EnGenius EnStation2 Manuale utente


T
ABLE
OF
C
ONTENTS
I
TABLE OF CONTENTS
Conventions 0-vii
Copyright
0-ix
Product Overview
Package Contents............................................................................................................1-1
Product Overview............................................................................................................ 1-2
Key Features........................................................................................................... 1-2
Benefits...........................................................................................................................
1-3
Technical Specifications ............................................................................................ 1-4
Wireless Specifications. ............................................................................................ 1-4
Hardware Specifications............................................................................................ 1-4
Software Specifications ............................................................................................ 1-4
Product Interface.............................................................................................................. 1-5
Installation
System Requirements........................................................................................................ 2-1

T
ABLE
OF
C
ONTENTS
3
Installing the Device........................................................................................................ 2-2
Pre-Installation Guidelines ........................................................................................ 2-2
Installing the Device ................................................................................................ 2-2
Wall Mounting the Device.......................................................................................... 2-3
Pole Mounting the Device.......................................................................................... 2-4
Web Configuration
Logging In..................................................................................................................... 3-1
Best Practices ......................................................................................................... 3-2
Basic Network Settings
System Status................................................................................................................ 4-1
Using Save/Reload....................................................................................................... 4-1
Viewing the System Information..................................................................................... 4-2
Viewing the Wireless Client List.......................................................................................4-4
Viewing the System Log.................................................................................................4-5
Viewing the Connection Status........................................................................................4-6
Viewing the DHCP Client Tables...................................................................................... 4-7

T
ABLE
OF
C
ONTENTS
4
Viewing the WDS Link List............................................................................................. 4-8
System Setup................................................................................................................ 4-9
Configuring Operation Modes......................................................................................... 4-9
Configuring IP Settings................................................................................................ 4-10
Configuring Spanning Tree Settings...............................................................................4-11
Router Setup................................................................................................................ 4-12
Configuring WAN Settings............................................................................................ 4-12
Static IP................................................................................................................4-12
Dynamic IP............................................................................................................4-13
Point-to-Point Protocol over Ethernet (PPPoE) .............................................................4-14
Point-to-Point Tunnelling Protocol (PPTP)....................................................................4-15
Configuring LAN Settings............................................................................................. 4-17
Configuring VPN Pass-Through..................................................................................... 4-18
Configuring Port Forwarding......................................................................................... 4-19
Configuring Demilitarized Zone.................................................................................... 4-21
Configuring Wireless LAN............................................................................................... 4-22
Configuring Wireless Settings....................................................................................... 4-22
Access Point Mode ..................................................................................................4-22
Client Bridge Mode..................................................................................................4-24
WDS Bridge Mode...................................................................................................4-26

T
ABLE
OF
C
ONTENTS
4
Client Router Mode .................................................................................................4-28
Configuring Wireless Security....................................................................................... 4-30
Wired Equivalent Privacy (WEP) ................................................................................4-30
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) ......................................................4-31
Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK) .................................................4-32
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed .............................................4-33
Wi-Fi Protected Access (WPA)...................................................................................4-34
Wi-Fi Protected Access 2 (WPA2) ..............................................................................4-35
Wi-Fi Protected Access (WPA) Mixed ..........................................................................4-36
Configuring Wireless MAC Filter.................................................................................... 4-37
Configuring WDS Link Settings..................................................................................... 4-38
Configuring Advanced Network Settings.........................................................................4-39
Wireless Traffic Shaping ..........................................................................................4-39
Management Setup........................................................................................................4-40
Configuring Administrator Account................................................................................ 4-40
Configuring Management VLAN.....................................................................................4-41
Configuring SNMP....................................................................................................... 4-42
Configuring Backup/Restore Settings.............................................................................4-44
Configuring Auto Reboot Settings..................................................................................4-45
Configuring Firmware Upgrade......................................................................................4-46

T
ABLE
OF
C
ONTENTS
5
Configuring System Time............................................................................................ 4-47
Configuring Wi-Fi Schedule.......................................................................................... 4-48
Add a Schedule Service ...........................................................................................4-48
Schedule Services Table ..........................................................................................4-49
Configuring Command Line Interface.............................................................................4-50
Configuring Logging.................................................................................................... 4-51
Configuring Diagnostics............................................................................................... 4-52
Viewing Device Discovery............................................................................................ 4-53
Configure Denial of Service Protection........................................................................... 4-54
Logging Out............................................................................................................... 4-55

T
ABLE
OF
C
ONTENTS
6
Appendix A
Federal Communication Commission Interference Statement.................................................A-1
Appendix B
Europe –EU Declaration of Conformity...............................................................................B-1
Appendix C
World Wide Technical Support........................................................................................... C-1

C
ONVENTIONS
VII
Conventions
The following conventions are used to give the useradditional
information about specific procedures or content. It is important
to pay attention to these conventions as they provideinforma-
tion to prevent damage to equipment or personalinjury.
General Conventions
The following general conventions are used in thisdocument:
N/A:
Example:
Indicates information used to demonstrate or explainan
associated concept.
Indicates that a component or a procedure is notapplica-
ble to this model.
CAUTION!
CAUTION SIGNS APPEAR BEFORE THE TEXT IT REFERENCES
.
CAUTION SIGNS APPEAR IN CAPITAL LETTERS TO EMPHASIZE
THAT THE
MESSAGE CONTAINS VITAL HEALTH AND SAFETY
INFORMATION
.
WARNING!
Warning information appears before the text itreferences
to emphasize that the content may prevent damage to the
device or equipment.
Important:
Indicates information that is important to know for the
proper completion of a procedure, choice of an option,or
completing a task.
Note:
Indicates additional information that is relevant to thecur-
rent process or procedure.
Prerequisite:
Indicates a requirement that must be addressedbefore
proceeding with the current function orprocedure.
!
!

C
ONVENTIONS
VIII
Typographical Conventions
The following typographical conventions are used in this docu-
ment:
Italics
Indicates book titles, directory names, file names, pathnames,
and program/processnames.
Constant width
Indicates computer output shown on a computer screen, includ-
ing menus, prompts, responses to input, and errormessages.
Constant width bold
Indicates commands lines as entered on the computer.Vari-
ables contained within user input are shown in angle
brackets (< >).
Bold
Indicates keyboard keys that are pressed by theuser.

C
OPYRIGHT
IX
Copyright
This user guide and its content is copyright of © EnGeniusNet-
works, 2014. All rightsreserved.
Any redistribution or reproduction in part or in whole in any form
is prohibited.
Do not distribute, transmit, store in any form ofelectronic
retrieval system or commercially exploit the content without the
expressed written permission of EnGeniusNetworks.
Indice
Altri manuali EnGenius Antenna
Manuali Antenna popolari di altre marche

Alfa Network
Alfa Network APA-L01 Manuale utente

Naval
Naval PR-422CA Manuale utente

Feig Electronic
Feig Electronic ID ISC.ANTH200/200 Series Manuale utente

TERK Technologies
TERK Technologies TV44 Manuale utente

Directive Systems & Engineering
Directive Systems & Engineering DSE2324LYRMK Manuale utente

HP
HP J8999A Manuale utente
















