Hawking HPOW5CM User Manual

Hawking HPOW5CM User Manual

High power outdoor wireless access point with built-in ap controller
Table of Contents

Advertisement

High Power Outdoor Wireless Access Point with Built-in AP Controller
HPOW5CM
website
www.hawkingtech.com
USER'S MANUAL
e-mail
techsupport@hawkingtech.com
© COPYRIGHT 2017 HAWKING TECHNOLOGIES,INC. ALL RIGHTS RESERVED.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HPOW5CM and is the answer not in the manual?

Questions and answers

Summary of Contents for Hawking HPOW5CM

  • Page 1 High Power Outdoor Wireless Access Point with Built-in AP Controller HPOW5CM website www.hawkingtech.com USER’S MANUAL e-mail techsupport@hawkingtech.com © COPYRIGHT 2017 HAWKING TECHNOLOGIES,INC. ALL RIGHTS RESERVED.
  • Page 2 COPYRIGHT Copyright ©2017 by Hawking Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical,...
  • Page 3 4. Consult the dealer or an experienced radio technician for help. FCC Caution This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person’s body (excluding extremities of hands, wrist and feet) during wireless modes of operation.
  • Page 4: Table Of Contents

    2-1 Build Network Connection ........................ 13 2-2 Definitions of HPOW5CM Supported Modes ................... 14 2-3 Connecting to the HPOW5CM via Web Browser ................18 2-3-1 Windows 7/8/10 IP address setup ..................... 18 2-3-2 Mac OS X IP Address Setup ......................21 2-3-3 Accessing the Web Page User Interface ..................
  • Page 5 3-5-3 Wireless Setup ........................... 47 Chapter IV: System Settings ........................50 4-1 WAN Setup ............................50 4-1-1 Internet Connection Type: Static IP ................... 50 4-1-2 Internet Connection Type: Dynamic IP (Default) ............... 50 4-1-3 Internet Connection Type: PPPoE ....................51 4-1-4 Internet Connection Type: PPTP ....................
  • Page 6 4-6-2 Root Password ........................... 78 4-6-3 Admin Login Methods: ....................... 78 4-6-4 System Log Setup ........................79 4-6-5 Auto Reboot ..........................80 4-7 Time Server Setup ..........................80 4-8 PoE PassThrough ..........................81 4-9 SNMP Setup ............................82 Chapter V: Wireless Setup .......................... 84 5-1 General Setup ...........................
  • Page 7 7-2-2 Device List ..........................111 7-2-3 Batch Setup ..........................111 7-3 AP Setup ............................114 7-4 Group Setup ............................ 114 7-5 Map Setup ............................114 7-6 Authentication Profile ........................116 7-7 Status .............................. 117 Chapter VIII: Utilities ..........................118 8-1 Profile Setting ..........................118 8-2 System Upgrade ..........................
  • Page 8: Chapter I: Product Information

    Chapter I: Product Information 1-1 Introduction Thank you for purchasing the HPOW5CM Hawking High Power Outdoor Wireless Access Point with Built- in AP Controller. This highly efficient access point is the best choice for Small office / Home office users.
  • Page 9   Proxy DNS  Dynamic DNS  NTP Client   Virtual Server (Port Forwarding)  Support MAC Filter  Support IP Filter  Support Layer-7 Protocol Filter and Content Filter  Support Static Routing  Support RIP and OSPF Dynamic Routing ...
  • Page 10  802.11i WPA2 (PSK + CCMP/ AES)  802.11i WPA2 (802.1x certification + CCMP/ AES)  Setting for TKIP/ CCMP/ AES key’s refreshing period  Hidden ESSID support  Setting for “Deny ANY “ connection request  MAC ACL  No.
  • Page 11: Safety Information

    1-2 Safety Information In order to keep the safety of users and property, please follow these safety instructions: 1. This access point is designed for outdoor use and is weather resistant. 2. DO NOT put this access point at or near hot or humid places, like kitchens or bathrooms. Also, do not leave this access point in the car in summer.
  • Page 12: Package Contents

    1-4 Package Contents Before you start to use this access point, please check if there’s anything missing in the package, and contact your place of purchase or contact Hawking Technologies. • 1x HPOW5CM • 1x RJ45 Cable • 1x Power Adapter (Power Supply) •...
  • Page 13 (4) LAN1 (PoE) Ethernet port (5) LED indicator for LAN1 (6) Power LED (7) Grounding Connection: Grounding cable can protect this device from lightning strikes and buildup of static electricity. Grounding cable not included in the package. We suggest 16-18 AWG grounding cable.
  • Page 14: Chapter Ii: System And Network Setup

    Chapter II: System and Network Setup 2-1 Build Network Connection Please follow the following instructions to build the network connection between your new HPOW5CM access point and your computers and other network devices: 1. Remove cover from device. Press the center tab (you may need a flathead screwdriver) and the cover should be able to be removed with a small amount of force.
  • Page 15: Definitions Of Hpow5Cm Supported Modes

    4. Configure the IP Address of your computer to be in the same range as the HPOW5CM (see section 2- Log into the setup page to configure the HPOW5CM 2-2 Definitions of HPOW5CM Supported Modes The HPOW5CM supports 6 different modes.
  • Page 16 When AP Controller mode is setup, one HPOW5CM is setup to control multiple HPOW5CM’s on the network. The HPOW5CM in AP controller mode can set IPs, configure wireless settings, monitor wireless status, upgrade firmware and remotely controll multiple HPOW5CMs. The other HPOW5CMs must be in AP mode.
  • Page 17 When Client Bridge + Repeater AP Mode is chosen, the system can be configured in bridged mode. In this mode, the device can connect to other Access Points via a wireless link and be used to bridge wired clients to the network. Go to section 3-3...
  • Page 18 In this mode, the device can connect to other Access Points via a wireless link and be used to bridge wired clients to the network and work as a wireless repeater for wireless devices. All Ethernet ports and repeater access points are bridged together. Go to section 3-3 When WISP mode is chosen, the system can be configured in Wireless repeater mode.
  • Page 19: Connecting To The Hpow5Cm Via Web Browser

    WAN page by using static IP, Dynamic IP, PPPoE or PPTP client. Go to section 3-5 2-3 Connecting to the HPOW5CM via Web Browser After the network connection is built, the next step you should do is setup the access point with proper network parameters, so it can work properly in your network environment.
  • Page 20 First, right click on ‘Start’ button (or left click if this is Windows 7 or below), then choose Control Panel. Under Network and Internet, choose View Network Status and Tasks, then choose Change Adapter Settings on the left hand column. Right-click Ethernet (or Local Area Connection), then select ‘Properties’.
  • Page 22: Mac Os X Ip Address Setup

    2-3-2 Mac OS X IP Address Setup Go to your System Preferences, go to Network. Select your Ethernet adapter. Make sure next to “Configure IPv4”, you have it set under “Manually” IP Address 192.168.2.20 Subnet Mask: 255.255.255.0 Click ‘Apply’ when finished 2-3-3 Accessing the Web Page User Interface...
  • Page 23 After the IP address setup is complete, please open your web browser. In the address field, please type: ‘192.168.2.254’ and press enter. The following message should be shown: For username and passwords, see the table below: Root Account Username: root Password: default...
  • Page 24: Chapter Iii: Setup Wizard

    HPOW5CM 3-1 Controller AP Mode When AP Controller mode is selected, one HPOW5CM is setup to control multiple HPOW5CM’s in AP mode on the network. The HPOW5CM in AP controller mode can set IPs, configure wireless settings, monitor wireless status, upgrade firmware and remotely controll multiple HPOW5CMs. Note: the other HPOW5CMs can only be in AP Mode.
  • Page 25: Setup Wizard

    The device will now reboot. Now, open your browser and go to 192.168.2.254. It should take you back into the settings page. Click on “Wizard”. Click “Next” 3-1-1 Setup Wizard This section is optional and will only setup the IP settings and the AP settings in CAP mode. You can change the default IP of the device here if required.
  • Page 26 Authentication: Choose your type of security (Hawking recommends AUTO (WPA or WPA-2PSK)) 3-1-1-2 Authentication (Wireless Security) This section allows you to set up wireless security to prevent any unauthorized access to your wireless network.
  • Page 27: Scan Ap Device

    256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters Hawking recommends using WPA2-PSK w/ AES cipher type as your default level of security. Click Finish and the device will automatically restart and save your settings. After you have finished, a network device must be connected to your network via the 10/100 Data In port on the PoE adapter or the LAN2 port to add this device to your network.
  • Page 28 Check the device you want to import and click “Import”. This will add the AP you selected to your Controller. You can also change the IP address settings of the devices Check the device and then go to the Update IP address and Netmask and make your changes. Click ‘Apply and Reboot’...
  • Page 29 Check the devices you want to Batch Setup under “Device List” Under VLAN List, you should see options to configure VLAN, Authentication Profile, Gateway & DNS, time Server, Management, Wireless Basic Setup, Wireless Advanced Setup, VAP setup, Upgrade and...
  • Page 30 Reboot. For more information go to section 7-2 After you make your changes, be sure to choose “Reboot” and Apply so the changes take effect.
  • Page 31: Ap Mode

    3-2 AP Mode When AP mode is chosen, the system can be configured as a standard wireless access point. In this mode, the device can be used as an Access Point for wireless client connection. All Ethernet ports wand wireless interfaces are bridged together. This section provides a detailed explanation for users on how to configure AP mode.
  • Page 32: Lan Setup

    This page is used to define the parameters for the wireless LAN clients ESSID: This is the wireless broadcast name. By default, it is ‘Hawking_HPOW5CM’ but you can change it to whatever you want. Authentication: Choose your type of security (Hawking recommends AUTO (WPA or WPA-2PSK))
  • Page 33 3-2-2-1 Authentication (Wireless Security) This section allows you to set up wireless security to prevent any unauthorized access to your wireless network  Open System (security disabled) When you select this mode, data encryption is disabled, and every wireless device in proximity will be able to connect your wireless access point if no other security measure is enabled Use this option only when you want to allow any user to use your wireless access point, and you are not concerned about unauthorized access to your files and/or transfers over your network.
  • Page 34: Client Bridge - Repeater Mode

    256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters Hawking recommends using WPA2-PSK w/ AES cipher type as your default level of security. Click Finish and the device will automatically restart and save your settings. After you have finished, you can connect the device to your network via the 10/100 Data IN port on the PoE adapter or the LAN2 port to add this access point to your network.
  • Page 35: Lan Setup

    Choose ClientBridge Mode and click save & reboot. The device will now reboot. Now, open your browser and go to 192.168.2.254. It should take you back into the settings page. Go to “Wizard”. Click “Next” 3-3-1 LAN setup You can change the default IP of the device here if required. By default, the IP is 192.168.2.254 Choose your DNS type.
  • Page 36: Ap Station List Setup

    3-3-2 AP Station List Setup This page allows you to search for an available Access Point to Connect. Click “Site Survey” for it to automatically scan for a network to connect to. Site Survey: Press this button for the device to automatically scan for wireless networks. After it scans, a list of wireless networks in the area will appear.
  • Page 37: Repeater Ap Setup

    ESSID: After you click setup, the name of the wireless network you wish to connect to will appear here. You can also manually enter the name or click on “Site Survey” for the device to scan for wireless networks. Authentication After you click setup, the security type of the wireless network you wish to connect to will appear here.
  • Page 38 Authentication: Choose your type of security (Hawking recommends AUTO (WPA or WPA-2PSK)) 3-3-3-1 Authentication (Wireless Security) This section allows you to set up wireless security to prevent any unauthorized access to your wireless network ...
  • Page 39: Wisp Mode

    256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters Hawking recommends using WPA2-PSK w/ AES cipher type as your default level of security. Click Finish and the device will automatically restart and save your settings. After you have finished, a network device must be connected to your network via the 10/100 Data In port on the PoE adapter or the LAN2 port to add this client device to your network.
  • Page 40 When WISP Mode is chosen, the system can be configured in Wireless Internet repeater mode. In this mode, the device can wirelessly connect to a WISP (wireless internet service provider), ie. Another wireless AP, HotSpot, etc. It can then wirelessly repeat the signal and can even act as a router for these signals.
  • Page 41: Wan Settings And Dns Setings

    3-4-1 WAN Settings and DNS Setings Choose your mode. Most ISPs use “Dynamic IP”. If you are unsure, please contact your ISP. Refer to Section 4-1 for a more in-depth explanation of these settings. Enter your hostname settings if you have one.
  • Page 42: Ap Station List Setup

    3-4-3 AP Station List Setup This page allows you to search for an available Access Point to Connect. Click “Site Survey” for it to automatically scan for a network to connect to.
  • Page 43: Repeater Ap Setup

    This page is used to define the parameters for the wireless LAN clients ESSID: This is the wireless broadcast name. By default, it is ‘Hawking_HPOW5CM’ but you can change it to whatever you want. Authentication: Choose your type of security (Hawking recommends AUTO (WPA or WPA-2PSK))
  • Page 44 Pre-shared key can be either entered as a 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters Hawking recommends using WPA2-PSK w/ AES cipher type as your default level of security.
  • Page 45: Router Mode

    Click Finish and the device will automatically restart and save your settings. After you have finished, this device will act as a Wireless Internet Service Provider. The device just needs be powered on via the P- Data Out port on the PoE adapter and can be standalone (you can also connect any wired clients to the 10/100 Data in Port on LAN2).
  • Page 46 Choose Router Mode and click save & reboot. The device will now reboot. After the device has finished rebooting, you will have to make changes to your computer’s physical connection. See below. The physical setup is slightly different than the standard setup. Plug your computer into LAN2 on the access point.
  • Page 47: Wan Settings And Dns Settings

    3-5-1 WAN Settings and DNS Settings Choose your mode. Most ISPs use “Dynamic IP”. If you are unsure, please contact your ISP. Refer to Section 4-1 for a more in-depth explanation of these settings. Enter your hostname settings if you have one.
  • Page 48: Wireless Setup

    This page is used to define the parameters for the wireless LAN clients ESSID: This is the wireless broadcast name. By default, it is ‘Hawking_HPOW5CM’ but you can change it to whatever you want. Authentication Choose your type of security (Hawking recommends AUTO (WPA or WPA-2PSK))
  • Page 49 256-bit secret in 64 HEX digits format, or 8 to 63 ASCII characters Hawking recommends using WPA2-PSK w/ AES cipher type as your default level of security. Click Finish and the device will automatically restart and save your settings. After you have finished, you can connect the device to your network via LAN2 to use this as a Router AP.
  • Page 50 Settings can be modified via the VLAN setup after configuration is complete. See section 4-3.
  • Page 51: Chapter Iv: System Settings

    Chapter IV: System Settings Under this heading, several settings can be changed to configure this device 4-1 WAN Setup Click under system, WAN setup. (This feature is only available under Router and WISP mode) 4-1-1 Internet Connection Type: Static IP Static IP users can manually setup the WAN IP w/ a static IP provided by the Internet Service Provider (ISP).
  • Page 52: Internet Connection Type: Pppoe

    Hostname: (optional). If your ISP uses dynamic IP addresses, you may need to enter a hostname provided by the ISP. 4-1-3 Internet Connection Type: PPPoE PPPoE users need to manually enter their ISP provided username/password. Please contact them if you are not sure.
  • Page 53: Internet Connection Type: Pptp

    Reconnect Mode: Always on – A connection to internet is always maintained On Demand – A connection to internet is made as needed Manual – Click on the “Connect” button on “WAN information” in the overview page to connect to the internet. 4-1-4 Internet Connection Type: PPTP The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of secure multi- protocol Virtual Private Networks (VPN) through public networks.
  • Page 54: Dns

    PPTP Server IP Address: The IP address of the PPTP Server WAN IP: IP Address of the WAN port IP Netmask (Subnet): The subnet mask of the WAN port PPTP Server IP address: The IP address of the PPTP server MTU: By default, it is 1492 bytes.
  • Page 55: Lan Setup

    Default MAC Address: Keep the default MAC address of WAN port on the system. Manual MAC Address: Enter the MAC address registered with your ISP. 4-2 LAN Setup Setup local IP Address/Netmask/Gateway/DNS and management. (This feature is only available under Router and WISP mode) 4-2-1 LAN IP Setup The administrator can set it to obtain (Dynamic IP) an IP automatically or manually setup (Static IP) the...
  • Page 56: Dns

    IP Address: The IP address of the LAN port; default IP address is 192.168.2.254 Netmask: The Subnet mask of the LAN port; default Netmask is 255.255.255.0 4-2-2 DNS Check “No default DNS server” (default) or “Specify a DNS server IP” to setup a system DNS. Primary: The IP Address of the Primary DNS server Secondary:...
  • Page 57: Vlan Setup

    4-3 VLAN Setup The VLAN setup is used to configure VLANs. Click under System, VLAN Setup. VLAN Mode: Number of VLANs (6 supported) VLAN Flag: Modes that are supported IP Address: IP address assigned to VLAN Netmask: Subnet Mask assigned to VLAN RADIO: WiFi frequency supported Action:...
  • Page 58 VLAN Mode: Enable/Disable to enable VLAN IP/Netmask Setup: Assign an IP address for specific VLAN Access Point: Enable/Disable the Wireless Radio 802.1d Spanning Tree: The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7. The Spanning Tree Protocol, also referred to as STP, is defined in the IEEE 802.1d standard.
  • Page 59: Vlan Dhcp Service

    Control Port: Select one of the VLANs to be managed AP. ETH VLAN Tag Setup: Enable/Disable and create your tags 4-3-2 VLAN DHCP Service Devices connected to the system can obtain an IP address automatically when this service is enabled. (This feature is only available in Router, ClientBridge + Repeater and WISP Modes)
  • Page 60 DHCP: Check Enable button to activate this function or Disable to deactivate this service. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to clients. The default range IP address is 192.168.2.10 to 192.168.2.70.
  • Page 61 WINS IP: Enter IP address of the Windows Internet Name Service (WINS) server; this is optional. Domain: Enter the domain name for this network. Lease Time: The IP addresses given out by the DHCP server will only be valid for the duration specified by the lease time.
  • Page 62: Vlan Access Point

    4-3-3 VLAN Access Point For each Virtual AP, users can configure general settings and security. Click “edit” on the Virtual AP you wish to edit. ESSID: Extended Service Set ID indicates the SSID which the clients used to connect to the VAP.
  • Page 63 period. Notice: IAPP only used on WPA-PSK and WPA2-PSK security type. Only one of VAPs can be enabled. Authentication: Choose your type of security you want to use for this Access Point Open System: Data are unencrypted during transmission when this option is selected.
  • Page 64 TKIP is short for “Temporal Key Integrity Protocol. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. Group Key Update Period: This time interval for re-keying GTK (broadcast/multicast encryption keys) in seconds.
  • Page 65: Vlan Mac Filter

    Group Key Update Interval: This time interval for re-keying GTK (broadcast/multicast encryption keys) in seconds. Enter the time-length required; the default time is 600 seconds. Authentication RADIUS Server Settings Radius Server: Enter the IP address of the Authentication RADIUS server. Radius Port: The port number used by Authentication RADIUS server.
  • Page 66: Vlan 802.11R Fast Roaming

    Type in the Mac address of the client you wish to add under the Mac filter. 4-3-5 VLAN 802.11r Fast Roaming The HPOW5CM supports 802.11r function for 2.4GHz. This allows the client to make the initial handshake with the AP is done even before the client gets in range of the AP.
  • Page 67 Fast Roaming: Enable or Disable the feature here. Default is disabled. Mobility Domain: MDID is used to indicate a group of Aps (within an ESS, ie. Sharing the same SSID) between which a STA can use Fast BSS Transition. Please enter 2-octet identifier as a hex string.
  • Page 68 To enable roaming between multiple AP devices, the first AP must key in the MAC address of the second AP and vice versa. The NAS Identifier and 128-bit key should be identical on both Aps. This will enable device roaming between both APs. Mac Address: Administrators must enter the MAC address of the other AP NAS Identifier:...
  • Page 69: Authentication

    Mac Address: Administrators must enter the MAC address of the other AP NAS Identifier: Enter 1-48 octets of network domain name 128-bit Key: Enter shared key R1 Key Holder List After setting up R1 Key Holder, the information will appear on this list. 4-4 Authentication This function is for web authentication.
  • Page 70: Authentication

    Displays 7 VLANs Authentication: Displays VLAN # and whether enable/disable web authentication Action: Choose authentication or select drop down. 4-4-1 Authentication Click on the authentication button to get into the basic settings Authentication: Enable/disable Multiple Login: Set one account or multiple users to simultaneously login (0 = not limited) Login Timeout: After account login with no traffic, system with automatically timeout.
  • Page 71: Guest

    4-4-2 Guest If enabled, the administrator can set guest count limit / login time, type and flow control Service: Enable/Disable Login Type: One Time: login to start counting until end of time Multiple Times: logout time will stop counting until the next relogin to start counting Count Limit: Set guest limit...
  • Page 72: Local User

    Login Time: With a certain timefame with no traffic, system will auto logout QoS: Restrict traffic of guest. Set user upload/download traffic 4-4-3 Local User Create a local user account for web login Username: User account Password: Account password 4-4-4 OAuth2.0 Supports Facebook and Google by default.
  • Page 73: Customize Page

    POP3 Server: Enable/Disable Display Name: Set the display name based on POP3 user/client Host: Host Server Name Port: Port number for Host Server Connect Type: STARTTLS, SSL/TTL or none. POP3 Server Test: Test to see if the settings are operating correctly. 4-4-6 Customize Page This function allows the user to customize the user login page.
  • Page 74: Customize Language

    Select enable to active default Login Page Select disable to activate HTML Source Code Window for Customization 4-4-7 Customize Language User can create other languages for login page.
  • Page 75: Walled Garden

    4-4-8 Walled Garden This function provides certain free services or advertisement web pages for users to access the websites listed before login and authentication. User without the network access right can still have a chance to experience the actual network service free of charge in Walled Garden URL list. Display Name: Set name of Website.
  • Page 76: Dhcp Setup

    4-5 DHCP Setup Devices connected to the system can obtain an IP address automatically when this service is enabled. (This feature is only available in Router and WISP Modes)
  • Page 77 DHCP: Check Enable button to activate this function or Disable to deactivate this service. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to clients. The default range IP address is 192.168.2.10 to 192.168.2.70, the netmask is 255.255.255.0 DNS1 IP: Enter IP address of the first DNS server;...
  • Page 78 Domain: Enter the domain name for this network. Lease Time: The IP addresses given out by the DHCP server will only be valid for the duration specified by the lease time. Increasing the time ensure client operation without interruptions, but could introduce potential conflicts. Lowering the lease time will avoid potential address conflicts, but might cause more interruptions to the client while it will acquire new IP addresses from the DHCP server.
  • Page 79: Management Setup

    4-6 Management Setup Administrators can setup system info, passwords and login methods. Click under System, Management 4-6-1 System Information System Name: Enter a desired name or use the default one. Description: Provide description of the system. Location: Enter geographical location information of the system. 4-6-2 Root Password Full administrative rights and access to all aspects of the configuration New Password:...
  • Page 80: System Log Setup

    Enable HTTP: Check to select HTTP Service. Enable HTTPS: Check to select HTTPS Service HTTPS Port: The default is 443 and the range is between 1 ~ 65535. Enable Telnet: Check to select Telnet Service Telnet Port : The default is 23 and the range is between 1 ~ 65535 Enable SSH: Check to select SSH Service SSH Port :...
  • Page 81: Auto Reboot

    4-6-5 Auto Reboot The device can be set to auto reboot in a daily, weekly, or monthly setting. 4-7 Time Server Setup System time can be configured via this page, and manual setting or via a NTP server is supported. Please go to System, Time Server Local Time: Display the current system time.
  • Page 82: Poe Passthrough

    Default NTP Server: Select the NTP Server from the drop-down list. Time Zone: Select a desired time zone from the drop-down list. Daylight saving time: Enable or disable Daylight saving. Setup Time Using Manual The user can manually set time/date Date: Set the date for system.
  • Page 83: Snmp Setup

    4-9 SNMP Setup SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. By enabling SNMP function, the administrator can obtain the system information remotely. You can access the settings by going to System, SNMP SNMP v2c Enable Check to enable SNMP v2c.
  • Page 84 RO Password: Set a password to authorize read-only access. RW User: Set a community string to authorize read/write access. RW Password: Set a password to authorize read/write access. SNMP Trap Events such as cold start, interface up & down, and association & disassociation will report to an assigned server.
  • Page 85: Chapter V: Wireless Setup

    Chapter V: Wireless Setup 5-1 General Setup This section allows you to set the data transmission, channel and output power for the system 5-1-1 Radio Basic Setup MAC Address: The MAC address of the Wireless interface is displayed here. Country: This device only supports United States WiFi channels.
  • Page 86: Ht Physical Mode

    If you select 802.11n, the only wireless clients using 802.11n band will be able to connect to this access point. (Maximum 300Mbps for 802.11n clients) Auto Channel: Enable/Disable the function. If disabled, the WiFi channel will be fixed to the manually selected channel.
  • Page 87 Tx/Rx Stream: 2 is the default setting. Using 1 will halve your speed. Channel Bandwidth: The "20/40” MHz option is usually best. The other option is available for special circumstances. Extension Channel: Only for Channel Bandwidth “40” MHz. Select the desired channel bonding for control.
  • Page 88: Advanced Settings

    Aggregation Size: The Aggregation Size is in the range of 1024~65535, default is 50000. It determines the size (in Bytes) of the larger frame. 5-2 Advanced Settings The administrator can change the Slot Time, ACK Timeout, RTS threshold and fragmentation threshold settings for the system Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond.
  • Page 89: Wmm Qos

    which support power saving mode, when to wake up to receive multicast frame. DTIM is necessary and critical in wireless environment as a mechanism to fulfill power-saving synchronization. A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered multicast frames.
  • Page 90 As an Example, time-sensitive Voice & Video, and multimedia are given effectively higher priority for transmission (lower wait times for channel access), while other applications and traditional IP data which are less time-sensitive but often more data-intensive are expected to tolerate longer wait times. High throughput.
  • Page 91: Station Setup

    ACM bit: Admission Control Mandatory, ACM only takes effect on AC_VI and AC_VO. When you do not click Checkbox, it means that the ACM is controlled by the connecting AP. If you click Checkbox, it means that the Client is in charge No ACK policy bit: Acknowledgment Policy, WMM defines two ACK policies: Normal ACK and No ACK.
  • Page 92 Open System: Data are unencrypted during transmission when this option is selected. Shared Key: WEP, Wired Equivalent Privacy, is a data encryption mechanism based on a 64-bit, or 128-bit. Select Shared Key as the security type from the drop down list as desired. Key Size: The key size of WEP encryption can be 64bit, 128bit.
  • Page 93: Repeater Ap Setup

    Cipher Type: You can chose use AES or TKIP with your WPA / WPA2 encryption method AES is short for Advanced Encryption Standard. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext. Each round consists of several processing steps, including one that depends on the encryption key.
  • Page 94 Access Point: Choose Enable or Disable Repeater AP function, the default is Disable ESSID: Extended Service Set ID. When users are browsing for available wireless networks, this is the SSID that will appear in the list.. SSID Visibility: By default, it is “Disable”. Enable this option to stop the SSID broadcast in your network.
  • Page 95 Open System: Data are unencrypted during transmission when this option is selected. WPA-PSK (or WPA2-PSK): WPA-PSK is short for W-Fi Protected Access-Pre- Shared Key. WPA-SPK uses the same encryption way with WPA, and the only difference between them is that WPA-PSK recreates a simple shared key, instead of using the user’s certification.
  • Page 96 TKIP is short for “Temporal Key Integrity Protocol. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. Group Key Update Period: This time interval for re-keying GTK (broadcast/multicast encryption keys) in seconds.
  • Page 97 Group Key Update Interval: This time interval for re-keying GTK (broadcast/multicast encryption keys) in seconds. Enter the time-length required; the default time is 600 seconds. Authentication RADIUS Server Settings Radius Server: Enter the IP address of the Authentication RADIUS server. Radius Port: The port number used by Authentication RADIUS server.
  • Page 98: Repeater Ap Mac Filter

    5-6 Repeater AP MAC Filter For each Repeater AP, users can allow or reject clients based on their MAC address. Click on Wireless, Repeater AP MAC Filter Setup. (This feature is only available in Client Bridge + Repeater AP and WISP Modes) Action: Select the desired access control type from the drop-down list;...
  • Page 99 WDS link is bidirectional and both side must support WDS. Access points know each other by MAC Address. In other words, each access point needs to include MAC address of its peer. Ensure all access points are configured with the same channel and own same security type settings. (This feature is only available in AP Mode) Security Type: Option is “Disable”, “WEP”, “TKIP”...
  • Page 100: Wds Status

    WDS Peer's MAC Address: Enter the MAC address of WDS peer. Note: All WDS peers need to have same WiFi Channel and same Security Type. 5-8 WDS Status This page shows the status of each WDS enabled device on the network. (This feature is only available in AP Mode) MAC Address: Display MAC address of WDS devices.
  • Page 101: Chapter Vi: Advanced Settings

    Chapter VI: Advanced Settings 6-1 DMZ DMZ is a setting associated with NAT functionality and is an alternative to setting up a Virtual Server (Port Forwarding). This feature opens all ports of DMZ host to internet users. Virtual Server rules have precedence over the DMZ rule.
  • Page 102 unicast or multicast packets on different protocols as shown in the IP Filter Setup. Important to note that IP filter rules has precedence over Virtual server rules. (This feature is only available in Router and WISP Modes) Click Edit to configure/edit a rule.
  • Page 103 Policy: Deny to drop and Pass to allow per filter rules In/Out: Applies to Ingress or egress packets. Protocol: Supports TCP, UDP or ICMP. Source Address/Mask: Enter desired source IP address and netmask. i.e. 192.168.2.10/32. Source Port: Enter a port or a range of ports as start:end. i.e. port 20:80 Destination Address/Mask: Enter desired destination IP address and netmask.
  • Page 104: Mac Filter

    Total of 20 rules maximum allowed in the IP Filter List. All rules can be edited or removed from the List. When you create rules in the IP Filter List, the prior rules maintain higher priority. To allow limited access from a subnet to a destination network manager needs to create allow rules first and followed by deny rules.
  • Page 105 Click Edit to configure/edit a rule. Active: By Default, the service is disabled. Check Enable radial button to enable Virtual Server. Comment: Enter appropriate message for resource sharing via Virtual Server. Protocol Type: Select appropriate sessions, TCP or UDP, from shared host via multiple private ports.
  • Page 106: Access Control

    Click “Save” button to add Virtual Server rule to List. Total of maximum 20 rules are allowed in this List. All rules can be edited or removed from the List. When creating multiple Virtual Server rules, the prior rules have higher priority. The Virtual server rules have precedence over the DMZ rules when both rules exist.
  • Page 107 Active: Check Enable button to activate this rule, and Disable to deactivate. Comment: Enter a descriptive name for this rule for identifying purposes. Protocol: Select Any or specify a protocol (TCP, UDP, ICMP, Content Filter and Application) from drop-down list. When you select ICMP or Layer 7 Application, the Local(LAN)/ Destination Port cannot be used.
  • Page 108 Application: Choose the application you wish to block. A small list of presets are available Domain Filter MAC Address: Enter MAC address in valid MAC address format (aa.bb.cc.dd.ee.ff) and click “Add” button to add in the MAC group of each rule. Click “Remove” button can remove MAC address in the group of each rule.
  • Page 109: Time Policy

    6-6 Time Policy Users can define time policy for Service Domain, IP Filtering, MAC Filtering and Virtual Server. There are 10 policies that can be defined. Click Edit to configure/edit a policy Create a Policy: Select desired schedule for this policy. Time Schedule: Select desired day of week and time period for this policy.
  • Page 110: Chapter Vii: Ap Control

    Chapter VII: AP Control 7-1 Scan Device This page allows you to scan and add devices to the AP control list. Click scan under filter device. It will scan for all managed APs on the network and list them under Scan Results.
  • Page 111: Update Ip Address & Netmask

    7-1-2 Update IP Address & Netmask Control Port: Change VLAN network for managed APs. VLAN TAG: Set VLAN TAG ID for managed APs IP Address: Set IP address for managed APs. The IP address will auto increment. Netmask: Set NetMask for the managed APs 7-1-3 Scan Result Displays managed Aps IP Address:...
  • Page 112: Batch Setup

    7-2 Batch Setup This section allows you to filter by VLAN/Group and choose which Batch setup functions you want to setup. 7-2-1 VLAN List VLAN: When VLAN Tag Function is enabled (Please refer to 4.3 system VLAN setup), administrator can change VLAN tag for managed APs. Group: When AP groups are created (please refer to 7.4), administrators can select and change group settings for managed APs.
  • Page 113  VLAN setup: VLAN: The function can select VLAN (see section 4-3-1) VLAN Mode: Administrator can enable or disable VLAN mode of the managed APs. Access Point0: Administrator can enable or disable 2.4GHz of the managed APs. 802.1d Spanning Tree: Administrator can enable or disable the function. (See section 4-3-1) Control Port:...
  • Page 114 IP Setup: Administrator can set IP address and Netmask of the managed APs. ETH0/1 VLAN Tag Setup: Administrator can set VLAN Tag or disable VLAN function of the managed APs.  Authentication Profile: After creating Profiles, See section 7-6 users can apply Authentication profiles ...
  • Page 115: Ap Setup

    7-3 AP Setup AP setup allows you to configure each individual AP you added to the Controller. You can edit the network settings, remove the devices from the controller or reboot them. VLAN: selected Desired VLAN for AP setup Setup: Administrators can modify IP address, system login passwords, web login port for managed APs. If administrator has to change AP devices, they can modify MAC address of new managed AP.
  • Page 116 Create New Map: Click the button to create map. Map Name: Enter a map name Image URL: Enter the URL of the map image. Description: Enter a description of the map. Layout: Once the map is on the Map List, administrators can click on the “Layout” button in the action tab to map out the AP network.
  • Page 117: Authentication Profile

    View: Once a device is placed, you can click the “View” button to monitor AP status and locations. 7-6 Authentication Profile Administrators can pre-set authentication conditions in the profile. For authentication, refer to 4.3.4 - Authentication...
  • Page 118: Status

    Create New Profile: Create a new authentication profile. Edit: Click the Authentication button to Enable or Disable authentication function. section 4-4 Click Dropdown to set authentication functions. See section 4-4 Action: Setup button can modify or delete for the authentication profile. 7-7 Status Check the status of each Access Point assigned to the Controller.
  • Page 119: Chapter Viii: Utilities

    Chapter VIII: Utilities 8-1 Profile Setting In this page you can save your current configuration, restore a previous saved configuration or restore all the settings in the system to the factory default settings. Save Settings to PC: Click Save button to save the current configuration to a local disk. Load Settings from PC: Click Browse button to locate a configuration file to restore, and then click Upload button to upload.
  • Page 120: Network Utility

    Upgrade Firmware: Upgrade firmware will support via Local PC, TFTP Server and HTTP URL upgrade 8-3 Network Utility The administrator can diagnose network connectivity via the PING or TRACEROUTE utility. Ping: This utility will help ping other devices on the network to verify connectivity. Ping utility, using ICMP packets, detects connectivity and latency between two network nodes.
  • Page 121: Reboot

    Traceroute: Allows tracing the hops from the device to a selected outgoing IP address. It should be used for the finding the route taken by ICMP packets across the network to the destination host. The test is started using the Start button, click Stop button to stopped test.
  • Page 122: Chapter Ix: Status

    Chapter IX: Status 9-1 Overview Detailed information on the Device and Network can be viewed on this page. 9-2 Wireless Client Administrators can view the status of all Wireless users. 9-3 Online Users The status can display online users by captive portal. Administrators can monitor user’s login/logout time and account type for the authentication account VLAN: Display VLAN number...
  • Page 123: Authentication Log By Captive Portal

    Authentication: Display captive Portal Authentication function is on/off on VLANs Download Packets: Display total download packets amount information of the VLAN Upload Packets: Display total upload packets amount information of the VLAN Download Bytes: Display total download flow information of the VLAN Upload Bytes: Display total upload flow information of the VLAN Action:...
  • Page 124: Chapter X: Hardware Install

    The HPOW5CM are designed with wall mounts and pole mounts for exterior installations. 10-1 Pole Mount Using the provided zip ties, secure the HPOW5CM through the holes on the back of the device. Make sure they are tight and secure. Make sure the pole itself is secure.
  • Page 125: Wall Mount

    10-2 Wall Mount Using the optional wall mount kit, first mount the wall mounting kit on a secure wall. Screw it in using the provided screws. Once secure, simply snap the HPOW5CM into the wall mount kit.
  • Page 127: Antenna Orientation

    Adjust the antenna as needed. The HPOW5CM has a 360 degree coverage radius. As seen in the diagram below, the signal will be transmitted in a sphere around the HPOW5CM. All devices within the range of the device should get a...
  • Page 128: Chapter Xi: Appendix

    Chapter XI: Appendix 11-1 Specifications Hardware Specification Base Platform AR9341 (AR1321) CPU Clock Speed 535 MHz Wireless Radio IEEE 802.11b/g/n Serial Port 1 * Console (Internal) Reset Switch Built-in Push-button momentary contact switch Standards Conformance IEEE 802.3 / IEEE 802.3u ...
  • Page 129 -20 °C ~ 85 °C Operating Humidity 100% Non-Condensing Storage Humidity 100% Non-Condensing Built-in Antenna HPOW5CM: 5dBi, 2.4GHz Omni Antenna (H-Plane: 360, E-Plane: 60) Input Power 48 VDC Ethernet Connector 2 * Ethernet Connector Power Supply AC Input : 110 – 220V AV Power DC Output : 48 VDC, 0.5A input (PoE Power Injector, support up to 1A)

Table of Contents