1. Introduction EOR7550 equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With certified IP‐65 protection, it is designed to deliver high reliability under harsh outdoor environment. Built‐in advanced multi‐functions provide flexibility in constructing scalable WiFi networks for all possible applications. With two individual interfaces, each can be configured into 6 different modes with maximum of 18 combinations. With 802.11n support, EOR7550 offers bandwidth up to 300Mbps to accommodate heavy traffic services such as multimedia streaming. Establishing ...
Management Firmware Upgrade Upgrading firmware via web browser, setting are reserved after upgrade Reset & Backup Reset to factory default. User can export all setting into a file via WEB MIB MIB I, MIB II(RFC1213) and private MIB SNMP V1, V2c 1.2. Package Contents 1 x Dual Radio Multi‐Function Repeater (EOR7550) 1 x PoE injector with Power Adapter 1 x Wall Mounting kit 1 x 1.8m Grounding Cable 1 x CD with User’s Manual 1 x QIG 1.3. System Requirement The following are the minimum system requirements in order configure the device. → PC/AT compatible computer with an Ethernet interface. → Operating system that supports HTTP web‐browser 1.4. Applications EOR7550 provides 18 operation modes for different applications in different environment. (1) Radio1 Radio2 Radio1 ...
Page 7
SSID2 LAN WAN EOR7550 are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs: Difficult‐to‐wire environments There are many situations where wires cannot be laid easily. Historic buildings, older buildings, open areas and across busy streets make the installation of LANs either impossible or very expensive. ...
Page 8
SOHO users need a cost‐effective, easy and quick installation of a small network. Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs. Wired LAN backup Network managers implement wireless LANs to provide backup for mission‐critical applications running on wired networks. Training/Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning. ...
2. Modes EOR7550 provides 2 separate radio channels for wider service area. Each of these 2 radio channels can be configured as different function mode separately. The device allows you to configure into different modes for different purposes in your network infrastructure. Each of these modes will have different setting. You are allowed to configure your radio channel freely with the following combination. EOR7550 Radio1(11a/b/g) Concurrent Modes ...
2.2. Client Bridge When in Client Bridge, EOR7550 will associate with nearby AP and sees the network device combination as a standard mobile unit (MU). The access point then forms a wireless bridge between the wired LAN and clients through EOR7550. 2.3. Client Router As Client Bridge mode, this allows your device to function as Client Bridge and Router as well. The device connection map can refer to 2.2 Client Bridge. 2.4. WDS Bridge WDS (Wireless Distribution System) allows AP to communicate with one another wirelessly. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. 2.5. WDS Repeater WDS (Wireless Distribution System) Repeater is not only an extended device, but also provides a wireless application for other wireless clients. 2.6. Universal Repeater (AP) Repeater is used to regenerate or replicate signals that are weakened or distorted by transmission over long distances and through areas with high levels of electromagnetic interference (EMI). Universal Repeater (AP) mode on one radio channel is usually configured along with Universal Repeater (STA) mode on another radio channel. 2.7. Universal Repeater (STA) Universal Repeater (STA) mode allows your device to operate as a client. This is usually configured with Universal Repeater (AP) on another channel. ...
3. Understanding the Hardware 3.1. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the Network port of the PoE injector and another end into your PC/Notebook. 3. Plug one end of another Ethernet cable to AP/Bridge port of the PoE injector and the other end into you cable/DSL modem (Internet) 4. Insert the DC‐inlet of the power adapter into the 48V port of the PoE injector and the other end into the power socket on the wall. 5. This diagram depicts the hardware configuration 3.2. IP Address Configuration The default IP address of the device is 192.168.1.2. In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook. 1. In the control panel, double click Network Connections and then double click on the connection of your Network Interface Card (NIC). You will then see the following screen. 2. Select Internet Protocol (TCP/IP) and then click on the Properties button. This will allow you to configure the TCP/IP settings of your PC/Notebook. 3. Select Use the following IP Address radio button and then enter the IP address (192.168.1.21) and subnet mask (255.255.255.0). Ensure that the IP address and subnet mask are on the same subnet as the device. 4. Click on the OK button to close this window, and once again to close LAN properties window. ...
4. Web Configuration 4.1. System 4.1.1. Operation Mode You are allowed to configure your device into different modes for different purposes (Please see Chapter 2). 1. To start configuration, press Reset to purge the default setting. 2. All 3 drop down fields will be reset for new configuration. 3. Refers to table in Chapter 2 for further configuration. ...
4.2. Wireless EOR7550 provides 2 separate Radio Channel which allows you configuring your device into different separate modes. Each Radio Channel can be configured separately with different configuration menu. 4.2.1. AP 4.2.1.1. Status ...
Page 18
4.2.1.2. Basic Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) 2.4 GHz (802.11g) Enabled SSID#: The device allows you to add up to 4 unique SSID ESSID#: Description of each configured SSID Channel: Channel selection. This will vary based on selected Band. ...
Page 19
4.2.1.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
Page 20
CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list. This feature can be helpful in restricting the coverage area of the wireless network . 4.2.1.4. Security Encryption: Disabled ...
Page 21
Encryption: WEP ESSID Selection: As this device supports multiple SSIDs, it is possible to configure a different security mode for each SSID (profile). Select an SSID from the drop‐down list. Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast ...
Page 22
authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used. ...
Page 23
broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS) feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop‐down menu. ...
Page 24
Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they ...
Page 25
4.2.1.6. Client List 4.2.1.7. VLAN Only Available in AP mode Virtual LAN: Choose to Enable or Disable the VLAN features. SSID1 Tag: Specify the VLAN tag. ...
Page 26
4.2.1.8. WMM 4.2.1.9. Power Saving Only Available for Radio 2 ...
4.2.2. Client Bridge 4.2.2.1. Status 4.2.2.2. Basic Radio: To enable/disable radio channel Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) 2.4 GHz (802.11g) ...
Page 28
Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.2.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
Page 29
Beacon Period: Beacons are packets sent by a wireless Access Point to synchronize wireless devices. Specify a Beacon Period value between 20 and 1024. The default value is set to 100 milliseconds. DTIM Period: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Period value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 10. ...
4.2.3. Client Router 4.2.3.1. Status 4.2.3.2. Basic Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) 2.4 GHz (802.11g) ...
Page 32
Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.3.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
Page 33
Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. 4.2.3.4. AP Profile This page allows you to configure the profile of the Client Bridge including Security Setting exactly the same as the Access Point. 4.2.3.5. WMM ...
4.2.4. WDS Bridge You can only connect to the device via Wireless Client 4.2.4.1. Status 4.2.4.2. Basic Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) ...
Page 35
2.4 GHz (802.11g) Channel: Channel selection. This will vary based on selected Band. MAC address 1~4: Specify up to 4 MAC address of the device. Set Security: Wireless security mode setting. Security: Disabled Security: WEP Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. Key Format: Select a key type from the drop‐down list. 128‐bit encryption requires a longer key than 64‐bit encryption. Keys are defined by entering in a string in HEX (hexadecimal ‐ using characters 0‐9, A‐F) or ASCII (American Standard Code for Information Interchange ‐ alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. Default Tx Key: You may choose one of your 4 different WEP keys from below. Encryption Key 1‐4: You may enter four different WEP keys. ...
Page 36
4.2.4.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list. This feature can be helpful in restricting the coverage area of the wireless network. 4.2.5. WDS Repeater 4.2.5.1. Status 4.2.5.2. Basic ...
Page 38
Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) 2.4 GHz (802.11g) Channel: Channel selection. This will vary based on selected Band. MAC address 1~4: Specify up to 4 MAC address of the device. Set Security: Wireless security mode setting. Security: Disabled Security: WEP Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. Key Format: Select a key type from the drop‐down list. 128‐bit encryption requires a longer key than 64‐bit encryption. Keys are defined by entering in a string in HEX (hexadecimal ‐ using characters 0‐9, A‐F) or ASCII (American Standard Code for Information Interchange ‐ alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. ...
Page 39
Default Tx Key: You may choose one of your 4 different WEP keys from below. Encryption Key 1‐4: You may enter four different WEP keys. 4.2.5.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list. This feature can be helpful in restricting the coverage area of the wireless network. 4.2.6. Universal Repeater (AP) 4.2.6.1. Status ...
Page 41
2.4 GHz (802.11b) 2.4 GHz (802.11g) Enabled SSID#: The device allows you to add up to 4 unique SSID ESSID#: Description of each configured SSID Channel: Channel selection. This will vary based on selected Band. 4.2.6.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ...
Page 42
Data rate: You may select a data rate from the drop‐down list, however, it is recommended to select auto. This is also known as auto‐fallback. Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. ...
Page 43
Encryption: WEP ESSID Selection: As this device supports multiple SSIDs, it is possible to configure a different security mode for each SSID (profile). Select an SSID from the drop‐down list. Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast ...
Page 44
authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used. ...
Page 45
they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS) feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop‐down menu. Encryption: Select WPA pre‐shared key from the drop‐down list. WPA Type: Select TKIP, AES, or WPA2 Mixed. The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per‐packet key generation ...
Page 46
Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they ...
4.2.7. Universal Repeater (STA) 4.2.7.1. Status 4.2.7.2. Basic Band: Configure the device into different wireless modes. 2.4 GHz (802.11b/g) 5 GHz (802.11a) 2.4 GHz (802.11b) 2.4 GHz (802.11g) ...
Page 49
Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.7.3. Advanced Fragment Threshold: Packets over the specified size will be fragmented in order to improve ...
Page 50
Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. 4.2.7.4. AP Profile 4.2.7.5. WMM ...
4.3. Network 4.3.1. Status 4.3.2. LAN Bridge Type: Select Static IP or Dynamic IP from the drop‐down list. If you select Static IP, you will be required to specify an IP address and subnet mask. If Dynamic IP is selected, then the IP address is received automatically from the external DHCP server. IP Address: Specify an IP address. IP Subnet Mask: Specify a subnet mask for the IP address. 802.1d Spanning Tree: Select Enable or Disable from the drop‐down list. Enabling spanning tree will avoid redundant data loops. ...
4.3.3. WAN Only shows when device is in WAN Interface Login Method: Configure different connection methods with WAN. Static IP Address Dynamic IP Address PPP over Ethernet PPTP Hostname: Specify the host name of your services MAC address: Specify MAC address over WAN Interface: WAN ...
Description: Description of IP Filtering item Protocol: Type of Protocols Both TCP UDP Local IP Address: Local IP address range Remote port range: Remote port number range 4.4.6. URL Filter ...
4.5. Advanced 4.5.1. NAT This allows you to enable/disable NAT service of the device. 4.5.2. Port Mapping Description: Description of Port Mapping item. Local IP: Source IP to be mapped. ...
Protocol: Protocol type. Both TCP UDP Remote Port Range: Source Port number to be mapped. 4.5.3. Port Forwarding Description: Description of Port Forwarding item. Local IP: Source IP to be forwarded. Protocol: Protocol type Both TCP UDP Local Port: Source Port Number to be forwarded. Forwarded Port: Destination Port Number forwarding to. ...
Page 61
Bandwidth Allocation Type: Type of traffics to be monitored. Download Upload Both Local IP range: Destination IP Range. Protocol: Protocol type to be monitored. All TCP UDP SMTP HTTP POP3 ...
FTP Remote port range: Source Port Number range Policy: The policy rules for QoS service. Min Max Rate(bps): FULL 32M 13M 8M 4M 2M 1M 512K 256K 128K 4.5.8. Static Routing Destination LAN IP: Destination IP address Subnet Mask: Destination subnet mask Default Gateway: Destination default gateway ...
4.6. Management 4.6.1. Admin Change current login password of the device. It is recommended to change the default password for security reasons. 4.6.2. SNMP Allows you to assign the contact details, location, community name and trap settings for SNMP. This is a networking management protocol used to monitor network‐attached devices. SNMP allows messages (called protocol data units) to be sent to various parts of a network. Upon receiving these messages, SNMP‐compatible devices (called agents) return data stored in their Management Information Bases. ...
SNMP Active: Choose to enable or disable the SNMP feature. SNMP Version: You may select a specific version or select All from the drop‐down list. Read Community Name: Specify the password for access the SNMP community for read only access. Set Community Name: Specify the password for access to the SNMP community with read/write access. System Location: Specify the location of the device. System Contact: Specify the contact details of the device. Trap Active: Choose to enable or disable the SNMP trapping feature. . Trap Manager IP: Specify the password for the SNMP trap community. Trap Community: Specify the name of SNMP trap community. 4.6.3.
Ensure that you have downloaded the appropriate firmware from the vendor’s website. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded with wireless interface. 4.6.4. Configure This allows you to restore to factory default setting or backup/restore your current setting. 4.6.5. Reset This will only reset you devices with current configuration unaffected. ...
4.7. Tools 4.7.1. Time Setting This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server. If the device losses power for any reason, it will not be able to keep its clock running, and will not display the correct time once the device has been restarted. Therefore, you must re‐enter the correct date and time. Time Zone: Select time zone. NTP Time Server: Specify the NTP server’s IP address for time synchronization. Daylight Saving: To enable daylight savings time. 4.7.2. DDNS DDNS allows you to create a hostname that points to your dynamic IP or static IP address or URL. The devices allows you redirecting the traffic to a specific DDNS providers for dynamic domain name routing. ...
Dynamic DNS: To enable/disable the DDNS service Server Address: List of DDNS Service providers 3322 DHS DynDNS ZoneEdit CyberGate Host Name: Host name to be redirected Username: User name for DDNS Service providers Password: Password for DDNS Service providers 4.7.3. Diagnosis Check whether a network destination is reachable with ping service. ...
Page 74
RFC 2865,2866 RADIUS Operation Mode 18 modes EOR7550 Radio1(11a/b/g) Radio2 WDS WDS AP CB CR UR(AP) UR(STA) Disable (11/b/g/n) Bridge Repeater O O O O O O AP X X (LAN/WAN) (LAN/WAN) (LAN) (LAN) (LAN/WAN) (LAN/WAN) O O CB X X X ...
Page 75
14 117 243 130 270 15 130 270 144.4 300 ‐ Distance Control (802.1x Ack timeout) for Radio2 ‐ Signal Strength indication using LEDs ‐ Bandwidth Selection Security Authentication: ‐ 802.11i (WPA, WPA2) ‐ 802.1x (including EAP‐TLS/TTLS) IEEE 802.1x Supplicant support in CB mode Encryption: Open, WEP‐64/128, TKIP, AES MAC address access control list MSSID Support in client access mode Hide SSID in beacons User isolation MAC address Filtering NAT in Client Router mode Multiple SSID (4 SSID) QoS WMM Management Configuration Web‐based configuration (HTTP)/Telnet Firmware Upgrade Upgrade firmware via web browser Fix latest setting parameter when firmware upgrading Administrator Setting Administrator password can be changed System monitoring ...
Appendix B – FCC INTERFERENCE STATEMENT Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there ...
Need help?
Do you have a question about the EOR7550 and is the answer not in the manual?
Questions and answers