Advantech EKI-6321AG User Manual
Advantech EKI-6321AG User Manual

Advantech EKI-6321AG User Manual

802.11 a/b/g single/dual/triple radio outdoor wireless access point

Advertisement

Quick Links

EKI-6321AG
EKI-6322AG
EKI-6323AG
802.11a/b/g Single/ Dual/ Triple
Radio Outdoor Wireless Access
Point
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EKI-6321AG and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Advantech EKI-6321AG

  • Page 1 EKI-6321AG EKI-6322AG EKI-6323AG 802.11a/b/g Single/ Dual/ Triple Radio Outdoor Wireless Access Point User Manual...
  • Page 2 The documentation and the software included with this product are copyrighted 2010 by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements in the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of Advantech Co., Ltd.
  • Page 3 Because of Advantech′s high quality-control standards and rigorous testing, most of our customers never need to use our repair service. If an Advantech product is defective, it will be repaired or replaced at no charge during the warranty period. For out-of-warranty repairs, you will be billed according to the cost of replacement materials, service time and freight.
  • Page 4: Fcc Radiation Exposure Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 5 Step Contact your distributor, sales representative, or Advantech’s customer service center for technical support if you need additional assistance. Please have the following information ready before you call: - Product name and serial number...
  • Page 6 Safety Precaution - Static Electricity Follow these simple precautions to protect yourself from harm and the products from damage. 1. To avoid electrical shock, always disconnect the power from your PC chassis before you work on it. Don't touch any components on the CPU card or other cards while the PC is on. 2.
  • Page 7: Chapter 1. Overview

    Chapter 1. Overview 1.1. Features EKI-6321AG, EKI-6322AG and EKI-6323AG are perfectly ideal wireless solutions for outdoor long range deployment, ultra fast roaming and reliable and robust wireless infrastructure. All of them provide 5GHz/ 2.4GHz dual band radio functionality with clean and highly reliable wireless point-to-point (PtP) or point-to-multipoint (PtMP) performance for distant locations.
  • Page 8 Harsh Outdoor Environments Sustainable o Certified IP67 sturdy water-tight housing o Wide operating temperature range from -35~70 ℃ System Management : o Firmware upgrade through TFTP, FTP o Interface status display o SNMP v1/v2 Simple Installation and Deployment : o Software Alignment / Deployment Tools...
  • Page 9: Specifications

    1.2. Specifications...
  • Page 10 ℃ ℃ ℃...
  • Page 11: Chapter 2. Hardware Installation

    Do make sure the operation frequency follows your local regulation. Some areas may have penalty when operating outdoor AP in a wrong frequency band. Advantech takes no responsibility for any penalty or loss caused by using illegal frequency band for Advantech EKI-6321AG/ EKI-6322AG/ EKI-6323AG.
  • Page 12: Hardware Description

    PoE. When the outdoor AP unit and the PoE are connected together with proper power supply, the outdoor unit is turned on and initialized. The console port is used at the initial setup and to connect to the antenna alignment kit. Front view of Advantech EKI-6321AG...
  • Page 14 ×...
  • Page 16: Outdoor Installation

    1.5. Outdoor Installation Before installation, please read and follow the precautions to the installation: Users MUST use a proper and well-installed surge protector in the outdoor installation. Otherwise, lightening surge may damage the devices. Lightning DAMAGE IS NOT COVERED UNDER WARRNTY. Users MUST use the PoE Injector shipped in the box.
  • Page 17 ( )...
  • Page 20 Chapter 4. Basic Configurations Login Access the system web user’s interface by insert the device IP address in URL of the web browser. The factory default IP address is 192.168.1.1. Login ID and password is required before access the system web user’s interface. The default user’s ID is admin and password is password.
  • Page 21 The following sections outline each selection item. 4.1 General Configuration The General configuration consists of four major parts: System General Setup Interface Configuration Assign WAN interface (Configuration only available when Router operation mode) Routing Configuration (Configuration only available when Router operation mode)
  • Page 22 4.1.1 System General Setup 1.1.1 System General Setup – Basic Setup Device Name & Description For identifying a particular outdoor access point. System Operation Mode AP can operate in either bridge mode or router mode. Note that when the AP is configured to operate in bridge mode, all four interfaces operate as bridge.
  • Page 23 DC-MESH DC-MESH is developed to improve wireless backbone connection to enhance better performance in overall throughput rate of the deployment. DC-MESH is a passive wireless backbone link failover methodology. "Wireless Station" interface will automatically switch the wireless backbone connection to another "Access Point" node (which has same ESSID ,ISP ID and SUB ID configuration).
  • Page 24 dynamic backbone route on wireless backbone passively when failure node occur. Because DC-MESH is a passive mechanism, link in wireless backbone can be more efficient than normal MESH. DC MESH feature description There are two DC-MESH mode devices in DC-MESH deployment: Gateway Node "Gateway Node"...
  • Page 25 There is a set of connection code for "Normal Node" to decide reconnecting access point in DC-MESH topology: ISP ID "ISP ID" is a specific 32bits digitized code for one wireless network service provider. When "Normal Node" is switching to the other Daisy Chain link, "Normal Node" will match the "ISP ID" of the new Access Point before connection is created.
  • Page 26 "DC-MESH Route Rule" provided the information for "Normal Node" to decide new wireless backbone route: Max Hops "Max Hops" setting limits the maximum node numbers in a Daisy Chain link. "Normal Node" will chose the less hops to reconnect when route is switching.
  • Page 27 Max RSSI Each device in Daisy Chain will have a "RSSI score" to add up the total RSSI in Daisy Chain route to the Gateway Node. When 2 available Daisy Chain paths have same number of hops the "Normal Node" will chose the less RSSI score to reconnect when route is switching.
  • Page 28 1.1.3 System General Setup – System Data/Time Set System Date & Set System Time Set the date and time NTP Setup When any NTP server is available in network, user can enable the NTP and system will automatically synchronize system time with NTP server. DNS Setup In order to enable NTP service, DNS setting is required for resolving domain name into IP address.
  • Page 29 1.2 Interface Configuration Interface Configuration is for configure the Ethernet interface and the multi wireless interfaces in system. All the physical settings of interfaces are configured here. Each interface can be individually enable/disable. When system is configured as a bridge, the IP address of system is set in the Bridge interface. Depends on the system, DHCP server and gateway can also be set in this page.
  • Page 30 The following settings can be configured for the wireless interfaces: In Bridge Mode In Router Mode Individual IP subnet belongs to specific interface will available in setting.
  • Page 31 Operation Mode Each interface can be set as an access point (AP) or a wireless station (also called AP client (AC)). When the interface is an AP, it accepts connection requests from wireless clients, such as wireless internet cards in PC or WiFi phones.
  • Page 32 station problem does not exit from the perspective of the AP. RTS Threshold can be set between 1 and 2312 bytes. Frag Threshold Setting the packet size to activate fragmentation. Frag Threshold can be set between 1 and 2312 bytes. Link Rate Set the data link rate for system.
  • Page 33 1.4 Routing Configuration (Configuration only available when Router operation mode) System also provides static routing table for network administrators to edit the necessary static route rule.
  • Page 34 4.2 Advanced Setting Under advanced settings, you will be able to configure the following: System Password Wireless Performance DHCP Configuration NAT Configuration SNMP configuration Wireless Security Setting 2.1 System Password The factory default web user interface password is “password”. Please do change it into another to secure the system login.
  • Page 35 2.2 Wireless Performance In order to serve higher quality of wireless hotspot, system provides Bandwidth Control and QoS setting for administrator to divide difference bandwidth service for various client connections. 2.2.1 Bandwidth Control Downstream and upstream data rates for subscriber or the client devices connecting to AP can be defined here.
  • Page 36 For specific client connections, system provides a table for network administrator to limit bandwidth of each individual client by MAC address. Once these client MAC addresses are set in the table, the general bandwidth limit rule will not apply to the connection of devices with these MAC address. Only the specified bandwidth limit rule applied.
  • Page 37 2.2.2 QoS Setting DSCP Differentiated Services Code Point (DSCP) is a 6-bit field in the header of IP packets for packet classification purposes. DSCP replaces the outdated IP precedence, a 3-bit field in the Type of Service byte of the IP header originally used to classify and prioritize types of traffic. Protocol Protocol base QoS mechanism differentiate packets by TCP/UDP service port to assign packets in different priority level.
  • Page 38 2.3 DHCP Configuration The scope of DHCP client pool that corresponds to the selected interface and subnet are defined in this menu. Lease (D) is the duration that the DHCP server grants to the DHCP client permission to use a particular IP address.
  • Page 39 Bridge Mode Router Mode...
  • Page 40 2.4 NAT Configuration Network Address Translation can be setup in four different ways: 1. Port forwarding NAT (Server sets) Server sets where internal IP addresses are mapped according to the TCP or UDP port are defined in this Port Forwarding NAT sub-menu.
  • Page 41 2. Static NAT (One to One Mapping) In this menu, you will be able to map internal private IP address to a global WAN IP address. 3. Dynamic NAT (Many to Many Mapping) A range of internal IP address can be mapped to a range of global IP address.
  • Page 42: Snmp Configuration

    4. Single Address NAT (PAT) A range of internal IP address can be mapped to a range of global IP address. The configuration is only available when system is operating in router mode. 2.5 SNMP configuration SNMP is configured here for simple network management. System supports all SNMP v1, v2 and v3. The private MIBs file can also be download from this page .
  • Page 43 2.6 Wireless Security Setting Comprehensive security settings are available on system in this menu. These include Hide ESSID, WEP Keys, 802.1x EAP-TLS, 802.1x EAP-MD5, WPA-PSK, WPA-EAP, MAC Address Filtering and RADIUS. Details of each type of security are in appendix. The security setting of each wireless interface is configured separately.
  • Page 44 2.6.1 MAC Address Filtering System can control the client connection by accepting or blocking the traffic from devices of specific MAC addresses.
  • Page 45 2.6.2 RADIUS RADIUS settings for 802.1x protocol authenticating with the remote RADIUS server for authenticating, authorization and accounting are set in this menu.
  • Page 46 4.3 System Management 3.1 Configuration Management The configuration of system can be backed-up or restored by using TFTP here. In a daisy chained sequential configurations, it is recommended to backup all configurations before uploading/upgrading firmware. You may name your configuration file in any ways you like. The configuration of system can be reset to factory default by using this menu.
  • Page 47 3.2 Security File Management For running EAP_TLS secure connection, network administrators may need to able to upload User Certificate, Root Certificate and RSA Key file to the system. In this menu, system allowed administrators to upload these Certificate files through TFTP server to the access point. Please refer Annotations for more on wireless security.
  • Page 48 Download the new firmware from Internet to the management PC and click Browse to select the file. Please do not shutdown the system during the upgrading process to prevent unexpected system failure. System will automatically reboot and perform image backup after the upgrade. New firmware will take effect after system reboot.
  • Page 49 3.4 System reboot Reboot system from web UI without disconnecting power cable or changing any connection. Certain configurations require system reboot to take place, such as configuration restore. 4.4 System Monitoring In System Monitoring sector, it provides system monitoring for device. The following sections introduce each menu : 4.1 Interface Link Status Real-time link statuses of all interfaces are shown in the menu.
  • Page 50 Transmit power of wireless interface set in SMT-12. - Data Link Rate Real-time data transmission rate. When Data Link Rate in “Interface Configuration” is set, it displays here. Otherwise, when it is set as AUTO in “Interface Configuration”, Data Link Rate here indicates the maximum transmission rate available, and can be used as an indication of link quality.
  • Page 51 4.2 Wireless Survey In Wireless Survey, system provides a signal scan function to detect any available wireless signal around the AP. It will help AP installer to clarify the environment. 4.2.1 Client List All the connecting clients’ MAC address will be display in Client List, including signal and data rate.
  • Page 52 4.3 System log System provide a setting of remote system log server, device will upload all system log to remote log server to provide network administrator to monitor the health of device. System provides seven system log levels (Level1=DEBUG Level2=EMERGENCY Level3=ALERT Level4=CRITICAL Level5=ERROR Level8=WARNING Level7=NOTICE Level8=INFO) to indicate the level of attention needed for each log.
  • Page 53 4.4 System Information System Information summarizes all the configuration and hardware information of the device.
  • Page 54: Antenna Concepts And Installations

    Appendix Antenna concepts and Installations ƒ•‹… ‡”‹‘Ž‘‰› The RF power coming out of the antenna port of a transmitter. It excludes the signal loss of the coaxial cable or the gain of the antenna, and is measured in dBm, Watts or milli-Watts The weakest RF signal level (usually in negative dBm) that a radio needs to receive in order to demodulate and decode a data packet without errors.
  • Page 55 As a signal spreads out from a radiating source, the energy spreads out over a larger surface area. As this occurs, the strength of that signal gets weaker. FSL specifies how much the signal has weakened over a given distance, and it is measured in dB.  ƒ–Š...
  • Page 56: Wireless Security Concept

    II. Wireless Security Concept ‡…—”‹–› ˆ‘” ‡–™‘” With 802.11 WEP, all APs and client radio NICs (Network Interface Card) on a particular wireless LAN have to use the same encryption key. A sending station encrypt each frame with a WEP key before transmission, and the receiving station decrypts it using the same key upon reception.

This manual is also suitable for:

Eki-6322agEki-6323ag

Table of Contents