Advertisement

Quick Links

Questo manuale d'istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per
TP-Link EAP225
o
cerca il tuo prodotto tra le
migliori offerte di Router
User Guide
For TP-LINK Auranet Access Points
REV1.3.0
1910011858

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Auranet EAP225 and is the answer not in the manual?

Questions and answers

Summary of Contents for Topband Auranet EAP225

  • Page 1 Questo manuale d’istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per TP-Link EAP225 cerca il tuo prodotto tra le migliori offerte di Router User Guide For TP-LINK Auranet Access Points REV1.3.0 1910011858...
  • Page 2 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP- LINK TECHNOLOGIES CO., LTD.
  • Page 3 FCC STATEMENT (EAP110/EAP320/EAP330/EAP225) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: 1)...
  • Page 5 RF Exposure Information This device meets the EU requirements (1999/5/EC Article 3.1a) on the limitation of exposure of the general public to electromagnetic fields by way of health protection. The device complies with RF specifications when the device used at 20 cm from your body. National Restrictions (EAP220/EAP320/EAP330/EAP225) Restricted to indoor use.
  • Page 6 2) Le gain maximal d'antenne permis pour les dispositifs avec antenne(s) amovible(s) utilisant la bande 5725-5850 MHz doit se conformer à la limitation P.I.R.E spécifiée pour l’exploitation point à point et non point à point, selon le cas. En outre, les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
  • Page 7 Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність вимогам нормативних документів та вимогам, що передбачені чинними законодавчими актами України. Safety Information When product has power button, the power button is one of the way to shut off the product; ...
  • Page 8 ●清潔本產品之前請先拔掉電源線。請勿使用液體、噴霧清潔劑或濕布進行清潔。 ●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 (EAP120/EAP220)此為甲類資訊技術設備, 于居住環境中使用時, 可能會造成射頻擾動, 在此 種情況下,使用者會被要求採取某些適當的對策。 (EAP220/EAP320/EAP330/EAP225) For EU/EFTA, this product can be used in the following countries: Explanation of the symbols on the product label Symbol Explanation DC voltage RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE).
  • Page 9: Table Of Contents

    CONTENTS About this User Guide .............................. 1 Chapter 1 Introduction ............................2 Chapter 2 Network Topology .......................... 3 Chapter 3 Management Mode........................4 Standalone Mode ..........................4 Managed Mode ..........................4 Switch to Standalone Mode ......................4 Chapter 4 Network .............................. 5 Chapter 5 Wireless ...............................
  • Page 10 6.2.1 SSID List ..........................42 Client ..............................43 6.3.1 User List ..........................43 6.3.2 Portal Authenticated Guest .................... 44 Chapter 7 Management ..........................46 System Log ............................. 46 7.1.1 Log List ........................... 46 7.1.2 Log Settings .......................... 47 7.1.3 Backup Log ........................... 48 Web Server............................
  • Page 11: About This User Guide

    About this User Guide When using this guide, please notice that features of the EAP may vary slightly depending on the model and software version you have, and on your location, language, and Internet service provider. All screenshots, images, parameters and descriptions documented in this guide are used for demonstration only.
  • Page 12: Chapter 1 Introduction

    Chapter 1 Introduction Auranet series products provide wireless coverage solutions for small-medium business. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily-configured enterprise- grade wireless network for small and medium business. ‘‘Celling lamp’’...
  • Page 13: Chapter 2 Network Topology

    Chapter 2 Network Topology A typical network topology for the EAP is shown below. Figure 2-1 Typical Topology To deploy an EAP in your local network, a DHCP server is required to assign IP addresses to the EAP and clients. Typically, a router acts as the DHCP server. A computer running the EAP Controller software can locate in the same or different subnet with the EAPs.
  • Page 14: Chapter 3 Management Mode

    Chapter 3 Management Mode Auranet series products can either work under the control of the EAP Controller software or work independently as a standalone access point. When user establishes a large-scale wireless network, the management of every single AP in the network is complex and complicated.
  • Page 15: Chapter 4 Network

    Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page By default, the EAP device obtains an IP address from a DHCP server (typically a Dynamic/Static: router). Select Static to configure IP address manually. If the EAP fails to get a dynamic IP address from a DHCP server within ten Fallback IP: seconds, the fallback IP will work as the IP address of the device.
  • Page 16: Chapter 5 Wireless

    Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below. Figure 5-1 Wireless Page...
  • Page 17: Wireless Settings

    5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page...
  • Page 18: Wireless Basic Settings

    TIPS: Proceed to the following chapter for information on configuring the wireless network of the EAP. The configuring information of 2.4GHz is taken as the example. 5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Check the box to enable 2.4GHz Wireless Radio. Radio: Wireless Mode: Select the protocol standard for the wireless network.
  • Page 19: Ssids

    Tx power: Enter the transmit power value. By default, the value is 20. If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation. NOTE: In most cases, it is unnecessary to select maximum transmit power. Selecting larger transmit power than needed may cause interference to neighborhood.
  • Page 20 Enable this function, AP will broadcast its SSID to hosts in the surrounding SSID environment, as thus hosts can find the wireless network identified by this SSID. If Broadcast: SSID Broadcast is not enabled, hosts must enter the AP’s SSID manually to connect to this AP.
  • Page 21 Open System: After you select Open System, clients can pass the  authentication and associate with the wireless network without password. However, correct password is necessary for data transmission. Shared Key: After you select Shared Key, clients has to input password to pass ...
  • Page 22 WPA-PSK: Pre-shared key of WPA.  WPA2-PSK: Pre-shared key of WPA2.  Select the encryption type, including Auto, TKIP, and AES. The default setting Encryption: is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's capability and request.
  • Page 23: Wireless Advanced Settings

    Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's capability and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode.
  • Page 24: Load Balance

    range is from 1 to 2347 bytes. The default value is 2347, which means that RTS is disabled. Fragmentation Specify the fragmentation threshold for packets. If the size of the packet is larger than the fragmentation threshold, the packet will be fragmented into several Threshold: packets.
  • Page 25: Portal Configuration

    Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server.
  • Page 26 No Authentication:Users are required to finish only two steps: agree with the user protocol and click the Login button. Local Password:Users are required to enter the preset password, which are saved in the EAP. External RADIUS Server:Users are required to enter the preset user name and password, which are saved in the database of the RADIUS server.
  • Page 27 Disable by default. Redirect specifies that the portal should redirect the newly Redirect: authenticated clients to the configured URL. If you enable the Redirect function, please enter the URL that a newly Redirect URL: authenticated client will be directed to. Select Local Web Portal, the authentication login page will be provided by the Portal built-in web server.
  • Page 28 Local Password  Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Username: (For Enter the user name for local authentication. EAP110/120/220 only) Enter the password for local authentication. Password: to configure Authentication Timeout, Redirect, Redirect Please refer to No Authentication URL, and Portal Customization.
  • Page 29 Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. to configure Authentication Timeout, Redirect, Redirect Please refer to No Authentication...
  • Page 30: Free Authentication Policy

    External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Enter the port for authentication service. Port: RADIUS Password: Enter the shared secret of RADIUS server to log in to the RADIUS server. Portal Customization: Select External Web Portal.
  • Page 31 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Source IP Enter the source IP address and subnet mask of the clients who can enjoy the free authentication policy.
  • Page 32: Mac Filtering

    Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24.
  • Page 33 Settings  Enable MAC Filtering: Check the box to enable MAC Filtering. Station MAC Group  Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown. Figure 5-19 Station MAC Group Step 2: Click and fill in a name for the MAC group.
  • Page 34: Scheduler

    Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group member. MAC Filtering Association  Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Displays the frequency band the wireless network operates at.
  • Page 35 Figure 5-23 Scheduler Page Settings  Scheduler: Check the box to enable Scheduler. Select Associated with SSID/AP, you can perform configurations on the Association Mode: SSIDs/AP. The display of Scheduler Association is based on your option here. Scheduler Profile Configuration ...
  • Page 36 Step 1: Click , two tables will be shown. Figure 5-24 Scheduler Profile Configuration Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Select one profile, and click and configure the recurring schedule for the rule.
  • Page 37 Figure 5-26 Add a Rule Scheduler Association  This zone will display different contents based on your selection of association mode in Settings. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID Displays the SSID of the standalone AP. SSID Name: Displays the frequency band which the wireless network operates at.
  • Page 38: Qos

    Associated with AP Figure 5-28 Scheduler Association_Associated with AP Displays the name of the device. AP MAC: Displays the MAC address of the device. Select a profile name from the drop-down list. Profile name is configured in Profile Name: Scheduler Profile Configuration. Select Radio On/Off to turn on/off the wireless network during the time Action: interval set for the profile.
  • Page 39: Ap Edca Parameters

    Figure 5-29 QoS Page 2.4GHz/5GHz Select the 2.4GHz or 5GHz to show and configure the setting of 2.4GHz or 5GHz. Wi-Fi Multimedia By default, WMM is enabled. After WMM is enabled, the device has the QoS function to guarantee the transmission of audio and video packets with high (WMM): priority.
  • Page 40 Figure 5-30 AP EDCA Parameters Queue displays the transmission queue. By default, the priority from high to Queue: low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters. Data 0 (Voice)—...
  • Page 41: Station Edca Parameters

    5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA Parameters Queue: Queue displays the transmission queue. By default, the priority from high to low is Data 0, Data 1, Data 2, and Data 3. The priority may be changed if you reset the EDCA parameters.
  • Page 42: Rogue Ap Detection

    TXOP Limit: The TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the client station to the EAP device. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the EAP device.
  • Page 43: Settings

    Figure 5-32 Rogue AP Detection Page 5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save.
  • Page 44: Detected Rogue Ap List

    5.6.2 Detected Rogue AP List Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown. You can click Known in Action column to move the AP to the Trusted AP List.
  • Page 45: Download/Backup Trusted Ap List

    Figure 5-35 Trusted AP List Action: Click Unknown to move the AP out of the Trusted AP List. MAC: The MAC address of the trusted AP. The SSID of the trusted AP. SSID: Displays the frequency band which the wireless network of the trusted AP operates Band: The channel on which the trusted AP is currently broadcasting.
  • Page 46 NOTE: EAP device does not have any control over the APs in the Detected Rogue AP List.
  • Page 47: Chapter 6 Monitoring

    Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List on the Monitoring page displays the device name, its MAC address and the number of clients.
  • Page 48 Device Name: Displays the device name. Displays the MAC address of the EAP. MAC: Num of Clients: Displays the number of clients connected to the EAP. Device Information  Figure 6-3 Device Information Displays the device name. Device Name: Displays the model of the device. Device Model: Displays the firmware version of the device.
  • Page 49 Wireless Settings  Figure 6-4 Wireless Settings Choose one band to view the information about wireless setting. 2.4GHz/5GHz Displays the channel number and the operating frequency. If you want Channel/Frequency: to change them, please refer to 5.1.1 Wireless Basic Settings. Displays the spectral width of the radio channel used by the device.
  • Page 50 IP Address: Displays the IP address of the device. Displays the subnet mask of the device. Subnet Mask: LAN Port1/ LAN Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port. Port2: Client  Figure 6-6 Client MAC: Displays the MAC address of the client of the AP selected in AP List.
  • Page 51 Figure 6-7 LAN Traffic Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Displays the total amount of dropped packets received/sent on the LAN port.
  • Page 52: Ssid

    6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List SSID Name: Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 53: Client

    Displays the enabling or disabling of MAC Filtering. If you want to modify it, MAC Filtering: please refer to 5.1.2 SSIDs. Displays the enabling or disabling of SSID Isolation. If you want to modify it, Isolation: please refer to 5.1.2 SSIDs.
  • Page 54: Portal Authenticated Guest

    Access Point: Displays the name of the device to which the client is connected. Displays the SSID the client is connected to. SSID: SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the value of SNR, the better network performance the device provides.
  • Page 55 Displays the data rate at which the authenticated client transmits wireless Rate(Mbps): packets. Down(Byte): Displays the throughput of the downstream data. Up(Byte): Displays the throughput of the upstream data. Displays the amount of time the client has been authenticated on the root AP. Active Time: Action: Click Unauthorize to stop giving authorization to the clients connected to the...
  • Page 56: Chapter 7 Management

    Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure.
  • Page 57: Log Settings

    Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configured: Enable Auto Mail, Enable Server Enable Nvram. Figure 7-3 Log Settings Enable Auto Mail ...
  • Page 58: Backup Log

    Enter the recipient’s email address, which will receive the system logs. Enter the IP address of the SMTP server. SMTP Server: Enable Generally users are required to log in to the SMTP server by entering user name and password. Authentication: User Name: Enter the sender’s email address.
  • Page 59: Web Server

    You can save the current system log to a file. Following is the page of Backup Log. Figure 7-6 Backup Log Page 7.2 Web Server You can log in web management interface, thereby manage and maintain the device. Following is the page of Web Server. Figure 7-7 Web Server Page HTTPS (Hypertext Transfer Protocol Secure) is enabled by default.
  • Page 60: Trunk

    Following is the page of Management Access. Figure 7-8 Management Access Page Check the box to enable MAC Authentication. After MAC Authentication is enabled, only the PCs in MAC address list can log in the device’s web Authentication: management page. By default this function is disabled. All PCs in LAN can log in and manage the device.
  • Page 61: Led On/Off

    Enable: Check the box to enable Trunk. The Trunk function can bundle multiple Ethernet links into a logical link to increase bandwidth, improve reliability and achieve load balancing. The EAP330 has two 1000Mbps Ethernet ports. If the Trunk function is enabled and the ports are in the speed of 1000Mbps Full Duplex, the whole bandwidth of the Trunk is up to 4Gbps (2000Mbps * 2) because the bandwidth of each member port is 2000Mbps.
  • Page 62: Management Vlan

    Following is the page of SSH. Figure 7-11 SSH Page Server Port: Enter the server port. By default, it is port 22. Check the box to enable SSH Server. By default, it is disabled. SSH Login: 7.7 Management VLAN TIPS: Only EAP225 has this function.
  • Page 63: Snmp

    Management Specify the Management VLAN ID, ranging from 1 to 4094. VLAN ID: 7.8 SNMP The device can be configured as an SNMP agent. SNMP (Simple Network Management Protocol), the most widely applied network management protocol, provides a management framework to monitor and maintain Internet devices. Main functions of SNMP include monitoring network performance, detecting and analyzing network error, configuring network devices, and so on.
  • Page 64 Enable SNMP Agent and the SNMP Agent will collect the information of this SNMP Agent: device and respond to information requests from one or more management systems. Enter the textual identification of the contact person for this managed node. SysContact: SysName: Enter an administratively-assigned name for this managed node.
  • Page 65: Chapter 8 System

    Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. User Account You can change the username and password to protect your device from unauthorized login. We recommend that you change the default user password on the very first system setup.
  • Page 66: Time Settings

    Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP address of the NTP server has to be filled in. Click the button and save the configuration, your PC’s time will be obtained as the device’s system time.
  • Page 67: Daylight Saving

    Specify the device’s time. Select the number from the drop-down list in time Time: format HH/MM/SS. Primary/Secondary If you’ve selected Get GMT from an NTP server, please input the primary NTP Server: NTP sever address and an alternative NTP server address. 8.2.2 Daylight Saving Figure 8-4 Daylight Saving Daylight Saving:...
  • Page 68: Reboot/Reset

    Recurring Mode  Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time adding in minutes when Daylight Saving Time comes. Start/End: Select starting time and ending time of Daylight Saving Time. Date Mode ...
  • Page 69: Backup & Restore

    Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file. To prevent the settings from being lost, we recommend that you back up the settings before you upgrade the device or upload a new configuration file.
  • Page 70 NOTE: Please select the proper software version that matches your hardware to upgrade. To avoid damage, please do not turn off the device while upgrading. After upgrading, the device will reboot automatically.

Table of Contents