EnGenius EOR7550 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius EOR7550, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius EOR7550 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of EnGenius EOR7550. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of EnGenius EOR7550 should contain:
- informations concerning technical data of EnGenius EOR7550
- name of the manufacturer and a year of construction of the EnGenius EOR7550 item
- rules of operation, control and maintenance of the EnGenius EOR7550 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius EOR7550 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius EOR7550, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius EOR7550.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius EOR7550 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

     EO R 7 5 5 0  Dual  Radio  Multi ‐ Function  Rep eate r User ’ s  Manual   V1.0[...]

  • Page 2

    i Ta b l e  of  Cont ent   1.  Introduction .............................................................................................................................. ... 1  1.1.  Feat ures ............................................................................................................................ 1  1.2.[...]

  • Page 3

    ii 4.4.1.  Enable ................................................................................................................. 49  4.4.2.  DMZ .................................................................................................................... 49  4.4.3.  DoS ......................................................[...]

  • Page 4

    iii  Rev i s i o n  His t or y  Ve r s i o n  Date  Note s  1.0  January ,  08,  20 09  Initial  Ve r s i o n  [...]

  • Page 5

    1 1. Introduction  EOR 75 50  equips  with  two  powerful  independen t  RF  interf aces  which  support  802.11a/b/g  and  802.11b/ g /n.  Wi t h  certified  IP ‐ 65  prot ection,  it  is  designed  to  deliver  hi gh  reliability  under  harsh  outdoor  envir on[...]

  • Page 6

    2 access  set ting.   Manage ment  - Fi r m w a r e  Upgrade  Upgr ading  firm ware  via  web  brow ser ,  setting  are  reser v ed  after  upgra de  - Rese t  &  Backup  Rese t  to  fa c to r y  default.  User  can  exp or t  all  setting  into  a  [...]

  • Page 7

    3 (7)  Radio1 Radio2 (8) Radio1 Radio2   a/b/g b/g/n a/b/g b/g/n   AP  CR AP WDS  Bridge   SSID1 SSID2 SSID1 SSID2   LA N  LA N  (9)  Radio1 Radio2 (10) Radio1 Radio2   a/b/g b/g/n a/b/g b/g/n   CR  AP WDS  Bridge AP   SSID1 SSID2 SSID1 SSID2   LA N  LA N  (11)  Radio1[...]

  • Page 8

    4 SOHO  users  need  a  cost ‐ effect ive ,  easy  and  quick  inst allation  of  a  small  network.  y  Wi r e l e s s  ext ensions  to  Eth er ne t  networks  Network  managers  in  dynamic  envir onments  ca n  minimiz e  the  overh ead  caus ed  by  mo v[...]

  • Page 9

    5 2. Modes   EOR 75 50  provide s  2  separat e  radi o  channels  fo r  wider  service  are a.  Ea ch  of  these  2  rad i o  channels  can  be  conf igu red  as  differ ent  function  mode  separ ately .  The  device  allow s  you  to  co nfigu re  int[...]

  • Page 10

    6 2.2. Client  Bridg e  When  in  Clien t  Bridge,  EOR7 550  wi ll  associat e  with  nearby  AP  and  see s  the  network  device  combination  as  a  st andard  mobi le  unit  (MU).  The  access  point  then  for m s  a  wireless  bridg e  between [...]

  • Page 11

    7 3. Under s tanding  the  H a rd wa re  3.1. Hardw are  Ins talla tion  1. Place  the  unit  in  an  appropria te  loca tion  after  conducting  a  sit e  survey .  2. Plug  one  end  of  the  Et her net  cabl e  into  the  Network  port  of  the  Po E  in[...]

  • Page 12

    8 4. We b  Configur ation  4.1. Sy ste m  4.1.1. Oper ation  Mode  Yo u  ar e  allowe d  to  confi gure  yo ur  device  into  diff eren t  modes  fo r  differ ent  purposes  (Ple ase  see  Chapter  2 ).  1. To  sta rt  configur ation,  press  Rese t  to  purge ?[...]

  • Page 13

    9 4.1.2. Sta tus  [...]

  • Page 14

    10 4.1.3. DHCP    DHCP  Configur ation  Menu  only  shows  when  device  is  in  Clien t  Rou te r  mode.  4.1.4. Sche dule  [...]

  • Page 15

    11 4.1.5. Ev e n t  Log  [...]

  • Page 16

    12 4.1.6. Monitor    [...]

  • Page 17

    13 4.2. Wi r e l e s s   EOR 75 50  provide s  2  separate  Ra dio  Channel  which  allows  you  configuring  your  device  into  diff erent  separ ate  mode s.  Ea c h  Radio  Channel  can  be  conf igu red  separ at e ly  with  diff eren t  configur ation  menu. ?[...]

  • Page 18

    14 4.2.1.2. Basic   ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4  GHz  (802.11b)  9 2.4  GHz  (802.11g)  ¾ Enabled  SSID#:  The  device  allows  you  to  add  up  to  4  u[...]

  • Page 19

    15 4.2.1.3. Adva n c ed   ¾ Fragment  Threshold:  Packets  over  the  specified  size  will  be  fragmented  in  order  to  improve  performance  on  noisy  networks.  Specify  a  value  between  256  and  2346.  The  default  value  is  2346.  ¾ RTS ?[...]

  • Page 20

    16 ¾ CTS  Protection:  CTS  (Clear  to  Send)  can  be  always  enabled,  auto,  or  disabled.  By  enabled  CTS,  the  Access  Point  and  clients  will  wait  fo r  a  ‘clear’  si gna l  before  transmitting.  It  is  recommended  to  select ?[...]

  • Page 21

    17 ¾ Encryption:  WEP   ¾ ESSID  Selection :  As  this  device  supports  multiple  SSIDs,  it  is  p ossible  to  configure  a  different  security  mode  for  each  SSID  (profile).  Select  an  SSID  from  the  drop ‐ down  list.  ¾ Broadcast [...]

  • Page 22

    18 authentication  encrypts  the  challenge  text  and  sends  it  ba ck  to  the  access  point.  If  the  challenge  text  is  encrypted  correctly,  the  access  point  allows  the  requesting  device  to  authenticate.  It  is  recommended  to  se[...]

  • Page 23

    19 broa dcas t  to  an yone  within  the  ra n ge  of  your  signal.  If  you're  not  using  encryption  then  they  could  connect  to  your  network.  When  this  is  disabled,  you  must  enter  the  Wireless  Network  Name  (SSID)  on  th[...]

  • Page 24

    20 ¾ Broadcast  SSID :  Selec t  Enable  or  Disable  from  the  drop ‐ down  list.  This  is  the  SSID  broadcast  feature.  When  this  option  is  set  to  Enable,  yo ur  wir e less  network  name  is  broa dcas t  to  an yone  within  the  ra[...]

  • Page 25

    21 4.2.1.6. Client  Lis t   4.2.1.7. VL AN    Only  Avai l a bl e  in  AP  mode  ¾ Virtual  LAN :  Choose  to  Enable  or  Disable  the  VLAN  features.  ¾ SSID1  Tag :  Spec ify  the  VLAN  tag.  [...]

  • Page 26

    22 4.2.1.8. WMM   4.2.1.9. Po we r  Saving    Only  Avai l a bl e  fo r  Radio  2  [...]

  • Page 27

    23 4.2.2. Client  Bridge  4.2.2.1. St at us   4.2.2.2. Basic   ¾ Radio:  To  enable/disable  radio  channel  ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4  GHz  (802.11b)  9 2.4  GHz  [...]

  • Page 28

    24 ¾ Site  Survey  Click  on  the  Site  Survey  but ton  to  view  a  list  of  Access  Poi nt s  in  the  area.  The  Sit e  Survey  page  display s  information  about  device s  within  the  802.11b/g /n  frequency .  Informa tion  such  as  chan[...]

  • Page 29

    25 ¾ Beacon  Period :  Beacons  are  packets  sent  by  a  wireless  Access  Point  to  synchronize  wireless  devices.  Specify  a  Beacon  Period  value  between  20  and  1024.  The  default  value  is  set  to  100  milliseconds.  ¾ DTIM  Per[...]

  • Page 30

    26 4.2.2.5. WMM  [...]

  • Page 31

    27 4.2.3. Client  Ro u t e r  4.2.3.1. St at us   4.2.3.2. Basic   ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4  GHz  (802.11b)  9 2.4  GHz  (802.11g) [...]

  • Page 32

    28 ¾ Site  Survey  Click  on  the  Site  Survey  but ton  to  view  a  list  of  Access  Poi nt s  in  the  area.  The  Sit e  Survey  page  display s  information  about  device s  within  the  802.11b/g /n  frequency .  Informa tion  such  as  chan[...]

  • Page 33

    29 ¾ Preamble  Type:  Select  a  short  or  long  preamble.  For  optimum  performance  it  is  recommended  to  also  configure  the  client  device  as  the  same  preamble  type.  4.2.3.4. AP  Pr ofile  This  page  allow s  you  to  configure  the[...]

  • Page 34

    30 4.2.4. WDS  Bridge   Yo u  can  only  connect  to  the  device  via  Wi r e l e s s  Client  4.2.4.1. St at us   4.2.4.2. Basic   ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4 [...]

  • Page 35

    31 9 2.4  GHz  (802.11g)  ¾ Channel:  Channel  selection.  This  will  vary  based  on  selected  Band.  ¾ MAC  address  1~4:  Specify  up  to  4  MAC  address  of  the  device.   ¾ Set  Security :  Wireless  security  mode  setting.   ¾ Security:[...]

  • Page 36

    32 4.2.4.3. Adva n c ed   ¾ Fragment  Threshold:  Packets  over  the  specified  size  will  be  fragmented  in  order  to  improve  performance  on  noisy  networks.  Specify  a  value  between  256  and  2346.  The  default  value  is  2346.  ¾ RTS ?[...]

  • Page 37

    33 ¾ CTS  Protection:  CTS  (Clear  to  Send)  can  be  always  enabled,  auto,  or  disabled.  By  enabled  CTS,  the  Access  Point  and  clients  will  wait  fo r  a  ‘clear’  si gna l  before  transmitting.  It  is  recommended  to  select ?[...]

  • Page 38

    34 ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4  GHz  (802.11b)  9 2.4  GHz  (802.11g)  ¾ Channel:  Channel  selection.  This  will  vary  based  on  selected  Band.  ¾ MAC  addre[...]

  • Page 39

    35 ¾ Default  Tx  Key :  You  may  choose  one  of  your  4  different  WEP  keys  from  below.  ¾ Encryption  Key  1 ‐ 4:  You  may  enter  four  different  WEP  keys.   4.2.5.3. Adva n c ed   ¾ Fragment  Threshold:  Packets  over  the  speci[...]

  • Page 40

    36 ¾ Preamble  Type:  Select  a  short  or  long  pr eamble.  For  optimum  performance  it  is  recommended  to  also  configure  the  client  device  as  the  same  preamble  type.  ¾ CTS  Protection:  CTS  (Clear  to  Send)  can  be  always  e[...]

  • Page 41

    37 9 2.4  GHz  (802.11b)  9 2.4  GHz  (802.11g)  ¾ Enabled  SSID#:  The  device  allows  you  to  add  up  to  4  unique  SSID  ¾ ESSID#:  Description  of  each  configured  SSID  Channel:  Channel  selection.  This  will  vary  based  on  selected [...]

  • Page 42

    38 ¾ Data  rate:  You  may  select  a  data  rate  from  the  drop ‐ down  list,  however,  it  is  recommended  to  select  auto .  This  is  also  known  as  auto ‐ fallback.  ¾ Preamble  Type:  Select  a  short  or  long  pr eamble.  For ?[...]

  • Page 43

    39 ¾ Encryption:  WEP   ¾ ESSID  Selection :  As  this  device  supports  multiple  SSIDs,  it  is  p ossible  to  configure  a  different  security  mode  for  each  SSID  (profile).  Select  an  SSID  from  the  drop ‐ down  list.  ¾ Broadcast [...]

  • Page 44

    40 authentication  encrypts  the  challenge  text  and  sends  it  ba ck  to  the  access  point.  If  the  challenge  text  is  encrypted  correctly,  the  access  point  allows  the  requesting  device  to  authenticate.  It  is  recommended  to  se[...]

  • Page 45

    41 they  could  connect  to  your  network.  When  this  is  disabled,  you  must  enter  the  Wireless  Network  Name  (SSID)  on  the  client  manually  to  connect  to  the  network.  ¾ WMM :  Choose  to  Enable  or  Disable  WMM.  This  is [...]

  • Page 46

    42 ¾ Broadcast  SSID :  Selec t  Enable  or  Disable  from  the  drop ‐ down  list.  This  is  the  SSID  broadcast  feature.  When  this  option  is  set  to  Enable,  yo ur  wir e less  network  name  is  broa dcas t  to  an yone  within  the  ra[...]

  • Page 47

    43 4.2.6.6. Client  Lis t   4.2.6.7. WMM  [...]

  • Page 48

    44 4.2.7. Univer sal  Re p eate r  (ST A)  4.2.7.1. St at us   4.2.7.2. Basic   ¾ Band:  Configure  the  device  into  different  wireless  modes.  9 2.4  GHz  (802.11b/g)  9 5  GHz  (802.11a)  9 2.4  GHz  (802.11b)  9 2.4  GHz  (802.11g) [...]

  • Page 49

    45 ¾ Site  Survey  Click  on  the  Site  Survey  button  to  view  a  list  of  A ccess  Poi n ts  in  the  area.  The  Site  Sur vey  pa ge  display s  information  about  devices  within  the  802.11b/ g /n  frequency .  Informa tion  such  as  cha[...]

  • Page 50

    46 ¾ Preamble  Type:  Select  a  short  or  long  preamble.  For  optimum  performance  it  is  recommended  to  also  configure  the  client  device  as  the  same  preamble  type.  4.2.7.4. AP  Pr ofile   4.2.7.5. WMM  [...]

  • Page 51

    47 4.3. Netw ork  4.3.1. Sta tus   4.3.2. LA N   ¾ Bridge  Type:  Select  Static  IP  or  Dynamic  IP  from  the  drop ‐ down  list.  If  you  select  Static  IP,  you  will  be  required  to  specify  an  IP  address  and  subnet  mask.  If [...]

  • Page 52

    48 4.3.3. WA N    Only  shows  when  device  is  in  WA N  Int erface  ¾ Login  Method:  Configure  different  connection  methods  with  WAN.  9 Static  IP  Address  9 Dynamic  IP  Address  9 PPP  over  Ethernet  9 PPTP  ¾ Hostname:  Specify  the  hos[...]

  • Page 53

    49 4.4. Fi r e w a l l   Only  shows  when  device  is  in  AP  or  CR  modes  with  WA N  Interf ace  enabled.  4.4.1. Enable   4.4.2. DMZ   4.4.3. DoS  [...]

  • Page 54

    50 4.4.4. MA C  Fi l t e r   4.4.5. IP  Fi l t e r  [...]

  • Page 55

    51 ¾ Description:  Description  of  IP  Filtering  item  ¾ Protocol:  Type  of  Protoc ols  9 Both  9 TCP  9 UDP  ¾ Local  IP  Address:  Local  IP  address  range  ¾ Remote  port  range:  Remote  port  number  rang e  4.4.6. URL  Fi l t e r   [...]

  • Page 56

    52 4.5. Ad va n c ed  4.5.1. NA T  This  allows  you  to  enable/disable  NA T  service  of  the  device.   4.5.2. Por t  Mapping   ¾ Description:  Description  of  Port  Mapping  item.   ¾ Local  IP:  Source  IP  to  be  mapped.  [...]

  • Page 57

    53 ¾ Protocol:  Protocol  type.   9 Both  9 TCP  9 UDP  ¾ Remote  Port  Range:  Source  Port  number  to  be  mapped.  4.5.3. Por t  Fo rwar ding   ¾ Description:  Description  of  Port  Forwarding  item.  ¾ Local  IP:  Source  IP  to  be  forwarded. ?[...]

  • Page 58

    54 4.5.4. Por t  Tr i g g e r i n g  [...]

  • Page 59

    55 4.5.5. AL G   4.5.6. UPnP  [...]

  • Page 60

    56 4.5.7. QoS   ¾ Priority  Queue  [...]

  • Page 61

    57  ¾ Bandwidth  Alloca tion   ¾ Type:  Type  of  traffics  to  be  monitored.  9 Download  9 Upload  9 Both  ¾ Local  IP  range:  Destination  IP  Range.   ¾ Protocol:  Protocol  type  to  be  monitored.   9 All  9 TCP  9 UDP  9 SMTP  9 HTTP  9 P[...]

  • Page 62

    58 9 FTP  ¾ Remote  port  range:  Source  Port  Number  range  ¾ Policy:  The  policy  rules  for  QoS  service.   9 Min  9 Max  ¾ Rate(bps):  9 FULL  9 32M  9 13M  9 8M  9 4M  9 2M  9 1M  9 512K  9 256K  9 128K  4.5.8. Sta tic  Ro uting   ¾ Desti[...]

  • Page 63

    59 4.5.9. Dynamic  R outing   4.5.10. R outing  T able  Prov iding  an  over view  of  current  Rout i n g  ta bl e. [...]

  • Page 64

    60 4.6. M a n age m ent  4.6.1. Adm i n  Change  current  login  password  of  the  device.  It  is  recommended  to  change  the  default  password  for  security  reasons.    4.6.2. SNMP  Allows  you  to  assign  the  contac t  details,  location,  com[...]

  • Page 65

    61  ¾ SNMP  Active :  Choose  to  enable  or  disable  the  SNMP  feature.  ¾ SNMP  Version :  You  may  select  a  specific  version  or  select  All  from  the  drop ‐ down  list.  ¾ Read  Community  Name :  Specify  the  password  for  acce[...]

  • Page 66

    62      Ensure  that  you  hav e  downloa ded  the  appr opriate  firmwar e  from  the  vendor ’ s  websi te.  Connect  the  device  to  you r  PC  using  an  Et he rnet  ca bl e,  as  the  firmwar e  cannot  be  upgra ded  with  wirele ss  [...]

  • Page 67

    63     [...]

  • Page 68

    64 4.7. T ools  4.7.1. Ti m e  Set ting  This  feature  allows  you  to  configure,  update,  and  maintain  the  correct  time  on  the  device’s  internal  system  clock  as  well  as  configure  the  time  zone.  The  date  and  time  of  the [...]

  • Page 69

    65  ¾ Dynamic  DNS:  To  enable/disable  the  DDNS  service  ¾ Server  Address:  List  of  DDNS  Service  providers  9 3322  9 DHS  9 DynDNS  9 ZoneEdit  9 CyberGate  ¾ Host  Name:  Host  name  to  be  redirected  ¾ Username:  User  name  for  DDNS  [...]

  • Page 70

    66   [...]

  • Page 71

    67 4.8. Logout  Logout  will  let  user  leav e  the  GUI.    [...]

  • Page 72

    68 Appendix  A  –  SPECIFICATIONS  Hard wa re  Specification  MCU  Ralink  RT28 80  RF  Ath e ro s  AR5 414  (Radio1)  +  Ralink  RT2 820  (Radio2)  Memory  32MB  SDRAM  Flash  8MB  Physical  In terface  One  10/ 100  Fas t  Ethe rnet  RJ ‐ 45  One  Reset [...]

  • Page 73

    69 IEEE802.11a  25dBm@36Mb ps  23dBm@48M bps  21dBm@54M bps  IEEE802.11a  25dBm@36Mb ps  23dBm@48M bps  21dBm@54M bps  5.725~5.825  GHz  IEEE802.11a  27dBm@6~24Mbps  25dBm@36Mbps  23dBm@48M bps  21dBm@54M bps  5.725~5.825  GHz  IEEE802.11a  27dBm@6~24Mbps  25dBm@36Mbps  23dBm@48M bps  2[...]

  • Page 74

    70 RFC  2865,2866  RADIUS  Opera tion  Mode  18  mo des   EOR7 55 0  Radio1(11a/b/ g)  Radio2  (11 /b/g/n)  AP  CB  CR  WDS  Bridge  WDS  Repeate r  UR(AP)  UR(ST A)  Disable  AP  O  (LAN/WAN) O  (LAN/WAN) O  (LAN)  O  (LAN)  O  (LAN/WAN) X  X  O  [...]

  • Page 75

    71 14  117  243  13 0  270  15  130  270  144.4  300   ‐ Distan ce  Contr ol  (802.1x  Ack  timeout)  fo r  Radio 2  ‐ Signal  Stre ngth  indi cation  usi ng  LEDs  ‐ Bandwidth  Selection  Security  Authentica tion:  ‐ 802.11i  (WP A,  WP A[...]

  • Page 76

    72 Appendix  B  –  FCC  INTERFERENCE  STATEMENT  Fede ral  Communication  Commission  In terfer ence  Sta tem ent   This  equipment  has  been  test ed  an d  fou nd  to  comply  with  the  limits  fo r  a  Class  B  digital  device,  pursuant  to  Pa [...]

  • Page 77

    73      [...]