LevelOne EAP-200 Enterprise Access Point User Manual V1.
1. 2. 3. 4. 5. 6. 7. Table of Contents Before You Start ............................................................................................................................. 3 1.1 Preface ........................................................................................................................................................... 3 1.2 Document Conventions ..............................................................................................................................
Article I. Before You Start Section 1.01 1.1 Preface This manual is intended for system integrators, field engineers, and network administrators to set up LevelOne’s EAP-200 802.11n/b/g 2.4GHz MIMO Access Point in their network environments. It contains step-by-step procedures and visual examples to guide MIS staff or individuals with basic network system knowledge to complete the installation. Section 1.02 1.
Section 1.03 1.3 Package Content The standard package of EAP-200 includes: • LevelOne EAP-200 x1 • Quick Installation Guide (QIG) x1 • CD-ROM (with User’s Manual and QIG) x1 • Console Cable x1 • Ethernet Cable x1 • Power Adapter (DC 12V) x1 • Antenna x2 • Screw Pack x1 • Ground Cable x1 It is recommended to keep the original packing materials for possible future shipment when repair or maintenance is required.
Article II. System Overview and Getting Started Section 2.01 2.1 Introduction of LevelOne EAP-200 The LevelOne EAP-200 Enterprise Access Point embedded with 802.11 n/b/g 2.4GHz MIMO radio in dust-proof metal housing is designed for wireless connectivity in enterprise or industrial environments of all dimensions. EAP-200 makes the wireless communication fast, secure and easy. It supports business grade security such as 802.1X, and Wi-Fi Protected Access (WPA and WPA2).
Section 2.02 2.2 Deployment Topology Common Network Layout with EAP-200s This above deployment scenario illustrates a deployment example using three access points, AP-1, AP-2, and AP-3. • Three EAP-200 systems construct a network comprising of wired and wireless segments • AP-2 plays the role of a wireless bridge. • All devices share the same DHCP server 192.168.1.1.
Section 2.03 2.3 Hardware Description This section depicts the hardware information including all panel description. Connector Panel EAP-200 Connector Panel 1 USB Disabled for future usage only. 2 WES Press to start running WES process. 3 Console Attach the serial cable here. 4 LAN1 / LAN2 Attach the Ethernet cable here for connection with wired local networks. 5 Reset Hardware reset button, press once to reset to the system. 6 DC 12V Attach the power socket here.
LED Panel EAP-200 LED Panel 1 Power LED LED ON indicates power on; OFF indicates power off. 2 LAN LED LED ON indicates LAN cable connected; OFF indicates no connection; BLINKING indicates transmitting data. 3 WLAN LED LED ON indicates wireless ready. 4 WDS LED LED ON indicates WDS ready. 5 WES LED To indicate WES status.
2.4 Hardware Installation Please follow the steps mentioned below to install the hardware of EAP-200: 1. Place the EAP-200 at the best location. The best location for EAP-200 is usually at the center of your intended wireless network. 2. Connect the EAP-200 to your network device. Connect one end of the Ethernet cable to LAN port of EAP-200 and the other end of the cable to a switch, a router, or a hub. EAP-200 is then connected to your existing wired LAN network. 3.
Section 2.04 2.5 Console Interface Via this port to enter the console interface for the administrator to check the IP address of EAP-200 and reset the device to default if the admin password is forgotten. 1. In order to connect to the console port of EAP-200, a console, modem cable and a terminal simulation program, such as the Hyper Terminal are needed. 2. If a Hyper Terminal is used, please set the parameters as 115200, 8, None, 1, None.
When resetting the device to default from the console interface, key in “reset2def” for login and password. Confirm “yes” and EAP-200 will begin the reset process. When the login prompt reappears, the device has completed the reset to default process and the LAN IP is reset to 192.168.1.1.
Section 2.05 2.6 Access Web Management Interface LevelOne EAP-200 supports web-based configuration. Upon the completion of hardware installation, EAP-200 can be configured through a PC by using its web browser such as Mozilla Firefox 2.0 (and higher) or Internet Explorer version 6.0 (and higher). The default values of the EAP-200’s LAN IP Address and Subnet Mask are: IP Address: 192.168.1.1 Subnet Mask: 255.255.255.
The Web Management Interface - System Overview Page 13
• To logout, simply click on the Logout button at the upper right hand corner of the interface to return to the Administrator Login Page. Click OK to logout.
Please follow the following steps to change the administrator’s password: Change Password Page Click on the Utilities main menu button, and then select the Change Password tab. Enter the old password and then a new password with a length of up to 32 characters, and retype it in the Re-enter New Password field. Congratulation! Now, LevelOne’s EAP-200 is installed and configured successfully. • • It is strongly recommended to make a backup copy of configuration settings.
Article III. Connect your AP to your Network The following instructions depict how to establish the wireless coverage of your network. The AP will connect to the network through its LAN port and provide wireless access to your network. After having prepared the EAP-200’s hardware for configuration, set the TCP/IP settings of administrator’s computer to have a static IP Address of 192.168.1.10 and Subnet Mask of 255.255.255.0.
From here, click on the System icon to arrive at the following page. On this Page you can make entries to the Name, Description, and Location fields as well as set the device’s time. System Information Page There are two methods of setting up the time: Manual (indicated by the option Set Date & Time) and NTP. The default is Manual and requires individual setup every time the system starts up. Simply choose a time zone and set the time accordingly. When finished, click SAVE.
While still on this Page, click on the Network Interface tab to begin configuration of the network settings. Network Settings Page If the deployment decides the AP will be getting dynamic IP Addresses from the connected network, set Mode to DHCP; otherwise, set Mode to Static and fill in the required fields marked with a red asterisk (IP Address, Netmask, Gateway, and Primary DNS Server) with the appropriate values for the network. Click SAVE when you are finished to save changes that have been made.
Step 3: Configure the AP’s Wireless General Settings Click on the Wireless icon followed by the General tab. On this page we only need to choose the Band and Channel that we wish to use. Wireless General Settings Page On this page, select the Band with which the AP is to broadcast its signal. The rest of the fields are optional and can be configured at another time. Click SAVE if any changes have been made.
Step 4: Configuring Wireless Coverage (VAP-1) To setup the AP’s wireless access, refer to the following VAP-1 configuration (other VAP configuration can refer to the same setup steps as done for VAP-1). Click on the Overview tab to proceed. Virtual AP Overview Page On this page click the hyperlink in the row and column that corresponds with VAP-1’s State. This will bring up the following page.
The desired VAP profile can be selected from the drop-down menu of Profile Name and VAP-1 configuration will serve as an example for all other VAPs. Before proceeding further, please make sure that the VAP field is Enable; afterwards, enter an ESSID to represent the WLAN associated with AP’s VAP-1. It is suggested that Profile Name is used to describe what this particular VAP will be used for; otherwise, leave it as default. VLAN ID can be chosen at another time.
Article IV. Adding Virtual Access Points EAP-200 possesses the feature of multi-ESSID; namely, it can behave as multiple virtual access points, providing different levels of services from the same physical AP device. Please click on the Wireless icon to review the VAP Overview page. VAP Overview Page To proceed with specific VAP configuration, click on the corresponding cell in the State column and the row of the VAP; the particular VAP’s Configuration page will then appear for further configuration.
Please select the desired VAP profile from the drop-down menu of Profile Name. Choose Enable for the VAP field. Pick a descriptive Profile Name and an appropriate ESSID for clients to associate to. A VLAN ID can be provided to indicate the traffics through this particular VAP. It may allow further management/control (e.g. access rights and Internet usage, etc) of each VAP with a management gateway. Click SAVE and then Reboot for the changes to take effect.
Article V. Secure Your AP Different VAP may require different level of security. These instructions will guide the user through setting up different types of security for a particular VAP. Simply repeat the following steps for other VAP with security requirement. Step 1: Ensure the intended VAP is Enabled VAP Overview Page On the VAP Overview page, check the table to confirm the VAP State. If it is Enabled, skip to Step 2. If not, click on to proceed with VAP Configuration for that particular VAP.
to begin the next step. Step 2: Configure Security Settings for your VAP The following instructions will guide the user to set up wireless security with a specific VAP. If only restricted access of certain MAC addresses is desired, skip to the Step3. MAC restriction can be coupled with wireless security to provide extra protection. First, click on the corresponding cell in the column labeled Security Type. This hyperlink will direct the user to the following Security Settings page.
• None: Authentication is not required and data is not encrypted during transmission when this option is selected. This is the default setting as shown in the following figure. Security Settings: None • WEP: WEP (Wired Equivalent Privacy) is a data encryption mechanism with key length selected from 64-bit, 128-bit, or 152-bit. Security Settings: WEP 802.11 Authentication: Select from Open System, Shared Key, or Auto. WEP Key Length: Select from 64-bit, 128-bit, 152-bit key length.
• 802.1X: When 802.1X Authentication is selected, RADIUS authentication and enhanced dynamic WEP are provided. Security Settings: 802.1X Authentication Dynamic WEP Settings: o Dynamic WEP: For 802.1X security type, Dynamic WEP is always enabled to automatically generate WEP keys for encryption. o WEP Key Length: Select from 64-bits or 128-bits key length. o Rekeying Period: The time interval for the dynamic WEP key to be updated; the time unit is in second.
• WPA-PSK: Provide shared key authenticaiton in WPA data encryption. Security Settings: WPA-PSK Cipher Suite: Select an encryption method from TKIP (WPA), AES (WPA), TKIP (WAP2), AES (WAP2), or Mixed. Pre-shared Key Type: Select a pre-shared key type: PSK (Hex) or Passphrase. Pre-shared Key: Enter the key value for the pre-shared key; the format of the key value depends on the key type selected.
• WPA-RADIUS: Authenticate users by RADIUS and provide WPA data encryption. Security Settings: WPA-RADIUS WPA Settings: o Cipher Suite: Select an encryption method from TKIP (WPA), AES (WPA), TKIP (WAP2), AES (WAP2), or Mixed. o Group Key Update Period: The time interval for the Group Key to be renewed; the time unit is in seconds. RADIUS Server Settings: o Host: Enter the IP address or domain name of the RADIUS server. o Authentication Port: The port number used by the RADIUS server.
Step 3: Configuring MAC ACL (Access Control List) Clicking on the hyperlink corresponding with intended VAP in the MAC ACL column, the user will be brought to the Access Control Settings page. Access Control Settings Page Please choose among Disable, Allow, Deny, and RADIUS ACL from the drop-down menu of Access Control Type. 1) Disable Access Control: This means that there is no restriction for client devices to access the system.
MAC ACL Deny List 31
4) RADIUS ACL: Authenticate incoming MAC addresses by an external RADIUS server. When RADIUS ACL is selected, all incoming MAC addresses will be authenticated by an external RADIUS server. Please note that each VAP MAC ACL and its security type (shown on the Security Settings page) share the same RADIUS configuration. RADIUS ACL Click SAVE and Reboot upon completing the related configurations to take effect.
Article VI. Create a WDS Bridge between two APs WDS link creation will assist to extend network coverage where running wires is not an option, effectively transferring the traffics to the other end of WLAN/LAN through the EAP-200. Since this is a peer to peer connection, both EAP-200s will be configured by the same way.
Step 2: Prevent Loops if Connecting Many APs When many APs are linked in this manner, undesired loops may form to lower overall WLAN performance. To prevent such occurrence, please make sure Layer 2 STP is enabled. To turn on this feature, please click on the System and then Network Interface tab. Network Settings Page Please select Enable in the field labeled Layer2 STP. This will prevent data from looping or a broadcast storm.
Article VII. Web Management Interface Configuration This chapter will guide the user through the EAP-200’s detailed settings. The following table shows all the User Interface (UI) functions of LevelOne’s EAP-200 Enterprise Access Point. The Web Management Interface (WMI) is the page where the status is displayed, control is issued and parameters are configured. In the Web Management Interface; there are two main interface areas: Main Menu and Working Area.
Event Log Note: On each configuration page, the user may Click SAVE to save the changes, but the user must reboot the system upon the completion of all configurations for the changes to take effect. Upon clicking SAVE, the following message will appear: “Some modification has been saved and will take effect after Reboot.” All online users will be disconnected during reboot or restart.
Section 7.01 7.1 System Upon clicking on the System button, users can work on this section for general configurations of the devices (e.g. Time Setup, Network Configurations, and System Logs). This section includes the following functions: General, Network Interface, Management, GRE Tunnel and CAPWAP. (a) 7.1.
1) Enable NTP: By selecting Enabled NTP, EAP-200 can synchronize its system time with the NTP server automatically. While this method is chosen, at least one NTP server's IP address or domain name must be provided. NTP Time Configuration Fields Generally networks would have a common NTP server (internal or external). If there is, use that one, otherwise locate a nearby NTP server on the web. 2) Manually set up: By selecting Manually set up, the administrator can manually set the system date and time.
(b)7.1.2 Network Interface On this page, the network settings of the device can be configured; fields with a red asterisk (i.e. IP Address, Netmask, Default Gateway, and Primary DNS Server) are mandatory. Network Settings Page • Mode: Determine the way to obtain the IP address, by DHCP or Static. Static: The administrator can manually set up the static LAN IP address. All required fields are marked with a red asterisk. o IP Address: The IP address of the LAN port.
(c) 7.1.3 Management The management services (e.g. VLAN for Management, SNMP, and System log) can be configured here. Management Services Page • VLAN for Management: When it is enabled, management traffics from the system will be tagged with a VLAN ID. In other words, administrator who wants to access the WMI must send management traffics with the same VLAN ID such as connecting to a specific VAP with the same VLAN ID. Enter a value between 1 and 4094 for the VLAN ID if the option is enabled.
• SNMP Configuration: By enabling SNMP function, the administrator can obtain the system information remotely. SNMP Configuration Fields Enable/ Disable: Enable or Disable this function. Community String: The community string is required when accessing the Management Information Base (MIB) of the system. o Read: Enter the community string to access the MIB with Read privilege. o Write: Enter the community string to access the MIB with Write privilege.
(d) 7.1.4 GRE Tunnel When GRE tunnel is created between EAP-200 and the controller, EAP-200 can be logically deployed into the Controller’s managed network regardless of its physical location. If the tunnel is created from WHG series controllers, all of the configuration should be performed on the Controller side. It is meaningless to configure GRE tunnel settings from the EAP-200 side.
(e) 7.1.5 CAPWAP CAPWAP is a standard interoperable protocol that enables a controller to manage a collection of wireless access points. There are 5 ways of discovery, DNS SRV, DHCP option, Broadcast, Multicast, and Static. Certificate Date Check: To enable this item, select Enable and click Manage Certificates to enter the page of Upload Certificate. Please refer to the section 7.4.4. Upload Certificate. DNS SRV Discovery: The way of using DNS SRV to discover acess controller.
Manage Certificates 44
Section 7.02 7.2 Wireless This section includes the following functions: VAP Overview, General, VAP Configuration, Security, Repeater, Advanced, Access Control, and Site Survey. EAP-200 supports up to eight Virtual Access Points (VAPs). Each VAP can have its own settings (e.g. ESSID, VLAN ID, security settings, etc.). With such VAP capabilities, different levels of service can be configured to meet network requirements. (a) 7.2.
• State: The hyperlink showing Enable or Disable connects to the VAP Configuration page. VAP – State Page • Security Type: The hyperlink showing the security type connects to the Security Settings Page.
• MAC ACL: The hyperlink showing Allow or Disable connects to the Access Control Settings Page. VAP – MAC ACL Page • Advanced Settings: The advanced settings hyperlink connects to the Advanced Wireless Settings Page.
(b)7.2.2 General AP’s general wireless settings can be configured here: AP General Settings Page • Band: Select an appropriate wireless band: 802.11b, 802.11g, 802.11b+802.11g, 802.11g+802.11n or select Disable if the wireless function is not required. • Pure 11n: Enable 802.11n network only. Short Preamble: The short preamble with a 56-bit synchronization field can improve WLAN transmission efficiency.
from the access point. **Due to RF regulation in different nations, available values in the above table will differ. Table 2 RF Configurations (under normal circumstances in certain countries) Band Channel Rate Power Disable N/A N/A N/A 36, 40, 44, 48, 52, 56, 60, 802.11a 64, 100, 104, 108, 112, 6M, 9M, 12M, 18M, 24M, 116, 120, 124, 128, 132, 36M, 48M, 54M 136, 140 802.11b 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1M, 2M, 5.5M, 11M 11, 12, 13 802.11g 802.11b+802.
(c) 7.2.3 VAP Configuration This section provides configuration of each Virtual Access Point with settings such as Profile Name, ESSID, and VLAN ID. VAP Configuration Page To enable specific VAP, select the VAP from the drop-down list of Profile Name. The basic settings of each VAP are collected in the profile as follows: • VAP: Enable or Disable this VAP. • Profile Name: The profile name of specific VAP for identity / management purposes.
(d) 7.2.4 Security EAP-200 supports various wireless authentication and data encryption methods in each VAP profile. With this, the administrator can provide different service levels to clients. The security type includes None, WEP, 802.1X, WPA-PSK, and WPA-RADIUS. • None: Authentication is not required and data is not encrypted during transmission when this option is selected. This is the default setting as shown in the following figure.
802.11 Authentication: Select from Open System, Shared Key, or Auto. WEP Key Length: Select from 64-bit, 128-bit, 152-bit key length. WEP Key Format: Select from ASCII or Hex format for the WEP key. WEP Key Index: Select a key index from 1~4. The WEP key index is a number that specifies which WEP key will be used for the encryption of wireless frames during data transmission. WEP Keys: Provide the pre-defined WEP key value; the system supports up to 4 sets of WEP keys. • 802.1X: When 802.
o Accounting Port: The port number used by the RADIUS server for accounting purposes. Specify a port number or use the default, 1813. o Accounting Interim Update Interval: The system will update accounting information to the RADIUS server every interval period. • WPA-PSK: WPA-PSK (Wi-Fi Protected Access Pre-shared Key) is a pre-shared key authentication method, a special mode of WPA.
WPA-RADIUS: If this option is selected, the RADIUS authentication and data encryption will be both enabled. Security Settings: WPA-RADIUS WPA Settings: o Cipher Suite: Select an encryption method from TKIP (WPA), AES (WPA), TKIP(WAP2), AES (WAP2), or Mixed. o Group Key Update Period: The time interval for the Group Key to be renewed; the time unit is in seconds. RADIUS Server Settings (Primary/Secondary): o Host: Enter the IP address or domain name of the RADIUS server.
(e) 7.2.5 Repeater To extend wireless network coverage, EAP-200 supports 3 options of Repeater type, None, WDS or Universal Repeater; selecting None will turn off this function. Universal Repeater If Universal Repeater is selected, please provide the SSID of upper-bound AP for uplink connection; Security Type (None, WEP, or WPA-PSK) can be configured for this Repeater connection. Please note the security type configured here shall follow upper-bound AP’s for intended connection.
WDS If WDS is selected, EAP-200 can support up to 4 WDS links to its peer APs. Security Type (None, WEP, or WPA/PSK) can be configured to decide which encryption to be used for WDS connections respectively. Please fill in remote peer’s MAC address and click SAVE to proceed; if setting revision is necessary, CLEAR button is used to clear the contents in the above WDS connection list. Repeater Settings: WDS o WES: Enable WES. o MAC Address: To remote peer’s MAC address.
(f) 7.2.6 Advanced The advanced wireless settings for the EAP-200’s VAP (Virtual Access Point) profiles allow customization of data transmission settings. The administrator can tune the following parameters to improve network communication performance if a poor connection occurs. Advanced Wireless Settings Page • RTS Threshold: Enter a value between 1 and 2346.
• WMM: The default is Disable. Wi-Fi Multimedia (WMM) is a Quality of Service (QoS) feature that prioritizes wireless data packets based on four access categories: voice, video, best effort, and background. Applications without WMM and applications that do not require QoS are assigned to the best-effort category, which receives a lower priority than that of voice and video. Therefore, WMM decides which data streams are more important and assigns them a higher traffic priority.
(g) 7.2.7 Access Control On this page, the network administrator can restrict the total number of clients connected to the EAP-200, as well as specify particular MAC addresses that can or cannot access the device. Access Control Settings Page • Maximum Number of Clients EAP-200 supports various methods of authenticating clients for wireless LAN access. The default policy is unlimited access without any authentication required.
• Access Control Type The administrator can restrict the wireless access of client devices based on their MAC addresses. Disable Access Control: When Disable is selected, there is no restriction for client devices to access the system. MAC ACL Allow List: When selecting MAC ACL Allow List, only the client devices (identified by their MAC addresses) listed in the Allow List (“allowed MAC addresses”)are granted with access to the system.
MAC ACL Deny List: When selecting MAC ACL Deny List, all client devices are granted with access to the system except those listed in the Deny List (“denied MAC addresses”). The administrator can allow any denied MAC address to connect to the system temporarily by checking Disable.
RADIUS ACL: Authenticate incoming MAC addresses by an external RADIUS. When RADIUS ACL is selected, all incoming MAC addresses will be authenticated by an external RADIUS. Please note that each VAP’s MAC ACL and its security type (shown on the Security Settings page) share the same RADIUS configuration.
(h) 7.2.8 Site Survey Sit Survey is a useful tool to provide information about the surrounding wireless environment; available APs are shown with their respective SSID, MAC Address, Channel, Rate setting, Signal reading, and Security type. The administrator can click Setup or Connect to configure the wireless connection according to the mentioned readings when Repeater Type is Universal Repeater.
WPA-PSK: Click Setup to configure the WPA-PSK setting for associating with the target AP. The following configuration box will then appear at the bottom of the screen. Information provided here must be consistent with the security settings of the target AP.
Section 7.03 7.3 Firewall The system provides an added security feature, Layer2 Firewall, in addition to typical AP security. Layer2 Firewall offers a firewall function that is tailored specifically for Layer2 traffics, providing another choice of shield against possible security threats coming from/going to WLAN (AP interfaces); hence, besides firewall policies configured on gateways, this extra security feature will assist to mitigate possible security breach.
>>To delete a specific rule, Del in Setting column of firewall list will lead to the following page for removal confirmation. After SAVE button is clicked and system reboot, the rule will be removed. >>To edit a specific rule, Ed in Setting column of firewall list will lead to the following page for detail configuration. From this page, the rule can be edited from scratch or an existing rule for revision.
VLAN ID (when EtherType is 802.1 Q): The VLAN ID is provided to associate with certain VLAN-tagging traffics. Priority (when EtherType is 802.1 Q): It denotes the priority level with associated VLAN traffics. Encapsulated Type (when EtherType is 802.1 Q): It can be used to indicate the type of encapsulated traffics. Opcode (when EtherType is ARP/RARP): This list can be used to specify the ARP Opcode in ARP header.
Please make sure all desired rules (state of rule) are checked and saved in overview page; the rule will be enforced upon system reboot.
(b)7.3.2 Service The administrator can add or delete firewall service here; the services in this list will become options to choose in firewall rule (when EtherType is IPv4). EAP-200 provides a list of rules to block or pass traffics of layer-3 or above protocols. These services are available to choose from drop-down list of layer2 firewall rule edit page with Ether Type to be IPv4. The first 28 entries are default services and the administrator can add/delete any extra desired services.
(c) 7.3.3 Advanced Advanced firewall settings are used to supplement the firewall rules, providing extra security enhancement against DHCP and ARP traffics traversing the available interfaces of system. Trust Interface: Each VAP interface can be checked individually to mark as trusted interfaces; security enforcements on DHCP/ARP like DHCP snooping and ARP inspection will be carried out on non-trusted interfaces.
Section 7.04 7.4 Utilities The administrator can maintain the system on this page: Change Password, Backup & Restore, System Upgrade, Reboot and Upload Certificate. (a) 7.4.1 Change Password To protect the Web Management Interface from unauthorized access, it is highly recommended to change the administrator’s password to a secure password. Only alpha-numeric characters are allowed, and it is also recommended to make use of a combination of both numeric and alphabetic characters.
(b)7.4.2 Backup & Restore This function is used to backup and restore the EAP-200 settings. The EAP-200 can also be restored to factory defaults using this function. It can be used to duplicate settings to other access points (backup settings of this system and then restore on another AP). Backup & Restore Page • Reset to Default: Click Reset to load the factory default settings of EAP-200. A pop-up Page will appear to reconfirm the request to reboot the system.
(c) 7.4.3 System Upgrade The EAP-200 provides a web firmware upload / upgrade feature. The administrator can download the latest firmware from the website and save it on the administrator’s PC. To upgrade the system firmware, click Browse to choose the new firmware file you downloaded onto your PC and then click Upload to execute the process. There will be a prompt confirmation message appearing to notify the administrator to restart the system after a successful firmware upgrade.
(d) 7.4.4 Reboot This function allows the administrator to restart the EAP-200 safely. The process shall take about three minutes. Click Reboot to restart the system. Please wait for the blinking timer to complete its countdown before accessing the system’s Web Management Interface again. The System Overview page will appear after reboot successfully. Occasionally, it is necessary to reboot the EAP-200 to ensure that parameter changes are submitted.
(e) 7.4.4 Upload Certificate This function is used to setup the advanced configuration for the CAPWAP to manage Certificates. Certificate: It provides Certificate security for CAPWAP to ensures the safety between Access Controller and WAP. Use Default Certificate: Click Use Default Certificate to use the default certificate and key.
Section 7.05 7.5 Status This page is used to view the current condition and state of the system and includes the following functions: Overview, Associated Clients, Repeater and Event Log. (a) 7.5.1 Overview The System Overview page provides an overview of the system status for the administrator.
Table 3 Status Page's Organizational Layout Item Description System Name The system name of the EAP-200. Firmware Version The present firmware version of the EAP-200 The present firmware build number of the Build Number System EAP-200 Location The location of the EAP-200. Site The site of the EAP-200 Device Time The system time of the EAP-200. The time that the system has been rebooted in System Up Time operation. MAC Address LAN Interface Radio Status The MAC address of the LAN Interface.
(b)7.5.2 Associated Clients The administrator can remotely oversee the status of all associated clients on this page. When a low SNR is found here, the administrator can tune the corresponding parameters or investigate the settings of associated clients to improve network communication performance. Associated Client Status Page • Associated VAP: The name of a VAP (Virtual Access Point) that the client is associated with. • ESSID: The Extended Service Set ID which the client is associated with.
(c) 7.5.3 Repeater The administrator can review detailed information of the repeater function on this page. Information of repeater’s status, mode and encryption is provided.
(d) 7.5.4 Event Log The Event Log provides the records of system activities. The administrator can monitor the system status by checking this log. Event Log Page In the log each line represents an event record; in each line, there are 4 fields: • Date / Time: The time & date when the event happened • Hostname: Indicates which host recorded this event. Note that all events on this page are local events, so the hostname in this field is always the same.
Section 7.06 7.6 Online Help The Help button is at the upper right corner of the display screen. Click Help for the Online Help window, and then click the hyperlink of the relevant information needed.