ADD OBSTANCE Concrete Wall (12dB)
Topology Network topology is a powerful tool to provide administrators a graphic overview of the logical network topology and the status of EnGenius devices. Use this screen to view the topology of the Org/Network. Click Manage > Topology to access this screen and double-click the organization/hierarchy view/network on the tree to change the scope.
The following describes the functions on this screen: Show label : Click to display or hide the device name & HW status on each device. HW status : Click to display or hide the POE Utilization on each switch. Redundant : Click to display or hide the redundant link . Other Devices : Click to display the third party devices as well as EWS series devices. Export : Click to download topology as PDF format .
Configuring Networks There’s a lot that EnGenius Cloud can do to customize a network to meet your specific needs. We’ll walk you through the most common settings here.
Configuring SSIDs
Facebook Wi-Fi Facebook login provides a social sign-on experience for users logging in to access points. You can use your Facebook page as the sign-in page when they first log in to your network. Users can then check in with their Facebook credentials, update their status, and ‘like’ the Facebook page. Configuring EnGenius Wi-Fi with Facebook Login After creating a Facebook page, Facebook Login is configured on the Configure > SSID > Click one of the SSID > Captive Portal by taking the following step: 1.
3. You will now see a link ‘Go to FB Wi-Fi Setup page’. Clicking on this link will take you to your Facebook Wi-Fi settings page. 4. If you are not logged into Facebook, you will be prompted to log into Facebook.
5. Once your Facebook page has been successfully paired with your SSID, the SSID page will update the Facebook Wi-Fi section with information about the paired page, along with an option to Unpair.
802.11 Settings 802.11r 802.11r is a standards-based fast roaming technology that is leveraged when using a secure SSID (WPA2-PSK & WPA2-Enterprise). This option improves client device roaming by reducing the handoff delay in situations where client devices roam from one access point to another. 802.11r is disabled by default on EnGenius Cloud. This feature can be enabled from the Configure > SSID page under Network Scope.
If this option cannot be enabled, please go to Wireless > Security Type to select WPA2 PSK or WPA2 Enterprise in advance. 802.11w 802.11w is enabled when Security Type is not Open. 802.
authentication, association, disassociation, beacon, and probe traffic. This enables APs to help prevent rogue devices from spoofing management frames from APs. Enable 802.11r will allow APs to begin utilizing Protected Management Frames for any clients that support 802.11w.
Configuring Security Security Type Click Configure > SSID > Click one of SSID > Wireless to access this screen. The following describes the authentication types on this screen: Open: Allows any client to associate with this network without any data encryption or authentication. WPA2 PSK: Enter a pre-shared key of 8-64 case-sensitive characters to enable WPA2PSK data encryption.
WPA3/WPA2 Personal mixed: WPA2/WPA3 mixed mode allows for the coexistence of WPA2 and WPA3 clients on a common SSID. The passphrase for both WPA2 and WPA3 clients remains the same, the AP just advertises the different encryption cyphers available to be selected for use by the client. Clients choose which cypher to use for the wireless connection.
Client IP Addressing NAT Mode In NAT mode, the EnGenius APs run as DHCP servers to assign IP addresses to wireless clients out of a private 172.x.x.x IP address pool behind a NAT. NAT mode should be enabled when any of the following is true: Wireless clients associated to the SSID only require Internet access, not access to local wired or wireless resources. There is no DHCP server on the LAN that can assign IP addresses to the wireless clients.
Configuring Custom DNS for an SSID in NAT Mode This allows you to set custom DNS servers for a NAT SSID, instead of using the AP's DNS server. This is typically used to forward NAT SSID clients to a DNS server with custom content filtering. Configuration 1. Navigate to Configure > SSID, then choose one SSID to customize the DNS settings. 2. Locate the Client IP mode and choose NAT mode then click Custom DNS.
3. Enter the preferred Custom DNS IP addresses. 4. Click Apply. Bridge Mode In bridge mode, the APs act as bridges, allowing wireless clients to obtain their IP addresses from an upstream DHCP server. Bridge mode should be enabled when the following is true: Wired and wireless clients in the network need to reach each other (e.g., a wireless laptop needs to discover the IP address of a network printer, or wired desktop needs to connect to a wireless surveillance camera).
User Cases Bridge mode works well in most circumstances, particularly for Roaming. and is the simplest option to put wireless clients on the LAN. Configuration 1. Navigate to Configure > SSID , then choose one SSID . 2. Locate the Client IP mode and choose Bridge mode then click Apply. If you configure Bridge mode on two or more SSIDs in the same network , it means that these Clients have IP addresses in the same subnet.
QoS Bandwidth Limit Bandwidth Limitation ensures that users do not consume more bandwidth than they should. We integrated bandwidth Limitation that enforces upload and download limits. Bandwidth Limitation can be applied per SSID or per user or both. When both SSID and Per Client bandwidth limit are set, that means when the total sum of client bandwidth is less than SSID bandwidth limit, per client can have a maximum of “per client bandwidth limit”.
Set the maximum upload stream limit for traffic from the SSID or Per user .
Captive Portal A captive portal can intercept network traffic until a user authenticates his/her connection, usually through a specifically designated login page. Click Configure > SSID > Captive Portal to access this screen. Authentication Type Click-through: User must view and acknowledge your splash page before being allowed on the network. EnGenius Authentication: User must enter a username and password before being allowed on the network. You could edit user settings through Configure > Cloud RADIUS User.
Social Login: Allows users to use a Facebook account to access WiFi. Redirect URL Configure the URL to which users will be redirected after successful login. Redirect to the original URL: Select this option to cache the initial website from the client during the authentication process and then forward it to the originally targeted web server after the user successfully authenticates.
Session Timeout: Specify a time limit after which users will be disconnected and required to log in again. Idle Timeout: Specify a time limit for an idle client after which users will be disconnected and required to log in again. Walled Garden: This option allows users to define network destinations that users can access before authenticating. For example, your company's website. HTTPS Login: This option allows users to log in through HTTPS.
Social Login Social login allows you to use your Facebook account to access WiFi. Follow the below steps to configure social login. 1. Click Configure > SSID > Select a SSID 2. Click Captive portal > go to Authentication Type > select Social login.
3. Click Apply.
Voucher Service This guide is intended to help you set up your network to generate and accept vouchers. With vouchers, you control access on a per-user basis by generating guest passes you can provide to users. Vouchers can be set to specific time increments and are ideal for hotels, coffee shops, apartments, etc. where you want to limit network access to users for a specific period of time. Enable Voucher Service Enable the voucher service by clicking Configure > SSID > Captive portal > Voucher Service.
Remember click on the Apply button at top-right corner to confirm your change on SSID settings. Management URL and Access Plan Management URL For each enabled voucher service, a dedicated Management URL is created. Any team members who have permissions of Front-desk Manager or Administrator can log in that specific URL and manage Voucher Users there.
Plan Start Time The plan start time is an option that defines the plan of voucher service is activated when an account is created or after the account's first login.
Generation allows you to generate Guest pass in batch , you can fill in the number of the Guest Pass you want to create. Each network supports total 100 Guest Passes. Managing Voucher User Click on the User Management Button in the toolbar. A Guest Management Page is performed to list all generated voucher user. You can edit the properties of a voucher user by clicking the user_id of that user or pick the users in that list to delete.
Configuring Splash Page This guide is intended to help you set up your splash page. With a splash page, you can channel network users to see a custom page before they can access the Internet. Before you start configuring a splash page, please make sure the captive portal is enabled in advance. External Splash Page URL: The external splash page enables the administrator to host their own splash page web server, rather than having it hosted by EnGenius Cloud.
After you complete the splash page, please remember to click Apply. Using the WYSIWYG editor You can choose different template from the drop-down menu at the top of the editor. Once you select your starting template, you can customize it with your message, colors, fonts, and images. EnGenius uses a WYSIWYG (what-you-see-is-what-you-get) editor that also supports HTML editing.
In addition to the standard editing tools along the top toolbar , you can click HTML icon to start editing . Choosing a starting template Choose a template from the drop-down menu at the top of the editor. You can customize the content and presentation of these templates to suit your needs . Any edits you make will be a copy of the template, you can go back to the default at any time. Adding and modifying images Each splash page template comes with a library of stock images.
2. Double-Click on the image or click insert icon to add the image.
Access control This page allows you to block clients in mac based on current SSID. The following describes the functions on this screen: Add : The entry for you to add the Mac address to be blocked. Reset : Clean all the Block list . Delete : Delete the list that you selected . After you add the block list , remember to click Apply to take effect .
Clone SSID This allows you to clone SSID configuration which you created previously. So you can create Multiple SSID with same configuration easily. Follow steps to clone SSID 1. Click Clone From 2.
3.
Examples How to Configure Captive Portal 1. Before you begin configuring a captive portal, you need to create a SSID. Navigate to Configure > SSID (If you can't click configure, please make sure you are on network scope). 2. Select one of the SSIDs from the list. If one is not available, please click Add SSID to create one.
3. Navigate to the captive portal and click Enabled and then select the authentication type. 4. Click Apply.
Configuring Radio Use this screen to configure radio settings for all access points in the network. Double-click one of the networks on Org-Trees > Configure > Radio Settings. The settings and options in the Radio Setting page apply to all access points in a network, and you can configure the following settings: Channel This option allows users to customize the channels. On the Auto setting, EnGenius access points automatically adjust the channels of their radios to avoid RF interference.
20MHz. To maximize throughput, use 40 MHz for 802.11n and 80 MHz for 802.11ac for 5GHz. Note that higher density deployments should use 20 MHz or 40 MHz channels on 5GHz. Tx Power Using this option, users can set a custom range for Tx power. The higher the transmission power (Tx power) of the access point, the bigger the coverage of the WiFi signal, so usually maximum power is set for an access point to connect to another access point for WDS or mesh purposes.
on the minimum bit rate. For example, if the bit rate is set to 6Mbps, then those clients with slower than 6Mbps bit rate will not be able to connect to the WiFi and will not slow down other client’s performance. 802.11b max bit rate is 11Mbps, so if 12Mbps is set per radio, then 802.11b clients will not be able to connect to the network.
Some legacy wireless clients are not compatible with 11ax . This option allows legacy equipment to connect with your network as usual, we suggest you disabling 11ax in 2.4G of your Radio settings. In this way, you can have equipments working in 5G with better performance and get legacy devices served well in 2.4G. Mesh This option allows users to enable mesh on 2.4GHz or 5GHz. After you enable mesh, there is an Auto Pairing button.
a Network nearby the cloud-connected AP. (less than 10 meter depends on the transmission power set of 2 AP’s) 3. Power on try-to-mesh AP until “mesh” LED keep flashing 4. Click Auto Pairing and it starts to count down on our Cloud Web UI. That means the Cloud-connected AP is trying to find the try-to-mesh AP and help it to join Cloud 1. There must be a Cloud-connected AP nearby try-to-mesh AP to access wirelessly and in the same “Network”, so the Mesh configuration can be pushed to 2 AP’s to mesh together.
Configuring Cloud RADIUS Use this screen to view and manage user accounts authenticated using EnGenius Authentication , you can choose EnGenius authentication from Configure > SSID > Captive portal, then select EnGenius Authentication from Authentication Type section ). Double-click one of the networks on Org-Trees > Configure > Cloud RADIUS Users to access this screen. The following describes the labels on this screen: 1. Name: Shows the descriptive name of the user account. 2.
Unblock: Unblock users.
Configuring MyPSK When setting up an enterprise wireless network, it is common to configure WPA2-PSK authentication in order to onboard different users on to the wireless network. However, IT administrators may still encounter some drawbacks with this method of authentication when they need to use different PSKs in order to assign different VLANs. MyPSK allows a network administrator to use multiple PSKs and assigned different VLANs per SSID.
The following describes the labels on the popup. Auto-Generated: Click the checkbox and then input the number of the users you want to create. Auto-Generated Users are limited to 50 per time. PSK: Input the password for the user to log in, Auto-Generated Users will have PSK automatically. VLAN: By SSID means the user is assigned the VLAN from the SSID which you choose to authorize.
1. Click the number on the Authorized SSIDs or each PSK 2. Allows you to edit the details of each user.
1. Doesn't support Captive portal mode nor NAT mode 2. Each Network has limited to 500 PSK users 3. In the SSID => Wireless => WPA2 myPSK , there is an option "Auth with External RADIUS Server " which is supported with AP v1.X.25 firmware or above.
Configuring VLAN This setting allows you to configure VLAN to all devices in the network at once . Table displays all VLANs have been configure in selected network . Use this screen to add and delete VLANs for network. Click Configure > VLAN Settings to access this screen. The VLAN Settings page contains the following information : VLAN ID : VLAN ID. NAME : VLAN name. Voice VLAN : This shows if VLAN has been assigned to Voice VLAN or not. SSID : the SSID that has been assigned the VLAN.
1. Click Add VLAN button. 2. Input VLAN ID and VLAN Name. 3. Click Apply to complete the settings. After you create the Network wide VLAN , you need to go to Switch detail page to assign ports or go to SSID page to assign the VLAN to specific SSID .
Configuring Switch Settings This setting allows you to configure Systems & Protocols in the network at once. This gives you to configure the System setting and apply it to whole Switches in the network. you can access this screen by Configure > Switch settings. Many MSP or SI would like to be able to “group configure port settings” in the Network. Switch Template feature helps users to apply same port configuration to all switch with same models in the Network to save time of configuration one by one.
You can create any template by Model type (or click on “Edit” of the template). The setting is similar to Individual Switch port settings. Apply to All will apply the Switch Template to all devices of the same model in the Network.
The uplink port will not be overridden by the template to prevent losing connection. Uplink port couldn't be the Mirror destination port PoE on the ports should be enabled when the ports are configured the PoE schedule on the devices.
Firmware Upgrade Automatic Upgrades EnGenius Cloud enables automatic upgrades by default and will upgrade firmware according to the Maintenance Window time period each week. Manual Upgrade To manually update device firmware: 1. Select the firmware you desire to upgrade. 2. Click Upgrade Now.
3. Click Apply.
General Settings General settings allow you to configure Network settings, AP network-wide settings and so do Switches. Click Configure > General Setting to access this screen. Edit Network Network name, country, and timezone can be edited as needed. Follow the steps below to edit a network. 1. Click edit button to change network name 2.
This feature allows you to configure the login account of local web GUI for devices. The settings here apply to all APs and Switches in this Network . Note that username and password could be blank if you don't want to change device login account of local web GUI. LED Light This allows you to enable all AP's LED lights in the current network. LAN Port settings (for ECW115AP only) This allows you to configure Lan port settings on ECW115. Noticed that either LAN1 Lan2 can be used for the uplink port.
System Reserved IP Range When using NAT (AP DHCP) and captive portal, AP will leverage a range of IP addresses as default. If user unconsciously configures their local Network conflicting with the range, it will cause problems. the user is able to change the System reserved range if they cannot change their local LAN IP address range. SSID > Wireless > IP Addressing (NAT/Bridge).
The blocked splash page below will be presented below to the blocked clients. Advanced settings Presence reporting For applications like CRM tools, presence analytics, or location-aware services which need to continuously gather presence data of wireless clients, EnGenius Cloud Acess Points are capable of delivering real-time presence data to fulfill the requirement. EnGenius Presence Service can have cloud-managed APs continuously gathering 802.
the following parameters can be configured on the page: Parameters Server Location Description 3rd party server address Secret used to generate a SHA256 HMAC signature, over the payload (the Key JSON message). The signature is then added to a custom HTTP header (“Signature”) in the POST message. Interval The Interval between two consecutive messages has been sent. Traffic log Traffic log feeds wireless client info to remote Syslog server.
Remote System Log The Remote System Log gives you the capability to remotely log Syslog events from a device on EnGenius Cloud to your external logging server. You can enable and configure the remote logging feature from Configure → General setting→ Syslog server. Status: Enable to open the function to the remote system log. Log server address: Specify the IP address or hostname of the Syslog server. Log server port: Specify the port of the Syslog server. The default port is 514.
Access Control In some cases, it is necessary to block a specific client on a network. This configuration will apply to the whole network and will affect the client immediately. Blocked List Navigate to Configure > Access Control to access this screen. You could block clients in the current network or on SSID basis depending on your requirement. This blocked list displays which you added the blocked clients in SSID > Access Control and Manage > Clients .
2. Enter the Mac Address , select the Scope ( Current Network or SSID basis) , then click Apply How to Unblock clients 1. Select the clients on the lists 2. Click Unblock VIP Lists All VIP clients can bypass Captive portal. Wired VIP client can bypass L2 isolation .
1. Click Add in the top-right corner . 2. Enter the Mac Address , select the Scope ( Current Network or SSID basis) , then click Apply How to remove VIP clients 1. Select the clients on the lists 2.
Analytics
Device Events Device events are events that are specific to individual devices, and are logged to EnGenius Cloud. Examples of events would include the specific time that a device comes online or goes offline. Use this screen to view Device Events. Click Analyze > Event Log > Device Event to access this screen. Searching the Event Log EnGenius Cloud allows to search device events based on a number of desired parameters.
You can specify date/time, severity, and other parameters. Select one or multiple event types, then enter the SSID, device name/MAC, or select client to display the log messages related to it. After customizing your search parameters, remember to click Apply to perform the search.
System Events System events are events related to EnGenius Cloud itself, such as device management or user management. Use this screen to view system events. You can specify date/time and severity, then select one or multiple event types. Enter the operator name to display the log messages related to it. Click Analyze > Event Log > System Events to access this screen.
Config Logs Config logs capture events based on your configuration changes, such as changes to SSID settings, radio settings, or network updates. Use this screen to view config logs. you can specify date/time, severity, select one or multiple event types, and enter the operator name to display the log messages related to it. Click Analyze > Event Log > Config Log to access this screen.
Managing Organizations
Managing Device Inventory and Licence The Inventory page lists all devices currently found in the inventory or added to a network within the current organization. The Inventory page contains the following information about each device: Type: type of the device. Model: model name of the device. Serial Number: serial number of the device. MAC: MAC address of the device. Network: the network that the device has been added to. Register Time: time of the device's addition to the inventory.
Assigning Devices to a Network This feature helps the users in assigning devices to a network. 1. Navigate to the inventory page. 2. Select one or multiple devices as per your requirements. 3. Click Assign to Network.
Removing Devices from a Network This feature allows for devices to be deleted in bulk from a network. To delete devices using bulk delete: 1. Navigate to the inventory page. 2. Select one or multiple devices as per your requirements. 3. Click Remove from Network. De-registering a Device from EnGenius Cloud This feature allows you to remove registered devices from EnGenius Cloud inventory. 1. Navigate to the inventory page. 2. Select one or multiple devices as per your requirements. 3.
License Click "Switch to Pro" allows you to use the pro features . Professional features are required to pay in the future. Currently, there are free to use.
Privacy Exposure Analysis would show you the timeline with the list of clients connected to the same AP based on a particular client. If you enable this feature would allow us to retrieve and present your client data in a timeline manner. Click Organization > Privacy to access this screen. You can click Manage=> Clients to access this page to see the details after you enable the Exposure Analysis.
< Bru ces-iPhone 111111 • 11 & s10'22"'4nl>l a, ... " flon.emap,leW8ldl MACM!li't1l .. f W.C:«ldltu O,BJ:UFOS'ifD MAoC I 0412't U l7 1H f ,:. umemeneblllPIKlne ,:, :11UJ2S13flll T"'II '1U (11 (ir n•'o) ;,. .:. El!GenlllMKTc:leMBP .. Mi1.C. lllklrM1 f4 W::.a.:.:.in S102629r..B llll•CMklrt11 ZI 1'i" 8:20"9C72 Toi '11S[ fr J, IPnoo@ ,l .......C101h:11 FDA l.S.0. -4U IBA MN!:addlH:I ,.;, S100'237N6 ,; 102!-23tJ;IIPhooe ii, :WIIWllii MACl1Mr'H1 3-f.F3 .....
Backup & Restore Generating a New Backup Users can create a new Network-wide setting and device backup by going to Organizations > Backup & Restore Restore: This allows you to restore all settings( Network-wide settings and Device settings) to the corresponding network. Protect: This allows you to protect the backup, so the backup will not be rotated when you exceed 2 backups of the network. Re-Backup: This allows you to update the current settings to the backup of the corresponding network.
When creating a new network you have the option to clone the configuration from another network. This will copy all network-wide configurations from the existing network with the exception of local device configurations.
Managing Team Members Use this screen to view, manage, and create user accounts for organization/network. Click Team Member icon to access this screen. The Team Member page contains the following information about each member: Name : member name . Email : member email . Org Permissions : member's org permissions . Network Managed : Displayed numbers of member's network permissions , hovering on the permission badge will display the network . Status : Member account status .
You can invite multiple users and assign them permissions for entire organization trees at once. 1. Input the user email, one per row. 2. Assign member privileges for a network or organization. 3. Click Apply to save changes. Modify Member Permissions 1. Click Modify. 2. Change the Permission based on the organization trees. 3. Click Apply.
0 Team Member s Senao Q, • P 1m ls ll0 n o,v / N e1work 1 [!I Admi111 ORG Stl"l:,O " L.) HVni:WNI ...,. .. Lock X -· Nelw rk Ad X Modify ,. r:,. I Oelele N twOJklJ ' A1,1 10-'28-- 20i8 -16 55 -00 .A(:l!Qfl• fl! Mod1f:, r£ Mod1f)' AIJ0-28.-2018-16. 5500 afMod1f)' AIJ9"'21- 0i 8 -16 5)-QQ @'Mod1f)' .,._... 2F Net ¥1o'Ork R.ese-!ld Ema1I r£ .,._...... F Necworx Rese-Bd Emal l (1fMod1f)' ll'IIOOYt fl! F'ront•e!ld -♦ • e,. HVRO'Mt Fron1-eBd • ..
Roles and Permissions Organization Permission Types Admin: user has full administrative access to all networks and organization-wide settings. This is the highest level of access available. Viewer: user is able to access most aspects of network and organization-wide settings, but unable to make any changes. Network Permission Types Admin: user has access to view all aspects of a network and makes any changes to it.
Notification & Alerts
Notification Center EnGenius Cloud provides a notification mechanism for alerting you to important events that occurred. You can click the bell icon to access this screen. Recent Notifications This shows the event numbers that occur and is ordered by organization. You can click one of the organizations in the list to access detailed event information.
Preferences Network Subscription This allows you to subscribe or unsubscribe to network events. When subscribed, you will receive that network's notifications.
Notifications Mobile App Notifications: You can turn on/off notifications on the EnGenius Cloud Mobile App. Email Notification: You will receive an email digest of network events at a scheduled time if at least one event has occurred.
Click See more details to see Network events. Each card represents an individual organization and each divider inside cards represents different networks.
Filter events: On the top of page allows you to filter events. You can check or uncheck the checkbox near error and warning events.
Configuring Alert Settings There are a number of options available for email alerts to be sent when certain network or device events occur. Alerts can be configured under Configure > Alerts.
AP(s) go offline for XXX minutes: sends an email if one or more access points go offline for a preset (and customizable) amount of time. Configuration changed within network: sends an email if SSID, radio settings, firmware upgrade, or individual device settings override the default settings. Event with severity XXXX and above occurs: sends an email if event severity meeting a minimum severity threshold occurs.
Configuration changed within network: sends an email if SSID, radio settings, firmware upgrades, or individual device settings override the default settings. Switch port link status change: sends an email when device port link status is changed. Switch STP Port status change: sends an email when device port STP status is changed. Switch LBD Port status change: sends an email when device LBD status is changed.
Mobile App The EnGenius Mobile App is a mobile user interface (UI) for EnGenius Cloud. You can keep an eye on your network when you are on the go. This is a great solution for around the clock network support. Versions are available for Android on Google Play and iOS via the App Store. Adding a Device This section explains how to add a networking device to your network using the EnGenius Mobile App. 1. Navigate to the Inventory tab and tap the + symbol on the bottom-right of the screen.
• Inventory Moni tor & Notification Team Members 0 Sup port
2. Find the QR code at the bottom of the device and scan it.
If the camera successfully scanned a QR code, the app will display the Device Information. You could tap Register to complete the Registration. If you failed to scan the QR code successfully, you could tap Okay, try another.
3. Once a device has been successfully registered, you can tap Assign to Network site now.
5. Tap the Network and tap Apply.
6. Once you select the wrong network, you could tap Change to select the correct network. If the network is correct , tap Next .
7. You could tap Finish to complete the whole process or tap Register more to register other devices .
Get Remote Support LiveChat Whenever you login the system, you can always find a LiveChat button at bottom-right corner of the page. You can leave a message with this chat system. EnGenius support team will usually feed back in minutes. Remote Support Passcode The EnGenius Support Passcode is used to verify users' identities for security purposes. When you get trouble on configuring your networks or operating your cloud configurations, you can click on the Help button on the top-right corner of menu.
There is an option here that you can decide how long the generated passcode is valid (from 1 hour to 7 days). By sending the generated passcode to EnGenius support team on LiveChat, support team can access your account temporarily to diagnose and resolve issues you've raised. Note that the generated PASSCODE will automatically expire after a period of time. Support team won't be able to access your resource once the PASSCODE is expired.
Security
Two Factor Authentication Two Factor Authentication, also known as 2FA or TFA, is a two-step verification process that requires more information in addition to the usual username and password. This extra piece of information is something only the user will know or have physically with them, like a token sent to a mobile app, for example. It is very important to create backup codes the moment you enable 2FA on your account in case your phone is lost and cannot access the 2FA code.
3. Open your chosen authenticator app on your smartphone. Since the following is using Google Authenticator as an example, the steps might vary slightly. Open the Google Authenticator app on your phone, tap Menu, then tap Begin Setup > Scan barcode. If you already have other accounts, you would click the plus sign (+) on the upper right and then Scan barcode. 4. Your phone will now be in the "scanning" mode. Go ahead and scan the QR code that appeared in the popup. 5.
You can access Recovery code after you enabled 2FA. You will be given a list of 10 backup codes, copy them somewhere safe. If there's a possibility someone has gained access to your codes, generate new ones to make those compromised ones obsolete. How to Deactivate 2FA 1. Select Two Factor Authentication from the top-right menu. 2.
How to Access a Locked Out Account If you are locked out of your account because you changed mobiles, deleted the authenticator app by mistake or lost your phone, you can get access to your account once more with the below method. Login Cloud using recovery codes 1. Go to cloud.engenius.ai enter your username and password as usual, and prompted for the screen for you to enter code.
2. Now just paste one of the backup codes you previously saved and click Verify. 3. Follow the How to Deactivate 2FA and How to Enable 2FA to protect your account procedure again. Remember to click Download code to save a new set of backup codes. Other possible issues and solutions are discussed in this Google 2-Step Verification Help article. 2FA Enforcement to your Organization This feature helps the Organization administrator to enforce all Cloud users to have more secure to access the organization.
team members don't activate 2FA, they are not allowed to access this organization . You can access this feature by clicking Organization > Security . If the user manages multiple Organizations and does not enable 2FA, he is still able to log in to Cloud. However, he cannot access the Org with 2FA enforcement enabled as a requirement.
Report Report lets you compile reports of past activity on your Organization/HV/networks. These reports can be filtered to only include certain organizations, HV, or networks. You can send them to recipients by email and schedule them to run periodically. How can I create Reports? To create your reports, you need to go to the Reports located on the left panel. Under the tab ‘Task’ you will find the button ‘New Task’ and click it.
Cover letter: Select the style and will be displayed in the cover letter) Language: Support English only currently) Logo: Upload the logo you want to display on the cover letter) Page Content This allows you to select page contents that will be displayed on your report. You can click the gear icon to show or hide the table data.
Configuration 1. Select Org-tree: this is the report data to collect from ). 2. Dashboard Period: Select the day, week, or month data you want to display on the dashboard Data. eg: Throughput. Top series . ) 3. Throughput SSID: Select the SSID you want to collect on throughput data) 4. Schedule: Select the report to be generated right now or Specific time or weekly) 5.
This allows you to review all the page contents and settings on a single page. If you want to change the settings, you could click back to change. If all the settings are OK, click Apply to create a task. Reports View The Report Tab displayed the lists of reports that the system has generated based on your task. When you open a saved report from Report Tab, Insightly will run the report and display: 1. Task name (same as report name): Click to navigate to corresponding tasks. 2.
Edit Task After you created the Tasks, this page allows you to monitor the data that you have selected. There are some icons for you to know the task status and do further editing. 1. Mail icon: This task has some email recipients that have been configured. 2. Calendar icon: This task has been scheduled to generate a report continuously. 3. New Task: This allows you to create another task. The basic mode only allowing you to create a single task and only have one report recorded. 4.
Appendix
Access Point LED Behavior Access Point LEDs and what they mean The table below describes the LEDs on the access point, their flashing patterns, and what those mean for its function. LED Static Power Power is on LAN 2.4G 5G Connected to LAN Flash Off Cloud is connecting Power is off Data is transmitting between AP and the Internet.
SSID Troubleshooting Naming Rules There is a management SSID that lets users know the current status when an access point connects to EnGenius Cloud. If an access point has lost its connection to the Internet but still receives power, it will broadcast a management service set identifier (SSID) that can be connected to for administrative tasks. Connect to the default SSID by completing the following steps: 1. Physically check that the access point has power. 2.
Solution: Check the AP's IP address configuration. -Gateway_ERR Cause: AP is unable to connect to its default gateway. Solution: Check the AP's IP address configuration and connectivity to its default gateway. -Proxy_ERR Cause: AP could not access Internet through HTTP/HTTPS proxy. Solution: Check the AP’s proxy configuration in miscellaneous settings. -DNS_ERR Cause: AP could not resolve the domain name from the DNS server. Solution: Check the AP's IP address configuration.
Firewall rules Below is the Firewall rules which is needed to access EnGenius Cloud. Cloud Devices AP, SW , Ensky Cloud Services Periodical Cloud communication,Firmware Upgrade,Real-Time Meter Source IP Your Networks AP, SW , Persistent Cloud Your Ensky communication Networks AP Cloud Radius AP, SW , Ensky AP, SW , Ensky AP NTP time sychronization Remote Tunnel Splash Page Your Networks Your Networks Your Networks Your Networks Destination IP Ports Protocol (TCP/UD any 443 TCP 44.
Mounting the AP Using the provided hardware, the AP can be attached to a wall or a ceiling. 1. Managed Indoor Access Point 4. Mounting Screw Kit 2. Ceiling Mount Base (9/16” T-Rail) 3.
Ceiling Mount an Access Point Wall Mount an Access Point 1) Slide the ceiling mount base into the slot of the Access 3) Continued from A, determine where the Access Point Point. to be placed and mark location on the surface for the two mounting holes. Use the appropriate drill bit to drill two 2) Hold the Access Point with one hand to reach the other hand over the T-Rail sides of the bracket. Then hook the stationary end of the ceiling mount bracket onto the TRail. 8.
FCC Statement: This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
ISED Statement: This device contains licence-exempt transmitter(s) that comply with Innovation, Science and Economic Development Canada’s licence-exempt RSS(s). Operation is subject to the following two conditions: (1) this device may not cause interference, (2) this device must accept any interference, including interference that may cause undesired operation of the device.