User ManualTable of Contents1 Safety Precautions11.1 Safety Precautions11.2 Symbol Description12 Installation and Debugging22.1 Installation Preparations22.1.1 Installation Preparation Flow22.1.2 Tool, Instrument and Document22.1.3 Installation Environment Inspection22.1.4 Unpacking Inspection22.2 Installation22.3 Power-on and Power-off22.4 Debugging23 Command Line Configuration33.1 Overview33.2 User Mode33.2.1 Entering the Privileged Mode33.2.2 Exiting the Telnet Configuration33.3 Privileged Mode33.3.1 Network Connectivity Check33.3.2 Saving the Configuration Data to FLASH33.3.3 Restoring the Default Configuration33.3.4 Resetting the Software33.3.5 Entering the Configure Mode33.3.6 Exiting the Privileged Mode33.3.7 Exiting the Telnet Configuration33.4 Configure Mode33.4.1 Bridge Configuration33.4.2 Clearing the Information33.4.3 Configuring the Configuration Server33.4.4 DHCP Server Configuration33.4.5 DISCOVER Configuration33.4.6 802.1X Parameter Configuration33.4.7 Password Configuration in the Privileged Mode33.4.8 Erasing the Filtration Rules33.4.9 Exiting the Configure Mode33.4.10 IAPP Load Balance Configuration33.4.11 Entering the Interface Configuration Mode33.4.12 IP Network Parameter Configuration33.4.13 Kicking Users33.4.14 Two-Layer Separation Configuration33.4.15 Log Printing Message Configuration33.4.16 MAC Filtration Configuration33.4.17 MAC Address Authentication Configuration33.4.18 Manager Configuration33.4.19 QoS Configuration33.4.20 RADIUS Server Configuration33.4.21 SNMP Module Configuration33.4.22 SSH Parameter Configuration33.4.23 Spanning Tree Parameter Configuration33.4.24 TELNET Configuration33.4.25 Uploading/Downloading TFTP Files33.4.26 VLAN Configuration33.4.27 Web Configuration33.4.28 Nation Zone Configuration33.4.29 Showing Parameter Configuration33.5 Ethernet Interface Configuration Mode33.5.1 Exiting the Ethernet Interface Configuration Mode33.5.2 Ethernet Interface MAC Filtration Configuration33.6 Wireless Interface Configuration Mode33.6.1 802.11-Related Parameter Configuration of the Wireless Interface33.6.2 ESSID Hiding Configuration33.6.3 Exiting the Wireless Interface Configuration Mode33.6.4 Enabling the Link Integrity Detection Function33.6.5 Wireless Interface MAC Filtration Configuration33.6.6 Multi-ESSID Configuration33.6.7 Security Parameter Configuration33.6.8 Transmission Power Configuration33.6.9 Working Mode Configuration3A.1 Making of Ethernet Cables1A.1.1 Making of Straight Through Ethernet Cables (RJ45)1A.1.2 Making of Straight Through Power Supply Ethernet Cables (C-RJ45-001)1A.1.3 Making of Crossover Ethernet Cables (RJ45J)2A.1.4 Ethernet Cable Label3Fig. 2.1-1 Sub-Channel Distribution2Fig. 2.1-2 Channel Distribution Principle of Adjacent APs2Fig. 2.2-1 installation instruction2Fig. 2.2-2 Soldered Connectors2Fig. 3.1-2 Telnet to W800A3Fig. A.1-1 Label of the Straight Through Ethernet Cable3Fig. A.1-2 Label of the Straight Through Power Supply Ethernet Cable3Fig. A.1-3 Label of the Crossover Ethernet cable4Table 1.2-1 Safety Symbols and Descriptions1Table 2.1-1 IDs and Frequencies of Channels2Table 3.6-1 W800A Working Channels3Table A.1-1 Connections of Straight Through Ethernet Cables (RJ45)1Table A.1-2 Connections of Straight Through Power Supply Ethernet Cables (C-RJ45-001)2Table A.1-3 Connections of Crossover Ethernet Cables (RJ45J)2Size: 521 KBPages: 80Language: EnglishOpen manual