Table of Contents

Advertisement

Quick Links

CERIO Corporation
CenOS 5.0
User Manual
for
OW-200 A1 / OW-218 A1
V3.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the OW-200 A1 and is the answer not in the manual?

Questions and answers

Summary of Contents for Cerio OW-200 A1

  • Page 1 CERIO Corporation CenOS 5.0 User Manual OW-200 A1 / OW-218 A1 V3.0...
  • Page 2: Table Of Contents

    1. Software Configuration ..................6 Device appearance and RJ-45 reset function kit description ..........6 Setup preparation of AP ......................7 Login Web Page ........................10 Operating Mode Introduction ....................11 Access Point Mode ........................... 11 Client Bridge + Repeater Mode ........................ 12 WISP + Repeater AP Mode ........................
  • Page 3 3.2.2 Set Authentication function....................37 # Guest ..............................37 # Local User .............................. 38 # OAuth2.0 ............................... 38 Sample for Google OAuth2.0 setup ......................39 Sample for Facebook OAuth2.0 setup ....................42 # POP3/IMAP Server ..........................45 # Customize Page ............................ 46 # Language ...............................
  • Page 4 4.3.3 WMM Setup .......................... 67 4.3.4 Station Setup ......................... 69 4.3.5 Repeater AP Setup ........................ 70 4.3.6 MAC Filter Setup ........................72 4.3.7 802.11r Fast Roaming Setup ....................73 5. WISP Mode ....................75 Configure WAN Setup ......................75 Configure LAN Setup ......................79 Configure DHCP Server ......................
  • Page 5 6.2.1 Scan Device .......................... 103 6.2.2 Batch Setup ......................... 104 6.2.3 AP Setup ..........................107 6.2.4 Group Setup ........................107 6.2.5 Map Setup ........................... 108 6.2.6 Authentication Profile ......................110 6.2.7 Status ........................... 110 7. Utilities ......................111 Profile Setting ........................111 System Upgrade ........................
  • Page 6: Software Configuration

    Device and Software Configuration 1.1 Device appearance and RJ-45 reset function kit description Device appearance ANT 1 ANT 2 1. When radio set 1Tx/1Rx then main signal output power is the left N-type (ANT1) connect. As refer 3.5.1 Radio 0 Basic Setup.
  • Page 7: Setup Preparation Of Ap

    1.2 Setup preparation of AP Please PC link to Device used cat5/6 Ethernet cable. The following setup uses a Windows PC, user OS may vary Step 1: Please click on the computer icon in the bottom right window, and click “Open Network and Internet settings”...
  • Page 8 Step 2: After click left side "Ethernet" function, click on the right side “Change adapter options” again. Step 3: In “Change adapter options” Page. Please find Ethernet (Local LAN) and Click the right button on the mouse and Click “Properties” V3.0...
  • Page 9 Step 4: In Properties page to setting IP address, please find “Internet Protocol Version 4 (TCP/IPv4)” and double click or click “OK” button. Step 5 : Select “Use the following IP address”, and fix in IP Address : 192.168.2.# ex. The # is any number by 1 to 253 Subnet mask : 255.255.255.0 And Click "OK"...
  • Page 10: Login Web Page

    Login Web Page Launch Web Browser Launch as web browser to access the web management interface of system by entering the default IP Address, http://192.168.2.254, in the URL field, and then press Enter. System Login root default Default login Username is “root”and Password is “default” V3.0...
  • Page 11: Operating Mode Introduction

    Operating Mode Introduction Access Point Mode Please click on System ->Mode Setup and choose Access Point Mode It can be deployed as a traditional fixed wireless Access Point  It allow wireless clients or Stations ( STA ) to access ...
  • Page 12: Client Bridge + Repeater Mode

    Client Bridge + Repeater Mode Please click on System ->Mode Setup and choose Client Bridge Mode V3.0...
  • Page 13 It can be used as a Client Bridge + Repeater AP to receive wireless signals over last mile  applications, helping WISPs deliver wireless broadband Internet service to new residential and business customers In this mode, the AP is enabled with DHCP Server functions. The wired clients of the AP are in the ...
  • Page 14: Wisp + Repeater Ap Mode

    WISP + Repeater AP Mode Please click on System ->Mode Setup and choose WISP Mode It can be used as an WISP/Outdoor Customer Premises Equipment (CPE) to receive wireless signals  over last mile application, helping WISPs deliver wireless broadband Internet service to residents and business customers In the WISP (CPE) mode, the CenOS 5.0 AP is a gateway enabled with NAT and DHCP Server ...
  • Page 15: Cap Mode (Centralizes Access Point)

    CAP mode (Centralizes Access Point) Please click on System ->Mode Setup and choose CAP Mode Control Management of CenOS5.0 APs  AP Management support 802.1Q VLAN infrastructure  Centralized setting Access Point function and firmware upgrade.  APs Group management for concept. ...
  • Page 16: System Configuration

    System Configuration There are common functions in any mode have management / Time Server / SNMP and Time Policy. Please refer to the following detailed instructions. Management Administrators can specify geographical location of the system via instructions in this page and modify system login password and select use system login protocol by 80, 443, 23, 22 Port.
  • Page 17  System Language: Administrator can select system language for English and Traditional Chinese  System Information: Administrator can set the system name / Description and Location.  Root Password: Administrator can change system login password.  LED Control:When system working the moment, device LED will flashes. Administrator can select close the LED flashes in the function.
  • Page 18 Disable: If chooses disable this function then client connection Ethernet port will not be  intercepted using web authentication. Wired client network basis on VLAN0. When disable this function system can use 8 VLAN and 8 ESSID. Auto Reboot: The functions can Auto-reboot the system by Date/time management. ...
  • Page 19: Configure Time Server

    Click “Save” button to save your changes. And click “Reboot” button to activate your changes Configure Time Server Administrator can select manual or via a NTP server to modify system time for the right local time. If select update the system time for manual, when administrator reboot system the system time will reply default.
  • Page 20 Mode: Administrator can select NTP Server or Manual.   NTP Server: System can auto update the system time. Administrator needs setting as NTP Server. Default NTP Server: Administrator can select NTP Server.  NTP Server: Administrator can setting as NTP Server. ...
  • Page 21: Snmp

    2.3 SNMP SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. By enabling SNMP function, the administrator can obtain the system information remotely. Please click on System -> SNMP and follow the below setting. SNMP v2c function Active: Administrator can select Enable or Disable the service.
  • Page 22: Configure Time Policy

    SNMP Trap Events such as cold start interface up & down, and association & disassociation will report to an assigned server. Active: Administrator can select Enable or Disable the service.  Community: Set a community string required by the remote host computer that will receive trap ...
  • Page 23 Please click Edit button to setting Time Policy rules. Comment: Enter the description of Time Policy rule.  Mode: Administrator can select On schedule or Out of schedule to execution the rules.  Create New Policy button: Administrator can set time for week / start time and end time. Click “Save”...
  • Page 24: Access Point Mode

    Access Point mode When AP mode is chosen, the system can be configured as an Access Point. This section provides detailed explanation for users to configure in the AP mode with help of illustrations. In the AP mode, functions listed in the table below are also available from the Web-based GUI interface.
  • Page 25: Network Setup

    # Network Setup Network button Administrator can click button to set VLAN network functions. VLAN Mode:Administrator can select Enable or disable for the VLAN Network.  At least one VLAN will always be enabled by default IP Mode:Administrator can select enable or disable function for VLAN IP. ...
  • Page 26: Network Pull-Down Menu

    # Network Pull-down menu Administrator can set DHCP Server and 2.4/5G security for the access point and set 802.11r fast roaming. Please click pull-down button. 3.1.1 DHCP Server Administrator can select enable / disable the function  Start IP : Set Start IP for DHCP Service. ...
  • Page 27  Gateway: Set Gateway IP for DHCP Service.  DNS(1-2) IP : Set DNS IP for DHCP Service. WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server; this is optional.  Domain : Enter the domain name for this network. ...
  • Page 28: Bandwidth Control

    3.1.2 Bandwidth Control Administrators can set bandwidth limit the max/min bandwidth of the Wi-Fi users, Bandwidth control can set IP/MASK , IP Range, Port(Service), SIP, RTP/RTSP and WEB. Administrator can enable or disable the function. Administrator can set total bandwidth used limit in VLAN. ...
  • Page 29: Radio 0 Access Point Setup

    3.1.3 Radio 0 Access Point Setup Administrator can Enable or Disable radio 0 (5G) Wi-Fi. If radio 0 (5G) are enabled, administrators can set the SSID and security for the 5G access point. Access Point: Administrator can Enable or Disable the radio 0 (5G). ...
  • Page 30 WPA Mode: Administrator can select security for Auto or only WPA or only WPA2.  Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption  method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
  • Page 31: Mac Filter

    Radius Server:Enter the IP address of the Authentication RADIUS server.  Radius Port: The port number used by Authentication RADIUS server. Use the default  1812 or enter port number specified. Radius Secret: The secret key for system to communicate with Authentication RADIUS ...
  • Page 32: Fast Roaming Setup

    After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally. MAC Address: Set managed MAC address of the client.  MAC Address List: Display managed MAC address list.  Click “Save” button to save your changes. Then click Reboot button to activate your changes. 3.1.5 802.11r Fast Roaming Setup The dual band Access Point supports 802.11r/802.11k function for 5G...
  • Page 33 Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same  SSID) between which a STA can use Fast BSS Transition. Please enter 2-octet identifier as a hex string. R0 Key Lifetime: Default lifetime of the PMK-RO in minutes, the default is 10000, administrator ...
  • Page 34: Authentication

    Shared Key of 128 bit. 128-bit Key: Enter  R1 Key holders : Enter a unified set of R1 Key Holder identification certification. MAC Address: Enter the main roaming device MAC address  R1 Identifier: Enter Shared identifier.  128-bit Key: Enter Shared Key of 128 bit. ...
  • Page 35: Enable Authentication Function

    #:Display VLANs number.  VLAN Mode:Displays VLAN on/off status. (Please refer to 3.2 VLAN Setup)  Authentication:Displays VLAN# whether enable or disable web authentication.  Action:The function has 2 buttons (Authentication and Dropdown)  3.2.1 Enable Authentication function : By clicking the Authentication button, administrator can enable or disable this function.
  • Page 36 Login URL:Administrator can set URL for login page.  Session Log:If network have Syslog server. Administrator can to systemmanagement  setting IP address for syslog server and enable the function. Account session log will copy to syslog server. Local User:Administrator can enable authentication for local user. Create user account can to ...
  • Page 37: Set Authentication Function

    3.2.2 Set Authentication function : By Clicking the Dropdown button, Administrators can set authentication functions. # Guest Administrator can enable or disable guest authentication. If enabled, the administrator can set guest Count Limit / login time and type and flow control. Service:Administrator can select enable or disable this function.
  • Page 38: Local User

    QoS: Administrator can restrict the traffic of guest. Traffic management can set users upload  and download traffic. Local User Administrator can create local user account for web login. User Name: Administrator can create users account.  Password:Set account password. ...
  • Page 39: Sample For Google Oauth2.0 Setup

    Sample for Google OAuth2.0 setup Please complete the application on the Google website to receive an account ID and password, follow the steps below. Step.1 Please go to the Google Developers Console page and create a project (Reference https://developers.google.com/identity/protocols/OAuth2) Step.2 Click Credentials to create OAuth client ID in the API manager page.
  • Page 40 Step.3 Select web application in the “Application Type” section and set “Restrictions” URL. Step.4 Set Authorized JavaScript origins and Authorized redirect URLs (important) Administrator must set login URL in the device function. After complete set of login URL go to the “Restrictions”...
  • Page 41 After complete set of login URL go to the “Restrictions” function in web page. Copy and paste the login URL from the system display into the “Restriction” page on the Google Developer website. Google Authorized JavaScript origins URL is http://domain0.login.com (same as Login URL) ...
  • Page 42: Sample For Facebook Oauth2.0 Setup

    Sample for Facebook OAuth2.0 setup Please complete the application on the Facebook website to receive an account ID and password, follow the steps below. Step.1 Please to Facebook developer’s page and add a New App Step.2 Select WWW function Step.3 Administrator must set www for your information.
  • Page 43 Step.4 Please click “Setting” and add Platform Step.5 Select Platform for “Website” Step.6 Enter URL is http://domain0.login.com/login/index.cgi?cgi=CALLBACK Administrator must set login URL in the device function. After complete set of login URL go to the “Facebook function in web page. Follow the steps below to set login URLs Site URL”...
  • Page 44 After complete set of login URL go to the “Facebook function in web page. Copy and Site URL” paste the login URL from the system display into the “ Site URL” page on the Facebook website. Step.7 Click Advanced function to enable the “Native or desktop app?”...
  • Page 45: Pop3/Imap Server

    Client ID and Client Secret setup by third parties such as Facebook and Google are subject to change. The instructions above follow the 2016 setup procedure. Any future changes to the Facebook/Google process may lead to our instructions becoming invalid. # POP3/IMAP Server The purpose of this integrated function is to allow clients to link a POP3 server for receiving emails from a remote server.
  • Page 46: Customize Page

    Host : Define the desired Host server name.  Port : Input the proper port number for the corresponding server.  Connect Type : Select the Connect type with options of “STARTTLS”, “SSL/TTL”, or “None”.  POP3 Server Test : Use this tool to test if the POP3 server is operating correctly with your ...
  • Page 47  Sample: See sample login page below that is customized by html coding (sample login page html code templates are available on Cerio website) The following function uses the enabled Template Multiple Language:Administrator can select enable or disable multiple language for login ...
  • Page 48: Language

    Language Administrator can create other language for login page. Click “Create New Language” button go to add or edit language for login page. Language: Set description of language.  Default Language: Display default language.  # Walled Garden This function provides certain free services or advertisement web pages for users to access the websites listed before login and authentication.
  • Page 49: Profile

    Device Name: Enter Device or Users Name.  IP Address: Enter used IP Address of Device or Users PC.  MAC Address: Enter MAC Address of Device or Users PC.  After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally.
  • Page 50: Radius Server

    RADIUS Server This function only used to operate in Access Point mode. Service:Administrator can select Enable or disable the function.  Radius:Administrator must to set remote RADIUS Server use Port.  Radius Secret:Administrator must to set remote RADIUS Server use Key. ...
  • Page 51: Wireless Configuration

    User Name:Create users name for RADIUS account.  Password:Enter password for user name.  Export User File:Administrator can export account list in RADIUS Server.  Import From PC:Administrator can import account list to the RADIUS Server.  Click “Save” button to save your set function. Then click Reboot button to activate your changes. Wireless Configuration This wireless functions administrator can set radio 0 (5G) application of the Access Point.
  • Page 52 Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If  administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually the best. The other ...
  • Page 53: Advanced Setup

    3.5.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 54 Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in  all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
  • Page 55: Wmm Setup

    3.5.3 WMM Setup This affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
  • Page 56 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 57: Wds Setup

    While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.
  • Page 58: Wds Status

    WDS Setup: Administrator can select Enable or Disable.  Authentication: Administrator can use AES security.  WDS Client Setup: Administrator can used 5G for WDS Links. A Single Radio supports up to 8  WDS links. VLAN Setup: The WDS aisle support Multi-tag VALN ...
  • Page 59: Client Bridge Mode

    4. Client Bridge Mode When Client Bridge is chosen, the system can be configured as a Client Bridge and support Repeater AP function. This can setup VLAN and DHCP server in the system menu. This section provides detailed explanation for users to configure in the Client Bridge Mode and Repeater AP function with help of illustrations.
  • Page 60 DNS: Enter IP address of domain name service.   Primary DNS: The IP address of the primary DNS server.  Secondary: The IP address of the secondary DNS server. 802.1d Spanning Tree :  The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7.
  • Page 61: Configure Dhcp Setup

    Configure DHCP Setup The DHCP Service function in the Client Bridge device can select a separate IP Address range within the same network segment of the source AP, and allocate those IP Addresses to connecting clients. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP ...
  • Page 62 IP Address: Display users used IP address.  MAC Address: Display MAC Address of users used device.  Expired: Display Lease expiration time of IP address.  Action: Kicked user button.  Static Lease IP Setup: Administrator can set as static IP address for users. Comment: Enter description for the information.
  • Page 63: Wireless General Setup

    4.3 Wireless General Setup The main setup Client Bridge connection to AP Station and Repeater AP functions setting, MAC filter, WMM and 802.11r/802.11k Fast Roaming etc in wireless menu. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally.
  • Page 64 Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If  administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually best. The other ...
  • Page 65: Advanced Setup

    4.3.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 66 Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in  all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
  • Page 67: Wmm Setup

    Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 4.3.3 WMM Setup His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic.
  • Page 68 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 69: Station Setup

    When the no acknowledgement (No ACK) policy is used, the recipient does not acknowledge received packets during wireless packet exchange. This policy is suitable in the environment where communication quality is fine and interference is weak. While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates.
  • Page 70: Repeater Ap Setup

    If Security/Cipher selected or set PassPhrase is wrong, it will not be able to bridge normally. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 4.3.5 Repeater AP Setup Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations. 1.
  • Page 71  WPA Mode: Administrator can select security for Auto or only WPA or only WPA2.  Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
  • Page 72: Mac Filter Setup

    4.3.6 MAC Filter Setup Administrator can setup allow or reject WiFi clients (MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable,  Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
  • Page 73: Fast Roaming Setup

    4.3.7 802.11r Fast Roaming Setup 802.11r/802.11k function for 5G radio. 802.11r, which is the IEEE The system support standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
  • Page 74 MAC Address: Enter must key in the MAC Address of other AP  NAS Identifier: Enter 1~48 octets of network domain name.  Shared Key of 128 bit. 128-bit Key: Enter  R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
  • Page 75: Wisp Mode

    5. WISP Mode WISP Mode is a router function, if the Telecom company permits wireless connection to their WAN, administrators can change the CenOS 5.0 AP to WISP Mode to connect to the wifi network. The WISP Mode support PPPoE / Static IP / Dynamic IP and PPTP for WAN, and support Repeater AP function.
  • Page 76 Hostname : The Hostname of the WAN port  PPPoE : To create wireless PPPoE WAN connection to a PPPoE server in network.  User Name : Enter User Name for PPPoE connection  Password : Enter Password for PPPoE connection ...
  • Page 77 PPTP: The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of  secure multi-protocol Virtual Private Networks (VPNs) through public networks. User Name: Enter account for PPTP.  Password: Enter user name account used password for PPTP.  PPTP Server IP: Enter remote IP address of PPTP Server. ...
  • Page 78 Manual – Click the “Connect” button on “WAN Information” in the Overview page to  connect to the Internet. MAC Clone  The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification. Some ISPs require you to register a MAC address in order to access to Internet. If not, you could use default MAC or clone MAC from a PC.
  • Page 79: Configure Lan Setup

    5.2 Configure LAN Setup Here are the instructions for how to setup the local IP Address and Netmask. Please click on System -> LAN and follow the below setting. IP Setup: The administrator can manually setup the LAN IP address. IP Address : The IP address of the LAN port;...
  • Page 80 Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP  address to clients. Netmask: The netmask default is 255.255.255.0.  Gateway: Enter source gateway IP address.  DNS1: Enter IP address of the first DNS server; this field is required. ...
  • Page 81: Wireless General Setup

    Static Lease IP Setup: Administrator can set as static IP address for users. Comment: Enter description for the information.  IP Address: Set static IP address for users.  MAC Address: Set MAC address of user device.  Static Lease IP List: Display users list of static IP address.
  • Page 82: Radio 0 Basic Setup

    5.4.1 Radio 0 Basic Setup MAC Address: Display radio 1 use MAC address.  Country: Administrator can select country used channel by US / EU and Taiwan.  Band Mode: Administrator can select 5G Band for 802.11a/n or 802.11ac. The default is ...
  • Page 83 Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. If  administratior adopt model is OW-200 A1 and select use 1Tx/1Rx funciton then please note external N-type connector only one have signal output, as shown below. Channel Bandwidth: The "20/40 and 802.11ac 80” MHz option is usually best. The other ...
  • Page 84: Advanced Setup

    5.4.2 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 85 Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in  all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
  • Page 86: Wmm Setup

    Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 5.4.3 WMM Setup His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic.
  • Page 87 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 88 TxOP Limit:Transmission Opportunity is an interval of time when a WME AP has the right to  initiate transmissions onto the wireless medium (WM). This value specifies (in milliseconds) the Transmission Opportunity (TXOP) for AP; that is, the interval of time when the WMM AP has the right to initiate transmissions on the wireless network.。...
  • Page 89: Station Setup

    5.4.4 Station Setup The functions setting functions include Client Bridge link to AP station. Administrator can used “site survey” function to Search for AP stations. MAC Address List: The function can discovery AP Station and select want to link the AP station, ...
  • Page 90: Repeater Ap Setup

    5.4.5 Repeater AP Setup Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations. 1. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally. 2. The default is enabling of Repeater AP. If want to used pure Client Bridge will can disable it.
  • Page 91  WPA Mode: Administrator can select security for Auto or only WPA or only WPA2.  Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
  • Page 92: Mac Filter Setup

    5.4.6 MAC Filter Setup Administrator can setup allow or reject WiFi clients(MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable,  Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
  • Page 93: Fast Roaming Setup

    5.4.7 802.11r Fast Roaming Setup 802.11r/802.11k function for 5G radio. 802.11r, which is the IEEE The system support standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
  • Page 94 MAC Address: Enter must key in the MAC Address of other AP  NAS Identifier: Enter 1~48 octets of network domain name.  Shared Key of 128 bit. 128-bit Key: Enter  R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
  • Page 95: Advanced Setup

    Advanced Setup Administrator can set basic routing security functions, including DMZ / IP and MAC filtering / virtual servers and access control management (basic firewall rules) in Advance memu. 5.5.1 DMZ DMZ is commonly work with the NAT functionality as an alternative of Virtual Server(Port Forwarding) while wanting all ports of DMZ host visible to Internet users.
  • Page 96: Ip Filter

    5.5.2 IP Filter Can allow or deny filter ingress or egress packets from specific source and/or to destination IP address on wired (LAN) or Wireless (WAN) ports. Filter rules could be used to filter unicast or multicast packets on different protocols as shown in the IP Filter Setup. Important to note that IP filter rules has precedence over Virtual server rules.
  • Page 97: Mac Filter

    Interface: The interface that a filter rule applies.  Schedule: Can choose to use rule by “Time Policy”.  All packets are allowed by default. Deny rules could be added to the filter list to filter out unwanted packets and leave remaining allowed. Click “Save”...
  • Page 98: Virtual Server

    5.5.4 Virtual Server The “Virtual Server” can also referred to as “Port Forward” as well and used interchangeably. Resources in the network can be exposed to the Internet users in a controlled manner including on-line gaming, video conferencing or others via Virtual Server setup. Don’t repeat ports’ usage to avoid confusion.
  • Page 99: Access Control

    Private IP Address: Enter corresponding IP address for internal.  Private Port: Enter internal service port No. for private.  Schedule : Administrator can select to used rule of “Time Policy”  Click “Save” button to save your set function. Then click “Reboot” button to activate your changes.
  • Page 100 # Access control rules: Active:Administrator can select Enable or Disable for the Access control rule.  Comment:Administrator can enter comment for the role.  Protocol:Administrator can to select management protocol by TCP/UDP/ICMP/Content  Filter/Application and Domain Filter. ANY: Select "Any" is all deny Protocol, administrator can filter local IP / IP range go to ...
  • Page 101: Cap Mode

    CAP Mode The CAP mode itself isn’t Access Point. This mode is primarily to control all the managed AP. The following describes setup function in system menu 6.1 VLAN Setup Setup Control AP of LAN or VLAN IP Address, Gateway, DNS and Ethernet Tag etc. Please click on System ->...
  • Page 102 VLAN Mode:Administrator can Enable or disable the VLAN function.  There must always be at least one VLAN enabled. If the administrator disables all the VLANs, he/she will not be able to login to the manager page. The administrator must then reset to default. IP setup:Administrator can set the VLAN IP address and NetMask or disable IP.
  • Page 103: Ap Control

    6.2 AP Control When CenOS5.0 AP changes to CAP mode, Administrator can use AP Control functions to centralize management of APs in the network architecture. AP control Setting functions have “Scan Device”, “Batch Setup”, “AP Setup”, “Group / Map setup” and Authentication Profile setup etc.. Please click “AP Control”...
  • Page 104: Batch Setup

    Netmask:Administrator can set single Netmask for Managed AP.  Default:Administrator click the button will can reset to default for select managed APs.  Control Port:Administrator can change VLAN network for managed APs.  VLAN TAG:Administrator can set VLAN TAG ID for managed APs. ...
  • Page 105 VLAN Setup:Administrator can set VLAN Tag, IP address and Wi-Fi on/off for the  managed APs. VLAN:The function can select VLAN (please refer to 3.1 Configure VLAN Setup) for  managed APs. VLAN Mode : Administrator can enable or disable VLAN mode of the managed APs. ...
  • Page 106 IP Setup:Administrator can set IP address and Netmask of the managed APs.  ETH0/1 VLAN Tag Setup:Administrator can set VLAN Tag or disable VLAN function  of the managed APs. Authentication Profile:After creating Profiles, See: “4.2.6 Authentication Profile” users can ...
  • Page 107: Ap Setup

    6.2.3 AP Setup Administrator can monitor statuses and modify managed APs information. VLAN:Select desired VLAN for AP setup  Setup:Administrator can modify IP addresses, system login passwords, and web login port for  managed APs. If administrator has change AP devices, administrator can modify MAC address of the new managed AP.
  • Page 108: Map Setup

    6.2.5 Map Setup The Map Setup feature allows administrators to upload a floor plan image to a web server, then use the image URL to import the map into the AP user interface. Once the image is uploaded, administrators can use the Map Setup function to map out the locations of the AP network. reate New Map:Click the button to create map.
  • Page 109 View:Once complete, administrators can click the “View” button to monitor AP statuses and locations. V3.0...
  • Page 110: Authentication Profile

    6.2.6 Authentication Profile Administrator can pre-set authentication conditions in the profile, the authentication set can refer 3.2 Authentication. Create New Profile:Administrator can create authentication profile.  Edit: Click the Authentication button to Enable or Disable authentication  function. For more details, refer to “3.2.1 Authentication”. Click Dropdown to set authentication functions.
  • Page 111: Utilities

    7. Utilities Administrator can backup or restore system configuration / firmware Upgrade / ping tools and system reset to default or reboot system. 7.1 Profile Setting This Functions purpose is to backup current configuration, restore prior configuration or reset back to factory default configurations.
  • Page 112: System Upgrade

    Load Settings from PC: Click Browse button to locate a configuration file to restore, and then click  Upload button to upload. Reset To Factory Default: Click Default button to reset back to the factory default settings and  expect Successful loading message. Then, click Reboot button to activate. 7.2 System Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations.
  • Page 113 Select File: Administrator can select Firmware file in Local PC.  Upgrade Via Local PC and TFTP Server: The upgrade firmware will support via local PC and TFTP Server and HTTP URL to upgrade system. 1. To prevent data loss during firmware upgrade, please back up current settings before proceeding 2.
  • Page 114: Network Utility

    7.3 Network Utility The administrator can diagnose network connectivity via the PING or TRACEROUTE utility. Please click on Utilities -> Network Utility and follow the below setting. Ping: This utility will help ping other devices on the network to verify connectivity. Ping utility, ...
  • Page 115: Status

    8. Status The status mainly displays system related information, including system network information, wireless base station information, and wireless user connection information. 8.1 Overview Detailed information on System, Network can be reviewed via this page. V3.0...
  • Page 116: Wireless Client

    8.2 Wireless Client The page can be display Wireless user information link to access point. Administrator can monitor MAC In addition to CAP mode) address / rate and RSSI for the wireless users. ( Radio:Display information for wireless client connection Radio 0. ...
  • Page 117: Authentication Log

    Download Packets:Display total download packets amount information by user.  Upload Packets:Display total upload packets amount information by user.  Download Bytes:Display total download flow information by user.  Upload Bytes:Display total upload flow information by user.  8.4 Authentication Log The authentication log can monitor account login/logout type and account use time.
  • Page 118: Appendix A. Web Gui Valid Characters

    Appendix A. WEB GUI Valid Characters Table B WEB GUI Valid Characters Block Field Valid Characters IP Address IP Format; 1-254 IP Netmask 128.0.0.0 ~ 255.255.255.252 IP Gateway IP Format; 1-254 Primary DNS IP Format; 1-254 Secondary DNS IP Format; 1-254 Hostname Length : 32 0-9, A-Z, a-z...
  • Page 119 Table B WEB GUI Valid Characters (continued) Block Field Valid Characters Management System Name/ Location Length : 32 0-9, A-Z, a-z Space ~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . = Description 32 chars Password...
  • Page 120 Table B WEB GUI Valid Characters (continued) Block Field Valid Characters Virtual AP Setup ESSID Length : 31 Space 0-9, A-Z, a-z ~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . = Maximum Clients 1 ~ 32 VLAN ID...

This manual is also suitable for:

Ow-218 a1

Table of Contents