Online Help
Organization of the Configuration Web:
System
System > System
Information
- Fields "Name", "Description", and "Location" are used for menmonic
purpose. It is recommended to have different values in each wireless device you have.
- Time settings allow SYSTEM's system time synchronized with NTP server or
manually set. When NTP server is used, NTP server1 must be filled.
System > Network
Determine the way to obtain the IP
address, by DHCP or manually set.
- Mode: Static or DHCP
- DHCP: The option is provided when a DHCP server
is provided in the network. The following IP address/Netmask/Gateway setting will be disabled.
- Static: Static setting is set these parameters manually. The basic parameters need to provide such as IP address, subnet mask and Gateway.
- Primary and Secondary DNS Server: Please provide at least one DNS server's IP address.
- Layer 2 STP: Depends on the configuration of SYSTEM(including wired and wireless settings), when it is configured to bridge several networks, we need enable STP.
.
System > Management
Services
For easier maintenance, SNMP and remote syslog services are provided
in SYSTEM. SYSTEM can be managed remotely in a
centralized manner.
- VLAN for Management: The Ethernet traffic from SYSTEM can be tagged with VLAN tag with specific ID.
- SNMP Configuration: By enabling this SNMP service, the remote SNMP manager could
obtain SYSTEM's system status.
- Syslog Configuration: By enabling this service, specify a remote syslog server
which could accept system log messages from SYSTEM remotely. Therefore, by reading
the syslog message in the remote server, review activities of all installed SYSTEM in the network.
- Auto Reboot: This option can be enabled to reboot system automatically with preferred Reboot Time from drop-down list.
Wireless
Wireless > Overview
- An overall status is collected in this page. SYSTEM has 8 Virtual APs (VAP), each has its own settings. In the table, we can click on the "Advanced Setting" to have detailed configuration of these VAPs respectively.
Wireless > General
The item in this page is for SYSTEM's RF settings.
Normally, the available RF configurations can be illustrated as:
Band |
SSID |
Short Preamble |
Channel |
Max Transmit Rate |
Transmit Power |
Disable |
N/A |
N/A |
N/A |
N/A |
N/A |
802.11b |
To-be-associated AP's SSID
|
Disable/Enable |
Auto, 1~11, 13, or 14 |
1M, 2M, 5.5M, 11M |
Auto, Lowest, Low, Medium, High, Highest |
802.11g |
To-be-associated AP's SSID
|
Disable/Enable |
Auto, 1~11 or 13 |
6M, 9M, 12M, 18M, 24M, 36M, 48M, 54M |
802.11b+802.11g |
To-be-associated AP's SSID |
Disable/Enable |
Auto, 1~11, 13, or 14 |
1M, 2M, 5.5M, 6M, 9M, 11M, 12M, 18M, 24M, 36M, 48M, 54M |
Wireless > VAP Configuration
- Profile Setting: Enable or disable virtual AP settings.
- Profile Name: Give the profile an identity for management purpose.
- ESSID: Indicate the ESSID which the clients used to connect to the VAP. ESSID will determine the service type of a client which assigned to the specified VAP.
- VLAN ID: SYSTEM supports tagged VLAN. To enable VLAN function, each VAP needs a unique VLAN ID; valid values are from 1 to 4094.
Wireless > Security
SYSTEM supports various authentication and data encryption methods. The security type includes:
- None: No authentication is required.
- WEP: Support key length of 64/128bits.
- 802.1X: Dynamic WEP can be enabled to provide data encryption while the authentication is taken care by provided RADIUS server. If "0" is input as Accounting Interim Update Interval, the system will follow the settings of radius server.
- WPA-PSK: Support pre-shared key authentication and WPA data encryption (TKIP/AES).
- WPA-RADIUS: Cipher for data encryption can be chosen from WPA Settings while the authentication is taken care by provided RADIUS server. If "0" is input as Accounting Interim Update Interval, the system will follow the settings of radius server.
- MAC: If this option is chosen, the user's MAC will be authenticated by provided RADIUS server.
Wireless > Repeater
- Repeater Type: SYSTEM support 3 options of repeater setting, namely None, WDS, or Universal Repeater.
- WDS: This device
supports up to 4 WDS peers. After providing WDS peer's MAC
address, click on "Add" to add this link to the table shown on UI.
Security type can be none, WEP or WPA.
- Universal Repeater:
Please provide the SSID of upper-bound AP and select security type
(None, WEP, or WPA-PSK). Site-survey tool will assist
to provide necessary information in this regard.
Wireless > Advanced
In most circumstance, the default settings can meet general requirements. If
occasionally wireless network needs to be tuned, the
following parameters will assist with that purpose.
- Beacon Interval: The value can be specified from 100~500ms. Between each Beacon Interval, the frame is transmitted.
- RTS Threshold: To control station access to the medium and to alleviate
this effect of the hidden terminal problem, the administrator can tune this RTS threshold
value. It can be configured between 1-2346 and is default at 2346.
- Fragment Threshold: A unicast frame larger than this threshold
will be fragmented before transmission. If a significant number of
collisions are occurring, the administrator can try to set a smaller value of the threshold to see whether it helps.
- Broadcast SSID: Disable this option will prevent SSID broadcast to the public.
- Station Isolation: By enabling this item, all stations associated with this AP can not
communicate with each other.
- IAPP: To provide a
better roaming capability for the stations among different APs
nearby, this item can be enabled to assist.
- 802.11g Protection:
Associated stations with 802.11g will be benefited by enabling
this option since their transmission rate will not be affected with
surrounding existence of 802.11b stations.
Wireless > Access Control
- Access Control Type: Three
types (Disable, Allow List, or Deny List) are supported. Under
Allow List or Deny List, users with provided MAC addresses will be
allowed or denied to access this SYSTEM.
Wireless > Site Survey
Site Survey is an useful
tool to provide information about the surrounding wireless environment;
available APs are shown with their respective SSID, MAC Address, Channel, Rate setting, Signal reading, and Security type. The administrator can click Setup or Connect to configure the wireless connection according to the aforementioned readings.
Firewall
Firewall > Firewall List
Enable Layer 2 Firewall: If the function is enabled, the firewall rules in the list with checked state will be enforced.
Firewall > Service
Firewall Service: It
provides a list of rules to block or pass traffics of layer-3 or above
protocols. These services are available to choose from drop-down
list of layer 2 firewall rule edit page with EtherType to be IPv4.
The first 28 entries are default services and the administrator
can add/delete any extra desired services.
Firewall > Advanced Firewall Settings
- Trust Interface: VAP1~8,
WDS1~4, and LAN are available to check individually as trust interface;
trust interface will not carry out DHCP snooping and ARP inspection.
- DHCP Snooping: If
enabled, only DHCP replies from listed trusted DHCP MAC/IP pairs will
be accepted; verification will be performed only on non-trusted
interfaces.
- ARP Inspection: If enabled, MAC identity will be validated on ARP replies from non-trusted interfaces.
- Trust List Broadcast:
If ARP inspection is enabled, this option can be enabled to broadcast
valid MAC/IP binding pairs previously inspected to all interfaces.
- Static Trust List: If
ARP inspection is enabled, this option can be enabled to provide static
MAC/IP binding pairs that can be accepted in non-trusted interfaces.
Utilities
Utilities > Password
The administrator can update or change password.
Utilities > Network Utilities
The current provided network utility is Ping and the target host FQDN-compliant name or IP address can be provided to test network connection.
Utilities > Config
Save Restore
The system can be restored to the default setting by clicking on Reset. The settings of the device can be backuped to a file. This file can be saved
for future use. It can be used to duplicate settings to the other SYSTEM devices
(backup settings and then restore in another device).
Utilities > System Upgrade
The first step is to acquire the correct firmware file and supply it
in the UI field. During firmware update, please don't trun off
the power to prevent from damaging the device permanently.
Utilities > Reboot
At this page, the administrator can reboot the device remotely.
Status
Status > System
Overview
This section provides an overview of the system for the administrator.
The description of the table is in the following:
Item |
Description |
Ststem Name |
The name provided in System Information. |
Firmware Version |
The present firmware version of SYSTEM. |
Build Number |
The Build Number of the firmware. |
Location |
The location provided in System Information. |
Site |
The firmware version for specific region. |
Device Time |
The current time on the device. |
System Up Time |
The system elapsing time since last reboot. |
LAN Interface |
MAC Address |
The MAC address of LAN interface. |
IP Address |
The IP address of the LAN interface. |
Subnet Mask |
The Subnet Mask of the LAN interface. |
Gateway |
The gateway of the LAN interface |
Radio Status |
MAC Address |
The MAC address of RF interface. |
Band |
The operating band. |
Channel |
The operating channel. |
TX Power |
The level of transmitted power. |
AP Status |
BSSID |
The BSSID (MAC) of AP. |
ESSID |
The assigned ESSID of AP. |
Security Type |
The security type of AP. |
Online Clients |
The number of online clients associated with AP. |
Status > Clients
Associated client's MAC, SNR, and Idle Time are listed in the UI table.
Status > Repeater
Information of repeater's status, mode, and encryption is provided.
Status > Event Log
Event log provides the records of system activities.
In the log, each line represents an event record; within each line,
there are 4 fields:
- Date/Time: The date & time of the record when the event happened
- Hostname: Indicate which host records this event. Note that all
events in this page are local event and this field of all events are the same.
However, in remote syslog service, this field will help the network administrator identify which
event is from this SYSTEM.
- Process Name (with square brackets): Indicate the process with which the specific event is associated.
- Description: Description of this event.
To save the Event Log to the administrator's computer or to clear all listed records, press Save
Log or Clear button respectively.