Edimax Technology Co 9574761413 AC1200 Dual Band Concurrent Ceiling-Mount Access Point User Manual

Edimax Technology Co Ltd AC1200 Dual Band Concurrent Ceiling-Mount Access Point

user manual

AC1200WirelessLAN11acDual‐BandConcurrentCeilingMountAccessPointUser’s ManualEW‐7679WAUserManual05‐2014/v1.0Version: 1.0 (October, 2014)
CONTENTSI.ProductInformation...............................................................................2I‐1.PackageContents..................................................................................................................2I‐2.SystemRequirements............................................................................................................2I.I‐3.HardwareOverview..........................................................................3I‐4.LEDStatus..............................................................................................................................4I‐5.Reset......................................................................................................................................5I‐6.SafetyInformation.................................................................................................................6II.QuickSetup............................................................................................7II‐1.InitialSetup............................................................................................................................7II‐2.BasicSettings.........................................................................................................................9III.HardwareInstallation...........................................................................13III‐1.ConnectingtheaccesspointtoarouterorPoEswitch.....................................................13III‐2.Mountingtheaccesspointtoaceiling..............................................................................14III‐3.T‐RailMount......................................................................................................................17IV.BrowserBasedConfigurationInterface.................................................19IV‐1.Information........................................................................................................................22IV‐1‐1.SystemInformation...........................................................................................................22IV‐1‐2.WirelessClients..................................................................................................................26IV‐1‐3.WirelessMonitor...............................................................................................................28IV‐1‐4.Log......................................................................................................................................30IV‐2.NetworkSettings...............................................................................................................32IV‐2‐1.LAN‐SideIPAddress...........................................................................................................32IV‐2‐2.LANPort.............................................................................................................................34IV‐2‐3.VLAN..................................................................................................................................35IV‐3.WirelessSettings................................................................................................................36IV‐3‐1.2.4GHz11bgn.....................................................................................................................36IV‐3‐1‐1.Basic.............................................................................................................................37IV‐3‐1‐2.Advanced.....................................................................................................................40IV‐3‐1‐3.Security........................................................................................................................42IV‐3‐1‐3‐1.NoAuthentication.....................................................................................................43IV‐3‐1‐3‐2.WEP............................................................................................................................44IV‐3‐1‐3‐3.IEEE802.1x/EAP..........................................................................................................44IV‐3‐1‐3‐4.WPA‐PSK....................................................................................................................44IV‐3‐1‐3‐5.WPA‐EAP....................................................................................................................45IV‐3‐1‐3‐6.AdditionalAuthentication.........................................................................................45
IV‐3‐1‐4.WDS.............................................................................................................................47IV‐3‐2.5GHz11ac11an.................................................................................................................49IV‐3‐2‐1.Basic.............................................................................................................................49IV‐3‐2‐2.Advanced.....................................................................................................................52IV‐3‐2‐3.Security........................................................................................................................54IV‐3‐2‐4.WDS.............................................................................................................................56IV‐3‐3.WPS......................................................................................................................................58IV‐3‐4.RADIUS.................................................................................................................................60IV‐3‐4‐1.RADIUSSettings...........................................................................................................61IV‐3‐4‐2.InternalServer.............................................................................................................63IV‐3‐4‐3.RADIUSAccounts.........................................................................................................65IV‐3‐5.MACFilter..........................................................................................................................67IV‐3‐6.WMM...................................................................................................................................69IV‐4.Management.....................................................................................................................71IV‐4‐1.Admin.................................................................................................................................71IV‐4‐2.DateandTime....................................................................................................................74IV‐4‐3.SyslogServer......................................................................................................................76IV‐4‐4.I’mHere.............................................................................................................................77IV‐5.Advanced...........................................................................................................................78IV‐5‐1.LEDSettings.......................................................................................................................78IV‐5‐2.UpdateFirmware...............................................................................................................79IV‐5‐3.Save/RestoreSettings........................................................................................................80IV‐5‐4.FactoryDefault..................................................................................................................82IV‐5‐5.Reboot................................................................................................................................83V.Appendix..............................................................................................84V‐1.ConfiguringyourIPaddress...............................................................................................84V‐1‐1.WindowsXP.......................................................................................................................85V‐1‐2.WindowsVista...................................................................................................................87V‐1‐3.Windows7.........................................................................................................................89V‐1‐4.Windows8.........................................................................................................................93V‐1‐5.Mac....................................................................................................................................97V‐1‐6.Glossary................................................................................................................................99V‐2.HardwareSpecification....................................................................................................102V‐3.ENVIRONMENT&PHYSICAL............................................................................................102
2I. ProductInformationI‐1.PackageContents1. AccessPoint2. CeilingMountBracket3. T‐RailMountingKit&Screws4. QuickInstallationGuide5. PowerAdapterI‐2.SystemRequirements‐ Existingcable/DSLmodem&router‐ Computerwithwebbrowserforaccesspointconfiguration45213
3I. I‐3.HardwareOverviewEthernetPortPower Jack(DCIN)
4I‐4.LEDStatusLEDColorLEDStatusDescriptionBlueOnTheaccesspointisstartingup.PurpleOnTheaccesspointison.AmberFlashingError.OffOffTheaccesspointisoff.
5I‐5.ResetIfyouexperienceproblemswithyouraccesspoint,youcanresetthedevicebacktoitsfactorysettings.Thisresetsallsettingsbacktodefault.1. Pressandholdtheresetbuttonontheaccesspointforatleast10secondsthenreleasethebutton.Youmayneedtouseapinorsimilarsharpobjecttopushtheresetbutton.2. Waitfortheaccesspointtorestart.TheaccesspointisreadyforsetupwhentheLEDisPurple.
6I‐6.SafetyInformationInordertoensurethesafeoperationofthedeviceanditsusers,pleasereadandactinaccordancewiththefollowingsafetyinstructions.1.Theaccesspointisdesignedforindooruseonly;donotplacetheaccesspointoutdoors.2.Donotplacetheaccesspointinornearhot/humidplaces,suchasakitchenorbathroom.3.Donotpullanyconnectedcablewithforce;carefullydisconnectitfromtheaccesspoint.4.Handletheaccesspointwithcare.Accidentaldamagewillvoidthewarrantyoftheaccesspoint.5.Thedevicecontainssmallpartswhichareadangertosmallchildrenunder3yearsold.Pleasekeeptheaccesspointoutofreachofchildren.6.Donotplacetheaccesspointonpaper,cloth,orotherflammablematerials.Theaccesspointmaybecomehotduringuse.7.Therearenouser‐serviceablepartsinsidetheaccesspoint.Ifyouexperienceproblemswiththeaccesspoint,pleasecontactyourdealerofpurchaseandaskforhelp.8.Theaccesspointisanelectricaldeviceandassuch,ifitbecomeswetforanyreason,donotattempttotouchitwithoutswitchingthepowersupplyoff.Contactanexperiencedelectricaltechnicianforfurtherhelp.9.Ifyousmellburningorseesmokecomingfromtheaccesspointorpoweradapter,thendisconnecttheaccesspointandpoweradapterimmediately,asfarasitissafelypossibletodoso.Callyourdealerofpurchaseforhelp.
7II. QuickSetupYouraccesspointcanbeupandrunninginjustafewminutes.Thisquickinstallationguidewillhelptosetupyouraccesspointandconfigureitsbasicsettings.Pleasefollowtheinstructionsinthechaptersbelow:II‐1.InitialSetup1. ConnecttheaccesspointtoacomputerviaEthernetcable.2. Connectthepoweradaptertotheaccesspoint’s12VDCportandplugthepoweradapterintoapowersupplyusingtheincludedcable.3. Pleasewaitamomentfortheaccesspointtostartup.TheaccesspointisreadywhentheLEDisPurple.4. Setyourcomputer’sIPaddressto192.168.2.xwherexisanumberintherange3–100.Ifyouareunsurehowtodothis,pleaserefertotheusermanualformoreinformation.Pleaseensuretherearenootheractivenetworkconnectionsonyourcomputer(disconnectWi‐FiconnectionsandEthernetcables).5. Entertheaccesspoint’sdefaultIPaddress192.168.2.1intotheURLbarofawebbrowser.
86. Youwillbepromptedforausernameandpassword.Enterthedefaultusername“admin”andthedefaultpassword“admin”.7. Youwillarrivethe“SystemInformation”screenshownbelow.8. Next,pleasefollowtheinstructionsbelowinII‐2.BasicSettingstoconfiguretheaccesspoint’sbasicsettings.Formoreadvancedconfigurations,pleaserefertoIV.BrowserBasedConfigurationInterface.
9II‐2.BasicSettingsTheinstructionsbelowwillhelpyoutoconfigurethefollowingbasicsettingsoftheaccesspoint:‐ LANIPAddress‐ 2.4GHz&5GHzSSID&Security‐ AdministratorName&Password‐ Time&DateItisrecommendedyouconfigurethesesettingsbeforeusingtheaccesspoint.1. Tochangetheaccesspoint’sLANIPaddress,goto“NetworkSettings”>“LAN‐sideIPAddress”andyouwillseethescreenbelow.2. EntertheIPaddresssettingsyouwishtouseforyouraccesspoint.Youcanuseadynamic(DHCP)orstaticIPaddress,dependingonyournetworkenvironment.Click“Apply”tosavethechangesandwaitafewmomentsfortheaccesspointtoreload.Whenyouchangeyouraccesspoint’sIPaddress,youneedtousethenewIPaddresstoaccessthebrowserbasedconfigurationinterfaceinsteadofthedefaultIP192.168.2.1.3. TochangetheSSIDofyouraccesspoint’s2.4GHzwirelessnetwork(s),goto“WirelessSetting”>“2.4GHz11bgn”>“Basic”.EnterthenewSSIDforyour2.4GHzwirelessnetworkinthe“SSID1”fieldandclick“Apply”.
10Toutilizemultiple2.4GHzSSIDs,openthedropdownmenulabelled“EnableSSIDnumber”andselecthowmanySSIDsyourequire.ThenenteranewSSIDinthecorrespondingnumberedfieldsbelow,beforeclicking“Apply”.4. Toconfigurethesecurityofyouraccesspoint’s2.4GHzwirelessnetwork(s),goto“WirelessSetting”>“2.4GHz11bgn”>“Security”.Selectan“AuthenticationMethod”andentera“Pre‐sharedKey”or“EncryptionKey”dependingonyourchoice,thenclick“Apply”.IfusingmultipleSSIDs,specifywhichSSIDtoconfigureusingthe“SSID”dropdownmenu.5. Goto“WirelessSetting”>“5GHz11ac11an”andrepeatsteps3&4fortheaccesspoint’s5GHzwirelessnetwork.6. Tochangetheadministratornameandpasswordforthebrowserbasedconfigurationinterface,goto“Management”>“Admin”.
117. Completethe“AdministratorName”and“AdministratorPassword”fieldsandclick“Apply”.8. Tosetthecorrecttimeforyouraccesspoint,goto“Management”>“DateandTime”.9. Setthecorrecttimeandtimezoneforyouraccesspointusingthedropdownmenus.TheaccesspointalsosupportsNTP(NetworkTimeProtocol)soalternativelyyoucanenterthehostnameorIPaddressofatimeserver.Click“Apply”whenyouarefinished.Youcanusethe“AcquireCurrentTimefromyourPC”buttonifyouwishtosettheaccesspointtothesametimeasyourPC.
1210. Thebasicsettingsofyouraccesspointarenowconfigured.PleaserefertoIII.HardwareInstallationforguidanceonconnectingyouraccesspointtoarouterorPoEswitch.
13III. HardwareInstallationIII‐1. ConnectingtheaccesspointtoarouterorPoEswitch1. Ifyouneedto,removethecapfromtheundersideoftheaccesspoint.Thiscreatesextraspaceforyourcablestopassthrough.2. ConnectarouterorPoEswitchtotheaccesspoint’sLANportusinganEthernetcable.3. Ifyouareusingarouter,thenconnectthepoweradaptertotheaccesspoint’s12VDCportandplugthepoweradapterintoapowersupply.DonotusethepoweradapterifyouareusingaPoEswitch.
14III‐2. MountingtheaccesspointtoaceilingTomounttheaccesspointtoaceiling,pleasefollowtheinstructionsbelowandrefertodiagramA&B.ForWoodenCeilings(refertodiagramA):1. Placetheceilingmountbrackettoaceilinginyourdesiredlocationandinsertscrewiiithroughholei(x2)andtightentofixthebracketinplace.2. Whentheceilingbracketisinplace,insetscrewivintoholev(x2)ontheaccesspoint.3. Fixtheaccesspointtotheceilingbracketbyinsertingtheattachedscrewsivintoholeviandtwistingtheaccesspoint.4. Locktheaccesspointfirmlyintoplacewhenbytwistingittoalignscrewsivwiththegroovesintheceilingmount.ForOtherCeilings(refertodiagramB):1. PlacetheceilingmountbrackettoaceilinginyourdesiredlocationandInsertscrewiithroughholei(x2)andtightentofixthebracketinplace,asshowninA.2. Insertscrewiiithroughholeiandintotherearofscrewiiandtightentoprovideadditionalstrength.3. Whentheceilingbracketisinplace,insertscrewivintoholev(x2)ontheaccesspoint.4. Fixtheaccesspointtotheceilingbracketbyinsertingtheattachedscrewsivintoholeviandtwistingtheaccesspoint.5. Locktheaccesspointfirmlyintoplacebytwistingittoalignscrewsivwiththegroovesintheceilingmount.
15Aiiiiii
16B
17III‐3. T‐RailMountTomounttheaccesspointtoaT‐Rail,pleasefollowtheinstructionsbelowandrefertodiagramC,D&E.1. SelectthecorrectsizeT‐Railbracketfromthetwosizeswhichareincludedinthepackagecontents.2. AttachtheT‐Railbracketitoholeiiusingscrewiii(x2)asshowninC.IfyouneedmorespacebetweentheaccesspointandtheT‐Rail,thenadditionallyusebracketivbetweenbracketiandholeii(x2),andusethelongerscrews(x2)includedinthepackagecontents.3. CliptheaccesspointontoyourT‐RailusingthenowattachedT‐Railbracket.C
18DE
19IV. BrowserBasedConfigurationInterfaceThebrowser‐basedconfigurationinterfaceenablesyoutoconfiguretheaccesspoint’sadvancedfeatures.ThedevicefeaturesarangeofadvancedfunctionssuchasMACfiltering,MACRADIUSauthentication,VLANconfigurations,upto32SSIDsandmanymore.Toaccessthebrowserbasedconfigurationinterface:1. ConnectacomputertoyouraccesspointusinganEthernetcable.2. Enteryouraccesspoint’sIPaddressintheURLbarofawebbrowser.Theaccesspoint’sdefaultIPaddressis192.168.2.1.3. Youwillbepromptedforausernameandpassword.Thedefaultusernameis“admin”andthedefaultpasswordis“1234”,thoughitwasrecommendedthatyouchangethepasswordduringsetup(seeII‐2.BasicSettings).Ifyoucannotrememberyourpassword,resettheaccesspointbacktoitsfactorydefaultsettings.RefertoI‐5.Reset4. Youwillarriveatthe“SystemInformation”screenshownbelow.
205. Usethemenuacrossthetopanddowntheleftsidetonavigate.
216. Click“Apply”tosavechangesandreloadtheaccesspoint,or“Cancel”tocancelchanges.Pleasewaitafewsecondsfortheaccesspointtoreloadafteryou“Apply”changes,asshownbelow.7. Pleaserefertothefollowingchaptersforfulldescriptionsofthebrowserbasedconfigurationinterfacefeatures.
22IV‐1. InformationScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐1‐1. SystemInformationThe“SystemInformation”pagedisplaysbasicsysteminformationabouttheaccesspoint.
23
24SystemModelDisplaysthemodelnumberoftheaccesspoint.ProductNameDisplaystheproductnameforreference,whichconsistsof“AP”plustheMACaddress.UptimeDisplaysthetotaltimesincethedevicewasturnedon.BootFromDisplaysinformationforthebootedhardware.VersionDisplays the firmware version.MACAddressDisplays the accesspoint’sMACaddress.ManagementVLANIDDisplaysthemanagementVLANID.IPAddressDisplaystheIPaddressofthisdevice.Click“Refresh”toupdatethisvalue.DefaultGatewayDisplaystheIPaddressofthedefaultgateway.DNSIPaddressofDNS(DomainNameServer).DHCPServerIPaddressofDHCPServer.WiredLANPortSettingsWiredLANPort SpecifieswhichLANport.StatusDisplaysthestatusoftheLANport(connectedordisconnected).VLANMode/IDDisplaystheVLANmode(taggedoruntagged)andVLANIDfortheLANport.SeeIV‐2‐3.VLANWireless2.4GHz(5GHz)StatusDisplaysthestatusofthe2.4GHzor5GHzwireless(enabledordisabled).MACAddressDisplays the accesspoint’sMACaddress.ChannelDisplaysthechannelnumberthespecifiedwirelessfrequency isusingforbroadcast.TransmitPower Displaysthewirelessradiotransmitpowerlevelasapercentage.
25Wireless2.4GHz (5GHz)/SSIDSSIDDisplays the SSIDname(s)forthespecifiedfrequency.AuthenticationMethodDisplaystheauthenticationmethodforthespecifiedSSID.SeeIV‐3.WirelessSettingsEncryptionType Displays the encryptiontypeforthespecifiedSSID.SeeIV‐3.WirelessSettingsVLANIDDisplaystheVLANIDforthespecifiedSSID.SeeIV‐2‐3.VLANAdditionalAuthenticationDisplaystheadditionalauthenticationtypeforthespecifiedSSID.SeeIV‐3.WirelessSettingsWirelessClientIsolationDisplayswhetherwirelessclientisolationisinuseforthespecifiedSSID.See IV‐2‐3.VLANWireless2.4GHz (5GHz)/WDSStatusMACAddressDisplays the peeraccesspoint’sMACaddress.EncryptionType DisplaystheencryptiontypeforthespecifiedWDS.SeeIV‐3‐1‐4.WDSVLANMode/IDDisplaystheVLANIDforthespecifiedWDS.SeeIV‐3‐1‐4.WDSRefreshClicktorefreshallinformation.
26IV‐1‐2. WirelessClientsThe“WirelessClients”pagedisplaysinformationaboutallwirelessclientsconnectedtotheaccesspointonthe2.4GHzor5GHzfrequency.RefreshtimeAutoRefreshTimeSelectatimeintervalfortheclienttablelisttoautomaticallyrefresh.ManualRefresh Clickrefreshtomanuallyrefreshtheclienttable.2.4GHz(5GHz)WLANClientTableSSIDDisplaystheSSIDwhichtheclientisconnectedto.MACAddressDisplaystheMACaddressoftheclient.TxDisplaysthetotaldatapacketstransmittedbythespecifiedclient.RxDisplaysthetotaldatapacketsreceivedbythespecifiedclient.Signal(%)Displaysthewirelesssignalstrengthforthespecifiedclient.
27ConnectedTime Displaysthetotaltimethewirelessclienthasbeenconnectedtotheaccesspoint.IdleTimeClientidletimeisthetimeforwhichtheclienthasnottransmittedanydatapacketsi.e.isidle.VendorThevendoroftheclient’swirelessadapterisdisplayedhere.
28IV‐1‐3. WirelessMonitorWirelessMonitorisatoolbuiltintotheaccesspointtoscanandmonitorthesurroundingwirelessenvironment.Selectafrequencyandclick“Scan”todisplayalistofallSSIDswithinrangealongwithrelevantdetailsforeachSSID.WirelessMonitorSiteSurveySelectwhichfrequency(orboth)toscan,andclick“Scan”tobegin.ChannelSurveyResultAfterascaniscomplete,click“Export”tosavetheresultstolocalstorage.SiteSurveyResultsChDisplays the channelnumberusedbythespecifiedSSID.SSIDDisplaystheSSIDidentifiedbythescan.MACAddressDisplays the MACaddressofthewirelessrouter/accesspointforthespecifiedSSID.SecurityDisplaystheauthentication/encryptiontypeofthespecifiedSSID.
29Signal(%)DisplaysthecurrentsignalstrengthoftheSSID.TypeDisplaysthe802.11wirelessnetworkingstandard(s)ofthespecifiedSSID.VendorDisplaysthevendorofthewirelessrouter/accesspointforthespecifiedSSID.
30IV‐1‐4. LogThesystemlogdisplayssystemoperationinformationsuchasuptimeandconnectionprocesses.Thisinformationisusefulfornetworkadministrators.Whenthelogisfull,oldentriesareoverwritten.SaveClicktosavethelogasafileonyourlocalcomputer.ClearClearalllogentries.RefreshRefreshthecurrentlog.
31Thefollowinginformation/eventsarerecordedbythelog: WirelessClientConnected&disconnectedKeyexchangesuccess&fail AuthenticationAuthenticationfailorsuccessful. AssociationSuccessorfail WPSM1‐M8messagesWPSsuccess ChangeSettings SystemBootDisplayscurrentmodelname NTPClient WiredLinkLANPortlinkstatusandspeedstatus ProxyARPProxyARPmodulestart&stop BridgeBridgestart&stop. SNMPSNMPserverstart&stop. HTTPHTTPstart&stop. HTTPSHTTPSstart&stop. SSHSSH‐clientserverstart&stop. TelnetTelnet‐clientserverstartorstop. WLAN(2.4G)WLAN(2.4G]channelstatusandcountry/regionstatus WLAN(5G)WLAN(5G)channelstatusandcountry/regionstatus ADT
32IV‐2. NetworkSettingsScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐2‐1. LAN‐SideIPAddressThe“LAN‐sideIPaddress”pageallowsyoutoconfigureyouraccesspointonyourLocalAreaNetwork(LAN).YoucanenabletheaccesspointtodynamicallyreceiveanIPaddressfromyourrouter’sDHCPserveroryoucanspecifyastaticIPaddressforyouraccesspoint,aswellasconfigureDNSservers.Theaccesspoint’sdefaultIPaddressis192.168.2.1.LAN‐sideIPAddressIPAddressAssignmentSelect“DHCPClient”foryouraccesspointtobeassignedadynamicIPaddressfromyourrouter’sDHCPserver,orselect“StaticIP”tomanuallyspecifyastatic/fixedIPaddressforyouraccesspoint(below).IPAddressSpecifytheIPaddresshere.ThisIPaddresswillbeassignedtoyouraccesspointandwill
33replacethedefaultIPaddress.SubnetMaskSpecifyasubnetmask.Thedefaultvalueis255.255.255.0DefaultGatewayForDHCPusers,select“FromDHCP”togetdefaultgatewayfromyourDHCPserveror“User‐Defined”toenteragatewaymanually.ForstaticIPusers,thedefaultvalueisblank.DHCPuserscanselecttogetDNSservers’IPaddressfromDHCPormanuallyenteravalue.ForstaticIPusers,thedefaultvalueisblank.PrimaryAddressDHCPuserscanselect“FromDHCP”togetprimaryDNSserver’sIPaddressfromDHCPor“User‐Defined”tomanuallyenteravalue.ForstaticIPusers,thedefaultvalueisblank.SecondaryAddressUserscanmanuallyenteravaluewhenDNSserver’sprimaryaddressissetto“User‐Defined”.
34IV‐2‐2. LANPortThe“LANPort”pageallowsyoutoconfigurethesettingsforyouraccesspoint’stwowiredLAN(Ethernet)ports.WiredLANPortIdentifiesLANport1.EnableEnable/disableLANport.Speed&DuplexSelectaspeed&duplextypeforLANport,orusethe“Auto”value.LANportscanoperateupto1000Mbpsandfull‐duplexenablessimultaneousdatapackets transfer/receive.FlowControlEnable/disableflowcontrol.Flowcontrolcanpausenewsessionrequestuntilcurrentdataprocessingiscomplete,inordertoavoiddeviceoverloadsunderheavytraffic.802.3azEnable/disable802.3az.802.3azisanEnergyEfficientEthernetfeaturewhichdisablesunusedinterfacestoreducepowerusage.
35IV‐2‐3. VLANThe“VLAN”(VirtualLocalAreaNetwork)enablesyoutoconfigureVLANsettings.AVLANisalocalareanetworkwhichmapsworkstationsvirtuallyinsteadofphysicallyandallowsyoutogrouptogetherorisolateusersfromeachother.VLANIDs1–4094aresupported.VLANIDsintherange1–4094aresupported.VLANInterfaceWiredLANPort/WirelessIdentifiesLANport1and wirelessSSIDs(2.4GHzor5GHz).VLANModeSelect“TaggedPort”or“UntaggedPort”forLANinterface.VLANIDSetaVLANIDforspecifiedinterface,if“UntaggedPort”isselected.ManagementVLANVLANIDSpecifytheVLANIDofthemanagementVLAN.OnlythehostsbelongingtothesameVLANcanmanagethedevice.
36IV‐3. WirelessSettingsScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐3‐1. 2.4GHz11bgnThe“2.4GHz11bgn”menuallowsyoutoviewandconfigureinformationforyouraccesspoint’s2.4GHzwirelessnetworkacrossfourcategories:Basic,Advanced,SecurityandWDS.
37IV‐3‐1‐1.BasicThe“Basic”screendisplaysbasicsettingsforyouraccesspoint’s2.4GHzWi‐Finetwork(s).
38WirelessEnableordisabletheaccesspoint’s2.4GHzwirelessradio.Whendisabled,no2.4GHzSSIDswillbeactive.BandSelectthewirelessstandardusedfortheaccesspoint.Combinationsof802.11b,802.11g&802.11ncanbeselected.EnableSSIDNumberSelecthowmanySSIDstoenableforthe2.4GHzfrequencyfromthedropdownmenu.Amaximumof16canbeenabled.SSID#EntertheSSIDnameforthespecifiedSSID(upto16).TheSSIDcanconsistofanycombinationofupto32alphanumericcharacters.VLANIDSpecifyaVLANIDforeachSSID.AutoChannelEnable/disableautochannelselection.Autochannelselectionwillautomaticallysetthewirelesschannelfortheaccesspoint’s2.4GHzfrequencybasedonavailabilityandpotentialinterference.Whendisabled,selectachannelmanuallyasshowninthenexttable.AutoChannelRangeSelectarangefromwhichtheautochannelsetting(above)willchooseachannel.AutoChannelIntervalSpecifyafrequencyforhowoftentheautochannelsettingwillcheck/reassignthewirelesschannel.Check/uncheckthe“Changechannelevenifclientsareconnected”boxaccordingtoyourpreference.ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),40MHz(higherperformancebutpotentiallyhigherinterference)orAuto(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisaseriesofratestocontrolcommunicationframesforwirelessclients.
39Whenautochannelisdisabled,selectawirelesschannelmanually:Channel Selectawirelesschannelfrom1–11(1‐13).ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),40MHz(higherperformancebutpotentiallyhigherinterference)orAuto(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisaseriesofratestocontrolcommunicationframesforwirelessclients.
40IV‐3‐1‐2.AdvancedThesesettingsareforexperiencedusersonly.Pleasedonotchangeanyofthevaluesonthispageunlessyouarealreadyfamiliarwiththesefunctions.Changingthesesettingscanadverselyaffecttheperformanceofyouraccesspoint.ContentionSlot Select“Short”or“Long”–thisvalueisusedforcontentionwindowsinWMM(seeIV‐3‐6.WMM).PreambleTypeSetthewirelessradio preambletype.Thepreambletypein802.11basedwirelesscommunicationdefinesthelengthoftheCRC(CyclicRedundancyCheck)blockforcommunicationbetweentheaccesspointandroamingwirelessadapters.Thedefaultvalueis“ShortPreamble”.GuardIntervalSettheguardinterval. Ashorterintervalcanimproveperformance.
41802.11gProtectionEnable/disable802.11gprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)802.11nProtectionEnable/disable802.11nprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)DTIMPeriodSettheDTIM(deliverytrafficindicationmessage)periodvalueofthewirelessradio.Thedefaultvalueis1.RTSThresholdSettheRTSthresholdofthewirelessradio.Thedefaultvalueis2347.FragmentThresholdSetthefragmentthresholdofthewirelessradio.Thedefaultvalueis2346.MulticastRateSetthetransferrateformulticastpacketsorusethe“Auto”setting.TxPowerSetthepoweroutputofthewirelessradio.Youmaynotrequire100%outputpower.Settingalowerpoweroutputcanenhancesecuritysincepotentiallymalicious/unknownusersindistantareaswillnotbeabletoaccessyoursignal.BeaconInterval Setthebeaconintervalofthewirelessradio.Thedefaultvalueis100.StationidletimeoutSettheintervalforkeepalivemessagesfromtheaccesspointtoawirelessclienttoverifyifthestationisstillalive/active.
42IV‐3‐1‐3.SecurityTheaccesspointprovidesvarioussecurityoptions(wirelessdataencryption).Whendataisencrypted,informationtransmittedwirelesslycannotbereadbyanyonewhodoesnotknowthecorrectencryptionkey.It’sessentialtoconfigurewirelesssecurityinordertopreventunauthorisedaccesstoyournetwork.Selecthard‐to‐guesspasswordswhichincludecombinationsofnumbers,lettersandsymbols,andchangeyourpasswordregularly.
43SSIDSelectionSelect whichSSIDtoconfiguresecuritysettingsfor.BroadcastSSIDEnableordisableSSIDbroadcast.Whenenabled,theSSIDwillbevisibletoclientsasanavailableWi‐Finetwork.Whendisabled,theSSIDwillnotbevisibleasanavailableWi‐Finetworktoclients–clientsmustmanuallyentertheSSIDinordertoconnect.Ahidden(disabled)SSIDistypicallymoresecurethanavisible(enabled)SSID.WirelessClientIsolationEnableordisablewirelessclientisolation.Wirelessclientisolationpreventsclientsconnectedtotheaccesspointfromcommunicatingwitheachotherandimprovessecurity.Typically,thisfunctionisusefulforcorporateenvironmentsorpublichotspotsandcanpreventbruteforceattacksonclients’usernamesandpasswords.LoadBalancingLoadbalancinglimitsthenumberofwirelessclientsconnectedtoanSSID.Setaloadbalancingvalue(maximum50).AuthenticationMethodSelectanauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriatefor yourmethod.AdditionalAuthenticationSelectanadditionalauthenticationmethodfromthedropdownmenuandrefertotheinformationbelow(IV‐3‐1‐3‐6.)appropriateforyourmethod.IV‐3‐1‐3‐1. NoAuthenticationAuthenticationisdisabledandnopassword/keyisrequiredtoconnecttotheaccesspoint.Disablingwirelessauthenticationisnotrecommended.Whendisabled,anybodywithinrangecanconnecttoyourdevice’sSSID.
44IV‐3‐1‐3‐2. WEPWEP(WiredEquivalentPrivacy)isabasicencryptiontype.ForahigherlevelofsecurityconsiderusingWPAencryption.KeyLengthSelect64‐bitor128‐bit.128‐bitismoresecurethan64‐bitandisrecommended.KeyTypeChoosefrom“ASCII”(anyalphanumericalcharacter0‐9,a‐zandA‐Z)or“Hex”(anycharactersfrom0‐9,a‐fandA‐F).DefaultKeySelectwhichencryptionkey(1–4below)isthedefaultkey.Forsecuritypurposes,youcansetuptofourkeys(below)andchangewhichisthedefaultkey.EncryptionKey1–4Enteryourencryptionkey/passwordaccordingtotheformatyouselectedabove.IV‐3‐1‐3‐3. IEEE802.1x/EAPKeyLengthSelect64‐bitor128‐bit.128‐bitismoresecurethan64‐bitandisrecommended.IV‐3‐1‐3‐4. WPA‐PSKWPA‐PSKisasecurewirelessencryptiontypewithstrongdataprotectionanduserauthentication,utilizing128‐bitencryptionkeys.WPATypeSelectfromWPA/WPA2MixedMode‐PSK,WPA2orWPAonly.WPA2issaferthanWPAonly,butnotsupportedbyallwirelessclients.Pleasemakesureyourwirelessclientsupportsyourselection.EncryptionSelect“TKIP/AESMixedMode”or“AES”encryptiontype.KeyRenewalIntervalSpecifyafrequencyforkeyrenewalinminutes.Pre‐SharedKeyChoosefrom“Passphrase”(8–63
45Typealphanumericcharacters)or“Hex”(upto64charactersfrom0‐9,a‐fandA‐F).Pre‐SharedKeyPleaseenter asecuritykey/passwordaccordingtotheformatyouselectedabove.IV‐3‐1‐3‐5. WPA‐EAPWPATypeSelectfromWPA/WPA2MixedMode‐EAP,WPA2‐EAPorWPA‐EAP.EncryptionSelect“TKIP/AESMixedMode”or“AES”encryptiontype.KeyRenewalIntervalSpecifyafrequencyforkeyrenewalinminutes.WPA‐EAPmustbedisabledtouseMAC‐RADIUSauthentication.IV‐3‐1‐3‐6. AdditionalAuthenticationAdditionalwirelessauthenticationmethodscanalsobeused:MACAddressFilterRestrictwirelessclientsaccessbasedonMACaddressspecifiedintheMACfiltertable.SeeIV‐3‐5.MACFiltertoconfigureMACfiltering.MACFilter&MAC‐RADIUSAuthenticationRestrictwirelessclientsaccessusingbothoftheaboveMACfiltering&RADIUSauthenticationmethods.MAC‐RADIUSAuthenticationRestrictwirelessclientsaccessbasedonMACaddressviaaRADIUSserver,orpasswordauthenticationviaaRADIUSserver.SeeIV‐3‐4.RADIUStoconfigureRADIUSservers.WPSmustbedisabledtouseMAC‐RADIUSauthentication.SeeIV‐3‐3.forWPSsettings.
46MACRADIUSPasswordSelectwhethertouseMACaddressorpasswordauthenticationviaRADIUSserver.Ifyouselect“Usethefollowingpassword”,enterthepasswordinthefieldbelow.Thepasswordshouldmatchthe“SharedSecret”usedinIV‐3‐4.RADIUS.
47IV‐3‐1‐4.WDSWirelessDistributionSystem(WDS)canbridge/repeataccesspointstogetherinanextendednetwork.WDSsettingscanbeconfiguredasshownbelow.WhenusingWDS,configuretheIPaddressofeachaccesspointtobeinthesamesubnetandensurethereisonlyoneactiveDHCPserveramongconnectedaccesspoints,preferablyontheWANside.WDSmustbeconfiguredoneachaccesspoint,usingcorrectMACaddresses.Allaccesspointsshouldusethesamewirelesschannelandencryptionmethod.
482.4GHzWDSFunctionalitySelect“WDSwithAP”touseWDSwithaccesspointor“DedicatedWDS”touseWDSandalsoblockcommunicationwithregularwirelessclients.WhenWDSisused,eachaccesspointshouldbeconfiguredwithcorrespondingMACaddresses,wirelesschannelandwirelessencryptionmethod.LocalMACAddressDisplaystheMACaddressofyouraccesspoint.WDSPeerSettingsWDS#EntertheMACaddressforuptofourotherWDS devicesyouwishtoconnect.WDSVLANVLANModeSpecifytheWDSVLANmode to“UntaggedPort” or“TaggedPort”.VLANIDSpecifytheWDSVLANID when“UntaggedPort”isselectedabove.WDSEncryptionmethodEncryptionSelectwhethertouse“None”or“AES”encryptionandenterapre‐sharedkeyforAESconsistingof 8‐63alphanumericcharacters.
49IV‐3‐2. 5GHz11ac11anThe“5GHz11ac11an”menuallowsyoutoviewandconfigureinformationforyouraccesspoint’s5GHzwirelessnetworkacrossfourcategories:Basic,Advanced,SecurityandWDS.IV‐3‐2‐1.BasicThe“Basic”screendisplaysbasicsettingsforyouraccesspoint’s5GHzWi‐Finetwork(s).WirelessEnableordisabletheaccesspoint’s5GHzwirelessradio.Whendisabled,no5GHzSSIDs
50willbeactive.BandSelectthewirelessstandardusedfortheaccesspoint.Combinationsof802.11a,802.11n&802.11accanbeselected.EnableSSIDNumberSelecthowmanySSIDstoenableforthe5GHzfrequencyfromthedropdownmenu.Amaximumof16canbeenabled.SSID#EntertheSSIDnameforthespecifiedSSID(upto16).TheSSIDcanconsistofanycombinationofupto32alphanumericcharacters.VLANIDSpecifyaVLANIDforeachSSID.AutoChannelEnable/disableautochannelselection.Autochannelselectionwillautomaticallysetthewirelesschannelfortheaccesspoint’s5GHzfrequencybasedonavailabilityandpotentialinterference.Whendisabled,selectachannelmanuallyasshowninthenexttable.AutoChannelRangeSelectarangefromwhichtheautochannelsetting(above)willchooseachannel.AutoChannelIntervalSpecifyafrequencyforhowoftentheautochannelsettingwillcheck/reassignthewirelesschannel.Check/uncheckthe“Changechannelevenifclientsareconnected”boxaccordingtoyourpreference.ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),Auto40/20MHzorAuto80/40/20MHz(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisaseriesofratestocontrolcommunicationframesforwirelessclients.Whenautochannelisdisabled,selectawirelesschannelmanually:Channel Selectawirelesschannel.ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),Auto40/20MHzorAuto80/40/20MHz
51(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisaseriesofratestocontrolcommunicationframesforwirelessclients.
52IV‐3‐2‐2.AdvancedThesesettingsareforexperiencedusersonly.Pleasedonotchangeanyofthevaluesonthispageunlessyouarealreadyfamiliarwiththesefunctions.Changingthesesettingscanadverselyaffecttheperformanceofyouraccesspoint.GuardIntervalSettheguardinterval. Ashorterintervalcanimproveperformance.802.11nProtectionEnable/disable802.11nprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)DTIMPeriodSettheDTIM(deliverytrafficindicationmessage)periodvalueofthewirelessradio.Thedefaultvalueis1.RTSThresholdSettheRTSthresholdofthewirelessradio.Thedefaultvalueis2347.FragmentThresholdSetthefragmentthresholdofthewirelessradio.Thedefaultvalueis2346.MulticastRateSetthetransferrateformulticastpacketsorusethe“Auto”setting.
53TxPowerSetthepoweroutputofthewirelessradio.Youmaynotrequire100%outputpower.Settingalowerpoweroutputcanenhancesecuritysincepotentiallymalicious/unknownusersindistantareaswillnotbeabletoaccessyoursignal.BeaconInterval Setthebeaconintervalofthewirelessradio.Thedefaultvalueis100.StationidletimeoutSettheintervalforkeepalivemessagesfromtheaccesspointtoawirelessclienttoverifyifthestationisstillalive/active.
54IV‐3‐2‐3.SecurityTheaccesspointprovidesvarioussecurityoptions(wirelessdataencryption).Whendataisencrypted,informationtransmittedwirelesslycannotbereadbyanyonewhodoesnotknowthecorrectencryptionkey.It’sessentialtoconfigurewirelesssecurityinordertopreventunauthorisedaccesstoyournetwork.Selecthard‐to‐guesspasswordswhichincludecombinationsofnumbers,lettersandsymbols,andchangeyourpasswordregularly.SSIDSelectionSelectwhichSSIDtoconfiguresecuritysettingsfor.BroadcastSSIDEnableordisableSSIDbroadcast.Whenenabled,theSSIDwillbevisibletoclientsasanavailableWi‐Finetwork.Whendisabled,theSSIDwillnotbevisibleasanavailableWi‐Finetworktoclients–clientsmustmanuallyentertheSSIDinordertoconnect.Ahidden(disabled)SSIDistypicallymoresecurethanavisible(enabled)SSID.
55WirelessClientIsolationEnableordisablewirelessclientisolation.Wirelessclientisolationpreventsclientsconnectedtotheaccesspointfromcommunicatingwitheachotherandimprovessecurity.Typically,thisfunctionisusefulforcorporateenvironmentsorpublichotspotsandcanpreventbruteforceattacksonclients’usernamesandpasswords.LoadBalancingLoadbalancinglimitsthenumberofwirelessclientsconnectedtoanSSID.Setaloadbalancingvalue(maximum50).AuthenticationMethodSelectanauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriateforyourmethod.AdditionalAuthenticationSelectanadditionalauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriateforyourmethod.PleasereferbacktoIV‐3‐1‐3.Securityformoreinformationonauthenticationandadditionalauthenticationtypes.
56IV‐3‐2‐4.WDSWirelessDistributionSystem(WDS)canbridge/repeataccesspointstogetherinanextendednetwork.WDSsettingscanbeconfiguredasshownbelow.WhenusingWDS,configuretheIPaddressofeachaccesspointtobeinthesamesubnetandensurethereisonlyoneactiveDHCPserveramongconnectedaccesspoints,preferablyontheWANside.WDSmustbeconfiguredoneachaccesspoint,usingcorrectMACaddresses.Allaccesspointsshouldusethesamewirelesschannelandencryptionmethod.
575GHzWDSModeWDSFunctionalitySelect“WDSwithAP”touseWDSwithaccesspointor“DedicatedWDS”touseWDSandalsoblockcommunicationwithregularwirelessclients.WhenWDSisused,eachaccesspointshouldbeconfiguredwithcorrespondingMACaddresses,wirelesschannelandwirelessencryptionmethod.LocalMACAddressDisplaystheMACaddressofyouraccesspoint.WDSPeerSettingsWDS#EntertheMACaddressforuptofourotherWDAdevicesyouwishtoconnect.WDSVLANVLANModeSpecifytheWDSVLANmode to“UntaggedPort” or“TaggedPort”.VLANIDSpecifytheWDSVLANID when“UntaggedPort” isselectedabove.WDSEncryptionEncryptionSelectwhethertouse“None”or“AES”encryptionandenterapre‐sharedkeyforAESwith8‐63alphanumericcharacters.
58IV‐3‐3.WPSWi‐FiProtectedSetupisasimplewaytoestablishconnectionsbetweenWPScompatibledevices.WPScanbeactivatedoncompatibledevicesbypushingaWPSbuttononthedeviceorfromwithinthedevice’sfirmware/configurationinterface(knownasPBCor“PushButtonConfiguration”).WhenWPSisactivatedinthecorrectmannerandatthecorrecttimefortwocompatibledevices,theywillautomaticallyconnect.“PINcodeWPS”isavariationofPBCwhichincludestheadditionaluseofaPINcodebetweenthetwodevicesforverification.Pleaserefertomanufacturer’sinstructionsforyourotherWPSdevice.
59WPSCheck/uncheckthisboxtoenable/disableWPSfunctionality.WPSmustbedisabledwhenusingMAC‐RADIUSauthentication(seeIV‐3‐1‐3‐6&IV‐3‐4).ProductPINDisplaystheWPSPINcodeofthedevice,usedforPINcodeWPS.YouwillberequiredtoenterthisPINcodeintoanotherWPSdeviceforPINcodeWPS.Click“GeneratePIN”togenerateanewWPSPINcode.Push‐ButtonWPSClick“Start”toactivateWPSontheaccesspointforapproximately2minutes.Thishasthesameeffectasphysicallypushingtheaccesspoint’sWPSbutton.WPSbyPINEnterthePINcodeofanotherWPSdeviceandclick“Start”toattempttoestablishaWPSconnectionforapproximately2minutes.WPSStatusWPSsecuritystatusisdisplayedhere.Click“Release”tocleartheexistingstatus.
60IV‐3‐4.RADIUSTheRADIUSsubmenuallowsyoutoconfiguretheaccesspoint’sRADIUSserversettings,categorizedintothreesubmenus:RADIUSsettings,InternalServerandRADIUSaccounts.ARADIUSserverprovidesuser‐basedauthenticationtoimprovesecurityandofferwirelessclientcontrol–userscanbeauthenticatedbeforegainingaccesstoanetwork.Theaccesspointcanutilizebothaprimaryandsecondary(backup)RADIUSserverforeachofitswirelessfrequencies(2.4GHz&5GHz).ExternalRADIUSserverscanbeusedortheaccesspoint’sinternalRADIUSservercanbeused.TouseRADIUSservers,goto“WirelessSettings”“Security”andselect“MACRADIUSAuthentication”“AdditionalAuthentication”andselect“MACRADIUSAuthentication”(seeIV‐3‐1‐3.&IV‐3‐2‐3).
61IV‐3‐4‐1.RADIUSSettingsConfiguretheRADIUSserversettingsfor2.4GHz&5GHz.EachfrequencycanuseaninternalorexternalRADIUSserver.
62RADIUSTypeSelect“Internal”tousetheaccesspoint’sbuilt‐inRADIUSserveror“external”touseanexternalRADIUSserver.RADIUSServerEntertheRADIUSserverhostIPaddress.AuthenticationPortSettheUDPportusedintheauthenticationprotocoloftheRADIUSserver.Valuemustbebetween1–65535.SharedSecretEnterasharedsecret/passwordbetween1–99charactersinlength.Thisshouldmatchthe“MAC‐RADIUS”passwordusedinIV‐3‐1‐3‐6orIV‐3‐2‐3.SessionTimeout Setadurationofsessiontimeoutinsecondsbetween0–86400.AccountingEnableordisableRADIUSaccounting.
63AccountingPort Whenaccountingisenabled(above),settheUDPportusedintheaccountingprotocoloftheRADIUSserver.Valuemustbebetween1–65535.IV‐3‐4‐2.InternalServerTheaccesspointfeaturesabuilt‐inRADIUSserverwhichcanbeconfiguredasshownbelowusedwhen“Internal”isselectedfor“RADIUSType”inthe“WirelessSettings”“RADIUS”“RADIUSSettings”menu.TouseRADIUSservers,goto“WirelessSettings”“Security”andselect“MACRADIUSAuthentication”“AdditionalAuthentication”andselect“MACRADIUSAuthentication”(seeIV‐3‐1‐3.&IV‐3‐2‐3).InternalServerCheck/unchecktoenable/disabletheaccesspoint’sinternalRADIUSserver.EAPInternalAuthenticationSelectEAPinternalauthenticationtypefromthedropdownmenu.EAPCertificateFileFormatDisplaystheEAPcertificatefileformat:PCK#12(*.pfx/*.p12)
64EAPCertificateFileClick“Upload”toopenanewwindowandselectthelocationofanEAPcertificatefiletouse.Ifnocertificatefileisuploaded,theinternalRADIUSserverwilluseaself‐madecertificate.SharedSecretEnter asharedsecret/passwordforusebetweentheinternalRADIUSserverandRADIUSclient.Thesharedsecretshouldbe1–99charactersinlength.Thisshouldmatchthe“MAC‐RADIUS”passwordusedinIV‐3‐1‐3‐6orIV‐3‐2‐3.SessionTimeout Setadurationofsessiontimeoutinsecondsbetween0–86400.TerminationActionSelectatermination‐actionattribute:“Reauthentication”sendsaRADIUSrequesttotheaccesspoint,“Not‐Reathentication”sendsadefaulttermination‐actionattributetotheaccesspoint,“Not‐Send”notermination‐actionattributeissenttotheaccesspoint.
65IV‐3‐4‐3.RADIUSAccountsTheinternalRADIUSservercanauthenticateupto256useraccounts.The“RADIUSAccounts”pageallowsyoutoconfigureandmanageusers.UserNameEntertheuser nameshere,separatedbycommas.
66AddClick“Add”toaddtheusertotheuserregistrationlist.ResetCleartextfromtheusernamebox.SelectChecktheboxtoselectauser.UserNameDisplaystheusername.PasswordDisplaysifspecifiedusernamehasapassword(configured)ornot(notconfigured).CustomizeClick“Edit”toopenanewfieldtoset/editapasswordforthespecifiedusername(below).DeleteSelected Deleteselecteduserfromtheuserregistrationlist.DeleteAllDeleteallusersfromtheuserregistrationlist.EditUserRegistrationListUserNameExistingusernameisdisplayedhereandcanbeeditedaccordingtoyourpreference.PasswordEnteroreditapasswordforthespecifieduser.
67IV‐3‐5. MACFilterMacfilteringisasecurityfeaturethatcanhelptopreventunauthorizedusersfromconnectingtoyouraccesspoint.Thisfunctionallowsyoutodefinealistofnetworkdevicespermittedtoconnecttotheaccesspoint.DevicesareeachidentifiedbytheiruniqueMACaddress.IfadevicewhichisnotonthelistofpermittedMACaddressesattemptstoconnecttotheaccesspoint,itwillbedenied.ToenableMACfiltering,goto“WirelessSettings”“2.4GHz11bgn/5GHz11ac11an”“Security”“AdditionalAuthentication”andselect“MACFilter”(seeIV‐3‐1‐3.&IV‐3‐2‐3).TheMACaddressfilteringtableisdisplayedbelow:AddMACAddressEnteraMACaddressofcomputerornetworkdevicemanuallye.g.‘aa‐bb‐cc‐dd‐ee‐ff’orentermultiple MACaddressesseparatedwith
68commas,e.g.‘aa‐bb‐cc‐dd‐ee‐ff,aa‐bb‐cc‐dd‐ee‐gg’AddClick“Add”toaddtheMACaddresstotheMACaddressfilteringtable.ResetClearallfields.MACaddressentrieswillbelistedinthe“MACAddressFilteringTable”.Selectanentryusingthe“Select”checkbox.SelectDeleteselectedorallentriesfromthetable.MACAddressTheMACaddressislistedhere.DeleteSelectedDeletetheselectedMACaddressfromthelist.DeleteAllDeleteallentriesfromtheMACaddressfilteringtable.ExportClick“Export”tosaveacopyoftheMACfilteringtable.Anewwindowwillpopupforyoutoselectalocationtosavethefile.
69IV‐3‐6.WMMWi‐FiMultimedia(WMM)isaWi‐FiAllianceinteroperabilitycertificationbasedontheIEEE802.11estandard,whichprovidesQualityofService(QoS)featurestoIEEE802.11networks.WMMprioritizestrafficaccordingtofourcategories:background,besteffort,videoandvoice.ConfiguringWMMconsistsofadjustingparametersonqueuesfordifferentcategoriesofwirelesstraffic.Trafficissenttothefollowingqueues:BackgroundLowPriorityHighthroughput,nontimesensitivebulkdatae.g.FTPBestEffortMediumPriorityTraditionalIPdata,mediumthroughputanddelay.VideoHighPriorityTimesensitivevideodatawithminimumtimedelay.VoiceHighPriorityTimesensitivedatasuchasVoIPandstreamingmediawithminimumtimedelay.Queuesautomaticallyprovideminimumtransmissiondelaysforvideo,voice,multimediaandcriticalapplications.Thevaluescanfurtherbeadjustedmanually:
70CWMinMinimumContentionWindow(milliseconds):Thisvalueisinputtotheinitialrandombackoffwaittimealgorithmforretryofadataframetransmission.Thebackoffwaittimewillbegeneratedbetween0andthisvalue.Iftheframeisnotsent,therandombackoffvalueisdoubleduntilthevaluereachesthenumberdefinedbyCWMax(below).TheCWMinvaluemustbelowerthantheCWMaxvalue.Thecontentionwindowschemehelpstoavoidframecollisionsanddeterminepriorityofframetransmission.Ashorterwindowhasahigherprobability(priority)oftransmission.CWMaxMaximumContentionWindow(milliseconds):Thisvalueistheupperlimittorandombackoffvaluedoubling(seeabove).AIFSNArbitrationInter‐FrameSpace(milliseconds):SpecifiesadditionaltimebetweenwhenachannelgoesidleandtheAP/clientsendsdataframes.TrafficwithalowerAIFSNvaluehasahigherpriority.TxOPTransmissionOpportunity(milliseconds):ThemaximumintervaloftimeanAP/clientcantransmit.Thismakeschannelaccessmoreefficientlyprioritized.Avalueof0meansonlyoneframepertransmission.Agreatervalueeffectshigherpriority.
71IV‐4. ManagementScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐4‐1. AdminYoucanchangethepasswordusedtologintothebrowser‐basedconfigurationinterfacehere.Itisadvisedtodosoforsecuritypurposes.Ifyouchangetheadministratorpassword,pleasemakeanoteofthenewpassword.Intheeventthatyouforgetthispasswordandareunabletologintothebrowserbasedconfigurationinterface,seeI‐5.Resetforhowtoresettheaccesspoint.
72AccounttoManageThisDeviceAdministratorNameSettheaccesspoint’sadministratorname.Thisisusedtologintothebrowserbasedconfigurationinterfaceandmustbebetween4‐16alphanumericcharacters(casesensitive).AdministratorPasswordSettheaccesspoint’sadministratorpassword.Thisisusedtologintothebrowserbasedconfigurationinterfaceandmustbebetween4‐32alphanumericcharacters(casesensitive).AdvancedSettingsProductNameEdittheproductnameaccordingtoyourpreferenceconsistingof1‐32alphanumericcharacters.Thisnameisusedforreferencepurposes.
73ManagementProtocolCheck/unchecktheboxestoenable/disablespecifiedmanagementinterfaces(seebelow).WhenSNMPisenabled,completetheSNMPfieldsbelow.SNMPVersionSelectSNMPversionappropriateforyourSNMPmanager.SNMPGetCommunityEnteranSNMPGetCommunitynameforverificationwiththeSNMPmanagerforSNMP‐GETrequests.SNMPSetCommunityEnteranSNMPSetCommunitynameforverificationwiththeSNMPmanagerforSNMP‐SETrequests.SNMPTrapEnableordisableSNMPTraptonotifySNMPmanagerofnetworkerrors.SNMPTrapCommunityEnteranSNMPTrapCommunitynameforverificationwiththeSNMPmanagerforSNMP‐TRAPrequests.SNMPTrapManagerSpecifytheIPaddressorsevername(2‐128alphanumericcharacters)oftheSNMPmanager.HTTPInternetbrowserHTTPprotocolmanagementinterfaceHTTPSInternetbrowserHTTPSprotocolmanagementinterfaceTELNETClientterminalwithtelnetprotocolmanagementinterfaceSSHClientterminalwithSSHprotocolversion1or2managementinterfaceSNMPSimpleNetworkManagementProtocol.SNMPv1,v2&v3protocolsupported.SNMPv2canbeusedwithcommunitybasedauthentication.SNMPv3usesuser‐basedsecuritymodel(USM)architecture.
74IV‐4‐2. DateandTimeYoucanconfigurethetimezonesettingsofyouraccesspointhere.Thedateandtimeofthedevicecanbeconfiguredmanuallyorcanbesynchronizedwithatimeserver.DateandTimeSettingsLocalTimeSettheaccesspoint’sdateandtimemanuallyusingthedropdownmenus.AcquireCurrentTimefromyourPCClick“AcquireCurrentTimefromYourPC”toentertherequiredvaluesautomaticallyaccordingtoyourcomputer’scurrenttimeanddate.NTPTimeServerUseNTPTheaccesspointalsosupportsNTP(NetworkTimeProtocol)forautomatictimeanddatesetup.
75ServerNameEnterthehostnameorIPaddressofthetimeserverifyouwish.UpdateInterval Specifyafrequency(inhours)fortheaccesspointtoupdate/synchronizewiththeNTPserver.TimeZoneTimeZoneSelectthetimezoneofyourcountry/region.Ifyourcountry/regionisnotlisted,pleaseselectanothercountry/regionwhosetimezoneisthesameasyours.
76IV‐4‐3. SyslogServerThesystemlogcanbesenttoaserver.TransferLogsCheck/unchecktheboxtoenable/disabletheuseofasyslogserver,andenterahostname,domainorIPaddressfortheserver,consistingofupto128alphanumericcharacters.
77IV‐4‐4. I’mHereTheaccesspointfeaturesabuilt‐inbuzzerwhichcansoundoncommandusingthe“I’mHere”page.Thisisusefulfornetworkadministratorsandengineersworkingincomplexnetworkenvironmentstolocatetheaccesspoint.Thebuzzerisloud!DurationofSoundSetthedurationforwhichthebuzzerwillsoundwhenthe“SoundBuzzer”buttonisclicked.SoundBuzzerActivatethebuzzersoundfortheabovespecifieddurationoftime.
78IV‐5. AdvancedScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐5‐1. LEDSettingsTheaccesspoint’sLEDscanbemanuallyenabledordisabledaccordingtoyourpreference.PowerLEDSelectonoroff.DiagLEDSelectonoroff.
79IV‐5‐2. UpdateFirmwareThe“Firmware”pageallowsyoutoupdatethesystemfirmwaretoamorerecentversion.Updatedfirmwareversionsoftenofferincreasedperformanceandsecurity,aswellasbugfixes.Youcandownloadthelatestfirmwarefromthewebsite.Donotswitchoffordisconnecttheaccesspointduringafirmwareupgrade,asthiscoulddamagethedevice.UpdateFirmwareFromSelect“afileonyourPC”touploadfirmwarefromyourlocalcomputer.FirmwareUpdateFileClick“Browse”toopenanewwindowtolocateandselectthefirmwarefileinyourcomputer.UpdateClick“Update”touploadthespecifiedfirmwarefiletoyouraccesspoint.
80IV‐5‐3. Save/RestoreSettingsTheaccesspoint’s“Save/RestoreSettings”pageenablesyoutosave/backuptheaccesspoint’scurrentsettingsasafiletoyourlocalcomputer,andrestoretheaccesspointtopreviouslysavedsettings.Save/RestoreSettingsUsingDeviceSelect“UsingyourPC”tosavetheaccesspoint’ssettingstoyourlocalcomputer.SaveSettingstoPCSaveSettingsClick“Save”tosavesettingsandanewwindowwillopentospecifyalocationtosavethesettingsfile.Youcanalsocheckthe“Encrypttheconfigurationfilewithapassword”boxandenterapasswordtoprotectthefileinthefieldunderneath,ifyouwish.
81RestoreSettingsfromPCRestoreSettings Clickthebrowsebuttontofindapreviouslysavedsettingsfileonyourcomputer,thenclick“Restore”toreplaceyourcurrentsettings.Ifyoursettingsfileisencryptedwithapassword,checkthe“Openfilewithpassword”boxandenterthepasswordinthefieldunderneath.
82IV‐5‐4. FactoryDefaultIftheaccesspointmalfunctionsorisnotresponding,thenitisrecommendedthatyourebootthedevice(seeIV‐5.5)orresetthedevicebacktoitsfactorydefaultsettings.Youcanresettheaccesspointbacktoitsdefaultsettingsusingthisfeatureifthelocationoftheaccesspointisnotconvenienttoaccesstheresetbutton.FactoryDefault Click“FactoryDefault” torestoresettingstothefactorydefault.Apop‐upwindowwillappearandaskyoutoconfirm.Afterresettingtofactorydefaults,pleasewaitfortheaccesspointtoresetandrestart.
83IV‐5‐5. RebootIftheaccesspointmalfunctionsorisnotresponding,thenitisrecommendedthatyourebootthedeviceorresettheaccesspointbacktoitsfactorydefaultsettings(seeIV‐5‐4).Youcanreboottheaccesspointremotelyusingthisfeature.RebootClick“Reboot”torebootthedevice.Acountdownwillindicatetheprogressofthereboot.
84V. AppendixV‐1.ConfiguringyourIPaddressTheaccesspointusesthedefaultIPaddress192.168.2.1.Inordertoaccessthebrowserbasedconfigurationinterface,youneedtomodifytheIPaddressofyourcomputertobeinthesameIPaddresssubnete.g.192.168.2.x(x=3–254).TheprocedureformodifyingyourIPaddressvariesacrossdifferentoperatingsystems;pleasefollowtheguideappropriateforyouroperatingsystem.InthefollowingexamplesweusetheIPaddress192.168.2.10thoughyoucanuseanyIPaddressintherange192.168.2.x(x=3–254).
85V‐1‐1.WindowsXP1. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.Double‐clickthe“NetworkandInternetConnections”icon,click“NetworkConnections”,andthendouble‐click“LocalAreaConnection”.The“LocalAreaConnectionStatus”windowwillthenappear,click“Properties”.2. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
86
87V‐1‐2.WindowsVista1. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.Click“ViewNetworkStatusandTasks”,thenclick“ManageNetworkConnections”.Right‐click“LocalAreaNetwork”,thenselect“Properties”.The“LocalAreaConnectionProperties”windowwillthenappear,select“InternetProtocolVersion4(TCP/IPv4)”,andthenclick“Properties”.2. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
88
89V‐1‐3.Windows71. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.2. Under“NetworkandInternet”click“Viewnetworkstatusandtasks”.3. Click“LocalAreaConnection”.
904. Click“Properties”.
915. Select“InternetProtocolVersion4(TCP/IPv4)andthenclick“Properties”.6. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
92
93V‐1‐4.Windows81. FromtheWindows8Startscreen,youneedtoswitchtodesktopmode.Moveyourcursertothebottomleftofthescreenandclick.2. Indesktopmode,clicktheFileExplorericoninthebottomleftofthescreen,asshownbelow.
943. Rightclick“Network”andthenselect“Properties”.
954. Inthewindowthatopens,select“Changeadaptersettings”fromtheleftside.5. Chooseyourconnectionandrightclick,thenselect“Properties”.
966. Select“InternetProtocolVersion4(TCP/IPv4)andthenclick“Properties”.7. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
97V‐1‐5.Mac1. HaveyourMacintoshcomputeroperateasusual,andclickon“SystemPreferences”2. InSystemPreferences,clickon“Network”.3. Clickon“Ethernet”intheleftpanel.4. Openthedrop‐downmenulabeled“ConfigureIPv4”andselect“Manually”.
98 5. EntertheIPaddress192.168.2.10andsubnetmask255.255.255.0.Clickon“Apply”tosavethechanges.
99V‐1‐6.GlossaryDefaultGateway(Accesspoint):Everynon‐accesspointIPdeviceneedstoconfigureadefaultgateway’sIPaddress.WhenthedevicesendsoutanIPpacket,ifthedestinationisnotonthesamenetwork,thedevicehastosendthepackettoitsdefaultgateway,whichwillthensenditouttowardsthedestination.DHCP:DynamicHostConfigurationProtocol.ThisprotocolautomaticallygiveseverycomputeronyourhomenetworkanIPaddress.DNSServerIPAddress:DNSstandsforDomainNameSystem,whichallowsInternetserverstohaveadomainname(suchaswww.Broadbandaccesspoint.com)andoneormoreIPaddresses(suchas192.34.45.8).ADNSserverkeepsadatabaseofInternetserversandtheirrespectivedomainnamesandIPaddresses,sothatwhenadomainnameisrequested(asintyping"Broadbandaccesspoint.com"intoyourInternetbrowser),theuserissenttotheproperIPaddress.TheDNSserverIPaddressusedbythecomputersonyourhomenetworkisthelocationoftheDNSserveryourISPhasassignedtoyou.DSLModem:DSLstandsforDigitalSubscriberLine.ADSLmodemusesyourexistingphonelinestotransmitdataathighspeeds.Ethernet:Astandardforcomputernetworks.Ethernetnetworksareconnectedbyspecialcablesandhubs,andmovedataaroundatupto10/100millionbitspersecond(Mbps).IPAddressandNetwork(Subnet)Mask:IPstandsforInternetProtocol.AnIPaddressconsistsofaseriesoffournumbersseparatedbyperiods,thatidentifiesasingle,uniqueInternetcomputerhostinanIPnetwork.Example:192.168.2.1.Itconsistsof2portions:theIPnetworkaddress,andthehostidentifier.TheIPaddressisa32‐bitbinarypattern,whichcanberepresentedasfourcascadeddecimalnumbersseparatedby“.”:aaa.aaa.aaa.aaa,whereeach“aaa”canbeanythingfrom000to255,orasfourcascadedbinarynumbersseparatedby“.”:bbbbbbbb.bbbbbbbb.bbbbbbbb.bbbbbbbb,whereeach“b”caneitherbe0or1.
100Anetworkmaskisalsoa32‐bitbinarypattern,andconsistsofconsecutiveleading1’sfollowedbyconsecutivetrailing0’s,suchas11111111.11111111.11111111.00000000.Thereforesometimesanetworkmaskcanalsobedescribedsimplyas“x”numberofleading1’s.Whenbotharerepresentedsidebysideintheirbinaryforms,allbitsintheIPaddressthatcorrespondto1’sinthenetworkmaskbecomepartoftheIPnetworkaddress,andtheremainingbitscorrespondtothehostID.Forexample,iftheIPaddressforadeviceis,initsbinaryform,11011001.10110000.10010000.00000111,andifitsnetworkmaskis,11111111.11111111.11110000.00000000Itmeansthedevice’snetworkaddressis11011001.10110000.10010000.00000000,anditshostIDis,00000000.00000000.00000000.00000111.ThisisaconvenientandefficientmethodforaccesspointstorouteIPpacketstotheirdestination.ISPGatewayAddress:(seeISPfordefinition).TheISPGatewayAddressisanIPaddressfortheInternetaccesspointlocatedattheISP'soffice.ISP:InternetServiceProvider.AnISPisabusinessthatprovidesconnectivitytotheInternetforindividualsandotherbusinessesororganizations.LAN:LocalAreaNetwork.ALANisagroupofcomputersanddevicesconnectedtogetherinarelativelysmallarea(suchasahouseoranoffice).YourhomenetworkisconsideredaLAN.MACAddress:MACstandsforMediaAccessControl.AMACaddressisthehardwareaddressofadeviceconnectedtoanetwork.TheMACaddressisauniqueidentifierforadevicewithanEthernetinterface.Itiscomprisedoftwoparts:3bytesofdatathatcorrespondstotheManufacturerID(uniqueforeachmanufacturer),plus3bytesthatareoftenusedastheproduct’sserialnumber.NAT:NetworkAddressTranslation.ThisprocessallowsallofthecomputersonyourhomenetworktouseoneIPaddress.Usingthebroadbandaccesspoint’sNATcapability,youcanaccesstheInternetfromanycomputeronyourhomenetworkwithouthavingtopurchasemoreIPaddressesfromyourISP.Port:NetworkClients(LANPC)usesportnumberstodistinguishonenetworkapplication/protocoloveranother.Belowisalistofcommonapplicationsandprotocol/portnumbers:
101ApplicationProtocolPortNumberTelnetTCP23FTPTCP21SMTPTCP25POP3TCP110H.323TCP1720SNMPUCP161SNMPTrapUDP162HTTPTCP80PPTPTCP1723PCAnywhereTCP5631PCAnywhereUDP5632Accesspoint:AaccesspointisanintelligentnetworkdevicethatforwardspacketsbetweendifferentnetworksbasedonnetworklayeraddressinformationsuchasIPaddresses.SubnetMask:Asubnetmask,whichmaybeapartoftheTCP/IPinformationprovidedbyyourISP,isasetoffournumbers(e.g.255.255.255.0)configuredlikeanIPaddress.ItisusedtocreateIPaddressnumbersusedonlywithinaparticularnetwork(asopposedtovalidIPaddressnumbersrecognizedbytheInternet,whichmustbeassignedbyInterNIC).TCP/IP,UDP:TransmissionControlProtocol/InternetProtocol(TCP/IP)andUnreliableDatagramProtocol(UDP).TCP/IPisthestandardprotocolfordatatransmissionovertheInternet.BothTCPandUDParetransportlayerprotocol.TCPperformspropererrordetectionanderrorrecovery,andthusisreliable.UDPontheotherhandisnotreliable.TheybothrunontopoftheIP(InternetProtocol),anetworklayerprotocol.WAN:WideAreaNetwork.Anetworkthatconnectscomputerslocatedingeographicallyseparateareas(e.g.differentbuildings,cities,countries).TheInternetisawideareanetwork.Web‐basedmanagementGraphicalUserInterface(GUI):Manydevicessupportagraphicaluserinterfacethatisbasedonthewebbrowser.ThismeanstheusercanusethefamiliarNetscapeorMicrosoftInternetExplorertoControl/configureormonitorthedevicebeingmanaged.
102V‐2.HardwareSpecificationMCU/RF MediaTekMT7620A(2.4GHz)+QCA9882(5GHz)PHY/SwitchQualcommAtherosAR8035Memory DDR264MBFlash 8MBPhysicalInterface‐LAN:10/100/1000GigabitEthernetwithPoEsupport802.3af(PDIn)‐ResetButton‐DCPowerJackPowerRequirementPoweroverEthernet,IEEE802.3afDC:12V/1AAntennaInternalPIFAAntenna(3dBi2.4GHzx2,4dBi5GHzx2)OthersInternalBuzzer(Findme)V‐3.ENVIRONMENT&PHYSICALTemperatureRangeOperation:0to40℃(32℉to104℉)Storage:‐20to60℃(‐4℉to140℉)Humidity 90%orless–Operating,90%orless‐StorageCertificationsFCC,CEDimensions 176(D)x30(H)mmWeight 306g
1COPYRIGHTCopyright©2014bythiscompany.Allrightsreserved.Nopartofthispublicationmaybereproduced,transmitted,transcribed,storedinaretrievalsystem,ortranslatedintoanylanguageorcomputerlanguage,inanyformorbyanymeans,electronic,mechanical,magnetic,optical,chemical,manualorotherwise,withoutthepriorwrittenpermissionofthiscompanyThiscompanymakesnorepresentationsorwarranties,eitherexpressedorimplied,withrespecttothecontentshereofandspecificallydisclaimsanywarranties,merchantabilityorfitnessforanyparticularpurpose.Anysoftwaredescribedinthismanualissoldorlicensed"asis".Shouldtheprogramsprovedefectivefollowingtheirpurchase,thebuyer(andnotthiscompany,itsdistributor,oritsdealer)assumestheentirecostofallnecessaryservicing,repair,andanyincidentalorconsequentialdamagesresultingfromanydefectinthesoftware.Further,thiscompanyreservestherighttorevisethispublicationandtomakechangesfromtimetotimeinthecontentsthereofwithoutobligationtonotifyanypersonofsuchrevisionorchanges.
2FederalCommunicationCommissionInterferenceStatementThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,pursuanttoPart15ofFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,uses,andcanradiateradiofrequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmfulinterferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedtotrytocorrecttheinterferencebyoneormoreofthefollowingmeasures:1.Reorientorrelocatethereceivingantenna.2.Increasetheseparationbetweentheequipmentandreceiver.3.Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiverisconnected.4.Consultthedealeroranexperiencedradiotechnicianforhelp.FCCCautionThisdeviceanditsantennamustnotbeco‐locatedoroperatinginconjunctionwithanyotherantennaortransmitter.ThisdevicecomplieswithPart15oftheFCCRules.Operationissubjecttothefollowingtwoconditions:(1)thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.Anychangesormodificationsnotexpresslyapprovedbythepartyresponsibleforcompliancecouldvoidtheauthoritytooperateequipment.FederalCommunicationsCommission(FCC)RadiationExposureStatementThisequipmentcomplieswithFCCradiationexposuresetforthforanuncontrolledenvironment.InordertoavoidthepossibilityofexceedingtheFCCradiofrequencyexposurelimits,humanproximitytotheantennashallnotbelessthan2.5cm(1inch)duringnormaloperation.FederalCommunicationsCommission(FCC)RFExposureRequirementsSARcompliancehasbeenestablishedinthelaptopcomputer(s)configurationswithPCMCIAslotonthesidenearthecenter,astestedintheapplicationforcertification,andcanbeusedinlaptopcomputer(s)withsubstantiallysimilarphysicaldimensions,construction,andelectricalandRFcharacteristics.UseinotherdevicessuchasPDAsorlappadsisnotauthorized.Thistransmitterisrestrictedforusewiththespecificantennatestedintheapplicationforcertification.Theantenna(s)usedforthistransmittermustnotbeco‐locatedoroperatinginconjunctionwithanyotherantennaortransmitter.R&TTEComplianceStatementThisequipmentcomplieswithalltherequirementsofDIRECTIVE1999/5/ECOFTHEEUROPEANPARLIAMENTANDTHECOUNCILofMarch9,1999onradioequipmentandtelecommunicationterminalequipmentandthemutualrecognitionoftheirconformity(R&TTE).TheR&TTEDirectiverepealsandreplacesinthedirective98/13/EEC(TelecommunicationsTerminalEquipmentandSatelliteEarthStationEquipment)AsofApril8,2000.SafetyThisequipmentisdesignedwiththeutmostcareforthesafetyofthosewhoinstallanduseit.However,specialattentionmustbepaidtothedangersofelectricshockandstaticelectricitywhenworkingwithelectricalequipment.Allguidelinesofthisandofthecomputermanufacturemustthereforebeallowedatalltimestoensurethesafeuseoftheequipment.EUCountriesIntendedforUseTheETSIversionofthisdeviceisintendedforhomeandofficeuseinAustria,Belgium,Bulgaria,Cyprus,Czech,Denmark,Estonia,Finland,France,Germany,Greece,Hungary,Ireland,Italy,Latvia,Lithuania,Luxembourg,Malta,Netherlands,Poland,Portugal,Romania,Slovakia,Slovenia,Spain,Sweden,Turkey,andUnitedKingdom.TheETSIversionofthisdeviceisalsoauthorizedforuseinEFTAmemberstates:Iceland,Liechtenstein,Norway,andSwitzerland.EUCountriesNotIntendedforUseNoneFCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.

Navigation menu