Table of Contents

Advertisement

User Guide
For TP-Link Omada Access Points
© 2023 TP-Link 1910013169 REV4.8.0
Note: Unless otherwise noted, the introduction in this guide takes EAP650 as an example. Features available in the EAP may vary by model.

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link Omada EAP615

  • Page 1 User Guide For TP-Link Omada Access Points © 2023 TP-Link 1910013169 REV4.8.0 Note: Unless otherwise noted, the introduction in this guide takes EAP650 as an example. Features available in the EAP may vary by model.
  • Page 2: Table Of Contents

    CONTENTS About This User Guide......................1 Overview ..........................3  1 Quick Start ........................4 Determine the Management Method ....................5 Connect Network Devices ........................6 Log in to the EAP and Change the SSID ..................... 8 Configure and Manage the EAP ......................21  2 Configure the Network ....................22 Configure the Wireless Parameters ....................24 2.1.1  Configure SSIDs ..........................
  • Page 3 Manage the Trusted AP List ........................63 Configure Smart Antenna (Only for Certain Devices) ..............65  3 Monitor the Network ....................66 Monitor the EAP ............................67 Monitor the Wireless Parameters ......................69 Monitor the SSIDs ............................70 Monitor the Radio Settings ........................71 Monitor Radio Traffic ..........................71 Monitor LAN Traffic .............................
  • Page 4  5 Configure the System ....................95 Configure the User Account ........................96 Controller Settings ..........................97 Enable Cloud-Based Controller Management .................. 97 Configure Controller Inform URL ......................99 Configure the System Time.......................100 Configure the System Time ........................101 Configure Daylight Saving Time ......................103 Reboot and Reset the EAP .........................105 Backup and Restore the Configuration..................106 Update the Firmware ...........................107  6 Application Example ....................
  • Page 5: About This User Guide

    Some models featured in this guide may be unavailable in your country or region. For local sales information, visit https://www.tp-link.com The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure the accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
  • Page 6 The authentication information can be found where you find this guide. Specifications can be found on the product page at https://www.tp-link.com To ask questions, find answers, and communicate with TP-Link users or engineers, please visit https://community.tp-link.com to join TP-Link Community.
  • Page 7: Overview

    Overview Omada series products provide wireless coverage solutions for small-medium business and households. They can either work independently as standalone APs or be centrally managed by Omada Software Controller, Omada Hardware Controller, or Omada Cloud-Based Controller, providing a flexible, richly-functional but easily configured wireless network for small-medium business and households.
  • Page 8: Quick Start

     1  Quick Start This chapter introduces how to build a wireless network using the EAPs and how to complete the basic settings. Follow the steps below: 1.1 Determine the Management Method 1.2 Connect Network Devices 1.3 Log in to the EAP and Change the SSID 1.4 Configure and Manage the EAP...
  • Page 9: Determine The Management Method

    1.1 Determine the Management Method Before building your network, choose a proper method to manage your EAPs. You have the following two options: ■   Controller Mode If you want to manage a large-scale network centrally, choose Controller Mode. In Controller Mode, you can configure and monitor mass EAPs, switches, and gateways via Omada SDN Controller.
  • Page 10: Connect Network Devices

    1.2 Connect Network Devices To connect your EAPs to the local network, refer to the following topology. Internet Router (DHCP Server) Clients 1. Connect the WAN port (or Internet port) of the router to the internet. 2. Connect your EAPs to the LAN port of the router. 3. Connect your wireless clients such as phones, tablets and laptops to the WiFi of the EAP.
  • Page 11 Tips:   • If you want to power your EAPs using a PoE switch, refer to the following topology. Internet PoE Switch Router (DHCP Server) Clients   • The router is the gateway of the network, and devices in the LAN surf the internet via the router. At the same time, the router acts as a DHCP server to assign dynamic IP addresses to the EAPs and clients.
  • Page 12: Log In To The Eap And Change The Ssid

    Mobile Device Installed with Omada App 1. To install Omada App, launch the Apple App Store (iOS) or Google Play store (Android) and search “TP-Link Omada” or simply scan the QR code to download and install the app. Scan for Omada App...
  • Page 13 2. Connect your mobile device to the WiFi of the EAP. The default SSID is printed at the bottom of the EAP. 3. Launch the Omada app, tap Standalone APs and wait for the EAP to be discovered. Tips: All the EAPs in the same subnet will be discovered by Omada app and shown on the page.
  • Page 14 4. Tap on the EAP appearing on the page. Set a new username and password for your login account of the EAP. 5. Change the SSID and password to keep your wireless network secure. Tap Next.
  • Page 15 6. Confirm the settings in the summary page. Tap Next, and the settings will take effect in several minutes. 7. To join your new wireless network, select the SSID and tap Join.
  • Page 16 8. Tap Continue to go to the managment page. In this page, you can view the information and settings of the EAP. If you want to change the settings incuding radio, SSID and device account, tap Now you can connect your phones, tablets and laptops to the new WiFi. If you cannot access the internet, follow the to troubleshoot the problem.
  • Page 17 1. Set your PC to obtain an IP address automatically. 2. Connect your PC to the WiFi of the EAP. The default SSID is printed at the bottom of the EAP.
  • Page 18 3. Make sure that your PC has got the IP address, default gateway, and DNS server from the DHCP server. 4. To log in to the EAP, launch a web browser and enter http://tplinkeap.net in the address bar. The login page will appear. By default, both the username and password are admin.
  • Page 19 5. After logging in to the EAP, follow the step-by-step instructions to complete the basic configurations. In the pop-up window, configure a new username and a new password for your user account, then click Next. 6. Configure the SSID and password. Click Save. Tips: You can skip this step and configure wireless settings later on the management page.
  • Page 20 7. The following page will appear. Make sure that your device has connected to the new wireless network and tick the checkbox. Then click Finish. Now you can connect your phones, tablets and laptops to the new WiFi. If you cannot access the internet, follow the to troubleshoot the problem.
  • Page 21 When the DHCP server is not available in your network, the EAP has the DHCP fallback IP address, which is 192.168.0.254 by default. • Using EAP Discovery Utility Go to https://www.tp-link.com/download/EAP-Controller.html#EAP_Discovery_Tool download, install and launch EAP Discovery Utility on your PC. EAP Discovery Utility can...
  • Page 22 scan all EAPs in the same network segment, and find the IP address of the EAP. In the following figure, for example, the IP address of the EAP is 192.168.0.5. Tips: Some EAP models only works with certain software version of Discovery Utility. If your Discovery Utility can’t discover your EAP anyway, try a different software version.
  • Page 23 3. After logging in to the EAP, follow the step-by-step instructions to complete the basic configurations. In the pop-up window, configure a new username and a new password for your user account, then click Next. 4. Configure the SSID and password. Click Save. Tips: You can skip this step and configure wireless settings later on the management page.
  • Page 24 5. The following page will appear. Make sure that your device has connected to the new wireless network and tick the checkbox. Then click Finish. Now you can connect your phones, tablets and laptops to the new WiFi. If you cannot access the internet, follow the to troubleshoot the problem.
  • Page 25: Configure And Manage The Eap

    1.4 Configure and Manage the EAP If you use the web browser to configure your EAP, you can configure more advanced functions according to your needs, and manage it conveniently on the web page. On the top of the page, you can click to log out and click to open the technical support website.
  • Page 26: Configure The Network

     2  Configure the Network This chapter introduces how to configure the network parameters and the advanced features of the EAP, including:   • 2.1 Configure the Wireless Parameters   • 2.2 Configure Portal Authentication   • 2.3 Configure VLAN   • 2.4 Configure MAC Filtering  ...
  • Page 28: Configure The Wireless Parameters

    2.1 Configure the Wireless Parameters To configure the wireless parameters, go to the Wireless > Wireless Settings page.
  • Page 29: Configure Ssids

    For a multi-band EAP, you can click each band to enable Wireless Radio and configure wireless parameters. 2.1.1 Demonstrated with 2.4GHz, the following sections introduce these contents: Configure SSIDs 2.1.2 Configure Wireless Advanced Settings 2.1.1  Configure SSIDs SSID (Service Set Identifier) is used as an identifier for a wireless LAN, and is commonly called as the “network name“.
  • Page 30 2. Click to add a new SSID on the chosen band. Tips: You can also click to edit the specific SSID which already exists in the list. And you can click to delete the SSID in the list. 3. Configure the following required parameters for this SSID: SSID Specify a name for the wireless network.
  • Page 31   • WEP (for certain models) WEP (Wired Equivalent Privacy) is a traditional encryption method. It has been proved that WEP has security flaws and can easily be cracked, so WEP cannot provide effective protection for wireless networks. Since WPA-Personal and WPA-Enterprise are much safer than WEP, we recommend that you choose WPA-Personal or WPA-Enterprise if your clients also support them.
  • Page 32 Key Type Select the WEP key length for encryption. 64Bit: Enter 10 hexadecimal digits or 5 ASCII characters. 128Bit: Enter 26 hexadecimal digits or 13 ASCII characters. 152Bit: Enter 32 hexadecimal digits or 16 ASCII characters. Key Value Enter the WEP keys. The length and valid characters are determined by the key format and key type.
  • Page 33 Encryption Select the Encryption type. Note that some encryption type is only available under certain circumstances. Auto: The default setting is Auto and the EAP will select TKIP or AES automatically based on the client device’s request. TKIP: Temporal Key Integrity Protocol. TKIP is not supported in 802.11n mode, 802.11ac mode or 802.11n/ac mixed mode.
  • Page 34   • WPA-Personal (for certain models) WPA-Personal is based on a pre-shared key. It is characterized by high safety and simple settings, so it is mostly used by common households and small businesses. The following table introduces how to configure each item: Version Select the version of WPA-Personal according to your needs.
  • Page 35 Protocol). WPA3-Enterprise can generate different passwords for different clients, which ensures higher network security. But it also costs more to maintain the network, so it is more suitable for business networks. The following table introduces how to configure each item: Encryption Select the Encryption type: AES-GCM 256 or AES-CNSA.
  • Page 36: Configure Wireless Advanced Settings

      • WPA3-Personal (for certain models) WPA-Personal is based on a pre-shared key. It is characterized by high safety and simple settings, so it is mostly used by common households and small businesses. The following table introduces how to configure each item: Wireless Configure the wireless password with ASCII characters.
  • Page 37 Select the frequency band and configure the following parameters. Wireless Mode Select the IEEE 802.11 mode the radio uses.   • For 2.4GHz: 802.11b/g/n/ax/be mixed is recommended so that all of 802.11b, 802.11g, 802.11n, 802.11ax, and 802.11be clients operating in the 2.4GHz frequency can connect to the AP.
  • Page 38: Load Balance

    Tx Power (EIRP) Specify the transmit power value. If this value is set to be larger than the maximum transmit power that is allowed by the local regulation, the regulated maximum transmit power will be applied in the actual situation. Note: In most cases, it is unnecessary to use the maximum transmit power.
  • Page 39: More Settings

    Compared with the relatively new client devices, some legacy client devices support slower wireless rate. If they communicate with the same EAP, the slower clients take more time to transmit and receive data compared with the faster clients. As a result, the overall wireless throughput of the network decreases.
  • Page 40 DTIM Period The DTIM (Delivery Traffic Indication Message) is contained in some Beacon frames. It indicates whether the EAP has buffered data for client devices. The DTIM Period indicates how often the clients served by this EAP should check for buffered data still on the EAP awaiting pickup. You can specify the value between 1-255 Beacon Intervals.
  • Page 41: Configure The Mlo Network (Only For Wi-Fi 7 Devices)

    2.1.3  Configure the MLO Network (Only for Wi-Fi 7 Devices) MLO (Multi-Link Operation) enables Wi-Fi 7 devices to simultaneously send and receive data across different bands and channels. This ensures fast and reliable connections even in dense network environments. To configure an MLO network, go to Wireless > Wireless Settings > MLO and click Add. Configure the parameters and save the settings.
  • Page 42 Rate Limit With this option enabled, the download and upload rate of each client which connects to the SSID will be limited to balance bandwidth usage. You can limit the download and upload rate for some specific clients by View Client Information configuring rate limit in client list, refer to get more details.
  • Page 43: Configure Portal Authentication

    2.2 Configure Portal Authentication Portal authentication provides authentication service to the clients that only need temporary access to the wireless network, such as the customers in a restaurant or in a supermarket. To access the network, these clients need to enter the authentication login page and use the correct login information to pass the authentication.
  • Page 44: Configure Portal

    Configure Portal Three portal authentication types are available: No Authentication Local Password External RADIUS Server . The following sections introduce how to configure each authentication type.   • No Authentication With this authentication type configured, clients can pass the authentication and access the network without providing any login information.
  • Page 45 Authentication Specify the value of authentication timeout. Timeout A client’s authentication will expire after the authentication timeout and the client needs to log in to the authentication page again to access the network. Options include 1 Hour, 8 Hours, 24 Hours, 7 Days, and Custom. With Custom selected, you can customize the time in days, hours, and minutes.
  • Page 46   • Local Password With this authentication type configured, clients are required to provide the correct password to pass the authentication. Follow the steps below to configure Local Password as the portal authentication type: 1. Select the SSID on which the portal will take effect. 2. Select Local Password as the authentication type.
  • Page 47 Authentication Specify the value of authentication timeout. Timeout A client’s authentication will expire after the authentication timeout and the client needs to log in to the authentication page again to access the network. Options include 1 Hour, 8 Hours, 24 Hours, 7 Days, and Custom. With Custom selected, you can customize the time in days, hours, and minutes.
  • Page 48   • External RADIUS Server If you have a RADIUS server on the network to authenticate the clients, you can select External Radius Server. Clients need to provide the correct login information to pass the authentication.
  • Page 49 Follow the steps below to configure External Radius Server as the portal authentication type: 1. Select the SSID on which the portal will take effect. 2. Build a RADIUS server on the network and make sure that it is reachable by the EAP. 3. Go to the Portal configuration page on the EAP.
  • Page 50: Configure Free Authentication Policy

    Redirect With this function configured, the newly authenticated client will be redirected to the specific URL. Redirect URL With Redirect enabled, you also need to enter the URL in this field. The newly authenticated client will be redirected to this URL. Portal Customization Configure the authentication page.
  • Page 51 the clients can visit the login page provided by the web portal server and then pass the subsequent authentication process. Follow the steps below to add free authentication policy. 1. In the Free Authentication Policy section, click to load the following page. 2. Configure the following parameters.
  • Page 52 Destination Port Specify the port number of the service. When using this service, the clients can access the specific resources without authentication. Leaving the field empty means that clients can access the specific resources no matter what service they are using. Status Check the box to enable the policy.
  • Page 53: Configure Vlan

    2.3 Configure VLAN Wireless VLAN is used to set VLANs for the wireless networks. With this feature, the EAP can work together with the switches supporting 802.1Q VLAN. Traffic from the clients in different wireless networks is added with different VLAN tags according to the VLAN settings of the wireless networks.
  • Page 54: Configure Mac Filtering

    2.4 Configure MAC Filtering MAC Filtering is used to allow or block the clients with specific MAC addresses to access the network. With this feature you can effectively control clients’ access to the wireless network according to your needs. To configure MAC Filtering, go to the Wireless > MAC Filtering page. Follow the steps below to configure MAC Filtering on this page: 1. In the Settings section, check the box to enable MAC Filtering, and click Save.
  • Page 55 2. In the Station MAC Group section, click and the following page will appear. 1 ) Click and specify a name for the MAC group to be created. Click OK. You can create up to eight MAC groups. 2 ) Select a MAC group in the group list (the color of the selected one will change to blue).
  • Page 56 For example, the following configuration means that the hosts in Group 2 are denied to access the SSID SSID-1 on the 2.4GHz band and allowed to access the SSID SSID-2 on the 5GHz band.
  • Page 57: Configure Scheduler

    2.5 Configure Scheduler With the Scheduler feature, the EAP or its wireless network can automatically turn on or off at the time you set. For example, you can schedule the radio to operate only during the office working time to reduce power consumption. To configure Scheduler, go to the Wireless >...
  • Page 58 2. In the Scheduler Profile Configuration section, click and the following page will appear. 1 ) Click and specify a name for the profile to be created. Click OK. You can create up to eight profiles. 2 ) Select a profile in the list (the color of the selected one will change to blue). Click to add time range items to the profile.
  • Page 59 3. In the Scheduler Association section, configure the scheduler rule. There are two association modes: Association with SSID Association with AP . The following sections introduce how to configure each mode. ■ Association with SSID   If you select Association with SSID in step 1, the Scheduler Association table will display all the SSIDs on the EAP.
  • Page 60: Configure Band Steering

    2.6 Configure Band Steering A client device that is capable of communicating on multiple frequency bands will typically connect to the 2.4GHz band. However, if too many client devices are connected to an AP on the same band, the efficiency of communication will be diminished. Band Steering can steer multi-band clients to different bands to greatly improve the network quality.
  • Page 61: Configure Qos

    2.7 Configure QoS Quality of service (QoS) is used to optimize the throughput and performance of the EAP when handling differentiated wireless traffic, such as Voice-over-IP (VoIP), other types of audio, video, streaming media, and traditional IP data. In QoS configuration, you should set parameters on the transmission queues for different types of wireless traffic and specify minimum and maximum wait time for data transmission.
  • Page 62 2. Check the box to enable Wi-Fi Multimedia (WMM). With WMM enabled, the EAP uses the QoS function to guarantee the high priority of the transmission of audio and video packets. Note: If 802.11n only mode is selected in 2.4GHz (or 802.11n only, 802.11ac only, or 802.11 n/ac mixed mode selected in 5GHz), the WMM should be enabled.
  • Page 63 Minimum A list to the algorithm that determines the initial random backoff wait Contention time (window) for retry of a transmission. Window This value cannot be higher than the value of Maximum Contention Window. Maximum The upper limit (in milliseconds) for the doubling of the random backoff Contention value.
  • Page 64 Arbitration Inter- A wait time for data frames. The wait time is measured in slots. Valid Frame Space values are from 0 to 15. Minimum A list to the algorithm that determines the initial random backoff wait Contention time (window) for retry of a transmission. Window This value cannot be higher than the value of Maximum Contention Window.
  • Page 65: Configure Rogue Ap Detection

    2.8 Configure Rogue AP Detection A Rogue AP is an access point that is installed on a secure network without explicit authorization from the network administrator. With Rogue AP Detection, the EAP can scan all channels to detect the nearby APs and display the detected APs in the Detected Rogue AP list.
  • Page 66: Detect Rogue Aps And Move The Rogue Aps To The Trusted Ap List

    Detect Rogue APs and Move the Rogue APs to the Trusted AP List Follow the steps below to detect the nearby APs and move the trusted ones to the Trusted AP list. 1. In the Settings section, check the box to enable Rogue AP Detection. Click Save. 2. In the Detected Rogue AP List section, click 3. Wait for a few seconds without any operation.
  • Page 67: Manage The Trusted Ap List

    Beacon Interval Displays the Beacon Interval value of the EAP. Beacon frames are sent periodically by the AP to announce to the stations the presence of a wireless network. Beacon Interval determines the time interval of the beacon frames sent by the AP device.
  • Page 68 • Manually create a trusted AP list. Create a txt. file, input the MAC addresses of the trusted APs in the format XX:XX:XX:XX:XX:XX and use the Space key to separate each MAC address. Save the file as a cfg file. 2. On this page, check the box to choose Download (PC to AP).
  • Page 69: Configure Smart Antenna (Only For Certain Devices)

    2.9 Configure Smart Antenna (Only for Certain Devices) Smart Antenna improve Wi-Fi performance for user-heavy scenarios through antenna array and intelligent algorithm, and it helps overcome obstacles and signal interference. To enable or disable Smart Antenna, go to the Wireless > Smart Antenna page.
  • Page 70: Monitor The Network

     3  Monitor the Network This chapter introduces how to monitor the running status and statistics of the wireless network, including:   • 3.1 Monitor the EAP   • 3.2 Monitor the Wireless Parameters   • 3.3 Monitor the Clients...
  • Page 71: Monitor The Eap

    3.1 Monitor the EAP To monitor the EAP information, go to the Status > Device page. The following device information is displayed: Device Name Displays the name of the EAP. The name consists of the product model followed with the MAC address of the EAP by default. Device Model Displays the product model of the EAP.
  • Page 72 CPU Utilization Displays the CPU occupancy. If this value is too high, the EAP may work abnormally. Memory Utilization Displays the memory occupancy.
  • Page 73: Monitor The Wireless Parameters

    3.2 Monitor the Wireless Parameters You can view the wireless parameters of the EAP, including SSID lists, radio settings, radio traffic and LAN traffic. Tips: 2.1 Configure the Wireless Parameters To change the wireless parameters, you can refer to To monitor the wireless parameters, go to the Status > Wireless page.
  • Page 74: Monitor The Ssids

    Monitor the SSIDs You can monitor the SSID information of the EAP. The following table introduces the displayed information of the SSID: SSID Name Displays the SSID name. Clients Displays the number of clients currently connected to the SSID. Band Displays the frequency band the SSID is currently using.
  • Page 75: Monitor The Radio Settings

    Monitor the Radio Settings You can monitor the radio settings of the EAP. The following figure posted in the introduction takes 2.4GHz as an example. The following table introduces the displayed information of the EAP. Wireless Radio Displays whether wireless function is enabled on the radio band. Channel Frequency Displays the channel and frequency which are currently used by the EAP.
  • Page 76: Monitor Lan Traffic

    Tx Packets Displays the total number of the sent packets on the current band since the EAP starts up. Rx Bytes Displays the total received traffic on the current band since the EAP starts Tx Bytes Displays the total sent traffic on the current band since the EAP starts up. Rx Dropped Displays the total number of the dropped packets which are received on Packets...
  • Page 77 Rx Errors Displays the total number of the received error packets since the EAP starts up. Tx Errors Displays the total number of the sent error packets since the EAP starts up.
  • Page 78: Monitor The Clients

    3.3 Monitor the Clients You can monitor the information of the clients connected to the EAP. To monitor the client information, go to the Status > Client page. View Client Information There are two types of clients: users and portal authenticated guests. Users are the clients that connect to the SSID with portal authentication disabled.
  • Page 79 MAC Address Displays the MAC address of the user. Band Displays the frequency band the user is working on. SSID Displays the SSID the user is connecting to. Active Time Displays how long the user has been connected to the SSID. Up (Byte) Displays the user’s total uploaded traffic to the EAP since the last connection.
  • Page 80: View Block Client Information

    View Block Client Information You can view the information of the clients that have been blocked and resume the client’s access. The following information of the blocked client is displayed: Hostname Displays the hostname of the user. MAC Address Displays the MAC address of the user. Up (Byte) Displays the user’s total uploaded traffic to the EAP since the last connection.
  • Page 81: Manage The Eap

     4  Manage the EAP The EAP provides powerful functions of device management and maintenance. This chapter introduces how to manage the EAP, including:   • 4.1 Manage the IP Address of the EAP   • 4.2 Manage System Logs   • 4.3 Configure Web Server  ...
  • Page 82: Manage The Ip Address Of The Eap

    4.1 Manage the IP Address of the EAP The IP address of the EAP can be a dynamic IP address assigned by the DHCP server or a static IP address manually specified by yourself. By default, the EAP gets a dynamic IP address from the DHCP server.
  • Page 83   • Dynamic If you choose Dynamic as the IP address mode, make sure that there is a reachable DHCP server on your network and the DHCP sever is properly configured to assign IP address and the other network parameters to the EAP. For network stability, you can also configure the fallback IP parameters for the EAP: Fallback IP With the fallback IP configured, if the EAP fails to get an IP...
  • Page 84 Configure the IP address and network parameters as the following table shows: IP Address Specify a static IP address for the EAP. IP Mask Specify the network mask. Gateway Specify the network gateway. Primary DNS Specify the primary DNS server. Secondary DNS Specify the secondary DNS server.
  • Page 85: Manage System Logs

    4.2 Manage System Logs System logs record information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure. To manage system logs, go to the Management >...
  • Page 86: Configure The Way Of Receiving Logs

    Configure the Way of Receiving Logs In the Log Settings section, you can configure the ways of receiving system logs. Follow the steps below to configure this feature: 1. Check the corresponding box to enable one or more ways of receiving system logs, and configure the related parameters.
  • Page 87 Time Mode Select Time Mode: Fixed Time or Period Time. Fixed Time means that the system logs will be sent at the specific time every day. Period Time means that the system logs will be sent at the specific time interval. Fixed Time If you select Fixed Time, specify a fixed time to send the system log mails.
  • Page 88: Configure Web Server

    4.3 Configure Web Server With the web server, you can log in to the management web page of the EAP. You can configure the web server parameters of the EAP according to your needs. To configure Web Server, go to the Management > Web Server page. Follow the steps below to configure Web Server: 1. Refer to the following table to configure the parameters: Secure Server Port...
  • Page 89: Configure Management Access

    4.4 Configure Management Access By default, all hosts in the LAN can log in to the management web page of the EAP with the correct username and password. To control the hosts’ access to the web page of the EAP, you can specify the MAC addresses and management VLAN of the hosts that are allowed to access the web page.
  • Page 90: Configure Management Vlan

    Follow the steps below to configure Management Access on this page: 1. Check the box to enable MAC Authentication. 2. Specify one or more MAC addresses in the MAC1/MAC2/MAC3/MAC4 fields. Up to four MAC addresses can be added. 3. Click Save. Tips:   • You can click to quickly add the MAC address of your current logged-in host, .
  • Page 91: Configure Trunk (Only For Certain Devices)

    4.5 Configure Trunk (Only for Certain Devices) The trunk function can bundle multiple Ethernet links into a logical link to increase bandwidth and improve network reliability. To configure the trunk function, go to the Management > Trunk page. Enable Check the box to enable the function. Mode Select the trunk algorithm mode.
  • Page 92: Configure Led

    4.6 Configure LED You can turn on or off the LED light of the EAP and flash the LED to locate your device. To configure LED, go to the Management > LED Control page. Check the box to turn on or turn off the LED light of the EAP, and click Save. To flash the LED, click Locate.
  • Page 93: Configure Wi-Fi Control (Only For Certain Devices)

    4.7 Configure Wi-Fi Control (Only for Certain Devices) Note: Wi-Fi Control is only available on certain devices. To check whether your device supports this feature, refer to the actual web interface. If Wi-Fi Control is available, there is Management > Wi-Fi Control in the menu structure.
  • Page 94: Configure Poe Out (Only For Certain Devices)

    4.8 Configure PoE Out (Only for Certain Devices) Note: PoE Out is only available on certain devices. To check whether your device supports this feature, refer to the actual web interface. If PoE Out is available, there is Management > LAN Port Config in the menu structure.
  • Page 95: Configure Ssh

    4.9 Configure SSH If you want to remotely log in to the EAP via SSH, you can deploy an SSH server on your network and configure the SSH feature on the EAP. To configure SSH, go to the Management > SSH page. Follow the steps below to configure SSH on this page: 1. Refer to the following table to configure the parameters: Server Port...
  • Page 96: Configure Snmp

    4.10 Configure SNMP The EAP can be configured as an SNMP agent and work together with the SNMP manager. Once the EAP has become an SNMP agent, it is able to receive and process request messages from the SNMP manager. At present, the EAP supports SNMP v1 and v2c. To configure the EAP as an SNMP agent, go to the Management >...
  • Page 97 Set Community Set Community has the read and write right of the device’s SNMP information. Enter the community name that allows read/write access to the device’s SNMP information. The community name can be considered a group password. The default setting is private. Set Source Defines the IP address (for example, 10.10.10.1) for management systems that can serve as Set Community to read and write the SNMP...
  • Page 98: Configure Power Saving (Only For Certain Devices)

    4.11 Configure Power Saving (Only for Certain Devices) Power saving can reduce the AP’s power usage. To configure power saving, go to the Power > Power Saving page. Trigger by Time With this option enabled, you can specify the start and end time to enable power saving every day within the time period.
  • Page 99: Configure The System

     5  Configure the System This chapter introduces how to configure the system of the EAP, including:   • 5.1 Configure the User Account   • 5.2 Controller Settings   • 5.3 Configure the System Time   • 5.4 Reboot and Reset the EAP  ...
  • Page 100: Configure The User Account

    5.1 Configure the User Account Every EAP has a user account, which is used to log in to the management page of the EAP. When you start the EAP at the first time, the username and password of the user account are both admin.
  • Page 101: Controller Settings

    For details about the whole procedure, refer to the User Guide of Omada SDN Controller. The guide can be found on the download center of our official website: https://www.tp-link.com/support/download/ Enable Cloud-Based Controller Management Go to the System > Controller Settings page. In the Cloud- Based Controller Management...
  • Page 102 EAP to your Omada Cloud-Based Controller, you can check the connection status on this page.
  • Page 103: Configure Controller Inform Url

    Configure Controller Inform URL Go to the System > Controller Settings page. In the Controller Inform URL section, inform the EAP of the controller’s URL/IP address, and click Save. Then the EAP make contact with the controller so that the controller can discover the EAP.
  • Page 104: Configure The System Time

    5.3 Configure the System Time System time is the standard time for Scheduler and other time-based functions. The EAP supports the basic system time settings and the Daylight Saving Time (DST) feature. To configure the system time, go to the System > Time Settings page. The following two sections introduce how to configure the basic system time settings and the Daylight Saving Time feature.
  • Page 105: Configure The System Time

    Configure the System Time In the Time Settings section, you can configure the system time. There are three methods to set the system time: Set the System Time Manually Acquire the System Time From an NTP Server , and Synchronize the System Time with PC’s Clock Determine the way of setting the system time and follow the steps below to complete the configurations:  ...
  • Page 106 Note: If you use an NTP server on the internet, make sure that the gateway address is set correctly on the EAP. Otherwise, the EAP cannot get the system time from the NTP server successfully. To set the 2.1 Configure the Wireless Parameters gateway address, refer to 2. Specify the NTP server for the EAP.
  • Page 107: Configure Daylight Saving Time

    Configure Daylight Saving Time Daylight saving time is the practice of advancing clocks during summer months so that evening daylight lasts longer, while sacrificing normal sunrise times. The EAP provides daylight saving time configuration. Follow the steps below to configure daylight saving time: 1. Check the box to enable Daylight Saving.
  • Page 108 ■ Recurring Mode   If you select Recurring Mode, manually specify a cycle time range for the daylight saving time of the EAP. This configuration will be used every year. The following table introduces how to configure the cycle time range. Time Offset Specify the time to set the clock forward by.
  • Page 109: Reboot And Reset The Eap

    5.4 Reboot and Reset the EAP You can reboot and reset the EAP according to your need. To reboot and reset the EAP, go to the System > Reboot&Reset page. • To reboot the EAP, click the button , and the EAP will be rebooted automatically. Please wait without any operation.
  • Page 110: Backup And Restore The Configuration

    5.5 Backup and Restore the Configuration You can save the current configuration of the EAP as a backup file and save the file to your host. And if needed, you can use the backup file to restore the configuration. We recommend that you backup the configuration before resetting or upgrading the EAP.
  • Page 111: Update The Firmware

    EAP. To update the firmware, go to the System > Firmware Update page. Follow the steps below to update the firmware of your EAP: https://www.tp-link.com 1. Go to our website and search your EAP model. Download the proper firmware file on the support page of the EAP.
  • Page 112: Application Example

     6  Application Example This chapter provides an application example about how to establish and manage a EAP wireless network: A restaurant wants to provide the wireless internet access for the employees and guests. The restaurant now has a router, a switch, a dual-band EAP and a computer. Follow the steps below to establish the wireless network: 6.1 Determine the Network Requirements 6.2 Build the Network Topology...
  • Page 113: Determine The Network Requirements

    6.1 Determine the Network Requirements Before starting to build the network, we need to first analyze and determine the network requirements. In this restaurant example, the network requirements are as follows: • On both 2.4GHz and 5GHz bands, there are two SSIDs needed: one for the restaurant employees and one for the guests.
  • Page 114: Build The Network Topology

    6.2 Build the Network Topology Build the network topology as the following figure shows. Router (DHCP Server) Switch Internet LAN: 192.168.88.1 Management Host • The router is the gateway of the network and acts as a DHCP server to assign dynamic IP addresses to the management host, EAP and clients.
  • Page 115: Log In To The Eap

    6.3 Log in to the EAP After building the network topology, follow the steps below to log in to the web page of the EAP: 1. On the management host, launch the web browser and enter “192.168.88.1” in the address bar. Then log in to the router and find the IP address of the EAP. As the following figure shows, the IP address of the EAP is 192.168.88.101.
  • Page 116: Configure The Eap

    6.4 Configure the EAP To achieve the network requirements in this application example, we need to Configure SSIDs Configure Portal Authentication Configure Scheduler Configure SSIDs 1. After Logging in to EAP, follow the step-by-step instructions to complete the basic configurations of creating SSIDs. Configure the SSID as “employee_2.4GHz” and “employee_5GHz”, specify the Password as “restaurant123abc“.
  • Page 117: Configure Portal Authentication

    3. The following page will appear. Configure this SSID as “guest_2.4GHz“, keep the Security Mode as “None” and check the box to enable the Portal feature for this SSID. Click OK. 4. Click to enter the configuration page for the 5GHz band. Similarly to the configurations for the 2.4GHz band, configure another SSID for the guests on the 5GHz band.
  • Page 118 2. Configure the portal feature as the following figure shows. 1 ) Select the SSIDs for the guests on which the portal will take effect. 2 ) Select the Authentication Type as “Local Password” and specify the Password as “restaurant123”. 3 ) Configure Authentication Timeout. Here we customize the timeout as 2 hours. It means that guests will be logged out after they have been authenticated for 2 hours.
  • Page 119: Configure Scheduler

    5 ) Configure the authentication page. Specify the title and the term of use. To access the internet, guests need to enter the correct password in the Password field, accept the Term of Use, and click the Login button. 3. Click Save. Configure Scheduler Follow the steps below to schedule the radio to operate only during the working time (9:00 am to 22:00 pm).
  • Page 120 2 ) Choose the newly added profile “worktime”, and click . Then the item configuraiton page will appear. Specify the time range as everyday 9:00 to 22:00. Click OK. 4. In the Scheduler Association section, select “worktime“ in the Profile Name column and select “Radio On”...
  • Page 121: Test The Network

    6.5 Test the Network To ensure that the employees and guests can surf the internet via the wireless network, we can use a client device, such as a telephone, to test whether the SSIDs are working normally. • To test the SSIDs for the employees, follow the steps below: 1 ) Enable the Wi-Fi feature of the client device.
  • Page 122 Tips: Generally, the web browser pops up automatically. But if the web browser does not pop up, we can manually launch the web browser and visit any http website. Then the authentication page will appear. 4 ) If the network is working normally, we will be redirected to the website of the restaurant: http://www.restaurant1.com.

Table of Contents