background image

 

 

 

 
 

 

 

 

User Manual 

Light Industrial Access Point 

IWF2220  

V1.2 

 

 

 

 

 

 

 

Summary of Contents for IWF2220

Page 1: ...User Manual Light Industrial Access Point IWF2220 V1 2 ...

Page 2: ...demark of NEXCOM INC Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners FCC Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide r...

Page 3: ... FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation For product available in the USA Canada market only channel 1 11 can be operated Selection of other channels is not possible This device and it s antennas s must not be co l...

Page 4: ...erated with minimum distance 20cm between the radiator your body Warning You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment 1 Handling the unit carry the unit with both hands and handle it with care 2 Maintenance to keep the unit clean use only approved cleaning products or cleans with a ...

Page 5: ...work 15 4 Adding Virtual Access Points 21 5 Securing the AP 23 6 Creating a WDS Bridge between two APs 35 7 Web Management Interface Configuration 38 7 1 System 40 7 1 1 General 40 7 1 2 Network Interface 42 7 1 3 Port 43 7 1 5 CAPWAP 46 7 1 6 IPv6 47 7 2 Wireless 48 7 2 1 VAP Overview 48 7 2 2 General 50 7 2 3 VAP Configuration 54 7 2 4 Security 55 7 2 5 Repeater 59 7 2 6 Advanced 60 7 2 7 Access...

Page 6: ...t Industrial AP ENGLISH 5 Copyright NEXCOM INC 7 4 4 Reboot 74 7 4 5 Upload Certificate 75 7 4 6 Channel Analysis 75 7 5 Status 77 7 5 1 Overview 77 7 5 2 Associated Clients 78 7 5 3 WDS Link Status 79 7 5 4 Event Log 80 ...

Page 7: ...ocedures and pictures to guide users with basic network system knowledge to complete the installation 1 2 Document Conventions Represents essential steps actions or messages that should not be ignored Note Contains related information that corresponds to a topic Indicates that clicking this button will save the changes you made but you must reboot the system for the changes to take effect Indicate...

Page 8: ...20 x1 CD ROM with User s Manual and QIG x1 Ethernet Cable x1 Power cord x1 Power Adaptor 12V x1 Detachable Antenna x4 It is recommended to keep the original packing materials for possible future shipment when repair or maintenance is required Any returned product should be packed in its original packaging to prevent damage during delivery ...

Page 9: ...fast secure and easy They support business grade security namely 802 1X and Wi Fi Protected Access WPA and WPA2 By pushing a purposely built button the WES Press n Connect feature makes it easy to bridge wireless links of multiple access points for forming a wider wireless network coverage The IWF Series also features multiple ESSIDs with VLAN tags and multiple Virtual APs great for enterprise app...

Page 10: ...r s Manual Light Industrial AP ENGLISH 9 Copyright NEXCOM INC 2 2 Hardware Description This section depicts the hardware information including all panel description IWF2220 Front Panel IWF2220 Front Panel ...

Page 11: ...an 5 seconds 2 WES Button RF B WDS Easy Setup Press the button to build up a WDS link with another peer 4 WDS links can be set up per RF card Note that the WES Button only runs on the 5 GHz RF Card B 3 LAN 1 4 Ports The ports for connections with LAN side devices 4 Uplink Port PoE The port for uplink connection to another gateway or device PoE 802 3at is supported 5 12V 2A Power Socket for the pow...

Page 12: ... hub IWF2220 is then connected to your existing wired LAN network Step 3 There are two ways to supply power to IWF2220 a Connect the DC power adaptor to the IWF2220 power jack socket b The IWF2220 Uplink port is capable of receiving DC currents Connect a IEEE 802 3at compliant PSE device e g a PoE switch to the Uplink port of IWF2220 with the Ethernet cable Now the Hardware Installation is complet...

Page 13: ...nt interface WMI connect the administrator PC to the LAN port of the AP via an Ethernet cable Then set a static IP Address on the same subnet mask as the AP in TCP IP settings of your PC such as the following example IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Note Please note that the IP Address used should not overlap with the IP Addresses of any other device within the same network to av...

Page 14: ... successful login into AP a System Overview page of the Web Management Interface WMI will appear The Web Management Interface System Overview Page To logout simply click on the Logout button at the upper right hand corner of the interface to return to the Administrator Login Page Click OK to logout ...

Page 15: ...lect the Change Password tab Enter the old password and then a new password with a length of up to 32 characters and retype it in the Re enter New Password field Congratulation Now the NEXCOM Access Point is installed and configured successfully It is strongly recommended to make a backup copy of your configuration settings After the AP s network configuration is completed please remember to chang...

Page 16: ...rovide wireless access to your network After having prepared the AP s hardware for configuration set the TCP IP settings of administrator s computer to have a static IP Address of 192 168 1 10 and Subnet Mask of 255 255 255 0 Step 1 Configuring the AP s System Information Enter the AP s default IP Address 192 168 1 1 into the URL of a web browser Log in using Username admin and Password admin The ...

Page 17: ...ds of setting up the time Manual indicated by the option Set Date Time and NTP The default is Manual and requires individual setup every time the system starts up Simply choose a time zone and set the time accordingly When it is finished click SAVE Manually Time Setup The alternative method is NTP Upon selecting NTP under the Time field the configuration changes to allow up to two NTP servers Simp...

Page 18: ...tting dynamic IP Addresses from the connected network set Mode to DHCP otherwise set Mode to Static and fill in the required fields marked with a red asterisk IP Address Netmask Gateway and Primary DNS Server with the appropriate values for the network Click SAVE when you are finished to save changes that have been made Step 3 Configure the AP s Wireless General Settings Click on the Wireless icon...

Page 19: ...he RF card you would like to set up and select the band in which the AP is to broadcast its signal The rest of the fields are optional and can be configured at another time Click SAVE if any changes have been made Note For IWF2220 the RF Card A supports only 2 4GHz bands b g n and RF Card B supports only 5GHz bands a n ...

Page 20: ...s wireless access refer to the following VAP 1 configuration other VAP configuration can refer to the same setup steps as done for VAP 1 Click on the Overview tab to proceed Virtual AP Overview Page On this page click the hyperlink in the row and column that corresponds with VAP 1 s State This will bring up the following page ...

Page 21: ...her please make sure that the VAP field is marked Enable afterwards enter an ESSID to represent the WLAN associated with AP s VAP 1 It is suggested that Profile Name is used to describe what this particular VAP will be used for otherwise leave it as default VLAN ID can be chosen at another time Click SAVE to save all changes up to this point and Reboot the system to apply these revised settings Co...

Page 22: ... virtual access points providing different levels of services from the same physical AP device Please click on the Wireless icon to review the VAP Overview page VAP Overview Page To proceed with specific VAP configuration click on the corresponding cell in the State column and row of the VAP the particular VAP s Configuration page will then appear for further configuration ...

Page 23: ...ofile Name Choose Enable for the VAP field Pick a descriptive Profile Name and an appropriate ESSID for clients to associate to A VLAN ID can be provided to indicate the traffic through this particular VAP It may allow further management control e g access rights and Internet usage etc of each VAP with a management gateway Click SAVE and then Reboot for the changes to take effect ...

Page 24: ...er through setting up different types of security for a particular VAP Simply repeat the following steps for other VAP with security requirement Step 1 Ensure the intended VAP is Enabled VAP Overview Page On the VAP Overview page check the table to confirm the VAP State If it is Enabled skip to Step 2 If not click on to proceed with VAP Configuration for that particular VAP ...

Page 25: ... Step 2 Configure Security Settings for your VAP The following instructions will guide the user to set up wireless security with a specific VAP If only restricted access of certain MAC addresses is desired skip to Step3 MAC restriction can be coupled with wireless security to provide extra protection First click on the corresponding cell in the column labeled Security Type This hyperlink will dire...

Page 26: ...ings Page RF Card A VAP 1 shown Select the desired Security Type from the drop down menu which includes None WEP 802 1X WPA PSK and WPA RADIUS 802 11g 802 11n band does not support WEP nor WPA PSK running TKIP When the Security Type is set as such the RF is only able to run g band ...

Page 27: ...g transmission when this option is selected This is the default setting as shown in the following figure Security Settings None WEP WEP Wired Equivalent Privacy is a data encryption mechanism with key length selected from 64 bit 128 bit or 152 bit Security Settings WEP 802 11 Authentication Select from Open System Shared Key or Auto ...

Page 28: ...sed for the encryption of wireless frames during data transmission WEP Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 802 1X When 802 1X Authentication is selected RADIUS authentication and enhanced dynamic WEP are provided Security Settings 802 1X Authentication Dynamic WEP Settings o Dynamic WEP For 802 1X security type Dynamic WEP is always enabled to au...

Page 29: ...The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accounting purposes Specify a port number or use the default...

Page 30: ...e Select an encryption method from TKIP WPA AES WPA TKIP WPA2 AES WPA2 or Mixed Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase Pre shared Key Enter the key value for the pre shared key the format of the key value depends on the key type selected Group Key Update Period The time interval for the Group Key to be renewed the time unit is in seconds ...

Page 31: ...r Settings o Host Enter the IP address or domain name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port ...

Page 32: ... will bring the user to the Access Control Settings page Access Control Settings Page Please choose among Disable Allow Deny and RADIUS ACL from the drop down menu of Access Control Type 1 Disable Access Control This means that there is no restriction for client devices to access the system 2 MAC ACL Allow List This means that only the client devices identified by their MAC addresses listed in the...

Page 33: ...ke sure at least the MAC of the modifying system is included e g network administrator s computer 3 MAC ACL Deny List This means that all client devices are granted with access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Enable ...

Page 34: ...uthenticate incoming MAC addresses by an external RADIUS server When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS server Please note that each VAP MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration ...

Page 35: ...User s Manual Light Industrial AP ENGLISH 34 Copyright NEXCOM INC RADIUS ACL Click SAVE and Reboot upon completing the related configurations to take effect ...

Page 36: ...to peer connection both APs will be configured the same way Step 1 Make sure the Band and Channel are matched between the WDS peers In order to create a valid WDS link the two APs must be configured to use the same channel and band for their wireless settings Click the Wireless icon and then General tab to go to the following page Wireless General Settings Page Please make sure both APs are using ...

Page 37: ...s feature please click on the System icon and the Network Interface tab Network Settings Page Please select Enable in the field labeled Layer2 STP This will prevent data from looping or creating a broadcast storm Click SAVE when completed and then Reboot to allow updated settings to take effect Step 3 Building the WDS Link To extend the wireless coverage each RF card supports up to 4 WDS links for...

Page 38: ...the main menu 2 Select the Repeater Settings tab 3 Choose WDS as the Repeater Type 4 Choose the desired WDS profile a Enable WDS b Enter the MAC Address peer AP and then Click SAVE If you are using another NEXCOM APs as the peer AP simply repeat the above mentioned steps to configure another peer AP s ...

Page 39: ...king Area occupies the major area of the WMI displayed in the center of the interface It is also referred to as the configuration page The Main Menu on the top of the WMI allows the administrator to traverse to various management functions of the system The management functions are grouped into branches System Wireless Firewall Utilities and Status Table 1 NEXCOM Access Points Function Organizatio...

Page 40: ...each configuration page you may click SAVE to save the changes of your configured settings but you must reboot the system for the changes to take effect After clicking SAVE the following message will appear Some modification has been saved and will take effect after Reboot All online users will be disconnected during reboot or restart ...

Page 41: ...formation For maintenance purposes it is highly recommended to have the following information stated as clearly as possible Name The system name used to identify this system Description Further information about the system e g device model firmware version and active date Location The information on geographical location of the system for the administrator to locate the system easily Time Device T...

Page 42: ...NTP server internal or external If there isn t locate a nearby NTP server on the web 2 Manually set up By selecting Manually set up the administrator can manually set the system date and time Manual Time Configuration Fields Set Date Select the appropriate Year Month and Day from the drop down menu Set Time Select the appropriate Hour Min and Sec from the drop down menu Unless Internet connection ...

Page 43: ... IP address of the primary DNS Domain Name System server o Alternate DNS Server The IP address of the substitute DNS server DHCP This configuration type is applicable when the system is connected to a network with the presence of a DHCP server all related IP information required will be provided by the DHCP server automatically Layer 2 STP If the AP is set up to bridge other network components thi...

Page 44: ...tagged with a VLAN ID CAPWAP Tunnel Interface Select a LAN VAP or WDS interface to designate its traffic to pass through the CAPWAP Tunnel established between the AP and the controller For network interfaces that are unchecked their traffic will be forwarded locally into the internet if this AP is deployed remotely on the WAN side of a controller The TIP in red at the bottom of the page explains t...

Page 45: ...ement When this is enabled management traffic from the system will be tagged with a VLAN ID In other words administrator who wants to access the WMI must send management traffic with the same VLAN ID such as connecting to a specific VAP with the same VLAN ID Enter a value between 1 and 4094 for the VLAN ID if the option is enabled Note Management is done without the utilization of VLAN IDs on sele...

Page 46: ...ite privilege Trap When enabled events on Cold Start Interface UP Down and Association Disassociation can be reported to an assigned server o Enable Disable Enable or Disable this function o Server IP Address Enter the IP address of the assigned server that will receive the trap report System Log When this function is enabled specify an external SYSLOG server to accept SYSLOG messages from the sys...

Page 47: ...is item select Enable and click Manage Certificates to enter the Upload Certificate page Please refer to the section 7 4 4 Upload Certificate DNS SRV Discovery Using DNS SRV to discover acess controller Domain Name Suffix Enter the suffix of the access controller such as example com DHCP Option Discovery Using DHCP option to discover access controller Broadcast Discovery Using Broadcast to discove...

Page 48: ...ssing capability IPv6 by default is disabled but it can be enabled on this tab page Mode There are two options for acquiring an IPv6 address for this device Static Configuring IPv6 address manually via this option if you have already acquired a permanent IPv6 address for operation DHCP Acquire IPv6 address automatically from upstream server ...

Page 49: ...n settings e g ESSID VLAN ID security settings etc With such VAP capabilities different levels of service can be configured to meet network requirements 7 2 1 VAP Overview An overall status is collected on this page including ESSID State Security Type MAC ACL and Advanced Settings where the AP features 8 VAPs with respective settings In this table please click on the hyperlink to further configure...

Page 50: ...H 49 Copyright NEXCOM INC VAP State Page Security Type The hyperlink showing the security type links to the Security Settings Page VAP Security Type Page MAC ACL The hyperlink showing Allow or Disable links to the Access Control Settings Page ...

Page 51: ...NGLISH 50 Copyright NEXCOM INC VAP MAC ACL Page Advanced Settings The advanced settings hyperlink links to the Advanced Wireless Settings Page VAP Advanced Settings Page 7 2 2 General AP s general wireless settings can be configured here ...

Page 52: ...available when Band is 802 11g 802 11n or 802 11a 802 11n The guard interval is the space between symbols characters being transmitted to eliminate inter symbol interference In order to further boost throughput with 802 11n short guard interval is half of what it used to be please select Enable to use Short Guard Interval or Disable to use normal Guard Interval Channel Width available when Band is...

Page 53: ...nabled this feature ensures all devices with different band compatibilities have the same air time This feature is ideal for networks with devices supporting different bands Packet Delay Threshold ms This is Tx queue flushing mechanism which purpose is to drop packets and immediately begin to process others if the queue has been processed for more than x milliseconds where Default 0 disabled Table...

Page 54: ...User s Manual Light Industrial AP ENGLISH 53 Copyright NEXCOM INC Please note that available values above will vary depending on the regulation of different countries ...

Page 55: ...rofile Name The profile name of a specific RF card and its VAP for identity management purposes ESSID ESSID Extended Service Set ID serves as an identifier for clients to associate with the specific VAP It can be coupled with different service levels like a variety of wireless security types VLAN ID The NEXCOM Access Point supports tagged VLANs virtual LANs To enable VLAN function each VAP shall b...

Page 56: ...ent service levels to clients The security type includes None WEP 802 1X WPA PSK and WPA RADIUS None Authentication is not required and data is not encrypted during transmission when this option is selected This is the default setting as shown in the following figure Security Settings None WEP WEP Wired Equivalent Privacy is a data encryption mechanism based on a 64 bit 128 bit or 152 bit shared k...

Page 57: ...P Keys Provide the pre defined WEP key value the system supports up to 4 sets of WEP keys 802 1X When 802 1X Authentication is selected RADIUS authentication and Dynamic WEP are provided Security Settings 802 1X Authentication Dynamic WEP Settings o Dynamic WEP For 802 1X security type Dynamic WEP is always enabled to automatically generate WEP keys for encryption o WEP Key Length Select a key len...

Page 58: ...erval The system will update accounting information to the RADIUS server every interval period WPA PSK WPA PSK Wi Fi Protected Access Pre shared Key is a pre shared key authentication method a special mode of WPA Security Settings WPA PSK Cipher Suite Select an encryption method from TKIP WPA AES WPA TKIP WAP2 AES WAP2 or Mixed Pre shared Key Type Select a pre shared key type PSK Hex or Passphrase...

Page 59: ...in name of the RADIUS server o Authentication Port The port number used by the RADIUS server Specify a port number or use the default 1812 o Secret Key The secret key for the system to communicate with the RADIUS server o Accounting Service Enabling this option allows accounting of login and logouts through the RADIUS server o Accounting Port The port number used by the RADIUS server for accountin...

Page 60: ...onnections respectively Please fill in remote peer s MAC address and click SAVE to proceed if setting revision is necessary the CLEAR button can be used to clear the contents in the above WDS connection list Repeater Settings WDS o WDS Select Enable to enable the respective WDS links Select Disable to remove them o MAC Address To input remote peer s MAC address o Security Type None WEP or WPA PSK ...

Page 61: ...nd can detect only the AP but not each other Fragmentation Threshold Enter a value between 256 and 2346 The default is 2346 A packet size larger than this threshold will be fragmented sent with several pieces instead of one chunk before transmission A smaller value results in smaller frames but allows a larger number of frames in transmission A lower Fragment Threshold setting can be useful in are...

Page 62: ...enabled the system will automatically broadcast information of associated wireless stations to its peer access points This will help wireless stations roam smoothly among IAPP enabled access points in the same wireless LAN IGMP Snooping When IGMP snooping is enabled IGMP packets are transferred via the Access Point s network interface and the IP multicast host Registration information is recorded ...

Page 63: ...device Access Control Settings Page Maximum Number of Clients The NEXCOM Access Point supports various methods of authenticating clients for wireless LAN access The default policy is unlimited access without any authentication requirement To restrict the station number of wireless connections simply change the Maximum Number of Stations to a desired number For example when the number of stations i...

Page 64: ...CL Allow List When selecting MAC ACL Allow List only the client devices identified by their MAC addresses listed in the Allow List allowed MAC addresses are granted access to the system The administrator can temporarily block any allowed MAC address by checking Disable until the administrator re Enables the listed MAC MAC Allow List Note An empty Allow List means that there is no allowed MAC addre...

Page 65: ...CL Deny List When selecting MAC ACL Deny List all client devices are granted access to the system except those listed in the Deny List denied MAC addresses The administrator can allow any denied MAC address to connect to the system temporarily by checking Disable Deny List ...

Page 66: ...ate incoming MAC addresses by an external RADIUS When RADIUS ACL is selected all incoming MAC addresses will be authenticated by an external RADIUS Please note that each VAP s MAC ACL and its security type shown on the Security Settings page share the same RADIUS configuration RADIUS ACL ...

Page 67: ...ce and Advanced Firewall Settings 7 3 1 Firewall List It provides an overview of firewall rules in the system 6 default rules with up to a total of 20 firewall rules are available for configuration Firewall List Page From the overview table each rule is designated with the following field No The numbering will decide the priority for the system to carry out the available firewall rules in the tabl...

Page 68: ...e when EtherType is IPv4 Select the available upper layer protocols services from the drop down list DSAP SSAP when EtherType is IEEE 802 3 The value can be further specified for the fields in 802 2 LLC frame header Type when EtherType is IEEE802 3 The field can be used to indicate the type of encapsulated traffic VLAN ID when EtherType is 802 1 Q The VLAN ID is provided to associate with certain ...

Page 69: ... firewall list will lead to the following page for detail configuration with rule ID for the current inserted rule From this page a rule can be added or edited from an existing rule for revision To move a specific rule Mv in the Setting column of the firewall list will lead to the following page for reordering confirmation After the SAVE button is clicked and system is rebooted the order of rules ...

Page 70: ...User s Manual Light Industrial AP ENGLISH 69 Copyright NEXCOM INC ...

Page 71: ...ass traffic of layer 3 or above protocols These services are available to choose from a drop down list of layer2 firewall rule edit page with Ether Type IPv4 The first 28 entries are default services and the administrator can add delete any extra desired services There are 28 firewall services available in default settings these default services cannot be deleted but can be disabled If changes are...

Page 72: ...e ARP table maintained by the AP will be used as a look up table upon receipt of ARP request from AP uplink Adversely without Proxy ARP ARP request is broadcasted down into the AP s wireless network causing network inefficiencies o Force DHCP option when enabled the AP only learns MAC IP pair information through DHCP packets Since devices configured with static IP address does not send DHCP traffi...

Page 73: ...ha numeric characters are allowed and it is also recommended to make use of a combination of both numeric and alphabetic characters Change Password Page The administrator can change password on this page Enter the original password admin and new password and then re enter the new password in the Re enter New Password field Click SAVE to save the new password 7 4 2 Backup Restore This function is u...

Page 74: ...f the reboot process The System Overview page will appear upon reboot completion Backup System Settings Click Backup to save the current system settings to a local disk such as the hard disk drive HDD of a local computer or a compact disc CD Restore System Settings Click Browse to search for a previously saved backup file and then click Upload to restore the settings The backup file will replace t...

Page 75: ...te It is recommended to check the firmware version number before proceeding further Please make sure you have the correct firmware file Firmware upgrade may sometimes result in the loss of data Please ensure that all necessary settings are written down before upgrading the firmware During firmware upgrade please do not turn off the power This may permanently damage the system 7 4 4 Reboot This fun...

Page 76: ... or Trusted Certificate for a means of security verification for CAPWAP or other security needs to ensure the authenticity of this AP to other network entities Use Default Certificate Click Use Default Certificate to use the default certificate and key 7 4 6 Channel Analysis The Channel Analysis is an excellent tool for IT staff to quickly grasp an idea of what the channel dynamics are Included fo...

Page 77: ...lysis is in progress the RF card loses its capability to serve clients and kicks off current users The browser used to implement Channel Analysis should have Java Runtime Environment installed beforehand or it would not display any information The system only allows 1 operator to use this function at one time Channel Analysis only runs on the 2 4GHz RF Card A of IWF2220 ...

Page 78: ...e is used to view the current condition and state of the system and it includes the following functions Overview Associated Clients WDS Link Status and Event Log 7 5 1 Overview The System Overview page provides an overview of the system status for the administrator System Overview Page ...

Page 79: ... Mask The Subnet Mask of the LAN Interface Gateway The Gateway of the LAN Interface Radio Status MAC Address The MAC address of the RF Card Band The RF band in use Channel The channel specified Tx Power Transmit Power level of RF card AP Status Profile Name The profile name of AP BSSID Basic Service Set ID ESSID Extended Service Set ID Security Type Security type of the Virtual AP Online Clients T...

Page 80: ... address of associated clients SNR The Signal to Noise Ratio of respective client s association Idle Time Time period that the associated client is inactive for the time unit is in seconds Disconnect Upon clicking Kick the client will be disconnected from the system 7 5 3 WDS Link Status The administrator can review detailed information of the repeater function at Status WDS Link Status Informatio...

Page 81: ...nt Log Page Each line in the log represents an event record in each line there are 4 fields Date Time The time date when the event happened Hostname Indicates which host recorded this event Note that all events on this page are local events so the hostname in this field is always the same In remote SYSLOG service however this field will help the administrator identify which event is from this Acce...

Page 82: ...P ENGLISH 81 Copyright NEXCOM INC Process name Indicate the event generated by the running instance Description Description of the event To save the file locally click SAVE LOG to clear all of the records click CLEAR P N V10020130328 ...

Reviews: