Deploy a Wireless Access PointIn order to prevent common faults, you should master some simple basic precautions. In order to ensure that the wireless access point is deployed without any problems, This article summarizes the ten experiences gained from practice.
1. The location of the wireless access point should not be near the metal structure.
When deploying wireless access points, you must note that the actual location of the deployment should not be subject to radio interference. Once there was such a case, the customer found that the wireless network could not work normally, and then consulted the relevant departments, after providing the specific location of the Access Point, technicians found that the user's access point device was located at the top of the steel girder under the metal roof. Therefore, the surrounding metal materials cause serious interference to radio signals. After adjusting the access point location, the existing problems are solved immediately. Therefore, when deploying wireless access points, we should try to avoid deploying devices near the metal structure.
2. Select the Ethernet power supply mode as far as possible for the access device
To ensure the widest coverage of the wireless network, many companies prefer to deploy wireless access points on top of the ceiling or similar positions. This makes it difficult for the access point to connect to the power supply. There are two solutions to this problem: one is to use a power extension line and the other is to use an Ethernet power supply (PoE. We recommend that you use the second solution. You can use an unused Ethernet port to power the access point. For network devices, connecting the end of the network cable to a dedicated PoE module can avoid the trouble of using wires.
3. After the wireless access point is deployed, You need to reset the Access Point password.
After the wireless access point is deployed, the first thing to do is to reset the internal password. Otherwise, anyone who uses the Internet to obtain the default password may directly access the Access Point configuration interface.
4. prevent overlapping DHCP scopes
In the past, a company purchased a Second Wireless Access Point to increase the coverage of wireless networks to a wider range. At the same time, a technician without practical experience is notified that the device must be set the same as other access points. As a result, both access points adopt the same DHCP scope configuration. Fortunately, the Access Point will view IP address conflicts on the network before the IP address lease is assigned. Otherwise, the direct consequence is that overlapping DHCP scopes within the coverage scope may cause a lot of trouble for end users.
5. Treat wireless connection as insecure Mode
A major advantage of a wireless network is that users can access the network without physically connecting to the device. Therefore, it is necessary to encrypt the network. We recommend that you use a more secure approach. Trust all users connected to the wireless network directly. The correct way is to regard the wireless network as an Internet connection. Only users who have been verified by VPN or similar mechanisms can be allowed to access the entire network wirelessly.
6. Use the SSID with specific meanings
Many IT experts recommend that you Disable SSID broadcast for wireless access points. However, for hackers, even if the SSID is not broadcasted, it is easy to detect. To solve this problem, we recommend that you use the SSID name containing the specific meaning. The advantage of doing so is that users who connect to the wireless network for the first time can clearly determine whether they have connected to the correct network.
7. Make full use of the device's internal security functions
Currently, even low-end wireless access points are equipped with numerous security features. This allows the majority of wireless access points to allow administrators to restrict network access using MAC addresses. Some wireless access points also provide an alert mechanism to send alerts by email when users attempt to connect to the network repeatedly using the wrong password. Therefore, in the actual deployment of wireless access points, it is necessary for users to fully understand the security functions provided by Wireless Access Point devices, in this way, the network can be effectively optimized through the functions provided by the device.
8. provide backup power support for Wireless Access Point Devices
The wireless network administrator must provide backup power (UPS) support for all wireless access points. Only in this way can the wireless network still run normally when the main power supply fails.
This is a very important issue. The first is to prevent accidents caused by major power failures. Second, the power supply should be restarted after a sudden shutdown for one or two seconds. For wireless connections, this situation is enough to cause network disconnection. In addition, battery-powered laptops or mobile devices are used by a large number of users to connect to wireless networks. These devices will not be affected by temporary power outages. Therefore, most wireless devices have the function of automatically re-establishing lost connections. If identity authentication is enabled for users in the network settings, before being re-authenticated, everyone will be blocked from the backend network resources. This leads to numerous phone calls to ask questions.
9. Adjust the signal strength as needed
Some Wireless Access Point devices allow users to adjust their signal strength through the network. Most users generally use the maximum signal strength for running, but considering that the requirements for wireless signal strength vary in different scenarios, for example, there may be no need for too much wireless coverage in the parking lot. Therefore, we need to carefully consider the coverage required by the wireless network, then adjust the actual signal strength.
10. Fill in the device warranty card to ensure after-sales benefits
When deploying wireless access points, you need to spend some time filling out the warranty information for the newly purchased Wireless Access Point device. In particular, it is more necessary for devices to deploy wireless access points. instead of relying solely on previous experience, we believe that the quality of Wireless Access Point devices is very high. In six months to one year, it is difficult for anyone to protect these devices without any problems. Filling in warranty information is the only way to protect your future product maintenance benefits.