beautypg.com
FIGURE
Figure 1 WNAP-7300 ............................................................................................................................. 1
Figure 2 Typical Application ................................................................................................................... 2
Figure 3 Move the Cover........................................................................................................................ 6
Figure 4 Cable Connection .................................................................................................................... 6
Figure 5 Enable the Secondary RJ45 Power......................................................................................... 7
Figure 6 Power on the device by PWR button ....................................................................................... 7
Figure 7 Attach and fasten the removable cover ................................................................................... 8
Figure 8 Connect to POE Injector .......................................................................................................... 8
Figure 9 Complete Set ........................................................................................................................... 9
Figure 10 Remove the plugs ................................................................................................................ 10
Figure 11 Connect to external antenna................................................................................................ 10
Figure 12 Pole Mounting – Step 1.........................................................................................................11
Figure 13 Pole Mounting – Step 2........................................................................................................ 12
Figure 14 Login Page........................................................................................................................... 15
Figure 15 Main Page............................................................................................................................ 16
Figure 16 Basic System Settings ......................................................................................................... 17
Figure 17 TCP/IP Settings (Bridge)...................................................................................................... 18
Figure 18 TCP/IP Settings (Router) ..................................................................................................... 19
Figure 19 Time Settings ....................................................................................................................... 21
Figure 20 RADIUS Settings ................................................................................................................. 22
Figure 21 Source IP Filtering ............................................................................................................... 23
Figure 22 Destination IP Filtering......................................................................................................... 24
Figure 23 Source Port Filtering ............................................................................................................ 24
Figure 24 Destination Port Filtering ..................................................................................................... 25
Figure 25 Port Forwarding ................................................................................................................... 26
Figure 26 DMZ ..................................................................................................................................... 26
Figure 27 Basic Wireless Settings ....................................................................................................... 27
Figure 28 Site Survey........................................................................................................................... 30
Figure 29 Advanced Wireless Settings ................................................................................................ 31
Figure 30 Security Settings .................................................................................................................. 34
Figure 31 Access Control ..................................................................................................................... 36