EnGenius ENSTATION2 User manual

T
ABLE OF
CONTENTS
TABLE OF CONTENTS
Conventions 0-vii Copyright
0-ix
Product Overview
Package Contents............................................................................................................ 1-1
Product Overview............................................................................................................ 1-2
Key Features ........................................................................................................... 1-2
Benefits ...........................................................................................................................
Technical Specifications ............................................................................................ 1-4
Wireless Specifications. ............................................................................................ 1-4
Hardware Specifications. ........................................................................................... 1-4
Software Specifications ............................................................................................ 1-4
Product Interface.............................................................................................................. 1-5
1-3
Installation
System Requirements........................................................................................................ 2-1
T
ABLE OF
CONTENTS
Installing the Device........................................................................................................ 2-2
Pre-Installation Guidelines ........................................................................................ 2-2
Installing the Device ................................................................................................ 2-2
Wall Mounting the Device .......................................................................................... 2-3
Pole Mounting the Device .......................................................................................... 2-4
Web Configuration
Logging In..................................................................................................................... 3-1
Best Practices ......................................................................................................... 3-2
Basic Network Settings
System Status................................................................................................................ 4-1
Using Save/Reload....................................................................................................... 4-1
Viewing the System Information..................................................................................... 4-2
Viewing the Wireless Client List....................................................................................... 4-4
Viewing the System Log................................................................................................. 4-5
Viewing the Connection Status........................................................................................ 4-6
Viewing the DHCP Client Tables...................................................................................... 4-7
3
T
ABLE OF
CONTENTS
Viewing the WDS Link List............................................................................................. 4-8
System Setup................................................................................................................ 4-9
Configuring Operation Modes......................................................................................... 4-9
Configuring IP Settings................................................................................................ 4-10
Configuring Spanning Tree Settings............................................................................... 4-11
Router Setup................................................................................................................ 4-12
Configuring WAN Settings............................................................................................ 4-12
Static IP ................................................................................................................ 4-12
Dynamic IP ............................................................................................................ 4-13
Point-to-Point Protocol over Ethernet (PPPoE) ............................................................. 4-14
Point-to-Point Tunnelling Protocol (PPTP) .................................................................... 4-15
Configuring LAN Settings............................................................................................. 4-17
Configuring VPN Pass-Through..................................................................................... 4-18
Configuring Port Forwarding......................................................................................... 4-19
Configuring Demilitarized Zone.................................................................................... 4-21
Configuring Wireless LAN............................................................................................... 4-22
Configuring Wireless Settings....................................................................................... 4-22
Access Point Mode .................................................................................................. 4-22
Client Bridge Mode .................................................................................................. 4-24
WDS Bridge Mode ................................................................................................... 4-26
4
T
ABLE OF
CONTENTS
4
Client Router Mode ................................................................................................. 4-28
Configuring Wireless Security....................................................................................... 4-30
Wired Equivalent Privacy (WEP) ................................................................................ 4-30
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) ...................................................... 4-31
Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) ................................................. 4-32
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed ............................................. 4-33
Wi-Fi Protected Access (WPA) ................................................................................... 4-34
Wi-Fi Protected Access 2 (WPA2) .............................................................................. 4-35
Wi-Fi Protected Access (WPA) Mixed .......................................................................... 4-36
Configuring Wireless MAC Filter.................................................................................... 4-37
Configuring WDS Link Settings..................................................................................... 4-38
Configuring Advanced Network Settings......................................................................... 4-39
Wireless Traffic Shaping .......................................................................................... 4-39
Management Setup........................................................................................................ 4-40
Configuring Administrator Account................................................................................ 4-40
Configuring Management VLAN..................................................................................... 4-41
Configuring SNMP....................................................................................................... 4-42
Configuring Backup/Restore Settings............................................................................. 4-44
Configuring Auto Reboot Settings.................................................................................. 4-45
Configuring Firmware Upgrade......................................................................................4-46
T
ABLE OF
CONTENTS
5
Configuring System Time............................................................................................ 4-47
Configuring Wi-Fi Schedule.......................................................................................... 4-48
Add a Schedule Service ........................................................................................... 4-48
Schedule Services Table .......................................................................................... 4-49
Configuring Command Line Interface............................................................................. 4-50
Configuring Logging.................................................................................................... 4-51
Configuring Diagnostics............................................................................................... 4-52
Viewing Device Discovery............................................................................................ 4-53
Configure Denial of Service Protection........................................................................... 4-54
Logging Out............................................................................................................... 4-55
T
ABLE OF
CONTENTS
6
Appendix A
Federal Communication Commission Interference Statement................................................. A-1
Appendix B
Europe – EU Declaration of Conformity............................................................................... B-1
Appendix C
World Wide Technical Support........................................................................................... C-1
C
ONVENTIONS
VII
!
!
Conventions
The following conventions are used to give the user additional information about specific procedures or content. It is important to pay attention to these conventions as they provide informa­tion to prevent damage to equipment or personal injury.
General Conventions
The following general conventions are used in this document:
CAUTION!
CAUTION SIGNS APPEAR BEFORE THE TEXT IT REFERENCES CAUTION SIGNS APPEAR IN CAPITAL LETTERS TO EMPHASIZE THAT THE MESSAGE CONTAINS VITAL HEALTH AND SAFETY
INFORMATION
WARNING!
Warning information appears before the text it references to emphasize that the content may prevent damage to the device or equipment.
Important:
Indicates information that is important to know for the proper completion of a procedure, choice of an option, or completing a task.
Note:
Indicates additional information that is relevant to the cur­rent process or procedure.
.
N/A:
Example:
Indicates information used to demonstrate or explain an associated concept.
Indicates that a component or a procedure is not applica­ble to this model.
Prerequisite:
Indicates a requirement that must be addressed before
.
proceeding with the current function or procedure.
C
ONVENTIONS
VIII
Typographical Conventions
The following typographical conventions are used in this docu­ment:
Italics
Indicates book titles, directory names, file names, path names, and program/process names.
Constant width
Indicates computer output shown on a computer screen, includ­ing menus, prompts, responses to input, and error messages.
Constant width bold
Indicates commands lines as entered on the computer. Vari­ables contained within user input are shown in angle brackets (< >).
Bold
Indicates keyboard keys that are pressed by the user.
C
OPYRIGHT
IX
Copyright
This user guide and its content is copyright of © EnGenius Net­works, 2014. All rights reserved.
Any redistribution or reproduction in part or in whole in any form is prohibited.
Do not distribute, transmit, store in any form of electronic retrieval system or commercially exploit the content without the expressed written permission of EnGenius Networks.
Product Overview
Chapter 1
P
RODUCT
OVERVIEW
P
ACKAGE
CONTENTS
1-1
1.1 Package Contents
The EnStation2 package contains the following items:
EnStation2 CPE
PoE Injector with Power Adapter
24V PoE Injector
Quick Installation Guide
Mounting Screw Set
Wall Mount Kit
Pole Mount Strap
1-2
P
RODUCT
OVERVIEW
P
RODUCT
OVERVIEW
1.2 Product Overview
Thank you for choosing EnStation2. The EnStation2 is a long range, high performance IEEE 802.11b/g/n network solution that provides Access Point, Client Bridge, WDS, and Client Router functions in a single device.
In addition to providing the latest wireless technology, the EnStation2 supports Power over Ethernet and Power by Adapter capabilities, which allow the device to be installed easily in nearly any indoor or outdoor location. Advanced features include power level control, traffic shaping, and Real time RSSI indication.
Point-to-point and point-to-multipoint wireless connectivity enable data transfers between two or more buildings
Channel bandwidth selection allows the appropriate band­width to be used to reach various distances
RSSI indicator makes it easy to select the best signal for Access Point connections
Power-over-Ethernet capabilities allow for flexible deployment
and great savings
A variety of security features help to protect your data and privacy while you are online. Security features include Wi-Fi Protected Access (WPA PSK/WPA2 PSK), 64/128/156 bit WEP Encryption, and IEEE 802.1x with RADIUS.
Key Features
High-speed data rates up to 300 Mbps make the EnStation2 ideally suited for handling heavy data payloads such as MPEG video streaming
A high output power up to 26 dBm delivers superior range and coverage
Fully interoperability with IEEE 802.11b/IEEE 802.11g/IEEE
802.11n-compliant devices
Multi-operation modes enable users to utilize Enstaion2 for various environments
Four SSIDs let clients access different networks through a single Access Point, and assign different policies and functions for each SSID
WPA2/WPA/ WEP/ IEEE 802.1x support and MAC address filtering ensure secure network connections
PPPoE/PPTP function support make it easy to access the Internet via Internet Service Provider (ISP) service authentication
SNMP Remote Configuration Management helps administrators remotely configure or manage the Access Point
QoS (WMM) support enhances performance and user experiences
1-3
P
RODUCT
OVERVIEW
B
ENEFITS
Benefits
The EnStation2 is the ideal product around which you can build your WLAN. The following list summarizes a few key advantages that WLANs have over wired networks:
Ideal for Hard-to-Wire Environments
There are many scenarios where cables cannot be used to connect networking devices. Historic and older buildings, open areas, and busy streets, for example, make wired LAN installations difficult, expensive, or impossible.
Temporary Workgroups
WLANs make it easy to provide connectivity to temporary work­groups that will later be removed. Examples include parks, athletic arenas, exhibition centers, disaster-recovery shelters, temporary offices, and construction sites.
Ability to Access Real-time Information
With a WLAN, workers who rely on access to real-time information, such as doctors and nurses, point-of-sale employees, mobile workers, and warehouse personnel, can access the data they need and increase productivity, without having to look for a place to plug into the network.
Wireless Extensions to Ethernet Networks
WLANs enable network managers in dynamic environments to minimize overhead caused by moves, extensions to networks, and other changes.
Wired LAN Backup
Network managers can implement WLANs to provide backup for mission-critical applications running on wired networks.
Mobility Within Training/Educational Facilities
Training sites at corporations and students at universities are a few examples where wireless connectivity can be used to facilitate access to information, information exchanges, and learning.
Frequently Changing Environments
WLANs are well suited for showrooms, meeting rooms, retail stores, and manufacturing sites where workplaces are rear­ranged frequently.
1-4
P
RODUCT
OVERVIEW
T
ECHNICAL
SPECIFICATION
Technical Specifications
Wireless Specifications
IEEE802.11b/g/n, 300Mbps 2.400 to 2.484 GHz
Hardware Specifications
Physical Interface: 2 x 10/100Mbps LAN Ports, 1 x Reset Button
Power Supply: Passive PoE, 24V/0.6A Power Adapter
Dimension: D 190mm (7.48") x H 38mm (1.50")
Operation Temperature: -4 °F to 140 °F , -20°C ~ 60°C
Embedded High-Gain Directional Antenna
IP55-Rated Enclosure
Software Specifications
Operation Modes: Client Bridge, Access Point, Client Router, WDS AP, WDS Bridge, WDS Station
Multiple SSIDs, Preferred SSID
PPPoE, PPTP, L2TP Pass-through
WMM, Traffic Shaping
CLI Interface, SNMP v1/v2c/v3
Recovery Page
Port Forwarding/DMZ
Narrow Bandwidth
1-5
P
RODUCT
OVERVIEW
P
RODUCT
INTERFACE
1.3 Product Interface
Figure 1-1: Back Panel View
BACK PANEL VIEW DESCRIPTION
A
LAN Port(PoE)
The PoE interface allows EnStation to be powered using the supplied PoE injector.
To configure EnStation, connect to an
B
LAN Port
Ethernet adapter in a computer for accessing more information.
C
D
Reset Button
Power LED
To reset to factory settings, press the button for more than 10 seconds.
OFF=EnStation is not receiving power ON=EnStation is receiving power.
OFF=EnStation is not connected to the
E
LAN(2) LEDs
network. ON=Enstation is connected to the network
but not sending or receiving data.
BACK PANEL VIEW DESCRIPTION
F
WAN LED
G
Signal Indicator LED
(Access Point or Client Bridge Mode) OFF=EnStation radio is off and the device is not sending or receiving data over the wireless LAN. ON=EnStation radio is on, and the device is not sending or receiving data over the wireless LAN. Blinking=EnStation radio is on, and the device is sending or receiving data over the wireless LAN.
(Client Bridge, WDS Station, and Client Router, Modes)
Installation
Chapter 2
I
NSTALLATION
S
YSTEM
REQUIREMENTS
2-1
2.1 System Requirements
To install the EnStation2, you need the following:
Computer (Windows, Linux, Mac OS X Operating System)
Web Browser (Internet Explorer, FireFox, Chrome, Safari)
Network Interface equipped: (one of the following)
Wired connectivity: Network Interface with an open
RJ-45 Ethernet Port
Wireless Connectivity:
Embedded 802.11n Wi-Fi wireless networking, IEEE
802.11b/g compatible
Wi-Fi Card, USB Wi-Fi Dongle (802.11 b/g/n)
An existing router or access point (AP) with SSID broad­cast
1x CAT5e Ethernet Cable
2-2
I
NSTALLATION
I
NSTALLING THE
DEVICE
!
2.2 Installing the Device
Installing the EnStation2 on a pole or wall optimizes the wire­less access range.
Note:
Only experienced installation professionals who are familiar with local building and safety codes and, wherever applicable, are licensed by the appropriate government regulatory authorities should install the EnStation2.
Pre-Installation Guidelines
Select the optimal location for the equipment using the following guidelines:
The EnStation2 should be mounted on a 1"-4" pole. Its location should enable easy access to the unit and its connectors for installation and testing.
The higher the placement of the antenna, the better the achievable link quality.
The antenna should be installed to provide a direct, or near line of sight with the Base Station antenna. The antenna should be aligned to face the general direction of the Base Station.
Installing the Device
To install the EnStation2, use the following procedure to mount the device on a pole and refer to the figure below:
1.
Remove the bottom cover protecting the RJ-45 connectors.
2.
Insert an Ethernet cable into the RJ-45 port labeled LAN.
3.
Install the bottom cover to protect the RJ-45 connectors.
4.
Remove the power cord and PoE injector from the box and plug the power cord into the DC port of the PoE injector.
CAUTION!
ONLY USE THE POWER ADAPTER SUPPLIED WITH THE
ENS
TATION
DAMAGE THE ENSTATION
2.
USING A DIFFERENT POWER ADAPTER MIGHT
2.
2-3
I
NSTALLATION
W
ALL
MOUNTING THE
DEVICE
5.
Plug the other end of the Ethernet cable into the PoE port
Wall Mounting the Device
of the PoE injector.
A. Plug the dynamic stick into the bracket. B. Combine the sealing nut with the assembled kit and
tighten it. C. Put the mock washer on the dynamic stick. D. Assemble the mounting kit with the CPE. E. Drill the holes 1.04"/26 mm holes and input the mounting
screws.
G. Use the hole of the bracket to aim for the screws on the
wall. Hang and re-adjust the device as necessary.
F. Use the included screws to attach the mounting screws.
Figure 2-1: Installing the EnStation2
6.
Turn over the EnStation2. Then insert the pole mounting strap through the middle hole of the EnStation2. Use a screwdriver to unlock the pole-mounting ring putting it through the EnStation2.
7.
Mount the EnStation2 securely to the pole by locking the strap tightly.
Figure 2-2: Wall Mounting the Device
2-4
I
NSTALLATION
P
OLE
MOUNTING THE
DEVICE
Pole Mounting the Device
A. Plug the dynamic stick into the bracket. B. Combine the sealing nut with the assembled kit.
Tighten to secure together. C. Put the mock washer on the dynamic stick. D. Assemble the mounting kit with the CPE. E. Thread the open end of the pole strap through the two
tabs on the bracket. F. Lock and tighten pole strap to secure bracket to the pole.
Figure 2-3: Pole Mounting the Device
Web Configuration
Chapter 3
W
EB
CONFIGURATION
L
OGGING
IN
3-1
3.1 Logging In
The EnStation2 has a built-in Web Configurator that lets you manage the unit from any location using a Web browser that supports HTTP and has Javascript installed for your convenience.
After configuring the computer for TCP/IP using the procedure appropriate for your operating system, use that computer’s Web browser to log in to the EnStation2 Web Configurator:
1.
Launch your Web browser.
3.
When the login screen appears, enter admin for the user- name in the top field and admin for the password in the bottom field.
2.
In the browser address bar, type 192.168.1.1 and
press the Enter key.
Note:
If you changed the EnStation2 LAN IP address, enter the correct IP address.
4.
You are now ready to use the instructions in the following chap-
Figure 3-2: Windows Security Login Dialog
Click Login to continue or Reset to abort the login.
ters to configure the EnStation2.
Figure 3-1: Web Browser Address Bar
3-2
W
EB
CONFIGURATION
B
EST
PRACTICES
Best Practices
Perform the following procedures regularly to make the EnStation2 more secure and manage the EnStation2 more effectively.
Change the Default Password: Use a password that is
not easy to guess and that contains different characters, such as numbers and letters. The EnStation2 username cannot be changed. For more information, see Configuring Administrator Account.
Backup the Configuration: Be sure you know how to
restore it. Restoring an earlier working configuration can be useful if the EnStation2 becomes unstable or crashes. If you forget your password, you will have to reset the EnStation2 to its factory default settings and lose any customized override settings you configured. However, if you back up an earlier configuration, you will not have to completely reconfigure the EnStation2. You can simply restore your last configuration. For more information, see Configuring Backup/Restore Settings.
Basic Network Settings
Chapter 4
B
ASIC
NETWORK
SETTINGS
S
YSTEM
STATUS
4-1
4.1 System Status
View the summary of the current system status including system (hardware/software version, date/time), wired network (LAN) and wireless network (WLAN) information.
4.1.1 Using Save/Reload
Save and apply the settings shown in the Unsaved changes list, or cancel the unsaved changes and revert to the previous settings that were in effect.
4-2
B
ASIC
NETWORK
SETTINGS
V
IEWING
SYSTEM
INFORMATION
4.1.2 Viewing System Information
Displays status information about the current operating mode:
System Information
Shows the general system information such as operating modes, system up time, firmware version, serial number, kernel version, and application version.
LAN Settings
Shows Local Area Network settings such as the LAN IP address, Subnet Mask, and MAC address.
4-3
B
ASIC
NETWORK
SETTINGS
V
IEWING
SYSTEM
INFORMATION
WAN Settings
Shows Wide Area Network settings such as the MAC address, connection type, connection status, LAN IP Address, Subnet Mask, Primary and Secondary DNS.
Current Wireless Settings
Shows wireless information such as frequency and channel. Since the EnStation2 supports multiple- SSIDs, information about each SSID, such as its ESSID and security settings, are displayed.
4-4
B
ASIC
NETWORK
SETTINGS
V
IEWING
WIRELESS
CLIENT
LIST
4.1.3 Viewing the Wireless Client List
The Client List displays a list of clients associated to the EnStation2, along with the MAC addresses and signal strength for each client. To remove an SSID client from the list, click the button that appears in the Kick and Ban column. Click the Refresh button to update the Client List.
4-5
B
ASIC
NETWORK
SETTINGS
V
IEWING
SYSTEM
LOG
4.1.4 Viewing the System Log
The EnStation2 automatically logs events to internal memory.
Note:
The oldest events are deleted from the log when memory is full.
Click the Refresh button to update the Client List or the Clear button to remove all events.
Loading...
+ 68 hidden pages