TP-Link EAP320 User Manual

TP-Link EAP320 User Manual

Ac1200/1900 wireless dual band gigabit access point
Hide thumbs Also See for EAP320:

Advertisement

User Guide

AC1200/1900 Wireless Dual Band Gigabit Access Point
EAP320/EAP330
REV1.0.0
1910011564

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link EAP320

  • Page 1: User Guide

    User Guide AC1200/1900 Wireless Dual Band Gigabit Access Point EAP320/EAP330 REV1.0.0 1910011564...
  • Page 2 CE Mark Warning This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. RF Exposure Information This device meets the EU requirements (1999/519/EC) on the limitation of exposure of the general public to electromagnetic fields by way of health protection.
  • Page 3: Safety Information

    100 mW e.i.r.p. It is permitted to use SRD for outdoor applications only for purposes of gathering telemetry information for automated monitoring and resources accounting systems or security systems. 2.3. Maximum mean e.i.r.p. density is 10 mW/MHz. Maximum 100 mW e.i.r.p. Indoor applications. Ukraine Limited e.i.r.p.
  • Page 4 This product can be used in the following countries: Explanation of the symbols on the product label Symbol Explanation DC voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE). This means that this product must be handled pursuant to European directive 2012/19/EU in order to be recycled or dismantled to minimize its impact on the environment.
  • Page 5: Declaration Of Conformity

    TP-LINK TECHNOLOGIES CO., LTD DECLARATION OF CONFORMITY For the following equipment: Product Description: Wireless Dual Band Gigabit Access Point Model No.: EAP320/EAP330 Trademark: TP-LINK We declare under our own responsibility that the above products satisfy all the technical regulations applicable to the product within the scope of Council Directives:...
  • Page 6 About this User Guide This User Guide is for EAP320 and EAP330. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer to the EAP Controller User Guide when the EAP is managed by the EAP Controller software.
  • Page 7: Table Of Contents

    CONTENTS Chapter 1 Introduction ............................3 Overview of the EAP ........................... 3 Hardware Overview ..........................3 1.2.1 LED ..............................3 1.2.2 Interface Panel ..........................4 Chapter 2 Network Topology .......................... 5 Chapter 3 Management Mode ........................6 Standalone Mode ..........................6 Managed Mode ............................
  • Page 8 Chapter 6 Monitoring ............................37 AP ................................37 6.1.1 AP List ............................37 SSID ................................ 42 6.2.1 SSID List ............................42 Client ..............................43 6.3.1 User List ............................43 6.3.2 Portal Authenticated Guest ....................44 Chapter 7 Management ..........................46 System Log ............................
  • Page 9: Chapter 1 Introduction

    “Celling lamp” appearance and easily mounting design with chassis make EAP easy to be installed on a wall or ceiling and blend in with most interior decorations. EAP320/EAP330 can be powered via a PSE* device or the provided power adapter. With the built-in dual-band antennas module, EAP320/EAP330 operate at both 2.4GHz and 5GHz, and apply 802.11ac standards and MIMO technology, allowing packet transmission at up to...
  • Page 10: Interface Panel

    This port is used to connect to the POE port of the provided PoE adapter for both data transmission and power supply through Ethernet cabling. POWER: The power port is used to connect the EAP320/EAP330 to an electrical wall outlet ...
  • Page 11: Chapter 2 Network Topology

    The EAP can be managed by the EAP Controller software, which is a management software specially designed for the TP-LINK EAP devices on a local wireless network, allowing you to centrally configure and monitor mass EAP devices using a web browser on your PC. For more...
  • Page 12: Chapter 3 Management Mode

    Chapter 3 Management Mode AC1200 Wireless Dual Band Access Point EAP320 and AC1900 Wireless Dual Band Access Point EAP330 can either work under the control of the EAP Controller software or work independently as a standalone access point. When user establishes a large-scale wireless network, the management of every single AP in the network is complex and complicated.
  • Page 13: Chapter 4 Network

    Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default, the EAP device obtains an IP address from a DHCP server (typically a router). You can also select Static to configure the IP address manually. Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device.
  • Page 14: Chapter 5 Wireless

    Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below. Figure 5-1 Wireless Page...
  • Page 15: Wireless Settings

    5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page...
  • Page 16: Wireless Basic Settings

    TIPS: Proceed to the following chapter for information on configuring the wireless network of the EAP. The configuring information of 2.4GHz is taken as the example. 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Check the box to enable the Wireless Radio. Radio/5GHz Wireless Radio: Wireless Mode:...
  • Page 17: Ssids

    Channel: Select the channel used by this device to improve wireless performance. 1/2412MHz means the channel is 1 and the frequency is 2412MHz. Tx power: Enter the transmit power value. By default, the value is 20. If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation.
  • Page 18 SSID Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless network identified by this SSID. If Broadcast: SSID Broadcast is not enabled, hosts must enter the AP’s SSID manually to connect to this AP.
  • Page 19 Open System: After you select Open System, clients can pass the  authentication and associate with the wireless network without password. However, correct password is necessary for data transmission. Shared Key: After you select Shared Key, clients has to input password to pass ...
  • Page 20 Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the client device's capability and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode.
  • Page 21: Wireless Advanced Settings

    Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's capability and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode.
  • Page 22: Load Balance

    is from 1 to 2347 bytes. The default value is 2347, which means that RTS is disabled. Fragmentation Specify the fragmentation threshold for packets. If the size of the packet is larger Threshold: than the fragmentation threshold, the packet will be fragmented into several packets.
  • Page 23: Portal Configuration

    Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server.
  • Page 24 No Authentication:Users are required to finish only two steps: agree with the user protocol and click the Login button. Local Password:Users are required to enter the preset password, which are saved in the EAP. External RADIUS Server:Users are required to enter the preset user name and password, which are saved in the database of the RADIUS server.
  • Page 25 Input Box 1 and Input Box 2. Enter up to 31 characters as the title of the authentication login page in Input Box 1, like “Guest Portal of TP-LINK”. Enter the terms presented to users in Input Box 2. The terms can be 1 to 1023...
  • Page 26 Local Password  Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Enter the password for local authentication. Password: Please refer to No Authentication to configure Authentication Timeout, Redirect, Redirect URL, and Portal Customization. External RADIUS Server  External RADIUS Server provides two types of portal customization: Local Web Portal and External Web Portal.
  • Page 27 Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Enter the port for authentication service. Port: RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. to configure Authentication Timeout, Redirect, Redirect Please refer to No Authentication...
  • Page 28: Free Authentication Policy

    External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. Portal Customization: Select External Web Portal.
  • Page 29 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Enter the source IP address and subnet mask of the clients who can enjoy the Source IP free authentication policy.
  • Page 30: Mac Filtering

    Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24.
  • Page 31 Settings  Enable MAC Filtering: Check the box to enable MAC Filtering. Station MAC Group  Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown. Figure 5-19 Station MAC Group Step 2: Click and fill in a name for the MAC group.
  • Page 32: Scheduler

    Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group member. MAC Filtering Association  Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Band: Displays the frequency band the wireless network operates at.
  • Page 33 Figure 5-23 Scheduler Page Settings  Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can perform configurations on the SSIDs/AP. The display of Scheduler Association is based on your option here. Scheduler Profile Configuration ...
  • Page 34 Step 1: Click , two tables will be shown. Figure 5-24 Scheduler Profile Configuration Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Select one profile, and click and configure the recurring schedule for the rule. Figure 5-26 Add a Rule...
  • Page 35: Scheduler Association

    Scheduler Association  This zone will display different contents based on your selection of association mode in Settings. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID SSID Name: Displays the SSID of the standalone AP. Displays the frequency band which the wireless network operates at. Band: Profile Name: Select a profile name from the drop-down list.
  • Page 36: Qos

    5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, we recommend you keep the default values for the EAP devices and station EDCA (Enhanced Distributed Channel Access). Figure 5-29 QoS Page 2.4GHz/5GHz Select the 2.4GHz or 5GHz to show and configure the setting of 2.4GHz or...
  • Page 37: Ap Edca Parameters

    5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client station. Figure 5-30 AP EDCA Parameters Queue: Queue displays the transmission queue. By default, the priority from high to low is Data 0, Data 1, Data 2, and Data 3.
  • Page 38: Station Edca Parameters

    5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA Parameters Queue displays the transmission queue. By default, the priority from high Queue: to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters.
  • Page 39: Rogue Ap Detection

    TXOP Limit: The TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the client station to the EAP device. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the EAP device.
  • Page 40: Settings

    Figure 5-32 Rogue AP Detection Page 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 Detected Rogue AP List Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown.
  • Page 41: Trusted Ap List

    Figure 5-34 Detected Rogue AP List Click to scan rogue APs. Make sure you have enabled Rogue AP Detection and saved the setting before you click the button. Action: Click Known to move the AP to the Trusted AP List. After the configurations are saved, the moved AP will not be displayed in the Detected Rogue AP List.
  • Page 42: Download/Backup Trusted Ap List

    SSID: The SSID of the trusted AP. Band: Displays the frequency band which the wireless network of the trusted AP operates Channel: The channel on which the trusted AP is currently broadcasting. Security: Displays the enabling or disabling of the security mode of the wireless network. 5.6.4 Download/Backup Trusted AP List You can import a list of trusted APs from a saved list which is acquired from another AP or created from a text file.
  • Page 43: Chapter 6 Monitoring

    Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List on the Monitoring page displays the device name, its MAC address and the number of clients.
  • Page 44: Device Information

    Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the EAP. Device Information  Figure 6-3 Device Information Displays the device name. Device Name: Device Model: Displays the model of the device.
  • Page 45: Lan Information

    Wireless Settings  Figure 6-4 Wireless Settings 2.4GHz/5GHz Choose one band to view the information about wireless setting. Channel/Frequency: Displays the channel number and the operating frequency. If you want to change them, please refer to 5.1.1 Wireless Basic Settings. Channel Width: Displays the spectral width of the radio channel used by the device.
  • Page 46 Subnet Mask: Displays the subnet mask of the device. LAN Port1/ LAN Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port. Port2: Client  Figure 6-6 Client Displays the MAC address of the client of the AP selected in AP List. MAC: SSID: Displays the SSID the client is connected to.
  • Page 47 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Displays the total amount of dropped packets received/sent on the LAN port.
  • Page 48: Ssid

    6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 49: Client

    MAC Filtering: Displays the enabling or disabling of MAC Filtering. If you want to modify it, please refer to 5.1.2 SSIDs. Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 50: Portal Authenticated Guest

    Access Point: Displays the name of the device to which the client is connected. SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the value of SNR, the better network performance the device provides.
  • Page 51 Rate(Mbps): Displays the data rate at which the authenticated client transmits wireless packets. Down(Byte): Displays the throughput of the downstream data. Up(Byte): Displays the throughput of the upstream data. Active Time: Displays the amount of time the client has been authenticated on the root AP. Action: Click Unauthorize to stop giving authorization to the clients connected to the wireless network.
  • Page 52: Chapter 7 Management

    Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure.
  • Page 53: Log Settings

    Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configured: Enable Auto Mail, Enable Server Enable Nvram. Figure 7-3 Log Settings Enable Auto Mail ...
  • Page 54: Backup Log

    Nvram (Non-volatile Random Access Memory) is a RAM that can still save data even if a device is power off. All TP-LINK EAPs are equipped with Nvram. With this option enabled, the Nvram feature can help reserve the system logs when an EAP device is power off.
  • Page 55: Web Server

    Figure 7-6 Backup Log Page 7.2 Web Server You can log in web management interface, thereby manage and maintain the device. Following is the page of Web Server. Figure 7-7 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure Server Designate a secure server port for web server in HTTPS mode.
  • Page 56: Trunk

    Following is the page of Management Access. Figure 7-8 Management Access Page Check the box to enable MAC Authentication. After MAC Authentication is enabled, only the PCs in MAC address list can log in the device’s web Authentication: management page. By default this function is disabled. All PCs in LAN can log in and manage the device.
  • Page 57: Led On/Off

    Enable: Check the box to enable Trunk. The Trunk function can bundles multiple Ethernet links into a logical link to increase bandwidth, improve reliability, and make load balanced. The EAP330 has two 1000Mbps Ethernet port. If the Trunk function is enabled and the ports are in the speed of 1000Mbps Full Duplex, the whole bandwidth of the Trunk is up to 4Gbps (2000Mbps * 2) because the bandwidth of each member port is 2000Mbps.
  • Page 58: Snmp

    Following is the page of SSH. Figure 7-11 SSH Page Server Port: Enter the server port. By default, it is port 22. SSH Login: Check the box to enable SSH Server. By default, it is disabled. 7.7 SNMP The device can be configured as an SNMP agent. SNMP (Simple Network Management Protocol), the most widely applied network management protocol, provides a management framework to monitor and maintain Internet devices.
  • Page 59 Figure 7-12 SNMP Page SNMP Agent: Enable SNMP Agent and the SNMP Agent will collect the information of this device and respond to information requests from one or more management systems. Enter the textual identification of the contact person for this managed node. SysContact: SysName: Enter an administratively-assigned name for this managed node.
  • Page 60 NOTE: Defining community can allow management systems in the same community to communicate with the SNMP Agent. The community name can be seen as the shared password of the network hosts group. Thus, for the security, we suggest modifying the default community name before enabling the SNMP Agent service.
  • Page 61: Chapter 8 System

    Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. User Account You can change the username and password to protect your device from unauthorized login. We recommend that you change the default user password on the very first system setup.
  • Page 62: Time Settings

    Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP address of the NTP server has to be filled in. Click the button and save the configuration, your PC’s time will be obtained as the device’s system time.
  • Page 63: Daylight Saving

    Time: Specify the device’s time. Select the number from the drop-down list in time format HH/MM/SS. Primary/Secondary If you’ve selected Get GMT from an NTP server, please input the primary NTP Server: NTP sever address and an alternative NTP server address. 8.2.2 Daylight Saving Figure 8-4 Daylight Saving Daylight Saving:...
  • Page 64: Reboot/Reset

    Recurring Mode  Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time adding in minutes when Daylight Saving Time comes. Select starting time and ending time of Daylight Saving Time. Start/End: Date Mode ...
  • Page 65: Backup & Restore

    Restore function helps you to restore the device to previous settings by uploading a backup file. Firmware Upgrade Figure 8-10 Firmware Upgrade to download the latest system file. Click Browse to choose Please log in http://www.tp-link.com/ the firmware file. Click Upgrade to upgrade the devices.
  • Page 66 NOTE: Please select the proper software version that matches your hardware to upgrade. To avoid damage, please do not turn off the device while upgrading. After upgrading, the device will reboot automatically.
  • Page 67: Appendix A: Specifications

    Appendix A: Specifications HARDWARE FEATURES Model EAP320 EAP330 Interface Kensington lock slot RESET button ETHERNET1(PoE): ETHERNET: 10/100/1000Mbps Ethernet port 10/100/1000Mbps Ethernet port (RJ-45) (RJ-45) CONSOLE port (RJ-45) ETHERNET2: 10/100/1000Mbps Ethernet port (RJ-45) Power Supply PoE(802.3at-compliant, 36-57VDC, PoE (802.3at-compliant, 36-57VDC, 0.7A Max) or external 12VDC/1.5A 0.7A Max) or external 12VDC/2.5A...

This manual is also suitable for:

Eap330

Table of Contents