User's Manual
EnRoute500 User’s Guide
TR0149 Rev. C5
6
9.6.1 Access Point IP Address.................................................................................... 63
9.6.2 IP Configuration of Clients Devices via DHCP ................................................... 63
9.6.3 Manual IP Configuration of Client Devices......................................................... 63
9.7 Client Devices .....................................................................................................64
9.8 Encryption and Authentication.............................................................................64
9.8.1 WEP Encryption ................................................................................................. 65
9.8.2 WPA Pre-Shared Key Mode (WPA-PSK)........................................................... 66
9.8.3 WPA EAP Mode................................................................................................. 66
9.9 Transmit Power ...................................................................................................67
10 Client DHCP Configuration.............................................................................. 69
10.1 Using Local DHCP Servers .................................................................................69
10.2 Using a Centralized DHCP Server ......................................................................71
10.2.1 Configuring the EnRoute500s ............................................................................ 72
10.2.2 Configuring the Central DHCP Server................................................................ 74
11 Connecting an EnRoute500 Gateway to a WAN ............................................ 75
11.1 Manual Configuration ..........................................................................................75
11.2 Network Address Translation (NAT)....................................................................75
11.3 VPN Access to a Mesh Gateway ........................................................................76
12 Controlling Access to the EnRoute500 .......................................................... 78
12.1 Firewall................................................................................................................78
12.2 Gateway Firewall.................................................................................................79
12.3 Blocking Client-to-Client Traffic ...........................................................................80
12.4 Access Control Lists (ACLs)................................................................................81
12.4.1 Access Point Access Control Lists (ACLs)......................................................... 82
12.4.2 Mesh ACL .......................................................................................................... 82
13 Quality of Service (QoS) Configuration.......................................................... 84
13.1 Priority Levels......................................................................................................84
13.2 Rate Limiting .......................................................................................................87
13.3 Rate Reservation ................................................................................................89
14 Enabling VLAN Tagging .................................................................................. 92
14.1 Client Interface Configuration..............................................................................92
14.2 Gateway Configuration........................................................................................93
15 Integration with Enterprise Equipment .......................................................... 95
15.1 Configuring Splash Pages...................................................................................95
15.1.1 Enabling Splash Pages ...................................................................................... 95
15.1.2 Configuring Splash URLs................................................................................... 96
15.1.3 Configuring the Authentication Server................................................................ 99
15.1.4 Trusted MAC Addresses .................................................................................... 99
15.2 Backhaul Health Monitoring ..............................................................................100
15.3 Layer 2 Emulation .............................................................................................101