EnGenius Technologies ENH500 Wireless 802.11an Access Point User Manual ENS500

EnGenius Technologies Wireless 802.11an Access Point ENS500

User Manual.pdf

User ManualBusiness SolutionsN300 5GHz Long Range CPEENH500version 2.0
  CONVENTIONS VIConventionsThe following conventions are used to give the user additional information about specific procedures or content. It is important to pay attention to these conventions as they provide informa-tion to prevent damage to equipment or personal injury.General ConventionsThe following general conventions are used in this document.N/A:Indicates that a component or a procedure is not applica-ble to this model.Prerequisite:Indicates a requirement that must be addressed before proceeding with the current function or procedure.CAUTION!CAUTIONS APPEAR BEFORE THE TEXT IT REFERENCES. CAU-TIONS APPEAR IN CAPITAL LETTERS TO EMPHASIZE THAT THE MESSAGE CONTAINS VITAL HEALTH AND SAFETY INFORMATION.WARNING!Warning information appears before the text it references to emphasize that the content may prevent damage to the device or equipment.Important:Indicates information that is important to know for the proper completion of a procedure, choice of an option, or completing a task.Note:Indicates additional information that is relevant to the cur-rent process or procedure.!!Example:Indicates information used to demonstrate or explain an associated concept.
  CONVENTIONS VIITypographical ConventionsThe following typographical conventions are used in this docu-ment:ItalicsIndicates book titles, directory names, file names, path names, and program/process names.Constant widthIndicates computer output shown on a computer screen, includ-ing menus, prompts, responses to input, and error messages.Constant width boldIndicates commands lines as entered on the computer. Vari-ables contained within user input are shown in angle brackets (< >).BoldIndicates keyboard keys that are pressed by the user.
  TABLE OF CONTENTS IIITABLE OF CONTENTSConventions 0-iCopyright 0-ixProduct Overview Package Contents 1-1Product Overview 1-2Key Features  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3Technical Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4Wireless Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4Hardware Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4Software Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4Product Interface 1-5Installation System Requirements 2-1
  TABLE OF CONTENTS IVInstalling the Device 2-2Pre-Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2Installing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2Wall Mounting the Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3Pole Mounting the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4Web Configuration Logging In 3-1Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2Basic Network SettingsSystem Status 4-1Using Save/Reload 4-1Viewing System Information 4-2Viewing Wireless Client List 4-4Viewing System Log 4-5Viewing Connection Status 4-6Viewing DHCP Client Table 4-7
  TABLE OF CONTENTS VViewing WDS Link List 4-8System Setup 4-9Configuring Operation Mode 4-9Configuring IP Settings 4-10Configuring Spanning Tree Settings 4-11Router Setup 4-12Configuring WAN Settings 4-12Static IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12Dynamic IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13Point-to-Point Protocol over Ethernet (PPPoE). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14Point-to-Point Tunnelling Protocol (PPTP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15Configuring LAN Settings 4-17Configuring VPN Pass-Through 4-18Configuring Port Forwarding 4-19Configuring Demilitarized Zone 4-21Configuring Wireless LAN 4-22Configuring Wireless Settings 4-22Access Point Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22Client Bridge Mode  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24WDS Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
  TABLE OF CONTENTS VIClient Router Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27Configuring Wireless Security 4-28Wired Equivalent Privacy (WEP)  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-28Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK). . . . . . . . . . . . . . . . . . . . . . . . . .4-30Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed . . . . . . . . . . . . . . . . . . . . . . .4-31Wi-Fi Protected Access (WPA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-32Wi-Fi Protected Access 2 (WPA2)  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-33Wi-Fi Protected Access (WPA) Mixed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34Configuring Wireless MAC Filter 4-35Configuring WDS Link Settings 4-36Configuring Advanced Network Settings 4-37Wireless Traffic Shaping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-37Management Setup 4-38Configuring Administrator Account 4-38Configuring Management VLAN 4-39Configuring SNMP 4-40Configuring Backup/Restore Settings 4-42Configuring Auto Reboot Settings 4-43Configuring Firmware Upgrade 4-44
  TABLE OF CONTENTS VIIConfiguring System Time 4-45Configuring Wi-Fi Schedule 4-46Add a Schedule Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-46Schedule Services Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-47Configuring Command Line Interface 4-48Configuring Logging 4-49Configuring Diagnostics 4-50Viewing Device Discovery 4-51Configure Denial of Service Protection 4-52Logging Out 4-53
  TABLE OF CONTENTS VIIIAppendix AFederal Communication Commission Interference Statement A-1Appendix BIndustry Canada Statement B-1
  COPYRIGHT VIIICopyrightThis user guide and its content is copyright of © EnGenius Net-works, 2014. All rights reserved.Any redistribution or reproduction in part or in whole in any form is prohibited.Do not distribute, transmit, store in any form of electronic retrieval system or commercially exploit the content without the expressed written permission of EnGenius Networks.
Product OverviewChapter 1
  PACKAGE CONTENTS 1-11.1 Package ContentsThe ENH500 package contains the following items:ENH500PoE Injector with Power Adapter24V PoE InjectorQuick Installation GuideMounting Screw SetPole Mount Strap
  PRODUCT OVERVIEW 1-21.2 Product OverviewThank you for choosing ENH500. The ENH500 is a long range, high performance IEEE 802.11a/n network solution that provides Access Point, Client Bridge, WDS, and Client Router functions in a single device.In addition to providing the latest wireless technology, the ENH500 supports Power over Ethernet and Power by Adapter capabilities, which allow the device to be installed eas-ily in nearly any location. Advanced features include power levelcontrol, traffic shaping, and Real time RSSI indication.A variety of security features help to protect your data and pri-vacy while you are online. Security features include Wi-Fi Pro-tected Access (WPA PSK/WPA2 PSK), 64/128/152 bit WEP Encryption, and IEEE 802.1x with RADIUS.Key FeaturesHigh-speed data rates up to 300 Mbps make the ENH500ideally suited for handling heavy data payloads such asMPEG video streamingHigh output power up to 26 dBm delivers superior range and coverageFully Interoperable with IEEE 802.11a/IEEE 802.11n-com-pliant devicesMulti-function capabilities enable users to use different modes in various environmentsPoint-to-point and point-to-multipoint wireless connectiv-ity enable data transfers between two or more buildingsChannel bandwidth selection allows the appropriate band-width to be used to reach various distancesRSSI indicator makes it easy to select the best signal for Access Point connectionsPower-over-Ethernet capabilities allow for flexible installa-tion locations and cost savingsFour SSIDs let clients access different networks through a single Access Point, and assign different policies and functions for each SSIDWPA2/WPA/ WEP/ IEEE 802.1x support and MAC address filtering ensure secure network connectionsPPPoE/PPTP function support make it easy to access the Internet via Internet Service Provider (ISP) service authenticationSNMP Remote Configuration Management helps adminis-trators remotely configure or manage the Access PointQoS (WMM) support enhances performance and user experiences
  BENEFITS 1-3BenefitsThe ENH500 is the ideal product around which you can build your WLAN. The following list summarizes a few key advan-tages that WLANs have over wired networks:Ideal for hard-to-wire environmentsThere are many scenarios where cables cannot be used to con-nect networking devices. Historic and older buildings, open areas, and busy streets, for example, make wired LAN installa-tions difficult, expensive, or impossible.Temporary workgroupsWLANs make it easy to provide connectivity to temporary work-groups that will later be removed. Examples include parks, ath-letic arenas, exhibition centers, disaster-recovery shelters, temporary offices, and construction sites.Ability to access real-time informationWith a WLAN, workers who rely on access to real-time informa-tion, such as doctors and nurses, point-of-sale employees, mobile workers, and warehouse personnel, can access the data they need and increase productivity, without having to look for a place to plug into the network.Frequently changed environmentsWLANs are well suited for showrooms, meeting rooms, retail stores, and manufacturing sites where workplaces are rear-ranged frequently.Wireless extensions to Ethernet networksWLANs enable network managers in dynamic environments to minimize overhead caused by moves, extensions to networks, and other changes.Wired LAN backupNetwork managers can implement WLANs to provide backup for mission-critical applications running on wired networks.Mobility within training/educational facilitiesTraining sites at corporations and students at universities are a few examples where wireless connectivity can be used to facili-tate access to information, information exchanges, and learn-ing.
  TECHNICAL SPECIFICATION 1-4Technical SpecificationWireless SpecificationIEEE802.11a/n, 2T2R, 300MbpsHardware SpecificationPhysical Interface: 2 x 10/100Mbps LAN Ports, 1 x Reset ButtonPower Supply: Passive PoE, 24V/1A Power AdapterDimension: 260(L) x 84mm(W) x 55mm(H)Embedded high gain directional antennaSoftware SpecificationOperation Mode: Client Bridge, Access Point, Client Router, WDS AP, WDS Bridge, WDS StationMultiple SSID, Preferred SSIDPPPoE, PPTP, L2TP Pass-throughWMM, Traffic ShapingCLI Interface, SNMP v1/v2c/v3Recovery PagePort Forwarding/DMZ
PRODUCT OVERVIEW PRODUCT LAYOUT 1-51.3 Product Layout Figure 1-1: Back Panel ViewBACK PANEL VIEW DESCRIPTIONA Power LED OFF = ENH500 is not receiving powerON = ENH500 is receiving powerB LAN (2) LEDsOFF = ENH500 is not connected to the network.ON = ENH500 is connected to the network, but not sending or receiving dataBlink = ENH500 is sending or receiving dataCWLAN LED(Access Point or Client Bridge Mode)OFF = ENH500 radio is off and the device is not sending or receiving data over the wireless LAN.ON = ENH500 radio is on, and the device is not sending or receiving data over the wireless LAN.Blinking = ENH500 radio is on, and the device is sending or receiving data over the wireless LAN.D Signal Indicator LED(Client Bridge, WDS Station and Client Router Mode)Green - Signal is goodOrange - Signal is normalRed - Signal is weak or non-existent
PRODUCT OVERVIEW PRODUCT LAYOUT 1-6BOTTOM VIEW DESCRIPTIONA LAN ConnectorTo configure the ENH500, connect to an Ethernet adapter in a computer. For more information B PoE LAN Connector The PoE interface allows the ENH500 to be powered using the supplied PoE injectorC Reset Button To reset to factory settings, press button for > 10 seconds.AB C
InstallationChapter 2
  SYSTEM REQUIREMENTS 2-12.1 System RequirementsTo install the ENH500, you need the following:Computer (Windows, Linux, Mac OS X Operating System)Web Browser (Internet Explorer, FireFox, Chrome, Safari)Network Interface equipped: (one of the following)Wired connectivity: Network Interface with an open RJ-45 Ethernet PortWireless Connectivity:Embedded 802.11n Wi-Fi wireless networking, IEEE 802.11a/n compatibleWi-Fi Card, USB Wi-Fi Dongle (802.11a/n)An existing router or access point (AP) with SSID broad-cast1x CAT5e Ethernet Cable
  INSTALLING THE DEVICE 2-22.2 Installing the DeviceInstalling the ENH500 on a pole or wall optimizes the wire-less access range.Pre-Installation GuidelinesSelect the optimal location for the equipment using the following guidelines:The ENH500 should be mounted on a 1"-4" pole. Its location should enable easy access to the unit and its con-nectors for installation and testing.The higher the placement of the antenna, the better the achievable link quality.The antenna should be installed to provide a direct, or near line of sight with the Base Station antenna. The antenna should be aligned to face the general direction of the Base Station.Installing the DeviceTo install the ENH500, use the following procedure to mount the device on a pole and refer to the figure below.1. Remove the bottom cover protecting the RJ-45 connec-tors.2. Insert an Ethernet cable into the RJ-45 port labeled LAN.3. Install the bottom cover to protect the RJ-45 connectors.4. Remove the power cord and PoE injector from the box and plug the power cord into the DC port of the PoE injec-tor.Note:Only experienced installation professionals who are famil-iar with local building and safety codes and, wherever applicable, are licensed by the appropriate government regulatory authorities should install the ENH500.CAUTION!ONLY USE THE POWER ADAPTER SUPPLIED WITH THE ENH50. USING A DIFFERENT POWER ADAPTER MIGHT DAMAGE THE ENH500.!
INSTALLATION INSTALLING THE DEVICE 2-35. Plug the other end of the Ethernet cable into the PoE port of the PoE injector. Figure 2-1: Installing the ENH5006. Turn over the ENH500. Then insert the pole mounting strap through the middle hole of the ENH500. Use a screwdriver to unlock the pole-mounting ring putting it through the ENH500.7. Mount the ENH500 securely to the pole by locking the strap tightly.This completes the installation procedure.Mounting the ENH500To install the ENH500, use the following procedure to mount the  device on a wall and refer to the figure belowAnchor: 8mm (D) x 25mm (L); Screw: 5.5mm (D) x 18mm (L)Figure 2-2: Wall Mouting the ENH5001.   Attach the mounting bracket to the wall using the provide       wall mounting hardware kit. 2.   Drill the holes to input the mounting screws. 3.   Place the ENH500 on the wall.
Web ConfigurationChapter 3
  LOGGING IN 3-13.1 Logging InThe ENH500 has a built-in Web Configurator that lets you   manage the unit from any location using a Web browser that supports HTTP and has Javascript installed.After configuring the computer for TCP/IP using the procedure appropriate for your operating system, use that computer’s Web browser to log in to the ENH500 Web Configurator.1. Launch your Web browser.2. In the browser address bar, type 192.168.1.1 and press the Enter key. Figure 3-1: Web Browser Address Bar3. When the login screen appears, enter admin for the user-name in the top field and admin for the password in the bottom field. Figure 3-2: Windows Security Login Dialog4. Click Login to continue or Reset to abort the login.You are now ready to use the instructions in the following chap-ters to configure the ENH500.Note:If you changed the ENH500 LAN IP address, enter the correct IP address.
  BEST PRACTICES 3-2Best PracticesPerform the following procedures regularly to make the ENH500 more secure and manage the ENH500 more effectively.Change the default password  Use a password that is not easy to guess and that contains different characters, such as numbers and letters. The ENH500 username cannot be changed. For more information, see Configur-ing Administrator Account.Back up the configuration and be sure you know how to restore it. Restoring an earlier working configuration can be useful if the ENH500 becomes unstable or crashes. If you forget your password, you will have to reset the ENH500 to its factory default settings and lose any cus-tomized override settings you configured. However, if you back up an earlier configuration, you will not have to com-pletely reconfigure the ENH500. You can simply restore your last configuration. For more information, see Config-uring Backup/Restore Settings.
Basic Network SettingsChapter 4
  SYSTEM STATUS 4-14.1 System StatusView the summary of the current system status including system (hardware/software version, date/time), wired network (LAN) and wireless network (WLAN) information.4.1.1 Using Save/ReloadSave and apply the settings shown in the Unsaved changes list, or cancel the unsaved changes and revert to the previous set-tings that were in effect.
  VIEWING SYSTEM INFORMATION 4-24.1.2 Viewing System InformationDisplays status information about the current operating mode.System Information  shows the general system information such as operating mode, system up time, firmware version, serial number, kernel version, and application version.LAN Settings  shows Local Area Network settings such as the LAN IP address, subnet mask, and MAC address.
  VIEWING SYSTEM INFORMATION 4-3WAN Settings  shows Wide Area Network settings such as the MAC address, connection type, connection status, LAN IP address, subnet mask, primary and secondary DNS.Current Wireless Settings  shows wireless information such as frequency and channel. Since the ENH500 supports multiple-SSIDs, information about each SSID, such as its ESSID and security settings, are displayed.
  VIEWING WIRELESS CLIENT LIST 4-44.1.3 Viewing Wireless Client ListDisplays a list of clients associated to the ENH500, along with the MAC addresses and signal strength for each client. To remove an SSID client from the list, click the button that appears in the Kick and Ban column.Click the Refresh button to update the client list.
  VIEWING SYSTEM LOG 4-54.1.4 Viewing System LogThe ENH500 automatically logs events to internal memory.Note:The oldest events are deleted from the log when memory is full.Click the Refresh button to update the client list or the Clear button to remove all events.
  VIEWING CONNECTION STATUS 4-64.1.5 Viewing Connection StatusDisplays the current status of the network.The WLAN information shown includes network type, SSID, BSSID, connection status, wireless mode, current channel, security, data rate, noise level, and signal strength.The WAN information shown includes the MAC address, connection type, connection status, IP address, IP subnet mask, primary DNS and secondary DNS.Click the Refresh button to update the client list or the Clear button to remove all events.
  VIEWING DHCP CLIENT TABLE 4-74.1.6 Viewing DHCP Client TableDisplays the clients that are associated to the ENH500 through DHCP. The MAC addresses and signal strength for each client are also shown.Click the Refresh button to update the client list.
  VIEWING WDS LINK LIST 4-84.1.7 Viewing WDS Link ListDisplays the clients that are associated to the ENH500 through WDS. The MAC addresses, link status and signal strength for each client are also shown.Click the Refresh button to update the client list.
  SYSTEM SETUP 4-94.2 System SetupThe following sections explain the features and functionality of the ENH500 in access point mode, client bridge mode, WDS access point mode, WDS bridge mode, WDS station mode and client router mode.4.2.1 Configuring Operation ModeSet the primary function of the device. The function that is selected affects which items are available in the main menu.Device Name  Enter a name for the device. The name you type appears in SNMP management. This name is not the SSID and is not broadcast to other devices.Operation Mode  Use the radio button to select an operating mode.Click Save & Apply to save changes or Cancel to abort.
  CONFIGURING IP SETTINGS 4-104.2.2 Configuring IP SettingsConfigure the ENH500 LAN settings for the ENH500 using a static or dynamic IP address.IP Network Setting  Configure the network connection type using either a static IP or dynamic IP.IP Address  Enter the LAN IP address of the ENH500.Subnet Mask  Enter the subnet mask of the ENH500.Default Gateway  Enter the default gateway of the ENH500.Primary DNS  Enter the primary DNS address of the ENH500.Secondary DNS  Enter the secondary DNS address of the ENH500.Use Link-Local Address  Click to enable a link-local address for the device.IPv6 IP Address  Enter the IPv6 LAN IP address of the ENH500 IPv6 Subnet Prefix Length  Enter the IPv6 subnet prefix length of the ENH500.IPv6 Default Gateway  Enter the IPv6 default gateway of the ENH500.IPv6 Primary DNS  Enter the IPv6 primary DNS of the ENH500.IPv6 Secondary DNS  Enter the IPv6 secondary DNS of the ENH500.Click Apply to save the settings or Cancel to discard changes.
  CONFIGURING SPANNING TREE SETTINGS 4-114.2.3 Configuring Spanning Tree SettingsSpanning Tree Status  Enable or disable the ENH500 Spanning Tree function.Bridge Hello Time  Specify Bridge Hello Time, in seconds. This value determines how often the ENH500 sends hello packets to communicate information about the topology throughout the entire Bridged Local Area NetworkBridge Max Age  Specify Bridge Max Age, in seconds. If another bridge in the spanning tree does not send a hello packet for a long period of time, it is assumed to be dead.Bridge Forward Delay  Specify Bridge Forward Delay, in seconds. Forwarding delay time is the time spent in each of the Listening and Learning states before the Forwarding state is entered. This delay is provided so that when a new bridge comes onto a busy network, it looks at some traffic before participating.Priority  Specify the Priority number. Smaller numbers have greater priority.Click Accept to confirm the changes or Cancel to cancel and return previous settings.
  ROUTER SETUP 4-124.3 Router Setup4.3.1 Configuring WAN SettingsConfigure the WAN settings for the ENH500 using a static or dynamic IP address, PPPoE or PPTP.Static IPSetting a static IP address allows an administrator to set a specific IP address for the router and guar-antees that it can not be assigned a different address.Account Name  Enter the account name provided by your ISP.Domain Name  Enter the domain name provided by your ISP.MTU  The maximum transmission unit (MTU) specifies the largest packet size permitted for an internet transmission. The factory default MTU size for static IP is 1500. The MTU size can be set between 576 and 1500.IP Address  Enter the router’s WAN IP address.Subnet Mask  Enter the router’s WAN subnet mask.Default Gateway  Enter the WAN gateway address.Primary DNS  Enter the primary DNS server address.
  DYNAMIC IP 4-13Secondary DNS  Enter the secondary DNS server address.Discard Ping on WAN  Check to Enable to recognize pings on the ENH500 WAN interface or Disable to block pings on the ENH500 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers.Click Accept to save the settings or Cancel to discard changes.Dynamic IPDynamic IP addressing assigns a different IP address each time a device connects to an ISP service provider. The service is most commonly used by ISP cable providers.Account Name  Enter the account name provided by your ISP.Domain Name  Enter the domain name provided by your ISP.MTU  The maximum transmission unit (MTU) specifies the largest packet size permitted for an internet transmission. The factory default MTU size for Dynamic IP is 1500. The MTU size can be set between 576 and 1500.Get Automatically From ISP  Click the radio button to obtain the DNS automatically from the DHCP server.Use These DNS Servers  Click the radio button to set up the Primary DNS and Secondary DNS servers manually.Discard Ping on WAN  Check to Enable to recognize pings on the ENH500 WAN interface or Disable to block pings on the ENH500 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers.Click Accept to save the settings or Cancel to discard changes.
  POINT-TO-POINT PROTOCOL OVER ETHERNET (PPPOE) 4-14Point-to-Point Protocol over Ethernet (PPPoE)Point-to-Point Protocol over Ethernet (PPPoE) is used mainly by ISPs that provide DSL modems to connect to the Internet.MTU  Enter the maximum transmission unit (MTU). The MTU specifies the largest packet size permitted for an internet transmission (PPPoE default: 1492). The MTU size can be set between 576 and 1492.Login  Enter the username assigned by an ISP.Password  Enter the password assigned by an ISP.Service Name  Enter the service name of an ISP (optional).Connect on Demand  Select the radio button to specify the maximum idle time. Internet connection will disconnect when it reach the maximum idle time, but it will automatically connect when user tries to access the network.Keep Alive  Select whether to keep the Internet connection always on, or enter a redial period once the internet lose connection.Get Automatically From ISP  Click the radio button to obtain the DNS automatically from the ISP.Use These DNS Servers  Click the radio button to set up the Primary DNS and Secondary DNS servers manually.Discard Ping on WAN  Check to Enable to recognize pings on the ENH500 WAN interface or Disable to block pings on the ENH500 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers.Click Accept to save the settings or Cancel to discard changes.
  POINT-TO-POINT TUNNELLING PROTOCOL (PPTP) 4-15Point-to-Point Tunnelling Protocol (PPTP)The point-to-point tunnelling protocol (PPTP) is used in association with virtual private networks (VPNs). There a two parts to a PPTP connection: the WAN interface settings and the PPTP settings.MTU  Enter the maximum transmission unit (MTU). The MTU specifies the largest packet size permitted for an internet transmission (PPPoE default: 1400). The MTU size can be set between 1200 and 1400.IP Address  Enter the router’s WAN IP address.Subnet Mask  Enter the router’s WAN subnet IP address.Default Gateway  Enter the router’s WAN gateway IP address.PPTP Server  Enter the IP address of the PPTP server.Username  Enter the username provided by your ISP.Password  Enter the password provided by your ISP.Connect on Demand  If you want the ENH500 to end the Internet connection after it has been inactive for a period of time, select this option and enter the number of minutes you want that period of inactivity to last.Keep Alive  If you want the ENH500 to periodically check your Internet connection, select this option. Then specify how often you want the ENH500 to check the Internet connection. If the connection is down, the ENH500 automatically re-establishes your connectionGet Automatically From ISP  Obtains the DNS automatically from ISP.
  POINT-TO-POINT TUNNELLING PROTOCOL (PPTP) 4-16Use These DNS Servers  Click the radio button to set up the Primary DNS and Secondary DNS servers manually.Discard Ping on WAN  Check to Enable to recognize pings on the ENH500 WAN interface or Disable to block pings on the ENH500 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blocking pings provides some extra security from hackers.Click Accept to save the settings or Cancel to discard changes.
  CONFIGURING LAN SETTINGS 4-174.3.2 Configuring LAN SettingsIP Address  Enter the LAN port IP address.IP Subnet Mask  Enter the LAN IP subnet mask.WINS Server IP  Enter the WINS Server IP.Use Router As DHCP Server  Check this option to enable the ENH500 internal DHCP server.Starting IP Address  Specify the starting IP address range for the pool of allocated for private IP addresses. The starting IP address must be on the same subnet as the ending IP address; that is the first three octets specified here must be the same as the first three octets in End IP Address.Ending IP Address  Specify the ending IP address range for the pool of allocated for private IP addresses. The ending IP address must be on the same subnet as the starting IP address; that is the first three octets specified here must be the same as the first three octets in Start IP Address.WINS Server IP  Enter the IP address of the WINS server.Click Accept to confirm the changes or Cancel to cancel and return previous settings.
  CONFIGURING VPN PASS-THROUGH 4-184.3.3 Configuring VPN Pass-ThroughVPN Pass-through allows a secure virtual private network (VPN) connection between two computers. Enabling the options on this page opens a VPN port and enables connections to pass through the ENH500 without interruption.PPTP Pass-through  Check this option to enable PPTP pass-through mode.L2TP Pass-through  Check this option to enable L2TP pass-through mode.IPSec Pass-through  Check this option to enable IPSec pass-through mode.Click Accept to confirm the changes or Cancel to cancel and return previous settings.
  CONFIGURING PORT FORWARDING 4-194.3.4 Configuring Port ForwardingPort forwarding enables multiple server applications on a LAN to serve clients on a WAN over a single WAN IP address. The router accepts incoming client packets, filters them based on the destination WAN, or public, port and protocol and forwards the packets to the appropriate LAN, or local, port. Unlike the DMZ feature, port forwarding protects LAN devices behind the firewall.NO.  Displays the sequence number of the forwarded port.Name  Displays the name of the forwarded port.Protocol   Displays the protocol to use for mapping from the following: TCP, UDP or Both.Start Port  Displays the LAN port number that WAN client packets will be forward to.End Port  Displays the port number that the WAN client packets are received.Server IP  Displays the IP address of the server for the forwarded port.Enable  Click to enable or disable the forwarded port profile.Modify  Click to modify the forwarded port profile.Delete  Click to delete the forwarded port profile.Click Add Entry to add port forwarding rules.Click Accept to confirm the changes.
  CONFIGURING PORT FORWARDING 4-20Service Name  Enter a name for the port forwarding rule.Protocol  Select a protocol for the application: Choices are Both, TCP, and UDP.Starting Port  Enter a starting port number.Ending Port  Enter an ending port number. All ports numbers between the starting and ending ports will forward users to the IP address specified in the IP Address field.IP Address  Enter the IP address of the server computer on the LAN network where users will be redirected.Click Save to apply the changes or Cancel to return previous settings.
  CONFIGURING DEMILITARIZED ZONE 4-214.3.5 Configuring Demilitarized ZoneConfiguring a device on the LAN as a demilitarized zone (DMZ) host allows unrestricted two-way Internet access for Internet applica-tions, such as online video games, to run from behind the NAT firewall. The DMZ function allows the router to redirect all packets going to the WAN port IP address to a particular IP address on the LAN. The difference between the virtual server and the DMZ func-tion is that a virtual server redirects a particular service or Internet application, such as FTP, to a particular LAN client or server, whereas a DMZ redirects all packets, regardless of the service, going to the WAN IP address to a particular LAN client or server.DMZ Hosting  Select Enable DMZ to activate DMZ functionality.DMZ Address  Enter an IP address of a device on the LAN.Click Accept to confirm the changes or Cancel to cancel and return previous settings.WARNING!The PC defined as a DMZ host is not protected by the firewall and is vulnerable to malicious network attacks. Do  not store or manage sensitive information on the DMZ host.!
  CONFIGURING WIRELESS LAN 4-224.4 Configuring Wireless LAN4.4.1 Configuring Wireless SettingsInstructions on how to configure the wireless and security settings for each of the possible operating modes.Access Point ModeThe ENH500 supports Access Point Mode. In this mode, users with a wireless client device within range can connect to the ENH500 to access the WLAN.Wireless Mode  Wireless mode supports 802.11a/n mixed modes.Channel HT Mode  The default channel bandwidth is 20/40 MHz. The larger the channel, the better the transmission quality and speed.Extension Channel  Select upper or lower channel. Your selection may affect the Auto channel function.Channel / Frequency  Select the channel and frequency appropriate.Auto  Check this option to enable auto-channel selection.AP Detection  AP Detection can select the best channel to use by scanning nearby areas for Access Points.WARNING!Incorrectly changing these settings may cause the device to stop functioning. Do not modify the settings in this section without a thor-ough understanding of the parameters.!
  ACCESS POINT MODE 4-23Current Profile  Configure up to four different SSIDs. If many client devices will be accessing the network, you can arrange the devices into SSID groups. Click Edit to configure the profile and check whether you want to enable extra SSIDs.Click Accept to confirm the changes or Cancel to cancel and return previous settings.SSID  Specify the SSID for the current profile.VLAN ID  Specify the VLAN tag for the current profile.Suppressed SSID  Check this option to hide the SSID from clients. If checked, the SSID will not appear in the site survey.Station Separation  Click the appropriate radio button to allow or prevent communication between client devices.Wireless Security  See the Wireless Security section.Click Save to accept the changes or Cancel to cancel and return previous settings.
  CLIENT BRIDGE MODE 4-24Client Bridge ModeClient Bridge Mode lets you connect two LAN segments via a wireless link as though they are on the same physical network. Since the computers are on the same subnet, broadcasts reach all machines. As a result, DHCP information generated by the server reach all client computers as though the clients residing on one physical network.Wireless Mode  Wireless mode supports 802.11a/n mixed modes.SSID  Specify the SSID if known. This field is completed automatically if you select an Access Point in the Site Survey.Site Survey  Scans nearby locations for Access Points. You can select a discovered Access Point to establish a connection.Prefer BSSID  Enter the MAC address if known. If you select an Access Point in the Site Survey, this field is completed automatically.Wireless Security  For details on wireless security settings, see Configuring Wireless Security.Click Accept to confirm the changes or Cancel to cancel and return previous settings.Profile  If you used the Site Survey, the Web Configurator shows nearby Access Points. To connect to an Access Point, click the Access Point’s BSSID.Wireless Security  See Configuring Wireless Security.Click Refresh to scan again.
 WDS BRIDGE MODE 4-25WDS Bridge ModeUnlike traditional bridging. WDS Bridge Mode allows you to create large wireless networks by linking several wireless access points with WDS links. WDS is normally used in large, open areas, where pulling wires is cost prohibitive, restricted or physically impossible.Wireless Mode  Wireless mode supports 802.11a/n mixed modes.Channel HT Mode  The default channel bandwidth is 40 MHz. The larger the channel, the better the transmission quality and speed.Extension Channel  Select upper or lower channel. Your selection may affect the Auto channel function.Channel / Frequency  Select the channel and frequency appropriate.Click Accept to confirm the changes or Cancel to cancel and return previous settings.
 WDS BRIDGE MODE 4-26Security  Select the type of WDS security: None, WEP, or AES.WEP Key  Enter the WEP key.AES Pass phrase  Enter the AES pass phrase.MAC Address  Enter the MAC address of the Access Point to which you want to extend wireless connectivity.Mode  Select Disable or Enable to disable or enable WDS.Click Accept to confirm the changes or Cancel to cancel and return previous settings.
  CLIENT ROUTER MODE 4-27Client Router ModeIn Client Router Mode, you can access the Internet wirelessly with the support of a WISP. In AP Router Mode, the ENH500 can access the Internet via a cable or DSL modem. In this mode, the ENH500 can be configured to turn off the wireless network name (SSID) broadcast, so that only stations that have the SSID can be connected. The ENH500 also provides wireless LAN 64/128/152-bit WEP encryption security, WPA/WPA2, and WPA-PSK/WPA2-PSK authentication, as well as TKIP/AES encryption security. It also supports VPN pass-through for sensitive data secure transmission.Wireless Mode  Wireless mode supports 802.11a/n mixed modes.SSID  Specify the SSID if known. This field is completed automatically if you select an Access Point in the Site Survey.Site Survey  Scans nearby locations for Access Points. You can select a discovered Access Point to establish a connection.Prefer BSSID  Enter the MAC address if known. If you select an Access Point in the Site Survey, this field is completed automatically.Wireless Security  See Configuring Wireless Security.Click Accept to confirm the changes or Cancel to cancel and return previous settings.Profile  If you used the Site Survey, the Web Configurator shows nearby Access Points. To connect to an Access Point, click the Access Point’s BSSID.Wireless Security  See Configuring Wireless Security.Click Refresh to scan again.
  CONFIGURING WIRELESS SECURITY 4-284.4.2 Configuring Wireless SecurityThe Wireless Security Settings section lets you configure the ENH500’s security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2, and WPA Mixed. We strongly recommend you use WPA2-PSK.Wired Equivalent Privacy (WEP)Security Mode  Select WEP from the drop-down list to begin the configuration.Auth Type  Select Open System or Shared.Input Type  Select an input type of Hex or ASCII.Key Length  Level of WEP encryption applied to all WEP keys. Select a 64/128/152-bit password lengths.Default Key  Specify which of the four WEP keys the ENH500 uses as its default.Key1 - Key4  Specify a password for the security key index. For security, each typed character is masked by a dot.Click Save to save the changes or Cancel to cancel and return previous settings.Note:802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS PRE-SHARED KEY (WPA-PSK) 4-29Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)Security Mode  Select WPA-PSK from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Passphrase  Specify the security password. For security, each typed character is masked by a dot.Group Key Update Interval  Specify how often, in seconds, the group key changes.Click Save to save the changes or Cancel to cancel and return previous settings.Note:802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS 2 PRE-SHARED KEY (WPA2-PSK) 4-30Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK)Security Mode  Select WPA2-PSK from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Passphrase  Specify the security password. For security, each typed character is masked by a dot.Group Key Update Interval  Specify how often, in seconds, the group key changes.Click Save to save the changes or Cancel to cancel and return previous settings.Note:802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS PRE-SHARED KEY (WPA-PSK) MIXED 4-31Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) MixedSecurity Mode  Select WPA2-PSK Mixed from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Passphrase  Specify the security password. For security, each typed character is masked by a dot.Group Key Update Interval  Specify how often, in seconds, the group key changes.Click Save to save the changes or Cancel to cancel and return previous settings.Note:WPA-PSK Mixed can allow multiple security modes at the same time.  802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS (WPA) 4-32Wi-Fi Protected Access (WPA)Security Mode  Select WPA from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Radius Server  Specify the IP address of the RADIUS server.Radius Port  Specify the port number that your RADIUS server uses for authentication. Default port is 1812.Radius Secret  Specify RADIUS secret furnished by the RADIUS server.Group Key Update Interval  Specify how often, in seconds, the group key changes.Radius Accounting  Select to enable or disable RADIUS accounting.Radius Accounting Server  Specify the IP address of the RADIUS accounting server.Radius Accounting Port  Specify the port number that your RADIUS accounting server uses for authentication. Default port is 1813.Radius Accounting Secret  Specify RADIUS accounting secret furnished by the RADIUS server.Interem Accounting Interval  Specify the interem accounting interval (60 - 600 seconds).Click Save to save the changes or Cancel to cancel and return previous settings.Note:802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS 2 (WPA2) 4-33Wi-Fi Protected Access 2 (WPA2)Security Mode  Select WPA2 from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Radius Server  Specify the IP address of the RADIUS server.Radius Port  Specify the port number that your RADIUS server uses for authentication. Default port is 1812.Radius Secret  Specify RADIUS secret furnished by the RADIUS server.Group Key Update Interval  Specify how often, in seconds, the group key changes.Radius Accounting  Select to enable or disable RADIUS accounting.Radius Accounting Server  Specify the IP address of the RADIUS accounting server.Radius Accounting Port  Specify the port number that your RADIUS accounting server uses for authentication. Default port is 1813.Radius Accounting Secret  Specify RADIUS accounting secret furnished by the RADIUS server.Interem Accounting Interval  Specify the interem accounting interval (60 - 600 seconds).Click Save to save the changes or Cancel to cancel and return previous settings.Note:802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  WI-FI PROTECTED ACCESS (WPA) MIXED 4-34Wi-Fi Protected Access (WPA) MixedSecurity Mode  Select WPA Mixed from the drop-down list to begin the configuration.Encryption  Select Both, TKIP, or AES as the encryption type.Both = uses TKIP and AES.TKIP = automatic encryption with WPA-PSK; requires pass-phrase.AES = automatic encryption with WPA2-PSK; requires passphrase.Radius Server  Specify the IP address of the RADIUS server.Radius Port  Specify the port number that your RADIUS server uses for authentication. Default port is 1812.Radius Secret  Specify RADIUS secret furnished by the RADIUS server.Group Key Update Interval  Specify how often, in seconds, the group key changes.Radius Accounting  Select to enable or disable RADIUS accounting.Radius Accounting Server  Specify the IP address of the RADIUS accounting server.Radius Accounting Port  Specify the port number that your RADIUS accounting server uses for authentication. Default port is 1813.Radius Accounting Secret  Specify RADIUS accounting secret furnished by the RADIUS server.Interem Accounting Interval  Specify the interem accounting interval (60 - 600 seconds).Click Save to save the changes or Cancel to cancel and return previous settings.Note:WPA-PSK Mixed can allow multiple security modes at the same time. 802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will change from 802.11n to 802.11a.
  CONFIGURING WIRELESS MAC FILTER 4-354.4.3 Configuring Wireless MAC FilterWireless MAC Filters are used to allow or deny network access to wireless clients according to their MAC addresses. You can manu-ally add a MAC address to restrict the permission to access ENH500. The default setting is Disable Wireless MAC Filters.ACL Mode  Determines whether network access is granted or denied to clients whose MAC addresses appear in the MAC Address table on this page. Choices are Disable, Deny MAC in the list, or Allow MAC in the list.MAC Address Filter  Enter the MAC address of the device.Click Add to add the MAC address to the MAC Address table.Click Apply to apply the changes.Note:This section applies to Access Point and WDS Access point mode.
  CONFIGURING WDS LINK SETTINGS 4-364.4.4 Configuring WDS Link SettingsUsing WDS Link Settings, you can create a wireless backbone link between multiple access points that are part of the same wireless network. This allows a wireless network to be expanded using multiple Access Points without the need for a wired backbone to link them, as is traditionally required.Security  Select the type of WDS security: None, WEP, or AES.WEP Key  Enter the WEP key.AES Passphrase  Enter the AES passphrase.MAC Address  Enter the MAC address of the Access Point to which you want to extend wireless connectivity.Mode  Select Disable or Enable to disable or enable WDS.Click Accept to confirm the changes or Cancel to cancel and return previous settings.Note:The Access Point to which you want to extend wireless connectivity must enter the ENH500’s MAC address into its configuration. For more information, refer to the documentation for the Access Point. Not all Access Point supports this feature.
  CONFIGURING ADVANCED NETWORK SETTINGS 4-374.4.5 Configuring Advanced Network SettingsConfigure the advanced wireless settings for your access point using the screens in this section. Leave these settings to their default values if you are not sure what values to enter.Data Rate  Select a data rate from the drop-down list. The data rate affects throughput. If you select a low data rate value, for example, the throughput is reduced but the transmission distance increases.Transmit Power  Lets you increase or decrease transmit power. Higher transmit power may prevent connections to the network, while the lower transmit power can prevent clients from connecting to the device.RTS/CTS Threshold  Specify the threshold package size for RTC/CTS. A small number causes RTS/CTS packets to be sent more often and consumes more bandwidth.Distance  Specify the distance between Access Points and clients. Longer distances may drop high-speed connections.Aggregation  Merges data packets into one packet. This option reduces the number of packets, but increases packet sizes.Wireless Traffic ShapingEnable Traffic Shaping  Enable or disable the regulation of packet flow leaving an interface for improved QoS.Incoming Traffic Limit  Specify the wireless transmission speed used for downloading.Outgoing Traffic Limit  Specify the wireless transmission speed used for uploading.Total Percentage  Specify the total percentage of the wireless traffic that is shaped.SSID1 to SSID4  Specify the percentage of the wireless traffic that is shaped for a specific SSID.
  MANAGEMENT SETUP 4-384.5 Management SetupThe Management section lets you configure administration, management VLAN, SNMP settings, backup/restore settings, firmware upgrade, time settings, and log settings. This chapter describes these settings.4.5.1 Configuring Administrator AccountClick the Administration link under the Management menu to change the user name and password used to log on to the ENH500 Web Configurator. The default user name is admin and the default password is admin. Changing these settings protects the EnSta-configuration settings from being accessed by unauthorized users.New Name  Enter a new username for logging in to the Web Configurator.New Password  Enter a new password for logging in to the Web ConfiguratorConfirm Password  Re-enter the new password for confirmation.Click Save/Apply to apply the changes or Cancel to return previous settings.Remote Management  Enable or disable remote management.Remote Upgrade  Specify whether the ENH500 firmware can be upgraded remotely.Remote Management Port  If remote management is enabled, enter the port number to be used for remote management. For example: If you specify the port number 8080, enter http://<IP address>:8080 to access the ENH500 Web Configurator.Click Accept to apply the changes or Cancel to return previous settings.
  CONFIGURING MANAGEMENT VLAN 4-394.5.2 Configuring Management VLANClick the Management VLAN link under the Management menu to assign a VLAN tag to the packets. A VLAN is a group of computers on a network whose software has been configured so that they behave as if they were on a separate Local Area Network (LAN). Computers on VLAN do not have to be physically located next to one another on the LANManagement VLAN ID  If your network includes VLANs and if tagged packets need to pass through the Access Point, enter the VLAN ID. Otherwise, click No VLAN tag.Click Accept to confirm the changes or Cancel to cancel and return previous settings.Note:If you reconfigure the Management VLAN ID, you may lose your connection to the ENH500. Verify that the DHCP server supports the reconfigured VLAN ID and then reconnect to the ENH500 using the new IP address.
  CONFIGURING SNMP 4-404.5.3 Configuring SNMPSNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative atten-tion.SNMP  Enable or disable the ENH500 SNMP function.Contact  Enter the contact details of the device.Location  Enter the location of the device.Community Name (Read Only)  Enter the password for accessing the SNMP community for read-only access.Community Name (Read/Write)  Enter the password for accessing the SNMP community for read and write access.Trap Destination Address  Enter the IP address where SNMP traps are to be sent.Trap Destination Community Name  Enter the password of the SNMP trap community.SNMPv3  Enable or Disable the SNMPv3 feature.User Name  Specify the username for SNMPv3.Auth Protocol  Select the authentication protocol type: MD5 or SHA.Auth Key (8-32 Characters)  Specify the authentication key for authentication.Priv Protocol  Select the privacy protocol type: DES.Priv Key (8-32 Characters)  Specify the privacy key for privacy.
  CONFIGURING SNMP 4-41Engine ID  Specify the engine ID for SNMPv3.Click Save/Apply to apply the changes or Cancel to return previous settings.
  CONFIGURING BACKUP/RESTORE SETTINGS 4-424.5.4 Configuring Backup/Restore SettingsClick the Backup/Restore Setting link under the Management menu to save the ENH500’s current settings in a file on your local disk or load settings onto the device from a local disk. This feature is particularly convenient administrators who have several ENH500 devices that need to be configured with the same settings.This page also lets you return the ENH500 to its factory default settings. If you perform this procedure, any changes made to the ENH500 default settings will be lost.Save A Copy of Current Settings  Click Backup to save the current configured settings.Restore Saved Settings from A File  To restore settings that have been previously backed up, click Browse, select the file, and click Restore.Revert to Factory Default Settings  Click Factory Default to restore the ENH500 to its factory default settings.
  CONFIGURING AUTO REBOOT SETTINGS 4-434.5.5 Configuring Auto Reboot SettingsClick the Auto Reboot Settings link under the Management menu to enable or disable the Auto Reboot function. This feature is par-ticularly convenient to administrators for the scheduling of auto rebooting on the device.This page also allows you to set the frequency of this function.Auto Reboot Setting  Select Enable from the drop-down menu to setup this function.Frequency of Auto Reboot  Select the frequency interval using the drop-down menus.Save/Apply  Click Save/Apply to set the new configuration.Cancel  Click Cancel to delete the settings.
  CONFIGURING FIRMWARE UPGRADE 4-444.5.6 Configuring Firmware UpgradeFirmware is system software that operates and allows the administrator to interact with the router.To update the firmware version, follow these steps:1. Download the appropriate firmware approved by EnGenius Networks from an approved web site.2. Click Choose File.3. Browse the file system and select the firmware file.4. Click Upload.5. The ENH500 restarts automatically after the upgrade completes.WARNING!Upgrading firmware through a wireless connection is not recommended. Firmware upgrading must be performed while connected to an Ethernet (LAN port) with all other clients disconnected.The firmware upgrade procedure can take several minutes. Do not power off the ENH500 during the firmware upgrade, as it can cause the device to crash or become unusable.Note:Save the firmware file to a local hard drive.!
  CONFIGURING SYSTEM TIME 4-454.5.7 Configuring System TimeChange the system time of the ENH500 by manually entering the information, synchronizing the device with a PC, or setup auto-matic updates through a network time (NTP) protocol server.Manually Set Date and Time  Enter the date and time values in the date and time fields or click the Synchronize with PC button to get the date and time values from the administrator’s PC.Automatically Get Date and Time  Select a time zone from the drop-down list and check whether you want to enter the IP address of an NTP server or use the default NTP server.Enable Daylight Saving  Click to enable or disable daylight savings time. Select the start and stop times from the Start Time and Stop Time dropdown lists.Click Save/Apply to apply the changes or Cancel to return previous settings.
  CONFIGURING WI-FI SCHEDULE 4-464.5.8 Configuring Wi-Fi ScheduleUse the Wi-Fi schedule function to control the wireless power ON/OFF service that operates on a routine basis.Add a Schedule ServiceCreate a schedule service type and date/time parameters for a specific service.Schedule Name Enter the description of the schedule service.Service Select the type of schedule service, either Wireless Power ON or Wireless Power OFF.Day Select the days of the week to enable the schedule service.Time of Day Set the start time that the service is active.Click Add to append the schedule service to the sched-ule service table, or Cancel to discard changes.
  SCHEDULE SERVICES TABLE 4-47Schedule Services TableThe Schedule function relies on the GMT time setting acquired from a network time protocol (NTP) server. For details on how to con-nect the ENH500 to an NTP server, see Configuring System Time.Schedule Table Displays a list of scheduled services for the ENH500. The properties of each service displayed are:# Displays the ID number of the service in the table.Name Displays the description of the service.Service Displays the type of service, either Wireless Power ON or Wireless Power OFF.Schedule Displays the schedule information of when the service is active.Select  Select one or more services to edit or delete.Click Delete Selected to delete the selected services or Delete All to delete all services.Click Apply to save the settings or Cancel to discard changes.
  CONFIGURING COMMAND LINE INTERFACE 4-484.5.9 Configuring Command Line InterfaceMost users will configure the ENH500 through the graphical user interface (GUI). However, for those who prefer an alternative method there is the command line interface (CLI).  The CLI can be access through a command console, modem or Telnet connec-tion.CLI  Select to enable or disable the ability to modify the ENH500 via a command line interface (CLI).Click Save/Apply to apply the changes or Cancel to return previous settings.
  CONFIGURING LOGGING 4-494.5.10 Configuring LoggingDisplay a list of events that are triggered on the ENH500 Ethernet and wireless interfaces. You can consult this log if an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.Syslog  Enable or disable the ENH500 syslog function.Log Server IP Address  Enter the IP address of the log server.Local Log  Enable or disable the local log service.Click Save/Apply to apply the changes or Cancel to return previous settings.
  CONFIGURING DIAGNOSTICS 4-504.5.11 Configuring DiagnosticsThe diagnosis feature allow the administrator to verify that another device is available on the network and is accepting request pack-ets. If the ping result returns alive, it means a device is on line. This feature does not work if the target device is behind a firewall or has security software installed.Target IP / Domain Name   Enter the IP address you would like to search.Ping Packet Size  Enter the packet size of each ping.Number of Pings  Enter the number of times you want to ping.Start Ping  Click Start Ping to begin pinging.Trace route target  Enter an IP address or domain name you want to trace.Start Traceroute  Click Start Traceroute to begin the traceroute operation.Target Address  Enter the IP address of the target PC.Time period  Enter time period for the speed test.Check Interval  Enter the interval for the speed test.Start Speed Test  Click Start Speed Test to begin the speed test operation.IPv4 Port  Displays the IPv4 port number of the ENH500.IPv6 Port  Displays the IPv6 port number of the ENH500.
  VIEWING DEVICE DISCOVERY 4-514.5.12 Viewing Device DiscoveryDevice Name  Displays the name of the devices connected to the network.Operation Mode  Displays the operation mode of the devices connected to the network.IP Address  Displays the IP address of the devices connected to the network.System MAC Address  Displays the system MAC address of the devices connected to the network.Firmware Version  Displays the firmware version of the devices connected to the network.
  CONFIGURE DENIAL OF SERVICE PROTECTION 4-524.5.13 Configure Denial of Service ProtectionUse TCP SYN Cookies Protection  Click to enable TCP SYN cookies protection.SYN Flood Attack Protection  Click to enable or disable SYN Flood Attack Protection.Match Interval Per Second   Enter the allowed number of packets per second.Limit Packets  Enter the maximum number of packets allowed per request.UDP Flood Attack Protection  Click to enable or disable UDP Flood Attack Protection.Match Interval Per Second   Enter the allowed number of packets per second.Limit Packets  Enter the maximum number of packets allowed per request.Ping Attack Protection  Click to enable or disable ping attack protection.Click Save/Apply to apply the changes or Cancel to return previous settings.
  LOGGING OUT 4-534.5.14 Logging OutClick Logout to logout from the EENH500.
  Appendix
A-1Federal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment o and on, the user is encouraged to try to correct the interference by one of the following measures: • Reorientorrelocatethereceivingantenna. • Increasetheseparationbetweentheequipmentandreceiver. • Connecttheequipmentintoanoutletonacircuitdierentfromthattowhichthereceiverisconnected. • Consultthedealeroranexperiencedradio/TVtechnicianforhelp.     FCC Caution:     Anychangesormodicationsnotexpresslyapprovedbythepartyresponsibleforcompliancecouldvoidtheuser’sauthoritytooperate      this equipment.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.           IMPORTANT NOTE: FCC Radiation Exposure StatementThisequipmentcomplieswith FCCradiationexposurelimits set forth foran uncontrolledenvironment.Thisequipmentshould be installed andoperated with minimum distance 2cm between the radiator & your body.Appendix A
B-1Europe – EU Declaration of ConformityThisdevicecomplieswiththeessentialrequirementsoftheR&TTEDirective1999/5/EC.ThefollowingtestmethodshavebeenappliedinordertoprovepresumptionofconformitywiththeessentialrequirementsoftheR&TTEDirective1999/5/EC:• EN60950-1    Safety of Information Technology Equipment • EN50385  Genericstandardtodemonstratethecomplianceofelectronicandelectricalapparatuswiththebasicrestrictionsrelatedtohumanexposureto electromagnetic elds (0 Hz - 300 GHz) • EN301893    Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive • EN301489-1    Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements • EN301489-17  Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specic conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipmentAppendix B - CE Interference Statement
B-2Thisdeviceisa5GHzwidebandtransmissionsystem(transceiver),intendedforuseinallEUmemberstatesandEFTAcountries,exceptinFranceand Italy where restrictive use applies.In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting upoutdoorradiolinksand/orforsupplyingpublicaccesstotelecommunicationsand/ornetworkservices.This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the end-user should contact the national spectrum authority in France.Česky [Czech] [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES.Dansk [Danish]  Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.Deutsch [German]  Hiermit erklärt [Name des Herstellers], dass sich das Gerät [Gerätetyp] in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet.Eesti [Estonian] Käesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tüüp = type of equipment] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele..English Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.Español [Spanish]  Por medio de la presente [nombre del fabricante] declara que el [clase de equipo] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.Ελληνική [Greek]  ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [name of manufacturer] ΔΗΛΩΝΕΙ ΟΤΙ [type of equipment] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ.
B-3Français [French]  Par la présente [nom du fabricant] déclare que l’appareil [type d’appareil] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.Italiano [Italian] Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.Latviski [Latvian] Ar šo [name of manufacturer  / izgatavotāja nosaukums] deklarē, ka [type of equipment / iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem.Lietuvių [Lithuanian] Šiuo [manufacturer name] deklaruoja, kad šis [equipment type] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.Nederlands [Dutch]  Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG..Malti [Maltese] Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC..Magyar [Hungarian]  Alulírott, [gyártó neve] nyilatkozom, hogy a [... típus] megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.Polski [Polish]  Niniejszym [nazwa producenta] oświadcza, że [nazwa wyrobu] jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.Português [Portuguese] [Nome do fabricante] declara que este [tipo de equipamento] está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE.Slovensko [Slovenian]  [Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES.Slovensky [Slovak]  [Meno výrobcu] týmto vyhlasuje, že [typ zariadenia] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.Suomi [Finnish]  [Valmistaja = manufacturer] vakuuttaa täten että [type of equipment = laitteen tyyppimerkintä] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.Svenska [Swedish]  Härmed intygar [företag] att denna [utrustningstyp] står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
APPENDIX C INDUSTRY CANADA STATEMENT C-1Appendix CIndustry Canada StatementThis device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement indésirable. Caution: (i) the device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; (ii) high-power radars are allocated as primary users (i.e. priority users)of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.   Adverstissement: (i).les dispositifs fonctionnant dans la bande 5 150-5 250 MHz sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux; (ii) De plus, les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.Radiation Exposure Statement:This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 21 cm between the radiator & your body.Déclaration d'exposition aux radiations:Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 21 cm de distance entre la source de rayonnement et votre corps.

Navigation menu