TP-Link PHAROS SERIES User Manual
Hide thumbs Also See for PHAROS SERIES:

Advertisement

User Guide

For TP-LINK Pharos Series Products
REV1.0.0
1910011048

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link PHAROS SERIES

  • Page 1: User Guide

    User Guide For TP-LINK Pharos Series Products REV1.0.0 1910011048...
  • Page 2: Table Of Contents

    CONTENTS Chapter 1 Overview ........................1 Introduction ....................................1 System Requirements ................................1 Getting Started ..................................1 Navigation ....................................3 Chapter 2 Operation Modes ......................4 Access Point ....................................4 Client......................................6 Repeater (Range Extender) ..............................7 Bridge ......................................8 AP Router .....................................
  • Page 3 IP&MAC Binding ..................................55 Chapter 6 Wireless Tab ........................57 Wireless Basic Settings ................................58 Wireless Client Settings ................................ 60 Wireless AP Settings ................................61 Multi-SSID ....................................64 Wireless MAC Filtering ................................65 Wireless Advanced Settings ..............................66 Chapter 7 Management Tab ......................68 System Log ....................................
  • Page 4: Chapter 1 Overview

    Introduction is TP-LINK's next generation outdoor product series dedicated to long-distance outdoor wireless networking solutions. is a powerful Web-based operating system, which is integrated into all Pharos series products. New features of Pharos series products are listed as follows: Provides User-friendly UI design.
  • Page 5 Chapter 1 Overview Upon initial login, please enter admin in the Username and Password fields. Check the box next to I agree to these terms of use, and click Login. We recommend you change the device’s user name and password from its default settings for network security.
  • Page 6: Navigation

    Chapter 1 Overview Navigation The PharOS Web Interface contains six main tabs, each of which provides a Web-based management page to configure the specific parameters of the Pharos series products. Quick Setup  On Quick Setup Guide, you can quickly configure your device through the step-by-step Quick Setup Wizard.
  • Page 7: Chapter 2 Operation Modes

    Chapter 2 Operation Modes Chapter 2 Operation Modes The Pharos series products support six modes to satisfy user’s diversified network requirements including Access Point mode, Client mode, Repeater (Range Extender) mode, Bridge mode, AP Router mode and AP Client Router (WISP Client) mode. This chapter introduces typical usage scenarios of each mode. You can choose the desired scenario according to your needs, and refer to the Installation Guide for hardware connection instruction and Chapter 3 Quick Setup Guide for software configuration.
  • Page 8 Chapter 2 Operation Modes Advantages: Transmit data wirelessly across a long distance and reduce the cabling cost. Network diagram: Scenario 3  Network requirements: Establish a point-to-point link for video monitor or combine two separate office networks as one. The device in the network: For video monitor, the device in AP mode connects to the monitoring computer and the device in Client mode connects to IP Camera.
  • Page 9: Client

    Chapter 2 Operation Modes Internet sharing  Client Network requirements: The most common usage scenario of Client is point-to-point networking with AP for video monitor or combining two separate office networks. Please refer to Scenario 3 of Access Point for detailed information. The device in the network: In this mode, the device actually serves as a wireless adapter to receive the wireless signal from root AP or Station.
  • Page 10: Repeater (Range Extender)

    Chapter 2 Operation Modes Repeater (Range Extender) The device in Repeater mode can extend wireless coverage of an existing wireless network to cover “dead” spots, especially to eliminate signal-blind corners in a larger space. The SSID and encryption type of the device should be the same as those of root AP.
  • Page 11: Bridge

    Chapter 2 Operation Modes Bridge Network requirements: Reinforce the wireless signal strength of the root AP device to eliminate the wireless signal-blind areas. Meanwhile, the wireless users can use the SSID and encryption type different from those of the root AP device to access the network. The device in the network: Similar to the Repeater mode, the Bridge mode is used to reinforce the exiting wireless signal.
  • Page 12: Ap Client Router (Wisp Client)

    Chapter 2 Operation Modes phones, laptops, and other wireless clients can share wide area network via the access to wireless network this device provides. Network diagram: AP Client Router (WISP Client) In AP Client Router mode, after accessing the wireless network provided by WISP, the device provides wireless network service for downstream wireless clients.
  • Page 13: Chapter 3 Quick Setup Guide

    Chapter 3 Quick Setup Guide Chapter 3 Quick Setup Guide Quick Setup wizard allows you to quickly configure your device step by step. Choose the suitable operation mode according to your network environment and follow the step-by-step instructions. Access Point If Access Point is selected, click Next and take the following steps: The LAN Settings page will appear as shown below.
  • Page 14 Chapter 3 Quick Setup Guide The Wireless AP Settings page will appear as shown below. Create an easy-to-remember name for your wireless network. Select WPA-PSK/WPA2-PSK in the Security box and enter the PSK Password below to prevent unauthorized access to your AP. Enter the distance between this device and the furthest client in Distance Setting.
  • Page 15: Client

    Chapter 3 Quick Setup Guide Client If Client is selected, click Next and take the following steps: The LAN Settings page will appear as shown below. The default IP Address is 192.168.0.254 and the default Subnet Mask is 255.255.255.0. You can change the IP Address and Subnet Mask on this page when there is an IP conflict with other devices.
  • Page 16 Chapter 3 Quick Setup Guide The AP list will appear as shown below. Select the desired wireless network and click Connect. It’s possible that two or more networks use the same SSID in the AP list. Lock to AP can make the device connect to the specified AP you had connected before the next time.
  • Page 17: Repeater (Range Extender)

    Chapter 3 Quick Setup Guide The Finish page will appear and display what you’ve configured previously. If you want to modify any parameter, click Back to reconfigure it. If all are confirmed, click Finish to complete the configuration. Repeater (Range Extender) If Repeater (Range Extender) is selected, click Next and take the following steps: The LAN Settings page will appear as shown below.
  • Page 18 Chapter 3 Quick Setup Guide The Wireless Client Settings page will appear as shown below. Click Survey to search for wireless networks. The AP list will appear as shown below. Select the desired wireless network and click Connect. It’s possible that two or more networks use the same SSID in the AP list. Lock to AP can make the device connect to the specified AP you had connected before the next time.
  • Page 19 Chapter 3 Quick Setup Guide If the root AP needs password to be connected, you should select the same Mode, Channel Width and Security type and enter the same PSK Password as entered on the root AP/router. Enter the distance between this device and the root AP/router in Distance setting. Then click Next. The Finish page will appear and display what you’ve configured previously.
  • Page 20: Bridge

    Chapter 3 Quick Setup Guide Bridge If Bridge is selected, click Next and take the following steps: The LAN Settings page will appear as shown below. The default IP Address is 192.168.0.254 and the default Subnet Mask is 255.255.255.0. You can change the IP Address and Subnet Mask on this page when there is an IP conflict with other devices.
  • Page 21 Chapter 3 Quick Setup Guide The AP list will appear as shown below. Select the desired wireless network and click Connect. It’s possible that two or more networks use the same SSID in the AP list. Lock to AP can make the device connect to the specified AP you had connected before the next time.
  • Page 22 Chapter 3 Quick Setup Guide Create a new SSID and PSK password for the local wireless network. The wireless AP settings for the local network will be set the same as your root AP by default. Click Next. The Finish page will appear and display what you’ve configured previously. If you want to modify any parameter, click Back to reconfigure it.
  • Page 23: Ap Router

    Chapter 3 Quick Setup Guide AP Router If AP Router is selected, click Next and take the following steps: The WAN Connection Type page will appear as shown below. Choose the suitable WAN connection type, and then click Next. The router supports three popular ways PPPoE, Dynamic IP and Static IP to connect to the Internet. To make sure the connection type your ISP provides, please refer to the ISP.
  • Page 24 Chapter 3 Quick Setup Guide Static IP - This type of connection uses a permanent, fixed (static) IP address that your ISP assigned. In  this type, you should fill in the IP address, Subnet Mask, Default Gateway, and DNS IP address manually, which are specified by your ISP.
  • Page 25: Ap Client Router (Wisp Client)

    Chapter 3 Quick Setup Guide The Finish page will appear and display what you’ve configured previously. If you want to modify any parameter, click Back to reconfigure it. If all are confirmed, click Finish to complete the configuration. AP Client Router (WISP Client) If AP Client Router (WISP Client) is selected, click Next and take the following steps: The WAN Connection Type page will appear as shown below.
  • Page 26 Chapter 3 Quick Setup Guide PPPoE - If your ISP delivers Internet through phone line and provides you with username and  password, you should choose this type. Under this condition, you should fill in both User Name and Password that the ISP supplied, and then click Next to proceed. Please note that these fields are case- sensitive.
  • Page 27 Chapter 3 Quick Setup Guide After configuring WAN connection type, The Wireless Client Settings page will appear as shown below. Click Survey to search for wireless networks. The AP list will appear as shown below. Select the desired wireless network and click Connect. It’s possible that two or more networks use the same SSID in the AP list.
  • Page 28 Chapter 3 Quick Setup Guide If the root AP needs password to be connected, you should select the same Mode, Channel Width and Security type and enter the same PSK Password as entered on the root AP/router. Enter the distance between this device and the root AP/router in Distance setting. Then click Next. Create a new SSID and PSK password for the local wireless network.
  • Page 29 Chapter 3 Quick Setup Guide The Finish page will appear and display what you’ve configured previously. If you want to modify any parameter, click Back to reconfigure it. If all are confirmed, click Finish to complete the configuration. - 26 -...
  • Page 30: Chapter 4 Status Tab

    Chapter 4 Status Tab Chapter 4 Status Tab The Status tab displays a summary of the link status information, current values of the basic configuration settings (depending on the operating mode), network settings and information, and traffic statistics. - 27 -...
  • Page 31: Status Information

    Chapter 4 Status Tab Status Information Device Information  Device information displays the customizable name, model, firmware version, system time, uptime, CPU and memory of the device. Wireless Settings  Wireless settings display the relative wireless parameters of the current device. You can change the parameters in Wireless tab.
  • Page 32 Chapter 4 Status Tab Max TX Rate Displays the data rate at which the device should transmit wireless packets. Distance Displays the wireless coverage distance where the client devices can be placed from the AP to get good wireless performance. You can change the value in Wireless Advanced Settings.
  • Page 33 Chapter 4 Status Tab Displays whether the AP function is Enabled or Disabled. It is enabled in Access Point, Repeater, Bridge, AP Router and AP Client Router modes and disabled in Client mode by default. MAC Address Displays the MAC address of AP interface or client interface. SSID Displays the wireless network name (SSID).
  • Page 34 Chapter 4 Status Tab RX Rate Displays the data rate at which the device receives wireless packets. Connection Time Displays the amount of time the device has been connected to the root AP.  It displays the relative LAN parameters of the current device. You can change the parameters in Network Tab.
  • Page 35: Monitor

    Chapter 4 Status Tab Subnet Mask Displays the Subnet Mask of the WAN. Default Gateway Displays the default gateway. DNS Server Displays the current DNS IP address. Monitor The monitor displays the data changes of throughput, Stations, Interfaces, ARP table, Routes, DHCP Clients and Dynamic WAN of the device.
  • Page 36 Chapter 4 Status Tab SNR (dB) Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. Generally, in order to achieve the best performance, users need to adjust the antenna to get the best SNR. CCQ (%) Displays the wireless Client Connection Quality (CCQ) of the station.
  • Page 37 Chapter 4 Status Tab ARP table  Lists all the entries of the Address Resolution Protocol (ARP) table currently recorded on the device. ARP is used to associate each IP address to the unique hardware MAC address of each device on the network. IP Address Displays the IP address assigned to a network device.
  • Page 38 Chapter 4 Status Tab Client Name Displays the device name of the client. MAC Address Displays the client’s MAC Address. IP Address Displays the IP address assigned to the client. Lease Time Displays the time of the DHCP client leased. Before the time is up, DHCP client will request to renew the lease automatically.
  • Page 39 Chapter 4 Status Tab Auto Refresh If Auto Refresh is checked, parameters in the table will refresh automatically. Click Obtain to gain the WAN IP address from DHCP server, and click Release to release the WAN IP address. - 36 -...
  • Page 40: Chapter 5 Network Tab

    Chapter 5 Network Tab Chapter 5 Network Tab On Network Tab, you can configure the parameters of WAN, LAN, Forwarding, Security, Access Control, Static Routing, Bandwidth control and IP&MAC Binding. If you’ve made any change of the parameters, please click Apply to make the configuration take effect. There will be a blue bar at the top of the page to remind you to save the configuration.
  • Page 41: Wan

    Chapter 5 Network Tab NOTE: WAN submenu is only available on AP router mode and AP client router (WISP Client) mode. There are five WAN connection types: Static, Dynamic, PPPoE, L2TP, and PPTP. Select the suitable one to configure the IP parameters of the WAN on the screen below. If you are not sure of the connection type to use, please consult your ISP.
  • Page 42 Chapter 5 Network Tab Secondary DNS Enter alternative DNS IP address if your ISP provides. MTU Size The normal MTU (Maximum Transmission Unit) value for most Ethernet networks is 1500 Bytes. For some ISPs you need to modify the MTU. But this is rarely required, and should not be done unless you are sure it is necessary for your ISP connection.
  • Page 43 Chapter 5 Network Tab WAN MAC Address This field displays the current MAC address of the WAN port. If your ISP binds the MAC address of your previous computer/router, please enter the correct MAC address into this field. The format for the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit).
  • Page 44 Chapter 5 Network Tab the Idle Time field. Users those pay by time for their Internet access can choose this mode to save their Internet-access fee. NOTE: Sometimes the connection cannot be disconnected although you specify a time to Idle Time (0~99 minutes) because some applications visit the Internet continually in the background.
  • Page 45 Chapter 5 Network Tab Use ISP-Specified IP If your service provider give you an IP address along with the user name and password, Enable "Use ISP-specified IP" and enter the IP address, which is provided by your ISP. Use These DNS Servers If the ISP specifies a DNS server IP address for you, Enable Use These DNS Server, and fill the Primary DNS and Secondary DNS fields below.
  • Page 46 Chapter 5 Network Tab your Internet connection is expected to remain active all the time, enter 0 in the Idle Time field. Users those pay by time for their Internet access can choose this mode to save their Internet-access fee. NOTE: Sometimes the connection cannot be disconnected although you specify a time to Idle Time (0~99 minutes) because some applications visit the Internet continually in the background.
  • Page 47: Lan

    Chapter 5 Network Tab The display of this submenu is different in modes. The page of AP router mode and AP client router (WISP Client) mode is shown as below. In these two modes, static is the only one connection type. While the page of Access Point mode, Client mode, Repeater (Range extender) mode and Bridge mode is shown as below.
  • Page 48 Chapter 5 Network Tab Connection type There is only one LAN Connection type Static in AP Router mode and AP Client Router (WISP Client) mode. While there are Static and Dynamic of Connection types in Access Point mode, Client mode, Repeater (Range Extender) mode and Bridge mode.
  • Page 49: Forwarding

    Chapter 5 Network Tab Address Reservation Address Reservation will enable you to specify a reserved IP address for a PC on the local area network, so the PC will always obtain the same IP address each time when it starts up. Reserved IP addresses could be assigned to servers that require permanent IP settings.
  • Page 50 Chapter 5 Network Tab Check the Enable box to use the DMZ function. DMZ (Demilitarized Zone) specifically allows computer/device behind become “demilitarized”, so all packets from the external network are forwarded to this computer/device. The demilitarized host is exposed to the wide area network, which can realize the unlimited bidirectional communication between internal hosts and external hosts.
  • Page 51 Chapter 5 Network Tab the Internet to this service port will be redirected to the LAN server. Virtual Server function not only makes the users from Internet visit the local area network, but also keeps network security within the intranet as other services are still invisible from Internet.
  • Page 52 Chapter 5 Network Tab To use the port trigger: 1. Click Add in the table of Port Trigger. 2. Enter the Incoming Port for incoming traffic. The port or port range is used by the remote system when it responds to the outgoing request. A response to one of these ports will be forwarded to the PC that triggered this rule.
  • Page 53: Security

    Chapter 5 Network Tab Security The Security function is available only in AP router mode and AP client router (WISP Client) mode. Stateful Packet Inspection (SPI) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it.
  • Page 54 Chapter 5 Network Tab IPSec Passthrough - IPSec (Internet Protocol security) is a suite of  protocols for ensuring private, secure communications over IP (Internet Protocol) networks, through the use of cryptographic security services. Check the box to allow IPSec tunnels to pass through the Device. DoS Protection DoS (Denial of Service) Attack is to occupy the network bandwidth maliciously by the network attackers or the evil programs sending a lot of service requests...
  • Page 55: Access Control

    Chapter 5 Network Tab Blocked DoS Host List Click Blocked DoS Host List to display the blocked DoS host table including host IP and host MAC. Click Refresh to renewal the table list. Click Clear to release all the blocked hosts. If you want to release one or some of the blocked hosts, please select them and Click Unlock.
  • Page 56: Static Routing

    Chapter 5 Network Tab To use the access control: 1. Click Add in the table to create control rules. 2. Choose one of the protocols from the drop-down list used for the target, any of IP, TCP, UDP, or ICMP. 3.
  • Page 57: Bandwidth Control

    Chapter 5 Network Tab Static Routing Check the Enable box to use the static routing function. To use the static routing: 1. Click Add to create a new static routing. 2. Enter the Target Network IP, the address of the network or host to be visited.
  • Page 58: Ip&Mac Binding

    Chapter 5 Network Tab Bandwidth Control Check the Enable box to use the bandwidth control function. To use the bandwidth control: 1. Click Add in the table of bandwidth control. 2. Enter the IP Range of the target hosts which need to be controlled of bandwidth, for example 192.168.0.12-192.168.0.25.
  • Page 59 Chapter 5 Network Tab IP&MAC Binding Check the Enable box to use the IP&MAC binding function. To use the IP&MAC Binding: 1. Click Add in the table of IP&MAC binding. 2. Enter the IP address and MAC address that you want to bind, for example 192.168.0.12, 00-23-5A-15-99-42.
  • Page 60: Chapter 6 Wireless Tab

    Chapter 6 Wireless Tab Chapter 6 Wireless Tab On Wireless Tab, you can configure the related wireless parameters in different modes. Please selectively read the details according to the working mode of your device. If you have made any change of the parameters, please click Apply to make the configuration take effect. There will be a blue bar at the top of the page to remind you to save the configuration.
  • Page 61: Wireless Basic Settings

    Chapter 6 Wireless Tab Wireless Basic Settings This section allows you to configure wireless basic settings, such as 802.11 mode and data rates. Mode Select the protocol standard used in the wireless network. With a frequency band of 2.4GHz, CPE210/CPE220/BS210/OAP210 supports five wireless modes: 802.11b, 802.11g, 802.11n, 802.11b/g and 802.11b/g/n.
  • Page 62 This setting is only available in the modes of Access Point and AP Router. MAXtream is a proprietary technology of TP-LINK for Wi-Fi system. It is based on TDMA (Time Division Multiple Access) so that data streams are transmitted in strict order.
  • Page 63: Wireless Client Settings

    Chapter 6 Wireless Tab NOTE: MAXtream Technology is only compatible with Pharos series products. You cannot connect other Wi-Fi devices to an AP with MAXtream enabled. MAXtream Station Mode This setting is available in Client and Bridge mode and in the AP Client Router mode when the wireless AP settings is disabled.
  • Page 64: Wireless Ap Settings

    Chapter 6 Wireless Tab Auto – The system automatically detects whether root device supports data  frames with the format of three/four address fields, giving priority to the format of four address fields. The selection of Auto is recommended. Security Mode Select the security mode of this device.
  • Page 65 Chapter 6 Wireless Tab Security Mode You can select one of the following security modes: WPA-PSK: Based on pre-shared key. It is characterized by higher safety and simple settings, which suits for common households and small business. WPA-PSK has two versions: WPA-PSK and WPA2- PSK.
  • Page 66 Chapter 6 Wireless Tab Version Select one of the following versions: Auto –Select WPA or WPA2 automatically based on the wireless station's  capability and request. WPA –Pre-shared key of WPA.  WPA2 –Pre-shred key of WPA2.  Select the Encryption type, including Auto, TKIP, and AES. The default setting is Encryption Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's...
  • Page 67: Multi-Ssid

    Chapter 6 Wireless Tab WEP Key Enter the WEP keys. The length and valid characters of the key are affected by key type. Key Type Select the WEP key length (64-bit, or 128-bit, or 152-bit) for encryption. Disabled means this WEP key is not used. 64bit -You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A- ...
  • Page 68: Wireless Mac Filtering

    Chapter 6 Wireless Tab 3. Set the VLAN ID of wireless network identified by this SSID, and the value ranges from 1 to 4094. 4. Select whether to broadcast this SSID or not. 5. Enable AP Isolation, the device would isolate the hosts within the same wireless network.
  • Page 69: Wireless Advanced Settings

    Chapter 6 Wireless Tab Filtering Rules There are two filtering policies to control the MAC filtering: Allow the stations specified by any enabled entries in the list to access.  The stations listed below are allowed to access the wireless network under the rules.
  • Page 70 Chapter 6 Wireless Tab DTIM Interval This value indicates the number of beacon intervals between successive Delivery Traffic Indication Messages (DTIMs) and this number is included in each Beacon frame. A DTIM is contained in Beacon frames to indicate whether the access point has buffered broadcast and/or multicast data for the client devices.
  • Page 71: Chapter 7 Management Tab

    Chapter 7 Management Tab Chapter 7 Management Tab On Management Tab, you can configure system management services: System Log, Miscellaneous, Ping Watch Dog, and Dynamic Domain Name System (DDNS). Web server, Simple Network Management Protocol (SNMP), SSH server, RSSI LED Thresholds are also available. - 68 -...
  • Page 72: System Log

    Chapter 7 Management Tab If you have made any change of the parameters, please click Apply to make the configuration take effect. There will be a blue bar at the top of the page to remind you to save the configuration. Click Save Changes when you finish all settings, otherwise all the settings will be recovered to last saved settings at reboot or power off.
  • Page 73: Miscellaneous

    Miscellaneous Discovery Enable the function to let TP-LINK Pharos Control software discover the device. With its main function to centralize monitoring and managing network devices in the network platform, Pharos Control is network management software developed independently by TP-LINK and it currently supports Pharos series products.
  • Page 74: Ping Watch Dog

    Chapter 7 Management Tab PoE Passthrough When enabled, the device allows Power over Ethernet (PoE) power to pass from LAN0 port to LAN1 port. Enable it if you want to supply power to other passive PoE device by LAN1. Ping Watch Dog Ping Watch Dog sets the device to continuously ping a user-defined IP address (it can be the Internet gateway, for example) to check the network connectivity.
  • Page 75: Dynamic Dns

    Chapter 7 Management Tab Dynamic DNS The main function of Dynamic DNS (DDNS) is mapping the fixed domain name to dynamic IP address. When a device connects to the Internet through PPPoE or Dynamic IP, the WAN IP address it gets is not fixed, which is inconvenient for the Internet users to access the servers in the local area network through IP address.
  • Page 76: Web Server

    Chapter 7 Management Tab Web Server The Web Server function enables users to log in to the web management page to manage this device remotely over the Internet. Secure Connection (HTTPS) The Secure Connection (HTTPS) mode is enabled by default. Secure Server Port Specify the server port that the Web server uses in the Secure Connection...
  • Page 77: Snmp Agent

    Chapter 7 Management Tab SNMP Agent You can get the traffic information and transmit condition by using the SNMP Agent function. Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. Main functions of SNMP include monitoring network performance, detecting and analyzing network error, configuring network devices, and so on.
  • Page 78: Ssh Server

    Server Port Enter the TCP/IP port of the SSH Server. The default port is 22. SSH Login Enable the SSH Server function. Remote Management Enable the function to let TP-LINK Pharos Control software manage the device remotely. - 75 -...
  • Page 79: Rssi Led Thresholds

    You can configure the LEDs on the device to light up when received signal levels reach the values defined in the following fields. This allows a technician to easily deploy a Pharos series product without logging into the device (for example, for antenna alignment operation).
  • Page 80: Chapter 8 System Tab

    Chapter 8 System Tab Chapter 8 System Tab The System Tab controls system maintenance routines, device customization, location management, user account management, firmware update, time setting and configuration backup. If you have made any change of the parameters, please click Apply to make the configuration take effect. There will be a blue bar at the top of the page to remind you to save the configuration.
  • Page 81: Device

    Chapter 8 System Tab Device The Device Name is the model of device by default. You can customize a new personal and easy-to- remember name. Device Name Customize the name of the device. Language Displays the default language in the web management page is English. Location Longitude and latitude define the device’s coordinates.
  • Page 82: Time Setting

    Chapter 8 System Tab Current User Name Displays the current user name. Current Password Enter the current password for the user account. Check the Show box to display what you've entered. New User Name Enter the new user name for the user account. New Password Enter the new password for the user account.
  • Page 83 Chapter 8 System Tab Date Specify the device’s date. Click the calendar icon or manually enter the date in the following format: YYYY/MM/DD. For example, for November 25, 2013, enter 2013/11/25 in the field. Time Specify the device’s date. Select the time from the drop-down list or manually enter the date in HH:MM:SS format.
  • Page 84: Firmware Update

    Firmware version Displays the current firmware version. Upload Firmware Please visit TP-LINK website www.tp-link.com/en/support/download/ to download the latest firmware. The system configuration can be preserved while the device is updated with a new firmware version. However, we recommend that you back up current system configuration before updating the firmware.
  • Page 85: Configuration

    Chapter 8 System Tab NOTE: 1. Please select the proper software version that matches your hardware to upgrade. 2. To avoid damage, please do not power off the device while upgrading. 3. After upgrading, the device will reboot automatically. Configuration The controls in this section manage the device configuration routines and the option to reset the device to factory default settings.
  • Page 86: Chapter 9 Tools List

    Chapter 9 Tools Chapter 9 Tools List This device provides some useful tools including Ping, Traceroute, Speed Test, Survey and Spectrum Analysis. Ping Ping test function is used to test the connectivity and reachability between the device and the target host so as to locate the network malfunctions.
  • Page 87: Traceroute

    Chapter 9 Tools Packet Size Enter the number of data bytes to be sent. It can be 4-472 bytes and the default is 64. Traceroute Tracertroute function is used to tracks the route packets taken from source on their way to a given target host.
  • Page 88 Chapter 9 Tools Test Result Displays the data streams that the device is transmitting (TX) and receiving (RX). Client The side to initiatively launch the test request. The client side can configure parameters including server’s IP, parallel and direction. Server The side to passively accept the test request.
  • Page 89: Survey

    Chapter 9 Tools Survey BSSID Displays the BSSID of other APs surveyed by this device. SSID Displays the SSID of other APs surveyed by this device. MAXtream Displays the MAXtream capability of other APs surveyed by this device. Device Name Displays the names of other APs surveyed by this device.
  • Page 90: Spectrum Analysis

    Chapter 9 Tools Spectrum Analysis Spectrum Analysis can help you to choose the proper channel/frequency. Through the spectrum analysis you can learn the distribution of the radio noise and intelligently select the channel/frequency in low noise. Click Spectrum Analysis in the tools’ drop-down list, the following window will pop up to remind you that all wireless connections will be lost during spectrum analysis.
  • Page 91: Appendix A: Pharos Maxtream Tdma

    Stations will automatically adjust their connections according to AP's MAXtream capability. NOTE: 1. Pharos MAXtream is a non-standard Wi-Fi protocol that is only compatible with TP-LINK’s Pharos series products. Please notice that you will not be able to connect other Wi-Fi devices to an AP with MAXtream enabled.
  • Page 92: Appendix B: Glossary

    Appendix B Glossary Appendix B: Glossary Glossary Description Application Level Gateway (ALG) is application specific translation ALG (Application Layer agent that allows an application on a host in one address realm to Gateway) connect to its counterpart running on a host in different realm transparently.
  • Page 93 Appendix B Glossary Glossary Description ICMP (Internet Control Network layer Internet protocol that reports errors and provides other Messages Protocol) information relevant to IP packet processing. Largest global Internetwork, connecting tens of thousands of networks Internet worldwide and having a “culture” that focuses on research and standardization based on real-life use.
  • Page 94 Appendix B Glossary Glossary Description SMTP (Simple Mail Transfer SMTP is an Internet standard for electronic mail (e-mail) transmission Protocol) SSH is a network protocol that allows data to be exchanged using a SSH (Secure Shell Protocol) secure channel between two networked devices. A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network.
  • Page 95 Appendix B Glossary Glossary Description Data communications network that serves users across a broad WAN (Wide Area Network) geographic area and often uses transmission devices provided by common carriers. WEP (Wired Equivalent A data privacy mechanism based on a 64-bit or 128-bit or 152-bit Privacy) shared key algorithm, as described in the IEEE 802.11 standard.

Table of Contents