Tp-Link eap110 Инструкция по эксплуатации онлайн
Содержание
- Eap110 eap120 eap220 1
- User guide 1
- Wireless n access point 1
- Fcc statement 2
- Ce mark warning 3
- Fcc rf radiation exposure statement 3
- Fcc statement 3
- 5250 mhz 4
- Country restriction reason remark 4
- National restriction 4
- Only for eap220 4
- The eu directive 1999 5 ec without any limitation except for the countries mentioned below 4
- This device is intended for home and office use in all eu countries and other countries following 4
- Ic statement 5
- Ncc notice bsmi notice 5
- Safety information 5
- 安全諮詢及注意事項 5
- 注意 5
- About this user guide 7
- Convention 7
- Contents 8
- Chapter 1 introduction 10
- Hardware overview 10
- Overview of the eap 10
- Eap110 11
- Interface panel 11
- Eap120 eap220 12
- Mounting bracket 13
- Passive poe adapter 13
- Chapter 2 network topology 14
- Chapter 3 management mode 15
- Managed mode 15
- Standalone mode 15
- Switch to standalone mode 15
- Chapter 4 network 17
- On network page you can configure the ip address of the standalone eap 17
- Chapter 5 wireless 18
- Wireless settings 19
- Wireless basic settings 20
- Click in the modify column the following content will be shown 21
- Clients connected to the device via cable do not belong to any vlan thus wired client can 21
- Communicate with all the wireless clients despite the vlan settings 21
- Ssids can work together with switches supporting 802 q vlan the eap can build up to eight 21
- Tags to the clients which connect to the corresponding wireless network it supports maximum 21
- Virtual wireless networks per radio for users to access at the same time it adds different vlan 21
- Vlans per radio the clients in different vlan cannot directly communicate with each other 21
- Enterprise or wpa psk 22
- Following is the detailed introduction of security mode wep wpa enterprise and wpa psk 22
- Wep wired equivalent privacy based on the ieee 802 1 standard is less safe than wpa 22
- Based on radius server wpa enterprise can generate different passwords for different users and 23
- Enterprise users at present wpa enterprise has two versions wpa psk and wpa2 psk 23
- It is much safer than wpa psk however it costs much to maintain and is more suitable for 23
- Wpa enterprise 23
- Based on pre shared key security mode wpa psk is characterized by high security and simple 24
- Configuration which suits for common households and small business wpa psk has two 24
- Versions wpa psk and wpa2 psk 24
- Wpa psk 24
- Wireless advanced settings 25
- Accessed for free by the clients while some specific resources can only be accessed by authorized 26
- Authentication policy according to your need 26
- By restricting the maximum number of clients accessing the eaps load balance helps to achieve 26
- Clients who want to access the wireless local network portal is also called web authentication 26
- Load balance 26
- Network resources can be classified into different types for different users part of them can be 26
- Portal 26
- Portal authentication enhances the network security by providing authentication service to the 26
- Rational use of network resources 26
- The newly authenticated client will be redirected to please refer to portal configuration or free 26
- The users have to log in a web page to establish verification 26
- Users what s more you can customize the authentication login page and specify a url which 26
- Portal configuration 27
- External radius server users are required to enter the preset user name and password which are saved in the database of the radius server the radius server acts as the authentication server which allows you to set different user name and password for different users 28
- Local password users are required to enter the preset user name and password which are saved in the eap 28
- No authentication 28
- Refer to the following content to configure portal based on actual network situations 28
- External radius server 30
- Local password 30
- Local web portal 31
- External web portal 32
- Free authentication policy 32
- Free authentication policy allows clients to access network resources for free on the lower part 32
- Of the portal page you can configure and view free authentication policies 32
- Please refer to no authentication to configure authentication timeout redirect and redirect 32
- Click to add a new authentication policy and configure its parameters 33
- Mac filtering 34
- Settings 35
- Station mac group 35
- Automates the enabling or disabling of the radio 36
- Click in modify column to edit the mac group name or mac address click to delete the 36
- Mac filtering association 36
- Mac group or group member 36
- Scheduler 36
- Scheduler allows you to configure rules with specific time interval for radios to operate which 36
- Click two tables will be shown 37
- Follow the steps below to add rules 37
- Scheduler profile configuration 37
- Settings 37
- Step 1 37
- Associated with ap 39
- Associated with ssid 39
- Scheduler association 39
- This zone will display different contents based on your selection of association mode in settings 39
- Changed changing these values affects the qos provided 40
- In normal use the default values for the eap device and station edca should not need to be 40
- The eap supports quality of service qos to prioritize voice and video traffic over other traffic 40
- Ap edca parameters 41
- Ap enhanced distributed channel access edca parameters affect traffic flowing from the eap 41
- Device to the client station 41
- Station edca parameters 42
- Station edca parameters affect traffic flowing from the client station to the eap device 42
- Rogue ap detection 43
- Detected rogue ap is unknown you can click known in action column to move the ap to the 44
- Detected rogue ap list 44
- Information about the detected rogue aps is displayed in the list by default the status of the 44
- Settings 44
- Trusted ap list 44
- Download backup trusted ap list 45
- From a text file the ap whose mac address is in the trusted ap list will not be detected as a 45
- Information about the trusted aps is displayed in the list 45
- Trusted ap list 45
- You can also backup a list and save it in your pc 45
- You can import a list of trusted aps from a saved list which is acquired from another ap or created 45
- Ap list 47
- Chapter 6 monitoring 47
- Device information 48
- Lan information 49
- Wireless settings 49
- Click lan traffic and you can monitor the data transmission status of the lan port 50
- Client 50
- Lan traffic 50
- Click radio traffic and you can monitor the data transmission status of the wireless network 51
- Radio traffic 51
- In ssid list you can monitor the related parameters of the wireless network 52
- Ssid list 52
- Client 53
- From user list you can monitor the status of all the clients connected to the eap including those 53
- User list 53
- Who are authenticated 53
- Authentication 54
- Portal authenticated guest 54
- The portal authenticated guest displays information about clients that have set up valid 54
- Chapter 7 management 56
- Log list 56
- System log 56
- Enable auto mail 57
- Log settings 57
- By default nvram is disabled check the box to enable nvram system logs will be saved after 58
- Enable nvram 58
- Enable server 58
- Power supply is cut 58
- System logs can also be sent to a server after auto mail feature is enabled the following content 58
- Web server 58
- Will be shown 58
- You can log in web management interface thereby manage and maintain the device 58
- Address of the current host will be added to mac address list 59
- Are allowed to log in to the web management page of the eap click add pc s mac and the mac 59
- Following is the page of web server 59
- Management access 59
- Management access control allows you to configure up to four mac addresses of the hosts that 59
- Following is the page of led on off by default the led is on 60
- Following is the page of management access 60
- Led on off 60
- Ssh connection on the ssh client software 60
- This device supports the ssh server function that allows users to login and manage it through 60
- Following is the page of snmp 62
- From snmp manager 62
- Once the device has become an snmp agent it is able to receive and process request messages 62
- Chapter 8 system 64
- Time settings 64
- User account 64
- Time settings 65
- Daylight saving 66
- Predefined mode 66
- Click reboot to restart the device click reset to restore the device to factory default settings 67
- Date mode 67
- Reboot reset 67
- Recurring mode 67
- Backup restore 68
- Firmware upgrade 68
- Appendix a specifications 70
Похожие устройства
- Tp-Link eap120 Инструкция по эксплуатации
- Tenda f300 Инструкция по эксплуатации
- Tenda w1800r Инструкция по эксплуатации
- Tenda n301 Инструкция по эксплуатации
- Tenda n150 Инструкция по эксплуатации
- Tetra tec aps 300 белый Инструкция по эксплуатации
- Tetra tec aps 150 белый Инструкция по эксплуатации
- Tetra tec aps 100 белый Инструкция по эксплуатации
- Tetra tec aps 50 белый Инструкция по эксплуатации
- Tetra gc 50, 50-400л Инструкция по эксплуатации
- Tetra gc 40, 50-200л Инструкция по эксплуатации
- Tetra gc 30, 20-60л Инструкция по эксплуатации
- Tetra tec aps 300 Инструкция по эксплуатации
- Tetra tec aps 150 Инструкция по эксплуатации
- Tetra tec aps 100 Инструкция по эксплуатации
- Tetra tec aps 50 Инструкция по эксплуатации
- Tetra tec ht 200w Инструкция по эксплуатации
- Tetra tec ht 150w Инструкция по эксплуатации
- Tetra tec ht 100w Инструкция по эксплуатации
- Tetra tec ht 75w Инструкция по эксплуатации