Device and Software Configuration 1.1 Device appearance and RJ-45 reset function kit description Device appearance ANT 1 ANT 2 1. When radio set 1Tx/1Rx then main signal output power is the left N-type (ANT1) connect. As refer 3.5.1 Radio 0 Basic Setup.
1.2 Setup preparation of AP Please PC link to Device used cat5/6 Ethernet cable. The following setup uses a Windows PC, user OS may vary Step 1: Please click on the computer icon in the bottom right window, and click “Open Network and Internet settings”...
Page 8
Step 2: After click left side "Ethernet" function, click on the right side “Change adapter options” again. Step 3: In “Change adapter options” Page. Please find Ethernet (Local LAN) and Click the right button on the mouse and Click “Properties” V3.0...
Page 9
Step 4: In Properties page to setting IP address, please find “Internet Protocol Version 4 (TCP/IPv4)” and double click or click “OK” button. Step 5 : Select “Use the following IP address”, and fix in IP Address : 192.168.2.# ex. The # is any number by 1 to 253 Subnet mask : 255.255.255.0 And Click "OK"...
Login Web Page Launch Web Browser Launch as web browser to access the web management interface of system by entering the default IP Address, http://192.168.2.254, in the URL field, and then press Enter. System Login root default Default login Username is “root”and Password is “default” V3.0...
Operating Mode Introduction Access Point Mode Please click on System ->Mode Setup and choose Access Point Mode It can be deployed as a traditional fixed wireless Access Point It allow wireless clients or Stations ( STA ) to access ...
Client Bridge + Repeater Mode Please click on System ->Mode Setup and choose Client Bridge Mode V3.0...
Page 13
It can be used as a Client Bridge + Repeater AP to receive wireless signals over last mile applications, helping WISPs deliver wireless broadband Internet service to new residential and business customers In this mode, the AP is enabled with DHCP Server functions. The wired clients of the AP are in the ...
WISP + Repeater AP Mode Please click on System ->Mode Setup and choose WISP Mode It can be used as an WISP/Outdoor Customer Premises Equipment (CPE) to receive wireless signals over last mile application, helping WISPs deliver wireless broadband Internet service to residents and business customers In the WISP (CPE) mode, the CenOS 5.0 AP is a gateway enabled with NAT and DHCP Server ...
CAP mode (Centralizes Access Point) Please click on System ->Mode Setup and choose CAP Mode Control Management of CenOS5.0 APs AP Management support 802.1Q VLAN infrastructure Centralized setting Access Point function and firmware upgrade. APs Group management for concept. ...
System Configuration There are common functions in any mode have management / Time Server / SNMP and Time Policy. Please refer to the following detailed instructions. Management Administrators can specify geographical location of the system via instructions in this page and modify system login password and select use system login protocol by 80, 443, 23, 22 Port.
Page 17
System Language: Administrator can select system language for English and Traditional Chinese System Information: Administrator can set the system name / Description and Location. Root Password: Administrator can change system login password. LED Control:When system working the moment, device LED will flashes. Administrator can select close the LED flashes in the function.
Page 18
Disable: If chooses disable this function then client connection Ethernet port will not be intercepted using web authentication. Wired client network basis on VLAN0. When disable this function system can use 8 VLAN and 8 ESSID. Auto Reboot: The functions can Auto-reboot the system by Date/time management. ...
Click “Save” button to save your changes. And click “Reboot” button to activate your changes Configure Time Server Administrator can select manual or via a NTP server to modify system time for the right local time. If select update the system time for manual, when administrator reboot system the system time will reply default.
Page 20
Mode: Administrator can select NTP Server or Manual. NTP Server: System can auto update the system time. Administrator needs setting as NTP Server. Default NTP Server: Administrator can select NTP Server. NTP Server: Administrator can setting as NTP Server. ...
2.3 SNMP SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. By enabling SNMP function, the administrator can obtain the system information remotely. Please click on System -> SNMP and follow the below setting. SNMP v2c function Active: Administrator can select Enable or Disable the service.
SNMP Trap Events such as cold start interface up & down, and association & disassociation will report to an assigned server. Active: Administrator can select Enable or Disable the service. Community: Set a community string required by the remote host computer that will receive trap ...
Page 23
Please click Edit button to setting Time Policy rules. Comment: Enter the description of Time Policy rule. Mode: Administrator can select On schedule or Out of schedule to execution the rules. Create New Policy button: Administrator can set time for week / start time and end time. Click “Save”...
Access Point mode When AP mode is chosen, the system can be configured as an Access Point. This section provides detailed explanation for users to configure in the AP mode with help of illustrations. In the AP mode, functions listed in the table below are also available from the Web-based GUI interface.
# Network Setup Network button Administrator can click button to set VLAN network functions. VLAN Mode:Administrator can select Enable or disable for the VLAN Network. At least one VLAN will always be enabled by default IP Mode:Administrator can select enable or disable function for VLAN IP. ...
# Network Pull-down menu Administrator can set DHCP Server and 2.4/5G security for the access point and set 802.11r fast roaming. Please click pull-down button. 3.1.1 DHCP Server Administrator can select enable / disable the function Start IP : Set Start IP for DHCP Service. ...
Page 27
Gateway: Set Gateway IP for DHCP Service. DNS(1-2) IP : Set DNS IP for DHCP Service. WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server; this is optional. Domain : Enter the domain name for this network. ...
3.1.2 Bandwidth Control Administrators can set bandwidth limit the max/min bandwidth of the Wi-Fi users, Bandwidth control can set IP/MASK , IP Range, Port(Service), SIP, RTP/RTSP and WEB. Administrator can enable or disable the function. Administrator can set total bandwidth used limit in VLAN. ...
3.1.3 Radio 0 Access Point Setup Administrator can Enable or Disable radio 0 (5G) Wi-Fi. If radio 0 (5G) are enabled, administrators can set the SSID and security for the 5G access point. Access Point: Administrator can Enable or Disable the radio 0 (5G). ...
Page 30
WPA Mode: Administrator can select security for Auto or only WPA or only WPA2. Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
Radius Server:Enter the IP address of the Authentication RADIUS server. Radius Port: The port number used by Authentication RADIUS server. Use the default 1812 or enter port number specified. Radius Secret: The secret key for system to communicate with Authentication RADIUS ...
After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally. MAC Address: Set managed MAC address of the client. MAC Address List: Display managed MAC address list. Click “Save” button to save your changes. Then click Reboot button to activate your changes. 3.1.5 802.11r Fast Roaming Setup The dual band Access Point supports 802.11r/802.11k function for 5G...
Page 33
Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) between which a STA can use Fast BSS Transition. Please enter 2-octet identifier as a hex string. R0 Key Lifetime: Default lifetime of the PMK-RO in minutes, the default is 10000, administrator ...
Shared Key of 128 bit. 128-bit Key: Enter R1 Key holders : Enter a unified set of R1 Key Holder identification certification. MAC Address: Enter the main roaming device MAC address R1 Identifier: Enter Shared identifier. 128-bit Key: Enter Shared Key of 128 bit. ...
#:Display VLANs number. VLAN Mode:Displays VLAN on/off status. (Please refer to 3.2 VLAN Setup) Authentication:Displays VLAN# whether enable or disable web authentication. Action:The function has 2 buttons (Authentication and Dropdown) 3.2.1 Enable Authentication function : By clicking the Authentication button, administrator can enable or disable this function.
Page 36
Login URL:Administrator can set URL for login page. Session Log:If network have Syslog server. Administrator can to systemmanagement setting IP address for syslog server and enable the function. Account session log will copy to syslog server. Local User:Administrator can enable authentication for local user. Create user account can to ...
3.2.2 Set Authentication function : By Clicking the Dropdown button, Administrators can set authentication functions. # Guest Administrator can enable or disable guest authentication. If enabled, the administrator can set guest Count Limit / login time and type and flow control. Service:Administrator can select enable or disable this function.
QoS: Administrator can restrict the traffic of guest. Traffic management can set users upload and download traffic. Local User Administrator can create local user account for web login. User Name: Administrator can create users account. Password:Set account password. ...
Sample for Google OAuth2.0 setup Please complete the application on the Google website to receive an account ID and password, follow the steps below. Step.1 Please go to the Google Developers Console page and create a project (Reference https://developers.google.com/identity/protocols/OAuth2) Step.2 Click Credentials to create OAuth client ID in the API manager page.
Page 40
Step.3 Select web application in the “Application Type” section and set “Restrictions” URL. Step.4 Set Authorized JavaScript origins and Authorized redirect URLs (important) Administrator must set login URL in the device function. After complete set of login URL go to the “Restrictions”...
Page 41
After complete set of login URL go to the “Restrictions” function in web page. Copy and paste the login URL from the system display into the “Restriction” page on the Google Developer website. Google Authorized JavaScript origins URL is http://domain0.login.com (same as Login URL) ...
Sample for Facebook OAuth2.0 setup Please complete the application on the Facebook website to receive an account ID and password, follow the steps below. Step.1 Please to Facebook developer’s page and add a New App Step.2 Select WWW function Step.3 Administrator must set www for your information.
Page 43
Step.4 Please click “Setting” and add Platform Step.5 Select Platform for “Website” Step.6 Enter URL is http://domain0.login.com/login/index.cgi?cgi=CALLBACK Administrator must set login URL in the device function. After complete set of login URL go to the “Facebook function in web page. Follow the steps below to set login URLs Site URL”...
Page 44
After complete set of login URL go to the “Facebook function in web page. Copy and Site URL” paste the login URL from the system display into the “ Site URL” page on the Facebook website. Step.7 Click Advanced function to enable the “Native or desktop app?”...
Client ID and Client Secret setup by third parties such as Facebook and Google are subject to change. The instructions above follow the 2016 setup procedure. Any future changes to the Facebook/Google process may lead to our instructions becoming invalid. # POP3/IMAP Server The purpose of this integrated function is to allow clients to link a POP3 server for receiving emails from a remote server.
Host : Define the desired Host server name. Port : Input the proper port number for the corresponding server. Connect Type : Select the Connect type with options of “STARTTLS”, “SSL/TTL”, or “None”. POP3 Server Test : Use this tool to test if the POP3 server is operating correctly with your ...
Page 47
Sample: See sample login page below that is customized by html coding (sample login page html code templates are available on Cerio website) The following function uses the enabled Template Multiple Language:Administrator can select enable or disable multiple language for login ...
Language Administrator can create other language for login page. Click “Create New Language” button go to add or edit language for login page. Language: Set description of language. Default Language: Display default language. # Walled Garden This function provides certain free services or advertisement web pages for users to access the websites listed before login and authentication.
Device Name: Enter Device or Users Name. IP Address: Enter used IP Address of Device or Users PC. MAC Address: Enter MAC Address of Device or Users PC. After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally.
RADIUS Server This function only used to operate in Access Point mode. Service:Administrator can select Enable or disable the function. Radius:Administrator must to set remote RADIUS Server use Port. Radius Secret:Administrator must to set remote RADIUS Server use Key. ...
User Name:Create users name for RADIUS account. Password:Enter password for user name. Export User File:Administrator can export account list in RADIUS Server. Import From PC:Administrator can import account list to the RADIUS Server. Click “Save” button to save your set function. Then click Reboot button to activate your changes. Wireless Configuration This wireless functions administrator can set radio 0 (5G) application of the Access Point.
Page 52
Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually the best. The other ...
3.5.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
Page 54
Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
3.5.3 WMM Setup This affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
Page 56
AC Type: Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.
WDS Setup: Administrator can select Enable or Disable. Authentication: Administrator can use AES security. WDS Client Setup: Administrator can used 5G for WDS Links. A Single Radio supports up to 8 WDS links. VLAN Setup: The WDS aisle support Multi-tag VALN ...
4. Client Bridge Mode When Client Bridge is chosen, the system can be configured as a Client Bridge and support Repeater AP function. This can setup VLAN and DHCP server in the system menu. This section provides detailed explanation for users to configure in the Client Bridge Mode and Repeater AP function with help of illustrations.
Page 60
DNS: Enter IP address of domain name service. Primary DNS: The IP address of the primary DNS server. Secondary: The IP address of the secondary DNS server. 802.1d Spanning Tree : The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7.
Configure DHCP Setup The DHCP Service function in the Client Bridge device can select a separate IP Address range within the same network segment of the source AP, and allocate those IP Addresses to connecting clients. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP ...
Page 62
IP Address: Display users used IP address. MAC Address: Display MAC Address of users used device. Expired: Display Lease expiration time of IP address. Action: Kicked user button. Static Lease IP Setup: Administrator can set as static IP address for users. Comment: Enter description for the information.
4.3 Wireless General Setup The main setup Client Bridge connection to AP Station and Repeater AP functions setting, MAC filter, WMM and 802.11r/802.11k Fast Roaming etc in wireless menu. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally.
Page 64
Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually best. The other ...
4.3.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
Page 66
Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 4.3.3 WMM Setup His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic.
Page 68
AC Type: Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
When the no acknowledgement (No ACK) policy is used, the recipient does not acknowledge received packets during wireless packet exchange. This policy is suitable in the environment where communication quality is fine and interference is weak. While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates.
If Security/Cipher selected or set PassPhrase is wrong, it will not be able to bridge normally. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 4.3.5 Repeater AP Setup Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations. 1.
Page 71
WPA Mode: Administrator can select security for Auto or only WPA or only WPA2. Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
4.3.6 MAC Filter Setup Administrator can setup allow or reject WiFi clients (MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable, Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
4.3.7 802.11r Fast Roaming Setup 802.11r/802.11k function for 5G radio. 802.11r, which is the IEEE The system support standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
Page 74
MAC Address: Enter must key in the MAC Address of other AP NAS Identifier: Enter 1~48 octets of network domain name. Shared Key of 128 bit. 128-bit Key: Enter R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
5. WISP Mode WISP Mode is a router function, if the Telecom company permits wireless connection to their WAN, administrators can change the CenOS 5.0 AP to WISP Mode to connect to the wifi network. The WISP Mode support PPPoE / Static IP / Dynamic IP and PPTP for WAN, and support Repeater AP function.
Page 76
Hostname : The Hostname of the WAN port PPPoE : To create wireless PPPoE WAN connection to a PPPoE server in network. User Name : Enter User Name for PPPoE connection Password : Enter Password for PPPoE connection ...
Page 77
PPTP: The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of secure multi-protocol Virtual Private Networks (VPNs) through public networks. User Name: Enter account for PPTP. Password: Enter user name account used password for PPTP. PPTP Server IP: Enter remote IP address of PPTP Server. ...
Page 78
Manual – Click the “Connect” button on “WAN Information” in the Overview page to connect to the Internet. MAC Clone The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification. Some ISPs require you to register a MAC address in order to access to Internet. If not, you could use default MAC or clone MAC from a PC.
5.2 Configure LAN Setup Here are the instructions for how to setup the local IP Address and Netmask. Please click on System -> LAN and follow the below setting. IP Setup: The administrator can manually setup the LAN IP address. IP Address : The IP address of the LAN port;...
Page 80
Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to clients. Netmask: The netmask default is 255.255.255.0. Gateway: Enter source gateway IP address. DNS1: Enter IP address of the first DNS server; this field is required. ...
Static Lease IP Setup: Administrator can set as static IP address for users. Comment: Enter description for the information. IP Address: Set static IP address for users. MAC Address: Set MAC address of user device. Static Lease IP List: Display users list of static IP address.
5.4.1 Radio 0 Basic Setup MAC Address: Display radio 1 use MAC address. Country: Administrator can select country used channel by US / EU and Taiwan. Band Mode: Administrator can select 5G Band for 802.11a/n or 802.11ac. The default is ...
Page 83
Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually best. The other ...
5.4.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
Page 85
Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 5.4.3 WMM Setup His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic.
Page 87
AC Type: Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
Page 88
TxOP Limit:Transmission Opportunity is an interval of time when a WME AP has the right to initiate transmissions onto the wireless medium (WM). This value specifies (in milliseconds) the Transmission Opportunity (TXOP) for AP; that is, the interval of time when the WMM AP has the right to initiate transmissions on the wireless network.。...
5.4.4 Station Setup The functions setting functions include Client Bridge link to AP station. Administrator can used “site survey” function to Search for AP stations. MAC Address List: The function can discovery AP Station and select want to link the AP station, ...
5.4.5 Repeater AP Setup Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations. 1. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally. 2. The default is enabling of Repeater AP. If want to used pure Client Bridge will can disable it.
Page 91
WPA Mode: Administrator can select security for Auto or only WPA or only WPA2. Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
5.4.6 MAC Filter Setup Administrator can setup allow or reject WiFi clients(MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable, Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
5.4.7 802.11r Fast Roaming Setup 802.11r/802.11k function for 5G radio. 802.11r, which is the IEEE The system support standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
Page 94
MAC Address: Enter must key in the MAC Address of other AP NAS Identifier: Enter 1~48 octets of network domain name. Shared Key of 128 bit. 128-bit Key: Enter R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
Advanced Setup Administrator can set basic routing security functions, including DMZ / IP and MAC filtering / virtual servers and access control management (basic firewall rules) in Advance memu. 5.5.1 DMZ DMZ is commonly work with the NAT functionality as an alternative of Virtual Server(Port Forwarding) while wanting all ports of DMZ host visible to Internet users.
5.5.2 IP Filter Can allow or deny filter ingress or egress packets from specific source and/or to destination IP address on wired (LAN) or Wireless (WAN) ports. Filter rules could be used to filter unicast or multicast packets on different protocols as shown in the IP Filter Setup. Important to note that IP filter rules has precedence over Virtual server rules.
Interface: The interface that a filter rule applies. Schedule: Can choose to use rule by “Time Policy”. All packets are allowed by default. Deny rules could be added to the filter list to filter out unwanted packets and leave remaining allowed. Click “Save”...
5.5.4 Virtual Server The “Virtual Server” can also referred to as “Port Forward” as well and used interchangeably. Resources in the network can be exposed to the Internet users in a controlled manner including on-line gaming, video conferencing or others via Virtual Server setup. Don’t repeat ports’ usage to avoid confusion.
Private IP Address: Enter corresponding IP address for internal. Private Port: Enter internal service port No. for private. Schedule : Administrator can select to used rule of “Time Policy” Click “Save” button to save your set function. Then click “Reboot” button to activate your changes.
Page 100
# Access control rules: Active:Administrator can select Enable or Disable for the Access control rule. Comment:Administrator can enter comment for the role. Protocol:Administrator can to select management protocol by TCP/UDP/ICMP/Content Filter/Application and Domain Filter. ANY: Select "Any" is all deny Protocol, administrator can filter local IP / IP range go to ...
CAP Mode The CAP mode itself isn’t Access Point. This mode is primarily to control all the managed AP. The following describes setup function in system menu 6.1 VLAN Setup Setup Control AP of LAN or VLAN IP Address, Gateway, DNS and Ethernet Tag etc. Please click on System ->...
Page 102
VLAN Mode:Administrator can Enable or disable the VLAN function. There must always be at least one VLAN enabled. If the administrator disables all the VLANs, he/she will not be able to login to the manager page. The administrator must then reset to default. IP setup:Administrator can set the VLAN IP address and NetMask or disable IP.
6.2 AP Control When CenOS5.0 AP changes to CAP mode, Administrator can use AP Control functions to centralize management of APs in the network architecture. AP control Setting functions have “Scan Device”, “Batch Setup”, “AP Setup”, “Group / Map setup” and Authentication Profile setup etc.. Please click “AP Control”...
Netmask:Administrator can set single Netmask for Managed AP. Default:Administrator click the button will can reset to default for select managed APs. Control Port:Administrator can change VLAN network for managed APs. VLAN TAG:Administrator can set VLAN TAG ID for managed APs. ...
Page 105
VLAN Setup:Administrator can set VLAN Tag, IP address and Wi-Fi on/off for the managed APs. VLAN:The function can select VLAN (please refer to 3.1 Configure VLAN Setup) for managed APs. VLAN Mode : Administrator can enable or disable VLAN mode of the managed APs. ...
Page 106
IP Setup:Administrator can set IP address and Netmask of the managed APs. ETH0/1 VLAN Tag Setup:Administrator can set VLAN Tag or disable VLAN function of the managed APs. Authentication Profile:After creating Profiles, See: “4.2.6 Authentication Profile” users can ...
6.2.3 AP Setup Administrator can monitor statuses and modify managed APs information. VLAN:Select desired VLAN for AP setup Setup:Administrator can modify IP addresses, system login passwords, and web login port for managed APs. If administrator has change AP devices, administrator can modify MAC address of the new managed AP.
6.2.5 Map Setup The Map Setup feature allows administrators to upload a floor plan image to a web server, then use the image URL to import the map into the AP user interface. Once the image is uploaded, administrators can use the Map Setup function to map out the locations of the AP network. reate New Map:Click the button to create map.
Page 109
View:Once complete, administrators can click the “View” button to monitor AP statuses and locations. V3.0...
6.2.6 Authentication Profile Administrator can pre-set authentication conditions in the profile, the authentication set can refer 3.2 Authentication. Create New Profile:Administrator can create authentication profile. Edit: Click the Authentication button to Enable or Disable authentication function. For more details, refer to “3.2.1 Authentication”. Click Dropdown to set authentication functions.
7. Utilities Administrator can backup or restore system configuration / firmware Upgrade / ping tools and system reset to default or reboot system. 7.1 Profile Setting This Functions purpose is to backup current configuration, restore prior configuration or reset back to factory default configurations.
Load Settings from PC: Click Browse button to locate a configuration file to restore, and then click Upload button to upload. Reset To Factory Default: Click Default button to reset back to the factory default settings and expect Successful loading message. Then, click Reboot button to activate. 7.2 System Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations.
Page 113
Select File: Administrator can select Firmware file in Local PC. Upgrade Via Local PC and TFTP Server: The upgrade firmware will support via local PC and TFTP Server and HTTP URL to upgrade system. 1. To prevent data loss during firmware upgrade, please back up current settings before proceeding 2.
7.3 Network Utility The administrator can diagnose network connectivity via the PING or TRACEROUTE utility. Please click on Utilities -> Network Utility and follow the below setting. Ping: This utility will help ping other devices on the network to verify connectivity. Ping utility, ...
8. Status The status mainly displays system related information, including system network information, wireless base station information, and wireless user connection information. 8.1 Overview Detailed information on System, Network can be reviewed via this page. V3.0...
8.2 Wireless Client The page can be display Wireless user information link to access point. Administrator can monitor MAC In addition to CAP mode) address / rate and RSSI for the wireless users. ( Radio:Display information for wireless client connection Radio 0. ...
Download Packets:Display total download packets amount information by user. Upload Packets:Display total upload packets amount information by user. Download Bytes:Display total download flow information by user. Upload Bytes:Display total upload flow information by user. 8.4 Authentication Log The authentication log can monitor account login/logout type and account use time.
Appendix A. WEB GUI Valid Characters Table B WEB GUI Valid Characters Block Field Valid Characters IP Address IP Format; 1-254 IP Netmask 128.0.0.0 ~ 255.255.255.252 IP Gateway IP Format; 1-254 Primary DNS IP Format; 1-254 Secondary DNS IP Format; 1-254 Hostname Length : 32 0-9, A-Z, a-z...
Need help?
Do you have a question about the OW-200 A1 and is the answer not in the manual?
Questions and answers