Home
LevelOne EAP-300_UM_V1_0
Contents
1. Repeater Advanced Access Control and Site Survey EAP 300 supports up to eight Virtual Access Points VAPs Each VAP can have its own settings e g ESSID VLAN ID security settings etc Such VAP capabilities enable different levels of service to meet network requirements a 7 2 1 VAP Overview An overall status is collected on this page including ESSID State Security Type MAC ACL and Advanced Settings where EAP 300 has 8 VAPs each having its own settings In this table please click on the hyperlink to further configure each individual VAP VAP Overview General Y VAP Config Y Security Y Repeater Y Advanced Y Access Control Site Survey Home gt Wireless gt VAP Overview VAP No ESSID EAPSOO 1 EAP3O0 2 EAPSOO 3 EAP300 4 EAP300 5 EAP 300 6 EAP 300 7 EAP 300 8 State Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled VAP Overview Security Type None None None None None None None None VAP Overview Page 42 MAC ACL Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Adwanced Settings Edit Edit Edit Edit Edit Edit Edit Edit e State The hyperlink showing Enable or Disable connects to the VAP Configuration page Eh a NI Ta 3 N i VAP Overview General WYAF Config k Security Repeater Advanced Access Control Site Survey Home Wireless VAP Config VAP Configuration Profile Name VAP
2. The Web Management Interface System Overview Page 12 e To logout simply click on the Logout button at the upper right hand corner of the interface to return to the Administrator Login Page Click OK to logout fHome Logout Help Logout Message from webpage Eg P re vou sure to logoff Please follow the following steps to change the administrator s password g gt gt O A 2 System AP Firewall Utilities Status N Change Password Backup Restore System Upgrade Reboot 4 Home gt Utilities gt Change Password Change Password Name admin Old Password New Password up to 32 characters Re enter New Password Change Password Page gt Click on the Utilities button and then select the Admin Password tab gt Enter the old password and then a new password with a length of up to 32 characters and retype it in the Re enter New Password field Congratulations Now LevelOne s EAP 300 is installed and configured successfully It is strongly recommended to make a backup copy of configuration settings A e After the EAP 300 s network configuration is completed please remember to change the IP Address of your PC Connection Properties back to its original settings in order to ensure that your PC functions properly in its real network environments Article III Connect your AP to your Network The following instructions depict how to establish the wireless cov
3. Disable Enable ARP Inspection Disable Enable Force DHCP Disable Enable Trust List Broadcast Disable Enable Static Trust List Disable Enable Trust Interface Each VAP interface can be checked individually to mark as trusted interfaces security enforcements on DHCP ARP like DHCP snooping and ARP inspection will be carried out on non trusted interfaces DHCP Snooping When enabled DHCP packets will be validated against possible threats like DHCP starvation attack in addition the trusted DHCP server IP MAC can be specified to prevent rouge DHCP server ARP Inspection When enabled ARP packets will be validated against ARP spoofing o Force DHCP option when enabled the AP only learns MAC IP pair information through DHCP packets Since devices configured with static IP address does not send DHCP traffic therefore any clients with static IP address will be blocked from internet access unless its MAC IP pair is listed and enabled on the Static Trust List o Trust List Broadcast can be enabled to let other AP with L2 firewall feature learn the trusted MAC IP pairs to issue ARP requests o Static Trust List can be used to add MAC or MAC IP pairs of devices that are trusted to issue ARP request Other network nodes can still send their ARP requests however if their IP appears in the static list with different MAC their ARP requests will be dropped to prevent eavesdropping lf any settings are made please clic
4. Disable Enable VAP 1 EAP300 1 VLAN ID Disable Enable VLAN ID 1 4094 Profile Name ESSID VAP State Page eSecurity Type The hyperlink showing the security type connects to the Security Settings Page VAP Overview General VAP Config N Secu rity Repeater Advanced Access Control Home gt Wireless gt Security Site Survey Security Settings Profile Name VAP 1 Security Type VAP Security Type Page 43 e MAC ACL The hyperlink showing Allow or Disable connects to the Access Control Settings Page a a k A re VAP Overview General WAP Config Security i Advanced 4 Access Control Site Survey N L 4 Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type Disable Access Control Access Control Settings Page e Advanced Settings The advanced settings hyperlink connects to the Advanced Wireless Settings Page VAP Overview General WAP Config Security Repeater Home Wireless gt Advanced i Adwanced Access Control Site Survey 4 Y 1 L Advanced Wireless Settings Profile Name RTS Threshold 1 2346 Fragment Threshold 256 2346 DTIM period 1 15 Broadcast SSID Disable Enable Wireless Station Isolation Disable Enable WMM Disa
5. If broadcast of the SSID is disabled only devices that have the correct SSID can connect to the system e Wireless Station Isolation By enabling this function all stations associated with the system are isolated and can only communicate with the system 54 e WMM The default is Disable Wi Fi Multimedia WMM is a Quality of Service QoS feature that prioritizes wireless data packets based on four access categories voice video best effort and background Applications without WMM and applications that do not require QoS are assigned to the best effort category which receives a lower priority than that of voice and video Therefore WMM decides which data streams are more important and assigns them a higher traffic priority This option works with WMM capable clients only lt To receive the benefits of WMM QoS gt The application must support WMM WMM shall be enabled on EAP 300 WMM shall be enabled in the wireless adapter on clients computer e lIAPP IAPP Inter Access Point Protocol is a protocol by which access points share information about the stations that are connected to them By enabling this function the system will automatically broadcast information of associated wireless stations to its peer access points This will help wireless stations roam smoothly among IAPP enabled access points in the same wireless LAN e Multicast Broadcast Rate Bandwidth configuration for multicast oroadcast packets If your wireles
6. Management GRE Tunnel Home gt System gt Management Services Management Services VLAN for Management Disable Enable viANID 1 4094 SNMP Configuration Disable Enable Community String Trap Disable Enable a ae Disable Enable SYSLOG Server IP 192 168 1 254 Server Port si4 SYSLOG Level Management Services Page e VLAN for Management When enabling this function management traffic from the system will be tagged with a VLAN ID In other words administrator who wants to access the WMI must send management traffic with the same VLAN ID such as connecting to the VAP with the same VLAN ID Enter a value between 1 and 4094 for the VLAN ID if the option is enabled 3 e SNMP Configuration By enabling SNMP function the administrator can obtain the system information remotely SNMP Configuration Disable Enable Community String Trap Disable Enable SNMP Configuration Fields gt Enable Disable Enable or Disable this function gt Community String The community string is required when accessing the Management Information Base MIB of the system o Read Enter the community string to access the MIB with Read privilege o Write Enter the community string to access the MIB with Write privilege gt Trap When enabled events on Cold Start Interface UP amp Down and Association amp Disassociation can be reported to an assigned server o Enable Disable Enable or
7. Profile Name VAP 1 Maximum Number of Clients Range 1 32 3 MAC ACL Deny List Access Control Type No MAC Address MAC ACL Deny List State 30 4 RADIUS ACL Authenticate incoming MAC addresses by an external RADIUS server When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS server Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration VAP Overview M General N YAP Config Security Repeater y Adwa nced Y Access Control Site Survey 4 Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 3 Access Control Type RADIUS ACL w PE ES SEREF i Notell These settings will also apply to security settings which use RADIUS Server for this VAP Host fi Domain Name IP Address Authentication Port 1812 1 65535 Secondary RADIUS Server Host DOO Authentication Port RADIUS ACL Click Save and Reboot after completing your configurations to have them take effect 3 Article VI Create a WDS Bridge between two APs WDS link creation will assist to extend network coverage where running wires is not an option effectively transferring the traffics to the other end of WLAN LAN through the EAP 300 Since this is a peer to peer connection both EAP 300s will be configured by the same
8. VaP Liv Security Type B02 1X v Dynamic WEP Disable Enable WEP Key Length 64 bits 128 bits Rekeying Period 300 second s Peay MARIES SOME p ii i Domain Name IP Address Authentication Port 1812 ili Secret Key Accounting Service Disable Enable Accounting Port 1 Accounting Interim Update Interval Ee secondisi Security Settings 802 1X Authentication gt Dynamic WEP Settings o Dynamic WEP For 802 1X security type Dynamic WEP is always enabled to automatically generate WEP keys for encryption o WEP Key Length Select from 64 bit or 128 bit key length o Rekeying Period The time interval for the dynamic WEP key to be updated the time unit is in second gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period 26 e WPA PSK Provide shared key authenticaiton in WP
9. admin and new password and then re enter the new password in the Re enter New Password field Click Save to activate the new password 68 b 7 3 2 Backup amp Restore This function is used to backup and restore the EAP 300 settings The EAP 300 can also be restored to factory defaults using this function It can be used to duplicate settings to other access points backup settings of this system and then restore on another AP System Upgrade Reboot 4 I Change Password y Backup amp Restore Home Utilities gt Config Save amp Restore Configuration Backup amp Restore Reset to Default Backup System Settings Backup amp Restore Page e Reset to Default gt Click Reset to load the factory default settings of EAP 300 A pop up Page will appear to reconfirm the request to reboot the system Click OK to proceed or click Cancel to cancel the reboot request Message from webpage J This action will reboot the system Do you want to continue Reboot Confirmation Prompt gt Awarning message as displayed below will appear during the reboot period The system power must be kept turn on before the completion of the reboot process gt The System Overview page will appear upon the completion of reboot e Backup System Settings Click Backup to save the current system settings to a local disk such as the hard disk drive HDD of a local computer or a compact disc CD e Restore System
10. generate WEP keys for encryption o WEP Key Length Select from 64 bit or 128 bit key length o Re keying Period The time interval for the dynamic WEP key to be updated the time unit is in second gt RADIUS Server Settings Primary Secondary o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes 49 Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period e WPA PSK WPA PSK Wi Fi Protected Access Pre shared Key is a pre shared key authentication method a special mode of WPA VAP S T E General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Pre shared Key Type PSK Hex 64 chars Passphrase 8 63 chars Group Key Update Period 600 second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP
11. o WEP Key Length Select from 64 bit or 128 bit key length o Rekeying Period The time interval for the dynamic WEP key to be updated the time unit is in second gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period 26 e WPA PSK Provide shared key authenticaiton in WPA data encryption VAP Overview General VAP Config Y Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Type Cipher Suite Pre shared Key Type Security Settings Profile Name VAP 1 WPA PSK TKIP WPA wt D PSK Hex 64 chars Passphrase 8 63 chars Pre shared Key PO Group Key Update Period 600 second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed gt Pre shared Key Type S
12. 1 ESSID EAP3O0 1 VLAN ID Disable Enable VLANID 1 4094 VAP Configuration Page VAP 1 shown Select Enable for the VAP field and click Save Click the Overview tab to return to the previous table to begin the next step Step 2 Configure Security Settings for your VAP Now we will proceed to secure your AP The following instructions allow you to secure it using a wireless standard encryption If you wish to only restrict MAC addresses skip to the Step3 If you want to also include MAC restrictions include the following step First click on the corresponding cell in the column labeled Security Type This hyperlink will direct you to the following Security Settings page VAP Overview General VAP Config Security Repeater Advanced Access Control Y Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings Page VAP 1 shown Select your desired Security Type from the drop down menu which includes None WEP 802 1X WPA PSK and WPA RADIUS 24 e None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security
13. EN A o Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 LAN Interface ______ rs AP Status Profile Security Online MAC Address 00 1F 04 83 96 01 Hime BSSID ESSID read Clients GRE IP Address VAP 1 00 1F D4 83 96 02 EAP 1 None 0 Ge Subnet Mask 255 255 0 0 VAP 2 06 1F D4 83 96 02 FAP 2 None 0o Gateway VAP 3 QA 1F D4 83 96 02 EAP 3 None 0 GRE Tunnel Status Connected Remote IP 192 168 3 3 Key 12345 System Overview Page 72 Table 3 Status Page s Organizational Layout System Name The system name of the EAP 300 Firmware Version The present firmware version of the EAP 300 The present firmware build number of the Build Number EAP 300 System Location The location of the EAP 300 The site of the EAP 300 Device Time The system time of the EAP 300 The time that the system has been rebooted in System Up Time operation LAN Interface Radio Status GRE Tunnel 7 ey Remote IP The IP Address of AC The password for the connection 74 b 7 4 2 Associated Client The administrator can remotely oversee the status of all associated clients on this page When a low SNR is found here the administrator can tune the corresponding parameters or investigate the settings of associated clients to improve network communication performance Overview Associated Clients Repeater Y Event Log Home gt S
14. EtherType Remark Setting 1 DROP CDP and VTP IEEE_ 8023 Del Ed In Mv 2 F DROP STP BPDU IEEE_8023 Del Ed In Mv 3 P DROP GARP IEEE_8023 Del Ed In Mv 4 O DROP RIP IPv4 Del Ed In Mv 5 O DROP HSRP IPv4 Del Ed In Mv 6 O DROP OSPF IPv4 Del Ed In Mv 7 Del Ed In Mv 8 Del Ed In Mv 9 Del Ed In Mv 10 Del Ed In Mv First Prev Next Last total 20 65 b 7 3 2 Service The administrator can add or delete firewall service here the services in this list will become options to choose in firewall rule when EtherType is IPv4 EAP 300 provides a list of rules to block or pass traffics of layer 3 or above protocols These services are available to choose from drop down list of layer2 firewall rule edit page with Ether Type to be IPv4 The first 28 entries are default services and the administrator can add delete any extra desired services There are 28 firewall services available in default settings these default services cannot be deleted but can be disabled If changes are made please click SAVE to save the settings before leaving this page Firewall List Service Advanced Home Firewall Service Config No Name 1 ALL 2 ALL TCP 3 ALL UDP ALL ICMP 3 FIP 6 HTTP 7 HTTPS POPS g SMTP 10 DHCP Firewall Service Description Delete ALL TCP Source Port 0 65535 Destination Port 0 65535 UDP Source Port 0 65535 Destination Port 0 65535 ICMP TCP UDP Destination Port 20 21 TCP UDP Destination Port 80 TCP U
15. Layout System Name The system name of the EAP 300 Firmware Version The present firmware version of the EAP 300 The present firmware build number of the Build Number EAP 300 System Location The location of the EAP 300 The site of the EAP 300 Device Time The system time of the EAP 300 The time that the system has been rebooted in System Up Time operation LAN Interface Radio Status GRE Tunnel 7 ey Remote IP The IP Address of AC The password for the connection 74 b 7 4 2 Associated Client The administrator can remotely oversee the status of all associated clients on this page When a low SNR is found here the administrator can tune the corresponding parameters or investigate the settings of associated clients to improve network communication performance Overview Associated Clients Repeater Y Event Log Home gt Status gt Wireless Clients Associated Client Status Client List Associated VAP ESSID MAC Address SNR dB Idle Time secs Disconnect Associated Client Status Page e Associated VAP The name of a VAP Virtual Access Point that the client is associated with e ESSID The Extended Service Set ID which the client is associated with e MAC Address The MAC address of associated clients e SNR The Signal to Noise Ratio of respective client s association e Idle Time Time period that the associated client is inactive the time unit is in second e Disconnect Upon clicking
16. Settings Click Browse to search for a previously saved backup file and then click Upload to restore the settings The backup file will replace the active configuration file currently running on the system After network parameters have been reset restored the network settings of the administrator PC may need to be changed to ensure that the IP address of the administrator PC is on the same subnet mask as the EAP 300 69 c 7 3 3 System Upgrade The EAP 300 provides a web firmware upload upgrade feature The administrator can download the latest firmware from the website and save it on the administrator s PC To upgrade the system firmware click Browse to choose the new firmware file you downloaded onto your PC and then click Upload to execute the process There will be a prompt confirmation message appearing to notify the administrator to restart the system after a successful firmware upgrade Please restart the system after upgrading the firmware Change Password Backup amp Restore System Upgrade Reboot Home Utilities gt System Upgrade System Upgrade Current Version Current Build Number System Upgrade Page e It is recommended to check the firmware version number before proceeding further Please make sure you have the correct firmware file a Male e Firmware upgrade may sometimes result in the loss of some data Please ensure that all necessary settings are written down before upgrading the firmware
17. Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism with key length selected from 64 bit 128 bit or 152 bit VAP Overview General VAP Contig Y Security Repeater Advanced Access Control Site Survey 4 Home gt Wireless gt Security Security Settings Profile Name Security Type WEP w Note The WEP keys are global setting for all virtual APs The key value will apply to all VAPs 802 11 Authentication Open System Shared Key Auto WEP Key Length 64 bits 128 bits 152 bits WEP Key Format ascu Hex WEP Key Index WEP Keys i oOo Security Settings WEP gt 802 11 Authentication Select from Open System Shared Key or Auto gt WEP Key Length Select from 64 bit 128 bit 152 bit key length gt WEP Key Format Select from ASC or Hex format for the WEP key gt WEP Key Index Select a key index from 1 through 4 The WEP key index is a number that specifies which WEP key is used for the encryption of wireless frames during data transmission gt WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 25 e 802 1X When 802 1X Authentication is selected RADIUS authentication and enhanced dynamic WEP are provided i i VAP Overview 4 General Y VAP Config Y Security Repeater Y Advanced Y Access Control Site Survey Home gt Wireless gt Securit Security Settings Profile Name
18. and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure VAP Overview General 1 WAP Config N Secu rity Repeater Advanced J Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism based on a 64 bit 128 bit or 152 bit shared key algorithm l w 4 4 l 4 j 4 4 l 4 VAP Overview General VAP Config Security Repeater j Advanced Access Control Y Site Survey Home Wireless gt Security Security Settings Profile Name Security Type WEP Note The WEP keys are global setting for all virtual APs The key value will apply to all VAPs 02 11 Authentication Open System Shared Key Auto WEP Key Length 64 bits 128 bits 152 bits WEP Key Format ascu Hex WEP Key Index WEP Keys Security Settings WEP 48 gt 802 11 Authentication Select from Open System Shared Key or Auto gt WEP Key Length Select from 64 bit 128 bit 152 bit key length gt WEP Key Format Select from ASCII or Hex format for the WEP key gt WEP Key Index Select a key index from 1 4 The WEP key index is a number that specifies which WEP key us used for the encryption of wireless frames during data transmission gt WEP Keys Provide the pre define
19. login prompt reappears the device has completed the reset to default process and the LAN IP is reset to 192 168 1 1 Copying Feature Control Profile Check customized objects Check customized pages objects Configuration file tmp hosta Cat can t open tmp status s start syslogd CHH 03if wap atop Stopping OSIF WAF br port 3 fathOapo entering disabled state loctl IEEESO0211 I0CTL SETMLME Invalid argument Could not connect to kernel driver toctl TEEES0e11 TOCTL SETMLME Invalid argumant Using interface athOapO with hwaddr OO 00 33 93 and ssid EAP200 1 brO port SlathOapO entering forwarding state le packet receive r pda athOapo log n No such file or directory ewErom Wetwork is down rR Tm m m a ROS m to rfrom Network is down aera messages they ll go to dev null rR la packet receive rE Warning No sourt o H ro E Fh ti Ch nent 3 prokbe s Feceived oO bebig a fC Pi m Aw far m er O broadcast z Sta art WES tLarting pid 546 try fsebin getty wrapper 3h L tryso 115200 wt100 SYSTEM IF 192 160 Enter Set t wh actory default login 10 Section 2 06 2 5 Access Web Management Interface LevelOne EAP 300 supports web based configuration Upon the completion of hardware installation EAP 300 can be configured through a PC by using its web browser such as Mozilla Firefox 2 0 and higher or Internet Explorer version 6 0 and hig
20. receives a lower priority than that of voice and video Therefore WMM decides which data streams are more important and assigns them a higher traffic priority This option works with WMM capable clients only lt To receive the benefits of WMM QoS gt The application must support WMM WMM shall be enabled on EAP 300 WMM shall be enabled in the wireless adapter on clients computer e lIAPP IAPP Inter Access Point Protocol is a protocol by which access points share information about the stations that are connected to them By enabling this function the system will automatically broadcast information of associated wireless stations to its peer access points This will help wireless stations roam smoothly among IAPP enabled access points in the same wireless LAN e Multicast Broadcast Rate Bandwidth configuration for multicast oroadcast packets If your wireless clients require larger or smaller bandwidth for sending multicast broadcast packets the administrator can customize the EAP700 s multicast broadcast bandwidth here 99 g 7 2 6 Access Control On this page the network administrator can restrict the total number of clients connected to the EAP 300 as well as specify particular MAC addresses that can or cannot access the device VAP Overview General Y VAP Config 4 Security Repeater Advanced Access Control Site Survey Home Wireless Access Control Access Control Settings Profile Name VA
21. recommended to use an NTP server for time synchronization because system time needs to be reconfigured once system reboot when choosing Manual set up 37 b 7 1 2 Network Interface On this page the devices network settings may be configured field with a red asterisk i e IP Address Netmask Default Gateway and Primary DNS Server are required General Y Network Interface Management Y GRE Tunnel Home gt System gt Network Interface Network Settings Mode Static DHCP IP Address J Default Gateway Primary DNS Server Alternate DNS Server fo Layer STP Disable Enable Network Settings Page e Mode Determine the way to obtain the IP address by DHCP or Static gt Static The administrator can manually set up the static LAN IP address All required fields are marked with a red asterisk o IP Address The IP address of the LAN port o Netmask The Subnet mask of the LAN port o Default Gateway The Gateway IP address of the LAN port o Primary DNS Server The IP address of the primary DNS Domain Name System server o Alternate DNS Server The IP address of the substitute DNS server gt DHCP This configuration type is applicable when the system is connected to a network with the presence of a DHCP server all related IP information required will be provided by the DHCP server automatically e Layer 2 STP If the EAP 300 is set up to bridge other network components this option ca
22. same DHCP server 192 168 1 1 Section 2 03 2 3 Hardware Description This section depicts the hardware information including all panel description Connector Panel l E USB J WES Restart 7 EAP 300 Connector Panel 1 Console Attach the serial cable here Press once to restart the system Press and hold for more than 5 Restart Reset Button seconds to reset to factory default Attach the power adapter here 4 WES Button WES Button Button Press to start Press to start running WES process WES process LAN Attach the Ethernet cable here biachadeitiblns Ait re connecting to the wired local network This port is POE compatible as well SBT 6 cca Antenna Panel EAP 300 Antenna Panel Antenna Connector Attach the antennas to the above 3 connectors LED Panel Drg PA opoo E EAP 300 Enterprise Access Point 5 4 3 z 4 EAP 300 LED Panel ML i LED ON indicates power on OFF indicates power off LED OFF indicates RF is not ready ON indicates RF is ready CLINKING indicates transmitting receiving data ip LED ON indicates Ethernet cable connected OFF indicates no connection i o eee future use WES Start LED Green OFF and then LED Red OFF and then BLINKING SLOWLY BLINKING SLOWLY WES Negotiate BLINKING NORMALLY BLINKING NORMALLY Green Red WES Negotiate Timeout LED Green ON LED Red ON WES Success LED Red ON LED Green ON WES Fail
23. the same physical AP device Please click on the Wireless icon to review the VAP Overview page VAP Config Security 4 Repeater h Advanced Access Control Site Survey VAP Overview General co WAD Papoose 655 gt VAP Overview Home gt Wire VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP 300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None Disabled Edit 7 EAF 300 7 Disabled None Disabled Edit z EAP300 8 Disabled None Disabled Edit VAP Overview Page Click on the corresponding cell in the State column and the row of the VAP you are planning on configuring enabling This will bring you to the particular VAP s Configuration page VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAP3O00 1 VLAN ID Disable Enable VLANID ss F 1 4094 VAP Configuration Page VAP 1 shown Please select the desired VAP profile from the drop down menu of Profile Name Choose Enable for the VAP field Pick a descriptive Profile Name and an appropriate ESSID for clients to associate to A VLAN ID can be provided to indicate the traffics through thi
24. 15 Broadcast SSID Disable Enable Wireless Station Isolation Disable Enable WMM Disable Enable IAPP Disable Enable Multicast Broadcast Rate Advanced Wireless Settings Page eRTS Threshold Enter a value between 1 and 2346 RTS Request to Send Threshold determines the packet size at which the system issues a request to send RTS before sending the fragment to prevent the hidden node problem The RTS mechanism will be activated if the data size exceeds the value provided A lower RTS Threshold setting can be useful in areas where many client devices are associating with EAP 300 or in areas where the clients are far apart and can detect only EAP 300 but not each other e Fragmentation Threshold Enter a value between 256 and 2346 The default is 2346 A packet size larger than this threshold will be fragmented sent with several pieces instead of one chunk before transmission A smaller value results in smaller frames but allows a larger number of frames in transmission A lower Fragment Threshold setting can be useful in areas where communication is poor or disturbed by a serious amount of radio interference e DTIM Period Input the DTIM Interval that is generated within the periodic beacon at a specified frequency Higher DTIM will let the wireless client save energy more but the throughput will be lowered e Broadcast SSID Disabling this function will prevent the system from broadcasting its SSID
25. 2 or Mixed gt Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 50 e WPA RADIUS If this option is selected the RADIUS authentication and data encryption will be both enabled VAP Overview General VAP Config Y Security Repeater Advanced Y Access Control Y Site Survey Home Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Group Key Update Period 600 second s Primary RADIUS Server Hast Pe Domain Name IP Address Authentication Port jisi2 Secret Key F Accounting Service Disable Enable Accounting Port he3 F Accounting Interim Update Interval lso second s Security Settings WPA RADIUS gt WPA Settings O O Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system
26. 2 aP 3 Wireless Laptop _ i IZIM 1 pt a Werelet Laptop WDS Links A fi kU a cS le s le al ha N i n a _ w O l Loa ea mahan art 1a Wired Detstopi Wheo Deichops x AF 02 108 008 Woche lovtup Ss MPANALI prea Wired Dotkiop Common Network Layout with EAP 300s This above deployment scenario illustrates a deployment example using three access points AP 1 AP 2 and AP 3 e Three EAP 300 systems construct a network comprising of wired and wireless segments e AP 2 plays the role of a wireless bridge e All devices share the same DHCP server 192 168 1 1 Section 2 03 2 3 Hardware Description This section depicts the hardware information including all panel description Connector Panel l E USB J WES Restart 7 EAP 300 Connector Panel 1 Console Attach the serial cable here Press once to restart the system Press and hold for more than 5 Restart Reset Button seconds to reset to factory default Attach the power adapter here 4 WES Button WES Button Button Press to start Press to start running WES process WES process LAN Attach the Ethernet cable here biachadeitiblns Ait re connecting to the wired local network This port is POE compatible as well SBT 6 cca Antenna Panel EAP 300 Antenna Panel Antenna Connector Attach the antennas to the above 3 connectors LED Panel Drg PA opoo E EAP 300 Ent
27. 200 1 brO port SlathOapO entering forwarding state le packet receive r pda athOapo log n No such file or directory ewErom Wetwork is down rR Tm m m a ROS m to rfrom Network is down aera messages they ll go to dev null rR la packet receive rE Warning No sourt o H ro E Fh ti Ch nent 3 prokbe s Feceived oO bebig a fC Pi m Aw far m er O broadcast z Sta art WES tLarting pid 546 try fsebin getty wrapper 3h L tryso 115200 wt100 SYSTEM IF 192 160 Enter Set t wh actory default login 10 Section 2 06 2 5 Access Web Management Interface LevelOne EAP 300 supports web based configuration Upon the completion of hardware installation EAP 300 can be configured through a PC by using its web browser such as Mozilla Firefox 2 0 and higher or Internet Explorer version 6 0 and higher The default values of the EAP 300 s LAN IP Address and Subnet Mask are IP Address 192 168 1 1 Subnet Mask 255 255 255 0 f Enterprise Access Point Windows Internet Explore Ko Go y E httpuit92 168 1 1 File Edit View Favorites Tools Help fe Enterprise Access Point Example of entering EAP 300 s default IP Address into a web browser e To access the web management interface WMI connect the administrator PC to the LAN port of EAP 300 via an Ethernet cable Then set a static IP Address on the same subnet mask as the E
28. 4M MCS0 15 1M 2M 5 5M 11M 12M 18M 24M 36M 48M 54M MCS0 15 c 7 2 3 VAP Configuration This section provides configuration of each Virtual Access Point with settings such as Profile Name ESSID and VLAN ID VAP Overview Y General V4P Config Security Repeater Y Advanced Access Control Site Survey m m Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAF300 1 VLAN ID Disable Enable VLAN ID 1 4094 VAP Configuration Page To enable each VAP the administrator must configure each VAP manually The settings of each VAP are collected as its profile e VAP Enable or Disable this VAP e Profile Name The profile name of each VAP for identity management purposes e ESSID ESSID Extended Service Set ID is the unique SSID used by a client device to associate with the specified VAP ESSID determines the service level assigned to a client e VLAN ID EAP 300 supports tagged VLANs virtual LANs To enable VLAN function each VAP must have a unique VLAN ID valid values range from 1 to 4094 47 d 7 2 4 Security EAP 300 supports various wireless authentication and data encryption methods in each VAP profile With this the administrator can provide different service levels to clients The security type includes None WEP 802 1X WPA PSK and WPA RADIUS e None Authentication is not required
29. 60 64 100 104 108 112 116 120 124 128 132 136 140 1523 Oye 0 18 Oy 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 1 2 3 4 5 6 7 8 9 10 11 12 13 J J J J J 46 6M 9M 12M 18M 24M 36M 48M 54M 1M 2M 5 5M 11M 6M 9M 12M 18M 24M 36M 48M 54M Auto Lowest Low Medium High Highest 1M 2M 5 5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 6M 9M 12M 18M 24M 36M 48M 54M MCS0 15 1M 2M 5 5M 11M 12M 18M 24M 36M 48M 54M MCS0 15 c 7 2 3 VAP Configuration This section provides configuration of each Virtual Access Point with settings such as Profile Name ESSID and VLAN ID VAP Overview Y General V4P Config Security Repeater Y Advanced Access Control Site Survey m m Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAF300 1 VLAN ID Disable Enable VLAN ID 1 4094 VAP Configuration Page To enable each VAP the administrator must configure each VAP manually The settings of each VAP are collected as its profile e VAP Enable or Disable this VAP e Profile Name The profile name of each VAP for identity management purposes e ESSID ESSID Extended Service Set ID is the unique SSID used b
30. 7 Disabled None Disabled Edit z EAP300 8 Disabled None Disabled Edit VAP Overview Page Click on the corresponding cell in the State column and the row of the VAP you are planning on configuring enabling This will bring you to the particular VAP s Configuration page VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAP3O00 1 VLAN ID Disable Enable VLANID ss F 1 4094 VAP Configuration Page VAP 1 shown Please select the desired VAP profile from the drop down menu of Profile Name Choose Enable for the VAP field Pick a descriptive Profile Name and an appropriate ESSID for clients to associate to A VLAN ID can be provided to indicate the traffics through this particular VAP It may allow further management control e g access rights and Internet usage etc of each VAP with a management gateway Click SAVE and then Reboot for the changes to take effect 22 Article V Secure Your AP Different VAP may require different level of security These instructions will guide the user through setting up different types of security for a particular VAP Simply repeat the following steps for other VAP with security requirement Step 1 Ensure that your VAP is Enabled VAP Overview General VAP Config Security Repeater Adv
31. A data encryption VAP Overview General VAP Config Y Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Type Cipher Suite Pre shared Key Type Security Settings Profile Name VAP 1 WPA PSK TKIP WPA wt D PSK Hex 64 chars Passphrase 8 63 chars Pre shared Key PO Group Key Update Period 600 second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed gt Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 27 e WPA RADIUS Authenticate users by RADIUS and provide WPA data encryption VAP Overview General VAP Config Y Security Repeater Y Advanced Access Control Site Survey Home Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Group Key Update Period 600 second s Primary RADIUS Server Host A Domain Name IP Address Authentication Port jigiz2_ Secret Key ae F Accounting Service Disable Enable Accounting Interim Update Interval so second s Security Settings WPA RADIUS gt WPA Settin
32. AP 300 in TCP IP settings of your PC such as the following example IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Please note that the IP Address used should not overlap with the IP Addresses of any Note ea other device within the same network eLaunch the web browser on your PC and enter the IP Address of the EAP 300 192 168 1 1 at the address field and then press Enter The following Administrator Login Page will then appear Enter admin for both the Username and Password fields and then click Login Username admin Password e0000 K Administrator Login Page e After a successful login into EAP 300 a System Overview page of the Web Management Interface WMI will appear gt Overview Associated Clients Wi Home gt Status gt System Overview amp System System Name Enterprise Access Point Firmware Version Build Number Location Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 O LAN Interface MAC Address 00 1F D4 83 96 01 IP Address Subnet Mask 255 255 0 0 Gateway GRE Tunnel Connected Remote IP 192 168 3 3 Status ii Firewall System Overview i Radio Status MAC Address 00 1F D4 83 96 02 OA Utilities l Band 802 11g n Channel 1 TX Power 19 dBm gt AP Status Profile Name VAP 1 BSSID VAP 2 Security Online Type Clients None o None o GRE 7
33. AP aE E E EE EEE NSi 23 6 Create a WDS Bridge between two APS eesseesseesseesocesoessoessoesocesoeesoeesoesooeeoeeeoeesoeesoessoeeseeeoee 32 7 Web Management Interface Configuration e sseesseeesseessecesocesscoessoeesocessoeesooeesoessoeesocessoee 34 PE ESA 65 5 8 EE E E A E T E E EE E E E E E EE ETE ET 36 FMM CG al EE EN A EE E OA E E A A A A A E E E A E A 36 ARANON O aE a A A A AA 38 e T T S ices sesuesasacnasegi use enedseeseucanemendseesegee 39 TA RE e a A E A A 41 TONT E a E E E TE E E E ni 42 EINA P OVIN O N aar ERE E e E 42 PEPA E CIC El sasaasacnzesnoncsaseonaenceasacasdeaegnesseeessnsacaonse segacaiasaceoossazeaneensacsonse S savasessnnsaascaseucnstenes seeaueeusaseeussasoduoos necaesaaen 45 Ae CON OS ss snzcapcecteannsaneecspuacau aeons tepaupsauseasoncczed A E O EEE EE E 47 Of Bs SO CUTLY sx caaasaccesvaeacoacoasntoateos lenses steatosasagacmssnaoatesasaeonsoateeasoaqsactosaancseasnniaeanoaaseaepeanack oontateateonuieannosstospsaiacaonaak 48 Dy OC OL E E A E E sea nesestaasiopsdua E E E E nes secisenseta nemestuaasmossuanesesecisrapsevanemesteaneces 51 AEAN E 54 7 2 6 Access Control o ieee ccecccesssssccccccecssssssesceccecesesssssssecceecesssssseccececessssscecececesssasesecececeesstsssecceeeeesttsseeeeeeenens 56 27 SUM ULV GY EE E A E A E A E E AA A E 60 TPES a e E E E A E E A NE 62 Te A eo SU E E E E A EEE EAEN P EE EEE E EEN E 62 FD ERE VNC IOIEN EEPO EERO EA O EEE SEEE EA O EOE AEO EEEE 66 TF A aE
34. AT EAE AE E E E AAEE 67 7S UNES eeen EENE EEEE EEEN EE E EEN E ONR EE 68 Zor P n eaaa E A T EE E E A 68 E E E i e E A E EE E ASE A E sedi E E E E S 69 A Do 0 a E E E E A ee E E ee eee 70 Toa REDO eee E E E A EEA E 71 Fe ee U E PE E A EAA A IE E EAA A A E E A AA AE A A E A E A I2 Ta OVE ON eoe E E E E E E 12 PA a Associ ed Chen eesi ia e E eiad Ee eias E Ei 75 PAS K A T aa S S eee 76 PAATE LOE a A A e 71 TO OMe Hel Deise a scree cheesiest a sont ts ts ts an dates neko tea ae ses 78 About 4ipnet The LevelOne Secure WLAN Controller series is powered by 4ipnet LevelOne is partnered with 4ipnet to deliver most feature rich product yet simple deployment in wireless networking infrastructure solution 4ipnet is a leading provider of wireless networking solution for manageable reliable and secure wireless access In an effort to meet changing market demands at the least possible cost 4ipnet delivers a diverse array of turnkey high performance products and mission critical applications to bring reliability and manageability to increasingly complex wireless networks 4ipnet s complete WLAN infrastructure solution portfolio addresses the needs of different network operation environments ranging from the ISP to the SOHO with an emphasis on simplified network deployment centralized network management and enhanced network performance 4ipnet Article I Before You Start Section 1 01 1 1 Preface This manual is intended for sy
35. DP Destination Port 443 TCP Destination Port 110 TCP Destination Port 25 UDP Destination Port 67 68 First Prey Next Last total 28 Add Firewall Service Page 66 c 7 3 3 Advanced Advanced firewall settings are used to supplement the firewall rules providing extra security enhancement against DHCP and ARP traffics traversing the available interfaces of system Firewall List Y Service Y Advanced Home gt Firewall gt Advanced Advanced Firewall Settings Trust Interface c c c c c E c c VAP1 VAP2 VAPS VAP4 VAP5 VAP VAP VAPS DHCP Snooping Disable Enable ARP Inspection Disable Enable Force DHCP Disable Enable Trust List Broadcast Disable Enable Static Trust List Disable Enable Trust Interface Each VAP interface can be checked individually to mark as trusted interfaces security enforcements on DHCP ARP like DHCP snooping and ARP inspection will be carried out on non trusted interfaces DHCP Snooping When enabled DHCP packets will be validated against possible threats like DHCP starvation attack in addition the trusted DHCP server IP MAC can be specified to prevent rouge DHCP server ARP Inspection When enabled ARP packets will be validated against ARP spoofing o Force DHCP option when enabled the AP only learns MAC IP pair information through DHCP packets Since devices configured with static IP address does not send DHCP traffic therefore any clients with static
36. Disable this function o Server IP Address Enter the IP address of the assigned server for receiving the trap report e System Log By enabling this function specify an external SYSLOG server to accept SYSLOG messages from the system remotely Vv Vv V WV yn Log Disable Enable SYSLOG Server IP Server Port SYSLOG Level System Log Fields Enable Disable Enable or Disable this function Server IP The IP address of the Syslog server that will receive the reported events Server Port The port number of the Syslog server Syslog Level Select the desired level of received events from the drop down menu 40 d 7 1 4 GRE Tunnel When GRE tunnel is created between EAP 300 and the controller EAP 300 can be logically deployed into the Controller s managed network regardless of its physical location If the tunnel is created from WHG series controllers all of the configuration should be performed on the Controller side It is meaningless to configure GRE tunnel settings from the EAP 300 side Once the settings are applied from the Controller side the applied settings such as Key string will be passed to the corresponding EAP 300 and its WMI page will automatically open to confirm the changes Click Restart link and EAP 300 will restart to activate the tunnel A new window will automatically open and display the tunnel settings from the AP side which is passed from the Controller Click the Reboot link to apply and activate the
37. Disabled Edit 7 EAF 300 7 Disabled None Disabled Edit 8 EAP300 8 Disabled None Disabled Edit Virtual AP Overview Page On this page click the hyperlink in the row and column that corresponds with VAP 1 s State This will bring up the following page VAP Overview General WAP Config Security Repeater Advanced 1 Access Control Site Survey iy Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAP300 1 VLAN ID Disable Enable VLANID t 1 4094 VAP Configuration Page VAP 1 shown 19 The desired VAP profile can be selected from the drop down menu of Profile Name and VAP 1 configuration will serve as an example for all other VAPs Before proceeding further please make sure that the VAP field is Enable afterwards enter an ESSID to represent the WLAN associated with AP s VAP 1 It is suggested that Profile Name is used to describe what this particular VAP will be used for otherwise leave it as default VLAN ID can be chosen at another time Click SAVE to save all changes up to this point and Reboot the system to apply these revised settings Congratulations After reboot the AP can start to work with these revised settings 20 Article IV Adding Virtual Access Points EAP 300 possesses the feature of multi ESSID namely it can behave as multiple virtual access points providing different levels of services from
38. E 8 2 5 Console Interface ar ecto taeda ect ctes cen nseissece oenonasste essen tea sivoaseptaste etess sebr EEEE en SPEE E EEEE SESS EE EEEE Eeee eere eeaeee eere e eene 9 2 5 Access Web Management Interface cccccsecscessscesssecssescessccessecessecesssscsseecessesessescesstsessesceseecessesens 11 3 Connect your AP to your Network e essseesscesseeesoeessocesocesscessoeesocessoeesocesooeesoeesocessoeesoeessoeesoe 15 4 Adding Virtual Access Points eeseessoessoesceesoeesoessoessoesceesoeesoeesocesoeesoessoessoeesoesoesoceeoeesoeesoessoeeo 21 Be SCL YOUF AP aE E E EE EEE NSi 23 6 Create a WDS Bridge between two APS eesseesseesseesocesoessoessoesocesoeesoeesoesooeeoeeeoeesoeesoessoeeseeeoee 32 7 Web Management Interface Configuration e sseesseeesseessecesocesscoessoeesocessoeesooeesoessoeesocessoee 34 PE ESA 65 5 8 EE E E A E T E E EE E E E E E EE ETE ET 36 FMM CG al EE EN A EE E OA E E A A A A A E E E A E A 36 ARANON O aE a A A A AA 38 e T T S ices sesuesasacnasegi use enedseeseucanemendseesegee 39 TA RE e a A E A A 41 TONT E a E E E TE E E E ni 42 EINA P OVIN O N aar ERE E e E 42 PEPA E CIC El sasaasacnzesnoncsaseonaenceasacasdeaegnesseeessnsacaonse segacaiasaceoossazeaneensacsonse S savasessnnsaascaseucnstenes seeaueeusaseeussasoduoos necaesaaen 45 Ae CON OS ss snzcapcecteannsaneecspuacau aeons tepaupsauseasoncczed A E O EEE EE E 47 Of Bs SO CUTLY sx caaasaccesvaeacoacoasntoateos lenses steatosasag
39. Enable Community String Trap Disable Enable SNMP Configuration Fields gt Enable Disable Enable or Disable this function gt Community String The community string is required when accessing the Management Information Base MIB of the system o Read Enter the community string to access the MIB with Read privilege o Write Enter the community string to access the MIB with Write privilege gt Trap When enabled events on Cold Start Interface UP amp Down and Association amp Disassociation can be reported to an assigned server o Enable Disable Enable or Disable this function o Server IP Address Enter the IP address of the assigned server for receiving the trap report e System Log By enabling this function specify an external SYSLOG server to accept SYSLOG messages from the system remotely Vv Vv V WV yn Log Disable Enable SYSLOG Server IP Server Port SYSLOG Level System Log Fields Enable Disable Enable or Disable this function Server IP The IP address of the Syslog server that will receive the reported events Server Port The port number of the Syslog server Syslog Level Select the desired level of received events from the drop down menu 40 d 7 1 4 GRE Tunnel When GRE tunnel is created between EAP 300 and the controller EAP 300 can be logically deployed into the Controller s managed network regardless of its physical location If the tunnel is created from WHG series controll
40. IP address will be blocked from internet access unless its MAC IP pair is listed and enabled on the Static Trust List o Trust List Broadcast can be enabled to let other AP with L2 firewall feature learn the trusted MAC IP pairs to issue ARP requests o Static Trust List can be used to add MAC or MAC IP pairs of devices that are trusted to issue ARP request Other network nodes can still send their ARP requests however if their IP appears in the static list with different MAC their ARP requests will be dropped to prevent eavesdropping lf any settings are made please click SAVE to save the configuration before leaving this page 6 7 Section 7 04 7 3 Utilities The administrator can maintain the system on this page Change Password Backup amp Restore System Upgrade and Reboot a 7 3 1 Change Password To protect the Web Management Interface from unauthorized access it is highly recommended to change the administrator s password to a secure password Only alpha numeric characters are allowed and it is also recommended to make use of a combination of both numeric and alphabetic characters Change Password Backup amp Restore System Upgrade Reboot Home gt Utilities gt Change Password Change Passy Change Password Name admin Old Password New Password up to 32 characters Re enter New Password Change Password Page The administrator can change password on this page Enter the original password
41. Kick the client will be disconnected with the system 75 c 7 4 3 Repeater The administrator can review detailed information of the repeater function on this page Information of repeater s status mode and encryption is provided Overview Clients Repeater Event Log Home Status gt Repeater Information Repeater Information Universal Repeater SSID Cip AP Status TX Rate SNR TX Count TX Error Encryption Enabled 48 Mbits 16 69 Bytes 0 Packets None Repeater Status Page Status The status of the WDS link either Enabled or Disabled TX Rate The transmit rate of the WDS link TX Count The accumulative number of transmission counts TX Errors The accumulative number of transmission errors 76 d 7 4 4 Event Log The Event Log provides the system activities records The administrator can monitor the system status by checking this log Overview Y Associated Clients Y Repeater Event Log Home gt Status gt Event Log Event Log Jan 1 08 00 16 syslogd started BusyBox v1 12 4 Jan 1 08 00 17 syslog athOap0O IEEE 802 11 Fetching hardware channel rate support not supported Event Log Page In the log each line represents an event record in each line there are 4 fields e Date Time The time amp date when the event happened e Hostname Indicates which host recorded this event Note that all events on this page are local events so the hostname in this field is always the sam
42. L Authenticate incoming MAC addresses by an external RADIUS When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration VAP Overview j General VAP Config Security Repeater Advanced Access Control Site Survey b Home Wireless Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type RADIUS ACL w Primary RADIUS Server Note These settings will also apply to security settings which use RADIUS Server for this VAP Host Domain Name IP Address Authentication Port 1 65535 Secret Key fs RADIUS ACL 37 h 7 2 7 Site Survey Sit Survey is a useful tool to provide information about the surrounding wireless environment available APs are shown with their respective SSID MAC Address Channel Rate setting Signal reading and Security tyoe The administrator can click Setup or Connect to configure the wireless connection according to the mentioned readings when Repeater Type is Universal Repeater Scan Agan AAE MAC Address Channel Rati Ss PCT ed Security seiun Comert 00 i 00 iF pA 00 26 56 14 43 None Connect OO 5 DS TF D4 OG 2E 36 l 34 2 wore Connect lf Universal Repeater function is enabled the system can scan and dis
43. LED Green ON LED Red ON To indicate different WES status as follows Master Slave Section 2 04 2 4 Hardware Installation Please follow the steps mentioned below to install the hardware of EAP 300 1 Place the EAP 300 at the best location The best location for EAP 300 is usually at the center of your intended wireless network 2 Connect the EAP 300 to your network device Connect one end of the Ethernet cable to LAN port of EAP 300 and the other end of the cable to a switch a router or a hub EAP 300 is then connected to your existing wired LAN network 3 There are two ways to supply power over to EAP 300 a Connect the DC power adapter to the EAP 300 power socket b EAP 300 LAN port is capable of transmitting DC currents Connect an IEEE 802 3af compliant PSE device e g a PoE switch to the LAN port of EAP 300 with the Ethernet cable Now the Hardware Installation is complete e Please only use the power adapter supplied with the EAP 300 package Using a different A power adapter may damage this system e To double verify the wired connection between EAP 300 and you switch router hub please also check the LED status indicator of the respective network devices Section 2 05 2 5 Console Interface Via this port to enter the console interface for the administrator to check the IP address of EAP 300 and reset the device to default if the admin password is forgotten 1 In order to connect to the console port of EA
44. MI is the page where the status is displayed control is issued and parameters are configured In the Web Management Interface there are two main interface areas Main Menu and Working Area The Working Area occupies the largest area of the WMI displayed in the center of the interface It is also referred to as the configuration page The Main Menu on the top of the WMI allows the administrator to traverse to various management functions of this system The management functions are grouped into branches System Wireless Firewall Utilities and Status Table 1 EAP 300 s Function Organization OPTION FUNCTION General Network Interface Management GRE Tunnel VAP Overview General VAP Configuration Security Wireless Repeater Advanced Access Control Site Survey Firewall List Service Advanced Change Password Backup amp Restore System Upgrade 34 ee OPTION FUNCTION gt Note Overview Associated Clients Repeater Event Log On each and every configuration page you may Click Save to save the changes but you must reboot the system upon the completion of all configurations settings for the changes to take effect When clicking Save the following message will appear Some modification has been saved and will take effect after Reboot All online users will be disconnected during reboot or restart 35 Section 7 01 7 1 System Found after clicking on the System button this section allows for g
45. NS Server fo Layer STP Disable Enable Network Settings Page e Mode Determine the way to obtain the IP address by DHCP or Static gt Static The administrator can manually set up the static LAN IP address All required fields are marked with a red asterisk o IP Address The IP address of the LAN port o Netmask The Subnet mask of the LAN port o Default Gateway The Gateway IP address of the LAN port o Primary DNS Server The IP address of the primary DNS Domain Name System server o Alternate DNS Server The IP address of the substitute DNS server gt DHCP This configuration type is applicable when the system is connected to a network with the presence of a DHCP server all related IP information required will be provided by the DHCP server automatically e Layer 2 STP If the EAP 300 is set up to bridge other network components this option can be enabled to prevent undesired loops because broadcasting storm may occur in a multi switch environment where broadcast packets are forwarded in an endless loop between switches Moreover a broadcast storm may consume most of available system resources in addition to available bandwidth Thus enabling the Layer 2 STP can lower such undesired occurrence and derive the best available data path for network Communication c 7 1 3 Management The EAP 300 s provided services e g VLAN Management SNMP and System log can be configured here General Network Interface
46. Number Channel 1 Location TX Power 19 dBm Site EN A Device Time 1976 01 01 08 00 30 System Up Time Odays 0 00 30 LAN Interface gt AP Status Profile 2 Security Online MAC Address 00 1F D4 83 96 01 Name BSSID ESSID re Clients SRE IP Address VAP 1 O0 1F D4 83 96 02 EAP 1 None o Subnet Mask 255 255 0 0 VAP 2 06 1F D4 83 96 02 EAP 2 None 0 3 Gateway VAP 3 OA 1F 04 83 96 02 EAP 3 None 0 amp e GRE Tunnel Status Connected Remote IP 1927 166 3 3 Key 12345 Web Management Interface Main Page System Overview From here click on the System icon to arrive at the following page On this Page you can make entries to the Name Description and Location fields as well as set the device s time General Network Interface 1 Management GRE Tunnel h Home gt System gt General System Information Name Enterprise Access Point Description S O Location s O Time Device Time 1970 01 05 14 17 18 Time Zone GMT 08 00 Taipei Time O Enable NTP Manually set up Set Date Mear Month Day Set Time Hour Mimin v sec System Information Page There are two methods of setting up the time Manual indicated by the option Set Date amp Time and NTP The default is Manual and requires individual setup every time the system starts up Simply choose a time zone and set the time accordingly When finished click Save Time Zone GMT 08 00 Taipei ha Time O E
47. P 1 Maximum Number of Clients f Range 1 32 Access Control Type Disable Access Control Access Control Settings Page e Maximum Number of Clients EAP 300 supports various methods of authenticating clients for wireless LAN access The default policy is unlimited access without any authentication required To restrict the station number of wireless connections simply change the Maximum Number of Stations to a desired number For example while the number of stations is set to 20 only 20 stations are allowed to connect to the specified VAP 56 e Access Control Type The administrator can restrict the wireless access of client devices based on their MAC addresses gt Disable Access Control When Disable is selected there is no restriction for client devices to access the system gt MAC ACL Allow List When selecting MAC ACL Allow List only the client devices identified by their MAC addresses listed in the Allow List allowed MAC addresses are granted with access to the system The administrator can temporarily block any allowed MAC address by checking Disable until the administrator re Enables the listed MAC VAP Overview General VAP Config Y Security Repeater Advanced Access Control Site Survey h Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type MAC ACL Allow List Mo MAC Address Stat
48. P 300 a console modem cable and a terminal simulation program such as the Hyper Terminal are needed 2 Ifa Hyper Terminal is used please set the parameters as 115200 8 None 1 None ax Pon teling Bite pei second Cusa Piti ie Panty Hone So bt as Fir ite Neme Heroe Deisi OK Cancel Ano The console interface looks like the screenshot below displaying the current LAN IP address and the instructions to reset device to default COM4 PulT login When resetting the device to default from the console interface key in reset2def for login and password Confirm yes and EAP 300 will begin the reset process SYSTEM IP 192 166 10 1 25 Enter resetzedet twice to E aa wh actory default login Password Do you really want to Set actory default and reboot yes ye When the login prompt reappears the device has completed the reset to default process and the LAN IP is reset to 192 168 1 1 Copying Feature Control Profile Check customized objects Check customized pages objects Configuration file tmp hosta Cat can t open tmp status s start syslogd CHH 03if wap atop Stopping OSIF WAF br port 3 fathOapo entering disabled state loctl IEEESO0211 I0CTL SETMLME Invalid argument Could not connect to kernel driver toctl TEEES0e11 TOCTL SETMLME Invalid argumant Using interface athOapO with hwaddr OO 00 33 93 and ssid EAP
49. P 300 x1 e Quick Installation Guide x1 e CD ROM with Users Manual and QIG x1 e Power Adapter DC 12V x1 e Cat 5e Ethernet cable x1 e Antenna x3 It is recommended to keep the original packing materials for possible future shipment when repair or maintenance is required Any returned product should be packed in its original packaging to prevent damage during delivery Article II System Overview and Getting Started Section 2 01 2 1 Introduction of LevelOne EAP 300 The LevelOne EAP 300 Enterprise Access Point embedded with 802 11 n a b g dual band MIMO radio in dust proof metal housing is designed for wireless connectivity in enterprise or industrial environments of all dimensions EAP 300 makes the wireless communication fast secure and easy It Supports business grade security such as 802 1X and Wi Fi Protected Access WPA and WPA2 By pushing a purposely built button the LevelOne WES feature makes it easy to bridge wireless links of multiple EAP 300s for forming wider wireless network coverage EAP 300 also features multiple ESSIDs with VLAN tags one EAP 300 can emulate up to eight Virtual APs great for enterprise applications such as separating the traffics of different departments using different ESSIDs PoE Switch fe Co gt li NY paanan MOS Unk lle Ate WHG Controller ESSID 2 Gs Wired and Wireless Network Layout with EAP200s Section 2 02 2 2 Deployment Topology fe nario ation 199 1481 14 AP
50. P address or domain name must be provided Time Device Time 2000 01 03 04 32 49 Time Zone GMT 08 00 Taipei Time Enable NTP Manually set up NTP Time Configuration Fields Generally networks would have a common NTP server internal or external If there is use it otherwise locate a nearby NTP server on the web 2 Manually set up By selecting Manually set up the administrator can manually set the system date and time Time Device Time 2000 01 03 04 32 49 Time Zone Time O Enable NTP Manually set up Set Time Bour Mimin l Msec Manual Time Configuration Fields Set Date Select the appropriate Year Month and Day from the drop down menu Set Time Select the appropriate Hour Min and Sec from the drop down menu Unless both an Internet connection and a network NTP server are unavailable it is recommended to use an NTP server for time synchronization because system time needs to be reconfigured once system reboot when choosing Manual set up 37 b 7 1 2 Network Interface On this page the devices network settings may be configured field with a red asterisk i e IP Address Netmask Default Gateway and Primary DNS Server are required General Y Network Interface Management Y GRE Tunnel Home gt System gt Network Interface Network Settings Mode Static DHCP IP Address J Default Gateway Primary DNS Server Alternate D
51. acmssnaoatesasaeonsoateeasoaqsactosaancseasnniaeanoaaseaepeanack oontateateonuieannosstospsaiacaonaak 48 Dy OC OL E E A E E sea nesestaasiopsdua E E E E nes secisenseta nemestuaasmossuanesesecisrapsevanemesteaneces 51 AEAN E 54 7 2 6 Access Control o ieee ccecccesssssccccccecssssssesceccecesesssssssecceecesssssseccececessssscecececesssasesecececeesstsssecceeeeesttsseeeeeeenens 56 27 SUM ULV GY EE E A E A E A E E AA A E 60 TPES a e E E E A E E A NE 62 Te A eo SU E E E E A EEE EAEN P EE EEE E EEN E 62 FD ERE VNC IOIEN EEPO EERO EA O EEE SEEE EA O EOE AEO EEEE 66 TF A aE AT EAE AE E E E AAEE 67 7S UNES eeen EENE EEEE EEEN EE E EEN E ONR EE 68 Zor P n eaaa E A T EE E E A 68 E E E i e E A E EE E ASE A E sedi E E E E S 69 A Do 0 a E E E E A ee E E ee eee 70 Toa REDO eee E E E A EEA E 71 Fe ee U E PE E A EAA A IE E EAA A A E E A AA AE A A E A E A I2 Ta OVE ON eoe E E E E E E 12 PA a Associ ed Chen eesi ia e E eiad Ee eias E Ei 75 PAS K A T aa S S eee 76 PAATE LOE a A A e 71 TO OMe Hel Deise a scree cheesiest a sont ts ts ts an dates neko tea ae ses 78 About 4ipnet The LevelOne Secure WLAN Controller series is powered by 4ipnet LevelOne is partnered with 4ipnet to deliver most feature rich product yet simple deployment in wireless networking infrastructure solution 4ipnet is a leading provider of wireless networking solution for manageable reliable and secure wireless access In an effort to meet changing market demands at t
52. an be chosen to be Block or Pass Remark The note of this rule can be specified here When the configuration for firewall rule is provided please click SAVE and Reboot system to let the firewall rule take effort gt gt To insert a specific rule In in Setting column of firewall list will lead to the following page for detail configuration with rule ID for the current inserted rule From this page the rule can be edited form scratch or from an existing rule for revision Firewall List Service Advanced Home gt Firewall List gt Rule Config Layer 2 Firewall Configuration H Rule ID Interface From To WAPI Service ALL ka IF Address fo Mask 0 0 0 0 0 w P address Masks 0 0 0 0 70 3 Action Block Pass gt gt To move a specific rule Mv in Setting column of firewall list will lead to the following page for reordering confirmation After SAVE button is clicked and system reboot the order of rules will be updated 64 Firewall List Home gt Firewall gt Move rule Move Rule 1 Before After ID 1 20 Please make sure all desired rules state of rule are checked and saved in overview page the rule will be ID Move to enforced upon system reboot Firewall List Service Advanced Home gt Firewall gt Firevell List Layer 2 Firewall Settings Enable Layer 2 Firewall Disable Enable No State Action Name
53. anced Access Control Site Survey Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None Disabled Edit 7 EAP300 7 Disabled None Disabled Edit 5 EAP300 8 Disabled None Disabled Edit VAP Overview Page On the VAP Overview page check the table to confirm the VAP State If it is Enabled skip to Step 2 If not click on to proceed with VAP Configuration for that particular VAP VAP Overview Y General WAP Co nfig Security Repeater Y Advanced Access Control Y Site Su mey Home gt Wireless VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAP3O0 1 VLAN ID Disable Enable VLANID 1 4094 VAP Configuration Page VAP 1 shown Select Enable for the VAP field and click Save Click the Overview tab to return to the previous table to begin the next step Step 2 Configure Security Settings for your VAP Now we will proceed to secure your AP The following instructions allow you to secure it using a wireless standard encryption If you wish to only restrict MAC addresses skip to the Step3 If you want to also include MAC restrictions include the following step First click on the cor
54. ass traffics of layer 3 or above protocols These services are available to choose from drop down list of layer2 firewall rule edit page with Ether Type to be IPv4 The first 28 entries are default services and the administrator can add delete any extra desired services There are 28 firewall services available in default settings these default services cannot be deleted but can be disabled If changes are made please click SAVE to save the settings before leaving this page Firewall List Service Advanced Home Firewall Service Config No Name 1 ALL 2 ALL TCP 3 ALL UDP ALL ICMP 3 FIP 6 HTTP 7 HTTPS POPS g SMTP 10 DHCP Firewall Service Description Delete ALL TCP Source Port 0 65535 Destination Port 0 65535 UDP Source Port 0 65535 Destination Port 0 65535 ICMP TCP UDP Destination Port 20 21 TCP UDP Destination Port 80 TCP UDP Destination Port 443 TCP Destination Port 110 TCP Destination Port 25 UDP Destination Port 67 68 First Prey Next Last total 28 Add Firewall Service Page 66 c 7 3 3 Advanced Advanced firewall settings are used to supplement the firewall rules providing extra security enhancement against DHCP and ARP traffics traversing the available interfaces of system Firewall List Y Service Y Advanced Home gt Firewall gt Advanced Advanced Firewall Settings Trust Interface c c c c c E c c VAP1 VAP2 VAPS VAP4 VAP5 VAP VAP VAPS DHCP Snooping
55. ble Enable IAPP Disable Enable Multicast Broadcast Rate Advanced Wireless Settings Page 44 b 7 2 2 General AP s general wireless settings can be configured here VAP Overview General VAP Config Security Repeater Advanced Access Control Y Site Survey Home gt Wireless gt General General Settings Band 802 11g 802 11n L Pure iin Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Width Channel Max Transmit Rate Transmit Power ACK Timeout 100 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500ms 3 AP General Settings Page Band Select an appropriate wireless band 802 11b 802 11g 802 11b 802 11g 802 119 802 11n or select Disable if the wireless function is not required gt Pure 11n Enable 802 11n network only Short Preamble The short preamble with a 56 bit synchronization field can improve WLAN transmission efficiency Select Enable to use Short Preamble or Disable to use Long Preamble with a 128 bit synchronization field Short Guard Interval available when Band is 802 11g 802 11n The guard interval is the space between symbols characters being transmitted to eliminate inter symbol interference In order to further boost throughput with 802 11n short guard interval is half of what it used to be please select Enable to use Short Guard Interval or Disable to use normal Guard Interval Channe
56. d WEP key value the system supports up to 4 sets of WEP keys e 802 1X When 802 1X Authentication is selected RADIUS authentication and enhanced WEP are provided VAP Overview General Y VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless Security Security Settings Profile Name VAP 1 Security Type 802 1X x Dynamic WEP Bisable Enable WEP Key Length 64 bits 128 bits Rekeying Pernod 300 seconds Peery RADE Server pages f Domain Name IP Address Authentication Port 18 12 l Secret Key te Accounting Service Disable Enable Accounting Port 1813 ig Accounting Interim Update Interval second s Security Settings 802 1X Authentication gt Dynamic WEP Settings o Dynamic WEP For 802 1X security tyoe Dynamic WEP is always enabled to automatically generate WEP keys for encryption o WEP Key Length Select from 64 bit or 128 bit key length o Re keying Period The time interval for the dynamic WEP key to be updated the time unit is in second gt RADIUS Server Settings Primary Secondary o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and l
57. d retype it in the Re enter New Password field Congratulations Now LevelOne s EAP 300 is installed and configured successfully It is strongly recommended to make a backup copy of configuration settings A e After the EAP 300 s network configuration is completed please remember to change the IP Address of your PC Connection Properties back to its original settings in order to ensure that your PC functions properly in its real network environments Article III Connect your AP to your Network The following instructions depict how to establish the wireless coverage of your network The AP will connect to the network through its LAN port and provide wireless access to your network After having prepared the EAP 300 s hardware for configuration set the TCP IP settings of administrator s computer to have a static IP Address of 192 168 1 10 and Subnet Mask of 255 255 255 0 Step 1 Configuring the AP s System Information gt Enter the AP s default IP Address 192 168 1 1 into the URL of a web browser gt Login via using Username admin and Password admin The WMI appears as shown below gt mg System Wireless Firewall Utilities Status T i i Fi 3 Y i Overview Associated Cliente Repeater Event Log Home gt Status gt System Overnier System Overview g gt System Radio Status System Name Enterprise Access Point MAC Address 00 1F 24 83 96 02 Firmware Version Band 802 1ig n Build
58. d to indicate the type of encapsulated traffics 63 gt gt VLAN ID when EtherType is 802 1 Q The VLAN ID is provided to associate with certain VLAN tagging traffics Priority when EtherType is 802 1 Q It denotes the priority level with associated VLAN traffics Encapsulated Type when EtherType is 802 1 Q It can be used to indicate the type of encapsulated traffics Opcode when EtherType is ARP RARP This list can be used to specify the ARP Opcode in ARP header Source MAC Address Mask indicates the source MAC IP Address Mask indicates the source IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Destination MAC Address Mask indicates the destination MAC IP Address Mask indicates the destination IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Action The rule can be chosen to be Block or Pass Remark The note of this rule can be specified here When the configuration for firewall rule is provided please click SAVE and Reboot system to let the firewall rule take effort gt gt To insert a specific rule In in Setting column of firewall list will lead to the following page for detail configuration with rule ID for the current inserted rule From this page the rule can be edited form scratch or from an existing rule for revision Firewall List Service Advanced Home gt Firewall List gt Rule Config Layer 2 Fi
59. e MAC Allow List Note An empty Allow List means that there are no allowed MAC addresses Make sure at least the MAC of the modifying system is included e g network administrator s computer 5 MAC ACL Deny List When selecting MAC ACL Deny List all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Disable VAP Overview General WAP Config Security Repeater Adva nced Y Access Control Site Survey h Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type MAC ACL Deny List w No MAC Address 1 fe Disable O Enable Deny List State 58 gt RADIUS ACL Authenticate incoming MAC addresses by an external RADIUS When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration VAP Overview j General VAP Config Security Repeater Advanced Access Control Site Survey b Home Wireless Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type RADIUS ACL w Pr
60. e However in remote SYSLOG service this field will help the administrator identify which event is from this EAP 300 e Process name Indicate the event generated by the running instance e Description Description of the event To save the file locally click SAVE LOG to clear all of the records click CLEAR Section 7 06 7 6 Online Help The Help button is at the upper right corner of the display screen Click Help for the Online Help window and then click the hyperlink of the relevant information needed Home Logout 7 Help Online Help Corner 78 level nas a E Hn E Zea E one LevelOne EAP 300 Enterprise Access Point User Manual V1 00 Table of Contents i TROLS Yon SC ee ssc eusbeassanssaean tev satcosdetieeucedosucossseesessesens 3 MMP aioe ca cactea ase nats E A EE E A E 3 1 2 Document Conventions cccccccccccccccccccceceeceeceeeeeeeeeeeeeeeeeeeeeseseeseeeeeeeeseeeeeeeeeseeseeeeeeeseeeeeseseseseseeeeesesecs 3 OD PAG A CO e E E E E E anteloalaneGeg aise enaitaenastetoness 3 2 System Overview and Getting Started essessoesscescceesccesocesoesscesocesccescocescessoesscesscesscesseeseees 4 24 Introd c on of LevelOne EA P90 O ss sassicastarcessasanoincdcnsadesasancianisazdeasasbuctondistagerasanccosiwatacesadeeo aE EE Troiae 4 2A Deployment Topology 4 en On er ne ne on Pe eee 5 OD TAA Gy ar Doser E Oee naaa E EE 6 24 Hardware MAS Ue A OMe rte ests E E E E T E E E
61. e During firmware upgrade please do not turn off the power This may permanently damage the system 70 d 7 3 4 Reboot This function allows the administrator to restart the EAP 300 safely The process shall take about three minutes Click Reboot to restart the system Please wait for the blinking timer to complete its countdown before accessing the system s Web Management Interface again The System Overview page will appear after reboot successfully Occasionally it is necessary to reboot the EAP 300 to ensure that parameter changes are submitted Change Password j Backup amp Restore System Upgrade Reboot Home Utilities gt Reboot Reboot the System Reboot may take several minutes to complete The Admin Login Page will be shown after system boots up Reboot Page Section 7 05 7 4 Status This page is used to view the current condition and state of the system and includes the following functions Overview Associated Clients Repeater and Event Log a 7 4 1 Overview The System Overview page provides an overview of the system status for the administrator r E Associated Clients Repeater Event Log h Y Home gt Status gt System Overview System Overview amp System __________ amp Radio Status System Name Enterprise Access Point MAC Address 00 1F D4 83 96 02 Firmware Version Band 802 1i9 n Build Number Channel 1 Location TX Power 19 dBm Site
62. e Version Build Number Location Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 O LAN Interface MAC Address 00 1F D4 83 96 01 IP Address Subnet Mask 255 255 0 0 Gateway GRE Tunnel Connected Remote IP 192 168 3 3 Status ii Firewall System Overview i Radio Status MAC Address 00 1F D4 83 96 02 OA Utilities l Band 802 11g n Channel 1 TX Power 19 dBm gt AP Status Profile Name VAP 1 BSSID VAP 2 Security Online Type Clients None o None o GRE 7 The Web Management Interface System Overview Page 12 e To logout simply click on the Logout button at the upper right hand corner of the interface to return to the Administrator Login Page Click OK to logout fHome Logout Help Logout Message from webpage Eg P re vou sure to logoff Please follow the following steps to change the administrator s password g gt gt O A 2 System AP Firewall Utilities Status N Change Password Backup Restore System Upgrade Reboot 4 Home gt Utilities gt Change Password Change Password Name admin Old Password New Password up to 32 characters Re enter New Password Change Password Page gt Click on the Utilities button and then select the Admin Password tab gt Enter the old password and then a new password with a length of up to 32 characters an
63. ecking this log Overview Y Associated Clients Y Repeater Event Log Home gt Status gt Event Log Event Log Jan 1 08 00 16 syslogd started BusyBox v1 12 4 Jan 1 08 00 17 syslog athOap0O IEEE 802 11 Fetching hardware channel rate support not supported Event Log Page In the log each line represents an event record in each line there are 4 fields e Date Time The time amp date when the event happened e Hostname Indicates which host recorded this event Note that all events on this page are local events so the hostname in this field is always the same However in remote SYSLOG service this field will help the administrator identify which event is from this EAP 300 e Process name Indicate the event generated by the running instance e Description Description of the event To save the file locally click SAVE LOG to clear all of the records click CLEAR Section 7 06 7 6 Online Help The Help button is at the upper right corner of the display screen Click Help for the Online Help window and then click the hyperlink of the relevant information needed Home Logout 7 Help Online Help Corner 78
64. ed among Auto Highest High Medium Low and Lowest trom the drop down menu ACK Timeout It indicates a period of time that the system waits for an Acknowledgement frame sent back from a station without retransmission In other words upon timeout if the Acknowledgement frame is still not received the frames will be retransmitted This option can be used to tune network performance for extended coverage For regular indoor deployments please keep the default setting Beacon Interval ms The entered amount of time indicates how often the beacon signal will be sent from the access point Due to RF regulation in different nations available values in the above table will differ Table 2 RF Configurations under normal circumstances in certain countries 802 11a 802 11b 802 119 802 11b 802 11g 802 11a 802 11n 802 11n 802 11g 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 1523 Oye 0 18 Oy 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 1 2 3 4 5 6 7 8 9 10 11 12 13 J J J J J 46 6M 9M 12M 18M 24M 36M 48M 54M 1M 2M 5 5M 11M 6M 9M 12M 18M 24M 36M 48M 54M Auto Lowest Low Medium High Highest 1M 2M 5 5M 6M 9M 11M 12M 18M 24M 36M 48M 54M 6M 9M 12M 18M 24M 36M 48M 5
65. ee OPTION FUNCTION gt Note Overview Associated Clients Repeater Event Log On each and every configuration page you may Click Save to save the changes but you must reboot the system upon the completion of all configurations settings for the changes to take effect When clicking Save the following message will appear Some modification has been saved and will take effect after Reboot All online users will be disconnected during reboot or restart 35 Section 7 01 7 1 System Found after clicking on the System button this section allows for general configurations of the devices e g Time Setup Network Configurations and System Logs This section includes the following functions General Network Interface Management and GRE Tunnel a 7 1 1 General General Home gt System General Name Description Location Device Time Time Zone Time Set Date Network Interface Management GRE Tunnel System Information Enterprise Access Point Time 1970 01 05 15 26 40 GMT 08 00 Taipel Enable NTP Manually set up Bear MMonth Day Set Time gt Hour imin Msec System Information Page System Information For maintenance purpose it is highly recommended to have the following information stated as clearly as possible gt Name The system name used to identify this system gt Description Further information ab
66. elect a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 27 e WPA RADIUS Authenticate users by RADIUS and provide WPA data encryption VAP Overview General VAP Config Y Security Repeater Y Advanced Access Control Site Survey Home Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Group Key Update Period 600 second s Primary RADIUS Server Host A Domain Name IP Address Authentication Port jigiz2_ Secret Key ae F Accounting Service Disable Enable Accounting Interim Update Interval so second s Security Settings WPA RADIUS gt WPA Settings o Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed o Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and log
67. eneral configurations of the devices e g Time Setup Network Configurations and System Logs This section includes the following functions General Network Interface Management and GRE Tunnel a 7 1 1 General General Home gt System General Name Description Location Device Time Time Zone Time Set Date Network Interface Management GRE Tunnel System Information Enterprise Access Point Time 1970 01 05 15 26 40 GMT 08 00 Taipel Enable NTP Manually set up Bear MMonth Day Set Time gt Hour imin Msec System Information Page System Information For maintenance purpose it is highly recommended to have the following information stated as clearly as possible gt Name The system name used to identify this system gt Description Further information about the system e g device model firmware version and active date gt Location The information on geographical location of the system for the administrator to locate the system easily Time gt Device Time Display the current time of the system gt Time Zone Select an appropriate time zone from the drop down list box gt Time Synchronize the system time by NTP server or manual setup 36 1 Enable NTP By selecting Enabled NTP EAP 300 can synchronize its system time with the NTP server automatically While this method is chosen at least one NTP server s I
68. erage of your network The AP will connect to the network through its LAN port and provide wireless access to your network After having prepared the EAP 300 s hardware for configuration set the TCP IP settings of administrator s computer to have a static IP Address of 192 168 1 10 and Subnet Mask of 255 255 255 0 Step 1 Configuring the AP s System Information gt Enter the AP s default IP Address 192 168 1 1 into the URL of a web browser gt Login via using Username admin and Password admin The WMI appears as shown below gt mg System Wireless Firewall Utilities Status T i i Fi 3 Y i Overview Associated Cliente Repeater Event Log Home gt Status gt System Overnier System Overview g gt System Radio Status System Name Enterprise Access Point MAC Address 00 1F 24 83 96 02 Firmware Version Band 802 1ig n Build Number Channel 1 Location TX Power 19 dBm Site EN A Device Time 1976 01 01 08 00 30 System Up Time Odays 0 00 30 LAN Interface gt AP Status Profile 2 Security Online MAC Address 00 1F D4 83 96 01 Name BSSID ESSID re Clients SRE IP Address VAP 1 O0 1F D4 83 96 02 EAP 1 None o Subnet Mask 255 255 0 0 VAP 2 06 1F D4 83 96 02 EAP 2 None 0 3 Gateway VAP 3 OA 1F 04 83 96 02 EAP 3 None 0 amp e GRE Tunnel Status Connected Remote IP 1927 166 3 3 Key 12345 Web Management Interface Main Page System Overview From here click on the System icon to arr
69. erprise Access Point 5 4 3 z 4 EAP 300 LED Panel ML i LED ON indicates power on OFF indicates power off LED OFF indicates RF is not ready ON indicates RF is ready CLINKING indicates transmitting receiving data ip LED ON indicates Ethernet cable connected OFF indicates no connection i o eee future use WES Start LED Green OFF and then LED Red OFF and then BLINKING SLOWLY BLINKING SLOWLY WES Negotiate BLINKING NORMALLY BLINKING NORMALLY Green Red WES Negotiate Timeout LED Green ON LED Red ON WES Success LED Red ON LED Green ON WES Fail LED Green ON LED Red ON To indicate different WES status as follows Master Slave Section 2 04 2 4 Hardware Installation Please follow the steps mentioned below to install the hardware of EAP 300 1 Place the EAP 300 at the best location The best location for EAP 300 is usually at the center of your intended wireless network 2 Connect the EAP 300 to your network device Connect one end of the Ethernet cable to LAN port of EAP 300 and the other end of the cable to a switch a router or a hub EAP 300 is then connected to your existing wired LAN network 3 There are two ways to supply power over to EAP 300 a Connect the DC power adapter to the EAP 300 power socket b EAP 300 LAN port is capable of transmitting DC currents Connect an IEEE 802 3af compliant PSE device e g a PoE switch to the LAN port of EAP 300 with the Ethernet cable Now the Hardwa
70. ers all of the configuration should be performed on the Controller side It is meaningless to configure GRE tunnel settings from the EAP 300 side Once the settings are applied from the Controller side the applied settings such as Key string will be passed to the corresponding EAP 300 and its WMI page will automatically open to confirm the changes Click Restart link and EAP 300 will restart to activate the tunnel A new window will automatically open and display the tunnel settings from the AP side which is passed from the Controller Click the Reboot link to apply and activate the settings to AP Please refer to your WHG manual for more information regarding AP management with tunnels General Network Interface Y Management GRE Tunnel CAPWAP Home gt System gt Management Services GRE Tunnel Configuration GRE Tunnel Disable Enable key ooo Interface yapi F VAP2 F VAP3 VI VAP4 V VAP5 F VAPG F VAP7 V VAPS WDS1 v WDS2 WDSs WDS4 e GRE Tunnel To enable click Enable of GRE Tunnel gt Remote IP Enter the IP address of the Controller gt Key Set up a password for the connection e Interface Select a VAP or WDS that its traffic will pass through the GRE Tunnel between APs and controller For how to enable VAP items please refer the section 7 2 3 VAP Configuration for reference 4 Section 7 02 7 2 Wireless This section includes the following functions VAP Overview General VAP Configuration Security
71. erview General Y VAP Config Y Security Y Repeater Y Advanced Y Access Control Site Survey Home gt Wireless gt VAP Overview VAP No ESSID EAPSOO 1 EAP3O0 2 EAPSOO 3 EAP300 4 EAP300 5 EAP 300 6 EAP 300 7 EAP 300 8 State Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled VAP Overview Security Type None None None None None None None None VAP Overview Page 42 MAC ACL Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Adwanced Settings Edit Edit Edit Edit Edit Edit Edit Edit e State The hyperlink showing Enable or Disable connects to the VAP Configuration page Eh a NI Ta 3 N i VAP Overview General WYAF Config k Security Repeater Advanced Access Control Site Survey Home Wireless VAP Config VAP Configuration Profile Name VAP Disable Enable VAP 1 EAP300 1 VLAN ID Disable Enable VLAN ID 1 4094 Profile Name ESSID VAP State Page eSecurity Type The hyperlink showing the security type connects to the Security Settings Page VAP Overview General VAP Config N Secu rity Repeater Advanced Access Control Home gt Wireless gt Security Site Survey Security Settings Profile Name VAP 1 Security Type VAP Security Type Page 43 e MAC ACL The hyperlink showing Allow or Disable connects to the Access Contr
72. gs o Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed o Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period When finished with these configurations and you do not wish to add MAC restrictions click SAVE and Reboot the system Otherwise click on the Overview tab and proceed with the next step 28 Step 3 Configuring MAC ACL Access Control List Click on the hyperlink corresponding with your VAP in the MAC ACL column You will be brought to the Access Control Settings page Site Survey h VAP Overview General WAP Config J Security J Repeater l Adwanced 1 Access Control Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Nu
73. h Channel Max Transmit Rate Transmit Power ACK Timeout 100 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500ms Wireless General Settings Page Here simply make sure that both APs are using the same Band and Channel in order to establish a successful WDS link Click SAVE if any changes have been made Step 2 Prevent Loops if Connecting Many AP s When many APs are linked in this manner undesired loops may form to lower overall WLAN performance To prevent such occurrence please make sure Layer 2 STP is enabled To turn on this feature please click on the System and then Network Interface tab General Y Network Interface Management GRE Tunnel Home gt System gt Network Interface Network Settings Mode Static DHCP IP Address 1927 168 1 1 sa Netmask 255 255 0 0 Default Gateway a Primary DNS Server ii Alternate DNS Server OoOo Layer STP Disable Enable Network Settings Page Please select Enable in the field labeled Layer2 STP This will prevent data from looping or a broadcast storm Click SAVE when completed and then Reboot to allow updated settings to take effect 33 Article VII Web Management Interface Configuration This chapter will guide you through the EAP 300 s detailed settings The following table shows all the User Interface Ul functions of LevelOne s EAP 300 Enterprise Access Point The Web Management Interface W
74. he following page for removal confirmation After SAVE button is clicked and system reboot the rule will be removed Firewall List Service 4 Advanced 4 Home Firewall Firewall List Layer 2 Firewall Settings Remove rule 1 gt gt To edit a specific rule Ed in Setting column of firewall list will lead to the following page for detail configuration From this page the rule can be edited from scratch or an existing rule for revision Firewall List Service pr nced Home Firewall List gt Rule Config Layer 2 Firewall Configuration Rule ID 1 EtherType IEEESO2 3 Interface From To DSAP SSAP mon ie IPv4 0800 Destination me aya aa ey e MAC Address o1 00 0C cc cc cc mas Action Block Pass Remark gt Rule ID The numbering of this specific rule will decide its priority among available firewall rules in the table Rule name The rule name can be specified here EtherType The drop down list will provide the available types of traffics subject to this rule Interface It can indicate inbound outbound direction with desired interfaces Vv Vv VY MV Service when EtherType is IPv4 Select the available upper layer protocols services from the drop down list gt DSAP SSAP when EtherType is IEEE 802 3 The value can be further specified for the fields in 802 2 LLC frame header gt Type when EtherType is IEEE802 3 The field can be use
75. he least possible cost 4ipnet delivers a diverse array of turnkey high performance products and mission critical applications to bring reliability and manageability to increasingly complex wireless networks 4ipnet s complete WLAN infrastructure solution portfolio addresses the needs of different network operation environments ranging from the ISP to the SOHO with an emphasis on simplified network deployment centralized network management and enhanced network performance 4ipnet Article I Before You Start Section 1 01 1 1 Preface This manual is intended for system integrators field engineers and network administrators to set up LevelOne s EAP 300 802 11n a b g Enterprise Access Point in their network environments It contains step by step procedures and visual examples to guide MIS staff or individuals with basic network system knowledge to complete the installation Section 1 02 1 2 Document Conventions Bh Represents essential steps actions or messages that should not be ignored Contains related information that corresponds to a topic ancii Indicates that clicking this button will save the changes you made but you must reboot the system upon the completion of all configuration settings for the changes to take effect sm Indicates that clicking this button will clear what you have set before the settings are applied Section 1 03 1 3 Package Content The standard package of EAP 300 includes e EA
76. he website and save it on the administrator s PC To upgrade the system firmware click Browse to choose the new firmware file you downloaded onto your PC and then click Upload to execute the process There will be a prompt confirmation message appearing to notify the administrator to restart the system after a successful firmware upgrade Please restart the system after upgrading the firmware Change Password Backup amp Restore System Upgrade Reboot Home Utilities gt System Upgrade System Upgrade Current Version Current Build Number System Upgrade Page e It is recommended to check the firmware version number before proceeding further Please make sure you have the correct firmware file a Male e Firmware upgrade may sometimes result in the loss of some data Please ensure that all necessary settings are written down before upgrading the firmware e During firmware upgrade please do not turn off the power This may permanently damage the system 70 d 7 3 4 Reboot This function allows the administrator to restart the EAP 300 safely The process shall take about three minutes Click Reboot to restart the system Please wait for the blinking timer to complete its countdown before accessing the system s Web Management Interface again The System Overview page will appear after reboot successfully Occasionally it is necessary to reboot the EAP 300 to ensure that parameter changes are submitted Change Password
77. her The default values of the EAP 300 s LAN IP Address and Subnet Mask are IP Address 192 168 1 1 Subnet Mask 255 255 255 0 f Enterprise Access Point Windows Internet Explore Ko Go y E httpuit92 168 1 1 File Edit View Favorites Tools Help fe Enterprise Access Point Example of entering EAP 300 s default IP Address into a web browser e To access the web management interface WMI connect the administrator PC to the LAN port of EAP 300 via an Ethernet cable Then set a static IP Address on the same subnet mask as the EAP 300 in TCP IP settings of your PC such as the following example IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Please note that the IP Address used should not overlap with the IP Addresses of any Note ea other device within the same network eLaunch the web browser on your PC and enter the IP Address of the EAP 300 192 168 1 1 at the address field and then press Enter The following Administrator Login Page will then appear Enter admin for both the Username and Password fields and then click Login Username admin Password e0000 K Administrator Login Page e After a successful login into EAP 300 a System Overview page of the Web Management Interface WMI will appear gt Overview Associated Clients Wi Home gt Status gt System Overview amp System System Name Enterprise Access Point Firmwar
78. ient devices identified by their MAC addresses listed in the Allow List allowed MAC addresses are granted with access to the system The administrator can temporarily block any allowed MAC address by checking Disable until the administrator re Enables the listed MAC VAP Overview General VAP Config Y Security Repeater Advanced Access Control Site Survey h Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type MAC ACL Allow List Mo MAC Address State MAC Allow List Note An empty Allow List means that there are no allowed MAC addresses Make sure at least the MAC of the modifying system is included e g network administrator s computer 5 MAC ACL Deny List When selecting MAC ACL Deny List all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Disable VAP Overview General WAP Config Security Repeater Adva nced Y Access Control Site Survey h Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type MAC ACL Deny List w No MAC Address 1 fe Disable O Enable Deny List State 58 gt RADIUS AC
79. imary DNS Server ii Alternate DNS Server OoOo Layer STP Disable Enable Network Settings Page Please select Enable in the field labeled Layer2 STP This will prevent data from looping or a broadcast storm Click SAVE when completed and then Reboot to allow updated settings to take effect 33 Article VII Web Management Interface Configuration This chapter will guide you through the EAP 300 s detailed settings The following table shows all the User Interface Ul functions of LevelOne s EAP 300 Enterprise Access Point The Web Management Interface WMI is the page where the status is displayed control is issued and parameters are configured In the Web Management Interface there are two main interface areas Main Menu and Working Area The Working Area occupies the largest area of the WMI displayed in the center of the interface It is also referred to as the configuration page The Main Menu on the top of the WMI allows the administrator to traverse to various management functions of this system The management functions are grouped into branches System Wireless Firewall Utilities and Status Table 1 EAP 300 s Function Organization OPTION FUNCTION General Network Interface Management GRE Tunnel VAP Overview General VAP Configuration Security Wireless Repeater Advanced Access Control Site Survey Firewall List Service Advanced Change Password Backup amp Restore System Upgrade 34
80. imary RADIUS Server Note These settings will also apply to security settings which use RADIUS Server for this VAP Host Domain Name IP Address Authentication Port 1 65535 Secret Key fs RADIUS ACL 37 h 7 2 7 Site Survey Sit Survey is a useful tool to provide information about the surrounding wireless environment available APs are shown with their respective SSID MAC Address Channel Rate setting Signal reading and Security tyoe The administrator can click Setup or Connect to configure the wireless connection according to the mentioned readings when Repeater Type is Universal Repeater Scan Agan AAE MAC Address Channel Rati Ss PCT ed Security seiun Comert 00 i 00 iF pA 00 26 56 14 43 None Connect OO 5 DS TF D4 OG 2E 36 l 34 2 wore Connect lf Universal Repeater function is enabled the system can scan and display all surrounding available access points APs The administrator can then select an AP to for connection to extend its wireless service coverage on this page SSID The SSID Service Set ID of the AP found in this system s coverage area MAC Address The MAC address of the respective AP Channel The channel number currently used by the respective AP or repeater Rate The transmitting rate of the respective AP Signal The encryption type used by the respective AP Vv yY VV VV y Setup Connect o Connect Click Connect to associate with the respective AP direct
81. ing to WLAN AP interfaces hence besides firewall policies configured on gateways this extra security feature will assist to mitigate possible security breach This section provides information in the following functions Firewall Settings Service and Advanced Firewall Settings a 7 3 1 Firewall List lt provides an overview of firewall rules in the system 6 default rules with up to total 20 firewall rules are available for configuration Firewall List Service 4 Advanced Home Firewall Firewall List Layer 2 Firewall Settings No State Action Name EtherType Remark Setting 1 LJ DROP CDP and VTP TEEE 8023 Del Ed In My 2 LJ DROP STP TEEE 8023 Del Ed In My 3 d DROP GARP TEEE_ 8023 Del Ed In My Firewall List Page From the overview table each rule is designated with the following field No The numbering will decide the priority to let system carry out the available firewall rules in the tables e State The check marks will enable the respective rules Action DROP denotes a block rule ACCEPT denotes a pass rule Name It shows the name of rule EtherType It denotes the type of traffics subject to this rule Remark It shows the note of this rule Setting 4 actions are available Del denotes to delete the rule Ed denotes to edit the rule In denotes to insert a rule and Mv denotes to move the rule 62 gt gt To delete a specific rule Del in Setting column of firewall list will lead to t
82. ion gt Universal Repeater lf Universal Repeater is selected please provide the SSID of upper bound AP for uplink connection 5l Security Type None WEP or WPA PSK can be configured for this Repeater connection Please note the security type configured here shall follow upper bound AP s for intended connection VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey q Home gt Wireless gt Repeater Config Repeater Settings Repeater Type WES The SSID of Upper Bound AP OoOo P Current wireless channel of the system is set at 1 Repeater connection may fail if the system is set to connect to upper AP with different channels Security Type Repeater Settings Universal Repeater o The SSID of Upper Bound AP Specify the SSID of the upper bound AP that the system is used to extend that AP s wireless service coverage o Security Type None WEP or WPA PSK 52 gt WDS lf WDS is selected EAP 300 can support up to 4 WDS links to its peer APs Security Type None WEP or WPA PSK can be configured to decide which encryption to be used for WDS connections respectively Please fill in remote peer s MAC address and click SAVE to proceed if setting revision is necessary CLEAR button is used to clear the contents in the above WDS connection list VAP Overview General VAP Config Y Security Repeater Advanced Access Control Y Site Survey Home Wireless gt Re
83. ive at the following page On this Page you can make entries to the Name Description and Location fields as well as set the device s time General Network Interface 1 Management GRE Tunnel h Home gt System gt General System Information Name Enterprise Access Point Description S O Location s O Time Device Time 1970 01 05 14 17 18 Time Zone GMT 08 00 Taipei Time O Enable NTP Manually set up Set Date Mear Month Day Set Time Hour Mimin v sec System Information Page There are two methods of setting up the time Manual indicated by the option Set Date amp Time and NTP The default is Manual and requires individual setup every time the system starts up Simply choose a time zone and set the time accordingly When finished click Save Time Zone GMT 08 00 Taipei ha Time O Enable NTP Manually set up Set Date Dhea Month Mbay Set Time Bour in Misec Manually Time Setup The alternative is NTP Upon selecting NTP under the Time field the configuration changes to allow up to two NTP servers Simply enter a local NTP server s IP Address if available or search online for an NTP server nearest you Set the time zone and click Save Time Zone GMT 08 00 Taipei Time Enable NTP Manually set up NTP Setup 16 Step 2 Configuring the AP s Network Settings While still on this Page click on the Net
84. j Backup amp Restore System Upgrade Reboot Home Utilities gt Reboot Reboot the System Reboot may take several minutes to complete The Admin Login Page will be shown after system boots up Reboot Page Section 7 05 7 4 Status This page is used to view the current condition and state of the system and includes the following functions Overview Associated Clients Repeater and Event Log a 7 4 1 Overview The System Overview page provides an overview of the system status for the administrator r E Associated Clients Repeater Event Log h Y Home gt Status gt System Overview System Overview amp System __________ amp Radio Status System Name Enterprise Access Point MAC Address 00 1F D4 83 96 02 Firmware Version Band 802 1i9 n Build Number Channel 1 Location TX Power 19 dBm Site EN A o Device Time 1970 01 01 08 00 30 System Up Time 0 days 0 00 30 LAN Interface ______ rs AP Status Profile Security Online MAC Address 00 1F 04 83 96 01 Hime BSSID ESSID read Clients GRE IP Address VAP 1 00 1F D4 83 96 02 EAP 1 None 0 Ge Subnet Mask 255 255 0 0 VAP 2 06 1F D4 83 96 02 FAP 2 None 0o Gateway VAP 3 QA 1F D4 83 96 02 EAP 3 None 0 GRE Tunnel Status Connected Remote IP 192 168 3 3 Key 12345 System Overview Page 72 Table 3 Status Page s Organizational
85. k SAVE to save the configuration before leaving this page 6 7 Section 7 04 7 3 Utilities The administrator can maintain the system on this page Change Password Backup amp Restore System Upgrade and Reboot a 7 3 1 Change Password To protect the Web Management Interface from unauthorized access it is highly recommended to change the administrator s password to a secure password Only alpha numeric characters are allowed and it is also recommended to make use of a combination of both numeric and alphabetic characters Change Password Backup amp Restore System Upgrade Reboot Home gt Utilities gt Change Password Change Passy Change Password Name admin Old Password New Password up to 32 characters Re enter New Password Change Password Page The administrator can change password on this page Enter the original password admin and new password and then re enter the new password in the Re enter New Password field Click Save to activate the new password 68 b 7 3 2 Backup amp Restore This function is used to backup and restore the EAP 300 settings The EAP 300 can also be restored to factory defaults using this function It can be used to duplicate settings to other access points backup settings of this system and then restore on another AP System Upgrade Reboot 4 I Change Password y Backup amp Restore Home Utilities gt Config Save amp Restore Config
86. l Width available when Band is 802 11g 802 11n Double channel bandwidth to 40 MHz is supported to enhance throughput Channel Select the appropriate channel from the drop down menu to correspond with your network settings for example Channel 1 11 is available in North American and Channel 1 13 in Europe or choose the default Auto Max Transmit Rate The maximum wireless transmitting rate Select the desired rate from the drop down menu The system uses the highest possible rate when Auto is selected Transmit Power The signal strength transmitted from the system can be selected among Auto Highest High Medium Low and Lowest trom the drop down menu ACK Timeout It indicates a period of time that the system waits for an Acknowledgement frame sent back from a station without retransmission In other words upon timeout if the Acknowledgement frame is still not received the frames will be retransmitted This option can be used to tune network performance for extended coverage For regular indoor deployments please keep the default setting Beacon Interval ms The entered amount of time indicates how often the beacon signal will be sent from the access point Due to RF regulation in different nations available values in the above table will differ Table 2 RF Configurations under normal circumstances in certain countries 802 11a 802 11b 802 119 802 11b 802 11g 802 11a 802 11n 802 11n 802 11g 36 40 44 48 52 56
87. level nas a E Hn E Zea E one LevelOne EAP 300 Enterprise Access Point User Manual V1 00 Table of Contents i TROLS Yon SC ee ssc eusbeassanssaean tev satcosdetieeucedosucossseesessesens 3 MMP aioe ca cactea ase nats E A EE E A E 3 1 2 Document Conventions cccccccccccccccccccceceeceeceeeeeeeeeeeeeeeeeeeeeseseeseeeeeeeeseeeeeeeeeseeseeeeeeeseeeeeseseseseseeeeesesecs 3 OD PAG A CO e E E E E E anteloalaneGeg aise enaitaenastetoness 3 2 System Overview and Getting Started essessoesscescceesccesocesoesscesocesccescocescessoesscesscesscesseeseees 4 24 Introd c on of LevelOne EA P90 O ss sassicastarcessasanoincdcnsadesasancianisazdeasasbuctondistagerasanccosiwatacesadeeo aE EE Troiae 4 2A Deployment Topology 4 en On er ne ne on Pe eee 5 OD TAA Gy ar Doser E Oee naaa E EE 6 24 Hardware MAS Ue A OMe rte ests E E E E T E E E E 8 2 5 Console Interface ar ecto taeda ect ctes cen nseissece oenonasste essen tea sivoaseptaste etess sebr EEEE en SPEE E EEEE SESS EE EEEE Eeee eere eeaeee eere e eene 9 2 5 Access Web Management Interface cccccsecscessscesssecssescessccessecessecesssscsseecessesessescesstsessesceseecessesens 11 3 Connect your AP to your Network e essseesscesseeesoeessocesocesscessoeesocessoeesocesooeesoeesocessoeesoeessoeesoe 15 4 Adding Virtual Access Points eeseessoessoesceesoeesoessoessoesceesoeesoeesocesoeesoessoessoeesoesoesoceeoeesoeesoessoeeo 21 Be SCL YOUF
88. ly no further configuration is required Cip 893 00 0E 2E 7C AA 6E i 54 4 None o Setup Click Setup to configure security settings for associating with the respective AP WEP Click Setup to configure the WEP setting for associating with the target AP Cip wep 00 11 A3 08 09 56 6 54 40 WEP The following configuration box will then appear at the bottom of the screen Security settings configured here must be the same as the target AP 60 Notelll If you set WEP security for Universal Repeater the security of AP will also change to WEP and use the same settings WEP Key Type Open Shared Auto WEP Key Length 64 bits 128 bits 152 bits WEP Key Format ASCH Hex WEP Key Index WEP Keys WPA PSK Click Setup to configure the WPA PSK setting for associating with the target AP OA 1F D4 39 10 74 11 54 52 WPA PSK The following configuration box will then appear at the bottom of the screen Information provided here must be consistent with the security settings of the target AP Cip psk Pre shared Cipher TKIP ane oe PSK Hex 64 chars Passphrase 8 63 chars 6 Section 7 03 7 3 Firewall The system provides an added security feature Layer2 Firewall in addition to typical AP security Layer2 Firewall offers a firewall function that is tailored specifically for Layer2 traffics providing another choice of shield against possible security threats coming from go
89. many client devices are associating with EAP 300 or in areas where the clients are far apart and can detect only EAP 300 but not each other e Fragmentation Threshold Enter a value between 256 and 2346 The default is 2346 A packet size larger than this threshold will be fragmented sent with several pieces instead of one chunk before transmission A smaller value results in smaller frames but allows a larger number of frames in transmission A lower Fragment Threshold setting can be useful in areas where communication is poor or disturbed by a serious amount of radio interference e DTIM Period Input the DTIM Interval that is generated within the periodic beacon at a specified frequency Higher DTIM will let the wireless client save energy more but the throughput will be lowered e Broadcast SSID Disabling this function will prevent the system from broadcasting its SSID If broadcast of the SSID is disabled only devices that have the correct SSID can connect to the system e Wireless Station Isolation By enabling this function all stations associated with the system are isolated and can only communicate with the system 54 e WMM The default is Disable Wi Fi Multimedia WMM is a Quality of Service QoS feature that prioritizes wireless data packets based on four access categories voice video best effort and background Applications without WMM and applications that do not require QoS are assigned to the best effort category which
90. mber of Clients f Range 1 32 3 Access Control Type Disable Access Control Access Control Settings Page Please choose among Disable Allow Deny and RADIUS ACL from the drop down menu of Access Control Type 1 Disable Access Control This means that there is no restriction for client devices to access the system MAC ACL Allow List This means that only the client devices identified by their MAC addresses listed in the Allow List allowed MAC addresses are granted with access to the system The administrator can temporarily block any allowed MAC address by checking Disable until the 2 administrator re Enables the listed MAC VAP Overview J General WAP Config J Security j Repeater Advanced Access Control Site Survey Home Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients 128 Range 1 32 Access Control Type MAC ACL Allow List w No MAC Address State MAC ACL Allow List 29 MAC ACL Deny List This means that all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Enable 3 VAP Overview General VAP Config Security y Repeater y Adwa noed Access Control Site Survey i i Home gt Wireless gt Access Control Access Control Settings
91. mong available firewall rules in the table Rule name The rule name can be specified here EtherType The drop down list will provide the available types of traffics subject to this rule Interface It can indicate inbound outbound direction with desired interfaces Vv Vv VY MV Service when EtherType is IPv4 Select the available upper layer protocols services from the drop down list gt DSAP SSAP when EtherType is IEEE 802 3 The value can be further specified for the fields in 802 2 LLC frame header gt Type when EtherType is IEEE802 3 The field can be used to indicate the type of encapsulated traffics 63 gt gt VLAN ID when EtherType is 802 1 Q The VLAN ID is provided to associate with certain VLAN tagging traffics Priority when EtherType is 802 1 Q It denotes the priority level with associated VLAN traffics Encapsulated Type when EtherType is 802 1 Q It can be used to indicate the type of encapsulated traffics Opcode when EtherType is ARP RARP This list can be used to specify the ARP Opcode in ARP header Source MAC Address Mask indicates the source MAC IP Address Mask indicates the source IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Destination MAC Address Mask indicates the destination MAC IP Address Mask indicates the destination IP address when EtherType is IPv4 ARP IP MAC amp MASK indicate the ARP payload fields Action The rule c
92. n be enabled to prevent undesired loops because broadcasting storm may occur in a multi switch environment where broadcast packets are forwarded in an endless loop between switches Moreover a broadcast storm may consume most of available system resources in addition to available bandwidth Thus enabling the Layer 2 STP can lower such undesired occurrence and derive the best available data path for network Communication c 7 1 3 Management The EAP 300 s provided services e g VLAN Management SNMP and System log can be configured here General Network Interface Management GRE Tunnel Home gt System gt Management Services Management Services VLAN for Management Disable Enable viANID 1 4094 SNMP Configuration Disable Enable Community String Trap Disable Enable a ae Disable Enable SYSLOG Server IP 192 168 1 254 Server Port si4 SYSLOG Level Management Services Page e VLAN for Management When enabling this function management traffic from the system will be tagged with a VLAN ID In other words administrator who wants to access the WMI must send management traffic with the same VLAN ID such as connecting to the VAP with the same VLAN ID Enter a value between 1 and 4094 for the VLAN ID if the option is enabled 3 e SNMP Configuration By enabling SNMP function the administrator can obtain the system information remotely SNMP Configuration Disable
93. nable NTP Manually set up Set Date Dhea Month Mbay Set Time Bour in Misec Manually Time Setup The alternative is NTP Upon selecting NTP under the Time field the configuration changes to allow up to two NTP servers Simply enter a local NTP server s IP Address if available or search online for an NTP server nearest you Set the time zone and click Save Time Zone GMT 08 00 Taipei Time Enable NTP Manually set up NTP Setup 16 Step 2 Configuring the AP s Network Settings While still on this Page click on the Network Interface tab to begin configuration of the network settings General Wetwork Interface Management GRE Tunnel Home gt System Network Interface Network Settings Mode Static DHCP IP Address ji Netmask 255 255 0 0 7 Default Gateway r Primary DNS Server T Alternate DNS Server f Layer STP Disable Enable Network Settings Page lf the deployment decides the AP will be getting dynamic IP Addresses from the connected network set Mode to DHCP otherwise set Mode to Static and fill in the required fields marked with a red asterisk IP Address Netmask Gateway and Primary DNS Server with the appropriate values for the network Click SAVE when you are finished to save changes that have been made Step 3 Configure the AP s Wireless General Settings Click on the Wireless icon followed by the General tab On this page we only
94. need to choose the Band and Channel that we wish to use VAP Overview Y General VAP Config Security J Repeater Advanced Access Control site Survey 4 Home gt Wireless gt General General Settings Band 802 119 802 11n Pure 11n Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Width si Channel Max Transmit Rate Auto m w a z E lt Transmit Power Auto ka ACK Timeout 100 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500ms Wireless General Settings Page On this page select the Band with which the AP is to broadcast its signal The rest of the fields are optional and can be configured at another time Click Save if any changes have been made Step 4 Configuring Wireless Coverage VAP 1 To setup the AP s wireless access refer to the following VAP 1 configuration other VAP configuration can refer to the same setup steps as done for VAP 1 Click on the Overview tab to proceed VAP Overview General VAP Config Security Repeater Advanced j Access Control Site Survey k Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None
95. nit 4 micro seconds Beacon Interval 100 100 500ms 3 AP General Settings Page Band Select an appropriate wireless band 802 11b 802 11g 802 11b 802 11g 802 119 802 11n or select Disable if the wireless function is not required gt Pure 11n Enable 802 11n network only Short Preamble The short preamble with a 56 bit synchronization field can improve WLAN transmission efficiency Select Enable to use Short Preamble or Disable to use Long Preamble with a 128 bit synchronization field Short Guard Interval available when Band is 802 11g 802 11n The guard interval is the space between symbols characters being transmitted to eliminate inter symbol interference In order to further boost throughput with 802 11n short guard interval is half of what it used to be please select Enable to use Short Guard Interval or Disable to use normal Guard Interval Channel Width available when Band is 802 11g 802 11n Double channel bandwidth to 40 MHz is supported to enhance throughput Channel Select the appropriate channel from the drop down menu to correspond with your network settings for example Channel 1 11 is available in North American and Channel 1 13 in Europe or choose the default Auto Max Transmit Rate The maximum wireless transmitting rate Select the desired rate from the drop down menu The system uses the highest possible rate when Auto is selected Transmit Power The signal strength transmitted from the system can be select
96. ogouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes 49 Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period e WPA PSK WPA PSK Wi Fi Protected Access Pre shared Key is a pre shared key authentication method a special mode of WPA VAP S T E General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name Security Type Cipher Suite Pre shared Key Type PSK Hex 64 chars Passphrase 8 63 chars Group Key Update Period 600 second s Security Settings WPA PSK gt Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed gt Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase gt Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected gt Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds 50 e WPA RADIUS If this option is selected the RADIUS authentication and data encryption will be both enabled VAP Overview General VAP Config Y Security Repeater Advanced Y Access Control Y Site Survey Home Wireless gt Secu
97. ol Site Survey 4 Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 3 Access Control Type RADIUS ACL w PE ES SEREF i Notell These settings will also apply to security settings which use RADIUS Server for this VAP Host fi Domain Name IP Address Authentication Port 1812 1 65535 Secondary RADIUS Server Host DOO Authentication Port RADIUS ACL Click Save and Reboot after completing your configurations to have them take effect 3 Article VI Create a WDS Bridge between two APs WDS link creation will assist to extend network coverage where running wires is not an option effectively transferring the traffics to the other end of WLAN LAN through the EAP 300 Since this is a peer to peer connection both EAP 300s will be configured by the same way Step 1 Make sure the Band and Channel Match between the WDS peers In order to successfully communicate the two EAP 300s must be configured to use the same channel and band for its wireless settings Click the Wireless icon followed by the General tab to reach the following page VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey 255 gt General Home gt Wire General Settings Band 802 119 802 11n Pure 11n Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Widt
98. ol Settings Page a a k A re VAP Overview General WAP Config Security i Advanced 4 Access Control Site Survey N L 4 Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 Access Control Type Disable Access Control Access Control Settings Page e Advanced Settings The advanced settings hyperlink connects to the Advanced Wireless Settings Page VAP Overview General WAP Config Security Repeater Home Wireless gt Advanced i Adwanced Access Control Site Survey 4 Y 1 L Advanced Wireless Settings Profile Name RTS Threshold 1 2346 Fragment Threshold 256 2346 DTIM period 1 15 Broadcast SSID Disable Enable Wireless Station Isolation Disable Enable WMM Disable Enable IAPP Disable Enable Multicast Broadcast Rate Advanced Wireless Settings Page 44 b 7 2 2 General AP s general wireless settings can be configured here VAP Overview General VAP Config Security Repeater Advanced Access Control Y Site Survey Home gt Wireless gt General General Settings Band 802 11g 802 11n L Pure iin Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Width Channel Max Transmit Rate Transmit Power ACK Timeout 100 0 255 O Auto U
99. ollowing configuration box will then appear at the bottom of the screen Information provided here must be consistent with the security settings of the target AP Cip psk Pre shared Cipher TKIP ane oe PSK Hex 64 chars Passphrase 8 63 chars 6 Section 7 03 7 3 Firewall The system provides an added security feature Layer2 Firewall in addition to typical AP security Layer2 Firewall offers a firewall function that is tailored specifically for Layer2 traffics providing another choice of shield against possible security threats coming from going to WLAN AP interfaces hence besides firewall policies configured on gateways this extra security feature will assist to mitigate possible security breach This section provides information in the following functions Firewall Settings Service and Advanced Firewall Settings a 7 3 1 Firewall List lt provides an overview of firewall rules in the system 6 default rules with up to total 20 firewall rules are available for configuration Firewall List Service 4 Advanced Home Firewall Firewall List Layer 2 Firewall Settings No State Action Name EtherType Remark Setting 1 LJ DROP CDP and VTP TEEE 8023 Del Ed In My 2 LJ DROP STP TEEE 8023 Del Ed In My 3 d DROP GARP TEEE_ 8023 Del Ed In My Firewall List Page From the overview table each rule is designated with the following field No The numbering will decide the priority to let system car
100. on Page VAP 1 shown 19 The desired VAP profile can be selected from the drop down menu of Profile Name and VAP 1 configuration will serve as an example for all other VAPs Before proceeding further please make sure that the VAP field is Enable afterwards enter an ESSID to represent the WLAN associated with AP s VAP 1 It is suggested that Profile Name is used to describe what this particular VAP will be used for otherwise leave it as default VLAN ID can be chosen at another time Click SAVE to save all changes up to this point and Reboot the system to apply these revised settings Congratulations After reboot the AP can start to work with these revised settings 20 Article IV Adding Virtual Access Points EAP 300 possesses the feature of multi ESSID namely it can behave as multiple virtual access points providing different levels of services from the same physical AP device Please click on the Wireless icon to review the VAP Overview page VAP Config Security 4 Repeater h Advanced Access Control Site Survey VAP Overview General co WAD Papoose 655 gt VAP Overview Home gt Wire VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP 300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None Disabled Edit 7 EAF 300
101. out the system e g device model firmware version and active date gt Location The information on geographical location of the system for the administrator to locate the system easily Time gt Device Time Display the current time of the system gt Time Zone Select an appropriate time zone from the drop down list box gt Time Synchronize the system time by NTP server or manual setup 36 1 Enable NTP By selecting Enabled NTP EAP 300 can synchronize its system time with the NTP server automatically While this method is chosen at least one NTP server s IP address or domain name must be provided Time Device Time 2000 01 03 04 32 49 Time Zone GMT 08 00 Taipei Time Enable NTP Manually set up NTP Time Configuration Fields Generally networks would have a common NTP server internal or external If there is use it otherwise locate a nearby NTP server on the web 2 Manually set up By selecting Manually set up the administrator can manually set the system date and time Time Device Time 2000 01 03 04 32 49 Time Zone Time O Enable NTP Manually set up Set Time Bour Mimin l Msec Manual Time Configuration Fields Set Date Select the appropriate Year Month and Day from the drop down menu Set Time Select the appropriate Hour Min and Sec from the drop down menu Unless both an Internet connection and a network NTP server are unavailable it is
102. outs through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period When finished with these configurations and you do not wish to add MAC restrictions click SAVE and Reboot the system Otherwise click on the Overview tab and proceed with the next step 28 Step 3 Configuring MAC ACL Access Control List Click on the hyperlink corresponding with your VAP in the MAC ACL column You will be brought to the Access Control Settings page Site Survey h VAP Overview General WAP Config J Security J Repeater l Adwanced 1 Access Control Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 3 Access Control Type Disable Access Control Access Control Settings Page Please choose among Disable Allow Deny and RADIUS ACL from the drop down menu of Access Control Type 1 Disable Access Control This means that there is no restriction for client devices to access the system MAC ACL Allow List This means that only the client devices identified by their MAC addresses listed in the Allow List allowed MAC addresses are granted with access to the system The administrator can temporarily block any allowed MAC addres
103. peater Config Repeater Settings Repeater Type l WES WDS Profile wos Security type Repeater Settings WDS o WES Enable WES o MAC Address To remote peer s MAC address o WDS Click on Enable to enable the respective WDS links click on Delete to remove them o Security Type None WEP or WPA PSK 53 f 7 2 5 Advanced The advanced wireless settings for the EAP 300 s VAP Virtual Access Point profiles allow customization of data transmission settings The administrator can tune the following parameters to improve network communication performance if a poor connection occurs VAP Overview General Y VAP Config Security Repeater Advanced Access Control 4 Site Survey Home Wireless gt Advanced Advanced Wireless Settings Profile Name RTS Threshold 1 2346 Fragment Threshold 256 2346 DTIM period 1 15 Broadcast SSID Disable Enable Wireless Station Isolation Disable Enable WMM Disable Enable IAPP Disable Enable Multicast Broadcast Rate Advanced Wireless Settings Page eRTS Threshold Enter a value between 1 and 2346 RTS Request to Send Threshold determines the packet size at which the system issues a request to send RTS before sending the fragment to prevent the hidden node problem The RTS mechanism will be activated if the data size exceeds the value provided A lower RTS Threshold setting can be useful in areas where
104. play all surrounding available access points APs The administrator can then select an AP to for connection to extend its wireless service coverage on this page SSID The SSID Service Set ID of the AP found in this system s coverage area MAC Address The MAC address of the respective AP Channel The channel number currently used by the respective AP or repeater Rate The transmitting rate of the respective AP Signal The encryption type used by the respective AP Vv yY VV VV y Setup Connect o Connect Click Connect to associate with the respective AP directly no further configuration is required Cip 893 00 0E 2E 7C AA 6E i 54 4 None o Setup Click Setup to configure security settings for associating with the respective AP WEP Click Setup to configure the WEP setting for associating with the target AP Cip wep 00 11 A3 08 09 56 6 54 40 WEP The following configuration box will then appear at the bottom of the screen Security settings configured here must be the same as the target AP 60 Notelll If you set WEP security for Universal Repeater the security of AP will also change to WEP and use the same settings WEP Key Type Open Shared Auto WEP Key Length 64 bits 128 bits 152 bits WEP Key Format ASCH Hex WEP Key Index WEP Keys WPA PSK Click Setup to configure the WPA PSK setting for associating with the target AP OA 1F D4 39 10 74 11 54 52 WPA PSK The f
105. re Installation is complete e Please only use the power adapter supplied with the EAP 300 package Using a different A power adapter may damage this system e To double verify the wired connection between EAP 300 and you switch router hub please also check the LED status indicator of the respective network devices Section 2 05 2 5 Console Interface Via this port to enter the console interface for the administrator to check the IP address of EAP 300 and reset the device to default if the admin password is forgotten 1 In order to connect to the console port of EAP 300 a console modem cable and a terminal simulation program such as the Hyper Terminal are needed 2 Ifa Hyper Terminal is used please set the parameters as 115200 8 None 1 None ax Pon teling Bite pei second Cusa Piti ie Panty Hone So bt as Fir ite Neme Heroe Deisi OK Cancel Ano The console interface looks like the screenshot below displaying the current LAN IP address and the instructions to reset device to default COM4 PulT login When resetting the device to default from the console interface key in reset2def for login and password Confirm yes and EAP 300 will begin the reset process SYSTEM IP 192 166 10 1 25 Enter resetzedet twice to E aa wh actory default login Password Do you really want to Set actory default and reboot yes ye When the
106. responding cell in the column labeled Security Type This hyperlink will direct you to the following Security Settings page VAP Overview General VAP Config Security Repeater Advanced Access Control Y Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings Page VAP 1 shown Select your desired Security Type from the drop down menu which includes None WEP 802 1X WPA PSK and WPA RADIUS 24 e None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism with key length selected from 64 bit 128 bit or 152 bit VAP Overview General VAP Contig Y Security Repeater Advanced Access Control Site Survey 4 Home gt Wireless gt Security Security Settings Profile Name Security Type WEP w Note The WEP keys are global setting for all virtual APs The key value will apply to all VAPs 802 11 Authentication Open System Shared Key Auto WEP Key Length 64 bits 128 bits 152 bits WEP Key Format a
107. rewall Configuration H Rule ID Interface From To WAPI Service ALL ka IF Address fo Mask 0 0 0 0 0 w P address Masks 0 0 0 0 70 3 Action Block Pass gt gt To move a specific rule Mv in Setting column of firewall list will lead to the following page for reordering confirmation After SAVE button is clicked and system reboot the order of rules will be updated 64 Firewall List Home gt Firewall gt Move rule Move Rule 1 Before After ID 1 20 Please make sure all desired rules state of rule are checked and saved in overview page the rule will be ID Move to enforced upon system reboot Firewall List Service Advanced Home gt Firewall gt Firevell List Layer 2 Firewall Settings Enable Layer 2 Firewall Disable Enable No State Action Name EtherType Remark Setting 1 DROP CDP and VTP IEEE_ 8023 Del Ed In Mv 2 F DROP STP BPDU IEEE_8023 Del Ed In Mv 3 P DROP GARP IEEE_8023 Del Ed In Mv 4 O DROP RIP IPv4 Del Ed In Mv 5 O DROP HSRP IPv4 Del Ed In Mv 6 O DROP OSPF IPv4 Del Ed In Mv 7 Del Ed In Mv 8 Del Ed In Mv 9 Del Ed In Mv 10 Del Ed In Mv First Prev Next Last total 20 65 b 7 3 2 Service The administrator can add or delete firewall service here the services in this list will become options to choose in firewall rule when EtherType is IPv4 EAP 300 provides a list of rules to block or p
108. rity Security Settings Profile Name Security Type Cipher Suite Group Key Update Period 600 second s Primary RADIUS Server Hast Pe Domain Name IP Address Authentication Port jisi2 Secret Key F Accounting Service Disable Enable Accounting Port he3 F Accounting Interim Update Interval lso second s Security Settings WPA RADIUS gt WPA Settings O O Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds gt RADIUS Server Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period e 7 2 5 Repeater To extend wireless network coverage EAP 300 supports 3 options of Repeater type None WDS or Universal Repeater selecting None will turn off this funct
109. ry out the available firewall rules in the tables e State The check marks will enable the respective rules Action DROP denotes a block rule ACCEPT denotes a pass rule Name It shows the name of rule EtherType It denotes the type of traffics subject to this rule Remark It shows the note of this rule Setting 4 actions are available Del denotes to delete the rule Ed denotes to edit the rule In denotes to insert a rule and Mv denotes to move the rule 62 gt gt To delete a specific rule Del in Setting column of firewall list will lead to the following page for removal confirmation After SAVE button is clicked and system reboot the rule will be removed Firewall List Service 4 Advanced 4 Home Firewall Firewall List Layer 2 Firewall Settings Remove rule 1 gt gt To edit a specific rule Ed in Setting column of firewall list will lead to the following page for detail configuration From this page the rule can be edited from scratch or an existing rule for revision Firewall List Service pr nced Home Firewall List gt Rule Config Layer 2 Firewall Configuration Rule ID 1 EtherType IEEESO2 3 Interface From To DSAP SSAP mon ie IPv4 0800 Destination me aya aa ey e MAC Address o1 00 0C cc cc cc mas Action Block Pass Remark gt Rule ID The numbering of this specific rule will decide its priority a
110. s clients require larger or smaller bandwidth for sending multicast broadcast packets the administrator can customize the EAP700 s multicast broadcast bandwidth here 99 g 7 2 6 Access Control On this page the network administrator can restrict the total number of clients connected to the EAP 300 as well as specify particular MAC addresses that can or cannot access the device VAP Overview General Y VAP Config 4 Security Repeater Advanced Access Control Site Survey Home Wireless Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients f Range 1 32 Access Control Type Disable Access Control Access Control Settings Page e Maximum Number of Clients EAP 300 supports various methods of authenticating clients for wireless LAN access The default policy is unlimited access without any authentication required To restrict the station number of wireless connections simply change the Maximum Number of Stations to a desired number For example while the number of stations is set to 20 only 20 stations are allowed to connect to the specified VAP 56 e Access Control Type The administrator can restrict the wireless access of client devices based on their MAC addresses gt Disable Access Control When Disable is selected there is no restriction for client devices to access the system gt MAC ACL Allow List When selecting MAC ACL Allow List only the cl
111. s by checking Disable until the 2 administrator re Enables the listed MAC VAP Overview J General WAP Config J Security j Repeater Advanced Access Control Site Survey Home Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients 128 Range 1 32 Access Control Type MAC ACL Allow List w No MAC Address State MAC ACL Allow List 29 MAC ACL Deny List This means that all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Enable 3 VAP Overview General VAP Config Security y Repeater y Adwa noed Access Control Site Survey i i Home gt Wireless gt Access Control Access Control Settings Profile Name VAP 1 Maximum Number of Clients Range 1 32 3 MAC ACL Deny List Access Control Type No MAC Address MAC ACL Deny List State 30 4 RADIUS ACL Authenticate incoming MAC addresses by an external RADIUS server When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS server Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration VAP Overview M General N YAP Config Security Repeater y Adwa nced Y Access Contr
112. s particular VAP It may allow further management control e g access rights and Internet usage etc of each VAP with a management gateway Click SAVE and then Reboot for the changes to take effect 22 Article V Secure Your AP Different VAP may require different level of security These instructions will guide the user through setting up different types of security for a particular VAP Simply repeat the following steps for other VAP with security requirement Step 1 Ensure that your VAP is Enabled VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None Disabled Edit 7 EAP300 7 Disabled None Disabled Edit 5 EAP300 8 Disabled None Disabled Edit VAP Overview Page On the VAP Overview page check the table to confirm the VAP State If it is Enabled skip to Step 2 If not click on to proceed with VAP Configuration for that particular VAP VAP Overview Y General WAP Co nfig Security Repeater Y Advanced Access Control Y Site Su mey Home gt Wireless VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP
113. scu Hex WEP Key Index WEP Keys i oOo Security Settings WEP gt 802 11 Authentication Select from Open System Shared Key or Auto gt WEP Key Length Select from 64 bit 128 bit 152 bit key length gt WEP Key Format Select from ASC or Hex format for the WEP key gt WEP Key Index Select a key index from 1 through 4 The WEP key index is a number that specifies which WEP key is used for the encryption of wireless frames during data transmission gt WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 25 e 802 1X When 802 1X Authentication is selected RADIUS authentication and enhanced dynamic WEP are provided i i VAP Overview 4 General Y VAP Config Y Security Repeater Y Advanced Y Access Control Site Survey Home gt Wireless gt Securit Security Settings Profile Name VaP Liv Security Type B02 1X v Dynamic WEP Disable Enable WEP Key Length 64 bits 128 bits Rekeying Period 300 second s Peay MARIES SOME p ii i Domain Name IP Address Authentication Port 1812 ili Secret Key Accounting Service Disable Enable Accounting Port 1 Accounting Interim Update Interval Ee secondisi Security Settings 802 1X Authentication gt Dynamic WEP Settings o Dynamic WEP For 802 1X security type Dynamic WEP is always enabled to automatically generate WEP keys for encryption
114. service coverage o Security Type None WEP or WPA PSK 52 gt WDS lf WDS is selected EAP 300 can support up to 4 WDS links to its peer APs Security Type None WEP or WPA PSK can be configured to decide which encryption to be used for WDS connections respectively Please fill in remote peer s MAC address and click SAVE to proceed if setting revision is necessary CLEAR button is used to clear the contents in the above WDS connection list VAP Overview General VAP Config Y Security Repeater Advanced Access Control Y Site Survey Home Wireless gt Repeater Config Repeater Settings Repeater Type l WES WDS Profile wos Security type Repeater Settings WDS o WES Enable WES o MAC Address To remote peer s MAC address o WDS Click on Enable to enable the respective WDS links click on Delete to remove them o Security Type None WEP or WPA PSK 53 f 7 2 5 Advanced The advanced wireless settings for the EAP 300 s VAP Virtual Access Point profiles allow customization of data transmission settings The administrator can tune the following parameters to improve network communication performance if a poor connection occurs VAP Overview General Y VAP Config Security Repeater Advanced Access Control 4 Site Survey Home Wireless gt Advanced Advanced Wireless Settings Profile Name RTS Threshold 1 2346 Fragment Threshold 256 2346 DTIM period 1
115. settings to AP Please refer to your WHG manual for more information regarding AP management with tunnels General Network Interface Y Management GRE Tunnel CAPWAP Home gt System gt Management Services GRE Tunnel Configuration GRE Tunnel Disable Enable key ooo Interface yapi F VAP2 F VAP3 VI VAP4 V VAP5 F VAPG F VAP7 V VAPS WDS1 v WDS2 WDSs WDS4 e GRE Tunnel To enable click Enable of GRE Tunnel gt Remote IP Enter the IP address of the Controller gt Key Set up a password for the connection e Interface Select a VAP or WDS that its traffic will pass through the GRE Tunnel between APs and controller For how to enable VAP items please refer the section 7 2 3 VAP Configuration for reference 4 Section 7 02 7 2 Wireless This section includes the following functions VAP Overview General VAP Configuration Security Repeater Advanced Access Control and Site Survey EAP 300 supports up to eight Virtual Access Points VAPs Each VAP can have its own settings e g ESSID VLAN ID security settings etc Such VAP capabilities enable different levels of service to meet network requirements a 7 2 1 VAP Overview An overall status is collected on this page including ESSID State Security Type MAC ACL and Advanced Settings where EAP 300 has 8 VAPs each having its own settings In this table please click on the hyperlink to further configure each individual VAP VAP Ov
116. st proof metal housing is designed for wireless connectivity in enterprise or industrial environments of all dimensions EAP 300 makes the wireless communication fast secure and easy It Supports business grade security such as 802 1X and Wi Fi Protected Access WPA and WPA2 By pushing a purposely built button the LevelOne WES feature makes it easy to bridge wireless links of multiple EAP 300s for forming wider wireless network coverage EAP 300 also features multiple ESSIDs with VLAN tags one EAP 300 can emulate up to eight Virtual APs great for enterprise applications such as separating the traffics of different departments using different ESSIDs PoE Switch fe Co gt li NY paanan MOS Unk lle Ate WHG Controller ESSID 2 Gs Wired and Wireless Network Layout with EAP200s Section 2 02 2 2 Deployment Topology fe nario ation 199 1481 14 AP 2 aP 3 Wireless Laptop _ i IZIM 1 pt a Werelet Laptop WDS Links A fi kU a cS le s le al ha N i n a _ w O l Loa ea mahan art 1a Wired Detstopi Wheo Deichops x AF 02 108 008 Woche lovtup Ss MPANALI prea Wired Dotkiop Common Network Layout with EAP 300s This above deployment scenario illustrates a deployment example using three access points AP 1 AP 2 and AP 3 e Three EAP 300 systems construct a network comprising of wired and wireless segments e AP 2 plays the role of a wireless bridge e All devices share the
117. stem integrators field engineers and network administrators to set up LevelOne s EAP 300 802 11n a b g Enterprise Access Point in their network environments It contains step by step procedures and visual examples to guide MIS staff or individuals with basic network system knowledge to complete the installation Section 1 02 1 2 Document Conventions Bh Represents essential steps actions or messages that should not be ignored Contains related information that corresponds to a topic ancii Indicates that clicking this button will save the changes you made but you must reboot the system upon the completion of all configuration settings for the changes to take effect sm Indicates that clicking this button will clear what you have set before the settings are applied Section 1 03 1 3 Package Content The standard package of EAP 300 includes e EAP 300 x1 e Quick Installation Guide x1 e CD ROM with Users Manual and QIG x1 e Power Adapter DC 12V x1 e Cat 5e Ethernet cable x1 e Antenna x3 It is recommended to keep the original packing materials for possible future shipment when repair or maintenance is required Any returned product should be packed in its original packaging to prevent damage during delivery Article II System Overview and Getting Started Section 2 01 2 1 Introduction of LevelOne EAP 300 The LevelOne EAP 300 Enterprise Access Point embedded with 802 11 n a b g dual band MIMO radio in du
118. tatus gt Wireless Clients Associated Client Status Client List Associated VAP ESSID MAC Address SNR dB Idle Time secs Disconnect Associated Client Status Page e Associated VAP The name of a VAP Virtual Access Point that the client is associated with e ESSID The Extended Service Set ID which the client is associated with e MAC Address The MAC address of associated clients e SNR The Signal to Noise Ratio of respective client s association e Idle Time Time period that the associated client is inactive the time unit is in second e Disconnect Upon clicking Kick the client will be disconnected with the system 75 c 7 4 3 Repeater The administrator can review detailed information of the repeater function on this page Information of repeater s status mode and encryption is provided Overview Clients Repeater Event Log Home Status gt Repeater Information Repeater Information Universal Repeater SSID Cip AP Status TX Rate SNR TX Count TX Error Encryption Enabled 48 Mbits 16 69 Bytes 0 Packets None Repeater Status Page Status The status of the WDS link either Enabled or Disabled TX Rate The transmit rate of the WDS link TX Count The accumulative number of transmission counts TX Errors The accumulative number of transmission errors 76 d 7 4 4 Event Log The Event Log provides the system activities records The administrator can monitor the system status by ch
119. tings Page On this page select the Band with which the AP is to broadcast its signal The rest of the fields are optional and can be configured at another time Click Save if any changes have been made Step 4 Configuring Wireless Coverage VAP 1 To setup the AP s wireless access refer to the following VAP 1 configuration other VAP configuration can refer to the same setup steps as done for VAP 1 Click on the Overview tab to proceed VAP Overview General VAP Config Security Repeater Advanced j Access Control Site Survey k Home gt Wireless gt VAP Overview VAP Overview VAP No ESSID State Security Type MAC ACL Advanced Settings 1 EAP300 1 Enabled None Disabled Edit 2 EAP300 2 Disabled None Disabled Edit 3 EAP300 3 Disabled None Disabled Edit 4 EAP300 4 Disabled None Disabled Edit 5 EAP300 5 Disabled None Disabled Edit 6 EAP300 6 Disabled None Disabled Edit 7 EAF 300 7 Disabled None Disabled Edit 8 EAP300 8 Disabled None Disabled Edit Virtual AP Overview Page On this page click the hyperlink in the row and column that corresponds with VAP 1 s State This will bring up the following page VAP Overview General WAP Config Security Repeater Advanced 1 Access Control Site Survey iy Home gt Wireless gt VAP Config VAP Configuration Profile Name VAP Disable Enable Profile Name VAP 1 ESSID EAP300 1 VLAN ID Disable Enable VLANID t 1 4094 VAP Configurati
120. to WEP Key Length 64 bits 128 bits 152 bits WEP Key Format ascu Hex WEP Key Index WEP Keys Security Settings WEP 48 gt 802 11 Authentication Select from Open System Shared Key or Auto gt WEP Key Length Select from 64 bit 128 bit 152 bit key length gt WEP Key Format Select from ASCII or Hex format for the WEP key gt WEP Key Index Select a key index from 1 4 The WEP key index is a number that specifies which WEP key us used for the encryption of wireless frames during data transmission gt WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys e 802 1X When 802 1X Authentication is selected RADIUS authentication and enhanced WEP are provided VAP Overview General Y VAP Config Security Repeater Advanced Access Control Site Survey Home gt Wireless Security Security Settings Profile Name VAP 1 Security Type 802 1X x Dynamic WEP Bisable Enable WEP Key Length 64 bits 128 bits Rekeying Pernod 300 seconds Peery RADE Server pages f Domain Name IP Address Authentication Port 18 12 l Secret Key te Accounting Service Disable Enable Accounting Port 1813 ig Accounting Interim Update Interval second s Security Settings 802 1X Authentication gt Dynamic WEP Settings o Dynamic WEP For 802 1X security tyoe Dynamic WEP is always enabled to automatically
121. to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default 1813 o Accounting Interim Update Interval The system will update accounting information to the RADIUS server every interval period e 7 2 5 Repeater To extend wireless network coverage EAP 300 supports 3 options of Repeater type None WDS or Universal Repeater selecting None will turn off this function gt Universal Repeater lf Universal Repeater is selected please provide the SSID of upper bound AP for uplink connection 5l Security Type None WEP or WPA PSK can be configured for this Repeater connection Please note the security type configured here shall follow upper bound AP s for intended connection VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey q Home gt Wireless gt Repeater Config Repeater Settings Repeater Type WES The SSID of Upper Bound AP OoOo P Current wireless channel of the system is set at 1 Repeater connection may fail if the system is set to connect to upper AP with different channels Security Type Repeater Settings Universal Repeater o The SSID of Upper Bound AP Specify the SSID of the upper bound AP that the system is used to extend that AP s wireless
122. uration Backup amp Restore Reset to Default Backup System Settings Backup amp Restore Page e Reset to Default gt Click Reset to load the factory default settings of EAP 300 A pop up Page will appear to reconfirm the request to reboot the system Click OK to proceed or click Cancel to cancel the reboot request Message from webpage J This action will reboot the system Do you want to continue Reboot Confirmation Prompt gt Awarning message as displayed below will appear during the reboot period The system power must be kept turn on before the completion of the reboot process gt The System Overview page will appear upon the completion of reboot e Backup System Settings Click Backup to save the current system settings to a local disk such as the hard disk drive HDD of a local computer or a compact disc CD e Restore System Settings Click Browse to search for a previously saved backup file and then click Upload to restore the settings The backup file will replace the active configuration file currently running on the system After network parameters have been reset restored the network settings of the administrator PC may need to be changed to ensure that the IP address of the administrator PC is on the same subnet mask as the EAP 300 69 c 7 3 3 System Upgrade The EAP 300 provides a web firmware upload upgrade feature The administrator can download the latest firmware from t
123. way Step 1 Make sure the Band and Channel Match between the WDS peers In order to successfully communicate the two EAP 300s must be configured to use the same channel and band for its wireless settings Click the Wireless icon followed by the General tab to reach the following page VAP Overview General VAP Config Security Repeater Advanced Access Control Site Survey 255 gt General Home gt Wire General Settings Band 802 119 802 11n Pure 11n Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Width Channel Max Transmit Rate Transmit Power ACK Timeout 100 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500ms Wireless General Settings Page Here simply make sure that both APs are using the same Band and Channel in order to establish a successful WDS link Click SAVE if any changes have been made Step 2 Prevent Loops if Connecting Many AP s When many APs are linked in this manner undesired loops may form to lower overall WLAN performance To prevent such occurrence please make sure Layer 2 STP is enabled To turn on this feature please click on the System and then Network Interface tab General Y Network Interface Management GRE Tunnel Home gt System gt Network Interface Network Settings Mode Static DHCP IP Address 1927 168 1 1 sa Netmask 255 255 0 0 Default Gateway a Pr
124. work Interface tab to begin configuration of the network settings General Wetwork Interface Management GRE Tunnel Home gt System Network Interface Network Settings Mode Static DHCP IP Address ji Netmask 255 255 0 0 7 Default Gateway r Primary DNS Server T Alternate DNS Server f Layer STP Disable Enable Network Settings Page lf the deployment decides the AP will be getting dynamic IP Addresses from the connected network set Mode to DHCP otherwise set Mode to Static and fill in the required fields marked with a red asterisk IP Address Netmask Gateway and Primary DNS Server with the appropriate values for the network Click SAVE when you are finished to save changes that have been made Step 3 Configure the AP s Wireless General Settings Click on the Wireless icon followed by the General tab On this page we only need to choose the Band and Channel that we wish to use VAP Overview Y General VAP Config Security J Repeater Advanced Access Control site Survey 4 Home gt Wireless gt General General Settings Band 802 119 802 11n Pure 11n Short Preamble Disable Enable Short Guard Interval Disable Enable Channel Width si Channel Max Transmit Rate Auto m w a z E lt Transmit Power Auto ka ACK Timeout 100 0 255 O Auto Unit 4 micro seconds Beacon Interval 100 100 500ms Wireless General Set
125. y a client device to associate with the specified VAP ESSID determines the service level assigned to a client e VLAN ID EAP 300 supports tagged VLANs virtual LANs To enable VLAN function each VAP must have a unique VLAN ID valid values range from 1 to 4094 47 d 7 2 4 Security EAP 300 supports various wireless authentication and data encryption methods in each VAP profile With this the administrator can provide different service levels to clients The security type includes None WEP 802 1X WPA PSK and WPA RADIUS e None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure VAP Overview General 1 WAP Config N Secu rity Repeater Advanced J Access Control Site Survey Home gt Wireless gt Security Security Settings Profile Name VAP 1 Security Type Security Settings None e WEP WEP Wired Equivalent Privacy is a data encryption mechanism based on a 64 bit 128 bit or 152 bit shared key algorithm l w 4 4 l 4 j 4 4 l 4 VAP Overview General VAP Config Security Repeater j Advanced Access Control Y Site Survey Home Wireless gt Security Security Settings Profile Name Security Type WEP Note The WEP keys are global setting for all virtual APs The key value will apply to all VAPs 02 11 Authentication Open System Shared Key Au
Download Pdf Manuals
Related Search
Related Contents
Philips DLM4330 User Manual 15K Quad BOP Assembly Manuale Utente Product User Manual for the Truck Unloading & Conveying SS-232C-BYP2 取扱説明書 Dossier Technique Copyright © All rights reserved.
Failed to retrieve file