TP-LINK EAP220 Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Points d'accès WLAN TP-LINK EAP220. TP-Link EAP220 User Guide [en] Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 70
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
User Guide
Wireless N Access Point
EAP110/EAP120/EAP220
REV1.0.0
1910011184
Vue de la page 0
1 2 3 4 5 6 ... 69 70

Résumé du contenu

Page 1 - User Guide

User Guide Wireless N Access Point EAP110/EAP120/EAP220 REV1.0.0 1910011184

Page 2 - FCC STATEMENT (EAP110)

3 Chapter 1 Introduction 1.1 Overview of the EAP EAP series products provide wireless coverage solutions for small-medium business. They can either

Page 3 - CE Mark Warning

4 Figure 1-1 Top View of the EAP LED Status Indication Solid green The device is working properly. Flashing red System errors. RAM, flash, Ether

Page 4

5 EAP120/EAP220: Figure 1-3 Interface Panel of EAP120/EAP220 Please note that EAP110 does not have the CONSOLE port, POWER port and ON/OFF button. T

Page 5 - NCC Notice & BSMI Notice

6 Passive PoE Adapter:  Power LED: The Power LED indicates the status of the electric current: green (0-0.8A), red (0.8A-1A).  POE Port: This po

Page 6

7 Chapter 2 Network Topology A typical network topology for the EAP is shown below. Figure 2-1 Typical Topology To deploy an EAP in your local netw

Page 7 - Convention

8 Chapter 3 Management Mode 300Mbps Wireless N Access Point EAP110 and Wireless N Gigabit Access Point EAP120/EAP220 can either work under the contr

Page 8 - CONTENTS

9 TIPS: Proceed to the following chapters for information on using the EAP in standalone mode. EAP110 is taken as the example.

Page 9

10 Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default,

Page 10 - Chapter 1 Introduction

11 Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below.

Page 11 - 1.2.2 Interface Panel

12 5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page

Page 12 - EAP120/EAP220:

FCC STATEMENT (EAP110) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the F

Page 13 - 1.2.3 Mounting Bracket

13 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Radio: Check the box to enable 2.4GHz Wireless Radio. Wireless

Page 14 - Chapter 2 Network Topology

14 If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation

Page 15 - Chapter 3 Management Mode

15 SSID Broadcast: Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless netw

Page 16

16  Open System: After you select Open System, clients can pass the authentication and associate with the wireless network without password. Howe

Page 17 - Chapter 4 Network

17  WPA-PSK: Pre-shared key of WPA.  WPA2-PSK: Pre-shared key of WPA2. Encryption: Select the encryption type, including Auto, TKIP, and AES. The

Page 18 - Chapter 5 Wireless

18 Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity

Page 19 - 5.1 Wireless Settings

19 Fragmentation Threshold: Specify the fragmentation threshold for packets. If the size of the packet is larger than the fragmentation threshold, th

Page 20

20 Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSI

Page 21 - 5.1.2 SSIDs

21 2. Local Password:Users are required to enter the preset user name and password, which are saved in the EAP. 3. External RADIUS Server:Users are

Page 22 - Enterprise or WPA-PSK

22 Redirect URL: Enter the URL that a newly authenticated client will be directed to. Portal Customization: Select Local Web Portal, the authenticati

Page 23 - WPA-Enterprise

FCC STATEMENT (EAP120&EAP220) This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 1

Page 24 - WPA-PSK

23  Local Password Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Username: Enter the user name for

Page 25

24 1. Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server

Page 26 - 5.2 Portal

25 2. External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS

Page 27 - 5.2.1 Portal Configuration

26 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a poli

Page 28 - No Authentication

27 Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is

Page 29

28  Settings Enable MAC Filtering: Check the box to enable MAC Filtering.  Station MAC Group Follow the steps below to add MAC groups. Step 1:

Page 30 - External RADIUS Server

29 Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group mem

Page 31 - Local Web Portal

30 Figure 5-23 Scheduler Page  Settings Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can p

Page 32 - External Web Portal

31 Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Click and configure the recurring schedule for t

Page 33

32  Scheduler Association This zone will display different contents based on your selection of association mode in Settings. 1. Associated with SS

Page 34 - 5.3 MAC Filtering

National Restrictions(only for EAP220) This device is intended for home and office use in all EU countries (and other countries following the EU direc

Page 35 - Station MAC Group

33 5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, the default valu

Page 36 - 5.4 Scheduler

34 5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client statio

Page 37

35 5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA

Page 38 - Figure 5-26 Add a Rule

36 5.6 Rogue AP Detection A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system adm

Page 39 - Scheduler Association

37 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 De

Page 40 - 5.5 QoS

38 Beacon Interval: The beacon interval used by the rogue AP. Beacon frames are transmitted by an AP at regular intervals to announce the existence o

Page 41 - 5.5.1 AP EDCA Parameters

39 Save Action: Select Download (PC to AP) to import a trusted AP list to the device. Select Backup (AP to PC) to copy the trusted AP list to your P

Page 42

40 Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List

Page 43 - 5.6 Rogue AP Detection

41 Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the

Page 44 - 5.6.1 Settings

42  Wireless Settings Figure 6-4 Wireless Settings Region: Displays the region you’ve selected. Channel/Frequency: Displays the channel number and

Page 45 - 5.6.3 Trusted AP List

IC STATEMENT This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe A est conforme à la norme NMB-003 du

Page 46

43 LAN Port: Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port.  Client Figure 6-6 Client MAC: Displ

Page 47 - Chapter 6 Monitoring

44 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) recei

Page 48 - Device Information

45 6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 S

Page 49 - LAN Information

46 Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs. Down(Byte): Displays the t

Page 50 - LAN Traffic

47 SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the

Page 51 - Radio Traffic

48 Active Time: Displays the amount of time the authenticated client has been connected to the root AP. Action: Click Unauthorize to stop giving aut

Page 52 - 6.2 SSID

49 Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about

Page 53 - 6.3 Client

50 Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configu

Page 54

51 SMTP Server: Enter the IP address of the SMTP server. Enable Authentication: Generally users are required to log in to the SMTP server by entering

Page 55 - Active Time:

52 Following is the page of Web Server. Figure 7-6 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure S

Page 56 - Chapter 7 Management

●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 此為甲類資

Page 57 - 7.1.2 Log Settings

53 Following is the page of Management Access. Figure 7-7 Management Access Page MAC Authentication: Check the box to enable MAC Authentication. Aft

Page 58 - 7.2 Web Server

54 SSH (Secure Shell) is a security protocol established on application and transport layers. SSH-encrypted-connection is similar to a telnet connect

Page 59 - 7.3 Management Access

55 Once the device has become an SNMP agent, it is able to receive and process request messages from SNMP manager. Following is the page of SNMP. Fi

Page 60 - 7.5 SSH

56 Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write

Page 61 - 7.6 SNMP

57 Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboo

Page 62

58 Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP

Page 63

59 Primary/Secondary NTP Server: If you’ve selected Get GMT from an NTP server, please input the primary NTP sever address and an alternative NTP ser

Page 64 - Chapter 8 System

60  Recurring Mode Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time

Page 65 - 8.2.1 Time Settings

61 8.4 Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the conf

Page 66 - 8.2.2 Daylight Saving

62 NOTE: 1. Please select the proper software version that matches your hardware to upgrade. 2. To avoid damage, please do not turn off the device

Page 67 - 8.3 Reboot/Reset

About this User Guide This User Guide is for EAP110, EAP120 and EAP220. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer

Page 68 - 8.5 Firmware Upgrade

63 Appendix A: Specifications HARDWARE FEATURES Model EAP110 EAP120 EAP220 Interface Kensington lock slot RESET button ETHERNET: 10/100Mbps Ether

Page 69

1 CONTENTS Chapter 1 Introduction .......

Page 70 - Appendix A: Specifications

2 5.6.4 Download/Backup Trusted AP List ..................... 38 Chapter 6 Monitorin

Commentaires sur ces manuels

Pas de commentaire