On this page, you can edit the AP’s name and password, manually assign an IP address, or change the Channel selection, transmit power and other wireless settings of a managed Access Point.

Device Name: The device name of the Access Point. Users can enter a custom name for the Access Point if they wish.

Administrator Username: Displays the current administrator login username for the Access Point. Enter a new Administrator username for the Access Point if you wish to change the username. The default username is: admin

New Password: Enter a new password of between 1~12 alphanumeric characters.

Verify Password: Enter the password again for confirmation.

Auto Configuration: Select whether the device IP address will use the static IP address specified in the IP Address field or be obtained automatically when the device connects to a DHCP server.

IP Address: Enter the IP address for the Access Point.

Subnet Mask: Enter the Subnet Mask for the Access Point.

Default Gateway: Enter the default Gateway for the Access Point.

Primary/Secondary DNS Server: Enter the Primary/Secondary DNS server name.

Wireless Radio Settings

Country: Select a Country/Region to conform to local regulations. Different regions have different rules that govern which channels can be used for wireless communications.

Wireless Mode: Select from the drop-down menu to set the wireless mode for the Access Point.

Channel HT Mode: Use the drop-down menu to select the channel width for 2.4GHz. A wider channel improves the performance, but some legacy devices operate only on either 20MHz or 40 MHz. This option is only available for 802.11n modes.

 

Extension Channel: Use the drop-down menu to set the Extension Channel as Upper or Lower channel. An extension channel is a secondary channel used to bond with the primary channel to increase this range to 40MHz allowing for greater bandwidth. This option is only available when Wireless Mode is 802.11n and Channel HT Mode is 20/40MHz or 40MHz.

Channel: Select Auto or manually assign a channel for the 2.4GHz or 5GHz radio.

Transmit Power: Allows you to manually set the transmit power on 2.4GHz or 5GHz radios. Optimizing channel assignments reduces channel interference and channel utilization for the network, thereby improving overall network performance and increasing the network’s client capacity. The list of available channels that can be assigned to radios is determined based on which country the Access Points are deployed in.

Client Limits: Limit the total number of clients that can associate with this Access Point.

Data Rate: Use the drop-down list to set the available transmit data rates permitted for wireless clients. The data rate affects the throughput of the access point. The lower the data rate, the lower the throughput, but the longer transmission distance.

RTS/CTS Threshold: Enter a Request to Send (RTS) Threshold value between 1~2346. Use RTS/CTS to reduce data collisions on the wireless network if you have wireless clients that are associated with the same Access Point.
Changing the RTS threshold can help control traffic flow through the Access Point. If you specify a lower threshold value, RTS packets will be sent more frequently. This will consume more bandwidth and reduce the throughput of the Access Point. Sending out more RTS packets can help the network recover from interference or collisions which might occur on a busy network or on a network experiencing electromagnetic interference.

Aggregation: Select whether to enable or disable Aggregation for the Access Point. This function merges data packets into one packet, reducing the number of packets. This also increases the packet sizes, so please keep this in mind. Aggregation is useful for increasing bandwidth throughput in environments that are prone to high error rates. This mode is only available for 802.11n modes. Fill in the frame rate limit you wish to use. The range is from 1~32. Next, fill in the max byte limit. The range is from 2304~65535.

WLAN Settings

Basic Setting 

Enable SSID: Select to enable or disable the SSID broadcasting.

SSID: Enter the SSID for the current profile. This is the name that is visible to wireless clients on the network.

Hidden SSID: Enable this option if you do not want to broadcast this SSID. This can help to discourage wireless users from connecting to a particular SSID.

Client Isolation: When enabled, all communication between wireless clients connected to the same AP will be blocked.

L2 Isolation: When enabled, wireless client traffic from all hosts and clients on the same subnet will be blocked.

VLAN Isolation: When enabled, all communications between wireless clients and any other devices on different VLANs will be blocked. All frames from wireless clients connected to this SSID will be tagged a corresponded 802.1Q VLAN tag when going out from Ethernet port.

VLAN ID: Enter the VLAN ID for the SSID profile. The range is from 1~4094. When VLAN tagging is configured per SSID, all data traffic from wireless users associated to that SSID is tagged with the configured VLAN ID. Multiple SSIDs also can be configured to use the same VLAN tag. For instance, a single VLAN ID could be used to identify all wireless traffic traversing the network, regardless of the SSID. When the AP receives VLAN-tagged traffic from the upstream switch or router, it forwards that traffic to the correct SSID. The AP drops all packets with VLAN IDs that are not associated to the SSID.

Traffic Shaping: Traffic Shaping regulates the allowed maximum downloading/uploading throughput per SSID. Select to enable or disable Wireless Traffic Shaping for the SSID.

  • Download Limit: Specifies the allowed maximum throughput for downloading.
  • Upload Limit: Specifies the allowed maximum throughput for uploading.

Fast Roaming: This feature uses protocols defined in 802.11r to allow continuous connectivity for wireless devices in motion, with fast and secure roaming from one AP to another. Coupled with 802.11k, wireless devices are able to quickly identify nearby APs that are available for roaming and once the signal strength of the current AP weakens and your device needs to roam to a new AP, it will already know which AP is the best to connect with. Note that not every wireless client supports 802.11k and 802.11r. Both the SSID and security options must be the same for this fast roaming to work. Fast Roaming is available when the following security methods are well configured:

Security: Select encryption method (WEP, WEP / WPA2 Enterprise, WPA-PSK / WPA2-PSK, or none) and encryption algorithm (AES or TKIP).

WEP: Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks which scrambles all data packets transmitted between the Access Point and the wireless clients associated with it. Both the Access Point and the wireless client must use the same WEP key for data encryption and decryption.

  • Mode: Select Open System or Shared Key.
  • WEP Key: Select the WEP Key you wish to use.
  • Input Type: ASCII: Regular Text or HEX. Select the key type. Your available options are ASCII and HEX.
    • ASCII Key: You can choose upper and lower case alphanumeric characters and special symbols such as @ and #.
    • HEX Key: You can choose to use digits from 0~9 and letters from A~F. Select the bitlength of the encryption key to be used in the WEP connection. Your available options are: 64, 128, and 152-bit password lengths.
  • Key Length: Select the desired option and ensure the wireless clients use the same setting. Your choices are: 64, 128, and 152-bit password lengths.
  • Key1/2/3/4: Enter the Key value or values you wish to use.

WPA / WPA2 Enterprise: WPA and WPA2 are Wi-Fi Alliance IEEE 802.11i standards, which include AES and TKIP mechanisms.

  • Type: Select the WPA type to use. Available options are Mixed, WPA and WPA2. Choose Mixed if your network has a mixture of older clients that only support WPA and TKIP, and newer client devices that support WPA2 and AES.
  • Encryption: Select the WPA encryption type you would like. Your available options are: Both, TKIP(Temporal Key Integrity Protocol) and AES(Advanced Encryption Standard). 
    Note: Since TKIP is not permitted for 802.11n-based transmissions, setting the encryption algorithm to TKIP when you are using an 802.11n or 802.11ac AP will cause the network to operate in 802.11g mode.
  • RADIUS Server: Enter the IP address of the RADIUS server.
  • RADIUS Port: Enter the port number used for connections to the RADIUS server.
  • RADIUS Secret: Enter the secret required to connect to the Radius server.
  • Update Interval: Specify how often, in seconds, the group key changes. Select 0 to disable.
  • RADIUS Accounting: Enables or disables the accounting feature.
  • RADIUS Accounting Server: Enter the IP address of the RADIUS accounting server.
  • RADIUS Accounting Port: Enter the port number used for connections to the RADIUS accounting server.
  • RADIUS Accounting Secret: Enter the secret required to connect to the RADIUS accounting server.
  • Accounting Group Key Update Interval: Specify how often, in seconds, the accounting data sends. The range is from 60~600 seconds.

WPA-PSK / WPA2-PSK: WPA with PSK (Pre-shared key / Personal mode), designed for home and small office networks that don’t require the complexity of an 802.1X authentication server.

  • Type: Select the WPA-PSK type to use. Available optionsare Mixed, WPA-PSK and WPA2PSK. Choose Mixed if your network has a mixture of older clients that only support WPA and TKIP, and newer client devices that support WPA2 and AES.
  • Encryption: Select the WPA encryption type you would like. Your available options are: Both, TKIP(Temporal Key Integrity Protocol) and AES(Advanced Encryption Standard).
    Note: Since TKIP is not permitted for 802.11n-based transmissions, setting the encryption algorithm to TKIP when you are using an 802.11n or 802.11ac AP will cause the network to operate in 802.11g mode.
  • WPA Passphrase: Enter the Passphrase you wish to use.
    If you are using the ASCII format, the Key must be between 8~64 characters in length.
  • Group Key Update Interval: Specify how often, in seconds, the Group Key changes.