Edimax Technology Co 9576791401 11ac Dual Band concurrent Wall-mount AP User Manual

Edimax Technology Co Ltd 11ac Dual Band concurrent Wall-mount AP

user manual

WAP1750UserManual02‐2014/v1.0
2CONTENTSI.ProductInformation...............................................................................4I‐1.PackageContents..........................................................................................................4I‐2.SystemRequirements....................................................................................................5I‐3.HardwareOverview.......................................................................................................5I‐4.LEDStatus......................................................................................................................6I‐5.Reset..............................................................................................................................6I‐6.MagneticWallMount....................................................................................................7I‐7.SafetyInformation.........................................................................................................8II.QuickSetup.........................................................錯誤!尚未定義書籤。II‐1.InitialSetup....................................................................................................................9II‐2.BasicSettings...............................................................................................................11II‐3.Wi‐FiProtectedSetup(WPS).......................................................................................15III.HardwareInstallation...........................................................................16IV.BrowserBasedConfigurationInterface.................................................17IV‐1.Information................................................................................................................19IV‐1‐1.SystemInformation...................................................................................................19IV‐1‐2.WirelessClients..........................................................................................................23IV‐1‐3.WirelessMonitor.......................................................................................................25IV‐1‐4.Log..............................................................................................................................27IV‐2.NetworkSettings.......................................................................................................29IV‐2‐1.LAN‐SideIPAddress...................................................................................................29IV‐2‐2.LANPort.....................................................................................................................31IV‐2‐3.VLAN..........................................................................................................................32IV‐3.WirelessSettings........................................................................................................33IV‐3‐1.2.4GHz11bgn.............................................................................................................33IV‐3‐1‐1.Basic...........................................................................................................................34IV‐3‐1‐2.Advanced...................................................................................................................37IV‐3‐1‐3.Security......................................................................................................................39IV‐3‐1‐3‐1.NoAuthentication.....................................................................................................40IV‐3‐1‐3‐2.WEP............................................................................................................................41IV‐3‐1‐3‐3.IEEE802.1x/EAP..........................................................................................................41IV‐3‐1‐3‐4.WPA‐PSK....................................................................................................................41IV‐3‐1‐3‐5.WPA‐EAP....................................................................................................................42IV‐3‐1‐3‐6.AdditionalAuthentication.........................................................................................42IV‐3‐1‐4.WDS...........................................................................................................................44
3IV‐3‐2.5GHz11ac11an.........................................................................................................46IV‐3‐2‐1.Basic...........................................................................................................................46IV‐3‐2‐2.Advanced...................................................................................................................49IV‐3‐2‐3.Security......................................................................................................................51IV‐3‐2‐4.WDS...........................................................................................................................53IV‐3‐3.WPS............................................................................................................................55IV‐3‐4.RADIUS.......................................................................................................................57IV‐3‐4‐1.RADIUSSettings.........................................................................................................58IV‐3‐4‐2.InternalServer...........................................................................................................60IV‐3‐4‐3.RADIUSAccounts.......................................................................................................62IV‐3‐5.MACFilter..................................................................................................................64IV‐3‐6.WMM.........................................................................................................................66IV‐4.Management.............................................................................................................68IV‐4‐1.Admin.........................................................................................................................68IV‐4‐2.DateandTime............................................................................................................71IV‐4‐3.SyslogServer..............................................................................................................73IV‐4‐4.I’mHere.....................................................................................................................74IV‐5.Advanced...................................................................................................................75IV‐5‐1.LEDSettings...............................................................................................................75IV‐5‐2.UpdateFirmware.......................................................................................................76IV‐5‐3.Save/RestoreSettings................................................................................................77IV‐5‐4.FactoryDefault..........................................................................................................79IV‐5‐5.Reboot........................................................................................................................80V.Appendix..............................................................................................81V‐1.ConfiguringyourIPaddress.......................................................................................81V‐1‐1.WindowsXP...............................................................................................................82V‐1‐2.WindowsVista...........................................................................................................84V‐1‐3.Windows7.................................................................................................................86V‐1‐4.Windows8.................................................................................................................90V‐1‐5.Mac............................................................................................................................94V‐1‐6.Glossary......................................................................................................................96
4I. ProductInformationI‐1.PackageContents    1. WAP1750AccessPoint2. Antennasx33. MagneticWallMountx2&Screws4. CD5. QuickInstallationGuide6. EthernetCable7. PowerAdapter8. MagneticWallMountScrewTemplate12345678
5I‐2.SystemRequirements‐ Existingcable/DSLmodem&router‐ ComputerwithwebbrowserforaccesspointconfigurationI‐3.HardwareOverviewA. 12VDCporttoconnectthepoweradapterB. LANportwithPoweroverEthernet(PoE)INC. LANportwithPoweroverEthernet(PoE)OUTD. USBPortforsystemlogE. EjectanattachedUSBdeviceF. ConnectamanagementconsoleG. ResettheaccesspointtofactorydefaultsettingsH. Wi‐FiProtectedSetup(WPS)buttonI. Switchtheaccesspointon/offA12VDCINBLAN1(PoE)CLAN2EEjectFConsoleGResetHWPSIOn/OffDUSBPort
6I‐4.LEDStatusLEDStatusDescriptionOffTheaccesspointisoff.BlueTheaccesspointison.AmberTheaccesspointisstartingup.FlashingAmberTheaccesspointcannotestablishaconnectiontothenetwork.FlashingAmberandBlueTheaccesspointexperiencedaproblemstartingup.Theaccesspointwillrestart.I‐5.ResetIfyouexperienceproblemswithyouraccesspoint,youcanresetthedevicebacktoitsfactorysettings.Thisresetsallsettingsbacktodefault.1. Pressandholdtheresetbuttonontheaccesspointforatleast10seconds.ReleasethebuttonwhentheLEDisflashingamber.Youmayneedtouseapencilorsimilarsharpobjecttopushtheresetbutton.2. Waitfortheaccesspointtorestart.TheaccesspointisreadyforsetupwhentheLEDisblue.
7I‐6.MagneticWallMountTheaccesspointincludesamagneticwallmountwhichrequiressomeassembly.1. Usetheincludedmagneticwallmountscrewtemplatetoidentifyandmarkcorrectscrewpositionsonyourselectedwall.2. Attachthetwomagneticwallmountstripstoyourwallusingtheincludedscrews,asshownbelow.3. Pressthebackofyouraccesspointfirmlyagainstthetwowallmountedmagneticstrips,withtheaccesspoint’sEdimaxlogointhecorrect,uprightorientationasdisplayedabove.Ensureyouraccesspointissecurelyattachedtothemagneticstrips.
8I‐7.SafetyInformationInordertoensurethesafeoperationofthedeviceanditsusers,pleasereadandactinaccordancewiththefollowingsafetyinstructions.1.Theaccesspointisdesignedforindooruseonly;donotplacetheaccesspointoutdoors.2.Donotplacetheaccesspointinornearhot/humidplaces,suchasakitchenorbathroom.3.Donotpullanyconnectedcablewithforce;carefullydisconnectitfromtheaccesspoint.4.Handletheaccesspointwithcare.Accidentaldamagewillvoidthewarrantyoftheaccesspoint.5.Thedevicecontainssmallpartswhichareadangertosmallchildrenunder3yearsold.Pleasekeeptheaccesspointoutofreachofchildren.6.Donotplacetheaccesspointonpaper,cloth,orotherflammablematerials.Theaccesspointmaybecomehotduringuse.7.Therearenouser‐serviceablepartsinsidetheaccesspoint.Ifyouexperienceproblemswiththeaccesspoint,pleasecontactyourdealerofpurchaseandaskforhelp.8.Theaccesspointisanelectricaldeviceandassuch,ifitbecomeswetforanyreason,donotattempttotouchitwithoutswitchingthepowersupplyoff.Contactanexperiencedelectricaltechnicianforfurtherhelp.9.Ifyousmellburningorseesmokecomingfromtheaccesspointorpoweradapter,thendisconnecttheaccesspointandpoweradapterimmediately,asfarasitissafelypossibletodoso.Callyourdealerofpurchaseforhelp.
9II. QuickSetupII‐1.InitialSetup1. ConnecttheaccesspointtoacomputerviaEthernetcable.2. Connectthepoweradaptertotheaccesspoint’s12VDCportandplugthepoweradapterintoapowersupply.3. Pleasewaitamomentfortheaccesspointtostartup.TheaccesspointisreadywhentheLEDisblue.4. Setyourcomputer’sIPaddressto192.168.2.xwherexisanumberintherange3–100.Ifyouareunsurehowtodothis,pleaserefertoV‐1.ConfiguringyourIPaddressformoreinformation.Pleaseensuretherearenootheractivenetworkconnectionsonyourcomputer(disconnectWi‐FiconnectionsandEthernetcables).5. Entertheaccesspoint’sdefaultIPaddress192.168.2.2intotheURLbarofawebbrowser.6. Youwillbepromptedforausernameandpassword.Enterthedefaultusername“admin”andthedefaultpassword“1234”.
107. Youwillarrivethe“SystemInformation”screenshownbelow.8. Next,pleasefollowtheinstructionsbelowinII‐2.BasicSettingstoconfiguretheaccesspoint’sbasicsettings.Formoreadvancedconfigurations,pleaserefertoIV.BrowserBasedConfigurationInterface.
11II‐2.BasicSettingsTheinstructionsbelowwillhelpyoutoconfigurethefollowingbasicsettingsoftheaccesspoint:‐ LANIPAddress‐ 2.4GHz&5GHzSSID&Security‐ AdministratorName&Password‐ Time&DateItisrecommendedyouconfigurethesesettingsbeforeusingtheaccesspoint.1. Tochangetheaccesspoint’sLANIPaddress,goto“NetworkSettings”>“LAN‐sideIPAddress”andyouwillseethescreenbelow.2. EntertheIPaddresssettingsyouwishtouseforyouraccesspoint.Youcanuseadynamic(DHCP)orstaticIPaddress,dependingonyournetworkenvironment.Click“Apply”tosavethechangesandwaitafewmomentsfortheaccesspointtoreload.Whenyouchangeyouraccesspoint’sIPaddress,youneedtousethenewIPaddresstoaccessthebrowserbasedconfigurationinterfaceinsteadofthedefaultIP192.168.2.2.
123. TochangetheSSIDofyouraccesspoint’s2.4GHzwirelessnetwork(s),goto“WirelessSetting”>“2.4GHz11bgn”>“Basic”.EnterthenewSSIDforyour2.4GHzwirelessnetworkinthe“SSID1”fieldandclick“Apply”.Toutilizemultiple2.4GHzSSIDs,openthedropdownmenulabelled“EnableSSIDnumber”andselecthowmanySSIDsyourequire.ThenenteranewSSIDinthecorrespondingnumberedfieldsbelow,beforeclicking“Apply”.4. Toconfigurethesecurityofyouraccesspoint’s2.4GHzwirelessnetwork(s),goto“WirelessSetting”>“2.4GHz11bgn”>“Security”.Selectan“AuthenticationMethod”andentera“Pre‐sharedKey”or“EncryptionKey”dependingonyourchoice,thenclick“Apply”.IfusingmultipleSSIDs,specifywhichSSIDtoconfigureusingthe“SSID”dropdownmenu.
135. Goto“WirelessSetting”>“5GHz11ac11an”andrepeatsteps3&4fortheaccesspoint’s5GHzwirelessnetwork.6. Tochangetheadministratornameandpasswordforthebrowserbasedconfigurationinterface,goto“Management”>“Admin”.7. Completethe“AdministratorName”and“AdministratorPassword”fieldsandclick“Apply”.8. Tosetthecorrecttimeforyouraccesspoint,goto“Management”>“DateandTime”.9. Setthecorrecttimeandtimezoneforyouraccesspointusingthedropdownmenus.TheaccesspointalsosupportsNTP(NetworkTimeProtocol)
14soalternativelyyoucanenterthehostnameorIPaddressofatimeserver.Click“Apply”whenyouarefinished.Youcanusethe“AcquireCurrentTimefromyourPC”buttonifyouwishtosettheaccesspointtothesametimeasyourPC.10. Thebasicsettingsofyouraccesspointarenowconfigured.PleaserefertoIII.HardwareInstallationforguidanceonconnectingyouraccesspointtoarouterorPoEswitch.
15II‐3.Wi‐FiProtectedSetup(WPS)Wi‐FiProtectedSetupisasimplewaytoestablishconnectionsbetweenWPScompatibledevices.YoucanusetheWPSbuttontoestablishaconnectionbetweentheaccesspointandaWPS‐compatiblewirelessdevice/client.1. PressandholdtheWPS/Resetbuttononthefrontoftheaccesspointfor2seconds.2. Withintwominutes,activateWPSonyourWPS‐compatiblewirelessdevice.PleasecheckthedocumentationforyourwirelessdeviceforinformationregardingitsWPSfunction.3. Thedeviceswillestablishaconnection.
16III.HardwareInstallation1. ConnectarouterorPoEswitchtotheaccesspoint’sLAN1portusinganEthernetcable.PoEswitchesmustbeconnectedtotheaccesspoint’sLAN1port.2. Ifyouareusingarouter,thenconnectthepoweradaptertotheaccesspoint’s12VDCportandplugthepoweradapterintoapowersupply.3. IfyouareusingaPoE(PoweroverEthernet)switchthenitisnotnecessarytousetheincludedpoweradapter,theaccesspointwillbepoweredbythePoEswitch.DonotusethepoweradapterifyouareusingaPoEswitch.4. Connectalocalnetworkclientorswitchtotheaccesspoint’sLAN2portasrequired.Theaccesspoint’sLAN2portcansupportPoEclients.
17IV. BrowserBasedConfigurationInterfaceThebrowser‐basedconfigurationinterfaceenablesyoutoconfiguretheaccesspoint’sadvancedfeatures.TheWAP1750featuresarangeofadvancedfunctionssuchasMACfiltering,MACRADIUSauthentication,VLANconfigurations,upto32SSIDsandmanymore.Toaccessthebrowserbasedconfigurationinterface:1. ConnectacomputertoyouraccesspointusinganEthernetcable.2. Enteryouraccesspoint’sIPaddressintheURLbarofawebbrowser.Theaccesspoint’sdefaultIPaddressis192.169.2.2.3. Youwillbepromptedforausernameandpassword.Thedefaultusernameis“admin”andthedefaultpasswordis“1234”,thoughitwasrecommendedthatyouchangethepasswordduringsetup(seeII‐2.BasicSettings).Ifyoucannotrememberyourpassword,resettheaccesspointbacktoitsfactorydefaultsettings.RefertoI‐5.Reset4. Youwillarriveatthe“SystemInformation”screenshownbelow.5. Usethemenuacrossthetopanddowntheleftsidetonavigate.
18 6. Click“Apply”tosavechangesandreloadtheaccesspoint,or“Cancel”tocancelchanges.Pleasewaitafewsecondsfortheaccesspointtoreloadafteryou“Apply”changes,asshownbelow.7. Pleaserefertothefollowingchaptersforfulldescriptionsofthebrowserbasedconfigurationinterfacefeatures.
19IV‐1. InformationScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐1‐1. SystemInformationThe“SystemInformation”pagedisplaysbasicsysteminformationabouttheaccesspoint.
20
21ModelDisplaysthemodelnumberoftheaccesspoint.ProductNameDisplaystheproductname forreference,whichconsistsof“AP”plustheMACaddress.UptimeDisplaysthetotaltimesincethedevicewasturnedon.BootFromDisplaysinformationforthebootedhardware,bootedfromeitherUSBorinternalmemory.MACAddressDisplays the accesspoint’sMACaddress.ManagementVLANIDDisplaysthemanagementVLANID.RuntimeCodeVersionDisplays the runtimecodeversion.IPAddressDisplaystheIPaddressofthisdevice.Click“Refresh”toupdatethisvalue.DefaultGatewayDisplaystheIPaddressofthedefaultgateway.DNSIPaddressofDNS(DomainNameServer)
22DHCPServerIPaddressofDHCPServer.WiredLANPortSpecifieswhichLANport(1or2).StatusDisplaysthestatusofthespecifiedLANport(connectedordisconnected).VLANMode/IDDisplaystheVLANmode(taggedoruntagged)andVLANIDforthespecifiedLANport.SeeIV‐2‐3.VLANStatusDisplaysthestatusofthe2.4GHzor5GHzwireless (enabledordisabled).MACAddressDisplays the accesspoint’sMACaddress.ChannelDisplaysthechannelnumberthespecifiedwirelessfrequencyisusingforbroadcast.TransmitPowerDisplaysthewirelessradiotransmitpowerlevelasapercentage.SSIDDisplays the SSID name(s) forthespecifiedfrequency.AuthenticationMethodDisplaystheauthenticationmethodforthespecifiedSSID.SeeIV‐3. WirelessSettingsEncryptionTypeDisplays the encryptiontypeforthespecifiedSSID.SeeIV‐3.WirelessSettingsVLANIDDisplaystheVLANIDforthespecifiedSSID.SeeIV‐2‐3.VLANAdditionalAuthenticationDisplaysthe additionalauthenticationtypeforthespecifiedSSID.SeeIV‐3. WirelessSettingsWirelessClientIsolationDisplayswhetherwirelessclientisolationisinuseforthespecifiedSSID.See IV‐2‐3.VLANRefreshClicktorefreshallinformation.
23IV‐1‐2. WirelessClientsThe“WirelessClients”pagedisplaysinformationaboutallwirelessclientsconnectedtotheaccesspointonthe2.4GHzor5GHzfrequency.AutoRefreshTime Selectatimeintervalfortheclienttablelisttoautomaticallyrefresh.ManualRefreshClickrefresh tomanuallyrefreshtheclienttable.SSIDDisplaystheSSIDwhichtheclientisconnectedto.MACAddressDisplaystheMACaddressoftheclient.TxDisplaysthetotaldatapacketstransmittedbythespecifiedclient.RxDisplaysthetotaldatapacketsreceivedbythespecifiedclient.Signal(%)Displaysthewirelesssignalstrengthforthespecifiedclient.ConnectedTimeDisplaysthetotaltimethewirelessclienthas
24beenconnectedtotheaccesspoint.IdleTimeClientidletimeisthetimeforwhichtheclienthasnottransmittedanydatapacketsi.e.isidle.VendorThevendoroftheclient’swirelessadapterisdisplayedhere.
25IV‐1‐3. WirelessMonitorWirelessMonitorisatoolbuiltintotheaccesspointtoscanandmonitorthesurroundingwirelessenvironment.Selectafrequencyandclick“Scan”todisplayalistofallSSIDswithinrangealongwithrelevantdetailsforeachSSID.ChannelSurveySelectwhichfrequency(orboth)toscan,andclick“Scan”tobegin.ChannelSurveyResultAfterascaniscomplete,click“Export”tosavetheresultstolocalstorage.ChDisplays the channelnumberusedbythespecifiedSSID.SSIDDisplaystheSSID identifiedbythescan.MACAddressDisplays the MACaddressofthewirelessrouter/accesspointforthespecifiedSSID.SecurityDisplaystheauthentication/encryptiontypeofthespecifiedSSID.Signal(%)Displaysthecurrentsignalstrengthofthe
26SSID.TypeDisplaysthe802.11wirelessnetworkingstandard(s)ofthespecifiedSSID.VendorDisplaysthevendorofthewirelessrouter/accesspointforthespecifiedSSID.
27IV‐1‐4. LogThesystemlogdisplayssystemoperationinformationsuchasuptimeandconnectionprocesses.Thisinformationisusefulfornetworkadministrators.Whenthelogisfull,oldentriesareoverwritten.SaveClicktosavethelogasafileonyourlocalcomputer.ClearClearalllogentries.RefreshRefreshthecurrentlog.
28Thefollowinginformation/eventsarerecordedbythelog:USBMount&unmountWirelessClientConnected&disconnectedKeyexchangesuccess&failAuthenticationAuthenticationfailorsuccessful.AssociationSuccessorfailWPSM1‐M8messagesWPSsuccessChangeSettingsSystemBootDisplayscurrentmodelnameNTPClientWiredLinkLANPortlinkstatusandspeedstatusProxyARPProxyARPmodulestart&stopBridgeBridgestart&stop.SNMPSNMPserverstart&stop.HTTPHTTPstart&stop.HTTPSHTTPSstart&stop.SSHSSH‐clientserverstart&stop.TelnetTelnet‐clientserverstartorstop.WLAN(2.4G)WLAN(2.4G]channelstatusandcountry/regionstatusWLAN(5G)WLAN(5G)channelstatusandcountry/regionstatusADT
29IV‐2. NetworkSettingsScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐2‐1. LAN‐SideIPAddressThe“LAN‐sideIPaddress”pageallowsyoutoconfigureyouraccesspointonyourLocalAreaNetwork(LAN).YoucanenabletheaccesspointtodynamicallyreceiveanIPaddressfromyourrouter’sDHCPserveroryoucanspecifyastaticIPaddressforyouraccesspoint,aswellasconfigureDNSservers.Theaccesspoint’sdefaultIPaddressis192.168.2.2.IPAddressAssignmentSelect“DHCPClient”foryouraccesspointtobeassignedadynamicIPaddressfromyourrouter’sDHCPserver,orselect“StaticIP”tomanuallyspecifyastatic/fixedIPaddressforyouraccesspoint(below).IPAddressSpecifytheIPaddresshere.ThisIPaddresswillbeassignedtoyouraccesspointandwillreplacethedefaultIPaddress.
30SubnetMaskSpecifyasubnetmask.Thedefaultvalueis255.255.255.0DefaultGatewayForDHCPusers,select“FromDHCP”togetdefaultgatewayfromyourDHCPserveror“User‐Defined”toenteragatewaymanually.ForstaticIPusers,thedefaultvalueisblank.DHCPuserscanselecttogetDNSservers’IPaddressfromDHCPormanuallyenteravalue.ForstaticIPusers,thedefaultvalueisblank.PrimaryAddressDHCPuserscanselect“FromDHCP”togetprimaryDNSserver’sIPaddressfromDHCPor“User‐Defined”tomanuallyenteravalue.ForstaticIPusers,thedefaultvalueisblank.SecondaryAddressDHCPuserscanselect“FromDHCP”togetsecondaryDNSserver’sIPaddressfromDHCPor“User‐Defined”tomanuallyenteravalue.ForstaticIPusers,thedefaultvalueisblank.
31IV‐2‐2. LANPortThe“LANPort”pageallowsyoutoconfigurethesettingsforyouraccesspoint’stwowiredLAN(Ethernet)ports.WiredLANPortIdentifiesLANport1or2.EnableEnable/disablespecifiedLANport.Speed&DuplexSelectaspeed&duplextypeforspecifiedLANport,orusethe“Auto”value.LANportscanoperateupto1000Mbpsandfull‐duplexenablessimultaneousdatapackettransfer/receive.FlowControlEnable/disableflowcontrol.Flowcontrolcanpausenewsessionrequestuntilcurrentdataprocessingiscomplete,inordertoavoiddeviceoverloadsunderheavytraffic.802.3azEnable/disable802.3az.802.3azisanEnergyEfficientEthernetfeaturewhichdisablesunusedinterfacestoreducepowerusage.
32IV‐2‐3. VLANThe“VLAN”(VirtualLocalAreaNetwork)enablesyoutoconfigureVLANsettings.AVLANisalocalareanetworkwhichmapsworkstationsvirtuallyinsteadofphysicallyandallowsyoutogrouptogetherorisolateusersfromeachother.VLANIDs0–4094aresupported.VLANIDsintherange0–4094aresupported.WiredLANPort/WirelessIdentifiesLANport1or2,orwirelessSSIDs(2.4GHzor5GHz).VLANModeSelect“TaggedPort”or “UntaggedPort”forspecifiedLAN/wirelessinterface.VLANIDSetaVLANIDforspecifiedinterface,if“UntaggedPort”isselected.VLANIDSpecifytheVLANIDofthesubnet.Hostsbelongingtothesubnetcanonlycommunicatewithotherhostsonthesamesubnet.
33IV‐3. WirelessSettingsScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐3‐1. 2.4GHz11bgnThe“2.4GHz11bgn”menuallowsyoutoviewandconfigureinformationforyouraccesspoint’s2.4GHzwirelessnetworkacrossfourcategories:Basic,Advanced,SecurityandWDS.
34IV‐3‐1‐1.BasicThe“Basic”screendisplaysbasicsettingsforyouraccesspoint’s2.4GHzWi‐Finetwork(s).
35WirelessEnableordisabletheaccesspoint’s2.4GHzwirelessradio.Whendisabled,no2.4GHzSSIDswillbeactive.BandSelectthewirelessstandardusedfortheaccesspoint.Combinationsof802.11b,802.11g&802.11ncanbeselected.EnableSSIDNumberSelecthowmanySSIDstoenableforthe2.4GHzfrequencyfromthedropdownmenu.Amaximumof16 canbeenabled.SSID#EntertheSSIDnameforthespecifiedSSID(upto16).TheSSIDcanconsistofanycombinationofupto32alphanumericcharacters.VLANIDSpecifyaVLANIDforeachSSID.AutoChannelEnable/disableautochannelselection.Autochannelselectionwillautomaticallysetthewirelesschannelfortheaccesspoint’s2.4GHzfrequencybasedonavailabilityandpotentialinterference.Whendisabled,selectachannelmanuallyasshowninthenexttable.AutoChannelRangeSelectarangefromwhichtheautochannelsetting(above)willchooseachannel.AutoChannelIntervalSpecifyafrequencyforhowoftentheautochannelsettingwillcheck/reassignthewirelesschannel.Check/uncheckthe“Changechannelevenifclientsareconnected”boxaccordingtoyourpreference.ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),40MHz(higherperformancebutpotentiallyhigherinterference)orAuto(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisthetransmissionrateforcontrolcommunicationframesforwirelessclients.Whenautochannelisdisabled,selectawirelesschannelmanually:ChannelIntervalSelectawirelesschannelfrom1–13.
36ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),40MHz(higherperformancebutpotentiallyhigherinterference)orAuto(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisthetransmissionrateforcontrolcommunicationframesforwirelessclients.
37IV‐3‐1‐2.AdvancedThesesettingsareforexperiencedusersonly.Pleasedonotchangeanyofthevaluesonthispageunlessyouarealreadyfamiliarwiththesefunctions.Changingthesesettingscanadverselyaffecttheperformanceofyouraccesspoint.ContentionSlotSelect“Short”or“Long”–thisvalueisusedforcontentionwindowsinWMM(seeIV‐3‐6.WMM).PreambleTypeSetthewirelessradio preambletype.Thedefaultvalueis“ShortPreamble”.GuardIntervalSettheguardinterval.802.11gProtectionEnable/disable802.11gprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)
38802.11nProtectionEnable/disable802.11nprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)DTIMPeriodSettheDTIM(deliverytrafficindicationmessage)periodvalueofthewirelessradio.Thedefaultvalueis1.RTSThresholdSettheRTSthresholdofthewirelessradio.Thedefaultvalueis2347.FragmentThresholdSetthefragmentthresholdofthewirelessradio.Thedefaultvalueis2346.MulticastRateSetthetransferrateformulticastpacketsorusethe“Auto”setting.TxPowerSetthepoweroutputofthewirelessradio.Youmaynotrequire100%outputpower.Settingalowerpoweroutputcanenhancesecuritysincepotentiallymalicious/unknownusersindistantareaswillnotbeabletoaccessyoursignal.BeaconIntervalSetthebeaconintervalofthewirelessradio.Thedefaultvalueis100.StationKeepaliveIntervalSettheintervalforkeepalivemessagesfromaccesspointtowirelessclienttoverifyifthestationisstillalive.
39IV‐3‐1‐3.SecurityTheaccesspointprovidesvarioussecurityoptions(wirelessdataencryption).Whendataisencrypted,informationtransmittedwirelesslycannotbereadbyanyonewhodoesnotknowthecorrectencryptionkey.It’sessentialtoconfigurewirelesssecurityinordertopreventunauthorisedaccesstoyournetwork.Selecthard‐to‐guesspasswordswhichincludecombinationsofnumbers,lettersandsymbols,andchangeyourpasswordregularly.
40SSIDSelectionSelectwhichSSIDtoconfiguresecuritysettingsfor.BroadcastESSIDEnableordisableESSIDbroadcast.Whenenabled,theESSIDwillbevisibletoclientsasanavailableWi‐Finetwork.Whendisabled,theESSIDwillnotbevisibleasanavailableWi‐Finetworktoclients–clientsmustmanuallyentertheESSIDinordertoconnect.Ahidden(disabled)ESSIDistypicallymoresecurethanavisible(enabled)SSID.WirelessClientIsolationEnableordisablewirelessclientisolation.Wirelessclientisolationpreventsclientsconnectedtotheaccesspointfromcommunicatingwitheachotherandimprovessecurity.Typically,thisfunctionisusefulforcorporateenvironmentsorpublichotspotsandcanpreventbruteforceattacksonclients’usernamesandpasswords.LoadBalancingLoadbalancinglimitsthenumberofwirelessclientsconnectedtoanSSID.Setaloadbalancingvalue(maximum50).AuthenticationMethodSelectanauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriateforyourmethod.AdditionalAuthenticationSelectanadditionalauthenticationmethodfromthedropdownmenuandrefertotheinformationbelow(IV‐3‐1‐3‐6.)appropriateforyourmethod.IV‐3‐1‐3‐1. NoAuthenticationAuthenticationisdisabledandnopassword/keyisrequiredtoconnecttotheaccesspoint.Disablingwirelessauthenticationisnotrecommended.Whendisabled,anybodywithinrangecanconnecttoyourdevice’sSSID.
41IV‐3‐1‐3‐2. WEPWEP(WiredEquivalentPrivacy)isabasicencryptiontype.ForahigherlevelofsecurityconsiderusingWPAencryption.KeyLengthSelect64‐bitor128‐bit.128‐bitismoresecurethan64‐bitandisrecommended.KeyTypeChoosefrom“ASCII”(anyalphanumericalcharacter0‐9,a‐zandA‐Z)or“Hex”(anycharactersfrom0‐9,a‐fandA‐F).DefaultKeySelectwhichencryptionkey(1–4below)isthedefaultkey.Forsecuritypurposes,youcansetuptofourkeys(below)andchangewhichisthedefaultkey.EncryptionKey1–4Enteryourencryptionkey/passwordaccordingtotheformatyouselectedabove.IV‐3‐1‐3‐3. IEEE802.1x/EAPKeyLengthSelect64‐bitor128‐bit.128‐bitismoresecurethan64‐bitandisrecommended.IV‐3‐1‐3‐4. WPA‐PSKWPA‐PSKisasecurewirelessencryptiontypewithstrongdataprotectionanduserauthentication,utilizing128‐bitencryptionkeys.WPATypeSelectfromWPA/WPA2MixedMode‐PSK,WPA2orWPAonly.WPA2issaferthanWPAonly,butnotsupportedbyallwirelessclients.Pleasemakesureyourwirelessclientsupportsyourselection.EncryptionSelect“TKIP/AESMixedMode”or“AES”encryptiontype.KeyRenewalIntervalSpecifyafrequencyforkeyrenewalinminutes.Pre‐SharedKeyChoosefrom“Passphrase”(8–63
42Typealphanumericcharacters)or“Hex”(upto64charactersfrom0‐9,a‐fandA‐F).Pre‐SharedKeyPleaseenter asecuritykey/passwordaccordingtotheformatyouselectedabove.IV‐3‐1‐3‐5. WPA‐EAPWPATypeSelectfromWPA/WPA2MixedMode‐EAP,WPA2‐EAP orWPA‐EAP.EncryptionSelect“TKIP/AESMixedMode”or“AES”encryptiontype.KeyRenewalIntervalSpecifyanfrequencyforkeyrenewalinminutes.IV‐3‐1‐3‐6. AdditionalAuthenticationAdditionalwirelessauthenticationmethodscanalsobeused:MACAddressFilterRestrictwirelessclientsaccessbasedonMACaddressspecifiedintheMACfiltertable.SeeIV‐3‐5.MACFiltertoconfigureMACfiltering.MAC‐RADIUSAuthenticationRestrictwirelessclientsaccessbasedonMACaddressviaaRADIUSserver,orpasswordauthenticationviaaRADIUSserver.SeeIV‐3‐4.RADIUStoconfigureRADIUSservers.WPSmustbedisabledtouseMAC‐RADIUSauthentication.SeeIV‐3‐3.forWPSsettings.
43MACRADIUSPasswordSelectwhethertouseMACaddressorpasswordauthenticationviaRADIUSserver.Ifyouselect“Usethefollowingpassword”,enterthepasswordinthefieldbelow.Thepasswordshouldmatchthe“SharedSecret”usedinIV‐3‐4.RADIUS.MACFilter&MAC‐RADIUSAuthenticationRestrictwirelessclientsaccessusingbothoftheaboveMACfiltering&RADIUSauthenticationmethods.
44IV‐3‐1‐4.WDSWirelessDistributionSystem(WDS)canbridge/repeataccesspointstogetherinanextendednetwork.WDSsettingscanbeconfiguredasshownbelow.WhenusingWDS,configuretheIPaddressofeachaccesspointtobeinthesamesubnetandensurethereisonlyoneactiveDHCPserveramongconnectedaccesspoints,preferablyontheWANside.WDSmustbeconfiguredoneachaccesspoint,usingcorrectMACaddresses.AllaccesspointsshouldusethesamewirelesschannelandWEPkey.
45WDSFunctionalitySelect“WDSwithAP”touseWDSor“WDSDedicatedMode”touseWDSandalsoblockcommunicationwithregularwirelessclients.WhenWDSisused,eachaccesspointshouldbeconfiguredwithcorrespondingMACaddresses,wirelesschannelandWEPkey.LocalMACAddressDisplaystheMACaddressofyouraccesspoint.WDS#EntertheMACaddressforuptofourotherWDAdevicesyouwishtoconnect.VLANModeSpecifytheWDSVLANmode.VLANIDSpecifytheWDSVLANID.EncryptionSelectwhethertouse“None”or“AES”encryptionandenterapre‐sharedkeyforAES.
46IV‐3‐2. 5GHz11ac11anThe“5GHz11ac11an”menuallowsyoutoviewandconfigureinformationforyouraccesspoint’s2.4GHzwirelessnetworkacrossfourcategories:Basic,Advanced,SecurityandWDS.IV‐3‐2‐1.BasicThe“Basic”screendisplaysbasicsettingsforyouraccesspoint’s5GHzWi‐Finetwork(s).
47WirelessEnableordisabletheaccesspoint’s5GHzwirelessradio.Whendisabled,no5GHzSSIDswillbeactive.BandSelectthewirelessstandardusedfortheaccesspoint.Combinationsof802.11a,802.11n&802.11ac canbeselected.EnableSSIDNumberSelecthowmanySSIDstoenableforthe5GHzfrequencyfromthedropdownmenu.Amaximumof16 canbeenabled.SSID#EntertheSSIDnameforthespecifiedSSID(upto16).TheSSIDcanconsistofanycombinationofupto32alphanumericcharacters.VLANIDSpecifyaVLANIDforeachSSID.AutoChannelEnable/disableautochannelselection.Autochannelselectionwillautomaticallysetthewirelesschannelfortheaccesspoint’s5GHzfrequencybasedonavailabilityandpotentialinterference.Whendisabled,selectachannelmanuallyasshowninthenexttable.AutoChannelRangeSelectarangefromwhichtheautochannelsetting(above)willchooseachannel.AutoChannelIntervalSpecifyafrequencyforhowoftentheautochannelsettingwillcheck/reassignthewirelesschannel.Check/uncheckthe“Changechannelevenifclientsareconnected”boxaccordingtoyourpreference.ChannelBandwidthSetthechannelbandwidth:20MHz(lowerperformancebutlessinterference),Auto40/20MHzorAuto80/40/20MHz(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisthetransmissionrateforcontrolcommunicationframesforwirelessclients.Whenautochannelisdisabled,selectawirelesschannelmanually:ChannelIntervalSelectawirelesschannel.ChannelBandwidthSetthechannelbandwidth:20MHz(lower
48performancebutlessinterference),Auto40/20MHzorAuto80/40/20MHz(automaticallyselectbasedoninterferencelevel).BSSBasicRateSetSetaBasicServiceSet(BSS)rate:thisisthetransmissionrateforcontrolcommunicationframesforwirelessclients.
49IV‐3‐2‐2.AdvancedThesesettingsareforexperiencedusersonly.Pleasedonotchangeanyofthevaluesonthispageunlessyouarealreadyfamiliarwiththesefunctions.Changingthesesettingscanadverselyaffecttheperformanceofyouraccesspoint.GuardIntervalSettheguardinterval.802.11nProtectionEnable/disable802.11nprotection,whichincreasesreliabilitybutreducesbandwidth(clientswillsendRequesttoSend(RTS)toaccesspoint,andaccesspointwillbroadcastCleartoSend(CTS),beforeapacketissentfromclient.)DTIMPeriodSettheDTIM(deliverytrafficindicationmessage)periodvalueofthewirelessradio.Thedefaultvalueis1.RTSThresholdSettheRTSthresholdofthewirelessradio.Thedefaultvalueis2347.FragmentThresholdSetthefragmentthresholdofthewirelessradio.Thedefaultvalueis2346.
50MulticastRateSetthetransferrateformulticastpacketsorusethe“Auto”setting.TxPowerSetthepoweroutputofthewirelessradio.Youmaynotrequire100%outputpower.Settingalowerpoweroutputcanenhancesecuritysincepotentiallymalicious/unknownusersindistantareaswillnotbeabletoaccessyoursignal.BeaconIntervalSetthebeaconintervalofthewirelessradio.Thedefaultvalueis100.StationKeepaliveIntervalSettheintervalforkeepalivemessagesfromaccesspointtowirelessclienttoverifyifthestationisstillalive.
51IV‐3‐2‐3.SecurityTheaccesspointprovidesvarioussecurityoptions(wirelessdataencryption).Whendataisencrypted,informationtransmittedwirelesslycannotbereadbyanyonewhodoesnotknowthecorrectencryptionkey.It’sessentialtoconfigurewirelesssecurityinordertopreventunauthorisedaccesstoyournetwork.Selecthard‐to‐guesspasswordswhichincludecombinationsofnumbers,lettersandsymbols,andchangeyourpasswordregularly.SSIDSelectionSelectwhichSSIDtoconfiguresecuritysettingsfor.BroadcastESSIDEnableordisableESSIDbroadcast.Whenenabled,theESSIDwillbevisibletoclientsasanavailableWi‐Finetwork.Whendisabled,theESSIDwillnotbevisibleasanavailableWi‐Finetworktoclients–clientsmustmanuallyentertheESSIDinordertoconnect.Ahidden(disabled)ESSIDistypicallymoresecurethanavisible(enabled)SSID.
52WirelessClientIsolationEnableordisablewirelessclientisolation.Wirelessclientisolationpreventsclientsconnectedtotheaccesspointfromcommunicatingwitheachotherandimprovessecurity.Typically,thisfunctionisusefulforcorporateenvironmentsorpublichotspotsandcanpreventbruteforceattacksonclients’usernamesandpasswords.LoadBalancingLoadbalancinglimitsthenumberofwirelessclientsconnectedtoanSSID.Setaloadbalancingvalue(maximum50).AuthenticationMethodSelectanauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriateforyourmethod.AdditionalAuthenticationSelectanadditionalauthenticationmethodfromthedropdownmenuandrefertotheinformationbelowappropriateforyourmethod.PleasereferbacktoIV‐3‐1‐3.Securityformoreinformationonauthenticationandadditionalauthenticationtypes.
53IV‐3‐2‐4.WDSWirelessDistributionSystem(WDS)canbridge/repeataccesspointstogetherinanextendednetwork.WDSsettingscanbeconfiguredasshownbelow.WhenusingWDS,configuretheIPaddressofeachaccesspointtobeinthesamesubnetandensurethereisonlyoneactiveDHCPserveramongconnectedaccesspoints,preferablyontheWANside.WDSmustbeconfiguredoneachaccesspoint,usingcorrectMACaddresses.AllaccesspointsshouldusethesamewirelesschannelandWEPkey.
54WDSFunctionalitySelect“WDSwithAP”touseWDSor“WDSDedicatedMode”touseWDSandalsoblockcommunicationwithregularwirelessclients.WhenWDSisused,eachaccesspointshouldbeconfiguredwithcorrespondingMACaddresses,wirelesschannelandWEPkey.LocalMACAddressDisplaystheMACaddressofyouraccesspoint.WDS#EntertheMACaddressforuptofourotherWDAdevicesyouwishtoconnect.VLANModeSpecifytheWDSVLANmode.VLANIDSpecifytheWDSVLANID.EncryptionSelectwhethertouse“None”or“AES”encryptionandenter apre‐sharedkeyforAES.
55IV‐3‐3.WPSWi‐FiProtectedSetupisasimplewaytoestablishconnectionsbetweenWPScompatibledevices.WPScanbeactivatedoncompatibledevicesbypushingaWPSbuttononthedeviceorfromwithinthedevice’sfirmware/configurationinterface(knownasPBCor“PushButtonConfiguration”).WhenWPSisactivatedinthecorrectmannerandatthecorrecttimefortwocompatibledevices,theywillautomaticallyconnect.“PINcodeWPS”isavariationofPBCwhichincludestheadditionaluseofaPINcodebetweenthetwodevicesforverification.Pleaserefertomanufacturer’sinstructionsforyourotherWPSdevice.
56WPSCheck/uncheckthisboxtoenable/disableWPSfunctionality.WPSmustbedisabledwhenusingMAC‐RADIUSauthentication(seeIV‐3‐1‐3‐6&IV‐3‐4).ProductPINDisplaystheWPSPINcodeofthe device,usedforPINcodeWPS.YouwillberequiredtoenterthisPINcodeintoanotherWPSdeviceforPINcodeWPS.Click“GeneratePIN”togenerateanewWPSPINcode.Push‐ButtonWPS Click“Start”toactivateWPSontheaccesspointforapproximately2minutes.Thishasthesameeffectasphysicallypushingtheaccesspoint’sWPSbutton.WPSbyPINEnterthePINcodeofanotherWPSdeviceandclick“Start”toattempttoestablishaWPSconnection forapproximately2minutes.WPSStatusWPSsecuritystatusisdisplayedhere.Click“Release”tocleartheexistingstatus.
57IV‐3‐4.RADIUSTheRADIUSsubmenuallowsyoutoconfiguretheaccesspoint’sRADIUSserversettings,categorizedintothreesubmenus:RADIUSsettings,InternalServerandRADIUSaccounts.ARADIUSserverprovidesuser‐basedauthenticationtoimprovesecurityandofferwirelessclientcontrol–userscanbeauthenticatedbeforegainingaccesstoanetwork.Theaccesspointcanutilizebothaprimaryandsecondary(backup)RADIUSserverforeachofitswirelessfrequencies(2.4GHz&5GHz).ExternalRADIUSserverscanbeusedortheaccesspoint’sinternalRADIUSservercanbeused.TouseRADIUSservers,goto“WirelessSettings”“Security”andselect“MACRADIUSAuthentication”“AdditionalAuthentication”andselect“MACRADIUSAuthentication”(seeIV‐3‐1‐3.&IV‐3‐2‐3).
58IV‐3‐4‐1.RADIUSSettingsConfiguretheRADIUSserversettingsfor2.4GHz&5GHz.Eachfrequencycanuseaprimaryandsecondary(backup)RADIUSserver.
59RADIUSTypeSelect“Internal”tousetheaccesspoint’sbuilt‐inRADIUSserveror“external”touseanexternalRADIUSserver.RADIUSServerEntertheRADIUS serverhostIPaddress.AuthenticationPortSettheUDPportusedintheauthenticationprotocoloftheRADIUSserver.Valuemustbebetween1–65535.SharedSecretEnterasharedsecret/passwordbetween1–99charactersinlength.Thisshouldmatchthe“MAC‐RADIUS”passwordusedinIV‐3‐1‐3‐6orIV‐3‐2‐3.SessionTimeoutSetadurationofsessiontimeoutinsecondsbetween0–86400.AccountingEnableordisableRADIUSaccounting.AccountingPortWhenaccountingisenabled(above),settheUDPportusedintheaccountingprotocoloftheRADIUSserver.Valuemustbebetween1–65535.
60IV‐3‐4‐2.InternalServerTheaccesspointfeaturesabuilt‐inRADIUSserverwhichcanbeconfiguredasshownbelow.usedwhen“Internal”isselectedfor“RADIUSType”inthe“WirelessSettings”“RADIUS”“RADIUSSettings”menu.TouseRADIUSservers,goto“WirelessSettings”“Security”andselect“MACRADIUSAuthentication”“AdditionalAuthentication”andselect“MACRADIUSAuthentication”(seeIV‐3‐1‐3.&IV‐3‐2‐3).InternalServerCheck/unchecktoenable/disabletheaccesspoint’sinternalRADIUSserver.EAPInternalAuthenticationSelectEAPinternalauthenticationtypefromthedropdownmenu.EAPCertificateFileFormatDisplaystheEAPcertificatefileformat:PCK#12(*.pfx/*.p12)EAPCertificateFileClick“Upload”toopenanewwindowandselectthelocationofanEAPcertificatefiletouse.Ifnocertificatefileisuploaded,theinternalRADIUSserverwilluseaself‐madecertificate.
61SharedSecretEnterasharedsecret/passwordforusebetweentheinternalRADIUSserverandRADIUSclient.Thesharedsecretshouldbe1–99charactersinlength.Thisshouldmatchthe“MAC‐RADIUS”passwordusedinIV‐3‐1‐3‐6orIV‐3‐2‐3.SessionTimeoutSetadurationofsessiontimeoutinsecondsbetween0–86400.TerminationActionSelectatermination‐actionattribute:“Reauthentication”sendsaRADIUSrequesttotheaccesspoint,“Not‐Reathentication”sendsadefaulttermination‐actionattributetotheaccesspoint,“Not‐Send”notermination‐actionattributeissenttotheaccesspoint.
62IV‐3‐4‐3.RADIUSAccountsTheinternalRADIUSservercanauthenticateupto256useraccounts.The“RADIUSAccounts”pageallowsyoutoconfigureandmanageusers.
63UserNameEnterausernamehere.AddClick“Add”toaddtheusertotheuserregistrationlist.ResetCleartextfromtheusernamebox.SelectChecktheboxtoselectauser.UserNameDisplaystheusername.PasswordDisplaysifspecifiedusernamehasapassword(configured)ornot(notconfigured).CustomizeClick“Edit”toopenanewfieldtoset/editapasswordforthespecifiedusername(below).DeleteSelectedDeleteselecteduserfromtheuserregistrationlist.DeleteAllDeleteallusersfromtheuserregistrationlist.EditUserRegistrationListUserNameExistingusernameisdisplayedhereandcanbeeditedaccordingtoyourpreference.PasswordEnteroreditapasswordforthespecifieduser.
64IV‐3‐5. MACFilterMacfilteringisasecurityfeaturethatcanhelptopreventunauthorizedusersfromconnectingtoyouraccesspoint.Thisfunctionallowsyoutodefinealistofnetworkdevicespermittedtoconnecttotheaccesspoint.DevicesareeachidentifiedbytheiruniqueMACaddress.IfadevicewhichisnotonthelistofpermittedMACaddressesattemptstoconnecttotheaccesspoint,itwillbedenied.ToenableMACfiltering,goto“WirelessSettings”“2.4GHz11bgn/5GHz11ac11an”“Security”“AdditionalAuthentication”andselect“MACFilter”(seeIV‐3‐1‐3.&IV‐3‐2‐3).TheMACaddressfilteringtableisdisplayedbelow:
65AddMACAddress EnteraMACaddressofcomputerornetworkdevicemanuallywithoutdashesorcolonse.g.forMACaddress‘aa‐bb‐cc‐dd‐ee‐ff’enter‘aabbccddeeff’.AddClick“Add” toaddtheMACaddresstotheMACaddressfilteringtable.ResetClearallfields.MACaddressentrieswillbelistedinthe“MACAddressFilteringTable”.Selectanentryusingthe“Select”checkbox.SelectDeleteselectedorallentriesfromthetable.MACAddressTheMACaddressislistedhere.DeleteSelectedDeletetheselectedMACaddressfromthelist.DeleteAllDeleteallentriesfromtheMACaddressfilteringtable.BackupClick“Backup”tosaveacopyoftheMACfilteringtable.Anewwindowwillpopupforyoutoselectalocationtosavethefile.
66IV‐3‐6.WMMWi‐FiMultimedia(WMM)isaWi‐FiAllianceinteroperabilitycertificationbasedontheIEEE802.11estandard,whichprovidesQualityofService(QoS)featurestoIEE802.11networks.WMMprioritizestrafficaccordingtofourcategories:background,besteffort,videoandvoice.ConfiguringWMMconsistsofadjustingparametersonqueuesfordifferentcategoriesofwirelesstraffic.Trafficissenttothefollowingqueues:BackgroundLowPriorityHighthroughput,nontimesensitivebulkdatae.g.FTPBestEffortMediumPriorityTraditionalIPdata,mediumthroughputanddelay.VideoHighPriorityTimesensitivevideodatawithminimumtimedelay.VoiceHighPriorityTimesenstiviedatasuchasVoIPandstreamingmedia withminimumtimedelay.Queuesautomaticallyprovideminimumtransmissiondelaysforvideo,voice,multimediaandcriticalapplications.Thevaluescanfurtherbeadjustedmanually:
67CWMinMinimumContentionWindow (milliseconds):Thisvalueisinputtotheinitialrandombackoffwaittimealgorithmforretryofadataframetransmission.Thebackoffwaittimewillbegeneratedbetween0andthisvalue.Iftheframeisnotsent,therandombackoffvalueisdoubleduntilthevaluereachesthenumberdefinedbyCWMax(below).Validvaluesare1,3,7,15,31,63,127,255,511or1024.TheCWMinvaluemustbelowerthantheCWMaxvalue.Thecontentionwindowschemehelpstoavoidframecollisionsanddeterminepriorityofframetransmission.Ashorterwindowhasahigherprobability(priority)oftransmission.CWMaxMaximumContentionWindow (milliseconds):Thisvalueistheupperlimittorandombackoffvaluedoubling(seeabove).Validvaluesare1,3,7,15,31,63,127,255,511or1024.AIFSNArbitrationInter‐FrameSpace (milliseconds):SpecifiesadditionaltimebetweenwhenachannelgoesidleandtheAP/clientsendsdataframes.TrafficwithalowerAIFSNvaluehasahigherpriority.TxOPTransmissionOpportunity(milliseconds):ThemaximumintervaloftimeanAP/clientcantransmit.Thismakeschannelaccessmoreefficientlyprioritized.Avalueof0meansonlyoneframepertransmission.Agreatervalueeffectshigher priority.
68IV‐4. ManagementScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐4‐1. AdminYoucanchangethepasswordusedtologintothebrowser‐basedconfigurationinterfacehere.Itisadvisedtodosoforsecuritypurposes.Ifyouchangetheadministratorpassword,pleasemakeanoteofthenewpassword.Intheeventthatyouforgetthispasswordandareunabletologintothebrowserbasedconfigurationinterface,seeI‐5.Resetforhowtoresettheaccesspoint.
69AdministratorNameSettheaccesspoint’sadministratorname.Thisisusedtologintothebrowserbasedconfigurationinterface.AdministratorPasswordSettheaccesspoint’sadministratorpassword.Thisisusedtologintothebrowserbasedconfigurationinterface.ProductNameEdittheproductnameaccordingtoyourpreference.Thisnameisusedforreferencepurposes.ManagementProtocolCheck/unchecktheboxestoenable/disablespecifiedmanagementinterfaces(seebelow).
70WhenSNMPisenabled,completetheSNMPfieldsbelow.SNMPVersionSelectSNMPversion appropriateforyourSNMPmanager.SNMPGetCommunityEnteranSNMPGetCommunitynameforverificationwiththeSNMPmanagerforSNMP‐GET requests.SNMPSetCommunityEnteranSNMPSetCommunitynameforverificationwiththeSNMPmanagerforSNMP‐SETrequests.SNMPTrapEnableordisableSNMPTrap tonotifySNMPmanagerofnetworkerrors.SNMPTrapCommunityEnteranSNMPTrapCommunity nameforverificationwiththeSNMPmanagerforSNMP‐TRAPrequests.SNMPTrapManagerSpecifytheIPaddressorsevername(maximum128characters)oftheSNMPmanager.HTTPInternetbrowserHTTPprotocolmanagementinterfaceHTTPSInternetbrowserHTTPSprotocolmanagementinterfaceTELNETClientterminalwithtelnetprotocolmanagementinterfaceSSHClientterminalwithSSHprotocolversion1or2managementinterfaceSNMPNetworkmanagementprotocol.SNMPv1,v2&v3protocolsupported.SNMPv2canbeusedwithcommunitybasedauthentication.SNMPv3usesuser‐basedsecuritymodel(UM)architecture.FTPDThirdpartyFTPserver.SNMPThirdpartyTFTPserver.
71IV‐4‐2. DateandTimeYoucanconfigurethetimezonesettingsofyouraccesspointhere.Thedateandtimeofthedevicecanbeconfiguredmanuallyorcanbesynchronizedwithatimeserver.LocalTimeSettheaccesspoint’sdateandtimemanuallyusingthedropdownmenus.AcquireCurrentTimefromyourPCClick“AcquireCurrentTimefromYourPC”toentertherequiredvaluesautomaticallyaccordingtoyourcomputer’scurrenttimeanddate.UseNTPTheaccesspointalsosupportsNTP(NetworkTimeProtocol)forautomatictimeanddatesetup.ServerNameEnterthehostnameorIPaddressofthetimeserverifyouwish.
72UpdateIntervalSpecifyafrequency(inhours)fortheaccesspointtoupdate/synchronizewiththeNTPserver.TimeZoneSelectthetimezoneofyourcountry/region.Ifyourcountry/regionisnotlisted,pleaseselectanothercountry/regionwhosetimezoneisthesameasyours.
73IV‐4‐3. SyslogServerThesystemlogcanbesenttoaserverortoattachedUSBstorage.TransferLogsCheck/unchecktheboxtoenable/disabletheuseofasyslogserver,andenterahostname,domainorIPaddressfortheserver,consistingofupto128alphanumericcharacters.CopyLogstoAttachedUSBDeviceCheck/unchecktheboxtoenable/disablecopyinglogstoattachedUSBstorage.
74IV‐4‐4. I’mHereTheaccesspointfeaturesabuilt‐inbuzzerwhichcansoundoncommandusingthe“I’mHere”page.Thisisusefulfornetworkadministratorsandengineersworkingincomplexnetworkenvironmentstolocatetheaccesspoint.Thebuzzerisloud!DurationofSound Setthedurationfor whichthebuzzerwillsoundwhenthe“SoundBuzzer”buttonisclicked.SoundBuzzerActivatethebuzzersoundfortheabovespecifieddurationoftime.
75IV‐5. AdvancedScreenshotsdisplayedareexamples.Theinformationshownonyourscreenwillvarydependingonyourconfiguration.IV‐5‐1. LEDSettingsTheaccesspoint’sLEDscanbemanuallyenabledordisabledaccordingtoyourpreference.PowerLEDSelectonoroff.DiagLEDSelectonoroff.
76IV‐5‐2. UpdateFirmwareThe“Firmware”pageallowsyoutoupdatethesystemfirmwaretoamorerecentversion.Updatedfirmwareversionsoftenofferincreasedperformanceandsecurity,aswellasbugfixes.YoucandownloadthelatestfirmwarefromtheEdimaxwebsite.Donotswitchoffordisconnecttheaccesspointduringafirmwareupgrade,asthiscoulddamagethedevice.UpdateFirmwareFromSelecttouploadfirmwarefrom yourlocalcomputerorfromanattachedUSBdevice.FirmwareUpdateFileClick“Browse”toopenanewwindowtolocateandselectthefirmwarefileinyourcomputer.UpdateClick“Update”touploadthespecifiedfirmwarefiletoyouraccesspoint.
77IV‐5‐3. Save/RestoreSettingsTheaccesspoint’s“Save/RestoreSettings”pageenablesyoutosave/backuptheaccesspoint’scurrentsettingsasafiletoyourlocalcomputeroraUSBdeviceattachedtotheaccesspoint,andrestoretheaccesspointtopreviouslysavedsettings.UsingDeviceSelecttosavetheaccesspoint’ssettingstoyourlocalcomputerortoanattachedUSBdevice.SaveSettingsClick“Save”tosavesettingsandanewwindowwillopentospecifyalocationtosavethesettingsfile.Ifsavingsettingstoyourcomputer,youcanalsocheckthe“Encrypttheconfigurationfilewitha
78password”box andenterapasswordtoprotectthefileinthefieldunderneath,ifyouwish.RestoreSettingsClickthebrowsebuttontofindapreviouslysavedsettingsfileandthenclick“Restore”toreplaceyourcurrentsettings.Ifyoursettingsfileisencryptedwithapassword,checkthe“Openfilewithpassword”boxandenterthepasswordinthefieldunderneath.
79IV‐5‐4. FactoryDefaultIftheaccesspointmalfunctionsorisnotresponding,thenitisrecommendedthatyourebootthedevice(seeIV‐5.5)orresetthedevicebacktoitsfactorydefaultsettings.Youcanresettheaccesspointbacktoitsdefaultsettingsusingthisfeatureifthelocationoftheaccesspointisnotconvenienttoaccesstheresetbutton.FactoryDefaultClick“FactoryDefault” torestoresettingstothefactorydefault.Apop‐upwindowwillappearandaskyoutoconfirm.Afterresettingtofactorydefaults,pleasewaitfortheaccesspointtoresetandrestart.
80IV‐5‐5. RebootIftheaccesspointmalfunctionsorisnotresponding,thenitisrecommendedthatyourebootthedeviceorresettheaccesspointbacktoitsfactorydefaultsettings(seeIV‐5‐4).Youcanreboottheaccesspointremotelyusingthisfeature.RebootClick“Reboot”torebootthedevice.Acountdownwillindicatetheprogressofthereboot.
81V. AppendixV‐1.ConfiguringyourIPaddressTheaccesspointusesthedefaultIPaddress192.168.2.2.Inordertoaccessthebrowserbasedconfigurationinterface,youneedtomodifytheIPaddressofyourcomputertobeinthesameIPaddresssubnete.g.192.168.2.x(x=3–254).TheprocedureformodifyingyourIPaddressvariesacrossdifferentoperatingsystems;pleasefollowtheguideappropriateforyouroperatingsystem.InthefollowingexamplesweusetheIPaddress192.168.2.10thoughyoucanuseanyIPaddressintherange192.168.2.x(x=3–254).
82V‐1‐1.WindowsXP1. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.Double‐clickthe“NetworkandInternetConnections”icon,click“NetworkConnections”,andthendouble‐click“LocalAreaConnection”.The“LocalAreaConnectionStatus”windowwillthenappear,click“Properties”.2. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
83
84V‐1‐2.WindowsVista1. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.Click“ViewNetworkStatusandTasks”,thenclick“ManageNetworkConnections”.Right‐click“LocalAreaNetwork”,thenselect“Properties”.The“LocalAreaConnectionProperties”windowwillthenappear,select“InternetProtocolVersion4(TCP/IPv4)”,andthenclick“Properties”.2. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
85
86V‐1‐3.Windows71. Clickthe“Start”button(itshouldbelocatedinthelower‐leftcornerofyourcomputer),thenclick“ControlPanel”.2. Under“NetworkandInternet”click“Viewnetworkstatusandtasks”.3. Click“LocalAreaConnection”.
874. Click“Properties”.
885. Select“InternetProtocolVersion4(TCP/IPv4)andthenclick“Properties”.6. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
89
90V‐1‐4.Windows81. FromtheWindows8Startscreen,youneedtoswitchtodesktopmode.Moveyourcursertothebottomleftofthescreenandclick.2. Indesktopmode,clicktheFileExplorericoninthebottomleftofthescreen,asshownbelow.
913. Rightclick“Network”andthenselect“Properties”.4. Inthewindowthatopens,select“Changeadaptersettings”fromtheleft
92side.5. Chooseyourconnectionandrightclick,thenselect“Properties”.
936. Select“InternetProtocolVersion4(TCP/IPv4)andthenclick“Properties”.7. Select“UsethefollowingIPaddress”,theninputthefollowingvalues:IPaddress:192.168.2.10SubnetMask:255.255.255.0Click‘OK’whenfinished.
94IV‐1‐5. Mac1. HaveyourMacintoshcomputeroperateasusual,andclickon“SystemPreferences”2. InSystemPreferences,clickon“Network”.3. Clickon“Ethernet”intheleftpanel.4. Openthedrop‐downmenulabeled“ConfigureIPv4”andselect“Manually”.
95 5. EntertheIPaddress192.168.2.10andsubnetmask255.255.255.0.Clickon“Apply”tosavethechanges.
96V‐1‐6.GlossaryDefaultGateway(Accesspoint):Everynon‐accesspointIPdeviceneedstoconfigureadefaultgateway’sIPaddress.WhenthedevicesendsoutanIPpacket,ifthedestinationisnotonthesamenetwork,thedevicehastosendthepackettoitsdefaultgateway,whichwillthensenditouttowardsthedestination.DHCP:DynamicHostConfigurationProtocol.ThisprotocolautomaticallygiveseverycomputeronyourhomenetworkanIPaddress.DNSServerIPAddress:DNSstandsforDomainNameSystem,whichallowsInternetserverstohaveadomainname(suchaswww.Broadbandaccesspoint.com)andoneormoreIPaddresses(suchas192.34.45.8).ADNSserverkeepsadatabaseofInternetserversandtheirrespectivedomainnamesandIPaddresses,sothatwhenadomainnameisrequested(asintyping"Broadbandaccesspoint.com"intoyourInternetbrowser),theuserissenttotheproperIPaddress.TheDNSserverIPaddressusedbythecomputersonyourhomenetworkisthelocationoftheDNSserveryourISPhasassignedtoyou.DSLModem:DSLstandsforDigitalSubscriberLine.ADSLmodemusesyourexistingphonelinestotransmitdataathighspeeds.Ethernet:Astandardforcomputernetworks.Ethernetnetworksareconnectedbyspecialcablesandhubs,andmovedataaroundatupto10/100millionbitspersecond(Mbps).IPAddressandNetwork(Subnet)Mask:IPstandsforInternetProtocol.AnIPaddressconsistsofaseriesoffournumbersseparatedbyperiods,thatidentifiesasingle,uniqueInternetcomputerhostinanIPnetwork.Example:192.168.2.1.Itconsistsof2portions:theIPnetworkaddress,andthehostidentifier.TheIPaddressisa32‐bitbinarypattern,whichcanberepresentedasfourcascadeddecimalnumbersseparatedby“.”:aaa.aaa.aaa.aaa,whereeach“aaa”canbeanythingfrom000to255,orasfourcascadedbinarynumbersseparatedby“.”:bbbbbbbb.bbbbbbbb.bbbbbbbb.bbbbbbbb,whereeach“b”caneitherbe0or1.
97Anetworkmaskisalsoa32‐bitbinarypattern,andconsistsofconsecutiveleading1’sfollowedbyconsecutivetrailing0’s,suchas11111111.11111111.11111111.00000000.Thereforesometimesanetworkmaskcanalsobedescribedsimplyas“x”numberofleading1’s.Whenbotharerepresentedsidebysideintheirbinaryforms,allbitsintheIPaddressthatcorrespondto1’sinthenetworkmaskbecomepartoftheIPnetworkaddress,andtheremainingbitscorrespondtothehostID.Forexample,iftheIPaddressforadeviceis,initsbinaryform,11011001.10110000.10010000.00000111,andifitsnetworkmaskis,11111111.11111111.11110000.00000000Itmeansthedevice’snetworkaddressis11011001.10110000.10010000.00000000,anditshostIDis,00000000.00000000.00000000.00000111.ThisisaconvenientandefficientmethodforaccesspointstorouteIPpacketstotheirdestination.ISPGatewayAddress:(seeISPfordefinition).TheISPGatewayAddressisanIPaddressfortheInternetaccesspointlocatedattheISP'soffice.ISP:InternetServiceProvider.AnISPisabusinessthatprovidesconnectivitytotheInternetforindividualsandotherbusinessesororganizations.LAN:LocalAreaNetwork.ALANisagroupofcomputersanddevicesconnectedtogetherinarelativelysmallarea(suchasahouseoranoffice).YourhomenetworkisconsideredaLAN.MACAddress:MACstandsforMediaAccessControl.AMACaddressisthehardwareaddressofadeviceconnectedtoanetwork.TheMACaddressisauniqueidentifierforadevicewithanEthernetinterface.Itiscomprisedoftwoparts:3bytesofdatathatcorrespondstotheManufacturerID(uniqueforeachmanufacturer),plus3bytesthatareoftenusedastheproduct’sserialnumber.NAT:NetworkAddressTranslation.ThisprocessallowsallofthecomputersonyourhomenetworktouseoneIPaddress.Usingthebroadbandaccesspoint’sNATcapability,youcanaccesstheInternetfromanycomputeronyourhomenetworkwithouthavingtopurchasemoreIPaddressesfromyourISP.Port:NetworkClients(LANPC)usesportnumberstodistinguishonenetworkapplication/protocoloveranother.Belowisalistofcommonapplicationsandprotocol/portnumbers:
98ApplicationProtocolPortNumberTelnetTCP23FTPTCP21SMTPTCP25POP3TCP110H.323TCP1720SNMPUCP161SNMPTrapUDP162HTTPTCP80PPTPTCP1723PCAnywhereTCP5631PCAnywhereUDP5632Accesspoint:AaccesspointisanintelligentnetworkdevicethatforwardspacketsbetweendifferentnetworksbasedonnetworklayeraddressinformationsuchasIPaddresses.SubnetMask:Asubnetmask,whichmaybeapartoftheTCP/IPinformationprovidedbyyourISP,isasetoffournumbers(e.g.255.255.255.0)configuredlikeanIPaddress.ItisusedtocreateIPaddressnumbersusedonlywithinaparticularnetwork(asopposedtovalidIPaddressnumbersrecognizedbytheInternet,whichmustbeassignedbyInterNIC).TCP/IP,UDP:TransmissionControlProtocol/InternetProtocol(TCP/IP)andUnreliableDatagramProtocol(UDP).TCP/IPisthestandardprotocolfordatatransmissionovertheInternet.BothTCPandUDParetransportlayerprotocol.TCPperformspropererrordetectionanderrorrecovery,andthusisreliable.UDPontheotherhandisnotreliable.TheybothrunontopoftheIP(InternetProtocol),anetworklayerprotocol.WAN:WideAreaNetwork.Anetworkthatconnectscomputerslocatedingeographicallyseparateareas(e.g.differentbuildings,cities,countries).TheInternetisawideareanetwork.Web‐basedmanagementGraphicalUserInterface(GUI):Manydevicessupportagraphicaluserinterfacethatisbasedonthewebbrowser.ThismeanstheusercanusethefamiliarNetscapeorMicrosoftInternetExplorertoControl/configureormonitorthedevicebeingmanaged.
99COPYRIGHTCopyrightEdimaxTechnologyCo.,Ltd.allrightsreserved.Nopartofthispublicationmaybereproduced,transmitted,transcribed,storedinaretrievalsystem,ortranslatedintoanylanguageorcomputerlanguage,inanyformorbyanymeans,electronic,mechanical,magnetic,optical,chemical,manualorotherwise,withoutthepriorwrittenpermissionfromEdimaxTechnologyCo.,Ltd.EdimaxTechnologyCo.,Ltd.makesnorepresentationsorwarranties,eitherexpressedorimplied,withrespecttothecontentshereofandspecificallydisclaimsanywarranties,merchantability,orfitnessforanyparticularpurpose.Anysoftwaredescribedinthismanualissoldorlicensedasis.Shouldtheprogramsprovedefectivefollowingtheirpurchase,thebuyer(andnotthiscompany,itsdistributor,oritsdealer)assumestheentirecostofallnecessaryservicing,repair,andanyincidentalorconsequentialdamagesresultingfromanydefectinthesoftware.EdimaxTechnologyCo.,Ltd.reservestherighttorevisethispublicationandtomakechangesfromtimetotimeinthecontentshereofwithouttheobligationtonotifyanypersonofsuchrevisionorchanges.TheproductyouhavepurchasedandthesetupscreenmayappearslightlydifferentfromthoseshowninthisQIG.Thesoftwareandspecificationsaresubjecttochangewithoutnotice.Pleasevisitourwebsitewww.edimax.comforupdates.Allbrandandproductnamesmentionedinthismanualaretrademarksand/orregisteredtrademarksoftheirrespectiveholders.
100FederalCommunicationCommissionInterferenceStatementThisequipmenthasbeentestedandfoundtocomplywiththelimitsforaClassBdigitaldevice,pursuanttoPart15ofFCCRules.Theselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferenceinaresidentialinstallation.Thisequipmentgenerates,uses,andcanradiateradiofrequencyenergyand,ifnotinstalledandusedinaccordancewiththeinstructions,maycauseharmfulinterferencetoradiocommunications.However,thereisnoguaranteethatinterferencewillnotoccurinaparticularinstallation.Ifthisequipmentdoescauseharmfulinterferencetoradioortelevisionreception,whichcanbedeterminedbyturningtheequipmentoffandon,theuserisencouragedtotrytocorrecttheinterferencebyoneormoreofthefollowingmeasures:1.Reorientorrelocatethereceivingantenna.2.Increasetheseparationbetweentheequipmentandreceiver.3.Connecttheequipmentintoanoutletonacircuitdifferentfromthattowhichthereceiverisconnected.4.Consultthedealeroranexperiencedradiotechnicianforhelp.FCCCautionThisdeviceanditsantennamustnotbeco‐locatedoroperatinginconjunctionwithanyotherantennaortransmitter.ThisdevicecomplieswithPart15oftheFCCRules.Operationissubjecttothefollowingtwoconditions:(1)thisdevicemaynotcauseharmfulinterference,and(2)thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.Anychangesormodificationsnotexpresslyapprovedbythepartyresponsibleforcompliancecouldvoidtheauthoritytooperateequipment.FederalCommunicationsCommission(FCC)RadiationExposureStatementThis equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. R&TTEComplianceStatementThisequipmentcomplieswithalltherequirementsofDIRECTIVE1999/5/ECOFTHEEUROPEANPARLIAMENTANDTHECOUNCILofMarch9,1999onradioequipmentandtelecommunicationterminalequipmentandthemutualrecognitionoftheirconformity(R&TTE).TheR&TTEDirectiverepealsandreplacesinthedirective98/13/EEC(TelecommunicationsTerminalEquipmentandSatelliteEarthStationEquipment)AsofApril8,2000.SafetyThisequipmentisdesignedwiththeutmostcareforthesafetyofthosewhoinstallanduseit.However,specialattentionmustbepaidtothedangersofelectricshockandstaticelectricitywhenworkingwithelectricalequipment.Allguidelinesofthisandofthecomputermanufacturemustthereforebeallowedatalltimestoensurethesafeuseoftheequipment.EUCountriesIntendedforUseTheETSIversionofthisdeviceisintendedforhomeandofficeuseinAustria,Belgium,Bulgaria,Cyprus,Czech,Denmark,Estonia,Finland,France,Germany,Greece,Hungary,Ireland,Italy,Latvia,Lithuania,Luxembourg,Malta,Netherlands,Poland,Portugal,Romania,Slovakia,Slovenia,Spain,Sweden,Turkey,andUnitedKingdom.TheETSIversionofthisdeviceisalsoauthorizedforuseinEFTAmemberstates:Iceland,Liechtenstein,Norway,andSwitzerland.EUCountriesNotIntendedforUseNoneEUDeclarationofConformityEnglish:ThisequipmentisincompliancewiththeessentialrequirementsandotherrelevantprovisionsofDirective1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Français:Cetéquipementestconformeauxexigencesessentiellesetautresdispositionsdeladirective1999/5/CE,2009/125/CE,2006/95/CE,2011/65/CE.
101Čeština:Totozařízeníjevsouladusezákladnímipožadavkyaostatnímipříslušnýmiustanovenímisměrnic1999/5/ES,2009/125/ES,2006/95/ES,2011/65/ES.Polski:UrządzeniejestzgodnezogólnymiwymaganiamiorazszczególnymiwarunkamiokreślonymiDyrektywąUE1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC..Română: AcestechipamentesteînconformitatecucerinţeleesenţialeşialteprevederirelevantealeDirectivei1999/5/CE,2009/125/CE,2006/95/CE,2011/65/CE.Русский:ЭтооборудованиесоответствуетосновнымтребованиямиположениямДирективы1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Magyar:Ezaberendezésmegfelelazalapvetőkövetelményeknekésmásvonatkozóirányelveknek(1999/5/EK,2009/125/EK,2006/95/EK,2011/65/EK).Türkçe: Bucihaz1999/5/EC,2009/125/EC,2006/95/EC,2011/65/ECdirektiflerizorunluisteklervediğerhükümlerleileuyumludur.Українська:Обладнаннявідповідаєвимогаміумовамдирективи1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC..Slovenčina:Totozariadeniespĺňazákladnépožiadavkyaďalšiepríslušnéustanoveniasmerníc1999/5/ES,2009/125/ES,2006/95/ES,2011/65/ES.Deutsch:DiesesGeräterfülltdieVoraussetzungengemäßdenRichtlinien1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Español: ElpresenteequipocumplelosrequisitosesencialesdelaDirectiva1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Italiano: QuestoapparecchioèconformeairequisitiessenzialieallealtredisposizioniapplicabilidellaDirettiva1999/5/CE,2009/125/CE,2006/95/CE,2011/65/CE.Nederlands:Ditapparaatvoldoetaandeessentiëleeisenenanderevantoepassingzijndebepalingenvanrichtlijn1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC..Português:EsteequipamentocumpreosrequesitosessênciaisdaDirectiva1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Norsk:DetteutstyreterisamsvarmeddeviktigstekraveneogandrerelevanteregleriDirektiv1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.Svenska: Dennautrustningäriöverensstämmelsemeddeväsentligakravenochövrigarelevantabestämmelseridirektiv1999/5/EG,2009/125/EG,2006/95/EG,2011/65/EG.Dansk: Detteudstyrerioverensstemmelsemeddevæsentligstekravogandrerelevanteforordningeridirektiv1999/5/EC,2009/125/EC,2006/95/EC,2011/65/EC.suomenkieli:Tämälaitetäyttäädirektiivien1999/5/EY,2009/125/EY,2006/95/EY,2011/65/EYoleellisetvaatimuksetjamuutasiaankuuluvatmääräykset.‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐WEEEDirective&ProductDisposal Attheendofitsserviceablelife,thisproductshouldnotbetreatedashouseholdorgeneralwaste.Itshouldbehandedovertotheapplicablecollectionpointfortherecyclingofelectricalandelectronicequipment,orreturnedtothesupplierfordisposal.
102DeclarationofConformityWe,EdimaxTechnologyCo.,Ltd.,declareunderoursoleresponsibility,thattheequipmentdescribedbelowcomplieswiththerequirementsoftheEuropeanR&TTEdirective1999/5/EC,and2009/125/EC,2006/95/EC,2011/65/EC.Equipment:N300Wall‐plugAccessPointModelNo.:EW‐7438APnThefollowingEuropeanstandardsforessentialrequirementshavebeenfollowed:Spectrum:ETSIEN300328V1.7.1(2006‐10)EMC:EN301489‐1V1.9.2(2011‐09);EN301489‐17V2.1.1(2009‐05)EMF:EN50385:2002Safety(LVD):IEC60950‐1:2005(2ndEdition);EN‐60950‐1:2006+A11:2009+A1:2010+A12:2011EdimaxTechnologyCo.,Ltd.No.3,WuChuan3rdRoad,Wu‐KuIndustrialPark,NewTaipeiCity,Taiwan       DateofSignature: November15,2011Signature:PrintedName:AlbertChangTitle:DirectorEdimaxTechnologyCo.,Ltd.
103NoticeAccordingtoGNUGeneralPublicLicenseVersion2ThisproductincludessoftwarethatissubjecttotheGNUGeneralPublicLicenseversion2.Theprogramisfreesoftwareanddistributedwithoutanywarrantyoftheauthor.Weoffer,validforatleastthreeyears,togiveyou,forachargenomorethanthecostsofphysicallyperformingsourcedistribution,acompletemachine‐readablecopyofthecorrespondingsourcecode.DasProduktbeinhaltetSoftware,diedenBedingungenderGNU/GPL‐Version2unterliegt.DasProgrammisteinesog.„FreeSoftware“,derAutorstelltdasProgrammohneirgendeineGewährleistungenzurVerfügung.WirbietenIhnenfüreinenZeitraumvondreiJahrenan,einevollständigemaschinenlesbareKopiedesQuelltextesderProgrammezurVerfügungzustellen–zunichthöherenKostenalsdenen,diedurchdenphysikalischenKopiervorganganfallen.GNUGENERALPUBLICLICENSEVersion2,June1991Copyright(C)1989,1991FreeSoftwareFoundation,Inc.51FranklinStreet,FifthFloor,Boston,MA02110‐1301,USAEveryoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,butchangingitisnotallowed.PreambleThelicensesformostsoftwarearedesignedtotakeawayyourfreedomtoshareandchangeit.Bycontrast,theGNUGeneralPublicLicenseisintendedtoguaranteeyourfreedomtoshareandchangefreesoftware‐‐tomakesurethesoftwareisfreeforallitsusers.ThisGeneralPublicLicenseappliestomostoftheFreeSoftwareFoundation’ssoftwareandtoanyotherprogramwhoseauthorscommittousingit.(SomeotherFreeSoftwareFoundationsoftwareiscoveredbytheGNULesserGeneralPublicLicenseinstead.)Youcanapplyittoyourprograms,too.Whenwespeakoffreesoftware,wearereferringtofreedom,notprice.OurGeneralPublicLicensesaredesignedtomakesurethatyouhavethefreedomtodistributecopiesoffreesoftware(andchargeforthisserviceifyouwish),thatyoureceivesourcecodeorcangetitifyouwantit,thatyoucanchangethesoftwareorusepiecesofitinnewfreeprograms;andthatyouknowyoucandothesethings.Toprotectyourrights,weneedtomakerestrictionsthatforbidanyonetodenyyoutheserightsortoaskyoutosurrendertherights.Theserestrictionstranslatetocertainresponsibilitiesforyouifyoudistributecopiesofthesoftware,orifyoumodifyit.Forexample,ifyoudistributecopiesofsuchaprogram,whethergratisorforafee,youmustgivetherecipientsalltherightsthatyouhave.Youmustmakesurethatthey,too,receiveorcangetthesourcecode.Andyoumustshowthemthesetermssotheyknowtheirrights.Weprotectyourrightswithtwosteps:(1)copyrightthesoftware,and(2)offeryouthislicensewhichgivesyoulegalpermissiontocopy,distributeand/ormodifythesoftware.Also,foreachauthor’sprotectionandours,wewanttomakecertainthateveryoneunderstandsthatthereisnowarrantyforthisfreesoftware.Ifthesoftwareismodifiedbysomeoneelseandpassedon,wewantitsrecipientstoknowthatwhattheyhaveisnottheoriginal,sothatanyproblemsintroducedbyotherswillnotreflectontheoriginalauthors’reputations.Finally,anyfreeprogramisthreatenedconstantlybysoftwarepatents.Wewishtoavoidthedangerthatredistributorsofafreeprogramwillindividuallyobtainpatentlicenses,ineffectmakingtheprogramproprietary.Topreventthis,wehavemadeitclearthatanypatentmustbelicensedforeveryone’sfreeuseornotlicensedatall.Theprecisetermsandconditionsforcopying,distributionandmodificationfollow.TERMSANDCONDITIONSFORCOPYING,DISTRIBUTIONANDMODIFICATION0.ThisLicenseappliestoanyprogramorotherworkwhichcontainsanoticeplacedbythecopyrightholdersayingitmaybedistributedunderthetermsofthisGeneralPublicLicense.The‘“Program’“,below,referstoanysuchprogramorwork,anda‘“workbasedontheProgram’“meanseithertheProgramoranyderivativeworkundercopyrightlaw:thatistosay,aworkcontainingtheProgramoraportionofit,eitherverbatimorwithmodificationsand/ortranslatedintoanotherlanguage.(Hereinafter,translationisincludedwithoutlimitationintheterm‘“modification’“.)Eachlicenseeisaddressedas‘“you’“.Activitiesotherthancopying,distributionandmodificationarenotcoveredbythisLicense;theyareoutsideitsscope.TheactofrunningtheProgramisnotrestricted,andtheoutputfromtheProgramiscoveredonlyifitscontentsconstituteaworkbasedontheProgram(independentofhavingbeenmadebyrunningtheProgram).WhetherthatistruedependsonwhattheProgramdoes.
1041.YoumaycopyanddistributeverbatimcopiesoftheProgram’ssourcecodeasyoureceiveit,inanymedium,providedthatyouconspicuouslyandappropriatelypublishoneachcopyanappropriatecopyrightnoticeanddisclaimerofwarranty;keepintactallthenoticesthatrefertothisLicenseandtotheabsenceofanywarranty;andgiveanyotherrecipientsoftheProgramacopyofthisLicensealongwiththeProgram.Youmaychargeafeeforthephysicalactoftransferringacopy,andyoumayatyouroptionofferwarrantyprotectioninexchangeforafee.2.YoumaymodifyyourcopyorcopiesoftheProgramoranyportionofit,thusformingaworkbasedontheProgram,andcopyanddistributesuchmodificationsorworkunderthetermsofSection1above,providedthatyoualsomeetalloftheseconditions:a) Youmustcausethemodifiedfilestocarryprominentnoticesstatingthatyouchangedthefilesandthedateofanychange.b) Youmustcauseanyworkthatyoudistributeorpublish,thatinwholeorinpartcontainsorisderivedfromtheProgramoranypartthereof,tobelicensedasawholeatnochargetoallthirdpartiesunderthetermsofthisLicense.c) Ifthemodifiedprogramnormallyreadscommandsinteractivelywhenrun,youmustcauseit,whenstartedrunningforsuchinteractiveuseinthemostordinaryway,toprintordisplayanannouncementincludinganappropriatecopyrightnoticeandanoticethatthereisnowarranty(orelse,sayingthatyouprovideawarranty)andthatusersmayredistributetheprogramundertheseconditions,andtellingtheuserhowtoviewacopyofthisLicense.(Exception:iftheProgramitselfisinteractivebutdoesnotnormallyprintsuchanannouncement,yourworkbasedontheProgramisnotrequiredtoprintanannouncement.)Theserequirementsapplytothemodifiedworkasawhole.IfidentifiablesectionsofthatworkarenotderivedfromtheProgram,andcanbereasonablyconsideredindependentandseparateworksinthemselves,thenthisLicense,anditsterms,donotapplytothosesectionswhenyoudistributethemasseparateworks.ButwhenyoudistributethesamesectionsaspartofawholewhichisaworkbasedontheProgram,thedistributionofthewholemustbeonthetermsofthisLicense,whosepermissionsforotherlicenseesextendtotheentirewhole,andthustoeachandeverypartregardlessofwhowroteit.Thus,itisnottheintentofthissectiontoclaimrightsorcontestyourrightstoworkwrittenentirelybyyou;rather,theintentistoexercisetherighttocontrolthedistributionofderivativeorcollectiveworksbasedontheProgram.Inaddition,mereaggregationofanotherworknotbasedontheProgramwiththeProgram(orwithaworkbasedontheProgram)onavolumeofastorageordistributionmediumdoesnotbringtheotherworkunderthescopeofthisLicense.3.YoumaycopyanddistributetheProgram(oraworkbasedonit,underSection2)inobjectcodeorexecutableformunderthetermsofSections1and2aboveprovidedthatyoualsodooneofthefollowing:a) Accompanyitwiththecompletecorrespondingmachine‐readablesourcecode,whichmustbedistributedunderthetermsofSections1and2aboveonamediumcustomarilyusedforsoftwareinterchange;or,b) Accompanyitwithawrittenoffer,validforatleastthreeyears,togiveanythirdparty,forachargenomorethanyourcostofphysicallyperformingsourcedistribution,acompletemachine‐readablecopyofthecorrespondingsourcecode,tobedistributedunderthetermsofSections1and2aboveonamediumcustomarilyusedforsoftwareinterchange;or,c) Accompanyitwiththeinformationyoureceivedastotheoffertodistributecorrespondingsourcecode.(Thisalternativeisallowedonlyfornoncommercialdistributionandonlyifyoureceivedtheprograminobjectcodeorexecutableformwithsuchanoffer,inaccordwithSubsectionbabove.)Thesourcecodeforaworkmeansthepreferredformoftheworkformakingmodificationstoit.Foranexecutablework,completesourcecodemeansallthesourcecodeforallmodulesitcontains,plusanyassociatedinterfacedefinitionfiles,plusthescriptsusedtocontrolcompilationandinstallationoftheexecutable.However,asaspecialexception,thesourcecodedistributedneednotincludeanythingthatisnormallydistributed(ineithersourceorbinaryform)withthemajorcomponents(compiler,kernel,andsoon)oftheoperatingsystemonwhichtheexecutableruns,unlessthatcomponentitselfaccompaniestheexecutable.Ifdistributionofexecutableorobjectcodeismadebyofferingaccesstocopyfromadesignatedplace,thenofferingequivalentaccesstocopythesourcecodefromthesameplacecountsasdistributionofthesourcecode,eventhoughthirdpartiesarenotcompelledtocopythesourcealongwiththeobjectcode.4.Youmaynotcopy,modify,sublicense,ordistributetheProgramexceptasexpresslyprovidedunderthisLicense.Anyattemptotherwisetocopy,modify,sublicenseordistributetheProgramisvoid,andwillautomaticallyterminateyourrightsunderthisLicense.However,partieswhohavereceivedcopies,orrights,fromyouunderthisLicensewillnothavetheirlicensesterminatedsolongassuchpartiesremaininfullcompliance.
1055.YouarenotrequiredtoacceptthisLicense,sinceyouhavenotsignedit.However,nothingelsegrantsyoupermissiontomodifyordistributetheProgramoritsderivativeworks.TheseactionsareprohibitedbylawifyoudonotacceptthisLicense.Therefore,bymodifyingordistributingtheProgram(oranyworkbasedontheProgram),youindicateyouracceptanceofthisLicensetodoso,andallitstermsandconditionsforcopying,distributingormodifyingtheProgramorworksbasedonit.6.EachtimeyouredistributetheProgram(oranyworkbasedontheProgram),therecipientautomaticallyreceivesalicensefromtheoriginallicensortocopy,distributeormodifytheProgramsubjecttothesetermsandconditions.Youmaynotimposeanyfurtherrestrictionsontherecipients’exerciseoftherightsgrantedherein.YouarenotresponsibleforenforcingcompliancebythirdpartiestothisLicense.7.If,asaconsequenceofacourtjudgmentorallegationofpatentinfringementorforanyotherreason(notlimitedtopatentissues),conditionsareimposedonyou(whetherbycourtorder,agreementorotherwise)thatcontradicttheconditionsofthisLicense,theydonotexcuseyoufromtheconditionsofthisLicense.IfyoucannotdistributesoastosatisfysimultaneouslyyourobligationsunderthisLicenseandanyotherpertinentobligations,thenasaconsequenceyoumaynotdistributetheProgramatall.Forexample,ifapatentlicensewouldnotpermitroyalty‐freeredistributionoftheProgrambyallthosewhoreceivecopiesdirectlyorindirectlythroughyou,thentheonlywayyoucouldsatisfybothitandthisLicensewouldbetorefrainentirelyfromdistributionoftheProgram.Ifanyportionofthissectionisheldinvalidorunenforceableunderanyparticularcircumstance,thebalanceofthesectionisintendedtoapplyandthesectionasawholeisintendedtoapplyinothercircumstances.Itisnotthepurposeofthissectiontoinduceyoutoinfringeanypatentsorotherpropertyrightclaimsortocontestvalidityofanysuchclaims;thissectionhasthesolepurposeofprotectingtheintegrityofthefreesoftwaredistributionsystem,whichisimplementedbypubliclicensepractices.Manypeoplehavemadegenerouscontributionstothewiderangeofsoftwaredistributedthroughthatsysteminrelianceonconsistentapplicationofthatsystem;itisuptotheauthor/donortodecideifheorsheiswillingtodistributesoftwarethroughanyothersystemandalicenseecannotimposethatchoice.ThissectionisintendedtomakethoroughlyclearwhatisbelievedtobeaconsequenceoftherestofthisLicense.8.Ifthedistributionand/oruseoftheProgramisrestrictedincertaincountrieseitherbypatentsorbycopyrightedinterfaces,theoriginalcopyrightholderwhoplacestheProgramunderthisLicensemayaddanexplicitgeographicaldistributionlimitationexcludingthosecountries,sothatdistributionispermittedonlyinoramongcountriesnotthusexcluded.Insuchcase,thisLicenseincorporatesthelimitationasifwritteninthebodyofthisLicense.9.TheFreeSoftwareFoundationmaypublishrevisedand/ornewversionsoftheGeneralPublicLicensefromtimetotime.Suchnewversionswillbesimilarinspirittothepresentversion,butmaydifferindetailtoaddressnewproblemsorconcerns.Eachversionisgivenadistinguishingversionnumber.IftheProgramspecifiesaversionnumberofthisLicensewhichappliestoitand‘“anylaterversion’“,youhavetheoptionoffollowingthetermsandconditionseitherofthatversionorofanylaterversionpublishedbytheFreeSoftwareFoundation.IftheProgramdoesnotspecifyaversionnumberofthisLicense,youmaychooseanyversioneverpublishedbytheFreeSoftwareFoundation.10.IfyouwishtoincorporatepartsoftheProgramintootherfreeprogramswhosedistributionconditionsaredifferent,writetotheauthortoaskforpermission.ForsoftwarewhichiscopyrightedbytheFreeSoftwareFoundation,writetotheFreeSoftwareFoundation;wesometimesmakeexceptionsforthis.Ourdecisionwillbeguidedbythetwogoalsofpreservingthefreestatusofallderivativesofourfreesoftwareandofpromotingthesharingandreuseofsoftwaregenerally.NOWARRANTY11.BECAUSETHEPROGRAMISLICENSEDFREEOFCHARGE,THEREISNOWARRANTYFORTHEPROGRAM,TOTHEEXTENTPERMITTEDBYAPPLICABLELAW.EXCEPTWHENOTHERWISESTATEDINWRITINGTHECOPYRIGHTHOLDERSAND/OROTHERPARTIESPROVIDETHEPROGRAM‘“ASIS’“WITHOUTWARRANTYOFANYKIND,EITHEREXPRESSEDORIMPLIED,INCLUDING,BUTNOTLIMITEDTO,THEIMPLIEDWARRANTIESOFMERCHANTABILITYANDFITNESSFORAPARTICULARPURPOSE.THEENTIRERISKASTOTHEQUALITYANDPERFORMANCEOFTHEPROGRAMISWITHYOU.SHOULDTHEPROGRAMPROVEDEFECTIVE,YOUASSUMETHECOSTOFALLNECESSARYSERVICING,REPAIRORCORRECTION.12.INNOEVENTUNLESSREQUIREDBYAPPLICABLELAWORAGREEDTOINWRITINGWILLANYCOPYRIGHTHOLDER,ORANYOTHERPARTYWHOMAYMODIFYAND/ORREDISTRIBUTETHEPROGRAMASPERMITTEDABOVE,BELIABLETOYOUFORDAMAGES,INCLUDINGANYGENERAL,SPECIAL,INCIDENTALORCONSEQUENTIALDAMAGESARISINGOUTOFTHEUSEORINABILITYTOUSETHEPROGRAM(INCLUDINGBUTNOTLIMITEDTOLOSSOFDATAORDATABEINGRENDEREDINACCURATEORLOSSESSUSTAINEDBYYOUORTHIRDPARTIESORAFAILUREOFTHEPROGRAMTOOPERATEWITHANYOTHERPROGRAMS),EVENIFSUCHHOLDEROROTHERPARTYHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGES.
106

Navigation menu