TP-Link Auranet EAP115-Wall User Manual
Hide thumbs Also See for Auranet EAP115-Wall:

Advertisement

Quick Links

User Guide
EAP115-Wall
REV1.0.0
1910011922

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link Auranet EAP115-Wall

  • Page 1 User Guide EAP115-Wall REV1.0.0 1910011922...
  • Page 2: Table Of Contents

    CONTENTS Chapter 1 Introduction ........................1 Chapter 2 Network Topology ......................2 Chapter 3 Management Mode ......................4 Standalone Mode ........................ 4 Managed Mode ........................4 Switch to Standalone Mode .................... 4 Chapter 4 Network ..........................5 Chapter 5 Wireless ..........................6 Wireless Settings ........................
  • Page 3 Client............................41 6.3.1 User List ........................41 6.3.2 Portal Authenticated Guest ................42 Chapter 7 Management........................44 System Log ......................... 44 7.1.1 Log List ........................44 7.1.2 Log Settings ......................45 Web Server .......................... 46 Management Access ....................... 47 LED ON/OFF ........................48 Wi-Fi Control ........................
  • Page 4: Chapter 1 Introduction

    Chapter 1 Introduction Auranet series products provide wireless coverage solutions for small-medium business. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily-configured enterprise-grade wireless network for small and medium business. “Celling lamp”...
  • Page 5: Chapter 2 Network Topology

    Chapter 2 Network Topology A typical network topology for EAP115-Wall is shown below. Figure 2-1 Typical Topology...
  • Page 6 The EAP can be managed by the EAP Controller software, which is a management software specially designed for the TP-Link EAP devices on a local wireless network, allowing you to centrally configure and monitor mass EAP devices using a web browser on your PC.
  • Page 7: Chapter 3 Management Mode

    Forget Controller. You can the EAP via the EAP Controller to turn it back as a standalone AP. Refer to the EAP Controller User Guide from our website at www.tp-link.com to learn more. TIPS: Proceed to the following chapters for information on using the EAP in standalone mode.
  • Page 8: Chapter 4 Network

    Chapter 4 Network Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default, the EAP obtains an IP address from a DHCP server (typically a router). Select Static to configure IP address manually. Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device.
  • Page 9: Chapter 5 Wireless

    Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below. Figure 5-1 Wireless Page...
  • Page 10: Wireless Settings

    5.1 Wireless Settings Wireless Settings Following is the page of Figure 5-2 Wireless Settings Page...
  • Page 11: Wireless Basic Settings

    TIPS: Proceed to the following chapter for information on configuring the wireless network of the EAP. 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Check the box to enable 2.4GHz Wireless Radio. Wireless Radio: Wireless Mode: Select the protocol standard for the wireless network. Wireless network created by the EAP work within 2.4GHz.
  • Page 12: Ssids

    Channel: Select the channel used by this device to improve wireless performance. 1/2412MHz means the Channel is 1 and the frequency is 2412MHz. By default, channel is automatically selected. Tx Power(EIRP): Enter the transmit power value. By default, the value is 20. If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation.
  • Page 13 SSID Name: Enter up to 32 characters as the SSID name. Wireless Set a VLAN ID (ranges from 0 to 4094) for the wireless network. Wireless VLAN ID: networks with the same VLAN ID are grouped to a VLAN. SSID Enable this function, AP will broadcast its SSID to hosts in the surrounding Broadcast: environment, as thus hosts can find the wireless network identified by this...
  • Page 14 Figure 5-5 Security Mode-WEP Type: Select the authentication type for WEP. Auto: The default setting is Auto, which can select Open System or  Shared Key automatically based on the wireless station's capability and request. Open System: After you select Open System, clients can pass the ...
  • Page 15 WPA-Enterprise  Based on RADIUS server, WPA-Enterprise can generate different passwords for different users and it is much safer than WPA-PSK. However, it costs much to maintain and is more suitable for enterprise users. At present, WPA-Enterprise has two versions: WPA-PSK and WPA2-PSK.
  • Page 16: Wireless Advanced Settings

    WPA-PSK  Based on pre-shared key, security mode WPA-PSK is characterized by high security and simple configuration, which suits for common households and small business. WPA-PSK has two versions: WPA-PSK and WPA2-PSK. Figure 5-7 Security Mode_WPA-PSK Auto: Select WPA-PSK or WPA2-PSK automatically based on the Version: ...
  • Page 17: Load Balance

    Beacon Beacons are transmitted periodically by the device to announce the Interval: presence of a wireless network for the clients. Beacon Interval value determines the time interval of the beacons sent by the device. You can specify a value from 40 to 100. The default value is 100 milliseconds. DTIM Period: This value indicates the number of beacon intervals between successive Delivery Traffic Indication Messages (DTIMs) and this number is included...
  • Page 18: Portal

    Maximum Enter the number of clients to be allowed for connection to the EAP. Associated The number ranges from 1 to 99. Clients: 5.2 Portal Portal authentication enhances the network security by providing authentication service to the clients that just need temporary access to the wireless network. Such clients have to log into a web page to establish verification, after which they will access the network as guests.
  • Page 19: Portal Configuration

    NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server. No Authentication :Users are required to finish only two steps: agree with the user protocol and click the Login button.
  • Page 20 Words can be filled in Input Box 1 and Input Box 2. Enter up to 31 characters as the title of the authentication login page in Input Box 1, like “Guest Portal of TP-Link”. Enter the terms presented to users in Input Box 2. The terms can be 1 to...
  • Page 21 Local Password  Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Password: Enter the password for local authentication. Please refer to No Authentication to configure Authentication Timeout, Redirect, Redirect URL, and Portal Customization. External RADIUS Server  External RADIUS Server provides two types of portal customization: Local Web Portal and External Web Portal.
  • Page 22 Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Select External RADIUS Server. Type: RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server.
  • Page 23: Free Authentication Policy

    External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server.
  • Page 24 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Source Enter the source IP address and subnet mask of the clients who can Range: enjoy the free authentication policy. Leaving the field empty means all IP addresses can access the specific resources.
  • Page 25: Mac Filtering

    Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24. Policy 1 is enabled. Click to edit the policy.
  • Page 26 Settings  Enable Check the box to enable MAC Filtering. Filtering: Station MAC Group  Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown. Figure 5-19 Station MAC Group Step 2: Click and fill in a name for the MAC group.
  • Page 27 Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click delete the MAC group or group member. MAC Filtering Association  Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Band: Displays the frequency band the wireless network operates at.
  • Page 28: Scheduler

    5.4 Scheduler Scheduler allows you to configure rules with specific time interval for radios to operate, which automates the enabling or disabling of the radio. Figure 5-23 Scheduler Page Settings  Scheduler: Check the box to enable Scheduler. Association Mode: Select Associated with SSID/AP, you can perform configurations on the SSIDs/AP.
  • Page 29 Figure 5-24 Scheduler Profile Configuration Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Select one profile, and click and configure the recurring schedule for the rule. Figure 5-26 Add a Rule...
  • Page 30 Scheduler Association  This zone will display different contents based on your selection of association mode in Settings. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID SSID Name: Displays the SSID of the standalone AP. Band: Displays the frequency band which the wireless network operates at. Profile Name: Select a profile name from the drop-down list.
  • Page 31: Qos

    5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, we recommend you keep the default values for the EAP devices and station EDCA (Enhanced Distributed Channel Access). Figure 5-29 QoS Page Wi-Fi Multimedia By default, WMM is enabled.
  • Page 32: Ap Edca Parameters

    5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client station. Figure 5-30 AP EDCA Parameters Queue: Queue displays the transmission queue. By default, the priority from high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters.
  • Page 33: Station Edca Parameters

    Maximum Burst The Maximum Burst is an AP EDCA parameter that applies only to traffic flowing from the EAP devices to the client station. This value specifies (in milliseconds) the maximum burst length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information.
  • Page 34: Rogue Ap Detection

    Minimum A list to the algorithm that determines the initial random backoff Contention wait time (window) for retry of a transmission. This value cannot be Window: higher than the value for the Maximum Contention Window. Maximum The upper limit (in milliseconds) for the doubling of the random Contention backoff value.
  • Page 35: Settings

    Figure 5-32 Rogue AP Detection Page 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 Rogue AP List detected Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown.
  • Page 36: Trusted Ap List

    Figure 5-34 Detected Rogue AP List Click to scan rogue APs. Make sure you have enabled Rogue AP Detection and saved the setting before you click the button. Action: Click Known to move the AP to the Trusted AP List. After the configurations are saved, the moved AP will not be displayed in the Detected Rogue AP List.
  • Page 37: Download/Backup Trusted Ap List

    MAC: The MAC address of the trusted AP. SSID: The SSID of the trusted AP. Band: Displays the frequency band which the wireless network of the trusted AP operates at. Channel: The channel on which the trusted AP is currently broadcasting. Security: Displays the enabling or disabling of the security mode of the wireless network.
  • Page 38: Chapter 6 Monitoring

    Chapter 6 Monitoring Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List Monitoring on the page displays the device name, its MAC address and the number of clients. Below the AP List the AP’s detailed information will be shown, including Device Information,...
  • Page 39 Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the EAP. Device Information  Figure 6-3 Device Information Device Name: Displays the device name. Device Model: Displays the model of the device.
  • Page 40 Wireless Settings  Figure 6-4 Wireless Settings Channel/Frequency: Displays the channel number and the operating frequency. If you want to change them, please refer to 5.1.1 Wireless Basic Settings. Channel Width: Displays the spectral width of the radio channel used by the device. If you want to change it, refer to 5.1.1 Wireless Basic Settings.
  • Page 41 Port1/ Displays the maximum transmission rate and duplex mode (half-duplex LAN Port2: or full-duplex) of the port. Client  Figure 6-6 Client MAC: Displays the MAC address of the client of the AP selected in AP List. SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength.
  • Page 42 Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Displays the total amount of dropped packets received/sent on the Packets: LAN port. Rx/Tx Errors: Displays the total amount of error packets received/sent on the LAN port.
  • Page 43: Ssid

    6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 44: Client

    MAC Filtering: Displays the enabling or disabling of MAC Filtering. If you want to modify it, please refer to 5.1.2 SSIDs. Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 45: Portal Authenticated Guest

    Band: Displays the band the client is in. Access Displays the name of the device to which the client is connected. Point: SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength.
  • Page 46 CCQ(%): Displays the Client Connection Quality (CCQ) of the authenticated client. CCQ refers to the ratio of current effective transmission bandwidth and the theoretically maximum available bandwidth. CCQ reflects the actual link condition. Rate(Mbps): Displays the data rate at which the authenticated client transmits wireless packets.
  • Page 47: Chapter 7 Management

    Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure.
  • Page 48: Log Settings

    Figure 7-2 Log List 7.1.2 Log Settings Log Settings You can choose the way to receive system logs in zone, where these parameters can be configured: Enable Auto Mail, Enable Server Enable Nvram. Figure 7-3 Log Settings Enable Auto Mail ...
  • Page 49: Web Server

    Nvram (Non-volatile Random Access Memory) is a RAM that can still save data even if a device is power off. All TP-Link EAPs are equipped with Nvram. With this option enabled, the Nvram feature can help reserve the system logs when an EAP device is power off.
  • Page 50: Management Access

    Figure 7-6 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure Server Designate a secure server port for web server in HTTPS mode. By Port: default the port is 443. Server Port: Designate a server port for web server in HTTP mode. By default the port is 80.
  • Page 51: Led On/Off

    Figure 7-7 Management Access Page Check the box to enable MAC Authentication. After MAC Authentication: Authentication is enabled, only the PCs in MAC address list can log in the device’s web management page. By default this function is disabled. All PCs in LAN can log in and manage the device. MAC1~MAC4: Enter the MAC addresses of the PCs which are authorized to log in the device.
  • Page 52: Ssh

    Figure 7-9 Wi-Fi Control With the Wi-Fi Control enabled, you can turn on/off the Wi-Fi and LED simultaneously by pressing the button on the front panel. LED ON/OFF Note: You can enable Wi-Fi Control feature only when the is enabled. 7.6 SSH This device supports the SSH Server function that allows users to login and manage it through SSH connection on the SSH client software.
  • Page 53: Management Vlan

    SSH Login: Check the box to enable SSH Server. By default, it is disabled. 7.7 Management VLAN Management VLAN provides a safer way for you to manage the EAP. With Management VLAN enabled, only the hosts in the management VLAN can manage the EAP. Since most hosts cannot process VLAN TAGs, connect the management host to the network via a switch, and set up correct VLAN settings for the switches on the network to ensure the communication between the host and the EAP in the management VLAN.
  • Page 54 SNMP Following is the page of Figure 7-12 SNMP Page SNMP Agent: Enable SNMP Agent and the SNMP Agent will collect the information of this device and respond to information requests from one or more management systems. SysContact: Enter the textual identification of the contact person for this managed node.
  • Page 55 Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write the SNMP information of this device. The format of subnet is “IP address/bit” (such as 10.10.10.0/24). The default is 0.0.0.0, which means all hosts can read and write the SNMP information of this device.
  • Page 56: Chapter 8 System

    Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. 8.1 User Account You can change the username and password to protect your device from unauthorized login.
  • Page 57: Time Settings

    the system time, configure the system to acquire its time settings from a preconfigured NTP server or synchronize the system time with the PC’s clock. The device supports DST (Daylight Saving Time). Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server.
  • Page 58: Daylight Saving

    Click the button and save the configuration, your PC’s time will be obtained as the device’s system time. Time zone: Select your local time zone from the drop-down list. Date: Set the current date, in format MM/DD/YYYY. For example, for November 25, 2014, enter 11/25/2014 in the field.
  • Page 59 Predefine Select a predefined DST configuration. Europe is the predefined Country: country by default. USA: Second Sunday in March, 02:00 ~ First Sunday in  November, 02:00 European: Last Sunday in March, 01:00 ~ Last Sunday in  October, 01:00 Australia: First Sunday in October, 02:00 ~ First Sunday in April, ...
  • Page 60: Reboot/Reset

    8.3 Reboot/Reset Figure 8-8 Reboot & Reset Click Reboot to restart the device. Click Reset to restore the device to factory default settings. 8.4 Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file.
  • Page 61: Firmware Upgrade

    8.5 Firmware Upgrade Figure 8-10 Firmware Upgrade Please log in http://www.tp-link.com/ to download the latest system file. Click Browse to choose the firmware file. Click Upgrade to upgrade the devices. NOTE: Please select the proper software version that matches your hardware to upgrade.
  • Page 62 Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies CO., LTD.
  • Page 63 FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 64 provide a separation distance of at least 20 cm from all persons and must not be co- located or operating in conjunction with any other antenna or transmitter.” RF Exposure Information This device meets the EU requirements (1999/5/EC Article 3.1a) on the limitation of exposure of the general public to electromagnetic fields by way of health protection.
  • Page 65 Industry Canada Statement CAN ICES-3 (B)/NMB-3(B) Korea Warning Statements 당해 무선설비는 운용중 전파혼신 가능성이 있음. Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність вимогам нормативних документів та вимогам, що передбачені чинними законодавчими актами України. Safety Information When product has power button, the power button is one of the way to shut off the ...
  • Page 66 BSMI Notice 安全諮詢及注意事項  請使用原裝電源供應器或只能按照本產品注明的電源類型使用本產品。  清潔本產品之前請先拔掉電源線。請勿使用液體、噴霧清潔劑或濕布進行清潔。  注意防潮,請勿將水或其他液體潑灑到本產品上。  插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。  請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。  請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 Explanation of the symbols on the product label Symbol Explanation Class II equipment DC voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE).
  • Page 67 Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies CO., LTD.
  • Page 68 Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. Note: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. Such modifications could void the user’s authority to operate the equipment.
  • Page 69 Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. Canadian Compliance Statement This device complies with Industry Canada license-exempt RSSs.
  • Page 70 Safety Information When product has power button, the power button is one of the way to shut off the  product; When there is no power button, the only way to completely shut off power is to disconnect the product or the power adapter from the power source. Don’t disassemble the product, or make repairs yourself.
  • Page 71 Explanation of the symbols on the product label Symbol Explanation Class II equipment DC voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE). This means that this product must be handled pursuant to European directive 2012/19/EU in order to be recycled or dismantled to minimize its impact on the environment.

Table of Contents