Page 1
Quick Star t Guide Brand : IgniteNet The AC866 is 5GHz Outdoor/Indoor AP access points (APs) that are housed in a waterproof enclosure for mounting outdoors. The units include a built‐ in mounting bracket for attaching to a 1.5 to 6‐inch pole and they can be powered through their Ethernet cable connection from a power injector module that is installed indoors. The Outdoor Stand‐Alone Access Points include these models: ◆ SF‐AC866 ‐ 5GHz Outdoor/Indoor AP Note: For Safety and Regulatory information, refer to the Safety and Regulatory Information document included with the AP. www.ignitenet.com ...
Page 2
– Section I Getting S tarted This section provides an overview of the access point, and introduces some basic concepts about wireless networking. It also describes the basic settings required to access the management interface. This section includes these chapters: ◆ “Introduction” on page 12 – 12 – ...
1 Introduction The access point (AP) runs software that includes a network management agent. The agent offers a variety of management options, including SNMP and a web‐ based interface. The AP can also be accessed via Telnet or SSH for configuration using a command line interface (CLI). Configuration Options The access point’s web agent allows you to configure AP parameters, monitor wireless connections, and display statistics using a standard web browser such as Internet Explorer 9.x or later, Mozilla Firefox 5 or later, and Google Chrome 35 or later. The AP’s web management interface can be accessed from any computer attached to the network. The CLI program can be accessed remotely by a Telnet or Secure Shell (SSH) connection over the network. The CLI is used primarily for technical support. The AP’s management agent also supports SNMP (Simple Network Management Protocol). This SNMP agent permits the AP to be managed from any computer in the network using network management software. The AP’s web interface, console interface, and SNMP agent allow you to perform management functions such as: ◆ Set management access user names and passwords ...
Chapter 1 | Introduction Network Connections Network Connections Prior to accessing the AP’s management agent through a network connection, you must first configure it with a valid IP address, subnet mask, and default gateway using the web interface, or the DHCP protocol. The AP has a static default management address of 192.168.2.1 and a subnet mask of 255.255.255.0. If the AP’s default IP address is not compatible with your network or a DHCP server is not available, the AP’s IP address must be configured manually through the web interface. First connect to the AP’s Ethernet 1 port and log in to the web interface, as described in “Connecting to the Web Interface” on page 13. Follow the steps described in “Setup Wizard” on page 15 to select your country and specify one of the configuration methods. Then configure the AP with an IP address that is compatible with your network as described under “LAN Settings” on page 33. Once the AP’s IP settings are configured for your network, you can access the AP’s management agent from anywhere within the attached network. The AP can be managed by any computer using a web browser, or from a network computer using SNMP network management software. Connecting to the Web Interface The AP offers a user‐friendly web‐based management interface for the configuration of all the unit’s features. Any PC directly attached to the unit can ...
Page 5
Chapter 1 | Introduction Connecting to the Web Interface Note: It is strongly recommended to change the default user name and password the first time you access the web interface. For information on changing user names and passwords, see “User Accounts” on page 57. Figure 1: Login Page – 15 – ...
Chapter 1 | Introduction Setup Wizard Setup Wizard The Setup Wizard is designed to help you configure the basic settings required to get the AP up and running. Step 1 Select Your Country – Select the access point’s country of operation from the drop‐ down menu. You must set the AP’s country code to be sure that the radios operate according to permitted local regulations. That is, setting the country code restricts operation of the AP to the radio channels and transmit power levels permitted for wireless networks in the specified country. Figure 2: Select Your Country Caution: You must set the country code to the country of operation. Setting the country code ensures that the radios operate within the local regulations specified for wireless networks. Note: The country code selection is for non‐US models only and is not available to all US models. Per FCC regulation, all Wi‐Fi products marketed in the US must be fixed to US operation channels only. ...
Page 7
Chapter 1 | Introduction Setup Wizard Step 2 Select Setup Method – Select Easy Setup to set basic wireless network access and guest network access parameters, or Advanced Setup to specify networking modes for an AP bridge, AP router, or manual configuration. Figure 3: Select Setup Method Step 3 Configure Settings ◆ Easy Setup — Basic wireless network and guest network access parameters. Specify the name and password for the wireless network and guest network. The Networking Mode is set to AP Router as described under Advanced Setup. Figure 4: Easy Setup Wireless Network Setup — Set the name and password for the primary ■ wireless network. A password must be specified to protect the network from unauthorized access. – 17 – ...
Page 8
Chapter 1 | Introduction Setup Wizard Guest Network Setup — Set the name and password for the guest wireless ■ network. This creates a second SSID for guest users, limiting their access only to the Internet. ◆ Advanced Setup — Networking modes for AP Bridge, AP Router, or manual configuration. Figure 5: Advanced Setup AP Bridge Mode — Configures an interface as attached to the WAN (that is, ■ the Internet). In the following figure, Ethernet Port 0 and Ethernet Port 1 are both attached to the WAN. Traffic from these interfaces is directly bridged into the Internet. (This is also called bridge to Internet.) Figure 6: Bridge to Internet AP Router Mode — Configures an interface as a member of the LAN. In the ■ following figure, Ethernet Port 1, Wireless LAN 0 (5 GHz Radio), and Wireless LAN 1 (2.4 GHz Radio) are all included in the LAN. Traffic from these interfaces is routed across the access point through Ethernet Port 0 to the Internet. (This is also called route to Internet.) Note: Single‐band access points only support one WLAN. ...
Page 9
Chapter 1 | Introduction Main Menu Figure 7: Route to Internet Manual Mode — Allows all configuration parameters to be manually ■ configured. Any wired module or radio module may be logically placed on the WAN and LAN side of the access point. Main Menu The web interface Main Menu provides access to all the configuration settings available for the AP. To configure settings, click the relevant Main Menu item. Each Main Menu item is summarized below with links to the relevant section in this guide where the configuration parameters are described in detail: ◆ Dashboard — The dashboard shows basic settings for the AP, including Internet status, local network settings, wireless radio status, and traffic graphs. See “Status Information” on page 22. ◆ Network — Configures Internet, Ethernet, LAN, and Hotspot settings. See “Network Settings” on page 28. ◆ Wireless — Configures 5 GHz Radio, 2.4 GHz Radio, and VLAN settings. See ...
Page 10
Chapter 1 | Introduction Main Menu Dashboard After logging in to the web interface, the dashboard displays. The dashboard shows basic settings for the AP, including Internet status, local network settings, wireless radio status, and traffic graphs. Figure 8: The Dashboard Common Web Page The list below describes the common buttons found on most of the web management pages: Buttons ◆ Save – Applies the new parameters and saves them to temporary RAM memory. Also displays a message at the top of the screen to inform you that the changes have not yet been saved to Flash memory. The running configuration will not be saved upon a reboot unless you click the “Apply” button. Figure 9: Set Configuration Changes ◆ Apply – Saves the current configuration so that it is retained after a restart. ◆ Revert – Cancels the newly entered settings and restores the originals. ...
Page 11
Chapter 1 | Introduction Main Menu – 20 – ...
Page 12
Section II Web Configuration This section provides details on configuring the access point using the web browser interface. This section includes these chapters: ◆ “Status Information” on page 22 ◆ “Network Settings” on page 28 ◆ “Wireless Settings” on page 37 ◆ “System Settings” on page 52 – 21 – ...
2 Status Information The Dashboard displays information on the current system configuration, including Internet status, local network settings, wireless radio status, and traffic graphs. Status Information includes the following sections: ◆ “System and Product Information” on page 22 ◆ “Internet Status” on page 22 ◆ “Local Networks” on page 24 ◆ “Wireless Status” on page 25 ◆ “Traffic Graphs” on page 27 System and Product Information The System and Product Info section shows descriptive information about the AP. Figure 10: System and Product Information The following items are displayed in this section: ◆...
Page 14
Chapter 2 | Status Information Internet Status Figure 11: Internet Status The following items are displayed in this section: ◆ Internet Source — The Ethernet port connected to the Internet. By default, this is Ethernet Port 0. ◆ Ports bridged to Internet — Additional interfaces attached directly to the Internet. (See Configure Settings – “Step 3” on page 16 for a more detailed description.) ◆ IP Address — IP address of the Internet connection. ◆ Gateway — IP address of the gateway router used to pass traffic between this device and other network segments. ◆ DNS — The IP address of the Domain Name Server on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. ◆ Hotspot Status — Shows if the hotspot is enabled or disabled, and the ports on which this service is enabled. ◆...
Chapter 2 | Status Information Local Networks Figure 13: ARP Table Figure 14: DHCP Leases Local Networks The Local Networks section shows information about the local network connection. Figure 15: Local Networks The following items are displayed in this section: ◆ Name — Shows information on the name of the local network, whether static or dynamic configuration is used, and the network mask. ◆ DHCP Server — Shows if DHCP service is enabled on this network. ◆ Members — Shows the ports and wireless radios attached to this network. ◆...
Page 16
Chapter 2 | Status Information Wireless Status Wireless Status The Wireless Status section shows information about the radio settings and associated clients. Figure 16: Wireless Status The following items are displayed in this section: ◆ Radio # — Indicates the 5 GHz or 2.4 GHz wireless interface. Radio Status — Shows if the wireless interface is enabled or disabled. ■ Op Mode — Shows if the unit is configured to operate as an access point ■ (manually configured), an AP in bridge mode, or an AP in router mode. Channel — The radio channel the access point uses to communicate with ■ wireless clients. The available channels depend on the 802.11 Mode , Channel Bandwidth , and Country Code settings . ...
Page 17
Chapter 2 | Status Information Wireless Status Tx Power — The power of the radio signals transmitted from the access ■ point. Total Clients — The total number of clients attached to this interface. ■ ◆ SSID # — Service set identifier. Clients that want to connect to the wireless network through an access point must set their SSIDs to the same as that of the access point. Network Name — A unique identifier for the local wireless network. ■ Security — Shows whether or not security has been enabled. ■ Associated clients — Shows detailed information about clients. ■ Name — Client name. ■ MAC Address — The MAC address of the wireless client. ■ IP Address — The IP address assigned to the wireless client. ■ Signal — Signal strength (TX/RX) in dBm. ■ Duration — The time the wireless client has been associated. ...
Chapter 2 | Status Information Traffic Graphs Traffic Graphs The Traffic Graphs section shows the data rate for the Ethernet ports and wireless interfaces. Figure 17: Traffic Graphs – 27 – ...
3 Network Settings This chapter describes basic network settings on the access point. It includes the following sections: ◆ “Internet Settings” on page 28 ◆ “Ethernet Settings” on page 31 ◆ “LAN Settings” on page 33 ◆ “Hotspot Settings” on page 34 Internet Settings The Internet Settings page configures the basic Internet settings for the AP, such as the source port, IP aliases, as well as the host name and maximum MTU size. Figure 18: Internet Settings The following items are displayed on this page: ...
Page 20
Chapter 3 | Network Settings Internet Settings Static IP — To configure a static IP address for the selected Ethernet ■ interface, the following items must be specified. Figure 19: IP Address Mode – Static IP IP Address — Specifies an IP address for the access point. Valid IP ■ addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.1) Subnet Mask — Indicates the local subnet mask. ■ (Default: 2 55.255.255.0) Default Gateway — The IP address of the default gateway, which is ■ used if the requested destination address is not on the local subnet. If you have management stations, DNS, RADIUS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided. Addl DNS Server — The IP address of Domain Name Servers on the ■ network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. If you have a DNS servers located on the local network, type the IP address in the text fields provided. ...
Page 21
Chapter 3 | Network Settings Internet Settings PPPoE — To obtain an IP address for the selected Ethernet interface using ■ PPPoE, the following items must be specified. Figure 20: IP Address Mode – PPPoE User Name — The user name specified by the service provider. ■ (Range: 1‐32 characters) Password — The password specified by the service provider. ■ (Range: 1‐32 characters) Service Name — The service name assigned for the PPPoE connection. ■ The service name is normally optional, but may be required by some service providers. (Range: 1‐32 alphanumeric characters) ◆ IP Aliases — Adds a static IPv4 address under which the access point can also be reached. Figure 21: IP Alias ◆ MTU Size — Sets the size of the maximum transmission unit (MTU) for packets sent on this interface. (Range: 1400‐1500 bytes; Default 1500 bytes) ...
Chapter 3 | Network Settings Ethernet Settings Ethernet Settings The Ethernet Settings page configures the network behavior of the Ethernet ports, indicating that a port provides an Internet connection for wireless clients attached to the local network (routed to the Internet), is bridged directly to the Internet, connected to the guest network, or provides hotspot service. The following items are common for all pages under Ethernet Settings: ◆ Status — Enables or disables this port. (Default: ON) ◆ Auto‐negotiation — Enables or disables auto‐negotiation for a given interface. (Default: ON) 1000BASE‐T does not support forced mode. Auto‐negotiation should always be used to establish a connection over any 1000BASE‐T port. When auto‐negotiation is enabled, the access point will negotiate the best settings for a link based on advertised capabilities. Figure 22: Ethernet Settings – Internet Source ...
Page 23
Chapter 3 | Network Settings Ethernet Settings Figure 23: Ethernet Settings – Network Behavior The following items are displayed on this page: ◆ Network Behavior — For the Ethernet port which is not providing Internet access, one of the following connection methods must be specified. (Default: Route to Internet) Bridge to Internet — Configures an interface to be attached to the WAN. ■ Traffic from this interface is directly bridged into the Internet. (See Figure 6, “Bridge to Internet", on page 17.) If an Ethernet port is bridged to the Internet, management access cannot be made by a direct connection to this port. However, if another Ethernet port or radio interface is within the LAN (routed to the Internet) the access point can be managed through this interface by a PC which is configured with IP address in the same subnet. Route to Internet — Configures an interface to be a member of the LAN. ■ Traffic from this interface is routed across the access point and out through an interface which is bridged to the Internet. (See Figure 7, “Route to Internet", on page 18.) By default, Ethernet Port 1 is routed to Internet, allowing management access via a direct connection to a PC configured with an address in the same subnet. Network Name — The network to be routed. The default is “Default ■ local network” as displayed under LAN Settings – Local Networks. Add to Guest Network — This port can only access the guest network. ...
Chapter 3 | Network Settings LAN Settings LAN Settings The LAN Settings page configures the LAN settings for the local network and guest network, including IP interface setting, DHCP server settings, STP administrative status, and UPnP administrative status. Figure 24: Network – LAN Settings The following items are displayed on this page: ◆ Members — The interfaces attached to the local area network. ◆ IP Address — Specifies the IP address for the local network or guest network. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.2.1) ◆ Subnet Mask — Indicates the local subnet mask. (Default: 255.255.255.0) ◆ MTU Size — Sets the size of the maximum transmission unit (MTU) for packets sent on this network. ◆ DHCP Server — Enables/disables DHCP on this network. (Default: Enabled) ...
Chapter 3 | Network Settings Hotspot Settings ◆ STP — Enables or disables processing of Spanning Tree Protocol messages. (Default: Disabled) ◆ UPnP — Enables or disables Universal Plug‐and‐Play broadcast messages. (Default: Disabled) Hotspot Settings The Hotspot Settings page can configure Internet access to the general public in places such as coffee houses, libraries and hospitals. Specific access rights may also be defined through a RADIUS server. Figure 25: Hotspot Settings (Network Settings) The following items are displayed on this page: ◆ Network IP — Specifies the IP address for the hotspot. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.182.1) ◆ Network Mask — Network mask for the associated IP subnet. This mask identifies the host address bits used for routing to specific subnets. ◆...
Page 26
Chapter 3 | Network Settings Hotspot Settings ◆ DNS 1 — The IP address of the primary Domain Name Server on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. ◆ DNS 2 — The secondary DNS server available to DHCP clients. ◆ DNS Domain Name — The domain name used to resolve incomplete host names via the Domain Name System. (Range: 1‐32 characters) Figure 26: Hotspot Settings (RADIUS Settings) The following items are displayed on this page: ◆ Radius Server 1 — IP address or host name of the primary RADIUS server. ◆ Radius Server 2 — IP address or host name of the secondary RADIUS server. ◆ Radius Shared Secret — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Range: 1‐255 characters). ◆ Radius Auth Port — RADIUS server UDP port used for authentication messages. (Range: 1‐65535, Default: 1812) ...
Page 27
Chapter 3 | Network Settings Hotspot Settings Figure 27: Hotspot Settings (Captive Portal Settings) The following items are displayed on this page: ◆ Captive Portal URL — Host name of Internet service portal for the hotspot. The captive portal forces a hotspot client to access a welcome web page (normally used for authentication) before gaining further access to the Internet. The welcome page may require authentication and/or payment. ◆ Captive Portal Secret — The password used for logging into the hotspot. ◆ Walled Garden — A list of web sites to which unauthenticated users are allowed to navigate. ◆ Auth White List — A list of MAC addresses that are allowed to bypass the captive portal to access the internet. – 36 – ...
4 Wireless Settings This chapter describes wireless settings on the access point. It includes the following sections: ◆ “Radio Settings” on page 37 ◆ “VLAN Settings” on page 50 Radio Settings The IEEE 802.11 wireless interfaces include configuration options for radio signal characteristics and wireless security features. The access point can operate in several radio modes, 802.11a/a+n/AC (5 GHz) or 802.11b+g/b+g+n (2.4 GHz). Supported modes depend on the access point model. Note that the dual‐band access points can operate at 2.4 GHz and 5 GHz at the same time. The web interface identifies the radio configuration pages as: ◆ Radio 0 — the 5 GHz 802.11a/n/AC radio interface ◆ Radio 1 — the 2.4 GHz 802.11b/g/n radio interface Each radio supports 8 virtual access point (VAP) interfaces based on the SSIDs, referred to as VAP 0 ~ VAP 7. Each VAP functions as a separate access point, and can be configured with its own Service Set Identification (SSID) and security settings. ...
Page 29
Chapter 4 | Wireless Settings Radio S ettings Figure 28: Radio Settings (Physical Radio Settings) The following items are displayed on this page: ◆ Status — Enables or disables the wireless service on this interface. ◆ Mode — Selects the mode in which the AP will function. Access Point (Auto‐WDS) — The VAP operates as an access point in WDS ■ mode, which accepts connections from APs in Client WDS mode. (This is the d efault s etting.) In this mode, the AP provides services to clients as a normal access point. WDS is used to automatically search for and connect to other AP nodes using the same SSID and security settings. Client — The AP can provide a wireless connection to another AP. In this ■ mode, it can pass information from or to locally wired hosts, but does not provide services to any wireless clients. Client WDS — The AP provides services to clients as a normal access point, ■ and operates as a client station in WDS mode, which can connect to other ...
Page 30
Chapter 4 | Wireless Settings Radio Settings ◆ Channel Bandwidth — The AP options for channel bandwidth include 5, 10, 20, 40 and 80 MHz. Using 20 MHz gives an 802.11g connection a speed of 54 Mbps and an 802.11n connection a speed of up to 108 Mbps, and ensures backward compliance for slower 802.11b devices. Setting the channel bandwidth to 40 MHz provides a connection speed for 802.11n of up to 300 Mbps. Using a channel bandwidth of 80MHz provides a connection speed up to 866.7 Mbps. (Default: 20 MHz; Range: 5 MHz, 10 MHz, 20 MHz, 40 MHz, 80MHz) ◆ Channel — The radio channel that the access point uses to communicate with wireless clients. When multiple access points are deployed in the same area, set the channel on neighboring access points at least five channels apart to avoid interference with each other. For example, for 11g/n 20 MHz mode you can deploy up to three access points in the same area using channels 1, 6, 11. Note that wireless clients automatically set the channel to the same as that used by the access point to which it is linked. (The available channels are dependent on the 802.11 Mode, Channel Bandwidth, and Country Code settings.) Selecting Auto enables the access point to automatically select an unoccupied radio channel. (Default: Auto) Table 1: Radio Channels Radio 0 (5 GHz) Radio 1 (2.4 GHz) Frequency (GHz) ...
Page 31
Chapter 4 | Wireless Settings Radio S ettings Figure 29: Radio Settings (Wireless Network Configuration) The following items are displayed on this page: General Settings ◆ Status — Enables or disables the wireless service on this VAP. ◆ SSID — The name of the basic service set provided by a Virtual Access Point (VAP) interface. Clients that want to connect to the network through the access point must set their SSID to the same as that of the access point’s VAP interface. (Default: ACN0.# (where # is 0‐7) for 5 GHz, ACN1.# (where # is 0‐7) for 2.4 GHz; Range: 1‐32 characters) ◆ Broadcast — The SSID can be broadcast at regular intervals so that wireless stations searching for a network connection can discover it. This allows wireless clients to dynamically discover and roam between WLANs. This feature also makes it easier for hackers to break into your home network. Because SSIDs are not encrypted, it is easy to grab one by snooping the WLAN looking for SSID broadcast messages coming from the AP. (Default: Enabled) ◆ Client Isolation — If enabled, wireless clients can talk to the LAN, and reach the Internet if such connection is available, but they cannot communicate with one a nother. ( Default D isabled) –...
Page 32
Chapter 4 | Wireless Settings Radio Settings ◆ WMM — Sets the WMM operational mode on the access point. When enabled, the parameters for each Access Category (AC) queue will be employed on the access point and QoS capabilities advertised to WMM‐enabled clients. (Default: Enabled) When enabled, WMM must be supported on any device trying to associated with the access point. Devices that do not support this feature will not be allowed to associate with the access point. Wireless networks offer an equal opportunity for all devices to transmit data from any type of application. Although this is acceptable for most applications, multimedia applications (with audio and video data) are particularly sensitive to the delay and throughput variations that result from this “equal opportunity” wireless access method. For multimedia applications to run well over a wireless network, a Quality of Service (QoS) mechanism is required to prioritize traffic types and provide an “enhanced opportunity” wireless access method. The access point implements QoS using the Wi‐Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time. WMM employs techniques that are a subset of the IEEE 802.11e QoS standard and it enables the access point to inter‐operate with both WMM‐enabled clients and other devices that may lack any WMM functionality. Access Categories — WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags (see Figure 2, “WMM Access Categories", on page 41). The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired ...
Page 33
Chapter 4 | Wireless Settings Radio S ettings WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. When the access point forwards traffic, WMM adds data packets to four independent transmit queues, one for each AC, depending on the 802.1D priority tag of the packet. Data packets without a priority tag are always added to the Best Effort AC queue. From the four queues, an internal “virtual” collision resolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the same collision resolution mechanism is used externally to determine which device has access to the wireless medium. For each AC queue, the collision resolution mechanism is dependent on two timing parameters: ◆ AIFSN (Arbitration Inter‐Frame Space Number), a number used to calculate the minimum time between data frames ◆ CW (Contention Window), a number used to calculate a random backoff time After a collision detection, a backoff wait time is calculated. The total wait time is the sum of a minimum wait time (Arbitration Inter‐Frame Space, or AIFS) ...
Page 34
Chapter 4 | Wireless Settings Radio Settings Security Settings ◆ Method — Sets the wireless security method for each VAP, including association mode, encryption, and authentication. (Default: No Security) No Security — The VAP broadcasts a beacon signal including the ■ configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection. WEP Open System — The VAP broadcasts a beacon signal including the ■ configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection. Key — WEP is used to encrypt data transmitted between wireless ■ clients and the VAP. WEP uses static shared keys (fixed‐length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. WEP is the security protocol initially specified in the IEEE 802.11 standard for wireless communications. Unfortunately, WEP has been found to be seriously flawed and cannot be recommended for a high level of network security. For more robust wireless security, the access point provides Wi‐Fi Protected Access (WPA) and WPA2 for improved data encryption and user authentication. Be sure that the WEP shared keys are the same for each client in the wireless network. All clients share the same keys, which are used for data encryption. For 64‐bit WEP, string length must be 5 ASCII characters (letters and numbers) or 10 hexadecimal digits. For 128‐bit WEP, string length must ...
Page 35
Chapter 4 | Wireless Settings Radio S ettings Auto: TKIP + CCMP (AES) — The encryption method used by the ■ client is discovered by the access point. Key — WPA is used to encrypt data transmitted between wireless ■ clients and the VAP. WPA uses static shared keys (fixed‐length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. String length must be 8 to 63 ASCII characters (letters and numbers). No special characters are allowed. WPA2‐PSK: Clients using WPA2 with a Pre‐shared Key are accepted for ■ authentication. WPA was introduced as an interim solution for the vulnerability of WEP pending the ratification of the IEEE 802.11i wireless security standard. In effect, the WPA security features are a subset of the 802.11i standard. WPA2 includes the now ratified 802.11i standard, but also offers backward compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK modes of operation and support for TKIP encryption. Refer to WPA‐PSK for a description of encryption methods and the key. WPA‐EAP — WPA employs a combination of several technologies to ■ provide an enhanced security solution for 802.11 wireless networks. A RADIUS server is used for authentication, and can also be used for accounting. Refer to WPA‐PSK for a description of encryption methods. RADIUS S ettings ...
Page 36
Chapter 4 | Wireless Settings Radio Settings Radius Auth Secret — A shared text string used to encrypt messages ■ between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS authentication server. Do not use blank spaces in the string. (Maximum length: 255 characters) Radius Acct Server — Specifies the IP address or host name of the ■ RADIUS a ccounting s erver. Radius Acct Port — The UDP port number used by the RADIUS server ■ for accounting messages. (Range: 1024‐65535; Default: 1813) Radius Acct Secret — A shared text string used to encrypt messages ■ between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS accounting server. Do not use blank spaces in the string. (Maximum length: 255 characters) WPA2‐EAP —WPA was introduced as an interim solution for the ■ vulnerability of WEP pending the ratification of the IEEE 802.11i wireless security standard. In effect, the WPA security features are a subset of the 802.11i standard. WPA2 includes the now ratified 802.11i standard, but also offers backward compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK modes of operation and support for TKIP encryption. A RADIUS server is used for authentication, and can also be used to accounting. Refer to WPA‐PSK for a description of encryption methods. ...
Page 37
Chapter 4 | Wireless Settings Radio S ettings Route to Internet — Configures an interface as a member of the LAN. ■ Traffic from this interface is routed across the access point and out through an interface which is bridged to the Internet. (See Figure 7, “Route to Internet", o n p age 1 8.) Network Name — The network to be routed. The default is “Default ■ local network” as displayed under LAN Settings – Local Network. Add to Guest Network — This interface can only support the guest ■ network. Hotspot Controlled — This interface can only support hotspot services. ■ Configure Hotspot — Opens Hotspot Settings page. ■ VLAN Tag Traffic — Tags any packets passing from this VAP (virtual access ■ point) to the associated Ethernet port as configured under “VLAN Settings” on page 50. (Range: 3‐4095) ◆...
Page 38
Chapter 4 | Wireless Settings Radio Settings Table 3: 802.11 Data Rates (Continued) Option Rate (Max) Coding Method Radio 0 (5 GHz) Radio 1 (2.4 GHz) 48M 48 Mbps OFDM √ √ 54M 54 Mbps OFDM √ √ MCS0 15 Mbps BPSK, single stream √ √ MCS1 30 Mbps QPSK, single stream √ √ MCS2 45 Mbps QPSK, single stream √ √ MCS3 ...
Page 39
Chapter 4 | Wireless Settings Radio S ettings Table 3: 802.11 Data Rates (Continued) Option Rate (Max) Coding Method Radio 0 (5 GHz) Radio 1 (2.4 GHz) NSS2‐MCS5 520 Mbps 256‐QAM, double stream √ NSS2‐MCS6 585 Mbps 256‐QAM, double stream √ NSS2‐MCS7 650 Mbps 256‐QAM, double stream √ NSS2‐MCS8 780 Mbps 256‐QAM, double stream √ NSS2‐MCS9 866.7 Mbps 256‐QAM, double stream √ ◆ Tx Streams — Specifies a single stream at 20MHz or a dual stream at 20MHz and 40MHz for signal transmission. (Options: 1, 2; Default 1) ...
Page 40
Chapter 4 | Wireless Settings Radio Settings Table 4: Tx Power (Continued) Power Radio 0 (5 GHz) Radio 1 (2.4 GHz) 20 dBM (100 mW) √ 21 dBM (125 mW) √ 22 dBM (158 mW) √ 23 dBM (199 mW) √ 24 dBM (251 mW) √ 25 dBM (316 mW) √ 26 dBM (398 mW) √ 27 dBM (501 mW) √ ◆ ACK Timeout — Sets the acknowledgement timeout, which is used primarily for long‐distance connections. This timeout is used to make an adjustment for link distance. It is based on the amount of time, in microseconds, that it should take to transmit a frame to the other end of the link, be processed by the receiving device, and have the ACK frame created and returned to the sending device. ( Range: 0 ‐255 m icroseconds; D efault: 0 m icroseconds) ...
Chapter 4 | Wireless Settings VLAN Settings ◆ STBC — Space‐time Block Coding sends multiple copies of the same data over a number of antennas, using the various received versions to improve the reliability of data transfer. The transmitted signal may traverse a difficult environment with scattering, reflection, and refraction which may then be further corrupted by thermal noise in the receiver, so some of the received copies will be better than others. This redundancy results in a higher chance of being able to use one or more of the received copies to correctly decode the received signal. (Default: Disabled) ◆ AMPDU — Enables or disables the use of Aggregated MAC Protocol Data Units. Physical layer (PHY) data rate improvements do not increase real throughput beyond a point because of 802.11 protocol overheads. The main media access control feature that provides a performance improvement is aggregation. Aggregation of MAC protocol data units (MPDUs) is referred to as MPDU aggregation or (A‐MPDU). (Default: Enabled) VLAN Settings VLANs (virtual local area networks) are turned off by default. If turned on they will automatically tag any packets passed to the LAN port from the relevant VAP (virtual access point). The access point can employ VLAN tagging to control access to network resources and increase security. VLANs separate traffic passing between the access point, associated clients, and the wired network. You can configure a VLAN for up to 13 VAP interfaces. Note the following points about the access point’s VLAN support: ...
Page 42
Chapter 4 | Wireless Settings VLAN Settings network must also be tagged with the same VLAN ID. Received traffic that has an unknown VLAN ID or no VLAN tag is dropped. ◆ When VLAN support is disabled, the access point does not tag traffic passed to the wired network and ignores the VLAN tags on any received frames. Note: Before enabling VLAN tagging on the access point, be sure to configure the attached network switch port to support tagged VLAN frames for the VLAN IDs configured on the access point. Otherwise, connectivity to the access point will be lost when you enable the VLAN feature. Figure 31: Configuring VLANs The following items are displayed on this page: ◆ VLAN ID — A VLAN identifier to be assigned. (Range: 3‐4095) (VLAN 1 and 2 are reserved for internal use.) ◆ Ports — The Ethernet ports assigned to the specified VLAN. ◆ SSIDs — The SSID of a VAP configured to be a member of the specified VLAN. This option is configured under Radio Settings (Network Settings – Network Behavior). ...
Page 43
5 System S ettings This chapter describes maintenance settings on the access point. It includes the following sections: ◆ “System Settings” on page 53 ◆ “Maintenance” on page 54 ◆ “User Accounts” on page 57 ◆ “Services” on page 57 – 52 – ...
Chapter 5 | System Settings System S ettings System Settings The System Settings page is used to configure general descriptive information about the access point, such as the system identification name, its geographic coordinates, and local time. Figure 32: System Settings The following items are displayed on this page: ◆ Device Name — An alias for the AP, enabling the device to be uniquely identified on the network. (Default: none; Range: 0‐50 characters) ◆ Device Latitude — The geographic latitude of the access point, given in degrees and minutes. (Range: ‐90 to +90 degrees) ◆ Device Longitude — The geographic longitude of the access point, given in degrees and minutes. (Range: ‐180 to +180 degrees) ◆...
Chapter 5 | System Settings Maintenance Maintenance The Maintenance page supports general maintenance tasks including displaying the system log, rebooting the device, restoring factory defaults, backing up or restoring configuration settings, and upgrading firmware. Figure 33: Maintenance Displaying The access point saves event and error messages to a local system log database. System Logs The log messages include the date and time, device name, message type, and message details. Figure 34: System Log – 54 – ...
Page 46
Chapter 5 | System Settings Maintenance Rebooting the The Reboot page allows you to reboot the access point. Access Point Figure 35: Rebooting the Access Point Resetting the The Reset page allows you to reset the access point to the factory defaults. Note that all user configured information will be lost. You will have to re‐enter the Access Point default user name and password to re‐gain management access to this device. Figure 36: Resetting to Defaults Note: It is also possible to reboot or reset the access point by inserting a pin in the pin hole labeled “RESET” on the connector panel of the access point and: ◆ press 2 seconds to reboot the access point; ◆ press 10 seconds to reset the access point to the factory defaults. – 55 – ...
Page 47
Chapter 5 | System Settings Maintenance Backing Up The Backup function allows you to back up the access point’s configuration to a management workstation. In Windows, a GNU Zip (*.tar.gz) file will be stored in the Configuration Downloads folder. This is a sample file name: backup‐ACN‐AP‐2014‐06‐27.tar.gz Settings Restoring The Restore page allows you to upload configuration settings from a management Configuration workstation. The specified file must be one that was previously backed up from the access point. Settings Figure 37: Restoring Configuration Settings Upgrading Firmware You can upgrade new access point software from a local file on the management workstation. New software may be provided periodically from your distributor. After upgrading new software, you must reboot the access point to implement the new code. Until a reboot occurs, the access point will continue to run the software it was using before the upgrade started. The access point supports dual software ...
Chapter 5 | System Settings User Accounts User Accounts The User Accounts page allows you to control management access to the switch based on manually configured user names and passwords. Figure 39: User Accounts The following items are displayed on this page: ◆ Username — The name of the user. (Range: 3‐15 ASCII characters, no special characters) ◆ Password — The user password. (Range: 3‐15 ASCII characters, case sensitive, no special characters) Services The Services page allows you to control remote management access to the switch and to configure of NTP time servers. Remote Management ...
Page 49
Chapter 5 | System Settings Services Figure 40: SSH Server Settings The following items are displayed on this page: ◆ SSH Server — Enables or disables SSH access to the access point. (Default: Enabled) ◆ Port — Sets the TCP port number for the SSH server on the access point. (Range: 1‐65535; Default: 22) ◆ Allow SSH from WAN — Allows SSH management access from the WAN. Telnet Telnet is a remote management tool that can be used to configure the access point from anywhere in the network. However, note that Telnet is not secure from hostile attacks. Figure 41: Telnet Server Settings ...
Page 50
Chapter 5 | System Settings Services ◆ The client authenticates the server using the server’s digital certificate. ◆ The client and server negotiate a set of security protocols to use for the connection. ◆ The client and server generate session keys for encrypting and decrypting data. ◆ The client and server establish a secure encrypted connection. ◆ A padlock icon should appear in the status bar for most browsers. Figure 42: Web Server Settings The following items are displayed on this page: ◆ HTTP Port — The TCP port to be used by the HTTP Web browser interface. (Range: 1‐65535; Default: 80) ◆ Allow HTTP from WAN — Allows HTTP management access from the WAN. ◆ HTTPS Port — The TCP port to be used by the HTTPS Web browser interface. (Range: 1‐65535; Default: 443) ◆ Allow HTTPS from WAN — Allows HTTPS management access from the WAN. Network Time ...
Page 51
Chapter 5 | System Settings Services Figure 43: NTP Settings The following items are displayed on this page: ◆ Local Time — Displays the local time as day of week, month, hour:minute:second, year, based on Universal Time Coordinates. ◆ NTP Service — Enables or disables sending of requests for time updates. (Default: Enabled) ◆ NTP Servers — Sets the host names for time servers. The switch attempts to update the time from the first server, if this fails it attempts an update from the next server in the sequence. To configure additional servers, click the “+” button to open a new edit field. ◆ Time Zone — To display a time corresponding to your local time, choose one of the predefined time zones from the scroll‐down list. SNMP Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a network. It is typically used to configure these devices for proper operation in a network environment, as well as to monitor them to evaluate performance or detect potential problems. Figure 44: SNMP Settings ...
Page 52
Chapter 5 | System Settings Services ◆ Contact — Administrator responsible for the access point. ◆ Community String — A community string that acts like a password and permits access to the SNMP protocol. (Range: 1‐32 characters, case sensitive; Default: public) The default string “public” provides read‐only access to the access point’s Management Information (MIB) database. ◆ Allow SNMP from WAN — Allows SNMP management access from the WAN. – 61 – ...
Page 53
Section III Appendices This section provides additional information and includes these items: ◆ “Troubleshooting” on page 62 – 61 – ...
A Troubleshooting Problems Accessing the Management Interface Table 5: Troubleshooting Chart Symptom Action Cannot connect using ◆ Be sure the AP is powered up. Telnet, web browser, or ◆ Check network cabling between the management station and the SNMP software AP. ◆ Check that you have a valid network connection to the AP and that intermediate switch ports have not been disabled. ◆ Be sure you have configured the AP with a valid IP address, subnet mask and default gateway. ◆ Be sure the management station has an IP address in the same subnet as the AP’s IP. ◆ If you are trying to connect to the AP using a tagged VLAN group, your ...
Page 55
Chapter A | Troubleshooting Using System Logs Display the log file through the System > Maintenance menu, and copy the information from the log file. Contact your distributor’s service engineer, and send a detailed description of the problem, along with all of the information mentioned in the above steps. – 63 – ...
Page 57
Caution: The planning and installation of the AP requires professional personnel that are trained in the installation of radio transmitting equipment. The user is responsible for compliance with local regulations concerning items such as antenna power, use of lightning arrestors, grounding, and radio mast or tower construction. Therefore, it is recommended to consult a professional contractor knowledgeable in local radio regulations prior to equipment installation. 1. Unpack the AP Unpack the AP and check the package contents. ◆ Outdoor Stand‐Alone Access Point SkyFire AC866 ◆ Pole‐mounting kit — includes two steel‐band clamps ◆ PoE power injector with power cord — either US, Continental Europe or UK ◆ Documentation —Quick Start Guide and Regulatory and Safety Information 2. Mount the AP After planning your installation, mount the unit on a pole, mast, or tower using the included two steel‐band clamps. Also, for models that require external antennas, install the antennas near the AP and attach the RF coaxial cables to the appropriate connectors on the AP. ...
Page 58
Quick Start Guide Attach External Antennas 3 Remove the front port cover by pushing the locking tab up and then sliding the cover off. Connect external antennas to the AP’s 5 GHz RP‐SMA connectors using RF coaxial cable provided in the antenna p ackage. Connect external antennas to the AP’s 2.4 GHz RP‐SMA connectors using RF coaxial cable provided in the antenna package. Note: The number of available 2.4 GHz or 5 GHz external antenna connectors depends on the specific model. 3. Connect Cables Connect outdoor‐rated Ethernet cable to the 1000BASE‐T RJ‐45 ETH0 (PoE) port on the unit. ...
Page 59
Quick Start Guide Connect the Ethernet cable from the AP to the “POE” port on the power injector. 3 Connect Ethernet cable from the “LAN” port on the power injector to a LAN switch. Connect the power cord to a nearby AC power source (100‐240 VAC, 50/60 Hz). 2 Note: Connecting the Ethernet cable from the AP to the injector module powers on the unit. 5. Verify AP Operation Verify basic AP operation by checking the system LEDs. ...
Page 60
Quick Start Guide Connect to the Web The stand‐alone APs offer a web‐based management interface for the configuration of all the unit’s features. User Interface You can make initial configuration changes by connecting a PC directly to the AP’s ETH1 RJ‐45 port. The AP has a default management IP address of 192.168.2.1 and a subnet mask of 255.255.255.0. You must set your PC IP address to be on the same subnet as the AP (that is, the PC and AP addresses must both start 192.168.2.x). Log in to the web interface using the default settings: ◆ Login Name — root ◆ Password — admin123 For more information on stand‐alone AP configuration using the web interface, refer to the Management Guide. – 5 – ...
Quick Start Guide Hardware Specifications Item Specification Chassis Size (H x W x D:) 283 x 94 x 50 mm (11.14 x 3.7 x 1.97 inches) Weight 762 g (1.68 lb) Temperature Operating: ‐20 °C to 65 °C (‐4 °F to 149 °F) Storage: ‐30 °C to 80 °C (‐22 °F to 176 °F) Humidity Operating: 15% to 95% (non‐condensing) Waterproof/Dustproof IP55 Network Interfaces Ports ETH0 (PoE) RJ‐45 Port: 1000BASE‐T, passive PoE ETH1 RJ‐45 Port: 100BASE‐TX 2.4 GHz Radio IEEE 802.11b/g/n 5 GHz Radio IEEE 802.11a/n/ac Radio F requencies 5745 ~ 5825 MHz (China) 5180 ~ 5240 MHz (NCC) 5260 ~ 5230 MHz (NCC) 5745 ~ 5825 MHz (NCC) ...
Quick Start Guide Federal Communication Commission Interference Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: ( 1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: ‐ Reorient or relocate the receiving antenna. ‐ Increase the separation between the equipment and receiver. ‐ Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ‐ Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter. For operation within 5.15 ~ 5.25GHz / 5.47 ~5.725GHz frequency range, it is restricted to indoor environment. The band from 5600‐5650MHz will be disabled by the software during the manufacturing and cannot be changed by the end user. This device meets all the other requirements specified in Part 15E, Section 15.407 of the FCC Rules. Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. ...
Quick Start Guide Professional installation instruction 1. Installation personal This product is designed for specific application and needs to be installed by a qualified personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting. 2. Installation location The product shall be installed at a location where the radiating antenna can be kept 20cm from nearby person in normal operation condition to meet regulatory RF exposure requirement. 3. External antenna Use only the antennas which have been approved by the applicant. The non‐approved antenna(s) may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC limit and is prohibited. 4. Installation procedure Please refer to user’s manual for the detail. 5. Warning Please carefully select the installation position and make sure that the final output power does not exceed the limit set force in relevant rules. The violation of the rule could lead to serious federal penalty. professional installer: 5.15‐5.25G band (UNII band 1) is certified to indoor use only. Installer must disable UNII band 1 by provided proprietary tool when you install this device for outdoor application to comply with FCC requirement. 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、 加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用, 並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電機須忍受合法通信或工業、 科學及醫療用電波輻射性電機設備之干擾。 此器材須經專業安裝並限用於固定式點對點操作。...
Need help?
Do you have a question about the AC866 and is the answer not in the manual?
Questions and answers