EKI-6311GN IEEE 802.11 b/g/n Wireless Access Point/Client Bridge User Manual EKI-6311GN-User_Manual V2.
Copyright The documentation and the software included with this product are copyrighted 2010 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd. Information provided in this manual is intended to be accurate and reliable.
Product Warranty (2 years) Advantech warrants to you, the original purchaser, that each of its products will be free from defects in materials and workmanship for two years from the date of purchase. This warranty does not apply to any products which have been repaired or altered by persons other than repair personnel authorized by Advantech, or which have been subject to misuse, abuse, accident or improper installation.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Technical Support and Assistance Step 1. Visit the Advantech web site at www.advantech.com/support where you can find the latest information about the product. Step 2. Contact your distributor, sales representative, or Advantech’s customer service center for technical support if you need additional assistance.
Safety Precaution - Static Electricity Follow these simple precautions to protect yourself from harm and the products from damage. 1. To avoid electrical shock, always disconnect the power from your PC chassis before you work on it. Don't touch any components on the CPU card or other cards while the PC is on. 2. Disconnect power before making any configuration changes. The sudden rush of power as you connect a jumper or install a card may damage sensitive electronic components. EKI-6311GN-User_Manual V2.
Contents CHAPTER 1 1.1 1.2 1.3 1.4 1.5 INTRODUCTION ............................................................................................................................. 4 FEATURES .................................................................................................................................... 4 SPECIFICATION .............................................................................................................................. 5 PACKING LIST................................
6.2 VIEW ASSOCIATION LIST ............................................................................................................... 54 VIEW NETWORK FLOW STATISTICS .............................................................................................................. 55 VIEW ARP TABLE .................................................................................................................................... 56 VIEW BRIDGE TABLE ...........................................................
CHAPTER Overview EKI-6311GN-User_Manual V2.
Chapter 1 Overview 1.1 Introduction EKI-6311GN is a feature rich wireless AP/ CPE which provides a reliable wireless connectivity for industrial environments. The PoE injector enhances flexibility in deployment of this AP/ CPE even where the DC power supply is hard to fulfill. As an 802.11n compliant device, EKI-6311GN provides 3 times higher data rates than legacy 802.11g devices.
1.3 Specification Standard Support Wireless IEEE802.11b/g/n Ethernet IEEE802.3u MDI / MDIX 10/100 Fast Ethernet LAN IEEE802.11b/g/n wireless LAN interface Passive 12V PoE, max. Distance: 20 meters Certifications US FCC Part 15 Class B & C & E Europe ETSI 300 328, ETSI 301 489-1&17 EN 60950 compliant and CE Mark Data Rates 802.11b 11, 5.5, 2, 1 Mbps, auto-fallback 802.11g 54, 48, 36, 24, 18, 12, 9, 6 Mbps, auto-fallback 802.11n: 6M, 6.5M, 13M, 13.5M, 19.5M, 26M, 27M, 39M,40.5M, 53M, 54M, 58.
Wireless Transmission Rates Transmitted Power o 802.11b: 26dBm o 802.11g: 26dBm @ 6Mbps, 24dBm @ 54Mbps o 802.11gn HT20: 26dBm @ MCS0, 22dBm@ MCS7 o 802.11gn HT40: 26dBm @ MCS0, 21dBm@ MCS7 Receiver Sensitivity 802.11b Sensitivity -93dBm @ 1Mbps; -88dBm @ 11Mbps 802.11g Sensitivity -89dBm @ 6Mbps; -73dBm @ 54Mbps 802.11n HT20 -88dBm @ MCS0; -70dBm @ MCS7 802.11n HT40 -84dBm @ MCS0; -67dBm @ MCS7 1.4 Packing List The product package you have received should contain the following items.
Start up manual & User’s manual CD N-to-RSMA adaptor RSMA Omni Antenna Figure 2 Accessories Warning: Users MUST use the “Power cord & PoE Injector” shipped in the box with the EKI-6311GN. Use of other options will cause damage to the EKI-6311GN. 1.5 Safety Precaution Attention IF DC voltage is supplied by other power injector, please check the voltage and use a protection device on the power supply input. EKI-6311GN-User_Manual V2.
CHAPTER Installation EKI-6311GN-User_Manual V2.
Chapter 2 Installation This chapter describes safety precautions and product information you have to know and check before installing EKI-6311GN. 2.1 Preparation before Installation Professional Installation Required Please seek assistance from a professional installer who is well trained in the RF installation and knowledgeable in the local regulations. Safety Precautions 1. To keep you safe and install the hardware properly, please read and follow these safety precautions. 2.
2.2 Installation Precautions To keep the EKI-6311GN well while you are installing it, please read and follow these installation precautions. 1. Users MUST use a proper and well-installed surge arrestor with the EKI-6311GN; otherwise, a random lightening could easily cause fatal damage to EKI-6311GN. EMD (Lightning) DAMAGE IS NOT COVERED UNDER WARRNTY. 2. Users MUST use the “Power cord & PoE Injector” shipped in the box with the EKI6311GN. Use of other options will cause damage to the EKI-6311GN. 3.
Figure 4 Cable Connection 3. Slide the cover back to seal the bottom of the EKI-6311GN. Figure 5 Seal the Bottom 4. Plug the power cord into the DC port of the PoE injector as the following right picture shows. Figure 6 Connect to PoE Injector 5. Plug the other side of the Ethernet cable as shown in Step 3 into the PoE port of the PoE injector and get the complete set ready. EKI-6311GN-User_Manual V2.
Figure 7 Complete Set EKI-6311GN-User_Manual V2.
2.4 Pole Mounting Pole Mounting 1. Turn the EKI-6311GN over. Put the pole mounting ring through the middle hole of it. Note that you should unlock the pole mounting ring with a screw driver before putting it through EKI6311GN as the following right picture shows. Figure 8 Pole Mounting – Step 1 2. Mount EKI-6311GN steadily to the pole by locking the pole mounting ring tightly. Figure 9 Pole Mounting – Step 2 3. Now you have completed the hardware installation of EKI-6311GN.
Using the External Antenna If you prefer to use the external antenna for your application instead of the built-in directional antenna, please follow the steps below. • Grab the black rubber on the top of EKI-6311GN, and slightly pull it up. The metal N-type connector will appear. Figure 10 Move the Rubber • Connect your antenna with the N-type to RSMA adaptor on the top of EKI-6311GN. The following picture shows the full set of EKI-6311GN: Figure 11 Removed the Rubber EKI-6311GN-User_Manual V2.
Note: If you are going to use an external antenna on EKI-6311GN, get some cable in advance. Be aware of the force you use while connecting to the N-type connector, inappropriate force may damage the N-type connector! Warning: Users MUST power off the EKI-6311GN first before connecting the external antenna to it.
CHAPTER Basic Settings EKI-6311GN-User_Manual V2.
Chapter 3 Basic Settings 3.1 Factory Default Settings We’ll elaborate the EKI-6311GN factory default settings. You can re-acquire these parameters by default. If necessary, please refer to the “Restore Factory Default Settings”. Table 1 EKI-6311GN Factory Default Settings Features Username Password Wireless Device Name Operating Mode Data Rate IP Address Subnet Mask LAN Gateway Primary DNS Server Secondary DNS Server Spanning Tree 802.
Configure the computer with a static IP address of 192.168.1.x, as the default IP address of EKI6311GN is 192.168.1.1. (X cannot be 0, 1, nor 255); A Web browser on PC for configuration such as Microsoft Internet Explorer 6.0 or above, Netscape, Firefox or Google Chrome. 3.3 How to Login the Web-based Interface The EKI-6311GN provides you with user-friendly Web-based management tool. Open Web browser and enter the IP address (Default: 192.168.1.1) of EKI-6311GN into the address field.
Figure 14 Main Page Note: The username and password are case-sensitive, and the password should be no more than 19 characters! 3.4 Basic System Settings For users who use the EKI-6311GN for the first time, it is recommended that you begin configuration from “Basic Settings” in “System” shown below: Figure 15 Basic System Settings Basic Settings EKI-6311GN-User_Manual V2.
Device Name: Specify the device name, which is composed of no more than 15 characters with (0-9), (A-Z), (a-z) or (-). Network Mode: Specify the network mode, including Bridge and Router. It is easy to configure parameters in Bridge Mode; however, users must pay extra attention to the way they configure the device when it is set to Router Mode. For details, please refer to TCP/IP Settings”. Ethernet Data Rate: Specify the transmission rate of data for Ethernet. Default is Auto.
Note: When the IP address of the CPE is changed, the clients on the network often need to wait for a while or even reboot before they can access the new IP address. For an immediate access to the bridge, please flush the netbios cache on the client computer by running the “nbtstat –r” command before using the device name of the CPE to access its Web Management page. In case the IEEE 802.
DHCP Subnet Mask, DHCP Gateway and Lease Time (15-44640 minutes). A DHCP relay agents is used to forward DHCP requests and replies between clients and servers when they are not on the same physical subnet. To enable the DHCP relay agent, check the “Enable DHCP Relay” checkbox and enter the IP address of the DHCP server. Warning: In AP mode, the IEEE 802.11b/g/n Wireless Outdoor CPE must establish connection with another wireless device before it is set to Router mode.
Time Zone Select Select the time zone from the dropdown list. NTP Server Select the time server from the “NTP Server” dropdown list or manually input the IP address of available time server into “Manual IP”. Hit “Apply” to save settings. 3.5 RADIUS Settings RADIUS (Remote Authentication Dial-In User Service) is a server for remote user authentication and accounting; playing a central role in the network in providing the capabilities of authenticating, authorizing, accounting, auditing, alarming and etc.
Global-Key Update: Check this option and specify the time interval between two global-key updates. 3.6 Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an untrusted network. EKI-6311GN has capabilities of Source IP Filtering, Destination IP Filtering, Source Port Filtering, Destination Port Filtering, Port Forwarding as well as DMZ.
Figure 21 Destination IP Filtering Source Port Filtering: The source port filtering enable you to restrict certain ports of data packets from your local network to Internet through EKI-6311GN. Use of such filters can be helpful in securing or restricting your local network. Figure 22 Source Port Filtering Destination Port Filtering: The destination port filtering enables you to restrict certain ports of data packets from your local network to Internet through EKI-6311GN.
Figure 23 Destination Port Filtering Port Forwarding: The port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings ne are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind EKI6311GN’s NAT firewall. Figure 24 Port Forwarding 3.7 Basic Wireless Settings EKI-6311GN-User_Manual V2.
Open “Basic Settings” in “Wireless” as below to make basic wireless configuration. Figure 25 Basic Wireless Settings Disable Wireless LAN Interface Check this option to disable WLAN interface, then the wireless module of EKI-6311GN will stop working and no wireless device can connect to it. Wireless Mode Four operating modes are available in EKI-6311GN. AP: The EKI-6311GN establishes a wireless coverage and receives connectivity from other wireless devices.
HT Protect Enable HT (High Throughput) protect to ensure HT transmission with MAC mechanism. Under 802.11n mode, wireless client can be divided into HT STA and Non-HT STA, among which the one with HT protect enabled gets higher throughput. Note: • STA stands for Station which is referred to wireless clients connecting to Access Point. Frequency/Channel Channel varies much as the available band differs from country to country.
Extension Channel Protection Mode This is to avoid conflict with other wireless network and boost the ability of your device to catch all 802.11g transmissions. However, it may decrease wireless network performance. Compared to CTS-Self; the transmission amount of CTS-RTS is much lower. Enable MAC Clone Available only under wireless client mode, it hides the MAC address of the AP while displays the one of associated wireless client or the MAC address designated manually. 3.
Figure 4 VAP Profile Settings Figure 28 VAP Profile Settings Basic Setting Profile Name: Name of the VAP profile Wireless Network Name: Enter the virtual SSID for the VAP Broadcast SSID: In AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk. By disabling broadcast SSID, the STA cannot scan and EKI-6311GN-User_Manual V2.
find the IEEE 802.11b/g/n Wireless Outdoor CPE, so that malicious attack by some illegal STA could be avoided. Wireless Separation: Wireless separation is an ideal way to enhance the security of network transmission. Under the mode except wireless client mode, enable “Wireless Separation” can prevent the communication among associated wireless clients. WMM Support: WMM (Wi-Fi Multimedia) is a subset of 802.11e.
CHAPTER Advanced Settings EKI-6311GN-User_Manual V2.
Chapter 4 Advanced Settings 4.1 Advanced Wireless Settings Open “Advanced Settings” in “Wireless” to make advanced wireless settings. Figure 6 Advanced Wireless Settings A-MPDU/A-MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled; however, if your wireless clients don’t support A-MPDU/A-MSDU aggregation, it is not recommended to enable it. Short GI Under 802.
Specify the maximum size in byte for a packet before data is fragmented into multiple packets. Setting it too low may result in poor network performance. Leave it at its default of 2346 is recommended. Beacon Interval Specify the frequency interval to broadcast packets. Enter a value between 20 and 1024. DTIM Interval DTIM, which stands for Delivery Traffic Indication Message, is contained in the data packets. It is for enhancing the wireless transmission efficiency. The default is set to 1.
LAN2LAN CPE LAN2LAN CPE mode enables packet forwarding at layer 2 level. It is fully transparent for all the Layer2 protocols. Space in Meter To decrease the chances of data retransmission at long distance, the EKI-6311GN can automatically adjust proper ACK timeout value by specifying distance of the two nodes. Flow Control It allows the administrator to specify the incoming and outgoing traffic limit by checking “Enable Traffic Shaping”. This is only available in Router mode.
Network Authentication Open System: It allows any device to join the network without performing any security check. Shared Key: Data encryption and key are required for wireless authentication (Not available in Bridge/AP Repeater mode). Legacy 802.1x: Available in AP/Wireless Client mode, it provides the rights to access the wireless network and wired Ethernet.
Note: We strongly recommend you enable wireless security on your network! Only setting the same Authentication, Data Encryption and Key in the EKI-6311GN and other associated wireless devices, can the communication be established! Access Control The Access Control appoints the authority to wireless client on accessing EKI-6311GN, thus a further security mechanism is provided. This function is available only under AP mode. Open “Access Control” in “Wireless” as below.
WDS Settings Extend the range of your network without having to use cables to link the Access Points by using the Wireless Distribution System (WDS): Simply put, you can link the Access Points wirelessly. Open “WDS Settings” in “Wireless” as below: Figure 33 WDS Settings Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and click “Apply” to save settings. Note: WDS Settings is available only under Bridge and AP Repeater Mode.
CHAPTER Management EKI-6311GN-User_Manual V2.
Chapter 5 Management Remote Management The IEEE 802.11b/g/n Wireless Outdoor CPE provides a variety of remotes managements including Telnet, SNMP, FTP, SSH, HTTPS and exclusive WISE tool, making configuration more convenient and secure. With Normal selected, Telnet, SNMP and FTP are activated as default remote management options. To use secure management tools such as SSH, HTTPS and WISE, please select “Secure”. You may also choose “Customized” to enable any methods as desired.
Figure 35 SNMP Configuration Protocol Version Select the SNMP version, and keep it identical on the EKI-6311GN and the SNMP manager. The EKI-6311GN supports SNMP v2/v3. Server Port Change the server port for a service if needed; however you have to use the same port to use that service for remote management. Get Community Specify the password for the incoming Get and GetNext requests from the management station. By default, it is set to public and allows all requests.
Figure 9 Configure SNMPv3 User Profile User Name Specify a user name for the SNMPv3 administrator or user. Only the SNMP commands carrying this user name are allowed to access the EKI-6311GN. Password Specify a password for the SNMPv3 administrator or user. Only the SNMP commands carrying this password are allowed to access the EKI-6311GN. Confirm Password Input that password again to make sure it is your desired one. Access Type Select “Read Only” or “Read and Write” accordingly.
Coovachilli Settings Coovachilli is a captive portal management which allows WLAN users to easily and securely access the Internet. Under Router mode, when Coovachilli is enabled, the IEEE 802.11b/g/n Wireless Access Point will force an HTTP client on a network to see a special web page (usually for authentication purposes) before using the Internet normally. At that time the browser is redirected to a web page which may require authentication. Captive portals are used at most Wi-Fi hotspots.
Enter the secret key of the radius server Radius NAS ID: Enter the name of the radius server if any Radius Administrative-User Radius Admin Username: Enter the username of the Radius Administrator Radius Admin Password: Enter the password of the Radius Administrator Captive Portal UAM Portal URL: Enter the address of the UAM portal server UAM Secret: Enter the secret password between the redirect URL and the Hotspot.
Click “Upload” to start the upload process; Wait a moment, the system will reboot after successful upgrade. Note: Do NOT cut the power off during upgrade, otherwise the system may crash! Backup/ Retrieve Settings It is strongly recommended you back up configuration information in case of something unexpected. If tragedy hits your device, you may have an access to restore the important files by the backup. All these can be done by the local or remote computer.
Restore Factory Default Settings The EKI-6311GN provides two ways to restore the factory default settings: Restore factory default settings via Web From “Configuration File”, clicking “Reset” will eliminate all current settings and reboot your device, then default settings are applied. Figure 13 Restore Settings Restore factory default settings via Reset Button If software in EKI-6311GN is unexpectedly crashed and no longer reset the unit via Web, you may do hardware reset via the reset button.
Figure 14 Reboot Password From “Password Settings” in “Management”, you can change the password to manage your EKI6311GN. Enter the new password respectively in “New Password” and “Confirm Password” fields; click “Apply” to save settings. Figure 15 Password Note: EKI-6311GN-User_Manual V2.
The password is case-sensitive and its length cannot exceed 19 characters! Certificate Settings Under Client mode, when EAP-TLS is used, the RADIUS server must know which user certificates to trust. The Server can trust all certificates issued by a given CA. To import a user certificate, from Import User Certificates, click “Browse” and specify the location where the user certificate is placed. Click “Import”.
Figure 17 System Log Remote Syslog Server Enable Remote Syslog: Enable System log to alert remote server. IP Address: Specify the IP address of the remote server. Port: Specify the port number of the remote server. EKI-6311GN-User_Manual V2.
Site Survey Only available under Wireless Client mode, site survey allows you to scan all the APs within coverage. Open “Site Survey” in “Tools” as below and select the desired AP to connect. Figure 18 Site Survey Ping Watch Dog If you mess your connection up and cut off your ability the log in to the unit, the ping watchdog has a chance to reboot due to loss of connectivity. Figure 19 Ping Watchdog EKI-6311GN-User_Manual V2.
Ping Watchdog Enable Ping Watchdog: To activate ping watchdog, check this checkbox. IP Address to Ping: Specify the IP address of the remote unit to ping. Ping Interval: Specify the interval time to ping the remote unit. Startup Delay: Specify the startup delay time to prevent reboot before the EKI-6311GN is fully initialized. Failure Count To Reboot: If the ping timeout packets reached the value, the EKI-6311GN will reboot automatically.
Figure 21 Antenna Alignment Speed Test The speed test is to monitor the current data transmission (TX) and data reception (RX) rate with the remote 802.11an Wireless Outdoor CPE. Enter the IP address of the remote CPE, type in the user name/password and click “Test”. The result will display in the bottom STATUS. You may test single TX/RX or bi-direction. Figure 22 Speed Test EKI-6311GN-User_Manual V2.
CHAPTER Status EKI-6311GN-User_Manual V2.
Chapter 6 Status 6.1 View EKI-6311GN Basic Information Open “Information” in “Status” to check the basic information of EKI-6311GN, which is read only. Click “Refresh” at the bottom to have the real-time information. Figure 50 Basic Information 6.2 View Association List Open “Association List” in “Connection” from “Status” to check the information of associated wireless clients. All is read only. Click “Refresh” at the bottom to view the current association list. EKI-6311GN-User_Manual V2.
Figure 51 Connection By clicking on the MAC address of the selected device on the web you may see more details including device name, connection time, signal strength, noise floor, ACK timeout, link quality, IP information, current data rate, current TX/RX packets. View Network Flow Statistics Open “Statistics” in “Status” to check the data packets received on and transmitted from the wireless and Ethernet ports. Click “Refresh” to view current statistics. EKI-6311GN-User_Manual V2.
Figure 23 Network Flow Statistics Poll Interval Specify the refresh time interval in the box beside “Poll Interval” and click “Set Interval” to save settings. “Stop” helps to stop the auto refresh of network flow statistics. View ARP Table Open “ARP Table” in “Status” as below. Click “Refresh” to view current table. EKI-6311GN-User_Manual V2.
Figure 24 ARP Table View Bridge Table Open “Bridge Table” in “Status” as below. Click “Refresh” to view current connected status.. Figure 25 Bridge Table EKI-6311GN-User_Manual V2.
View Active DHCP Client Table Open “DHCP Clients” in “Status” as below to check the assigned IP address, MAC address and time expired for each DHCP leased client. Click “Refresh” to view current table. Figure 26 DHCP Client Table View Network Activities The network activities allows you to monitor the current Wireless and Ethernet TX/RX data traffic in graphical and numerical form on the Web of the Skyport.
Figure 27 Network Activities EKI-6311GN-User_Manual V2.
CHAPTER Trouble Shooting EKI-6311GN-User_Manual V2.
Chapter 7 Trouble shooting This chapter provides trouble shooting procedures for basic problems with the EKI-6311GN. For warranty assistance, contact your service provider or distributor for the process. Q 1. How to know the MAC address of EKI-6311GN? MAC Address distinguishes itself by the unique identity among network devices. There are two ways available to know it. • Each device has a label posted with the MAC address. Please refer below. Figure 47 MAC Address Q 2.
EKI-6311GN face to the direction where the AP is to get the best connection quality. • In addition, you can start “Site Survey” in “Wireless Basic Settings” to check the signal strength. If it is weak or unstable (The smaller the number is, the weaker the signal strength is.), please join other available AP for better connection. EKI-6311GN-User_Manual V2.
Appendix A. ASCII WEP can be configured with a 64-bit, 128-bit or 152-bit Shared Key (hexadecimal number or ACSII). As defined, hexadecimal number is represented by 0-9, A-F or a-f; ACSII is represented by 0-9, A-F, a-f or punctuation. Each one consists of two-digit hexadecimal. Table 2 ACSII ASCII Character ! " # $ % & ‘ ( ) * + , .
Appendix B.
√ dhcpclienth ostname pppoeconn ectstatus pppoelocali p pppoestatic ipaddr pppoeuser name pppoepass word pppoeserv ername pppoeconn ectmode pppoeidleti me √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -lan -ipaddr -netmask dhcpserver enable dhcpserveri pstart dhcpserveri pend dhcpserverl easetime dhcprelaye nable dhcpserveri p wlan -operationmode -ssid -ssidhided -radio -wirelessmode -HTprotect -frequency/channel EKI
√ √ √ √ √ √ √ √ √ √ -power -rate -antenna -antennaGain -wmm √ √ -Isolation √ √ -maxStaNum √ √ -StaNumLmt √ √ -spaceInMeter √ √ -LinkIntegration √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -channelMode -channelOffset -extension -A-MPDU -A-MSDU -shortGI -RIFS -RTS -fragment -beacon -DTIM -preamble -IGMP -stdm -cpeType √ √ -authentication √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -reauthtime √ √ -keyupdate √ √ √ √ √ √ √ √ √ √ -encrypt
pe √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -username -loginname -password -usercert privatekeyp assword -trafficshaping -enable -downlimit -downburst -uplimit -upburst -wdsMac -local -remote1 -remote2 -remote3 -remote4 √ √ √ √ √ -wdsSeparation √ -association vapprofile 1(2, 3,etc) √ √ √ √ √ √ √ √ -active -profileName -ssid √ √ -ssidhided √ √ √ √ √ √ √ √ -vlanID -Isolation -wmm -MaxStaNum √ √ -StaNumLmt √ √ -authentication √ √ -encryption √ √ -default √
√ √ √ √ √ -enable -addrule -delerule √ -rulelist √ √ √ √ -enable √ √ -addrule √ -delerule -destipfilter √ -rulelist √ √ √ √ √ √ -addrule √ -delerule -srcportfilter -enable √ -rulelist √ √ √ √ -enable √ √ -addrule √ -delerule -destportfilter √ √ √ √ -rulelist √ √ √ √ -portforward -enable -addrule -delerule √ -rulelist √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -dmzenable -dmzipaddr remote -privacy -telnet -snmp -ftp -ssh -forcehttps -wise snm
√ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ -trapdestination -trapcommunity -v3Admin -on -name -password accessTyp e authenticati on -Privacy --access type -on -name -password accessTyp e authenticati on -Privacy --access type -v3User coovachilli -coovaChilliEnable primaryRadiusServe r secondaryRadiusSer ver -radiusAuthPort -radiusAcctPort -radiusSharedSecret -radiusNasid r
√ √ √ √ √ √ √ -ip √ acl -mode √ -delete √ -list √ -MacAddr √ √ √ statistics -Wireless -Ethernet √ √ √ √ √ √ log list password reset reboot exit EKI-6311GN-User_Manual V2.
Appendix C. GPL Declamation PUBLIC SOFTWARE DECLAMATION In the software we delivered, there may contains some public software, if it is, please read below carefully: 1. Definition “Public Software”, when applicable, shall mean that portion of the Licensed Software, in source code form, set forth in the below Table, and provided under the terms set forth in the Section 5, the indicated website, the complete license terms can be found.
5. Public Software Name and Description Table 4 Public Software Name and Description Program Name Copy Right Description Origin Sour Code Redboot Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003 Red Hat, Inc. ftp://ftp.ge s.redhat.c om/private /gnuproxscale030422/red boot-intelxscale030630.tar. Z http://www .busybox. net/downl oads/busy box1.01.tar.bz 2 http://nchc .dl.sourcef orge.net/s ourceforg e/bridge/br idge-utils1.0.6.tar.gz http://matt. ucc.asn.au /dropbear/ dropbear0.51.tar.
procps Author: Albert Cahalan, Michael K. Johnson, Jim Warner, etc. vsftpd Author: Chris Evans linux EKI-6311GN-User_Manual V2.1 94.tar.gz http://proc ps.sourcef orge.net/p rocps3.2.7.tar.gz ftp://vsftpd .beasts.or g/users/ce vans/vsftp d1.1.2.tar.gz ftp://ftp.ker nel.org/pu b/linux/ker nel/v2.6/lin ux2.6.20.3.tar .bz2 GNU GENERAL PUBLIC LICENSE Version 2 GNU LIBRARY GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 http://www.gnu.