Product Overview - EnGenius Networks

Product Overview - EnGenius Networks
EnGenius® X-TRA RANGE®
ENS200 LONG RANGE WIRELESS 11N OUTDOOR CB / AP
User Guide
V1.0
TABLE OF CONTENTS
TABLE OF CONTENTS
Conventions
Copyright
0-vi
0-viii
Product Overview
Package Contents
1-1
Product Overview
1-2
Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
Technical Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Physical Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Wireless Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Hardware Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
Product Layout
1-5
Installation
System Requirements
2-1
I
TABLE OF CONTENTS
Installing the Device
2-2
Pre-Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Installing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Web Configuration
Logging In
3-1
Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Basic Network Settings
System Status
4-1
Using Save/Load
4-1
Viewing System Information
4-2
Viewing Wireless Client List
4-4
Viewing System Log
4-5
Viewing Connection Status
4-6
Viewing DHCP Client Table
4-7
Viewing WDS Link List
4-8
System Setup
4-9
Configuring Operation Mode
4-9
II
TABLE OF CONTENTS
Configuring IP Settings
4-10
Configuring Spanning Tree Settings
4-11
Router Setup
4-12
Configuring WAN Settings
4-12
Static IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Dynamic IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Point-to-Point Protocol over Ethernet (PPPoE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Point-to-Point Tunnelling Protocol (PPTP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Configuring LAN Settings
4-18
Configuring VPN Pass-Through
4-19
Configuring Port Forwarding
4-20
Configuring Demilitarized Zone
4-22
Configuring Wireless LAN
4-23
Configuring Wireless Settings
4-23
Access Point Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Client Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
WDS Bridge Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Client Router Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Configuring Wireless Security
4-29
Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
III
TABLE OF CONTENTS
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK). . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed . . . . . . . . . . . . . . . . . . . . . . . 4-32
Wi-Fi Protected Access (WPA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Wi-Fi Protected Access 2 (WPA2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Wi-Fi Protected Access (WPA) Mixed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Configuring Wireless MAC Filter
4-39
Configuring WDS Link Settings
4-40
Configuring Advanced Network Settings
4-41
Management Setup
4-43
Configuring Administrator Account
4-43
Configuring Management VLAN
4-45
Configuring SNMP
4-46
Configuring Backup/Restore Settings
4-48
Configuring Firmware Upgrade
4-49
Configuring System Time
4-50
Configuring Command Line Interface
4-51
Configuring Logging
4-52
Configuring Diagnostics
4-53
Viewing Device Discovery
4-54
IV
TABLE OF CONTENTS
Configure Denial of Service Protection
4-55
Logging Out
4-56
Appendix A
Federal Communication Commission Interference Statement
A-1
Appendix B
Industry Canada Statement
B-1
Appendix C
WorldWide Technical Support
C-1
V
CONVENTIONS
Conventions
The following conventions are used to give the user additional
information about specific procedures or content. It is important
to pay attention to these conventions as they provide information to prevent damage to equipment or personal injury.
Example:
Indicates information used to demonstrate or explain an
associated concept.
N/A:
General Conventions
Indicates that a component or a procedure is not applicable to this model.
The following general conventions are used in this document.
Prerequisite:
!
!
CAUTION!
Indicates a requirement that must be addressed before
proceeding with the current function or procedure.
CAUTIONS APPEAR BEFORE THE TEXT IT REFERENCES. CAUTIONS APPEAR IN CAPITAL LETTERS TO EMPHASIZE THAT THE
MESSAGE CONTAINS VITAL HEALTH AND SAFETY INFORMATION.
WARNING!
Warning information appears before the text it references
to emphasize that the content may prevent damage to the
device or equipment.
Important:
Indicates information that is important to know for the
proper completion of a procedure, choice of an option, or
completing a task.
Note:
Indicates additional information that is relevant to the current process or procedure.
0-VI
CONVENTIONS
Typographical Conventions
The following typographical conventions are used in this document:
Italics
Indicates book titles, directory names, file names, path names,
and program/process names.
Constant width
Indicates computer output shown on a computer screen, including menus, prompts, responses to input, and error messages.
Constant width bold
Indicates commands lines as entered on the computer. Variables contained within user input are shown in angle
brackets (< >).
Bold
Indicates keyboard keys that are pressed by the user.
0-VII
COPYRIGHT
Copyright
This user guide and its content is copyright of © EnGenius Networks, 2011. All rights reserved.
Any redistribution or reproduction in part or in whole in any form
is prohibited.
Do not distribute, transmit, store in any form of electronic
retrieval system or commercially exploit the content without the
expressed written permission of EnGenius Networks.
0-VIII
Product Overview
Chapter 1
PRODUCT OVERVIEW
PACKAGE CONTENTS
1.1 Package Contents
ITEM
QUANTITY
ENS200 Wireless Access Point / Client Bridge
1
PoE injector (EPE-24R)
1
24V/0.6A
12V,
1A Power Adaptor
1
Ethernet Cable
1
Mast Strap
1
Quick Installation Guide
1
User CD (with user manual)
1
Technical Support Card
1
1-1
PRODUCT OVERVIEW
PRODUCT OVERVIEW
1.2 Product Overview
Thank you for choosing ENS200. The ENS200 is a long range,
high performance IEEE 802.11b/g/n network solution that provides Access Point, Client Bridge, WDS, and Client Router
functions in a single device.
In addition to providing the latest wireless technology, the
ENS200 supports Power over Ethernet and Power by Adapter
capabilities, which allow the device to be installed easily in
nearly any indoor or outdoor location. Advanced features
include power level control, narrow bandwidth selection, traffic
shaping, and Real time RSSI indication.
A variety of security features help to protect your data and privacy while you are online. Security features include Wi-Fi Protected Access (WPA PSK/WPA2 PSK), 64/128/156 bit WEP
Encryption, and IEEE 802.1x with RADIUS.
Key Features

High-speed data rates up to 150 Mbps make the ENS200
ideally suited for handling heavy data payloads such as
MPEG video streaming

High output power up to 26 dBm delivers superior range
and coverage

Fully Interoperable with IEEE 802.11b/IEEE 802.11g/IEEE
802.11n-compliant devices

Multi-function capabilities enable users to use different
modes in various environments
1-2

Point-to-point and point-to-multipoint wireless connectivity enable data transfers between two or more buildings

Channel bandwidth selection allows the appropriate bandwidth to be used to reach various distances

RSSI indicator makes it easy to select the best signal for
Access Point connections

Power-over-Ethernet capabilities allow for flexible installation locations and cost savings

Four SSIDs let clients access different networks through a
single Access Point, and assign different policies and
functions for each SSID

WPA2/WPA/ WEP/ IEEE 802.1x support and MAC
address filtering ensure secure network connections

PPPoE/PPTP function support make it easy to access the
Internet via Internet Service Provider (ISP) service
authentication

SNMP Remote Configuration Management helps administrators remotely configure or manage the Access Point

QoS (WMM) support enhances performance and user
experiences
PRODUCT OVERVIEW
BENEFITS
Benefits
Wireless extensions to Ethernet networks
WLANs enable network managers in dynamic environments to
minimize overhead caused by moves, extensions to networks,
and other changes.
The ENS200 is the ideal product around which you can build
your WLAN. The following list summarizes a few key advantages that WLANs have over wired networks:
Wired LAN backup
Ideal for hard-to-wire environments
Network managers can implement WLANs to provide backup
for mission-critical applications running on wired networks.
There are many scenarios where cables cannot be used to connect networking devices. Historic and older buildings, open
areas, and busy streets, for example, make wired LAN installations difficult, expensive, or impossible.
Mobility within training/educational
facilities
Temporary workgroups
Training sites at corporations and students at universities are a
few examples where wireless connectivity can be used to facilitate access to information, information exchanges, and learning.
WLANs make it easy to provide connectivity to temporary workgroups that will later be removed. Examples include parks, athletic arenas, exhibition centers, disaster-recovery shelters,
temporary offices, and construction sites.
Ability to access real-time information
With a WLAN, workers who rely on access to real-time information, such as doctors and nurses, point-of-sale employees,
mobile workers, and warehouse personnel, can access the data
they need and increase productivity, without having to look for a
place to plug into the network.
Frequently changed environments
WLANs are well suited for showrooms, meeting rooms, retail
stores, and manufacturing sites where workplaces are rearranged frequently.
1-3
PRODUCT OVERVIEW
TECHNICAL SPECIFICATION
Technical Specification

Port Forwarding/Mapping/Virtual Server (Client Router
mode)
Physical Interface

Port Triggering (Client Router mode)

WAN Type: PPPoE/PPTP/L2TP (Client Router mode)

2x10/100Mbps LAN Ports

Reset Button
Wireless Specification

IEEE 802.11 B/G/N, 150MBps Wireless Speed

Frequency bands: 2.4Ghz and 5Ghz
Hardware Specification

Dimension: 186mm x 100mm x 29mm (L x W x H)

12V/1A
Power Adapter: 24V/0.6A

Passive PoE

Encryption: WEP/WPA/WPA2/TKIP/AES

Hidden ESSID

MAC Address Filtering

PPTP/IPSec/L2TP Pass-through

Remote Control/Firmware Upgrade

Backup/Restore Setting

DHCP Server (Client Router mode)

NAT/NAPT (Client Router mode)
1-4
PRODUCT OVERVIEW
PRODUCT LAYOUT
1.3 Product Layout
BACK PANEL VIEW
A
B
C
A B C
Power LED
Figure 1-1: Back Panel View
1-5
OFF = ENS200 is not receiving power
ON = ENS200 is receiving power
LAN (2) LEDs
OFF = ENS200 is not connected to the
network.
ON = ENS200 is connected to the network,
but not sending or receiving data
Blink = ENS200 is sending or receiving data
WLAN LED
(Access Point or Client Bridge Mode)
OFF = ENS200 radio is off and the device is
not sending or receiving data over the
wireless LAN.
ON = ENS200 radio is on, and the device is
not sending or receiving data over the
wireless LAN.
Blinking = ENS200 radio is on, and the
device is sending or receiving data over the
wireless LAN.
D
D
DESCRIPTION
Signal Indicator LED
(Access Point or Client Bridge Mode)
Green - Signal is good
Orange - Signal is normal
Red - Signal is weak or non-existent
PRODUCT OVERVIEW
PRODUCT LAYOUT
A
BOTTOM VIEW
A
Reset Button
B
LAN Connector
C
PoE LAN Connector
B
C
DESCRIPTION
To reset to factory settings, press button for >
10 seconds.
To configure the ENS200, connect to an
Ethernet adapter in a computer. For more
information
The PoE interface allows the ENS200 to be
powered using the supplied PoE injector
1-6
Installation
Chapter 2
INSTALLATION
SYSTEM REQUIREMENTS
2.1 System Requirements
To install the ENS200, you need the following:

Computer (Windows, Linux, OSX Operating System)

CD-ROM *

Web Browser (Internet Explorer, FireFox, Chrome, Safari)

Network Interface Card with an open RJ-45 Ethernet Port

Wi-Fi Card or USB Wi-Fi Dongle (802.11 B/G/N) **

An existing router or access point (AP) with SSID broadcast

CAT5 Ethernet Cables
Note:
* Windows Only: Using ENS200 Setup CD
** Optional
2-1
INSTALLATION
INSTALLING THE DEVICE
2.2 Installing the Device
Installing the Device
Installing the ENS200 on a pole or wall optimizes the wireless
access range.
To install the ENS200, use the following procedure to mount the
device on a pole and refer to the figure below.
Note:
Only experienced installation professionals who are familiar with local building and safety codes and, wherever
applicable, are licensed by the appropriate government
regulatory authorities should install the ENS200.
1. Remove the bottom cover protecting the RJ-45 connectors.
2. Insert an Ethernet cable into the RJ-45 port labeled LAN.
Pre-Installation Guidelines
3. Install the bottom cover to protect the RJ-45 connectors.
Select the optimal location for the equipment using the following
guidelines:
4. Remove the power cord and PoE injector from the box
and plug the power cord into the DC port of the PoE injector.

The ENS200 should be mounted on a 1"-4" pole. Its location should enable easy access to the unit and its connectors for installation and testing.

The higher the placement of the antenna, the better the
achievable link quality.

The antenna should be installed to provide a direct, or
near line of sight with the Base Station antenna. The
antenna should be aligned to face the general direction of
the Base Station.
!
2-2
CAUTION!
ONLY USE THE POWER ADAPTER SUPPLIED WITH THE
ENS200. USING A DIFFERENT POWER ADAPTER MIGHT DAMAGE THE ENS200.
Web Configuration
Chapter 3
WEB CONFIGURATION
LOGGING IN
3.1 Logging In
The ENS200 has a built-in Web Configurator that lets you manage the unit from any location using a Web browser that supports HTTP and has JavaScript installed.
3. When the Windows Security window appears, enter admin
for the username in the top field and admin for the password in
the bottom field.
After configuring the computer for TCP/IP using the procedure
appropriate for your operating system, use that computer’s
Web browser to log in to the ENS200 Web Configurator.
1. Launch your Web browser.
2. In the browser address bar, type 192.168.1.1 and
press the Enter key.
Note:
If you changed the ENS200 LAN IP address, enter the correct IP address.
Figure 3-2: Windows Security Login Dialog
4. Click OK.
You are now ready to use the instructions in the following chapters to configure the ENS200.
Figure 3-1: Web Browser Address Bar
3-1
WEB CONFIGURATION
BEST PRACTICES
Best Practices
Perform the following procedures regularly to make the
ENS200 more secure and manage the ENS200 more effectively.

Change the default password Use a password that is
not easy to guess and that contains different characters,
such as numbers and letters. The ENS200 username cannot be changed. For more information, see Configuring
Administrator Account.

Back up the configuration and be sure you know how to
restore it. Restoring an earlier working configuration can
be useful if the ENS200 becomes unstable or crashes. If
you forget your password, you will have to reset the
ENS200 to its factory default settings and lose any customized override settings you configured. However, if you
back up an earlier configuration, you will not have to completely reconfigure the ENS200. You can simply restore
your last configuration. For more information, For more
information, see Configuring Administrator Account.
3-2
Basic Network Settings
Chapter 4
BASIC NETWORK SETTINGS
SYSTEM STATUS
4.1 System Status
View the summary of the current system status including system (hardware/software version, date/time), wired network (LAN) and
wireless network (WLAN) information.
4.1.1 Using Save/Load
Save and apply the settings shown in the Unsaved changes list,
or cancel the unsaved changes and revert to the previous settings that were in effect.
4-1
BASIC NETWORK SETTINGS
VIEWING SYSTEM INFORMATION
4.1.2 Viewing System Information
Displays status information about the current operating mode.
System Information shows the general system information
such as operating mode, system up time, firmware version, serial
number, kernel version, and application version.
LAN Settings shows Local Area Network settings such as the
LAN IP address, subnet mask, and MAC address.
WAN Settings shows Wide Area Network settings such as the
MAC address, connection type, connection status, LAN IP
address, subnet mask, primary and secondary DNS.
4-2
BASIC NETWORK SETTINGS
VIEWING SYSTEM INFORMATION
Current Wireless Settings shows wireless information such as
frequency and channel. Since the ENS200 supports multipleSSIDs, information about each SSID, such as its ESSID and
security settings, are displayed.
4-3
BASIC NETWORK SETTINGS
VIEWING WIRELESS CLIENT LIST
4.1.3 Viewing Wireless Client List
Displays a list of clients associated to the ENS200, along with the MAC addresses and signal strength for each client.
Click the Refresh button to update the client list.
4-4
BASIC NETWORK SETTINGS
VIEWING SYSTEM LOG
4.1.4 Viewing System Log
The ENS200 automatically logs events to internal memory.
Note:
The oldest events are deleted from the log when memory is full.
Click the Refresh button to update the client list or the Clear button to remove all events.
4-5
BASIC NETWORK SETTINGS
VIEWING CONNECTION STATUS
4.1.5 Viewing Connection Status
Displays the current status of the network. The information shown includes network type, SSID, BSSID, connection status, wireless
mode, current channel, security, data rate, noise level, and signal strength.
Click the Refresh button to update the client list or the Clear button to remove all events.
4-6
BASIC NETWORK SETTINGS
VIEWING DHCP CLIENT TABLE
4.1.6 Viewing DHCP Client Table
Displays the clients that are associated to the ENS200 through DHCP. The MAC addresses and signal strength for each client are
also shown.
Click the Refresh button to update the client list.
4-7
BASIC NETWORK SETTINGS
VIEWING WDS LINK LIST
4.1.7 Viewing WDS Link List
Displays the clients that are associated to the ENS200 through WDS. The MAC addresses, link status and signal strength for each
client are also shown.
Click the Refresh button to update the client list.
4-8
BASIC NETWORK SETTINGS
CONFIGURING IP SETTINGS
4.2.2 Configuring IP Settings
Configure the LAN settings for the ENS200 using a static or dynamic IP address.
IP Network Setting Configure the network connection type
using either a static IP or dynamic IP.
IP Address Enter the LAN IP address of the ENS200.
Subnet Mask Enter the subnet mask of the ENS200.
Default Gateway Enter the default gateway of the ENS200.
Primary DNS Enter the primary DNS address of the ENS200.
Secondary DNS Enter the secondary DNS address of the
ENS200.
Click Apply to save the settings or Cancel to discard changes.
4-10
BASIC NETWORK SETTINGS
CONFIGURING SPANNING TREE SETTINGS
4.2.3 Configuring Spanning Tree Settings
Spanning Tree Status Enable or disable the ENS200
Spanning Tree function.
Bridge Hello Time Specify Bridge Hello Time, in seconds. This
value determines how often the ENS200 sends hello packets to
communicate information about the topology throughout the
entire Bridged Local Area Network
Bridge Max Age Specify Bridge Max Age, in seconds. If
another bridge in the spanning tree does not send a hello packet
for a long period of time, it is assumed to be dead.
Bridge Forward Delay Specify Bridge Forward Delay, in
seconds. Forwarding delay time is the time spent in each of the
Listening and Learning states before the Forwarding state is
entered. This delay is provided so that when a new bridge
comes onto a busy network, it looks at some traffic before
participating.
Priority Specify the Priority number. Smaller numbers have
greater priority.
Click Accept to confirm the changes or Cancel to cancel and return
previous settings.
4-11
BASIC NETWORK SETTINGS
ROUTER SETUP
4.3 Router Setup
4.3.1 Configuring WAN Settings
Configure the WAN settings for the ENS200 using a static or dynamic IP address, PPPoE or PPTP.
Static IP
Setting a static IP address allows an administrator to set a specific IP address for the router and guarantees that it can not be
assigned a different address.
Account Name Enter the account name provided by your ISP
Domain Name Enter the domain name provided by your ISP
MTU The maximum transmission unit (MTU) specifies the
largest packet size permitted for an internet transmission. The
factory default MTU size for static IP is 1500. The MTU size
can be set between 512 and 1500.
IP Address Enter the router’s WAN IP address.
Subnet Mask Enter the router’s WAN subnet mask.
Default Gateway Enter the WAN gateway address.
Primary DNS Enter the primary DNS server address.
Secondary DNS Enter the secondary DNS server address.
Discard Ping on WAN Check to Enable to recognize pings on
the ENS200 WAN interface or Disable to block pings on the
4-12
BASIC NETWORK SETTINGS
DYNAMIC IP
ENS200 WAN interface. Note: Pinging IP addresses is a common method used by hackers to test whether the IP address is valid.
Blocking pings provides some extra security from hackers.
Click Accept to save the settings or Cancel to discard changes.
Dynamic IP
Dynamic IP addressing assigns a different IP address each time a device connects to an ISP service provider. The service is most
commonly used by ISP cable providers.
Account Name Enter the account name provided by your ISP
Domain Name Enter the domain name provided by your ISP
MTU The maximum transmission unit (MTU) specifies the
largest packet size permitted for an internet transmission. The
factory default MTU size for static IP is 1500. The MTU size can
be set between 512 and 1500.
Get Automatically From ISP Click the radio button to obtain
the DNS automatically from the DHCP server.
Use These DNS Servers Click the radio button to set up the
Primary DNS and Secondary DNS servers manually.
Discard Ping on WAN Check to Enable to recognize pings on
the ENS200 WAN interface or Disable to block pings on the
ENS200 WAN interface. Note: Pinging IP addresses is a
common method used by hackers to test whether the IP
address is valid. Blocking pings provides some extra security
from hackers.
Click Accept to save the settings or Cancel to discard
changes.
4-13
BASIC NETWORK SETTINGS
POINT-TO-POINT PROTOCOL OVER ETHERNET (PPPOE)
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Protocol over Ethernet (PPPoE) is used mainly by ISPs that provide DSL modems to connect to the Internet.
MTU Enter the maximum transmission unit (MTU). The MTU
specifies the largest packet size permitted for an internet
transmission (PPPoE default: 1492). The MTU size can be set
between 512 and 1492.
Login Enter the username assigned by an ISP.
Password Enter the password assigned by an ISP.
Service Name Enter the service name of an ISP (optional).
Connect on Demand Select the radio button to specify the
maximum idle time. Internet connection will disconnect when it
reach the maximum idle time, but it will automatically connect
when user tries to access the network.
Keep Alive Select whether to keep the Internet connection
always on, or enter a redial period once the internet lose
connection.
4-14
BASIC NETWORK SETTINGS
POINT-TO-POINT PROTOCOL OVER ETHERNET (PPPOE)
Get Automatically From ISP Click the radio button to obtain
the DNS automatically from the DHCP server.
Use These DNS Servers Click the radio button to set up the
Primary DNS and Secondary DNS servers manually.
Discard Ping on WAN Check to Enable to recognize pings on
the ENS200 WAN interface or Disable to block pings on the
ENS200 WAN interface. Note: Pinging IP addresses is a
common method used by hackers to test whether the IP
address is valid. Blocking pings provides some extra security
from hackers.
Click Accept to save the settings or Cancel to discard
changes.
4-15
BASIC NETWORK SETTINGS
POINT-TO-POINT TUNNELLING PROTOCOL (PPTP)
Point-to-Point Tunnelling Protocol (PPTP)
The point-to-point tunnelling protocol (PPTP) is used in association with virtual private networks (VPNs). There a two parts to a PPTP
connection: the WAN interface settings and the PPTP settings.
MTU Enter the maximum transmission unit
(MTU). The MTU specifies the largest packet
size permitted for an internet transmission
(PPPoE default: 1492). The MTU size can be set
between 512 and 1492.
IP Address Enter the router’s WAN IP address.
Subnet Mask Enter the router’s WAN subnet IP address.
Default Gateway Enter the router’s WAN gateway IP address.
PPTP Server Enter the IP address of the PPTP server.
Username Enter the username provided by your ISP.
Password Enter the password provided by your ISP.
Connect on Demand If you want the ENS200 to end the
Internet connection after it has been inactive for a period of
time, select this option and enter the number of minutes you
want that period of inactivity to last.
4-16
BASIC NETWORK SETTINGS
POINT-TO-POINT TUNNELLING PROTOCOL (PPTP)
Keep Alive If you want the ENS200 to periodically check your
Internet connection, select this option. Then specify how often
you want the ENS200 to check the Internet connection. If the
connection is down, the ENS200 automatically re-establishes
your connection
Get Automatically From ISP Obtains the DNS automatically
from DHCP server.
Use These DNS Servers Click the radio button to set up the
Primary DNS and Secondary DNS servers manually.
Discard Ping on WAN Check to Enable to recognize pings on
the ENS200 WAN interface or Disable to block pings on the
ENS200 WAN interface. Note: Pinging IP addresses is a
common method used by hackers to test whether the IP
address is valid. Blocking pings provides some extra security
from hackers.
Click Accept to save the settings or Cancel to discard
changes.
4-17
BASIC NETWORK SETTINGS
CONFIGURING LAN SETTINGS
4.3.2 Configuring LAN Settings
IP Address Enter the LAN port IP address.
IP Subnet Mask Enter the LAN IP subnet mask.
WINS Server IP Enter the WINS Server IP.
Use Router As DHCP Server Check this option to
enable the ENS200 internal DHCP server.
Starting IP Address Specify the starting IP
address range for the pool of allocated for private IP
addresses. The starting IP address must be on the
same subnet as the ending IP address; that is the
first three octets specified here must be the same as
the first three octets in End IP Address.
Ending IP Address Specify the ending IP address
range for the pool of allocated for private IP
addresses. The ending IP address must be on the
same subnet as the starting IP address; that is the
first three octets specified here must be the same as
the first three octets in Start IP Address.
WINS Server IP Enter the IP address of the WINS
server.
Click Accept to confirm the changes or Cancel to cancel and return previous settings.
4-18
BASIC NETWORK SETTINGS
CONFIGURING VPN PASS-THROUGH
4.3.3 Configuring VPN Pass-Through
VPN Pass-through allows a secure virtual private network (VPN) connection between two computers. Enabling the options on this
page opens a VPN port and enables connections to pass through the ENS200 without interruption.
PPTP Pass-through Check this option to enable PPTP pass-through mode.
L2TP Pass-through Check this option to enable L2TP pass-through mode.
IPSec Pass-through Check this option to enable IPSec pass-through mode.
Click Accept to confirm the changes or Cancel to cancel and return previous settings.
4-19
BASIC NETWORK SETTINGS
CONFIGURING PORT FORWARDING
4.3.4 Configuring Port Forwarding
Port forwarding enables multiple server applications on a LAN to serve clients on a WAN over a single WAN IP address. The router
accepts incoming client packets, filters them based on the destination WAN, or public, port and protocol and forwards the packets to
the appropriate LAN, or local, port. Unlike the DMZ feature, port forwarding protects LAN devices behind the firewall.
NO. Displays the sequence number of the forwarded port.
Name Displays the name of the forwarded port.
Protocol Displays the protocol to use for mapping from the following: TCP, UDP or Both.
Start Port Displays the LAN port number that WAN client packets will be forward to.
End Port Displays the port number that the WAN client packets are received.
Server IP Displays the IP address of the server for the forwarded port.
Enable Click to enable or disable the forwarded port profile
Modify Click to modify the forwarded port profile
Delete Click to delete the forwarded port profile
Click Add Entry to add port forwarding rules
Click Accept to confirm the changes.
4-20
BASIC NETWORK SETTINGS
CONFIGURING PORT FORWARDING
Service Name Enter a name for the port forwarding rule.
Protocol Select a protocol for the application: Choices are Both, TCP,
and UDP.
Starting Port Enter a starting port number.
Ending Port Enter an ending port number. All ports numbers between
the starting and ending ports will forward users to the IP address
specified in the IP Address field.
IP Address Enter the IP address of the server computer on the LAN
network where users will be redirected.
Click Save to apply the changes or Cancel to return previous settings.
4-21
BASIC NETWORK SETTINGS
CONFIGURING DEMILITARIZED ZONE
4.3.5 Configuring Demilitarized Zone
Configuring a device on the LAN as a demilitarized zone (DMZ) host allows unrestricted two-way Internet access for Internet applications, such as online video games, to run from behind the NAT firewall. The DMZ function allows the router to redirect all packets
going to the WAN port IP address to a particular IP address on the LAN. The difference between the virtual server and the DMZ function is that a virtual server redirects a particular service or Internet application, such as FTP, to a particular LAN client or server,
whereas a DMZ redirects all packets, regardless of the service, going to the WAN IP address to a particular LAN client or server.
!
WARNING!
The PC defined as a DMZ host is not protected by the firewall and is vulnerable to malicious network attacks. Do not store or
manage sensitive information on the DMZ host.
DMZ Hosting Select Enable DMZ to activate DMZ
functionality.
DMZ Address Enter an IP address of a device on
the LAN.
Click Accept to confirm the changes or Cancel to
cancel and return previous settings.
4-22
BASIC NETWORK SETTINGS
CONFIGURING WIRELESS LAN
4.4 Configuring Wireless LAN
4.4.1 Configuring Wireless Settings
Instructions on how to configure the wireless and security settings for each of the possible operating modes.
!
WARNING!
Incorrectly changing these settings may cause the device to stop functioning. Do not modify the settings in this section without a
thorough understanding of the parameters.
Access Point Mode
The ENS200 supports Access Point Mode. In this mode, users with a wireless client device within range can connect to the ENS200
to access the WLAN
4-23
BASIC NETWORK SETTINGS
ACCESS POINT MODE
Wireless Mode Wireless
mode supports 802.11b/g/n
mixed modes.
Channel HT Mode The
default channel bandwidth is
40 MHz. The larger the
channel, the better the
transmission quality and
speed.
Extension Channel Select
upper or lower channel. Your
selection may affect the Auto
channel function.
Channel / Frequency
Select the channel and
frequency appropriate for your country’s regulation.
Auto Check this option to enable auto-channel selection.
AP Detection AP Detection can select the best channel to use by scanning nearby areas for Access Points.
Current Profile Configure up to four different SSIDs. If many client devices will be accessing the network, you can arrange the
devices into SSID groups. Click Edit to configure the profile and check whether you want to enable extra SSIDs.
Click Accept to confirm the changes or Cancel to cancel and return previous settings.
4-24
BASIC NETWORK SETTINGS
ACCESS POINT MODE
SSID Specify the SSID for the current profile.
VLAN ID Specify the VLAN tag for the current profile.
Suppressed SSID Check this option to hide the SSID from
clients. If checked, the SSID will not appear in the site survey.
Station Separation Click the appropriate radio button to allow
or prevent communication between client devices.
Wireless Security See the Wireless Security section.
Click Save to accept the changes or Cancel to cancel and
return previous settings.
4-25
BASIC NETWORK SETTINGS
CLIENT BRIDGE MODE
Client Bridge Mode
Client Bridge Mode lets you connect two LAN segments via a wireless link as though they are on the same physical network. Since
the computers are on the same subnet, broadcasts reach all machines. As a result, DHCP information generated by the server reach
all client computers as though the clients residing on one physical network.
Wireless Mode Wireless mode supports 802.11b/g/n mixed
modes.
SSID Specify the SSID if known. This field is completed
automatically if you select an Access Point in the Site Survey.
Site Survey Scans nearby locations for Access Points. You
can select a discovered Access Point to establish a connection.
Prefer BSSID Enter the MAC address if known. If you select an
Access Point in the Site Survey, this field is completed
automatically.
Wireless Security See section 8.2 for information.
Click Accept to confirm the changes or Cancel to cancel and return previous settings.
Profile If you used the Site Survey, the Web Configurator
shows nearby Access Points. To connect to an Access Point,
click the Access Point’s BSSID.
Wireless Security See Configuring Wireless Security.
Click Refresh to scan again.
4-26
BASIC NETWORK SETTINGS
WDS BRIDGE MODE
WDS Bridge Mode
Unlike traditional bridging. WDS Bridge Mode allows you to create large wireless networks by linking several wireless access points
with WDS links. WDS is normally used in large, open areas, where pulling wires is cost prohibitive, restricted or physically impossible.
Wireless Mode Wireless mode supports 802.11b/g/n mixed
modes.
Channel HT Mode The default channel bandwidth is 40 MHz.
The larger the channel, the better the transmission quality and
speed.
Extension Channel Select upper or lower channel. Your
selection may affect the Auto channel function.
Channel / Frequency Select the channel and frequency
appropriate for your country’s regulation.
Click Accept to confirm the changes or Cancel to cancel and
return previous settings.
Security Select the type of WDS security: WEP or AES.
WEP Key Enter the WEP key.
AES Pass phrase Enter the AES pass phrase.
MAC Address Enter the MAC address of the Access Point to
which you want to extend wireless connectivity.
Mode Select Disable or Enable to disable or enable WDS.
Click Accept to confirm the changes or Cancel to cancel and
return previous settings.
4-27
BASIC NETWORK SETTINGS
CLIENT ROUTER MODE
Client Router Mode
In Client Router Mode, you can access the Internet wirelessly with the support of a WISP. In AP Router Mode, the ENS200 can
access the Internet via a cable or DSL modem. In this mode, the ENS200 can be configured to turn off the wireless network name
(SSID) broadcast, so that only stations that have the SSID can be connected. The ENS200 also provides wireless LAN 64/128/156bit WEP encryption security, WPA/WPA2, and WPA-PSK/WPA2-PSK authentication, as well as TKIP/AES encryption security. It also
supports VPN pass-through for sensitive data secure transmission.
Wireless Mode Wireless mode supports 802.11b/g/n mixed
modes.
SSID Specify the SSID if known. This field is completed
automatically if you select an Access Point in the Site Survey.
Site Survey Scans nearby locations for Access Points. You can
select a discovered Access Point to establish a connection.
Prefer BSSID Enter the MAC address if known. If you select an
Access Point in the Site Survey, this field is completed
automatically.
Wireless Security See Configuring Wireless Security.
Click Accept to confirm the changes or Cancel to cancel and return previous settings.
Profile If you used the Site Survey, the Web Configurator
shows nearby Access Points. To connect to an Access Point,
click the Access Point’s BSSID.
Wireless Security See Configuring Wireless Security.
Click Refresh to scan again.
4-28
BASIC NETWORK SETTINGS
CONFIGURING WIRELESS SECURITY
4.4.2 Configuring Wireless Security
The Wireless Security Settings section lets you configure the ENS200’s security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK
Mixed, WPA, WPA2, and WPA Mixed. We strongly recommend you use WPA2-PSK.
Wired Equivalent Privacy (WEP)
Security Mode Select WEP from the drop-down list to begin
the configuration.
Auth Type Select Open System or Shared.
Input Type Select an input type of Hex or ASCII.
Key Length Level of WEP encryption applied to all WEP keys.
Select a 64/128/152-bit password lengths.
Default Key Specify which of the four WEP keys the ENS200
uses as its default.
Key1 - Key4 Specify a password for the security key index. For
security, each typed character is masked by a dot.
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will drop from 802.11n to 802.11g.
4-29
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS PRE-SHARED KEY (WPA-PSK)
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)
Security Mode Select WPA-PSK from the drop-down list to
begin the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES.

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Passphrase Specify the security password. For security, each
typed character is masked by a dot.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will drops from 802.11n to 802.11g.
4-30
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS 2 PRE-SHARED KEY (WPA2-PSK)
Wi-Fi Protected Access 2 Pre-Shared Key (WPA2-PSK)
Security Mode Select WPA2-PSK from the drop-down list to
begin the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Passphrase Specify the security password. For security, each
typed character is masked by a dot.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will change from 802.11n to 802.11g.
4-31
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS PRE-SHARED KEY (WPA-PSK) MIXED
Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) Mixed
Security Mode Select WPA2-PSK Mixed from the drop-down
list to begin the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Radius Server Specify the IP address of the RADIUS server.
Radius Port Specify the port number that your RADIUS server
uses for authentication. Default port is 1812.
Radius Secret Specify RADIUS secret furnished by the
RADIUS server.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
Radius Accounting
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
WPA-PSK Mixed can allow multiple security modes at the same time.
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will change from 802.11n to 802.11g.
4-32
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS (WPA)
Wi-Fi Protected Access (WPA)
Security Mode Select WPA from the drop-down list to begin
the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Radius Server Specify the IP address of the RADIUS server.
Radius Port Specify the port number that your RADIUS server
uses for authentication. Default port is 1812.
Radius Secret Specify RADIUS secret furnished by the
RADIUS server.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
4-33
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS (WPA)
Radius Accounting Select to enable or disable RADIUS
accounting.
Radius Accounting Port Specify the port number that your
RADIUS accounting server uses for authentication. Default port
is 1812.
Radius Accounting Secret Specify RADIUS accounting
secret furnished by the RADIUS server.
Interem Accounting Interval Specify the interem accounting
interval (60 - 600 seconds).
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will drops from 802.11n to 802.11g.
4-34
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS 2 (WPA2)
Wi-Fi Protected Access 2 (WPA2)
Security Mode Select WPA from the drop-down list to begin
the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Radius Server Specify the IP address of the RADIUS server.
Radius Port Specify the port number that your RADIUS server
uses for authentication. Default port is 1812.
Radius Secret Specify RADIUS secret furnished by the
RADIUS server.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
4-35
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS 2 (WPA2)
Radius Accounting Select to enable or disable RADIUS
accounting.
Radius Accounting Port Specify the port number that your
RADIUS accounting server uses for authentication. Default port
is 1812.
Radius Accounting Secret Specify RADIUS accounting
secret furnished by the RADIUS server.
Interem Accounting Interval Specify the interem accounting
interval (60 - 600 seconds).
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will drops from 802.11n to 802.11g.
4-36
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS (WPA) MIXED
Wi-Fi Protected Access (WPA) Mixed
Security Mode Select WPA from the drop-down list to begin
the configuration.
Encryption Select Both, TKIP, or AES as the encryption type.

Both = uses TKIP and AES

TKIP = automatic encryption with WPA-PSK; requires
passphrase.

AES = automatic encryption with WPA2-PSK; requires
passphrase.
Radius Server Specify the IP address of the RADIUS server.
Radius Port Specify the port number that your RADIUS server
uses for authentication. Default port is 1812.
Radius Secret Specify RADIUS secret furnished by the
RADIUS server.
Group Key Update Interval Specify how often, in seconds, the
group key changes.
4-37
BASIC NETWORK SETTINGS
WI-FI PROTECTED ACCESS (WPA) MIXED
Radius Accounting Select to enable or disable RADIUS
accounting.
Radius Accounting Port Specify the port number that your
RADIUS accounting server uses for authentication. Default port
is 1812.
Radius Accounting Secret Specify RADIUS accounting
secret furnished by the RADIUS server.
Interem Accounting Interval Specify the interem accounting
interval (60 - 600 seconds).
Click Save to save the changes or Cancel to cancel and return
previous settings.
Note:
802.11n does not allow WEP/WPA-PSK/WPA-PSK TKIP security
mode. The connection mode will drops from 802.11n to 802.11g.
4-38
BASIC NETWORK SETTINGS
CONFIGURING WIRELESS MAC FILTER
4.4.3 Configuring Wireless MAC Filter
Note:
This section applies to Access Point and WDS Access point mode.
Wireless MAC Filters are used to allow or deny network access to wireless clients according to their MAC addresses. You can manually add a MAC address to restrict the permission to access ENS200. The default setting is Disable Wireless MAC Filters.
ACL Mode Determines whether network access is granted or
denied to clients whose MAC addresses appear in the MAC
Address table on this page. Choices are Disable, Deny MAC in
the list, or Allow MAC in the list.
MAC Address Filter Enter the MAC address of the device.
Click Add to add the MAC address to the MAC Address table.
Click Apply to apply the changes.
4-39
BASIC NETWORK SETTINGS
CONFIGURING WDS LINK SETTINGS
4.4.4 Configuring WDS Link Settings
Using WDS Link Settings, you can create a wireless backbone link between multiple access points that are part of the same wireless
network. This allows a wireless network to be expanded using multiple Access Points without the need for a wired backbone to link
them, as is traditionally required.
Security Select the type of WDS security: WEP or AES.
WEP Key Enter the WEP key.
AES Passphrase Enter the AES passphrase.
MAC Address Enter the MAC address of the Access Point to
which you want to extend wireless connectivity.
Mode Select Disable or Enable to disable or enable WDS.
Click Accept to confirm the changes or Cancel to cancel and
return previous settings.
Note:
The Access Point to which you want to extend wireless connectivity
must enter the ENS200’s MAC address into its configuration. For
more information, refer to the documentation for the Access Point. Not
all Access Point supports this feature.
4-40
BASIC NETWORK SETTINGS
CONFIGURING ADVANCED NETWORK SETTINGS
Enable Traffic Shaping Check this option to enable wireless
traffic shaping. Traffic shaping regulates the flow of packets
leaving an interface to deliver improved Quality of Service.
Incoming Traffic Limit Specify the wireless transmission
speed used for downloading.
Outgoing Traffic Limit Specify the wireless transmission
speed used for uploading.
Click Accept to confirm the changes or Cancel to cancel and
return previous settings.
4-42
BASIC NETWORK SETTINGS
MANAGEMENT SETUP
4.5 Management Setup
The Management section lets you configure administration, management VLAN, SNMP settings, backup/restore settings, firmware
upgrade, time settings, and log settings. This chapter describes these settings.
4.5.1 Configuring Administrator Account
Click the Administration link under the Management menu to change the user name and password used to log on to the ENS200
Web Configurator. The default user name is admin and the default password is admin. Changing these settings protects the
ENS200 configuration settings from being accessed by unauthorized users.
Name Enter a new username for logging in to the Web
Configurator.
Password Enter a new password for logging in to the Web
Configurator
Confirm Password Re-enter the new password for
confirmation.
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-43
BASIC NETWORK SETTINGS
CONFIGURING ADMINISTRATOR ACCOUNT
Remote Management Enable or disable remote management.
Remote Upgrade Specify whether the ENS200 firmware can
be upgraded remotely.
Remote Management Port If remote management is enabled,
enter the port number to be used for remote management. For
example: If you specify the port number 8080, enter http://
<IP address>:8080 to access the ENS200 Web
Configurator.
Click Accept to apply the changes or Cancel to return
previous settings.
4-44
BASIC NETWORK SETTINGS
CONFIGURING MANAGEMENT VLAN
4.5.2 Configuring Management VLAN
Click the Management VLAN link under the Management menu to assign a VLAN tag to the packets. A VLAN is a group of computers
on a network whose software has been configured so that they behave as if they were on a separate Local Area Network (LAN).
Computers on VLAN do not have to be physically located next to one another on the LAN
Management VLAN ID If your network includes VLANs and if
tagged packets need to pass through the Access Point, enter
the VLAN ID. Otherwise, click No VLAN tag.
Click Accept to confirm the changes or Cancel to cancel and
return previous settings.
Note:
If you reconfigure the Management VLAN ID, you may lose your connection to the ENS200. Verify that the DHCP server supports the
reconfigured VLAN ID and then reconnect to the ENS200 using the
new IP address.
4-45
BASIC NETWORK SETTINGS
CONFIGURING SNMP
4.5.3 Configuring SNMP
SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
SNMP Enable or disable the ENS200 SNMP function.
Contact Enter the contact details of the device.
Location Enter the location of the device.
Community Name (read only) Enter the password for
accessing the SNMP community for read-only access.
Community Name (read/write) Enter the password for
accessing the SNMP community for read and write access.
Trap Destination Address Enter the IP address where SNMP
traps are to be sent.
Trap Destination Community Name Enter the password of
the SNMP trap community.
4-46
BASIC NETWORK SETTINGS
CONFIGURING SNMP
SNMPv3
User Name
Auth Protocol
Auth Key (8-32 characters)
Priv Protocol
Priv Key (8-32 characters)
Engine ID
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-47
BASIC NETWORK SETTINGS
CONFIGURING BACKUP/RESTORE SETTINGS
4.5.4 Configuring Backup/Restore Settings
Click the Backup/Restore Setting link under the Management menu to save the ENS200’s current settings in a file on your local disk
or load settings onto the device from a local disk. This feature is particularly convenient administrators who have several ENS200
devices that need to be configured with the same settings.
This page also lets you return the ENS200 to its factory default settings. If you perform this procedure, any changes made to the
ENS200 default settings will be lost.
Save A Copy of Current Settings Click Backup to save the
current configured settings.
Restore Saved Settings from a File To restore settings that
have been previously backed up, click Browse, select the file,
and click Restore.
Revert to Factory Default Settings Click this button to restore
the ENS200 to its factory default settings.
4-48
BASIC NETWORK SETTINGS
CONFIGURING FIRMWARE UPGRADE
4.5.5 Configuring Firmware Upgrade
Firmware is system software that operates and allows the administrator to interact with the router.
!
WARNING!
Upgrading firmware through a wireless connection is not recommended. Firmware upgrading must be performed while connected
to an Ethernet (LAN port) with all other clients disconnected.
The firmware upgrade procedure can take several minutes. Do not power off the ENS200 during the firmware upgrade, as it can cause the
device to crash or become unusable.
To update the firmware version, follow these steps:
1. Download the appropriate firmware approved by EnGenius Networks from an approved web site.
Note:
Save the firmware file to a local hard drive.
2. Click Choose File.
3. Browse the file system and select the firmware file.
4. Click Upload.
5. The ENS200 restarts automatically after the upgrade
completes.
4-49
BASIC NETWORK SETTINGS
CONFIGURING SYSTEM TIME
4.5.6 Configuring System Time
Change the system time of the ENS200 and setup automatic updates through a network time (NTP) protocol server or through a PC.
Manually Set Date and Time Manually specify the date and
time.
Synchronize with PC Click this button to get the date and time
settings from the administrator’s PC.
Automatically Get Date and Time Select a time zone from the
drop-down list and check whether you want to enter the IP
address of an NTP server or use the default NTP server.
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-50
BASIC NETWORK SETTINGS
CONFIGURING COMMAND LINE INTERFACE
4.5.7 Configuring Command Line Interface
Most users will configure the ENS200 through the graphical user interface (GUI). However, for those who prefer an alternative
method there is the command line interface (CLI). The CLI can be access through a command console, modem or Telnet connection.
CLI Select to enable or disable the ability to modify the ENS200
via a command line interface (CLI).
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-51
BASIC NETWORK SETTINGS
CONFIGURING LOGGING
4.5.8 Configuring Logging
Display a list of events that are triggered on the ENS200 Ethernet and wireless interfaces. You can consult this log if an unknown
error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.
Syslog Enable or disable the ENS200 syslog function.
Log Server IP Address Enter the IP address of the log server.
Local Log Enable or disable the local log service.
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-52
BASIC NETWORK SETTINGS
CONFIGURING DIAGNOSTICS
4.5.9 Configuring Diagnostics
The diagnosis feature allow the administrator to verify that another device is available on the network and is accepting request packets. If the ping result returns alive, it means a device is on line. This feature does not work if the target device is behind a firewall or
has security software installed.
Target IP Enter the IP address you would like to search.
Ping Packet Size Enter the packet size of each ping.
Number of Pings Enter the number of times you want to ping.
Start Ping Click Start Ping to begin pinging.
Trace route Target Enter an IP address or domain name you
want to trace.
Start Trace route Click Start Trace route to begin the trace
route operation.
Target Address Enter the IP address of the target PC.
Time Period Enter time period for the speed test.
Check Interval Enter the interval for the speed test.
Start Speed Test Click Start Speed Test to begin the speed test
operation.
4-53
BASIC NETWORK SETTINGS
VIEWING DEVICE DISCOVERY
4.5.10 Viewing Device Discovery
Device Name Displays the name of the devices connected to
the network of the ENS200.
Operation Mode Displays the operation mode of the devices
connected to the network of the ENS200.
IP Address Displays the IP address of the devices connected
to the network of the ENS200.
System MAC Address Displays the system MAC address of
the devices connected to the network of the ENS200.
Firmware Version Displays the firmware version of the devices
connected to the network of the ENS200.
4-54
BASIC NETWORK SETTINGS
CONFIGURE DENIAL OF SERVICE PROTECTION
4.5.11 Configure Denial of Service Protection
Use TCP SYN Cookies Protection Click to enable TCP SYN
cookies protection.
SYN Flood Attack Protection Click to enable or disable SYN
Flood Attack Protection.
Match Interval Per Second Enter the allowed number of
packets per second.
Limit Packets Enter the maximum number of packets
allowed per request.
UDP Flood Attack Protection Click to enable or disable UDP
Flood Attack Protection.
Match Interval Per Second Enter the allowed number of
packets per second.
Limit Packets Enter the maximum number of packets
allowed per request.
Ping Attack Protection Click to enable or disable ping attack
protection.
Click Save/Apply to apply the changes or Cancel to return
previous settings.
4-55
BASIC NETWORK SETTINGS
LOGGING OUT
4.5 Logging Out
Click Logout to logout from the ENS200.
4-56
APPENDIX A
FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT
Appendix A
Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This
equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/TV technician for help.
!
WARNING!
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to
operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not
cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
FCC Radiation Exposure Statement
A-1
APPENDIX A
FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT
Important:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph
(d)(2).
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment
should be installed and operated with minimum distance 20cm between the radiator & your body
A-2
APPENDIX B
INDUSTRY CANADA STATEMENT
Appendix B
Industry Canada Statement
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This
device may not cause harmful interference, and (2) this device must accept any interference received, including interference that
may cause undesired operation.
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement indésirable.
Important:
Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be
installed and operated with minimum distance 20cm between the radiator & your body.
Déclaration d'exposition aux radiations:
Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit
être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps.
B-1
APPENDIX C
WORLDWIDE TECHNICAL SUPPORT
Appendix C
WorldWide Technical Support
REGION/COUNTRY OF PURCHASE
SERVICE CENTRE
SERVICE INFORMATION
CANADA
Canada
LOS ANGELES, USA
USA
Mexico, Central and Southern America
MIAMI, USA
C-1
web site
www.engeniuscanada.com
email
rma@engeniuscanada.com
contact numbers
Toll Free: (+1) 888-397-2788
Local: (+1) 905-940-8181
hours of operation
Monday - Friday
9:00AM to 5:30PM EST (GMT-5)
web site
www.engeniustech.com
email
support@engeniustech.com
contact numbers
Toll Free: (+1) 888-735-7888
Local: (+1) 714-432-8668
hours of operation
Monday - Friday
8:00 AM to 4:30 PM PST (GMT-8)
web site
[ES] es.engeniustech.com
[PT] pg.engeniustech.com
email
miamisupport@engeniustech.com
APPENDIX C
WORLDWIDE TECHNICAL SUPPORT
REGION/COUNTRY OF PURCHASE
SERVICE CENTRE
SERVICE INFORMATION
NETHERLANDS
Europe
Africa
Middle East
Russia
CIS / Armenia, Azerbaijan, Belarus,
Georgia, Kazakhstan, Kyrgyzstan,
Moldova, Tajikistan,
Turkmenistan, Ukraine,
Uzbekistan
Turkey
Afghanistan
Pakistan
Bangladesh, Maldives,
Nepal, Bhutan, Sri Lanka
DUBAI, UAE
C-2
contact numbers
Miami: (+1) 305-887-7378
Sao Paulo, Brazil: (+55)11-3957-0303
D.F., Mexico:(+52)55-1163-8894
hours of operation
Monday - Friday
8:00 AM to 5:30PM EST (GMT-5)
web site
www.engeniusnetworks.eu
email
support@engeniusnetworks.eu
contact numbers
(+31) 40-8200-887
hours of operation
Monday - Friday
9:00 AM - 5:00 PM (GMT+1)
web site
www.engenius-me.com
email
support@engenius-me.com
contact numbers
Toll Free:
U.A.E.: 800-EnGenius
800-364-364-87
General:
(+971) 4357-5599
hours of operation
Sunday - Thursday
9:00 AM - 6:00 PM (GMT+4)
APPENDIX C
WORLDWIDE TECHNICAL SUPPORT
REGION/COUNTRY OF PURCHASE
Singapore, Cambodia,
Indonesia, Malaysia,
Thailand, Philippines,
Vietnam
China, Hong Kong, Korea
India
South Africa
Oceania
SERVICE CENTRE
SERVICE INFORMATION
SINGAPORE
TAIWAN, R.O.C.
web site
www.engeniustech.com.sg/e_warranty_form
email
techsupport@engeniustech.com.sg
contact numbers
Toll Free:
Singapore: 1800-364-3648
hours of operation
Monday - Friday
9:00 AM - 6:00 PM (GMT+8)
web site
www.engeniusnetworks.com
email
technology@senao.com
Others
Note:
* Service hours are based on the local time of the service center.
* Please visit the website for the latest information about customer service.
C-3
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising