Page 1
CERIO Corporation CenOS 5.0 User Manual OW-500 6N00-MESH eXtreme High Power WiFi6 Tri-Radio AX4200 MAN-MESH Outdoor PoE Bridge/AP V1.3 V1.0a...
Page 2
Content Device and Software Configuration ....................... 8 1-1. Device appearance ........................8 1-2. Setup Preparation of AP ....................... 9 1-3. Login Web Page .......................... 11 Operating Mode Introduction ........................12 2-1. MAN-Mesh Mode (Default Mode) ....................12 2-2. Access Point Mode ........................12 2-3.
Page 3
4-1-7. 802.11r Fast Roaming Setup ....................49 4-2. Wireless Configuration ....................... 51 4-2-1. Mesh Radio 0 (2.4G) Setup ....................52 4-2-2. Mesh Radio 1 (5G-1) / Radio 2(5G-2) Setup ................55 4-2-3. Advanced Setup ........................58 4-2-4. WMM Setup ......................... 60 4-3.
Page 4
#Sample for Facebook OAuth2.0 setup ....................103 5-3-4. POP3/IMAP Server ......................107 5-3-5. Customize ........................... 107 5-3-6. Language ..........................109 5-3-7. Walled Garden ........................110 5-3-8. Privilege Address ........................ 110 5-3-9. Bulk MAC Address ....................... 111 5-3-10. Profile ..........................111 5-4.
Page 5
6-4-6. Station Porfile Setup ......................140 6-4-7. Repeater AP Setup ......................141 6-4-8. MAC Filter Setup ......................... 145 6-4-9. 802.11r Fast Roaming ......................146 WISP Mode ............................... 148 7-1. Change Setup mode ......................... 149 7-2. Configure WAN Setup ....................... 149 7-3.
Page 6
8-3-3 Radio 0(2.4G)/Radio1(5G)/Radio2(5G) Access Point Setup ............ 185 8-3-4 MAC Filter .......................... 191 8-3-5 802.11r Fast Roaming Setup ....................191 8-4. Wireless Configuration ......................194 8-4-1. Radio 0 (2.4G) Basic Setup ....................194 8-4-2. Radio 1 (5G-1) / Radio 2 (5G-2)Basic Setup ................196 8-4-3.
Page 7
13-2. Point to Point / Multi-Point for WDS settings ................240 13-3. Apply CERIO web authentication login page sample ..............241 13-4. Regional 5Ghz WiFi channel related, country/region DFS (Dynamic Frequency ......246 Appendix. WEB GUI Valid Characters ........................ 247 V1.3...
Page 8
Device and Software Configuration Device appearance 1-1. External for 2.4GHzN-Type Connecter External for 5GHz-2 N-Type Connecter External for 5GHz-2 N-Type Connecter External for 5GHz-1 N-Type Connecter External for 5GHz-1 N-Type Connecter External for 2.4GHz N-Type Connecter SUS304 Uniaxial Adjustable Bracket Holes 6KV Lightning Protection Surge SUS304 Fixed Mounting...
Page 9
Setup Preparation of AP 1-2. Please PC link to Device used cat5/6 Ethernet cable. The following setup uses a Windows PC, user OS may vary. Step 1: Please click on the computer icon in the bottom right window, and click “Open Network and Internet settings”...
Page 10
Step 4: In Properties page to setting IP address, please find “Internet Protocol Version 4 (TCP/IPv4)” and double click or click “OK” button. Step 5 : Select “Use the following IP address”, and fix in IP Address : 192.168.2.# ex. The # is any number by 1 to 253 Subnet mask : 255.255.255.0 And Click "OK"...
Page 11
Login Web Page 1-3. Launch as web browser to access the web management interface of system by entering the default IP Address, http://192.168.2.254, in the URL field, and then press Enter. Default login Usermane is〝root〞and Password is〝default〞. V1.3 V1.0a...
Page 12
Operating Mode Introduction MAN-Mesh Mode (Default Mode) 2-1. After switching MAN-Mesh mode, at first, set one as MAN-Mesh AP "host node", and then successively to set other stations as the MAN-Mesh AP "interlink node", and sequentially expand the network nodes to increase the coverage.
Page 13
When you want to use the wireless method to access the Internet, you can convert the device to the Access Point mode.. It can be deployed as a traditional fixed wireless Access Point It allow wireless clients or Stations ( STA ) to access ...
Page 14
Application of WDS function in Access Point mode WDS can be used for long-distance point-to-point wireless connections, as well as applications for long-distance point-to-multipoint wireless connections. You can enable the WDS function under the Access Point (AP Mode), which is an application of AP + WDS, which means that the device can also use the services of the Access Ponit (AP station), it can be used for long distance with another AP through WDS.
Page 15
Note: If Client Bridge used 5GHz connection to AP station then Repeater AP only use 2.4GHz. WISP + Repeater AP Mode 2-4. Please click on System ->Mode Setup and choose WISP Mode It can be used as an WISP (Wireless Internet Service Provide) to receive wireless signals over last mile ...
Page 16
Station, and, in WISP (CPE) mode, it does not accept wireless association from wireless clients. Router mode 2-5. Please click on System -> Mode Setup and choose Router Mode Router AP with 802.1Q tag VLAN, can use multi-ESSID with VLAN Tag ...
Page 17
CAP mode (Centralizes Access Point) 2-6. Please click on System ->Mode Setup and choose CAP Mode Control Management of CenOS5.0 APs AP Management support 802.1Q VLAN infrastructure Centralized setting Access Point function and firmware upgrade. APs Group management for concept. ...
Page 18
System Configuration Management 3-1. Please click on System ->Management and choose System Language. System Language:Administrator can select system language for English and Traditional Chinese System Information:Administrator can set the system name / Description and Location. Root Password:Administrator can change system login password. ...
Page 19
Set the IP address of the remote system Log server。 Port: Set the port number of the remote system Log server. By the default , the built-in log center of the “Cerio AP Controller” corresponds to port 514. V1.3 V1.0a...
Page 20
If you use the built-in log server function of Cerio's AP Controller product, please use the default 514 remote server port for the designated connection. The built-in log server of the AP management controller provided by Cerio Company provides a complete log format and all complete format information for its wireless AP devices of Cerio Company.
Page 21
NTP Server:Administrator can setting as NTP Server. For example, select the time server of "cerio.com.tw" on the Internet as the basis for NTP time calibration as follows. Time Zone:Administrator can select a desired time zone from the drop-down list. ...
Page 22
Administrator can select manual or via a NTP server to modify system time for the right local time. 1. This product supports hardware battery memory time keep design, When "Manual Update" time is selected and the time can be stored in the hardware memory, if the time cannot be stored and always becomes invalid and returns to the default time, the hardware battery must be replaced.
Page 23
SNMP V3 Function Active:Administrator can select Enable or Disable the service. RO Username:Set a community string to authorize read-only access. RO Password:Set a password to authorize read-only access. RW Username:Set a community string to authorize read/write access. ...
Page 24
Configure Time Policy 3-4. Please click Edit button to setting Time Policy rules Comment: Enter the description of Time Policy rule. Mode: Administrator can select On schedule or Out of schedule to execution the rules. Administrator can set time for week / start time and end time. ...
Page 25
MAN-MESH Mode MAN-Mesh WiFi has the capability of dynamic routing automatic path selection. The dynamic path selection includes the best path transmission of the Mesh Backbone network and the best dynamic path transmission of the WAN / Internet route. # LAN physical WAN Internet / Layer2+ backhaul internet access architecture Under the environmentally interconnected MAN-Mesh AP, the WiFi AP Station extends all backhaul or WAN with its...
Page 26
# LAN physical intranet / IP Routing backhaul area intranet access architecture. Under the MAN-Mesh AP of environmental interconnection, the IPv4 Bridge "IP Routing" mode is used to allow each Routing Mesh unit to quickly simulate communication with the Routing protocol through the Mesh AP (Host Node Mesh unit) without performing Mesh NAT.
Page 27
VLAN Setup 4-1. Under Man-Mesh mode, the administrator must set up the system's IP address, the network segment must be the same as the internal network domain, and the IP address can’t be the same as other devices, otherwise it will cause conflicts Setting the AP's (LAN) IP address and other functions, please click "System "...
Page 28
(green is enabled, red means disabled) Radio 2 :It is a 5Ghz radio, it can display the SSID name of 5Ghz in each VLAN and whether it is enabled (green is enabled, red means disabled) Action:Click the network button to enter the LAN setting page. Click the drop-down arrow ...
Page 29
You can set the IP address of the gateway in the architectural environment or the external DNS IP address (if there is no special needs, it is recommended to set at 8.8.8.8 which provided by Google or 168.95.1.1 provided by Chunghwa Telecom for public.
Page 30
802.1d Spanning Tree : The spanning tree network protocol provides a loop free topology for a bridged LAN between LAN interface and 8 WDS interfaces from wds0 to wds7. The Spanning Tree Protocol, which is also referred to as STP, is defined in the IEEE Standard 802.1d VLAN Tag Setup: Set the VLAN used tags.
Page 31
That if ETH0 is set to use a VLAN tag, you must enter the management interface with the same VLAN as the tag to enter the management settings. Otherwise, the VLAN domain is completely blocked. Click “Save” button to save your changes. Then click Reboot button to activate your changes. #...
Page 32
IP Routing Mode IPv4 Bridge: IP Routing and Layer2 services can be selected. IP Routing : Select and enable this IP Routing mode as the main Bridge mode of IPv4 Bridge. Static peer It has the same meaning as Static Routing. The manager manually enters and sets the IP location of the back-end LAN device to participate in the Mesh environment interconnection,manually specify the local physical LAN connection manually specify the LAN IP address, must have a LAN IP address which can connect in Mesh...
Page 33
In the case of Mesh interconnection, if you want to migrate and change the originally specified Static Peer IP host address and set it to the Static Peer IP setting of the MAN-Mesh AP of another station, please be sure to delete the Static Peer in the original Mesh AP first Host IP address.
Page 34
Layer2 Mode Layer2 : Select and enable the VxLan mode of this Layer 2 as the IPv4 Bridge. The Layer2 VxLan mode establishes a logical connection between entities between networks, and handles flow control and error detection during transmission. Layer2 encapsulates the digital signal of the physical layer into a data frame, where the frame contains the data link layer The MAC address used to identify the source address of the host data.
Page 35
VXLAN Setting VXLAN VNI : Virtual Network ID (VNI) Virtual identification designation, the specified value of the ● virtual identification of each MAN-Mesh host connected to each other in the environment must be the same, and a maximum of 16,000,000 VxLAN logical network virtual identifications are supported.
Page 36
Uplink Backup Uplink IP Address You can choose to enable or disable, the default is "off", when the "off" state, ● it will automatically monitor the connection. When Uplink Backup is enabled, the five groups of IPv4 bridge Uplink IP in the Uplink IP ...
Page 37
Star Tree Mesh Uplink IP Address List: Uplink IP Address List: Display and fill in the IPv4 list of MAN-Mesh devices with priority ● designated connection. Currently there are five groups of customizable fill-in settings open. The fill-in value in this part is based on the IPv4 “Bridge address” system displayed by the host system of other stations (to be uplinked) as the main fill-in IP identification value.
Page 38
access of other unnecessary MESH devices. (The allowed IP is the IPv4 address of MESH/ Mask is the subnet mask) Auto Link Allow Address List: Auto Link Allow Address List: Display the IPv4 list of MAN-Mesh devices allowed to connect. All ●...
Page 39
DHCP Server 4-1-4. Click “DHCP Server”Setting DHCP Server The DHCP server includes "DHCP service" and "DHCP Relay ", it can only choose one way to enable, if your DHCP Client IP and DHCP Server IP in the same "net segment / subnet", it is able to set and obtain the dynamically assigned IP address through the DHCP service, if it is not in the same "net segment / subnet", you must be choose DHCP Relay mode setting, DHCP Relay can forward the message and assign it to a...
Page 40
If there are 2 DHCP servers in the network environment, please pay attention to the distribution of IP addresses, do not repeat, to avoid IP conflicts Start IP : Set Start IP for DHCP Service. End IP : Set End IP for DHCP Service. ...
Page 41
IP Address : Display the IP address sent to the client device MAC Address: Display the MAC address of the client device Expired: Display the expiration time of IP lease Active: To list this device (MAC) as a fixed IP address distribution ...
Page 42
DHCP Relay (DHCPR), the relay service can exchange DHCP packets between DHCP clients and DHCP servers located in different "network segments / subnets". Relay service is used to send DHCP Clinet IP request packets from different subnets / segments to the DHCP server when the DHCP Client sends an IP request to the server, so that the DHCP server can assign IP to different subnets / network segments DHCP Clinet.
Page 43
Radio 0(2.4G)/Radio 1(5G-1)/Radio 2(5G-2) Access Point Setup 4-1-5. Administrator can Enable or Disable Radio 0(2.4G)/Radio 1(5G-1)/ Radio 2(5G-2) Wi-Fi. If Radio are enabled, administrators can set the SSID and security for the Radio 0(2.4G) and Radio 1(5G-1) and Radio 2(5G-2)access point. Administrator can Enable or Disable radio 0/1/2 (2.4/5G/5G) Wi-Fi.
Page 44
Connection Limit: Administrator can select Enable or Disable WiFi connection Limit. 【Supports 128 users to access at the same time.】 Security Type: Select the desired security type from the drop-down list; the options are Open System, WPA-PSK/WPA2-Personal, WPA/WPA2-Enterprise, WPA3 and 802.1x Notes: The WEP encryption mode is currently known to be not the most secure wireless encryption method, and will not be able to support 802.11ac/ax.
Page 45
wireless client wants to connect, can be choose which group of wireless keys and establish a connection through WEP encryption. Note: If you choose to use WEP encryption mode, please enter the corresponding WEP key value according to the following requirements. 64bits: 10 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 5 groups of ASCII characters (0~9, A~Z and a~z can be used)
Page 46
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 47
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 48
The WPA3 is latest and most secure protocol currently available for Wi-Fi devices. It is applicable to all access devices that support Wi-Fi 6 (802.11ax). If the wireless access card does not support WPA3 calculation mode, that you adjust the use to WPA2 / AES calculus mode recommended.
Page 49
(1 ) Only Deny List MAC:Administrator can add wireless users MAC address in MAC list. The access point will deny connection in MAC address list. (2) Only Allow List MAC:Administrator can add wireless users MAC address in MAC list. The access point will allow connection in MAC address list.
Page 50
If this feature is enabled when using 802.11r fast roaming, the wireless user equipment must support 802.11k functionality to work properly. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) ...
Page 51
MAC Address: Administrators must enter the MAC Address of other AP NAS Identifier: Enter 1~48 octets of network domain name. Shared Key of 128 bit. 128-bit Key: Enter R1 Key holders : Enter a unified set of R1 Key Holder identification certification. MAC Address: Enter the main roaming device MAC address ...
Page 52
Mesh Radio 0 (2.4G) Setup 4-2-1. MAC Address: Display 2.4G WiFi MAC address. Country: Administrator can select country: United States(US) , Europe(EU) , Janpan(JP) or Taiwan(TW). Band Mode: Administrator can select 2.4G Band for 802.11b、802.11b/g、802.11b/g/n、802.11n. or 802.11ax, The default is 802.11ax. Channel: Administrator can make select 1 to 11 CH.Priority automatic connection channel selection of ...
Page 53
The MAN-Mesh AP provides intelligent and quickly automatic connections between multiple channels. When selected more channels then the search range becomes bigger then the longer time will be required. Appropriate channel selection will help to speed up MAN-Mesh APs to automatically connect to each other. It is recommended that the number of channels selected can be 1 to 3 channels.
Page 54
Channel Bandwidth: The "20/40” MHz option is usually best. The other option is available for special circumstances. Extension Channel: Sets channel select to Upper or Lower. The Upper supports 1 to 7 range CH and Lower supports 5 to 11 range CH. Min MCS: This parameter represents for 802.11ax transmission rate.
Page 55
Mesh Radio 1 (5G-1) / Radio 2(5G-2) Setup 4-2-2. MAC Address: Display Radioi 1(5G-1) or Radio 2(5G-2) WiFi MAC address. Country: Administrator can select country: United States(US) , Europe(EU) or Taiwan(TW). Band Mode: Administrator can select 5G Band for 802.11a or 802.11a/n or 802.11n(5G) or 802.11ac. ...
Page 56
5G Radio 1 Mark selection three low range 5G Radio 1 Mark selection three high range frequency channels frequency channels The MAN-Mesh AP provides intelligent and quickly automatic connections between multiple channels. When selected more channels then the search range becomes bigger then the longer time will be required.
Page 57
HT Physical Mode TX / RX Stream: Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. Channel BandWith: The Wireless 5G can choose 20 or 20/40 Mhz or 11ac/ax 80Mhz or 11ax 160Mhz as the data transmission speed between the base station and wireless users. When the operation mode is 802.11ac / 802.11ax, you can choose 80 or 160Mhz.
Page 58
Advanced Setup 4-2-3. Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal strength, time stamp, support data rate.
Page 59
fragments the data packets. Fragmentation threshold will be used when we have more data packet size to be transmitted and we have less fragment threshold value. Let’s say from Ethernet we have to send 1400 byte packet but the fragmentation threshold is set as 400. In this case when the packet is to be transmitted on air it will fragment the packet in to 4 small packet 400+400+400+200 and send on air.
Page 60
WMM Setup 4-2-4. This affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
Page 61
AC Type: Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
Page 62
communication quality is fine and interference is weak. While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.
Page 63
When this encryption function is enabled, each MAN-Mesh AP device in the Mesh architecture environment needs to synchronize the same encryption settings.If disable the Mesh connection encryption function, to avoid the possibility of connecting to other mesh groups that also use the default SSID (meshssid), it is strongly recommended to change your own Mesh AP SSID in the Mesh environment.
Page 64
If the source interface of WAN selects wireless "Mesh" as the upper layer interface (NAT WAN), other interfaces of the host (including wired VLAN (0 ~ 15) and wireless AP) will become the lower layer interface interface (NAT LAN), this application Designed to allow the use of every Mesh NAT AP unit (small block) environment host that is not connected to each other and users can connect to the Internet Host planning the entire MAN-Mesh environment.
Page 65
MAN-Mesh Device Setup 4-3-2. Click "MAN-Mesh" "MAN-Mesh Device 0 Setup"-> Device Setup to set MAN-Mesh Device 0 "/" MAN-Mesh Device 1 Setup " Device Setup to set MAN-Mesh Device 1" / "MAN-Mesh Device 2 Setup" "Device Setup to Set MAN-Mesh Device 2", enable or disable MAN-Mesh AP radio 0,1,2 , MAN-Mesh IPv4 / IPv6 setup , MAN-Mesh deployment method, MAN-Mesh mandatory MAC address, MAN- Mesh MAC address list:。...
Page 66
MAN-Mesh radio for mesh auto link . The default value is “Disable”. When any Radio of MAN-Mesh AP is enabled, At the same time, you must set Mesh interface IP address of Mesh AP. The IP address of the MAN-Mesh AP can be set in both IPv4 and IPv6 formats.
Page 67
The IPv4 format is from 0.0.0.0 to 255.255.255.255. Except for the following private IP is not used by international ownership , The remaining IPs are real IPs that are owned or used internationally. To avoid the IP error occurs, please use the following recommended range to choose your own private IP : Private network Class A : 10.0.0.0~10.255.255.255 Private network Class B : 172.16.0.0~172.31.255.255...
Page 68
MAN-Mesh Deployment Multi-hop Layout : MAN-Mesh AP multi-hop layout role setting selection, you can choose the layout of the Host node or Interlink node Host Node : In the MAN-Mesh mesh network environment, it must deploy a unique "host node" so that ...
Page 69
MAN-Mesh MAC Address List : Manage the MAC list of designated priority links. The MAC addresses of all hosts added by MAN-Mesh Force MAC Address will be displayed here, and you can choose to delete them. MAN-Mesh Block MAC Address : In the case of automatic interconnection, you can set the specified model to block the MAC of the MAN-Mesh AP host.
Page 70
# MAN-MESH connection setting step example , It can help managers establish Mesh host interconnection extension wireless and wireless AP station settings. The Mesh function will be applied to the default man-mesh mode. This function is mainly used to construct a Mesh mesh transmission environment.
Page 71
Set the LAN IP of the second Mesh AP to 192.168.2.253 and the subnet mask to 255.255.255.0 Set the LAN IP of the third Mesh AP to 192.168.2.252 and the subnet mask to 255.255.255.0 Step 2 : Set the Mesh SSID and encryption of each Mesh AP (Mesh unit) to be consistent. "MAN-Mesh"...
Page 72
is different.. Click the "MAN-Mesh" → "MAN-Mesh Device Setup"-management page, set the MESH IP of each WIFI MESH interface (including Radio-0, Radio-1, Radio-2), and ensure that each designated MESH IP Different (Once the same repeated conflicting IP appears in the environment, MESH will be abnormal and unable to operate normally) MAN-Mesh Settings: Enable this radio as a wireless base station (radio) used by MAN-Mesh.
Page 73
The Mesh environment architecture requires one device to be configured as a host node (usually the Mesh AP connected to the head-end wired network is configured as the host node) Set the second Mesh AP's Radio1 (5G-1) Mesh IP to 10.0.1.253 and subnet mask to 255.255.255.255 . In the Mesh environment architecture, except one host which is set as a "host node", all other hosts are set as "interconnect nodes"...
Page 74
Radio 1 (5G-1) Radio 2 (5G-2) Country and channel setting suggestions : Here we take "Taiwan" as an example for the country setting. For each Radio, just select a single channel. Using multiple channels will increase the waiting time required for each host to successfully pair and connect to each other.
Page 75
recommended to avoid channels 100 to 144 and select "Non-DFS Channel" to select settings. **Refer to more information** DFS (Dynamic Frequency Selection/Dynamic Frequency Selection) is one of the functions of the 5GHz WiFi frequency. Originally, DFS channels were only reserved for specific radar signals, such as military radar, satellite communications, weather radar, etc. Currently, the channel range included in DFS is defined in accordance with the relevant regulations of each country/region and can be used through the relevant channels in each country/region.
Page 76
After selecting Layer2 mode, other devices can be connected and operated without complicated settings. If there are advanced settings, detailed settings are required. When using Layer2 mode, VXLAN technology will internally calculate the best path for each route transmission. The time required ...
Page 77
by stepping out of the upper-layer NAT Router to successfully access the Internet, the NAT router needs to have a static routing table setting. If it is applied This mode is highly recommended for environments that only need to build an internal LAN. After completing steps 1 to 5 above and restarting each Mesh AP host to apply the settings, the three hosts will automatically connect to the mesh at startup.
Page 78
own needs: Mesh AP unit 1 Mesh AP unit 2 Mesh AP unit 3 Radio 0(2.4G) 2.4G_0_0 2.4G_0_0 2.4G_0_0 Radio 1(5G-1) 5G_0_1 5G_0_1 5G_0_1 Radio 2(5G-2) 5G_0_2 5G_0_2 5G_0_2 Recommendations for encryption type setting::It is up to the user to decide whether to use WiFi encrypted connections for broadcast SSID users.
Page 79
Set the gateway address and DNS address for each Mesh AP : Click the "System " → "VLAN Setup" and pull the function list to the bottom. Default gateway:Set the gateway IP address. Here, enter the gateway IP location into the IP address ...
Page 80
For the first time after switching modes, always perform access management on the LAN default IP address of 192.168.2.254 2. Cerio’s dual-band wireless base station supports 16 VLANs and 48 SSIDs ( Each VLAN supports 2.4Ghz SSID x1 and 5Ghz-1 band SSID x1 and 5Ghz-2 band SSID x1) V1.3...
Page 81
VLAN Setup 5-2. Here are the instructions to setup the local IP Address / Netmask / Gateway / DNS and management Access Point 2.4G or 5G-1 Radio or 5G-2 Radio on/off. Administrators can change settings such as LAN Spanning Tree and Tag VLAN functions. VLAN Mode:Display on/off for the VLAN network.
Page 82
Action : Click the button to enter the LAN setting page. Click the drop-down arrow to display the wireless setting function list. Radio 1:Display radio 5G-1 SSID name. Action : Click the button to enter the LAN setting page. Click the ...
Page 83
Management Access Point 0:Administrator can Enable or Disable 2.4G Radio. Access Point 1:Administrator can Enable or Disable 5G-1 Radio. Access Point 2:Administrator can Enable or Disable 5G-2 Radio. 802.1d Spanning Tree : The spanning tree network protocol provides a loop free topology for a ...
Page 84
ETH2 VLAN Tag Setup Network port VLAN Tag Setup: Follow standard 802.1Q specification, the function can be turned off or enabled. You can define the tag to the ETH2 physical network port , which can be set from 1 to 4096 Note: If ETH1 is configured to use a VLAN Tag, then entering the management interface requires a VLAN with the same tag to enter the management settings.
Page 85
Start IP: Set Start IP address for DHCP Service. End IP: Set End IP address for DHCP Service. Netmask: Set IP Netmask, the default is 255.255.255.0 Gateway: Set Gateway IP address for DHCP Service. DNS(1-2) IP : Set DNS IP address for DHCP Service. ...
Page 86
Static Lease IP Setup:Administrator can set be delivered fixed IP address to the users. Comment: Enter rule description. IP Address: Enter access point IP. MAC Address: Enter Client MAC Address of PC network. Click “Save” button to save your changes. Then click Reboot button to activate your changes. Bandwidth Control 5-2-2 Administrators can set bandwidth limit the max/min bandwidth of the Wi-Fi users, Bandwidth...
Page 87
QoS Rule List: Administrator can set bandwidth limit by IP/MASK, IP Range, Port(Service), SIP, RTP/RTSP, WEB protocol , each VLAN can set 10 bandwidth management rule. Click “Save” button to save your changes. Then click Reboot button to activate your changes. Radio 0(2.4G)/Radio1(5G)/Radio2(5G) Access Point Setup 5-2-3 Administrator can Enable or Disable radio 0/1/2 (2.4/5G/5G) Wi-Fi.
Page 88
Open System, WPA-PSK/WPA2-Personal, WPA/WPA2-Enterprise, WPA3 and 802.1x Notes: The WEP encryption mode is currently known to be not the most secure wireless encryption method, and will not be able to support 802.11ac/ax. It is not recommended that you continue to use this WEP encryption mode. It is recommended that you use a rate that meets 802.11ac/ax Correspondingly supported encryption modes above WPA / WPA2 to increase your wireless network security.
Page 89
Note: If you choose to use WEP encryption mode, please enter the corresponding WEP key value according to the following requirements. 64bits: 10 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 5 groups of ASCII characters (0~9, A~Z and a~z can be used) 128bits: 26 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 13 groups of ASCII characters (0~9, A~Z and a~z can be used)
Page 90
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 91
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 92
The WPA3 is latest and most secure protocol currently available for Wi-Fi devices. It is applicable to all access devices that support Wi-Fi 6 (802.11ax). If the wireless access card does not support WPA3 calculation mode, that you adjust the use to WPA2 / AES calculus mode recommended.
Page 93
MAC Address: Set managed MAC address of the client. MAC Address List: Display managed MAC address list. Click “Save” button to save your changes. Then click Reboot button to activate your changes. 802.11r Fast Roaming Setup 5-2-5 The Tri band Access Point supports 802.11r/802.11k function for 2.4G (Rado 0)and 5G (Rado 1)and (Rado 2).
Page 94
Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) between which a STA can use Fast BSS Transition. This setting must be 2-octet of hex string codes. For example, enter 8c4d R0 Key Lifetime: Default lifetime of the PMK-RO in minutes, the default is 10000, administrator ...
Page 95
Address of AP2, and AP2 must key in the MAC Address of AP1. The NAS Identifier and 128-bit Key should be identical in both AP settings. This will enable device roaming between the two Access Points. MAC Address: Administrators must enter the MAC Address of another side AP. ...
Page 96
When enable web authentication function, please does make the Access Point can be connected to gateway. Please refer to VLAN Setup. If the gateway IP address is set error address then web login page can't display #:Display VLANs number. VLAN Mode:Displays VLAN on/off status.
Page 97
Session Log:If network have Syslog server. Administrator can to systemmanagement setting IP address for syslog server and enable the function. Account session log will copy to the Cerio ( For this part of the “AP controller’s log server function, Controller device ‘s syslog server.
Page 98
Local User:Administrator can enable authentication for local user. Create user account can to reference “ Local User” setup. After activating the local account, be sure to go to the "Local Account" function menu to create an authenticated user account.. RADIUS:Authentication support remote RADIUS Server.
Page 99
Secret Key::Enter the key to connect to the remote RADIUS server. Click “Save” button to save your changes. Then click Reboot button to activate your changes. Guest 5-3-1. Administrator can enable or disable guest authentication. If enabled, the administrator can set guest Count Limit / login time and type and flow control.
Page 100
User Name: Administrator can create users account. Password:Set account password. OAuth 2.0 5-3-3. The OAuth2.0 function supports Facebook and Google by default. Users can add additional OAuth2.0 servers through UI settings. #:Display items. Active:Display on/off status for the authentication. ...
Page 101
Step.3 Select web application in the “Application Type” section and set “Restrictions” URL. V1.3 V1.0a...
Page 102
Step.4 Set Authorized JavaScript origins and Authorized redirect URLs (important) Administrator must set login URL in the device function. After complete set of login URL go to the “Restrictions” function in web page. Follow the steps below to set login URLs Setup login URL in the device.
Page 103
Step.5 After completing the “Restrictions” setup, click the create button. An OAuth Client page will pop-up with your “client ID” and “client secret”. Administrators must copy and paste their client ID and secret into the OAuth 2.0 Setup page in our software UI. Save and reboot the AP system, complete the setup.
Page 104
Step.2 Select WWW function Step.3 Administrator must set www for your information. Step.4 Please click “Setting” and add Platform V1.3 V1.0a...
Page 105
Step.5 Select Platform for “Website” Step.6 Enter URL is http://domain0.login.com/login/callback.cgi Administrator must set login URL in the device function. After complete set of login URL go to the “Facebook Site URL” function in web page. Follow the steps below to set login URLs Setup login URL in the device.
Page 106
After complete set of login URL go to the “Facebook Site URL” function in web page. Copy and paste the login URL from the system display into the “ Site URL” page on the Facebook website. Step.7 Click Advanced function to enable the “Native or desktop app?” and “Is App Secret embedded in the client? “...
Page 107
POP3/IMAP Server 5-3-4. The purpose of this integrated function is to allow clients to link a POP3 server for receiving emails from a remote server. Service: Administrator can choose Enable or Disable the PoP3 authentication. Display Name:Set the “Display Name” based on the appropriate POP3 user or client. ...
Page 108
Page Setup Template:Administrator can select Enable or disable. Select enable to active default Login Page Select disable to active HTML Source code window for customization V1.3 V1.0a...
Page 109
Sample: See sample login page below that is customized by html coding (sample login page html code templates are available on Cerio website) The following function uses the enabled Template Multiple Language:Administrator can select enable or disable multiple language for login page.
Page 110
Walled Garden 5-3-7. This function provides certain free services or advertisement web pages for users to access the websites listed before login and authentication. User without the network access right can still have a chance to experience the actual network service free of charge in Walled Garden URL list. Display Name: Set name of Website.
Page 111
Bulk MAC Address 5-3-9. This function is similar to the privileged list, the difference is that this function only verifies the MAC address, and the MAC list can only be built in batches by uploading When this function is turned on, as long as the devices on the MAC list will not need to do web page verification and can directly use Internet services.
Page 112
RADIUS Server 5-4. Service:Administrator can select Enable or disable the function. Radius:Administrator must to set remote RADIUS Server use Port.。 Radius Secret:Administrator must to set remote RADIUS Server use Key. Click “Save” button to save your changes. Then click Reboot button to activate your changes. RADIUS Account Setup 5-5.
Page 113
Wireless Configuration 5-6. Radio 0 (2.4G) Basic Setup 5-6-1. General Setup MAC Address:Display 2.4G WiFi MAC address. Country:Administrator can select country: US or EU or Japan or Taiwan. Band Mode:Administrator can select 2.4G Band for 802.11b、802.11b/g、802.11b/g/n、 802.11n.
Page 114
ACK Timeout. The input distance is calculated in units (meters). ACK timeout:When waiting for the "ACKnowledgment frame" interval is too long to be received, the ACK will be retransmitted. A higher ACK Timeout will reduce packet loss, but the transmission efficiency will be poor.
Page 115
Max MCS: This parameter represents for 802.11ax transmission rate. The fastest possible transmission rate will be selected. You have the option of selecting the speed if necessary. Short GI : Short Guard Interval is “Enabled” by default to increase throughput. However, it can also ...
Page 116
Auto Channel: Administrator can Enable or Disable the function. If select disabled function the WiFi channel can be manually fixed. Channel:There are different options for wireless operation modes in regions. Tx Power: Administrator can control the WiFi Tx output power. The power Max. Level 9. ...
Page 117
TX/RX Stream: Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. Channel BandWith: The Wireless 5G can choose 20 or 20/40 Mhz or 11ac/ax 80Mhz at 5G-1 (Radio-1) or 11ax 160Mhz at 5G-2 (Radio) as the data transmission speed between the base station and wireless users.
Page 118
Advanced Setup 5-6-3. Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
Page 119
point sends the buffered multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless throughput in multicast applications.
Page 120
client connection is automatically connected to the 5GHz network as the main connection to improve performance. signal. RF on/off by schedule: Administrator can apply Time Policy to on or off wireless Location Tracking Log: The system can detect the signal strength of the wireless client to ...
Page 121
throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue. AC_VI Video High Minimum delay. Time-sensitive video data is automatically sent to this queue.
Page 122
when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet. Click “Save”...
Page 123
bring multiple groups of tags to another bridge endpoint. WDS Setup: Administrator can select Enable or Disable. Radio ESSID: For connected Radio, please enter the same SSID name for each radio. Security Type: Enable AES 128bit or AES 256bit encryption or Disable this encryption function.
Page 124
WDS considerations 1. When two wireless APs want to use WDS connection, the channels of the two must be the same. 2. If the two base AP stations are A and B, the WDS Client Setup of station A needs to set the wireless MAC address of station B, and the WDS Client Setup of station B needs to set the wireless MAC address of station A.
Page 125
MAC Address:Display connected MAC Address. Rate(TX/RX):Display Tx/Rx rate of the point to point. RSSI: Display signal connection value of RSSI. The RSSI signal quality display of this product is expressed through the signal strength measurement method. Therefore, for RSSI, the larger the "positive value", the better the connection quality.
Page 126
Client Bridge Mode If the administrator needs to switch to Client Bridge mode, Please click "System"-> " Mode Setup " to change Client Bridge mode. Change Setup Mode 6-1. This section provides detailed explanation for users to configure in the Client Bridge Mode and Repeater AP function with help of illustrations.
Page 127
Static IP: IP address: The IP address is 192.168.2.254 Netmask: The default Netmask is 255.255.255.0 Gateway: The default Gateway IP Address is 192.168.2.1, Please check your Gateway IP and change. DNS: Enter IP address of domain name service. ...
Page 128
Configure DHCP Setup 6-3. The DHCP Service function in the Client Bridge device can select a separate IP Address range within the same network segment of the source AP, and allocate those IP Addresses to connecting clients. Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when ...
Page 129
DHCP Clients List: When users link to CenOS 5.0 AP and use IP address of the DHCP service, the DHCP Client List will display users the information and used IP address. IP Address: Display users used IP address. MAC Address: Display MAC Address of users used device. ...
Page 130
General Setup MAC Address:Display 2.4G WiFi MAC address. Country:Administrator can select country: US or EU or Japan or Taiwan. Band Mode:Administrator can select 2.4G Band for 802.11b、802.11b/g、802.11b/g/n、 802.11n. or 802.11ax, The default is 802.11ax Auto Channel:Administrator can Enable or Disable the function. If disabled, the WiFi channel will ...
Page 131
Setting ACK Timeout can strengthen the long-distance connection. Changing the value can optimize the setting. If the value is too low, the length transmission will be reduced. If the value is too high, there may be disconnection. HP Physical Mode TX/RX Stream:Build in 2.4GHz 2 antennas and support 2TX/2RX streams.
Page 132
Aggregation: By default, it's “Enabled”. Select “Disable” to deactivate Aggregation. A part of the 802.11n standard (or draft-standard), it allows sending multiple frames per single access to the medium by combining frames together into one larger frame. It creates the larger frame by combining smaller frames with the same physical source and destination end points and traffic class (i.e.
Page 133
Channel:There are different options for wireless operation modes in regions. Tx Power: Administrator can control the WiFi Tx output power. The power Max. Level 9. Slot Timout : You can enter the slot time value here. When the distance is long or short, the ...
Page 134
corresponds to the channel bandwidth. MAX MCS: Maximum MCS compile set value. The Max MCS value must be greater than the Min MCS value. Shout GI: Short Guard Interval is “Enabled” by default to increase throughput. However, it can ...
Page 135
Advanced Setup 6-4-3. Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal strength, time stamp, support data rate.
Page 136
will help power saving and possibly decrease wireless throughput in multicast applications. Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
Page 137
WMM Setup 6-4-4. His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
Page 138
AC Type: Data Transmitted Queue Priority Description AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue.
Page 139
While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.。...
Page 140
Security: After site survey AP station complete will list all AP station, when click AP station setup button then AP station information (ESSID/Security type) will display on page. PassPhrase Settings: Administrator need manual set correct ESSID security/Cipher type and ...
Page 141
AP Station Security Settings Enable:Administrator can choose this profile enable or disable. Roaming Match:The roaming SSID acceptance format setting requirements for all bridge AP. Whole:Only accept same bridge AP SSID name for wireless automatic connection. Start with:The SSID name format with different SSID but the same prefix of the ...
Page 142
【Supports 128 users to access at the same time.】 Security Type: Select the desired security type from the drop-down list; the options are Open System, WPA-PSK/WPA2-Personal, WPA/WPA2-Enterprise, WPA3 and 802.1x Notes: The WEP encryption mode is currently known to be not the most secure wireless encryption method, and will not be able to support 802.11ac/ax.
Page 143
wireless client wants to connect, can be choose which group of wireless keys and establish a connection through WEP encryption. Note: If you choose to use WEP encryption mode, please enter the corresponding WEP key value according to the following requirements. 64bits: 10 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 5 groups of ASCII characters (0~9, A~Z and a~z can be used)
Page 144
Group Key Update Interval: The time interval is for re-keying GTK (broadcast/multicast encryption keys) in seconds. Enter the time-length required; the default time is 600 seconds. Pass Phrase: Enter the ESSID pass phrase. WPS Push Button: Administrator can used WPS function to link WiFi client. If enabled, ...
Page 145
Radius Server:Enter the IP address of the Authentication RADIUS server. Radius Port: The port number used by Authentication RADIUS server. Use the default 1812 or enter port number specified. Radius Secret: The secret key for system to communicate with Authentication RADIUS server. ...
Page 146
Only Allow List MAC: Define certain wireless clients in the list which will have granted access to the Access Point while the access will be denied for all the remaining clients – Action Type is set to “Only Allow List MAC”. Only Deny List MAC: Define certain wireless clients in the list which will have denied access to ...
Page 147
Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) between which a STA can use Fast BSS Transition. Please enter 2-octet identifier as a hex string. R0 Key Lifetime: Default lifetime of the PMK-RO in minutes, the default is 10000, administrator can ...
Page 148
NAS Identifier: Enter 1~48 octets of network domain name. Shared Key of 128 bit. 128-bit Key: Enter R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification. MAC Address: Enter the main roaming device MAC address ...
Page 149
Change Setup mode 7-1. If the administrator needs to switch to WISP mode, Please click "System"-> " Mode Setup " to change WISP mode. When the upper limit of the 2.4G frequency is used, the repeater AP will only be able to use the other two 5G extension Repeater AP APs.
Page 150
Dynamic IP: Please consult with WISP for correct wireless settings to associate with WISP AP before a dynamic IP, along with related IP settings. If IP Address is not assigned, please double check with your wireless settings and ensure successful association. Also, you may go to “WAN Information” in the Overview page to click Release button to release IP address and click Renew button to renew IP address again.
Page 151
PPTP: The Point-to-Point Tunneling Protocol (PPTP) mode enables the implementation of secure multi-protocol Virtual Private Networks (VPNs) through public networks. User Name: Enter account for PPTP. Password: Enter user name account used password for PPTP. PPTP Server IP: Enter remote IP address of PPTP Server. ...
Page 152
On Demand – A connection to Internet is made as needed. Manual – Click the “Connect” button on “WAN Information” in the Overview page to connect to the Internet. MAC Clone : The MAC address is a 12-digit HEX code uniquely assigned to hardware as identification. ...
Page 153
IP Settings: Administrator can select the IP used Static or Dynamic IP address. Static IP : A set of fixed IP addresses can be manually set for the system to use. Dynamic IP : If there is a DHCP server on the top, you can use the dynamic IP address to let the system ...
Page 154
DHCP Setup Start IP / End IP: Specify the range of IP addresses to be used by the DHCP server when assigning IP address to clients. Netmask: The netmask default is 255.255.255.0. Gateway: Enter source gateway IP address. ...
Page 155
DHCP Clients List: When users link to CenOS 5.0 AP and use IP address of the DHCP service, the DHCP Client List will display users the information and used IP address. IP Address: Display users used IP address. MAC Address: Display MAC Address of users used device. ...
Page 156
Wireless General Setup 7-5. Radio 0 (2.4G) Basic Setup 7-5-1. General Setup MAC Address:Display 2.4G WiFi MAC address. Country:Administrator can select country: US or EU or Japan or Taiwan. Band Mode:Administrator can select 2.4G Band for 802.11b、802.11b/g、802.11b/g/n、 ...
Page 157
ACK timeout:When waiting for the "ACKnowledgment frame" interval is too long to be received, the ACK will be retransmitted. A higher ACK Timeout will reduce packet loss, but the transmission efficiency will be poor. Setting ACK Timeout can strengthen the long-distance connection. Changing the value can optimize the setting.
Page 158
Short GI : Short Guard Interval is “Enabled” by default to increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation. Aggregation: By default, it's “Enabled”.
Page 159
Auto Channel: Administrator can Enable or Disable the function. If select disabled function the WiFi channel can be manually fixed. Channel:There are different options for wireless operation modes in regions. Tx Power: Administrator can control the WiFi Tx output power. The power Max. Level 9. ...
Page 160
TX/RX Stream: Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. Channel BandWith: The Wireless 5G can choose 20 or 20/40 Mhz or 11ac/ax 80Mhz at 5G-1 (Radio-1) or 11ax 160Mhz at 5G-2 (Radio) as the data transmission speed between the base station and wireless users.
Page 161
Advanced Setup 7-5-3. Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”. Beacon is broadcast to all the stations, provides the basic information of AP such as SSID, channel, encryption keys, signal strength, time stamp, support data rate.
Page 162
will help power saving and possibly decrease wireless throughput in multicast applications. Fragmentation Threshold: Fragmentation Threshold is one more parameter which is given in all stations and Access points. Fine tuning Fragmentation Threshold parameter can result in good throughput but not using it properly can results in low throughput. In simple words it does the same thing which MTU do in Ethernet.
Page 163
WMM Setup 7-5-4. His affects traffic flowing from the access point to the client station. Configuring QoS options consists of setting parameters on existing queues for different types of wireless traffic. You can configure different minimum and maximum wait times for the transmission of packets in each queue based on the requirements of the media being sent.
Page 164
AP to Clients AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue. AC_VI Video High...
Page 165
retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.。 Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. Station Setup 7-5-5.
Page 166
If Security/Cipher selected or set PassPhrase is wrong, it will not be able to bridge normally. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. Station Porfile Setup 7-5-6. You can create setting multiple configuration files for your working WISP AP connection settings and choose whether to enable single or multiple transactions at the same time.
Page 167
divisions. SSID:Administrator can set Wi-Fi SSID name Security Type:Administrator can select the encryption information corresponding to the bridge AP connection. Comment:Administrator can be marked for each of profiles individual notes. Repeater AP Setup 7-5-7. Administrators can configure ESSID, SSID broadcasting, Maximum number of client associations. Access Point: Administrator can Enable or Disable the Repeater AP function.
Page 168
Notes: The WEP encryption mode is currently known to be not the most secure wireless encryption method, and will not be able to support 802.11ac/ax. It is not recommended that you continue to use this WEP encryption mode. It is recommended that you use a rate that meets 802.11ac/ax Correspondingly supported encryption modes above WPA / WPA2 to increase your wireless network security.
Page 169
Note: If you choose to use WEP encryption mode, please enter the corresponding WEP key value according to the following requirements. 64bits: 10 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 5 groups of ASCII characters (0~9, A~Z and a~z can be used) 128bits: 26 groups of Hexadecimal characters (0~9, A~F and a~f can be used) 13 groups of ASCII characters (0~9, A~Z and a~z can be used)
Page 170
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 171
Note: When setting WEP or TKIP encryption, the data rate will not exceed 54 Mbps. The IEEE 802.11n protocol prohibits the use of high throughput with WEP or TKIP as unicast keys. If you use these encryption methods (such as WEP, WPA-TKIP, WPA2-TKIP), your data rate will be reduced to 54 Mbps, or if it is used for commercial purposes, such as applications where the end user cannot connect to the wireless at a higher speed than 54 Mbps.
Page 172
MAC Filter Setup 7-5-8. Administrator can setup allow or reject WiFi clients(MAC address) to access Repeater AP. Rule: Select the desired access control type from the drop-down list; the options are Disable, Allow or Reject. Only Allow List MAC: Define certain wireless clients in the list which will have granted access to ...
Page 173
The Tri band Access Point supports 802.11r/802.11k function for 2.4G (Rado 0)and 5G (Rado 1)and (Rado 2). 802.11r, which is the IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP. Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) ...
Page 174
MAC Address: Enter must key in the MAC Address of other AP NAS Identifier: Enter 1~48 octets of network domain name. Shared Key of 128 bit. 128-bit Key: Enter R0 Key Holder List: After setting "R0 Key holders" function the information will appear in list. R1 Key Holder List: Enter a unified set of R1 Key Holder identification certification.
Page 175
Router Mode Change Setup Mode 8-1. When Router AP mode is chosen, the system can be configured as an Router AP mode. This section provides detailed explanation for users to configure in the Router AP mode with help of illustrations. In the Router AP mode, functions listed in the table below are also available from the Web-based GUI interface.
Page 176
WAN Setting Static IP: Users can manually setup the WAN IP address with a static IP provided by WISP. IP Address: The IP address of the WAN port. IP Netmask: The Subnet mask of the WAN port. IP Gateway: The default gateway of the WAN port.
Page 177
User Name : Enter User Name for PPPoE connection Password : Enter Password for PPPoE connection MTU: By default, MTU is set to 1492 bytes. MTU stands for Maximum Transmission Unit. Consult with WISP for a correct MTU setting. Reconnect Mode: Administrator can select three function for Always On / On Demand / Manual.
Page 178
Netmask: The Subnet mask of the WAN port. MTU: By default, it’s 1460 bytes. MTU stands for Maximum Transmission Unit. Consult with WISP for a correct MTU setting. MPPE40/128: Microsoft Point-to-Point Encryption (MPPE) encrypts data in Point-to-Point Protocol ...
Page 179
Primary DNS: The IP address of the primary DNS server. Secondary DNS: The IP address of the secondary DNS server. The NAT support Enable and Disable Service VLAN Setup 8-3. Here are the instructions to setup the local IP Address / Netmask / Gateway / DNS and management Access Point 2.4G or 5G-1 Radio or 5G-2 Radio on/off.
Page 180
VLAN Mode:Display on/off for the VLAN network. Flag:Display master VLAN and VLAN Tag No. information. When displayed it means that the current main wired connection is this virtual network as the main login system. IP Address:Display IP Address for VLAN Network ...
Page 181
Management Access Point 0:Administrator can Enable or Disable 2.4G Radio. Access Point 1:Administrator can Enable or Disable 5G-1 Radio. Access Point 2:Administrator can Enable or Disable 5G-2 Radio. 802.1d Spanning Tree : The spanning tree network protocol provides a loop free topology for a ...
Page 182
ETH1 VLAN Tag Setup Network port VLAN Tag Setup: Follow standard 802.1Q specification, the function can be turned off or enabled. You can define the tag to the ETH1 physical network port , which can be set from 1 to 4096. ETH2 VLAN Tag Setup Network port VLAN Tag Setup: Follow standard 802.1Q specification, the function can be ...
Page 183
DHCP Server 8-3-1 Administrator can select enable / disable the function Start IP: Set Start IP address for DHCP Service. End IP: Set End IP address for DHCP Service. Netmask: Set IP Netmask, the default is 255.255.255.0 Gateway: Set Gateway IP address for DHCP Service.
Page 184
addresses from the DHCP server. Default is 86400 seconds DHCP Client List Administrator can view IP address used status of client users on each DHCP Server. Static Lease IP Setup:Administrator can set be delivered fixed IP address to the users. ...
Page 185
Bandwidth Control / Total Bandwidth Control Mode: Administratior can Enable or Disable the function. Airtime Fairness: TX/RX traffic balancing, if device use point-to-point ( WDS or AP mode + Client Bridge) then recommended to enable it. Total Bandwidth Control: Administrator can set total bandwidth used limit in VLAN ...
Page 186
Access Point: Administrator can Enable or Disable the radio 0/1/2 (2.4G/5G/5G). ESSID: Administrator can set Wi-Fi SSID name SSID Visibility: Administrator can select Enable or Disable the Visibility. Client Isolation: Enable or Disable the client isolation function. ...
Page 187
: WEP Auth Method:Administrator can choose the WEP Open system open authentication method or the WEP Shared password authentication method. WEP Length:Administrator can choose to use 64bits, 128bits, and 152bits encryption key lengths, but must make sure that the wireless network card used by your wireless client also supports the corresponding wireless key length.
Page 188
WPA / WPA2-Personal: WPA Mode: Administrator can select security for Auto or only WPA or only WPA2. Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a ...
Page 189
WPA / WPA2-Enterprise: WPA Mode: Administrator can select security for Auto or only WPA or only WPA2. Cipher Type: Administrator can select use AES or TKIP with WPA / WPA2 encryption method. AES is short for “Advanced Encryption Standard”, The AES cipher is specified as a ...
Page 190
WPA3 : The 802.11ax peer-to-peer entity authentication mode is different from the Pre-Shared Key . SAE Password:When the administrator sets this virtual wireless network SSID to use WPA3 calculation, the SAE connection password must be at least 8 characters. SAE PWE:Optionally enable the SAE PWE (Password Element) function, before exchanging ...
Page 191
MAC Filter 8-3-4 Only Deny List MAC:Administrator can add wireless users MAC address in MAC list. The access point will deny connection in MAC address list. Only Allow List MAC:Administrator can add wireless users MAC address in MAC list. The ...
Page 192
If this feature is enabled when using 802.11r fast roaming, the wireless user equipment must support 802.11k functionality to work properly Mobility Domain: MDID is used to indicate a group of APs (within an ESS, i.e., sharing the same SSID) between which a STA can use Fast BSS Transition.
Page 193
R0 Key holders : To enable roaming between multiple AP devices, AP1 must key in the MAC Address of AP2, and AP2 must key in the MAC Address of AP1. The NAS Identifier and 128-bit Key should be identical in both AP settings. This will enable device roaming between the two Access Points.
Page 194
Wireless Configuration 8-4. Radio 0 (2.4G) Basic Setup 8-4-1. General Setup MAC Address:Display 2.4G WiFi MAC address. Country:Administrator can select country: US or EU or Japan or Taiwan. Band Mode:Administrator can select 2.4G Band for 802.11b、802.11b/g、802.11b/g/n、 802.11n.
Page 195
the ACK will be retransmitted. A higher ACK Timeout will reduce packet loss, but the transmission efficiency will be poor. Setting ACK Timeout can strengthen the long-distance connection. Changing the value can optimize the setting. If the value is too low, the length transmission will be reduced.
Page 196
increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation. Aggregation: By default, it's “Enabled”. Select “Disable” to deactivate Aggregation. A part of the 802.11n standard (or draft-standard), it allows sending multiple frames per single access to the medium by combining frames together into one larger frame.
Page 197
Auto Channel: Administrator can Enable or Disable the function. If select disabled function the WiFi channel can be manually fixed. Channel:There are different options for wireless operation modes in regions. Tx Power: Administrator can control the WiFi Tx output power. The power Max. Level 9. ...
Page 198
TX/RX Stream: Administrator can select 1 or 2 TX/RX. The default is 2TX/2RX. Channel BandWith: The Wireless 5G can choose 20 or 20/40 Mhz or 11ac/ax 80Mhz at 5G-1 (Radio-1) or 11ax 160Mhz at 5G-2 (Radio) as the data transmission speed between the base station and wireless users.
Page 199
Advanced Setup 8-4-3. Beacon Interval: Beacon Interval is in the range of 40~3500 and set in unit of millisecond. The default value is 100 msec. Access Point (AP) in IEEE 802.11 will send out a special approximated 50-byte frame, called “Beacon”.
Page 200
A DTIM interval is a count of the number of beacon frames that must occur before the access point sends the buffered multicast frames. For instance, if DTIM Interval is set to 3, then the Wi-Fi clients will expect to receive a multicast frame after receiving three Beacon frame. The higher DTIM interval will help power saving and possibly decrease wireless throughput in multicast applications.
Page 201
Band Steering(5G Priority):When 2.4GHz and 5GHz networks exist at the same time, the 5GHz client connection is automatically connected to the 5GHz network as the main connection to improve performance. signal. RF on/off by schedule: Administrator can apply Time Policy to on or off wireless ...
Page 202
AC_BK Background High throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AC_BE Best Effort Medium Medium throughput and delay. Most traditional IP data is sent to this queue. AC_VI Video High...
Page 203
While the No ACK policy helps improve transmission efficiency, it can cause increased packet loss when communication quality deteriorates. This is because when this policy is used, a sender does not retransmit packets that have not been received by the recipient. When the Normal ACK policy is used, the recipient acknowledges each received uncast packet.
Page 204
Static Assignment: Enter external and internal IP address of DMZ host. The function only external IP to Internal IP address External IP Address: Enter external IP address Internal IP Address: Enter Virtual IP for service device. IP Filter 9-2.
Page 205
Active: Administrator can select Enable or Disable the service. Comment: Enter the description of IP filter rule. Policy: Administrator can select the IP flow rule of Deny or Pass. In/ Out: Administrator can select the IP flow rule of In/out bound. ...
Page 206
Source Destination Rule In/Out Protocol Listen Action Side IP/Mask Port IP/Mask Port 192.168.2.2/32 192.168.2.254/32 Pass 192.168.2.0/24 192.168.2.254/32 Deny Example 2: All Telnet access to the system from the IP addresses of subnet 192.168.2.x works with the rule 1 of Example 2. The rule 2 won’t make any difference.
Page 207
Policy: Administrator can select to use rule by “Time Policy”. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. Virtual Server 9-4. The “Virtual Server” can also referred to as “Port Forward” as well and used interchangeably. Resources in the network can be exposed to the Internet users in a controlled manner including on-line gaming, video conferencing or others via Virtual Server setup.
Page 208
Public Port: Enter service port No. for public. Private IP Address: Enter corresponding IP address for internal. Private Port: Enter internal service port No. for private. Schedule : Administrator can select to used rule of “Time Policy” ...
Page 209
# Access control rules: Active:Administrator can select Enable or Disable for the Access control rule. Comment:Administrator can enter comment for the role. Protocol:Administrator can to select management protocol by TCP/UDP/ICMP/Content Filter/Domain Filter and IP P2P. ANY: Select "Any" is all deny Protocol, administrator can filter local IP / IP range go to ...
Page 210
CAP Mode Change Setup Mode 10-1. If the administrator needs to switch to CAP mode, Please click "System"-> " Mode Setup " to change CAP mode. Click “Save” button to save your changes. And click “Reboot” button to activate your changes Please note that the LAN IP addresses in each mode are different from each other and will not continue.
Page 211
NetMask:Display netmask for the VLAN mode. Action:Administrator can set VLAN IP、Radio 2.4 or 5G-1 or 5G-2 on/off、Spanning tree、VLAN VLAN Mode:Administrator can Enable or disable the VLAN function. IP Setup:Administrator can set the VLAN IP address and NetMask or disable IP. ...
Page 212
ETH1 VLAN Tag Setup: Administrator can set Tag ID for the Ethernet port. ETH2 VLAN Tag Setup:Administrator select Enable/disable the Ethernet port and set the Tag ID for the Ethernet port. Click “Save” button to save your set function. Then click “Reboot” button to activate your changes. AP Control 10-3.
Page 213
# Centralized Management APs operating Instructions. Filter Device: VLAN#:Administrator can select VLAN network to discovery managed Aps Default Password:Set login system password by managed Aps. Sort:Administrator can select discovery managed Aps Type. (IP or MAC) Scan Result #:...
Page 214
VLAN:When VLAN Tag function is enabled (please refer for “System VLAN Setup”), administrator can change VLAN tag for managed APs Group:When AP Groups are created (please refer” Group setup”), Administrators can select and change group settings of managed APs. Batch Setup:Administrator can centralize setting changes for managed APs.
Page 215
AP Setup 10-3-3. Administrator can monitor statuses and modify managed APs information. VLAN:Select desired VLAN for AP setup Setup:Administrator can modify IP addresses, system login passwords, and web login port for managed APs. If administrator has change AP devices, administrator can modify MAC address of the new managed AP.
Page 216
then use the image URL to import the map into the AP user interface. Once the image is uploaded, administrators can use the Map Setup function to map out the locations of the AP network Create New Map:Click the button to create map ...
Page 217
After the Map URL setup confirmation, please reboot the system. View:Once complete, administrators can click the “View” button to monitor AP statuses and locations.。 Authentication Profile (Profile) 10-3-6. Administrator can pre-set authentication conditions in the profile, the authentication set can refer “Authentication”.
Page 218
Create New Profile:Administrator can create authentication profile. Edit: Click the Authentication button to Enable or Disable authentication function. For more details, refer to “Authentication”. Click Dropdown to set authentication functions. Refer to “Authentication” dropdown functions. Action: The button can modify or delete for the authentication profile. ...
Page 219
port number, and delete MAN-Mesh Divice. MAN-Mesh Status 10-4-2. Display the system status, IP address, comment, I{time, firmware version, and firmware release date of the newly added MAN-Mesh Device. This function is only for authorized MAN-Mesh hosts in the display environment. For more MAN-Mesh support functions, please refer to the related MAN-Mesh function detailed operation manual.
Page 220
Save Settings to PC: Click Save button to save the current configuration to a local disk. Load Settings from PC: Click Browse button to locate a configuration file to restore, and then click Upload button to upload. Reset To Factory Default: Click Default button to reset back to the factory default settings and ...
Page 221
Select File: Administrator can select Firmware file in Local PC. Upgrade Via Local PC and TFTP Server: The upgrade firmware will support via local PC and TFTP Server and HTTP URL to upgrade system. V1.3 V1.0a...
Page 222
We strongly recommend that you perform the firmware update by following these steps: 1.Please use a RJ-45 network cable to connect the computer and the wireless base AP mode to perform the update operation. Do not use a wireless connection for firmware update operations.
Page 223
Traceroute:Allows tracing the hops from the CenOS 5.0 AP device to a selected outgoing IP address. It should be used for the finding the route taken by ICMP packets across the network to the destination host. The test is started using the Start button, click Stop button to stopped test. Destination Host: Specifies the Destination Host for the finding the route taken by ICMP ...
Page 224
Status The status mainly displays system related information, including system network information, wireless base station information, and wireless user connection information. Overview 12-1. Overview:It mainly displays the current mode, name, time, firmware version, network card address and related network settings. Information:Shows the performance / memory usage of the total CPU space used by the ...
Page 225
Radio 0/Radio 1/Radio2:Displays the basic operating mode information of the current Radio 0 (2.4GHz) / Radio 1 (5GHz-1) / Radio 2 (5GHz-2) wireless AP. Wireless Client 12-2. The page can be display Wireless user information link to access point. Administrator can monitor ※...
Page 226
Online Users 12-3. The status can display online users by Captive Portal. Administrator can monitor user’s login / logout time and account type for the authentication account. (This page only used AP mode) This function works in the wireless AP mode. When the web authentication function is activated, the current connection status and related information of online users who have passed the authentication will be displayed.
Page 227
MAN-Mesh Link Chart 12-5. This function works in MAN-Mesh mode. When the MAN-Mesh function is enable, the MAN-Mesh APs connection information will be displayed. (Please refer to the manual "MAN-Mesh" function) Display MAN-Mesh connection information(MAN-Mesh Link Chart) or MAN-Mesh signal status(MAN-Mesh Client) to view MAN-Mesh related information.
Page 229
MAN-Mesh Client 12-6. This function works in MAN-Mesh mode. When the MAN-Mesh function is enable, the MAN-Mesh APs connection information will be displayed. (Please refer to the manual "MAN-Mesh" function) Display MAN-Mesh connection status of MAN-Mesh wireless signal . MAN-Mesh Client MAN-Mesh Radio 0 (2.4G) MAC Address : Peripheral MAN-Mesh MAC address connected to Radio 0 ...
Page 230
MAN-Mesh Radio 2 (5G) MAC Address : Peripheral MAN-Mesh MAC address connected to Radio 2 Rate(RX/TX) : Peripheral MAN-Mesh equipment connected to Radio 2 transmission rate , RX receive rate and TX transmit rate RSSI : Display the signal value between wireless users and Radio 2 ...
Page 231
(such as handheld WiFi client devices or WiFi laptops that require seamless connection when moving) to connect from a Cerio When the AP access point switches to another Cerio WiFi AP access point, it maintains a continuous wireless connection and can continue to transmit without reconnecting.
Page 232
RSSI quality results. Before setting up the Cerio WiFi AP, please ensure that the relative signal transmission power (Power Level) of each Cerio WiFi AP in your environment is appropriately arranged. Know the relative distance between your WiFi client network card device and the WiFi AP and the reachable RSSI status.
Page 233
1. Environment: Each Cerio WiFi AP has "overlapping signals at the roaming end" deployed with each other. 2. Each Cerio WiFi AP uses the same channel, the same SSID name (ESSID) and the same WiFi encryption. 3. For each Cerio WiFi AP, set its own relative "R0/R1Key Holders and other related AP neighbor lists".
Page 234
This signal usually refers to the RSSI between -70 and -80 after the WiFi client network card is connected to the Cerio WiFi AP access point. When the driver automatic mechanism of the WiFi client *Tip : In addition to the above-mentioned query methods through the software UI, you can also quickly obtain the MAC address ID of each relative radio through the off-machine label of the Cerio product body.
Page 235
Step-3 : First understand the neighbor status of each AP where it is located Through the overall planning of the "overlapping signals at the roaming end", you can clearly understand the neighbors of each WiFi AP's "overlapping signals at the roaming end". The 802.11r roaming mechanism is responsible for the WiFi AP.
Page 236
Step-4 : Perform 802.11r settings on each WiFi AP; use the above illustration as an example of subsequent related settings. Through the overall planning of the "overlapping signals at the roaming end", you can clearly understand the neighbors of each WiFi AP's "overlapping signals at the roaming end". The 802.11r roaming mechanism is responsible for the WiFi AP.
Page 237
1.) The neighbor of IP 251 WiFi AP is IP 252 WiFi AP, which means that IP251 WiFi AP must : In the roaming 11r setting of Radio-0 (2.4G), you need to add neighbor 8c:4d:ea:ff:ff:3f in the roaming list (R0KH or R1KH list). Roaming shared domain name : Key password Each device must be named with the same "domain...
Page 238
The adjacent neighbors of IP 252 WiFi AP are IP 251 WiFi AP and IP 253 WiFi AP, which means that IP252 WiFi AP must : In the roaming 11r setting of Radio-0 (2.4G), you need to add neighbors 8c:4d:ea:ff:ff:30 and 8c:4d:ea:ff:ff:4e to the roaming list (R0KH or R1KH list). Roaming shared domain name : Key password Each device must be named with the same "domain...
Page 239
1. Environment Each Cerio WiFi AP "has been deployed with each other" with "overlapping signals at the roaming end". 2. Each Cerio WiFi AP uses the same channel, the same SSID name (ESSID) and the same WiFi encryption 3. For each Cerio WiFi AP" set its own relative "R0/R1Key Holders and other related AP neighbor lists"...
Page 240
Point to Point / Multi-Point for WDS settings 13-2. The WDS function is applied in the wireless AP mode. This function is mainly used for point-to-point wireless AP bridging. For the setting method,You can refer to the manual “WDS Setting”. This document mainly guides the key WDS procedures.
Page 241
Apply CERIO web authentication login page sample 13-3. If the device uses our company's wireless AP CenOS5.0, and the web authentication function is enabled, you will be able to customize the web authentication page. You can follow the steps below to easily complete the sample login page.
Page 242
Step 6 : Go to the company's Cerio website to download the sample file first. And open your download sample, select all the HTML syntax and copy it, then paste it on the custom edit page of the system and save it.
Page 243
Login page for template below : V1.3 V1.0a...
Page 244
This part must be within 190 lines. If the written HTML / CSS and other source code exceeds a certain line, it is recommended to save the CSS source code to the remote Web server, and then enter the IP address of the remote web server.
Page 245
Step 8 : The login function of this system is displayed by default. If there are unnecessary fields, specific fields can be hidden by CSS syntax, as explained below: Add the <style> class tag in the syntax and then add {display: none;} </ style> as the following example, find the ID code of the field to be hidden by the browser, for example, to hide the "Please "Sign in"...
Page 247
Appendix. WEB GUI Valid Characters Table A WEB GUI Valid Characters Block Field Valid Characters IP Address IP Format; 1-254 IP Netmask 128.0.0.0 ~ 255.255.255.252 IP Gateway IP Format; 1-254 Primary DNS IP Format; 1-254 Secondary DNS IP Format; 1-254 Hostname Length : 32 0-9, A-Z, a-z...
Need help?
Do you have a question about the OW-500 6N00-MESH and is the answer not in the manual?
Questions and answers