Table of Contents

Advertisement

Quick Links

Questo manuale d'istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per
TP-Link EAP620
HD
o cerca il tuo prodotto tra le
migliori offerte di Wireless e Bluetooth
User Guide
For TP-Link Omada Access Points
1910012768 REV4.6.0
June 2020

Advertisement

Table of Contents
loading

Summary of Contents for TP-Link Omada EAP620

  • Page 1 Questo manuale d’istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per TP-Link EAP620 o cerca il tuo prodotto tra le migliori offerte di Wireless e Bluetooth User Guide For TP-Link Omada Access Points 1910012768 REV4.6.0 June 2020...
  • Page 2: Table Of Contents

    CONTENTS About This User Guide......................1 Overview ..........................3  1 Quick Start ........................4 Determine the Management Method ....................5 Build the Network Topology ........................6 Log In to the EAP ............................7 1.3.1   Log In via a Wireless Connection ....................7 1.3.2  Log In via a Wired Connection ......................
  • Page 3 Configure Rogue AP Detection ......................47 Detect Rogue APs and Move the Rogue APs to the Trusted AP List ........48 Manage the Trusted AP List ........................50  3 Monitor the Network ....................52 Monitor the EAP ............................53 Monitor the Wireless Parameters ......................54 Monitor the SSIDs ............................
  • Page 4 Configure the User Account ........................76 Controller Settings ..........................77 Enabling Cloud-Based Controller Management ................77 Configuring Controller Inform URL ......................78 Configure the System Time........................78 Configure the System Time ........................79 Configure Daylight Saving Time ......................81 Reboot and Reset the EAP ........................83 Backup and Restore the Configuration....................84 Update the Firmware ..........................84  6 Application Example ....................86...
  • Page 5: About This User Guide

    Some models featured in this guide may be unavailable in your country or region. For local sales information, visit https://www.tp-link.com The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure the accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
  • Page 6 The authentication information can be found where you find this guide. Specifications can be found on the product page at https://www.tp-link.com To ask questions, find answers, and communicate with TP-Link users or engineers, please visit https://community.tp-link.com to join TP-Link Community.
  • Page 7: Overview

    Overview Omada series products provide wireless coverage solutions for small-medium business and households. They can either work independently as standalone APs or be centrally managed by Omada Software Controller, Omada Hardware Controller (OC200/OC300), or Omada Cloud-Based Controller, providing a flexible, richly-functional but easily configured wireless network for small- medium business and households.
  • Page 8: Quick Start

     1  Quick Start This chapter introduces how to build a wireless network using the EAPs and how to complete the basic settings. Follow the steps below: 1. Determine the Management Method 2. Build the Network Topology 3. Log In to the EAP 4.
  • Page 9: Determine The Management Method

    For detailed instructions about the network topology in such situations and how to use Omada SDN Controller, refer to the User Guide of Omada SDN Controller. The guide can be found on the download center of our official website: https://www.tp-link.com/support/download/ ■  ...
  • Page 10: Build The Network Topology

    1.2 Build the Network Topology To manage the EAPs in Standalone mode, refer to the following topology. Router (DHCP Server) Switch Internet LAN: 192.168.0.1 IP: 192.168.0.100 Clients • The router is the gateway of the network, and devices in the LAN surf the internet via the router.
  • Page 11: Log In To The Eap

    1.3 Log In to the EAP The following sections introduce how to log in to the EAP via a wireless connection and a wired connection. 1.3.1   Log In via a Wireless Connection To access the management web page via a wireless connection, you can use either the domain name or the IP address of the EAP.
  • Page 12 3. Make sure that the wireless client has been assigned the IP address and has got the IP address of the DNS server and the gateway. 4. Launch a web browser on the client device and enter http://tplinkeap.net in the address bar to load the login page of the EAP. Use admin for both of the username and password to log in.
  • Page 13: Log In Via A Wired Connection

    EAP according to its MAC address. The MAC address can be found at the bottom of the EAP. • Go to https://www.tp-link.com/download/EAP-Controller.html#EAP_Discovery_Tool to download EAP Discovery Utility. EAP Discovery Utility is a software that can scan all EAPs in the same network segment. Install and launch EAP Discovery Utility on the PC, and find the IP address of the EAP.
  • Page 14 2. Launch a web browser and enter 192.168.0.5 in the address bar to load the login page of the EAP. Use admin for both of the username and password to log in. iipe   • Some EAP models only works with certain software version of Discovery Utility. If your Discovery Utility can’t discover your EAP anyway, try a different software version.
  • Page 15: Do The Basic Configurations

    1.4 Do the Basic Configurations After Logging in to EAP, follow the step-by-step instructions to complete the basic configurations. 1. In the pop-up window, configure a new username and a new password for your user account, then click Next. 2. For the dual-band EAP, select at least one radio band between 2.4GHz and 5GHz to configure the SSID and password.
  • Page 16 3. The following page will appear. Make sure that your device has connected to the new wireless network and tick the checkbox. Then click Finish. iipe If needed, you can also create more new SSIDs. For detailed instructions about how to create new Configure SSIDs SSIDs, refer to...
  • Page 17: Configure And Manage The Eap

    1.5 Configure and Manage the EAP After all the steps above are completed, the legal wireless clients can enjoy the internet via the EAP. Additionally, you can configure the advanced functions of the EAP according to your need, and manage it conveniently on the web page. On the top of the page, you can click to log out and click to open the technical...
  • Page 18: Configure The Network

     2  Configure the Network This chapter introduces how to configure the network parameters and the advanced features of the EAP, including:   • Configure the Wireless Parameters   • Configure Portal Authentication   • Configure VLAN   • Configure MAC Filtering  ...
  • Page 19: Configure The Wireless Parameters

    2.1 Configure the Wireless Parameters To configure the wireless parameters, go to the Wireless > Wireless Settings page. For a dual-band EAP, there are two bands: 2.4GHz and 5GHz. The wireless parameters are separately set on each band. You can click to select a band and configure the wireless parameters on this band.
  • Page 20: Configure Ssids

    Before configuring the wireless parameters on each band, check the box to enable 2.4GHz or 5GHz Wireless Radio. Only when this option is enabled will the wireless radio on 2.4GHz or 5GHz band works. Demonstrated with 2.4GHz, the following sections introduce these contents: Configure SSIDs Configure Wireless Advanced Settings...
  • Page 21 Follow the steps below to create an SSID on the EAP: 1. If your EAP is a dual-band device, click to choose a frequency band on which the new SSID will be created. 2. Click to add a new SSID on the chosen band. iipe You can also click to edit the specific SSID which already exists in the list.
  • Page 22 protection for wireless networks. Since WPA-Personal and WPA-Enterprise are much safer than WEP, we recommend that you choose WPA-Personal or WPA-Enterprise if your clients also support them. Ntte WEP is not supported in 802.11n mode or 802.11ac mode. If WEP is applied in 802.11n, 802.11 ac or 802.11n/ac mixed mode, the clients may not be able to access the wireless network.
  • Page 23 Key Value Enter the WEP keys. The length and valid characters are determined by the key format and key type.   • WPA-Enterprise WPA-Enterprise (Wi-Fi Protected Access-Enterprise) is a safer encryption method compared with WEP and WPA-Personal. It requires a RADIUS server to authenticate the clients via 802.1X and EAP (Extensible Authentication Protocol).
  • Page 24 Encryption Select the Encryption type. Note that some encryption type is only available under certain circumstances. Auto: The default setting is Auto and the EAP will select TKIP or AES automatically based on the client device’s request. TKIP: Temporal Key Integrity Protocol. TKIP is not supported in 802.11n mode, 802.11ac mode or 802.11n/ac mixed mode.
  • Page 25   • WPA-Personal WPA-Personal is based on a pre-shared key. It is characterized by high safety and simple settings, so it is mostly used by common households and small businesses. The following table introduces how to configure each item: Version Select the version of WPA-Personal according to your needs.
  • Page 26: Configure Wireless Advanced Settings

    2.1.2  Configure Wireless Advanced Settings Proper wireless parameters can improve the performance of your wireless network. This section introduces how to configure the advanced wireless parameters of the EAP, including Radio Setting Load Balance Airtime Fairness More Settings Radio Setting Radio settings directly control the behavior of the radio in the EAP and its interaction with the physical medium;...
  • Page 27 Channel Width Select the channel width of the EAP. The available options differ among different EAPs. For some EAPs, available options include 20MHz, 40MHz and 20/40MHz. For other EAPs, available options include 20MHz, 40MHz, 80MHz and 20/40/80MHz. When the radio mode includes 802.11n, we recommend you set the channel bandwidth to 20/40 MHz or 20/40/80MHz to improve the transmission speed.
  • Page 28: Load Balance

    Tx Power (EIRP) Specify the transmit power value. If this value is set to be larger than the maximum transmit power that is allowed by the local regulation, the regulated maximum transmit power will be applied in the actual situation. Note: In most cases, it is unnecessary to use the maximum transmit power.
  • Page 29: More Settings

    Compared with the relatively new client devices, some legacy client devices support slower wireless rate. If they communicate with the same EAP, the slower clients take more time to transmit and receive data compared with the faster clients. As a result, the overall wireless throughput of the network decreases.
  • Page 30: Configure Portal Authentication

    DTIM Period The DTIM (Delivery Traffic Indication Message) is contained in some Beacon frames. It indicates whether the EAP has buffered data for client devices. The DTIM Period indicates how often the clients served by this EAP should check for buffered data still on the EAP awaiting pickup. You can specify the value between 1-255 Beacon Intervals.
  • Page 31: Configure Portal

    To configure portal authentication, go to the Wireless > Portal page. Configure Portal Three portal authentication types are available: No Authentication Local Password External RADIUS Server . The following sections introduce how to configure each authentication type.
  • Page 32   • No Authentication With this authentication type configured, clients can pass the authentication and access the network without providing any login information. They only need to accept the term of use on the authentication page. Follow the steps below to configure No Authentication as the portal authentication type: 1. Select the SSID on which the portal will take effect.
  • Page 33 Redirect With this function configured, the newly authenticated client will be redirected to the specific URL. Redirect URL With Redirect enabled, you also need to enter the URL in this field. The newly authenticated client will be redirected to this URL. Portal Configure the authentication page.
  • Page 34 Follow the steps below to configure Local Password as the portal authentication type: 1. Select the SSID on which the portal will take effect. 2. Select Local Password as the authentication type. 3. Configure the relevant parameters as the following table shows: Password Specify a password for authentication.
  • Page 35   • External RADIUS Server If you have a RADIUS server on the network to authenticate the clients, you can select External Radius Server. Clients need to provide the correct login information to pass the authentication.
  • Page 36 Follow the steps below to configure External Radius Server as the portal authentication type: 1. Select the SSID on which the portal will take effect. 2. Build a RADIUS server on the network and make sure that it is reachable by the EAP. 3. Go to the Portal configuration page on the EAP.
  • Page 37: Configure Free Authentication Policy

    Redirect With this function configured, the newly authenticated client will be redirected to the specific URL. Redirect URL With Redirect enabled, you also need to enter the URL in this field. The newly authenticated client will be redirected to this URL. Portal Customization Configure the authentication page.
  • Page 38 the clients can visit the login page provided by the web portal server and then pass the subsequent authentication process. Follow the steps below to add free authentication policy. 1. In the Free Authentication Policy section, click to load the following page. 2. Configure the following parameters.
  • Page 39: Configure Vlan

    Destination Port Specify the port number of the service. When using this service, the clients can access the specific resources without authentication. Leaving the field empty means that clients can access the specific resources no matter what service they are using. Status Check the box to enable the policy.
  • Page 40: Configure Mac Filtering

    3. Specify the VLAN ID for the wireless network in the VLAN ID column. Every VLAN ID represents a different VLAN. It supports maximum 8 VLANs per frequency band. The VLAN ID range is 0 to 4094. 0 is used to disable VLAN tagging. 4. Click Save.
  • Page 41 Follow the steps below to configure MAC Filtering on this page: 1. In the Settings section, check the box to enable MAC Filtering, and click Save. 2. In the Station MAC Group section, click and the following page will appear. 1 ) Click and specify a name for the MAC group to be created.
  • Page 42: Configure Scheduler

    the MAC address of the host and click OK. In the same way, you can add more MAC addresses to the selected MAC group. 3. In the MAC Filtering Association section, configure the filtering rule. For each SSID, you can select a MAC group in the MAC Group Name column and select the filtering rule (Allow/Deny) in the Action column.
  • Page 43 To configure Scheduler, go to the Wireless > Scheduler page. Follow the steps below to configure Scheduler on this page: 1. In the Settings section, check the box to enable Scheduler and select the Association Mode. There are two modes: Associated with SSID (the scheduler profile will be applied to the specific SSID) and Associated with AP (the profile will be applied to all SSIDs on the EAP).
  • Page 44 2. In the Scheduler Profile Configuration section, click and the following page will appear. 1 ) Click and specify a name for the profile to be created. Click OK. You can create up to eight profiles. 2 ) Select a profile in the list (the color of the selected one will change to blue). Click to add time range items to the profile.
  • Page 45: Configure Band Steering

    3. In the Scheduler Association section, configure the scheduler rule. There are two association modes: Association with SSID Association with AP . The following sections introduce how to configure each mode. ■ Association with SSID   If you select Association with SSID in step 1, the Scheduler Association table will display all the SSIDs on the EAP.
  • Page 46 diminished. Band Steering can steer dual-band clients to the 5GHz frequency band which supports higher transmission rates and more client devices, and thus to greatly improve the network quality. Ntte Only the dual-band EAP products support Band Steering. To configure Band Steering, go to the Wireless > Band Steering page. Follow the steps below to configure Band Steering on this page: 1. Check the box to enable Band Steering function.
  • Page 47: Configure Qos

    Connection Connection Threshold defines the maximum number of clients Threshold/Difference connected to the 5GHz band. The value of Connection Threshold Threshold is from 2 to 40, and the default is 20. Difference Threshold defines the maximum difference between the number of clients on the 5GHz band and 2.4GHz band. The value of Difference Threshold is from 1 to 8, and the default is 4.
  • Page 48 To configure QoS, go to the Wireless > QoS page. Follow the steps below to configure QoS on this page: 1. Click to choose a frequency band to be configured. 2. Check the box to enable Wi-Fi Multimedia (WMM). With WMM enabled, the EAP uses the QoS function to guarantee the high priority of the transmission of audio and video packets.
  • Page 49 Ntte If 802.11n only mode is selected in 2.4GHz (or 802.11n only, 802.11ac only, or 802.11 n/ac mixed mode selected in 5GHz), the WMM should be enabled. If WMM is disabled, the 802.11n only mode cannot be selected in 2.4GHz (or 802.11n only, 802.11ac only, or 802.11 n/ac mixed mode in 5GHz). 3. In the AP EDCA Parameters section, configure the AP EDCA ((Enhanced Distributed Channel Access) parameters.
  • Page 50 Maximum The upper limit (in milliseconds) for the doubling of the random backoff Contention value. This doubling continues until either the data frame is sent or the Window Maximum Contention Window size is reached. This value must be higher than the value of Minimum Contention Window.
  • Page 51: Configure Rogue Ap Detection

    Minimum A list to the algorithm that determines the initial random backoff wait Contention time (window) for retry of a transmission. Window This value cannot be higher than the value of Maximum Contention Window. Maximum The upper limit (in milliseconds) for the doubling of the random backoff Contention value.
  • Page 52: Detect Rogue Aps And Move The Rogue Aps To The Trusted Ap List

    Ntte The Rogue AP Detection feature is only used for collecting information of the nearby wireless network and does not impact the detected APs, no matter what operations you have executed in this feature. To configure Rogue AP Detection, go to the Wireless > Rogue AP Detection page. Detect Rogue APs and Move the Rogue APs to the Trusted AP List Follow the steps below to detect the nearby APs and move the trusted ones to the Trusted AP list.
  • Page 53 2. In the Detected Rogue AP List section, click 3. Wait for a few seconds without any operation. After detection is finished, the detected APs will be displayed in the list. The following table introduces the displayed information of the APs: Displays the MAC address of the AP. SSID Displays the SSID of the AP.
  • Page 54: Manage The Trusted Ap List

    5. View the trusted APs in the Trusted AP List section. To move the specific AP back to the Rogue AP list, you can click in the Action column. Manage the Trusted AP List You can download the trusted AP list from your local host to the EAP or backup the current Trusted AP list to your local host.
  • Page 55 5. Click Save to import the trusted AP list.   • Backup the Trusted AP List to the Host You can backup the current trusted AP list and save the backup file to the local host. Follow the steps below to backup the current trusted AP list: 1. On this page, check the box to choose Backup (AP to PC).
  • Page 56: Monitor The Network

     3  Monitor the Network This chapter introduces how to monitor the running status and statistics of the wireless network, including:   • Monitor the EAP   • Monitor the Wireless Parameters   • Monitor the Clients...
  • Page 57: Monitor The Eap

    3.1 Monitor the EAP To monitor the EAP information, go to the Status > Device page. The following device information is displayed: Device Name Displays the name of the EAP. The name consists of the product model followed with the MAC address of the EAP by default. Device Model Displays the product model of the EAP.
  • Page 58: Monitor The Wireless Parameters

    CPU Utilization Displays the CPU occupancy. If this value is too high, the EAP may work abnormally. Memory Utilization Displays the memory occupancy. 3.2 Monitor the Wireless Parameters You can view the wireless parameters of the EAP, including SSID lists, radio settings, radio traffic and LAN traffic.
  • Page 59: Monitor The Ssids

    Monitor the SSIDs You can monitor the SSID information of the EAP. The following table introduces the displayed information of the SSID: SSID Name Displays the SSID name. Clients Displays the number of clients currently connected to the SSID. Band Displays the frequency band the SSID is currently using.
  • Page 60: Monitor The Radio Settings

    Monitor the Radio Settings You can monitor the radio settings of the EAP. For a dual-band EAP, there are two bands: 2.4GHz and 5GHz. You can click to select a band to view. The following figure posted in the introduction takes 2.4GHz as an example. The following table introduces the displayed information of the EAP.
  • Page 61: Monitor Lan Traffic

    The following traffic information of the radio is displayed: Rx Packets Displays the total number of the received packets on the 2.4GHz/5GHz band since the EAP starts up. Tx Packets Displays the total number of the sent packets on the 2.4GHz/5GHz band since the EAP starts up.
  • Page 62: Monitor The Clients

    Rx Dropped Displays the total number of the dropped packets which are received by the Packets EAP since it starts up. Tx Dropped Displays the total number of the dropped packets which are sent by the Packets EAP since it starts up. Rx Errors Displays the total number of the received error packets since the EAP starts up.
  • Page 63: View Client Information

    View Client Information There are two types of clients: users and portal authenticated guests. Users are the clients that connect to the SSID with portal authentication disabled. Guests are the clients that connect to the SSID with portal authentication enabled. Click the to select the client types to view the information of the EAP.
  • Page 64: View Block Client Information

    You can execute the corresponding operation to the EAP by clicking an icon in the Action column. Click the icon to configure the rate limit of the client to balance bandwidth usage. Enter the download limit and upload limit and click You can limit the download and upload rate for each clients by which Configure connect to specific SSIDs when configuring SSIDs, refer to...
  • Page 65: Manage The Eap

     4  Manage the EAP The EAP provides powerful functions of device management and maintenance. This chapter introduces how to manage the EAP, including:   • Manage the IP Address of the EAP   • Manage System Logs   • Configure Web Server  ...
  • Page 66: Manage The Ip Address Of The Eap

    4.1 Manage the IP Address of the EAP The IP address of the EAP can be a dynamic IP address assigned by the DHCP server or a static IP address manually specified by yourself. By default, the EAP gets a dynamic IP address from the DHCP server.
  • Page 67   • Dynamic If you choose Dynamic as the IP address mode, make sure that there is a reachable DHCP server on your network and the DHCP sever is properly configured to assign IP address and the other network parameters to the EAP. For network stability, you can also configure the fallback IP parameters for the EAP: Fallback IP With the fallback IP configured, if the EAP fails to get an IP...
  • Page 68: Manage System Logs

    Configure the IP address and network parameters as the following table shows: IP Address Specify a static IP address for the EAP. IP Mask Specify the network mask. Gateway Specify the network gateway. Primary DNS Specify the primary DNS server. Secondary DNS Specify the secondary DNS server.
  • Page 69: View System Logs

    View System Logs In the Log section, you can click to refresh the logs and view them in the table. Configure the Way of Receiving Logs In the Log Settings section, you can configure the ways of receiving system logs. Follow the steps below to configure this feature: 1. Check the corresponding box to enable one or more ways of receiving system logs, and configure the related parameters.
  • Page 70 The following table introduces how to configure these parameters: From Enter the sender’s E-mail address. Enter the receiver’s E-mail address. SMTP Server Enter the IP address of the sender’s SMTP server. Note: At present, the domain name of SMTP server is not supported in this field.
  • Page 71: Configure Web Server

    4.3 Configure Web Server With the web server, you can log in to the management web page of the EAP. You can configure the web server parameters of the EAP according to your needs. To configure Web Server, go to the Management > Web Server page. Follow the steps below to configure Web Server: 1. Refer to the following table to configure the parameters: Secure Server Port...
  • Page 72: Configure Management Access

    4.4 Configure Management Access By default, all hosts in the LAN can log in to the management web page of the EAP with the correct username and password. To control the hosts’ access to the web page of the EAP, you can specify the MAC addresses and management VLAN of the hosts that are allowed to access the web page.
  • Page 73: Configure Management Vlan

    Follow the steps below to configure Management Access on this page: 1. Check the box to enable MAC Authentication. 2. Specify one or more MAC addresses in the MAC1/MAC2/MAC3/MAC4 fields. Up to four MAC addresses can be added. 3. Click Save. iipe   • You can click to quickly add the MAC address of your current logged-in host, .
  • Page 74: Configure Led

    4.5 Configure LED You can turn on or off the LED light of the EAP and flash the LED to locate your device. To configure LED, go to the Management > LED Control page. Check the box to turn on or turn off the LED light of the EAP, and click Save. To flash the LED, click Locate.
  • Page 75: Configure Poe Out (Only For Certain Devices)

    Certain devices have an LED/Wi-Fi button on the front panel. With Wi-Fi Control enabled, you can press the button to turn on or off both of the Wi-Fi and LED at the same time. To configure Wi-Fi Control, go to the Management > Wi-Fi Control page. Check the box to enable Wi-Fi Control and click Save.
  • Page 76: Configure Ssh

    Check the box to enable PoE Out and click Save. 4.8 Configure SSH If you want to remotely log in to the EAP via SSH, you can deploy an SSH server on your network and configure the SSH feature on the EAP. To configure SSH, go to the Management >...
  • Page 77: Configure Snmp

    4.9 Configure SNMP The EAP can be configured as an SNMP agent and work together with the SNMP manager. Once the EAP has become an SNMP agent, it is able to receive and process request messages from the SNMP manager. At present, the EAP supports SNMP v1 and v2c. To configure the EAP as an SNMP agent, go to the Management >...
  • Page 78 Set Community Set Community has the read and write right of the device’s SNMP information. Enter the community name that allows read/write access to the device’s SNMP information. The community name can be considered a group password. The default setting is private. Set Source Defines the IP address (for example, 10.10.10.1) for management systems that can serve as Set Community to read and write the SNMP...
  • Page 79: Configure The System

     5  Configure the System This chapter introduces how to configure the system of the EAP, including:   • Configure the User Account   • Controller Settings   • Configure the System Time   • Reboot and Reset the EAP   • Backup and Restore the Configuration  ...
  • Page 80: Configure The User Account

    5.1 Configure the User Account Every EAP has a user account, which is used to log in to the management page of the EAP. When you start the EAP at the first time, the username and password of the user account are both admin.
  • Page 81: Controller Settings

    For details about the whole procedure, refer to the User Guide of Omada SDN Controller. The guide can be found on the download center of our official website: https://www.tp-link.com/support/download/ Enable Cloud-Based Controller Management Go to the System > Controller Settings page. In the Cloud- Based Controller Management...
  • Page 82 EAP to your Omada Cloud-Based Controller, you can check the connection status on this page.
  • Page 83: Configuring Controller Inform Url

    Configure Controller Inform URL Go to the System > Controller Settings page. In the Controller Inform URL section, inform the EAP of the controller’s URL/IP address, and click Savt. Then the EAP make contact with the controller so that the controller can discover the EAP. 5.3 Configure the System Time System time is the standard time for Scheduler and other time-based functions.
  • Page 84: Configure The System Time

    To configure the system time, go to the System > Time Settings page. The following two sections introduce how to configure the basic system time settings and the Daylight Saving Time feature. Configure the System Time In the Time Settings section, you can configure the system time. There are three methods to set the system time: Set the System Time Manually Acquire the System Time From an...
  • Page 85   • Set the System Time Manually To set the system time manually, follow the steps below: 1. Configure the following three options on the page: Time Zone, Date and Time. Time Zone Select your time zone from the drop-down list. Here GMT means Greenwich Mean Time.
  • Page 86: Configure Daylight Saving Time

    4. Click Save.   • Synchronize the System Time with PC’s Clock To synchronize the system time with the clock of your currently logged-in host, follow the steps below: 1. Click the button and the synchronized system time will be displayed in the Date and Time fields. 2. Click Save.
  • Page 87 There are four regions provided: USA, European, Austrilia and New Zealand. The following table introduces the predefined daylight saving time of each region. From 2: 00 a.m. on the Second Sunday in March to 2:00 a.m. on the First Sunday in November. European From 1: 00 a.m.
  • Page 88: Reboot And Reset The Eap

    ■ Date Mode   If you select Date Mode, manually specify an absolute time range for the daylight saving time of the EAP. This configuration will be used only once. The following table introduces how to configure the absolute time range. Time Offset Specify the time to set the clock forward by.
  • Page 89: Backup And Restore The Configuration

    • To reset the EAP, click the button , and the EAP will be reset to the factory defaults automatically. Please wait without any operation. Ntte After reset, all the current configuration of the EAP will be lost. We recommend that you check whether you have any configuration that needs to be backed up before resetting the EAP.
  • Page 90 To update the firmware, go to the System > Firmware Update page. Follow the steps below to update the firmware of your EAP: 1. Go to our website https://www.tp-link.com and search your EAP model. Download the proper firmware file on the support page of the EAP.
  • Page 91: Application Example

     6  Application Example This chapter provides an application example about how to establish and manage a EAP wireless network: A restaurant wants to provide the wireless internet access for the employees and guests. The restaurant now has a router, a switch, a dual-band EAP and a computer. Follow the steps below to establish the wireless network: 1.
  • Page 92: Determine The Network Requirements

    6.1 Determine the Network Requirements Before starting to build the network, we need to first analyze and determine the network requirements. In this restaurant example, the network requirements are as follows: • On both 2.4GHz and 5GHz bands, there are two SSIDs needed: one for the restaurant employees and one for the guests.
  • Page 93: Log In To The Eap

    6.3 Log in to the EAP After building the network topology, follow the steps below to log in to the web page of the EAP: 1. On the management host, launch the web browser and enter “192.168.88.1” in the address bar. Then log in to the router and find the IP address of the EAP. As the following figure shows, the IP address of the EAP is 192.168.88.101.
  • Page 94: Configure The Eap

    6.4 Configure the EAP To achieve the network requirements in this application example, we need to Configure SSIDs Configure Portal Authentication Configure Scheduler Configure SSIDs 1. After Logging in to EAP, follow the step-by-step instructions to complete the basic configurations of creating SSIDs. Configure the SSID as “employee_2.4GHz” and “employee_5GHz”, specify the Password as “restaurant123abc“.
  • Page 95: Configure Portal Authentication

    3. The following page will appear. Configure this SSID as “guest_2.4GHz“, keep the Security Mode as “None” and check the box to enable the Portal feature for this SSID. Click OK. 4. Click to enter the configuration page for the 5GHz band. Similarly to the configurations for the 2.4GHz band, configure another SSID for the guests on the 5GHz band.
  • Page 96 2. Configure the portal feature as the following figure shows. 1 ) Select the SSIDs for the guests on which the portal will take effect. 2 ) Select the Authentication Type as “Local Password” and specify the Password as “restaurant123”. 3 ) Configure Authentication Timeout. Here we customize the timeout as 2 hours. It means that guests will be logged out after they have been authenticated for 2 hours.
  • Page 97: Configure Scheduler

    5 ) Configure the authentication page. Specify the title and the term of use. To access the internet, guests need to enter the correct password in the Password field, accept the Term of Use, and click the Login button. 3. Click Save. Configure Scheduler Follow the steps below to schedule the radio to operate only during the working time (9:00 am to 22:00 pm).
  • Page 98: Test The Network

    2 ) Choose the newly added profile “worktime”, and click . Then the item configuraiton page will appear. Specify the time range as everyday 9:00 to 22:00. Click OK. 4. In the Scheduler Association section, select “worktime“ in the Profile Name column and select “Radio On”...
  • Page 99 • To test the SSIDs for the guests, follow the steps below: 1 ) Enable the Wi-Fi feature of the client device. 2 ) Choose the SSID “guest_2.4GHz“ or “guest_5GHz“ among the detected SSIDs. 3 ) The default web browser on the device will pop up and the authentication page will appear.
  • Page 100 4 ) If the network is working normally, we will be redirected to the website of the restaurant: http://www.restaurant1.com.
  • Page 101: Appendix: Omada App

    Appendix: Omada App Omada app is a mobile application designed for Omada series EAP products. It allows you to conveniently manage and monitor your network. This appendix introduces how to use Omada app to manage your network and includes the following sections: ■...
  • Page 102: Install Omada App On The Mobile Device

    Omada app runs on iOS and Android devices, such as smart phones and tablets. Launch the Apple App Store (iOS) or Google Play store (Android) and search “TP-Link Omada” or simply scan the QR code to download and install the app.
  • Page 103 1. Connect your mobile device to 3. Tap on the EAP appearing on the the EAP by using the default SSID page. Set a new username and (format: TP-Link 2.4GHz/5GHz_ password for your login account of XXXXXX) printed on the label. the EAP.
  • Page 104 5. You can view the name of the EAP and other information including wireless parameters and clients. And you can tap to change the settings of radio, SSID and device account. iipe   • Omada app is designed to help you quickly configure some basic settings.
  • Page 105 Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd.

Table of Contents