Professional Documents
Culture Documents
ACT Mod 2 Altai AP Basic Config v3.1 20200911
ACT Mod 2 Altai AP Basic Config v3.1 20200911
___________________________________________________________________________
Version 3.0
Sep, 2020
Training Contents
* * *
802.3af PoE
802.3at PoE
Power
Supply # #
Passive PoE 56V 54V 56V 56V 54V 56V 24V 18V
12-24V via
12V via 12-24V via
DC Input Terminal
DC Jack DC Jack
Block
Max. Power Consumption 65W 20W 25W 20W 11.7W 12W 25W 12W 8W 12W
4
Power Up Your AP Device via PoE Standards (Active PoE)
AP (PD)
802.3af/at-Compatible PoE Switch
(PSE)
TERMINOLOGY:
5
Power Up Your AP Device via Passive PoE
AP (PD)
DATA & Power
Out / PoE
DC Jack
PoE Injector
IEC C13
Connector
ETH0 (PoE IN)
Applicable to A8n(ac) Applicable to
Series, AX500 Series, C2s/C1n/C1an
A3Ei/A3c/A3w, A2(ac)
Series, and CX200
Positive: 0V
Negative: -48V
6
Power Up Your AP Device via DC Input
ETH0
DC Jack
V-
ETH0
V+ DC Terminal
Block
7
INITIAL ACCESS TO AP WEB UI
Change TCP/IP Setting on Your Computer
IP Address Any address in the subnet 192.168.1.x, except 192.168.1.222 and 192.168.1.255
Example: 192.168.1.2
Subnet Mask 255.255.255.0
Default Gateway/Router Leave it blank
DNS Leave it blank
9
Access AP Web UI
Procedures:
Username: admin
Password: admin
10
Menu Tabs & Frequently-Used Function Buttons/Shortcuts
2. Reboot AP 3. Logout
4. Firmware Version
1. Menu Tabs
5. Uptime
8. Download Logs
9. Submit
1. Menu Tabs: Each tab corresponds to an individual content page for 6. Unsaved Changes: Review all configuration changes that have been
various AP functions. e.g. monitoring, configuration, administration, submitted but not yet applied. You can discard the changes if needed.
troubleshooting tools, and AP device information.
7. Save & Apply: Apply the previously submitted configurations to the AP
2. Reboot AP: Reboot the AP manually
8. Download Logs: Retrieve ALL logs such as syslog, wifi log and event log
3. Logout the current session in a single package file
4. Current Firmware Version 9. Submit: Temporarily store the configurations made on a single
configuration page. The configurations is not yet applied to the AP until
5. Current Uptime
you click “Save & Apply”
CONFIGURE IP ADDRESS OF ACCESS POINT
Option 1: Static IP Settings
Network Scenario:
PC
IP: 192.168.100.2/24
AP L2 SW Gateway
IP: 192.168.100.30/24 IP: 192.168.100.1/24
Procedures:
• Now you can change your computer’s IP to 192.168.100.100 with subnet mask 255.255.255.0. You should be able to use the new IP address to access
the AP. Go to Status > Overview > Network. It should show the new IP address settings.
14
Option 2: DHCP Client Settings
Network Scenario:
DHCP Server
AP
IP: 192.168.100.x/24
x from .30 to .40
L2 SW
Gateway
PC: IP: 192.168.100.1/24
IP: 192.168.100.2/24
Procedures:
For DHCP case, we may not know what the exact IP address the AP
4. Click “Submit” button.
obtains, unless we go to the DHCP server to look up the IP lease table. Since
5. Click Save and Apply to apply all configurations. the IP is unknown, we have to use a secondary IP to access AP instead.
Verification By Secondary IP Address
Network Scenario:
AP PC
IP: 192.168.99.x/24 IP: 192.168.99.2/24
L2 SW
Procedures:
4. Go to Status > Overview > Network. It should In our case, the AP’s Ethernet MAC address is 00:19:be:a3:09:20. The last byte is 20 (HEX). Convert it
show Success to obtain an IP address from into a decimal value, which is 32. Therefore the secondary IP of this AP is 192.168.99.32.
Exceptions:
Some of the IP addresses are invalid or reserved for particular purposes. If the last byte of MAC address is 00/01/02/03/04/FF, we shall follow a specific
MAC-to-IP-address mapping according to the table below.
Ethernet MAC Address Reserved Purpose Last MAC Byte Replaced By Secondary IP Address
XX:XX:XX:XX:XX:00 Invalid IP A0 192.168.99.160
XX:XX:XX:XX:XX:01 For gateway A1 192.168.99.161
XX:XX:XX:XX:XX:02 For operator computer A2 192.168.99.162
XX:XX:XX:XX:XX:03 For operator computer A3 192.168.99.163
XX:XX:XX:XX:XX:04 For operator computer A4 192.168.99.164
XX:XX:XX:XX:XX:FF Invalid IP AF 192.168.99.175
17
NETWORK MODE: SWITCH VS GATEWAY
Network Mode: Switch Mode vs Gateway Mode
Network Interfaces:
• Ethernet, i.e. Eth0, Eth1
• 2.4G (Radio0)
➢ WLAN0 – WLAN15
• 5G (Radio 1)
➢ WLAN0 – WLAN15
Network Scenario:
LAN LAN
IP: 192.168.10.10 Public IP
IP: 192.168.20.10
L2
IP: 192.168.10.11
20
Switch Mode
Procedures:
NOTE:
21
Gateway Mode
Procedures:
NOTE:
22
RADIO MODE: AP, STATION, REPEATER & BRIDGE
AP Mode
• Advertises SSIDs so that the wireless clients are able to see it and to join the network.
LAN
24
Station Mode
• Works as a CPE (Customer Premises Equipment) to connect with a remote AP for WDS (Wireless Distribution System) bridge.
• Compared to AP mode, it does not advertise any SSID, but search a target SSID for connection instead.
• By using the AP-STA pair, we can bring two wired networks together. In general, the Station/CPE mode should be used on the remote network (client
side) and the AP mode on the local network (server side) for the sake of network access control and management.
C1an C1n
Station Mode Station Mode
C1n C1an
Station Mode Station Mode
LAN
25
Repeater Mode
• Works as a relay station to pass data traffic between a remote AP and wireless clients.
• It is a mix of AP and Station modes. On one hand, it runs on Station mode to connect to the remote AP for wireless backhaul. On the other hand, it
runs on AP mode to advertise SSIDs to provide WiFi access to the end devices. Therefore, it is commonly used for coverage extension purpose while
wired backhaul is not available at sites.
• Due to the fact that WiFi, based on the 802.11 standards, is a half-duplex access medium by nature, the radio is not able to send/receive data
packets with AP and end devices at the same time. Put it in other words, the Repeater will use a double of time to process a data stream when
compared to other radio modes, i.e. AP, Station and Bridge. Therefore, the actual throughput is usually lower.
26
Bridge Mode
• Also called static bridge or MAC bridge, enables two devices to connect together over the air for layer 2 network (LAN) extension.
• Same as AP-STA pair, it forms a WDS which makes the bridge transparent to any layer 2 communication between the two Ethernet segments.
• The only difference is that a static bridge can be used for Point-to-Point (P2P) link only while an AP-STA bridge can be deployed on Point-to-
Multipoint (P2MP) configuration. Since the bridge setup requires the peer’s MAC, it is regarded as static bridge instead of dynamic, meaning that the
device does not pair with other devices under any circumstances.
Local A2 Remote A2
Bridge Mode Bridge Mode
LAN LAN
27
CONFIGURE AP MODE
Demo: Network Scenario for AP Mode
Internet
Wireless Clients
DHCP: 192.168.100.100 – .200 GW
GW: 192.168.100.1 IP: 192.168.100.1/24
DHCP Server Enabled
AP Configuration Summary
WLAN0 WLAN1
SSID Name Altai Guest Altai Staff
WPA2-Enterprise (RADIUS)
WPA2-Personal (PSK)
Authentication • Server: 192.168.10.100
• Passphrase: altaiPSK123
• Secret: altairadius123
AP Management Disabled Full Access
Bandwidth Control 5 Mbps/User 10 Mbps/User
29
Step 1: Scan Channels to Select the Best Channels
Channel Scan is performed in order to choose the good channel(s) for WLAN operation. The key consideration to choose a good channel is to find one
which has relatively low busy %, low noise floor, and low No. of AP. For 2.4 GHz channel, try to select one in combination of channels 1,6 and 11, or
channels 2, 7, 12, or channels 3, 8, 13 for static channel operation. Or alternatively, choose the entire combination (3 channels together) for AP auto
channel switching.
Procedures:
NOTE:
Procedures:
Procedures:
for both Uplink and Downlink. to limit bandwidth for the entire WLAN traffic.
32
Step 3-1: Configure WLAN Settings for Guest SSID
Procedures:
33
Step 3-2: Configure WLAN Settings for Staff SSID
Procedures:
34
Step 3-2: Configure WLAN Settings for Staff SSID
Procedures:
35
Step 3-2: Configure WLAN Settings for Staff SSID
Procedures:
36
Step 3-2: Configure WLAN Settings for Staff SSID
Procedures:
NOTE:
37
Verification
Get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” respectively, and go through the checklist below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
38
Verification
39
CONFIGURE STATION MODE
Demo: Network Scenario for Station Mode
GW
PC IP: 192.168.100.1/24
DHCP: 192.168.100.100 - .200 DHCP Server Enabled
GW: 192.168.100.1
41
Distance Setting
For a Point to Pont (P2P) or a Point to Multi-Points (P2MP) networks, if the link distance exceeds 2km, you SHOULD set a proper value for the distance
parameter on ALL the devices with the following rules.
2. The default value is 2km. If the actual distance between the two devices are less than 2 km, just leave it as default.
3. The distance value SHOULD be rounded up to the nearest integer. For example, if the actual distance is 4.3 km, we should set the distance
to 5 km.
4. For a P2MP configuration, the distance between the AP and the stations may be different from each other. In this case, the distance value of
ALL the devices in the P2MP group, including the AP and Stations, MUST be set to the largest one. An example scenario
is shown below. We should set the distance to 4 km for ALL of them even though the actual distance is shorter for some of the links.
A2e Station 1
1 km
A2e Station 2
2 km
A2e Station 3
4 km
A8-Ein(ac) AP
42
Step 1: Configure Distance for AP
NOTE:
Procedures:
43
Step 2: Configure Radio Settings for STA
Procedures:
44
Step 3-1: Configure STA WLAN Settings for Guest SSID Association
Procedures:
3. Click “[Scan]”.
45
Step 3-1: Configure STA WLAN Settings for Guest SSID Association
Procedures:
46
Step 3-1: Configure STA WLAN Settings for Guest SSID Association
Procedures:
47
Step 3-1: Configure STA WLAN Settings for Guest SSID Association
Procedures:
48
Step 3-2: Configure STA WLAN Settings for Staff SSID Association
Procedures:
3. Click “[Scan]”.
49
Step 3-2: Configure STA WLAN Settings for Staff SSID Association
Procedures:
50
Step 3-2: Configure STA WLAN Settings for Staff SSID Association
Procedures:
51
Step 3-2: Configure STA WLAN Settings for Staff SSID Association
Procedures:
52
Step 4: Configure Distance for Station
Procedures:
53
Verification
Get a PC to connect with the Station via Ethernet cable. Go through the checklist below for the cases where the Station is associating to the SSIDs “Altai
Guest” and “Altai Staff” respectively.
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the AP’s access right is NOT granted to the PC which is using guest connection via the station device.
54
Verification (Guest SSID Association)
55
Verification (Guest SSID Association)
56
Verification (Guest SSID Association)
Connect a computer to Station via Ethernet and you should found the AP inaccessible via Web UI (HTTP/HTTPS) or SSH.
57
Verification (Staff SSID Association)
58
Verification (Staff SSID Association)
59
Verification (Staff SSID Association)
Connect a computer to Station via Ethernet and you should be able to access AP via Web UI (HTTP/HTTPS) or SSH.
60
CONFIGURE REPEATER MODE
Demo: Network Scenario for Repeater Mode
Repeater
Switch Mode Internet
IP: 192.168.100.40/24
GW: 192.168.100.1
GW
IP: 192.168.100.1/24
Wireless Client DHCP Server Enabled
DHCP: 192.168.100.100 - .200
GW: 192.168.100.1
NOTE:
63
Step 2: Configure Radio Settings for Repeater
Procedures:
64
Step 3: Configure Station Settings for Repeater
Procedures:
65
Step 3: Configure Station Settings for Repeater
Procedures: Repeater
3. Fill out the target Remote SSID. In our scenario,
it is Altai Backhaul.
66
Step 3: Configure Station Settings for Repeater
Procedures:
67
Step 4: Configure AP Settings for Repeater
Procedures:
68
Verification (Backhaul Status)
69
Verification (Client Association)
Get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” via Repeater respectively, and go through the checklist below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
70
Verification (Client Association)
Check from the Repeater End, and go to Status > Radio0(2.4G)/Radio1(5G) > Association List > Station List.
71
CONFIGURE BRIDGE MODE
Demo: Network Scenario for Bridge Mode
Internet
Legend Wireless Client
DHCP: 192.168.100.100 - .200 GW
Altai Guest GW: 192.168.100.1 IP: 192.168.100.1/24
Altai Staff DHCP Server Enabled
5G Static Bridge
Local Bridge/Remote Bridge 5G Configuration Summary Remote Bridge 2.4G Configuration Summary
Wireless Mode Same for both WLAN0 WLAN1
Channel Same for both SSID Name Altai Guest Altai Staff
Remote MAC Address Remote 5G MAC WPA2-Enterprise (RADIUS)
WPA2-Personal (PSK)
Authentication • Server: 192.168.10.100
Cipher Mode AES • Passphrase: altaiPSK123
• Secret: altairadius123
AP Management Disabled Full Access
Bandwidth Control 5 Mbps/User 10 Mbps/User
73
Step 1: Scan Channels to Select the Best Channels
Channel Scan is performed in order to choose the good channel(s) for WLAN operation. The key consideration to choose a good channel is to find one
which has relatively low busy %, low noise floor, and low No. of AP.
Procedures:
The Bridge mode basically sets a Point-to-Point connection between two devices using their 5G MAC address for mutual authentication.
Procedures:
75
Step 3: Configure Radio Settings for Bridge
Procedures:
7.
76 Click “Submit” button.
Step 4: Configure Remote Bridge 5G MAC Information
Procedures:
77
Step 5: Configure AES Encryption
Procedures:
78
Step 6: Configure Distance
Procedures:
NOTE:
79
Verification
✓ Check if you can access the remote bridge peer from the local-end network
To test network access over the bridge, get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” respectively, and go through the checklist
below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the access right to remote bridge is granted to staff client only
80
Verification (Bridge Status)
81
Enable VLAN Configuration
Introduction to VLAN
• VLAN (Virtual Local Area Network) is a Layer 2 feature that allows you to logically divide a LAN into multiple subnets such that downstream hosts are
separated into distinct broadcast domains.
• Only those which belong to the same VLAN (same broadcast domain) can directly communicate to each other.
• To achieve the purpose of logical network segmentation, we can assign different VLAN ID tags (based on 802.1Q) to the Ethernet frame headers for
identifying different network traffic. AP and other neighboring layer 2 devices will look at the VLAN ID tags and have corresponding packet
processing and switching, so as to keep different VLAN traffic isolated from each other while sharing the same physical connection environment.
• There are two VLAN modes for interface operation: 1) Access mode; 2) Trunk mode
83
CONFIGURE VLAN FOR AP MODE
Demo: Network Scenario for AP Mode
AP
SSID-VLAN Mapping Switch Mode RADIUS Server
Mgmt IP: 192.168.100.30/24 IP: 192.168.10.100
WLAN VLAN Mgmt VLAN: 100 RADIUS Client: 192.168.100.30
GW: 192.168.100.1 RADIUS Secret: altairadius123
Altai Staff VLAN 150 (Service) GW
Altai Guest VLAN 160 (Service) VLAN 10: 192.168.10.1
Trunk
(VLAN 100, 150, 160) Internet
Wireless Clients GW
Staff: 192.168.150.2 – .254 VLAN 100: 192.168.100.1/24
Guest: 192.168.160.2 – .254 VLAN 150: 192.168.150.1/24
VLAN 160: 192.168.160.1/24
DHCP Server Enabled on VLAN 150 & 160
VLAN Configuration Summary
Interface Ethernet WLAN0 (Altai Guest) WLAN1 (Altai Staff)
Trunk (VLAN 1, 100, 150, 160); OR
VLAN Type Access VLAN 160 Access VLAN 150
Trunk ALL
Remark:
1. VLAN 100 is Management VLAN. In such case, Guest or Staff clients cannot access AP directly unless inter-VLAN routing is enabled at the gateway.
2. To allow various VLAN traffic to pass through between the AP and the neighboring switch or gateway, the counterpart of the switch or gateway
should be configured to be running in “Trunk” mode allowing VLAN 100, 150 and 160 as well.
3. VLAN 10 and VLAN 100 are inter-reachable by gateway configuration so that the AP can communicate with the RADIUS server for Staff auth.
85 VLAN 1 serves as Native VLAN.
4.
Step 1: Enable VLAN Feature
Procedures:
2. Enable VLAN.
86
Step 2: Add New VLAN Profiles
Procedures:
NOTE:
87
Step 3: Select Management VLAN
Procedures:
NOTE:
88
Step 4: Configure Trunk Mode for Backhaul Interfaces
Procedures:
89
Step 4: Configure Trunk Mode for Backhaul Interfaces
NOTE:
PVID: Port VLAN ID, which is the default VLAN specifically assigned for untagged frames (Native VLAN) which is received at the trunk interface for AP
operation.
By default, PVID is set to VLAN 1, as it is the most common setting as native VLAN for all the other network nodes.
Default VLAN Tagging: Used with “PVID”. If selected, AP will add the tag of PVID to those untagged frames leaving the interface. By default, the box is
unchecked. Thus, the frames which are of PVID will be untagged when they leave the trunk interface.
Incoming
VLAN VLAN VLAN VLAN VLAN VLAN VLAN
Payload Payload Payload Payload Payload Payload Payload Payload
160 150 100 160 1 150 100
Procedures:
91
Step 5: Configure Access Mode for End-Device Connection
Procedures:
92
Configuration Summary
93
Verification
Get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” respectively, and go through the checklist below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server on different VLANs
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the access right is NOT granted to anyone including staff unless inter-VLAN routing is allowed at the gateway
94
Verification
95
CONFIGURE VLAN FOR STATION MODE
Demo: Network Scenario for Station Mode – Case 1
• Case 1: Associate the station device to either staff SSID or guest SSID.
• No VLAN configuration is required on the Station end, meaning that the management traffic of the station itself and the user data traffic of the
computers sitting behind belong to the same VLAN, either VLAN 150 or 160 depending on the SSID the station is connecting to.
• Suitable for the case for BYOD. No management required for station devices, just like ordinary clients.
Remote AP
Legend Switch Mode RADIUS Server
Mgmt IP: 192.168.100.30/24 IP: 192.168.10.100
Altai Guest Mgmt VLAN: 100 RADIUS Client: 192.168.100.30
GW: 192.168.100.1 RADIUS Secret: altairadius123
Altai Staff
GW
Station VLAN 10: 192.168.10.1
Switch Mode
Staff: 192.168.150.2 – .254
Trunk
Guest: 192.168.160.2 – .254
(VLAN 100, 150, 160) Internet
GW
PC VLAN 100: 192.168.100.1/24
Staff: 192.168.150.2 – .254 VLAN 150: 192.168.150.1/24
Guest: 192.168.160.2 – .254 VLAN 160: 192.168.160.1/24
DHCP Server Enabled on VLAN 150 & 160
97
Demo: Network Scenario for Station Mode – Case 2
• Case 2: Associate the station device to trunk SSIDs in order to separate Station management traffic from user data traffic.
• Suitable for the case that you want to put the station device as part of WiFi infrastructure.
SSID-VLAN Mapping
WLAN VLAN
Remote AP
Altai Staff VLAN 150 (Service) + VLAN 100 (Mgmt) RADIUS Server
Switch Mode
Altai Guest VLAN 160 (Service) + VLAN 100 (Mgmt) Mgmt IP: 192.168.100.30/24 IP: 192.168.10.100
Mgmt VLAN: 100 RADIUS Client: 192.168.100.30
GW: 192.168.100.1 RADIUS Secret: altairadius123
GW
Station VLAN 10: 192.168.10.1
Switch Mode
Mgmt IP: 192.168.100.40
Trunk
Mgmt VLAN: 100
(VLAN 100, 150, 160) Internet
GW: 192.168.100.1
GW
PC VLAN 100: 192.168.100.1/24
Staff: 192.168.150.2 – .254 VLAN 150: 192.168.150.1/24
Guest: 192.168.160.2 – .254 VLAN 160: 192.168.160.1/24
DHCP Server Enabled on VLAN 150 & 160
Access VLAN
150 / VLAN 160
98
Demo: Network Scenario for Station Mode – Case 2
Remark:
1. VLAN 100 is Management VLAN. In such case, Guest or Staff clients sitting behind the Station cannot access AP and Station directly unless inter-VLAN
routing is enabled at the gateway.
2. To allow various VLAN traffic to pass through between the AP and the neighboring switch or gateway, the counterpart of the switch or gateway
should be configured to be running in “Trunk” mode allowing VLAN 100, 150 and 160 as well.
3. VLAN 10 and VLAN 100 are inter-reachable by gateway configuration so that the AP can communicate with the RADIUS server for Staff auth.
4. VLAN 1 serves as Native VLAN.
99
Configuration Summary for AP
100
Configuration Summary for Station When Connecting to Staff SSID
101
Configuration Summary for Station When Connecting to Guest SSID
102
Verification
Get a PC to connect with the Station via Ethernet cable. Go through the checklist below for the cases where the Station is associating to the SSIDs “Altai
Guest” and “Altai Staff” respectively.
✓ Check if the PC successfully acquire IP addresses from your DHCP server on the designated VLAN
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the access right is NOT granted to any PC including staff unless inter-VLAN routing is allowed at the gateway
103
CONFIGURE VLAN FOR REPEATER MODE
Demo: Network Scenario for Repeater Mode
SSID-VLAN Mapping
WLAN VLAN
Remote AP
RADIUS Server
Switch Mode
Mgmt IP: 192.168.100.30/24 IP: 192.168.10.100
Mgmt VLAN: 100 RADIUS Client: 192.168.100.30
GW: 192.168.100.1 RADIUS Client: 192.168.100.40
Repeater GW RADIUS Secret: altairadius123
Switch Mode VLAN 10: 192.168.10.1
Mgmt IP: 192.168.100.40/24
Mgmt VLAN: 100
GW: 192.168.100.1 Trunk
(VLAN 100, 150, 160) Internet
GW
Wireless Clients VLAN 100: 192.168.100.1/24
VLAN 150: 192.168.150.1/24
Staff: 192.168.150.2 – .254
VLAN 160: 192.168.160.1/24
Guest: 192.168.160.2 – .254
DHCP Server Enabled on VLAN 150 & 160
105
Demo: Network Scenario for Repeater Mode
Remark:
1. VLAN 100 is Management VLAN. In such case, Guest or Staff clients cannot access AP directly unless inter-VLAN routing is enabled at the gateway.
2. To allow various VLAN traffic to pass through between the AP and the neighboring switch or gateway, the counterpart of the switch or gateway
should be configured to be running in “Trunk” mode allowing VLAN 100, 150 and 160 as well.
3. VLAN 10 and VLAN 100 are inter-reachable by gateway configuration so that the AP can communicate with the RADIUS server for Staff auth.
4. VLAN 1 serves as Native VLAN 1.
106
Configuration Summary for Remote AP
107
Configuration Summary for Repeater
108
Verification (Client Association)
Get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” via Repeater respectively, and go through the checklist below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server on different VLANs
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the access right is NOT granted to anyone including staff unless inter-VLAN routing is allowed at the gateway
109
CONFIGURE VLAN FOR BRIDGE MODE
Demo: Network Scenario for Bridge Mode
Internet
Wireless Clients
GW
Staff: 192.168.150.2 – .254
VLAN 100: 192.168.100.1/24
Guest: 192.168.160.2 – .254 VLAN 150: 192.168.150.1/24
VLAN 160: 192.168.160.1/24
DHCP Server Enabled on VLAN 150 & 160
SSID-VLAN Mapping
WLAN VLAN
111
Demo: Network Scenario for Bridge Mode
Remark:
1. VLAN 100 is Management VLAN. In such case, Guest or Staff clients cannot access AP directly unless inter-VLAN routing is enabled at the gateway.
2. To allow various VLAN traffic to pass through between the AP and the neighboring switch or gateway, the counterpart of the switch or gateway
should be configured to be running in “Trunk” mode allowing VLAN 100, 150 and 160 as well.
3. VLAN 10 and VLAN 100 are inter-reachable by gateway configuration so that the AP can communicate with the RADIUS server for Staff auth.
4. VLAN 1 serves as Native VLAN 1.
112
Configuration Summary for Local Bridge
113
Configuration Summary for Remote Bridge
114
Verification
✓ Check if you can access the remote bridge peer from the local-end network via management VLAN
To test network access over the bridge, get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” respectively, and go through the checklist
below.
✓ Check if the clients successfully acquire IP addresses from your DHCP server on different VLANs
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
✓ Check if the access right is NOT granted to anyone including staff unless inter-VLAN routing is allowed at the gateway
115
CONFIGURE GATEWAY MODE
Network Scenario for Gateway Mode
AP DHCP Server,
Gateway Mode PPPoE Server RADIUS Server
WAN IP: (i) By Static IP (192.168.100.30); or
WAN IP: (ii) By DHCP; or
WAN IP: (iii) By PPPoE
LAN IP: 192.168.98.1/24
L2 SW
Internet
GW
IP: 192.168.100.1/24
Wireless Clients
IP: 192.168.98.2 – .254
117
Step 1: Configure WAN IP Address
Option 1: Static IP (For configuration details, see Configure IP Address of Access Point)
Option 2: DHCP (For configuration details, see Configure IP Address of Access Point)
118
Step 1: Configure WAN IP Address
NOTE:
119
Step 2: Configure LAN IP Address
Procedures:
120
Step 3: Configure Wireless Settings
• For details, refer to section RADIO MODE: AP, STATION, REPEATER & BRIDGE.
• In our example, we configure as AP mode and advertise two SSIDs “Altai Guest” and “Altai Staff”.
121
Step 4: Assign LAN/WAN Interfaces
Procedures:
122
Step 5: Enable/Disable NAT
Procedures:
123
Step 6: Configure DHCP Server for LAN Devices
Procedures:
124
Step 6: Configure DHCP Server for LAN Devices
Procedures:
125
Verification
Get 2 clients to connect to the SSIDs “Altai Guest” and “Altai Staff” respectively, and go through the checklist below.
✓ Check if you can access the AP via LAN interface, e.g. 192.168.98.1, when connecting with staff SSID
✓ Check if the guest client’s speed is limited to 5 Mbps, and staff client’s to 10Mbps
126
Verification – Access to AP
• The secondary IP address is applicable to WAN interface ONLY. Therefore, if you just have LAN interface for AP access, especially via WiFi, make sure
you give Full Access Right for ALL the SSIDs in the first place, including Guest SSID, so that you can access the AP via LAN interface. Once you confirm
all the other settings are running well, set the Access Right as the very last step.
• For PPPoE case, the WAN traffic is all tunneled between AP and the PPPoE server (ISP device). Therefore, it is not feasible to access AP via WAN
interface using secondary IP address within customer’s premises. To access the AP, you have to use LAN interfaces.
To check WAN status such IP address, default gateway and DNS server, you may need to access the AP via LAN interface, i.e. 192.168.98.1 and go to
Status > Overview > Network (Gateway Mode). The screenshot below shows the PPPoE status when the AP is successfully connected with PPPoE server to
obtain an IP address.
127
Verification – DCHP Lease
128
UPDATE ADMIN PASSWORD
Update Admin Password
Procedures:
130
Thank You