Cerio eXtreme CW-400 A1 User Manual

Cerio eXtreme CW-400 A1 User Manual

Power wave2 4x 11n/ac 2.4/5ghz 2x2 ceiling / wall poe access point, cenos 5.0
Table of Contents

Advertisement

Quick Links

CERIO Corporation
CenOS 5.0
User Manual
for
CW-400 A1
eXtreme Power Wave2 4X 11N/ac 2.4/5Ghz 2x2 Ceiling /
Wall PoE Access Point
V1.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the eXtreme CW-400 A1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Cerio eXtreme CW-400 A1

  • Page 1 CERIO Corporation CenOS 5.0 User Manual CW-400 A1 eXtreme Power Wave2 4X 11N/ac 2.4/5Ghz 2x2 Ceiling / Wall PoE Access Point V1.0...
  • Page 2: Table Of Contents

    1. Device and Software Configuration ..........7 Setup preparation of AP ......................7 Login Web Page ........................10 Operating Mode Introduction ....................10 Access Point Mode ........................... 10 Client Bridge + Repeater Mode ........................ 12 WISP + Repeater AP Mode ........................13 CAP mode (Centralizes Access Point).......................
  • Page 3 Authentication ........................33 3.2.1 Enable Authentication function .................... 34 3.2.2 Set Authentication function....................36 # Guest ..............................36 # Local User .............................. 37 # OAuth2.0 ............................... 37 Sample for Google OAuth2.0 setup ......................38 Sample for Facebook OAuth2.0 setup ....................41 # POP3/IMAP Server ..........................
  • Page 4 Configure DHCP Setup ......................63 Wireless General Setup ......................65 4.3.1 Radio 0(2.4G) Basic Setup ..................... 65 4.3.2 Radio 1 (5G) Basic Setup ....................... 68 4.3.3 Advanced Setup ........................70 4.3.4 WMM Setup .......................... 72 4.3.5 Station Setup ......................... 74 4.3.6 Repeater AP Setup ........................
  • Page 5 Configure LAN Setup ......................106 # Network Setup ..........................106 # Network Pull-down menu ......................107 6.2.1 DHCP Server......................... 107 6.2.2 Bandwidth Control ......................109 6.2.3 Radio 0(2.4G)/1(5G) Access Point Setup ................110 6.2.4 MAC Filter ..........................113 6.2.5 802.11r Fast Roaming Setup ....................114 Wireless General Setup .......................
  • Page 6 8.2.4 Group Setup ........................137 8.2.5 Map Setup ........................... 137 8.2.6 Authentication Profile ......................139 8.2.7 Status ........................... 139 9. Utilities ..................140 Profile Setting ........................140 System Upgrade ........................141 Network Utility ........................143 Reboot ..........................143 10. Status ..................144 10.1 Overview ..........................
  • Page 7: Device And Software Configuration

    Device and Software Configuration 1.1 Setup preparation of AP Please PC link to Device used cat5/6 Ethernet cable. The following setup uses a Windows PC, user OS may vary Step 1: Please click on the computer icon in the bottom right window, and click “Open Network and Internet settings”...
  • Page 8 Step 2: After click left side "Ethernet" function, click on the right side “Change adapter options” again. Step 3: In “Change adapter options” Page. Please find Ethernet (Local LAN) and Click the right button on the mouse and Click “Properties” V1.0...
  • Page 9 Step 4: In Properties page to setting IP address, please find “Internet Protocol Version 4 (TCP/IPv4)” and double click or click “OK” button. Step 5 : Select “Use the following IP address”, and fix in IP Address : 192.168.2.# ex. The # is any number by 1 to 253 Subnet mask : 255.255.255.0 And Click "OK"...
  • Page 10: Login Web Page

    Login Web Page Launch Web Browser Launch as web browser to access the web management interface of system by entering the default IP Address, http://192.168.2.254, in the URL field, and then press Enter. System Login root default Default login Usermane is “root”and Password is “default” Operating Mode Introduction Access Point Mode Please click on System ->Mode Setup and choose Access Point Mode...
  • Page 11 WDS Setup includes AES (Advanced Encryption Standard) Authentication  This enables the wireless interconnection of Access Point in a IEEE802.11 network and accepts  wireless Support Captive Portal authentication.  V1.0...
  • Page 12: Client Bridge + Repeater Mode

    Client Bridge + Repeater Mode Please click on System ->Mode Setup and choose Client Bridge Mode It can be used as a Client Bridge + Repeater AP to receive wireless signals over last mile  applications, helping WISPs deliver wireless broadband Internet service to new residential and business customers In this mode, the AP is enabled with DHCP Server functions.
  • Page 13: Wisp + Repeater Ap Mode

    WISP + Repeater AP Mode Please click on System ->Mode Setup and choose WISP Mode It can be used as an WISP (Wireless Internet Service Provide) to receive wireless signals over last  mile application, helping WISPs deliver wireless broadband Internet service to residents and business customers In the WISP (CPE) mode, the CenOS 5.0 AP is a gateway enabled with NAT and DHCP Server ...
  • Page 14: Cap Mode (Centralizes Access Point)

    CAP mode (Centralizes Access Point) Please click on System ->Mode Setup and choose CAP Mode ontrol Management of CenOS5.0 APs  AP Management support 802.1Q VLAN infrastructure  Centralized setting Access Point function and firmware upgrade.  APs Group management for concept. ...
  • Page 15: Router Mode

    Router mode It can be deployed as a gateway with wireless Access Point  Built-in DHCP Server.  Security suport firewall / Access Control / IP and MAC filter  System Configuration There are common functions in any mode have management / Time Server / SNMP and Time Policy.
  • Page 16  System Language: Administrator can select system language for English and Traditional Chinese  System Information: Administrator can set the system name / Description and Location.  Root Password: Administrator can change system login password.  LED Control:When system working the moment, device LED will flashes. Administrator can select close the LED flashes in the function.
  • Page 17  System Log Setup: Administrator can be backup system log or authentication log to remote server. Please enter IP address and port of remote syslog server. Auto Reboot: The functions can Auto-reboot the system by Date/time management.  Daily: Setting time to system reboot. ...
  • Page 18: Configure Time Server

    Click “Save” button to save your changes. And click “Reboot” button to activate your changes Configure Time Server Administrator can select manual or via a NTP server to modify system time for the right local time. If select update the system time for manual, when administrator reboot system the system time will reply default.
  • Page 19: Snmp

    Time Zone: Administrator can select a desired time zone from the drop-down list.  Daylight saving Time: Enable or disable Daylight saving.   Manual: Administrator must to set the system time. Click “Save” button to save your changes. And click “Reboot” button to activate your changes SNMP SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents.
  • Page 20 SNMP v3 function Active: Administrator can select Enable or Disable the service.  RO username: Set a community string to authorize read-only access.  Ro password: Set a password to authorize read-only access.  RW username: Set a community string to authorize read/write access. ...
  • Page 21: Configure Time Policy

    Time Policy Please click Edit button to setting Time Policy rules. Comment: Enter the description of Time Policy rule.  Mode: Administrator can select On schedule or Out of schedule to execution the rules.  Create New Policy button: Administrator can set time for week / start time and end time. V1.0...
  • Page 22: Access Point Mode

    Click “Save” button to add schedule to policy. There are 10 schedule maximum allowed in the each time policy. All schedules can be edited or removed in the each time policy. Click Reboot button to activate your changes. Access Point mode When AP mode is chosen, the system can be configured as an Access Point.
  • Page 23 VLAN Mode:Display on/off for the VLAN network.  Flag:Display master VLAN and VLAN Tag No. information.  IP Address:Display IP Address for VLAN Network.  NetMask:Display IP netmask.  Radio 0:Display radio 2.4G SSID name.  Radio 1:Display radio 5G SSID name. ...
  • Page 24: Network Setup

    # Network Setup Network button Administrator can click button to set VLAN network functions. VLAN Mode:Administrator can select Enable or disable for the VLAN Network.  At least one VLAN will always be enabled by default IP Mode:Administrator can select enable or disable function for VLAN IP. ...
  • Page 25: Network Pull-Down Menu

    VLAN Tag Setup: Set the VLAN used tags.  # Network Pull-down menu Administrator can set DHCP Server and 2.4/5G security for the access point and set 802.11r fast roaming. Please click pull-down button. 3.1.1 DHCP Server Administrator can select enable / disable the function ...
  • Page 26  End IP : Set End IP for DHCP Service.  Netmask: Set IP Netmask, the default is 255.255.255.0  Gateway: Set Gateway IP for DHCP Service.  DNS(1-2) IP : Set DNS IP for DHCP Service. WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server; this is optional. ...
  • Page 27: Bandwidth Control

    3.1.2 Bandwidth Control Administrators can set bandwidth limit the max/min bandwidth of the Wi-Fi users, Bandwidth control can set IP/MASK , IP Range, Port(Service), SIP, RTP/RTSP and WEB. Airtime Faimess: TX/RX traffic balancing, if device use point-to-point ( WDS or AP mode + ...
  • Page 28: Radio 0(2.4G)/1(5G) Access Point Setup

    3.1.3 Access Point 2.4G/5G Setup Administrator can Enable or Disable radio 0/1 (2.4/5G) Wi-Fi. If radio 0/1 (2.4/5G) are enabled, administrators can set the SSID and security for the 2.4/5G access point. Access Point: Administrator can Enable or Disable the radio 0/1 (2.4G/5G). ...
  • Page 29 WPA Mode: Administrator can select security for Auto or only WPA or only WPA2.  Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption  method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext.
  • Page 30: Mac Filter

    Radius Server:Enter the IP address of the Authentication RADIUS server.  Radius Port: The port number used by Authentication RADIUS server. Use the default  1812 or enter port number specified. Radius Secret: The secret key for system to communicate with Authentication RADIUS ...
  • Page 31: Fast Roaming Setup

    (1 ) Only Deny List MAC:Administrator can add wireless users MAC address in MAC list. The access point will deny connection in MAC address list. (2) Only Allow List MAC:Administrator can add wireless users MAC address in MAC list. The access point will allow connection in MAC address list.
  • Page 32 Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same  SSID) between which a STA can use Fast BSS Transition. Please enter 2-octet identifier as a hex string. R0 Key Lifetime: Default lifetime of the PMK-RO in minutes, the default is 10000, administrator ...
  • Page 33: Authentication

    R1 Key holders : Enter a unified set of R1 Key Holder identification certification. MAC Address: Enter the main roaming device MAC address  R1 Identifier: Enter Shared identifier.  128-bit Key: Enter Shared Key of 128 bit.  After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally.
  • Page 34: Enable Authentication Function

    #:Display VLANs number.  VLAN Mode:Displays VLAN on/off status. (Please refer to 3.2 VLAN Setup)  Authentication:Displays VLAN# whether enable or disable web authentication.  Action:The function has 2 buttons (Authentication and Dropdown)  3.2.1 Enable Authentication function : By clicking the Authentication button, administrator can enable or disable this function.
  • Page 35 Login URL:Administrator can set URL for login page.  Authentication Log: If network have Syslog server. Administrator can to  systemmanagement setting IP address for syslog server and enable the function. Authentication user login/logout log will copy to syslog server. Session Log:If network have Syslog server.
  • Page 36: Set Authentication Function

    3.2.2 Set Authentication function : By Clicking the Dropdown button, Administrators can set authentication functions. 1. Authentiction Type support Guest / Local User / OAuth2.0(Google/Facebook) and E-Mail (PoP3/IMAP) 2. Administratior can customization Login page and Language of page. 3. Support Walled Garden(URL whitelist) and Account privilege address.
  • Page 37: Local User

    Local User Administrator can create local user account for web login. User Name: Administrator can create users account.  Password:Set account password.  # OAuth2.0 The OAuth2.0 function supports Facebook and Google by default. Users can add additional OAuth2.0 servers through UI settings. #:Display items.
  • Page 38: Sample For Google Oauth2.0 Setup

    Sample for Google OAuth2.0 setup Please complete the application on the Google website to receive an account ID and password, follow the steps below. Step.1 Please go to the Google Developers Console page and create a project (Reference https://developers.google.com/identity/protocols/OAuth2) Step.2 Click Credentials to create OAuth client ID in the API manager page.
  • Page 39 Step.3 Select web application in the “Application Type” section and set “Restrictions” URL. Step.4 Set Authorized JavaScript origins and Authorized redirect URLs (important) Administrator must set login URL in the device function. After complete set of login URL go to the “Restrictions”...
  • Page 40 After complete set of login URL go to the “Restrictions” function in web page. Copy and paste the login URL from the system display into the “Restriction” page on the Google Developer website. Google Authorized JavaScript origins URL is http://domain0.login.com (same as Login URL) ...
  • Page 41: Sample For Facebook Oauth2.0 Setup

    Sample for Facebook OAuth2.0 setup Please complete the application on the Facebook website to receive an account ID and password, follow the steps below. Step.1 Please to Facebook developer’s page and add a New App Step.2 Select WWW function Step.3 Administrator must set www for your information.
  • Page 42 Step.4 Please click “Setting” and add Platform Step.5 Select Platform for “Website” Step.6 Enter URL is http://domain0.login.com/login/index.cgi?cgi=CALLBACK Administrator must set login URL in the device function. After complete set of login URL go to the “Facebook function in web page. Follow the steps below to set login URLs Site URL”...
  • Page 43 After complete set of login URL go to the “Facebook function in web page. Copy and Site URL” paste the login URL from the system display into the “ Site URL” page on the Facebook website. Step.7 Click Advanced function to enable the “Native or desktop app?”...
  • Page 44: Pop3/Imap Server

    Client ID and Client Secret setup by third parties such as Facebook and Google are subject to change. The instructions above follow the 2016 setup procedure. Any future changes to the Facebook/Google process may lead to our instructions becoming invalid. # POP3/IMAP Server The purpose of this integrated function is to allow clients to link a POP3 server for receiving emails from a remote server.
  • Page 45: Customize Page

    Host : Define the desired Host server name.  Port : Input the proper port number for the corresponding server.  Connect Type : Select the Connect type with options of “STARTTLS”, “SSL/TTL”, or “None”.  POP3 Server Test : Use this tool to test if the POP3 server is operating correctly with your ...
  • Page 46  Sample: See sample login page below that is customized by html coding (sample login page html code templates are available on Cerio website) The following function uses the enabled Template Multiple Language:Administrator can select enable or disable multiple language for login ...
  • Page 47: Language

    Language Administrator can create other language for login page. Click “Create New Language” button go to add or edit language for login page. Language: Set description of language.  Default Language: Display default language.  # Walled Garden This function provides certain free services or advertisement web pages for users to access the websites listed before login and authentication.
  • Page 48: Profile

    Device Name: Enter Device or Users Name.  IP Address: Enter used IP Address of Device or Users PC.  MAC Address: Enter MAC Address of Device or Users PC.  After the above function is setup, please click "Save" button and reboot system will apply new profile and working normally.
  • Page 49: Radius Server

    RADIUS Server This function only used to operate in Access Point mode. Service:Administrator can select Enable or disable the function.  Radius:Administrator must to set remote RADIUS Server use Port.  Radius Secret:Administrator must to set remote RADIUS Server use Key. ...
  • Page 50: Wireless Configuration

    User Name:Create users name for RADIUS account.  Password:Enter password for user name.  Export User File:Administrator can export account list in RADIUS Server.  Import From PC:Administrator can import account list to the RADIUS Server.  Click “Save” button to save your set function. Then click Reboot button to activate your changes. Wireless Configuration This wireless functions administrator can set radio 2.4/5G application of the Access Point.
  • Page 51 MAC Address: Display 2.4G WiFi MAC address.  Country: Administrator can select country: US or EU or Taiwan.  Band Mode: Administrator can select 802.11b/g/n for the 2.4G Band.  Auto Channel: Administrator can Enable or Disable the function. If disabled, the WiFi channel ...
  • Page 52 HT Physical Mode TX/RX Stream: Support 2TX/2RX streams. Administrator can select 1 or 2 TX/RX. The default is  2TX/2RX. Channel Bandwidth: The "20/40” MHz option is usually best. The other option is available for  special circumstances. Extension Channel: Sets channel select to Upper or Lower. The Upper supports 1 to 7 range ...
  • Page 53: Radio 1 Setup(5G)

    3.5.2 Radio 1 Setup(5G) MAC Address: Display 5G WiFi MAC address.  Country: Administrator can select country: US or EU or Taiwan.  Band Mode: Administrator can select 5G Band for 802.11a/n or 802.11ac. The default is 802.11ac  Auto Channel: Administrator can Enable or Disable the function. If select disabled function the ...
  • Page 54 All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK Timeout”. ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment.
  • Page 55: Advanced Setup

    3.5.3 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Recommend use default. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 56 Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in  all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
  • Page 57: Wmm Setup

    3.5.4 WMM Setup This affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
  • Page 58 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 59: Wds Setup

    While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.
  • Page 60: Wds Status

    WDS Setup: Administrator can select Enable or Disable.  Authentication: Administrator can use AES security.  WDS Client Setup: Administrator can used 2.4G or 5G for WDS Links. A Single Radio supports  up to 8 WDS links. VLAN Setup: The WDS aisle support Multi-tag VALN ...
  • Page 61: Client Bridge Mode

    4. Client Bridge Mode When Client Bridge is chosen, the system can be configured as a Client Bridge and support Repeater AP function. This can setup VLAN and DHCP server in the system menu. This section provides detailed explanation for users to configure in the Client Bridge Mode and Repeater AP function with help of illustrations.
  • Page 62 DNS: Enter IP address of domain name service.   Primary DNS: The IP address of the primary DNS server.  Secondary: The IP address of the secondary DNS server. 802.1d Spanning Tree :  The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7.
  • Page 63: Configure Dhcp Setup

    DHCP Setup The DHCP Service function in the Client Bridge device can select a separate IP Address range within the same network segment of the source AP, and allocate those IP Addresses to connecting clients. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP ...
  • Page 64 IP Address: Display users used IP address.  MAC Address: Display MAC Address of users used device.  Expired: Display Lease expiration time of IP address.  Action: Kicked user button.  Static Lease IP Setup: Administrator can set as static IP address for users. Comment: Enter description for the information.
  • Page 65: Wireless General Setup

    4.3 Wireless General Setup The main setup Client Bridge connection to AP Station and Repeater AP functions setting, MAC filter, WMM and 802.11r/802.11k Fast Roaming etc in wireless menu. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally.
  • Page 66 Slot Time : Slot time is in the range of 9~1489 and set in unit of microsecond. The default  value is 9 microsecond. Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time decreases the overall back-off, which increases throughput.
  • Page 67 HT Physical Mode TX/RX Stream: Supporting 2TX/2RX streams. Administrator can select 1 or 2 TX/RX. The  default is 2TX/2RX. Channel Bandwidth: The "20/40” MHz option is usually best. The other option is available for  special circumstances. Extension Channel: Set channel select of Upper or Lower, the Upper support 1 to 7 range CH ...
  • Page 68: Radio 1 (5G) Basic Setup

    4.3.2 Radio 1 (5G) Station Mode: When administrator select enable mode will used this radio in the client bridge function. If select disable then used Repeater AP function. MAC Address: Display radio 1 used MAC address.  Country: Administrator can select country used channel by US / EU and Taiwan. ...
  • Page 69 All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK Timeout”. ACK Timeout is adjustable due to the fact that distance between two radio links may vary in different deployment.
  • Page 70: Advanced Setup

    4.3.3 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Recommend use default. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 71 A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless throughput in multicast applications.
  • Page 72: Wmm Setup

    RF on/off by Schedule: When system enable and set time policy function then RF on/off can  apply time policy in the function.( Time Policy function set please go to system  Time Policy) Location Tracking Log: This feature can provides information to third-party positioning systems. ...
  • Page 73 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 74: Station Setup

    TxOP Limit:Transmission Opportunity is an interval of time when a WME AP has the right to  initiate transmissions onto the wireless medium (WM). This value specifies (in milliseconds) the Transmission Opportunity (TXOP) for AP; that is, the interval of time when the WMM AP has the right to initiate transmissions on the wireless network.。...
  • Page 75: Repeater Ap Setup

    MAC Address List: The function can discovery AP Station and select want to link the AP station,  please click site survey button. If want to discovery 2.4G station then administrator need to enable station mode in Radio 0 function page (reference manual 4.3.1 Radio0). Same practice if want to discovery 5G station will need to enable station mode in Radio 1 function page (reference manual 4.3.2 Radio1).
  • Page 76 Connection Limit: This function is Disabled by default. If select Enable, Administrator can limit  Wi-Fi users the Quantity. Authentication: Select the desired security type from the drop-down list; the options are  WPA-PSK, WPA2-PSK, WPA/WPA2-Enterprise and WEP 802.1X.  Open System: Data are not unencrypted during transmission when this option is selected. ...
  • Page 77: Mac Filter Setup

    4.3.7 MAC Filter Setup Administrator can setup allow or reject WiFi clients(MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable,  Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
  • Page 78: Fast Roaming Setup

    4.3.8 802.11r Fast Roaming Setup 802.11r/802.11k function for 2.4G and 5G radio. 802.11r, which is the The system support IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
  • Page 79 MAC Address: Enter must key in the MAC Address of other AP  NAS Identifier: Enter 1~48 octets of network domain name.  Shared Key of 128 bit. 128-bit Key: Enter  R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
  • Page 80: Wisp Mode

    5. WISP Mode Relevant to Dual Band Devices Only: If wireless WAN used 2.4G radio connection to Telecom company station, the Repeater AP radio only used 5G radio. So wireless WAN used 5G radio connection to Telecom company station, the Repeater AP radio only used 2.4G radio. WISP Mode is a router function, if the Telecom company permits wireless connection to their WAN, administrators can change the CenOS 5.0 AP to WISP Mode to connect to the wifi network.
  • Page 81 Dynamic IP: Please consult with WISP for correct wireless settings to associate with WISP AP  before a dynamic IP, along with related IP settings. If IP Address is not assigned, please double check with your wireless settings and ensure successful association. Also, you may go to “WAN Information”...
  • Page 82 Manual – Click the “Connect” button on “WAN Information” in the Overview page to  connect to the Internet. PPTP: The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of  secure multi-protocol Virtual Private Networks (VPNs) through public networks. User Name: Enter account for PPTP.
  • Page 83 When Time Server is enabled at the “On Demand” mode, the “Reconnect Mode” will turn out “Always on”. Manual – Click the “Connect” button on “WAN Information” in the Overview page to  connect to the Internet. MAC Clone  The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification.
  • Page 84: Configure Lan Setup

    LAN Setup Here are the instructions for how to setup the local IP Address and Netmask. Please click on System -> LAN and follow the below setting. IP Setup: The administrator can manually setup the LAN IP address. IP Address : The IP address of the LAN port; default IP address is 192.168.2.254 ...
  • Page 85: Configure Dhcp Server

    DHCP Server The DHCP Service function in the Client Bridge device can select a separate IP Address range within the same network segment of the source AP, and allocate those IP Addresses to connecting clients. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP ...
  • Page 86 DHCP Clients List: When users link to the CenOS 5.0 AP and use IP address of the DHCP service, the DHCP Client List will display users the information and used IP address. IP Address: Display users used IP address.  MAC Address: Display MAC Address of users used device.
  • Page 87: Wireless General Setup

    5.4 Wireless General Setup The main setup Client Bridge connection to AP Station and Repeater AP functions setting, MAC filter, WMM and 802.11r/802.11k Fast Roaming etc in wireless menu. If want to use Repeater AP function then Clinet Bridge must determine connection to Access Point then Repeater AP can operate normally.
  • Page 88 Slot Time : Slot time is in the range of 9~1489 and set in unit of microsecond. The default  value is 9 microsecond. Slot time is the amount of time a device waits after a collision before retransmitting a packet. Reducing the slot time decreases the overall back-off, which increases throughput.
  • Page 89 TX/RX Stream: Supporting 2TX/2RX streams. Administrator can select 1 or 2 TX/RX. The  default is 2TX/2RX. Channel Bandwidth: The "20/40” MHz option is usually best. The other option is available for  special circumstances. Extension Channel: Set channel select of Upper or Lower, the Upper support 1 to 7 ranges CH ...
  • Page 90: Radio 1 (5G) Basic Setup

    5.4.2 Radio 1 (5G) MAC Address: Display radio 1 use MAC address.  Country: Administrator can select country used channel by US / EU and Taiwan.  Band Mode: Administrator can select 5G Band for 802.11a/n or 802.11ac. The default is ...
  • Page 91 ACK Timeout : ACK timeout is in the range of 1~372 and set in unit of microsecond. The default  value is 64 microsecond. All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK Timeout”.
  • Page 92: Advanced Setup

    recommends use default value is 500000. Aggregation Size: Set aggregation size, the size  Recommend use default. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 5.4.3 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. ...
  • Page 93 A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless throughput in multicast applications.
  • Page 94: Wmm Setup

    RF on/off by Schedule: When system enable and set time policy function then RF on/off can  apply time policy in the function.( Time Policy function set please go to system  Time Policy) Location Tracking Log: This feature can provides information to third-party positioning ...
  • Page 95 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 96: Station Setup

    ACM bit:Admission Control Mandatory, ACM only takes effect on AC_VI and AC_VO. When  you do not click Checkbox, it means that the ACM is controlled by the connecting AP. If you click Checkbox, it means that the Client is in charge。 No ACK policy bit:Acknowledgment Policy, WMM defines two ACK policies: Normal ACK and ...
  • Page 97: Repeater Ap Setup

    If want to discovery 2.4G station then administrator need to enable station mode in Radio 0 function page (reference manual 4.3.1 Radio0). Same practice if want to discovery 5G station will need to enable station mode in Radio 1 function page (reference manual 4.3.2 Radio1).
  • Page 98 Connection Limit: This function is disabled by default. If select Enable, Administrator can limit  Wi-Fi users the Quantity. Authentication: Select the desired security type from the drop-down list; the options are  WPA-PSK, WPA2-PSK, WPA/WPA2-Enterprise and WEP 802.1X.  Open System: Data are not unencrypted during transmission when this option is selected. ...
  • Page 99: Mac Filter Setup

    5.4.7 MAC Filter Setup Administrator can setup allow or reject WiFi clients(MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable,  Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted ...
  • Page 100: Fast Roaming Setup

    5.4.8 802.11r Fast Roaming Setup 802.11r function for 2.4G and 5G radio. 802.11r, which is the IEEE The system support standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the ...
  • Page 101 MAC Address: Enter must key in the MAC Address of other AP  NAS Identifier: Enter 1~48 octets of network domain name.  Shared Key of 128 bit. 128-bit Key: Enter  R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
  • Page 102: Router Mode

    6. Router Mode When Router AP mode is chosen, the system can be configured as an Router AP mode. This section provides detailed explanation for users to configure in the Router AP mode with help of illustrations. In the Router AP mode, functions listed in the table below are also available from the Web-based GUI interface.
  • Page 103 Dynamic IP: Please consult with WISP for correct wireless settings to associate with WISP AP  before a dynamic IP, along with related IP settings. If IP Address is not assigned, please double check with your wireless settings and ensure successful association. Also, you may go to “WAN Information”...
  • Page 104 Manual – Click the “Connect” button on “WAN Information” in the Overview page to  connect to the Internet. PPTP: The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of  secure multi-protocol Virtual Private Networks (VPNs) through public networks. User Name: Enter account for PPTP.
  • Page 105 When Time Server is enabled at the “On Demand” mode, the “Reconnect Mode” will turn out “Always on”. Manual – Click the “Connect” button on “WAN Information” in the Overview page to  connect to the Internet. MAC Clone  The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification.
  • Page 106: Configure Lan Setup

    LAN Setup Here are the instructions to setup the local IP Address / Netmask / Gateway / DNS and management Access Point 2.4G or 5G Radio on/off. Administrators can change settings such as LAN Spanning Tree and Tag VLAN functions. VLAN Mode:Display on/off for the VLAN network.
  • Page 107: Network Pull-Down Menu

    802.1d Spanning Tree : The spanning tree network protocol provides a loop free topology for  a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7. The Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE Standard 802.1d Control Port:Administrator can select one of the VLAN as managed AP.
  • Page 108  Start IP : Set Start IP for DHCP Service.  End IP : Set End IP for DHCP Service.  Netmask: Set IP Netmask, the default is 255.255.255.0  Gateway: Set Gateway IP for DHCP Service.  DNS(1-2) IP : Set DNS IP for DHCP Service. WINS IP : Enter IP address of the Windows Internet Name Service (WINS) server;...
  • Page 109: Bandwidth Control

    Comment : Enter rule description.  IP Address : Enter access point IP.  MAC Address : Enter Client MAC Address of PC network.  Click “Save” button to save your changes. Then click Reboot button to activate your changes. 6.2.2 Bandwidth Control Administrators can set bandwidth limit the max/min bandwidth of the Wi-Fi users, Bandwidth control can set IP/MASK , IP Range, Port(Service), SIP, RTP/RTSP and WEB.
  • Page 110: Radio 0(2.4G)/1(5G) Access Point Setup

    QoS Rule List: Administrator can set bandwidth limit by IP/MASK, IP Range, Port(Service), SIP,  RTP/RTSP, WEB protocol , each VLAN can set 10 bandwidth management rule. Click “Save” button to save your changes. Then click Reboot button to activate your changes. 6.2.3 Access Point 2.4G/5G Setup Administrator can Enable or Disable radio 0/1 (2.4/5G) Wi-Fi.
  • Page 111 Client Isolation: Enable or Disable the client isolation function.  Connection Limit: Administrator can select Enable or Disable WiFi connection Limit.  User Limit: If select enable of the connection Limit function, administrator can set users  connection limit.( Recommended 2.4G/5G limit 40/60 Wi-Fi Users) Security Type: Select the desired security type from the drop-down list;...
  • Page 112 Group Key Update Interval: The time interval is for re-keying GTK  (broadcast/multicast encryption keys) in seconds. Enter the time-length required; the default time is 600 seconds. Pass Phrase: Enter the ESSID pass phrase.  WPS: Administrator can used WPS function to link WiFi client. If enabled, ...
  • Page 113: Mac Filter

    6.2.4 MAC Filter (1 ) Only Deny List MAC:Administrator can add wireless users MAC address in MAC list. The access point will deny connection in MAC address list. (2) Only Allow List MAC:Administrator can add wireless users MAC address in MAC list. The access point will allow connection in MAC address list.
  • Page 114: Fast Roaming Setup

    6.2.5 802.11r Fast Roaming Setup The dual band Access Point supports 802.11r/802.11k function for 2.4G and 5G radio. 802.11r, which is the IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same ...
  • Page 115 R0 Key Holder: To enable roaming between multiple AP devices, AP1 must key in the MAC Address of AP2, and AP2 must key in the MAC Address of AP1. The NAS Identifier and 128-bit Key should be identical in both AP settings.
  • Page 116: Wireless General Setup

    6.3 Wireless General Setup 6.3.1 Radio 0 Setup (2.4G) MAC Address: Display 2.4G WiFi MAC address.  Country: Administrator can select country: US or EU or Taiwan.  Band Mode: Administrator can select 802.11b/g/n for the 2.4G Band.  Auto Channel: Administrator can Enable or Disable the function. If disabled, the WiFi channel ...
  • Page 117 ACK Timeout:ACK timeout is in the range of 1~372 and set in unit of microsecond. The default  value is 64 microsecond. All data transmission in 802.11b/g request an “Acknowledgement” (ACK) send by receiving radio. The transmitter will resend the original packet if correspondent ACK failed to arrive within specific time interval, also refer to as “ACK Timeout”.
  • Page 118: Radio 1 Setup(5G)

    A part of the 802.11n standard (or draft-standard), it allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source and destination end points and traffic class (i.e.
  • Page 119 Then, following ownership of the channel will be sooner for the new pair due to shorter slot time. However, when long duration of existing collision sources and shorter slot time exist the owners might experience subsequent collisions. When adjustment to longer slot time can’t improve performance then RTS/CTS could supplement and help improve performance.
  • Page 120: Advanced Setup

    6.3.3 Advanced Setup Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The  default value is 100 msec. Recommend use default. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
  • Page 121 Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in  all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
  • Page 122: Wmm

    Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. 6.3.4 WMM His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic.
  • Page 123 AC Type:  Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
  • Page 124: Advanced Setup

    When the no acknowledgement (No ACK) policy is used, the recipient does not acknowledge received packets during wireless packet exchange. This policy is suitable in the environment where communication quality is fine and interference is weak. While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates.
  • Page 125: Ip Filter

    Automatic Assignment: Enter Internal IP address of DMZ host and only one DMZ host is  supported. Internal IP Address: Enter Virtual IP for service device.  Static Assignment: Enter external and internal IP address of DMZ host. The function only ...
  • Page 126: Mac Filter

    Active: Administrator can select Enable or Disable the service.  Comment: Enter the description of IP filter rule.  Policy: Administrator can select the IP flow rule of Deny or Pass.  In/ Out: Administrator can select the IP flow rule of In/out bound. ...
  • Page 127: Virtual Server

    Mode: Administrator can select Deny or Allow.  Deny: The MAC Filter List will be denied to access (LAN to WAN). Others will be allowed.  Allow: The MAC Filter List will be allowed to access (LAN to WAN). Others will be denied. ...
  • Page 128 Please click Edit button to setting Virtual Server rules. Active: Administrator can select Virtual server rule to Enable or disable.  Comment: Enter the description of virtual server rule.  Protocol: Administrator can select service protocol of TCP or UDP. ...
  • Page 129: Access Control

    7.1.5 Access Control The Access Control function administrator can to block or allow specific kinds of TCP/UDP/ICMP protocol, such as Internet access, designated services, and websites. The Access Control function can set 20 profiles. Please click on Advance -> Access Control and follow the below setting. #:Display access control list.
  • Page 130: Cap Mode

    ANY: Select "Any" is all deny Protocol, administrator can filter local IP / IP range go to  destination IP / IP range and use protocol. TCP: Deny TCP Protocol, Administrator can set TCP protocol and assign IP / IP range. ...
  • Page 131  #:Display VLAN No.  VLAN Mode:Display on /off line status for the VLAN mode  IP Address:Display IP address for the VLAN mode.  NetMask:Display netmask for the VLAN mode.  Action:Administrator can set VLAN IP、Radio 2.4 or 5G on/off、Spanning tree、IAPP and VLAN tag. VLAN Mode:Administrator can Enable or disable the VLAN function.
  • Page 132: Ap Control

    ETH0:Administrator select Enable/disable the Ethernet port.  VLAN Tag:Administrator can set Tag ID for the Ethernet port.  Set Gateway / DNS address functions.  Gateway: The default Gateway IP Address is 192.168.2.1, Please check your Gateway IP and  change.
  • Page 133: Scan Device

    8.2.1 Scan Device This management page can discover all managed APs in the network. Administrator can set IP address / Password and VLAN tag for managed APs. After the setup is complete, Administrator must import all managed APs to databases. VLAN# : Administrator can select VLAN network to discovery managed Aps ...
  • Page 134: Batch Setup

    NetMask:Administrator can set NetMask for managed APs.  When the setting managed APs is completed, please click Apply & Reboot button to complete the setup process. 8.2.2 Batch Setup The AP control function supports centralized configuration of managed APs. Administrator can change VLAN network / Group and batch setup for managed APs.
  • Page 135 VLAN:The function can select VLAN (please refer to 3.1 Configure VLAN Setup) for  managed APs. VLAN Mode:Administrator can enable or disable VLAN mode of the managed APs.  Access Point0/1:Administrator can enable or disable 2.4G or 5G radio of the ...
  • Page 136: Ap Setup

    Authentication Profile:After creating Profiles, See: “Authentication Profile” users can  conveniently apply Authentication profiles Gateway & DNS: Setting Gateway and DNS for managed APs.  Time Server: Setting System Time for managed APs.  Management Setup: Setting system name/ system login port and system log server service ...
  • Page 137: Group Setup

    8.2.4 Group Setup Administrator can create Groups within the same VLAN. VLAN:Select VLAN.  Create New Group:Click the button to create a new AP Group  Device button:Administrator can select managed APs and import them into the Group.  8.2.5 Map Setup The Map Setup feature allows administrators to upload a floor plan image to a web server, then use the image URL to import the map into the AP user interface.
  • Page 138 :Once the Map is created and properly in the Map List, administrators can click the “Layout” button in the action tab to map out the AP network. Managed APs will appear in the “Device List” section of the layout page. Administrators can simply drag the AP (IP Address) to the correct installation location.
  • Page 139: Authentication Profile

    8.2.6 Authentication Profile Administrator can pre-set authentication conditions in the profile, the authentication set can refer 3.2 Authentication. Create New Profile:Administrator can create authentication profile.  Edit: Click the Authentication button to Enable or Disable authentication  function. For more details, refer to “3.2 Authentication”. Click Dropdown to set authentication functions.
  • Page 140: Utilities

    9. Utilities Administrator can backup or restore system configuration / firmware Upgrade / ping tools and system reset to default or reboot system. 9.1 Profile Setting This Functions purpose is to backup current configuration, restore prior configuration or reset back to factory default configurations.
  • Page 141: System Upgrade

    Load Settings from PC: Click Browse button to locate a configuration file to restore, and then click  Upload button to upload. Reset To Factory Default: Click Default button to reset back to the factory default settings and  expect Successful loading message. Then, click Reboot button to activate. 9.2 System Upgrade Firmware is the main software image that system needs to respond to requests and to manage real time operations.
  • Page 142 Select File: Administrator can select Firmware file in Local PC.  Upgrade Via Local PC and TFTP Server: The upgrade firmware will support via local PC and TFTP Server and HTTP URL to upgrade system. 1. To prevent data loss during firmware upgrade, please back up current settings before proceeding 2.
  • Page 143: Network Utility

    9.3 Network Utility The administrator can diagnose network connectivity via the PING or TRACEROUTE utility. Please click on Utilities -> Network Utility and follow the below setting. Ping: This utility will help ping other devices on the network to verify connectivity. Ping utility, ...
  • Page 144: Status

    10. Status The status mainly displays system related information, including system network information, wireless base station information, and wireless user connection information. 10.1 Overview Detailed information on System, Network can be reviewed via this page. V1.0...
  • Page 145: Wireless Client

    10.2 Wireless Client The page can be display Wireless user information link to access point. Administrator can monitor MAC In addition to CAP mode) address / rate and RSSI for the wireless users. ( Radio:Display information for wireless client connection Radio 0 or 1 ...
  • Page 146: Authentication Log

    Download Packets:Display total download packets amount information by user.  Upload Packets:Display total upload packets amount information by user.  Download Bytes:Display total download flow information by user.  Upload Bytes:Display total upload flow information by user.  10.4 Authentication Log The authentication log can monitor account login/logout type and account use time.
  • Page 147: Appendix A. Web Gui Valid Characters

    Appendix A. WEB GUI Valid Characters Table B WEB GUI Valid Characters Block Field Valid Characters IP Address IP Format; 1-254 IP Netmask 128.0.0.0 ~ 255.255.255.252 IP Gateway IP Format; 1-254 Primary DNS IP Format; 1-254 Secondary DNS IP Format; 1-254 Hostname Length : 32 0-9, A-Z, a-z...
  • Page 148 Table B WEB GUI Valid Characters (continued) Block Field Valid Characters Management System Name/ Location Length : 32 0-9, A-Z, a-z Space ~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . = Description 32 chars Password...
  • Page 149 Table B WEB GUI Valid Characters (continued) Block Field Valid Characters Virtual AP Setup ESSID Length : 31 Space 0-9, A-Z, a-z ~ ! @ # $ % ^ * ( ) _ + - { } | : < > ? [ ] / ; ` , . = Maximum Clients 1 ~ 32 VLAN ID...

Table of Contents