EnGenius Technologies EAP9550 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius Technologies EAP9550, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius Technologies EAP9550 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of EnGenius Technologies EAP9550. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of EnGenius Technologies EAP9550 should contain:
- informations concerning technical data of EnGenius Technologies EAP9550
- name of the manufacturer and a year of construction of the EnGenius Technologies EAP9550 item
- rules of operation, control and maintenance of the EnGenius Technologies EAP9550 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius Technologies EAP9550 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius Technologies EAP9550, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius Technologies EAP9550.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius Technologies EAP9550 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    EnGenius EAP9550 1 1N Multi-Functi on AP/Repeater[...]

  • Page 2

    T able of Co ntent 1. Introductio n ................................................................................................................. 4 1.1. Features and Benef it s ...................................................................................... 4 1.2. Package Content s .........................................................[...]

  • Page 3

    4.6. Logout ............................................................................................................. 44 A ppendix A – FCC Interference S t atement .................................................................... 4 5 A ppendix B – IC Interf erence St atement ...............................................................[...]

  • Page 4

    1. Introduction EAP9550 is a powerful and multi-funct ioned 1 1n A ccess Point and it can act three m odes A P/WDS/Universal Repeater . Smoke detector appearance will minimize visibility . So this model can work properly at Hotel or pub lic area. EAP9 550 is a Wireless Network device t hat delivers up to 6x faster speeds and 7x extended coverage th[...]

  • Page 5

    SNMP Remote Conf iguration Man agement Helping admini strators to remotel y configure or ma nage the A cce ss Point easil y QoS (WMM ) support Enhancing us er performa nce and densit y 1.2. Package Content s The p a ckage cont ains the following items. In case of return, please keep the original box set, and the complete box set must be included fo[...]

  • Page 6

    2. Understanding the H ardware 2.1. Hardware Installat ion 1 Place the unit in an appropriate place af ter cond ucting a site surv ey . 2 Plug one en d of the Ethernet cable in t o the RJ-45 port on the rear p anel of the device and another end into your PC/Notebook . 3 Insert the DC-inlet of the power adapter i nto the port labeled “DC-IN” and[...]

  • Page 7

    3. Modes A P/W DS/Universal Repeater 3.1. Access Point In AP (A ccess Point) mode, your device act s as a communication hub for users with a wireless device to connect to a w ired LAN /W AN. 3.2. WDS Bridge Y ou can only connect to the device via Ethernet Port WDS (Wireless Distribution System) allows A P to communicate with one another wirelessly [...]

  • Page 8

    4. W eb Configuration 4.1. System 4.1.1. Operation Mode You are allowed to configure E A P95 50 into different modes: A P, WDS Bridge and Universal Repeater. Please refer to Chapter 2: Modes for operat ion under different modes. 4.1.2. S t atus[...]

  • Page 9

    • System: Basic information of the de v ice. • WLAN Settings: WL A N channel. • SSID_1: SSID information. 4.1.3. DHCP[...]

  • Page 10

    4.1.4. Schedule     4.1.5. Event Log 4.1.6. Monitor The device will record the router trans mission st atus in a time sp an.[...]

  • Page 11

     Det ail: Click into det ail to see his torical record.[...]

  • Page 12

    4.2. Wireless 4.2.1. A P 4.2.1.1. S t atus[...]

  • Page 13

    4.2.1.2. Basic  Radio: To ena b le/dis able w ireless sign al. • Mode: Define A P in different modes. W h en in A P mode, the device works as regular AP, or WDS mode to interlink with other A P devices . . . . You are allowed to set MAC address and encrypti on algorithm ( Please refer t o 4.2.1.4 for encry p tion confi g urati on)  AP  W[...]

  • Page 14

    • MAC A d dress 1~4: T o specif y MAC address of o ther A P devices. M AC address will only shows when configured in WDS A P mode. • Security : Please refer to 4.2. 1.4 for encry ption configuration 4.2.1.3. A d va nced • Fragment Thres hold: P ackets over the spe cified size w ill be fragmented in order to improve performance on noisy networ[...]

  • Page 15

    • Data rate: Y o u may select a data rate from the drop-down list, however, it is recommended to select a uto. This is al so known as auto-fal lback. • N Data Rate: You may se lect N data rate from the d rop-d own lis t, however, it is recommende d to select auto. • Channel B andwidth : Select chan nel bandwidt h (A uto 20/40MHz or 20MHz) •[...]

  • Page 16

     Encryp tion: WEP • ESSID Selection: A s this device support s mult iple SSIDs, it is possi ble to configure a different securi ty mode for each S S ID (pr ofile). Select an SSI D from the drop-d own li st. • Broadcast SSID : Select Enable or Disable from the drop-down list. This is the S SID broadcast feature. When this option is set to Ena[...]

  • Page 17

    packets are transmitted without encry p tion. Shared Key sends an unenc r ypted challen ge text string to any device attempti ng to communicate w ith the A P. The device requesting authenticatio n encrypts the challenge text and s ends it back to the access point. If the challenge text is encry p ted correctly , the access point allows the requesti[...]

  • Page 18

    • Broadcast SSID : Select Enable or Disable from the drop-down list. This is the S SID broadcast feature. When this option is set to Enable , your wireless netw ork name is broadcast to anyone w ithin the range of your signal . If y ou're not using encry p tion then they could co nnect to y our network. W hen this is disable d, y ou must en [...]

  • Page 19

    • ESSID Selection: A s this device support s mult iple SSIDs, it is possi ble to configure a different securi ty mode for each S S ID (pr ofile). Select an SSI D from the drop-d own li st. • Broadcast SSID : Select Enable or Disable from the drop-down list. This is the S SID broadcast feature. When this option is set to Enable , your wireless n[...]

  • Page 20

    4.2.1.6. WPS • WPS : Place a ch eck in this box to ena b le this f eature. • WPS Current Status: Displays the current status of t he W PS con figuration. • Self Pin Co de: Displays the current PI N . • SSID: Display s the curren t SSID. • Authenticati on Mode : Displays t he current authentication m ode. • Passphrase Key: Display s the [...]

  • Page 21

    4.2.1.8. VL A N O nly A vaila ble in A P mode • Virtual LA N: Choose to Enable or Disable the VLA N features. • SSID1 Tag : Specify the VLAN tag.[...]

  • Page 22

    4.2.1.9. WMM 4.2.2. WDS Bridge Y ou can only connect to the device via Ethernet Port[...]

  • Page 23

    4.2.2.1. S t atus 4.2.2.2. Basic • Radio: T o enable/dis able radio f requency . • Mode: W DS mode al lows y ou to i nterlink w ith o ther A P devices. Se tting M A C ad d ress and encrypti on algorithm ( Please refer t o 4.2.1.4 for encry p tion confi g urati on) • Band: Co nfigure the d evice into different wireless mod es.  2.4 GHz (B)[...]

  • Page 24

     2.4 GHz (N)  2.4 GHz (B+G)  2.4 GHz (G)  2.4 GHz (B+G+ N) • Channel : You can ma n ually configure a channel to be used. • MAC A d dress 1~4: T o specif y MAC address of o ther A P devices. M AC address will only shows when configured in WDS mode . • Security : Please refer to 4.2. 1.4 for encry ption configuration  Security: [...]

  • Page 25

    alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to rem ember. • Default Tx K e y : You ma y choose on e of y o ur 4 diff erent WEP k eys from below. • Encry ption Key 1-4: You may enter four different WEP key s.  Security: WP A pre-shared key • WPA T ype: Se le ct TKIP or A E S. Th e encry[...]

  • Page 26

    4.2.2.3. A d va nced • Fragment Thres hold: P ackets over the spe cified size w ill be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default v alue is 2346. • RTS Thres h old: Packets over the specified s i ze will u se the RTS/CTS mechanis m to maintain performance in noisy networks and[...]

  • Page 27

    4.2.2.4. WMM[...]

  • Page 28

    4.2.3. Universal Repeater ( A P) 4.2.3.1. S t atus[...]

  • Page 29

    4.2.3.2. Basic • Radio: T o enable/dis able radio f requency . • Mode: Univ ersal Rep eater • Band: Co nfigure the d evice into different wireless mod es.  2.4 GHz (B)  2.4 GHz (N)  2.4 GHz (B+G)  2.4 GHz (G)  2.4 GHz (B+G+ N)[...]

  • Page 30

    • Enabled S S ID#: The device al lows y ou to hav e 1 unique SSID • ESSID# : Description of each configured S SID • Site Survey : List out all connect ed devices. 4.2.3.3. A d va nced • Fragment Thres hold: P ackets over the spe cified size w ill be fragmented in order to improve performance on noisy networks. Specify a value between 256 an[...]

  • Page 31

    • Preamble Ty pe: S el ect a short or long pr e amble. For optimum p erforman ce it is recommende d to also configure the client device as the same pr eamble type. • CTS P rotect ion: C TS (Clear to Send) can be always en abled, auto, or d isabled. By enabled CTS, the Access Point and clients will w ait for a ‘clear’ signal before transmitt[...]

  • Page 32

    • ESSID Selection : As this device supports multipl e SSIDs, it is possible to configure a different security mode for each SS I D (profile). Select an SSID from the drop-down li st. • Broadcast SSID: Select Enable or Disable from the drop-do wn list. This is the SSID br o adc ast feature. When this option is set to Enable, your wir eless netw [...]

  • Page 33

    • Key Length: Select a 6 4-bit or 128-bit W EP key length fr om the drop- down li st. • Key Type: Select a key ty pe from the drop-down list. 128-bit encry ption require s a longer key than 64-bit encry ption. Keys are defined by entering in a string in HEX (he xade cimal - using characters 0-9, A -F) or ASCII (American Standard Code for Inform[...]

  • Page 34

    connect to your network. When this is d isabled, you must enter the Wireless Network Name (SSID) on the clie nt manually to con nect to t he network. • WMM: Choose to Enable or Disable W MM . This is the Quality of Serv ice (Q oS) feat u re for prioritizing voice and video applications. T his option can be further configured in WM M under the Wir[...]

  • Page 35

    4.2.3.6. WPS • WPS : Place a ch eck in this box to ena b le this f eature. • WPS Current Status: Displays the current status of t he W PS con figuration. • Self Pin Co de: Displays the current PI N . • SSID: Display s the curren t SSID. • Authenticati on Mode : Displays t he current authentication m ode. • Passphrase Key: Display s the [...]

  • Page 36

    4.2.3.8. WMM[...]

  • Page 37

    4.3. Network 4.3.1. S t atus 4.3.2. L A N • Bridge Type: Sele ct Stati c IP or D ynamic IP from the drop-d own list. If y ou select Static IP, you will b e required to specify an IP address and subnet mask. If Dynamic IP is selected, then the IP ad d ress is received aut omatically from t he external D HCP serv er. • IP A d dress: Specify an IP[...]

  • Page 38

    Dynamic Host Configur at ion Protoco l (DHCP ) is a network appli cation protocol used by device s (DHCP clients) to obt ain configuration in f ormation for operation in an In ternet Pro t ocol network. This protocol reduces sy stem administration w ork load, al lowing networks to add devices w ith little or no manual interven tion. • DHCP server[...]

  • Page 39

    4.4. Management 4.4.1. A dmin Change current login passw ord of the dev ice. It is recomme nde d to change the default password for securit y re asons. 4.4.2. SNMP A llow s y ou to ass ign the cont act det ails, location, communit y name and trap settings for SNMP . This is a net w orking management protocol used to monitor network-att a ched devic[...]

  • Page 40

    • SNMP A ctive: Choose to enable o r disa ble the S NM P feat ure. • SNMP Versi on: You may select a specifi c version or sel ect Al l from t he drop-do wn list. • Read Community N ame: Specify the password for access the S NMP community for read only access. • Set Comm u nity Name: Specify the password for ac cess to the SNMP co mmunit y w[...]

  • Page 41

    4.4.4. Firmware It allows you to upgrade the firmware of t he device in order to improve the functionality and performance .  Ensure that yo u have downloa ded the appropriate firmware from the vendor ’ s website. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded wi th wireless interface. 4.4.5. Configur[...]

  • Page 42

    4.5. T ool s 4.5.1. T i me Setting This feature allows you to configure, update, and maintain the correct time on the device’s internal s y st em clock as well as configure the time zone. The date a nd time of the device can be configured ma nually or b y s ynchronizing with a time ser v er. I f the device losses power for any reason, it will not[...]

  • Page 43

    4.5.2. Power Sa v ing 4.5.3. Diagnosis Check whether a netw ork destination is reachable with ping serv ice.[...]

  • Page 44

    4.5.4. LED Control 4.6. Logout[...]

  • Page 45

    Appendix A – FCC Interference Statement Federal Communication Commissi on Interference St atement This e quipment has been tested and fo und to compl y with the limits for a Class B digital device, p ursuant to Part 15 of the FCC Rules. Th ese limits are designed to provide reasonable protection again st harmful interference in a residential inst[...]

  • Page 46

    Appendix B – IC Int erference S t atement Industry Canada stat e ment: This device complies with RSS-21 0 of the In dustry Ca nada Rules. Operation is subject to the following two conditions: (1) Th is device may not caus e harmful inte rference, and (2) thi s device must accept an y inte rference received, including interference that ma y ca use[...]