Enable-IT 8424 User manual

A l l R i g h t s R e s e r v e d 1 9 9 7 - 2 0 0 8 E
N A B L E
-I T
-P r o p r i e t a r y a n d C o n f i d e n t i a l
Enable-IT 8424
802.11g / 802.11b / WPA
Wireless Access Point
User Manual

P a g e 2 o f 9 3
Copyright © 1997- 2008, Enable-IT, Inc. All rights reserved. No part of this documentation
may be reproduced in any form or by any means or used to make any derivative work (such
as translation, transformation, or adaptation) without written permission from Enable-IT, Inc.
Enable-IT, Inc reserves the right to revise this documentation and to make changes in
content from time to time without obligation on the part of Enable-IT, Inc to provide
notification of such revision or change.
Enable-IT, Inc provides this documentation without warranty, term, or condition of any kind,
either implied or expressed, including, but not limited to, the implied warranties, terms or
conditions of merchantability, satisfactory quality, and fitness for a particular purpose.
Enable-IT, Inc may make improvements or changes in the product(s) and/or the
program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished
under a license agreement included with the product as a separate document, in the hard
copy documentation. If you are unable to locate a copy, please contact Enable-IT, Inc and a
copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software
describedhereinareprovidedtoyousubjecttothefollowing:
All technical data and computer software are commercial in nature and developed solely at
private expense. Software is delivered as "Commercial Computer Software" as defined in
DFARS 252.227-7014 (June 1995) or as a "commercial item" as defined in FAR 2.101 (a)
and as such is provided with only such rights as are provided in Enable-IT, Inc's standard
commercial license for the Software.
Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov
1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or
deface any portion of any legend provided on any licensed program or documentation
contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, Enable-IT, Inc registered trademarks are registered in the
United States and may or may not be registered in other countries

P a g e 3 o f 9 3
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION..................................................................................................................................4
Features of your Wireless Access Point ........................................................................................................4
Package Contents.............................................................................................................................................6
Physical Details.................................................................................................................................................6
CHAPTER 3 ACCESS POINT SETUP...................................................................................................................... 8
Over view ............................................................................................................................................................ 8
Setup using the Windows Utility .....................................................................................................................8
Access Control................................................................................................................................................12
Security Profiles..............................................................................................................................................14
Security Profile Screen...................................................................................................................................15
System Screen................................................................................................................................................25
Wireless Screens............................................................................................................................................26
Basic Settings Screen....................................................................................................................................26
Advanced Settings..........................................................................................................................................29
CHAPTER 4 PC AND SERVER CONFIGURATION ..............................................................................................31
Over view ..........................................................................................................................................................31
Using WEP.......................................................................................................................................................31
Using WPA-802.1x ..........................................................................................................................................32
802.1x Server Setup (Windows 2000 Server)............................................................................................... 33
802.1x Client Setup on Windows XP.............................................................................................................43
Using 802.1x Mode (without WPA)................................................................................................................ 51
Using WPA-PSK..............................................................................................................................................52
Using WPA-802.1x ..........................................................................................................................................53
802.1x Server Setup (Windows 2000 Server)............................................................................................... 54
802.1x Client Setup on Windows XP.............................................................................................................64
Using 802.1x Mode (without WPA)................................................................................................................ 72
CHAPTER 5 OPERATION AND STATUS..............................................................................................................72
Operation.........................................................................................................................................................72
Status Screen.................................................................................................................................................. 72
CHAPTER 6 ACCESS POINT MANAGEMENT.....................................................................................................78
Over view ..........................................................................................................................................................78
Admin Login Screen.......................................................................................................................................78
Auto Config/Update........................................................................................................................................80
Config File........................................................................................................................................................82
Log Settings (Syslog).....................................................................................................................................83
Rogue APs.......................................................................................................................................................84
SNMP................................................................................................................................................................85
Upgrade Firmware ..........................................................................................................................................86
APPENDIX A SPECIFICATIONS............................................................................................................................86
Wireless Access Point....................................................................................................................................86
APPENDIX B TROUBLESHOOTING .....................................................................................................................89
Over view ..........................................................................................................................................................89
General Problems...........................................................................................................................................89

P a g e 4 o f 9 3
C h a p t e r 1
I n t r o d u c t i o n
This Chapter provides an overview of the Wireless Access Point's features and capabilities.
C o n g r a t u l a t i o n s o n t h e p u r c h a s e o f y o u r n e w W i r e l e s s A c c e s s P o i n t . T h e W i r e l e s s A c c e s s P o i n t l i n k s y o u r 8 0 2 . 1 1 g o r
8 0 2 . 1 1 b W i r e l e s s S t a t i o n s t o y o u r w i r e d L A N . T h e W i r e l e s s s t a t i o n s a n d d e v i c e s o n t h e w i r e d L A N a r e t h e n o n t h e s a m e
n e t w o r k , a n d c a n c o m m u n i c a t e w i t h e a c h o t h e r w i t h o u t r e g a r d f o r w h e t h e r t h e y a r e c o n n e c t e d t o t h e n e t w o r k v i a a
W i r e l e s s o r w i r e d c o n n e ct i o n .
Figure 1: Wireless Access Point
T h e a u t o -s e n s i n g c a p a b i l i t y o f t h e W i r e l e s s A c c e s s P o i n t a l l o w s p a c k e t t r a n s m i s s i o n u p t o 5 4 M b p s f o r m a x i m u m
t h r o u g h p u t , o r a u t o m a t i c s p e e d r e d u c t i o n t o l o w e r s p e e d s w h e n t h e e n v i r o n m e n t d o e s n o t p e r m i t m a x i m u m t h r o u g h p u t .
F e a t u r e s o f y o u r W i r e l e s s A c c e s s P o i n t
T h e W i r e l e s s A c c e s s P o i n t i n c o r p o r a t e s m a n y a d v a n c e d f e a t u r e s , c a r e f u l l y d e s i g n e d t o p r o v i d e s o p h i s t i c a t e d f u n c t i o n s
w h i l e b e i n g e a s y t o u s e .
•Standards Compliant. The Wireless Router complies with the IEEE802.11g (DSSS) specifications for Wireless
LANs.
•Supports both 802.11b and 802.11g Wireless Stations. The 802.11g standard provides for backward compatibility
with the 802.11b standard, so both 802.11b and 802.11g Wireless stations can be used simultaneously.
•108Mbps Wireless Connections. On both the 2.4GHz (802.11b & 802.11g) and 5GHz (802.11a) bands,
108Mbps connections are available to compatible clients.
•Bridge Mode Support. The Wireless Access Point can operate in Bridge Mode, connecting to another Access
Point. Both PTP (Point to Point) and PTMP (Point to Multi-Point) Bridge modes are supported.
And you can even use both Bridge Mode and Access Point Mode simultaneously!
•Client/Repeater Access Point. The Wireless Access Point can operate as a Client or Repeater Access Point,
sending all traffic received to another Access Point.
•Simple Configuration. If the default settings are unsuitable, they can be changed quickly and easily.
•DHCP Client Support. Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other
devices upon request. The Wireless Access Point can act as a DHCP Client, and obtain an IP address and
related information from your existing DHPC Server.
•Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web
Browser.

P a g e 5 o f 9 3
S e c u r i t y F e a t u r e s
•Security Profiles. For maximum flexibility, wireless security settings are stored in Security Profiles. Up to 8
Security profiles can be defined, and up to 4 used as any time.
•Multiple SSIDs.Because each Security Profile has it own SSID, and up to 4 Security Profiles can be active
simultaneously, multiple SSIDs are supported. Different clients can connect to the Wireless Access Point
using different SSIDs, with different security settings.
•Multiple SSID Isolation.If desired, PCs and devices connecting using different SSIDs can be isolated from
each other.
•VLAN Support. The 802.1Q VLAN standard is supported, allowing traffic from different sources to be
segmented. Combined with the multiple SSID feature, this provides a powerful tool to control access to your
LAN.
•WEP support. Support for WEP (Wired Equivalent Privacy) is included. Both 64 Bit and 128 Bit keys are
supported.
•WPA support. Support for WPA is included. WPA is more secure than WEP, and should be used if possible.
Both TKIP and AES encryption methods are supported.
•802.1x Support. Support for 802.1x mode is included, providing for the industrial-strength wireless security of
802.1x authentication and authorization.
•Radius Client Support. The Wireless Access Point can login to your existing Radius Server (as a Radius client).
•Radius MAC Authentication. You can centralize the checking of Wireless Station MAC addresses by using a
Radius Server.
•Rogue AP Detection.The Wireless Access Point can detect unauthorized (Rouge) Access Points on your LAN.
•Access Control. The Access Control feature can check the MAC address of Wireless clients to ensure that only
trusted Wireless Stations can use the Wireless Access Point to gain access to your LAN.
•Password - protected Configuration. Optional password protection is provided to prevent unauthorized users
from modifying the configuration data and settings.
A d v a n c e d F e a t u r e s
•Auto Configuration. The Wireless Access Point can perform self-configuration by copying the configuration data
from another Access Point. This feature is enabled by default.
•Auto Update. The Wireless Access Point can automatically update its firmware, by downloading and installing
new firmware from your FTP server.
•Command Line Interface. If desired, the command line interface (CLI) can be used for configuration. This
provides the possibility of creating scripts to perform common configuration changes.
•NetBIOS & WINS Support. Support for both NetBIOS broadcast and WINS (Windows Internet Naming Service)
allows the Wireless Access Point to easily fit into your existing Windows network.
•Radius Accounting Support. If you have a Radius Server, you can use it to provide accounting data on Wireless
clients.
•Syslog Support. If you have a Syslog Server, the Wireless Access Point can send its log data to your Syslog
Server.
•SNMP Support. SNMP (Simple Network Management Protocol) is supported, allowing you to use a SNMP
program to manage the Wireless Access Point.
•UAM Support. The Wireless Access Point supports UAM (Universal Access Method), making it suitable for use
in Internet cafes and other sites where user access time must be accounted for.
•WDS Support. Support for WDS (Wireless Distribution System) allows the Wireless Access Point to act as a
Wireless Bridge. Both Point-to-Point and Multi-Point Bridge modes are supported.

P a g e 6 o f 9 3
P a c k a g e C o nt e n t s
T h e f o l l o w i n g i t e m s s h o u l d b e i nc l u d e d :
•Wireless Access Point
I f a n y o f t h e a b o v e i t e m s a r e d a m a g e d o r m i s s i n g , p l e a s e c o n t a c t y o u r d e a l e r i m m e d ia t e l y .
P h y s i c a l D e t a i l s
F r o n t P a n e l L E D s
Figure 2: Front Panel
S t a t u s
O n - E r r o r c o n d it i o n .
O f f - N o r m a l o p e r a t i o n .
B l i n k i n g - D u r i n g s t a r t u p , a n d w h e n t h e F i r m w a r e i s b e i n g u pg r a d e d .
P o w e r
O n - N o r m a l o p e r a t i o n .
O f f - N o p o w e r
L A N
O n - T h e L A N ( E t h e r n e t ) p o r t i s a c t i v e .
O f f - N o a c t i v e c o n n e c t i o n o n t h e L A N ( E t h e r n e t ) p o r t .
F l a s h i n g - D a t a i s b e i n g t r a n s m i t t e d o r r e c e i v e d v i a t h e c o r r es p o n d i n g
L A N ( E t h e r n e t ) p o r t .
W i r e l e s s
L A N
O n - I d l e
O f f - E r r o r - W i r e l e s s c o n n e c t i o n i s n o t a v a i l a b l e .
F l a s h i n g - D a t a i s b e i n g t r a n s m i t t e d o r r e c e i v e d v i a t h e W i r e l e s s
a c c e s s p o i n t . D a t a i n c l u d e s " n e t w o r k t r a f f i c " a s w e l l a s u s e r d a t a .

P a g e 7 o f 9 3
R e a r P a n e l
Figure 3 Rear Panel
A n t e n n a
O n e a n t e n n a ( a e r i a l ) i s s u p p l i e d . B e s t r e s u l t s a r e u s u a l l y o bt a i n e d
w i t h t h e a n t e n n a i n a v e r t i c a l p o s it i o n .
C o n s o l e p o r t
D B 9 f e m a l e R S 2 3 2 p o r t .
R e s e t B u t t o n
T h i s b u t t o n h a s t w o ( 2 ) f u n c t i o n s :
•Reboot. When pressed and released, the Wireless Access
Point will reboot (restart).
•Reset to Factory Defaults. This button can also be used to
clear ALL data and restore ALL settings to the factory
default values.
T o C l e a r A l l D a t a a n d r e s t o r e t h e f a c t o r y d e f a u l t v a l u e s :
1. Power Off the Access Point
2. Hold the Reset Button down while you Power On the Access
Point.
3. Continue holding the Reset Button until the Status (Red)
LED blinks TWICE.
4. Release the Reset Button.
The factory default configuration has now been restored,
and the Access Point is ready for use.
E t h e r n e t
U s e a s t a n d a r d L A N c a b l e ( R J 4 5 c o n n e c t o r s ) t o c o n n e c t t h i s p o r t t o
a 1 0 B a s e T o r 1 0 0 B a s e T h u b o n y o u r L A N .
P o w e r p o r t
C o n n e c t t h e s u p p l i e d p o w e r a d a p t e r h e r e .

P a g e 8 o f 9 3
C h a p t e r 3
A c c e s s P o i n t S e t u p
This Chapter provides details of the Setup process for Basic Operation of your Wireless Access
Point.
O v e r v i e w
T h i s c h a p t e r d e s c r i b e s t h e s e t u p p r o c e d u r e t o m a k e t h e W i r e l e s s A c c e s s P o i n t a v a l i d d e v i c e o n y o u r L A N , a n d t o
f u n c t i o n a s a n A c c e s s P o i n t f o r y o u r W i r e l e s s S t a t i o n s .
W i r e l e s s S t a t i o n s m a y a l s o r e q u i r e c o n f i g u r a t i o n . F o r d e t a i l s , s e e C h a p t e r 4 - W i r e l e s s S t a t i o n C o n f i g u r a t i o n .
T h e W i r e l e s s A c c e s s P o i n t c a n b e c o n f i g u r e d u s i n g e i t h e r t h e s u p p l i e d W i n d o w s u t i l i t y o r y o u r W e b B r o w s e r
S e t u p u s i n g t h e W i n d o w s U t i l i t y
A s i m p l e W i n d o w s s e t u p u t i l i t y i s s u p p l i e d o n t h e C D -R O M . T h i s u t i l i t y c a n b e u s e d t o a s s i g n a s u i t a b l e I P a d d r e s s t o t h e
W i r e l e s s A c c e s s P o i n t . U s i n g t h i s u t i l i t y i s r e c o mm e n d e d , b e c a u s e i t c a n l o c a t e t h e W i r e l e s s A c c e s s P o i n t e v e n i f i t h a s
a n i n v a l i d I P a d d r e s s .
I n s t a l l a t i o n
5. Insert the supplied CD-ROM in your drive.
6. If the utility does not start automatically, run the SETUP program in the root folder.
7. Follow the prompts to complete the installation.
M a i n S c r e e n
•Start the program by using the icon created by the setup program.
•When run, the program searches the network for all active Wireless Access Points, then lists them on screen,
as shown by the example below.
Figure 4: Management utility Screen
Wireless Access Points
T h e m a i n p a n e l d i s p l a y s a l i s t o f a l l W i r e l e s s A c c e s s P o i n t s f o u n d o n t h e n e tw o r k . F o r e a c h A c c e s s P o i n t , t h e f o l l o w i n g
d a t a i s s h o w n :
S e r v e r N a m e
T h e S e r v e r N a m e i s s h o w n o n a s t i c k e r o n t h e b a s e o f t h e d e v i c e .
I P a d d r e s s
T h e I P a d d r e s s f o r t h e W i r e l e s s A c c e s s P o i n t .
M A C A dd r e s s
T h e h a r d w a r e o r p h y s i c a l a d d r e s s o f t h e W i r e l e s s A c c e s s P o i n t .
I E E E S t a nd a r d
T h e w i r e l e s s s t a n d a r d o r s t a n d a r d s u s e d b y t h e W i r e l e s s A c c e s s
P o i n t ( e . g . 8 0 2 . 1 1 b , 8 0 2 . 1 1 g )
F W V e r s i o n
T h e c u r r e n t F i r m w a r e v e r s i o n i n s t a l l e d i n t h e W i r e l e s s A c c e s s P o i n t .

P a g e 9 o f 9 3
D e s c r i p t i o n
A n y e x t r a i n f o r m a t i o n f o r t h e W i r e l e s s A c c e s s P o i n t , e n t e r e d b y t h e
a d m i n i s t r a t o r .
N o t e : I f t h e d e s i r e d W i r e l e s s A c c e s s P o i n t i s n o t l i s t e d , c h e c k t h a t t h e d e v i c e i s i n s t a l l e d a n d O N , t h e n u p d a t e t h e l i s t b y
c l i c k i n g t h e R e f r e s h b u t t o n .
Buttons
R e f r e s h
C l i c k t h i s b u t t o n t o u p d a t e t h e W i r e l e s s A c c e s s P o i n t d e v i c e
l i s t i n g a f t e r c h a n gi n g t h e n a m e o r I P A d d r e s s .
D e t a i l I n f o
W h e n c l i c k e d , a d d i t i o n a l i n f o r m a t i o n a b o u t t h e s e l e c t e d A c c e s s
P o i n t w i l l b e d i s p l a y e d .
W e b M a n a g em e n t
U s e t h i s b u t t o n t o c o n n e c t t o t h e W i r e l e s s A c c e s s P o i n t ' s W e b -
b a s e d m a n a g e m e n t i n t e r f a c e .
S e t I P A d d r e s s
C l i c k t h i s b u t t o n i f y o u w a n t t o c h a n g e t h e I P A d d r e s s o f t h e
W i r el e s s A c c e s s P o i n t .
E x i t
E x i t t h e M a n a g e m e n t u t i l i t y p r o g r a m b y c l i c k i n g t h i s b u t t o n .

P a g e 1 0 o f 9 3
Se t u p P r o c e d u r e
8. Select the desired Wireless Access Point.
9. Click the Set IP Address button.
10. If prompted, enter the user name and password. The default values are admin for the User Name, and
password for the Password.
11. Ensure the IP address, Network Mask, and Gateway are correct for your LAN. Save any changes.
12. Click the Web Management button to connect to the selected Wireless Access Point using your Web
Browser. If prompted, enter the User Name and Password again.
13. Check the following screens, and configure as necessary for your environment. Use the on-line help if
necessary.
The later sections in this Chapter also provides more details about each of these screens.
•Access Control - MAC level access control.
•Security Profiles - Wireless security.
•System - Identification, location, and Network settings
•Wireless - Basic & Advanced
14. You may also wish to set the admin password and administration connection options. These are on the Admin
Login screen accessed from the Management menu. See Chapter 6 for details of the screens and features
available on the Management menu.
15. Use the Apply/Restart button on the menu to apply your changes and restart the Wireless Access Point.
S e t u p i s n o w c o mp l e t e .
W i r e l e s s s t a t i o n s m u s t n o w b e s e t t o m a t c h t h e W i r e l e s s A c c e s s P o i n t . S e e C h a p t e r 4 f o r d e t a i l s .
S e t u p u s i n g a W e b B r o w s e r
Y o u r B r o w s e r m u s t s u p p o r t J a v a S c r i p t . T h e c o n f i g u r a t i o n p r o g r a m h a s b e e n t e s t e d o n t h e f o l l o w i n g b r o w se r s :
•Netscape V4.08 or later
•Internet Explorer V4 or later
S e t u p P r o c e d u r e
B e f o r e c o m m e n c i n g , i n s t a l l t h e W i r e l e s s A c c e s s P o i n t i n y o u r L A N , a s d e s c r i b e d p r e v i o u s l y .
16. Check the Wireless Access Point to determine its Default Name. This is shown on a label on the base or rear,
and is in the following format:
SCxxxxxx
Where xxxxxx is a set of 6 Hex characters ( 0 ~ 9, and A ~ F ).
17. Use a PC which is already connected to your LAN, either by a wired connection or another Access Point.
•Until the Wireless Access Point is configured, establishing a Wireless connection to it may be not
possible.
•If your LAN contains a Router or Routers, ensure the PC used for configuration is on the same LAN
segment as the Wireless Access Point.
18. Start your Web browser.
19. In the Address box, enter HTTP:// and the Default Name of the Wireless Access Point
e.g. H T T P : / / S C 2 D 6 3 1 A
20. You should then see a login prompt, which will ask for a User Name and Password.
Enter admin for the User Name, and password for the Password.
These are the default values. The password can and should be changed. Always enter the current user name
and password, as set on the Admin Login screen.

P a g e 1 1 o f 9 3
Figure 5: Password Dialog
21. You will then see the Status screen, which displays the current settings and status. No data input is possible
on this screen. See Chapter 5 for details of the Status screen.
From the menu, check the following screens, and configure as necessary for your environment. Details of these
screens and settings are described in the following sections of this chapter.
•Access Control - MAC level access control.
•Security Profiles - Wireless security.
•System - Identification, location, and Network settings
•Wireless - Basic & Advanced
22. You may also wish to set the admin password and administration connection options. These are on the Admin
Login screen accessed from the Management menu. See Chapter 6 for details of the screens and features
available on the Management menu.
23. Use the Apply/Restart button on the menu to apply your changes and restart the Wireless Access Point.
S e t u p i s n o w c o mp l e t e .
W i r e l e s s s t a t i o n s m u s t n o w b e s e t t o m a t c h t h e W i r e l e s s A c c e s s P o i n t . S e e C h a p t e r 4 f o r d e t a i l s .
If you can't connect:
I t i s l i k e l y t h a t y o u r P C ’ s I P a d d r e s s i s i n c o m p a t i b l e w i t h t h e W i r e l e s s A cc e s s
P o i n t ’ s I P a d d r e s s . T h i s c a n h a p p e n i f y o u r L A N d o e s n o t h a v e a D H C P S e r v e r .
T h e d e f a u l t I P a d d r e s s o f t h e W i r e l e s s A c c e s s P o i n t i s 1 9 2 . 1 6 8 . 0 . 2 2 8 , w i t h a
N e tw o r k M a s k o f 2 5 5 . 2 5 5 . 2 5 5 . 0 .
I f y o u r P C ’ s I P a d d r e s s i s n o t c o m p a t i b l e w i t h t h i s , y o u m u s t c h a n g e y o u r P C ’ s
I P a d d r e s s t o a n u n u s e d v a l u e i n t h e r a n g e 1 9 2 . 1 6 8 . 0 . 1 ~ 1 9 2 . 1 6 8 . 0 . 2 5 4 , w i t h a
N e tw o r k M a s k o f 2 5 5 . 2 5 5 . 2 5 5 . 0 . S e e A p p e n d i x C - W i n d o w s T C P / I P f o r
d e t a i l s f o r t h i s p r o c ed u r e .

P a g e 1 2 o f 9 3
A c c e s s C o n t r o l
T h i s f e a t u r e c a n b e u s e d t o b l o c k a c c e s s t o y o u r L A N b y u n k n o w n o r u n t r u s t e d w i r el e s s s t at i o n s .
C l i c k A c c e s s C o n t r o l o n t h e m e n u t o v i e w a s c r e e n l i k e t h e f o l l o wi n g .
Figure 6: Access Control Screen
D a t a - A c c e s s C o n t r o l S c r e e n
E n a b l e
U s e t h i s c h e c k b o x t o E n a b l e o r D i s a b l e t h i s f e a t u r e a s d e s i r e d .
W a r n i n g ! E n s u r e y o u r o w n P C i s i n t h e " T r u s t e d W i r e l e s s S t a t i o n s "
l i s t b e f o r e e n a b l i n g t h i s f e a t u r e .
T r u s t e d
S t at i o n s
T h i s t a b l e l i s t s a n y W i r e l e s s S t a t i o n s y o u h a v e d e s i g n a t e d a s
" T r u s t e d " . I f y o u h a v e n o t a d d e d a n y s t a t i o n s , t h i s t a b l e w i l l b e
e m p t y . F o r e a c h W i r e l e s s s t a t i o n , t h e f o l l o w i n g d a t a i s d i s p l a y e d :
•MAC Address - the MAC or physical address of each
Wireless station.
•Connected - this indicates whether or not the Wireless
station is currently associates with this Access Point.
Buttons
M o d i f y L i s t
T o c h a n g e t h e l i s t o f T r u s t e d S t a t i o n s ( A d d , E d i t , o r D e l e t e a
W i r e l e s s S t a t i o n o r S t a t i o n s ) , c l i c k t h i s b u t t o n . Y o u w i l l t h e n s e e t h e
T r u s t e d W i r e l e s s S t a t i o n s s c r e e n , d e s c r i b e d b e l o w .
R e a d f r o m F i l e
T o u p l o a d a l i s t o f T r u s t e d S t a t i o n s f r o m a f i l e o n y o u r P C , c l i c k t h i s
b u t t o n .
W r i t e t o F i l e
T o d o w n l o a d t h e c u r r e n t l i s t o f T r u s t e d S t a t i o n s f r o m t h e A c c e s s
P o i n t t o a f i l e o n y o u r P C , c l i c k t h i s b u t t o n .

P a g e 1 3 o f 9 3
T r u s t e d W i r e l e s s S t a t i o n s
T o c h a n g e t h e l i s t o f t r u s t e d w i r e l e s s s t at i o n s , u s e t h e M o d i f y L i s t b u t t o n o n t h e Acc e s s C o n t r o l s c r e e n . Y o u w i l l s e e a
s c r e e n l i k e t h e s a m p l e b e l o w .
Figure 7: Trusted Wireless Stations
D a t a - T r u s t e d W i r e l e s s S t a t i o n s
T r u s t e d W i r e l e s s
S t a t i o n s
T h i s l i s t s a n y W i r e l e s s S t a t i o n s w h i c h y o u h a v e d e s i g n a t e d a s
“ T r u s t e d ” .
O t h e r W i r e l e s s
S t a t i o n s
T h i s l i s t a n y W i r e l e s s S t a t i o n s d e t e c t e d b y t h e A c c e s s P o i n t ,
w h i c h y o u h a v e n o t d e s i g n a t e d a s " T r u s t e d " .
N a m e
T h e n a m e a s s i g n e d t o t h e T r u s t e d W i r e l e s s S t a t i o n . U s e t h i s
w h e n a d d i n g o r e d i t i n g a T r u s t e d S t a t i o n .
A d d r e s s
T h e M A C ( p h y s i c a l ) a d d r e s s o f t h e T r u s t e d W i r e l e s s S t a t i o n .
U s e t h i s w h e n a d d i n g o r e d i t i n g a T r u s t e d S t a t i o n .
Buttons
< <
A d d a T r u s t e d W i r e l e s s S t a t i o n t o t h e l i s t ( m o v e f r o m t h e " O t h e r
S t a t i o n s " l i s t ) .
•Select an entry (or entries) in the "Other Stations" list,
and click the " << " button.
•Enter the Address (MAC or physical address) of the
wireless station, and click the "Add " button.
> >
D e l e t e a T r u s t e d W i r e l e s s S t a t i o n f r o m t h e l i s t ( m o v e t o t h e
" O t h e r S t a t i o n s " l i s t ) .
•Select an entry (or entries) in the "Trusted Stations" list.
•Click the " >> " button.
S e l e c t A l l
S e l e c t a l l o f t h e S t a t i o n s l i s t e d i n t h e " O t h e r S t a t i o n s " l i s t .
S e l e c t N o n e
D e -s e l e c t a n y S t a t i o n s c u r r e n t l y s e l e c t e d i n t h e " O t h e r S t at i o n s "
l i s t .
E d i t
To change an existing entry in the "Trusted Stations" list,
select it and click this button.
24. Select the Station in the "Trusted Station" list.
25. Click the "Edit" button. The address will be copied to the
"Address" field, and the "Add" button will change to
"Update".
26. Edit the address (MAC or physical address) as required.
27. Click "Update" to save your changes.
A d d
T o a d d a T r u s t e d S t a t i o n w h i c h i s n o t i n t h e " O t h e r W i r e l e s s
S t at i o n s " l i s t , e n t e r t h e r e q u i r e d d a t a a n d c l i c k t h i s b u t t o n .

P a g e 1 4 o f 9 3
C l e a r
C l e a r t h e N a m e a n d A d d r e s s f i e l d s .
S e c u r i t y P r o f i l e s
S e c u r i t y P r o f i l e s c o n t a i n t h e S S I D a n d a l l t h e s e c u r i t y s e t t i n g s f o r W i r e l e s s c o n n e ct i o n s t o t h i s A c c e s s P o i n t .
•Up to eight (8) Security Profiles can be defined.
•Up to four (4) Security Profiles can be enabled at one time, allowing up to 4 different SSIDs to be used
simultaneously.
Figure 8: Security Profiles Screen
D a t a - S e c u r i t y P r o f i l e s S c r e e n
Profile
P r o f i l e L i s t
A l l a v a i l a b l e p r o f i l e s a r e l i s t e d . F o r e a c h p r o f i l e , t h e f o l l o w i n g d a t a
i s d i s p l a y e d :
•*
If displayed before the name of the profile, this indicates
the profile is currently enabled. If not displayed, the
profile is currently disabled.
•Profile Name
The current profile name is displayed.
•[SSID]
The current SSID associated with this profile.
•Security System
The current security system (e.g. WPA-PSK ) is
displayed.
•[Band]
The Wireless Band (2.4 GHz, 5GHz) for this profile is
displayed. Profiles may be assigned to either or both
Wireless Bands.
B u t t o n s
•Enable - Enable the selected profile.
•Configure - Change the settings for the selected profile.
•Disable - Disable the selected profile.

P a g e 1 5 o f 9 3
Primary Profile
8 0 2 . 1 1 b / g A P M o d e
S e l e c t t h e p r i m a r y p r o f i l e f o r 8 0 2 . 1 1 b a n d 8 0 2 . 1 1 g ( 2 . 4 G H z
b a n d ) A P m o d e . O n l y e n a b l e d p r o f i l e s a r e l i s t e d . T h e S S I D
a s s o c i a t e d w i t h t h i s p r o f i l e w i l l b e b r o a d c a s t i f t h e " B r o a d c a s t
S S I D " s e t t i n g o n t h e Bas i c s c r e e n i s e n a b l e d .
8 0 2 . 1 1 b / g B r i d g e
M o d e
S e l e c t t h e p r i m a r y p r o f i l e f o r 8 0 2 . 1 1 b a n d 8 0 2 . 1 1 g ( 2 . 4 G H z
b a n d ) B r i d g e M o d e . T h i s s e t t i n g d e t e r m i n e s t h e S S I D a n d
s e c u r i t y s e tt i n g s u s e d f o r t h e B r i d g e c o n n e c t i o n t o t h e r e m o t e
A P .
Isolation
N o n e
I f t h i s o p t i o n i s s e l e c t e d , w i r e l e s s c l i e n t s u s i n g d i ff e r e n t p r o f i l e s
( d i f f e r e n t S S I D s ) a r e n o t i s o l a t e d f r o m e a c h o t h e r , s o t h e y w i l l b e
a b l e t o c o m m u n i c a t e w i t h e a c h o t h e r .
I s o l a t e a l l
I f t h i s o p t i o n i s s e l e c t e d , w i r e l e s s c l i e n t s u s i n g d i ff e r e n t p r o f i l e s
( d i f f e r e n t S S I D s ) a r e i s o l a t e d f r o m e a c h o t h e r , s o t h e y w i l l N O T
b e a b l e t o c o m m u n ic a t e w i t h e a c h o t h e r . T h e y w i l l s t i l l b e a b l e t o
c o m m u n i c a t e w i t h o t h e r c l i e n t s u s i n g t h e s a m e p r of i l e , u n l e s s t h e
" W i r e l e s s S e p a r a t i o n " s e t t i n g o n t h e " A d v a n c e d " s c r e e n h a s
b e e n e n a b l e d .
U s e V L A N
T h i s o p t i o n i s o n l y u s e f u l i f t h e h u b s / s w i t c h e s o n y o u r L A N
s u pp o r t t h e V L A N ( 8 0 2 . 1 Q ) s t a n d a r d .
W h e n V L A N i s u s e d , y o u m u s t s e l e c t t h e d e s i r e d V L A N f o r e a c h
s e c u r i t y p r o f i l e w h e n c o n f i g u r i n g t h e p r o f i l e . ( I f V L A N i s n o t
s e l e c t e d , t h e V L A N s e tt i n g f o r e a c h p r o f i l e i s i g n o r e d . )
C l i c k t h e " C o n f i g u r e V L A N " b u t t o n t o c o n f i g u r e t h e I D s u s e d b y
e a c h V L A N .
S e c u r i t y P r o f i l e S c r e e n
T h i s s c r e e n i s d i s p l a y e d w h e n y o u s e l e c t a P r o f i l e o n t h e S e c u r i t y P r o f i l e s s c r e e n , a n d c l i c k t h e C o n f i g u r e b u t t o n .
Figure 9: Security Profile Screen
P r o f i l e D a t a
E n t e r t h e d e s i r e d s e t t i n g s f o r e a c h o f t h e f o l l o w i n g :
P r o f i l e N a m e
E n t e r a s u i t a b l e n a m e f o r t h i s p r o f i l e .
S S I D
E n t e r t h e d e s i r e d S S I D . E a c h p r o f i l e m u s t h a v e a u n i q u e S S I D .
W i r e l e s s B a n d
S e l e c t t h e w i r e l e s s b a n d o r b a n d s f o r t h i s p r o f i l e . I f y o u r W i r e l e s s
A c c e s s P o i n t o n l y h a s a s i n g l e b a n d , t h e n o n l y 1 o p t i o n i s
a v a i l a b l e .

P a g e 1 6 o f 9 3
S e c u r i t y S e t t i n g s
S e l e c t t h e d e s i r e d o p t i o n , a n d t h e n e n t e r t h e s e t t i n g s f o r t h e s e l e c t e d m e t h o d .
T h e a v a i l a b l e o p t i o n s a r e :
•None - No security is used. Anyone using the correct SSID can connect to your network.
•WEP - The 802.11b standard. Data is encrypted before transmission, but the encryption system is not very
strong.
•WPA-PSK - Like WEP, data is encrypted before transmission. WPA is more secure than WEP, and should be
used if possible. The PSK (Pre-shared Key) must be entered on each Wireless station. The 256Bit encryption
key is derived from the PSK, and changes frequently.
•WPA-802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication
according to the 802.1x standard. Data transmissions are encrypted using the WPA standard.
If this option is selected:
•This Access Point must have a "client login" on the Radius Server.
•Each user must have a "user login" on the Radius Server.
•Each user's wireless client must support 802.1x and provide the login data when required.
•All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key
input is required.
•802.1x - This uses the 802.1x standard for client authentication, and WEP for data encryption. If possible, you
should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption.
If this option is selected:
•This Access Point must have a "client login" on the Radius Server.
•Each user must have a "user login" on the Radius Server.
•Each user's wireless client must support 802.1x and provide the login data when required.
•All data transmission is encrypted using the WEP standard. You only have to select the WEP key size;
the WEP key is automatically generated.

P a g e 1 7 o f 9 3
S e c u r i t y S e t t i n g s -N o n e
Figure 10: Wireless Security - None
N o s e c u r i t y i s u s e d . A n y o n e u s i n g t h e c o r r e c t S S I D c a n c o n n e c t t o y o u r n e t w o r k .
T h e o n l y s e t t i n g s a v a i l a b l e f r o m t h i s s c r e e n a r e R a d i u s M A C A u t h e n t i c a t i o n a n d U A M ( U n i v e r s a l A c c e s s M e t h o d ) .
R a d i u s M A C A u t h e n t i c a t i o n
R a d i u s M A C A u t h e n t i c a t i o n p r o v i d e s f o r M A C a d d r e s s c h e c k i n g w h i c h i s c e n t r a l i z e d o n y o u r R a d i u s s e r v e r . I f y o u d o n ' t
h a v e a R a d i u s S e r v e r , y o u c a n n o t u s e t h i s f e a t u r e .
Using MAC authentication
28. Ensure the Wireless Access Point can login to your Radius Server.
•Add a RADIUS client on the RADIUS server, using the IP address or name of the Wireless Access Point,
and the same shared key as entered on the Wireless Access Point.
•Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your
Radius Server. These parameters are entered either on the Security page, or the Radius-based MAC
authentication sub-screen, depending on the security method used.
•On the Access Point, enable the Radius-based MAC authentication feature on the screen below.
29. Add Users on the Radius server as required. The username must be the MAC address of the Wireless client
you wish to allow, and the password must be blank.
30. When clients try to associate with the Access Point, their MAC address is passed to the Radius Server for
authentication.
•If successful, “xx:xx:xx:xx:xx:xx MAC authentication” is entered in the log, and client station status would
show as “authenticated” on the station list table;
•If not successful, “xx:xx:xx:xx:xx:xx MAC authentication failed” is entered in the log,, and station status is
shown as “authenticating” on the station list table.

P a g e 1 8 o f 9 3
Radius-based MAC authentication Screen
T h i s s c r e e n w i l l l o o k d i f f e r e n t d e p e n d i n g o n t h e c u r r e n t s e c u r i t y s e t t i n g . I f y o u h a v e a l r e a d y p r o v i d e d t h e a d d r e s s o f y o u r
R a d i u s s e r v e r , y o u w o n ' t b e p r o m p t e d f o r i t a g a i n . O t h e r w i s e , y o u m u s t e n t e r t h e d e t a i l s o f y o u r R a d i u s S e r v e r o n t h i s
s c r e e n .
Figure 11: Radius-based MAC Authentication Screen
D a t a - R a d i u s -b a s e d M A C A u t h e n t i c a t i o n S c r e e n
En a b l e . . .
E n a b l e t h i s i f y o u w i s h t o R a d i u s -b a s e d M A C a u t h e n t i c a t i o n .
R a d i u s S e r v e r
A d d r e s s
I f t h i s f i e l d i s v i s i b l e , e n t e r t h e n a m e o r I P a d d r e s s o f t h e R ad i u s
S e r v e r o n y o u r n e tw o r k .
R a d i u s P o r t
I f t h i s f i e l d i s v i s i b l e , e n t e r t h e p o r t n u m b e r u s e d f o r c o n n e ct i o n s t o
t h e R a d i u s S e r v e r .
C l i e n t L o g i n
N a m e
I f t h i s f i e l d i s v i s i b l e , i t d i s p l a y s t h e n a m e u s e d f o r t h e C l i e n t L o g i n
o n t h e R a d i u s S e r v e r . T h i s L o g i n n a m e m u s t b e c r e a t e d o n t h e
R a d i u s S e r v e r .
S h a r e d K e y
I f t h i s f i e l d i s v i s i b l e , i t i s u s e d f o r t h e C l i e n t L o g i n o n t h e R ad i u s
S e r v e r . E n t e r t h e k e y v a l u e t o m a t c h t h e v a l u e o n t h e R a d i u s
S e r v e r .
W E P K e y
I f t h i s f i e l d i s v i s i b l e , i t i s f o r t h e W E P k e y u s e d t o e n c r y p t d a t a
t r a n s m i ss i o n s t o t h e R a d i u s S e r v e r . E n t e r t h e d e s i r e d k e y v a l u e i n
H E X , a n d e n s u r e t h e R a d i u s S e r v e r h a s t h e s a m e v a l u e .
W E P K e y I n d e x
I f t h i s f i e l d i s v i s i b l e , s e l e c t t h e d e s i r e d k e y i n d e x . A n y v a l u e c a n b e
u s e d , p r o v i d e d i t m a t c h e s t h e v a l u e o n t h e R a d i u s S e r v e r .

P a g e 1 9 o f 9 3
U A M
U A M ( U n i v e r s a l A c c e s s M e t h o d ) i s i n t e n d e d f o r u s e i n I n t e r n e t c a f e s , H o t S p o t s , a n d o t h e r s i t e s w h e r e t h e A c c e s s P o i n t
i s u s e d t o p r o v i d e I n t e r n e t A c c e s s .
I f e n a b l e d , t h e n H T T P ( T C P , p o r t 8 0 ) c o n n e c t i o n s a r e c h e c k e d . ( U A M o n l y w o r k s o n H T T P c o n n e c t i o n s ; a l l o t h e r t r a f f i c
i s i g n o r e d . ) I f t h e u s e r h a s n o t b e e n a u t h e n t i c a t e d , I n t e r n e t a c c e s s i s b l o c k e d , a n d t h e u s e r i s r e -d i r e c t e d t o a n o t h e r w e b
p a g e . T y p i c a l l y , t h i s w e b p a g e i s o n y o u r W e b s e r v e r , a n d e x p l a i n s h o w t o p a y f o r a n d o b t a i n I n t e r n e t a c c e s s .
T o u s e U A M , y o u n e e d a R a d i u s S e r v e r f o r A u t h e n t i c a t i o n . T h e " R a d i u s S e r v e r S e t u p " m u s t b e c o mp l e t e d b e f o r e y o u
c a n u s e U A M . T h e r e q u i r e d s e t u p d e p e n d s o n w h e t h e r y o u a r e u s i n g “ I n t e r n a l ” o r “ E x t e r n a l ” a u t h e n t i c a t i o n .
•Internal authentication uses the web page built into the Wireless Access Point.
•External authentication uses a web page on your Web server. Generally, you should use External
authentication, as this allows you to provide relevant and helpful information to users.
UAM authentication - Internal
31. Ensure the Wireless Access Point can login to your Radius Server.
•Add a RADIUS client on RADIUS server, using the IP address or name of the Wireless Access Point, and
the same shared key as entered on the Wireless Access Point.
•Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your
Radius Server. These parameters are entered either on the Security page, or the UAM sub-screen,
depending on the security method used.
32. Add users on your RADIUS server as required, and allow access by these users.
33. Client PCs must have the correct Wireless settings in order to associate with the Wireles Access Point.
34. When an associated client tries to use HTTP (TCP, port 80) connections, they will be re-directed to a user
login page.
35. The client (user) must then enter the user name and password, as defined on the Radius Server. (You must
provide some system to let users know the correct name and password to use.)
36. If the user name and password is correct, Internet access is allowed.
Otherwise, the user remains on the login page.
•Clients which pass the authentication are listed as “xx:xx:xx:xx:xx:xx WEB authentication” in the log table,
and station status would show as “Authenticated” on the station list table.
•If a client fails authentication, “xx:xx:xx:xx:xx:xx WEB authentication failed” shown in the log, and station
status is shown as “Authenticating” on the station list table.
UAM authentication - External
37. Ensure the Wireless Access Point can login to your Radius Server.
•Add a RADIUS client on RADIUS server, using the IP address or name of the Wireless Access Point, and
the same shared key as entered on the Wireless Access Point.
•Ensure the Wireless Access Point has the correct address, port number, and shared key for login to your
Radius Server. These parameters are entered either on the Security page, or the UAM sub-screen,
depending on the security method used.
38. On your Web Server, create a suitable welcome page.
The welcome page must have a link or button to allow the user to input their user name and password
on the uamlogon.htm page on the Access Point.
39. On the Access Point’s UAM screen, select External Web-based Authentication, and enter the URL for the
welcome page on your Web server.
40. Add users on your RADIUS server as required, and allow access by these users.
41. Client PCs must have the correct Wireless settings in order to associate with the Wireless Access Point.
42. When an associated client tries to use HTTP (TCP, port 80) connections, they will be re-directed to the
welcome page on your Web Server. They must then click the link or button in order to reach the Access
Point’s login page.
43. The client (user) must then enter the user name and password, as defined on the Radius Server. (You must
provide some system to let users know the correct name and password to use.)
44. If the user name and password is correct, Internet access is allowed.
Otherwise, the user remains on the login page.

P a g e 2 0 o f 9 3
•Clients which pass the authentication are listed as “xx:xx:xx:xx:xx:xx WEB authentication” in the log table,
and station status would show as “Authenticated” on the station list table.
•If a client fails authentication, “xx:xx:xx:xx:xx:xx WEB authentication failed” is shown in the log, and station
status is shown as “Authenticating” on the station list table.
UAM Screen
T h e U A M s c r e e n w i l l l o o k d i f f e r e n t d e p e n d i n g o n t h e c u r r e n t s e c u r i t y s e t t i n g . I f y o u h a v e a l r e a d y p r o v i d e d t h e a d d r e s s o f
y o u r R a d i u s s e r v e r , y o u w o n ' t b e p r o m p t e d f o r i t a g a i n .
Figure 12: UAM Screen
D a t a - U A M S c r e e n
E n a b l e
E n a b l e t h i s i f y o u w i s h t o u s e t h i s f e a t u r e . S e e t h e s e c t i o n a b o v e f o r
d e t a i l s o f u s i n g U A M .
I n t e r n a l
W e b -b a s e d
A u t h e n t i c at i o n
I f s e l e c t e d , t h e n w h e n a u s e r f i r s t t r i e s t o a c c e s s t h e I n t e r n e t , t h e y
w i l l b e b l o c k e d , a n d r e -d i r e c t e d t o t h e b u i l t -i n l o g i n p a g e . T h e l o g o n
d a t a i s t h e n s e n t t o t h e R a d i u s S e r v e r f o r a u t h e n t i c at i o n .
E x t e r n a l
W e b -b a s e d
A u t h e n t i c at i o n
I f s e l e c t e d , t h e n w h e n a u s e r f i r s t t r i e s t o a c c e s s t h e I n t e r n e t , t h e y
w i l l b e b l o c k e d , a n d r e -d i r e c t e d t o t h e U R L b e l o w . T h i s n e e d s t o b e
o n y o u r o w n l o c a l W e b S e r v e r . T h e p a g e m u s t a l s o l i n k b a c k t o t h e
b u i l t -i n l o g i n p a g e o n t h i s d e v i c e t o c o m p l e t e t h e l o g i n p r o c e d u r e .
L o g i n U R L
E n t e r t h e U R L o f t h e p a g e o n y o u r l o c a l W e b S e r v e r y o u w i s h u s e r s
t o s e e w h e n t h e y a t t e m p t t o a c c e s s t h e I n t e r n e t , b u t a r e n o t l o g g e d
i n .
L o g i n F a i l u r e
U R L
E n t e r t h e U R L o f t h e p a g e o n y o u r l o c a l W e b S e r v e r y o u w i s h u s e r s
t o s e e i f t h e i r l o g i n f a i l s . ( T h i s m a y b e t h e s a m e U R L a s t h e L o g i n
U R L ) .
S e c u r i t y S e t t i n g s -W E P
T h i s i s t h e 8 0 2 . 1 1 b s t a n d a r d . D a t a i s e n c r y p t e d b e f o r e t r a n s m i s s i o n , b u t t h e e n c r y pt i o n s y s t e m i s n o t v e r y s t r o n g .
Table of contents
Other Enable-IT Wireless Access Point manuals
Popular Wireless Access Point manuals by other brands

Philips
Philips Smart-hopping 2.0 installation guide

Crestron
Crestron CEN-WAP-ABG-CM quick start guide

Zinwell
Zinwell ZW-2000-IA user manual

D-Link
D-Link AirPro DWL-6000AP Quick installation guide

D-Link
D-Link DAP-1360 Quick installation guide

Zhone
Zhone EtherXtend 3300 Series Quick installation instructions

Fortress Technologies
Fortress Technologies ES210 Hardware guide

3Com
3Com WL-306 Test instructions

D-Link
D-Link DAP-3520 - AirPremier N Dual Band Exterior PoE Access... Command line interface reference manual

xG Technology
xG Technology CN1100 installation guide

KAREEM
KAREEM ST5801GB01R user manual

Edge-Core
Edge-Core EAP101 quick start guide