TP-Link Auranet EAP110 User Manual
Hide thumbs Also See for Auranet EAP110:

Advertisement

User Guide

For TP-Link Auranet Access Points
REV2.0.0
1910011960

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link Auranet EAP110

  • Page 1: User Guide

    User Guide For TP-Link Auranet Access Points REV2.0.0 1910011960...
  • Page 2 Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd.
  • Page 3 FCC STATEMENT (EAP110/EAP320/EAP330/EAP225/EAP245) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4: Canadian Compliance Statement

    CE Mark Warning (EAP110) This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. (EAP320/EAP330/EAP225/EAP245) This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
  • Page 5 1) The device for operation in the band 5150–5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; 2) For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the band 5725-5850 MHz shall be such that the equipment still complies with the e.i.r.p.
  • Page 6: Safety Information

    Déclaration d'exposition aux radiations Cet équipement est conforme aux limites d'exposition aux rayonnements ISEDC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 26 cm de distance entre la source de rayonnement et votre corps.(EAP320) Cet équipement est conforme aux limites d'exposition aux rayonnements ISEDC établies pour un environnement non contrôlé.
  • Page 7 NCC Notice & BSMI Notice 注意! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自 變更頻率、加大功率或變更原設計之特性或功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通行; 經發現有干擾現象時, 應立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信規定作業之無線電 信。低功率射頻電機需忍受合法通信或工業、科學以及醫療用電波輻射性電機設備之干擾。 安全諮詢及注意事項 ●請使用原裝電源供應器或只能按照本產品注明的電源類型使用本產品。 ●清潔本產品之前請先拔掉電源線。請勿使用液體、噴霧清潔劑或濕布進行清潔。 ●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 (EAP320/EAP330/EAP225/EAP245) For EU/EFTA, this product can be used in the following countries: Explanation of the symbols on the product label Symbol Explanation DC voltage...
  • Page 8 pursuant to European directive 2012/19/EU in order to be recycled or dismantled to minimize its impact on the environment. User has the choice to give his product to a competent recycling organization or to the retailer when he buys a new electrical or electronic equipment. Indoor use only...
  • Page 9: Table Of Contents

    CONTENTS About this User Guide ..........................1 Chapter 1 Introduction ........................1 Chapter 2 Network Topology ......................2 Chapter 3 Management Mode ......................4 Standalone Mode ........................ 4 Managed Mode ........................4 Switch to Standalone Mode .................... 4 Chapter 4 Network ..........................
  • Page 10 6.2.1 SSID List ........................44 Client............................45 6.3.1 User List ........................46 6.3.2 Portal Authenticated Guest ................46 Chapter 7 Management ........................48 System Log ......................... 48 7.1.1 Log List ........................49 7.1.2 Log Settings ......................49 7.1.3 Backup Log (For EAP320/330/225 only) ............51 Web Server ..........................
  • Page 11: About This User Guide

    The Quick Installation Guide can be found where you find this guide or inside the package of the EAP. Specifications can be found on the product page at http://www.tp-link.com. A Technical Support Forum is provided for you to discuss our products at http://forum.tp-link.com.
  • Page 12: Chapter 1 Introduction

    Chapter 1 Introduction Auranet series products provide wireless coverage solutions for small-medium business. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily-configured enterprise-grade wireless network for small and medium business. “Celling lamp”...
  • Page 13: Chapter 2 Network Topology

    Chapter 2 Network Topology A typical network topology for the EAP is shown below. Internet Router Switch EAP Cont roller Management Host Clients Figure 2-1 Typical Topology To deploy an EAP in your local network, a DHCP server is required to assign IP addresses to the EAP and clients.
  • Page 14 The EAP can be managed by the EAP Controller software, which is a management software specially designed for the TP-Link EAP devices on a local wireless network, allowing you to centrally configure and monitor mass EAP devices using a web browser on your PC.
  • Page 15: Chapter 3 Management Mode

    Forget Controller. You can the EAP via the EAP Controller to turn it back as a standalone AP. Refer to the EAP Controller User Guide from our website at www.tp-link.com to learn more. TIPS: Proceed to the following chapters for information on using the EAP in standalone mode.
  • Page 16: Chapter 4 Network

    Chapter 4 Network Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default, the EAP device obtains an IP address from a DHCP server (typically a router). Select Static to configure IP address manually. Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device.
  • Page 17: Chapter 5 Wireless

    Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below. Figure 5-1 Wireless Page...
  • Page 18: Wireless Settings

    5.1 Wireless Settings Wireless Settings Following is the page of NOTE: EAP110 has only 2.4GHz band. Figure 5-2 Wireless Settings Page...
  • Page 19: Wireless Basic Settings

    TIPS: Proceed to the following chapter for information on configuring the wireless network of the EAP. The configuring information of 2.4GHz is taken as the example. 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Check the box to enable 2.4GHz Wireless Radio. Wireless Radio: Wireless Mode: Select the protocol standard for the wireless network.
  • Page 20: Ssids

    Select the channel used by this device to improve wireless Channel: performance. 1/2412MHz means the Channel is 1 and the frequency is 2412MHz. By default, channel is automatically selected. Tx power: Enter the transmit power value. If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation.
  • Page 21 Click to add up to 8 wireless networks per radio. SSID Name: Enter up to 32 characters as the SSID name. Wireless Set a VLAN ID for the wireless network. VLAN ID: Wireless networks with the same VLAN ID are grouped to a VLAN. SSID Enable this function, AP will broadcast its SSID to hosts in the surrounding Broadcast:...
  • Page 22 Figure 5-5 Security Mode-WEP Type: Select the authentication type for WEP. Auto: The default setting is Auto, which can select Open System or  Shared Key automatically based on the wireless station's capability and request. Open System: After you select Open System, clients can pass the ...
  • Page 23 WPA-Enterprise  Based on RADIUS server, WPA-Enterprise can generate different passwords for different users and it is much safer than WPA-PSK. However, it costs much to maintain and is more suitable for enterprise users. At present, WPA-Enterprise has two versions: WPA-PSK and WPA2-PSK.
  • Page 24 NOTE: Encryption type TKIP is not supported in 802.11n mode. If TKIP is applied in 802.11n mode, the clients may not be able to access the wireless network of the EAP. If TKIP is applied in 11b/g/n mode (in the 2.4GHz frequency band) or 11a/n (in the 5GHz frequency band), the device may work at a low transmission rate.
  • Page 25: Wireless Advanced Settings

    5.1.3 Wireless Advanced Settings Figure 5-8 Wireless Advanced Settings Beacon Beacons are transmitted periodically by the device to announce the Interval: presence of a wireless network for the clients. Beacon Interval value determines the time interval of the beacons sent by the device. You can specify a value from 40 to 100.
  • Page 26: Portal

    Figure 5-9 Load Balance Load Balance: Disable by default. Click ON to enable the function. After enabling it, you can set a number for maximum associated clients to control the wireless access. Maximum Enter the number of clients to be allowed for connection to the EAP. Associated The number ranges from 1 to 99.
  • Page 27: Portal Configuration

    Portal Following is the page of Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server.
  • Page 28 No Authentication :Users are required to finish only two steps: agree with the user protocol and click the Login button. Local Password :Users are required to enter the preset password, which are saved in the EAP. External RADIUS Server : Users are required to enter the preset user name and password, which are saved in the database of the RADIUS server.
  • Page 29 Words can be filled in Input Box 1 and Input Box 2. Enter up to 31 characters as the title of the authentication login page in Input Box 1, like “Guest Portal of TP-Link”. Enter the terms presented to users in Input Box 2. The terms can be 1 to...
  • Page 30 Local Password  Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Password: Enter the password for local authentication. Please refer to No Authentication to configure Authentication Timeout, Redirect, Redirect URL and Portal Customization. External RADIUS Server  External RADIUS Server provides two types of portal customization: Local Web Portal and External Web Portal.
  • Page 31 Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Select External RADIUS Server. Type: RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. Enter the shared secret of RADIUS server to log in to the RADIUS RADIUS Password: server.
  • Page 32: Free Authentication Policy

    External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server.
  • Page 33 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Source IP Enter the source IP address and subnet mask of the clients who can Range: enjoy the free authentication policy. Leaving the field empty means all IP addresses can access the specific resources.
  • Page 34: Mac Filtering

    Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24. Policy 1 is enabled. Click to edit the policy.
  • Page 35 Figure 5-18 MAC Filtering Page Settings  Enable Check the box to enable MAC Filtering. Filtering: Station MAC Group  Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown. Figure 5-19 Station MAC Group...
  • Page 36 Step 2: Click and fill in a name for the MAC group. Figure 5-20 Add a Group Step 3: Select one MAC group, click and input the MAC address you want to organize into this group. Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address.
  • Page 37: Scheduler

    MAC Filtering Association  Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Band: Displays the frequency band the wireless network operates at. MAC Group Name: Select a MAC group from the drop-down list to allow or deny its members to access the wireless network.
  • Page 38 Figure 5-23 Scheduler Page Settings  Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can perform configurations on the SSIDs/AP. The display of Scheduler Association is based on your option here. Scheduler Profile Configuration ...
  • Page 39 Step 1: Click , two tables will be shown. Figure 5-24 Scheduler Profile Configuration Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Select one profile, and click and configure the recurring schedule for the rule.
  • Page 40: Scheduler Association

    Figure 5-26 Add a Rule Scheduler Association  This zone will display different contents based on your selection of association mode in Settings. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID SSID Name: Displays the SSID of the standalone AP. Band: Displays the frequency band which the wireless network operates at.
  • Page 41: Qos

    Associated with AP Figure 5-28 Scheduler Association_Associated with AP Displays the name of the device. AP MAC: Displays the MAC address of the device. Profile Name: Select a profile name from the drop-down list. Profile name is configured in Scheduler Profile Configuration. Action: Select Radio On/Off to turn on/off the wireless network during the time interval set for the profile.
  • Page 42: Ap Edca Parameters

    Figure 5-29 QoS Page Select the 2.4GHz or 5GHz to show and configure the setting of 2.4GHz 2.4GHz/5GHz: or 5GHz. Wi-Fi Multimedia By default, WMM is enabled. After WMM is enabled, the device has the (WMM): QoS function to guarantee the transmission of audio and video packets with high priority.
  • Page 43 Figure 5-30 AP EDCA Parameters Queue displays the transmission queue. By default, the priority from Queue: high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters. Data 0 (Voice)—Highest priority queue, minimum delay.
  • Page 44: Station Edca Parameters

    5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA Parameters Queue displays the transmission queue. By default, the priority Queue: from high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters.
  • Page 45: Rogue Ap Detection

    The TXOP Limit is a station EDCA parameter and only applies to TXOP Limit: traffic flowing from the client station to the EAP device. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the EAP device.
  • Page 46: Settings

    Figure 5-32 Rogue AP Detection Page 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save.
  • Page 47: Detected Rogue Ap List

    5.6.2 Detected Rogue AP List Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown. You can click Known in Action column to move the AP to the Trusted AP List. Figure 5-34 Detected Rogue AP List Click to scan rogue APs.
  • Page 48: Download/Backup Trusted Ap List

    Figure 5-35 Trusted AP List Action: Click Unknown to move the AP out of the Trusted AP List. MAC: The MAC address of the trusted AP. SSID: The SSID of the trusted AP. Displays the frequency band which the wireless network of the trusted AP Band: operates at.
  • Page 49 NOTE: EAP device does not have any control over the APs in the Detected Rogue AP List.
  • Page 50: Chapter 6 Monitoring

    Chapter 6 Monitoring Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List Monitoring on the page displays the device name, its MAC address and the number of clients. Below the AP List the AP’s detailed information will be shown, including Device Information,...
  • Page 51: Device Information

    Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Total Clients: Displays the number of clients connected to the EAP. Device Information  Figure 6-3 Device Information Device Name: Displays the device name. Device Displays the model of the device. Model: Firmware Displays the firmware version of the device.
  • Page 52: Lan Information

    Wireless Settings  Figure 6-4 Wireless Settings 2.4GHz/5GHz: Choose one band to view the information about wireless setting. Displays the channel number and the operating frequency. If Channel/Frequency: you want to change them, please refer to 5.1.1 Wireless Basic Settings. Channel Width: Displays the spectral width of the radio channel used by the device.
  • Page 53 Displays the maximum transmission rate and duplex mode (half-duplex LAN Port: or full-duplex) of the port. Client  Figure 6-6 Client MAC: Displays the MAC address of the client of the AP selected in AP List. SSID: Displays the SSID the client is connected to. Signal to Noise Ratio, the power ratio between the received wireless signal SNR(dB): strength and the environmental noise strength.
  • Page 54 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Displays the total amount of dropped packets received/sent on the Packets: LAN port.
  • Page 55: Ssid

    6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 56: Client

    Displays the security mode the wireless network is applying. If you Security: want to modify it, please refer to 5.1.2 SSIDs. Portal: Displays the enabling or disabling of Portal. If you want to modify it, please refer to 5.1.2 SSIDs. Displays the enabling or disabling of MAC Filtering.
  • Page 57: User List

    6.3.1 User List Figure 6-12 User List MAC: Displays the MAC address of the client. Band: Displays the band the client is in. Access Displays the name of the device to which the client is connected. Point: SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength.
  • Page 58 MAC: Displays the MAC address of the authenticated client. Band: Displays the band the authenticated client is in. Access Displays the name of the device to which the authenticated client is Point: connected SSID: Displays the SSID the authenticated client is connected to. Signal to Noise Ratio, the power ratio between the received wireless SNR(dB): signal strength and the environmental noise strength.
  • Page 59: Chapter 7 Management

    Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure.
  • Page 60: Log List

    7.1.1 Log List Log List From you can view detailed information about hardware, software, system issues and so on. Figure 7-2 Log List 7.1.2 Log Settings Log Settings You can choose the way to receive system logs in zone, where these parameters can be configured: Enable Auto Mail,...
  • Page 61 Enable Auto Mail  If Auto Mail Feature is enabled, system logs will be sent to a mailbox. The following content will be shown. Figure 7-4 Enable Auto Mail From: Enter the sender’s email address. Enter the recipient’s email address, which will receive the system logs. SMTP Server: Enter the IP address of the SMTP server.
  • Page 62: Backup Log (For Eap320/330/225 Only)

    Nvram (Non-volatile Random Access Memory) is a RAM that can still save data even if a device is power off. All TP-Link EAPs are equipped with Nvram. With this option enabled, the Nvram feature can help reserve the system logs when an EAP device is power off.
  • Page 63: Management Access

    Web Server Following is the page of Figure 7-7 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure Server Designate a secure server port for web server in HTTPS mode. By Port: default the port is 443. Designate a server port for web server in HTTP mode.
  • Page 64: Trunk (For Eap330 Only)

    Management Access Following is the page of Figure 7-8 Management Access Page Check the box to enable MAC Authentication. After MAC Authentication: Authentication is enabled, only the PCs in MAC address list can log in the device’s web management page. By default this function is disabled.
  • Page 65: Led On/Off

    The Trunk function can bundle multiple Ethernet links into a logical link to increase bandwidth, improve reliability and achieve load balancing. The EAP330 has two 1000Mbps Ethernet ports. If the Trunk function is enabled and the ports are in the speed of 1000Mbps Full Duplex, the whole bandwidth of the Trunk is up to 4Gbps (2000Mbps * 2) because the bandwidth of each member port is 2000Mbps.
  • Page 66: Management Vlan

    insecure network environment. It can encrypt all the transmission data and prevent the information in remote management from being leaked. Following is the page of Figure 7-11 SSH Page Server Port: Enter the server port. By default, it is port 22. SSH Login: Check the box to enable SSH Server.
  • Page 67: Snmp

    Management Specify the Management VLAN ID. The valid values are from 1 to 4094. VLAN ID: 7.8 SNMP The device can be configured as an SNMP agent. SNMP (Simple Network Management Protocol), the most widely applied network management protocol, provides a management framework to monitor and maintain Internet devices.
  • Page 68 Enable SNMP Agent and the SNMP Agent will collect the information of SNMP Agent: this device and respond to information requests from one or more management systems. SysContact: Enter the textual identification of the contact person for this managed node. SysName: Enter an administratively-assigned name for this managed node.
  • Page 69: Chapter 8 System

    Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. User Account You can change the username and password to protect your device from unauthorized login.
  • Page 70: Time Settings

    the system time, configure the system to acquire its time settings from a preconfigured NTP server or synchronize the system time with the PC’s clock. The device supports DST (Daylight Saving Time). Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server.
  • Page 71: Daylight Saving

    Click the button and save the configuration, your PC’s time will be obtained as the device’s system time. Time zone: Select your local time zone from the drop-down list. Set the current date, in format MM/DD/YYYY. For example, for Date: November 25, 2014, enter 11/25/2014 in the field.
  • Page 72 USA: Second Sunday in March, 02:00 ~ First Sunday in  November, 02:00 European: Last Sunday in March, 01:00 ~ Last Sunday in  October, 01:00 Australia: First Sunday in October, 02:00 ~ First Sunday in April,  03:00 New Zealand: Last Sunday in September, 02:00 ~ First Sunday in ...
  • Page 73: Reboot/Reset

    Reboot/Reset Figure 8-8 Reboot & Reset Click Reboot to restart the device. Click Reset to restore the device to factory default settings. Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file.
  • Page 74: Firmware Update

    Firmware Update Figure 8-10 Firmware Upgrade Please log in http://www.tp-link.com/ to download the latest system file. Click Browse to choose the firmware file. Click Update to update the devices. NOTE: Please select the proper software version that matches your hardware to update.

Table of Contents