on page 22
◆
“Local Networks” on page 24
◆
“Wireless Status” on page 25
◆
“Traffic Graphs” on page 27
System and Product Information
The System and Product Info section shows descriptive information about the AP.
Figure 10: System and Product Information
The following items are displayed in this section:
◆
The model name of the unit.
◆
The software version number.
◆
The serial number of the physical access point.
◆
Length of time the management agent has been up.
◆
The last 1‐minute, 5‐minute and 15‐minute CPU load average.
Internet Status
The Internet Status section shows information about the Internet connection.
– 22 –
Chapter 2 | Status Information
Internet Status
Figure 11: Internet Status
The following items are displayed in this section:
◆
Internet Source — The Ethernet port connected to the Internet. By default,
this is Ethernet Port 0.
◆
Ports bridged to Internet — Additional interfaces attached directly to the
Internet. (See Configure Settings – “Step 3” on page 16 for a more detailed
description.)
◆
IP Address — IP address of the Internet connection.
◆
Gateway — IP address of the gateway router used to pass traffic between this
device and other network segments.
◆
DNS — The IP address of the Domain Name Server on the network. A DNS
maps numerical IP addresses to domain names and can be used to identify
network hosts by familiar names instead of the IP addresses.
◆
Hotspot Status — Shows if the hotspot is enabled or disabled, and the ports
on which this service is enabled.
◆
Options — Includes showing the ARP cache, showing DHCP leases, or
renewing DHCP leases.
Figure 12: Options
– 23 –
Chapter 2 | Status Information
Local Networks
Figure 13: ARP Table
Figure 14: DHCP Leases
Local Networks
The Local Networks section shows information about the local network connection.
Figure 15: Local Networks
The following items are displayed in this section:
◆
Name — Shows information on the name of the local network, whether static
or dynamic configuration is used, and the network mask.
◆
DHCP Server — Shows if DHCP service is enabled on this network.
◆
Members — Shows the ports and wireless radios attached to this network.
◆
Port Status — Shows the status of the Ethernet ports, including link up state,
MAC address, speed, and duplex mode.
– 24 –
Chapter 2 | Status Information
Wireless Status
Wireless Status
The Wireless Status section shows information about the radio settings and
associated clients.
Figure 16: Wireless Status
The following items are displayed in this section:
◆
1.
2.
Radio # — Indicates the 5 GHz or 2.4 GHz wireless interface.
■
Radio Status — Shows if the wireless interface is enabled or disabled.
■
Op Mode — Shows if the unit is configured to operate as an access point
(manually configured), an AP in bridge mode, or an AP in router mode.
■
Channel — The radio channel the access point uses to communicate with
wireless clients. The available channels depend on the 802.11 Mode1,
Channel Bandwidth1, and Country Code settings2.
■
IEEE Mode — The 802.11 wireless LAN standards supported by the access
point.
See “Radio Settings” on page 37.
See “Setup Wizard” on page 15.
– 25 –
Chapter 2 | Status Information
Wireless Status
◆
■
Tx Power — The power of the radio signals transmitted from the access
point.
■
Total Clients — The total number of clients attached to this interface.
SSID # — Service set identifier. Clients that want to connect to the wireless
network through an access point must set their SSIDs to the same as that of the
access point.
■
Network Name — A unique identifier for the local wireless network.
■
Security — Shows whether or not security has been enabled.
■
Associated clients — Shows detailed information about clients.
■
Name — Client name.
■
MAC Address — The MAC address of the wireless client.
■
IP Address — The IP address assigned to the wireless client.
■
Signal — Signal strength (TX/RX) in dBm.
■
Duration — The time the wireless client has been associated.
■
Tx Rate — The data transmit rate to the wireless client.
■
Rx Rate — The data receive rate from the wireless client.
■
Tx Bytes — The number of transmitted bytes to this client.
■
Rx Bytes — The number of received bytes from this client
■
Tx Packets — The number of transmitted packets to this client.
■
Rx Packets — The number of received packets from this client.
– 26 –
Chapter 2 | Status Information
Traffic Graphs
Traffic Graphs
The Traffic Graphs section shows the data rate for the Ethernet ports and wireless
interfaces.
Figure 17: Traffic Graphs
– 27 –
3
Network Settings
This chapter describes basic network settings on the access point. It includes the
following sections:
◆
“Internet Settings” on page 28
◆
“Ethernet Settings” on page 31
◆
“LAN Settings” on page 33
◆
“Hotspot Settings” on page 34
Internet Settings
The Internet Settings page configures the basic Internet settings for the AP, such as
the source port, IP aliases, as well as the host name and maximum MTU size.
Figure 18: Internet Settings
The following items are displayed on this page:
◆
Internet Source — The Ethernet port used to access the Internet.
(Default: Ethernet Port 0; Options: Ethernet Port 0‐1)
◆
IP Address Mode — The method used to provide an IP address for the Internet
access port. (Default: DHCP; Options: DHCP, static IP, PPPoE)
■
DHCP — Configuration options displayed for DHCP are shown in Figure 18,
“Internet Settings", on page 28.
– 28 –
Chapter 3 | Network Settings
Internet Settings
■
Static IP — To configure a static IP address for the selected Ethernet
interface, the following items must be specified.
Figure 19: IP Address Mode – Static IP
■
IP Address — Specifies an IP address for the access point. Valid IP
addresses consist of four decimal numbers, 0 to 255, separated by
periods. (Default: 192.168.1)
■
Subnet Mask — Indicates the local subnet mask.
(Default: 255.255.255.0)
■
Default Gateway — The IP address of the default gateway, which is
used if the requested destination address is not on the local subnet.
If you have management stations, DNS, RADIUS, or other network
servers located on another subnet, type the IP address of the default
gateway router in the text field provided.
■
Addl DNS Server — The IP address of Domain Name Servers on the
network. A DNS maps numerical IP addresses to domain names and
can be used to identify network hosts by familiar names instead of the
IP addresses.
If you have a DNS servers located on the local network, type the IP
address in the text fields provided.
– 29 –
Chapter 3 | Network Settings
Internet Settings
■
PPPoE — To obtain an IP address for the selected Ethernet interface using
PPPoE, the following items must be specified.
Figure 20: IP Address Mode – PPPoE
◆
■
User Name — The user name specified by the service provider.
(Range: 1‐32 characters)
■
Password — The password specified by the service provider.
(Range: 1‐32 characters)
■
Service Name — The service name assigned for the PPPoE connection.
The service name is normally optional, but may be required by some
service providers. (Range: 1‐32 alphanumeric characters)
IP Aliases — Adds a static IPv4 address under which the access point can also
be reached.
Figure 21: IP Alias
◆
MTU Size — Sets the size of the maximum transmission unit (MTU) for packets
sent on this interface. (Range: 1400‐1500 bytes; Default 1500 bytes)
– 30 –
Chapter 3 | Network Settings
Ethernet Settings
Ethernet Settings
The Ethernet Settings page configures the network behavior of the Ethernet ports,
indicating that a port provides an Internet connection for wireless clients attached
to the local network (routed to the Internet), is bridged directly to the Internet,
connected to the guest network, or provides hotspot service.
The following items are common for all pages under Ethernet Settings:
◆
Status — Enables or disables this port. (Default: ON)
◆
Auto‐negotiation — Enables or disables auto‐negotiation for a given
interface. (Default: ON)
1000BASE‐T does not support forced mode. Auto‐negotiation should always be
used to establish a connection over any 1000BASE‐T port.
When auto‐negotiation is enabled, the access point will negotiate the best
settings for a link based on advertised capabilities.
Figure 22: Ethernet Settings – Internet Source
The following status message is displayed if an interface is connected to the
Internet:
◆
“This port is the internet source for this product. Configure Internet Settings”
If more than one interface is connected to the Internet, only the last configured
interface is used.
– 31 –
Chapter 3 | Network Settings
Ethernet Settings
Figure 23: Ethernet Settings – Network Behavior
The following items are displayed on this page:
◆
Network Behavior — For the Ethernet port which is not providing Internet
access, one of the following connection methods must be specified.
(Default: Route to Internet)
■
Bridge to Internet — Configures an interface to be attached to the WAN.
Traffic from this interface is directly bridged into the Internet. (See Figure 6,
“Bridge to Internet", on page 17.) If an Ethernet port is bridged to the
Internet, management access cannot be made by a direct connection to
this port. However, if another Ethernet port or radio interface is within the
LAN (routed to the Internet) the access point can be managed through this
interface by a PC which is configured with IP address in the same subnet.
■
Route to Internet — Configures an interface to be a member of the LAN.
Traffic from this interface is routed across the access point and out through
an interface which is bridged to the Internet. (See Figure 7, “Route to
Internet", on page 18.) By default, Ethernet Port 1 is routed to Internet,
allowing management access via a direct connection to a PC configured
with an address in the same subnet.
■
Network Name — The network to be routed. The default is “Default
local network” as displayed under LAN Settings – Local Networks.
■
Add to Guest Network — This port can only access the guest network.
■
Hotspot Controlled — This port can only access hotspot services.
■
Configure Hotspot — Opens the Hotspot Settings page.
– 32 –
Chapter 3 | Network Settings
LAN Settings
LAN Settings
The LAN Settings page configures the LAN settings for the local network and guest
network, including IP interface setting, DHCP server settings, STP administrative
status, and UPnP administrative status.
Figure 24: Network – LAN Settings
The following items are displayed on this page:
◆
Members — The interfaces attached to the local area network.
◆
IP Address — Specifies the IP address for the local network or guest network.
Valid IP addresses consist of four decimal numbers, 0 to 255, separated by
periods. (Default: 192.168.2.1)
◆
Subnet Mask — Indicates the local subnet mask. (Default: 255.255.255.0)
◆
MTU Size — Sets the size of the maximum transmission unit (MTU) for packets
sent on this network.
◆
DHCP Server — Enables/disables DHCP on this network. (Default: Enabled)
■
DHCP Start — First address in the address pool. (Range: 1‐256;
Default: x.x.x.100)
■
DHCP Max — Maximum number of addresses in the address pool.
(Range: 1‐255; Default: 150)
– 33 –
Chapter 3 | Network Settings
Hotspot Settings
◆
STP — Enables or disables processing of Spanning Tree Protocol messages.
(Default: Disabled)
◆
UPnP — Enables or disables Universal Plug‐and‐Play broadcast messages.
(Default: Disabled)
Hotspot Settings
The Hotspot Settings page can configure Internet access to the general public in
places such as coffee houses, libraries and hospitals. Specific access rights may also
be defined through a RADIUS server.
Figure 25: Hotspot Settings (Network Settings)
The following items are displayed on this page:
◆
Network IP — Specifies the IP address for the hotspot. Valid IP addresses
consist of four decimal numbers, 0 to 255, separated by periods. (Default:
192.168.182.1)
◆
Network Mask — Network mask for the associated IP subnet. This mask
identifies the host address bits used for routing to specific subnets.
◆
DHCP Start — Starting number of (last numeric field) in address pool.
(Range: 1‐254; Default: 10)
◆
DHCP End — Ending number of (last numeric field) in address pool.
(Range: 1‐254; Default: 254)
◆
DHCP Lease Time — The duration that an IP address is assigned to a DHCP
client. (Range: 600‐43200 seconds; Default: 600 seconds)
– 34 –
Chapter 3 | Network Settings
Hotspot Settings
◆
DNS 1 — The IP address of the primary Domain Name Server on the network. A
DNS maps numerical IP addresses to domain names and can be used to identify
network hosts by familiar names instead of the IP addresses.
◆
DNS 2 — The secondary DNS server available to DHCP clients.
◆
DNS Domain Name — The domain name used to resolve incomplete host
names via the Domain Name System. (Range: 1‐32 characters)
Figure 26: Hotspot Settings (RADIUS Settings)
The following items are displayed on this page:
◆
Radius Server 1 — IP address or host name of the primary RADIUS server.
◆
Radius Server 2 — IP address or host name of the secondary RADIUS server.
◆
Radius Shared Secret — A shared text string used to encrypt messages
between the access point and the RADIUS server. Be sure that the same text
string is specified on the RADIUS server. Do not use blank spaces in the string.
(Range: 1‐255 characters).
◆
Radius Auth Port — RADIUS server UDP port used for authentication
messages. (Range: 1‐65535, Default: 1812)
◆
Radius Acct Port — RADIUS server UDP port used for accounting messages.
(Range: 1‐65535, Default: 1813)
◆
Local ID — Local RADIUS server identifier.
◆
Local Name — Local RADIUS server name
◆
Operation ID — Local RADIUS server operation identifier.
– 35 –
Chapter 3 | Network Settings
Hotspot Settings
Figure 27: Hotspot Settings (Captive Portal Settings)
The following items are displayed on this page:
◆
Captive Portal URL — Host name of Internet service portal for the hotspot.
The captive portal forces a hotspot client to access a welcome web page (normally
used for authentication) before gaining further access to the Internet. The
welcome page may require authentication and/or payment.
◆
Captive Portal Secret — The password used for logging into the hotspot.
◆
Walled Garden — A list of web sites to which unauthenticated users are
allowed to navigate.
◆
Auth White List — A list of MAC addresses that are allowed to bypass the
captive portal to access the internet.
– 36 –
4
Wireless Settings
This chapter describes wireless settings on the access point. It includes the
following sections:
◆
“Radio Settings” on page 37
◆
“VLAN Settings” on page 50
Radio Settings
The IEEE 802.11 wireless interfaces include configuration options for radio signal
characteristics and wireless security features.
The access point can operate in several radio modes, 802.11a/a+n/AC (5 GHz) or
802.11b+g/b+g+n (2.4 GHz). Supported modes depend on the access point model.
Note that the dual‐band access points can operate at 2.4 GHz and 5 GHz at the
same time. The web interface identifies the radio configuration pages as:
◆
Radio 0 — the 5 GHz 802.11a/n/AC radio interface
◆
Radio 1 — the 2.4 GHz 802.11b/g/n radio interface
Each radio supports 8 virtual access point (VAP) interfaces based on the SSIDs,
referred to as VAP 0 ~ VAP 7. Each VAP functions as a separate access point, and can
be configured with its own Service Set Identification (SSID) and security settings.
However, most radio signal parameters apply to all VAP interfaces. Traffic to specific
VAPs can be segregated based on user groups or application traffic. The clients
associate with each VAP in the same way as they would with separate physical
access points. The AP supports up to a total of 127 wireless clients across all VAP
interfaces per radio.
– 37 –
Chapter 4 | Wireless Settings
Radio Settings
Figure 28: Radio Settings (Physical Radio Settings)
The following items are displayed on this page:
◆
Status — Enables or disables the wireless service on this interface.
◆
Mode — Selects the mode in which the AP will function.
■
Access Point (Auto‐WDS) — The VAP operates as an access point in WDS
mode, which accepts connections from APs in Client WDS mode. (This is
the default setting.)
In this mode, the AP provides services to clients as a normal access point.
WDS is used to automatically search for and connect to other AP nodes
using the same SSID and security settings.
■
Client — The AP can provide a wireless connection to another AP. In this
mode, it can pass information from or to locally wired hosts, but does not
provide services to any wireless clients.
■
Client WDS — The AP provides services to clients as a normal access point,
and operates as a client station in WDS mode, which can connect to other
access points in Auto‐WDS mode. Connection to another AP can be made
automatically by other access points operating in Auto‐WDS mode.
◆
DFS — Dynamic Frequency Selection can be used to detect and avoid
interference with Radar systems operating in the 5 GHz range (UNII channels
52‐64 and 100‐140). If radar is detected, the AP will alter the channel it is
operating on and tell associated stations the channel to which it is moving. This
allows stations to re‐associate with minimum interruption. (This parameter is
only applicable to the 5 GHz radio, and is enabled by default.)
◆
802.11 Mode — Defines the radio operation mode.
■
Radio 0 (5 GHz Radio) — Default: 11a+n; Options: 11a, 11a+n, 11AC
■
Radio 1 (2.4 GHz Radio) — Default: 11b+g; Options: 11b+g, 11b+g+n
– 38 –
Chapter 4 | Wireless Settings
Radio Settings
◆
Channel Bandwidth — The AP options for channel bandwidth include 5, 10,
20, 40 and 80 MHz. Using 20 MHz gives an 802.11g connection a speed of
54 Mbps and an 802.11n connection a speed of up to 108 Mbps, and ensures
backward compliance for slower 802.11b devices. Setting the channel bandwidth
to 40 MHz provides a connection speed for 802.11n of up to 300 Mbps. Using a
channel bandwidth of 80MHz provides a connection speed up to
866.7 Mbps. (Default: 20 MHz; Range: 5 MHz, 10 MHz, 20 MHz, 40 MHz, 80MHz)
◆
Channel — The radio channel that the access point uses to communicate with
wireless clients. When multiple access points are deployed in the same area, set
the channel on neighboring access points at least five channels apart to avoid
interference with each other. For example, for 11g/n 20 MHz mode you can
deploy up to three access points in the same area using channels 1, 6, 11. Note
that wireless clients automatically set the channel to the same as that used by
the access point to which it is linked. (The available channels are dependent on
the 802.11 Mode, Channel Bandwidth, and Country Code settings.)
Selecting Auto enables the access point to automatically select an unoccupied
radio channel. (Default: Auto)
Table 1: Radio Channels
Radio 0 (5 GHz)
Radio 1 (2.4 GHz)
Radio Channelsa Frequency (GHz)
Radio Channels
Frequency (GHz)
Auto
Auto scan
Auto
Auto scan
36
5.180
2.412
40
5.200
2.417
44
5.220
2.422
48
5.240
2.427
149
5.745
2.432
153
5.765
2.437
157
5.785
2.422
161
5.805
2.447
165
5.825
2.452
10
2.457
11
2.462
a. Supported channels depend on the 802.11 mode and channel bandwidth.
– 39 –
Chapter 4 | Wireless Settings
Radio Settings
Figure 29: Radio Settings (Wireless Network Configuration)
The following items are displayed on this page:
General Settings
◆
Status — Enables or disables the wireless service on this VAP.
◆
SSID — The name of the basic service set provided by a Virtual Access Point
(VAP) interface. Clients that want to connect to the network through the access
point must set their SSID to the same as that of the access point’s VAP interface.
(Default: ACN0.# (where # is 0‐7) for 5 GHz, ACN1.# (where # is 0‐7) for 2.4 GHz;
Range: 1‐32 characters)
◆
Broadcast — The SSID can be broadcast at regular intervals so that wireless
stations searching for a network connection can discover it. This allows wireless
clients to dynamically discover and roam between WLANs. This feature also
makes it easier for hackers to break into your home network. Because SSIDs are
not encrypted, it is easy to grab one by snooping the WLAN looking for SSID
broadcast messages coming from the AP. (Default: Enabled)
◆
Client Isolation — If enabled, wireless clients can talk to the LAN, and reach
the Internet if such connection is available, but they cannot communicate with
one another. (Default Disabled)
– 40 –
Chapter 4 | Wireless Settings
Radio Settings
◆
WMM — Sets the WMM operational mode on the access point. When enabled,
the parameters for each Access Category (AC) queue will be employed on the
access point and QoS capabilities advertised to WMM‐enabled clients. (Default:
Enabled)
When enabled, WMM must be supported on any device trying to associated with
the access point. Devices that do not support this feature will not be allowed to
associate with the access point.
Wireless networks offer an equal opportunity for all devices to transmit data
from any type of application. Although this is acceptable for most applications,
multimedia applications (with audio and video data) are particularly sensitive
to the delay and throughput variations that result from this “equal opportunity”
wireless access method. For multimedia applications to run well over a wireless
network, a Quality of Service (QoS) mechanism is required to prioritize traffic
types and provide an “enhanced opportunity” wireless access method.
The access point implements QoS using the Wi‐Fi Multimedia (WMM) standard.
Using WMM, the access point is able to prioritize traffic and optimize
performance when multiple applications compete for wireless network
bandwidth at the same time. WMM employs techniques that are a subset of the
IEEE 802.11e QoS standard and it enables the access point to inter‐operate with
both WMM‐enabled clients and other devices that may lack any WMM
functionality.
Access Categories — WMM defines four access categories (ACs): voice, video,
best effort, and background. These categories correspond to traffic priority
levels and are mapped to IEEE 802.1D priority tags (see Figure 2, “WMM Access
Categories", on page 41). The direct mapping of the four ACs to 802.1D
priorities is specifically intended to facilitate inter operability with other wired
network QoS policies. While the four ACs are specified for specific types of
traffic, WMM allows the priority levels to be configured to match any network‐
wide QoS policy. WMM also specifies a protocol that access points can use to
communicate the configured traffic priority levels to QoS‐enabled wireless
clients.
Table 2: WMM Access Categories
Access
Category
WMM
Designation
Description
802.1D
Tags
AC_VO (AC3)
Voice
Highest priority, minimum delay. Time‐sensitive
data such as VoIP (Voice over IP) calls.
7, 6
AC_VI (AC2)
Video
High priority, minimum delay. Time‐sensitive data
such as streaming video.
5, 4
AC_BE (AC0)
Best Effort
Normal priority, medium delay and throughput.
Data only affected by long delays. Data from
applications or devices that lack QoS capabilities.
0, 3
AC_BK (AC1)
Background
Lowest priority. Data with no delay or throughput
requirements, such as bulk data transfers.
2, 1
– 41 –
Chapter 4 | Wireless Settings
Radio Settings
WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video,
Best Effort, and Background. The higher the AC priority, the higher the probability
that data is transmitted.
When the access point forwards traffic, WMM adds data packets to four
independent transmit queues, one for each AC, depending on the 802.1D priority
tag of the packet. Data packets without a priority tag are always added to the Best
Effort AC queue. From the four queues, an internal “virtual” collision resolution
mechanism first selects data with the highest priority to be granted a transmit
opportunity. Then the same collision resolution mechanism is used externally to
determine which device has access to the wireless medium.
For each AC queue, the collision resolution mechanism is dependent on two
timing parameters:
◆AIFSN (Arbitration Inter‐Frame Space Number), a number used to
calculate the minimum time between data frames
◆CW (Contention Window), a number used to calculate a random backoff time
After a collision detection, a backoff wait time is calculated. The total wait time is
the sum of a minimum wait time (Arbitration Inter‐Frame Space, or AIFS)
determined from the AIFSN, and a random backoff time calculated from a value
selected from zero to the CW. The CW value varies within a configurable range. It
starts at CWMin and doubles after every collision up to a maximum value, CWMax.
After a successful transmission, the CW value is reset to its CWMin value.
Figure 30: WMM Backoff Wait Times
Time
CWMin
High Priority
CWMax
AIFS
Random Backoff
Minimum Wait Time
Random Wait Time
CWMin
Low Priority
CWMax
AIFS
Random Backoff
Minimum Wait Time
Random Wait Time
For high‐priority traffic, the AIFSN and CW values are smaller. The smaller values
equate to less backoff and wait time, and therefore more transmit opportunities.
– 42 –
Chapter 4 | Wireless Settings
Radio Settings
Security Settings
◆
Method — Sets the wireless security method for each VAP, including
association mode, encryption, and authentication. (Default: No Security)
■
No Security — The VAP broadcasts a beacon signal including the
configured SSID. Wireless clients with an SSID setting of “any” can read the
SSID from the beacon and automatically set their SSID to allow immediate
connection.
■
WEP Open System — The VAP broadcasts a beacon signal including the
configured SSID. Wireless clients with an SSID setting of “any” can read the
SSID from the beacon and automatically set their SSID to allow immediate
connection.
■
Key — WEP is used to encrypt data transmitted between wireless
clients and the VAP. WEP uses static shared keys (fixed‐length
hexadecimal or alphanumeric strings) that are manually distributed to
all clients that want to use the network.
WEP is the security protocol initially specified in the IEEE 802.11
standard for wireless communications. Unfortunately, WEP has been
found to be seriously flawed and cannot be recommended for a high
level of network security. For more robust wireless security, the access
point provides Wi‐Fi Protected Access (WPA) and WPA2 for improved
data encryption and user authentication.
Be sure that the WEP shared keys are the same for each client in the
wireless network. All clients share the same keys, which are used for
data encryption.
For 64‐bit WEP, string length must be 5 ASCII characters (letters and
numbers) or 10 hexadecimal digits. For 128‐bit WEP, string length must
be 13 ASCII characters (letters and numbers) or 26 hexadecimal digits.
■
WPA‐PSK — For enterprise deployment, WPA requires a RADIUS
authentication server to be configured on the wired network. However, for
small office networks that may not have the resources to configure and
maintain a RADIUS server, WPA provides a simple operating mode that uses
just a pre‐shared password for network access. The Pre‐Shared Key mode
uses a common password for user authentication that is manually entered
on the access point and all wireless clients. The PSK mode uses the same
TKIP packet encryption and key management as WPA in the enterprise,
providing a robust and manageable alternative for small networks.
■
Encryption — Data encryption uses one of the following methods:
■
CCMP (AES) — AES‐CCMP is used as the multicast encryption
cipher. AES‐CCMP is the standard encryption cipher required for
WPA2. (This is the default setting.)
■
TKIP — TKIP is used as the multicast encryption cipher.
– 43 –
Chapter 4 | Wireless Settings
Radio Settings
■
■
Auto: TKIP + CCMP (AES) — The encryption method used by the
client is discovered by the access point.
Key — WPA is used to encrypt data transmitted between wireless
clients and the VAP. WPA uses static shared keys (fixed‐length
hexadecimal or alphanumeric strings) that are manually distributed to
all clients that want to use the network.
String length must be 8 to 63 ASCII characters (letters and numbers).
No special characters are allowed.
■
WPA2‐PSK: Clients using WPA2 with a Pre‐shared Key are accepted for
authentication.
WPA was introduced as an interim solution for the vulnerability of WEP
pending the ratification of the IEEE 802.11i wireless security standard. In
effect, the WPA security features are a subset of the 802.11i standard. WPA2
includes the now ratified 802.11i standard, but also offers backward
compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK
modes of operation and support for TKIP encryption.
Refer to WPA‐PSK for a description of encryption methods and the key.
■
WPA‐EAP — WPA employs a combination of several technologies to
provide an enhanced security solution for 802.11 wireless networks. A
RADIUS server is used for authentication, and can also be used for
accounting.
Refer to WPA‐PSK for a description of encryption methods.
RADIUS Settings
A RADIUS server must be specified for the access point to implement IEEE
802.1X network access control and Wi‐Fi Protected Access (WPA) wireless
security.
In addition, you can configure a RADIUS Accounting server to receive user‐
session accounting information from the access point. RADIUS Accounting
can be used to provide valuable information on user activity in the
network.
This guide assumes that you have already configured RADIUS server(s) to support
the access point. Configuration of RADIUS server software is beyond the scope of
this guide, refer to the documentation provided with the RADIUS server software.
■
Radius Auth Server — Specifies the IP address or host name of the
RADIUS authentication server.
■
Radius Auth Port — The UDP port number used by the RADIUS server
for authentication messages. (Range: 1024‐65535; Default: 1812)
– 44 –
Chapter 4 | Wireless Settings
Radio Settings
■
■
Radius Auth Secret — A shared text string used to encrypt messages
between the access point and the RADIUS server. Be sure that the same
text string is specified on the RADIUS authentication server. Do not use
blank spaces in the string. (Maximum length: 255 characters)
■
Radius Acct Server — Specifies the IP address or host name of the
RADIUS accounting server.
■
Radius Acct Port — The UDP port number used by the RADIUS server
for accounting messages. (Range: 1024‐65535; Default: 1813)
■
Radius Acct Secret — A shared text string used to encrypt messages
between the access point and the RADIUS server. Be sure that the same
text string is specified on the RADIUS accounting server. Do not use
blank spaces in the string. (Maximum length: 255 characters)
WPA2‐EAP —WPA was introduced as an interim solution for the
vulnerability of WEP pending the ratification of the IEEE 802.11i wireless
security standard. In effect, the WPA security features are a subset of the
802.11i standard. WPA2 includes the now ratified 802.11i standard, but also
offers backward compatibility with WPA. Therefore, WPA2 includes the
same 802.1X and PSK modes of operation and support for TKIP encryption.
A RADIUS server is used for authentication, and can also be used to
accounting.
Refer to WPA‐PSK for a description of encryption methods.
Refer to WPA‐EAP for a information on configuring the RADIUS server.
◆
Access Control List — Wireless clients can be authenticated for network access
by checking their MAC address against the local database configured on the
access point. (Default: OFF)
■
Policy — The MAC list can be configured to either allow or deny network
access to specified clients. (Default: Allow all MACs on list)
■
Filtered MACs — Enter a physical address for each client. Enter six pairs of
hexadecimal digits separated by colons, and followed by an optional
comment; for example, 00:90:D1:12:AB:89 John Smith’s PC
Network Settings
◆
Network Behavior — One of the following connection methods must be
specified. (Default: Route to Internet)
■
Bridge to Internet — Configures an interface as attached to the WAN.
Traffic from this interface is directly bridged into the Internet. (See Figure 6,
“Bridge to Internet", on page 17.)
– 45 –
Chapter 4 | Wireless Settings
Radio Settings
■
Route to Internet — Configures an interface as a member of the LAN.
Traffic from this interface is routed across the access point and out through
an interface which is bridged to the Internet. (See Figure 7, “Route to
Internet", on page 18.)
■
Network Name — The network to be routed. The default is “Default
local network” as displayed under LAN Settings – Local Network.
■
Add to Guest Network — This interface can only support the guest
network.
■
Hotspot Controlled — This interface can only support hotspot services.
■
■
Configure Hotspot — Opens Hotspot Settings page.
VLAN Tag Traffic — Tags any packets passing from this VAP (virtual access
point) to the associated Ethernet port as configured under “VLAN Settings”
on page 50. (Range: 3‐4095)
◆
Limit Upload — Enables rate limiting of traffic from the VAP interface as it is
passed to the wired network. You can set a maximum rate in Kbytes per second.
(Range: 256‐10048576 Kbytes per second; Default: OFF)
◆
Limit Download — Enables rate limiting of traffic from the wired network as it
is passed to the VAP interface. You can set a maximum rate in kbytes per
second. (Range: 256‐10048576 Kbytes per second; Default: OFF)
Advanced Settings
◆
802.11 Rates — The minimum data rate at which the AP transmits packets on
the wireless interface.
Table 3: 802.11 Data Rates
Option
Rate (Max)
Coding Method
Auto
Auto
Based on signal strength
1M
1 Mbps
CKK
√
2M
2 Mbps
CKK
√
5.5M
5.5 Mbps
CKK
√
11M
11 Mbps
CKK
√
√
6M
6 Mbps
OFDM
√
√
9M
9 Mbps
OFDM
√
√
12M
12 Mbps
OFDM
√
√
18M
18 Mbps
OFDM
√
√
24M
24 Mbps
OFDM
√
√
36M
36 Mbps
OFDM
√
√
– 46 –
Radio 0 (5 GHz)
√
Radio 1 (2.4 GHz)
√
Chapter 4 | Wireless Settings
Radio Settings
Table 3: 802.11 Data Rates (Continued)
Option
Rate (Max)
Coding Method
48M
48 Mbps
OFDM
√
√
54M
54 Mbps
OFDM
√
√
MCS0
15 Mbps
BPSK, single stream
√
√
MCS1
30 Mbps
QPSK, single stream
√
√
MCS2
45 Mbps
QPSK, single stream
√
√
MCS3
60 Mbps
16‐QAM, single stream
√
√
MCS4
90 Mbps
16‐QAM, single stream
√
√
MCS5
120 Mbps
64‐QAM, single stream
√
√
MCS6
135 Mbps
64‐QAM, single stream
√
√
MCS7
150 Mbps
64‐QAM, single stream
√
√
MCS8
30 Mbps
BPSK, double stream
√
√
MCS9
60 Mbps
QPSK, double stream
√
√
MCS10
90 Mbps
QPSK, double stream
√
√
MCS11
120 Mbps
16‐QAM, double stream
√
√
MCS12
180 Mbps
16‐QAM, double stream
√
√
MCS13
240 Mbps
64‐QAM, double stream
√
√
MCS14
270 Mbps
64‐QAM, double stream
√
√
MCS15
300 Mbps
64‐QAM, double stream
√
√
NSS1‐MCS0
32.5 Mbps
256‐QAM, single stream
√
NSS1‐MCS1
65 Mbps
256‐QAM, single stream
√
NSS1‐MCS2
97.5 Mbps
256‐QAM, single stream
√
NSS1‐MCS3
130 Mbps
256‐QAM, single stream
√
NSS1‐MCS4
195 Mbps
256‐QAM, single stream
√
NSS1‐MCS5
260 Mbps
256‐QAM, single stream
√
NSS1‐MCS6
292.5 Mbps
256‐QAM, single stream
√
NSS1‐MCS7
325 Mbps
256‐QAM, single stream
√
NSS1‐MCS8
390 Mbps
256‐QAM, single stream
√
NSS1‐MCS9
433.3 Mbps
256‐QAM, single stream
√
NSS2‐MCS0
65 Mbps
256‐QAM, double stream
√
NSS2‐MCS1
130 Mbps
256‐QAM, double stream
√
NSS2‐MCS2
195 Mbps
256‐QAM, double stream
√
NSS2‐MCS3
260 Mbps
256‐QAM, double stream
√
NSS2‐MCS4
390 Mbps
256‐QAM, double stream
√
– 47 –
Radio 0 (5 GHz)
Radio 1 (2.4 GHz)
Chapter 4 | Wireless Settings
Radio Settings
Table 3: 802.11 Data Rates (Continued)
Option
Rate (Max)
Coding Method
Radio 0 (5 GHz)
NSS2‐MCS5
520 Mbps
256‐QAM, double stream
√
NSS2‐MCS6
585 Mbps
256‐QAM, double stream
√
NSS2‐MCS7
650 Mbps
256‐QAM, double stream
√
NSS2‐MCS8
780 Mbps
256‐QAM, double stream
√
NSS2‐MCS9
866.7 Mbps
256‐QAM, double stream
√
Radio 1 (2.4 GHz)
◆
Tx Streams — Specifies a single stream at 20MHz or a dual stream at 20MHz
and 40MHz for signal transmission. (Options: 1, 2; Default 1)
◆
Rx Streams — Specifies a single stream at 20MHz or a dual stream at 20MHz
and 40MHz for signal reception. (Options: 1, 2; Default 1)
◆
Tx Power — Adjusts the power of the radio signals transmitted from the access
point. The higher the transmission power, the farther the transmission range.
Power selection is not just a trade off between coverage area and maximum
supported clients. You also have to ensure that high‐power signals do not
interfere with the operation of other radio devices in the service area.
(Default: 17 dBm for 5 GHz radio, 27 dBm for 2.4 GHz radio)
Table 4: Tx Power
Power
Radio 0 (5 GHz)
Radio 1 (2.4 GHz)
0 dBM (1 mW)
√
√
4dBM (2 mW)
√
√
5 dBM (3 mW)
√
√
7 dBM (5 mW)
√
√
8 dBM (6 mW)
√
√
9 dBM (7 mW)
√
√
10 dBM (10 mW)
√
√
11 dBM (12 mW)
√
√
12 dBM (15 mW)
√
√
13 dBM (19 mW)
√
√
14 dBM (25 mW)
√
√
15 dBM (31 mW)
√
√
16 dBM (39 mW)
√
√
17 dBM (50 mW)
√
√
18 dBM (63 mW)
√
19 dBM (79 mW)
√
– 48 –
Chapter 4 | Wireless Settings
Radio Settings
Table 4: Tx Power (Continued)
Power
Radio 0 (5 GHz)
Radio 1 (2.4 GHz)
20 dBM (100 mW)
√
21 dBM (125 mW)
√
22 dBM (158 mW)
√
23 dBM (199 mW)
√
24 dBM (251 mW)
√
25 dBM (316 mW)
√
26 dBM (398 mW)
√
27 dBM (501 mW)
√
◆
ACK Timeout — Sets the acknowledgement timeout, which is used primarily
for long‐distance connections. This timeout is used to make an adjustment for
link distance. It is based on the amount of time, in microseconds, that it should
take to transmit a frame to the other end of the link, be processed by the
receiving device, and have the ACK frame created and returned to the sending
device. (Range: 0‐255 microseconds; Default: 0 microseconds)
◆
Fragmentation Thresh. — Sets the maximum frame size above which packets
are fragmented. This reduces the time required to transmit the frame, and
therefore reduces the probability that it will be corrupted (at the cost of more
data overhead). (Range: 256‐2346 bytes; Default: 2346 bytes)
◆
RTS Threshold — Sets the packet size threshold at which a Request to Send
(RTS) signal must be sent to a receiving station prior to the sending station
starting communications. The access point sends RTS frames to a receiving
station to negotiate the sending of a data frame. After receiving an RTS frame,
the station sends a CTS (clear to send) frame to notify the sending station that it
can start sending data.
If the RTS threshold is set to 1, the access point always sends RTS signals. If set to
2346, the access point never sends RTS signals. If set to any other value, and the
packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send /
Clear to Send) mechanism will be enabled.
The access points contending for the medium may not be aware of each other. The
RTS/CTS mechanism can solve this “Hidden Node Problem.” (Range: 1‐2346 bytes:
Default: 2346 bytes)
◆
SGI — The 802.11n draft specifies two guard intervals: 400ns (short) and 800ns
(long). Support of the 400ns Short Guard Interval is optional for transmit and
receive. The purpose of a guard interval is to introduce immunity to
propagation delays, echoes, and reflections to which digital data is normally
very sensitive. Enabling the SGI sets it to 400ns. (Default: Disabled)
– 49 –
Chapter 4 | Wireless Settings
VLAN Settings
◆
STBC — Space‐time Block Coding sends multiple copies of the same data over
a number of antennas, using the various received versions to improve the
reliability of data transfer. The transmitted signal may traverse a difficult
environment with scattering, reflection, and refraction which may then be
further corrupted by thermal noise in the receiver, so some of the received
copies will be better than others. This redundancy results in a higher chance of
being able to use one or more of the received copies to correctly decode the
received signal. (Default: Disabled)
◆
AMPDU — Enables or disables the use of Aggregated MAC Protocol Data Units.
Physical layer (PHY) data rate improvements do not increase real throughput
beyond a point because of 802.11 protocol overheads. The main media access
control feature that provides a performance improvement is aggregation.
Aggregation of MAC protocol data units (MPDUs) is referred to as MPDU
aggregation or (A‐MPDU). (Default: Enabled)
VLAN Settings
VLANs (virtual local area networks) are turned off by default. If turned on they will
automatically tag any packets passed to the LAN port from the relevant VAP (virtual
access point).
The access point can employ VLAN tagging to control access to network resources
and increase security. VLANs separate traffic passing between the access point,
associated clients, and the wired network. You can configure a VLAN for up to 13
VAP interfaces.
Note the following points about the access point’s VLAN support:
◆
If an Ethernet LAN port on the access point is assigned a VLAN ID, any traffic
entering that port must be also tagged with the same VLAN ID.
◆
A management VLAN can be used for managing the access point through
remote management tools, such as the web interface, SSH, Telnet or SNMP.
The access point can be configured to only accept management traffic that is
tagged with the specified management VLAN ID. This ID must be assigned to
the Ethernet ports or radio interfaces which are designated to handle
management traffic.
◆
Wireless clients associated to the access point can be assigned to a VLAN.
Wireless clients are assigned to the VLAN for the VAP interface with which they
are associated. The access point only allows traffic tagged with correct VLAN
IDs to be forwarded to associated clients on each VAP interface.
◆
When VLAN support is enabled on the access point, traffic passed to the wired
network is tagged with the appropriate VLAN ID. When an Ethernet port on the
access point is configured as a VLAN member, traffic received from the wired
– 50 –
Chapter 4 | Wireless Settings
VLAN Settings
network must also be tagged with the same VLAN ID. Received traffic that has an
unknown VLAN ID or no VLAN tag is dropped.
◆
When VLAN support is disabled, the access point does not tag traffic passed to
the wired network and ignores the VLAN tags on any received frames.
Note: Before enabling VLAN tagging on the access point, be sure to configure the
attached network switch port to support tagged VLAN frames for the VLAN IDs
configured on the access point. Otherwise, connectivity to the access point will be
lost when you enable the VLAN feature.
Figure 31: Configuring VLANs
The following items are displayed on this page:
◆
VLAN ID — A VLAN identifier to be assigned. (Range: 3‐4095)
(VLAN 1 and 2 are reserved for internal use.)
◆
Ports — The Ethernet ports assigned to the specified VLAN.
◆
SSIDs — The SSID of a VAP configured to be a member of the specified VLAN.
This option is configured under Radio Settings (Network Settings – Network
Behavior).
– 51 –
5
SystemSettings
This chapter describes maintenance settings on the access point. It includes the
following sections:
◆
“System Settings” on page 53
◆
“Maintenance” on page 54
◆
“User Accounts” on page 57
◆
“Services” on page 57
– 52 –
Chapter 5 | System Settings
System Settings
System Settings
The System Settings page is used to configure general descriptive information
about the access point, such as the system identification name, its geographic
coordinates, and local time.
Figure 32: System Settings
The following items are displayed on this page:
◆
Device Name — An alias for the AP, enabling the device to be uniquely
identified on the network. (Default: none; Range: 0‐50 characters)
◆
Device Latitude — The geographic latitude of the access point, given in
degrees and minutes. (Range: ‐90 to +90 degrees)
◆
Device Longitude — The geographic longitude of the access point, given in
degrees and minutes. (Range: ‐180 to +180 degrees)
◆
Enable reset button — Enables or disables the hardware reset button.
◆
Local Time — The local time, given as day of week, month, time, year.
◆
Configure Network Time — Links to the Network Time (NTP) section on the
Services page.
– 53 –
Chapter 5 | System Settings
Maintenance
Maintenance
The Maintenance page supports general maintenance tasks including displaying
the system log, rebooting the device, restoring factory defaults, backing up or
restoring configuration settings, and upgrading firmware.
Figure 33: Maintenance
Displaying The access point saves event and error messages to a local system log database.
System Logs The log messages include the date and time, device name, message type, and
message details.
Figure 34: System Log
– 54 –
Chapter 5 | System Settings
Maintenance
Rebooting the The Reboot page allows you to reboot the access point.
Access Point
Figure 35: Rebooting the Access Point
Resetting the The Reset page allows you to reset the access point to the factory defaults. Note
Access Point that all user configured information will be lost. You will have to re‐enter the
default user name and password to re‐gain management access to this device.
Figure 36: Resetting to Defaults
Note: It is also possible to reboot or reset the access point by inserting a pin in the
pin hole labeled “RESET” on the connector panel of the access point and:
◆
◆
press 2 seconds to reboot the access point;
press 10 seconds to reset the access point to the factory defaults.
– 55 –
Chapter 5 | System Settings
Maintenance
Backing Up The Backup function allows you to back up the access point’s configuration to a
Configuration management workstation. In Windows, a GNU Zip (*.tar.gz) file will be stored in the
Settings Downloads folder. This is a sample file name: backup‐ACN‐AP‐2014‐06‐27.tar.gz
Restoring The Restore page allows you to upload configuration settings from a management
Configuration workstation. The specified file must be one that was previously backed up from the
Settings access point.
Figure 37: Restoring Configuration Settings
Upgrading Firmware You can upgrade new access point software from a local file on the management
workstation. New software may be provided periodically from your distributor.
After upgrading new software, you must reboot the access point to implement the
new code. Until a reboot occurs, the access point will continue to run the software
it was using before the upgrade started. The access point supports dual software
images, so if newly loaded software is corrupted, the alternate image will be used
on the next reboot. Configuration settings are stored separately from the software,
so the current settings will always be used for any new software. However, note
that if the current configurtion settings are corrupted, the system defaults will be
used.
Figure 38: Upgrading Firmware
– 56 –
Chapter 5 | System Settings
User Accounts
User Accounts
The User Accounts page allows you to control management access to the switch
based on manually configured user names and passwords.
Figure 39: User Accounts
The following items are displayed on this page:
◆
Username — The name of the user. (Range: 3‐15 ASCII characters, no special
characters)
◆
Password — The user password. (Range: 3‐15 ASCII characters, case sensitive,
no special characters)
Services
The Services page allows you to control remote management access to the switch
and to configure of NTP time servers.
Remote Management The SSH, Telnet, Web, and SNMP management interfaces are enabled and open to
Settings access from the Internet. To provide more security, specific services can be disabled
and management access prevented from the Internet.
SSH The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol
uses generated public keys to encrypt all data transfers passing between the access
point and SSH‐enabled management station clients and ensures that data traveling
over the network arrives unaltered. Clients can then securely use the local user
name and password for access authentication.
Note that SSH client software needs to be installed on the management station to
access the access point for management via the SSH protocol.
– 57 –
Chapter 5 | System Settings
Services
Figure 40: SSH Server Settings
The following items are displayed on this page:
◆
SSH Server — Enables or disables SSH access to the access point.
(Default: Enabled)
◆
Port — Sets the TCP port number for the SSH server on the access point.
(Range: 1‐65535; Default: 22)
◆
Allow SSH from WAN — Allows SSH management access from the WAN.
Telnet Telnet is a remote management tool that can be used to configure the access point
from anywhere in the network. However, note that Telnet is not secure from hostile
attacks.
Figure 41: Telnet Server Settings
The following items are displayed on this page:
◆
Telnet Server — Enables or disables Telnet access to the access point.
(Default: Enabled)
◆
Port — Sets the TCP port number for the Telnet server on the access point.
(Range: 1‐65535; Default: 23)
◆
Allow Telnet from WAN — Allows Telnet management access from the WAN.
Web server A Web browser provides the primary method of managing the access point. Both
HTTP and HTTPS service can be accessed independently. If you enable HTTPS, you
must indicate this in the URL: https://device:port_number]
When you start HTTPS, the connection is established in this way:
– 58 –
Chapter 5 | System Settings
Services
◆
The client authenticates the server using the server’s digital certificate.
◆
The client and server negotiate a set of security protocols to use for the
connection.
◆
The client and server generate session keys for encrypting and decrypting data.
◆
The client and server establish a secure encrypted connection.
◆
A padlock icon should appear in the status bar for most browsers.
Figure 42: Web Server Settings
The following items are displayed on this page:
◆
HTTP Port — The TCP port to be used by the HTTP Web browser interface.
(Range: 1‐65535; Default: 80)
◆
Allow HTTP from WAN — Allows HTTP management access from the WAN.
◆
HTTPS Port — The TCP port to be used by the HTTPS Web browser interface.
(Range: 1‐65535; Default: 443)
◆
Allow HTTPS from WAN — Allows HTTPS management access from the WAN.
Network Time Network Time Protocol (NTP) allows the access point to set its internal clock based
on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time
on the access point enables the system log to record meaningful dates and times
for event entries. If the clock is not set, the access point will only record the time
from the factory default set at the last bootup.
The access point acts as an NTP client, periodically sending time synchronization
requests to specified time servers. The access point will attempt to poll each server
in the configured sequence.
– 59 –
Chapter 5 | System Settings
Services
Figure 43: NTP Settings
The following items are displayed on this page:
◆
Local Time — Displays the local time as day of week, month,
hour:minute:second, year, based on Universal Time Coordinates.
◆
NTP Service — Enables or disables sending of requests for time updates.
(Default: Enabled)
◆
NTP Servers — Sets the host names for time servers. The switch attempts to
update the time from the first server, if this fails it attempts an update from the
next server in the sequence. To configure additional servers, click the “+”
button to open a new edit field.
◆
Time Zone — To display a time corresponding to your local time, choose one
of the predefined time zones from the scroll‐down list.
SNMP Simple Network Management Protocol (SNMP) is a communication protocol
designed specifically for managing devices on a network. It is typically used to
configure these devices for proper operation in a network environment, as well as
to monitor them to evaluate performance or detect potential problems.
Figure 44: SNMP Settings
The following items are displayed on this page:
◆
SNMP Server — Enables or disables SNMP on the access point.
(Default: Enabled)
– 60 –
Chapter 5 | System Settings
Services
◆
Contact — Administrator responsible for the access point.
◆
Community String — A community string that acts like a password and
permits access to the SNMP protocol. (Range: 1‐32 characters, case sensitive;
Default: public)
The default string “public” provides read‐only access to the access point’s
Management Information (MIB) database.
◆
Allow SNMP from WAN — Allows SNMP management access from the WAN.
– 61 –
Section III
Appendices
This section provides additional information and includes these items:
◆
“Troubleshooting” on page 62
– 61 –
A
Troubleshooting
Problems Accessing the Management Interface
Table 5: Troubleshooting Chart
Symptom
Action
Cannot connect using
Telnet, web browser, or
SNMP software
◆
◆
◆
◆
◆
◆
◆
Forgot or lost the password
◆
Be sure the AP is powered up.
Check network cabling between the management station and the
AP.
Check that you have a valid network connection to the AP and
that intermediate switch ports have not been disabled.
Be sure you have configured the AP with a valid IP address, subnet
mask and default gateway.
Be sure the management station has an IP address in the same
subnet as the AP’s IP.
If you are trying to connect to the AP using a tagged VLAN group,
your management station, and the ports connecting intermediate
switches in the network, must be configured with the appropriate
tag.
If you cannot connect using Telnet, you may have exceeded the
maximum number of concurrent Telnet/SSH sessions permitted.
Try connecting again at a later time.
Reset the AP to factory defaults using its Reset button.
Using System Logs
If a fault does occur, refer to the Quick Start Guide to ensure that the problem you
encountered is actually caused by the AP. If the problem appears to be caused by
the AP, follow these steps:
1. Enable SNMP in the System > Servcies menu.
2. Enable SNMP access from the WAN when connecting from a remote location.
3. Repeat the sequence of commands or other actions that lead up to the error.
4. Make a list of the commands or circumstances that led to the fault. Also make a
list of any error messages displayed.
5. Record all relevant system settings.
– 62 –
Chapter A | Troubleshooting
Using System Logs
6. Display the log file through the System > Maintenance menu, and copy the
information from the log file.
7. Contact your distributor’s service engineer, and send a detailed description of
the problem, along with all of the information mentioned in the above steps.
– 63 –
– 64 –
Quick Start Guide
Follow the steps in this guide to install the AP in your network.
Caution: The planning and installation of the AP requires professional personnel
that are trained in the installation of radio transmitting equipment. The user is
responsible for compliance with local regulations concerning items such as
antenna power, use of lightning arrestors, grounding, and radio mast or tower
construction. Therefore, it is recommended to consult a professional contractor
knowledgeable in local radio regulations prior to equipment installation.
1. Unpack the AP Unpack the AP and check the package contents.
◆
Outdoor Stand‐Alone Access Point
SkyFire AC866
◆
Pole‐mounting kit — includes two steel‐band clamps
◆
PoE power injector with power cord — either US, Continental Europe or UK
◆
Documentation —Quick Start Guide and Regulatory and Safety Information
2. Mount the AP After planning your installation, mount the unit on a pole, mast, or tower using the
included two steel‐band clamps.
Also, for models that require external antennas, install the antennas near the AP
and attach the RF coaxial cables to the appropriate connectors on the AP.
Pole Mounting
– 2 –
Feed the steel‐band clamps through the
integrated pole‐mount bracket points on
the back of the AP.
Fasten the steel‐band clamps around the
pole to secure the AP to the pole.
Quick Start Guide
Attach External Antennas
Remove the front port cover by
pushing the locking tab up and then
sliding the cover off.
Connect external antennas to the
AP’s 5 GHz RP‐SMA connectors using
RF coaxial cable provided in the
antenna package.
Connect external antennas to the
AP’s 2.4 GHz RP‐SMA connectors
using RF coaxial cable provided in the
antenna package.
Note: The number of available 2.4 GHz or 5 GHz external antenna connectors
depends on the specific model.
3. Connect Cables Connect outdoor‐rated Ethernet cable to the 1000BASE‐T RJ‐45 ETH0 (PoE) port on
the unit.
Connect outdoor‐rated Category 5e
or better cable to the left‐side RJ‐45
ETH0 (PoE) port.
(Optional) Connect a local LAN
switch or computer to the right‐side
ETH1 100BASE‐TX RJ‐45 port.
Pass the cables through the access
holes at the bottom of the AP.
Replace the port cover on the AP and
push the locking tab down to secure
it in place.
4. Connect Power Install the PoE power injector indoors. Connect the power injector to the Ethernet
cable from the AP, to a port on a local LAN switch, and then to an AC power source.
Caution: The power injector module is designed for indoor use only. Never mount
the power injector outside with the AP unit.
– 3 –
Quick Start Guide
Connect the Ethernet cable from the AP to
the “POE” port on the power injector.
Connect Ethernet cable from the “LAN” port
on the power injector to a LAN switch.
Connect the power cord to a nearby AC
power source (100‐240 VAC, 50/60 Hz).
Note: Connecting the Ethernet cable from the AP to the injector module powers
on the unit.
5. Verify AP Operation Verify basic AP operation by checking the system LEDs.
The power LED should be on green, the ETH0 port LED on/blinking green, and the
5GHz wireless LED /blue (5 GHz).
5GHz signal strength LEDs.
5GHz link/activity LED. ETH1
port link/activity LED. ETH0 (PoE)
port link/activity LED.
– 4 –
Power LED.
Quick Start Guide
6. Connect to the Web The stand‐alone APs offer a web‐based management interface for the
User Interface configuration of all the unit’s features.
You can make initial configuration changes by connecting a PC directly to the AP’s
ETH1 RJ‐45 port. The AP has a default management IP address of 192.168.2.1 and a
subnet mask of 255.255.255.0. You must set your PC IP address to be on the same
subnet as the AP (that is, the PC and AP addresses must both start 192.168.2.x).
Log in to the web interface using the default settings:
◆
Login Name — root
◆
Password — admin123
For more information on stand‐alone AP configuration using the web interface,
refer to the Management Guide.
– 5 –
Quick Start Guide
Hardware Specifications
Item
Specification
Chassis
Size (H x W x D:)
283 x 94 x 50 mm (11.14 x 3.7 x 1.97 inches)
Weight
762 g (1.68 lb)
Temperature
Operating: ‐20 °C to 65 °C (‐4 °F to 149 °F)
Storage: ‐30 °C to 80 °C (‐22 °F to 176 °F)
Humidity
Operating: 15% to 95% (non‐condensing)
Waterproof/Dustproof
IP55
Network Interfaces
Ports
ETH0 (PoE) RJ‐45 Port: 1000BASE‐T, passive PoE
ETH1 RJ‐45 Port: 100BASE‐TX
2.4 GHz Radio
IEEE 802.11b/g/n
5 GHz Radio
IEEE 802.11a/n/ac
Radio Frequencies
5745 ~ 5825 MHz (China)
5180 ~ 5240 MHz (NCC)
5260 ~ 5230 MHz (NCC)
5745 ~ 5825 MHz (NCC)
Power Supply
PoE Input Power
24 VDC, 1.0 A
Power Consumption
24 W maximum
Power Injector Module
100‐240 VAC, 50‐60 Hz, auto‐sensing
Regulatory Compliances
Radio
EN 300 328 V1.8.1:2012
EN 301 893 V1.7.1:2012
EN 301 489‐1 V1.9.2 (2011‐09)
EN 301 489‐7 V1.3.1:2005
FCC Part 15E 15.407 (5.150GHz‐5.250GHz)
Emissions
EN 55022 2010+AC:2011
EN 61000‐3‐2 2006+A1:2009+A2:2009
FCC Class B Part 15
Immunity
EN 55024 : 2010
EN 61000‐4‐2 : 2009
– 6 –
Quick Start Guide
Federal Communication Commission Interference Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (
1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15
of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the equipment off and on,
the user is encouraged to try to correct the interference by one of the following measures:
‐
‐
‐
‐
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void
the user's authority to operate this equipment.
This transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter.
For operation within 5.15 ~ 5.25GHz / 5.47 ~5.725GHz frequency range, it is restricted to indoor environment.
The band from 5600‐5650MHz will be disabled by the software during the manufacturing and cannot be changed
by the end user. This device meets all the other requirements specified in Part 15E, Section 15.407 of the FCC Rules.
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Note: The country code selection is for non‐US model only and is not available to all US model.
Per FCC regulation, all WiFi product marketed in US must fixed to US operation channels only.
– 7 –
Quick Start Guide
Professional installation instruction
1. Installation personal
This product is designed for specific application and needs to be installed by a qualified personal who has RF and
related rule knowledge. The general user shall not attempt to install or change the setting.
2. Installation location
The product shall be installed at a location where the radiating antenna can be kept 20cm from nearby person in
normal operation condition to meet regulatory RF exposure requirement.
3. External antenna
Use only the antennas which have been approved by the applicant. The non‐approved antenna(s) may produce
unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC limit and is prohibited.
4. Installation procedure
Please refer to user’s manual for the detail.
5. Warning
Please carefully select the installation position and make sure that the final output power does not exceed the
limit set force in relevant rules. The violation of the rule could lead to serious federal penalty.
professional installer: 5.15‐5.25G band (UNII band 1) is certified to indoor use only. Installer must disable UNII band 1 by provided proprietary tool
when you install this device for outdoor application to comply with FCC requirement.
低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、
加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,
並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電機須忍受合法通信或工業、
科學及醫療用電波輻射性電機設備之干擾。
此器材須經專業安裝並限用於固定式點對點操作。
本器材須經專業工程人員安裝及設定,始得設置使用,且不得直接販售給一般消費者。
「電磁波曝露量MPE標準值1mW/cm2,送測產品實測值為 0.682 mW/cm2」
– 8 –

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract
XMP Toolkit                     : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39
Producer                        : Acrobat Distiller 7.0 (Windows)
Create Date                     : 2015:05:06 14:38:28+08:00
Creator Tool                    : PScript5.dll Version 5.2
Modify Date                     : 2015:05:06 16:35:08+08:00
Metadata Date                   : 2015:05:06 16:35:08+08:00
Format                          : application/pdf
Title                           : Microsoft Word - SF-AC866 FCC Manual_20150506
Creator                         : tting
Document ID                     : uuid:64056f61-5760-43d3-bc6f-baf5fbd62764
Instance ID                     : uuid:c0bffecd-1f3a-4d61-9cfc-e30471100f88
Page Count                      : 63
Author                          : tting
EXIF Metadata provided by EXIF.tools
FCC ID Filing: HEDAC866

Navigation menu