EnGenius ENS200 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation EnGenius ENS200. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel EnGenius ENS200 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation EnGenius ENS200 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation EnGenius ENS200 devrait contenir:
- informations sur les caractéristiques techniques du dispositif EnGenius ENS200
- nom du fabricant et année de fabrication EnGenius ENS200
- instructions d'utilisation, de réglage et d’entretien de l'équipement EnGenius ENS200
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage EnGenius ENS200 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles EnGenius ENS200 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service EnGenius en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées EnGenius ENS200, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif EnGenius ENS200, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation EnGenius ENS200. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    WIRELES S 11N LONG RANGE OUTDOOR CB/AP ENS200 User Guide V1.0[...]

  • Page 2

    T ABLE OF C ONTENTS I T ABLE OF C ONTENTS Conventions 0-vi Copyright 0- viii Product Overview Package Contents 1-1 Product Overview 1-2 K ey F eatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]

  • Page 3

    T ABLE OF C ONTENTS II Installing the Device 2-2 Pre-Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 Installing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Web Configuration Logging In 3-1 Best Practices . . [...]

  • Page 4

    T ABLE OF C ONTENTS III Configuring IP Settings 4-10 Configuring Spanning Tree Settings 4-11 Router Setup 4-12 Configuring WAN Settings 4-12 Static IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 2 Dynamic IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]

  • Page 5

    T ABLE OF C ONTENTS IV Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31 Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed . . . . . . . . . . . . . . . . . . . . . . . 4-33 Wi-Fi[...]

  • Page 6

    T ABLE OF C ONTENTS V Configuring Logging 4-50 Configuring Diagnostics 4-51 Viewing Device Discovery 4-52 Configure Denial of Service Protection 4-53 Logging Out 4-54 Appendix A F eder al Communication Commission Interference Statement A -1 Appendix B Industry Canada Statement B-1 Appendix C W orldWide T echnical Support C- 1[...]

  • Page 7

    C ONVENTIONS VI Conventions The following conventi ons are used to give the user additional information about specific procedur es or content. It is important to pay attention to these conventions as they provide informa- tion to prevent dam age to equipment or personal injury . General Conventions The following general conventions are used in this[...]

  • Page 8

    C ONVENTIONS VII Typographical Conventions The following typographical convent ions are used in this docu- ment: Italics Indicates book titles, directory names, file names, path names, and program/process names. Constant width Indicates computer output s hown on a computer screen, includ- ing menus, prompts, responses to input, and error messages. [...]

  • Page 9

    C OPYRIGHT VIII Copyright This user guide and its content is copyright of © EnGenius Net- works, 201 1. All right s reserved. Any redistribution or r eproduction in part or in whole in any form is prohibited. Do not distribute, transmit, stor e in any form of electronic retrieval system or commercially exploit the cont ent without the expressed wr[...]

  • Page 10

    Product Overview Chapter 1[...]

  • Page 11

    P RODUCT O VER VIEW P ACKAGE C ONTENTS 1-1 1.1 Package Contents ITEM QUANTITY ENS200 Wireless Access Point / Client Bridge 1 PoE Injector (EPE1212) 1 24V/0.6A Power Adaptor 1 Mast S trap 1 T echnical Support Card 1[...]

  • Page 12

    P RODUCT O VER VIEW P RODUCT O VERVIEW 1-2 1.2 Product Overview Thank you for choosing ENS200. The ENS200 is a long range, high performance IE EE 802.1 1b/g/n network solution that pro- vides Access Point, Client Bridge, WDS, and Client Router functions in a single device. In addition to providing the latest wi reless technology , the ENS200 suppor[...]

  • Page 13

    P RODUCT O VER VIEW B ENEF ITS 1-3 Benefits The ENS200 is the ideal product around which you can build your WLAN. The following list summarizes a few key advan- tages that WLANs have over wired networks: Ideal for hard-to-wire environments There are many scenarios where cables cannot be used to con- nect networking devices. Hist oric and older buil[...]

  • Page 14

    P RODUCT O VER VIEW T ECHNICAL S PECIFICATION 1-4 Technical Specification Wireless Specification  IEEE802.1 1b/g/n, 1T1R, 150Mbps  2.400 to 2.484 GHz, program mable upon different country regulations Hardware Specification  Physical Interface: 2 x 10/100 Mbp s LAN Ports, 1 x Reset Button  Power Supply: Passive PoE, 24V/0.6A Power Adapte[...]

  • Page 15

    P RODUCT O VER VIEW P RODUCT L AYOUT 1-5 1.3 Product Layout Figure 1-1: Back Panel View A B C D BACK PANEL VIEW DESCRIPTION A Power LED OFF = ENS200 is not receiving power ON = ENS200 is receiving power B LAN (2) LEDs OFF = ENS200 is not conn ected to the network. ON = ENS200 is connected to the network, but not sending or receiving da ta Blink = E[...]

  • Page 16

    P RODUCT O VER VIEW P RODUCT L AYOUT 1-6 BOTTOM VIEW DESCRIPTION A Reset Button T o reset to factory sett ings, press button for > 10 second s. B LAN Connector T o configure the ENS200, connect to an Ethernet adapte r in a computer . For more information C PoE LAN Connecto r The PoE interface allo ws the ENS200 to be powered using the supp lied [...]

  • Page 17

    Installation Chapter 2[...]

  • Page 18

    I NSTALLATION S YSTEM R EQUIREMENTS 2-1 2.1 System Requirements T o install the ENS200, you need the following:       Computer (Windows, Linux , Ma c OS X Operating System) Web Browser (Internet Explorer , FireFox, Chrome, Safari) Network Interface Card wi th an open RJ-45 Ethernet Port Wi-Fi Card or USB Wi-Fi Dongle (802.11 B/G/N[...]

  • Page 19

    I NSTALLATION I NSTALLING THE D EVICE 2-2 2.2 Installing the Device Installing the ENS200 on a pole or wall op timizes the wireless access range. Pre-Installation Guidelines Select the optimal location for the equipment using the following guidelines:  The ENS200 should be mount ed on a 1"-4" pole. It s loca- tion should enable ea sy a[...]

  • Page 20

    I NSTALLATION I NSTALLING THE D EVICE 2-3 5. Plug the other end of the Ethernet cable into the PoE port of the PoE injector . Figure 2-1: Inst alling the ENS200 6. T urn over the ENS200. Th en insert the mast strap through the middle hole of the ENS200. Use a screw- driver to unlock the pole-m ounting ring putting it through the ENS200. 7. Mount th[...]

  • Page 21

    Web Configuration Chapter 3[...]

  • Page 22

    W EB C ONFIGURATION L OGGING I N 3-1 3.1 Logging In The ENS200 has a built-in Web Conf igurator that let s you man- age the unit from any location using a Web browser that sup- ports HTTP and has Javascript inst alled. After configuring the computer for TCP/IP using the procedure appropriate for your operating system, use that computer ’s Web bro[...]

  • Page 23

    W EB C ONFIGURATION B EST P RACTICES 3-2 Best Practices Perform the following procedur es regularly to make the ENS200 more secure and m anage the ENS200 more effec- tively .  Change the d efault p assword Use a password that is not easy to guess and that contains dif ferent characters, such as numbers and letter s. The ENS200 username can- not [...]

  • Page 24

    Basic Network Settings Chapter 4[...]

  • Page 25

    B ASIC N ETWORK S ETTINGS S YSTEM S TATUS 4-1 4.1 System Status View the summary of the current system st atus including system (hardware/sof tware version, da te/time), wired network (LAN) and wireless network (W LAN) information. 4.1.1 Using Save/Reload Save and apply the settin gs shown in the Unsaved changes list, or cancel the unsaved changes [...]

  • Page 26

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM I NFORMATION 4-2 4.1.2 Viewing System Information Displays status information abou t the current operating mode. System Inform ation shows the general system information such as operating mode, system up ti me, firmware ve rsion, serial number , kernel version, and application version. LAN Settings shows L[...]

  • Page 27

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM I NFORMATION 4-3 Current Wireless Settings shows wireless information such as frequency and channel. Since the ENS200 supports multiple- SSIDs, information about each SSID, such as it s ESSID and security settings, are displayed.[...]

  • Page 28

    B ASIC N ETWORK S ETTINGS V IEWING W IRELESS C LIENT L IST 4-4 4.1.3 Viewing Wireless Client List Displays a list of clients a ssociated to the ENS200 , along with the MAC addresses and sign al strength for each client. Click the Refresh button to update t he client list.[...]

  • Page 29

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM L OG 4-5 4.1.4 Viewing System Log The ENS200 automatically logs events to internal memory . Note: The oldest event s are deleted from the log when memory is full. Click the Refresh button to update the cl ient list or the Clear button to remove all events.[...]

  • Page 30

    B ASIC N ETWORK S ETTINGS V IEWING C ONNECTION S TATUS 4-6 4.1.5 Viewing Connection Status Displays the current status of the network. The WLAN information shown includes network type, SSID, BSSID, c onnection status, wireless mode, current channel, security , dat a rate, noise level, and signal strength. The W A N information shown includes the MA[...]

  • Page 31

    B ASIC N ETWORK S ETTINGS V IEWING DHCP C LIENT T ABLE 4-7 4.1.6 Viewing DHCP Client Table Displays the clients that are a ssociated to the ENS200 through DHCP . The MAC addre sses and signal strengt h for each client are also shown. Click the Refresh button to update t he client list.[...]

  • Page 32

    B ASIC N ETWORK S ETTINGS V IEWING WDS L INK L IST 4-8 4.1.7 Viewing WDS Link List Displays the clients that are a ssociated to the ENS200 th rough WDS. The MAC addresses, link st atus and signal strength for each client are also shown. Click the Refresh button to update t he client list.[...]

  • Page 33

    B ASIC N ETWORK S ETTINGS S YSTEM S ETUP 4-9 4.2 System Setup The following sections explain th e features and functionality of the ENS200 in access point mode, client bridge mode, WDS acces s point mode, WDS bridge mode, WDS stat ion mode and cli ent router mode. 4.2.1 Configuring Operation Mode Set the primary function of the device. The function[...]

  • Page 34

    B ASIC N ETWORK S ETTINGS C ONFIGU RING IP S ETTINGS 4-10 4.2.2 Configuring IP Settings Configure the LAN settings for the ENS200 using a static or dynamic IP address. IP Network Setting Configure the net work connection type using either a static IP or dynamic IP . IP Address Enter the LAN IP address of the ENS200. Subnet Mask Enter the subnet mas[...]

  • Page 35

    B ASIC N ETWORK S ETTINGS C ONFIGURING S PANNIN G T REE S ETTINGS 4-11 4.2.3 Configuring Spanning Tree Settings Sp anning T ree St atus Enable or disable the ENS200 S panning T ree function. Bridge Hello Time S pecify Bridge Hello T ime, in seconds. This value determines how often the ENS200 sends hello packet s to communicate information about the[...]

  • Page 36

    B ASIC N ETWORK S ETTINGS R OUTER S ETUP 4-12 4.3 Router Setup 4.3.1 Configuring WAN Settings Configure the W AN settings for t he ENS200 using a st atic or dyna mic IP address, PPPoE or PPTP . Static IP Setting a static IP address allows an administrator to set a specific IP add ress for the router and guar- antees that it can not be assigned a di[...]

  • Page 37

    B ASIC N ETWORK S ETTINGS D YNAMIC IP 4-13 Secondary DNS Enter the secondar y DNS server address. Discard Ping on W AN Check to Enable to recognize pings on the ENS200 W AN interface or Disable to block pings on the ENS200 W A N interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blockin[...]

  • Page 38

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT P ROTOCOL OVER E THERNET (PPP O E) 4-14 Point-to-Point Protocol over Ethernet (PPPoE) Point-to-Point Protocol over Ethernet (PPPoE) is used mainly by ISPs that provide DSL modems to connect to the Internet. MTU Ent er the maximum tran smission unit (MTU). The MTU specifies the largest packet size permit[...]

  • Page 39

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT T UNNELLING P ROTOCOL (PPTP) 4-15 Point-to-Point Tunnelling Protocol (PPTP) The point-to-point tunnellin g protocol (PPTP) is used in association with virtual priv ate networks (VPNs). There a two part s to a PPTP connection: the W AN interface settings and the PPTP settings. MTU Ent er the maximum tran[...]

  • Page 40

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT T UNNELLING P ROTOCOL (PPTP) 4-16 Use These DNS Servers Click the radio button to set up the Primary DNS and Secondary DN S servers manually . Discard Ping on W AN Check to Enable to recognize pings on the ENS200 W AN interface or Disable to block pings on the ENS200 W A N interface. Note: Pinging IP ad[...]

  • Page 41

    B ASIC N ETWORK S ETTINGS C ONFIGURING LAN S ETTINGS 4-17 4.3.2 Configuring LAN Settings IP Address Enter the LAN port IP address. IP Subnet Mask Enter the LAN IP subne t mask. WINS Server IP Enter the WINS Server IP . Use Router As DHCP Server Check this opt ion to enable the ENS200 internal DHCP server . St arting IP Address S pecify the starting[...]

  • Page 42

    B ASIC N ETWORK S ETTINGS C ONFIGURING VPN P ASS -T HROUGH 4-18 4.3.3 Configuring VPN Pass-Through VPN Pass-through allows a secure virtual private network (VPN) c onnection between two co mputers. Enabling th e options o n this page opens a VPN port and enables connections to p ass through t he ENS200 without interruption. PPTP Pass-through Check [...]

  • Page 43

    B ASIC N ETWORK S ETTINGS C ONFIGURING P ORT F ORWARDING 4-19 4.3.4 Configuring Port Forwarding Port forwarding enables multip le server applications on a LAN to serve clients on a W AN over a single W AN IP addr ess. The route r accepts incoming client p ackets, filters them based on the destination W AN, or public, port and prot ocol and forwards[...]

  • Page 44

    B ASIC N ETWORK S ETTINGS C ONFIGURING P ORT F ORWARDING 4-20 Service Name Enter a name for t he port forwarding rule. Protocol Select a protocol for the applicat ion: Choices are Both, TCP , and UDP . St arting Port Enter a starting port number . Ending Port Enter an ending port number . All ports numbers between the st arting and ending ports wil[...]

  • Page 45

    B ASIC N ETWORK S ETTINGS C ONFIGURING D EMILITARIZED Z ONE 4-21 4.3.5 Configuring Demilitarized Zone Configuring a device on the LAN as a demilitarized zone (DMZ) host allows unrestric ted two-way Internet access for Internet app lica- tions, such as online video games, to run from behind the NA T firewall. The DMZ function allows the router to re[...]

  • Page 46

    B ASIC N ETWORK S ETTINGS C ONFIGURING W IRELESS LAN 4-22 4.4 Configuring Wireless LAN 4.4.1 Configuring Wireless Settings Instructions on how to configure the wireless and security se ttings for each of the possible operating modes. Access Point Mode The ENS200 supports Access Point Mode. In this mode, users with a wirele ss client device within r[...]

  • Page 47

    B ASIC N ETWORK S ETTINGS A CCESS P OINT M ODE 4-23 AP Detection AP Detection can select th e best channel to use by scanning n earby areas for Access Points. Current Profile Configure up to four different SSID s. If many client devices will be accessing the net work, you can arrange the devices into SSID groups. Click Edit to configure the profil [...]

  • Page 48

    B ASIC N ETWORK S ETTINGS C LIENT B RIDGE M ODE 4-24 Client Bridge Mode Client Bridge Mode lets you connect two LAN segment s via a wireless link as though they are on th e same physical network. Since the computers are on the same s ubnet, broadcasts reach all machines. As a result , DHCP information generated by the server reac h all client compu[...]

  • Page 49

    B ASIC N ETWORK S ETTINGS C LIENT B RIDGE M ODE 4-25 Profile If you used the Si te Survey , the Web Configurator shows near by Access Points. T o connect to an Access Poin t, click the Access Point’s BSSID. Wireless Security See Configuring Wireless Security . Click Refresh to scan again.[...]

  • Page 50

    B ASIC N ETWORK S ETTINGS WDS B RIDGE M ODE 4-26 WDS Bridge Mode Unlike traditional bridging. WDS Bridge Mode allows you to create large wireless networks by linking several wireless access po ints with WDS links. WDS is no rmally used in large, open areas, wher e pulling wires is cost prohibitiv e, restricted or physically im possible. Wireless Mo[...]

  • Page 51

    B ASIC N ETWORK S ETTINGS WDS B RIDGE M ODE 4-27 Security Select the type of WDS security: None, WEP , or AES. WEP Key Enter the WEP key . AES Pass phrase Enter the AES pass phrase. MAC Address Enter the MAC address of the Access Point to which you want to extend wireless connectivity . Mode Select Disable or Enable to disable or enable WDS. Click [...]

  • Page 52

    B ASIC N ETWORK S ETTINGS C LIENT R OUTER M ODE 4-28 Client Router Mode In Client Router M ode, you can access the Internet wire lessly with the su pport of a WISP . In AP Rout er Mode, the ENS200 can access the Internet via a cable or DSL modem. In this mode, the EN S200 can be configured to turn of f the wireless network name (SSID) broadcast, so[...]

  • Page 53

    B ASIC N ETWORK S ETTINGS C LIENT R OUTER M ODE 4-29 Profile If you used the Si te Survey , the Web Configurator shows near by Access Points. T o connect to an Access Poin t, click the Access Point’s BSSID. Wireless Security See Configuring Wireless Security . Click Refresh to scan again.[...]

  • Page 54

    B ASIC N ETWORK S ETTINGS C ONFIGURING W IRELESS S ECURITY 4-30 4.4.2 Configuring Wireless Security The Wireless Security Settings section le ts you configure the ENS200’ s security modes: WEP , WP A-PSK, WP A2-PSK, WP A-PSK Mixed, WP A, WP A2, and WP A Mixed. W e strongly reco mmend you use WP A2-PSK. Wired Equivalent Privacy (WEP) Security Mode[...]

  • Page 55

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS P RE -S HAR ED K EY (WPA-PSK) 4-31 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Security Mode Select WP A-PSK from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with [...]

  • Page 56

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS 2 P RE -S HARED K EY (WPA2-PSK) 4-32 Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) Security Mode Select WP A2-PSK from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption[...]

  • Page 57

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS P RE -S HARED K EY (WPA-PSK) M IXED 4-33 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed Security Mode Select WP A2-PSK Mi xed from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automa[...]

  • Page 58

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS (WPA) 4-34 Wi-Fi Protected Access (WPA) Security Mode Select WP A from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phrase.  AES = auto[...]

  • Page 59

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS 2 (WPA2) 4-35 Wi-Fi Protected Access 2 (WPA2) Security Mode Select WP A2 from t he drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phrase.  AE[...]

  • Page 60

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS (WPA) M IXED 4-36 Wi-Fi Protected Access (WPA) Mixed Security Mode Select WP A Mixed from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phr[...]

  • Page 61

    B ASIC N ETWORK S ETTINGS C ONFIGURING W I RELESS MAC F ILTER 4-37 4.4.3 Configuring Wireless MAC Filter Wireless MAC Filters are used to allow or d eny network access to wireless clients accord ing to their MAC addresses. Y ou can man u- ally add a MAC address to rest rict the permission to acce ss ENS200. The default setting is Disable Wireless M[...]

  • Page 62

    B ASIC N ETWORK S ETTINGS C ONFIGURING WDS L INK S ETTINGS 4-38 4.4.4 Configuring WDS Link Settings Using WDS Link Settings, you can create a wireless backbone link be tween multiple access points that are part of the same wirel ess network. This allows a wireless network to be expanded using mult iple Access Point s without the need for a wired ba[...]

  • Page 63

    B ASIC N ETWORK S ETTINGS C ONFIGURING A DVANCED N ETWORK S ETTINGS 4-39 4.4.5 Configuring Advanced Network Settings Network address translati on (NA T) allows users on the LAN to access the Internet thro ugh a single or multiple Public IP Address es. NA T provides firewall protection from hacker att acks and allows for mapping LAN IP addresses to [...]

  • Page 64

    B ASIC N ETWORK S ETTINGS M ANAGEMENT S ETUP 4-40 4.5 Management Setup The Management section lets you co nfigure administration, management VLAN, SNMP settings, ba ckup/restore settings, firmware upgrade, time settings, and log settings. Th is chapter describe s these settings. 4.5.1 Configuring Administrator Account Click the Administration link [...]

  • Page 65

    B ASIC N ETWORK S ETTINGS C ONFIGURING M ANAGEMENT VLAN 4-41 4.5.2 Configuring Management VLAN Click the Management VLAN link un der the Management menu to assign a VLAN tag to the packet s. A VLAN is a group of computers on a network whose software has bee n configured so that th ey behave as if they were on a se para te L oca l Ar ea Network (LAN[...]

  • Page 66

    B ASIC N ETWORK S ETTINGS C ONFIGURING SNMP 4-42 4.5.3 Configuring SNMP SNMP is used in network managem ent systems to monitor network-at tached devices for conditions t hat warrant administrative atten - tion. SNMP Enable or disable the ENS200 SNMP function. Cont act Enter the contact det ails of the device. Location Enter the locati on of the dev[...]

  • Page 67

    B ASIC N ETWORK S ETTINGS C ONFIGURING SNMP 4-43 Engine ID S pecify the engine ID for SNMPv3. Click Save/Apply to apply the changes or Cancel to return previous settings.[...]

  • Page 68

    B ASIC N ETWORK S ETTINGS C ONFIGURING B ACKUP /R ESTORE S ETTINGS 4-44 4.5.4 Configuring Backup/Restore Settings Click the Backup/Restore Setting link under the Management menu to save the ENS200’s current settings in a file on your local d isk or load settings onto the device fr om a local disk. This feature is particularly convenient admini st[...]

  • Page 69

    B ASIC N ETWORK S ETTINGS C ONFIGURING F IRMWARE U PGRADE 4-45 4.5.5 Configuring Firmware Upgrade Firmware is system softwa re that operates and allo ws the administrator to interact with the router . T o update the firmware vers ion, follow these steps: 1. Download the appr opriate firmware approved by EnGenius Networks from an approved web site. [...]

  • Page 70

    B ASIC N ETWORK S ETTINGS C ONFIGURING S YSTEM T IME 4-46 4.5.6 Configuring System Time Change the system time of the ENS200 by m anually entering the information, synchronizi ng the device with a PC, or setup automat ic updates through a network time (NTP) protocol server . Manually Set Date and Time Enter the date and time values in the date and [...]

  • Page 71

    B ASIC N ETWORK S ETTINGS C ONFIGURING W I -F I S CHEDULE 4-47 4.5.7 Configuring Wi-Fi Schedule Use the Wi-Fi schedule function to co ntrol the wireless power ON/OFF servic e that operates on a routine basis. Add a Schedule Service Create a schedule service type and date/time parameters for a specific service. Schedule Name Enter the descrip tion o[...]

  • Page 72

    B ASIC N ETWORK S ETTINGS S CHEDULE S ERVICE S T ABLE 4-48 Schedule Services Table The Schedule function relies on the GMT time setting acquired from a network time protocol (NTP) server . For details on how to con- nect the ENS200 to an NTP server , see Configuring System Time . Schedule T able Displays a list of scheduled services for the ENS200.[...]

  • Page 73

    B ASIC N ETWORK S ETTINGS C ONFIGURING C OMMAND L INE I NTERFACE 4-49 4.5.8 Configuring Command Line Interface Most users will configure the EN S200 through the graphical user interface (GUI). Howe ver , for those who prefer an alternative method there is the command line interface (CLI). The CLI can be access th rough a command console, modem or T[...]

  • Page 74

    B ASIC N ETWORK S ETTINGS C ONFIGURING L OGGING 4-50 4.5.9 Configuring Logging Display a list of events t hat are triggered on the ENS200 Ethernet and wirel ess interfaces. Y ou can cons ult this log if an unkn own error occurs on the system or wh en a report needs to be sent to the technical support dep art ment for debugging purposes. Syslog Enab[...]

  • Page 75

    B ASIC N ETWORK S ETTINGS C ONFIGURING D IAGNOSTICS 4-51 4.5.10 Configuring Diagnostics The diagnosis feature allow the adm inistrator to verify t hat another device is av ailable on the network and is accepting reques t p ack- ets. If the ping result returns alive , it means a device is on line. This feature does not work if the t arget device is [...]

  • Page 76

    B ASIC N ETWORK S ETTINGS V IEWING D EVICE D ISCOVERY 4-52 4.5.11 Viewing Device Discovery Device Name Displays the name of the dev ices connected to the network. Operation Mode Displays the operation mode of the devices co nnected to the network. IP Address Displays the IP addr ess of the devices c onnected to the network. System MAC Address Displ[...]

  • Page 77

    B ASIC N ETWORK S ETTINGS C ONFIGURE D ENIAL OF S ERVICE P ROTECTION 4-53 4.5.12 Configure Denial of Service Protection Use TCP SYN Cookies P rotection Click to enable TCP SYN cookies protection. SYN Flood Attack Protection Click to enable or disable SYN Flood Attack Protection. Match Interval Per Second Enter the al lowed number of packet s per se[...]

  • Page 78

    B ASIC N ETWORK S ETTINGS L OGGING O UT 4-54 4.5.13 Logging Out Click Logout to logout from the ENS200.[...]

  • Page 79

    A PPENDIX A F EDERAL C OMMUNICATION C OMMISSION I NTERF ERENCE S TATEMEN T A-1 Appendix A Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Pa rt 15 of the FCC Rules. These limits are designed to provid e reasonable protection against [...]

  • Page 80

    A PPENDIX A F EDERAL C OMMUNICATION C OMMISSION I NTERF ERENCE S TATEMEN T A-2 Important: This equipment complies with FCC radiation exposure limits set fort h for an uncontrolled environment. This device complies with FCC RF Exposure limits se t forth for an uncont rolled environment, under 47 CFR 2.109 3 paragrap h (d)(2 ). This transmitter must [...]

  • Page 81

    A PPENDIX B I NDUSTRY C ANADA S TATEMENT B-1 Appendix B Industry Canada Statement This device complies with RSS-210 of the Industry C anada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmful inte rference, and (2) this device mu st accept any interference rece ived, including interference th at may c[...]

  • Page 82

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-1 Appendix C WorldWide Technical Support REGION / COUNTRY OF PURCHASE SERVICE CENTRE SERVICE INFORMATION Canada CANADA web site www .engeniuscanada.com email rma@engeniuscanada.com contact nu mbers T oll Free: (+1) 888-397-27 88 Local: (+1) 90 5-940-8181 hours of operation Monday - Friday 9:00AM to 5:3[...]

  • Page 83

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-2 Mexico, Central and Southe rn America MIAMI, USA web site [ES] es.engeniustech.com [PT] pg.en geniustech.com email miamisupport@engeniu stech.com contact nu mbers Miami: (+1) 305- 887-7378 Sao Paulo, Brazil: (+55)1 1-39 57-0303 D.F ., Mexico:(+52)55 -1 163-8894 hours of operation Monday - Friday 8:00[...]

  • Page 84

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-3 Singapore, Cambod ia, Indonesia, Malaysia, Thailand, Philippines, Vietna m China, Hong Kong, Korea India South Afric a Oceania SINGAPORE web site www .engenius tech.com.sg/e_warranty_form email techsupport@engeniu stech.com.sg contact nu mbers T oll Free: Singapore: 1800 -364-3648 hours of operation [...]