User Guide For TP-Link Auranet Access Points REV1.0.
COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd. Copyright © 2016 TP-Link Technologies Co., Ltd..
FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
CE Mark Warning This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. RF Exposure Information This device meets the EU requirements (1999/5/EC Article 3.1a) on the limitation of exposure of the general public to electromagnetic fields by way of health protection. The device complies with RF specifications when the device used at 20 cm from your body.
The high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.
Safety Information When product has power button, the power button is one of the way to shut off the product; When there is no power button, the only way to completely shut off power is to disconnect the product or the power adapter from the power source. Don’t disassemble the product, or make repairs yourself. You run the risk of electric shock and voiding the limited warranty. If you need service, please contact us. Avoid water and wet locations.
For EU/EFTA, this product can be used in the following countries: AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MT NL NO PL PT RO SE SI SK Explanation of the symbols on the product label Symbol Explanation DC voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE).
CONTENTS About this User Guide .......................................................................................................................................... 1 Chapter 1 Introduction ...................................................................................................................................... 2 Chapter 2 Network Topology .......................................................................................................................
6.3 6.2.1 SSID List ............................................................................................................................... 45 6.3.1 User List ............................................................................................................................... 47 Client..................................................................................................................................................... 46 6.3.2 Chapter 7 7.1 7.
About this User Guide When using this guide, please notice that features of the EAP may vary slightly depending on the model and software version you have, and on your location, language, and Internet service provider. All screenshots, images, parameters and descriptions documented in this guide are used for demonstration only. The information in this document is subject to change without notice.
Chapter 1 Introduction Auranet series products provide wireless coverage solutions for small-medium business. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily-configured enterprise-grade wireless network for small and medium business. “Celling lamp” appearance and easily mounting design with chassis make EAP easy to be installed on a wall or ceiling and blend in with most interior decorations.
Chapter 2 Network Topology A typical network topology for the EAP is shown below. Internet Router Switch EAP Controller Manangement Host EAP EAP EAP Clients Figure 2-1 Typical Topology To deploy an EAP in your local network, a DHCP server is required to assign IP addresses to the EAP and clients. Typically, a router acts as the DHCP server. A computer running the EAP Controller software can locate in the same or different subnet with the EAPs.
The EAP can be managed by the EAP Controller software, which is a management software specially designed for the TP-Link EAP devices on a local wireless network, allowing you to centrally configure and monitor mass EAP devices using a web browser on your PC. For more information about the EAP Controller, please find the EAP Controller User Guide from our official website: http://www.tp-link.
Chapter 3 Management Mode Auranet series products can either work under the control of the EAP Controller software or work independently as a standalone access point. When user establishes a large-scale wireless network, the management of every single AP in the network is complex and complicated. With the EAP Controller software, you can centrally manage the mass APs simply in a web browser. The Standalone mode applies to a relatively small-sized wireless network.
Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default, the EAP device obtains an IP address from a DHCP server (typically a router). Select Static to configure IP address manually. Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device.
Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below.
5.1 Wireless Settings Following is the page of Wireless Settings.
TIPS: Proceed to the following chapter for information on configuring the wireless network of the EAP. The configuring information of 2.4GHz is taken as the example. 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Radio: Check the box to enable 2.4GHz Wireless Radio. Wireless Mode: Select the protocol standard for the wireless network. For 2.4GHz network, we recommend that select 802.
Channel: Select the channel used by this device to improve wireless performance. 1/2412MHz means the Channel is 1 and the frequency is 2412MHz. By default, channel is automatically selected. Tx power: Enter the transmit power value. By default, the value is 20. If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation. NOTE: In most cases, it is unnecessary to select maximum transmit power.
Click to add up to 8 wireless networks per radio. SSID Name: Enter up to 32 characters as the SSID name. Wireless VLAN ID: Set a VLAN ID for the wireless network. SSID Broadcast: Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless network identified by this SSID. If SSID Broadcast is not enabled, hosts must enter the AP’s SSID manually to connect to this AP. Security Mode: Select the security mode of the wireless network.
Figure 5-5 Security Mode-WEP Type: Select the authentication type for WEP. Auto: The default setting is Auto, which can select Open System or Shared Key automatically based on the wireless station's capability and request. Open System: After you select Open System, clients can pass the authentication and associate with the wireless network without password. However, correct password is necessary for data transmission.
WPA-Enterprise Based on RADIUS server, WPA-Enterprise can generate different passwords for different users and it is much safer than WPA-PSK. However, it costs much to maintain and is more suitable for enterprise users. At present, WPA-Enterprise has two versions: WPA-PSK and WPA2-PSK. Figure 5-6 Security Mode_WPA-Enterprise Version: Select one of the following versions: Auto: Select WPA-PSK or WPA2-PSK automatically based on the wireless station's capability and request.
11b/g/n mode (in the 2.4GHz frequency band) or 11a/n (in the 5GHz frequency band), the device may work at a low transmission rate. WPA-PSK Based on pre-shared key, security mode WPA-PSK is characterized by high security and simple configuration, which suits for common households and small business. WPA-PSK has two versions: WPA-PSK and WPA2-PSK. Figure 5-7 Security Mode_WPA-PSK Version: Auto: Select WPA or WPA2 automatically based on the wireless station's capability and request.
5.1.3 Wireless Advanced Settings Figure 5-8 Wireless Advanced Settings Beacon Interval: Beacons are transmitted periodically by the device to announce the presence of a wireless network for the clients. Beacon Interval value determines the time interval of the beacons sent by the device. You can specify a value from 40 to 100. The default value is 100 milliseconds.
Figure 5-9 Load Balance Load Balance: Disable by default. Click ON to enable the function. After enabling it, you can set a number for maximum associated clients to control the wireless access. Maximum Associated Clients: Enter the number of clients to be allowed for connection to the EAP. The number ranges from 1 to 99. 5.2 Portal Portal authentication enhances the network security by providing authentication service to the clients that just need temporary access to the wireless network.
Following is the page of Portal . Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server.
No Authentication :Users are required to finish only two steps: agree with the user protocol and click the Login button. Local Password:Users are required to enter the preset password, which are saved in the EAP. External RADIUS Server : Users are required to enter the preset user name and password, which are saved in the database of the RADIUS server. The RADIUS server acts as the authentication server, which allows you to set different usernames and passwords for different users.
Redirect: Disable by default. Redirect specifies that the portal should redirect the newly authenticated clients to the configured URL. Redirect URL: If you enable the Redirect function, please enter the URL that a newly authenticated client will be directed to. Portal Customization: Select Local Web Portal, the authentication login page will be provided by the built-in web server. The page configured below will be presented to users as the login page.
Local Password Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Password: Enter the password for local authentication. Please refer to No Authentication to configure Authentication Timeout, Redirect, Redirect URL and Portal Customization. External RADIUS Server External RADIUS Server provides two types of portal customization: Local Web Portal and External Web Portal.
1. Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. Please refer to No Authentication to configure Authentication Timeout, Redirect, Redirect URL and Portal Customization.
2. External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. Portal Customization: Select External Web Portal.
Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Source IP Range: Enter the source IP address and subnet mask of the clients who can enjoy the free authentication policy. Leaving the field empty means all IP addresses can access the specific resources. Destination IP Range: Enter the destination IP address and subnet mask for free authentication policy.
Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24. Policy 1 is enabled. Click to edit the policy. Click to delete the policy. 5.3 MAC Filtering MAC Filtering uses MAC addresses to determine whether one host can access the wireless network.
Figure 5-18 MAC Filtering Page Settings Enable MAC Filtering: Check the box to enable MAC Filtering. Station MAC Group Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown.
Step 2: Click and fill in a name for the MAC group. Figure 5-20 Add a Group Step 3: Select one MAC group, click and input the MAC address you want to organize into this group. Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click delete the MAC group or group member.
MAC Filtering Association Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Band: Displays the frequency band the wireless network operates at. MAC Group Name: Select a MAC group from the drop-down list to allow or deny its members to access the wireless network. Action: Allow: Allow the access of the stations specified in the MAC group. Deny: Deny the access of the stations specified in the MAC group. 5.
Figure 5-23 Scheduler Page Settings Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can perform configurations on the SSIDs/AP. The display of Scheduler Association is based on your option here. Scheduler Profile Configuration Follow the steps below to add rules.
Step 1: Click , two tables will be shown. Figure 5-24 Scheduler Profile Configuration Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Select one profile, and click rule.
Figure 5-26 Add a Rule Scheduler Association This zone will display different contents based on your selection of association mode in Settings. 1. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID SSID Name: Displays the SSID of the standalone AP. Band: Displays the frequency band which the wireless network operates at. Profile Name: Select a profile name from the drop-down list. Profile name is configured in Scheduler Profile Configuration.
2. Associated with AP Figure 5-28 Scheduler Association_Associated with AP AP: Displays the name of the device. AP MAC: Displays the MAC address of the device. Profile Name: Select a profile name from the drop-down list. Profile name is configured in Scheduler Profile Configuration. Action: Select Radio On/Off to turn on/off the wireless network during the time interval set for the profile. 5.
Figure 5-29 QoS Page 2.4GHz/5GHz: Select the 2.4GHz or 5GHz to show and configure the setting of 2.4GHz or 5GHz. Wi-Fi Multimedia (WMM): By default, WMM is enabled. After WMM is enabled, the device has the QoS function to guarantee the transmission of audio and video packets with high priority. 5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client station.
Figure 5-30 AP EDCA Parameters Queue: Queue displays the transmission queue. By default, the priority from high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters. Data 0 (Voice)—Highest priority queue, minimum delay. Timesensitive data such as VoIP and streaming media are automatically sent to this queue. Data 1 (Video)—High priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.
5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA Parameters Queue: Queue displays the transmission queue. By default, the priority from high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters. Data 0 (Voice)—Highest priority queue, minimum delay. Timesensitive data such as VoIP and streaming media are automatically sent to this queue.
TXOP Limit: The TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the client station to the EAP device. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the EAP device. The valid values are multiples of 32 between 0 and 8192.
Figure 5-32 Rogue AP Detection Page 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save.
5.6.2 Detected Rogue AP List Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown. You can click Known in Action column to move the AP to the Trusted AP List. Figure 5-34 Detected Rogue AP List Click to scan rogue APs. Make sure you have enabled Rogue AP Detection and saved the setting before you click the button. Action: Click Known to move the AP to the Trusted AP List.
Figure 5-35 Trusted AP List Action: Click Unknown to move the AP out of the Trusted AP List. MAC: The MAC address of the trusted AP. SSID: The SSID of the trusted AP. Band: Displays the frequency band which the wireless network of the trusted AP operates at. Channel: The channel on which the trusted AP is currently broadcasting. Security: Displays the enabling or disabling of the security mode of the wireless network. 5.6.
NOTE: EAP device does not have any control over the APs in the Detected Rogue AP List.
Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List on the Monitoring page displays the device name, its MAC address and the number of clients. Below the AP List the AP’s detailed information will be shown, including Device Information, Wireless Settings, LAN Information, Client, LAN Traffic and Radio Traffic.
6.1.1 AP List Figure 6-2 AP List Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the EAP. Device Information Figure 6-3 Device Information Device Name: Displays the device name. Device Model: Displays the model of the device. Firmware Version: Displays the firmware version of the device. If you want to upgrade the firmware, please refer to 8.5 Firmware Upgrade.
CPU Displays the CPU occupancy, which helps you to preliminarily judge whether the device functions properly. Memory: Displays the memory usage , which helps you to preliminarily judge whether the device functions properly. Wireless Settings Figure 6-4 Wireless Settings 2.4GHz/5GHz: Choose one band to view the information about wireless setting. Channel/Frequency: Displays the channel number and the operating frequency. If you want to change them, please refer to 5.1.1 Wireless Basic Settings.
LAN Information Figure 6-5 LAN Information MAC Address: Displays the MAC address of the device. IP Address: Displays the IP address of the device. Subnet Mask: Displays the subnet mask of the device. LAN Port: Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port. Client Figure 6-6 Client MAC: Displays the MAC address of the client of the AP selected in AP List. SSID: Displays the SSID the client is connected to.
LAN Traffic Click LAN Traffic and you can monitor the data transmission status of the LAN port. Figure 6-7 LAN Traffic Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Packets: Displays the total amount of dropped packets received/sent on the LAN port. Rx/Tx Errors: Displays the total amount of error packets received/sent on the LAN port.
Rx/Tx Dropped Packets: Displays the total amount of dropped packets received/sent by the wireless network. Rx/Tx Errors: Displays the total amount of error packets received/sent by the wireless network. 6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs. VLAN ID: Displays the VLAN which the SSID belongs to.
SSID Broadcast: Displays the enabling or disabling of SSID broadcast. If you want to modify it, please refer to 5.1.2 SSIDs. Band: Displays the frequency band the wireless network is operating at. Security: Displays the security mode the wireless network is applying. If you want to modify it, please refer to 5.1.2 SSIDs. Portal: Displays the enabling or disabling of Portal. If you want to modify it, please refer to 5.1.2 SSIDs. MAC Filtering: Displays the enabling or disabling of MAC Filtering.
6.3.1 User List Figure 6-12 User List MAC: Displays the MAC address of the client. Band: Displays the band the client is in. Access Point: Displays the name of the device to which the client is connected. SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the value of SNR, the better network performance the device provides.
MAC: Displays the MAC address of the authenticated client. Band: Displays the band the authenticated client is in. Access Point: Displays the name of the device to which the authenticated client is connected SSID: Displays the SSID the authenticated client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the value of SNR, the better network performance the device provides.
Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure. Following is the page of System Log.
7.1.1 Log List From Log List you can view detailed information about hardware, software, system issues and so on. Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configured: Enable Auto Mail, Enable Server and Enable Nvram.
Enable Auto Mail If Auto Mail Feature is enabled, system logs will be sent to a mailbox. The following content will be shown. Figure 7-4 Enable Auto Mail From: Enter the sender’s email address. To: Enter the recipient’s email address, which will receive the system logs. SMTP Server: Enter the IP address of the SMTP server. Enable Authentication: Generally users are required to log in to the SMTP server by entering user name and password.
Figure 7-5 Enable Server System Log Server IP: Enter the IP address of the remote server. System Log Server Port: Enter the port of the remote server. Enable Nvram By default, Nvram is disabled. Check the box to enable Nvram, system logs will be saved after power supply is cut. Nvram (Non-volatile Random Access Memory) is a RAM that can still save data even if a device is power off. All TP-Link EAPs are equipped with Nvram.
Server Port: Designate a server port for web server in HTTP mode. By default the port is 80. Session Timeout: Set the session timeout time. If you do nothing with the web management page within the timeout time, the system will log out automatically. Please login again if you want to go back to web management page. 7.3 Management Access Management Access Control allows you to configure up to four MAC addresses of the hosts that are allowed to log in to the web management page of the EAP.
Figure 7-8 LED ON/OFF 7.5 SSH This device supports the SSH Server function that allows users to login and manage it through SSH connection on the SSH client software. SSH (Secure Shell) is a security protocol established on application and transport layers. SSH-encrypted-connection is similar to a telnet connection, but essentially the old telnet remote management method is not safe, because the password and data transmitted with plain-text can be easily intercepted.
7.6 Management VLAN Management VLAN provides a safer way for you to manage the EAP. With Management VLAN enabled, only the hosts in the management VLAN can manage the EAP. Since most hosts cannot process VLAN TAGs, connect the management host to the network via a switch, and set up correct VLAN settings for the switches on the network to ensure the communication between the host and the EAP in the management VLAN. Following is the page of Management VLAN.
managed devices are network devices including hosts, bridges, switches and routers. MIB is the collection of managed devices. It defines a series of properties of the managed devices. Every SNMP agent has its own MIB. Once the device has become an SNMP agent, it is able to receive and process request messages from SNMP manager. Following is the page of SNMP.
Set Community: Set Community has the read and write right of the device's SNMP information. Enter the community name that allows read/write access to the device's SNMP information. The community name can be considered a group password. The default setting is private. Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write the SNMP information of this device. The format of subnet is “IP address/bit” (such as 10.10.10.
Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. 8.1 User Account You can change the username and password to protect your device from unauthorized login. We recommend that you change the default user password on the very first system setup. Figure 8-1 User Account Page 8.
the system time, configure the system to acquire its time settings from a preconfigured NTP server or synchronize the system time with the PC’s clock. The device supports DST (Daylight Saving Time). Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP address of the NTP server has to be filled in.
Click the button and save the configuration, your PC’s time will be obtained as the device’s system time. Time zone: Select your local time zone from the drop-down list. Date: Set the current date, in format MM/DD/YYYY. For example, for November 25, 2014, enter 11/25/2014 in the field. Time: Specify the device’s time. Select the number from the drop-down list in time format HH/MM/SS.
USA: Second Sunday in March, 02:00 ~ First Sunday in November, 02:00 European: Last Sunday in March, 01:00 ~ Last Sunday in October, 01:00 Australia: First Sunday in October, 02:00 ~ First Sunday in April, 03:00 New Zealand: Last Sunday in September, 02:00 ~ First Sunday in April, 03:00 Recurring Mode Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time adding in minutes when Daylight Saving Time comes.
8.3 Reboot/Reset Figure 8-8 Reboot & Reset Click Reboot to restart the device. Click Reset to restore the device to factory default settings. 8.4 Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file. To prevent the settings from being lost, we recommend that you back up the settings before you upgrade the device or upload a new configuration file.
8.5 Firmware Upgrade Figure 8-10 Firmware Upgrade Please log in http://www.tp-link.com/ to download the latest system file. Click Browse to choose the firmware file. Click Upgrade to upgrade the devices. NOTE: 1. 2. 3. Please select the proper software version that matches your hardware to upgrade. To avoid damage, please do not turn off the device while upgrading. After upgrading, the device will reboot automatically.