EnGenius ENS200 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung EnGenius ENS200 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von EnGenius ENS200, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung EnGenius ENS200 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung EnGenius ENS200. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung EnGenius ENS200 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts EnGenius ENS200
- Den Namen des Produzenten und das Produktionsjahr des Geräts EnGenius ENS200
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts EnGenius ENS200
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von EnGenius ENS200 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von EnGenius ENS200 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service EnGenius finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von EnGenius ENS200 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts EnGenius ENS200, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von EnGenius ENS200 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    WIRELES S 11N LONG RANGE OUTDOOR CB/AP ENS200 User Guide V1.0[...]

  • Seite 2

    T ABLE OF C ONTENTS I T ABLE OF C ONTENTS Conventions 0-vi Copyright 0- viii Product Overview Package Contents 1-1 Product Overview 1-2 K ey F eatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]

  • Seite 3

    T ABLE OF C ONTENTS II Installing the Device 2-2 Pre-Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 Installing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Web Configuration Logging In 3-1 Best Practices . . [...]

  • Seite 4

    T ABLE OF C ONTENTS III Configuring IP Settings 4-10 Configuring Spanning Tree Settings 4-11 Router Setup 4-12 Configuring WAN Settings 4-12 Static IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 2 Dynamic IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]

  • Seite 5

    T ABLE OF C ONTENTS IV Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31 Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed . . . . . . . . . . . . . . . . . . . . . . . 4-33 Wi-Fi[...]

  • Seite 6

    T ABLE OF C ONTENTS V Configuring Logging 4-50 Configuring Diagnostics 4-51 Viewing Device Discovery 4-52 Configure Denial of Service Protection 4-53 Logging Out 4-54 Appendix A F eder al Communication Commission Interference Statement A -1 Appendix B Industry Canada Statement B-1 Appendix C W orldWide T echnical Support C- 1[...]

  • Seite 7

    C ONVENTIONS VI Conventions The following conventi ons are used to give the user additional information about specific procedur es or content. It is important to pay attention to these conventions as they provide informa- tion to prevent dam age to equipment or personal injury . General Conventions The following general conventions are used in this[...]

  • Seite 8

    C ONVENTIONS VII Typographical Conventions The following typographical convent ions are used in this docu- ment: Italics Indicates book titles, directory names, file names, path names, and program/process names. Constant width Indicates computer output s hown on a computer screen, includ- ing menus, prompts, responses to input, and error messages. [...]

  • Seite 9

    C OPYRIGHT VIII Copyright This user guide and its content is copyright of © EnGenius Net- works, 201 1. All right s reserved. Any redistribution or r eproduction in part or in whole in any form is prohibited. Do not distribute, transmit, stor e in any form of electronic retrieval system or commercially exploit the cont ent without the expressed wr[...]

  • Seite 10

    Product Overview Chapter 1[...]

  • Seite 11

    P RODUCT O VER VIEW P ACKAGE C ONTENTS 1-1 1.1 Package Contents ITEM QUANTITY ENS200 Wireless Access Point / Client Bridge 1 PoE Injector (EPE1212) 1 24V/0.6A Power Adaptor 1 Mast S trap 1 T echnical Support Card 1[...]

  • Seite 12

    P RODUCT O VER VIEW P RODUCT O VERVIEW 1-2 1.2 Product Overview Thank you for choosing ENS200. The ENS200 is a long range, high performance IE EE 802.1 1b/g/n network solution that pro- vides Access Point, Client Bridge, WDS, and Client Router functions in a single device. In addition to providing the latest wi reless technology , the ENS200 suppor[...]

  • Seite 13

    P RODUCT O VER VIEW B ENEF ITS 1-3 Benefits The ENS200 is the ideal product around which you can build your WLAN. The following list summarizes a few key advan- tages that WLANs have over wired networks: Ideal for hard-to-wire environments There are many scenarios where cables cannot be used to con- nect networking devices. Hist oric and older buil[...]

  • Seite 14

    P RODUCT O VER VIEW T ECHNICAL S PECIFICATION 1-4 Technical Specification Wireless Specification  IEEE802.1 1b/g/n, 1T1R, 150Mbps  2.400 to 2.484 GHz, program mable upon different country regulations Hardware Specification  Physical Interface: 2 x 10/100 Mbp s LAN Ports, 1 x Reset Button  Power Supply: Passive PoE, 24V/0.6A Power Adapte[...]

  • Seite 15

    P RODUCT O VER VIEW P RODUCT L AYOUT 1-5 1.3 Product Layout Figure 1-1: Back Panel View A B C D BACK PANEL VIEW DESCRIPTION A Power LED OFF = ENS200 is not receiving power ON = ENS200 is receiving power B LAN (2) LEDs OFF = ENS200 is not conn ected to the network. ON = ENS200 is connected to the network, but not sending or receiving da ta Blink = E[...]

  • Seite 16

    P RODUCT O VER VIEW P RODUCT L AYOUT 1-6 BOTTOM VIEW DESCRIPTION A Reset Button T o reset to factory sett ings, press button for > 10 second s. B LAN Connector T o configure the ENS200, connect to an Ethernet adapte r in a computer . For more information C PoE LAN Connecto r The PoE interface allo ws the ENS200 to be powered using the supp lied [...]

  • Seite 17

    Installation Chapter 2[...]

  • Seite 18

    I NSTALLATION S YSTEM R EQUIREMENTS 2-1 2.1 System Requirements T o install the ENS200, you need the following:       Computer (Windows, Linux , Ma c OS X Operating System) Web Browser (Internet Explorer , FireFox, Chrome, Safari) Network Interface Card wi th an open RJ-45 Ethernet Port Wi-Fi Card or USB Wi-Fi Dongle (802.11 B/G/N[...]

  • Seite 19

    I NSTALLATION I NSTALLING THE D EVICE 2-2 2.2 Installing the Device Installing the ENS200 on a pole or wall op timizes the wireless access range. Pre-Installation Guidelines Select the optimal location for the equipment using the following guidelines:  The ENS200 should be mount ed on a 1"-4" pole. It s loca- tion should enable ea sy a[...]

  • Seite 20

    I NSTALLATION I NSTALLING THE D EVICE 2-3 5. Plug the other end of the Ethernet cable into the PoE port of the PoE injector . Figure 2-1: Inst alling the ENS200 6. T urn over the ENS200. Th en insert the mast strap through the middle hole of the ENS200. Use a screw- driver to unlock the pole-m ounting ring putting it through the ENS200. 7. Mount th[...]

  • Seite 21

    Web Configuration Chapter 3[...]

  • Seite 22

    W EB C ONFIGURATION L OGGING I N 3-1 3.1 Logging In The ENS200 has a built-in Web Conf igurator that let s you man- age the unit from any location using a Web browser that sup- ports HTTP and has Javascript inst alled. After configuring the computer for TCP/IP using the procedure appropriate for your operating system, use that computer ’s Web bro[...]

  • Seite 23

    W EB C ONFIGURATION B EST P RACTICES 3-2 Best Practices Perform the following procedur es regularly to make the ENS200 more secure and m anage the ENS200 more effec- tively .  Change the d efault p assword Use a password that is not easy to guess and that contains dif ferent characters, such as numbers and letter s. The ENS200 username can- not [...]

  • Seite 24

    Basic Network Settings Chapter 4[...]

  • Seite 25

    B ASIC N ETWORK S ETTINGS S YSTEM S TATUS 4-1 4.1 System Status View the summary of the current system st atus including system (hardware/sof tware version, da te/time), wired network (LAN) and wireless network (W LAN) information. 4.1.1 Using Save/Reload Save and apply the settin gs shown in the Unsaved changes list, or cancel the unsaved changes [...]

  • Seite 26

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM I NFORMATION 4-2 4.1.2 Viewing System Information Displays status information abou t the current operating mode. System Inform ation shows the general system information such as operating mode, system up ti me, firmware ve rsion, serial number , kernel version, and application version. LAN Settings shows L[...]

  • Seite 27

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM I NFORMATION 4-3 Current Wireless Settings shows wireless information such as frequency and channel. Since the ENS200 supports multiple- SSIDs, information about each SSID, such as it s ESSID and security settings, are displayed.[...]

  • Seite 28

    B ASIC N ETWORK S ETTINGS V IEWING W IRELESS C LIENT L IST 4-4 4.1.3 Viewing Wireless Client List Displays a list of clients a ssociated to the ENS200 , along with the MAC addresses and sign al strength for each client. Click the Refresh button to update t he client list.[...]

  • Seite 29

    B ASIC N ETWORK S ETTINGS V IEWING S YSTEM L OG 4-5 4.1.4 Viewing System Log The ENS200 automatically logs events to internal memory . Note: The oldest event s are deleted from the log when memory is full. Click the Refresh button to update the cl ient list or the Clear button to remove all events.[...]

  • Seite 30

    B ASIC N ETWORK S ETTINGS V IEWING C ONNECTION S TATUS 4-6 4.1.5 Viewing Connection Status Displays the current status of the network. The WLAN information shown includes network type, SSID, BSSID, c onnection status, wireless mode, current channel, security , dat a rate, noise level, and signal strength. The W A N information shown includes the MA[...]

  • Seite 31

    B ASIC N ETWORK S ETTINGS V IEWING DHCP C LIENT T ABLE 4-7 4.1.6 Viewing DHCP Client Table Displays the clients that are a ssociated to the ENS200 through DHCP . The MAC addre sses and signal strengt h for each client are also shown. Click the Refresh button to update t he client list.[...]

  • Seite 32

    B ASIC N ETWORK S ETTINGS V IEWING WDS L INK L IST 4-8 4.1.7 Viewing WDS Link List Displays the clients that are a ssociated to the ENS200 th rough WDS. The MAC addresses, link st atus and signal strength for each client are also shown. Click the Refresh button to update t he client list.[...]

  • Seite 33

    B ASIC N ETWORK S ETTINGS S YSTEM S ETUP 4-9 4.2 System Setup The following sections explain th e features and functionality of the ENS200 in access point mode, client bridge mode, WDS acces s point mode, WDS bridge mode, WDS stat ion mode and cli ent router mode. 4.2.1 Configuring Operation Mode Set the primary function of the device. The function[...]

  • Seite 34

    B ASIC N ETWORK S ETTINGS C ONFIGU RING IP S ETTINGS 4-10 4.2.2 Configuring IP Settings Configure the LAN settings for the ENS200 using a static or dynamic IP address. IP Network Setting Configure the net work connection type using either a static IP or dynamic IP . IP Address Enter the LAN IP address of the ENS200. Subnet Mask Enter the subnet mas[...]

  • Seite 35

    B ASIC N ETWORK S ETTINGS C ONFIGURING S PANNIN G T REE S ETTINGS 4-11 4.2.3 Configuring Spanning Tree Settings Sp anning T ree St atus Enable or disable the ENS200 S panning T ree function. Bridge Hello Time S pecify Bridge Hello T ime, in seconds. This value determines how often the ENS200 sends hello packet s to communicate information about the[...]

  • Seite 36

    B ASIC N ETWORK S ETTINGS R OUTER S ETUP 4-12 4.3 Router Setup 4.3.1 Configuring WAN Settings Configure the W AN settings for t he ENS200 using a st atic or dyna mic IP address, PPPoE or PPTP . Static IP Setting a static IP address allows an administrator to set a specific IP add ress for the router and guar- antees that it can not be assigned a di[...]

  • Seite 37

    B ASIC N ETWORK S ETTINGS D YNAMIC IP 4-13 Secondary DNS Enter the secondar y DNS server address. Discard Ping on W AN Check to Enable to recognize pings on the ENS200 W AN interface or Disable to block pings on the ENS200 W A N interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid. Blockin[...]

  • Seite 38

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT P ROTOCOL OVER E THERNET (PPP O E) 4-14 Point-to-Point Protocol over Ethernet (PPPoE) Point-to-Point Protocol over Ethernet (PPPoE) is used mainly by ISPs that provide DSL modems to connect to the Internet. MTU Ent er the maximum tran smission unit (MTU). The MTU specifies the largest packet size permit[...]

  • Seite 39

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT T UNNELLING P ROTOCOL (PPTP) 4-15 Point-to-Point Tunnelling Protocol (PPTP) The point-to-point tunnellin g protocol (PPTP) is used in association with virtual priv ate networks (VPNs). There a two part s to a PPTP connection: the W AN interface settings and the PPTP settings. MTU Ent er the maximum tran[...]

  • Seite 40

    B ASIC N ETWORK S ETTINGS P OINT - TO -P OINT T UNNELLING P ROTOCOL (PPTP) 4-16 Use These DNS Servers Click the radio button to set up the Primary DNS and Secondary DN S servers manually . Discard Ping on W AN Check to Enable to recognize pings on the ENS200 W AN interface or Disable to block pings on the ENS200 W A N interface. Note: Pinging IP ad[...]

  • Seite 41

    B ASIC N ETWORK S ETTINGS C ONFIGURING LAN S ETTINGS 4-17 4.3.2 Configuring LAN Settings IP Address Enter the LAN port IP address. IP Subnet Mask Enter the LAN IP subne t mask. WINS Server IP Enter the WINS Server IP . Use Router As DHCP Server Check this opt ion to enable the ENS200 internal DHCP server . St arting IP Address S pecify the starting[...]

  • Seite 42

    B ASIC N ETWORK S ETTINGS C ONFIGURING VPN P ASS -T HROUGH 4-18 4.3.3 Configuring VPN Pass-Through VPN Pass-through allows a secure virtual private network (VPN) c onnection between two co mputers. Enabling th e options o n this page opens a VPN port and enables connections to p ass through t he ENS200 without interruption. PPTP Pass-through Check [...]

  • Seite 43

    B ASIC N ETWORK S ETTINGS C ONFIGURING P ORT F ORWARDING 4-19 4.3.4 Configuring Port Forwarding Port forwarding enables multip le server applications on a LAN to serve clients on a W AN over a single W AN IP addr ess. The route r accepts incoming client p ackets, filters them based on the destination W AN, or public, port and prot ocol and forwards[...]

  • Seite 44

    B ASIC N ETWORK S ETTINGS C ONFIGURING P ORT F ORWARDING 4-20 Service Name Enter a name for t he port forwarding rule. Protocol Select a protocol for the applicat ion: Choices are Both, TCP , and UDP . St arting Port Enter a starting port number . Ending Port Enter an ending port number . All ports numbers between the st arting and ending ports wil[...]

  • Seite 45

    B ASIC N ETWORK S ETTINGS C ONFIGURING D EMILITARIZED Z ONE 4-21 4.3.5 Configuring Demilitarized Zone Configuring a device on the LAN as a demilitarized zone (DMZ) host allows unrestric ted two-way Internet access for Internet app lica- tions, such as online video games, to run from behind the NA T firewall. The DMZ function allows the router to re[...]

  • Seite 46

    B ASIC N ETWORK S ETTINGS C ONFIGURING W IRELESS LAN 4-22 4.4 Configuring Wireless LAN 4.4.1 Configuring Wireless Settings Instructions on how to configure the wireless and security se ttings for each of the possible operating modes. Access Point Mode The ENS200 supports Access Point Mode. In this mode, users with a wirele ss client device within r[...]

  • Seite 47

    B ASIC N ETWORK S ETTINGS A CCESS P OINT M ODE 4-23 AP Detection AP Detection can select th e best channel to use by scanning n earby areas for Access Points. Current Profile Configure up to four different SSID s. If many client devices will be accessing the net work, you can arrange the devices into SSID groups. Click Edit to configure the profil [...]

  • Seite 48

    B ASIC N ETWORK S ETTINGS C LIENT B RIDGE M ODE 4-24 Client Bridge Mode Client Bridge Mode lets you connect two LAN segment s via a wireless link as though they are on th e same physical network. Since the computers are on the same s ubnet, broadcasts reach all machines. As a result , DHCP information generated by the server reac h all client compu[...]

  • Seite 49

    B ASIC N ETWORK S ETTINGS C LIENT B RIDGE M ODE 4-25 Profile If you used the Si te Survey , the Web Configurator shows near by Access Points. T o connect to an Access Poin t, click the Access Point’s BSSID. Wireless Security See Configuring Wireless Security . Click Refresh to scan again.[...]

  • Seite 50

    B ASIC N ETWORK S ETTINGS WDS B RIDGE M ODE 4-26 WDS Bridge Mode Unlike traditional bridging. WDS Bridge Mode allows you to create large wireless networks by linking several wireless access po ints with WDS links. WDS is no rmally used in large, open areas, wher e pulling wires is cost prohibitiv e, restricted or physically im possible. Wireless Mo[...]

  • Seite 51

    B ASIC N ETWORK S ETTINGS WDS B RIDGE M ODE 4-27 Security Select the type of WDS security: None, WEP , or AES. WEP Key Enter the WEP key . AES Pass phrase Enter the AES pass phrase. MAC Address Enter the MAC address of the Access Point to which you want to extend wireless connectivity . Mode Select Disable or Enable to disable or enable WDS. Click [...]

  • Seite 52

    B ASIC N ETWORK S ETTINGS C LIENT R OUTER M ODE 4-28 Client Router Mode In Client Router M ode, you can access the Internet wire lessly with the su pport of a WISP . In AP Rout er Mode, the ENS200 can access the Internet via a cable or DSL modem. In this mode, the EN S200 can be configured to turn of f the wireless network name (SSID) broadcast, so[...]

  • Seite 53

    B ASIC N ETWORK S ETTINGS C LIENT R OUTER M ODE 4-29 Profile If you used the Si te Survey , the Web Configurator shows near by Access Points. T o connect to an Access Poin t, click the Access Point’s BSSID. Wireless Security See Configuring Wireless Security . Click Refresh to scan again.[...]

  • Seite 54

    B ASIC N ETWORK S ETTINGS C ONFIGURING W IRELESS S ECURITY 4-30 4.4.2 Configuring Wireless Security The Wireless Security Settings section le ts you configure the ENS200’ s security modes: WEP , WP A-PSK, WP A2-PSK, WP A-PSK Mixed, WP A, WP A2, and WP A Mixed. W e strongly reco mmend you use WP A2-PSK. Wired Equivalent Privacy (WEP) Security Mode[...]

  • Seite 55

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS P RE -S HAR ED K EY (WPA-PSK) 4-31 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Security Mode Select WP A-PSK from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with [...]

  • Seite 56

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS 2 P RE -S HARED K EY (WPA2-PSK) 4-32 Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) Security Mode Select WP A2-PSK from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption[...]

  • Seite 57

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS P RE -S HARED K EY (WPA-PSK) M IXED 4-33 Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed Security Mode Select WP A2-PSK Mi xed from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automa[...]

  • Seite 58

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS (WPA) 4-34 Wi-Fi Protected Access (WPA) Security Mode Select WP A from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phrase.  AES = auto[...]

  • Seite 59

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS 2 (WPA2) 4-35 Wi-Fi Protected Access 2 (WPA2) Security Mode Select WP A2 from t he drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phrase.  AE[...]

  • Seite 60

    B ASIC N ETWORK S ETTINGS W I -F I P ROTECTED A CCESS (WPA) M IXED 4-36 Wi-Fi Protected Access (WPA) Mixed Security Mode Select WP A Mixed from the drop-down list to begin the configuration. Encryption Select Both, TKIP , or AES as the encryption type.  B oth = uses TKIP and AE S.  TKIP = automatic encryption with WP A-PSK; requires pass- phr[...]

  • Seite 61

    B ASIC N ETWORK S ETTINGS C ONFIGURING W I RELESS MAC F ILTER 4-37 4.4.3 Configuring Wireless MAC Filter Wireless MAC Filters are used to allow or d eny network access to wireless clients accord ing to their MAC addresses. Y ou can man u- ally add a MAC address to rest rict the permission to acce ss ENS200. The default setting is Disable Wireless M[...]

  • Seite 62

    B ASIC N ETWORK S ETTINGS C ONFIGURING WDS L INK S ETTINGS 4-38 4.4.4 Configuring WDS Link Settings Using WDS Link Settings, you can create a wireless backbone link be tween multiple access points that are part of the same wirel ess network. This allows a wireless network to be expanded using mult iple Access Point s without the need for a wired ba[...]

  • Seite 63

    B ASIC N ETWORK S ETTINGS C ONFIGURING A DVANCED N ETWORK S ETTINGS 4-39 4.4.5 Configuring Advanced Network Settings Network address translati on (NA T) allows users on the LAN to access the Internet thro ugh a single or multiple Public IP Address es. NA T provides firewall protection from hacker att acks and allows for mapping LAN IP addresses to [...]

  • Seite 64

    B ASIC N ETWORK S ETTINGS M ANAGEMENT S ETUP 4-40 4.5 Management Setup The Management section lets you co nfigure administration, management VLAN, SNMP settings, ba ckup/restore settings, firmware upgrade, time settings, and log settings. Th is chapter describe s these settings. 4.5.1 Configuring Administrator Account Click the Administration link [...]

  • Seite 65

    B ASIC N ETWORK S ETTINGS C ONFIGURING M ANAGEMENT VLAN 4-41 4.5.2 Configuring Management VLAN Click the Management VLAN link un der the Management menu to assign a VLAN tag to the packet s. A VLAN is a group of computers on a network whose software has bee n configured so that th ey behave as if they were on a se para te L oca l Ar ea Network (LAN[...]

  • Seite 66

    B ASIC N ETWORK S ETTINGS C ONFIGURING SNMP 4-42 4.5.3 Configuring SNMP SNMP is used in network managem ent systems to monitor network-at tached devices for conditions t hat warrant administrative atten - tion. SNMP Enable or disable the ENS200 SNMP function. Cont act Enter the contact det ails of the device. Location Enter the locati on of the dev[...]

  • Seite 67

    B ASIC N ETWORK S ETTINGS C ONFIGURING SNMP 4-43 Engine ID S pecify the engine ID for SNMPv3. Click Save/Apply to apply the changes or Cancel to return previous settings.[...]

  • Seite 68

    B ASIC N ETWORK S ETTINGS C ONFIGURING B ACKUP /R ESTORE S ETTINGS 4-44 4.5.4 Configuring Backup/Restore Settings Click the Backup/Restore Setting link under the Management menu to save the ENS200’s current settings in a file on your local d isk or load settings onto the device fr om a local disk. This feature is particularly convenient admini st[...]

  • Seite 69

    B ASIC N ETWORK S ETTINGS C ONFIGURING F IRMWARE U PGRADE 4-45 4.5.5 Configuring Firmware Upgrade Firmware is system softwa re that operates and allo ws the administrator to interact with the router . T o update the firmware vers ion, follow these steps: 1. Download the appr opriate firmware approved by EnGenius Networks from an approved web site. [...]

  • Seite 70

    B ASIC N ETWORK S ETTINGS C ONFIGURING S YSTEM T IME 4-46 4.5.6 Configuring System Time Change the system time of the ENS200 by m anually entering the information, synchronizi ng the device with a PC, or setup automat ic updates through a network time (NTP) protocol server . Manually Set Date and Time Enter the date and time values in the date and [...]

  • Seite 71

    B ASIC N ETWORK S ETTINGS C ONFIGURING W I -F I S CHEDULE 4-47 4.5.7 Configuring Wi-Fi Schedule Use the Wi-Fi schedule function to co ntrol the wireless power ON/OFF servic e that operates on a routine basis. Add a Schedule Service Create a schedule service type and date/time parameters for a specific service. Schedule Name Enter the descrip tion o[...]

  • Seite 72

    B ASIC N ETWORK S ETTINGS S CHEDULE S ERVICE S T ABLE 4-48 Schedule Services Table The Schedule function relies on the GMT time setting acquired from a network time protocol (NTP) server . For details on how to con- nect the ENS200 to an NTP server , see Configuring System Time . Schedule T able Displays a list of scheduled services for the ENS200.[...]

  • Seite 73

    B ASIC N ETWORK S ETTINGS C ONFIGURING C OMMAND L INE I NTERFACE 4-49 4.5.8 Configuring Command Line Interface Most users will configure the EN S200 through the graphical user interface (GUI). Howe ver , for those who prefer an alternative method there is the command line interface (CLI). The CLI can be access th rough a command console, modem or T[...]

  • Seite 74

    B ASIC N ETWORK S ETTINGS C ONFIGURING L OGGING 4-50 4.5.9 Configuring Logging Display a list of events t hat are triggered on the ENS200 Ethernet and wirel ess interfaces. Y ou can cons ult this log if an unkn own error occurs on the system or wh en a report needs to be sent to the technical support dep art ment for debugging purposes. Syslog Enab[...]

  • Seite 75

    B ASIC N ETWORK S ETTINGS C ONFIGURING D IAGNOSTICS 4-51 4.5.10 Configuring Diagnostics The diagnosis feature allow the adm inistrator to verify t hat another device is av ailable on the network and is accepting reques t p ack- ets. If the ping result returns alive , it means a device is on line. This feature does not work if the t arget device is [...]

  • Seite 76

    B ASIC N ETWORK S ETTINGS V IEWING D EVICE D ISCOVERY 4-52 4.5.11 Viewing Device Discovery Device Name Displays the name of the dev ices connected to the network. Operation Mode Displays the operation mode of the devices co nnected to the network. IP Address Displays the IP addr ess of the devices c onnected to the network. System MAC Address Displ[...]

  • Seite 77

    B ASIC N ETWORK S ETTINGS C ONFIGURE D ENIAL OF S ERVICE P ROTECTION 4-53 4.5.12 Configure Denial of Service Protection Use TCP SYN Cookies P rotection Click to enable TCP SYN cookies protection. SYN Flood Attack Protection Click to enable or disable SYN Flood Attack Protection. Match Interval Per Second Enter the al lowed number of packet s per se[...]

  • Seite 78

    B ASIC N ETWORK S ETTINGS L OGGING O UT 4-54 4.5.13 Logging Out Click Logout to logout from the ENS200.[...]

  • Seite 79

    A PPENDIX A F EDERAL C OMMUNICATION C OMMISSION I NTERF ERENCE S TATEMEN T A-1 Appendix A Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Pa rt 15 of the FCC Rules. These limits are designed to provid e reasonable protection against [...]

  • Seite 80

    A PPENDIX A F EDERAL C OMMUNICATION C OMMISSION I NTERF ERENCE S TATEMEN T A-2 Important: This equipment complies with FCC radiation exposure limits set fort h for an uncontrolled environment. This device complies with FCC RF Exposure limits se t forth for an uncont rolled environment, under 47 CFR 2.109 3 paragrap h (d)(2 ). This transmitter must [...]

  • Seite 81

    A PPENDIX B I NDUSTRY C ANADA S TATEMENT B-1 Appendix B Industry Canada Statement This device complies with RSS-210 of the Industry C anada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmful inte rference, and (2) this device mu st accept any interference rece ived, including interference th at may c[...]

  • Seite 82

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-1 Appendix C WorldWide Technical Support REGION / COUNTRY OF PURCHASE SERVICE CENTRE SERVICE INFORMATION Canada CANADA web site www .engeniuscanada.com email rma@engeniuscanada.com contact nu mbers T oll Free: (+1) 888-397-27 88 Local: (+1) 90 5-940-8181 hours of operation Monday - Friday 9:00AM to 5:3[...]

  • Seite 83

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-2 Mexico, Central and Southe rn America MIAMI, USA web site [ES] es.engeniustech.com [PT] pg.en geniustech.com email miamisupport@engeniu stech.com contact nu mbers Miami: (+1) 305- 887-7378 Sao Paulo, Brazil: (+55)1 1-39 57-0303 D.F ., Mexico:(+52)55 -1 163-8894 hours of operation Monday - Friday 8:00[...]

  • Seite 84

    A PPENDIX C W ORLD W IDE T ECHNICAL S UPPORT C-3 Singapore, Cambod ia, Indonesia, Malaysia, Thailand, Philippines, Vietna m China, Hong Kong, Korea India South Afric a Oceania SINGAPORE web site www .engenius tech.com.sg/e_warranty_form email techsupport@engeniu stech.com.sg contact nu mbers T oll Free: Singapore: 1800 -364-3648 hours of operation [...]