Sign In
Upload
Manuals
Brands
DPtech Manuals
IP Access Controllers
WCS7000 Series
DPtech WCS7000 Series Access Controllers Manuals
Manuals and User Guides for DPtech WCS7000 Series Access Controllers. We have
1
DPtech WCS7000 Series Access Controllers manual available for free PDF download: User Configuration Manual
DPtech WCS7000 Series User Configuration Manual (128 pages)
Wireless Access Controller
Brand:
DPtech
| Category:
IP Access Controllers
| Size: 4 MB
Table of Contents
Table of Contents
4
Chapter 1 Product Overview
13
Product Introduction
13
Web Management
13
Login to the Web Management Interface
13
Figure1-1 WEB Management Interface
13
Web Interface Layout
14
Figure1-2 Deploying of WEB Interface
15
Chapter 2 System Management
16
Introduction to System Management
16
Device Management
17
Device Information
17
Figure2-1 System Management Menu
17
Figure2-2 Device Information
18
Table2-1 Device Information
18
Device Status
19
Figure2-3 Device Status
19
Table2-2 Device Status
19
Device Settings
20
Figure2-4 Device Information Settings
20
Figure2-5 System Name Settings
20
Figure2-6 System Time Configuration
21
Figure2-7 Log Sending Method
21
Figure2-8 VCPU Configuration
21
Figure2-9 System Threshold
22
Figure2-10 Enabling Remote Diagnostic
22
Table2-3 System Threshold
22
Figure2-11 Setting Frame Gap
23
Figure2-12 System Parameter Settings
23
Snmp Configuration
24
Introduction to Snmp
24
Figure2-13 Database Clearing
24
Figure2-14 SNMP Version Configuration
25
Table2-4 SNMP Version Configuration
25
Figure2-15 Device Information
26
Rmon Configuration
27
Introduction to Rmon
27
Alarm Entry
27
Figure2-16 IP Address List
27
Figure2-17 Alarm Entry
28
Figure2-18 Statistic Entry
28
Table2-5 Statistic Entry
28
Administrator
29
Introduction to Administrator
29
Table2-6 Administrator Management Feature
29
Figure2-19 Current Administrator
30
Figure2-20 Administrator Settings
30
Table2-7 Current Administrator List
30
Table2-8 Administrator Settings
30
Figure2-21 Administrator Authentication Settings
33
Table2-9 Administrator Authentication Method and Configuration Parameter
33
Figure2-22 Logon Administrator Settings
34
Table2-10 Logon Parameter Settings
34
Configuration Range
35
Web Access Protocol Settings
35
Figure2-23 Configuration Range
35
Table2-11 Configuration Range
35
Interface Service Limit
36
Figure2-24 WEB Access Protocol Settings
36
Table2-12 WEB Access Protocol Settings
36
Remote User Management
37
Figure2-25 Interface Service Limit
37
Figure2-26 Remote User Management
37
Table2-13 Interface Service Limitation
37
Table2-14 Remote Login Management
37
Configuration File
38
Figure2-27 Configuration File Management
38
Table2-15 Configuration File
38
Software Version
39
Figure2-28 Software Version
40
Table2-16 Software Version
40
Ntp Configuration
41
Figure2-29 NTP Time Configuration
41
Table2-17 NTP Server Mode
41
Chapter 3 Network Management
42
Introduction to Network Management
42
Figure2-30 NTP Client Configuration
42
Table2-18 NTP Client Mode
42
Interface Management
43
Figure3-1 Network Management Menu
43
Network Mode
44
Vlan Configuration
44
Figure3-2 Network Configuration
44
Service Interface Configuration
45
Figure3-3 VLAN Interface Configuration
45
Figure3-4 VLAN Configuration
45
Network Object
46
Security Zone
46
Ip Address
46
Figure3-5 Service Interface Configuration
46
Figure3-6 Interface Rate Limitation Alarming
46
Figure3-7 Security Zone
46
Figure3-8 Address Object
47
Figure3-9 Address Object Group
47
Table3-1 Address Object
47
Mac Address
48
Figure3-10 Mac Address
48
Table3-2 Address Object Group
48
Mac Address Table Management
49
Figure3-11 MAC Group
49
Figure3-12 MAC Address Table Management
49
Table3-3 MAC Group
49
Forwarding Configuration
50
Routing
50
Figure3-13 Forwarding Configuration
50
Table3-4 MAC Address Table
50
Static Route
51
Routing Table
52
Figure3-14 Configuring Static Route
52
Figure3-15 Health Check
52
Figure3-16 Basic Routing Table
52
Figure3-17 Displaying Detailed Routing Table
53
Table3-5 Displaying Basic Routing Table
53
Table3-6 Displaying Detailed Routing Table
53
Equivalent Routing
54
Rip
54
Figure3-18 Equivalent Routing
54
Figure3-19 Configure RIP
54
Table3-7 RIP Advanced Configuration
55
Table3-8 RIP Interface Configuration
55
Ospf Protocol
56
Figure3-20 Display RIP State
56
Figure3-21 Configuring OSPF Protocol
57
Table3-9 OSPF Advanced Configuration
57
Table3-10 OSPF Area Configuration
58
Table3-11 OSPF Interface Configuration
58
Figure3-22 Displaying OSPF Interface Information
59
Table3-12 Displaying OSPF Interface Information
59
Figure3-23 Displaying OSPF Neighbor Information
60
Table3-13 Displaying OSPF Neighbor Information
60
Arp Configuration
61
Display Arp
61
Static Arp
61
Figure3-24 Display ARP
61
Gratuitous Arp Sending
62
Figure3-25 Static ARP
62
Figure3-26 Gratuitous ARP Sending
62
Table3-14 Policy-Based Routing
62
Dns Configuration
63
Introduction to Dns
63
Dns
63
Figure3-27 DNS
63
Table3-15 Policy-Based Routing
63
Dhcp Configuration
64
Introduction to Dhcp
64
Dhcp Server
64
Figure3-28 DHCP Server
64
Table3-16 DHCP Server Configuration Items
64
Dhcp Relay
65
Table3-17 DHCP Host Address
65
Dhcp Ip Address Table
66
Figure3-29 DHCP Relay
66
Figure3-30 DHCP IP Address Table
66
Table3-18 DHCP Relay Configuration
66
Diagnostic Tools
67
Figure3-31 Diagnostic Tools
67
Table3-19 DHCP IP Address Table
67
Chapter 4 Ap Management
68
Ap Configuration
68
Ap Template
68
Figure3-32 Testing Result of "Ping" Command
68
Figure4-1 AP Configuration
69
Table4-1 AP Basic Configuration
69
Table4-2 SSID Group Configuration
70
Table4-3 SSID Configuration
70
Ap Configure
72
Figure4-2 AP Configure
72
Table4-4 Viewing AP
72
Ap Basic Information
74
Ap Version Control
74
Figure4-3 AP Basic Information
74
Figure4-4 AP Version Control
74
Table4-5 AP Basic Information
74
Basic Configuration
75
Sta Management
75
Figure4-5 Basic Configuration
75
Figure4-6 STA Display Management
75
Table4-6 AP Version Control
75
Ac-Ap Log
76
Rogue Ap Log Info
76
Ap Unusual Log Information
76
Figure4-7 Rogue AP Log Info
76
Figure4-8 AP Unusual Log Information
76
Table4-7 STA Display Management
76
Black Name Management
77
Figure4-9 BLACK NAME Management
77
Table4-8 Black/White List Management
77
Chapter 5 Advanced Service
78
Packet Filtering Policy
79
Figure5-1 Firewall
79
Figure5-2 Packet Filtering Policy
79
Table5-1 Packet Filtering Policy Configuration Items
80
Figure5-3 Configuring Action
81
Table5-2 Configuring Action
81
Packet Filtering Policy Log
82
Figure5-4 Packet Filtering Policy Log
82
Figure5-5 Packet Filtering Match Number
82
Alg Configuration
83
Figure5-6 Alg Configuration
83
Table5-3 Packet Filtering Policy Log
83
Packet Filtering Policy
84
Nat
84
Introduction to Nat
84
Source Nat
84
Figure5-7 Packet Filtering Policy
84
Table5-4 Alg Configuration
84
Destination Nat
85
Figure5-8 Source NAT
85
Table5-5 Source NAT Configuration
85
Figure5-9 Configuring Destination NAT
86
Table5-6 Destination NAT Configuration
86
One to One Nat
87
Address Pool
87
Figure5-10 One to One NAT
87
Table5-7 One to One NAT Configuration
87
Alg Configuration
88
Figure5-11 Address Pool
88
Table5-8 Address Pool Configuration
88
Nat_Pt
89
Figure5-12 Alg Configuration
89
Table5-9 Alg Configuration
89
Basic Attack Protection
90
Figure5-13 Ipv6 Bound
90
Figure5-14 Basic Attack Protection
90
Basic Attack Log Query
91
Figure5-15 Basic Attack Log Query
91
Table5-10 Basic Attack Protection
91
Session Limit
92
Service Limit
92
Figure5-16 Sessions Limit
92
Table5-11 Basic Attack Log Query
92
Basic DD O S
93
Defend Object Management
93
Figure5-17 Service Limit
93
Figure5-18 Defend Object Management
93
Table5-12 Defend Object Management
93
Configuration and Tendency
94
Figure5-19 Traffic Status and Monitoring
94
Table5-13 Traffic and Status Monitoring Configuration Items
94
Protection History
95
Figure5-20 DDOS Defend Settings
95
Table5-14 DDOS Defend Settings
95
Ipv6 Basic DDOS
96
Configuration and Tendency
96
Figure5-21 Protection History
96
Figure5-22 Protection Configuration
96
Table5-15 Protection Configuration
96
Protection History
97
Figure5-23 Traffic Trend Art
97
Figure5-24 Protection History
97
Blackname
98
Figure5-25 Blackname Configuration
98
Table5-16 Blackname Configuration
98
Blacklist Query
99
Blackname Log Query
99
Figure5-26 Blackname Query
99
Figure5-27 Blacklist Log Query
99
Table5-17 Blackname Query
99
Table5-18 Blacklist Log Query
99
Mac/Ip Binding
100
Mac/Ip B
100
Figure5-28 MAC/IP Binding
101
Table5-19 MAC/IP Binding
101
Auto-Learning
102
Figure5-29 Auto Learning
102
Table5-20 Switches Table
102
Table5-21 Auto Learning
102
User Mac Binding
103
Figure5-30 User MAC Binding
103
Table5-22 User/Mac Binding
103
User/Ip Binding
104
Binding Log Query
104
Figure5-31 User/Ip Binding
104
Table5-23 User /IP Binding
104
Session Management
105
Figure5-32 Binding Log Query
105
Table5-24 Binding Log Query
105
Session List
106
Session Parameter
106
Session Monitoring
106
Figure5-33 Session List
106
Figure5-34 Session Parameter
106
Session Log Configuration
107
Qos
107
Vip Bandwidth Guarantee
107
Figure5-35 Session Monitoring
107
Figure5-36 Session Log Configuration
107
Figure5-37 Bandwidth Guarantee Basic Set
107
Traffic Classification
108
Congestion Avoidance
108
Figure5-38 Traffic Classification
108
Table5-25 Bandwidth Guarantee Basic Set
108
Congestion Management
109
Figure5-39 Congestion Avoidance
109
Figure5-40 Congestion Management
109
Table5-26 Congestion Avoidance
109
Table5-27 Congestion Management
109
Traffic Shaping
110
Anti-ARP-Spoofing
110
Figure5-41 Traffic Shaping
110
Arp Configuration
111
Figure5-42 Anti-ARP-Spoofing
111
Table5-28 Anti-ARP-Spoofing
111
Figure5-43 ARP Configuration
112
Table5-29 ARP Configuration
112
Chapter 6 Log Management
113
Introduction to Log Management
113
System Log
113
Latest Log
113
Figure6-1 Log Management Menu
113
Figure6-2 Latest Log
114
Table6-1 Latest Log
114
System Log Query
115
Figure6-3 System Log Query
115
System Log File Operation
116
Figure6-4 System Log File Operation
116
Table6-2 System Log Searching Conditions
116
Table6-3 System Log File Operation
116
System Log Configuration
117
Operation Log
117
Latest Log
117
Figure6-5 System Log Configuration
117
Table6-4 System Log Configuration Items
117
Figure6-6 Latest Log
118
Table6-5 Latest Log Configuration Items
118
Operation Log Query
119
Figure6-7 Log Query
119
Table6-6 Operation Log Query Configuration Items
119
Log File Operation
120
Operation Log Configuration
120
Figure6-8 System Log File Operation
120
Table6-7 Operation Log File Configuration Items
120
Service Log
121
Service Log Configuration
121
Figure6-9 Operation Log Configuration
121
Table6-8 Operation Log Configuration Items
121
Figure6-10 Service Log
122
Table6-9 Service Log Configuration Items
122
Chapter 7 User Authentication
124
Portal Authentication
124
Introduction to Portal Authentication
124
Authentication Config
124
Figure7-1 Security Center
124
Figure7-2 Basic Authentication
125
Table7-1 Basic Authentication Configuration Items
125
Figure7-3 Webauth Configuration
126
Table7-2 Webauth Configuration Items
126
Figure7-4 TAC Configuration
127
Figure7-5 Customer Configuration
127
Table7-3 TAC Configuration Items
127
Table7-4 Customer Configuration
128
Advertisement
Advertisement
Related Products
DPtech Categories
Switch
Network Router
Gateway
Firewall
IP Access Controllers
More DPtech Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL