H3C WA2620X-AGNP, WA2610E-AGN, WA2610i-GN, WA2612-AGN, WA2620-AGN, WA2620E-AGN, WA2620i-AGN, WA3610i-GN, WA3620i-AGN, WA3628i-AGN Web-Based Configuration Manual

  • Hello! I am an AI chatbot trained to assist you with the H3C WA2620X-AGNP Web-Based Configuration Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
H3C WA Series Access Points
Web-Based Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document version: 6W106-20130802
Copyright © 2003-2013, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H
3
Care, , IRF, NetPilot, Netflow,
SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of
Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C WA Series Access Points Web-based Configuration Guide describes the web functions of the
WA series, such as quick start, Web overview, wireless service configuration, security and authentication
related configurations, QoS configuration, and advanced settings.
NOTE:
• The grayed out functions or parameters on the web interface indicate that they are not supported or
cannot be modified.
• The displayed web pages may vary depending on your AP model.
• The terms
AP
and
fat AP
in this document can refer to wireless bridges with fat AP functions.
This preface includes:
• Audience
• Conventions
• About the H3C WA series access points documentation set
• Obtaining documentation
• Technical support
• Documentation feedback
Audience
This documentation is intended for:
• Network planners
• Field technical support and servicing engineers
• Network administrators working with the WA series
Conventions
This section describes the conventions used in this documentation set.
GUI conventions
Convention Descri
p
tion
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Descri
p
tion
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Represents an access point.
Represents omnidirectional signals.
About the H3C WA series access points
documentation set
The H3C WA series access points documentation set includes:
Cate
g
or
y
Documents Pur
p
oses
Product
description and
specifications
Marketing brochures Describe product specifications and benefits.
Hardware
specifications
and installation
Compliance and safety
manual
Provides regulatory information and the safety instructions
that must be followed during installation.
Quick start
Guides you through initial installation and setup procedures
to help you quickly set up and use your AP with the
minimum configuration.
Installation guide
Guides you through hardware specifications and
installation methods to help you install your AP.
Software
configuration
Getting started guide
Guides you through the main functions of your AP, and
describes how to install and log in to your AP, perform
basic configurations, maintain software, and troubleshoot
Cate
g
or
y
Documents Pur
p
oses
your AP.
Configuration guides Describe software features and configuration procedures.
Command references Provide a quick reference to all available commands.
Operations and
maintenance
Release notes
Provide information about the product release, including
the version history, hardware and software compatibility
matrix, version upgrade information, technical support
information, and software upgrading.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web
at http://www.h3c.com
.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]
—Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions]
—Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]
—Provides the documentation released with the
software version.
Technical support
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
i
Contents
About the WA series access points Web-based configuration guide ····································································· 1
Applicable models and software versions ······················································································································ 1
Feature matrix ···································································································································································· 1
Quick Start ···································································································································································· 3
Quick Start wizard home page ······································································································································· 3
Basic configuration ··························································································································································· 3
Admin configuration ························································································································································· 4
IP configuration ································································································································································· 5
Wireless configuration ······················································································································································ 6
RADIUS configuration ······················································································································································· 7
Encryption configuration ·················································································································································· 9
Radio configuration ······················································································································································· 11
Configuration summary ················································································································································· 12
Quick Start configuration examples ····························································································································· 12
Simple text authentication configuration example ····························································································· 12
WEP (Open-System) encryption configuration example ··················································································· 14
WPA2-PSK authentication configuration example ····························································································· 17
Summary ····································································································································································· 20
Device information ························································································································································· 20
Device info ····························································································································································· 21
System resource state ············································································································································ 21
Device interface information ································································································································ 21
Recent system logs ················································································································································· 22
Displaying WLAN service ············································································································································· 22
Displaying detailed information of WLAN service ···························································································· 22
Displaying statistics of WLAN service ················································································································· 25
Displaying connection history information of WLAN service ··········································································· 25
Displaying radio ····························································································································································· 26
Displaying WLAN services bound to a radio ···································································································· 26
Displaying detailed radio information ················································································································ 26
Displaying WDS ····························································································································································· 29
Displaying client ····························································································································································· 30
Displaying client detailed information ················································································································ 30
Displaying client statistics ····································································································································· 32
Displaying RF ping information ··························································································································· 34
Device basic information configuration ···················································································································· 35
Configuring device basic information ·························································································································· 35
Configuring system name ····································································································································· 35
Configuring web idle timeout period ·················································································································· 35
Device maintenance configuration ··························································································································· 37
Software upgrade ·························································································································································· 37
Reboot ············································································································································································· 38
Diagnostic information ·················································································································································· 39
System time configuration ·········································································································································· 41
Displaying the system time ············································································································································ 41
Configuring the system time ·········································································································································· 42
ii
Log management configuration ································································································································ 43
Displaying syslog ·················································································································································· 43
Setting the log host························································································································································· 44
Setting buffer capacity and refresh interval ················································································································ 45
Configuration management ······································································································································· 47
Backing up configuration ·············································································································································· 47
Restoring configuration ·················································································································································· 47
Saving configuration ······················································································································································ 48
Initializing configuration ················································································································································ 49
File management configuration ································································································································· 50
Displaying file list ··························································································································································· 50
Downloading a file ························································································································································ 50
Uploading a file ····························································································································································· 51
Removing a file ······························································································································································· 51
Specifying the main boot file ········································································································································ 51
Interface management configuration ························································································································ 52
Displaying interface information and statistics ··········································································································· 52
Creating an interface ····················································································································································· 54
Modifying a Layer 2 interface ······································································································································ 56
Modifying a Layer 3 interface ······································································································································ 59
Interface management configuration example ··········································································································· 61
TR-069 configuration ················································································································································· 63
TR-069 configuration ····················································································································································· 63
Configuration guidelines ··············································································································································· 65
User management configuration ······························································································································· 66
Creating a user ······························································································································································· 66
Setting the super password ··········································································································································· 67
Switching the user access level to the management level ························································································· 68
SNMP configuration ·················································································································································· 69
SNMP overview······························································································································································ 69
Configuration task list ···················································································································································· 69
Enabling SNMP ······························································································································································ 71
Configuring an SNMP view ·········································································································································· 72
Creating an SNMP view······································································································································· 72
Adding rules to an SNMP view ··························································································································· 74
Configuring an SNMP community ······························································································································· 74
Configuring an SNMP group ········································································································································ 75
Configuring an SNMP user ··········································································································································· 77
Configuring SNMP trap function ·································································································································· 79
Displaying SNMP packet statistics ······························································································································· 81
SNMP configuration example ······································································································································ 81
Loopback configuration ············································································································································· 87
Loopback operation ······················································································································································· 87
Configuration guidelines ··············································································································································· 88
MAC address configuration ······································································································································ 89
Configuring a MAC address entry ······························································································································· 90
Setting the aging time of MAC address entries ·········································································································· 91
MAC address configuration example ·························································································································· 92
iii
VLAN configuration ··················································································································································· 94
Overview ········································································································································································· 94
Recommended configuration procedure······················································································································ 94
Creating a VLAN···························································································································································· 95
Modifying a VLAN ························································································································································· 95
Modifying a port ···························································································································································· 96
VLAN configuration example ········································································································································ 98
Configuration guidelines ··············································································································································· 99
ARP configuration ··················································································································································· 101
Overview ······································································································································································· 101
Introduction to ARP ·············································································································································· 101
Introduction to gratuitous ARP ···························································································································· 101
Displaying ARP entries ················································································································································· 101
Creating a static ARP entry ········································································································································· 102
Removing ARP entries ·················································································································································· 103
Configuring gratuitous ARP ········································································································································· 103
Static ARP configuration example ······························································································································ 104
IGMP snooping configuration ································································································································ 105
Recommended configuration procedure···················································································································· 106
Enabling IGMP snooping globally ····························································································································· 106
Configuring IGMP snooping on a VLAN ··················································································································· 107
Configuring IGMP snooping on a port ······················································································································ 108
Displaying IGMP snooping multicast entry information ··························································································· 110
IGMP snooping configuration example ····················································································································· 111
IPv4 and IPv6 routing configuration ······················································································································ 114
Overview ······································································································································································· 114
Displaying the IPv4 active route table ······················································································································· 114
Creating an IPv4 static route ······································································································································· 115
Displaying the IPv6 active route table ······················································································································· 117
Creating an IPv6 static route ······································································································································· 118
IPv4 static route configuration example ····················································································································· 119
IPv6 static route configuration example ····················································································································· 121
Configuration guidelines ············································································································································· 123
DHCP overview ······················································································································································· 124
Recommended configuration procedure···················································································································· 124
Enabling DHCP ···························································································································································· 125
Creating a static address pool for the DHCP server ································································································ 125
Creating a dynamic address pool for the DHCP server ·························································································· 127
Enabling the DHCP server on an interface ················································································································ 129
Display the information of assigned IP addresses ···································································································· 129
DHCP server configuration example ·························································································································· 130
DNS configuration ·················································································································································· 133
Overview ······································································································································································· 133
Static domain name resolution ··························································································································· 133
Dynamic domain name resolution ····················································································································· 133
Recommended configuration procedure···················································································································· 133
Configuring static name resolution table ·········································································································· 133
Configuring dynamic domain name resolution ································································································ 134
Configuring static name resolution table ··················································································································· 134
Configuring dynamic domain name resolution ········································································································ 135
Adding a DNS server address ··································································································································· 135
iv
Adding a domain name suffix ···································································································································· 136
Clearing dynamic DNS cache ···································································································································· 136
DNS configuration example ······································································································································· 136
PPPoE ······································································································································································· 141
Overview ······································································································································································· 141
Configuring PPPoE client ············································································································································· 141
Displaying PPPoE client session statistics ··················································································································· 143
Displaying PPPoE client session summary information ····························································································· 144
PPPoE client configuration example ··························································································································· 145
Configuration guidelines ············································································································································· 147
Service management ·············································································································································· 148
Overview ······································································································································································· 148
Configuring service management ······························································································································ 149
Diagnostic tools ······················································································································································· 151
Overview ······································································································································································· 151
Ping ······································································································································································· 151
Trace route ··························································································································································· 151
Ping operation ······························································································································································ 152
IPv4 ping operation ············································································································································· 152
IPv6 ping operation ············································································································································· 153
Trace route operation ·················································································································································· 155
Web overview ························································································································································· 157
Logging in to the web interface ·································································································································· 157
Logging out of the web interface ································································································································ 158
Introduction to the web interface ································································································································ 158
Web user level ····························································································································································· 159
Introduction to the web-based NM functions ············································································································ 159
Common web interface elements ······························································································································· 167
Configuration guidelines ············································································································································· 171
Troubleshooting web browser ···································································································································· 172
Failure to access the device through the web interface ·················································································· 172
Radio configuration ················································································································································ 175
Configuring radio ························································································································································ 175
Configuring data transmit rates ·································································································································· 179
Configuring 802.11a/802.11b/802.11g rates ···························································································· 179
Configuring 802.11n MCS ································································································································ 180
Configuring calibration ··············································································································································· 183
Channel calibration information ························································································································ 183
Parameter setting ················································································································································· 184
Configuring channel scanning ···································································································································· 186
Configuring channel scanning parameters ······································································································ 186
Configuring AP operating mode ······················································································································· 188
Configuring channel detection ··································································································································· 190
Displaying detection record ······························································································································· 190
Configuring the detection record aging time ··································································································· 191
Displaying history record···································································································································· 191
Antenna ································································································································································ 192
AAA configuration ·················································································································································· 193
AAA overview ······························································································································································ 193
Configuring AAA ························································································································································· 194
Configuration prerequisites ································································································································ 194
v
Recommended configuration procedure ··········································································································· 194
Configuring an ISP domain ································································································································ 194
Configuring authentication methods for the domain ······················································································· 195
Configuring authorization methods for the domain ························································································ 197
Configuring accounting methods for the domain ···························································································· 199
AAA configuration example ······································································································································· 200
RADIUS configuration ············································································································································· 204
RADIUS overview ························································································································································· 204
Configuring a RADIUS scheme ··································································································································· 204
RADIUS configuration examples································································································································· 210
Configuration guidelines ············································································································································· 217
HWTACACS configuration ···································································································································· 219
HWTACACS overview ················································································································································ 219
Configuring HWTACACS ··········································································································································· 219
Recommended configuration procedure ··········································································································· 219
Creating HWTACACS scheme system ·············································································································· 220
Configuring HWTACACS servers ····················································································································· 220
Configuring HWTACACS parameters ·············································································································· 221
HWTACACS configuration example ························································································································· 224
Configuration guidelines ············································································································································· 229
User configuration ··················································································································································· 231
User overview ······························································································································································· 231
Configuring a local user ·············································································································································· 231
Configuring a user group ············································································································································ 234
Configuring a guest ····················································································································································· 235
Procedure for a management level administrator to configure a guest ························································· 235
Procedure for a guest administrator to configure a guest ··············································································· 237
Certificate management ········································································································································· 238
PKI overview ································································································································································· 238
Configuring PKI ···························································································································································· 238
Recommended configuration procedure for manual request ·········································································· 239
Recommended configuration procedure for automatic request ······································································ 240
Creating a PKI entity ··········································································································································· 241
Creating a PKI domain ······································································································································· 242
Generating an RSA key pair ······························································································································ 245
Destroying the RSA key pair ······························································································································ 246
Retrieving and displaying a certificate ············································································································· 246
Requesting a local certificate ····························································································································· 247
Retrieving and displaying a CRL ························································································································ 248
PKI configuration example ·········································································································································· 249
Configuration guidelines ············································································································································· 254
Wireless service ······················································································································································ 255
Access service ······························································································································································ 255
Terminology ························································································································································· 255
Wireless client access ········································································································································· 255
WLAN data security ··········································································································································· 259
Client access authentication ······························································································································· 260
802.11n ······························································································································································· 262
Introduction to WDS ···················································································································································· 262
Advantages of WDS ··········································································································································· 262
WDS network topologies ··································································································································· 262
Repeater mode overview ············································································································································· 264
vi
Workgroup bridge mode overview ··························································································································· 264
Configuring wireless service ·································································································································· 266
Configuring access service ········································································································································· 266
Recommended configuration procedure ··········································································································· 266
Creating a wireless service ································································································································ 266
Configuring clear type wireless service ············································································································ 267
Configuring crypto type wireless service ·········································································································· 276
Security parameter dependencies ····················································································································· 283
Binding an AP radio to a wireless service ········································································································ 284
Enabling a wireless service ································································································································ 284
Enabling a radio ················································································································································· 284
Configuring WDS service ··········································································································································· 285
Configuring WDS service ··································································································································· 285
Configuring a neighbor MAC address ············································································································· 286
Configuring advanced WDS settings ················································································································ 286
Configuring global WDS ···································································································································· 289
Configuring a working channel ························································································································· 289
Enabling WDS service ········································································································································ 290
Configuring the repeater service ································································································································ 290
Configuring the workgroup bridge ···························································································································· 291
Enabling the client mode ···································································································································· 291
Connecting the wireless service ························································································································· 292
Displaying statistics ············································································································································· 293
Wireless access configuration examples ··················································································································· 294
Wireless service configuration example ··········································································································· 294
Access service-based VLAN configuration example ························································································ 296
WPA-PSK authentication configuration example ····························································································· 298
Local MAC authentication configuration example··························································································· 303
Remote MAC authentication configuration example ······················································································· 307
Remote 802.1X authentication configuration example ··················································································· 316
Dynamic WEP encryption-802.1X authentication configuration example ···················································· 328
802.11n configuration example ······················································································································· 334
WDS configuration examples ····································································································································· 337
WDS configuration example ······························································································································ 337
WDS point-to-multipoint configuration example ······························································································ 340
Repeater mode configuration example ······················································································································ 341
Workgroup bridge mode configuration example ···································································································· 345
Configuring ACL and QoS ····································································································································· 349
Overview ······································································································································································· 349
Introduction to ACL ·············································································································································· 349
Introduction to QoS ············································································································································· 349
Configuring an ACL ····················································································································································· 350
Recommended configuration procedures ········································································································· 350
Adding a time range ··········································································································································· 351
Adding an IPv4 ACL ··········································································································································· 352
Configuring a rule for a basic IPv4 ACL ··········································································································· 353
Configuring a rule for an advanced IPv4 ACL ································································································· 355
Configuring a rule for an Ethernet frame header ACL ···················································································· 358
Adding an IPv6 ACL ··········································································································································· 360
Configuring a rule for a basic IPv6 ACL ··········································································································· 361
Configuring a rule for an advanced IPv6 ACL ································································································· 363
Configuring priority mapping ····································································································································· 365
Overview ······························································································································································ 365
vii
Configuration procedure ···································································································································· 365
Configuring a QoS policy ··········································································································································· 367
Recommended QoS policy configuration procedure ······················································································ 367
Adding a class ····················································································································································· 368
Configuring classification rules ·························································································································· 369
Adding a traffic behavior ··································································································································· 372
Configuring actions for a traffic behavior ········································································································ 373
Adding a policy ··················································································································································· 376
Configuring classifier-behavior associations for the policy ············································································ 376
Applying a policy to a port ································································································································ 377
Applying a QoS policy to a wireless service ··································································································· 378
ACL/QoS configuration example ······························································································································ 380
Network requirements ········································································································································· 380
Configuration procedure ···································································································································· 380
Verifying the configuration ································································································································· 389
Configuration guidelines ············································································································································· 389
Configuring wireless QoS ······································································································································ 390
Overview ······································································································································································· 390
Terminology ························································································································································· 390
WMM protocol overview ··································································································································· 391
Enabling wireless QoS ················································································································································ 392
Setting the SVP service ················································································································································ 393
Setting CAC admission policy ···································································································································· 394
Setting radio EDCA parameters for APs ···················································································································· 394
Setting EDCA parameters for wireless clients ··········································································································· 396
Displaying radio statistics ············································································································································ 397
Displaying client statistics ············································································································································ 399
Setting rate limiting ······················································································································································ 400
Configuring the bandwidth guarantee function ········································································································ 401
Setting the reference radio bandwidth ············································································································· 401
Setting guaranteed bandwidth ·························································································································· 402
Enabling bandwidth guarantee ························································································································· 403
Displaying guaranteed bandwidth settings ······································································································ 404
Wireless QoS configuration examples ······················································································································ 404
CAC service configuration example ················································································································· 404
Static rate limiting configuration example ········································································································ 406
Dynamic rate limiting configuration example ·································································································· 407
Bandwidth guarantee configuration example ·································································································· 408
Advanced settings ··················································································································································· 411
Advanced settings overview ······································································································································· 411
District code ························································································································································· 411
Switching to fit AP mode ···································································································································· 411
Continuous transmitting mode ···························································································································· 411
Uplink interface monitoring ································································································································ 411
Channel busy test ················································································································································ 412
Band navigation ·················································································································································· 412
Configuring multicast optimization ···················································································································· 412
Configuring WLAN advanced settings ······················································································································ 413
Setting a district code ········································································································································· 413
Switching the AP to operate in fit AP mode ····································································································· 414
Configuring continuous transmitting mode ······································································································· 414
Configuring uplink interface monitoring ··········································································································· 416
Configuring a channel busy test ························································································································ 416
viii
Configuring band navigation ····························································································································· 417
Configuring multicast optimization ···················································································································· 419
Advanced settings configuration examples ··············································································································· 421
Band navigation configuration example ··········································································································· 421
Multicast optimization configuration example ································································································· 423
WLAN security configuration ································································································································· 425
WLAN security overview ············································································································································· 425
WIDS attack detection ········································································································································ 425
Blacklist and white list ········································································································································· 426
Configuring WIDS ······················································································································································· 426
Configuring WIDS ··············································································································································· 426
Displaying history record···································································································································· 427
Displaying statistics information ························································································································· 427
Configuring the blacklist and white list functions ····································································································· 428
Configuring dynamic blacklist ··························································································································· 428
Configuring static blacklist ································································································································· 429
Configuring white list ·········································································································································· 429
User isolation ··························································································································································· 431
Configuring user isolation ··········································································································································· 431
Index ········································································································································································ 432
1
About the WA series access points Web-based
configuration guide
The H3C WA series access points Web-based configuration guide describes the software features for the
H3C WA series access points and guide you through the software configuration procedures. These
configuration guides also provide configuration examples to help you apply software features to different
network scenarios.
Applicable models and software versions
The H3C WA series access points include WA2600 series and WA3600 series. This document
describes the software features for only fat APs. Table 1 sho
ws the applicable models and software
versions.
Table 1 Applicable models and software versions
Series Model
WA2600 series
WA2600 series access points (indoors)
WA2612-AGN
WA2620-AGN
WA2610i-GN
WA2620i-AGN
WA2600 series access points (enhanced)
WA2610E-AGN
WA2620E-AGN
WA2600 series access points (outdoors) WA2620X-AGNP
WA3600 series WA3600 series access points (indoors)
WA3610i-GN
WA3620i-AGN
WA3628i-AGN
Feature matrix
• Support of the H3C WA series access points for features may vary by device model.
• The grayed out functions or parameters on the Web interface indicate that they are not supported
or cannot be modified.
• The displayed Web pages may vary depending on your AP model.
• The terms AP and fat AP in this document can refer to wireless bridges with fat AP functions.
2
Table 2 Feature matrix
Module Feature WA2600 series
WA3600 series
Device
Optical Ethernet interface
Supported on the
WA2620X-AGNP
Not supported.
Device maintenance
The "File Type" and "If a file
with the same name already
exists, overwrite it without
any prompt" options in
software upgrade are
supported on the
WA2610i-GN and
WA2620i-AGN.
The "File Type" and "If a
file with the same name
already exists, overwrite it
without any prompt"
options in software
upgrade are supported.
Interface management
Configuration of IPv6
address for an interface is
supported.
The maximum Ethernet
frame length allowed by an
Ethernet interface is 1536
bytes for the
WA2610-AGN,
WA2612-AGN, and
WA2620-AGN and 1600
bytes for the other models.
Configuration of IPv6
address for an interface is
supported.
The maximum Ethernet
frame length allowed by
an Ethernet interface is
1600 bytes.
Wireless service Fast association
Supported on the APs
supporting both 2.4 GHz
and 5 GHz radios.
Supported on the APs
supporting both 2.4 GHz
and 5 GHz radios.
Radio
Radio
802.11n radio mode is
supported.
Support for 802.11a/b/g
depends on your AP model.
To check whether a radio
mode is supported, see the
corresponding list on the
web page.
802.11n bandwidth mode
is supported.
802.11n radio mode is
supported.
Support for 802.11a/b/g
depends on your AP
model. To check whether a
radio mode is supported,
see the corresponding list
on the web page.
802.11n bandwidth
mode is supported.
Rate
Support for
802.11a/b/g/n depends
on your AP model.
If a radio mode is not
supported, it is displayed as
gray on the web page.
802.11n radio mode is
supported.
Support for 802.11a/b/g
depends on your AP
model.
If a radio mode is not
supported, it is displayed
as gray on the web page.
MCS index Up to 15. Up to 23.
Advanced settings
Band navigation
Supported on the APs
supporting both 2.4 GHz
and 5 GHz radios.
Supported on the APs
supporting both 2.4 GHz
and 5 GHz radios.
3
Quick Start
The Quick Start wizard leads you through basic configuration procedures to quickly make your device
available for use.
Quick Start wizard home page
From the navigation tree, select Quick Start to enter the home page of the Quick Start wizard.
Figure 1 Home page of the Quick Start wizard
Basic configuration
1. On the home page of the Quick Start wizard, click start.
The basic configuration page appears.
4
Figure 2 Basic configuration page
2. Configure the parameters as described in Table 3.
Table 3 Configuration items
Item Descri
p
tion
System Name
Specify the name of the current device.
By default, the system name of the device is the device model.
Country/Region Code
Select the code of the country where you are. This field defines the radio frequency
characteristics such as the power and the total number of channels for frame
transmission. Before configuring the device, you need to configure the country
code correctly. If the Country Code field is grayed out, it cannot be modified.
Time Zone Select a time zone for the system.
Time Specify the current time and date.
Admin configuration
1. On the basic configuration page, click Next.
The admin configuration page appears.
5
Figure 3 Admin configuration page
2. Configure the parameters as described in Table 4.
Table 4 Configuration items
Item Descri
p
tion
Password Specify the password for user Admin to use to log into the device, in cipher text.
Confirm Password Enter the password again to confirm the password.
Password Encryption
Select the attribute for the password encryption method:
• Reversible
• Irreversible
IP configuration
1. On the Admin Configuration page, click Next.
The IP configuration page appears.
6
Figure 4 IP configuration page
2. Configure the parameters as described in Table 5.
Table 5 Configuration items
Item Descri
p
tion
IP Address
Specify the IP address of VLAN-interface 1. This IP address is used for logging in to
the device.
By default, the IP address of VLAN-interface 1 is 192.168.0.50 .
Mask
Specify the IP address mask of VLAN-interface 1.
By default, the mask is 24-bit long.
Default Gateway
Specify the IP address of the default gateway that connects the device to the
network.
By default, no default gateway is available.
Wireless configuration
1. On the IP configuration page, click Next.
The wireless configuration page appears.
7
Figure 5 Wireless configuration page
2. Configure the parameters as described in Table 6.
Table 6 Configuration items
Item Descri
p
tion
Primary Service
Authentication type
Select the authentication type for the wireless service, which can be:
• None—Performs no authentication.
• User authentication (802.1X)—Performs 802.1X authentication.
The default authentication type is None. In that case, skip the 5/8: Radius
Configuration step.
Wireless Service Specify the Service Set Identifier (SSID).
Encrypt
Select this box to go to the 6/8: Encryption Configuration step.
By default, no encryption is performed. If this option is not selected, the 6/8:
Encryption Configuration step is skipped.
RADIUS configuration
1. On the wireless configuration page, select User authentication (802.1X) for the Primary Service
Authentication Type field.
2. Click Next.
3. The RADIUS configuration page appears.
/