EnGenius Technologies ENS500 User Manual

WIRELESS 11N LONG RANGE OUTDOOR AP / CB ENS500EXT User Guide
V1.0
TABLE OF CONTENTS
TABLE OF CONTENTS
Product Overview
Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Software Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
Technical Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Hardware Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Software Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Environment & Mechanical. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Wireless Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
I
TABLE OF CONTENTS
Installation
Pre-Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Installing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Web Configuration
Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Basic Network Settings
Using Save/Reload 4-1 Viewing System Information 4-2 Viewing Wireless Client List 4-4 Viewing System Log 4-5 Viewing Connection Status 4-6 Viewing DHCP Client Table 4-7 Viewing WDS Link List 4-8
II
TABLE OF CONTENTS
Configuring Operation Mode 4-9 Configuring IP Settings 4-10 Configuring Spanning Tree Settings 4-11
Router Setup 4-12
Configuring WAN Settings 4-12
Static IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Dynamic IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Point-to-Point Protocol over Ethernet (PPPoE). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Point-to-Point Tunnelling Protocol (PPTP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Configuring LAN Settings 4-17 Configuring VPN Pass-Through 4-18 Configuring Port Forwarding 4-19 Configuring Demilitarized Zone 4-21
Configuring Wireless LAN 4-22
Configuring Wireless Settings 4-22
Access Point Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Client Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
WDS Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Client Router Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
III
TABLE OF CONTENTS
Configuring Wireless Security 4-28
Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-28
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK). . . . . . . . . . . . . . . . . . . . . . . . . .4-30
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed . . . . . . . . . . . . . . . . . . . . . . .4-31
Wi-Fi Protected Access (WPA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-32
Wi-Fi Protected Access 2 (WPA2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-33
Wi-Fi Protected Access (WPA) Mixed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34
Configuring Wireless MAC Filter 4-35 Configuring WDS Link Settings 4-36 Configuring Wireless Advanced Settings 4-37
Management Setup 4-39
Configuring Administrator Account 4-39 Configuring Management VLAN 4-40 Configuring SNMP 4-41 Configuring Backup/Restore Settings 4-43 Configuring Firmware Upgrade 4-44 Configuring System Time 4-45 Configuring Wi-Fi Schedule 4-46
Add a Schedule Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-46
Schedule Services Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-47
IV
TABLE OF CONTENTS
Configuring Command Line Interface 4-48 Configuring Logging 4-49 Configuring Diagnostics 4-50 Viewing Device Discovery 4-51 Configure Denial of Service Protection 4-52 Logging Out 4-53
Appendix A
Federal Communication Commission Interference Statement A-1
Appendix B
Industry Canada Statement B-1
Appendix C
WorldWide Technical Support C-1
V
CONVENTIONS
N/A:
Prerequisite:
CAUTION!
WARNING!
Important:
Note:
!
!
Example:
Conventions
The following conventions are used to give the user additional information about specific procedures or content. It is important to pay attention to these conventions as they provide informa­tion to prevent damage to equipment or personal injury.
Indicates information used to demonstrate or explain an associated concept.
General Conventions
The following general conventions are used in this document.
CAUTIONS APPEAR BEFORE THE TEXT IT REFERENCES. CAU- TIONS APPEAR IN CAPITAL LETTERS TO EMPHASIZE THAT THE MESSAGE CONTAINS VITAL HEALTH AND SAFETY INFORMATION.
Warning information appears before the text it references to emphasize that the content may prevent damage to the device or equipment.
Indicates information that is important to know for the proper completion of a procedure, choice of an option, or completing a task.
Indicates additional information that is relevant to the cur­rent process or procedure.
Indicates that a component or a procedure is not applica­ble to this model.
Indicates a requirement that must be addressed before proceeding with the current function or procedure.
VI
CONVENTIONS
Typographical Conventions
The following typographical conventions are used in this docu­ment:
Italics
Indicates book titles, directory names, file names, path names, and program/process names.
Constant width
Indicates computer output shown on a computer screen, includ­ing menus, prompts, responses to input, and error messages.
Constant width bold
Indicates commands lines as entered on the computer. Vari­ables contained within user input are shown in angle brackets (< >).
Bold
Indicates keyboard keys that are pressed by the user.
VII
COPYRIGHT
Copyright
This user guide and its content is copyright of © EnGenius Net­works, 2012. All rights reserved.
Any redistribution or reproduction in part or in whole in any form is prohibited.
Do not distribute, transmit, store in any form of electronic retrieval system or commercially exploit the content without the expressed written permission of EnGenius Networks.
VIII
Product Overview
Chapter 1
PRODUCT OVERVIEW PACKAGE CONTENTS
1.1 Package Contents
ENS500EXTQuick Start GuideTechnical Support CardPole Mounting Strap x2Wall Mounting Screw SetPoE Injector (EPE1212) with Power AdapterTwo detachable 5 dBi high gain omni-directional antennas
1-1
great coverage
Transmit high output power for
Loading...
+ 28 hidden pages