CONTENTS
1INTRODUCTION............................................................................................ 1
1.1 Features.........................................................................................................................2
1.2 Specifications................................................................................................................2
1.3 Package Contents..........................................................................................................3
2INSTALLATION PROCEDURE..................................................................... 4
3CONFIGURATION UTILITY......................................................................... 7
3.1 Site Survey....................................................................................................................9
3.2 Profile..........................................................................................................................10
3.2.1 Configure the Profile ........................................................................ 11
3.2.1.1 Configuration ............................................................................................. 11
3.2.1.2 Authentication and Security.......................................................................13
3.2.1.3 802.1x Setting-Certification.......................................................................17
3.2.1.4 802.1x Setting-CA Server .......................................................................... 18
3.3 Link Status ..................................................................................................................19
3.4 Statistics......................................................................................................................20
3.5 Advance ......................................................................................................................20
3.6 QoS .............................................................................................................................23
3.7 About...........................................................................................................................24
3.8 Turbo Mode.................................................................................................................25
3.9 SoftAP.........................................................................................................................25
3.9.1 Config...............................................................................................................25
3.9.1.1 Auth. Vs. Security ..................................................................... 28
3.9.2 Access Control .................................................................................................30
3.9.3 Mac Table.........................................................................................................31
3.9.4 Event Log.........................................................................................................32
3.9.5 Statistics ...........................................................................................................32
3.9.6 About................................................................................................................33
4TROUBLESHOOTING.................................................................................. 34