CONTENTS
1 INTRODUCTION ............................................................................................ 1
1.1 Features.........................................................................................................................2
1.2 Specifications................................................................................................................ 2
1.3 Package Contents.......................................................................................................... 3
2 INSTALLATION PROCEDURE ..................................................................... 4
3 CONFIGURATION UTILITY......................................................................... 7
3.1 Site Survey....................................................................................................................9
3.2 Profile.......................................................................................................................... 10
3.2.1 Configure the Profile ........................................................................ 11
3.2.1.1 Configuration ............................................................................................. 11
3.2.1.2 Authentication and Security....................................................................... 13
3.2.1.3 802.1x Setting-Certification....................................................................... 17
3.2.1.4 802.1x Setting-CA Server .......................................................................... 18
3.3 Link Status .................................................................................................................. 19
3.4 Statistics ...................................................................................................................... 20
3.5 Advance ...................................................................................................................... 20
3.6 QoS ............................................................................................................................. 23
3.7 About........................................................................................................................... 24
3.8 Turbo Mode................................................................................................................. 25
3.9 SoftAP......................................................................................................................... 25
3.9.1 Config............................................................................................................... 25
3.9.1.1 Auth. Vs. Security ..................................................................... 28
3.9.2 Access Control ................................................................................................. 30
3.9.3 Mac Table......................................................................................................... 31
3.9.4 Event Log.........................................................................................................32
3.9.5 Statistics ...........................................................................................................32
3.9.6 About................................................................................................................33
4 TROUBLESHOOTING.................................................................................. 34