Ruijie RG-WLAN Series Access Points Web-Based Configuration Guide, RGOS11.9 (6) W1B1 (V1.0)
Ruijie RG-WLAN Series Access Points Web-Based Configuration Guide, RGOS11.9 (6) W1B1 (V1.0)
AP_RGOS 11.9(6)W1B1
Any reproduction, excerption, backup, modification, transmission, translation or commercial use of this document or
any portion of this document, in any form or by any means, without the prior written consent of Ruijie Networks is
prohibited.
All other trademarks or registered trademarks mentioned in this document are owned by their respective owners.
Disclaimer
The products, services, or features you purchase are subject to commercial contracts and terms. Some or all of the
products, services or features described in this document may not be within the scope of your purchase or use.
Unless otherwise agreed in the contract, Ruijie Networks does not make any express or implied statement or
guarantee for the content of this document.
Due to product version upgrades or other reasons, the content of this document will be updated from time to time.
Ruijie Networks reserves the right to modify the content of the document without any notice or prompt.
This manual is for reference only. Ruijie Networks endeavors to ensure content accuracy and will not shoulder any
responsibility for losses and damages caused due to content omissions, inaccuracies or errors.
Preface
Intended Audience
This document is intended for:
Network engineers
Network administrators
Technical Support
Ruijie Networks Website: https://www.ruijienetworks.com/
Community: https://community.ruijienetworks.com
Conventions
1. Signs
The signs used in this document are described as follows:
Warning
An alert that calls attention to important rules and information that if not understood or followed can result in data
loss or equipment damage.
Caution
An alert that calls attention to essential information that if not understood or followed can result in function failure or
performance degradation.
Note
An alert that contains additional or supplementary information that if not understood or followed will not lead to
serious consequences.
Specification
I
Contents
Preface ................................................................................................................................................... I
1.6.1 Constructing a WLAN for the DHCP Server on the AP Device ............................... 78
i
Configuration Guide Web-based Configuration
1 Web-based Configuration
1.1 Overview
A user accesses the Web-based management system using a browser such as Internet Explorer (IE) to manage the
AP device.
Web-based management involves two parts: Web server and Web client. A Web server is integrated into a device to
receive and process requests sent from a client (for example, read a Web file or execute a command request) and
returns the processing results to the client. Generally, a Web client refers to a Web browser.
1.2 Application
Application Description
Web-based Management After configuring, a user can access the Web-based management system through a
browser.
As shown in the following figure, an administrator can access a device through a browser on a PC to manage the
device.
Figure 1-1
Note The Web management system integrates configuration commands and sends them to the device through
AJAX requests.
Web service is enabled on the device to process HTTP requests to return requested data.
Function Deployment
1
Configuration Guide Web-based Configuration
An administrator logs in to the Web-based management system using the Web browser on a client to manage
the device. Generally, a client refers to a PC. It may also be other mobile terminal devices, for example, a laptop.
Google Chrome is recommended, and Internet Explorer 11 and 360 Browser are supported. Exceptions such as
messy code and format errors may occur when other browsers are used.
Resolution: It is recommended that the resolution be set to 1024 x 768, 1280 x 1024, or 1440 x 960. Exceptions
such as font alignment error and format error may occur when other resolutions are selected.
Login authentication information for Web-based management must be configured for the AP device.
Default Configuration
The following table lists the Web management system default configuration.
Login
Type http://X.X.X.X (management IP address), default: http://192.168.110.1, in the address bar of a browser and press
Enter to access the login page, as shown in the following figure.
2
Configuration Guide Web-based Configuration
Enter the username and password. Click Login to access the Web management system.
If you enter the wrong username or password for five consecutive times, your account will be locked for 10 minutes.
3
Configuration Guide Web-based Configuration
1) The Config Wizard page is displayed after successfully logging in to the Web if the device is in the default factory
setting state, as shown in the preceding figure.
2) The Config Wizard page is also displayed when you click the Config Wizard link in the upper-right corner on the
homepage.
The device supporting NAT can work in Bridge mode or NAT mode.
4
Configuration Guide Web-based Configuration
Configure the Wi-Fi parameters, and click Finish to finish the configuration.
After the AP device is initialized, please configure the AP device through the Config Wizard page.
5
Configuration Guide Web-based Configuration
All quick settings are scenario-based settings. And some of the configuration is delivered by default. If
configurations such as NAT, interface, or address pool are changed via CLI or MACC system, it is recommended
to not change the configuration again via Quick Settings, otherwise there could be incompatibility.
If the AP device is in access mode, it is recommended to build the gateway and address pool on the other device.
If the AP device is in routing mode, it is recommended to build the gateway and address pool on the AP device
and configure the NAT for it.
1.3.2 Monitor
1.3.2.1 Dashboard
The dashboard enables viewing basic information for the AP device, including the device MAC address, device model,
system alarm information, flow trends of AP device ports, latest trends of all management APs, and STA information
corresponding to each management AP. In addition, it enables you to know the distribution condition of STA signal
strength in real time.
Click the Traffics > Details or RSSI Summary > Details link in the lower left corner to view the STA details on the
displayed page, for example, the MAC address and RSSI.
6
Configuration Guide Web-based Configuration
1.3.2.3 DHCP
DHCP server status and address pool usage are displayed here.
7
Configuration Guide Web-based Configuration
1.3.3 Configuration
1.3.3.1 Wi-Fi/WLAN
A Wireless Local Area Network (WLAN) refers to a network system that allows different PCs to communicate and share
resources with each other by interconnecting different PCs through wireless communication technologies. The essence
of a WLAN is that PCs are interconnected with each other in wireless rather than wired mode, thus constructing a
network and allowing terminals to move more flexibly.
Wi-Fi or Wi-Fi is a technology for wireless local area networking with devices based on the IEEE
802.11standards. Devices that can use Wi-Fi technology include personal computers, video-game
consoles, smartphones, digital cameras, tablet computers, smart TVs, digital audio players and modern printers. Wi-Fi
compatible devices can connect to the Internet via a WLAN and a wireless access point. Such an access point
(or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be
as small as a single room with walls that block radio waves, or as large as many square kilometers achieved by using
multiple overlapping access points.
Service Set Identifier (SSID), also referred to as ESSID: It is used to distinguish different networks, that is, identifying
an ESS. An SSID contains a maximum of 32 characters. A WNIC configured with different SSIDs can access different
networks. SSIDs are usually broadcasted by an AP or a wireless router. The scanning function delivered with the XP
can be used to view SSIDs within the current area. In consideration of security, SSIDs may not be broadcasted. In this
case, users need to manually set SSIDs to access corresponding networks. To be simple, an SSID is the name of a
WLAN. Only computers with the same SSID can communicate with each other.
The WLAN allows wireless STAs to access the AP through Wi-Fi for Internet services. Multiple WLANs can be added
or deleted.
8
Configuration Guide Web-based Configuration
Adding Wi-Fi/WLAN
Editing Wi-Fi/WLAN
9
Configuration Guide Web-based Configuration
WLAN ID
SSID
Encryption Type
WPA/WPA2-PSK: This encryption type is secure and simple, often used in homes and small offices.
WPA/WPA2-802.1x: An authentication server is required. This encryption type is complicated and costs much, not
recommended for common users.
Advanced Settings
Hide SSID
SSID Code
WiFi Type
10
Configuration Guide Web-based Configuration
Rate Limiting
5G-prior Access
Deleting Wi-Fi/WLAN
2) Click .
1.3.3.2 AP
Wireless channels transmit RF medium between APs and wireless STAs. The use of channels varies with different
countries and frequency bands. For example, the 2.4 GHz frequency band can be configured with 13 channels (channel
1 to channel 13), and the 5 GHz frequency band can be configured with five channels (channels 149, 153, 157, 161,
and 165). The overlapping channels in the 2.4 GHz frequency band generate interference. It is recommended that
these channels be configured as non-overlapping channels (for example, channels 1, 6, and 11) to avoid radio signal
collision. The five channels in the 5 GHz frequency band do not overlap or generate interference.
11
Configuration Guide Web-based Configuration
Wireless channel settings are mainly about adjusting the strength of the Wi-Fi signal sent out by the device. Channel
parameters can be set for the 2.4G and 5G networks.
12
Configuration Guide Web-based Configuration
Radio Protocol
2.4G Network: (1) 11bgn indicates the set of 802.11b, 802.11g and 802.11n. (2) 11bgn+11ax indicates the set of 802.11b,
802.11g, 802.11n and 802.11ax.
5G Network: (1) 11an indicates the set of 802.11a and 802.11n. (2) 11an+11ac indicates the set of 802.11a, 802.11n,
802.11ac. (3) 11an+11ac+11ax indicates the set of 802.11a, 802.11n, 802.11ac and 802.11ax.
Radio Channel
RF Bandwidth
The channel width of the current radio, including 20 Mhz and 40 Mhz.
Power
The power of the current radio. Power Saving, Standard and Enhanced indicate 30, 80 and 100 respectively.
STA Limit
1.3.3.2.2 iBeacon
iBeacon uses Bluetooth low energy proximity sensing to transmit a universally unique identifier picked up by a
compatible app or operating system. The identifier and several bytes sent with it can be used to determine the device's
physical location, track customers, or trigger a location-based action on the device such as a check-in on social
media or a push notification.
iBeacon signals are broadcast over Bluetooth, and mainly applied to WeChat Shake.
If the AP does not support Bluetooth radio, the following page will be displayed.
13
Configuration Guide Web-based Configuration
If the AP supports Bluetooth radio, the following page will be displayed. You can configure iBeacon globally or
based on radio. Radio-based iBeacon settings prevail over global iBeacon settings.
14
Configuration Guide Web-based Configuration
1.3.3.3 Network
External network settings are mainly about configuration of the communication mode between the AP and external
network. Two communication modes are available: Bridge mode and NAT mode.
In Bridge Mode, the Ruijie APs act as bridges, allowing wireless clients to obtain their IP addresses from an upstream
DHCP server.
In NAT Mode, the Ruijie APs run as DHCP servers to assign IP addresses to wireless clients out of a private 10.x.x.x
IP address pool behind a NAT.
The AP you use might not support this function, which is subject to the actual menu items.
15
Configuration Guide Web-based Configuration
You can select the AP working mode to determine the AP role and then configure based on the corresponding working
mode.
1.3.3.3.2 Interface
A port is a physical entity that is used for connections on the network devices.
Speed
16
Configuration Guide Web-based Configuration
Generally, the speed of an Ethernet physical port is determined through negotiation with the peer device. The
negotiated speed can be any speed within the interface capability. You can also configure any speed within the interface
capability for the Ethernet physical port on the Web page.
When you configure the speed of an AP port, the configuration takes effect on all of its member ports. (All these member
ports are Ethernet physical ports.)
Duplex Mode
Set the duplex mode of the interface to full-duplex so that the interface can receive packets while sending packets.
Set the duplex mode of the interface to half-duplex so that the interface can receive or send packets at a time.
Set the duplex mode of the interface to auto-negotiation so that the duplex mode of the interface is determined through
auto negotiation between the local interface and peer interface.
Interface Name
You can configure the name of an interface based on the purpose of the interface. For example, if you want to assign
GigabitEthernet 1/1 for exclusive use by user A, you can describe the interface as "Port for User A."
Administrative Status
You can configure the administrative status of an interface to disable the interface as required. If the interface is disabled,
no frame will be received or sent on this interface, and the interface will loss all its functions. You can enable a disabled
interface by configuring the administrative status of the interface. Two types of interface administrative status are
defined: Up and Down. The administrative status of an interface is Down when the interface is disabled, and Up when
the interface is enabled.
Interface Settings
17
Configuration Guide Web-based Configuration
2) The configuration for the port is displayed in the dialog box. Next, edit the configuration.
1.3.3.3.3 VLAN
A Virtual Local Area Network (VLAN) is a logical network created based on a physical network. A VLAN can be
categorized into Layer-2 networks of the OSI model.
A VLAN has the same properties as a common LAN, except for physical location limitation. Unicast, broadcast and
multicast frames of Layer 2 are forwarded and transmitted within a VLAN, keeping traffic segregated.
We may define a port as a member of a VLAN, and all terminals connected to this port are parts of a virtual network
that supports multiple VLANs. You do not need to adjust the network physically when adding, removing and modifying
users. Communication among VLANs is realized through Layer-3 devices, as shown in the following figure.
18
Configuration Guide Web-based Configuration
The VLANs supported by Ruijie products comply with the IEEE802.1Q standard. A maximum of 4094 VLANs (VLAN
ID 1-4094) are supported, among which VLAN 1 cannot be deleted.
Adding a VLAN
19
Configuration Guide Web-based Configuration
Click Add VLAN. A dialog box is displayed, as shown in the preceding figure. Set corresponding parameters in the
dialog box and click Save. The newly added VLAN is displayed in the VLAN list after the Add operation succeeded
message is displayed.
Editing a VLAN
20
Configuration Guide Web-based Configuration
Click the Edit button. A dialog box is displayed, as shown in the preceding figure. Click Save. The Save operation
succeeded message is displayed.
Deleting a VLAN
Click the Delete button for a VLAN in the list and then click OK in the displayed dialog box to finish deleting.
1.3.3.3.4 Route
Routing is the process of selecting a path for traffic in a network, or between or across multiple networks.
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry. In many cases,
static routes are manually configured by a network administrator by adding in entries into a routing table, though this
may not always be the case.
Default route is a setting on a computer that defines the packet forwarding rule to use when no specific route can be
determined for a given Internet Protocol (IP) destination address. All packets for destinations not established in
the routing table are sent via the default route.
21
Configuration Guide Web-based Configuration
Click Add Static Route, set the configuration items in the dialog box displayed, and click Save. The newly added static
route is displayed in the route list after the Save operation succeeded message is displayed.
22
Configuration Guide Web-based Configuration
Click Add Default Route. Set the configuration items in the displayed dialog box, and click Save. The newly added
route is displayed in the route list after the Save operation succeeded message appears.
Editing a route
2) A dialog box is displayed, as shown in the preceding figure. The configuration for the route is displayed. Next, edit
the configuration.
Deleting a route
23
Configuration Guide Web-based Configuration
Click the Delete button for a route in the list and then click OK in the displayed dialog box to finish deleting.
1.3.3.3.5 DHCP
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol
(IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol
(BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain required
TCP/IP configuration information from a DHCP server.
DHCP supports three mechanisms for IP address allocation. In "automatic allocation", DHCP assigns a permanent IP
address to a client. In "dynamic allocation", DHCP assigns an IP address to a client for a limited period of time (or until
the client explicitly relinquishes the address). In "static allocation", a client's IP address is assigned by the network
administrator, and DHCP is used simply to convey the assigned address to the client. A particular network will use one
or more of these mechanisms, depending on the policies of the network administrator.
DHCP Settings
24
Configuration Guide Web-based Configuration
Click Add DHCP, set the configuration items in the dialog box displayed, and click Save. The newly added DHCP pool
is displayed in the DHCP pool list after the Save operation succeeded message is displayed.
2) Click Delete Selected DHCP and then click OK in the dialog box displayed to finish deleting.
25
Configuration Guide Web-based Configuration
Click Excluded Address Range. A dialog box is displayed, as shown in the preceding figure. Set the configuration
items in the displayed dialog box, and click Save. The newly configured address range is displayed in the DHCP pool
list after the Save operation succeeded message is displayed.
DHCP service
26
Configuration Guide Web-based Configuration
2) The configuration for the DHCP pool is displayed in the dialog box. Next, edit the configuration.
Static Address
27
Configuration Guide Web-based Configuration
Click Add Static Address, set the configuration items in the displayed dialog box, and then click Save. The newly
added static address is displayed in the list after the Save operation succeeded message is displayed.
28
Configuration Guide Web-based Configuration
2) Click Delete Selected Address and then click OK in the dialog box displayed to finish deleting.
1) Click the Edit button for a static address in the list. A dialog box is displayed.
2) The configuration for the static address is displayed in the dialog box. Next, edit the configuration.
Click the Delete button for a static address in the list to finish deleting.
DHCP Relay
29
Configuration Guide Web-based Configuration
Client List
2) Click Bind MAC to Dynamic IP and then click OK in the displayed dialog box to finish deleting.
30
Configuration Guide Web-based Configuration
Input the IP address in the text box. Click Search. The search results meeting the criterion are displayed in the list.
Generally, this function is used to map a specified port of a specified host in the internal network to a specified port of
an external network address.
This function may not be supported. The actual menu may vary with the device.
31
Configuration Guide Web-based Configuration
Click Add Port Mapping, set the configuration items in the dialog box displayed, and then click Save. The newly added
port mapping is displayed in the list after the Save operation succeeded message is displayed.
2) Click Delete Selected Port Mapping and then click OK in the displayed dialog box to finish deleting.
32
Configuration Guide Web-based Configuration
2) The configuration for port mapping is displayed in the dialog box. Next, edit the configuration.
Click the Delete button for a port mapping entry in the list to finish deleting.
1.3.3.3.7 VPN
33
Configuration Guide Web-based Configuration
The Advanced Settings include some algorithm settings. It is recommended to use the default settings.
1.3.3.4 Security
1.3.3.4.1 Containment
Rogue APs may exist in a WLAN. Rogue APs may have security vulnerabilities and can be manipulated by attackers
to seriously threaten and endanger network security. The containment function can be enabled on the AP to attack
rogue devices and prevent other wireless STAs from being associated with rogue devices.
Containment Settings
34
Configuration Guide Web-based Configuration
35
Configuration Guide Web-based Configuration
Trusted AP
When the rogue AP containment function is enabled, the APs not authorized will be contained. However, some APs
are trusted devices and special processing is required. You can configure the MAC addresses of trusted devices.
36
Configuration Guide Web-based Configuration
If an SSID matches with the keyword fuzzily, the Wi-Fi is a phishing Wi-Fi.
This function allows or blocks specified users from accessing the Wi-Fi.
Click to add a MAC address for a user. You can add multiple MAC addresses.
37
Configuration Guide Web-based Configuration
38
Configuration Guide Web-based Configuration
SSID-based Blacklist
Click in the list and configure the whitelist/blacklist for the specified SSID.
You can select the blacklist/whitelist type, add blacklist/whitelist users, and import blacklist/whitelist users.
39
Configuration Guide Web-based Configuration
3) Click Delete Selected and then click OK in the displayed dialog box to finish deleting.
Add OUI
40
Configuration Guide Web-based Configuration
Click Add OUI, set the configuration items in the dialog box displayed, and click Save. The newly added OUI is
displayed in the OUI list after the Add succeeded message is displayed.
2. Click Delete Selected and then click OK in the dialog box displayed to finish deleting.
Deleting a OUI
Importing OUIs
41
Configuration Guide Web-based Configuration
To ensure network security and prevent unwitting information transfer, you can prohibit communication between internal
network users by means of configuration. Some special users (users who can access each other) can be identified
based on the user name and MAC address.
3) Click the Add icon to add a MAC address for a mutual-access user. You can add multiple MAC addresses.
42
Configuration Guide Web-based Configuration
1.3.3.4.4 Anti-attack
Some malicious attacks are always found in the network environment. These attacks may bring about an extremely
heavy burden for the switch, resulting in the switch using an excessive amount of CPU power and giving rise to a
potential operational failure.
1) ARP-guard: Enables ARP-guard configuration. Click the ARP-guard List link to view the host where ARP attack
is detected.
2) IP-guard: Enables IP-guard configuration. Click the IP-guard List link to view the host where IP scanning is
detected.
3) ICMP-guard: Enables ICMP-guard configuration. Click the ICMP-guard List link to view the host where an ICMP
attack is detected.
4) DHCP-guard: Enables DHCP-guard configuration. Click the DHCP-guard List link to view the host where a
DHCPv4 attack is detected.
5) DHCPv6-guard: Enables DHCPv6-guard configuration. Click the DHCPv6-guard List link to view the host where
a DHCPv6 attack is detected.
43
Configuration Guide Web-based Configuration
1.3.3.4.5 ARP
2) Click the Dynamic Binding>>Static Binding icon to switch from dynamic binding to static binding in batches.
Manual Binding
Click OK. The newly bound ARP is displayed in the ARP list after the Save operation succeeded message is displayed.
44
Configuration Guide Web-based Configuration
1.3.3.4.6 ACL
When receiving a packet on a port, the input ACL checks whether the packet matches the ACE entry for this port. When
the device intends to output a packet through a port, the output ACL checks whether the packet matches the ACE entry
for this port.
When there are different filtration rules, multiple rules may be applied simultaneously and only several of them can be
applied. If a packet matches an ACE entry, this packet is processed (permitted or denied) according to the action policy
defined by this ACE.
ACL Settings
Adding an ACL
Click Add ACL and set the configuration items in the dialog box displayed. Click OK. The newly added ACL is displayed
in the ACL List drop-down list on the left after the Save operation succeeded message is displayed.
Deleting an ACL
45
Configuration Guide Web-based Configuration
3) Click OK. The newly added access rule is displayed in the access rule list after the Save operation succeeded
message is displayed.
1) Click the Edit button for an access rule in the access rule list.
2) The configuration for the access rule is displayed in the dialog box and the configuration can be edited.
46
Configuration Guide Web-based Configuration
Click Delete Selected and then click OK in the displayed dialog box to finish deleting ACL Time
ACLs based on time can be enabled. For example, you can set ACLs to take effect in different time segments for a
week, but first a time object must be configured.
ACL Time
47
Configuration Guide Web-based Configuration
Click Add Time Object, then set the configuration items in the dialog box displayed, and click Save. The newly added
time object is displayed in the time object list after the Save operation succeeded message is displayed.
2) Click Delete Selected and then click OK in the dialog box displayed to finish deleting.
2) The configuration about the time object is displayed in the dialog box. Then edit the configuration.
48
Configuration Guide Web-based Configuration
ACL Application
1. Click .
3. Click Save. After the message "Configuration succeeded." is displayed, the ACL will appear in the list.
49
Configuration Guide Web-based Configuration
1.3.3.5 Authentication
Web authentication allows you to control user access to the Internet. The users can perform authentication on the
browser without installing any application, which is easy and convenient. Web authentication can be classified into
iPortal authentication and ePortal authentication based on the server location.
ePortal Authentication
Unauthenticated users will be redirected to the specified website for authentication. If the Portal is not built into the AC,
please select ePortal authentication.
50
Configuration Guide Web-based Configuration
iPortal Authentication
Unauthenticated users will be redirected to the specified website for authentication. If the Portal is built into the AC,
please select iPortal authentication.
WeChat Auth is an authentication solution that relieves users from the need of entering usernames and passwords.
Besides, it provides an AD space on WeChat for Wi-Fi service providers.
The following two authentication modes are available: WiFi Auth 3.x and WiFi+SMS Auth. (The default is the WeChat
template)
51
Configuration Guide Web-based Configuration
52
Configuration Guide Web-based Configuration
Advanced Settings provide some optional features applicable to both Web authentication V1 and Web authentication
V2.
1.3.3.6 Optimization
1.3.3.6.1 RF Navigation
Your AP might not support this function. The menu may vary with the device.
Configure the navigation mode and type of the efficient RF navigation to optimize RF performance.
53
Configuration Guide Web-based Configuration
Navigation Mode
There are two navigation modes: auto and fixed. In auto mode, the AP can automatically steer stations (STAs) to
different bands based on the RF load during operation. In fixed mode, the AP steers high-performance STAs to
designated bands during operation regardless of RF environment differences.
Navigation Type
You can enable 802.11ax only, or enable both 802.11ac and 802.11ax.
1.3.3.7 Solution
Your AP might not support this function. The menu may vary with the device.
This function is mainly applicable to the E-bag solution for schools. Balanced optimization ensures a smooth network
experience and avoids disconnection when a user uses the E-bag application.
E-bag Optimization
54
Configuration Guide Web-based Configuration
Click Click to learn more, and the following page will appear.
Select an SSID, and click Associate to enable all 5G clients in the classroom to connect to this SSID. The maximum
number of 5G clients will be calculated automatically.
55
Configuration Guide Web-based Configuration
Enter the maximum number of 5G clients here, and click Save. E-bag optimization settings will take effect.
You can click Advanced Settings to configure advanced settings. If you perform E-bag optimization again, the
advanced settings will be overridden.
Monitoring
This function allows you to monitor the network performance after E-bag settings are applied.
Group Access
56
Configuration Guide Web-based Configuration
1. Click +.
57
Configuration Guide Web-based Configuration
1. Click Delete.
3. The "Delete succeeded." message appears, indicating that the MAC address is deleted.
1. Click Edit.
58
Configuration Guide Web-based Configuration
1.3.3.8 Advanced
1.3.3.8.1 Unicast/Multicast
Unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one
receiver, each identified by a network address.
Multicast is group communication where information is addressed to a group of destination computers simultaneously.
Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-
to-multipoint communication.
1.3.3.8.2 Antenna
The antenna is divided into internal and external, and can generate directional or omnidirectional radiation patterns.
Whether antenna type switchover and orientation switchover are supported depends on the radio capacity, which is
displayed on the page.
59
Configuration Guide Web-based Configuration
1.3.4 Diagnosis
Connectivity Test
When the network malfunctions, you can test the network connectivity to facilitate troubleshooting.
Port Status
The system detects whether an interface of the AC is in the up state.
AC-AP Connection Status
The system detects whether an AP is online on the AC.
Internet Connection Status
The system detects whether the AC is reachable to an external network by pinging 114.114.114.114, or pinging 8.8.8.8
if the AC is deployed abroad.
Ping
60
Configuration Guide Web-based Configuration
Source IP
Indicates the source address.
Timeout Interval(s)
Indicates the timeout interval.
Repeat Times
Indicates the number of data packets to be transmitted.
Packet Size (Bytes)
Indicates the length of the data padding section in a data packet to be transmitted.
Fragment
Indicates the DF flag bit of an IP address. When the DF flag bit is set to 1, data packets are not fragmented. The DF
flag bit is 0 by default.
Tracert
61
Configuration Guide Web-based Configuration
1.3.4.3 Syslog
1.3.4.3.1 Syslog
1.3.4.4 WIDS
1.3.4.4.1 Rogue AP
SSID mode: Contain APs emitting the same Wi-Fi signals as the local AP.
62
Configuration Guide Web-based Configuration
AdHoc mode: Contain AdHoc devices simulating the same Wi-Fi signals.
CONFIG mode: Contain APs by configuring the MAC address and the SSID blacklist manually.
63
Configuration Guide Web-based Configuration
1.3.5 Maintenance
1.3.5.1 Settings
Download the main program or Web package to the local device and perform local upgrade.
Click the DNS Server and Route links to check network connection.
1.3.5.1.2 Restart
64
Configuration Guide Web-based Configuration
Backup
Back up the configuration file on the device. You can export current settings for batch operation.
Restore
After you restore the device to factory settings, please use the default IP address to access Eweb.
The network device system clock records the time of events on the device. For example, the time shown in system
logs is obtained from the system clock. Time is recorded in the format of year-month-day, hour:minute:second, day of
the week.
When you use a network device for the first time, set its system clock to the current date and time manually.
65
Configuration Guide Web-based Configuration
Set the system time based on the region for the device.
Two types of APs are available: Fat Access Points and Fit Access Points.
A FAT AP is suitable for family and small-scaled networks and provides full features. Generally, one device can
implement access, authentication, routing, VPN, address translation, and even the firewall functions.
A FIT AP is suitable for large-scale wireless network deployment. A dedicated wireless controller is needed to provide
unified management. A FIT-AP can be used only after the wireless controller delivers configurations and it cannot
complete configuration by itself.
The device sends local logs to the server for storage. History logs are stored for ease of query.
Server Logging can be set to ON/OFF to enable/disable the server log function.
66
Configuration Guide Web-based Configuration
Domain names can be dynamically parsed only after a DNS server is configured.
1.3.5.2 System
Admin Password
To enhance the system security and information interaction security, you need to change the default password of the
system.
On the Admin Password tab page, enter the old password, new password, and confirm password, and click Save.
67
Configuration Guide Web-based Configuration
Basic Settings
Configure the device location to better inspect devices and facilitate device management. Set the timeout time. When
you do not perform operations on the system for long, the Web-based system automatically exits to ensure your system
security.
Web Access Port: Indicates the access port. It needs to be added when you access the Web-based system from a
browser.
Device Location: Indicates the device location. Setting this parameter facilitates management.
Permissions
68
Configuration Guide Web-based Configuration
A system may have multiple users of different levels that correspond to different permissions. You can set or view
permissions through the Permission Settings page. The system has two default users: user admin
Adding an administrator
Click Add Administrator. A dialog box is displayed, as shown in the preceding figure. Set the configuration items in
the dialog box, and click Save. The newly added administrator is displayed in the list after the Save succeeded
message is displayed.
69
Configuration Guide Web-based Configuration
2) A dialog box is displayed, as shown in the preceding figure. The configuration about the administrator is displayed
in the dialog box. Then edit the configuration.
Deleting an administrator
1.3.5.2.2 Telnet
The Web console function is similar to the Telnet function and you can configure any command on the console. However,
the Web console function does not support commands in shell mode, telnetting to APs, or batch refresh of commands.
70
Configuration Guide Web-based Configuration
1.3.5.2.4 SNMP
The Simple Network Management Protocol (SNMP) is by far the dominant protocol in network management. This
Protocol (SNMP) was designed to be an easily implementable, basic network management tool that could be used to
meet network management needs. It is named Simple Network Management Protocol as it is really easy to understand.
A key reason for its widespread acceptance, besides being the chief Internet standard for network management, is its
relative simplicity. There are different versions of SNMP, such as SNMP V1, SNMP V2c, and SNMP V3.
1.3.5.2.5 CWMP/MACC
The CPE WAN Management Protocol (CWMP) is used by a server to manage, configure, and monitor ACs, APs,
routers, or switches.
The CWMP enables a device to interconnect to the cloud platform or other servers for management.
Your AP may not support this function and the actual menu items shall prevail. When a device is interconnected
to a server over CWMP, a correct DNS server needs to be configured so that the device correctly parses the
domain name of the server. Therefore, check whether a correct DNS server is configured.
71
Configuration Guide Web-based Configuration
Click DNS server behind Note to redirect to the related configuration page.
Set parameters and click Save.
CWMP
Indicates whether to enable CWMP.
Server URL
Indicates the server address.
Server Username
Indicates the server username, which can be used for verification.
Server Password
Indicates the server password, which can be used for verification.
Device URL
Indicates the device URL, which can be used for active connection within the server LAN.
Device Username
Indicates the device username, which can be used for verification.
Device Password
Indicates the device password, which can be used for verification.
CPE Inform Interval(s)
Indicates the interval for connecting to the server, that is, heartbeat packet interval. Other Functions
1.3.6 Others
1.3.6.1 Favorites
After you add frequently configured functions to favorites, you can click menu items in the favorites and configure the
functions rapidly next time.
Adding to favorites
Select a required menu and drag it to Favorites.
72
Configuration Guide Web-based Configuration
Canceling favorites
Click Favorites to display the favorites list. Select a menu item from the list and click the icon. Confirm the delete
operation to delete the menu item from the favorites.
There are increasing functions in the system. The fast query menu helps users rapidly search for required functions.
Enter a search condition in the search box on the home page. A list of records meeting the search condition is rapidly
displayed. Click a function to redirect to the function page.
The current account is displayed in the upper right corner of the home page. The current account is admin, as shown
in the figure below.
73
Configuration Guide Web-based Configuration
Online Service
Click the current account icon in the upper right corner. A function drop-down list is displayed. Click Online Service
when you need to seek help.
Language switching
Click the current account icon in the upper right corner. A function drop-down list is displayed. The second item is
used for language switching. If the system is in Chinese, click English to switch to the English edition; if the system
is in English, click 中文 to switch to the Chinese edition.
The language switching item is displayed based on actual requirements. If only Chinese is supported, this item is not
displayed. It is displayed only when both Chinese and English are supported.
Click the current account icon in the upper right corner. A function drop-down list is displayed. Click Logout and click
OK to exit the system.
1.4.1 SmartAP
SmartAP allows you to deploy APs in mobile office scenario. Click Config Wizard to end the SmartAP configuration
page, including System Mode, Network Configuration and Change Web NMS Password. If APs are not applied to
mobile office scenario, only system mode will be displayed.
1. System Mode
74
Configuration Guide Web-based Configuration
Click Change and the System Mode window is displayed. You can select a mode among three modes available: Fit
AP, Fat AP and MACC.
2. Network Configuration
The Web service is enabled for an AP device when this AP is delivered. By default, the IP address is 192.168.110.1.
The following describes how to enable Web service on the CLI when it is disabled.
75
Configuration Guide Web-based Configuration
Configuration Commands
enable service web-server Enables the Web service.
ip address (Optional) Configures the IP address.
Configuring the
(Optional) Configures the username and
Web server
webmaster level username password password for logging in to the Web-based
management system.
Configuration Method
Mandatory configuration.
Optional configuration.
Configuring the Username and Password for Logging in to the Web-Based Management System
Optional configuration.
When the Web service is enabled, the administrator username/passwords (admin/admin) and guest
user/passwords (guest/guest) are created by default. The passwords of these two accounts can be changed. In
addition, you can create other Web-based management accounts.
Verification
Log in to the Web page by using the preset IP address and Web-based management account and password, then
check whether the login is successful.
Relevant Commands
76
Configuration Guide Web-based Configuration
Configuring the Account and Password for Logging in to the Web-Based Management System
Configuration Example
Verification Run the show running-config command to display related configuration commands.
Ruijie(config)#show running-config
Building configuration...
Current configuration: 6312 bytes
!
hostname ruijie
77
Configuration Guide Web-based Configuration
!
!
webmaster level 0 username admin password 7 08022b181b29
webmaster level 1 username manager password 7 06073f
webmaster level 2 username guest password 7 14155f083206
http update mode auto-detect
!
!
interface VLAN 1
ip address 192.168.1.200 255.255.255.0
no shutdown
!
line con 0
line vty 0 4
login
!
!
End
78
Configuration Guide Web-based Configuration
Verification
79
Configuration Guide Web-based Configuration
You can select the following Internet connection types when the AP works in wireless routing mode.
80
Configuration Guide Web-based Configuration
81
Configuration Guide Web-based Configuration
82
Configuration Guide Web-based Configuration
83
Configuration Guide Web-based Configuration
Configure a Wi-Fi name (use a simple name that is easy to remember). A Wi-Fi name contains up to 32
characters.
Security configuration
By default, the WPA2-PSK mode is selected. A password consists of 8 to 64 characters and can be a combination of
letters, digits, and special characters.
84
Configuration Guide Web-based Configuration
85
Configuration Guide Web-based Configuration
DHCP configuration
Click Finish.
Verification
Associate an STA with Wi-Fi: Eweb_AAAA1 and obtain the IP address 192.168.1.4.
Verify that the STA can connect to the Wi-Fi and then visit the Web through 192.168.1.1.
If the management IP address is changed, use the new management IP address to use the Web again.
86