Tp link eap110 outdoor инструкция

Примечания к выпуску для контроллера Omada SDN версии 5.12.7

Поддерживаемые устройства

Точки доступа
EAP113-Outdoor, EAP615-WE, EAP680, EAP683 LR, EAP690E HD, EAP670, EAP660 HD, EAP655-Wall, EAP653, EAP650-Outdoor, EAP650-Wall, EAP650, EAP620 HD, EAP615-Wall, EAP613, EAP610-Outdoor, EAP610, EAP265 HD, EAP235-Wall, EAP230-Wall, EAP225-Outdoor, EAP223, EAP115-Wall, EAP245 V3, EAP225 V3, EAP225-Wall V2 и выше, EAP115 V4, EAP110 V4, EAP110-Outdoor V3 и выше

Коммутаторы (в новых моделях нет префикса «TL-»)
SG3218XP-M2, SG3210X-M2, SG3210XHP-M2, TL-SX3016F, TL-SX3008F, TL-SX3206HPP, TL-SG3452XP, TL-SG3452X, TL-SG3452P, TL-SG3452, TL-SG3428X-M2, TL-SG3428XPP-M2, TL-SG3428XMP, TL-SG3428XF, TL-SG3428X, TL-SG3428X-UPS, TL-SG3428MP, TL-SG3428, TL-SG3210XHP-M2, TL-SG2428P, TL-SG2218P, TL-SG2218, TL-SG2016P, TL-SG2210MP, TL-SG2008P, TL-SG3210 V3, TL-SG2210P V3.2, TL-SG2008 V3, TL-SL2428P V4 и выше

Шлюзы
ER706W, ER8411,, ER7206 V1 (TL-ER7206 V1) и V2, ER707-M2, ER605 V1 (TL-R605 V1) и V2

Улучшения и новые функции

Примечание: если используется веб-API, обращаем ваше внимание, что файл cookie был переименован с «TPEAP_SESSIONID» на «TPOMADA_SESSIONID».

1. В связи с изменениями, осуществлёнными компанией Facebook, функция Facebook Wi-Fi была удалена.

2. Добавлена поддержка маршрутизатора ER706W.

3. В контроллер Omada добавлен режим MSP (управляемый поставщик услуг), позволяющий отслеживать общее состояние клиентов и управлять клиентами внутри платформы Omada. Для включения этого режима необходимо перейти в раздел «Глобальный вид», нажать на три точки (⋮) в верхнем правом углу и нажать «Включить режим MSP». Отключить этот режим можно в этом же разделе. В режиме MSP можно автоматически создавать резервные копии настроек всех локаций, принадлежащих одной учётной записи клиента.

4. Добавлена поддержка следующих языков: немецкий, арабский, польский, чешский, словенский и венгерский. Пока ещё не все разделы переведены на арабский.

5. В контроллер Omada добавлена поддержка Open API. Эта функция доступна в разделе «Глобальный вид» > «Настройки» > «Интеграция платформ». Эта функция позволяет разрабатывать или совмещать собственные приложения, а также внедрять интерфейсы API. Дополнительная информация доступна в онлайн-руководстве API и в выпадающем меню в верхнем левом углу.

6. Добавлена возможность печати кодов ваучера на разных языках (включая русский).  

7. Добавлена система обнаружения вторжений (IDS/IPS). Для работы этой функции необходимо предварительно обновить прошивку. После обновления перейдите в раздел «Вид локации» > «Настройки» > «Безопасность сети». Результаты доступны в разделах «Вид локации» > «Аналитика» > «Управление угрозами» и «Глобальный вид» > «Безопасность». Полный список поддерживаемых устройств доступен в примечаниях к выпуску.

8. Добавлена возможность создания расписания для работы заданных портов и для работы функции PoE на заданных портах («Вид локации» > «Настройки» > «Расписание PoE»).

9. Добавлена возможность экспорта групп MAC-адресов, что упрощает перенос и редактирование групп MAC-адресов.

10. В раздел «Менеджер хот-спотов» добавлена роль оператора хот-спота с возможностью присвоения разных прав («Запись» или «Только чтение») для разных пользователей.

11. Добавлена возможность применения к нужным коммутаторам списков управления доступом, привязанных к сети VLAN.

12. Для портала добавлена поддержка шифрования CHAP, обеспечивающего безопасную аутентификацию при использовании вместе с функцией «Внешний портал». Добавлена поддержка протокола LDAP, обеспечивающего бесшовную интеграцию с сервером LDAP для аутентификации пользователей.

13. Добавлена возможность переноса прав учётной записи. Эта функция доступна в разделе «Глобальный вид» > «Учётная запись». Она позволяет вносить изменения в учётную запись главного администратора.

14. Добавлена возможность создания большего количества расписаний.

15. В раздел «Глобальный вид» > «Настройки» > «Настройки сервера» добавлен встроенный сервер RADIUS, который позволяет использовать WPA-Enterprise, сервер RADIUS с порталом и 802.1X.

16. В раздел «Устройства» > «Публичный IP-адрес» добавлено отображение внешних IP-адресов удалённо управляемых устройств.

17. В раздел «Менеджер хот-спотов» добавлены параметры «Группа ваучеров» и «Статистика ваучеров», позволяющие управлять группами ваучеров.

18. Для доступа к некоторым из новых функций необходимо обновить прошивку шлюза Omada:

Теперь трафик IPv6 можно блокировать через настройки ACL шлюза.

Добавлена возможность настройки RA IPv6 для шлюза Omada.

Добавлена возможность фильтрации MAC-адресов в разделе «Вид локации» > «Настройки» > «Безопасность сети» > «Фильтрация MAC-адресов».

В раздел «Аналитика» добавлена возможность отслеживания лимитов сеанса. Эта функция отображает количество сеансов, используемых одним IP-адресом.

Добавлена поддержка MSS Clamping («Вид локации» > «Настройки» > «Проводные сети» > «Интернет» > «PPPoE» > «Настройки»). MSS Clamping позволяет указать верхний предел значения максимального размера сегмента (MSS), о котором договариваются отправляющая и принимающая сторона при установке подключения TCP во избежание IP-фрагментации.

Добавлена поддержка кеша DNS («Вид локации» > «Настройки» > «Сервисы»). Кеш DNS повышает скорость преобразования доменного имени — перед отправкой запроса в интернет сначала анализируются недавние локальные преобразования адресов.

В шлюз добавлены ping, трассировка и «Инструменты терминала».

Добавлена возможность загрузки информации о шлюзе. Для получения доступа к функции откройте боковую панель шлюза и нажмите «Загрузить» в разделе «Настройка» > «Управление устройством». Для получения информации об устройстве контроллер Omada использует порт TCP 29815.

Для PFS добавлена поддержка групп DH 14 и 15.

Добавлена возможность использования диапазона IP-адресов локальной сети 0.0.0.0/0 для VPN-подключения IPsec типа «узел—сеть».

Добавлена возможность тегирования одного идентификатора VLAN в разных сетях.

Добавлена поддержка псевдонимов IP WAN («Вид локации» > «Настройки» > «Проводные сети» > «Интернет»). Эта функция позволяет создать несколько IP-адресов для одного порта WAN и использовать эти адреса для проброса портов.

В список управления доступом шлюза добавлена поддержка групп локаций, что позволяет блокировать передачу данных на определённые локации или приём данных с них.

В журналы добавлено отображение IP-адреса источника атак TCP с нулевым значением в поле «flags» и атак Ping of Death, а также отображение изменений в сети провайдера во время резервирования канала. Также увеличено количество журналов шлюза.

В раздел «Устройства» > «Порты» шлюзов Omada добавлена поддержка управления потоком.

Добавлена возможность изменения интервала обновления динамического DNS (1–60 минут).

19. Добавлен параметр «Порог бездействия клиентов» («Глобальный вид» > «Настройки» > «Настройки контроллера»). Этот параметр позволяет задать интервал, по прошествии которого контроллер Omada будет считать клиента отключённым, если он не сообщит своё состояние в течение заданного промежутка времени.

20. В раздел «Карта» добавлено окно поиска и отчёты тепловой карты, а также возможность экспорта топологии. Добавлено отображение RSSI точек доступа на тепловой карте.

21. Теперь примечания к выпуску можно просматривать непосредственно в контроллере Omada путём нажатия иконки обновления устройства. Это позволяет быстро ознакомляться с изменениями в новых прошивках.

22. В раздел «Устройства» > «Настройка» > «Вещание» добавлена возможность изменения режима Wi-Fi (802.11) для точки доступа Omada.

23. В раздел «Статистика» добавлена возможность выполнения поиска по устройству. Данная функция позволяет быстро находить статистику по конкретным устройствам.

24. Добавлена возможность экспорта данных через облако.

25. Добавлена возможность изменения уровня системного журнала («Глобальный вид» > «Настройки» > «Системные настройки»). Данная функция упрощает сбор информации об устранённых неполадках посредством установки значения «Пользовательский вариант» для параметра «Тип уровня журнала» и выбора нужного уровня неполадок для нужных журналов.

Улучшения

1. Лимит количества локаций увеличен до пяти тысяч.

2. Теперь ваучеры могут подсчитывать время фактического пребывания пользователя в сети.

3. Улучшен алгоритм работы умной оптимизации WLAN.

4. Добавлена возможность импорта диапазона MAC-адресов.

5. Обновлено правило проверки IP-адресов — теперь в последнем сегменте IP-адресов можно использовать ноль.

6. Имя контроллера и приглашающего пользователя добавлено в тело письма.

7. В раздел «Клиент» добавлено отображение уровня сигнал/шум.

8. В резервные копии больше не будет включаться информация об устройстве.

9. Добавлено окно поиска и возможность группового удаления элементов резервирования DHCP.

10. Настройка NTP перемещена из глобального вида в локальный, что позволяет управлять локациями, у которых разные часовые пояса.

11. Раздел «Сервер SMTP» перемещён из раздела «Вид локации» > «Настройки» > «Настройки контроллера» в раздел «Глобальный вид» > «Настройки» > «Настройки сервера».

12. Имена контроллера и локации теперь указываются в заголовке оповещающих писем.

13. Фоновое изображение профиля портала теперь адаптируется под разные размеры экранов. Добавлена возможность загрузки изображений с прозрачным фоном.

14. В «Быструю настройку» добавлена возможность настройки уведомлений об обновлении для контроллера и (или) устройств.

15. В раздел «Клиенты» добавлены иконки для пунктов «Тип подключения», «Wi-Fi подключение» и других.

Примечания

1. Данная версия контроллера адаптирована под приложение Omada версии 4.10 или выше.

2. Контроллер Omada совместим лишь определёнными устройствами, на которых установлена соответствующая версия прошивки. Убедитесь, что ваше устройство совместимо с контроллером.

3. Для операционной системы Windows требуется Java 8 (или OpenJDK 8) или более новая версия. Рекомендуется использовать 64-разрядную версию Windows.

4. Для 64-разрядной операционной системы Linux требуется Java 8 (или OpenJDK 8) или более новая версия. Также требуется система управления MongoDB версий 3 и 4.

User Guide

For TP-Link Auranet Access Points

EAP110 / EAP115 / EAP225 / EAP245 / EAP320 / EAP330 / EAP115-Wall / EAP110-Outdoor

1910012409 REV 2.1.0

May 2018

CONTENTS

About this User Guide……………………………………………………………………………………………

1

Overview………………………………………………………………………………………………………………….

2

 1 Quick Start…………………………………………………………………………………………………………

4

1.1

Determine the Management Method……………………………………………………………………………………..

5

1.2

Build the Network Topology…………………………………………………………………………………………………….

6

1.3

Log in to the EAP………………………………………………………………………………………………………………………..

6

Log in via the Domain Name…………………………………………………………………………………………………………

7

Log In via the Domain Name…………………………………………………………………………………………………………

7

Log in via the IP Address of the EAP…………………………………………………………………………………………..

9

1.4

Edit the SSID……………………………………………………………………………………………………………………………..

11

1.5

Configure and Manage the EAP……………………………………………………………………………………………..

14

 2 Configure the Network………………………………………………………………………………….

15

2.1

Configure the IP Address of the EAP……………………………………………………………………………………

16

2.2

Configure the Wireless Parameters……………………………………………………………………………………..

19

Configure Basic Wireless Settings…………………………………………………………………………………………..

20

Configure SSIDs………………………………………………………………………………………………………………………….

22

Cofigure Wireless Advanced Settings…………………………………………………………………………………….

27

Configure Load Balance…………………………………………………………………………………………………………….

28

2.3

Configure Portal Authentication……………………………………………………………………………………………

29

Configure Portal…………………………………………………………………………………………………………………………..

30

Configure Free Authentication Policy……………………………………………………………………………………..

36

2.4

Configure MAC Filtering………………………………………………………………………………………………………….

38

2.5

Configure Scheduler……………………………………………………………………………………………………………….

40

2.6

Configure QoS………………………………………………………………………………………………………………………….

43

2.7

Configure Rogue AP Detection……………………………………………………………………………………………..

47

Detect Rogue APs & Move the Rogue APs to the Trusted AP List……………………………………..

48

Manage the Trusted AP List………………………………………………………………………………………………………

50

 3 Monitor the Network………………………………………………………………………………………

52

3.1

Monitor the EAP……………………………………………………………………………………………………………………….

53

View Device Information…………………………………………………………………………………………………………….

54

View Wireless Settings……………………………………………………………………………………………………………….

55

View LAN Information…………………………………………………………………………………………………………………

55

View Client Information………………………………………………………………………………………………………………

56

View LAN Traffic………………………………………………………………………………………………………………………….

57

View Radio Traffic……………………………………………………………………………………………………………………….

58

3.2

Monitor the SSIDs…………………………………………………………………………………………………………………….

59

3.3

Monitor the Clients…………………………………………………………………………………………………………………..

60

View the Users……………………………………………………………………………………………………………………………..

60

View and Manage the Portal Authenticated Guests……………………………………………………………..

61

 4 Manage the EAP……………………………………………………………………………………………..

62

4.1

Manage System Logs………………………………………………………………………………………………………………

63

View System Logs……………………………………………………………………………………………………………………….

64

Configure the Way of Receiving Logs……………………………………………………………………………………..

64

Backup Logs (For EAP320/EAP330/EAP225)………………………………………………………………………..

66

4.2

Configure Web Server…………………………………………………………………………………………………………….

66

4.3

Configure Management Access…………………………………………………………………………………………….

67

4.4

Configure Trunk (For EAP330)……………………………………………………………………………………………….

68

4.5

Configure LED…………………………………………………………………………………………………………………………..

69

4.6

Configure Wi-Fi Control (For EAP115-Wall)…………………………………………………………………………

69

4.7

Configure SSH………………………………………………………………………………………………………………………….

70

4.8

Configure Management VLAN……………………………………………………………………………………………….

70

4.9

Configure SNMP……………………………………………………………………………………………………………………….

71

 5 Configure the System……………………………………………………………………………………

73

5.1 Configure the User Account

…………………………………………………………………………………………………..74

5.2

Configure the System Time……………………………………………………………………………………………………

74

Configure the System Time……………………………………………………………………………………………………….

75

Configure Daylight Saving Time……………………………………………………………………………………………….

77

5.3

Reboot and Reset the EAP……………………………………………………………………………………………………..

79

5.4

Backup and Restore the Configuration………………………………………………………………………………..

80

5.5

Update the Firmware……………………………………………………………………………………………………………….

80

 6 Application Example………………………………………………………………………………………

82

6.1

Determine the Network Requirements…………………………………………………………………………………

83

6.2

Build the Network Topology…………………………………………………………………………………………………..

83

6.3

Log in to the EAP………………………………………………………………………………………………………………………

84

6.4

Configure the EAP……………………………………………………………………………………………………………………

85

Configure SSIDs………………………………………………………………………………………………………………………….

85

Configure Portal Authentication……………………………………………………………………………………………….

87

Configure Scheduler…………………………………………………………………………………………………………………..

89

6.5

Test the Network……………………………………………………………………………………………………………………..

90

About this User Guide

When using this guide, please notice that features of the EAP may vary slightly depending on the model and software version you have, and on your location, language, and Internet service provider. All screenshots, images, parameters and descriptions documented in this guide are used for demonstration only.

The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Users must take full responsibility for their application of any product.

Convention

Unless otherwise noted, the introduction in this guide takes EAP245 as an example.

More Info

The latest software, management app and utility can be found at Download Center at http://www.tp-link.com/support.

The Quick Installation Guide can be found where you find this guide or inside the package of the EAP.

Specifications can be found on the product page at http://www.tp-link.com.

A Technical Support Forum is provided for you to discuss our products at http://forum.tp-link.com.

Our Technical Support contact information can be found at the Contact Technical Support page at www.tp-link.com/support.

1

Overview

Auranet series products provide wireless coverage solutions for small-medium business and households. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily configured wireless network for small and medium business and households.

The following figure shows the top view of EAP320/EAP330:

The following figure shows the top view of EAP110/EAP115/EAP225/EAP245:

2

The following figure shows the front view of EAP115-Wall:

The following figure shows the front view of EAP110-Outdoor:

3

  1  Quick Start

This chapter introduces how to build a wireless network using the EAPs and how to complete the basic settings. Follow the steps below:

1.Determine the Management Method

2.Build the Network Topology

3.Log in to the EAP

4.Edit the SSID

5.Configure and Manage the EAP

4

1.1 Determine the Management Method

Before building the wireless network, choose a proper method to manage the EAP based on your actual network situation. There are two methods: via EAP Controller and via the web page of the EAP.

Via EAP Controller

If you want to establish a large-scale wireless network and have mass EAPs to be managed, we recommend that you use EAP Controller to centrally manage the EAPs. In such case, the EAPs work in FIT mode.

For detailed instructions about the network topology in such situation and how to use EAP Controller, refer to the User Guide of EAP Controller. To download EAP Controller and its User Guide, go to http://www.tp-link.com/en/download/EAP-Controller.html.

Via the Web Page of the EAP

If you have a relatively small-sized wireless network and only one or just a small number of EAPs need to be managed, you can directly use the web browser to manage each EAP on its own management web page. In such case, the EAP works in Standalone mode (FAT mode), which means that it works independently as a standalone access point.

This User Guide introduces how to configure the Standalone EAP on its web page.

Note

The web page of an EAP is inaccessible while it is managed by EAP Controller. To turn the EAP back to Standalone mode and access its web page, you can Forget the EAP on EAP Controller to reset the EAP or simply close EAP Controller.

5

1.2 Build the Network Topology

To manage the EAPs in Standalone mode, refer to the following topology.

Switch

Router (DHCP Server)

LAN: 192.168.0.1

Internet

PC

EAP

EAP

IP: 192.168.0.100

Clients

The router is the gateway of the network, and devices in the LAN surf the internet via the router. At the same time, the router acts as a DHCP server to assign dynamic IP addresses to the EAPs and clients.

The layer 2 switch is connected to the LAN interface of the router.

The PC and the EAPs are all connected to the layer 2 switch. Since the PC and the EAPs are in the same network segment, the PC can log in to the web pages of the EAPs and manage them.

1.3Log in to the EAP

There are two methods to log in to the EAP. You can choose one as you like: Log in via the Domain Name and Log in via the IP Address of the EAP.

Note

EAP320 and EAP330 are not currently available for login via domain name.

6

Log in via the Domain Name

In this method, you needn’t know the IP address of the EAP, but you need to prepare a wireless client device, such as a wireless laptop. Follow the steps below to log in to the EAP wirelessly:

Note

EAP320 and EAP330 are not currently available for login via domain name.

Log In via the Domain Name

In this method, you needn’t know the IP address of the EAP, but you need to prepare a wireless client device, such as a wireless laptop. Follow the steps below to log in to the EAP wirelessly:

1. Set the wireless client device to get IP settings assigned automatically.

2. Search the default SSID (Network name) using your wireless client device and connect to the wireless network of the EAP. The default SSID of the EAP is printed on the product label at the bottom of the device. The dual-band EAP has two default SSIDs named TP-LINK_2.4GHz_XXXXXX and TP-LINK_5GHz_XXXXXX on the 2.4GHz band and 5GHz band, and the single-band EAP has a default SSID named TPLINK_2.4GHz_ XXXXXX on the 2.4GHz band.

7

3. Make sure that the wireless client has been assigned with the IP address and has got the IP address of the DNS server and the gateway.

4. Launch a web browser on the client device and enter http://tplinkeap.net in the address bar to load the login page of the EAP. Use admin for both of the username and password to log in.

8

5. In the pop-up window, configure a new username and a new password for your user account.

6. Use the new username and password to log in.

Tips

To facilitate access to the EAP via a wired device, you can set a static IP address for the EAP and remember it well or write it down. But make sure that this IP address is not being used in the same LAN. For detailed instructions about how to set a static IP address for the EAP, refer to Configure the IP Address of the EAP.

Log in via the IP Address of the EAP

To log in to the EAP through the Ethernet cable, you need to know the IP address of the EAP. Follow the steps below to log in via the IP address of the EAP:

1. Get the IP address of the EAP. There are two methods.

Log in to the router which acts as the DHCP server. In the DHCP client list, find the IP address of your EAP according to its MAC address. The MAC address can be found at the bottom of the EAP.

Go to http://www.tp-link.com/en/download/EAP-Controller.html#EAP_Discovery_ Tool to download EAP Discovery Utility. EAP Discovery Utility is a software that can scan all EAPs in the same network segment. Install and launch EAP Discovery Utility

9

on the PC, and find the IP address of the EAP. In the following figure, the IP address of the EAP is 192.168.0.5.

2. Launch a web browser and enter 192.168.0.5 in the address bar to load the login page of the EAP. Use admin for both of the username and password to log in.

10

3. In the pop-up window, configure a new username and a new password for your user account.

4. Use the new username and password to log in.

Tips

To facilitate access to the EAP via a wired device, you can set a static IP address for the EAP and remember it well or write it down. But make sure that this IP address is not being used in the same LAN. For detailed instructions about how to set a static IP address for the EAP, refer to Configure the IP Address of the EAP.

1.4 Edit the SSID

By default, the dual-band EAP has two default SSIDs named TP-LINK_2.4GHz_XXXXXX and TP-LINK_5GHz_XXXXXX on the 2.4GHz band and 5GHz band, and the single-band EAP has a default SSID named TP-LINK_2.4GHz_XXXXXX on the 2.4GHz band.

The default SSID has no password, so anyone can access the network without authentication. If your network is a private network, for security, we recommend that you change the SSID configuration immediately after login.

Follow the steps below to edit the default SSID:

11

1. Go to the Wireless > Wireless Settings page. In the SSIDs section, click

in the

Modify column of the SSID entry.

12

2. The following page will appear. Change Security Mode from None to WEP, WPAEnterprise or WPA-PSK. Configure the related parameters and click OK. We recommend that you choose WPA-PSK. For details, refer to Configure SSIDs.

Tips

··If needed, you can also create more new SSIDs. For detailed instructions about how to create new SSIDs, refer to Configure SSIDs.

··If your EAP is a dual-band EAP, remember to configure the SSID of the 5GHz band in the same way.

13

1.5 Configure and Manage the EAP

After all the steps above are completed, the legal wireless clients can enjoy the internet via the EAP. Additionally, you can configure the advanced functions of the EAP according to your need, and manage it conveniently on the web page.

On the top of the page, you can click to log out and click to open the technical support website.

There are five tabs: Network, Wireless, Monitoring, Management and System. The following table introduces what you can configure under each tab.

Network

You can configure the IP address of the EAP.

Wireless

You can configure the wireless parameters and the advanced features, such

as Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection.

Monitoring

You can view the information of the EAP, SSIDs and clients.

Management

You can manage the EAP using the management features, such as System

Logs, Web Server, Management Access, Management VLAN and SNMP.

System

You can configure the system parameters, including the login account and

the system time. In addition, you can reboot and reset the EAP, backup and

restore the configuration, and upgrade the EAP using the new firmware file.

14

  2  Configure the Network

This chapter introduces how to configure the network parameters and the advanced features of the EAP, including:

··Configure the IP Address of the EAP

··Configure the Wireless Parameters

··Configure Portal Authentication

··Configure MAC Filtering

··Configure Scheduler

··Configure QoS

··Configure Rogue AP Detection

15

2.1 Configure the IP Address of the EAP

The IP address of the EAP can be a dynamic IP address assigned by the DHCP server or a static IP address manually specified by yourself. By default, the EAP gets a dynamic IP address from the DHCP server. You can also specify a static IP address according to your needs.

Tips

For detailed introduction about how to find the dynamic IP address of the EAP, refer to Log in via the IP Address of the EAP.

To configure the IP address of the EAP, go to the Network page.

Follow the steps below to configure the IP address of the EAP:

1. Choose your desired IP address mode: Dynamic or Static.

2. Configure the related parameters according to your selection.

16

··Dynamic

If you choose Dynamic as the IP address mode, make sure that there is a reachable DHCP server on your network and the DHCP sever is properly configured to assign IP address and the other network parameters to the EAP.

For network stability, you can also configure the fallback IP parameters for the EAP:

Fallback IP

With the fallback IP configured, if the EAP fails to get an IP address from a

DHCP server within 10 seconds, the fallback IP will work as the IP address

of the EAP. After that, however, the EAP will keep trying to obtain an IP

address from the DHCP server until it succeeds.

DHCP Fallback

Specify a fallback IP address for the EAP. Make sure that this IP address

IP

is not being used by any other device in the same LAN.

DHCP Fallback

Specify the network mask of the fallback IP.

IP MASK

DHCP Fallback

Specify the network gateway.

Gateway

··Static

If you choose Static as the IP address mode, you need to manually specify an IP address and the related network parameters for the EAP. Make sure that the specified IP address is not being used by any other device in the same LAN.

Configure the IP address and network parameters as the following table shows:

17

IP Address

Specify a static IP address for the EAP.

IP Mask

Specify the network mask.

Gateway

Specify the network gateway.

Primary DNS

Specify the primary DNS.

Secondary

Specify the secondary DNS.

DNS

3. Click Save.

18

TP-Link EAP110-Outdoor User Manual

2.2 Configure the Wireless Parameters

To configure the wireless parameters, go to the Wireless > Wireless Settings page.

The following sections introduce these contents: Configure Basic Wireless Settings,

Configure SSIDs, Cofigure Wireless Advanced Settings and Configure Load Balance.

19

Note

··For a dual-band EAP, there are two bands: 2.4GHz and 5GHz. The wireless parameters are

separately set on each band. You can click to select a band and configure the wireless parameters on this band.

··The following figures take 2.4GHz as an example.

Configure Basic Wireless Settings

Proper wireless parameters can improve the quality of your wireless network. This section introduces how to configure the basic wireless parameters.

Follow the steps below to complete the basic wireless settings:

1. If your EAP is a dual-band device, click

to choose a frequency band to

be configured.

2. In the Wireless Basic Settings section, configure the following parameters:

2.4GHz Wireless Radio/5GHz Wireless Radio

Check the box to enable 2.4GHz/5GHz Wireless Radio. By default, it is enabled.

Only when this option is enabled will the wireless radio on 2.4GHz/5GHz band works.

Wireless Mode

Select the protocol standard for the wireless network.

For 2.4GHz network, we recommend that you select 802.11b/g/n. In

this way, clients supporting any one of these modes can access your

wireless network.

For 5GHz network, we recommend that you select 802.11n/ac or

802.11a/n/ac. In this way, clients supporting any one of these modes

can access your wireless network.

20

Channel Width

Select the channel width.

According to IEEE 802.11n standard, using a higher bandwidth can

increase wireless throughput. However, you may choose a lower

bandwidth due to the following reasons:

··

To increase the available number of channels within the limited total

bandwidth.

··

To avoid interference from overlapping channels occupied by other

devices in the environment.

··

Lower bandwidth can concentrate higher transmit power, increasing

stability of wireless links over long distances.

Channel

Select the channel used by the EAP. For example, 1/2412MHz means

that the channel is 1 and the frequency is 2412MHz.

By default, the channel is automatically selected, and we recommend

that you keep the default setting.

Tx Power (EIRP)

Specify the transmit power value.

If this value is set to be larger than the maximum transmit power that is

allowed by the local regulation, the regulated maximum transmit power

will be applied in the actual situation.

Note: In most cases, it is unnecessary to use the maximum transmit

power. Specifying a larger transmit power than needed may cause

interference to the neighborhood. Also it consumes more power and

reduces longevity of the device.

3. Click Save.

21

Configure SSIDs

SSID (Service Set Identifier) is used as an identifier for a wireless LAN, and is commonly called as the “network name“. Clients can find and access the wireless network through the SSID. For one EAP, you can build up to eight SSIDs per frequency band.

Follow the steps below to create an SSID on the EAP:

1. If your EAP is a dual-band device, click

to choose a frequency band on

which the new SSID will be created.

2. Click

to add a new SSID on the chosen band.

Tips

If there are SSIDs already in the list, you can also click to edit the specific SSID.

3. Configure the following required parameters for this SSID:

SSID

Specify a name for the wireless network.

22

Set a VLAN ID for the wireless network. It supports maximum 8 VLANs per frequency band.

With this feature, the EAP can work together with the switches supporting 802.1Q VLAN. The EAP adds different VLAN tags to the clients which are connected to the corresponding wireless network. The clients in different VLANs cannot directly communicate with each other.

VLAN 0 means that the EAP does not add any VLAN tag to the clients which are connected to this wireless network.

Note: Clients connected to the EAP via Ethernet cable do not belong to any VLAN. Thus wired client can communicate with all the wireless clients despite the VLAN settings.

SSID Broadcast

With the option enabled, EAP will broadcast the SSID to the nearby

hosts, so that those hosts can find the wireless network identified by

this SSID. If this option is disabled, users must enter the SSID manually

to connect to the EAP.

Security Mode

Select the security mode of the wireless network. There are four

options:

None: Clients can access the wireless network without authentication.

WEP/WPA-Enterprise/WPA-PSK: Clients need to pass the authentication

before accessing the wireless network. For network security, we

recommend that you encrypt your wireless network. The following

sections will introduce how to configure these security modes.

Portal

With this option enabled, the Portal configuration will be applied to this

wireless network.

Portal provides authentication service for the clients who just need

temporary access to the wireless network, such as the customers in a

shopping mall or in a restaurant. Portal also provides a way for vendors

and companies to put their advertisements on the authentication

page. For detailed instructions about Portal, refer to Configure Portal

Authentication.

SSID Isolation

With this option enabled, the devices connected to the same SSID

cannot communicate with each other.

4. Click OK to create the SSID.

Following is the detailed instructions about how to configure WEP, WPA-Enterprise and

WPA-PSK.

··WEP

WEP (Wired Equivalent Privacy) is a traditional encryption method. It has been proved that WEP has security flaws and can easily be cracked, so WEP cannot provide effective protection for wireless networks. Since WPA-PSK and WPA-Enterprise are much safer

23

than WEP, we recommend that you choose WPA-PSK or WPA-Enterprise if your clients also support them.

Note

WEP is not supported in 802.11n mode or 802.11ac mode. If WEP is applied in 802.11n, 802.11 ac or 802.11n/ac mixed mode, the clients may not be able to access the wireless network. If WEP is applied in 802.11b/g/n mode (2.4GHz) or 802.11a/n (5GHz), the EAP may work at a low transmission rate.

The following table detailedly introduces how to configure each item:

Type

Select the authentication type for WEP.

Auto: The EAP can select Open System or Shared Key automatically based

on the wireless capability and request of the clients.

Open System: Clients can pass the authentication and associate with

the wireless network without password. However, correct password is

necessary for data transmission.

Shared Key: Clients have to input the correct password to pass the

authentication, otherwise the clients cannot associate with the wireless

network or transmit data.

Key Selected

Select one key to specify. You can configure four keys at most.

WEP Key Format

Select ASCII or Hexadecimal as the WEP key format.

ASCII: With this format selected, the WEP key can be any combination of

keyboard characters of the specified length.

Hexadecimal: With this format selected, the WEP key can be any

combination of hexadecimal digits (0-9, a-f, A-F) with the specified length.

Key Type

Select the WEP key length for encryption.

64Bit: Enter 10 hexadecimal digits or 5 ASCII characters.

128Bit: Enter 26 hexadecimal digits or 13 ASCII characters.

152Bit: Enter 32 hexadecimal digits or 16 ASCII characters.

Key Value

Enter the WEP keys. The length and valid characters are determined by the

key format and key type.

24

··WPA-Enterprise

WPA-Enterprise (Wi-Fi Protected Access-Enterprise) is a safer encryption method compared with WEP and WAP-PSK. It requires a RADIUS server to authenticate the clients via 802.1X and EAP (Extensible Authentication Protocol). WPA-Enterprise can generate different passwords for different clients, which ensures higher network security. But it also costs more to maintain the network, so it is more suitable for business networks.

The following table introduces how to configure each item:

Version

Select the version of WPA-Enterprise.

Auto: The EAP will automatically choose the version used by each client

device.

WPA/WPA2: They’re two versions of WPA security mode. WPA2 is an

update of WPA. Compared with WPA, WPA2 introduces AES algorithm

and CCMP encryption. Theoretically, WPA2 is securer than WPA.

Encryption

Select the Encryption type.

Auto: The default setting is Auto and the EAP will select TKIP or AES

automatically based on the client device’s request.

TKIP: Temporal Key Integrity Protocol. TKIP is not supported in 802.11n

mode, 802.11ac mode or 802.11n/ac mixed mode. If TKIP is applied in

802.11n, 802.11 ac or 802.11n/ac mixed mode, the clients may not be

able to access the wireless network. If TKIP is applied in 11b/g/n mode

(2.4GHz) or 11a/n mode(5GHz), the device may work at a low transmission

rate.

AES: Advanced Encryption Standard. It is securer than TKIP.

RADIUS Server IP

Enter the IP address of the Radius Server.

RADIUS Port

Enter the port number of the Radius Server.

RADIUS Password

Enter the shared secret key of the Radius server.

25

Group Key Update

Specify an update period of the encryption key. The update period

Period

instructs how often the EAP should change the encryption key. 0 means

that the encryption key does not change at anytime.

··WPA-PSK

WPA-PSK (Wi-Fi Protected Access-PSK) is based on a pre-shared key. It is characterized by high safety and simple settings, so it is mostly used by common households and small businesses.

The following table introduces how to configure each item:

Version

Select the version of WPA-Enterprise.

Auto: The EAP will automatically choose the version used by each client

device.

WPA-PSK/WPA2-PSK: They’re two versions of WPA-PSK security mode.

WPA2-PSK is an update of WPA-PSK. Compared with WPA, Theoretically,

WPA2 is securer than WPA.

Encryption

Select the Encryption type.

Auto: The default setting is Auto and the EAP will select TKIP or AES

automatically based on the client device’s request.

TKIP: Temporal Key Integrity Protocol. TKIP is not supported in 802.11n

mode, 802.11ac mode or 802.11n/ac mixed mode. If TKIP is applied in

802.11n, 802.11 ac or 802.11n/ac mixed mode, the clients may not be able

to access the wireless network. If TKIP is applied in 11b/g/n mode (2.4GHz)

or 11a/n mode(5GHz), the device may work at a low transmission rate.

AES: Advanced Encryption Standard. It is securer than TKIP.

Wireless

Configure the wireless password with ASCII or Hexadecimal characters.

Password

··

For ASCII, the length should be between 8 and 63 and the valid

characters contain numbers, letters (case-sensitive) and common

punctuations.

··

For Hexadecimal, the length should be between 8 and 64, and the valid

characters contain: 0-9, a-f, A-F.

26

Group Key

Specify an update period of the encryption key. The update period instructs

Update Period

how often the EAP should change the encryption key. 0 means that the

encryption key does not change at anytime.

Cofigure Wireless Advanced Settings

Configure the advanced wireless parameters of the EAP and click Save.

The following table introduces how to configure each item:

Beacon Interval

Beacons are transmitted periodically by the EAP device to announce the

presence of a wireless network for the clients. Beacon Interval determines

the time interval of the beacons sent by the EAP device.

You can specify a value between 40 and 100ms. The default is 100ms.

DTIM Period

The DTIM (Delivery Traffic Indication Message) is contained in some

Beacon frames. It indicates whether the EAP device has buffered data for

client devices. The DTIM Period indicates how often the clients served

by this EAP device should check for buffered data still on the EAP device

awaiting pickup.

You can specify the value between 1-255 Beacon Intervals. The default

value is 1, indicating that clients check for buffered data at every beacon.

An excessive DTIM interval may reduce the performance of multicast

applications, so we recommend you keep the default value.

27

RTS Threshold

RTS/CTS (Request to Send/Clear to Send) is used to improve the data

transmission efficiency of the network with hidden nodes, especially when

there are lots of large packets to be transmitted.

When the size of a data packet is larger than the RTS Threshold, the RTS/

CTS mechanism will be activated. With this mechanism activated, before

sending a data packet, the client will send an RTS packet to the EAP to

request data transmitting. And then the EAP will send CTS packet to inform

other clients to delay their data transmitting. In this way, packet collisions

can be avoided.

For a busy network with hidden nodes, a low threshold value will help

reduce interference and packet collisions. But for a not-so-busy network, a

too low threshold value will cause bandwidth wasting and reduce the data

throughput. The recommended and default value is 2347 bytes.

Fragmentation

The fragmentation function can limit the size of packets transmitted over

Threshold

the network. If the size of a packet exceeds the Fragmentation Threshold,

the fragmentation function is activated and the packet will be fragmented

into several packets.

Fragmentation helps improve network performance if properly configured.

However, a too low fragmentation threshold may result in poor wireless

performance caused by the extra work of dividing up and reassembling

of frames and increased message traffic. The recommended and default

value is 2346 bytes.

Airtime Fairness

Only EAP320 and EAP330 support this feature.

With this option enabled, each client connected to the EAP can get the

same amount of time to transmit data, avoiding low-data-rate clients to

occupy too much network bandwidth.

Compared with the relatively new client devices, some legacy client

devices support slower wireless rate. If they communicate with the

same EAP, the slower clients take more time to transmit and receive

data compared with the faster clients. As a result, the overall wireless

throughput of the network decreases. So under such circumstance, we

recommend that you enable this feature to ensure the data transmission

time for the faster clients. In this way, the network overall throughput can

be improved.

Configure Load Balance

With the Load Balance feature, you can limit the maximum number of clients who can access the EAP. In this way, you can achieve rational use of network resources.

28

Follow the steps below to configure Load Balance:

1. Click

to choose a frequency band on which the load balance feature will

take effect.

2. In the Load Balance section, check the box to enable this feature. The ON button with cyan background color indicates this feature is enabled.

3. Specify the maximum number of clients who can connect to the EAP at the same time. While the number of connected clients has reached the limit and there are more clients requesting to access the network, the EAP will disconnect those with weaker signals.

4. Click Save.

2.3 Configure Portal Authentication

Portal authentication provides authentication service to the clients that only need temporary access to the wireless network, such as the customers in a restaurant or in a supermarket. To access the network, these clients need to enter the authentication login page and use the correct login information to pass the authentication. In addition, you can customize the authentication login page and specify a URL which the authenticated clients will be redirected to.

In this module, you can also configure Free Authentication Policy, which allows the specific clients to access the specific network resources without authentication.

29

Loading…

For TPLink Auranet Access Points

COPYRIGHT & TRADEMARKS

Specifications are subject to change without notice. is a registered trademark

of TPLink TECHNOLOGIES CO., LTD. Other brands and product names are trademarks

or registered trademarks of their respective holders.

No part of the specifications may be reproduced in any form or by any means or used to

make any derivative such as translation, transformation, or adaptation without

permission from TPLink TECHNOLOGIES CO., LTD. Copyright © 2016 TPLink

TECHNOLOGIES CO., LTD. All rights reserved.

FCC STATEMENT

This equipment has been tested and found to comply with the limits for a Class B digital

device, pursuant to part 15 of the FCC Rules. These limits are designed to provide

reasonable protection against harmful interference in a residential installation. This

equipment generates, uses and can radiate radio frequency energy and, if not installed

and used in accordance with the instructions, may cause harmful interference to radio

communications. However, there is no guarantee that interference will not occur in a

particular installation. If this equipment does cause harmful interference to radio or

television reception, which can be determined by turning the equipment off and on, the

user is encouraged to try to correct the interference by one or more of the following

measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the

receiver is connected.

Consult the dealer or an experienced radio/ TV technician for help.

This device complies with part 15 of the FCC Rules. Operation is subject to the following

two conditions:

1 This device may not cause harmful interference.

2 This device must accept any interference received, including interference that may

cause undesired operation.

Any changes or modifications not expressly approved by the party responsible for

compliance could void the user’s authority to operate the equipment.

Note: The manufacturer is not responsible for any radio or TV interference caused by

unauthorized modifications to this equipment. Such modifications could void the user’s

authority to operate the equipment.

FCC RF Radiation Exposure Statement:

This equipment complies with FCC RF radiation exposure limits set forth for an

uncontrolled environment. This device and its antenna must not be colocated or

operating in conjunction with any other antenna or transmitter.

“To comply with FCC RF exposure compliance requirements, this grant is applicable to

only Mobile Configurations. The antennas used for this transmitter must be installed to

provide a separation distance of at least 20 cm from all persons and must not be co

located or operating in conjunction with any other antenna or transmitter.”

CE Mark Warning

This is a class B product. In a domestic environment, this product may cause radio

interference, in which case the user may be required to take adequate measures.

RF Exposure Information

This device meets the EU requirements (1999/5/EC Article 3.1a) on the limitation of

exposure of the general public to electromagnetic fields by way of health protection.

The device complies with RF specifications when the device used at 20 cm from your

body.

Canadian Compliance Statement

This device complies with Industry Canada licenseexempt RSSs. Operation is subject

to the following two conditions:

1 This device may not cause interference, and

2 This device must accept any interference, including interference that may cause

undesired operation of the device.

Le présent appareil est conforme aux CNR d’Industrie Canada applicables aux

appareils radio exempts de licence. L’exploitation est autorisée aux deux conditions

suivantes :

1 l’appareil ne doit pas produire de brouillage;

2 l’utilisateur de l’appareil doit accepter tout brouillage radioélectrique subi, meme si

le brouillage est susceptible d’en compromettre le fonctionnement.

This radio transmitter (IC: 8853AEAP110Outdoor/ Model: EAP110Outdoor) has been

approved by Industry Canada to operate with the antenna types listed below with the

maximum permissible gain indicated. Antenna types not included in this list below,

having a gain greater than the maximum gain indicated for that type, are strictly

prohibited for use with this device.

Le présent émetteur radio (IC: 8853A- EAP110Outdoor / Model: EAP110Outdoor) a

été approuvé par Industrie Canada pour fonctionner avec les types d‘antenne

énumérés cidessous et ayant un gain admissible maximal. Les types d’antenne non

inclus dans cette liste cidessous et dont le gain est supérieur au gain maximal indiqué,

sont strictement interdits pour l’exploitation de l’émetteur.

Two 2.4GHz 5dBi external omnidirectional antennas

Radiation Exposure Statement

This equipment complies with IC radiation exposure limits set forth for an uncontrolled

environment. This equipment should be installed and operated with minimum distance

20cm between the radiator & your body.

Déclaration d’exposition aux radiations

Cet équipement est conforme aux limites d’exposition aux rayonnements IC établies

pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un

minimum de 20 cm de distance entre la source de rayonnement et votre corps.

Industry Canada Statement

CAN ICES3 (B)/NMB3(B)

Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність

вимогам нормативних документів та вимогам, що передбачені чинними

законодавчими актами України.

Safety Information

When product has power button, the power button is one of the way to shut off the

product; When there is no power button, the only way to completely shut off power

is to disconnect the product or the power adapter from the power source.

Don’t disassemble the product, or make repairs yourself. You run the risk of electric

shock and voiding the limited warranty. If you need service, please contact us.

Avoid water and wet locations.

Adapter shall be installed near the equipment and shall be easily accessible.

The plug considered as disconnect device of adapter.

Use only power supplies which are provided by manufacturer and in the original

packing of this product. If you have any questions, please don’t hesitate to contact us.

NCC Notice & BSMI Notice

注意!

依據 低功率電波輻射性電機管理辦法

第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自

變更頻率、加大功率或變更原設計之特性或功能。

第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通行經發現有干擾現象時,

應立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信規定作業無線電

信。低功率射頻電機需忍受合法通信或工業、科學以及醫療用電波輻射性電機設備之干擾。

安全諮詢及注意事項

請使用原裝電源供應器或只能按照本產品注明的電源類型使用本產品。

清潔本產品之前請先拔掉電源線。請勿使用液體、噴霧清潔劑或濕布進行清潔。

注意防潮,請勿將水或其他液體潑灑到本產品上。

插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。

請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。

請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。

Explanation of the symbols on the product label

DC voltage

RECYCLING

This product bears the selective sorting symbol for Waste electrical and

electronic equipment (WEEE). This means that this product must be handled

pursuant to European directive 2012/19/EU in order to be recycled or dismantled

to minimize its impact on the environment.

User has the choice to give his product to a competent recycling organization or

to the retailer when he buys a new electrical or electronic equipment.

CONTENTS

About this User Guide ……………………………………………………………………………………………………………. 1

Chapter 1 Introduction ………………………………………………………………………………………………………. 2

Chapter 2 Network Topology ……………………………………………………………………………………………. 3

Chapter 3 Management Mode ………………………………………………………………………………………….. 5

3.1 Standalone Mode …………………………………………………………………………………………………. 5

3.2 Managed Mode …………………………………………………………………………………………………….. 5

3.3 Switch to Standalone Mode ……………………………………………………………………………….. 5

Chapter 4 Network ……………………………………………………………………………………………………………… 6

Chapter 5 Wireless ……………………………………………………………………………………………………………… 7

5.1 Wireless Settings …………………………………………………………………………………………………. 8

5.1.1 Wireless Basic Settings …………………………………………………………………………… 9

5.1.2 SSIDs ………………………………………………………………………………………………………… 10

5.1.3 Wireless Advanced Settings …………………………………………………………………. 14

5.1.4 Load Balance …………………………………………………………………………………………… 15

5.2 Portal ……………………………………………………………………………………………………………………. 15

5.2.1 Portal Configuration ……………………………………………………………………………….. 16

5.2.2 Free Authentication Policy …………………………………………………………………….. 21

5.3 MAC Filtering ………………………………………………………………………………………………………. 23

5.4 Scheduler …………………………………………………………………………………………………………….. 25

5.5 QoS ………………………………………………………………………………………………………………………. 29

5.5.1 AP EDCA Parameters …………………………………………………………………………….. 29

5.5.2 Station EDCA Parameters ……………………………………………………………………… 31

5.6 Rogue AP Detection …………………………………………………………………………………………… 32

5.6.1 Settings ……………………………………………………………………………………………………. 33

5.6.2 Detected Rogue AP List…………………………………………………………………………. 33

5.6.3 Trusted AP List ………………………………………………………………………………………… 34

5.6.4 Download/Backup Trusted AP List ………………………………………………………. 35

Chapter 6 Monitoring ……………………………………………………………………………………………………….. 36

6.1 AP …………………………………………………………………………………………………………………………. 36

6.1.1 AP List ………………………………………………………………………………………………………. 36

6.2 SSID ……………………………………………………………………………………………………………………… 41

6.2.1 SSID List …………………………………………………………………………………………………… 41

6.3 Client…………………………………………………………………………………………………………………….. 42

6.3.1 User List …………………………………………………………………………………………………… 42

6.3.2 Portal Authenticated Guest …………………………………………………………………… 43

Chapter 7 Management……………………………………………………………………………………………………. 45

7.1 System Log …………………………………………………………………………………………………………. 45

7.1.1 Log List …………………………………………………………………………………………………….. 45

7.1.2 Log Settings …………………………………………………………………………………………….. 46

7.2 Web Server ………………………………………………………………………………………………………….. 47

7.3 Management Access …………………………………………………………………………………………. 48

7.4 LED ON/OFF ………………………………………………………………………………………………………… 49

7.5 SSH ………………………………………………………………………………………………………………………. 50

7.6 Management VLAN ……………………………………………………………………………………………. 50

7.7 SNMP ……………………………………………………………………………………………………………………. 51

Chapter 8 System ……………………………………………………………………………………………………………… 54

8.1 User Account ………………………………………………………………………………………………………. 54

8.2 Time Settings ………………………………………………………………………………………………………. 54

8.2.1 Time Settings ………………………………………………………………………………………….. 55

8.2.2 Daylight Saving ……………………………………………………………………………………….. 56

8.3 Reboot/Reset ……………………………………………………………………………………………………… 57

8.4 Backup & Restore ……………………………………………………………………………………………….. 58

8.5 Firmware Upgrade ……………………………………………………………………………………………… 58

About this User Guide

When using this guide, please notice that features of the EAP may vary slightly

depending on the model and software version you have, and on your location, language,

and Internet service provider. All screenshots, images, parameters and descriptions

documented in this guide are used for demonstration only.

The information in this document is subject to change without notice. Every effort has

been made in the preparation of this document to ensure accuracy of the contents, but

all statements, information, and recommendations in this document do not constitute

the warranty of any kind, express or implied. Users must take full responsibility for their

application of any product.

Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer to the

EAP Controller User Guide from our website at www.tplink.com when the EAP is

managed by the EAP Controller software.

Unless otherwise noted, the EAP or the device mentioned in this guide stands for

EAP110Outdoor.

The latest software, management app and utility can be found at Download Center at

www.tplink.com/support.

The Quick Installation Guide can be found where you find this guide or inside the package

of the EAP.

Specifications can be found on the product page at http://www.tplink.com.

A Technical Support Forum is provided for you to discuss our products at

http://forum.tplink.com.

Our Technical Support contact information can be found at the Contact Technical

Support page at www.tplink.com/support.

1

Chapter 1 Introduction

Auranet series products provide wireless coverage solutions for smallmedium

business. They can either work independently as standalone APs or be centrally

managed by the EAP Controller software, providing a flexible, richlyfunctional but

easilyconfigured enterprisegrade wireless network for small and medium business.

Figure 1-1 View of the EAP

2

Chapter 2 Network Topology

A typical network topology for the EAP is shown below.

Figure 2-1 Typical Topology

To deploy an EAP in your local network, a DHCP server is required to assign IP addresses

to the EAP and clients. Typically, a router acts as the DHCP server. A computer running

the EAP Controller software can locate in the same or different subnet with the EAPs.

3

The EAP can be managed by the EAP Controller software, which is a management

software specially designed for the TPLink EAP devices on a local wireless network,

allowing you to centrally configure and monitor mass EAP devices using a web browser

on your PC. For more information about the EAP Controller, please find the EAP

Controller User Guide from our official website:

http://www.tplink.com/en/support/download/

4

Chapter 3 Management Mode

Auranet series products can either work under the control of the EAP Controller

software or work independently as a standalone access point.

When user establishes a largescale wireless network, the management of every single

AP in the network is complex and complicated. With the EAP Controller software, you

can centrally manage the mass APs simply in a web browser.

The Standalone mode applies to a relatively smallsized wireless network. EAPs in the

Standalone mode cannot be managed centrally by the EAP Controller software.

3.1 Standalone Mode

By default, the EAP works independently as a standalone access point. By entering the

IP address of the standalone EAP, you can log in to its web interface and perform

configurations.

The factory default IP address configuration of the EAP is DHCP (Dynamic Host

Configuration Protocol). Before you access the web interface of the EAP, please make

sure the DHCP server works properly. Typically, a router acts as the DHCP server.

Follow the steps below to log in to the web interface of a standalone EAP.

1. Launch a web browser, enter the DHCP address in the address field and press the

Enter key.

2. Enter admin (all lowercase) for both username and password.

3.2 Managed Mode

The EAP will become a managed AP once it is adopted via the EAP Controller software.

Users can manage the AP via a web browser. Refer to the EAP Controller User Guide

from our website at www.tplink.com to know more about EAP Controller software.

3.3 Switch to Standalone Mode

The web interface of a specific EAP is not available once this EAP is adopted by the

EAP Controller. You can

Forget

the EAP via the EAP Controller to turn it back as a

standalone AP. Refer to the EAP Controller User Guide from our website at www.tp

link.com to learn more.

5

Chapter 4 Network

On

page you can configure the IP address of the standalone EAP.

Figure 4-1 Network Page

Dynamic/Static: By default, the EAP device obtains an IP address from a DHCP server

(typically a router). Select Static to configure IP address manually.

Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within

ten seconds, the fallback IP will work as the IP address of the device.

After that, however, the device will keep trying to obtain an IP address

from the DHCP server until it succeeds.

DHCP Fallback

IP/IP MASK:

Enter the fallback IP/IP mask.

DHCP Fallback

Gateway:

Enter the fallback gateway.

6

Chapter 5 Wireless

page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS

and Rogue AP Detection, is shown below.

Figure 5-1 Wireless Page

7

5.1 Wireless Settings

Following is the page of

.

Figure 5-2 Wireless Settings Page

8

5.1.1 Wireless Basic Settings

Figure 5-3 Wireless Basic Settings

2.4GHz

Wireless Radio:

Check the box to enable 2.4GHz Wireless Radio.

Wireless Mode: Select the protocol standard for the wireless network.

We recommend that select 802.11b/g/n, in which way clients supporting

any one of these modes can access your wireless network.

Channel Width: Select the channel width of this device.

According to IEEE 802.11n standard, using a higher bandwidth can

increase wireless throughput. However, users may choose lower

bandwidth due to the following reasons:

1. To increase the available number of channels within the limited total

bandwidth.

2. To avoid interference from overlapping channels occupied by other

devices in the environment.

3.

Lower bandwidth can concentrate higher transmit power,

increasing stability of wireless links over long distances.

Channel: Select the channel used by thi

s device to improve wireless

performance. 1/2412MHz means the Channel is 1 and the frequency is

2412MHz. By default, channel is automatically selected.

Tx power: Enter the transmit power value. By default, the value is 20.

If the maximum transmit power is set to be larger than local regulation

allows, the maximum Tx power regulated will be applied in actual

situation.

: In most cases, it is unnecessary to select maximum transmit

power. Selecting larger transmit power than needed may cause

interference to neighborhood. Also it consumes more power and will

9

reduce longevity of the device. Select a certain transmit power is

enough to achieve the best performance.

5.1.2 SSIDs

SSIDs can work together with switches supporting 802.1Q VLAN. The EAP can build up

to eight virtual wireless networks per radio for users to access. At the same time, it adds

different VLAN tags to the clients which connect to the corresponding wireless network.

It supports maximum 8 VLANs per radio. The clients in different VLAN cannot directly

communicate with each other.

Clients connected to the device via cable do not belong to any VLAN. Thus wired client

can communicate with all the wireless clients despite the VLAN settings.

Click in the Modify column, the following content will be shown.

Figure 5-4 SSIDs

Click to add up to 8 wireless networks per radio.

SSID Name: Enter up to 32 characters as the SSID name.

Wireless

VLAN ID:

Set a VLAN ID for the wireless network.

Wireless networks with the same VLAN ID are grouped to a VLAN.

SSID

Broadcast:

Enable this function, AP will broadcast its SSID to hosts in the surrounding

environment, as thus hosts can find the wireless network identified by this

SSID. If SSID Broadcast is not enabled, hosts must enter the AP’s SSID

manually to connect to this AP.

10

Security

Mode:

Select the security mode of the wireless network. For the security of

wireless network, you are suggested to encrypt your wireless network. This

device provides three security modes: WPAEnterprise, WPAPSK (WPA

PreShared Key) and WEP (Wired Equivalent Privacy). WPA

recommended. Settings vary in different security modes as the details are

in the following introduction. Select None and the hosts can access the

wireless network without password.

Portal: Portal provides authentication service for the clients who want to access

the wireless local area network. For more information, refer to 5.2 Portal.

After Portal is enabled, the configurations in 5.2 Portal will be applied.

SSID

Isolation:

After enabling SSID Isolation, the devices connected in the same SSID

cannot communicate with each other.

Modify: Click to open the page to edit the parameters of SSID.

Click to delete the SSID.

Following is the detailed introduction of security mode: WEP, WPAEnterprise and

WPAPSK.

WEP

WEP (Wired Equivalent Privacy), based on the IEEE 802.11 standard, is less safe than

WPAEnterprise or WPAPSK.

WEP is not supported in 802.11n mode. If WEP is applied in 802.11n mode, the clients may

not be able to access the wireless network. If WEP is applied in 11b/g/n mode, the device

may work at a low transmission rate.

Figure 5-5 Security ModeWEP

Type: Select the authentication type for WEP.

Auto: The default setting is Auto, which can select Open System or

Shared Key automatically based on the wireless station’s capability and

request.

11

Open System: After you select Open System, clients can pass the

authentication and associate with the wireless network without

password. However, correct password is necessary for data

transmission.

Shared Key: After you select Shared Key, clients has to input password

to pass the authentication, or it cannot associate with the wireless

network or transmit data.

Key Selected: You can configure four keys in advance and select one as the present

valid key.

Wep Key

Format:

Select the wep key format ASCII or Hexadecimal.

ASCII: ASCII format stands for any combination of keyboard characters

in the specified length.

Hexadecimal:

Hexadecimal format stands for any combination of

hexadecimal digits (09, af, AF) in the specified length.

Key Type: Select the WEP key length for encryption.

64bit: You can enter 10 hexadecimal digits (any combination of 09, a

f, AF without null key) or 5 ASCII characters.

128bit: You can enter 26 hexadecimal digits (any combination of 09,

a-f, A-F without null key) or 13 ASCII characters.

152bit: You can enter 32 hexadecimal digits (any combination of 09,

a-f, A-F without null key) or 16 ASCII characters.

Key Value: Enter the key value.

WPAEnterprise

Based on RADIUS server, WPAEnterprise can generate different passwords for

different users and it is much safer than WPAPSK. However, it costs much to maintain

and is more suitable for enterprise users. At present, WPAEnterprise has two versions:

WPAPSK and WPA2PSK.

Figure 5-6 Security Mode_WPAEnterprise

12

Version: Select one of the following versions:

Auto: Select WPAPSK or WPA2PSK automatically based on the

wireless station’s capability and request.

WPAPSK: Preshared key of WPA.

WPA2PSK: Preshared key of WPA2.

Encryption: Select the encryption type, including Auto, TKIP, and AES. The default

setting is Auto, which can select TKIP (Temporal Key Integrity Protocol)

or AES (Advanced Encryption Standard) automatically based on the

wireless station’s capability and request. AES is more secure than TKIP

and TKIP is not supported in 802.11n mode. It is recommended to select

AES as the encryption type.

RADIUS Server

IP/Port:

Enter the IP address/port of the RADIUS server.

RADIUS

Password:

Enter the shared secret of RADIUS server to access the RADIUS server.

Group Key

Update period:

Specify the group key update period in seconds. The value can be either

0 or 308640000 seconds.

Encryption type TKIP is not supported in 802.11n mode. If TKIP is applied in 802.11n mode,

the clients may not be able to access the wireless network of the EAP. If TKIP is applied in

11b/g/n mode, the device may work at a low transmission rate.

WPAPSK

Based on preshared key, security mode WPAPSK is characterized by high security and

simple configuration, which suits for common households and small business. WPAPSK

has two versions: WPAPSK and WPA2PSK.

Figure 5-7 Security Mode_WPAPSK

Version: Auto: Select WPAPSK or WPA2PSK

automatically based on the

wireless station’s capability and request.

13

WPAPSK: Preshared key of WPA.

WPA2PSK: Preshared key of WPA2.

Encryption: Select the encryption type, including Auto, TKIP, and AES. The default

setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or

AES (Advanced Encryption Standard) automatically based on the wireless

station’s capability and request. AES is more secure than TKIP and TKIP

is not supported in 802.11n mode. It is recommended to select AES as

the encryption type.

Wireless

Password:

Configure the WPAPSK/WPA2PSK password with ASCII or Hexadecimal

characters. For ASCII, the length should be between 8 and 63 characters

with combination of numbers, letters (casesensitive) and common

punctuations. For Hexadecimal, the length should be 64 characters (case

insensitive, 09, af, AF).

Group Key

Update Period:

Specify the group key update period in seconds. The value can be either

0 or 308640000 seconds.

5.1.3 Wireless Advanced Settings

Figure 5-8 Wireless Advanced Settings

Beacon

Interval:

Beacons are transmitted periodically by the device to announce the

presence of a wireless network for the clients. Beacon Interval value

determines the time interval of the beacons sent by the device. You can

specify a value from 40 to 100. The default value is 100 milliseconds.

DTIM Period: This value indicates the number of beacon intervals between successive

Delivery Traffic Indication Messages (DTIMs) and this number is included

in each Beacon frame. A DTIM is contained in Beacon frames to indicate

whether the access point has buffered broadcast and/or multicast data for

the client devices. Following a Beacon frame containing a DTIM, the

access point will release the buffered broadcast and/or multicast data, if

any exists. You can specify the value between 1255 Beacon Intervals. The

default value is 1, indicating the DTIM Period is the same as Beacon

Interval. An excessive DTIM period may reduce the performance of

multicast applications. It is recommended to keep it by default.

14

RTS

Threshold:

When the RTS threshold is activated, all the stations and APs follow the

Request to Send (RTS) protocol. When the station is to send packets, it will

send a RTS to AP to inform the AP that it will send data. After receiving the

RTS, the AP notices other stations in the same wireless network to delay

their transmitting of data. At the same time, the AP inform the requesting

station to send data. The value range is from 1 to 2347 bytes. The default

value is 2347, which means that RTS is disabled.

Fragmentation

Threshold:

Specify the fragmentation threshold for packets. If the size of the packet

is larger than the fragmentation threshold, the packet will be fragmented

into several packets. Too low fragmentation threshold may result in poor

wireless performance

caused by the excessive packets. The

recommended and default value is 2346 bytes.

5.1.4 Load Balance

By restricting the maximum number of clients accessing the EAPs, Load Balance helps

to achieve rational use of network resources.

Figure 5-9 Load Balance

Load Balance: Disable by default. Click ON to enable the function. After enabling it,

you can set a number for maximum associated clients to control the

wireless access.

Maximum

Associated

Clients:

Enter the number of clients to be allowed for connection to the EAP.

The number ranges from 1 to 99.

5.2 Portal

Portal authentication enhances the network security by providing authentication service

to the clients that just need temporary access to the wireless network. Such clients have

to log into a web page to establish verification, after which they will access the network

as guests. What’s more, you can customize the authentication login page and specify a

URL which the newly authenticated clients will be redirected to. Please refer to Portal

Configuration or Free Authentication Policy according to your need.

15

Following is the page of

.

Figure 5-10 Portal Page

To apply Portal in a wireless network, please go to WirelessWireless SettingsSSIDs

to enable Portal of a selected SSID.

5.2.1 Portal Configuration

Three authentication types are available: No Authentication, Local Password and

External RADIUS Server.

Users are required to finish only two steps: agree with the user

protocol and click the Login button.

16

Users are required to enter the preset password, which are saved in

the EAP.

Users are required to enter the preset user name and

password, which are saved in the database of the RADIUS server. The RADIUS server

acts as the authentication server, which allows you to set different usernames and

passwords for different users.

Refer to the following content to configure Portal based on actual network situations.

No Authentication

Figure 5-11 Portal Configuration_No Authentication

Authentication

Type:

Select No Authentication.

Authentication

Timeout:

After successful verification, an authentication session is established.

Authentication Timeout decides the active time of the session. Within

the active time, the device keeps the authentication session open with

the associated client. To reopen the session, the client needs to log in

the web authentication page and enter the user name and password

again once authentication timeout is reached.

By default, authentication timeout is one hour. Select Custom from the

dropdown list to customize the parameter.

17

Redirect: Disable by default. Redirect specifies that the portal should redirect the

newly authenticated clients to the configured URL.

Redirect URL: If you enable the Redirect function, please enter the URL that a newly

authenticated client will be directed to.

Portal

Customization:

Select Local Web Portal, the authentication login page will be provided

by the builtin web server.

The page configured below will be presented to users as the login page.

Words can be filled in Input Box 1 and Input Box 2.

Enter up to 31 characters as the title of the authentication login page in

Input Box 1, like “Guest Portal of TPLink”.

Enter the terms presented to users in Input Box 2. The terms can be 1 to

1023 characters long.

18

Local Password

Figure 5-12 Portal Configuration_Local Password

Authentication Type: Select Local Password.

Password: Enter the password for local authentication.

Please refer to No Authentication to configure Authentication Timeout, Redirect,

Redirect URL and Portal Customization.

External RADIUS Server

provides two types of portal customization: Local Web Portal

and External Web Portal. The authentication login page of Local Web Portal is provided

by the builtin portal server of the EAP, as Figure 5-13 shown. The authentication login

page of External Web Portal is provided by external portal server, as Figure 5-14 shown.

19

1. Local Web Portal

Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal

Authentication

Type:

Select External RADIUS Server.

RADIUS Server IP: Enter the IP address of the RADIUS server.

Port: Enter the port for authentication service.

RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS

server.

Please refer to No Authentication to configure Authentication Timeout, Redirect,

Redirect URL and Portal Customization.

20

2. External Web Portal

Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal

Authentication Type: Select External RADIUS Server.

RADIUS Server IP: Enter the IP address of the RADIUS server.

Port: Enter the port for authentication service.

RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS

server.

Portal Customization: Select External Web Portal.

External Web Portal

URL:

Enter the authentication login page’s URL, which is provided by

the remote portal server.

Please refer to No Authentication to configure Authentication Timeout, Redirect and

Redirect URL.

5.2.2 Free Authentication Policy

Free Authentication Policy allows clients to access network resources for free. On the

lower part of the Portal page you can configure and view free authentication policies.

Figure 5-15 Free Authentication Policy

21

Click to add a new authentication policy and configure its parameters.

Figure 5-16 Configure Free Authentication Policy

Policy Name: Enter a policy name.

Source IP

Range:

Enter the source IP address and subnet mask of the clients who can

enjoy the free authentication policy. Leaving the field empty means all IP

addresses can access the specific resources.

Destination IP

Range: Enter the destination IP address and subnet mask for free authentication

policy. Leaving the field empty means all IP addresses can be visited.

When External Radius Server is configured and External Web Portal is

selected, please set the IP address and subnet mask of your external

web server as the Destination IP Range.

Source MAC: Enter the source MAC address of the clients who can enjoy the free

authentication policy. Leaving the field empty means all MAC addresses

can access the specific resources.

Destination

Port:

Enter the destination port for free authentication policy. Leaving the field

empty means all ports can be accessed.

Status: Check the box to enable the policy.

22

Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17

shows.

Figure 5-17 Add Free Authentication Policy

Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP

address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24. Policy 1 is enabled.

Click to edit the policy. Click to delete the policy.

5.3 MAC Filtering

MAC Filtering uses MAC addresses to determine whether one host can access the

wireless network. Thereby it can effectively control the user access to the wireless

network.

Figure 5-18 MAC Filtering Page

23

Settings

Enable MAC

Filtering:

Check the box to enable MAC Filtering.

Station MAC Group

Follow the steps below to add MAC groups.

Step 1:

Click , two tables will be shown.

Figure 5-19 Station MAC Group

Step 2:

Click and fill in a name for the MAC group.

Figure 5-20 Add a Group

Step 3:

Select one MAC group, click and input the MAC address you want

to organize into this group.

24

Figure 5-21 Add a Group Member

Click in Modify column to edit the MAC group name or MAC address. Click to

delete the MAC group or group member.

MAC Filtering Association

Figure 5-22 MAC Filtering Association

SSID Name: Displays the SSID of the wireless network.

Band: Displays the frequency band the wireless network operates at.

MAC Group Name: Select a MAC group from the dropdown list to allow or deny its

members to access the wireless network.

Action: Allow: Allow the access of the stations specified in the MAC

group.

Deny: Deny the access of the stations specified in the MAC

group.

5.4 Scheduler

Scheduler allows you to configure rules with specific time interval for radios to operate,

which automates the enabling or disabling of the radio.

25

Figure 5-23 Scheduler Page

Settings

Scheduler: Check the box to enable Scheduler.

Association Mode: Select Associated with SSID/AP, you can perform configurations on

the SSIDs/AP. The display of Scheduler Association is based on your

option here.

Scheduler Profile Configuration

Follow the steps below to add rules.

Step 1:

Click and input a profile name for the rule.

26

Figure 5-24 Add a Profile

Step 2:

Select one profile, and click and configure the recurring schedule for the

rule.

Figure 5-25 Add a Rule

27

Scheduler Association

This zone will display different contents based on your selection of association mode in

Settings.

1. Associated with SSID

Figure 5-26 Scheduler Association_Associated with SSID

SSID Name: Displays the SSID of the standalone AP.

Band: Displays the frequency band which the wireless network operates at.

Profile Name: Select a profile name from the drop

down list. Profile name is

configured in Scheduler Profile Configuration.

Action: Select Radio On/Off to turn on/off the wireless network during the time

interval set for the profile.

2. Associated with AP

Figure 5-27 Scheduler Association_Associated with AP

AP: Displays the name of the device.

AP MAC: Displays the MAC address of the device.

Profile Name: Select a profile name from the dropdown list. Profile name is configured

in Scheduler Profile Configuration.

Action: Select Radio On/Off to turn on/off the wireless network during the time

interval set for the profile.

28

5.5 QoS

The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other

traffic types. In normal use, we recommend you keep the default values for the EAP

devices and station EDCA (Enhanced Distributed Channel Access).

Figure 5-28 QoS Page

WiFi Multimedia

(WMM):

By default, WMM is enabled. After WMM is enabled, the device has the

QoS function to guarantee the transmission of aud

packets with high priority.

5.5.1 AP EDCA Parameters

AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from

the EAP device to the client station.

29

Figure 5-29 AP EDCA Parameters

Queue: Queue displays the transmission queue. By default, the priority from

high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be

changed if you reset the EDCA parameters.

Data 0 (Voice)Highest priority queue, minimum delay. Time

sensitive data such as VoIP and streaming media are automatically

sent to this queue.

Data 1 (Video)High priority queue, minimum delay. Timesensitive

video data is automatically sent to this queue.

Data 2 (Best Effort)Medium priority queue, medium throughput and

delay. Most traditional IP data is sent to this queue.

Data 3 (Background)Lowest priority queue, high throughput. Bulk

data that requires maximum throughput and is not timesensitive is

sent to this queue (FTP data, for example).

Arbitration Inter

Frame Space:

A wait time for data frames. The wait time is measured in slots. Valid

values for Arbitration InterFrame Space are from 1 to 15.

Minimum

Contention

Window:

A list to the algorithm that determines the initial random backoff wait

time (window) for retry of a transmission.

This value can not be higher than the value for the Maximum

Maximum

Contention

Window:

The upper limit (in milliseconds) for the doubling of the random backoff

value. This doubling continues until either the data frame is sent or the

Maximum Contention Window size is reached.

This value must be higher than the value for the Minimum Contention

Maximum Burst The Maximum Burst

is a AP EDCA parameter that applies only to

traffic flowing from the EAP devices to the client station. This value

specifies (in milliseconds) the maximum burst length allowed for

packet bursts on the wireless network. A packet burst is a collection

of multiple frames transmitted without header information. The

decreased over

head results in higher throughput and better

performance.

The valid values are multiples of 32 between 0 and 8192.

30

5.5.2 Station EDCA Parameters

Station EDCA parameters affect traffic flowing from the client station to the EAP device.

Figure 5-30 Station EDCA Parameters

Queue

Queue displays the transmission queue. By default, the priority

from high to low is Data 0, Data 1, Data 2, and Data 3. The priority

may be changed if you reset the EDCA parameters.

Data 0 (Voice)Highest priority queue, minimum delay. Time

sensitive data such as VoIP and streaming media are

automatically sent to this queue.

Data 1 (Video)High priority queue, minimum delay. Time

sensitive video data is automatically sent to this queue.

Data 2 (Best Effort)Medium priority queue, medium throughput

and delay. Most traditional IP data is sent to this queue.

Data 3 (Background)Lowest priority queue, high throughput.

Bulk data that requires maximum throughput and is not time

sensitive is sent to this queue (FTP data, for example).

Arbitration Inter

Frame Space

A wait time for data frames. The wait time is measured in slots.

Valid values for Arbitration InterFrame Space are from 0 to 15.

Minimum Contention

Window

A list to the algorithm that determines the initial random backoff

wait time (window) for retry of a transmission. This value can not

be higher than the value for the Maximum Contention Window.

Maximum Contention

Window

The upper limit (in milliseconds) for the doubling of the random

backoff value. This doubling continues until either the data frame

is sent or the Maximum Contention Window size is reached.

This value must be higher than the value for the Minimum

Contention Window.

31

TXOP Limit

The TXOP Limit is a station EDCA parameter and only applies to

traffic flowing from the client station to the EAP device. The

Transmission Opportunity (TXOP) is an interval of time, in

milliseconds, when a WME client station has the right to initiate

transmissions onto the wireless medium (WM) towards the EAP

device.

The valid values are multiples of 32 between 0 and 8192.

No

Acknowledgement

Select Enable to specify that the EAP device should not

acknowledge frames with QosNoAck as the service class value.

By default, it is disabled.

Unscheduled

Automatic Power

Save Delivery

Select Enable to enable APSD, which is a power management

method. APSD is recommended if VoIP phones access the

network through the EAP device. By default, it is enabled.

5.6 Rogue AP Detection

A Rogue AP is an access point that has been installed on a secure network without

explicit authorization from a system administrator.

The EAP device can scan all channels to detect all APs in the vicinity of the network. If

rogue APs are detected, they are shown on the

. If an AP listed

as a rogue is legitimate, you can add it to the

.

32

Figure 5-31 Rogue AP Detection Page

5.6.1 Settings

Figure 5-32 Enable Rogue AP Detection

Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save.

5.6.2 Detected Rogue AP List

Information about the detected rogue APs is displayed in the list. By default, the status

of the detected rogue AP is unknown. You can click Known in Action column to move

the AP to the Trusted AP List.

33

Figure 5-33 Detected Rogue AP List

Click to scan rogue APs. Make sure you have enabled Rogue AP Detection

and saved the setting before you click the button.

Action: Click Known to move the AP to the Trusted AP List. After the configurations

are saved, the moved AP will not be displayed in the Detected Rogue AP

List.

MAC: The MAC address of the rogue AP.

SSID: The SSID of the rogue AP.

Band: Displays the frequency band which the wireless network of the rogue AP

operates at.

Channel: The channel on which the rogue AP is currently broadcasting.

Security: Displays the enabling or disabling of the security mode of the wireless

network.

Beacon

Interval:

The beacon interval used by the rogue AP.

Beacon frames are transmitted by an AP at regular intervals to announce

the existence of the wireless network. The default behavior is to send a

beacon frame once every 100 milliseconds (or 10 per second).

Signal: The strength of the radio signal emitting from the rogue AP.

5.6.3 Trusted AP List

Information about the trusted APs is displayed in the list.

Figure 5-34 Trusted AP List

34

Action: Click Unknown to move the AP out of the Trusted AP List.

MAC: The MAC address of the trusted AP.

SSID: The SSID of the trusted AP.

Band: Displays the frequency band which the wireless network of the trusted AP

operates at.

Channel: The channel on which the trusted AP is currently broadcasting.

Security: Displays the enabling or disabling of the security mode of the wireless

network.

5.6.4 Download/Backup Trusted AP List

You can import a list of trusted APs from a saved list which is acquired from another AP

or created from a text file. The AP whose MAC address is in the Trusted AP List will not

be detected as a rogue.

You can also backup a list and save it in your PC.

Figure 5-35 Download/Backup Trusted AP List

Save Action: Select Download (PC to AP) to import a trusted AP list to the device.

Select Backup (AP to PC) to copy the trusted AP list to your PC.

Source File

Name:

Click Browse and choose the path of a saved trusted AP list or to save

a trusted AP list.

File

Management:

Select Replace to import the list and replace the contents of the

Trusted AP List.

Select Merge to import the list and add the APs in the imported file to

the APs currently shown in the Trusted AP List

EAP device does not have any control over the APs in the Detected Rogue AP List.

35

Chapter 6 Monitoring

On

page, you can monitor the network running status and statistics based

on AP, SSID and Client.

6.1 AP

on the

page displays the device name, its MAC address and the

number of clients. Below the AP List the AP’s detailed information will be shown,

including Device Information, Wireless Settings, LAN Information, Client, LAN Traffic and

Radio Traffic.

Figure 6-1 AP Monitoring

6.1.1 AP List

Figure 6-2 AP List

36

Device Name: Displays the device name.

MAC: Displays the MAC address of the EAP.

Num of Clients: Displays the number of clients connected to the EAP.

Device Information

Figure 6-3 Device Information

Device Name: Displays the device name.

Device

Model:

Displays the model of the device.

Firmware

Version:

Displays the firmware version of the device. If you want to upgrade the

firmware, please refer to 8.5 Firmware Upgrade.

System Time: Displays the system time of the device. If you want to adjust the system

time, please refer to 8.2.1 Time Settings.

Uptime: Displays the time that has elapsed since the last reboot.

CPU: Displays the CPU occupancy, which helps you to preliminarily judge

whether the device functions properly.

Memory: Displays the memory usage

, which helps you to preliminarily judge

whether the device functions properly.

37

Wireless Settings

Figure 6-4 Wireless Settings

Channel/Frequency

:

Displays the channel number and the operating frequency. If you

want to change them, please refer to 5.1.1 Wireless Basic

Settings.

Channel Width: Displays the spectral width of the radio channel used by the

device. If you want to change it, refer to 5.1.1 Wireless Basic

Settings.

IEEE802.11 Mode: Displays the radio standard used for operation of your device. If

you want to change it, refer to 5.1.1 Wireless Basic Settings.

Max TX Rate: Displays the maximum data rate at which the device should

transmit wireless packets.

Transmit Power: Displays the maximum average transmit power of the device. If

you want to change it, refer to 5.1.1 Wireless Basic Settings.

LAN Information

Figure 6-5 LAN Information

MAC Address: Displays the MAC address of the device.

IP Address: Displays the IP address of the device.

Subnet Mask: Displays the subnet mask of the device.

38

LAN Port: Displays the maximum transmission rate and duplex mode (halfduplex

or fullduplex) of the port.

Client

Figure 6-6 Client

MAC: Displays the MAC address of the client of the AP selected in AP List.

SSID: Displays the SSID the client is connected to.

SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal

strength and the environmental noise strength. The bigger the value of SNR

is, the better network performance the device provides.

CCQ(%): Displays the wireless Client Connection Quality (CCQ). CCQ refers to the

ratio of current effective transmission bandwidth and the theoretically

maximum available bandwidth. CCQ reflects the actual link condition.

Rate(Mbps): Displays the data rate at which the client transmits wireless packets.

Down(Byte): Displays the throughput of the downstream data.

Up(Byte): Displays the throughput of the upstream data.

Active Time: Displays the amount of time the client has been connected to the device.

LAN Traffic

Click LAN Traffic and you can monitor the data transmission status of the LAN port.

Figure 6-7 LAN Traffic

39

Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port.

Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN

port.

Rx/Tx Dropped

Packets:

Displays the total amount of dropped packets received/sent on the

LAN port.

Rx/Tx Errors: Displays the total amount of error packets received/sent on the LAN

port.

Radio Traffic

Click Radio Traffic and you can monitor the data transmission status of the wireless

network.

Figure 6-8 Radio Traffic

Rx/Tx Packets: Displays the total amount of packets received/sent by the wireless

network.

Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent by the

wireless network.

Rx/Tx Dropped

Packets:

Displays the total amount of dropped packets received/sent by the

wireless network.

Rx/Tx Errors: Displays the total amount of error packets received/sent by the

wireless network.

40

6.2 SSID

Figure 6-9 SSID Monitoring

6.2.1 SSID List

In

you can monitor the related parameters of the wireless network.

Figure 6-10 SSID List

SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2

SSIDs.

VLAN ID: Displays the VLAN which the SSID belongs to. If you want to change

the VLAN ID, please refer to 5.1.2 SSIDs.

Num of Clients: Displays the number of clients connected to the SSID. If you want to

get more information about these clients, please refer to 5.1.2 SSIDs.

SSID

Broadcast:

Displays the enabling or disabling of SSID broadcast. If you want to

modify it, please refer to 5.1.2 SSIDs.

Band: Displays the frequency band the wireless network is operating at.

Security: Displays the security mode the wireless network is applying. If you

want to modify it, please refer to 5.1.2 SSIDs.

Portal: Displays the enabling or disabling of Portal. If you want to modify it,

please refer to 5.1.2 SSIDs.

41

MAC Filtering:

Displays the enabling or disabling of MAC Filtering. If you want to

modify it, please refer to 5.1.2 SSIDs.

Isolation:

Displays the enabling or disabling of SSID Isolation. If you want to

modify it, please refer to 5.1.2 SSIDs.

Down(Byte): Displays the throughput of the downstream data.

Up(Byte): Displays the throughput of the upstream data.

6.3 Client

From

, you can monitor the status of all the clients connected to the EAP

including those who are authenticated.

Figure 6-11 Client Monitoring

6.3.1 User List

Figure 6-12 User List

MAC: Displays the MAC address of the client.

42

Band: Displays the band the client is in.

Access

Point:

Displays the name of the device to which the client is connected.

SSID: Displays the SSID the client is connected to.

SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless

signal strength and the environmental noise strength. The bigger the

value of SNR, the better network performance the device provides.

CCQ(%): Displays the wireless Client Connection Quality (CCQ). CCQ refers to the

ratio of current effective transmission bandwidth and the theoretically

maximum available bandwidth. CCQ reflects the actual link condition.

Rate(Mbps): Displays the data rate at which the client transmits wireless packets.

Down(Byte): Displays the throughput of the downstream data.

Up(Byte): Displays the throughput of the upstream data.

Active Time: Displays the amount of time the client has been connected to the device.

6.3.2 Portal Authenticated Guest

The

Portal Authenticated Guest

displays information about clients that have set up

valid authentication.

Figure 6-13 Portal Authenticated Guest

MAC: Displays the MAC address of the authenticated client.

Band: Displays the band the authenticated client is in.

Access

Point:

Displays the name of the device to which the authenticated client is

connected

SSID: Displays the SSID the authenticated client is connected to.

SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless

signal strength and the environmental noise strength. The bigger the

value of SNR, the better network performance the device provides.

43

CCQ(%): Displays the Client Connection Quality (CCQ) of the authenticated client.

CCQ refers to the ratio of current effective transmission bandwidth and

the theoretically maximum available bandwidth. CCQ reflects the actual

link condition.

Rate(Mbps): Displays the data rate at which the authenticated client transmits wireless

packets.

Down(Byte): Displays the throughput of the downstream data.

Up(Byte): Displays the throughput of the upstream data.

Active Time: Displays the amount of time the client has been authenticated on the root

AP.

Action: Click Unauthorize to stop giving authorization to the clients connected to

the wireless network.

44

Chapter 7 Management

page is mainly used for device management and maintenance.

7.1 System Log

System log records information about hardware, software as well as system issues and

monitors system events. With the help of system log, you can get informed of system

running status and detect the reasons for failure.

Following is the page of

.

Figure 7-1 System Log Page

7.1.1 Log List

From

you can view detailed information about hardware, software, system

issues and so on.

45

Figure 7-2 Log List

7.1.2 Log Settings

You can choose the way to receive system logs in

zone, where these

parameters can be configured: Enable Auto Mail, Enable Server and Enable Nvram.

Figure 7-3 Log Settings

Enable Auto Mail

If Auto Mail Feature is enabled, system logs will be sent to a mailbox. The following

content will be shown.

Figure 7-4 Enable Auto Mail

From: Enter the sender’s email address.

To: Enter the recipient’s email address, which will receive the system logs.

SMTP Server: Enter the IP address of the SMTP server.

46

Enable

Authentication:

Generally users are required to log in to the SMTP server by entering

user name and password.

User Name: Enter the sender’s email address.

Password: Enter the password of the sender’s email address.

Confirm Password: Enter the password again for confirmation.

Time Mode: System logs can be sent at specific time or time interval.

Fixation Time: Set a fixed time, for example, 15:00. The recipient will

receive the system logs sent by the device at 15:00 every day.

Period Time: Set a time interval, for example, 5 hours. The recipient

will receive the system logs sent by the device every 5 hours.

Enable Server

System logs can also be sent to a server. After Enable Server is enabled, the following

content will be shown.

Figure 7-5 Enable Server

System Log Server IP: Enter the IP address of the remote server.

System Log Server

Port:

Enter the port of the remote server.

Enable Nvram

By default, Nvram is disabled. Check the box to enable Nvram, system logs will be saved

after power supply is cut.

Nvram (Nonvolatile Random Access Memory) is a RAM that can still save data even if a

device is power off. All TPLink EAPs are equipped with Nvram. With this option enabled,

the Nvram feature can help reserve the system logs when an EAP device is power off.

7.2 Web Server

You can log in web management interface, thereby manage and maintain the device.

47

Following is the page of

.

Figure 7-6 Web Server Page

HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default.

Secure Server

Port:

Designate a secure server port for web server in HTTPS mode. By

default the port is 443.

Server Port: Designate a server port for web server in HTTP mode. By default the port

is 80.

Session

Timeout:

Set the session timeout time. If you do nothing with the web

management page within the timeout time, the system will log out

automatically. Please login again if you want to go back to web

management page.

7.3 Management Access

Management Access Control allows you to configure up to four MAC addresses of the

hosts that are allowed to log in to the web management page of the EAP. Click Add PC’s

MAC and the MAC address of the current host will be added to MAC address list.

48

Following is the page of

.

Figure 7-7 Management Access Page

MAC

Authentication:

Check the box to enable MAC Authentication. After MAC

Authentication is enabled, only the PCs in MAC address list can log in

the device’s web management page. By default this function is

disabled. All PCs in LAN can log in and manage the device.

MAC1MAC4: Enter the MAC addresses of the PCs which are authorized to log in the

device.

7.4 LED ON/OFF

Following is the page of

. By default the LED is on.

Figure 7-8 LED ON/OFF

49

7.5 SSH

This device supports the SSH Server function that allows users to login and manage it

through SSH connection on the SSH client software.

SSH (Secure Shell) is a security protocol established on application and transport layers.

SSH-encryptedconnection is similar to a telnet connection, but essentially the old

telnet remote management method is not safe, because the password and data

transmitted with plaintext can be easily intercepted. SSH can provide information

security and powerful authentication when you login this device remotely through an

insecure network environment. It can encrypt all the transmission data and prevent the

information in remote management from being leaked.

Following is the page of SSH.

Figure 7-9 SSH Page

Server Port: Enter the server port. By default, it is port 22.

SSH Login: Check the box to enable SSH Server. By default, it is disabled.

7.6 Management VLAN

Management VLAN provides a safer way for you to manage the EAP. With Management

VLAN enabled, only the hosts in the management VLAN can manage the EAP. Since most

hosts cannot process VLAN TAGs, connect the management host to the network via a

switch, and set up correct VLAN settings for the switches on the network to ensure the

communication between the host and the EAP in the management VLAN.

Following is the page of Management VLAN.

50

Figure 7-10 Management VLAN Page

Management

VLAN:

Enable Management VLAN.

Management

VLAN ID:

Specify the Management VLAN ID. The valid values are from 1 to 4094.

7.7 SNMP

The device can be configured as an SNMP agent.

SNMP (Simple Network Management Protocol), the most widely applied network

management protocol, provides a management framework to monitor and maintain

Internet devices. Main functions of SNMP include monitoring network performance,

detecting and analyzing network error, configuring network devices, and so on. When

networks function properly, SNMP can perform the functions of statistics, configuration and

testing. When networks have troubles, SNMP can detect and restore these troubles.

An SNMP consists of three key components: manager, agent and MIB (Management

Information Base). SNMP manager is a client program operating at workstation, assisting

network administrators to accomplish most network device management tasks. An agent

is a networkmanagement software module that resides on a managed device and

responsible for receiving and dealing with data sent by managing device. Generally the

managed devices are network devices including hosts, bridges, switches and routers. MIB

is the collection of managed devices. It defines a series of properties of the managed

devices. Every SNMP agent has its own MIB.

Once the device has become an SNMP agent, it is able to receive and process request

messages from SNMP manager.

Following is the page of SNMP.

51

Figure 7-11 SNMP Page

SNMP Agent: Enable SNMP Agent and the SNMP Agent will collect the information of

this device and respond to information requests from one or more

management systems.

SysContact: Enter the textual identification of the contact person for this managed

node.

SysName: Enter an administrativelyassigned name for this managed node.

SysLocation: Enter the physical location of this managed node.

Get

Community:

Community refers to a host group aiming at network management. Get

Community only has the read

only right of the device’s SNMP

information. The community name can be considered a group password.

The default setting is public.

Get Source: Defines the IP address (for example, 10.10.10.1) or subnet for management

systems that can serve as Get Community to read the SNMP information of

this device. The format of subnet is “IP address/bit” (such as 10.10.10.0/24).

The default is 0.0.0.0, which means all hosts can read the SNMP information

of this device.

Set

Community:

Set Community has the read and write right of the device’s SNMP

information. Enter the community name that allows read/write access to

the device’s SNMP information. The community name can be considered

a group password. The default setting is private.

Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for

management systems that can serve as Set Community to read and

write the SNMP information of this device. The format of subnet is “IP

address/bit” (such as 10.10.10.0/24). The default is 0.0.0.0, which means

all hosts can read and write the SNMP information of this device.

52

NOTE:

Defining community can allow management systems in the same community to communicate

with the SNMP Agent. The community name can be seen as the shared password of the

network hosts group. Thus, for the security, we suggest modifying the default community

name before enabling the SNMP Agent service. If the field of community is blank, the SNMP

Agent will not respond to any community name.

53

Chapter 8 System

System page is mainly used to configure some basic information like user account and

time, and realize functions including reboot, reset, backup, restore and upgrade the device.

8.1 User Account

You can change the username and password to protect your device from unauthorized

login. We recommend that you change the default user password on the very first system

setup.

Figure 8-1 User Account Page

Old User

Name/Password:

Enter the present user name and password of the admin account to

get the permission of modification.

New User

Name/Password:

Enter a new user name and password for the admin account. Both

values are casesensitive, up to 64 characters and with no space. New

Password must not be «admin»

Confirm New

Password:

Enter the new password again.

8.2 Time Settings

System time represents the device system’s notion of the passing of time. System time is

the standard time for Scheduler and other timebased functions. You can manually set the

system time, configure the system to acquire its time settings from a preconfigured NTP

server or synchronize the system time with the PC’s clock.

54

The device supports DST (Daylight Saving Time).

Figure 8-2 Time Settings

8.2.1 Time Settings

Figure 8-3 Time Settings

Click the button and the device will obtain GMT time from NTP server.

IP address of the NTP server has to be filled in.

Click the button and save the configuration, your PC’s time will be

obtained as the device’s system time.

Time zone: Select your local time zone from the dropdown list.

55

Date: Set the current date, in format MM/DD/YYYY. For example, for

November 25, 2014, enter 11/25/2014 in the field.

Time: Specify the device’s time. Select the number from the dropdown list

in time format HH/MM/SS.

Primary/Secondary

NTP Server:

If you’ve selected Get GMT from an NTP server, please input the

primary NTP sever address and an alternative NTP server address.

8.2.2 Daylight Saving

Figure 8-4 Daylight Saving

Daylight Saving: Enable or disable the DST. DST is disabled by default.

Mode: Options include Predefined Mode, Recurring Mode and Date Mode.

Please refer to the following content for more information.

Predefined Mode

Figure 8-5 Predefined Mode

Mode: Select Predefined Mode.

Predefine

Country:

Select a predefined DST configuration. Europe is the predefined

country by default.

USA

: Second Sunday in March, 02:00 ~ First Sunday in

November, 02:00

European: Last Sunday in March, 01:00 ~ Last Sunday in October,

01:00

Australia: First Sunday in October, 02:00 ~ First Sunday in April,

03:00

56

New Zealand: Last Sunday in September, 02:00 ~ First Sunday in

April, 03:00

Recurring Mode

Figure 8-6 Recurring Mode

Mode: Select Recurring Mode. The configuration is recurring in use.

Time Offset: Specify the time adding in minutes when Daylight Saving Time comes.

Start/End: Select starting time and ending time of Daylight Saving Time.

Date Mode

Figure 8-7 Date Mode

Mode: Select Date Mode.

Time Offset: Specify the time adding in minutes when Daylight Saving Time comes.

Start/End: Select starting time and ending time of Daylight Saving Time.

8.3 Reboot/Reset

Figure 8-8 Reboot & Reset

57

Click Reboot to restart the device. Click Reset to restore the device to factory default

settings.

8.4 Backup & Restore

Figure 8-9 Backup & Restore

You can save the current configuration of the EAP as a backup file and restore the

configuration via a backup file. To prevent the settings from being lost, we recommend that

you back up the settings before you upgrade the device or upload a new configuration file.

Restore function helps you to restore the device to previous settings by uploading a backup

file.

8.5 Firmware Upgrade

Figure 8-10 Firmware Upgrade

Please log in http://www.tplink.com/ to download the latest system file. Click Browse to

choose the firmware file. Click Upgrade to upgrade the devices.

58

NOTE:

1. Please select the proper software version that matches your hardware to upgrade.

2. To avoid damage, please do not turn off the device while upgrading.

3. After upgrading, the device will reboot automatically.

59

На чтение 13 мин. Просмотров 7.7k.

Содержание

  1. Характеристики Auranet EAP
  2. Комплектация Auranet EAP110
  3. Комплектация Auranet EAP220
  4. Подключение к локальной сети точек Auranet
  5. Подключение питания EAP110:
  6. Подключение питания EAP120/EAP220
  7. Настройка EAP120/EAP220
  8. Настройка точек доступа TP-Link Auranet с помощью утилиты управления EAP
  9. Настройка беспроводных сетей с помощью EAP Controller

Характеристики Auranet EAP

Серия EAP TP-Link EAP110 TP-Link EAP120 TP-Link EAP220
Модель Беспроводная точка доступа серии N, скорость до 300 Мбит/с Беспроводная гигабитная точка доступа серии N, скорость до 300 Мбит/с Беспроводная двухдиапазонная гигабитная точка доступа, скорость до 600 Мбит/с
Стандарты беспроводной связи IEEE 802.11 n/b/g IEEE 802.11 n/b/g IEEE 802.11 n/b/g/a
Скорость 2,4 ГГц: 300 Мбит/с 2,4 ГГц: 300 Мбит/с 2,4 ГГц: 300 Мбит/с
5 ГГц: 300 Мбит/с
Порт Ethernet 1 порт 10/100 Мбит/с 1 гигабитный порт 1 гигабитный порт
PoE Пассивное PoE 24 В/1 А 802.3af 802.3af
Встроенные антенны 2 * 3 дБи 2 * 4 дБи 4 * 4 дБи
ПО для управления
Макс. количество SSID 8 8 16
Портал аутентификации
Фильтрация MAC-адресов
Расписание беспроводного режима
Обнаружение несанкционированных точек доступа
Автоматическая настройка передатчика

Комплектация Auranet EAP110

Начну с комплектации.Сегодня у меня на столе две точки доступа TP-LINK, призванные сместить лидеров рынка корпоративного Wi-Fi с пьедестала почета (вендоров не называю специально). Честно говоря, впервые с ними сталкиваюсь так близко, буду изучать вместе с вами.

Точка доступа поставляется в картонной коробке, с документацией на английском и русском языках, на CD-диске мануалы по настройке и инсталляции точек доступа, непосредственно сам софтовый EAP Controller (при установке лучше скачать свежий с сайта производителя, на момент обзора это была версия EAP Controller_V2.4.4 от 29/06/16, ссылка для скачивания http://www.tp-linkru.com/res/down/soft/EAP_Controller_V2.4.4.zip). В коробке, помимо самой точки доступа, находится PoE-адаптер T240100-2-POE, комплект для монтажа на стену или потолок, пластиковые дюбели и винты. Комплектация позволяет начать установку прямо на месте, без захода в магазин стройматериалов.

Комплектация Auranet

Комплектация Auranet EAP220

Комплектация похожа на младшего брата, исключение составляет блок питания — вместо адаптера PoE предлагается адаптер для подключения к сети 220В T120150-2C1, на выходе адаптера 12 В/1.5. Наличие адаптера постоянного тока позволит вам не использовать PoE-коммутатор (дополнительные расходы!), а подключать точку рядом с розеткой.

Подключение к локальной сети точек Auranet

Подключение не вызывает вопросов — EAP110 можно подключить к порту 10/100 Мбит, EAP210 при подключении к PoE требует ТОЛЬКО UTPcat5 и выше, со всеми 8 жилами (необходимо для передачи питания по стандарту 802.3af ), т.е. GigabitEthernet. EAP210 можно запитать как от адаптера питания, так и от PoE-коммутатора или PoE-инжектора.

Подключение TP-Link EAP к локальной сети

Подключение питания EAP110:

  1. С помощью кабеля Ethernet соедините порт ETHERNET точки доступа ЕАР110 с портом РОЕ на РоЕ-адаптере. Длина кабеля не должна превышать 100 м.
  2. С помощью кабеля Ethernet подключите коммутатор к порту LAN PoE- адаптера.
  3. Подключите кабель питания к соответствующему разъёму РоЕ-адаптера, затем подключите его к электророзетке.

Электропитание модели EAP110

Подключение питания EAP120/EAP220

Питание точки доступа EAP120/EAP220 может осуществляться с помощью питающего устройства (например, PoE-коммутатора) или адаптера питания.

С помощью PoE-коммутатора

1. С помощью кабеля Ethernet подключите РоЕ-коммутатор к порту ETHERNET точки доступа EAP120/EAP220.

2. Нажмите кнопку ON/OFF на точке доступа EAP120/EAP220.

С помощью PoE-коммутатора

С помощью адаптера питания

1. Подключите адаптер питания к соответствующему разъёму на точке доступа EAP120/EAP220, затем подключите адаптер питания к электророзетке.

2. Нажмите кнопку ON/OFF на точке доступа EAP120/EAP220.

С помощью адаптера питания

Настройка EAP120/EAP220

При подключении точек доступа к маршрутизатору с настроенным DHCP-сервером точки сразу получают IP-адрес и начинают вещать в эфир. SSID уже сконфигурированы на устройствах, по-умолчанию разрешено подключение без пароля. Имя сети имеет такой вид: TP-LINK_2.4GHz_594AC5 — указание на производителя, рабочая частота Wi-Fi и последние 6 знаков MAC-адреса. Преобразование адресов NAT выполняется на главном маршрутизаторе, отвечающем за подключение к сети провайдера, беспроводные клиенты подключаются в режиме беспроводного моста, как будто напрямую в маршрутизатор. Получение IP-адреса можно оставить динамическое, в таком случае, для того, чтобы узнать, как подключиться к WEB-интерфейсу точки, вам придется обратиться к интерфейсу маршрутизатора, там по MAC-адресу выяснить, какой же адрес получила точка доступа TP-Link. Институтом IEEE за TP-Link закреплен MAC- адрес, который начинается на c4e9.84,  поэтому на маршрутизаторе даем команду

sh arp | i c4e9.84
Internet  192.168.1.59           48   c4e9.8459.4ac5  ARPA   GigabitEthernet0/1
Internet  192.168.1.60           15   c4e9.84b6.de48  ARPA   GigabitEthernet0/1

Зная IP-адреса устройств, мы уже можем к ним подключиться для внесения изменений в конфигурацию.

Подключившись через любой WEB-браузер по IP-адресу, вводим логин и пароль по-умолчанию: admin, admin. Сразу же меняем на свои (не забываем, что у нас Wi-Fi по-умолчанию без пароля, злоумышленник может попасть в вашу сеть без вашего ведома). Далее идем в меню Network-IP Settings-Static, выставляем желаемый адрес для сетевого устройства, маску сети и шлюз (адрес вашего маршрутизатора) и нажимаем Save. Точка доступа сразу же становится доступной по адресу, который вы указали.

Настройка IP TP-Link EAP

Для того, чтобы настройить сеть Wi-Fi, необходимо, в первую очередь, изменить настройки регулятивного домена. По-умолчанию выставлен United States,необходио выбрать регион Russia.

Выбор региона

После этого идем меню Wireless-Wireles Setting, с помощью переключателя 2.4GHZ/5GHZ попадаем в настройки каждого из двух диапазонов, поддерживаемых точкой доступа EAP220. Настройки SSID для каждого диапазона задаются отдельно. Можно выбрать Wireless Mode (802.11b/g/n mixed, 802.11b/g, 802.11n only), ширину канала (20/40 MHz, 20 MHz, 40 MHz), выбрать канал (с первого по тринадцатый либо Auto) и максимальную мощность точки доступа (в Регионе Россия — 20 dBm или 100мВт).

В автоматическом режиме точка выбрала почему-то 7 канал, что неверно, так как этот канал не является непересекающимся (всего в диапазоне 2.4 МГц три таких канала — 1, 6 и 11).12 и 13 канал также советую не использовать, так как не все беспроводные устройства «знают» о таких каналах, поэтому связи не будет. Для определения наиболее свободного канала переходим в меню Wireless -Rogue AP Detection для определения каналов, на которых работают соседские точки доступа. Жмем Scan, видим список соседей:

rogue ap detection

На скрине видно, что в нашем случае предпочтительней будет выбрать первый канал для работы как наиболее свободный от соседей. Нажимаем кнопку Save для сохранения внесенных изменений.

Далее переходим к редактированию SSID (имя нашей беспроводной сети).

Настройка SSID TP-Link

SSID Name — имя сети

Wireless VLAN ID — используется в корпоративных сетях для того, чтобы применять особенные политики безопасности к трафику беспроводных клиентов и для ограничения широковещательного домена.

SSID Broadcast — разрешить транслировать  название беспроводной сети, снятие галочки делает вашу сеть «скрытой», к ней смогут подключиться только те, кто знает ее название и пароль.

Security Mode — выбор типа алгоритма обеспечения безопасности сети Wi-Fi (None, WEP, WPA-Interprise, WPA-PSK). Доступны версии WPA-PSK, WPA2-PSK с типами шифрования TKIP или AES. Можно подключить внешний радиус-сервер для авторизации пользователей на нем (каждый пользователь будет заходит под своим логином и паролем).

Portal — настройка HotSpot для пользователей, которым надо показать рекламу перед предоставлением доступа в сеть. Возможно предоставление доступа с паролем и без, через внешний сервере авторизации — radius. Подробно настраивается меню Wireless-Portal.

SSID Isolation — возможность изолировать траффик беспроводных клиентов, для того, чтобы они не попадали в локальную сеть. Доступ только в сеть Интернет для пользователей «гостевой» сети. 

Load Balance — ограничение максимального количества клиентов, которые могут подключиться к данной точке доступа. По-умолчанию, ограничений нет.

Всего можно добавить до 8ми SSID на каждый диапазон, все клиенты будут работать в одном канале, но для каждой сети можно настроить свои ограничения по трафику (настраивается на маршрутизаторе с помощью списков контроля доступа и функционала ограничения скорости). На точке доступа скорость для клиентов не ограничить.

Еще полезным будет ограничить список подключаемых устройств по MAC-адресам (настраивается в меню MAC Filtering), это дополнительно повысит безопасность вашей сети.

В меню Scheduler можно задать расписание вещания точек доступа, причем это можно делать как для каждой точки в отдельности, так и для отдельных SSID. Настраивается время активности либо неактивности точки по дням недели, отдельно на выходные, на каждый день или произвольно с указанием с времени работы  начала и окончания. Не забудьте настроить клиент точного времени для того, чтобы расписание работало корректно (меню System-Time Settings)

scheduler

В настройках беспроводной сети также есть меню QoS — настройка качества обслуживания в зависимости от типа трафика и приоритетов. Весь трафик можно разделить на 4 категории, задав каждой из них свои приоритет

На беспроводных точках доступа серии Auranet можно отключать световой индикатор работы, настраивается в меню Managment — LED On/Off. Также здесь настраиваются такие параметры как  отправка логов на сервер или по почте, конфигурируется доступ по протоколам HTTPS, SSH и настройка SNMP read для отправки оповещений на внешний сервер сбора данных о состоянии устройства.

Для обновления прошивки устройства необходимо сначала скачать ее с сайта вендора, а потом загрузить через меню System-Firmware Upgrade. Важно — во время обновления прошивки не выключать устройство от питания!

На этом закончим обзор точек доступа TP-Link Auranet EAP110 и EAP220 в режиме Standalone, перейдем к настройке с помощью контроллера.

Настройка точек доступа TP-Link Auranet с помощью утилиты управления EAP

Контроллер точек доступа необходим для управления большим количеством точек доступа одновременно. Единый интерфейс для массового изменения настроек, сбора и просмотра статистики, работы с HotSpot, управления политиками доступа и безопасности.

  1. Контроллер Auranet абсолютно бесплатный, распространяется с сайта вендора
  2. Программный контроллер доступен только для семейства операционных систем Windows (WinXP/Vista/7/8/8.1/10/Server2008 (32/64bit)/Server2012 (64bit)).
  3. Используйте последнюю версию контроллера, там исправлены ошибки ПО, обнаруженные в ранних выпусках.
  4. После установки контроллера Auranet вам будет предложено обновить софт на точках доступа до актуального.

Установка не занимает много времени, единственное, что удивило — контроллер при размере установщика 92 Мб просит зарезервировать для его работы аж 4Гб свободного места.

По-умолчанию, софт устанавливается в папку Program Files (x86) на диске C, что свидетельствует о том, что нативной поддержки 64-битных систем в нем нет. После установки размер папки составил 188 Мб, немного.

Запускаем ярлык на рабочем столе — EAP Controller, происходит первичная инициализация, запуск необходимых служб и баз данных

После запуска вас перекинет в браузер для выполнения первоначальной настройки — SSID сети, пароля, создание аккаунта администратора.

При входе в интерфейс контроллера вы увидите знакомую картинку, если уже работали с точками доступа Ubiquiti семейства UniFi — карта локации, с точками доступа, которые вам необходимо разместить на этой карте.

EAP интерфейс

Первым делом, нам нужно передать управлению точками доступа контроллеру — для этого нажимаем кнопку Pending  и Batch Adopt, для того, чтобы ассоциировать обе точки одновременно

batch Adopt

Выскочит предложение о вводе логина и пароля — необходимо ввести данные администратора. Точки доступа в случае успешной передачи управления появятся в меню Access Points. Необходимо обновить прошивку на них. Для этого жмеv стрелочку вверх напротив точки доступа.

Upgrade EAP

Указываем на заранее скачанные файлы прошивок (необходимо предварительно их разархивировать). Для EAP 110 это файл вида TL-EAP110v1_eu_1.0.2_[20160405-rel51328]_up_signed.bin, для EAP 220 — TL-EAP220v1_eu_2.0.2_[20160401-rel65964]_up_signed.bin. В процессе обновления не выключайте питание на точках доступа. 

После успешного обновления обе точки доступа будут раздавать ту беспроводную сеть, которую мы объявили при первом включении контроллера.

Дальше интерфейс повторяет возможности UniFi Controller, опишу только основные моменты настройки меню:

Map-Label — позволяет разместить точки доступа на плане для наглядности, с помощью  кнопки «шестеренки»получить доступ к быстрой статистике (MAC Address, IP AddressModelVersionCPUMemory,Uptime, статистика по трафику проводного интерфейса LAN, беспроводного Radio) изменить базовые настройки точки доступа (NameIP Setting,Radio, Load Balance,WLANSRogue AP DetectionForget this AP), статистику по подключенным клиентам — меню User и Guest.

Map-Details показывает детальную статистику (NameMACIPChannelUsersGuests).

Map-Coverage показывает приблизительную область покрытия на карте.

Карта покрытия Tp-Link

Statistics — отображает в графическом виде обработанные данные по количеству клиентов на каждую SSID, на каждую точку, суммарный трафик скачанной и полученной информации, отображение на шкале времени, позволяет выявить активных пользователей.

Access Points  — предоставляет доступ к интерфейсам управления каждой точкой по отдельности, информации об MAC-адресе, IP-адресе, статусе, модели, версии прошивки, принадлежности WLAN Group, Radio 2G, Radio 5G. Кнопки Action позволяют выполнить быстрые действия — Locate (показать на карте конкретную точку доступа), Reboot — перезагрузить точку доступа, Upgrade — обновить прошивку, Move to Site — перекинуть точку доступа в другую локацию (по умолчанию — Default).

Clients — отображает информацию о подключенных клиентах. Доступна информация — MAC Address, Hostname, IP Address, Access Point, SSID, User/Guest, 2G/5G, Download, Upload ,Rate(Mbps), Active Time, Signal, Action относительно беспроводного клиента. Action позволяет заблокировать клиента (запретить доступ к сети).

Insights — данное меню предоставляет доступ к справочным данным, собранным во время работы контроллера. Здесь есть статистика по всем подключавшимся клиентам, информация о соседних точках доступа (доверенные и недоверенные), информация о последних гостевых подключениях.

Log — журнал событий системы.

Настройка беспроводных сетей с помощью EAP Controller

Для одновременной настройки всех точек доступа нам необходимо открыть нижнюю панель Wireless Setting. Там три вкладки — Basic Wireless Setting, Advanced Wireless Setting и Band Steering. Последняя функция позволяет разгрузить диапазон 2.4 ГГЦ в двухдиапазонных точках доступа и принудить устройства, поддерживающие связь в 5 ГГц, подключиться к сети 5 ГГЦ (в таком случае ваши сети на обоих диапазонах должны иметь одинаковый SSID и пароль). К сожалению, в интерфейсе нет возможности ограничить количество клиентов, которых следует подключить к диапазону 5 ГГЦ. Скорее всего, за это будет отвечать функция Load Balance.

Настроим для теста 3 сети — telecom-sales_2GHz, telecom-sales_5GHz и telecom-sales_guest — отдельная сеть для клиентов в 2.4 ГГц диапазоне, в 5 ГГц и гостевая сеть с запретом доступа к локальной сети, включенным Band Steering и ограничением скорости в 1Мбит/с, с запретом общаться клиентам между собой.

ADD SSID

Жмем синий плюсик с надписью Add, заполняем поля как на скриншоте ниже:

 telecom-sales_2GHz

Жмем Apply — информация о новой сети автоматически распространилась на активные точки доступа, которые прошли процедуру присоединения к контроллеру — Adopting.

На скриншоте видно правило Access Control Rule — эта настройка отвечает за блокировку доступа клиентов к локальной сети. None — без ограничений.

Тоже самое выполняем для сети в 5 ГГц диапазоне — ставим переключатель в 5GHz жмем Add.

telecom-sales_5GHz

Настройка гостевой сети на EAP 110/220:

Нам придется создать 2 одинаковых SSID в каждом диапазоне с одинаковыми настройками — чтобы заработал Band Steering.

переключатель в 5GHz

На скриншоте видно,что правило Access Control Rule мы изменили на Default.

guest

Данное правило настраивается отдельно, в нем мы указываем запрещенные ресурсы локальной сети (меню wireless controll — access control). 

Указываем Rate Limit — ограничение скорости в килобитах, значение для Upload  и Download равно 1024. Тоже самое делаем в 5 ГГц диапазоне.

Проверяем, что все настройки применились.

проверка

проверка 2

Теперь мы можем подключать к сети наших клиентов, основные настройки выполнены.

Если у вас остались вопросы, прошу направлять на почту support@telecom-sales.ru

View the manual for the TP-Link EAP110-Outdoor here, for free. This manual comes under the category access points and has been rated by 4 people with an average of a 8.2. This manual is available in the following languages: English. Do you have a question about the TP-Link EAP110-Outdoor or do you need help? Ask your question here

The TP-Link EAP110-Outdoor is an access point designed for outdoor use. With a maximum data transfer rate of 300 Mbit/s, it allows for fast and efficient wireless connectivity. It features Power over Ethernet (PoE) support, which means it can be powered through the Ethernet cable, providing convenience and flexibility in installation. The Ethernet LAN data rates supported are 10 and 100 Mbit/s.

The access point operates on the 2.4 GHz frequency, providing reliable coverage and connectivity over a wide range. However, it does not support the 5 GHz frequency. Equipped with two external antennas, it offers improved signal strength and coverage. The antenna gain level is up to 5 dBi, ensuring better signal reception and transmission.

The access point is designed with a reset button, allowing for easy troubleshooting and restarts if needed. It has a single Ethernet LAN (RJ-45) port, providing a convenient connection point for wired devices. The output voltage of the access point is 24 V, with an output current of 0.6 A.

With LED indicators for power, it allows for easy monitoring and visual confirmation of its current status. The access point can be mounted on a pole or wall, offering flexibility in installation options.

Overall, the TP-Link EAP110-Outdoor is a reliable outdoor access point that provides fast wireless connectivity. With its durable construction and external antennas, it offers improved signal strength and coverage. Its Power over Ethernet support adds convenience and flexibility in installation.

General
TP-Link
EAP110-Outdoor | EAP110-OUTDOOR V3
access point
6935364097752, 6935364097769, 0845973092832
English
User manual (PDF), Installation Guide (PDF), Datasheet (PDF)
Features
Maximum data transfer rate 300 Mbit/s
Ethernet LAN data rates 10, 100 Mbit/s
2.4 GHz Yes
5 GHz No
Networking standards IEEE 802.11b, IEEE 802.11g, IEEE 802.11n
Automatic channel selection Yes
Quality of Service (QoS) support Yes
Wi-Fi Multimedia (WMM)/(WME) Yes
Rate limiting Yes
Wireless isolation Yes
Virtual LAN features Tagged VLAN
Frequency band 2.4 GHz
No
Maximum data transfer rate (2.4 GHz) 300 Mbit/s
VLAN support Yes
Power
Power over Ethernet (PoE) Yes
Output voltage 24 V
Output current 0.6 A
Power consumption (max) 3.12 W
Design
Reset button Yes
LED indicators Power
Product color White
Placement Pole, Wall
Certification CE, FCC, RoHS
Antenna
Antenna type External
Antennas quantity 2
Antenna gain level (max) 5 dBi
Antenna direction type Omni-directional
Antenna features Detachable antenna
Ports & interfaces
Ethernet LAN (RJ-45) ports 1
USB 2.0 ports quantity 0
Security
Number of SSID supported 8
MAC address filtering Yes
Security algorithms WPA-Enterprise, WPA-PSK, WPA2-Enterprise, WPA2-PSK
Remote Authentication Dial-In User Service (RADIUS) Yes
Management features
Web-based management Yes
Syslog Yes
Protocols
Management protocols HTTP/HTTPS, SNMP, Telnet
Packaging content
PoE adapter included Yes
Mounting kit Yes
Cables included AC
Number of products included 1 pc(s)
Antenna included Yes
Operational conditions
Operating temperature (T-T) -30 — 65 °C
Storage temperature (T-T) -40 — 70 °C
Operating relative humidity (H-H) 10 — 90 %
Storage relative humidity (H-H) 5 — 90 %
Weight & dimensions
Height 26.7 mm
Width 214.9 mm
Depth 46 mm
Packaging data
Package type Box
Package weight 620 g
Package width 270 mm
Package depth 140 mm
Package height 100 mm
Performance
Compatible operating systems Microsoft Windows XP, Vista, Windows 7, Windows 8, Windows10

show more

Can’t find the answer to your question in the manual? You may find the answer to your question in the FAQs about the TP-Link EAP110-Outdoor below.

What certifications does the TP-Link EAP110-Outdoor have?

The TP-Link EAP110-Outdoor has the following certifications: CE, FCC, RoHS.

What is the height of the TP-Link EAP110-Outdoor?

The TP-Link EAP110-Outdoor has a height of 26.7 mm.

What is the width of the TP-Link EAP110-Outdoor?

The TP-Link EAP110-Outdoor has a width of 214.9 mm.

What is the depth of the TP-Link EAP110-Outdoor?

The TP-Link EAP110-Outdoor has a depth of 46 mm.

How can I connect my TP-Link EAP110-Outdoor access point to the internet?

To connect your access point to the internet, you need to connect the Ethernet cable from your modem or router to the WAN port of the access point.

What should I do if the LED lights on my access point are not turning on?

If the LED lights are not turning on, make sure the access point is connected to a power source and the power switch is turned on. If the issue persists, check the power outlet and the power cable for any faults.

How can I change the wireless network name (SSID) of my access point?

To change the SSID of your access point, you need to access the web-based management interface. Open a web browser, enter the default IP address of the access point in the address bar, and then navigate to the wireless settings section to modify the SSID.

How do I set up a password for my wireless network?

To set up a password for your wireless network, access the web-based management interface, navigate to the wireless security settings, and select a security protocol such as WPA2. Then, enter a strong password in the designated field to ensure secure access to your network.

Can I extend the range of my TP-Link EAP110-Outdoor access point with additional devices?

Yes, you can extend the range of your access point by setting up a mesh network with compatible devices, such as TP-Link EAP110-Outdoor access points. This allows you to provide seamless coverage and expand your wireless network to reach areas with weaker signals.

Does the TP-Link EAP110-Outdoor have Power over Ethernet (PoE)?

Yes, this means that the access point can receive power and transmit data through a single Ethernet cable, making installation easier and more flexible for the user.

Does the TP-Link EAP110-Outdoor support both 2.4 GHz and 5 GHz frequencies?

No, the access point only supports the 2.4 GHz frequency, which may limit the user’s options for connecting to wireless networks with higher speeds and less interference.

Does the TP-Link EAP110-Outdoor have a reset button?

Yes, this allows the user to easily reset the access point to its factory settings, which can be useful for troubleshooting or starting fresh with configuration.

What is the output voltage and current of the TP-Link EAP110-Outdoor?

The access point has an output voltage of 24 V and an output current of 0.6 A. This ensures that it can provide sufficient power to operate reliably.

How many antennas does the TP-Link EAP110-Outdoor have?

The access point has 2 external antennas, which can help improve the signal strength and coverage area compared to access points with fewer or internal antennas.

Is the manual of the TP-Link EAP110-Outdoor available in English?

Yes, the manual of the TP-Link EAP110-Outdoor is available in English .

Is your question not listed? Ask your question here

Понравилась статья? Поделить с друзьями:

Это тоже интересно:

  • Tp link cpe210 инструкция на русском
  • Tp link tl mr3020 инструкция на русском языке
  • Toshiba ct 90326 телевизор инструкция
  • Tp link deco m9 plus инструкция
  • Torrent инструкция на русском языке

  • Подписаться
    Уведомить о
    guest

    0 комментариев
    Старые
    Новые Популярные
    Межтекстовые Отзывы
    Посмотреть все комментарии