ZDC ZN-7200-2EI-O User Manual

Zac wireless access point
Table of Contents

Advertisement

ZN-7200-2EI-O/ZN-7200-2AEI-O
ZAC Wireless Access Point
User's Manual
V1.1
Sep 2014
1

Advertisement

Table of Contents
loading

Summary of Contents for ZDC ZN-7200-2EI-O

  • Page 1 ZN-7200-2EI-O/ZN-7200-2AEI-O ZAC Wireless Access Point User’s Manual V1.1 Sep 2014...
  • Page 2: About This Manual

    Copyright Copyright © 2014 all rights reserved. No part of this publication may be reproduced, adapted, stored in a retrieval system, translated into any language, or transmitted in any form or by any means without the written permission of the supplier. About This Manual This user manual is intended to guide professional installer to install the IEEE 802.11n ZAC Access Point series and how to build the infrastructure centered on it.
  • Page 3: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4: Fcc Radiation Exposure Statement

    FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. To avoid the possibility of exceeding radio frequency exposure limits, you shall beep a distance of at least 100cm between you and the antenna of the installed equipment. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
  • Page 5 Warranty Hardware warranty is for one (1) year from date of shipment from Distributor warrants that hardware will conform to the current relevant published specifications and will be free from material defects in material and workmanship under normal use and service. IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT (INCLUDING,...
  • Page 6: Table Of Contents

    Content Chapter 1 Introduction ....................10 Introduction ......................... 10 Key Features ....................... 10 Hardware Overview ..................... 11 Front View........................... 11 Back View ........................... 11 Inside the Bottom Cover ......................12 LED Indicators .......................... 12 Typical Management Scenario ..................13 Hardware Installation ....................14 Preparation before Installation ...................
  • Page 7 Status ............................44 View Basic Information ......................44 View Managed APs ........................44 View Wireless Users ........................ 45 View DHCP Client Table ......................45 Wireless Settings ........................46 Wireless Networks (VAP Profiles Settings)................46 Wireless Protocols........................50 Access Control ......................... 52 Traffic Shaping .........................
  • Page 8 Thin AP Mode ......................73 Information ..........................73 Basic Settings ..........................73 FAT AP Mode ....................... 75 Status ............................75 View Basic Information ......................75 View Association List ........................ 75 View Network Flow Statistics ....................76 View ARP Table ........................77 View Bridge Table ........................
  • Page 9 Password ..........................102 Upgrade Firmware........................102 Backup/ Retrieve Settings ...................... 103 Restore Factory Default Settings.................... 103 Reboot............................ 104 Remote Management ......................104 SNMP Management ....................... 105 Certificate Settings ......................... 107 Tools ............................108 System Log ..........................108 Ping Watch Dog ........................108 Appendix A.
  • Page 10: Chapter 1 Introduction

    APs that eliminates the need for a separate hardware controller to manage the WLAN. ZN-7200-2EI-O operates at 2.4GHz band while ZN-7200-2AEI-O operates at 5GHz band. Ideally for SMB or hotspot network, this breakthrough innovation provides superior Wi-Fi network solutions at significantly lower cost and easier management.
  • Page 11: Hardware Overview

    Hardware Overview Front View Back View...
  • Page 12: Inside The Bottom Cover

    Inside the Bottom Cover LED Indicators COLOR STATUS DESCRIPTION Green The device is powered on The device is not receiving power Green The device has the Ethernet connection The device has no Ethernet connection Blinking Transmitting/receiving Ethernet packets WLAN Green The WLAN is active The WLAN is inactive Blinking...
  • Page 13: Typical Management Scenario

    Typical Management Scenario This section describes the typical management of ZAC Access Point. By default, it is set to thin AP mode (managed AP) which allows it to be managed by the ZAC Access Point in AC mode. The following figure illustrates a ZAC wireless network. When a thin AP mode joins a wired network, it will start to look for a ZAC Access Point in AC mode.
  • Page 14: Hardware Installation

    Hardware Installation This chapter describes safety precautions and product information you have to know and check before installing the ZAC Access Point. Preparation before Installation Professional Installation Required Please seek assistance from a professional installer who is well trained in the RF installation and knowledgeable in the local regulations.
  • Page 15: Installation Precautions

    Installation Precautions To keep the ZAC Access Point well while you are installing it, please read and follow these installation precautions. Users MUST use a proper and well-installed grounding and surge arrestor with the ZAC Access Point; otherwise, a random lightening could easily cause fatal damage to ZAC Access Point. EMD (Lightning) DAMAGE IS NOT COVERED UNDER WARRNTY.
  • Page 16 Pole Mounting Ring Ferrite Suppression Core 24VDC Power Cord & PoE Injector Warning: Users MUST use the “Power cord & PoE Injector” shipped in the box with the IEEE 802.11n ZAC Wireless Access Point. Use of other options will likely cause damage to the AP.
  • Page 17: Hardware Installation

    Hardware Installation Connect up The bottom of the ZAC Access Point is a movable cover. Grab the cover and pull it back harder to take it out as the figure shown below. Plug a standard Ethernet cable into the RJ45 port. Slide the cover back and press down the lock button to seal the bottom of the ZAC Access Point.
  • Page 18: Using The Grounding Wire

    Using the Grounding Wire The ZAC Access Point is equipped with a grounding wire. It is important that the Access Point, cables, and PoE Injector must be properly connected to earth ground during normal use against surges or ESD. 1. Remove the screw on the grounding point at the bottom of the ZAC Access Point. 2.
  • Page 19 Connect external antennas that came with the package to the SMA-type connectors on top of the Access Point. For longer coverage distance, it is recommended that higher gain antennas be used to best suit the application. Warning: Users MUST power off the Access Point first before connecting the external antenna to it.
  • Page 20 You may turn one antenna 45 degrees to the left and the other 45 degrees to the right. The tilted antennas are a reasonable way to operate and the best way if the antennas are fairly close together since they couple together much less than if they are both pointed in the same direction (parallel).
  • Page 21 To adjust antennas, loose the connector joint counterclockwise first, then adjust antenna to the desired position. DO NOT bend or turn the antennas without loosening the connector joint, otherwise, damage might be caused to the antennas. Antenna installation is complete.
  • Page 22: Mount The Ap On A Pole

    Mount the AP on a Pole Turn the ZAC Access Point over. Put the pole mounting ring through the middle hole of it. Note that you should unlock the pole mounting ring with a screw driver before putting it through the device as the following right picture shows.
  • Page 23: Power Up

    Power Up Connect power cord to the PoE injector as the following right picture shows. Connect the Ethernet cable that connects the Access Point to the “POE” port of the PoE injector as figured below.
  • Page 24: Connect To The Access Point

    Connect the power plug to a power socket. The Access Point will be powered up immediately. Connect to the Access Point To be able to configure and manage the ZAC Access Point, please do the followings: Open the ferrite core by unsnapping the connector latches. The core will open, revealing a concave surface.
  • Page 25 Loop the cable around and through the core. This helps "lock" the core in place, and may be required in circumstances with severe interference. Close the core and snap the halves back together. Connect the Ethernet cable with suppression core to the “Data In” port of the PoE injector.
  • Page 26 Connect the other end of Ethernet cable to a PC or a switch hub. The hardware installation is complete. To configure the Access Point, please refer to Chapter 2 Quick Setup Tutorial.
  • Page 27: Chapter 2 Quick Setup Tutorial

    Chapter 2 Quick Setup Tutorial Access the Web Configurator The ZAC Access Point provides you with user-friendly Web-based management interface to easily manage the access point. Configure the computer with a static IP address of 192.168.1.x, as the default IP address of the ZAC Access Point is 192.168.1.1.
  • Page 28 Enter the username (Default: admin) and password (Default: password) respectively and click “Login” to login the main page of the ZAC Access Point. Note: The username and password are case-sensitive, and the password should be no more than 19 characters!
  • Page 29: Configure The Ac+Thin Ap Mode

    Configure the AC+Thin AP mode The ZAC Access Point provides 4 operation modes: “Thin AP”, “Virtual AC”, “Virtual AC+Thin AP ”, as well as “FAT AP”. The default mode is “Thin AP”. To allow the ZAC Access Point to manage the thin APs, you need to switch one of the ZAC Access Points to virtual controller mode first.
  • Page 30 For Virtual Controller + Thin AP mode, if you need to configure the wireless settings for the ZAC Access Point especially SSID and encryption method, go to Wireless Settings > Wireless Networks and click on #1 Wireless SSID for configuration. After the configuration is made, click Save to save the settings. A dialog message will pop up to remind you changes will also apply to other managed Thin APs.
  • Page 31 Firmware Upgrade for ZAC AP in AC mode To upgrade the firmware for the ZAC Access Point in controller mode when necessary, go to Management > Firmware Upload and from Upgrade AC Firmware, browse the firmware file where it is placed.
  • Page 32 Moving the mouse over MAC address of each managed AP will also display relevant RF information such as channel mode, current channel, antenna being used together with transmit output power.
  • Page 33 Manage Thin APs To configure and manage the managed APs: 1. Enter the web page of the ZAC Access Point in controller mode and go to Management > AP Management, the following screen shows up. The ZAC Access Point AP in Virtual AC+Thin AP mode on the list is highlighted in bold font. By selecting it and hitting Radio button, you may configure its radio setting such as channel bandwidth, channel, antenna and output power.
  • Page 34 Besides radio setting, you may also reboot the managed AP, change its IP address and perform firmware upgrade for managed AP. Firmware Upgrade for Managed Thin APs For firmware upgrade, you may choose to upgrade the selected managed AP by hitting Upgrade Selected, or do the group upgrade by hitting Upgrade All.
  • Page 35 Monitor Managed Thin APs To view each managed AP’s status, please go to Status > Managed APs. Besides viewing device information such as device name, MAC address, IP address, and FW version, you may also monitor the wireless clients that are currently associated with the managed APs as well as packets statistics. Configure the Fat AP mode Fat AP mode operates as standalone AP that cannot be managed by the ZAC Access Point.
  • Page 36 To switch from default mode Thin AP to Fat AP mode for the first time configuration, go to Basic Settings. From the Device Mode drop-down list, select “Fat AP” and hit YES to make the change take effect. The Fat AP covers “AP mode”, “Wireless Client mode”, “Bridge mode” as well as “AP Repeater mode”.
  • Page 37 In the example here, we only change the “Wireless Network Name (SSID)” as “Join_me”. In addition, for better coverage of the AP to optimize your WLAN network, it is suggested that a high gain external antenna be used; To allows the radio to calculate the EIRP and limit output to legal levels to comply the regulation, you need to enter the Web GUI and to specify the gain of the antenna after the external antenna is installed onto the Access...
  • Page 38 4. To decrease the chances of data retransmission at long distance, the ZAC Access Point can automatically adjust proper ACK timeout value by specifying distance between the nodes. By specifying the distance, go to Wireless > Advanced Setting and fill in the number in the Distance field.
  • Page 39 Besides specifying the SSID manually, you may select the preferable Access Point to connect by clicking the “Site Survey” button beside Wireless Mode. Once the button is pressed, the wireless client will scan all the available access points within coverage. Select the one you prefer to connect, and click Select AP to establish the connection.
  • Page 40 4. To check whether the association with the Access Point has been successfully made, go to Status > Connections. If the connection is established, it will display association information of the Access Point including MAC address, wireless mode, signal strength and connection time.
  • Page 41 Bridge Mode 1. Go to Wireless > Basic Settings. Choose “Bridge” from Wireless Mode, choose a clean channel, and fill in the gain of the external antenna. Click Apply to save configuration. 2. Go to “WDS Settings” in “Wireless”, input the MAC address of the remote bridge to “Remote AP MAC Address 1”...
  • Page 42 network topologies are not supported by WDS and should be avoided in all the use cases. 3. Repeat the above procedures to configure the remote ZAC bridge. 4. Enter the actual distance in the Distance field. For example, if the distance between the two ZAC bridges is 3 kilometers, enter 3000 in the field.
  • Page 43 To establish point-to-point bridge connection, please follow the procedures described in Bridge mode. To connect the wireless client to the AP, please follow the procedures described in Wireless Client mode.
  • Page 44: Chapter 3 Navigate The Web Configurator

    Chapter 3 Navigate the Web Configurator Virtual AC+Thin AP Mode Status View Basic Information Open “Information” in “Status” to check the basic information of the ZAC Access Point, which is read only. Information includes system information, IP settings, and wireless network setting. Click “Refresh”...
  • Page 45: View Wireless Users

    View Wireless Users Open “Wireless Users” in “Status” to check the information of all the wireless clients such as MAC address, SSID of the managed APs that are associated with, signal strength, connection up time, and Click “Refresh” at the bottom to update the list. uploaded/downloaded packets.
  • Page 46: Wireless Settings

    Wireless Settings Wireless Setting allows you to configure wireless parameters, security method, access control and flow control for your ZAC Access Point. Note that the configuration will also apply on all the other managed APs. Wireless Networks (VAP Profiles Settings) The IEEE 802.11n ZAC Access Point allows up to 8 virtual SSIDs on a single BSSID and to configure different profile settings such as security and VLAN ID to each SSID.
  • Page 47 Basic Setting SSID: This wireless network name is shared among all associated devices in your wireless network. Keep it identical on all those devices. Note that the SSID is case-sensitive and cannot exceed 32 characters. Description: Name of the VAP profile Broadcast SSID: In AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk.
  • Page 48 To prevent unauthorized radios from accessing data transmitting over the connectivity, the ZAC Access Point provides you with rock solid security settings. Network Authentication Open System: It allows any device to join the network without performing any security check. Shared Key: Data encryption and key are required for wireless authentication (Not available in Bridge/AP Repeater mode).
  • Page 49 Note: If Radius relevant authentication type is selected, please go to Wireless  Radius Settings for further radius server configuration. WPA-PSK: It is a simplified WPA mode with no need for specific authentication server. In this so-called WPA Pre-Shared Key, all you have to do is just pre-enter a key in each WLAN node and this is the common way to be adopted in large and middle enterprise as well as residential network.
  • Page 50: Wireless Protocols

    Network Basic Setting: Network Mode: Specify the network mode. It includes Bridge and Router. When switch to Router mode, the LAN IP address for web page access will become 192.168.0.99. Wireless Protocols Allow the user to change country code, 802.11 mode and other advanced parameters for the ZAC Access Point.
  • Page 51 Basic Settings Country Region: The availability of some specific channels and/or operational frequency bands is country dependent. 802.11 Mode: The IEEE 802.11n ZAC Access Point can communicate with wireless devices of 802.11b/g or 802.11b/g/n. Data Rate: Usually “Auto” is preferred. Under this rate, the IEEE 802.11n ZAC Access Point will automatically select the highest available rate to transmit.
  • Page 52: Access Control

    ports identified as members of the specific multicast group. HT Protect: Enable HT (High Throughput) protect to ensure HT transmission with MAC mechanism. Under 802.11n mode, wireless client can be divided into HT STA and Non-HT STA, among which the one with HT protect enabled gets higher throughput. Preamble Type: It defines some details on the 802.11 physical layer.
  • Page 53: Traffic Shaping

    Open “Access Control” in “Wireless Settings” as below. Wireless Network: Select the VAP network you would like to enable access control. Access Control Mode If you select “Allow Listed”, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP.
  • Page 54: Radius Settings

    Enable Traffic Shaping Check this box to control the overall bandwidth for a specific VAP network. Interface Selection: Select the VAP network you would like to enable traffic shaping. Outgoing Traffic Rate: To specify maximum outgoing bandwidth to a certain rate in kbit/s. Outgoing Traffic Burst: To specify the buffer size for outgoing traffic that can be sent within a given unit of time.
  • Page 55: Tcp/Ip Settings

    Authentication RADIUS Server This is for RADIUS authentication. It can communicate with RADIUS through IP Address, Port and Shared Secret. IP Address: Enter the IP address of the Radius Server; Port: Enter the port number of the Radius Server; Shared Secret: This secret, which is composed of no more than 31 characters, is shared by the IEEE 802.11n ZAC Access Point and RADIUS during authentication.
  • Page 56: Captive Portal

    LAN Settings: IP Address: Specify the IP address for the managed Access Point. Subnet Mask: Specify the Subnet mask for the managed Access Point. DHCP Server: Select to enable or disable DHCP server on the managed Access Point. DHCP IP Address Range: When the DHCP Server is enabled, users may specify DHCP IP Address Range for the managed Access Point.
  • Page 57 To enable Captive Portal, check “Captive Portal” and select the VAP network needed for captive portal. Radius Settings Primary Radius Server: Enter the name or IP address of the primary radius server Secondary Radius Server: Enter the name or IP address of the primary radius server if any. Radius Auth Port: Enter the port number for authentication Radius Acct Port: Enter the port number for billing Radius Shared Secret: Enter the secret key of the radius server...
  • Page 58: Firewall Settings

    Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an un-trusted network. The IEEE 802.11n ZAC Access Point has capabilities of Source IP Filtering, Destination IP Filtering, Source Port Filtering, Destination Port Filtering, Port Forwarding as well as DMZ.
  • Page 59 Destination IP Filtering: You may create and activate a rule that filters a packet based on the destination IP address to restrict the local computers from accessing certain websites. Check “Enable Destination IP Filtering” to activate rule. Destination IP Address: Enter the IP address to be restricted. Comment: Make comments to record your filtering rule.
  • Page 60 Comment: Make comments to record your filtering rule. Click Apply and the IP address will be added in the list. To delete the restricted source ports, click Select checkbox of the designated ports and click the Delete Selected button. You may delete all the IP addresses in the list by clicking Delete All.
  • Page 61: Management

    Port Forwarding: The port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings ne are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind IEEE 802.11n Wireless ZAC Access Point’s NAT firewall.
  • Page 62 Restart: Restart the selected managed AP. Rename: Rename for the selected managed AP. Set IP: Assign a static IP address for the selected managed AP or obtain the IP address from ZAC Access Point in AC mode. Default is DHCP client. Radio: Allows to configure the channel bandwidth, operating channel, antenna and output power for the selected managed Access Point.
  • Page 63: System Settings

    Upgrade Selected: Upgrade firmware for the selected managed AP. Note that you need to upload the firmware file into the ZAC Access Point in AC mode prior to firmware upgrade, otherwise a window will pop up saying TAP firmware hasn’t been uploaded. Upgrade All: Click to upgrade all the managed APs simultaneously.
  • Page 64 path redundancy while preventing loops in a network. STP allows only one active path at a time between the access points but establish the redundant link as a backup if the initial link fails. STP Forward Delay: STP Forward Delay is the time spent in detecting and learning network tree topology state before entering the forward state.
  • Page 66: Time Settings

    Time Settings Compliant with NTP, the IEEE 802.11n ZAC Access Point is capable of keeping its time in complete accord with the Internet time. To use this feature, check “Enable NTP Client Update” in advance. Current Time Display the present time in Yr, Mon, Day, Hr, Min and Sec. Time Zone Select Select the time zone from the dropdown list.
  • Page 67: Backup/ Retrieve Settings

    firmware upgrade for managed APs. Note: Do NOT cut the power off during upgrade, otherwise the system may crash! Backup/ Retrieve Settings It is strongly recommended you back up configuration information in case of something unexpected. If tragedy hits your device, you may have an access to restore the important files by the backup. All these can be done by the local or remote computer.
  • Page 68: Reboot

    Restore factory default settings via Reset Button If software in ZAC Access Point is unexpectedly crashed and no longer reset the unit via W eb, you may do hardware reset via the reset button. Press and hold the button for at least 5 seconds and then release it until the PWR LED gives a blink.
  • Page 69: Password Settings

    Password Settings You can change the password for your IEEE 802.11n ZAC Access Point. Current Password: Enter the current password. New Password: Enter the new password. Confirm Password: Enter the new password again for confirmation. Note: The password is case-sensitive and its length cannot exceed 19 characters! Syslog Setting: The ZAC Access Point provides remote syslog management by sending logs to an external syslog server.
  • Page 70: System Log

    IP Address: Specify the IP address of the remote server. Port: Specify the port number of the remote server. Send Syslog via Email Log Schedule: Configure the frequency of logs being sent. 5 scheduling options are provided: Never, Hourly, Daily, Weekly, and When log is full. Severity Level: Choose All to send all the logs or Alert to send only the alert messages.
  • Page 71: System Alert

    System Alert: System alert record and events occurred on both ZAC Access Point in AC mode and managed AP in this page. Once the log entries are all used, the log will wrap around and the old logs will be deleted. You may click Clear to delete logs manually as well.
  • Page 72: Trace Route

    Ping Address Enter IP address of the remote destination. Ping Count: Enter the number of pings. Packet Size: Specify ping packet size. Trace Route This tool is used to discover the routes that packets take when traveling to the destination destination. Destination IP Address Enter IP address of the remote destination and click Start to start.
  • Page 73: Thin Ap Mode

    Thin AP Mode Information You may see some managed AP’s basic information such as model name, firmware version, MAC address, current up time, registration status as well as MAC address. Basic Settings Allows you to configure device and IP settings for the managed AP.
  • Page 74 General Settings: Device Mode: Three modes are provided: AC+Thin AP, Thin AP, FAT AP. Select AC+Thin AP to have the device act as virtual access controller to manage other managed APs on your network. Select “Thin AP” to have the ZAC Access Point managed by the ZAC AP in AC mode. Select FAT AP to perform as a standalone AP, neither managing nor managed by other ZAC APs.
  • Page 75: Fat Ap Mode

    FAT AP Mode Status View Basic Information Open “Information” in “Status” to check the basic information of the ZAC Access Point, which is read only. Information includes system information, LAN settings, wireless setting and interfac e status. Click “Refresh” at the bottom to have the real-time information. View Association List Open “Connections”...
  • Page 76: View Network Flow Statistics

    device name, connection time, signal strength, noise floor, ACK timeout, link quality, IP information, current data rate, current TX/RX packets. View Network Flow Statistics Open “Statistics” in “Status” to check the data packets received on and transmitted from the wireless and Ethernet ports.
  • Page 77: View Arp Table

    View ARP Table Open “ARP Table” in “Status” as below. Click “Refresh” to view current table. View Bridge Table Open “Bridge Table” in “Status” as below. Click “Refresh” to view current connected status.. View Active DHCP Client Table Open “DHCP Clients” in “Status” as below to check the assigned IP address, MAC address and time expired for each DHCP leased client.
  • Page 78: View Network Activities

    View Network Activities The network activities allows you to monitor the current Wireless and Ethernet TX/RX data traffic in graphical and numerical form on the Web of the Skyport. The chart scale and throughput dimension (Bps, Kbps, Mbps) changes dynamically according to the mean throughput value. Throughput statistics can be updated manually using the “Refresh”...
  • Page 79: Tcp/Ip Settings

    Select “Thin AP” to have the ZAC Access Point managed by the ZAC AP in AC mode. Select FAT AP to perform as a standalone AP, neither managing nor managed by other ZAC APs. Device Name: Specify the device name, which is composed of no more than 15 characters w ith (0-9), (A-Z), (a-z) or (-).
  • Page 80 Obtain IP Address Automatically: If a DHCP server exists in your network, you can check this option, thus the IEEE 802.11n ZAC Access Point is able to obtain IP settings automatically from that DHCP server. Note: When the IP address of the ZAC Access Point is changed, the clients on the network often need to wait for a while or even reboot before they can access the new IP address.
  • Page 81 WAN Settings: Specify the Internet access method to Static IP, DHCP or PPPOE. Users must enter WAN IP Address, Subnet Mask, Gateway settings provided by your ISPs. LAN Settings: When DHCP Server is disabled, users can specify IP address and subnet mask for the ZAC ACCESS POINT manually.
  • Page 82: Time Settings

    connect the ZAC Access Point with another wireless device before it is set to Router mode and access the ZAC Access Point via the connected wireless device. Time Settings Compliant with NTP, the IEEE 802.11n ZAC Access Point is capable of keeping its time in accord with the Internet time.
  • Page 83: Radius Settings

    RADIUS Settings RADIUS (Remote Authentication Dial-In User Service) is a server for remote user authentication and accounting; playing a central role in the network in providing the capabilities of authenticating, authorizing, accounting, auditing, alarming and etc. It allows an organization to maintain user profiles in a central database that all remote servers can share.
  • Page 84: Firewall Settings

    Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an un-trusted network. The IEEE 802.11n ZAC Access Point has capabilities of Source IP Filtering, Destination IP Filtering, Source Port Filtering, Destination Port Filtering, Port Forwarding as well as DMZ.
  • Page 85 You may create and activate a rule that filters a packet based on the destination IP address to restrict the local computers from accessing certain websites. Check “Enable Destination IP Filtering” to activate rule. Destination IP Address: Enter the IP address to be restricted. Comment: Make comments to record your filtering rule.
  • Page 86 Destination Port Filtering: You may create and activate a rule that filters a packet based on the destination port from your local network to Internet. Check “Enable Destination Port Filtering” to activate rule. Port Range: Enter the port range you would like to restrict. Protocol: Select port protocol: Both, TCP, UDP.
  • Page 87: Udp Pass Through

    activate port forwarding. IP Address: Enter the IP address the local server. Protocol: Select Both, UDP or TCP. Port Range: Specify the port range. Comment: Make comments to record the port forwarding rule. UDP Pass Through By check Enable UDP Pass through will allow all the UDPs packets to pass through the firewall. Note that opening all the UDP ports will be very likely to expose the network to intruders DMZ: A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its...
  • Page 88: Wireless

    Wireless Open “Basic Settings” in “Wireless” as below to make basic wireless configuration. Disable Wireless LAN Interface Check this option to disable WLAN interface, then the wireless module of IEEE 802.11n ZAC Access Point will stop working and no wireless device can connect to it. Operation Mode Four operating modes are available in IEEE 802.11n ZAC Access Point when acts as a FAT AP.
  • Page 89 Wireless Network Name (SSID) This wireless network name is shared among all associated devices in your wireless network. Keep it identical on all those devices. Note that the SSID is case-sensitive and can not exceed 32 characters. Broadcast SSID Under AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk.
  • Page 90 The maximum output power will vary depending on the country selected in order to comply with the local regulation. The output power here is counted from the RF single chain only not including the antenna gain. Maximum Output Power (per chain): Specify the signal transmission power.
  • Page 91: Vap Profile Settings

    VAP Profile Settings Available in AP mode, the IEEE 802.11n ZAC Access Point allows up to 8 virtual SSIDs on a single BSSID and to configure different profile settings such as security and VLAN ID to each SSID. To create a virtual AP, you may check the Enable box of the profile and click on the profile (eg.
  • Page 92 Basic Setting Profile Name: Name of the VAP profile Wireless Network Name: Enter the virtual SSID for the VAP Broadcast SSID: In AP mode, hiding network name is necessary when you are in a wireless environment that may have potential risk. By disabling broadcast SSID, the STA cannot scan and find the IEEE 802.11n ZAC Access Point, so that malicious attack by some illegal STA could be avoided.
  • Page 93 802.11a/n ZAC Access Point provides you with rock solid security settings. Network Authentication Open System: It allows any device to join the network without performing any security check. Shared Key: Data encryption and key are required for wireless authentication (Not available in Bridge/AP Repeater mode).
  • Page 94: Vlan

    encryption for the client. If it is selected, the data encryption can only be TKIP + AES and the passphrase is required. Data Encryption If data encryption is enabled, the key is required and only sharing the same key with other wireless devices can the communication be established.
  • Page 95: Advanced Settings

    Advanced Settings Open “Advanced Settings” in “Wireless” to make advanced wireless settings. A-MPDU/A-MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled; however, if your wireless clients don’t support A-MPDU/A-MSDU aggregation, it is not recommended to enable it.
  • Page 96 RTS Threshold The IEEE 802.11n ZAC Access Point sends RTS (Request to Send) frames to certain receiving station and negotiates the sending of a data frame. After receiving an RTS, that STA responds with a CTS (Clear to Send) frame to acknowledge the right to start transmission. The setting range is 0 to 2346 in byte.
  • Page 97: Access Control

    TDM Coordination Stands for “Time-Division Multiplexing Technique”, this resource reservation control mechanisms can avoid packet collisions and send the packets much more efficiently allowing for higher effective throughput rates. This function is only available in AP/CPE mode. It is highly recommended to enable TDM coordination when there are multiple CPEs needed to connect to the AP in your application.
  • Page 98: Traffic Shaping

    Profile Selection: Select the VAP network you would like to enable access control. Access Control Mode If you select “Allow Listed”, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP. W hile when “Deny Listed” is selected, those wireless clients on the list will not be able to connect the AP.
  • Page 99: Captive Portal

    Overall Traffic Shaping Check this box to control the overall bandwidth of the ZAC Access Point. Incoming Traffic Limit: To specify maximum incoming bandwidth to a certain rate in kbit/s. Incoming Traffic Burst: To specify the buffer size for incoming traffic that can be sent within a given unit of time.
  • Page 100 To enable Captive Portal, check “Captive Portal” and select the VAP network needed for captive portal. Radius Settings Primary Radius Server: Enter the name or IP address of the primary radius server Secondary Radius Server: Enter the name or IP address of the primary radius server if any. Radius Auth Port: Enter the port number for authentication Radius Acct Port: Enter the port number for billing Radius Shared Secret: Enter the secret key of the radius server...
  • Page 101: Wds Settings

    WDS Settings Extend the range of your network without having to use cables to link the Access Points by using the Wireless Distribution System (WDS): Simply put, you can link the Access Points wirelessly. Open “WDS Settings” in “Wireless” as below: Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and click “Apply”...
  • Page 102: Management

    Management Password From “Password Settings” in “Management”, you can change the password to manage your IEEE 802.11n ZAC Access Point. Current Password: Enter the current password. New Password: Enter the new password. Confirm Password: Enter the new password again for confirmation. Note: The password is case-sensitive and its length cannot exceed 19 characters! Upgrade Firmware...
  • Page 103: Backup/ Retrieve Settings

    Note: Do NOT cut the power off during upgrade, otherwise the system may crash! Backup/ Retrieve Settings It is strongly recommended you back up configuration information in case of something unexpected. If tragedy hits your device, you may have an access to restore the important files by the backup. All these can be done by the local or remote computer.
  • Page 104: Reboot

    Restore factory default settings via Reset Button If software in IEEE 802.11n ZAC Access Point is unexpectedly crashed and no longer reset the unit via W eb, you may do hardware reset via the reset button. Press and hold the button for at least 5 seconds and then release it until the PWR LED gives a blink.
  • Page 105: Snmp Management

    SNMP Management The IEEE 802.11n ZAC Access Point supports SNMP for convenient remote management. Open “SNMP Settings” in “Management” shown below. Set the SNMP parameters and obtain MIB file before remote management. Protocol Version: Select the SNMP version, and keep it identical on the IEEE 802.11n ZAC Access Point and the SNMP manager.
  • Page 106 Trap Destination: Specify the IP address of the station to send the SNMP traps to. Trap Community: Specify the password sent with each trap to the manager. By default, it is set to public and allows all requests. Configure SNMPv3 User Profile For SNMP protocol version 3, you can click “Configure SNMPv3 User Profile”...
  • Page 107: Certificate Settings

    Certificate Settings Under Wireless Client mode, when EAP-TLS is used, the RADIUS server must know which user certificates to trust. The Server can trust all certificates issued by a given CA. To import a user certificate, from Import User Certificates, click “Browse” and specify the location where the user certificate is placed.
  • Page 108: Tools

    Tools System Log System log is used for recording events occurred on the IEEE 802.11n ZAC Access Point, including station connection, disconnection, system reboot and etc. Open “System Log” in “Tools” as below. Remote Syslog Server Enable Remote Syslog: Enable System log to alert remote server. IP Address: Specify the IP address of the remote server.
  • Page 109 Ping Watchdog Enable Ping Watchdog: To activate ping watchdog, check this checkbox. IP Address to Ping: Specify the IP address of the remote unit to ping. Ping Interval: Specify the interval time to ping the remote unit. Startup Delay: Specify the startup delay time to prevent reboot before the IEEE 802.11n ZAC Access Point is fully initialized.
  • Page 110: Appendix A. Ascii

    Appendix A. ASCII WEP can be configured with a 64-bit, 128-bit or 152-bit Shared Key (hexadecimal number or ACSII). As defined, hexadecimal number is represented by 0-9, A-F or a-f; ACSII is represented by 0-9, A-F, a-f or punctuation. Each one consists of two-digit hexadecimal. Table 1 ACSII ASCII ASCII...

This manual is also suitable for:

Zn-7200-2aei-oZn-7200-2eiZn-7200-2aei-l

Table of Contents