TP-Link EAP320, EAP330, Auranet EAP120, Auranet EAP220, Auranet EAP320 User Manual

...
User Guide
AC1200/1900 Wireless Dual Band Gigabit Access Point
EAP320/EAP330
REV1.0.0
1910011564
This subsection does not apply for the geographical area
. Permitted for use SRD for
outdoor applications without restriction on installation
Permitted to use SRD for other purposes for outdoor
applications only when the installation height is not
2. SRD with DSSS and other than FHSS wideband
This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
RF Exposure Information
This device meets the EU requirements (1999/519/EC) on the limitation of exposure of the general public to electromagnetic fields by way of health protection.
The device complies with RF specifications when the device used at 20 cm from your body.
National Restrictions
This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below:
Country Restriction Reason/remark
Belarus Not implemented
Norway Implemented
within a radius of 20 km from the centre of Ny-Ålesund on
Svalbard.
Italy Implemented The public use is subject to general authorisation by the
respective service provider.
Russian
Federation
Limited
implementation
1. SRD with FHSS modulation
1.1. Maximum 2.5 mW e.i.r.p.
1.2. Maximum 100 mW e.i.r.p
height only for purposes of gathering telemetry information
for automated monitoring and resources accounting systems.
exceeding 10 m above the ground surface.
1.3.Maximum 100 mW e.i.r.p. Indoor applications.
modulation
2.1. Maximum mean e.i.r.p. density is 2 mW/MHz. Maximum
100 mW e.i.r.p.
2.2. Maximum mean e.i.r.p. density is 20 mW/MHz. Maximum
100 mW e.i.r.p. It is permitted to use SRD for outdoor
applications only for purposes of gathering telemetry
information for automated monitoring and resources
accounting systems or security systems.
2.3. Maximum mean e.i.r.p. density is 10 mW/MHz. Maximum
100 mW e.i.r.p. Indoor applications.
Ukraine Limited
implementation
e.i.r.p. ≤100 mW with built-in antenna with amplification
factor up to 6 dBi.
ATTENTION: Due to EU law, the country settings must be identical to the country where the device is operating (important due to non-harmonised frequencies in the EU).
Restricted to indoor use.
Продукт сертифіковано згідно с правилами системи УкрСЕПРО на відповідність вимогам нормативних документів та вимогам, що передбачені чинними законодавчими актами України.
Safety Information
When product has power button, the power button is one of the way to shut off the product;
when there is no power button, the only way to completely shut off power is to disconnect the product or the power adapter from the power source.
Don’t disassemble the product, or make repairs yourself. You run the risk of electric shock
and voiding the limited warranty. If you need service, please contact us.
Avoid water and wet locations.
Adapter shall be installed near the equipment and shall be easily accessible.
The plug considered as disconnect device of adapter.
Use only power supplies which are provided by manufacturer and in the original
packing of this product. If you have any questions, please don't hesitate to contact us.
This product can be used in the following countries:
This product bears the selective sorting symbol for Waste electrical and electronic
equipment (WEEE). This means that this product must be handled pursuant to European
2012/19/EU in order to be recycled or dismantled to minimize its impact on the
AT BG BY CA CZ DE DK EE
ES FI FR GB GR HU IE IT
LT LV MT NL NO PL PT RO
RU SE SG SK TR UA US
Explanation of the symbols on the product label
Symbol Explanation
DC voltage
RECYCLING
directive
environment.
User has the choice to give his product to a competent recycling organization or to the
retailer when he buys a new electrical or electronic equipment.
TP-LINK TECHNOLOGIES CO., LTD
DECLARATION OF CONFORMITY
For the following equipment:
Product Description: Wireless Dual Band Gigabit Access Point
Model No.: EAP320/EAP330
Trademark: TP-LINK
We declare under our own responsibility that the above products satisfy all the technical regulations applicable to the product within the scope of Council Directives:
Directives 1999/5/EC, Directives 2006/95/EC, Directives 1999/519/EC, Directives 2011/65/EU
The above product is in conformity with the following standards or other normative documents
EN 300 328 V1.8.1
EN 301 489-1 V1.9.2 & EN 301 489-17 V2.2.1
EN 60950-1: 2006 + A11: 2009 + A1: 2010 + A12: 2011 +A2: 2013
EN 50385: 2002
EN 301 893 V1.7.1
The product carries the CE Mark:
Person responsible for making this declaration:
Yang Hongliang
Product Manager of International Business
Date of issue: 2015-12-18
TP-LINK TECHNOLOGIES CO., LTD.
Building 24 (floors 1, 3, 4, 5), and 28 (floors 1-4) Central Science and Technology
Park, Shennan Rd, Nanshan, Shenzhen, China
About this User Guide
This User Guide is for EAP320 and EAP330. Chapter 4 to Chapter 8 are only suitable for the EAP in Standalone mode. Refer to the EAP Controller User Guide when the EAP is managed by the EAP Controller software.
Convention
Unless otherwise noted, the EAP or the device mentioned in this guide stands for AC1200 Wireless Dual Band Access Point EAP320, AC1900 Wireless Dual Band Access Point EAP330.
CONTENTS
Chapter 1 Introduction ...................................................................................................................................... 3
1.1 Overview of the EAP ........................................................................................................................... 3
1.2 Hardware Overview ............................................................................................................................ 3
1.2.1 LED ................................................................................................................................................... 3
1.2.2 Interface Panel ............................................................................................................................. 4
Chapter 2 Network Topology .......................................................................................................................... 5
Chapter 3 Management Mode ........................................................................................................................ 6
3.1 Standalone Mode ................................................................................................................................. 6
3.2 Managed Mode .................................................................................................................................... 6
3.3 Switch to Standalone Mode ............................................................................................................. 6
Chapter 4 Network .............................................................................................................................................. 7
Chapter 5 Wireless ............................................................................................................................................... 8
5.1 Wireless Settings .................................................................................................................................. 9
5.1.1 Wireless Basic Settings .......................................................................................................... 10
5.1.2 SSIDs ............................................................................................................................................. 11
5.1.3 Wireless Advanced Settings ................................................................................................ 15
5.1.4 Load Balance ............................................................................................................................. 16
5.2 Portal ...................................................................................................................................................... 16
5.2.1 Portal Configuration ............................................................................................................... 17
5.2.2 Free Authentication Policy ................................................................................................... 22
5.3 MAC Filtering ...................................................................................................................................... 24
5.4 Scheduler ............................................................................................................................................. 26
5.5 QoS ......................................................................................................................................................... 30
5.5.1 AP EDCA Parameters .............................................................................................................. 31
5.5.2 Station EDCA Parameters ..................................................................................................... 32
5.6 Rogue AP Detection ......................................................................................................................... 33
5.6.1 Settings ....................................................................................................................................... 34
5.6.2 Detected Rogue AP List ........................................................................................................ 34
5.6.3 Trusted AP List .......................................................................................................................... 35
5.6.4 Download/Backup Trusted AP List .................................................................................... 36
1
Chapter 6 Monitoring ...................................................................................................................................... 37
6.1 AP ............................................................................................................................................................ 37
6.1.1 AP List .......................................................................................................................................... 37
6.2 SSID ........................................................................................................................................................ 42
6.2.1 SSID List ....................................................................................................................................... 42
6.3 Client ...................................................................................................................................................... 43
6.3.1 User List ....................................................................................................................................... 43
6.3.2 Portal Authenticated Guest ................................................................................................. 44
Chapter 7 Management ................................................................................................................................. 46
7.1 System Log .......................................................................................................................................... 46
7.1.1 Log List ........................................................................................................................................ 46
7.1.2 Log Settings ............................................................................................................................... 47
7.1.3 Backup Log ................................................................................................................................ 48
7.2 Web Server .......................................................................................................................................... 49
7.3 Management Access ........................................................................................................................ 49
7.4 Trunk ...................................................................................................................................................... 50
7.5 LED ON/OFF ........................................................................................................................................ 51
7.6 SSH .......................................................................................................................................................... 51
7.7 SNMP ..................................................................................................................................................... 52
Chapter 8 System .............................................................................................................................................. 55
8.1 User Account ....................................................................................................................................... 55
8.2 Time Settings ...................................................................................................................................... 55
8.2.1 Time Settings ............................................................................................................................ 56
8.2.2 Daylight Saving ........................................................................................................................ 57
8.3 Reboot/Reset ...................................................................................................................................... 58
8.4 Backup & Restore .............................................................................................................................. 59
8.5 Firmware Upgrade ............................................................................................................................ 59
Appendix A: Specifications ................................................................................................................................ 61
2
System LED

Chapter 1 Introduction

1.1 Overview of the EAP

EAP series products provide wireless coverage solutions for small-medium business. They can either work independently as standalone APs or be centrally managed by the EAP Controller software, providing a flexible, richly-functional but easily-configured enterprise-grade wireless network for small and medium business.
“Celling lamp” appearance and easily mounting design with chassis make EAP easy to be installed on a wall or ceiling and blend in with most interior decorations.
EAP320/EAP330 can be powered via a PSE* device or the provided power adapter.
With the built-in dual-band antennas module, EAP320/EAP330 operate at both 2.4GHz and 5GHz, and apply 802.11ac standards and MIMO technology, allowing packet transmission at up to 1200Mbps/1900Mbps.
*PSE: Power Sourcing Equipment, a device (switch or hub for instance) that will provide power in a PoE setup.

1.2 Hardware Overview

1.2.1 LED

EAP320 and EAP330 have the same LED status and corresponding indications.
Figure 1-1 Top View of the EAP
3
LED Status Indication
Solid green
The device is working properly.
Flashing red
System errors. RAM, flash, Ethernet, WLAN or firmware
Flashing yellow
Firmware update is in progress. Do not disconnect or Double-flashing red, green, yellow
The device is being reset to its factory default settings.
may be malfunctioning.
power off the device.

1.2.2 Interface Panel

EAP320:
Figure 1-2 Interface Panel of EAP320
EAP330:
Figure 1-3 Interface Panel of EAP330
Kensington Security Slot: Secure the lock (not provided) into the security slot to prevent
the device from being stolen.
RESET: With the device powered on, press and hold the RESET button for about 5 seconds
until the LED flashes red, then release the button. The device will restore to factory default settings.
CONSOLE: This port is used to connect to the serial port of a computer or a terminal to
check and monitor system information of the EAP320.
Note: CLI commands are not available in current software version. We will release a new version supporting CLI commands soon. Please pay close attention to our official website.
ETHERNET/ETH1(PoE):
This port is used to connect to the POE port of the provided PoE adapter for both data transmission and power supply through Ethernet cabling.
POWER: The power port is used to connect the EAP320/EAP330 to an electrical wall outlet
via power adapter. Please only use the provided power adapter.
4

Chapter 2 Network Topology

A typical network topology for the EAP is shown below.
Figure 2-1 Typical Topology
To deploy an EAP in your local network, a DHCP server is required to assign IP addresses to the EAP and clients. Typically, a router acts as the DHCP server. A computer running the EAP Controller software can locate in the same or different subnet with the EAPs.
The EAP can be managed by the EAP Controller software, which is a management software specially designed for the TP-LINK EAP devices on a local wireless network, allowing you to centrally configure and monitor mass EAP devices using a web browser on your PC. For more information about the EAP Controller, please refer to the EAP Controller User Guide from our official website:
http://www.tp-link.com/en/support/download/
5

Chapter 3 Management Mode

AC1200 Wireless Dual Band Access Point EAP320 and AC1900 Wireless Dual Band Access Point EAP330 can either work under the control of the EAP Controller software or work independently as a standalone access point.
When user establishes a large-scale wireless network, the management of every single AP in the network is complex and complicated. With the EAP Controller software, you can centrally manage the mass APs simply in a web browser.
The Standalone mode applies to a relatively small-sized wireless network. EAPs in the Standalone mode cannot be managed centrally by the EAP Controller software.

3.1 Standalone Mode

By default, the EAP works independently as a standalone access point. By entering the IP address of the standalone EAP, you can log in to its web interface and perform configurations.
The factory default IP address configuration of the EAP is DHCP (Dynamic Host Configuration Protocol). Before you access the web interface of the EAP, please make sure the DHCP server works properly. Typically, a router acts as the DHCP server.
Follow the steps below to log in to the web interface of a standalone EAP.
1. Launch a web browser, enter the DHCP address in the address field and press the Enter key.
2. Enter admin (all lowercase) for both username and password.

3.2 Managed Mode

The EAP will become a managed AP once it is adopted via the EAP Controller software. Users can manage the AP via a web browser. Refer to the EAP Controller User Guide to know more about EAP Controller software.

3.3 Switch to Standalone Mode

The web interface of a specific EAP is not available once this EAP is adopted by the EAP Controller. You can Forget the EAP via the EAP Controller to turn it back as a standalone AP. Refer to the EAP Controller User Guide to learn more.
TIPS:
Proceed to the following chapters for information on using the EAP in standalone mode. EAP330 is taken as the example.
6

Chapter 4 Network

On Network page you can configure the IP address of the standalone EAP.
Dynamic/Static:
Fallback IP:
DHCP Fallback IP/IP MASK:
DHCP Fallback Gateway:
Figure 4-1 Network Page
By default, the EAP device obtains an IP address from a DHCP server (typically a router). You can also select Static to configure the IP address manually.
If the EAP fails to get a dynamic IP address from a DHCP server within ten seconds, the fallback IP will work as the IP address of the device. After that, however, the device will keep trying to obtain an IP address from the DHCP server until it succeeds.
Enter the fallback IP/IP mask.
Enter the fallback gateway.
7

Chapter 5 Wireless

Wireless page, consisting of Wireless Settings, Portal, MAC Filtering, Scheduler, QoS and Rogue AP Detection, is shown below.
Figure 5-1 Wireless Page
8

5.1 Wireless Settings

Following is the page of Wireless Settings.
Figure 5-2 Wireless Settings Page
9
ptions include 20MHz, 40MHz and 20/40MHz (this device
can increase wireless throughput. However, users may choose lower
To avoid interference from overlapping channels occupied by other
roceed to the following chapter for information on configuring the wireless network of the EAP.
TIPS:
P The configuring information of 2.4GHz is taken as the example.

5.1.1 Wireless Basic Settings

Figure 5-3 Wireless Basic Settings
2.4GHz Wireless Radio/5GHz Wireless Radio:
Wireless Mode:
Channel Width:
Check the box to enable the Wireless Radio.
Select the protocol standard for the wireless network.
Wireless network created by the EAP is able to operate in the 2.4GHz and 5GHz frequency The EAP supports 802.11b/g/n, 802.11b/g, 802.11n standards in the
2.4GHz mode and 802.11a/n/ac, 802.11n/ac, 802.11ac standards in the 5GHz mode. It is recommended to select 802.11b/g/n (2.4GHz) and 802.11a/n/ac (5GHz), in which way clients supporting any one of these modes can access your wireless network.
Select the channel width of this device.
For 2.4Ghz, the o automatically selects 20MHz or 40MHz, and 20MHz will be used if 40MHz is not available), and for 5Ghz, include 20MHz, 40MHz, 80MHz and 20/40/80MHz. According to IEEE 802.11 standard, using a channel width of 40MHz or 80MHz
bandwidth due to the following reasons:
1. To increase the available number of channels within the limited total bandwidth.
2. devices in the environment.
3. Lower bandwidth can concentrate higher transmit power, increasing stability of wireless links over long distances.
10
elect the channel used by this device to improve wireless performance.
n needed may cause interference to
neighborhood. Also it consumes more power and will reduce longevity of the
to achieve the best
Channel:
Tx power:
S 1/2412MHz means the channel is 1 and the frequency is 2412MHz.
Enter the transmit power value. By default, the value is 20.
If the maximum transmit power is set to be larger than local regulation allows, the maximum Tx power regulated will be applied in actual situation.
NOTE: In most cases, it is unnecessary to select maximum transmit power.
Selecting larger transmit power tha
device. Select a certain transmit power is enough performance.

5.1.2 SSIDs

SSIDs can work together with switches supporting 802.1Q VLAN. The EAP can build up to eight virtual wireless networks per radio for users to access. At the same time, it adds different VLAN tags to the clients which connect to the corresponding wireless network. It supports maximum 8 VLANs per radio. The clients in different VLAN cannot directly communicate with each other.
Clients connected to the device via cable do not belong to any VLAN. Thus wired client can communicate with all the wireless clients despite the VLAN settings.
Click in the Modify column, the following content will be shown.
Figure 5-4 SSIDs
SSID Name:
Wireless VLAN ID:
Click to add up to 8 wireless networks per radio.
Enter up to 32 characters as the SSID name.
Set a VLAN ID (ranges from 1 to 4094) for the wireless network. Wireless networks with the same VLAN ID are grouped to a VLAN.
11
, AP will broadcast its SSID to hosts in the surrounding
his device
for the clients who want to access the
After enabling SSID Isolation, the devices connected in the same SSID cannot
SSID Broadcast:
Security Mode:
Portal:
SSID Isolation:
Modify:
Enable this function environment, as thus hosts can find the wireless network identified by this SSID. If SSID Broadcast is not enabled, hosts must enter the AP’s SSID manually to connect to this AP.
Select the security mode of the wireless network. For the security of wireless network, you are suggested to encrypt your wireless network. T provides three security modes: WPA-Enterprise, WPA-PSK (WPA Pre-Shared Key) and WEP (Wired Equivalent Privacy). WPA-PSK is recommended. Settings vary in different security modes as the details are in the following introduction. Select None and the hosts can access the wireless network without password.
Portal provides authentication service wireless local area network. For more information, refer to 5.2 Portal. After Portal is enabled, the configurations in 5.2 Portal will be applied.
communicate with each other.
Click to open the page to edit the parameters of SSID.
Click to delete the SSID.
Following is the detailed introduction of security mode: WEP, WPA-Enterprise and WPA-PSK.
WEP
WEP (Wired Equivalent Privacy), based on the IEEE 802.11 standard, is less safe than WPA­Enterprise or WPA-PSK.
NOTE:
WEP is not supported in 802.11n mode. If WEP is applied in 802.11n mode, the clients may not be able to access the wireless network. If WEP is applied in 11b/g/n mode (in the 2.4GHz frequency band) or 11a/n (in the 5GHz frequency band), the device may work at a low transmission rate.
Figure 5-5 Security Mode_WEP
Type:
Select the authentication type for WEP.
Auto: The default setting is Auto, which can select Open System or Shared Key
automatically based on the wireless station's capability and request.
12
Open System: After you select Open System, clients can pass the
the authentication, or it cannot associate with the wireless network or
Hexadecimal format stands for any combination of
authentication and associate with the wireless network without password. However, correct password is necessary for data transmission.
Shared Key: After you select Shared Key, clients has to input password to pass
transmit data.
Key Selected:
Wep Key Format:
You can configure four keys in advance and select one as the present valid key.
Select ASCII or Hexadecimal as the WEP key format.
ASCII: ASCII format stands for any combination of keyboard characters in the
specified length.
Hexadecimal:
hexadecimal digits (0-9, a-f, A-F) in the specified length.
Key Type:
Select the WEP key length (64-bit, or 128-bit) for encryption.
64-bit: You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F
without null key) or 5 ASCII characters.
128-bit: You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-
F without null key) or 13 ASCII characters.
Key Value:
WPA-Enterprise
Enter the key value.
Based on RADIUS server, WPA -Enterprise can generate different passwords for different users and it is much safer than WPA-PSK. However, it costs much to maintain and is more suitable for enterprise users. At present, WPA-Enterprise has two versions: WPA-PSK and WPA2-PSK.
Figure 5-6 Security Mode_WPA-Enterprise
Version:
Select one of the following versions:
Auto: Select WPA-PSK or WPA2-PSK automatically based on the client
device's capability and request.
WPA-PSK: Pre-shared key of WPA.
WPA2-PSK: Pre-shared key of WPA2.
13
is Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES
not be able to access the wireless network of the EAP. If TKIP is applied in 11b/g/n
Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting
(Advanced Encryption Standard) automatically based on the client device's capability and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode. It is recommended to select AES as the encryption type.
RADIUS Server
Enter the IP address/port of the RADIUS server.
IP/Port:
RADIUS
Enter the shared secret of RADIUS server to access the RADIUS server.
Password:
Group Key Update period:
Specify the group key update period in seconds. The value can be either 0 or 30-8640000 seconds.
NOTE:
Encryption type TKIP is not supported in 802.11n mode. If TKIP is applied in 802.11n mode, the clients may mode (in the 2.4GHz frequency band) or 11a/n (in the 5GHz frequency band), the device may work at a low transmission rate.
WPA-PSK
Based on pre-shared key, security mode WPA-PSK is characterized by high security and simple configuration, which suits for common households and small business. WPA-PSK has two versions: WPA-PSK and WPA2-PSK.
Figure 5-7 Security Mode_WPA-PSK
Version:
Auto: Select WPA or WPA2 automatically based on the wireless station's
capability and request.
WPA-PSK: Pre-shared key of WPA.
WPA2-PSK: Pre-shared key of WPA2.
14
automatically based on the wireless station's capability
with ASCII or Hexadecimal
For ASCII, the length should be between 8 and 63 characters with
Interval value determines the time
, the access point will release the buffered
Encryption: Select the encryption type, including Auto, TKIP, and AES. The default setting is
Auto, which can select TKIP (Temporal Key Integrity Protocol) or AES (Advanced Encryption Standard) and request. AES is more secure than TKIP and TKIP is not supported in 802.11n mode. It is recommended to select AES as the encryption type.
Wireless Password:
Group Key Update Period:
Configure the WPA-PSK/WPA2-PSK password characters. combination of numbers, letters (case-sensitive) and common punctuations. For Hexadecimal, the length should be 64 characters (case-insensitive, 0-9, a-f, A-F).
Specify the group key update period in seconds. The value can be either 0 or at least 30. 0 means no update.

5.1.3 Wireless Advanced Settings

Figure 5-8 Wireless Advanced Settings
Beacon Interval:
DTIM Period:
RTS Threshold:
Beacons are transmitted periodically by the device to announce the presence of a wireless network for the clients. Beacon interval of the beacons sent by the device. You can specify a value from 40 to 100. The default value is 100 milliseconds.
This value indicates the number of beacon intervals between successive Delivery Traffic Indication Messages (DTIMs) and this number is included in each Beacon frame. A DTIM is contained in Beacon frames to indicate whether the access point has buffered broadcast and/or multicast data for the client devices. Following a Beacon frame containing a DTIM broadcast and/or multicast data, if any exists. You can specify the value between 1-255 Beacon Intervals. The default value is 1, indicating the DTIM Period is the same as Beacon Interval. An excessive DTIM period may reduce the performance of multicast applications. It is recommended to keep it by default.
When the RTS threshold is activated, all the stations and APs follow the Request to Send (RTS) protocol. When the station is to send packets, it will send a RTS to AP to inform the AP that it will send data. After receiving the RTS, the AP notices other stations in the same wireless network to delay their transmitting of data. At the same time, the AP inform the requesting station to send data. The value range
15
Loading...
+ 46 hidden pages