EOR7550 Dual Radio Multi‐Function Repeater User’s Manual V1.
Table of Content 1. 2. 3. 4. Introduction ................................................................................................................................. 1 1.1. Features ............................................................................................................................ 1 1.2. Package Contents ............................................................................................................. 2 1.3. System Requirement ...................................
4.4.1. Enable................................................................................................................. 49 4.4.2. DMZ .................................................................................................................... 49 4.4.3. DoS ..................................................................................................................... 49 4.4.4. MAC Filter .....................................................................................................
Revision History Version Date Notes 1.
1. Introduction EOR7550 equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With certified IP‐65 protection, it is designed to deliver high reliability under harsh outdoor environment. Built‐in advanced multi‐functions provide flexibility in constructing scalable WiFi networks for all possible applications. With two individual interfaces, each can be configured into 6 different modes with maximum of 18 combinations. With 802.
access setting. Management - Firmware Upgrade Upgrading firmware via web browser, setting are reserved after upgrade Reset & Backup Reset to factory default. User can export all setting into a file via WEB MIB MIB I, MIB II(RFC1213) and private MIB SNMP V1, V2c 1.2. Package Contents 1 x Dual Radio Multi‐Function Repeater (EOR7550) 1 x PoE injector with Power Adapter 1 x Wall Mounting kit 1 x 1.8m Grounding Cable 1 x CD with User’s Manual 1 x QIG 1.3.
(7) Radio1 a/b/g AP SSID1 Radio2 b/g/n CR SSID2 (8) Radio1 a/b/g AP SSID1 LAN (9) Radio1 a/b/g CR SSID1 (11) Radio1 a/b/g AP SSID1 LAN Radio2 b/g/n AP SSID2 (10) Radio1 a/b/g WDS Bridge SSID1 Radio2 b/g/n WDS Repeater SSID2 (12) Radio1 a/b/g AP SSID1 Radio2 b/g/n AP SSID2 (14) Radio2 b/g/n UR(STA) (16) Radio2 b/g/n UR(AP) SSID2 (18) LAN Radio1 a/b/g WDS Repeater SSID1 LAN (15) Radio1 a/b/g UR(AP) SSID1 LAN (17) Radio1 a/b/g UR(STA) Radio2 b/g/n AP SSID2 LAN LAN (13) Radio2 b/g/n
SOHO users need a cost‐effective, easy and quick installation of a small network. y Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs. y Wired LAN backup Network managers implement wireless LANs to provide backup for mission‐critical applications running on wired networks.
2. Modes EOR7550 provides 2 separate radio channels for wider service area. Each of these 2 radio channels can be configured as different function mode separately. The device allows you to configure into different modes for different purposes in your network infrastructure. Each of these modes will have different setting. You are allowed to configure your radio channel freely with the following combination.
2.2. Client Bridge When in Client Bridge, EOR7550 will associate with nearby AP and sees the network device combination as a standard mobile unit (MU). The access point then forms a wireless bridge between the wired LAN and clients through EOR7550. 2.3. Client Router As Client Bridge mode, this allows your device to function as Client Bridge and Router as well. The device connection map can refer to 2.2 Client Bridge. 2.4.
3. Understanding the Hardware 3.1. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the Network port of the PoE injector and another end into your PC/Notebook. 3. Plug one end of another Ethernet cable to AP/Bridge port of the PoE injector and the other end into you cable/DSL modem (Internet) 4.
4. Web Configuration 4.1. System 4.1.1. Operation Mode You are allowed to configure your device into different modes for different purposes (Please see Chapter 2). 1. To start configuration, press Reset to purge the default setting. 2. All 3 drop down fields will be reset for new configuration. 3. Refers to table in Chapter 2 for further configuration.
4.1.2.
4.1.3. DHCP DHCP Configuration Menu only shows when device is in Client Router mode. 4.1.4.
4.1.5.
4.1.6.
4.2. Wireless EOR7550 provides 2 separate Radio Channel which allows you configuring your device into different separate modes. Each Radio Channel can be configured separately with different configuration menu. 4.2.1. AP 4.2.1.1.
4.2.1.2. Basic ¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.11b) 9 2.4 GHz (802.11g) ¾ Enabled SSID#: The device allows you to add up to 4 unique SSID ¾ ESSID#: Description of each configured SSID ¾ Channel: Channel selection. This will vary based on selected Band.
4.2.1.3. Advanced ¾ Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. ¾ RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ¾ ACK Timeout: The wait time for an ACK signal to time out.
¾ CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. ¾ Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list. This feature can be helpful in restricting the coverage area of the wireless network. 4.2.1.4.
¾ Encryption: WEP ¾ ESSID Selection: As this device supports multiple SSIDs, it is possible to configure a different security mode for each SSID (profile). Select an SSID from the drop‐down list. ¾ Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network.
¾ ¾ ¾ ¾ ¾ authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used. Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. Key Type: Select a key type from the drop‐down list. 128‐bit encryption requires a longer key than 64‐bit encryption.
¾ ¾ ¾ ¾ ¾ broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS) feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop‐down menu.
¾ Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. ¾ WMM: Choose to Enable or Disable WMM.
4.2.1.6. Client List 4.2.1.7. VLAN Only Available in AP mode ¾ Virtual LAN: Choose to Enable or Disable the VLAN features. ¾ SSID1 Tag: Specify the VLAN tag.
4.2.1.8. WMM 4.2.1.9.
4.2.2. Client Bridge 4.2.2.1. Status 4.2.2.2. Basic ¾ Radio: To enable/disable radio channel ¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.11b) 9 2.4 GHz (802.
¾ Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.2.3.
¾ Beacon Period: Beacons are packets sent by a wireless Access Point to synchronize wireless devices. Specify a Beacon Period value between 20 and 1024. The default value is set to 100 milliseconds. ¾ DTIM Period: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Period value.
4.2.2.5.
4.2.3. Client Router 4.2.3.1. Status 4.2.3.2. Basic ¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.11b) 9 2.4 GHz (802.
¾ Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.3.3.
¾ Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. 4.2.3.4. AP Profile This page allows you to configure the profile of the Client Bridge including Security Setting exactly the same as the Access Point. 4.2.3.5.
4.2.4. WDS Bridge You can only connect to the device via Wireless Client 4.2.4.1. Status 4.2.4.2. Basic ¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.
9 2.4 GHz (802.11g) ¾ Channel: Channel selection. This will vary based on selected Band. ¾ MAC address 1~4: Specify up to 4 MAC address of the device. ¾ Set Security: Wireless security mode setting. ¾ Security: Disabled ¾ Security: WEP ¾ Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. ¾ Key Format: Select a key type from the drop‐down list. 128‐bit encryption requires a longer key than 64‐bit encryption.
4.2.4.3. Advanced ¾ Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346. ¾ RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 0 and 2347. The default value is 2347. ¾ ACK Timeout: The wait time for an ACK signal to time out.
¾ CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. ¾ Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list. This feature can be helpful in restricting the coverage area of the wireless network. 4.2.5. WDS Repeater 4.2.5.1. Status 4.2.5.2.
¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.11b) 9 2.4 GHz (802.11g) ¾ Channel: Channel selection. This will vary based on selected Band. ¾ MAC address 1~4: Specify up to 4 MAC address of the device. ¾ Set Security: Wireless security mode setting. ¾ Security: Disabled ¾ Security: WEP ¾ Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. ¾ Key Format: Select a key type from the drop‐down list.
¾ Default Tx Key: You may choose one of your 4 different WEP keys from below. ¾ Encryption Key 1‐4: You may enter four different WEP keys. 4.2.5.3. Advanced ¾ Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346.
¾ Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. ¾ CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto. ¾ Tx Power: You may control the transmit output power of the device by selecting a value from the drop‐down list.
9 2.4 GHz (802.11b) 9 2.4 GHz (802.11g) ¾ Enabled SSID#: The device allows you to add up to 4 unique SSID ¾ ESSID#: Description of each configured SSID Channel: Channel selection. This will vary based on selected Band. 4.2.6.3. Advanced ¾ Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 2346. The default value is 2346.
¾ Data rate: You may select a data rate from the drop‐down list, however, it is recommended to select auto. This is also known as auto‐fallback. ¾ Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. ¾ CTS Protection: CTS (Clear to Send) can be always enabled, auto, or disabled. By enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto.
¾ Encryption: WEP ¾ ESSID Selection: As this device supports multiple SSIDs, it is possible to configure a different security mode for each SSID (profile). Select an SSID from the drop‐down list. ¾ Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network.
¾ ¾ ¾ ¾ ¾ authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used. Key Length: Select a 64‐bit or 128‐bit WEP key length from the drop‐down list. Key Type: Select a key type from the drop‐down list. 128‐bit encryption requires a longer key than 64‐bit encryption.
¾ ¾ ¾ ¾ ¾ they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS) feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop‐down menu. Encryption: Select WPA pre‐shared key from the drop‐down list. WPA Type: Select TKIP, AES, or WPA2 Mixed.
¾ Broadcast SSID: Select Enable or Disable from the drop‐down list. This is the SSID broadcast feature. When this option is set to Enable, your wireless network name is broadcast to anyone within the range of your signal. If you're not using encryption then they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network. ¾ WMM: Choose to Enable or Disable WMM.
4.2.6.6. Client List 4.2.6.7.
4.2.7. Universal Repeater (STA) 4.2.7.1. Status 4.2.7.2. Basic ¾ Band: Configure the device into different wireless modes. 9 2.4 GHz (802.11b/g) 9 5 GHz (802.11a) 9 2.4 GHz (802.11b) 9 2.4 GHz (802.
¾ Site Survey Click on the Site Survey button to view a list of Access Points in the area. The Site Survey page displays information about devices within the 802.11b/g/n frequency. Information such as channel, SSID, BSSID, encryption, authentication, signal strength, and operating mode are displayed. Select the desired device and then click on the Add to AP Profile button. 4.2.7.3.
¾ Preamble Type: Select a short or long preamble. For optimum performance it is recommended to also configure the client device as the same preamble type. 4.2.7.4. AP Profile 4.2.7.5.
4.3. Network 4.3.1. Status 4.3.2. LAN ¾ Bridge Type: Select Static IP or Dynamic IP from the drop‐down list. If you select Static IP, you will be required to specify an IP address and subnet mask. If Dynamic IP is selected, then the IP address is received automatically from the external DHCP server. ¾ IP Address: Specify an IP address. ¾ IP Subnet Mask: Specify a subnet mask for the IP address. ¾ 802.1d Spanning Tree: Select Enable or Disable from the drop‐down list.
4.3.3. WAN Only shows when device is in WAN Interface ¾ Login Method: Configure different connection methods with WAN.
4.4. Firewall Only shows when device is in AP or CR modes with WAN Interface enabled. 4.4.1. Enable 4.4.2. DMZ 4.4.3.
4.4.4. MAC Filter 4.4.5.
¾ Description: Description of IP Filtering item ¾ Protocol: Type of Protocols 9 Both 9 TCP 9 UDP ¾ Local IP Address: Local IP address range ¾ Remote port range: Remote port number range 4.4.6.
4.5. Advanced 4.5.1. NAT This allows you to enable/disable NAT service of the device. 4.5.2. Port Mapping ¾ Description: Description of Port Mapping item. ¾ Local IP: Source IP to be mapped.
¾ Protocol: Protocol type. 9 Both 9 TCP 9 UDP ¾ Remote Port Range: Source Port number to be mapped. 4.5.3. Port Forwarding ¾ Description: Description of Port Forwarding item. ¾ Local IP: Source IP to be forwarded. ¾ Protocol: Protocol type 9 Both 9 TCP 9 UDP ¾ Local Port: Source Port Number to be forwarded. ¾ Forwarded Port: Destination Port Number forwarding to.
4.5.4.
4.5.5. ALG 4.5.6.
4.5.7.
¾ Bandwidth Allocation ¾ Type: Type of traffics to be monitored. 9 Download 9 Upload 9 Both ¾ Local IP range: Destination IP Range. ¾ Protocol: Protocol type to be monitored.
9 FTP ¾ Remote port range: Source Port Number range ¾ Policy: The policy rules for QoS service. 9 Min 9 Max ¾ Rate(bps): 9 FULL 9 32M 9 13M 9 8M 9 4M 9 2M 9 1M 9 512K 9 256K 9 128K 4.5.8.
4.5.9. Dynamic Routing 4.5.10. Routing Table Providing an overview of current Routing table.
4.6. Management 4.6.1. Admin Change current login password of the device. It is recommended to change the default password for security reasons. 4.6.2. SNMP Allows you to assign the contact details, location, community name and trap settings for SNMP. This is a networking management protocol used to monitor network‐attached devices. SNMP allows messages (called protocol data units) to be sent to various parts of a network.
¾ SNMP Active: Choose to enable or disable the SNMP feature. ¾ SNMP Version: You may select a specific version or select All from the drop‐down list. ¾ Read Community Name: Specify the password for access the SNMP community for read only access. ¾ Set Community Name: Specify the password for access to the SNMP community with read/write access. ¾ System Location: Specify the location of the device. ¾ System Contact: Specify the contact details of the device.
Ensure that you have downloaded the appropriate firmware from the vendor’s website. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded with wireless interface. 4.6.4. Configure This allows you to restore to factory default setting or backup/restore your current setting. 4.6.5. Reset This will only reset you devices with current configuration unaffected.
63
4.7. Tools 4.7.1. Time Setting This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server. If the device losses power for any reason, it will not be able to keep its clock running, and will not display the correct time once the device has been restarted. Therefore, you must re‐enter the correct date and time.
¾ Dynamic DNS: To enable/disable the DDNS service ¾ Server Address: List of DDNS Service providers 9 3322 9 DHS 9 DynDNS 9 ZoneEdit 9 CyberGate ¾ Host Name: Host name to be redirected ¾ Username: User name for DDNS Service providers ¾ Password: Password for DDNS Service providers 4.7.3. Diagnosis Check whether a network destination is reachable with ping service.
66
4.8. Logout Logout will let user leave the GUI.
Appendix A – SPECIFICATIONS Hardware Specification MCU Ralink RT2880 RF Atheros AR5414 (Radio1) + Ralink RT2820 (Radio2) Memory 32MB SDRAM Flash 8MB Physical Interface One 10/100 Fast Ethernet RJ‐45 One Reset Button Power Requirements Power over Ethernet, 48V DC/0.375A Regulation Certifications FCC Part 15/UL, ETSI 300/328/CE RF Specification Frequency Band 802.11a 4.92 ~ 5.08 GHz 5.15 ~ 5.35GHz, 5.47 ~ 5.725GHz, 5.725~5.825GHz 802.11b/g/n U.S., Europe and Japan product covering 2.400 to 2.
IEEE802.11a 25dBm@36Mbps IEEE802.11a 25dBm@36Mbps 23dBm@48Mbps 23dBm@48Mbps 21dBm@54Mbps 21dBm@54Mbps 27dBm@6~24Mbps 27dBm@6~24Mbps 5.725~5.825 GHz 25dBm@36Mbps 5.725~5.825 GHz 25dBm@36Mbps IEEE802.11a 23dBm@48Mbps IEEE802.11a 23dBm@48Mbps 21dBm@54Mbps 21dBm@54Mbps 27dBm@6~24Mbps 27dBm@6~24Mbps 2.412~2.462 GHz 25dBm@36Mbps 2.412~2.462 GHz 25dBm@36Mbps IEEE802.11g 24dBm@48Mbps IEEE802.11g 24dBm@48Mbps 23dBm@54Mbps 2.412~2.462 GHz IEEE802.11b 28dBm@1~11Mbps 23dBm@54Mbps 2.
RFC 2865,2866 RADIUS Operation Mode 18 modes EOR7550 Radio1(11a/b/g) Radio2 AP CB (11/b/g/n) O WDS WDS Bridge Repeater O O CR O O AP (LAN/WAN) (LAN/WAN) (LAN) (LAN) (LAN/WAN) X X X X UR(AP) UR(STA) X X O (LAN/WAN) O CB O X X (LAN/WAN) (LAN/WAN) O CR O X X X X X X (LAN) WDS (LAN) O O X Bridge (LAN) WDS O X (LAN/WAN) UR(AP) X X X X X (LAN) O X Repeater Disable X X X X X (LAN/WAN) O X X X X X X (LAN/WAN) O UR(STA) X X X X X X X X X
14 117 243 130 270 15 130 270 144.4 300 ‐ Distance Control (802.1x Ack timeout) for Radio2 ‐ Signal Strength indication using LEDs ‐ Bandwidth Selection Security Authentication: ‐ 802.11i (WPA, WPA2) ‐ 802.1x (including EAP‐TLS/TTLS) IEEE 802.
Appendix B – FCC INTERFERENCE STATEMENT Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
73