TP-Link EAP110 User Manual

TP-Link EAP110 User Manual

Wireless n access point
Hide thumbs Also See for EAP110:

Advertisement

User Guide

Wireless N Access Point
EAP110/EAP120/EAP220
REV1.0.0
1910011184

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EAP110 and is the answer not in the manual?

Questions and answers

Summary of Contents for TP-Link EAP110

  • Page 1: User Guide

    User Guide Wireless N Access Point EAP110/EAP120/EAP220 REV1.0.0 1910011184...
  • Page 2 FCC STATEMENT (EAP110) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. ” CE Mark Warning (EAP110/EAP120) (EAP220) This is a class A product. In a domestic environment, this product may cause radio interference,...
  • Page 4 National Restrictions (only for EAP220) This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Country Restriction Reason/remark General authorization required for outdoor use and Bulgaria None public service...
  • Page 5: Safety Information

    IC STATEMENT This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada. Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність вимогам нормативних документів та вимогам, що передбачені чинними законодавчими актами України.
  • Page 6 ●注意防潮,請勿將水或其他液體潑灑到本產品上。 ●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。 ●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。 ●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。 此為甲類資訊技術設備,于居住環境中使用時,可能會造成射頻擾動,在此種情況下,使用 者會被要求採取某些適當的對策。 This product can be used in the following countries:...
  • Page 7 About this User Guide This User Guide is for EAP110, EAP120 and EAP220. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer to the EAP Controller User Guide when the EAP is managed by the EAP Controller software.
  • Page 8: Table Of Contents

    CONTENTS Chapter 1 Introduction ............................3 Overview of the EAP ........................... 3 Hardware Overview ..........................3 1.2.1 LED ..............................3 1.2.2 Interface Panel ..........................4 1.2.3 Mounting Bracket ........................6 Chapter 2 Network Topology .......................... 7 Chapter 3 Management Mode ........................8 Standalone Mode ..........................
  • Page 9 5.6.4 Download/Backup Trusted AP List ..................38 Chapter 6 Monitoring ............................40 AP ................................40 6.1.1 AP List ............................40 SSID ................................ 45 6.2.1 SSID List ............................45 Client ..............................46 6.3.1 User List ............................46 6.3.2 Portal Authenticated Guest ....................47 Chapter 7 Management ..........................
  • Page 10: Chapter 1 Introduction

    “Celling lamp” appearance and easily mounting design with chassis make EAP easy to be installed on a wall or ceiling and blend in with most interior decorations. EAP110 is provided with a passive PoE adapter for power supply. EAP120/EAP220 can be powered via a PSE* device or the provided power adapter.
  • Page 11: Interface Panel

    Flashing yellow Firmware update is in progress. Do not disconnect or power off the device. Double-flashing red, green, yellow The device is being reset to its factory default settings. 1.2.2 Interface Panel EAP110: Figure 1-2 Interface Panel of EAP110...
  • Page 12 ETHERNET:  For EAP110, this port is used to connect to the POE port of the provided PoE adapter for both data transmission and power supply through Ethernet cabling. For EAP120/EAP220, this port is used to connect to a router to transmit data or to a PSE (Power Sourcing Equipment), such as a PoE switch, for both data transmission and Power over Ethernet (PoE) through Ethernet cabling.
  • Page 13: Mounting Bracket

    Power LED: The Power LED indicates the status of the electric current: green (0-0.8A), red  (0.8A-1A). POE Port: This port is used to connect the ETHERNET port of the EAP110.  LAN Port: This port is used to connect your LAN.
  • Page 14: Chapter 2 Network Topology

    Chapter 2 Network Topology A typical network topology for the EAP is shown below. Figure 2-1 Typical Topology To deploy an EAP in your local network, a DHCP server is required to assign IP addresses to the EAP and clients. Typically, a router acts as the DHCP server. Ensure the EAPs are in the same subnet with the Controller Host in which the EAP Controller is installed.
  • Page 15: Standalone/Managed Mode

    Chapter 3 Management Mode 300Mbps Wireless N Access Point EAP110 and Wireless N Gigabit Access Point EAP120/EAP220 can either work under the control of the EAP Controller software or work independently as a standalone access point. When user establishes a large-scale wireless network, the management of every single AP in the network is complex and complicated.
  • Page 16 TIPS: Proceed to the following chapters for information on using the EAP in standalone mode. EAP110 is taken as the example.
  • Page 17: Chapter 4 Network

    Chapter 4 Network On Network page you can configure the IP address of the standalone EAP. Figure 4-1 Network Page Dynamic/Static: By default, the EAP device obtains an IP address from a DHCP server (typically a router). Select Static to configure IP address manually. Fallback IP: If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device.
  • Page 18: Wireless Page

    Chapter 5 Wireless Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below. Figure 5-1 Wireless Page...
  • Page 19: Wireless Settings

    5.1 Wireless Settings Following is the page of Wireless Settings. Figure 5-2 Wireless Settings Page...
  • Page 20: Wireless Basic Settings

    5.1.1 Wireless Basic Settings Figure 5-3 Wireless Basic Settings 2.4GHz Wireless Check the box to enable 2.4GHz Wireless Radio. Radio: Wireless Mode: Select the protocol standard for the wireless network. Wireless network created by the EAP is able to operate in the 2.4GHz frequency The EAP supports 802.11b/g/n, 802.11b/g, and 802.11n standards.
  • Page 21: Ssids

    If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation. NOTE: In most cases, it is unnecessary to select maximum transmit power. Selecting larger transmit power than needed may cause interference to neighborhood.
  • Page 22 SSID Enable this function, AP will broadcast its SSID to hosts in the surrounding environment, as thus hosts can find the wireless network identified by this SSID. If Broadcast: SSID Broadcast is not enabled, hosts must enter the AP’s SSID manually to connect to this AP.
  • Page 23 Open System: After you select Open System, clients can pass the  authentication and associate with the wireless network without password. However, correct password is necessary for data transmission. Shared Key: After you select Shared Key, clients has to input password to pass ...
  • Page 24 WPA-PSK: Pre-shared key of WPA.  WPA2-PSK: Pre-shared key of WPA2.  Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's capability and request.
  • Page 25: Wireless Advanced Settings

    Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) automatically based on the wireless station's capability and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode.
  • Page 26: Load Balance

    Fragmentation Specify the fragmentation threshold for packets. If the size of the packet is larger than the fragmentation threshold, the packet will be fragmented into several Threshold: packets. Too low fragmentation threshold may result in poor wireless performance caused by the excessive packets. The recommended and default value is 2346 bytes.
  • Page 27: Portal Configuration

    Following is the page of Portal. Figure 5-10 Portal Page NOTE: To apply Portal in a wireless network, please go to Wireless→Wireless Settings→SSIDs to enable Portal of a selected SSID. 5.2.1 Portal Configuration Three authentication types are available: No Authentication, Local Password and External RADIUS Server.
  • Page 28 Local Password:Users are required to enter the preset user name and password, which are saved in the EAP. External RADIUS Server:Users are required to enter the preset user name and password, which are saved in the database of the RADIUS server. The RADIUS server acts as the authentication server, which allows you to set different user name and password for different users.
  • Page 29 Redirect URL: Enter the URL that a newly authenticated client will be directed to. Portal Select Local Web Portal, the authentication login page will be provided by the built-in portal server. Customization: The page configured below will be presented to users as the login page. Words can be filled in Input Box 1 and Input Box 2.
  • Page 30 Local Password  Figure 5-12 Portal Configuration_Local Password Authentication Type: Select Local Password. Enter the user name for local authentication. Username: Password: Enter the password for local authentication. to configure Authentication Timeout, Redirect, Redirect Please refer to No Authentication URL, and Portal Customization. External RADIUS Server ...
  • Page 31 Local Web Portal Figure 5-13 Portal Configuration_External RADIUS Server_Local Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. Enter the shared secret of RADIUS server to log in to the RADIUS server. RADIUS Password: Please refer to No Authentication...
  • Page 32: Free Authentication Policy

    External Web Portal Figure 5-14 Portal Configuration_External RADIUS Server_External Web Portal Authentication Type: Select External RADIUS Server. RADIUS Server IP: Enter the IP address of the RADIUS server. Port: Enter the port for authentication service. Enter the shared secret of RADIUS server to log in to the RADIUS server. RADIUS Password: Portal Customization: Select External Web Portal.
  • Page 33 Click to add a new authentication policy and configure its parameters. Figure 5-16 Configure Free Authentication Policy Policy Name: Enter a policy name. Enter the source IP address and subnet mask of the clients who can enjoy the Source IP free authentication policy.
  • Page 34: Mac Filtering

    Click the button OK in Figure 5-16 and the policy is successfully added as Figure 5-17 shows. Figure 5-17 Add Free Authentication Policy Here is the explanation of Figure 5-17: The policy name is Policy 1. Clients with IP address range 192.168.2.0/24 are able to visit IP range 10.10.10.0/24.
  • Page 35 Settings  Enable MAC Filtering: Check the box to enable MAC Filtering. Station MAC Group  Follow the steps below to add MAC groups. Step 1: Click , two tables will be shown. Figure 5-19 Station MAC Group Step 2: Click and fill in a name for the MAC group.
  • Page 36: Scheduler

    Figure 5-21 Add a Group Member Click in Modify column to edit the MAC group name or MAC address. Click to delete the MAC group or group member. MAC Filtering Association  Figure 5-22 MAC Filtering Association SSID Name: Displays the SSID of the wireless network. Band: Displays the frequency band the wireless network operates at.
  • Page 37 Figure 5-23 Scheduler Page Settings  Check the box to enable Scheduler. Scheduler: Association Mode: Select Associated with SSID/AP, you can perform configurations on the SSIDs/AP. The display of Scheduler Association is based on your option here. Scheduler Profile Configuration ...
  • Page 38 Step 2: Click and input a profile name for the rule. Figure 5-25 Add a Profile Step 3: Click and configure the recurring schedule for the rule. Figure 5-26 Add a Rule...
  • Page 39: Scheduler Association

    Scheduler Association  This zone will display different contents based on your selection of association mode in Settings. Associated with SSID Figure 5-27 Scheduler Association_Associated with SSID SSID Name: Displays the SSID of the standalone AP. Band: Displays the frequency band which the wireless network operates at. Profile Name: Select a profile name from the drop-down list.
  • Page 40: Qos

    5.5 QoS The EAP supports Quality of Service (QoS) to prioritize voice and video traffic over other traffic types. In normal use, the default values for the EAP device and station EDCA should not need to be changed. Changing these values affects the QoS provided. Figure 5-29 QoS Page Wi-Fi Multimedia By default, WMM is enabled.
  • Page 41: Ap Edca Parameters

    5.5.1 AP EDCA Parameters AP Enhanced Distributed Channel Access (EDCA) parameters affect traffic flowing from the EAP device to the client station. Figure 5-30 AP EDCA Parameters Queue: Displays the transmission queues: Data 0>Data 1>Data 2>Data 3. Arbitration Inter- A wait time for data frames. The wait time is measured in slots. Valid values for AIFS are from 1 to 15.
  • Page 42: Station Edca Parameters

    5.5.2 Station EDCA Parameters Station EDCA parameters affect traffic flowing from the client station to the EAP device. Figure 5-31 Station EDCA Parameters Displays the transmission queues: Data 0>Data 1>Data 2>Data 3. Queue: Arbitration Inter- A wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 15.
  • Page 43: Rogue Ap Detection

    5.6 Rogue AP Detection A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. The EAP device can scan all channels to detect all APs in the vicinity of the network. If rogue APs are detected, they are shown on the Detected Rogue AP List.
  • Page 44: Settings

    5.6.1 Settings Figure 5-33 Enable Rogue AP Detection Rogue AP Detection: Check the box to enable Rogue AP Detection, then click Save. 5.6.2 Detected Rogue AP List Information about the detected rogue APs is displayed in the list. By default, the status of the detected rogue AP is unknown.
  • Page 45: Trusted Ap List

    Beacon The beacon interval used by the rogue AP. Interval: Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second). The strength of the radio signal emitting from the rogue AP.
  • Page 46 Save Action: Select Download (PC to AP) to import a trusted AP list to the device. Select Backup (AP to PC) to copy the trusted AP list to your PC. Source File Click Browse and choose the path of a saved trusted AP list or to save a trusted AP list.
  • Page 47: Chapter 6 Monitoring

    Chapter 6 Monitoring On Monitoring page, you can monitor the network running status and statistics based on AP, SSID and Client. 6.1 AP AP List on the Monitoring page displays the device name, its MAC address and the number of clients.
  • Page 48: Device Information

    Device Name: Displays the device name. MAC: Displays the MAC address of the EAP. Num of Clients: Displays the number of clients connected to the EAP. Device Information  Figure 6-3 Device Information Device Name: Displays the device name. Displays the model of the device. Device Model: Firmware Displays the firmware version of the device.
  • Page 49: Lan Information

    Wireless Settings  Figure 6-4 Wireless Settings Displays the region you’ve selected. Region: Channel/Frequency: Displays the channel number and the operating frequency. If you want to change them, please refer to 5.1.1 Wireless Basic Settings. Channel Width: Displays the spectral width of the radio channel used by the device. If you want to change it, refer to 5.1.1 Wireless Basic Settings.
  • Page 50 LAN Port: Displays the maximum transmission rate and duplex mode (half-duplex or full-duplex) of the port. Client  Figure 6-6 Client MAC: Displays the MAC address of the client of the AP selected in AP List. SSID: Displays the SSID the client is connected to. SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength.
  • Page 51 Rx/Tx Packets: Displays the total amount of packets received/sent on the LAN port. Rx/Tx Bytes: Displays the total amount of data (in bytes) received/sent on the LAN port. Rx/Tx Dropped Displays the total amount of dropped packets received/sent on the LAN port.
  • Page 52: Ssid

    6.2 SSID Figure 6-9 SSID Monitoring 6.2.1 SSID List In SSID List you can monitor the related parameters of the wireless network. Figure 6-10 SSID List Displays the SSID name. If you want to modify it, please refer to 5.1.2 SSIDs.
  • Page 53: Client

    Isolation: Displays the enabling or disabling of SSID Isolation. If you want to modify it, please refer to 5.1.2 SSIDs. Down(Byte): Displays the throughput of the downstream data. Up(Byte): Displays the throughput of the upstream data. 6.3 Client From User List, you can monitor the status of all the clients connected to the EAP including those who are authenticated.
  • Page 54: Portal Authenticated Guest

    SNR(dB): Signal to Noise Ratio, the power ratio between the received wireless signal strength and the environmental noise strength. The bigger the value of SNR, the better network performance the device provides. CCQ(%): Displays the wireless Client Connection Quality (CCQ). CCQ refers to the ratio of current effective transmission bandwidth and the theoretically maximum available bandwidth.
  • Page 55 Active Time: Displays the amount of time the authenticated client has been connected to the root AP. Action: Click Unauthorize to stop giving authorization to the clients connected to the wireless network.
  • Page 56: Chapter 7 Management

    Chapter 7 Management Management page is mainly used for device management and maintenance. 7.1 System Log System log records information about hardware, software as well as system issues and monitors system events. With the help of system log, you can get informed of system running status and detect the reasons for failure.
  • Page 57: Log Settings

    Figure 7-2 Log List 7.1.2 Log Settings You can choose the way to receive system logs in Log Settings zone, where these parameters can be configured: Enable Auto Mail, Enable Server Enable Nvram. Figure 7-3 Log Settings Enable Auto Mail ...
  • Page 58: Web Server

    SMTP Server: Enter the IP address of the SMTP server. Generally users are required to log in to the SMTP server by entering user Enable name and password. Authentication: User Name: Enter the sender’s email address.  Password: Enter the password of the sender’s email address. ...
  • Page 59: Management Access

    Following is the page of Web Server. Figure 7-6 Web Server Page HTTPS: HTTPS (Hypertext Transfer Protocol Secure) is enabled by default. Secure Server Designate a secure server port for web server in HTTPS mode. By default the port is 443. Port: Server Port: Designate a server port for web server in HTTP mode.
  • Page 60: Led On/Off

    Following is the page of Management Access. Figure 7-7 Management Access Page Check the box to enable MAC Authentication. After MAC Authentication is enabled, only the PCs in MAC address list can log in the device’s web Authentication: management page. By default this function is disabled. All PCs in LAN can log in and manage the device.
  • Page 61: Snmp

    SSH (Secure Shell) is a security protocol established on application and transport layers. SSH- encrypted-connection is similar to a telnet connection, but essentially the old telnet remote management method is not safe, because the password and data transmitted with plain-text can be easily intercepted.
  • Page 62 Once the device has become an SNMP agent, it is able to receive and process request messages from SNMP manager. Following is the page of SNMP. Figure 7-10 SNMP Page SNMP Agent: Enable SNMP Agent and the SNMP Agent will collect the information of this device and respond to information requests from one or more management systems.
  • Page 63 Set Source: Defines the IP address (for example, 10.10.10.1) or subnet for management systems that can serve as Set Community to read and write the SNMP information of this device. The format of subnet is “IP address/bit” (such as 10.10.10.0/24). The default is 0.0.0.0, which means all hosts can read and write the SNMP information of this device.
  • Page 64: Chapter 8 System

    Chapter 8 System System page is mainly used to configure some basic information like user account and time, and realize functions including reboot, reset, backup, restore and upgrade the device. User Account You can change the username and password to protect your device from unauthorized login. We recommend that you change the default user password on the very first system setup.
  • Page 65: Time Settings

    Figure 8-2 Time Settings 8.2.1 Time Settings Figure 8-3 Time Settings Click the button and the device will obtain GMT time from NTP server. IP address of the NTP server has to be filled in. Click the button, your PC’s time will be obtained as the device’s system time. Time zone: Select your local time zone from the drop-down list.
  • Page 66: Daylight Saving

    Primary/Secondary If you’ve selected Get GMT from an NTP server, please input the primary NTP Server: NTP sever address and an alternative NTP server address. 8.2.2 Daylight Saving Figure 8-4 Daylight Saving Daylight Saving: Enable or disable the DST. DST is disabled by default. Mode: Options include Predefined Mode, Recurring Mode and Date Mode.
  • Page 67: Recurring/Date Mode

    Recurring Mode  Figure 8-6 Recurring Mode Mode: Select Recurring Mode. The configuration is recurring in use. Time Offset: Specify the time adding in minutes when Daylight Saving Time comes. Select starting time and ending time of Daylight Saving Time. Start/End: Date Mode ...
  • Page 68: Backup & Restore

    Backup & Restore Figure 8-9 Backup & Restore You can save the current configuration of the EAP as a backup file and restore the configuration via a backup file. Back up the settings before you upgrade the device or upload a new configuration file can prevent it from being lost.
  • Page 69 NOTE: Please select the proper software version that matches your hardware to upgrade. To avoid damage, please do not turn off the device while upgrading. After upgrading, the device will reboot automatically.
  • Page 70: Appendix A: Specifications

    Appendix A: Specifications HARDWARE FEATURES Model EAP110 EAP120 EAP220 Interface Kensington lock slot RESET button ETHERNET: 10/100/1000Mbps Ethernet port (RJ- ETHERNET: 10/100Mbps Ethernet port (RJ- CONSOLE port (RJ-45) Power connector (DC-2) Power Supply 24V/1A passive PoE PoE(802.3af-compliant, PoE (802.3af-compliant, adapter (included) 36-57VDC, 0.2A Max) or...

This manual is also suitable for:

Eap220Eap120

Table of Contents

Save PDF