On this page, you can edit the AP's name and password, manually
assign an IP address, or change the
Channel selection, transmit power
and other wireless settings of a managed Access Point.

Device Name: The device name of the Access Point. Users
can enter a custom name for the Access Point if they wish.

Administrator Username: Displays the current
administrator login username for the Access Point. Enter a new
Administrator username for the Access Point if you wish to change the
username. The default username is: admin

New Password: Enter a new password of between 1~12
alphanumeric characters.

Verify Password: Enter the password again for
confirmation.

 

Auto Configuration: Select whether the device IP address
will use the static IP address specified in the IP Address field or be
obtained automatically when the device connects to a DHCP server.

IP Address: Enter the IP address for the Access Point.

Subnet Mask: Enter the Subnet Mask for the Access Point.

Default Gateway: Enter the default Gateway for the Access
Point.

Primary/Secondary DNS Server: Enter the Primary/Secondary
DNS server name.

 

Wireless Radio Settings

Country: Select a Country/Region to conform to local
regulations. Different regions have different rules that govern which
channels can be used for wireless communications.

 

Wireless Mode: Select from the drop-down menu to set the wireless mode for
the Access Point.

 

Channel HT Mode: Use the drop-down menu to select the
channel width for 2.4GHz. A wider channel improves the performance, but
some legacy devices operate only on either 20MHz or 40 MHz. This option is
only available for 802.11n modes.

 

Extension Channel: Use the drop-down menu to set the
Extension Channel as Upper or Lower channel. An extension channel is a
secondary channel used to bond with the primary channel to increase this
range to 40MHz allowing for greater bandwidth. This option is only
available when Wireless Mode is 802.11n and Channel HT Mode is 20/40MHz or
40MHz.

Channel: Select Auto or manually assign a channel for the
2.4GHz or 5GHz radio.

Transmit Power: Allows you to manually set the transmit power on 2.4GHz or
5GHz radios. Optimizing channel assignments reduces channel interference
and channel utilization for the network, thereby improving overall network
performance and increasing the network’s client capacity. The list
of available channels that can be assigned to radios is determined based
on which country the Access Points are deployed in.

Client Limits: Limit the total number of clients that can
associate with this Access Point.

Data Rate: Use the drop-down list to set the available
transmit data rates permitted for wireless clients. The data rate affects
the throughput of the access point. The lower the data rate, the lower the
throughput, but the longer transmission distance.

RTS/CTS Threshold: Enter a Request to Send (RTS) Threshold value between
1~2346. Use RTS/CTS to reduce data collisions on the wireless network if
you have wireless clients that are associated with the same Access Point.
Changing the RTS threshold can help control traffic flow through the
Access Point. If you specify a lower threshold value, RTS packets will be
sent more frequently. This will consume more bandwidth and reduce the
throughput of the Access Point. Sending out more RTS packets can help the
network recover from interference or collisions which might occur on a
busy network or on a network experiencing electromagnetic interference.

 Aggregation: Select whether to enable or disable
Aggregation for the Access Point. This function merges data packets into
one packet, reducing the number of packets. This also increases the packet
sizes, so please keep this in mind. Aggregation is useful for increasing
bandwidth throughput in environments that are prone to high error rates.
This mode is only available for 802.11n modes. Fill in the frame rate
limit you wish to use. The range is from 1~32. Next, fill in the max byte
limit. The range is from 2304~65535.

WLAN Settings

Basic Setting 

Enable SSID: Select to enable or disable the SSID
broadcasting.

SSID: Enter the SSID for the current profile. This is the
name that is visible to wireless clients on the network.

Hidden SSID: Enable this option if you do not want to
broadcast this SSID. This can help to discourage wireless users from
connecting to a particular SSID.

Client Isolation: When enabled, all communication between
wireless clients connected to the same AP will be blocked.

L2 Isolation: When enabled, wireless client traffic from
all hosts and clients on the same subnet will be blocked.

VLAN Isolation: When enabled, all communications between
wireless clients and any other devices on different VLANs will be blocked.
All frames from wireless clients connected to this SSID will be tagged a
corresponded 802.1Q VLAN tag when going out from Ethernet port.

VLAN ID: Enter the VLAN ID for the SSID profile. The
range is from 1~4094. When VLAN tagging is configured per SSID, all data
traffic from wireless users associated to that SSID is tagged with the
configured VLAN ID. Multiple SSIDs also can be configured to use the same
VLAN tag. For instance, a single VLAN ID could be used to identify all
wireless traffic traversing the network, regardless of the SSID. When the
AP receives VLAN-tagged traffic from the upstream switch or router, it
forwards that traffic to the correct SSID. The AP drops all packets with
VLAN IDs that are not associated to the SSID.

Traffic Shaping: Traffic Shaping regulates the allowed
maximum downloading/uploading throughput per SSID. Select to enable or
disable Wireless Traffic Shaping for the SSID.

  • Download Limit: Specifies the allowed maximum
    throughput for downloading.
  • Upload Limit: Specifies the allowed maximum throughput
    for uploading.

Fast Roaming: This feature uses protocols defined in
802.11r to allow continuous connectivity for wireless devices in motion,
with fast and secure roaming from one AP to another. Coupled with 802.11k,
wireless devices are able to quickly identify nearby APs that are
available for roaming and once the signal strength of the current AP
weakens and your device needs to roam to a new AP, it will already know
which AP is the best to connect with. Note that not every wireless client
supports 802.11k and 802.11r. Both the SSID and security options must be
the same for this fast roaming to work. Fast Roaming is available when the
following security methods are well configured:

Security: Select encryption method (WEP, WEP / WPA2
Enterprise, WPA-PSK / WPA2-PSK, or none) and encryption algorithm (AES or
TKIP).

WEP: Wired Equivalent Privacy (WEP) is a data encryption
protocol for 802.11 wireless networks which scrambles all data packets
transmitted between the Access Point and the wireless clients associated
with it. Both the Access Point and the wireless client must use the same
WEP key for data encryption and decryption.

  • Mode: Select Open System or Shared Key.
  • WEP Key: Select the WEP Key you wish to use.
  • Input Type: ASCII: Regular Text or HEX. Select the key
    type. Your available options are ASCII and HEX.

    • ASCII Key: You can choose upper and lower case
      alphanumeric characters and special symbols such as @ and #.
    • HEX Key: You can choose to use digits from 0~9 and
      letters from A~F. Select the bitlength of the encryption key to be
      used in the WEP connection. Your available options are: 64, 128, and
      152-bit password lengths.
  • Key Length: Select the desired option and ensure the
    wireless clients use the same setting. Your choices are: 64, 128, and
    152-bit password lengths.
  • Key1/2/3/4: Enter the Key value or values you wish to
    use.

 

WPA / WPA2 Enterprise: WPA and WPA2 are Wi-Fi Alliance
IEEE 802.11i standards, which include AES and TKIP mechanisms.

  • Type: Select the WPA type to use. Available options are
    Mixed, WPA and WPA2. Choose Mixed if your network has a mixture of older
    clients that only support WPA and TKIP, and newer client devices that
    support WPA2 and AES.
  • Encryption: Select the WPA encryption type you would
    like. Your available options are: Both, TKIP(Temporal Key Integrity
    Protocol) and AES(Advanced Encryption Standard).
    Note: Since TKIP is not permitted for 802.11n-based transmissions,
    setting the encryption algorithm to TKIP when you are using an 802.11n
    or 802.11ac AP will cause the network to operate in 802.11g mode.
  • RADIUS Server: Enter the IP address of the RADIUS
    server.
  • RADIUS Port: Enter the port number used for connections
    to the RADIUS server.
  • RADIUS Secret: Enter the secret required to connect to
    the Radius server.
  • Update Interval: Specify how often, in seconds, the
    group key changes. Select 0 to disable.
  • RADIUS Accounting: Enables or disables the accounting
    feature.
  • RADIUS Accounting Server: Enter the IP address of the
    RADIUS accounting server.
  • RADIUS Accounting Port: Enter the port number used for
    connections to the RADIUS accounting server.
  • RADIUS Accounting Secret: Enter the secret required to
    connect to the RADIUS accounting server.
  • Accounting Group Key Update Interval: Specify how
    often, in seconds, the accounting data sends. The range is from 60~600
    seconds.

WPA-PSK / WPA2-PSK: WPA with PSK (Pre-shared key /
Personal mode), designed for home and small office networks that
don't require the complexity of an 802.1X authentication server.

  • Type: Select the WPA-PSK type to use. Available options
    are Mixed, WPA-PSK and WPA2PSK. Choose Mixed if your network has a
    mixture of older clients that only support WPA and TKIP, and newer
    client devices that support WPA2 and AES.
  • Encryption: Select the WPA encryption type you would
    like. Your available options are: Both, TKIP(Temporal Key Integrity
    Protocol) and AES(Advanced Encryption Standard).
    Note: Since TKIP is not permitted for 802.11n-based transmissions,
    setting the encryption algorithm to TKIP when you are using an 802.11n
    or 802.11ac AP will cause the network to operate in 802.11g mode.
  • WPA Passphrase: Enter the Passphrase you wish to use.
    If you are using the ASCII format, the Key must be between 8~64
    characters in length.
  • Group Key Update Interval: Specify how often, in
    seconds, the Group Key changes.