Table of Contents

Advertisement

Quick Links

OAP1300
User Manual
11-2020 / v1.2

Advertisement

Table of Contents
loading

Summary of Contents for Edimax OAP1300

  • Page 1 OAP1300 User Manual 11-2020 / v1.2...
  • Page 2: Table Of Contents

    CONTENTS OVERVIEW ..................1 Product Information ..............2 Package Contents ................2 System Requirements ..............3 Hardware Overview ................ 3 LED Status ..................4 Reset ....................5 II Quick Setup & Mode Selection ............ 6 II-1 Default Mode: Access Point Mode ..........6 II-2 Repeater Mode ................
  • Page 3 IV-3-1-2 Advanced ..................... 47 IV-3-1-3 Security ......................49 IV-3-1-3-1 No Authentication / Additional Authentication ........ 50 IV-3-1-3-2 WEP ...................... 52 IV-3-1-3-3 IEEE802.1x/EAP ................... 52 IV-3-1-3-4 WPA-PSK ....................53 IV-3-1-3-5 WPA-EAP ....................54 IV-3-1-4 WDS ......................55 IV-3-1-5 Guest Network .................... 57 IV-3-2 5GHz 11ac 11an ..................
  • Page 4 IV-6 Operation Mode ................. 100 V Appendix ................101 Configuring your IP address ............101 V-1-1 Windows XP ..................102 V-1-2 Windows Vista ..................104 V-1-3 Windows 7 ..................106 V-1-4 Windows 8 ..................110 V-1-5 Mac ..................... 114 Setting AP via ManageEngine MibBrowser with SNMPv3 - Example ....................
  • Page 5: Overview

    OVERVIEW Your device can function in four different modes. AP Mode is a regular access point for use in your wireless network. This is the default mode of the access point. Repeater Mode is a wireless repeater (also called wireless range extender) that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.
  • Page 6: I Product Information

    Product Information Package Contents 1. OAP1300 Access Point 5. Quick Installation Guide 2. Wall Mount Screw Template 6. Ethernet Cable 3. Wall Mount Screw Set 7. Pole Mount Strap x2 4. CD 8. Antenna x2...
  • Page 7: System Requirements

    System Requirements - Existing cable/DSL modem, PoE Switch & router - Computer with web browser for access point configuration Hardware Overview Ports and Button LAN 1 LAN port with Power over Ethernet (PoE) IN POE-IN LAN 2 LAN port with PoE OUT POE-OUT Reset Reset Button...
  • Page 8: Led Status

    LED Status LED Status Description Wireless enabled. (WLAN) Wireless disabled. Wireless enabled. 2.4G (WLAN) Wireless disabled. LAN port connected. LAN (PSE) Flashing Activity (transmitting and receiving). LAN port not connected. LAN port connected. LAN (PD) Flashing Activity (transmitting and receiving). LAN port not connected.
  • Page 9: Reset

    Reset If you experience problems with your access point, you can reset the device back to its factory settings. This resets all settings back to default. Press and hold the reset button on the access point for at least 10 seconds then release the button.
  • Page 10: Quick Setup & Mode Selection

    Quick Setup & Mode Selection The unit can function as a standalone access point (AP Mode), as a repeater (Repeater Mode), as part of an AP array (Managed AP Mode), or as a client bridge (Client Bridge Mode). Follow the default mode steps below and select the desired operation mode. II-1 Default Mode: Access Point Mode Set your computer’s IP address to 192.168.2.x where x is a number in...
  • Page 11 Enter the device’s default IP address 192.168.2.2 into the URL bar of a web browser. You will be prompted for a username and password. Enter the default username “admin” and the default password “1234”. “System Information” home screen will be shown:...
  • Page 12 By default, the device is in AP Mode. If you do not wish to change the operation mode, switch your computer back to dynamic IP address now. If you wish to change to a different operation mode, go to “Operation Mode”...
  • Page 13: Repeater Mode

    II-2 Repeater Mode From the default mode above, Select Repeater Mode from the operation mode drop down menu: Press “Apply” and wait for the device to reboot into Repeater Mode: When system page is displayed, go to Wireless Settings  Wireless Extender.
  • Page 14 Click Scan to search for and display available SSIDs Click the circle icon to connect to an available source SSID. SSIDs can be configured independently for each frequency 2.4GHz & 5GHz.
  • Page 15 Edit the new extended SSID according to your preference and enter the security details for the source SSID (e.g. Pre-shared Key). Click “Connect” to proceed. Wait for the configuration to take effect: The device (now in Repeater Mode) will establish a connection to the source SSID and repeat the extended SSID.
  • Page 16: Client Bridge Mode

    II-3 Client Bridge Mode From the default mode above, Select Client Bridge Mode from the operation mode drop down menu: Press “Apply” and wait for the device to reboot into Client Bridge Mode: When system page is displayed, go to Wireless Settings  Wireless Extender.
  • Page 17 Click Scan to search for and display available SSIDs Click the circle icon to connect to an available source SSID. SSIDs can be configured independently for each frequency 2.4GHz & 5GHz.
  • Page 18 Edit according to your preference and enter the security details for the source SSID (e.g. Pre-shared Key). Click “Connect” to proceed. Wait for the configuration to take effect: The device (now in Client Bridge Mode) will receive wireless signal and provides it to devices connected to the bridge via Ethernet cable.
  • Page 19: Managed Ap Mode

    II-4 Managed AP Mode Scenario: The Unit being managed by an AP Controller The access point can be part of an AP Array by switching to “Managed AP Mode”. An AP Array is a group of access points centrally managed by an AP Controller, where it can monitor, configure and manage all Managed APs.
  • Page 20 To manually change to “Managed AP Mode”: Ensure you have the latest firmware from the Edimax website for your Edimax Pro products. Connect an AP Controller to the switch currently connected to the access point and computer. From the default mode above, select Managed AP Mode from the operation mode drop down menu: Press “Apply”...
  • Page 21: Basic Settings

    II-5 Basic Settings Basic settings of the access point are: - LAN IP Address; and - 2.4GHz & 5GHz SSID & Security; and - Administrator Name & Password; and - Time & Date It is recommended that these settings are configured before using the access point.
  • Page 22 Enter the IP address settings you wish to use for your access point. You can use a dynamic (DHCP) or static IP address, depending on your network environment. Click “Apply” to save the changes and wait a few moments for the access point to reload. When you change your access point’s IP address, you need to use the new IP address to access the browser based configuration interface 192.168.2.2.
  • Page 23 Configuring Security Settings of 2.4GHz wireless network Go to “Wireless Settings” > “2.4GHz 11bgn” > “Security”. Select an “Authentication Method”, enter or select fields where appropriate, and click “Apply”. If multiple SSIDs are used, specify which SSID to configure using the “SSID”...
  • Page 24 Changing SSID and Configuring Security Setting for 5GHz wireless network Follow the steps outlined in “Changing SSID for 2.4GHz wireless network” and “Configuring Security Setting for 2.4GHz wireless network” but choose the 5GHz option instead. Changing Admin Name and Password Go to “Management”...
  • Page 25 Changing Date and Time Go to “Management” > “Date and Time”. Set the correct time and time zone for your access point using the drop down menus. The access point also supports NTP (Network Time Protocol) so, alternatively, you can enter the host name or IP address of a time server.
  • Page 26: Wi-Fi Protected Setup (Wps)

    II-6 Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup is a simple way to establish connections between WPS compatible devices. You can use the WPS button or the configuration webpage activate the access point’s WPS function. Go to “Wireless Settings” > “WPS” on your configuration webpage. Check the checkbox of “Enable”...
  • Page 27: Hardware Installation

    Hardware Installation After finishing the above setup processes, you may relocate the access point to the desired location. III-1 Antenna The antennae must be screwed onto the access point. Please screw both antennae on clock-wise onto the SMA connectors as demonstrated below: SMA Connectors...
  • Page 28: Powering On The Access Point Outdoor

    III-2 Powering on the Access Point Outdoor Remove the cap from the underside of the access point by 1) pulling the hook upwards, and 2) pulling the cap downward, as shown below: Removed Underside Cap Wire an Ethernet cable to the LAN 1 (PoE-In) port of the access point and the PoE switch to power up the access point.
  • Page 29 Let the hook click with the access point and make sure it does not come off easily. The cap serves as a rain-proof design suitable for use in the open. Click...
  • Page 30: Mounting

    III-3 Mounting After powering up the access point, mount it according to the desired mounting options: Wall or Pole Mount Wall Mount Attach the mount and access point to a wall using the included wall mount template and wall mount screw sets.
  • Page 31 Pole Mount Fix the mount and access point to a pole using the included pole mount straps.
  • Page 32: Browser Based Configuration Interface

    The browser-based configuration interface enables you to configure the device’s advanced features. The OAP1300 features a range of advanced functions such as MAC filtering, MAC RADIUS authentication, VLAN configurations, up to 32 SSIDs and many more. To access the browser based configuration interface: Connect a computer to your access point using an Ethernet cable.
  • Page 33 You will arrive at the “System Information” screen shown below. Use the menu across the top and down the left side to navigate. Where applicable, click “Apply” to save changes and reload the access point, or “Cancel” to cancel changes. Please wait a few seconds for the access point to reload after you “Apply”...
  • Page 34: Information

    IV-1 Information IV-1-1 System Information “System Information” page displays basic system information.
  • Page 35 System Model Displays the model number of the access point. Product Name Displays the product name for reference, which consists of “AP” plus the MAC address. Uptime Displays the total time since the device was turned on. System Time Displays the system time. Boot From Displays information for the booted hardware, booted from internal memory.
  • Page 36 of the power present in a received radio signal. Wireless 2.4GHZ (5GHz) / SSID SSID Displays the SSID name(s) for the specified frequency. Authentication Displays the authentication method for the specified SSID. See ‎ Method Wireless Settings. I V-3 Displays the encryption type for the specified SSID. See ‎ Encryption I V-3 Type...
  • Page 37: Iv-1-2 Wireless Clients

    IV-1-2 Wireless Clients “Wireless Clients” page displays information about all wireless clients connected to the device on the 2.4GHz or 5GHz frequency. Refresh time Auto Refresh Select a time interval for the client table list to automatically Time refresh. Manual Click refresh to manually refresh the client table.
  • Page 38: Iv-1-3 Wireless Monitor

    IV-1-3 Wireless Monitor “Wireless Monitor” is a tool built into the device to scan and monitor the surrounding wireless environment. Select a frequency and click “Scan” to display a list of all SSIDs within range along with relevant details for each SSID. Wireless Monitor Site Survey Select which frequency (or both) to scan, and click “Scan”...
  • Page 39: Iv-1-4 Dhcp Clients

    IV-1-4 DHCP Clients “DHCP Clients” shows information of DHCP leased clients.
  • Page 40: Iv-1-5 Log

    IV-1-5 “System log” displays system operation information such as up time and connection processes. This information is useful for network administrators. Older entries will be overwritten when the log is full Save Click to save the log as a file on your local computer. Clear Clear all log entries.
  • Page 41  Change Settings  System Boot Displays current model name  NTP Client  Wired Link LAN Port link status and speed status  Proxy ARP Proxy ARP module start & stop  Bridge Bridge start & stop.  SNMP SNMP server start &...
  • Page 42: Network Settings

    IV-2 Network Settings IV-2-1 LAN-Side IP Address “LAN-side IP address” page allows you to configure your access point on your Local Area Network (LAN). You can enable the access point to dynamically receive an IP address from your router’s DHCP server or you can specify a static IP address for your access point, as well as configure DNS servers.
  • Page 43 IP Address Specify the IP address here. This IP address will be assigned to your access point and will replace the default IP address. Subnet Mask Specify a subnet mask. The default value is 255.255.255.0 Default For DHCP users, select “From DHCP” to get default gateway Gateway from your DHCP server or “User-Defined”...
  • Page 44: Iv-2-2 Lan Port

    IV-2-2 LAN Port “LAN Port” page allows you to configure the settings for your access point’s two wired LAN (Ethernet) ports. Wired LAN Identifies LAN port 1 or 2. Port Enable Enable/disable specified LAN port. Speed & Select a speed & duplex type for specified LAN port, or use Duplex the “Auto”...
  • Page 45: Iv-2-3 Igmp Snooping

    IV-2-3 IGMP Snooping IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links IP multicast streams. Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic.
  • Page 46: Iv-2-4 Stp Management

    IV-2-4 STP Management When enabled, STP ensures that you do not create loops when you have redundant paths in your network (as loops are deadly to a network). This page allows you to enable / disable STP management. Press “Apply” to confirm the settings.
  • Page 47: Iv-2-5 Vlan

    IV-2-5 VLAN “VLAN” (Virtual Local Area Network) enables you to configure VLAN settings. A VLAN is a local area network which maps workstations virtually instead of physically and allows you to group together or isolate users from each other. VLAN IDs in the range 1 – 4095 are supported. VLAN Interface Wired LAN Identifies LAN port 1 or 2 and wireless SSIDs.
  • Page 48: Wireless Settings

    IV-3 Wireless Settings IV-3-1 2.4GHz 11bgn The “2.4GHz 11bgn” menu allows you to view and configure information for your access point’s 2.4GHz wireless network across five categories: Basic, Advanced, Security, WDS & Guest Network.
  • Page 49: Iv-3-1-1 Basic

    IV-3-1-1 Basic The “Basic” screen displays basic settings for your access point’s 2.4GHz Wi-Fi network (s). Wireless Enable or disable the access point’s 2.4GHz wireless radio. When disabled, no 2.4GHz SSIDs will be active. Band Wireless standard used for the access point. Combinations of 802.11b, 802.11g &...
  • Page 50 Auto Select a range to which auto channel selection can choose Channel from. Range Auto Select a time interval for how often the auto channel setting Channel will check/reassign the wireless channel. Interval Check/uncheck the “Change channel even if clients are connected”...
  • Page 51: Iv-3-1-2 Advanced

    IV-3-1-2 Advanced These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Changing these settings can adversely affect the performance of your access point. Contention Select “Short”...
  • Page 52 802.11n Enable/disable 802.11n protection, which increases reliability Protection but reduces bandwidth (clients will send Request to Send (RTS) to access point, and access point will broadcast Clear to Send (CTS), before a packet is sent from client). DTIM Set the DTIM (delivery traffic indication message) period value Period of the wireless radio.
  • Page 53: Iv-3-1-3 Security

    IV-3-1-3 Security The access point provides various security options (wireless data encryption). When data is encrypted, information transmitted wirelessly cannot be read by anyone who does not know the correct encryption key. It is essential to configure wireless security in order to prevent unauthorised access to your network.
  • Page 54: Iv-3-1-3-1 No Authentication / Additional Authentication

    SSID Selection Select a SSID to configure its security settings. Broadcast SSID Enable or disable SSID broadcast. Enable: the SSID will be visible to clients as an available Wi-Fi network. Disable: the SSID will not be visible as an available Wi-Fi network to clients –...
  • Page 55 Additional wireless authentication methods can be applied to all authentication methods: WPS must be disabled to use additional authentication. See ‎ I V-3-3 for WPS settings. MAC Address Filter Restrict wireless clients access based on MAC address specified in the MAC filter table.
  • Page 56: Iv-3-1-3-2 Wep

    IV-3-1-3-2 WEP (Wired Equivalent Privacy) is a basic encryption type. When selected, a notice will pop-up as exemplified below: Below is a figure showing the configurable fields: Key Length Select 64-bit or 128-bit. 128-bit is more secure than 64-bit and is recommended. Key Type Choose from “ASCII”...
  • Page 57: Iv-3-1-3-4 Wpa-Psk

    IV-3-1-3-4 WPA-PSK WPA-PSK is a secure wireless encryption type with strong data protection and user authentication, utilizing 128-bit encryption keys. Below is a figure showing the configurable fields: Fast Roaming Settings will also be shown: 802.11r Fast When your device roams from one AP to another on the Roaming same network, 802.11r uses a feature called Fast Basic Service Set Transition (FT) to authenticate more quickly.
  • Page 58: Iv-3-1-3-5 Wpa-Eap

    802.11r Fast Transition Roaming Settings Mobility_dom Specify the mobility domain (2.4GHz or 5GHz) Encryption Key Specify the encryption key Over the DS Enable or disable this function. IV-3-1-3-5 WPA-EAP Fast Roaming Settings will also be shown: WPA Type Select from WPA/WPA2 Mixed Mode-EAP, WPA2-EAP or WPA-EAP.
  • Page 59: Iv-3-1-4 Wds

    IV-3-1-4 Wireless Distribution System (WDS) can bridge/repeat access points together in an extended network. WDS settings can be configured as shown below. When using WDS, configure the IP address of each access point to be in the same subnet and ensure there is only one active DHCP server among connected access points, preferably on the WAN side.
  • Page 60 2.4GHz Select “WDS with AP” to use WDS with access point or “WDS Functionality Dedicated Mode” to use WDS and also block communication with regular wireless clients. When WDS is used, each access point should be configured with corresponding MAC addresses, wireless channel and wireless encryption method.
  • Page 61: Iv-3-1-5 Guest Network

    IV-3-1-5 Guest Network Enable / disable guest network to allow clients to connect as guests.
  • Page 62: Iv-3-2 5Ghz 11Ac 11An

    IV-3-2 5GHz 11ac 11an The “5GHz 11ac 11an” menu allows you to view and configure information for your access point’s 5GHz wireless network across five categories: Basic, Advanced, Security, WDS & Guest Network.
  • Page 63: Iv-3-2-1 Basic

    IV-3-2-1 Basic The “Basic” screen displays basic settings for your access point’s 5GHz Wi-Fi network (s). Wireless Enable or disable the access point’s 5GHz wireless radio. When disabled, no 5GHz SSIDs will be active. Band Wireless standard used for the access point. Combinations of 802.11a, 802.11n &...
  • Page 64 Range Auto Select a time interval for how often the auto channel setting Channel will check/reassign the wireless channel. Interval Check/uncheck the “Change channel even if clients are connected” box according to your preference. Channel Select the channel bandwidth: Bandwidth 20MHz (lower performance but less interference);...
  • Page 65: Iv-3-2-2 Advanced

    IV-3-2-2 Advanced These settings are for experienced users only. Please do not change any of the values on this page unless you are already familiar with these functions. Changing these settings can adversely affect the performance of your access point. Guard Set the guard interval.
  • Page 66 Tx Power Set the power output of the wireless radio. You may not require 100% output power. Setting a lower power output can enhance security since potentially malicious/unknown users in distant areas will not be able to access your signal. Beacon Set the beacon interval of the wireless radio.
  • Page 67: Iv-3-2-3 Security

    IV-3-2-3 Security The access point provides various security options (wireless data encryption). When data is encrypted, information transmitted wirelessly cannot be read by anyone who does not know the correct encryption key. It’s essential to configure wireless security in order to prevent unauthorised access to your network.
  • Page 68 Wireless Client Enable or disable wireless client isolation. Wireless client Isolation isolation prevents clients connected to the access point from communicating with each other and improves security. Typically, this function is useful for corporate environments or public hot spots and can prevent brute force attacks on clients’ usernames and passwords.
  • Page 69: Iv-3-2-4 Wds

    IV-3-2-4 Wireless Distribution System (WDS) can bridge/repeat access points together in an extended network. WDS settings can be configured as shown below. When using WDS, configure the IP address of each access point to be in the same subnet and ensure there is only one active DHCP server among connected access points, preferably on the WAN side.
  • Page 70 5GHz WDS Mode Select “WDS with AP” to use WDS with access point or “WDS Functionality Dedicated Mode” to use WDS and also block communication with regular wireless clients. When WDS is used, each access point should be configured with corresponding MAC addresses, wireless channel and wireless encryption method.
  • Page 71: Iv-3-2-5 Guest Network

    IV-3-2-5 Guest Network Enable / disable guest network to allow clients to connect as guests.
  • Page 72: Iv-3-3 Wps

    IV-3-3 Wi-Fi Protected Setup is a simple way to establish connections between WPS compatible devices. WPS can be activated on compatible devices by pushing a WPS button on the compatible device or from within the compatible device’s firmware / configuration interface (known as PBC or “Push Button Configuration”).
  • Page 73 Product PIN Displays the WPS PIN code of the device, used for PIN code WPS. You will be required to enter this PIN code into another WPS device for PIN code WPS. Click “Generate PIN” to generate a new WPS PIN code. Push-Button Click “Start”...
  • Page 74: Iv-3-4 Radius

    IV-3-4 RADIUS The RADIUS menu allows you to configure the device’s external RADIUS server settings. A RADIUS server provides user-based authentication to improve security and offer wireless client control – users can be authenticated before gaining access to a network. The device can utilize a primary and a secondary (backup) external RADIUS server for each of its wireless frequencies (2.4GHz &...
  • Page 75: Iv-3-4-1 Radius Settings

    IV-3-4-1 RADIUS Settings Configure the RADIUS server settings for 2.4GHz and 5GHz. Each frequency can use an internal or external RADIUS server.
  • Page 76 RADIUS Type Select “Internal” to use the access point’s built-in RADIUS server or “external” to use an external RADIUS server. RADIUS Server Enter the RADIUS server host IP address. Authentication Set the UDP port used in the authentication protocol of the Port RADIUS server.
  • Page 77: Iv-3-4-2 Internal Server

    IV-3-4-2 Internal Server The access point features a built-in RADIUS server which can be configured as shown below used when “Internal” is selected for “RADIUS Type” in the “Wireless Settings”  “RADIUS”  “RADIUS Settings” menu.  To use RADIUS servers, go to “Wireless Settings” “Security”...
  • Page 78 Session Set a duration of session timeout in seconds between 0 – Timeout 86400. Termination Select a termination-action attribute: Action Reauthentication: sends a RADIUS request to the access point; or, Not-Reauthentication: sends a default termination-action attribute to the access point; or Not-Send: no termination-action attribute is sent to the access point.
  • Page 79: Iv-3-4-3 Radius Accounts

    IV-3-4-3 RADIUS Accounts The internal RADIUS server can authenticate up to 256 user accounts. The “RADIUS Accounts” page allows you to configure and manage users. Enter a username in the box below and click “Add” to add the username.
  • Page 80 Select “Edit” to edit the username and password of the RADIUS account: Press “Apply” to apply the configuration, or “Cancel” to forfeit the changes. User Name Enter the user names here, separated by commas. Click “Add” to add the user to the user registration list. Reset Clear text from the user name box.
  • Page 81: Iv-3-5 Mac Filter

    IV-3-5 MAC Filter MAC filtering is a security feature that can help to prevent unauthorized users from connecting to your access point. This function allows you to define a list of network devices permitted to connect to the access point. Devices are each identified by their unique MAC address.
  • Page 82 Add MAC Enter a MAC address of computer or network device manually Address e.g. ‘aa-bb-cc-dd-ee-ff’ or enter multiple MAC addresses separated with commas, e.g. ‘aa-bb-cc-dd-ee-ff,aa-bb-cc-dd-ee-gg’ Click “Add” to add the MAC address to the MAC address filtering table. Reset Clear all fields. MAC address entries will be listed in the “MAC Address Filtering Table”.
  • Page 83: Iv-3-6 Wmm

    IV-3-6 Wi-Fi Multimedia (WMM) is a Wi-Fi Alliance interoperability certification based on the IEEE 802.11e standard, which provides Quality of Service (QoS) features to IEE 802.11 networks. WMM prioritizes traffic according to four categories: background, best effort, video and voice. Configuring WMM consists of adjusting parameters on queues for different categories of wireless traffic.
  • Page 84 Queues automatically provide minimum transmission delays for video, voice, multimedia and critical applications. The values can be adjusted further manually: CWMin Minimum Contention Window (milliseconds): This value is input to the initial random backoff wait time algorithm for retry of a data frame transmission.
  • Page 85: Iv-3-7 Schedule

    IV-3-7 Schedule The schedule feature allows you to automate the wireless network for the specified time ranges. Wireless scheduling can save energy and increase the security of your network. Check/uncheck the box “Enable” and select “Apply” to enable/disable the wireless scheduling function. Select “Add”...
  • Page 86 Schedules will be shown in the Schedule List as exemplified below: Select “Add” to add more schedules; or Check the box of currently available schedule, select “Edit” to edit, or select “Delete Selected” to delete; or Select “Delete All” to delete all schedules.
  • Page 87: Iv-3-8 Traffic Shaping

    IV-3-8 Traffic Shaping Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. Check the checkbox to enable traffic shaping, specify the down link and up link values, and click “Apply”...
  • Page 89: Iv-3-9 Bandsteering

    IV-3-9 Bandsteering Band steering detects clients capable of 5GHz operation and steers them there to make the more crowded 2.4 GHz band available for clients only capable of connecting to 2.4GHz band. This helps improve end user experience by reducing channel utilization, especially in high density environments.
  • Page 90: Management

    IV-4 Management (Configurable for AP Mode only) IV-4-1 Admin You can change the password used to login to the browser-based configuration interface here. It is advised to do so for security purposes. If you change the administrator password, please make a note of the new password.
  • Page 91 Advanced Settings Product Name Edit the product name according to your preference consisting of 1-32 alphanumeric characters. This name is used for reference purposes. Management Check/uncheck the boxes to enable/disable specified Protocol management interfaces (see below). When SNMP is enabled, complete the SNMP fields below.
  • Page 92 SNMP Trap Enter an SNMP Trap Community name for verification with Community the SNMP manager for SNMP-TRAP requests. SNMP Trap Specify the IP address or sever name (2-128 alphanumeric Manager characters) of the SNMP manager. HTTP Internet browser HTTP protocol management interface TELNET Client terminal with telnet protocol management interface SNMP...
  • Page 93: Iv-4-2 Date And Time

    IV-4-2 Date and Time Configure the date and time settings of the access point here. The date and time of the device can be configured manually or can be synchronized with a time server. Date and Time Settings Local Time Set the access point’s date and time manually using the drop down menus.
  • Page 94 NTP Time Server Use NTP The access point also supports NTP (Network Time Protocol) for automatic time and date setup. Server Name Enter the host name or IP address of the time server if you wish. Update Specify a frequency (in hours) for the access point to Interval update/synchronize with the NTP server.
  • Page 95: Iv-4-3 Syslog Server

    IV-4-3 Syslog Server The system log can be sent to a server. Syslog Server Settings Transfer Logs Check the box to enable the use of a syslog server. Enter a host name, domain or IP address for the server, consisting of up to 128 alphanumeric characters. Syslog E-mail Settings E-mail Logs Check the box to enable/disable e-mail logs.
  • Page 96: Iv-4-4 Ping Test

    IV-4-4 Ping Test The access point includes a built-in ping test function. Ping is a computer network administration utility used to test whether a particular host is reachable across an IP network and to measure the round-trip time for sent messages.
  • Page 97: Iv-4-5 I'm Here

    IV-4-5 I’m Here The access point features a built-in buzzer which can sound on command using the “I’m Here” page. This is useful for network administrators and engineers working in complex network environments to locate the access point. The buzzer is loud! Duration of Set the duration for which the buzzer will sound when the Sound...
  • Page 98: Advanced

    IV-5 Advanced IV-5-1 LED Settings The access point’s LEDs can be manually enabled or disabled according to your preference. Power LED Select on or off. 2.4GHz LED Select on or off. 5GHz LED Select on or off. Diag LED Select on or off.
  • Page 99: Iv-5-2 Update Firmware

    The “Firmware” page allows you to update the firmware of the system. Updated firmware versions often offer increased performance and security, as well as bug fixes. Download the latest firmware from the Edimax website. Do not switch off or disconnect the access point during a firmware upgrade, as this could damage the device.
  • Page 100 Firmware Location: a file on your PC Firmware Click “Choose File” to select firmware from your PC. Update File Update Click to update the firmware.
  • Page 101: Iv-5-3 Save / Restore Settings

    IV-5-3 Save / Restore Settings The device’s “Save / Restore Settings” page enables you to save / backup the device’s current settings as a file to your local computer, and restore the device to previously saved settings. Save Settings to PC Save Settings Encryption: If you wish to encrypt the configuration file with a password, check the “Encrypt the configuration file with a...
  • Page 102: Iv-5-4 Factory Default

    IV-5-4 Factory Default If the access point malfunctions or is not responding, rebooting the device (‎ Reboot) maybe an option to consider. If rebooting does not work, try I V-5-5 resetting the device back to its factory default settings. You can reset the access point back to its default settings using this feature if the reset button is not readily accessible.
  • Page 103: Iv-5-5 Reboot

    IV-5-5 Reboot If the access point malfunctions or is not responding, rebooting the device may be an option to consider. You can reboot the access point remotely using this feature. Reboot Click “Reboot” to reboot the device. A countdown will indicate the progress of the reboot.
  • Page 104: Operation Mode

    (via Ethernet cable). In Managed AP mode some functions of the access point will be disabled in this user interface and must be set using Edimax Pro NMS on the AP Controller. Press “Apply” to apply the configuration, or “Cancel” to forfeit the changes.
  • Page 105: Appendix

    Appendix Configuring your IP address The access point uses the default IP address 192.168.2.2. In order to access the browser based configuration interface, you need to modify the IP address of your computer to be in the same IP address subnet e.g. 192.168.2.x (x = 3 – 254).
  • Page 106: V-1-1 Windows Xp

    V-1-1 Windows XP Click the “Start” button (it should be located in the lower-left corner of your computer)  “Control Panel”  “Network and Internet Connections”  “Network Connections”  “Local Area Connection”. The “Local Area Connection Properties” window will appear, select “Internet Protocol (TCP / IP)”, and click “Properties”.
  • Page 107 Select “Use the following IP address”, then input the following values: IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Click ‘OK’ when finished.
  • Page 108: V-1-2 Windows Vista

    V-1-2 Windows Vista Click the “Start” button (it should be located in the lower-left corner of your computer)  “Control Panel”  “View Network Status and Tasks”  “Manage Network Connections”  “Local Area Network”  “Properties”. The “Local Area Connection Properties” window will appear, select “Internet Protocol Version 4 (TCP / IPv4)”, and then click “Properties”.
  • Page 109 Select “Use the following IP address”, then input the following values: IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Click ‘OK’ when finished.
  • Page 110: V-1-3 Windows 7

    V-1-3 Windows 7 Click the “Start” button (it should be located in the lower-left corner of your computer), then click “Control Panel”. Under “Network and Internet” click “View network status and tasks”.
  • Page 111 Click “Local Area Connection”. Click “Properties”.
  • Page 112 Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
  • Page 113 Select “Use the following IP address”, then input the following values: IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Click ‘OK’ when finished.
  • Page 114: V-1-4 Windows 8

    V-1-4 Windows 8 From the Windows 8 Start screen, switch to desktop mode by clicking the “Desktop” box. In desktop mode, click the File Explorer icon in the bottom left of the screen, as shown below.
  • Page 115 Right click “Network” and select “Properties”. In the window that opens, select “Change adapter settings” from the left side.
  • Page 116 Right click the connection and select “Properties”. Select “Internet Protocol Version 4 (TCP/IPv4) and then click “Properties”.
  • Page 117 Select “Use the following IP address”, then input the following values: IP address: 192.168.2.10 Subnet Mask: 255.255.255.0 Click ‘OK’ when finished.
  • Page 118: V-1-5 Mac

    V-1-5 Have your Macintosh computer operate as usual, and click on “System Preferences” In System Preferences, click on “Network”. Click on “Ethernet” in the left panel.
  • Page 119 Open the drop-down menu labeled “Configure IPv4” and select “Manually”. Enter the IP address 192.168.2.10 and subnet mask 255.255.255.0. Click on “Apply” to save the changes.
  • Page 120: Setting Ap Via Manageengine Mibbrowser With Snmpv3 - Example

    Setting AP via ManageEngine MibBrowser with SNMPv3 - Example V-2-1 Setting in Web 1. The length of the password needs to be equal or greater than 8. 2. SNMP Version: V3...
  • Page 121: V-2-2 Setting Rule

    Setting Rule If you want to set Basic Wireless Setting via SNMP, the related variables need to be set together. Please refer to the file Edimax-7476HPC_private_MIB_20150715_v1.1, for setting Radio or SSID. Example: Basic Wireless Settings Settings snmpset STRING 192.168.2.2 1.3.6.1.4.1.3822.2000.1.3.3 i 2 Auto Channel Disable snmpset STRING 192.168.2.2 1.3.6.1.4.1.3822.2000.1.2.3 i 3...
  • Page 122 Figure 2 Step 2: Check v3 and click Add Figure 3 Step 3: Enter AP’s IP and Administrator Name (User Name)
  • Page 123 Figure 4 Step 4: Click OK 2. Load MIB Module Figure 5 Click Load MIB Module and choose the file, edimax_20150728.txt (MIB file)
  • Page 124 3. Add variables Figure 6 Example of setting the variable Step 1.: Select the OID. Step 2-1.: Enter the index of Radio (2.4G). Step 2-2.: Enter the Set Value. Step 3-1.: Click MultiVar. Step 3-2.: Check Multi-Var. Step 4.: Add this Variable 4.
  • Page 125: Best Practice

    Best Practice VI-1 How to Create and Link WLAN & Access Point Groups NMS can be used to create individual SSIDs and group multiple SSIDs together into WLAN groups. You can then assign individual access points to use those WLAN group settings and/or group multiple access points together into access point groups, which you can also assign to use WLAN group settings.
  • Page 126 Enter an SSID name and set authentication/encryption and click “Save & Apply”:...
  • Page 127 The new SSID will be displayed in the WLAN panel. Repeat to add additional SSIDs according to your preference. Click “Add” in the WLAN Groups panel: Enter a name for the SSID group and check the boxes to select which SSIDs to include in the group.
  • Page 128: Vi-1-2 Create Access Point Group

    The new WLAN group will be displayed in the WLAN Group panel. Repeat to add additional WLAN groups according to your preference: VI-1-2 Create Access Point Group Go to NMS Settings  Access Point and click “Add” in the Access Point Group panel:...
  • Page 129 Enter a Name and then scroll down to the Group Settings panel and use the << button to add selected access points into your group from the box on the right side. Click “Save & Apply” when done. The new group will be displayed in the Access Point Group panel. Repeat to add additional access point groups according to your preference:...
  • Page 130: Vi-1-3 Assign Access Point Group To Use The Ssid Group Settings

    VI-1-3 Assign Access Point Group to use the SSID group settings Go to NMS Settings  Access Point and select an access point group using the checkboxes in the Access Point Group panel. Click “Edit”: Scroll down to the Profile Group Settings panel and check the “Override Group Settings”...
  • Page 131 Professional installation warning: This device is point-to-multi-point device. The general user should not attempt to install or change settings, it needs to be installed by a qualified personal who has RF exposure and related rule knowledge or technology. The installation position and output power does not exceed the limit set forth in US Rule CFR 47 part 15 section 15.247 &...
  • Page 132 COPYRIGHT Copyright  Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission from Edimax Technology Co., Ltd.
  • Page 133 19.66 dBm 5500-5700 27.73 dBm A simplified DoC shall be provided as follows: Article 10(9) Hereby, Edimax Technology Co., Ltd. declares that the radio equipment type AC1300 Outdoor AP is in compliance with Directive 2014/53/EU The full text of the EU declaration of conformity is available at the following internet address: http://www.edimax.com/edimax/global/...
  • Page 134 EU Declaration of Conformity English: This equipment is in compliance with the essential requirements and other relevant provisions of Directive 2014/53/EU, 2014/35/EU. Français: Cet équipement est conforme aux exigences essentielles et autres dispositions de la directive 2014/53/EU, 2014/35/EU. Čeština: Toto zařízení je v souladu se základními požadavky a ostatními příslušnými ustanoveními směrnic 2014/53/EU, 2014/35/EU.
  • Page 135 Declaration of Conformity We, Edimax Technology Co., Ltd., declare under our sole responsibility, that the equipment described below complies with the requirements of the European Radio Equipment directives. Equipment: AC1300 Outdoor AP Model No.: OAP1300 The following European standards for essential requirements have been followed:...
  • Page 136 Notice According to GNU General Public License Version 2 This product includes software that is subject to the GNU General Public License version 2. The program is free software and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no more than the costs of physically performing source distribution, a complete machine-readable copy of the corresponding source code.
  • Page 137 intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
  • Page 138 Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6.

Table of Contents