Home
Moxa AirWorks AWK-5232 User`s Manual
Contents
1. 1 3 AWK 5232 Introduction coor state peenpin Green TP port s 1000 Mbps link is active Blinking Data is being transmitted at 1000 Mbps Off TP port s 1000 Mbps link is inactive ATTENTION When the LEDs for STATE Green FAULT WLAN1 and WLAN2 all light up simultaneously and blink at one second intervals it means the system has failed to boot This may be due to improper operation or uncontrollable issues such as an unexpected shutdown during a firmware update To recover the firmware refer to Firmware Recovery in Chapter 7 Beeper The beeper signals that the system is ready with two short beeps Reset Button The RESET button is located on the top panel of the AWK 5232 You can reboot the AWK 5232 or reset it to factory defaults by pressing the RESET button with a pointed object like a straightened paper clip e System reboot Hold the RESET button down for under 5 seconds and then release e Reset to factory default Hold the RESET button down for over 5 seconds until the STATE LED starts blinking green Release the button to reset the AWK 5232 RESET button Relay Digital Output The AWK 5232 has one relay output which consists of the 2 terminal block contacts on the top panel as shown below These relay contacts are used to forward notifications of system failure and user configured events The two wires attached to the relay contacts form an open circuit when a u
2. HS Advanced Settings VLAN Settings A DHCP Server HS Packet Filters 3 MAC Filters A IP Protocol Filters 3 TCP UDP Port Filters RSTP Settings A SNMP Agent Storm Protection 3 Link Fault Pass Through a Auto Warning Settings Ey System Log System Log Event Types FEY Syslog 3 Syslog Event Types Syslog Server Settings HS E mail 2 E mail Event Types E mail Server Settings Jg Relay Relay Event Types Ey Trap 3 Trap Event Types SNMP Trap Receiver Settings E N Status al a m if IM BE mM E E E E m O PRRPRPRR S Wireless Status Associated Client List DHCP Client List System Log Relay Status DI and Power Status RSTP Status aintenance Console Settings Ping Firmware Upgrade Config Import Export Load Factory Default Password Misc Settings ave Configuration Restart Logout Getting Started A quick overview of the AWK 5232 s status Basic settings for administering the AWK 5232 Essential settings related to establishing a TT q l wireless network Advanced features to support additional network management and secure wired and wireless communication These advanced functions are all optional Application oriented device management functions to set up events traps and reactions via relay warning e mail and SNMP notification These functions are all optional Real time status information to monito
3. 5 Click Next to select additional tasks 2 Setup AWE Search Utility Select Additional Tasks Which additional tasks should be performed Select the additional tasks you would like Setup to perform while installing AWE Search Utility then click Next Additional icons Create a Quick Launch icon 6 Click Next to proceed with the installation The installer then displays a summary of the installation options 4 3 AWK 5232 Software I nstallation Configuration El Setup AWK Search Utility ala Ready to Install Setup le now ready to begin installing AWE Search Utility on your computer Click Install to continue with the installation or click Back if you want to review or change any settings Destination location C Program Flesko a MLS E Search Utility Start Menu folder AWE Search Utility Install Cancel 7 Click Install to begin the installation The setup window will report the progress of the installation To change the installation settings click Back and navigate to the previous screen 8 Click Finish to complete the installation of AWK Search Utility 2 Setup AWE Search Utility Completing the AWK Search Utility Setup Wizard Setup has finished installing AWE Search Utility on your computer The application may be launched by selecting the installed icons Click Finish to exit Setup Configuring AWK Search Utility The Broadcast Search function is
4. Bridge priority 32768 v Hello time 2 1 10 seconds Forwarding delay 15 4 30 seconds Max age 20 6 40 seconds No Enable RSTP Port Priority Port Cost Edge Port 1 LAN1 128 v 200000 2 LAN 2 128 v 200000 3 WLAN 1 Master 128 v 2000000 4 WLAN 2 Slave 128 vw 2000000 RSTP status This field will appear only when selected to operate STP RSTP It indicates whether this AWK 5232 is the Root of the Spanning Tree the root is determined automatically or not 3 28 AWK 5232 Web Console Configuration Bridge priority Numerical value You can increase the bridge priority by selecting a lower 32768 selected number A higher bridge priority brings a greater chance of by user being established as the root of the Spanning Tree topology Hello time Numerical value input The root of the Spanning Tree topology periodically sends out a 2 Seconds by user hello message to other devices on the network to check if the 1 10 seconds topology is healthy Hello time indicates how often the root sends hello messages Forwarding delay Numerical value input The amount of time this device waits before checking to see if it 15 seconds by user Should change to a different topology 4 30 seconds Max age Numerical value input As a non root role if the device has not received a hello 20 seconds by user message from the root longer than Max age it will 6 40 seconds reconfigure itself as a root Once two or more d
5. AWK 5232 Web Console Configuration Trap Event Types Trap Event Types E P z lt m Event Cold start Warm start Power 1 transition n gt Off Power 1 transition Off gt On Power 2 transition n gt Off Power 2 transition Off gt On PoE transition On gt Off PoE transition Off gt On Configuration changed Console authentication failure DI 1 transition On gt Off DI 1 transition Off gt On DI 2 transition On gt Off DI 2 transition Off gt On LAN 1 link On LAN 1 link Off LAN 2 link On LAN 2 link Off 531 5E 55 gt h 5 gt 555 SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs SNMPv1 and SMIv2 MIBs SNMPv2c The two styles are basically equivalent and it is possible to convert between the two You can set the parameters for SNMP trap receivers through the web page SNMP Trap Receiver Settings 1st Trap version vi ist Trap server IP name ist Trap community 2nd Trap version 2nd Trap server IP name 2nd Trap community alert 1st 2nd Trap version SNMP trap defined in SNMPv1 V1 SNMP trap defined in SNMPv2 lst 2nd Trap server P name IP address or host Enter the IP address or name of the trap server used by your None name network 3 37 AWK 5232 Web Console Configuration lst 2nd Trap community Max 31 characters Use a community string match with a maximum of 31 alert characters for authenticatio
6. a Cattinac All information on this page are active values System info Disabling Telnet and Browser Access If you are connecting the AWK 5232 to a public network but do not intend to use its management functions over the network then we suggest disabling both Telnet Console and Web Configuration Please run Maintenance gt Console Settings to disable them as shown in the following figure Console Settings HTTP console Enable Disable HTTPS console Enable Disable Telnet console C Enable Disable SSH console e Enable Disable Submit 9 0 6 References This chapter provides more detailed information about wireless related technologies The information in this chapter can help you administer your AWK 5232s and plan your industrial wireless network better The following topics are covered in this chapter O 0 000 Beacon DTI M Fragment RTS Threshold STP and RSTP gt The STP RSTP Concept gt Differences between RSTP and STP AWK 5232 References Beacon A beacon is a packet broadcast by the AP to keep the network synchronized A beacon includes the wireless LAN service area the AP address the Broadcast destination address a time stamp Delivery Traffic Indicator Maps DTIM and the Traffic Indicator Message TIM Beacon Interval indicates the frequency interval of AP DTIM Delivery Traffic Indication Map DTIM is contained in beacon frames It is used to indicate that broadcast
7. e a 3 38 NTS FS o Sta S erra orenean c c eae en eeu C AAAA ENAA AEAEE EAEE 3 38 Associated Client List for Redundant AP AP or Master mode only c 3 38 DnGr Client Estero AROS ONIY 003 j3 a O 3 39 SVS ONT EOD oria AO 3 39 Relay Stali A AS 3 40 Brand POWE ALU Siener a ea ln eR RRRA EE ASR TERE EA R ASR AE E areca EEEE EEA 3 40 Relay Statis sakii eaa aa a a aae a a a AAA 3 40 WIGIILETTG NES uta A E AARAA ATATA AAAA 0016 14A6 001134 141063014 3 41 CONSOIS SEMINGS c tua c n t AA NAAA AA ODE DE bi 3 41 A OOOO EEE E E e tds 3 41 LAA GI s Are UDALA A 51A Phu tua 3 42 Conta MPO EXPO s14 o ado o co do o o to 12v E tea l g 04429402 10011401 9400 ie nicas 3 42 He Man nrg er reer eee rere ee 3 42 EDSSWOT 2615so c0 5654s61fne saSosoboesaeso b pana sang b n hoa h h i song iu h Annies Atk IRAn 3 2 9015 9V 3 358 AAA e eo Ne ee a aaa dae 3 43 MISC SO s2 6 5 4 O a 3 43 Save CONT UEA ION candatidtesedide teint e a tadedad a lin db ed let VSE EENEN E AE 3 43 Re A ES 3 44 LOGOUT san loss O 3 45 4 Software Installation CGnTiGUFGLIOHD ccc cczrcrccrccrcrrecrrcrrrrecrsesrrrsrrrserearsrrsssaswssEssssisi slasi sissiisiaasla WiSi 4 1 OV GRVICW t0 6skkb in Dvh 0t vices wie ieee a aaa aaa aa aaa aa s0 0sbs240s190501ips6 4030503050105 08 5a a Dos 4 2 ANE O amp s a sa a_ G aa 4 2 MSEMO AWE
8. in 802 11n mode Open For security reasons it is highly recommended that the security mode should be set to the options other than Open System When the security mode is set to Open System no authentication or data encryption will be performed WEP According to the IEEE802 11 standard WEP can be used for authentication and data encryption confidentiality Shared or Shared Key authentication type is used if WEP authentication and data encryption are both needed Normally Open or Open System authentication type is often used when WEP data encryption is run with authentication When WEP is enabled as a security mode the length of a key so called WEP seed can be specified as 64 128 bits which is actually a 40 104 bit secret key with a 24 bit initialization vector The AWK 5232 provides 4 entities of WEP key settings that can be selected to use with Key index The selected key setting specifies the key to be used as a send key for encrypting traffic from the AP side to the wireless client side All 4 WEP keys are used as receive keys to decrypt traffic from the wireless client side to the AP side The WEP key can be presented in two Key type HEX and ASCII Each ASCII character has 8 bits so a 40 bit or 64 bit WEP key contains 5 characters and a 104 bit or 128 bit key has 13 characters In hex each character uses 4 bits so a 40 bit key has 10 hex characters and a 128 bit key has 26 characters SSID Security mode Authen
9. A 3 4 NetWork SOINS insano irc tle aa E E aE a a D a a UTA 3 4 TNE SOUMO 70 Ca a ang eens C an ca 3 5 Wireless S GUEINGS O ORI 3 6 Operation Modest ai cis 3 6 WES VEAN ZA AAA A oa ade 3 9 Enabling Non Redundant Single RF AP ener cnn rn rr rr rr 3 9 WEAN 5 CUITV G CUEING S dat tae tase mea ane 3 12 Advanced Wireless S CUNAS dida iad 3 19 WLAN Certification Settings for EAP TLS in Redundant Client Client or Slave mode only 3 22 AVANCES d S ENO ar a Meet tne ae ASAS SAA een oca eee ba 3 22 USIRO VICO SULAN an 2n5 net not 0001s0ais010i001010080085009001000180008050005n0501ieni0rtpeigpdotied0a010 01100 18085000505 1805 s n sa 06 3 23 COYITIGTIT TTCT vIFtUAal LAN odiada 3 24 DHCP Server for AP Client operation mode s AP mode only cha 3 25 PACKS E FIS Si A A ana a laa le A A O 3 26 RSTP Settings for Master r Slave mode OnIV its iia 3 28 A TT n1 c6 c0 211201 22017150 00667 sa state sleseoserharie lens e0 tale ocise cna aia ia na aaa neni 0071008110 10152181401 3 30 LONE VO EC CHO Nutria oo tdt detal dad dadas 3 31 Link Fault Pass Through for Client Slave mode only HH nh kh r 3 32 AUTON AIN OS CEN St E AAA A AA E AAA LENA OA AA 3 32 Sl A ON 3 32 SY SOG cece aoa E ae cata eee eee eee ea Og a tc 3 33 IN 3 34 A ae er ee O A A ee 3 36 AO 3T ong ac i hong ah Dra Ta DET oh hi oh eo a ha h ae re NAN E ON AATE as AN ENAN EN pe 3 36
10. AWK 5232 Restart 1 Warning Click Restart to discard changes and reboot AWK 5232 US directly Click Save and Restart to apply all setting changes and reboot AWK 5232 US Restart SaveandRestart If you run the Restart function without changing any configurations or saving all your changes you will see just one Restart button on your screen Restart 11 Warning Clicking Restart will disconnect all Ethernet connections and reboot AWK 5232 US Restart You will not be able to run any of the AWK 5232 s functions while the system is rebooting 3 44 AWK 5232 Web Console Configuration Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page For security reasons we recommend you logout before quitting the console manager Logout Click Logout button to defalut Login page Logout 3 45 4 Software I nstallation Configuration The following topics are covered in this chapter O Overview O AWK Search Utility gt Installing AWK Search Utility gt Configuring AWK Search Utility AWK 5232 Software I nstallation Configuration Overview The Documentation amp Software CD included with your AWK 5232 is designed to make the installation and configuration procedure easy and straightforward This auto run CD includes AWK Search Utility to broadcast search for all AWK s accessible over the network the AWK 5232 User s Manual and Quick In
11. AWK 5232 can be powered by DC power input or PoE Power over Ethernet Plus The AWK 5232 will use whichever power source you choose ATTENTION Do NOT use either an EEE802 3af PoE Injector NOR a PSE Power Sourcing Equipment Use only an EEE802 3at compliant PSE for PoE Power over Ethernet Plus device Step 2 Connect the AWK 5232 to a notebook or PC Since the AWK 5232 supports MDI MDI X auto sensing you can use either a straight through cable or crossover cable to connect the AWK 5232 to a computer If the LED indicator on AWK 5232 s LAN port lights up it means the connection is established Step 3 Set up the computer s IP address Set an IP address on the same subnet as the AWK 5232 Since the AWK 5232 s default IP address is 192 168 127 253 and the subnet mask is 255 255 255 0 you should set the IP address of the computer to 192 168 127 xxx After you select Maintenance gt Load Factory Default and click the Submit button the AWK 5232 will be reset to factory default settings and the IP address will be also reset to 192 168 127 253 Step 4 Use the web based manager to configure AWK 5232 Open your computer s web browser and type http 192 168 127 253 in the address field to access the homepage of the web based Network Manager Before the homepage opens you will need to enter the user name and password as shown in the following figure For first time configuration enter the default username and password and then
12. Configuration Configuration setting changes Restart without saving configuration non volatile The system reboots and volatile memory Save memory Restart initialize with the settings flash memory _ in falsh memory Save and Restart After you click on Save Configuration in the left menu box the following screen will appear Click Save if you wish to update the configuration settings in the flash memory at this time Alternatively you may choose to run other functions and put off saving the configuration until later However the new setting changes will remain in the non volatile memory until you save the configurations Save Configuration If vou have submitted any configuration changes you must save the changes and restart the system before they take effect Click Save to save the changes in 4WK 5222 US s memory Click Restart to activate new settings In the navigation panel Restart If you submitted configuration changes you will find a blinking string in the upper right corner of the screen After making all your changes click the Restart function in the left menu box One of two different screens will appear If you made changes recently but did not save you will be given two options Clicking the Restart button here will reboot the AWK 5232 directly and all setting changes will be ignored Clicking the Save and Restart button will apply all setting changes and then reboot the
13. Daylight saving time is enabled the following parameters can be shown e The Starts at parameter allows users to enter the date that daylight saving time begins e The Stops at parameter allows users to enter the date that daylight saving time ends e The Time offset parameter indicates how many hours forward the clock should be advanced Time server 1 2 The 1st 2nd time IP or Domain address of NTP time server The 2nd time will be None server IP Name used if the 1st NTP server fails to connect Query period Query period time This parameter determines how often the time is updated from 600 seconds 1 9999 seconds the NTP server Wireless Settings The essential settings for wireless networks are presented in this function group Settings must be properly set before establishing your wireless network Operation Mode The AWK 5232 supports three operation modes that are used for different wireless network applications 3 6 AWK 5232 Web Console Configuration Wireless Redundancy In traditional architectures most vendors only provide a single RF AP and Client in which the AP connects one or more Clients to the network Since the AP and Client are connected by a single RF connection if the RF connection is disconnected the system or network behind the Client will be disconnected too Client With the new wireless redundancy technology you can set up a redundant wireless connection between a redundant clie
14. IP address Po Maximum number of users Client lease time 1 10 days Static DHCP mapping No Llartive IP address MAC address oO o oO D fF Ww M DHCP server AP only Enables AWK 5232 as a DHCP server Disable DHCP server function Default gateway Factory Default IP address of a default The IP address of the router that connects to an outside None gateway network Subnet mask Setting Description Factory Default Identifies the type of sub network e g 255 255 0 0 for a 3 25 AWK 5232 Web Console Configuration a Class B network or 255 255 255 0 for a Class C network LF Primary Secondary DNS server IP address of Primary The IP address of the DNS Server used by your network After None Secondary DNS server entering the DNS Server s IP address you can use URL as well The Secondary DNS server will be used if the Primary DNS server fails to connect Start I P address Factory Default IP address Indicates the IP address which AWK 5232 can start assigning None Maximum number of users 1 999 Specifies how many IP address can be assigned continuously None Client lease time 1 10 days The lease time for which an IP address is assigned The IP 10 days address may go expired after the lease time is reached Packet Filters The AWK 5232 includes various filters for IP based packets going through LAN and WLAN interfaces You can set these filters as
15. If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices Any changes or modifications not expressly approved by the party 1 2 AWK 5232 Supporting Information responsible for compliance could void the user s authority to operate this equipment This transmitter must not be co located or operated in conjunction with any other antenna or transmitter FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with a minimum distance of 20 cm between the radiator amp your body This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference t
16. Improve network performance and reduce latency e Increase security e Secure network restricts members to resources on their own VLAN e Clients roam without compromising security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name SSID The AP can support up to 9 SSIDs per radio interface with a unique VLAN configurable per SSID The AP matches packets transmitted or received to a network name with the associated VLAN Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN This eliminates unnecessary traffic on the wireless LAN conserving bandwidth and maximizing throughput In addition to enhancing wireless traffic management the VLAN capable AP supports easy assignment of wireless users to workgroups In a typical scenario each user VLAN represents a department workgroup for example one VLAN could be used for a marketing department and the other for a human resource department In this scenario the AP would assign every packet it accepted to a VLAN Each packet would then be identified as marketing or human resource depending on which wireless client received it The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch Finally the switch would be configured to route packets VLAN 3 from the marketing department to the appropriate VLAN 2 Floor 3 1 A VLAN corporat
17. Note This option is not supported under 802 11n Advance Encryption System is enabled Provides TKIP broadcast key and TKIP AES unicast key for some legacy AP clients This option is rarely used Note This option is available in Redundant AP AP or Master mode only and cannot support AES enabled clients Primary Secondary RADIUS server IP The IP address of Specifies the delegated RADIUS server for EAP None RADIUS server Primary Secondary RADIUS port Factory Default Port number Specifies the port number of the delegated RADIUS server 1812 Primary Secondary RADIUS shared key Description Factory Default Max 31 characters The secret key shared between AP and RADIUS server None Key renewal 60 86400 seconds Specifies the time period of group key renewal 3600 seconds 1 minute to 1 year WPA WPA2 Enterprise for Redundant Client Client or Slave mode In a client role the AWK 5232 can support three EAP methods or EAP protocols EAP TLS EAP TTLS and EAP PEAP corresponding to WPA WPA Enterprise settings on the AP side WLAN 1 WLAN Security Settings SSID MOA 1 Security mode VHhAz WPA type Enterprise v Encryption method EAP protocol Encryption method TKIP Temporal Key Integrity Protocol is enabled TKIP Note This option is not supported under 802 11n AES Advance Encryption System is enabled 3 16 AWK 5232 Web Console Configuration EAP Protocol TLS Specifi
18. The AWK 5232 s two DC power inputs make the power supply more reliable and it can be powered via PoE for easier deployment Package Checklist Moxa s AWK 5232 is shipped with the following items If any of these items is missing or damaged please contact your customer service representative for assistance e 1 AWK 5232 e 4 Swivel type Antennas 2 dBi RP SMA 2 4 5 GHz e 1 Quick Installation Guide e 1 Software CD e 1 Moxa Product Warranty Booklet e 1 Cable Holder with a Screw e Protective Caps NOTE The above items come with the AWK 5232 standard version The package contents may vary in a customized version Product Features e IEEE 802 11a b g n compliant e Three in one design AP Bridge Client e Dual RF design for redundant wireless communication e Advanced wireless security gt 64 bit and 128 bit WEP WPA WPA2 gt SSID Hiding IEEE 802 1X RADIUS gt Packet access control amp filtering e STP RSTP support for redundancy of system networking e Dedicated antenna selection e Free firmware update for more advanced functions e RS 232 console management e 2DI 1DO for on site monitoring and warming e Operating temperature ranges from 40 to 75 C T model e Power input by redundant 24 VDC power inputs or EEE802 3at Power over Ethernet Plus e DIN Rail or wall mounting ability e IP30 protected high strength metal housing 1 2 AWK 5232 Introduction Product Specifications ATTENTION A The AWK 5232 is NOT
19. a firewall to help enhance network security MAC Filter The AWK 5232 s MAC filter is a policy based filter that can allow or filter out IP based packets with specified MAC addresses The AWK 5232 provides 8 entities for setting MAC addresses in your filtering policy Remember to check the Active check box for each entity to activate the setting MAC Filters Enable Disable Policy Drop No active Name MAC address Enable Disables MAC filter Policy Only the packets fitting the entities on list can be allowed Drop Any packet fitting the entities on list will be denied 3 26 AWK 5232 Web Console Configuration ATTENTION Be careful when you enable the filter function Drop no entity on list is activated all packets are allowed Accept no entity on list is activated all packets are denied IP Protocol Filter The AWK 5232 s IP protocol filter is a policy based filter that can allow or filter out IP based packets with specified IP protocol and source destination IP addresses The AWK 5232 provides 8 entities for setting P protocol and source destination IP addresses in your filtering policy Four IP protocols are available All ICMP TCP and UDP You must specify either the Source IP or the Destination IP By combining IP addresses and netmasks you can specify a single IP address or a range of IP addresses to accept or drop For example IP address 192 168 1 1 and netmask 255 255 255 2
20. and multicast frames buffered by the AP will be delivered shortly Lower settings result in more efficient networking while preventing your PC from dropping into power saving sleep mode Higher settings allow your PC to enter sleep mode thus saving power Fragment A lower setting means smaller packets which will create more packets for each transmission If you have decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Only minor modifications of this value are recommended RTS Threshold RTS Threshold 256 2346 This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication This value should remain at its default setting of 2 346 When you encounter inconsistent data flow only minor modifications are recommended STP and RSTP The STP RSTP Concept Spanning Tree Protocol STP was designed to help reduce link failures in a network and provide protection from loops Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network The STP protocol is part of the IEEE802 1D standard 1998 Edition bridge specification Rapid Spanning Tree Protocol RSTP implements the Spanning Tree Algorithm and Protocol defined by EEE802 1w 2001 standard RSTP provides the following benefits e The topology of a bridged n
21. established Please refer to the following section for more details Communications Testing After installation you can run a sample test to make sure the AWK 5232 and wireless connection are functioning normally Two testing methods are explained in the following sections Use the first method if you are using only one AWK 5232 device and use the second method if you are using two or more AWK 5232s Testing Method for one AWK 5232 If you are only using one AWK 5232 you will need a second notebook computer equipped with a WLAN card Configure the WLAN card to connect to the AWK 5232 NOTE the default SSID is MOXA_ 1 and change the IP address of the second notebook B so that it is on the same subnet as the first notebook A which is connected to the AWK 5232 After configuring the WLAN card establish a wireless connection with the AWK 5232 and open a DOS window on Notebook B At the prompt type ping lt IP address of notebook A gt and then press Enter see the figure below A Reply from IP address response means the communication was successful A Request timed out response means the communication failed In this case recheck the configuration to make sure the connections are correct 2 3 AWK 5232 Getting Started SSID MOXA 1 IP 192 166 127 253 Notebook B Notebook A IP 192 165B 127 1 IP 182 168 127 2 Testing Method for two or more AWK 5232s If you have two or more AWK 5232s you will ne
22. for Data Bits None for Parity and 1 for Stop Bits AWK 5232 Property Communication Parameter Terminal File Transfer Capturing COM Options Forts Baud Rate Data Bits Parity Stop Bits Flaw Control ATSACTS SON4OFF 4 Click on the Terminal tab and select VT100 or ANSI for Terminal Type Click on OK to continue 5 The Console login screen will appear Log into the RS 232 console with the login name default admin COMI Output State CTA ON OFF RTS ON C OFF Other Console Configurations Property Communication Parameter Terminal File Transfer Capturing Terminal Type vT10n ARSI DunbTemnagcio Da umb Terminal Option nh Terminal Transmit Send Enter Rey As Receive CR Translation LF Translation and password default root if no new password is set En FComm RA AAA AL a A alaale 5 28 E COM8 115200 None 8 1 T100 WE 5232 15 OTR att t sz3z 0001 login RTS 6 The AWK 5232 s device information and Main Menu will be displayed Please follow the description on me Ready screen and select the administration option you wish to perform En PComm Terminal Emulator COM8 115200 None 8 1 Y 1100 Profile Edit Port Manager Window Help a GA elel size BY COM8 115200 None 1 1100 LAN Hac Address Serial Ma Firmware Version ANE 5232 05 O00 90 E8 00 03 3E 2 L 2 1 0 Build 1105
23. in TTLS and PEAP you can use an anonymous user name for the outer authentication while the true user name is shown only through the encrypted channel Remember not all client software supports anonymous altercation Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP WLAN 1 WLAN Security Settings SSID Moana 1 Security mode VhAmz WPA type Enterprise 4 Encryption method TKIP EAP protocol TTL5 MS CHAF Ww2 PAP CHAP MS CHAP User name mS CHAP TTLS inner authentication Anonymous name TTL Inner Authentication Password Authentication Protocol is used MS CHAP V2 CHAP Challenge Handshake Authentication Protocol is used MS CHAP Microsoft CHAP is used MS CHAP V2 Microsoft CHAP version 2 is used Anonymous Factory Default Max 31 characters A distinct name used for outer authentication None User name amp Password Factory Default User name and password used in inner authentication None PEAP There are a few differences in the inner authentication procedures for TTLS and PEAP TTLS uses the encrypted channel to exchange attribute value pairs AVPs while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel The AWK 5232 provides MS CHAP V2 merely as an EAP method for inner authentication 3 18 AWK 5232 WLAN 1 WLAN Security Settings SSID Security mode WPA type Encryption method EAP protocol Inner EAP p
24. in the following table You can check the box for Enable log to enable the grouped events All default values are enabled checked Details for each event group can be found on the System log Event Types table on page 3 31 3 33 AWK 5232 Web Console Configuration Syslog Event Types Event group Enable log System related events e MNetwork related events Iw Config related events e Power events Iw DI events Iw Syslog Server Settings You can configure the parameters for your Syslog servers in this page Syslog Server Settings Syslog server 1 su Syslog port 514 Syslog server 2 FO Syslog port 514 Syslog server 3 FO Syslog port 514 Syslog server 1 2 3 IP address Enter the IP address of the 1st 2nd 3rd Syslog Server Syslog port Port destination Enter the UDP port of the corresponding Syslog server 514 1 to 65535 E mail E mail Event Types Check the box for Active to enable the event items All default values are deactivated unchecked Details for each event item can be found on the System log Event Types table on page 3 39 3 34 AWK 5232 Web Console Configuration E mail Event Types Event _ Active Cold start L Warm start L Power 1 transition On gt 0ff L Power 1 transition Off gt On L Power 2 transition On gt 0ff L Power 2 transition Off gt On L PoE transition On gt Off L PoE transition Off gt On L Configuration changed L Console auth
25. key are the minimum requirements for authentication and encryption The following parameters can be configured on the SNMP Agent page A more detailed explanation of each parameter is given below the following figure SMP Agent Enable Disable Read community public 7o Write commnuity private s lt CisS SNMP agent version Iwi vec Admin auth type No Auth Admin privacy key Disable 7 Privacy key Private MIB information Device object ID enterprise 8691 15 1 Enable 3 30 AWK 5232 Web Console Configuration Enables SNMP Agent Disable Disables SNMP Agent Read community for V1 V2c V3 or V1 V2c Read Community Use a community string match with a maximum of 31 characters for authentication This means that the SNMP agent can access all objects with read only permissions using this community string Write community for V1 V2c V3 or V1 V2c Read Write Use a community string match with a maximum of 31 private Community characters for authentication This means that the SNMP agent can accesses all objects with read write permissions using this community string SNMP agent version V1 V2c V3 or Select the SNMP protocol version used to manage the switch V1 V2c V1 V2c or V3 only Admin auth type for V1 V2c V3 and V3 only Setting MD5 Provide authentication based on the HMAC MD5 algorithms 8 character passwords are the minimum requirement for authenticatio
26. seconds Current local time shows the AWK 5232 s system time when you open this web page You can click on the Set Time button to activate the update after setting up the date and time parameters An Updated string will appear to indicate that the change is complete Local time settings will be immediately activated in the system without running Save and Restart 3 5 AWK 5232 Web Console Configuration NOTE The AWK 5232 has a real time clock RTC Users are strongly recommended to update the Local time for the AWK 5232 after initial setup or long term shutdown especially when the network does not have an Internet connection for accessing the NTP server or there is no NTP server on the LAN Current local time User adjustable time The date and time parameters allow configuration of the local None time with immediate activation yyyy mm dd hh mm ss format 24 hour format Time zone User selectable time The time zone setting allows conversion from GMT Greenwich GMT Greenwich zone Mean Time to local time Mean Time ATTENTION Changing the time zone will automatically adjust the Current local time You should configure the Time zone before setting the Current local time Daylight saving time Enable Disable Daylight saving time also know as DST or summer time Disable involves advancing clocks usually 1 hour during the summer time to provide an extra hour of daylight in the afternoon When
27. the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade After the progress bar reaches 100 the AWK 5232 will reboot itself When upgrading your firmware the AWK 5232 s other functions are forbidden Firmware Upgrade Select update image Browse Firmware Upgrade and Restart ATTENTION Please make sure the power source is stable when you upgrade your firmware An unexpected power breakup may damage your AWK 5232 Config mport Export You can back up or restore the AWK 5232 s configuration with Config Import Export In the Config I mport section click Browse to specify the configuration file and click Config Import button to begin importing the configuration Config Import Select configuration file Browse Contig Import In the Config Export section click the Config Export button and save the configuration file onto your local storage media The configuration file is a text file and you can view and edit it with a general text editing tool Config Export Config Export Load Factory Default Use this function to reset the AWK 5232 and roll all settings back to the factory default values You can also reset the hardware by pressing the reset button on the top panel of the AWK 5232 3 42 AWK 5232 Web Console Configuration Load Factory Default Reset to Factory Default Click Activate to reset all settings including the console password to the factory default
28. values The system will be restarted immediately Activ ate Password You can change the administration password for each of the AWK 5232 s console managers by using the Password function Before you set up a new password you must input the current password and reenter the new password for confirmation For your security do not use the default password root and remember to change the administration password regularly Password Current password asse New password ERT Confirm password asseesa Misc Settings Additional settings to help you manage your AWK 5232 are available on this page Misc Settings Reset button e Always enable Disable after 60 sec Reset button Always enable The AWK 5232 s Reset button works normally Always enable Disable after 60 sec The AWK 5232 s Reset button will become invalid 60 seconds after the AWK 5232 completes booting Save Configuration The following figure shows how the AWK 5232 stores the setting changes into volatile and non volatile memory All data stored in volatile memory will disappear when the AWK 5232 is shutdown or rebooted unless they are y Because the AWK 5232 starts up and initializes with the settings stored in flash memory all new changes must be saved to flash memory before restarting the AWK 5232 This also means the new changes will not work unless you run either the Save Configuration function or the Restart function 3 43 AWK 5232 Web Console
29. when long distance transmission is required A high gain antenna installed at a fixed antenna connector can also improve performance EAPOL Version setting Description Factory Dea 1 EAPOL version 1 was standardized in the 2001 version of 1 E AAA WMM Enable Disable WMM is a QoS standard for WLAN traffic Voice and video data Enable will be given priority bandwidth when enabled with WMM supported wireless clients Note WMM will always be enabled under 802 11n mode Full 11a channel support Enable Disable Enabling this option allows users to select 5GHz channels from Disable both licensed and unlicensed bands 3 21 AWK 5232 Web Console Configuration WLAN Certification Settings for EAP TLS in Redundant Client Client or Slave mode only When EAP TLS is used a WLAN Certificate will be required at the client end to support WPA WPA2 Enterprise The AWK 5232 can support the PKCS 12 also known as Personal Information Exchange Syntax Standard certificate formats that define file formats commonly used to store private keys with accompanying public key certificates protected with a password based symmetric key WLAN Certificate Settings Import for EAP TLS in Client mode only Current status Certificate issued to Certificate issued by Certificate expiration date Current Status displays information for the current WLAN certificate which has been imported into the AWK 5232 Nothing will be shown if no certi
30. 009 06 18 19h 11m 01s LAN 1 link off 212 2009 06 198 19h 11m 08s LAN 2 link on 213 2009 06 18 19h 11m 39s RSTP topology changed Export Log Relay Status The status of user configurable events can be found under Relay Status The status will refresh every 5 seconds if the Auto refresh box is checked If an event is triggered it will be noted on this list System administrators can click Acknowledge Event when he has acknowledged the event and addressed it Relay Status Auto refresh Relay Status Power 1 transition On gt Off Acknowledge Event Power 2 transition n gt D ff Acknowledge Event PoE transition n gt Off Acknowledge Event DI 1 transition On gt Off Acknowledge Event DI 1 transition Off gt On Acknowledge Event DI 2 transition On gt Off 4cknowledge Event DI 2 transition Off gt On Acknowledge Event LAN 1 link On Acknowledge Event LAN 1 link Off Acknowledge Event LAN 2 link On Acknowledge Event LAN 2 link Off Acknowledge Event DI and Power Status The status of power inputs and digital inputs is shown on this web page The status will refresh every 5 seconds if the Auto refresh box is checked 3 40 AWK 5232 Web Console Configuration Din and Power status M Auto refresh Input status On Off Power 1 status Qin Power 2 status Sit PoE status OF DI 1 status O DI 2 status Off Maintenance Maintenance functions provide the adminis
31. 0903 il System Info Settings 2 Network Settings 3 Time Settings 4 Maintenance Si Restart tq Quit ey in your selection State OPEN NOTE mm A CTS DER El m Ready desired formatting options To modify the appearance of the PComm Terminal Emulator window select Edit gt Font and then choose the AWK 5232 Other Console Configurations ATTENTION If you unplug the RS 232 cable or trigger DTR a disconnection event will be evoked to enforce logout for network security You will need to log in again to resume operation Configuration by Telnet and SSH Consoles You may use Telnet or SSH client to access the AWK 5232 and manage the console over a network To access the AWK 5232 s functions over the network from a PC host that is connected to the same LAN as the AWK 5232 you need to make sure that the PC host and the AWK 5232 are on the same logical subnet To do this check your PC host s IP address and subnet mask njio ho NOTE The AWK 5232 s default IP address is 192 168 127 253 and the default subnet mask is 255 255 255 0 for a Class C network If you do not set these values properly please check the network settings of your PC host and then change the IP address to 192 168 127 xxx and subnet mask to 255 255 255 0 Follow the steps below to access the console utility via Telnet or SSH client 1 From Windows Desktop run Start gt Run and then use Telnet to access the AWK 5232 s IP address fro
32. 55 refers to the sole IP address 192 168 1 1 IP address 192 168 1 1 and netmask 255 255 255 0 refers to the range of IP addresses from 192 168 1 1 to 192 168 255 Remember to check the Active check box for each entity to activate the setting IP Protocol Filters Enable Disable Policy Drop No I Active Protocol Source IP Source netmask Destination IP Destination netmask Enable Enables IP protocol filter Disable Disables IP protocol filter Policy Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied ATTENTION Be careful when you enable the filter function Drop no entity on list is activated all packets are allowed Accept no entity on list is activated all packets are denied TCP UDP Port Filter The AWK 5232 s TCP UDP port filter is a policy based filter that can allow or filter out TCP UDP based packets with a specified source or destination port The AWK 5232 provides 8 entities for setting the range of source destination ports of a specific protocol In addition to selecting TCP or UDP protocol you can set either the source port destination port or both The end port can be left empty if only a single port is specified Of course the end port cannot be larger then the start port 3 2 AWK 5232 Web Console Configuration The Application name is a text string that describes the corre
33. 5S232 192 162 1 2Z Netmask of AWRK 5232 255 255 252 0 Gateway of AWR S232 192 168 40 142 IP address of TFTP server 255 255 252 0 l Start to firmware upgrade using the above network setting immediately z Change the network settings Enter your selection l Z enter for abort 1 Select 0 in the sub menu to load the firmware image via LAN and then enter the file name of the firmware to start the firmware recovery 7 4 AWK 5232 Supporting Information Load method select 0 Load from LAN l Load from serial with modem q Abort Please select item Please input file name Default file name AWK 5232 ronm User Input file name AWE 5232 1 0 ron Technical Support Contact I nformation Customer satisfaction is our number one concern and to ensure that customers receive the full benefit of our products Moxa Internet Services has been set up to provide technical support driver updates product information certification status installation guide and user s manual updates The following services are provided e E mail for technical support Support moxa com Worldwide Support usa moxa com The Americas e World Wide Web WWW Site for product information http www moxa com 7 5
34. A and WPA2 for better compatibility Personal versions of WPA WPA2 also know as WPA WPA PSK Pre Shared Key provides a simple way of encrypting a wireless connection for high confidentiality A Passphrase is used as a basis for encryption methods or cipher types ina WLAN connection The passphrases should be complex and as long as possible The number of ASCII characters of the Passphrase must be at least 8 and can go up to 63 For security reason this passphrase should be disclosed to the relevant users only and changed regularly SSID Moxa 1 Security mode WPA type Encryption method Passphrase Key renewal 60 86400 seconds 3 14 AWK 5232 Web Console Configuration WPA Type Provides Pre Shared Key enabled WPA and WPA2 Provides enterprise level security for WPA and WPA2 Encryption method Temporal Key Integrity Protocol is enabled TKIP Note This option is not supported under 802 11n Advance Encryption System is enabled Provides TKIP broadcast key and TKIP AES unicast key for some legacy AP clients This option is rarely used Note This option is available in Redundant AP AP or Master mode only and cannot support AES enabled clients Passphrase 8 63 characters Master key to generate keys for encryption and decryption Key renewal for Redundant AP AP or Master mode only 60 86400 seconds Specifies the time period of group key renewal 3600 seconds 1 minute to 1 year NOTE The value f
35. AP TTLS It is usually much easier to re use existing authentication systems such as a Windows domain or Active Directory LDAP directory or Kerberos realm rather than creating a parallel authentication system As a result TTLS Tunneled TLS and PEAP Protected EAP are used to support the use of so called legacy authentication methods TTLS and PEAP work in a similar way First they establish a TLS tunnel like EAP TLS and validate whether the network is trustworthy with digital certificates on the authentication server This step is run to establish a tunnel that protects the next step or inner authentication so it is sometimes referred to as the outer authentication Then the TLS tunnel is used to encrypt an older authentication protocol that authenticates the user for the network As you can see digital certificates are still needed for the outer authentication in a simplified form Only a small number of certificates are required which can be generated by a small certificate authority Certificate reduction makes TTLS and PEAP much more popular than EAP TLS AWK 5232 Web Console Configuration The AWK 5232 provides some non cryptographic EAP methods including PAP CHAP MS CHAP and MS CHAP V2 These EAP methods are not recommended for direct use on wireless networks However they may be useful as inner authentication methods with TTLS or PEAP Because the inner and outer authentications can use distinct user names
36. Determines how large a packet can be before the Access Point 2346 256 to 2346 coordinates transmission and reception to ensure efficient communication NOTE You can refer to the related glossaries in Chapter 5 for detailed information about the above mentioned settings By setting these parameters properly you can better tune the performance of your wireless network Noise protection Enable Disable Adjusts the interference coping capability of the wireless signal This option should be enabled for communication distance under 500 meters and should be disabled for communication distances over 500 meters Transmission enhancement Enable Disable This setting can enhance communication by strengthening the Disable AWK 5232 s transmission power It is quite useful for long distance transmission or countering environmental interference The user must carefully evaluate and measure the transmission power of the entire system to ensure it stays below the regulative limit In addition that RF type 802 11a mode cannot be used if this function is enabled NOTE Make sure the same Transmission distance parameters are set in both AP and Client When this parameter is greater than 500 an optimal algorithm will be enabled to support long distance transmission Note that Transmission enhancement only supports 802 11b g n mode 802 11a mode is not supported Transmission enhancement is also recommended to enable communication at both ends
37. Ee GS S Address e https 7192 168 127 253 home asp 2 Warning messages will pop out to warn users that the security certificate was issued by a company they have not chosen to trust Security Alert Ed Information you exchange with this site cannot be viewed or changed by others However there 13 a problem with the site s security certificate D The security certificate was issued by a company you have not chosen to trust View the certificate to determine whether you want to bust the certifying authority The security certificate date is valid The security certificate has a valid name matching the name of the page you are trying to view Do pou want to proceed Yes View Certificate 3 Select Yes to accept the certificate issued by Moxa IW and then enter the AWK 5232 s web browser interface secured via HTTPS SSL You can see the protocol in URL is https Then you can use the menu tree on the left side of the window to open the function pages to access each of AWK 5232 s functions MOXA AWK 3121 JP 192 168 127 253 Microsoft Internet Explorer m x File Edit View Favorites Tools Help ae Ey D i R mL Back gt x 2 A Search S Favorites E2 DI ES 3 Address a https 192 168 127 253 home asp Eso Links Total Solution for Industrial Wireless Networking SJ Main Menu a Overview C1 Overview HE Basic Settings Wireless Settings a du nm n
38. Moxa AirWorks AWK 5232 User s Manual First Edition October 2011 www moxa com product O 2011 Moxa Inc All rights reserved Moxa AirWorks AWK 5232 User s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement Copyright Notice Trademarks 2011 Moxa Inc All rights reserved The MOXA logo is a registered trademark of Moxa Inc All other trademarks or registered marks in this manual belong to their respective manufacturers Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa Moxa provides this document as is without warranty of any kind either expressed or implied including but not limited to its particular purpose Moxa reserves the right to make improvements and or changes to this manual or to the products and or the programs described in this manual at any time Information provided in this manual is intended to be accurate and reliable However Moxa assumes no responsibility for its use or for any infringements on the rights of third parties that may result from its use This product might include unintentional technical or typographical errors Changes are periodically made to the information herein to correct such errors and these changes are incorporated into new editions of the publication Technical Support Contact I nf
39. S SS CMT ea ao 4 2 Conigurng AWK Search NIU IU ces 4 4 Di Other COHSOIE CGHHDUfGEIOHS ii i1142621122122 2222i1212x2xistx xesiaS1xSs6xss5sssxSaxsSsxxsasiswdSsi30s3 43808 89889305088s82983 0x9xx484 5 1 RS 232 Console Configuration 115200 None 8 1 VT10 HT nh nha 5 2 Configuration by Telnet and SSH CO SO CS uc do ko chon to cio 5 4 Configuration by Web Browser with HTTPS S9 ixs 54500 666615600140180410944091241608 124350010080006 8 6444204cedsdei999 4 20A 0i 5 4 Disabling Telnet and Browser ACOSO A A NES a0 5 5 gt ROTOS A ias 6 1 RR CANAS 6 2 A A aU 3401 6 2 O 6 2 A A A ee PE uen eue vew Da we IN ne ene er Ge ene 6 2 O AA eee eee eee ee eee ee eee Tec er eee here rn Ca een ere eee ern Cec nt 6 2 TASS EARSTE SE ONCE D nr ceca recedes A EEEE EEEE Cate ase ust e task AAAA 6 2 Differences between AS TP and ST ticctcenecuctsentcuetcuatsnetaun tien teucksued Ceweeuctseasway DO 6 3 Ta SUPPOFING THIOFIHNGEIONziriiiriiiairiziiiiiiiiiiiiiiiiiiiiiiiaiiiiiiiariiiiiiiiaasssrraaseaszEEESAEEEITSSSSEESIIESISEEEEEEISSSESEIS86E862 7 1 PRO CHG TAS USES MAA tl 7 2 Doe DECIA ONO C ONORI Laan xxx fnfsesisladsoxaosdsdstnlsdsdsinbsddsxdsdsd edad edad eda dadadedada a a b b4 a E BA e AEEA 7 2 Federal Communication Commission Interference Statemenf nen 7 2 RSTTE Compliance Statene arraian are eal iden oran 7 3 FIr Ware RGCOIVGE V610 66v dtsuu chi u CAINEA A MA AS NEENAKE M E Shin duiukdtij
40. TP RSTP protocol to increase the reliability across the entire network In addition SNMP support can ease the network management via SNMP protocols 3 22 AWK 5232 Web Console Configuration Using Virtual LAN Setting up Virtual LANs VLANs on your AWK series increases the efficiency of your network by dividing the LAN into logical segments as opposed to physical segments In general VLANs are easier to manage The Virtual LAN VLAN Concept What is a VLAN A virtual LAN commonly known as a VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain regardless of their physical location A VLAN has the same attributes as a physical LAN but it allows for end stations to be grouped together even if they are not located on the same network switch Network reconfiguration can be done through software instead of physically relocating devices VLANs now extend as far as the reach of the access point signal Clients can be segmented into wireless sub networks via SSID and VLAN assignment A Client can access the network by connecting to an AP configured to support its assigned SSID VLAN Benefits of VLANs VLANs are used to conveniently efficiently and easily manage your network in the following ways e Manage adds moves and changes from a single point of contact e Define and monitor groups e Reduce broadcast and multicast traffic to unnecessary destinations e
41. These relay contacts are used to indicate user configured events and system failure The two wires attached to the relay contacts form an open circuit when a user configured event is triggered If a user configured event does not occur the relay circuit will remain closed For safety reasons the relay circuit is kept open when the AWK 5232 is not powered Relay Event Types Trap You can check the box for Active to enable the event items All default values are deactivated unchecked Details for each event item can be found in the System log Event Types table on page 3 31 Relay Event Types Event Active Power 1 transition On gt 0ff F Power 2 transition On gt 0ff L PoE transition On gt Off F DI 1 transition On gt Off L DI 1 transition Off gt On F DI 2 transition On gt Off L DI 2 transition Off gt On L LAN 1 link On F LAN 1 link Off F LAN link On L L LAN 2 link Off Traps can be used to signal abnormal conditions notifications to a management station This trap driven notification can make your network more efficient Because a management station usually takes care of a large number of devices that have a large number of objects it will be overloading for the management station to poll or send requests to query every object on every device It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event
42. V3 SNMP V1 and SNMP V2c use a community string match for authentication which means that SNMP servers access all objects with read only or read write permissions using the community string public private default value SNMP V3 which requires you to select an authentication level of MD5 or SHA is the most secure protocol You can also enable data encryption to enhance data security The AWK 5232 s MIB can be found in the software CD and supports reading the attributes via SNMP Only get method is supported SNMP security modes and security levels supported by the AWK 5232 are shown in the following table Select the security mode and level that will be used to communicate between the SNMP agent and manager Protocol Setting on UI Authentication Data Version web page Type Encryption SNMP V1 V2c Read Community string Use a community string match for V1 V2c Community authentication V1 V2c Community string Write Read Use a community string match for authentication Community SNMP V3 No Auth Use account with admin or user to access objects Provides authentication based on HMAC MD5 or HMAC SHA algorithms 8 character passwords are the minimum requirement for MD5 or SHA Authentication based on MD5 or SHA authentication MD5 or SHA Authentication Data encryption Provides authentication based on based on MD5 or HMAC MD5 or HMAC SHA algorithms SHA and data encryption key 8 character passwords and a data encryption
43. a portable mobile device and should be located at least 20cm away from the human body The AWK 5232 is NOT designed for the general public To safely deploy the AWK 5232s within a wireless network a well trained technician is required for installation Functional Design LED Indicators The LEDs on the front panel of the AWK 5232 allow you to quickly identity device status and wireless settings o coir stete Description Front Panel LED Indicators System Green HH He jor Powers not ping supplies from power mp2 SS ee O O O Blinking Cannot get an IP address from the DHCP server interval 1 sec Off There is no error condition STATE Green Red Software Ready Blinking Green The AWK has been located by AWK Search Utility interval 1 sec Red Booting or Error condition Green Amber WLAN 1 functions in Client mode Blinking Green WLAN1 s data communication is running in Client mode WLANI functions in AP Bridge mode Blinking Amber WLAN1 s data communication is running in AP Bridge mode WLANI is not in use Green Amber WLAN2 function is in Client mode Blinking Green WLAN2 s data communication is running in Client mode WLAN2 function is in AP Bridge mode Blinking Amber WLAN2 s data communication is running in P AP Bridge mode TP Port LAN1 LAN2 LED Indicators Port I nterface Amber On TPportsi0 100Mbpslinkisacive for FP port s 10 100 Mbps link is inactive
44. click on the Login button MOXN Moxa AWK 5232 EU Username admin Password Login goahead WEBSERVER AWK 5232 Getting Started NOTE NOTE Default user name and password Username admin Password root For security reasons we strongly recommend changing the default password To do so select Maintenance gt Password and then follow the on screen instructions to change the password After you click Submit to apply changes you can see that the web page is refreshed and the string Update and a blinking reminder will be shown on the upper right corner of web page as follow re Plinlo Das NI ie os x s Ne UCR MHOStart LO activate Mew SOtungs Total Solution for Industrial Wireless Networking 3 Main Menu Ga Overview System Info Settings Updated To make the changes effective click Restart and then Save and Restart after you change the settings About 30 seconds are needed for the AWK 5232 to complete its restart process Step 5 Select the operation mode for the AWK 5232 By default the AWK 5232 s operation mode is set to Wireless redundancy You can change the setting in Wireless Settings gt Operation mode if you would like to use the Wireless bridge or AP Client mode instead Detailed information about configuring the AWK 5232 s operation can be found in Chapter 3 Step 6 Test communications We will describe 2 test methods to make sure the network connection has been
45. connect to AP If wireless is disconnected AWK restarts auto negotiation on Ethernet port but always stays in the link failure state Once the wireless connection is recovered AWK will try to recover the Ethernet link System log will indicate the link fault pass through events in addition to the original link up down events Link Fault Pass Through for Client Slave mode only Link Fault Pass Through Enable Disable Link Fault Pass Through Enables Link Fault Pass Through Disable Disables Link Fault Pass Through Auto Warning Settings Since industrial grade devices are often located at the endpoints of a system these devices will not always know what is happening elsewhere on the network This means that these devices including wireless APs or clients must provide system maintainers with real time alarm messages Even when system administrators are out of the control room for an extended period they can still be informed of the status of devices almost instantaneously when exceptions occur In addition to logging these events the AWK 5232 supports different approaches to warn engineers automatically such as SNMP trap e mail and relay output It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output System Log System Log Event Types Detail information for grouped events is shown in the following table You can check the box for Enable log to enable the gro
46. d Only supports the IEEE 802 11g standard B G Mixed Supports IEEE 802 11b g standards but 802 11g may operate at a slower speed if when 802 11b clients are on the network 3 10 AWK 5232 Web Console Configuration G N Mixed Supports EEE 802 11g n standards but 802 11n may operate at a slower speed if 802 11g clients are on the network B G N Mixed Supports IEEE 802 11b g n standards but 802 11g n may operate at a slower speed if 802 11b clients are on the network 568z N Only 2 4GHz Only supports the 2 4 GHz IEEE 802 11n standard FI Only supports the IEEE 802 11a standard A A N Mixed Supports IEEE 802 11a n standards but 802 11n may operate at a slower speed if 802 11a clients are on the network N Only 5GHz Only supports the 5 GHz IEEE 802 11n standard Channel for AP mode only Available channels vary The AWK 5232 plays the role of wireless AP 6 in B G N Mixed with RF type Moge Channel Width for any 11N RF type only Setting Description Faactory Default 20 MHz Select your channel width If you are not sure which option to 20 MHz 20 40 MHz use select 20 40MHz Auto Channel bonding If 20 40 MHz is set the channel bonding 40 MHz will be automatically enabled if the connection target supports this feature SSID Max of 31 characters he SSID of a client and the SSID of the AP must be identical for MOXA_ RF number the client and AP to be able to communicate with each other SSID b
47. d has not been set and then click Login to continue MOXN Moxa AWK 5232 EU Username admin Password goahead WEBSERVER You may need to wait a few moments for the web page download onto your computer Please note that the Model name and IP address of your AWK 5232 are both shown on the title of the web page This information can help you identify multiple AWK 5232s You can use the menu tree on the left side of the window to open the function pages to access each of AWK 5232 s functions AWK 5232 Web Console Configuration EJ Main Menu HO Overview Basic Settings Wireless Settings E Advanced Settings E Auto Warning Settings 3 Status ae Maintenance Save Configuration fo Restart 239 Logout Overview All information on this page are active values System Info Model name Device name Serial No System up time Firmware version Device Info Device MAC address IP address Subnet mask Gateway 802 11 Info Country code Operation mode l AWK 5232 EU AWK 5232_ 0000 O O days 00h 02m 14s 1 0 Build 11061403 00 90 E8 00 02 F1 192 168 127 253 255 255 295 0 EU Wireless redundancy Redundant Wirel AP WLAN 1 AP V ao In the following paragraphs we will go through each of the AWK 5232 s management functions in detail You can also get a quick overview of these functions in the Function Guiding Map section of Chapter 2 NOTE The model name of t
48. e DHCP Client List shows all the clients that require and have successfully received IP assignments You can click the Refresh button to refresh the list DHCP Client List MAC IP 1 O0 13 ce el ee ef 192 168 127 2 Select all Refresh You can press Select all button to select all content in the list for further editing Select All Print Select all Refresh System Log Triggered events are recorded in System Log You can export the log contents to an available viewer by clicking Export Log You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log 3 39 AWK 5232 Web Console Configuration System log 196 2009 06 18 16h 31m 52s Power 1 transition Off gt On Al 187 2009 06 18 16h 32m 16s LAN 1 link on 1198 2009 06 18 16h 32m 17s LAN 2 link on 1199 2009 06 18 16h 32m 33s RSTP topology changed 200 2009 06 19 16h 32m 335 LAN 1 link off 201 2009 06 18 16h 32m 345 LAN 2 link off 202 2009 06 18 16h 32m 43s LAN 1 link on 203 2009 06 18 16h 32m 45s LAN 2 link on 204 2009 06 18 16h 33m 135 RSTP topology changed 205 2009 06 19 16h 33m 53s RSTP topology changed 206 2009 06 18 16h 34m 31s RSTP topology changed 207 2009 06 18 16h 35m 09s RSTP topology changed 208 2009 06 18 19h 10m 17s System cold start l 209 2009 06 18 19h 10m 17s Power 1 transition Off gt Cin 210 2009 06 18 19h 10m 53s LAN 1 link on 211 2
49. e resources such as printers and servers gsi0 3 PIE 2 Packets from the human resource department could be Y j floor ssl 2 restricted to a gateway that allowed access to only the a wK Internet A member of the human resource department a g poor could send and receive e mail and access the Internet Je ma A ii but would be prevented from accessing servers or hosts g on the local corporate network 3 23 AWK 5232 Web Console Configuration Configuring Virtual LAN VLAN Settings To configure the AWK s VLAN use the VLAN Setting page to configure the ports YLAN Settings for 4P Master Slave mode only Management YLAN ID Port PVID YLA Tagged Please use comma to separate multiple VLAN tags AAA Management VLAN ID VLAN ID Set the management VLAN of this AWK ranges from 1 to 4094 Trunk Port LAN o This port is the LAN port on the AWK Yes sd This is a wireless port for the specific SSID This field will refer to the SSID that you have created If more SSIDs have been created new rows will be added Port PVID VLAN ID ranging from 1 Set the port s VLAN ID for devices that connect to the port The 1 to 4094 port can be a LAN port or WLAN ports VLAN Tagged A comma seperated list Specify which VLANs can communicate with this specific VLAN of VLAN IDs Each of the VLAN IDs range from 1 to 4094 3 24 AWK 5232 Web Console Configuration NOTE The VLAN feature can al
50. ed a second notebook computer B equipped with an Ethernet port Use the default settings for the first AWK 5232 connected to notebook A and change the second or third AWK 5232 connected to notebook B to Client mode Then configure the notebooks and AWK 5232s properly Client AP a Bn _ JP 1 92 68 1 27 2513 PING h n SSID MOXA _1 _ ae Notebook B Notebook A IP 192 168 127 1 IP 192 168 127 2 After setting up the testing environment open a DOS window on notebook B At the prompt type ping lt IP address of notebook A gt and then press Enter A Reply from IP address response means the communication was successful A Request timed out response means the communication failed In this case recheck the configuration to make sure the connections are correct Function Guiding Map The management functions are categorized in a tree and shown in the left field of the web based management console You can efficiently locate the function you need with the following guide AWK 5232 Main Menu Overview HS Basic Settings 2 System Info Settings A Network Settings 3 Time Settings Ag Wireless Settings 2 Operation Mode OS WLAN 1 Basic Wireless Settings WLAN Security Settings 3 Advanced Wireless Settings WLAN Certificate Settings EY WLAN 2 Basic Wireless Settings A WLAN Security Settings Advanced Wireless Settings WLAN Certificate Settings
51. eless Bridge mode s Master page Descriptions of other operation modes can be found in the Basic Wireless Settings section Enabling Non Redundant Single RF AP Wireless Redundancy mode s Redundant AP The AWK 5232 can be configured as a single RF AP by entering Add SSID the status will initially appear as inactive but after entering the new SSID and hitting Save the status will change from inactive to active Showing that the WLAN is ready to operate as an access point in non redundant AP mode see figure on next page 3 9 AWK 5232 Web Console Configuration Basic Wireless Settings Multiple SSID Status SSID Operation Mode Action Active MOXA_1 Redundant AP Inactive AP Save Cancel Cesse y WLAN WLAN Wireless Bridge Mode s Master You can set the virtual AP function in Wireless Bridge AP mode Master setting Click Add SSID enter the name for the SSID then click Save Basic Wireless Settings Multiple SSID Status SSID Operation Mode Action Active MOXA_1 AP Edit Inactive AP Save Cancel EE Basic Wireless Setting The following figure shows the Basic Wireless Settings page The parameters and options are described as follows Operation mode AP RF type B G N Mixed x Channel 6 SSID MOXA 1 SSID broadcast 2 Enable Disable Submit RF type Setting Description Factory Default Bo Only supports the IEEE 802 11b standard B G N Mixe
52. ement gt R amp TTE Compliance Statement O Firmware Recovery O Technical Support Contact Information AWK 5232 Supporting Information About This User s Manual This manual is mainly designed for but no limited to the following hardware and firmware for the AWK 5232 e Hardware Rev e Firmware Ver You are strongly recommended to visit Moxa s website http www moxa com and find the latest product datasheet firmware QIG Quick Installation Guide UM User s Manual and related information NOTE You can find out the hardware revision number of AWK 5232 on the side label The firmware version number can be seen on the Overview page as follow System Info Model name Device name Serial No System up time Firmware version AWK 5232 EU AWK 5232 2222 2222 O days 00h 02m 20s 1 0 Build 11092116 DoC Declaration of Conformity Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation
53. entication failure L DI 1 transition n gt Off L DI 1 transition Off gt On L DI 2 transition n gt Off L DI 2 transition Off gt On L LAN 1 link On F LAN 1 link Off F LAN link On C LAN 2 link Off F E mail Server Settings You can set up to 4 e mail addresses to receive alarm emails from the AWK 5232 The following parameters can be configured on the E mail Server Settings page In addition a Send Test Mail button can be used to test whether the Mail server and e mail addresses work well More detailed explanations about these parameters are given after the following figure E mail Server Settings Mail server SMTP oF User name FT Password _ From e mail address PO To e mail address 1 POF To e mail address 2 PO To e mail address 3 PF To e mail address 4 PO Submit Send Test Mail Mail server SMTP IP address The IP Address of your email server None User name amp Password Setting Description Factory Default Sa User name and password used in the SMTP server None AWK 5232 Web Console Configuration From e mail address Max 63 characters Enter the administrator s e mail address which will be shown in None the From field of a warning e mail To E mail address 1 2 3 4 Max 63 characters Enter the receivers e mail addresses Relay The AWK 5232 has one relay output which consists of 2 terminal block contacts on the AWK 5232 s top panel
54. es Transport Layer Security protocol TLS TTLS Specifies Tunneled Transport Layer Security PEAP Specifies Protected Extensible Authentication Protocol or Protected EAP Before choosing the EAP protocol for your WPA WPA2 Enterpise settings on the client end please contact the network administrator to make sure the system supports the protocol on the AP end Detailed information on these three popular EAP protocols is presented in the following sections EAP TLS TLS is the standards based successor to the Secure Socket Layer SSL It can establish a trusted communication channel over a distrusted network TLS provides mutual authentication through certificate exchange EAP TLS is also secure to use You are required to submit a digital certificate to the authentication server for validation but the authentication server must also supply a certificate You can use WLAN 1 2 gt WLAN Certificate Settings to import your WLAN certificate and enable EAP TLS on the client end WLAN 1 WLAN Security Settings SSID Momo 1 Security mode Wt Pe WPA type Encryption method TKIP EAP protocol TLS M Certificate issued to HA Certificate issued by HA Certificate expiration date HA You can check the current certificate status in Current Status if it is available Certificate issued to shows the certificate user Certificate issued by shows the certificate issuer Certificate expiration date indicates when the certificate gets invalid E
55. ess AWK 5232 s IP address Identifies the AWK 5232 on a TCP IP network 192 168 127 253 Subnet mask AWK 5232 s subnet Identifies the type of network to which the AWK 5232 is 255 255 255 0 mask connected e g 255 255 0 0 for a Class B network or 255 255 255 0 for a Class C network Gateway AWK 5232 s default The IP address of the router that connects the LAN to an None gateway outside network Primary Secondary DNS server IP address of Primary The IP address of the DNS Server used by your network After None Secondary DNS server entering the DNS Server s IP address you can input the AWK 5232 s URL e g http ap11 abc com in your browser s address field instead of entering the IP address The Secondary DNS server will be used if the Primary DNS server fails to connect Time Settings The AWK 5232 has a time calibration function based on information from an NTP server or user specified Date and Time information Functions such as Auto warning can add real time information to the message Time Settings Date YYYY MM DD Time HH MM SS Current local time 2009 f o1 y 23 16 58 EN set ime Time zone GMT 06 00 Central Time US amp Canada Daylight saving time M Enable Starts at lapr y ist y sun y foo E loo HH MIM Stops at Joct y llast y sun y foo foo HH MM Time offset 01 00 Time serwer 1 time nist gov Time server 2 Query period 600 600 9999
56. etwork will be determined much more quickly compared to STP e RSTP is backward compatible with STP making it relatively easy to deploy For example gt Defaults to sending 802 1D style BPDUs if packets with this format are received gt STP 802 1D and RSTP 802 1w can operate on the LAN ports and WLAN ports AP and WDS1 WDS8 of the same AWK 5232 This feature is particularly helpful when the AWK 5232 connects to older equipment such as legacy switches 6 2 AWK 5232 References Differences between RSTP and STP RSTP is similar to STP but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge Adjacent bridges connected via point to point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change The main benefit of RSTP is that the configuration decision is made locally rather than network wide allowing RSTP to carry out automatic configuration and restore a link faster than STP 6 3 7 Supporting Information This chapter presents additional information about this manual and product You can also learn how to contact Moxa for technical support The following topics are covered in this chapter O About This User s Manual O DoC Declaration of Conformity gt Federal Communication Commission Interference Stat
57. evices on the network are recognized as a root the devices will renegotiate to set up a new Spanning Tree topology Enable RSTP Enable disable Enables or disables the port as a node on the Spanning Tree Disable unchecked topology Port priority Numerical value Increase this port s priority as a node on the Spanning Tree 128 selected by user topology by inputting a lower number Port cost Enable Disable Input a higher cost to indicate that this port is less suitable as a 20000 node for the Spanning Tree topology Edge port Checked unchecked Sets a port which no BPDU expectedly goes through as an unchecked except edge port WLAN1 2 ports NOTE We recommend you set an edge port for the port which is connected to a non STP RSTP sub network or an end device PLC RTU etc as opposed to network equipment This can prevent unnecessary waiting and negotiation of STP RSTP protocol and accelerate system initialization When an edge port receives BPDUs it can still function as an STP RSTP port and start negotiation Setting an edge port is different from disabling STP RSTP on a port If you disable STP RSTP a port will not deal with STP RSTP BPDUs at all 3 29 AWK 5232 Web Console Configuration Port Status Port Status indicates the current Spanning Tree status of this port Use Forwarding for normal transmission or Blocking to block transmission SNMP Agent The AWK 5232 supports SNMP V1 V2c
58. ew A Weg AWK 5232 US 192 168 127 253 00 90 E8 19 17 9B 255 255 255 0 1 0 Build 11090604 System Info Device Info 802 11 Info Model name AWK 5232 US Device name AWK 5232_2222 Device location IP configuration Static x IP address 192 168 127 253 Subnet mask 255 255 255 0 Gateway Device description Serial No 2222 System up time 0 days 00h 00m 38s Firmware version 1 0 Build 11090604 Primary DNS server Secondary DNS server Jf OK X Cancel The three advanced options Search Connection and Miscellaneous are explained below 4 8 AWK 5232 Software I nstallation Configuration Search Retry count default 5 Indicates how many times the search will be retried automatically Retry interval ms The time lapsed between retries Advanced Options search Connection Misc Retry count 5 Retry interval ma 1 O00 Connection Connection timeout secs Use this option to set the waiting time for the Default Login Locate Assign IP Upload Firmware and Unlock to complete Upgrade timeout secs Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading Use this option to set the waiting time for the Firmware to write to flash Advanced Options Search Connection Misc Connection timeout secs 0 Upgrade timeout secs 500 MISC Search on start Checkmark this box if you would like the
59. ficate is available Certificate issued to shows the certificate user Certificate issued by shows the certificate issuer Certificate expiration date indicates when the certificate gets invalid You can import a new WLAN certificate in Import WLAN Certificate by following these steps in order 1 Input the corresponding password or key in the Certificate private password field Then click Submit to set the password 2 You can see the password displayed in the Certificate private password field Then click on the Browse button in Select certificate key file and select the certificate file 3 Click Upload Certificate File to import the certificate file If it succeeds you can see the information uploaded in Current Certificate f it fails you may need to return to step 1 to set the password correctly and then import the certificate file again Step 1 Certificate private password Submit Step 2 Select certificate key file Browse Upload Certificate File NOTE The WLAN certificate will remain after the AWK 5232 reboots Even though it is expired it can still be seen on Current Certificate Advanced Settings Several advanced functions are available to increase the functionality of your AWK 5232 and wireless network system The DHCP server helps you deploy wireless clients efficiently Packet filters provide security mechanisms such as firewalls in different network layers Moreover the AWK 5232 can support S
60. hat may cause undesired operation FCC 15 407 e Within the 5 15 5 25 GHz band U NII devices will be restricted to indoor operations to reduce any potential for harmful interference to co channel MSS operations R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 CE OF THE EUROPEAN PARLI AMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment as of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Greece Ireland Italy Luxembourg Portugal Spain Sweden The Netherlands and United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland EU Countries Not I nte
61. he AWK 5232 is shown as AWK 5232 XX where XX indicates the country code The country code represents the AWK 5232 version and which bandwidth it uses We use AWK 5232 US as an example in the following figures The country code of model name on the screen may vary if you are using a different version band AWK 5232 NOTE Overview For security reasons you will need to log back into the AWK 5232 after the 5 minute time out The Overview page summarizes the AWK 5232 s current status The information is categorized into several groups System Info Device info and 802 11 I nfo Overview All information on this page are active values System Info Model name Device name Serial No System up time Firmware version Device Info Device MAC address IP address Subnet mask Gateway 802 11 Info Country code Operation mode Channel RF type SSID AWK 5232 EU AWK 5232_0000 0 O days 00h 02m 14s 1 0 Build 11061403 00 200 E8 00 02 F1 192 168 127 253 290 200 200 0 EU Wireless redundancy Redundant AP WLAN 1 6 B G N Mixed MOXA 1 3 3 Wireless redundancy Redundant AP WLAN 2 11 B G N Mixed MOxA _2 AWK 5232 Web Console Configuration Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the AWK 5232 System I nfo Settings The System Info items especially Device name and Device description are displayed and included on
62. ial console connection method which requires using a short serial cable to connect the AWK 5232 to a PC s COM port can be used if you do not know the AWK 5232 s IP address It is also convenient to use serial console configurations when you cannot access the AWK 5232 over Ethernet LAN such as in the case of LAN cable disconnections or broadcast storming over the LAN ATTENTION Do not use the RS 232 console manager when the AWK 5232 is powered at reversed voltage ex 48VDC even though reverse voltage protection is supported If you need to connect the RS 232 console at reversed voltage Moxa s TCC 82 isolator is your best solution We recommend using Moxa PComm Lite Terminal Emulator which can be downloaded free of charge from Moxa s website Before running PComm Terminal Emulator use an RJ 45 to DB9 F or RJ 45 to DB25 F cable to connect the AWK 5232 s RS 232 console port to your PC s COM port generally COM1 or COM2 depending on how your system is set up After installing PComm Terminal Emulator take the following steps to access the RS 232 console utility 1 From the Windows desktop open the Start menu and start PComm Terminal Emulator in the PComm Lite group 2 Select Open under Port Manager to open a new connection En FComm Terminal Emulator Profile POLEO Help 3 The Communication Parameter page of the Property window opens Select the appropriate COM port for Console Connection 115200 for Baud Rate 8
63. low wireless clients to manage the AP If the VLAN Management ID matches a VLAN ID then those wireless clients who are members of that VLAN will have AP management access CAUTION Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP all members of that User VLAN will have management access to the AP Be careful to restrict VLAN membership to those with legitimate access to the AP DHCP Server for AP Client operation mode s AP mode only DHCP Dynamic Host Configuration Protocol is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses The AWK 5232 can act as a simplified DHCP server and easily assign IP addresses to your wireless clients by responding to the DHCP requests from the client ends The P related parameters you set on this page will also be sent to the client You can also assign a static P address to a specific client by entering its MAC address The AWK 5232 provides a Static DHCP mapping list with up to 16 entities Be reminded to check the Active check box for each entity to activate the setting You can check the IP assignment status under Status gt DHCP Client List DHCP Server for AP mode only DHCP server Enable Default gateway areca Subnet mask Primary DNS server Po Secondary ONS server Po Start
64. m the Windows Run window You may also issue the telnet command from the MS DOS prompt Hun ki E4 w Type the name of a program folder document or Internet resource and Windows will open it for you Open telnet 132 168 127 253 y Cancel Browse When using SSH client ex PuTTY please run the client program ex putty exe and then input the AWK 5232 s IP address specifying 22 for the SSH connection port 32 PuTTY Can l x Category E Session Basic options for your PuT Ty session Es Terminal specify the destination you wantto connectto Keyboard Host Hame for IF address Bell 132 160 127 253 a E f Connection type E C Baw Telnet Rlogin SSH Serial H Appearance 2 The Console login screen will appear Please refer to the previous paragraph RS 232 Console Configuration and for login and administration Configuration by Web Browser with HTTPS SSL To secure your HTTP access the AWK 5232 supports HTTPS SSL encryption for all HTTP traffic Perform the following steps to access the AWK 5232 s web browser interface via HTTPS SSL 1 Open your web browser and type https lt AWK 5232 s IP address gt in the address field Press Enter to establish the connection 5 4 AWK 5232 Other Console Configurations 3 https 7 192 168 127 253 home asp Microsoft Internet Explorer File Edit View Favorites Tools Help Back Y A Seach Favoiles Media lt 4
65. n Provides authentication based on HMAC SHA algorithms 8 character passwords are the minimum requirement for authentication Admin private key for V1 V2c V3 and V3 only DES based data encryption AES based data encryption Private Key A data encryption key is the minimum requirement for data encryption maximum of 63 characters Private MIB Information Device Object ID Also know as OID This is the AWK 5232 s enterprise value It is fixed Storm Protection In general one host should not be allowed to occupy unlimited bandwidth particularly when the device malfunctions For example so called broadcast storms could be caused by an incorrectly configured topology or a malfunctioning device Storm Protection Storm protection Enable Disable Multicast amp flooding Enable Disable 3 31 AWK 5232 Web Console Configuration Storm Protection Enable Disable Enable or disable Broadcast Storm Protection globally for Enable multicast packets Multicast and flooding Enable Disable If you enable Storm Protection the Multicast and flooding Disable option will show up You can Enable or Disable Broadcast Storm Protection globally for unknown multicast and unknown unicast packets Link Fault Pass Through for Client Slave mode only This function means if Ethernet port is link down wireless connection will be forced to disconnect Once Ethernet link is recovered AWK will try to
66. n Status Wireless Status The status for 802 11 info parameters such as Operation mode and Channel are shown on the Wireless Status page The status will refresh every 5 seconds if the Auto refresh box is checked Certain values for 802 11 info may not appear with different operation modes For example Current BSSID and RSSI are not available in Redundant AP AP or Master modes It is helpful to use the continuously updated information option on this page such as RSSI to monitor the Signal strength of the AWK 5232 in Redundant Client Client or Slave modes Wireless Status Auto refresh Show status of WLAN 1 SSID MOxA_1 802 11 info Operation mode 4P Cliant Client WLAN 1 Channel Mot connected RF type B G Mixed SSID Mona 1 Security mode OFEN Current BSSID Py fs Signal strength angli Transmission rate HA Transmission power Full Associated Client List for Redundant AP AP or Master mode only Associated Client List shows all the clients that are currently associated to a particular AWK 5232 You can click Select all to select all the content in the list for further editing You can click Refresh to refresh the list 3 38 AWK 5232 Web Console Configuration Associated Client List for Redundant AP AP or Master mode only Show clients for WLAN 1 SSID MO A_ 1 WLAN 1 SSID MOXA 11 WLAN 2 SSID MOXA 2 DHCP Client List for AP mode only When you enable the DHCP server th
67. n you switch to Wireless Redundancy mode you will see an additional WLAN Security Setting overview page Please click on Edit to modify WLAN security settings WLAN Security Settings Multiple SSID Status SSID Operation Mode Security Mode Action Active MOXA 1 AP OPEN Edit The AWK 5232 provides four standardized wireless security modes Open WEP Wired Equivalent Privacy WPA Wi Fi Protected Access and WPA2 Several types of security models are available in AWK 5232 by selecting Security mode and WPA type e Open No authentication no data encryption e WEP Static WEP Wired Equivalent Privacy keys must be manually configured e WPA WPA2 Personal also known as WPA WPA2 PSK You need to specify the Pre Shared Key in the Passphrase field which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets e WPA WPA2 Enterprise also called WPA WPA2 EAP Extensible Authentication Protocol In addition to device based authentication WPA WPA2 Enterprise enables user based authentication via IEEE802 1X The AWK 5232 can support three EAP methods EAP TLS EAP TTLS and EAP PEAP 3 12 AWK 5232 Web Console Configuration SSID Moma 1 Security mode Security mode Setting BeempMm ra amp ewBeRauh PA WPA2 Fully supports EEE 802 11i with TKIP AES 802 1X in 802 11a b g mode supports IEEE 802 11i with AES 802 1X
68. nded for Use None Potential Restrictive Use France only channels 10 11 12 and 13 CE Warning This is a class B product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures Firmware Recovery When the LEDs of FAULT and STATE all light up simultaneously and blink at one second interval it means the system booting has failed It may result from some wrong operation or uncontrollable issues such as an unexpected shutdown during firmware update The AWK 5232 is designed to help administrators recover such damage and resume system operation rapidly You can refer to the following instructions to recover the firmware Connect to the AWK 5232 s RS 232 console with 115200bps and N 8 1 You will see the following message shown on the terminal emulator every one second 7 3 AWK 5232 Press Press Press Press Press Press Press Press Press Press Press Press Press Press Ctrl C and the following message will appear Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Ctrl C Cer 1 E Ctrl C Ctrl C ta to ta to ta t ta t t t ta t ta enter enter enter ent ar enter enter Bentler enter Bentler enter enter enter Bentler Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Firmware Recovery Recovery Recovery Recove
69. nloc Upgrade DO Import Refresh Refresh All Exit No Model name IP address Device MAC address Overview AWK 5232 US 192 168 127 253 00 90 E8 19 17 9B 255 255 255 0 1 0 Build 11090604 System Info Device Info 802 11 Info Model name AWIK 5232 US Device name AWK 5232_2222 Device location Device description Serial No 2222 System up time 0 days 00h 00m 38s Firmware version 1 0 Build 11090604 Click Locate to cause the selected device to beep AA oe AA AS IE File Edit Function Tools Help A sont Ex LL bed k ee x P u E E e See Ta ee All eu No Modelname IP address Device MAC address Subnet mask Firmware version ef 1 AWK 5232 US 192 168 127 253 00 90 E8 19 17 9B 255 255 255 0 1 0 Build 11090604 System Info Device Info 802 11 Info Model name AWK 5232 US Device name AWK 5232_2222 Device location Device description i m Locating Serial No 2222 Model AWK 5232 US System up time 0 days 00h 00m 38s IP 192 168 127 253 Firmware version 1 0 Build 11090604 00 90 E8 19 17 9B Netmask 255 255 255 0 Make sure your AWK is unlocked before using the search utility s icons setting The AWK will unlock automatically if the password is set to the default Otherwise you must enter the new password manually Go to Tools gt AWK login Options to manage and unlock additional AWKs 4 6 AWK 5232 Software I nstallation Configu
70. nsole for information on how to use the web console 4 7 AWK 5232 Software I nstallation Configuration PD AWK Search Utility P o x File Edit Function Tools Help 2 x a 4 E E 2 nu nu F Search Search Ex Locate eb Telnet Assign IP Unlock Upgrade Export Import Refresh Refresh All Exit No Modelname IP address Device MAC address of Awk 5232U5S 00 90 8 19 17 98 255 255 255 0 System Info Device Info 802 11 Info Model name AWK 5232 US Device name AWK 5232_2222 Device location Device description Serial No 2222 System up time 0 days 00h 00m 38s Firmware version 1 0 Build 11090604 Click on Telnet if you would like to use telnet to configure your AWKs File Edit Function Tools Help 2 x 4 P ES E 2 a nv TL Search Search Ex Locate Web Telr Assign IP Unlock Upgrade Export Import Refresh Refresh All Exit ie Awk 7 253 00 30 E8 13 17 3B 255 255 255 0 System Info Device Info 802 11 Info Model name AWK 5232 US Device name AWK 5232_2222 Device location Device description Serial No 2222 System up time O days 00h 00m 38s Firmware version 1 0 Build 11090604 Click Assign IP to change the IP setting _ A e TH a xs File Edit Function Tools Help x a ES 2 nu mu F Search Search Ex Locate Web Telnet Assign IP Unlock Upgrade Export Import Refresh Refresh All Exit No Modelname IP address Device MAC address Overvi
71. nt device and a redundant AP device The redundant structure involves using the AWK 5232 s two RF modules to set up two independent wireless connections between the redundant client and redundant AP devices If either of the two wireless connections fails the other wireless connection will continue transmitting packets between the redundant client and redundant AP devices In addition to carrying one or more redundant clients standard single RF clients can also associate with the redundant AP One of the biggest advantages of the AWK 5232 s wireless redundancy mode is that you can expect zero data loss Redundant AP Fe Redundant AP Pe Fedundant Redundant 4 la Client Client 3 AWK 5232 Web Console Configuration The following figure shows the Wireless Redundancy operation mode Operation mode Wireless redundancy WLAN Operation mode Redundant AP se WLAN Radiunaari client WLAN Operation mode Setting Description Faactory Default Redundant AP AP with Dual RF redundancy capable of serving dual RF clients Redundant AP Redundant Client Dual RF redundant clients can join dual RF redundant APs Wireless Bridge A bridge is a network component that connects two networks AWK 5232 s bridge operation is based on the AP master and Client Slave concept Both sides of the connection must have the same RF type SSID and security settings For single RF mesh networks the conventional setup i
72. or key renewal instructs the wireless AP how often it should change the encryption keys Usually the security level will be higher if you set this value shorter so that the encryption keys are changed more often Default value is 3600 seconds 6 minutes Longer time periods can be considered if traffic is not so busy WPA WPA2 Enterprise for Redundant AP AP or Master mode By selecting WPA type as Enterprise you can use EAP Extensible Authentication Protocol a framework authentication protocol used by 802 1X to provide network authentication In these Enterprise level security modes a back end RADIUS Remote Authentication Dial In User Service server is needed if IEEE 802 1X functionality is enabled in WPA WPA2 The IEEE 802 1X protocol also offers the possibility of carrying out an efficient connection authentication in a large scaled network It is not necessary to exchange keys or pass phrases WLAN 1 WLAN Security Settings SSID MOA 1 Security mode WPA type Encryption method Primary RADIUS server IP pes Primary RADIUS server port Primary RADIUS shared key Po Secondary RADIUS server IP fe Secondary RADIUS server port Secondary RADIUS shared key PF OS Key renewal 60 86400 seconds 3 15 AWK 5232 Web Console Configuration WPA Type Provides Pre Shared Key enabled WPA and WPA2 Personal Provides enterprise level security for WPA and WPA2 Encryption method Temporal Key Integrity Protocol is enabled TKIP
73. ormation Moxa Americas Toll free 1 888 669 2872 Tel 1 714 528 6777 Fax 1 714 528 6778 Moxa Europe Tel 49 89 3 70 03 99 0 Fax 49 89 3 70 03 99 99 www moxa com su ort Moxa China Shanghai office Toll free 800 820 5036 Tel 86 21 5258 9955 Fax 86 21 5258 5505 Moxa Asia Pacific Tel 886 2 8919 1230 Fax 886 2 8919 1231 Table of Contents 1 TH FOOUCEIOTriririiecdioiiiaeriitrbioriiceiieetieeittciceCeeiCScecevkttssesektleeoeseeteasdss9og9358540601309338522824040408039834076438549821u2942 1 1 SW A PEE PA gBAga xa 1 2 Package C E K E2 1111101116 11ay 120x314 1014i196112a1215154i220 1125150194 oe td 1 2 Product FOUR EKE EEEIEE A AN aeaa a 1 2 Product SSC IE CEU OIG ees cocoa 1 3 Funcional Desig Waar aaa ese de eae loradada le ladarala la dasataidedele lada 1 3 A Gan Stet bi t0 tet 2 A s 6 6 1 1111 11 111 133 1 3 OO 1 4 Ro ee OS 1 4 Relay A DIGIA OIE OE sa v32 cn ee ene ence EAE AE a a a eoon 1 4 Antenn asns a tenet cnet a a a e e kee ekrk kekeke kekek dda qu n aaa aa a aa 1 5 2s GGLTLIHTXO SEAT abs 2 1 Firsttime Installation ana Contiquration ni 2 2 COMMUNICATION TESTO i6 nin rin O ANG EBEA tb 2 3 E AO Eo 2 4 3 Web Console ContTigUFA ION iii A A A Aa 3 1 CONTIUELION DY WED BROWSE a eN tel ee 3 2 BAVE VI ERE E eee ee EE TE delata dd ltd tb titi tb 3 3 BSC 0 atte we renee ae es a eee Oah 3 4 SYSTEM AO SENGS see ea pee E ea eee en eles seen eae Si N EA
74. r wired wireless network performance advanced services and device management functions Functions to maintain the AWK 5232 and diagnose the network On demand functions to support the operations of web based console management 3 Web Console Configuration In this chapter we will explain each web management page of the web based console configuration Moxa s easy to use management functions will help you set up your AWK 5232 as well as establish and maintain your wireless network easily The following topics are covered in this chapter O Configuration by Web Browser O Overview O Basic Settings gt System Info Settings gt Network Settings gt Time Settings O Wireless Settings gt Operation Mode gt WLAN1 WLAN2 gt Enabling Non Redundant Single RF AP gt WLAN Security Settings gt Advanced Wireless Settings gt WLAN Certification Settings for EAP TLS in Redundant Client Client or Slave mode only O Advanced Settings gt Using Virtual LAN gt Configuring Virtual LAN gt DHCP Server for AP Client operation mode s AP mode only Packet Filters RSTP Settings for Master or Slave mode only SNMP Agent Storm Protection VV VV Y Link Fault Pass Through for Client Slave mode only O Auto Warning Settings System Log Syslog E mail Relay V VY VY WV Trap a Status gt Wireless Status gt Associated Client List for Redundant AP AP or Master mode only DHCP Client Lis
75. ration File Edit Function Tools Help 2 LAN Utility Login Options P E 2 uy amp uy Search Search AWK Login Options Telnet Assign IP Upgrade Export Import Refresh Refresh All Exit No Modelname Advanced Options e MAC address Overview AWK 5232 Customize List View E8 19 17 255 255 255 0 1 0 Build 11090604 System Info Device Info 802 11 Info Model name AWK 5232 US Device name AWK 5232_2222 Device location Device description Serial No 2222 System up time 0 days 00h 00m 38s Firmware version 1 0 Build 11090604 i Use the scroll down list to select the MAC addresses of those AWKs you would like to manage and then click Add Key in the password for the AWK device and then click OK to save If you return to the search page and search for the AWK again you will find that the AWK will unlock automatically ATTENTION For security purposes we suggest you can change the AWK search utility login password instead of using default AWE Login Options Found awk devicelsl 132 168 127 253 00 30 E8 00 40 01 Last IP Device MAC address Username Default admin 192 168 127 253 00 90 8 00 40 01 famin Delete vf OK XA Cancel To modify the configuration of the highlighted AWK click on the Web icon to open the web console This will take you to the web console where you can make all configuration changes Refer to Chapter 3 Using the Web Co
76. roadcast for AP mode only Enable Disable SSID can be broadcast or not AWK 5232 Web Console Configuration NOTE If your device uses redundant Client Client or Slave mode you can find an additional Site Survey button on basic wireless settings page The button supports site survey and pops up a dialog box listing the information for available APs as shown in the following figure You can click on the SSID of an entity and bring the value of its SSID onto the SSID field of the Basic Wireless Settings page Clicking on the Refresh button will re scan and update the table Operation mode Client RF tyne B G N Mixed Channel 6 SSID MOXA _1 Site Survey SSID broadcast 2 Enable Disable E http 192 168 127 253 Site Survey Microsoft Internet Explorer Site Survey No al 2 3 4 5 6 ty 8 J MAC address Channel Mode Signal Home 00 18 84 81 CD 9A BSS WEP 2000 FON_AP 00 18 84 81 CD 99 BSS OPEN 000 default DO 15 F2 A2 07 64 BSS OPEN 000 BLW 54PM 00 90 CC D6 B5 20 BSS WEP 000 BLW 54PM 00 90 CC D6 BC EC BSS OPEN 2000 ZyXEL 00 19 CB 41 48 9A BSS WEP 2000 00 16 01 8C 11 7F BSS OPEN anll HJ Wireless 00 16 01 ED DO 61 BSS WEP 000 default 00 40 05 56 9D B1 BSS WEP 000 H o hpsetup 52 BC 90 E2 84 14 Ad Hoc OPEN 2000 Refresh Close r Internet WLAN Security Settings The following figure shows the WLAN1 2 Security Settings page The parameters and options are described as follows NOTE Whe
77. rotocol Anonymous name User name Password Inner EAP protocol MS CHAP V2 Anonymous WiPAS TKIP Moss 1 wpa2 Enterprise PEAP w MS CHAP V2 MIS LH L TT E Po Web Console Configuration Factory Default Microsoft CHAP version 2 is used MS CHAP V2 Factory Default Max 31 characters A distinct name used for outer authentication None User name amp Password Advanced Wireless Settings User name and password used in inner authentication None Additional wireless related parameters are presented in this section to help you set up your wireless network in detail WLAN 1 Advanced Wireless Settings Transmission rate Multicast Rate Guard interval Transmission power Beacon interval DTIM interval Fragmentation threshold RTS threshold Noise protection Transmission enhancement Antenna WMM Full 11a channel support Submit Transmission Rate Auto M 8 ns Full ll 100 40 1000ms 1 1 15 2346 256 2346 2346 256 2346 Enable Disable Auta Enable Disable Description Factory Default The AWK 5232 senses and adjusts the data rate automatically Available rates Users can manually select a target transmission data rate 3 19 AWK 5232 Web Console Configuration NOTE NOTE Multicast Rate Available rates You can set a fixed multicast rate for the transmission of 6M broadcast and multicast packets on a per radio ba
78. ry Recovery Recovery Becowery Recovery Recovery Recovery Recovery Recovery Recovery Process Process Process Process Process Process Process Process Process Process Process Process Process Supporting Information Press Ctrl C and the following message will appear Press Ctrl C to enter Firmware Recovery Process Press Ctrl C to enter Firmware Recovery Process IP address of AMEK 5232 192 168 40 155 Netmask of AWK S22 2 255 255 252 000 Gateway of AIIE bzzzZ 197 168 433 254 IP address of TFTP server 192 1638 40 142 l Start to firmware upgrade using the above network setting immediately 2 Change the network settings Enter your selection 1 2 enter for abort Enter 2 to change the network setting Specify where the AWK 5232 s firmware file on the TFTP server and press y to write the settings into flash memory 1 Start to firmware upgrade using the above network setting immediately Change the network settings Enter your selection 1 2 enter for abort Z of AWE 5232 132 168 1 2 of TFTP server 192 168 1 1 Netmask of AWE 5232 255 255 252 0 Gateway of AUIE 5Z3zZ 192 168 1 254 Update RedBoot non volatile configuration continue y n Y IP address IP address AWK 5232 restarts and the Press Ctrl C to enter Firmware Recovery Process message will reappear Press Ctrl C to enter the menu and select 1 to start the firmware upgrade process IP address of AWR S
79. s to use WDS to establish a static bridge link In this case the APs at both ends of the WDS link must be configured manually with each other s MAC addresses The performance of a single RF bridge will be poor if more nodes are added The AWK 5232 s dual RF bridge concept is different from using a single RF because the AWK 5232 has dual RFs and offer users a cascade link to bridge the two ends without narrowing down the throughput Operation mode WLAN 1 Operation mode AP e WLAN 2 Operation mode 3 8 AWK 5232 Web Console Configuration WLAN 1 WLAN 2 Operation mode Master Master can build a connection with a Slave that has the same AP for WLAN 1 RF type SSID and security settings Master for WLAN 2 Slave Slave can build a connection with a master that has the same RF type SSID and security settings AP Client AP Client mode provides a more flexible topology to allow the user to configure the 2 RF module for an AP or Client Operation mode AP Client ka WLAN 1 Operation mode AF e WLAN 2 Operation mode AP e AP ap lado WLAN1 OR WLANE WLAN2 AP Client Matching Table for AP Client s WLANs WLAN 1 WLAN 2 Allowable Setting WLAN1 WLAN2 Some applications already have existing Clients in the environment The AWK 5232 not only can carry dual RF clients but also single RF or existing Clients to the Ethernet LAN This function is available in Wireless Redundancy mode s Redundant AP or Wir
80. search function to start searching for devices after you log in to the AWK search Utility Advanced Options Search Connection Misc Search on start 4 9 5 Other Console Configurations This chapter explains how to access the AWK 5232 for the first time In addition to HTTP access there are four ways to access AWK 5232 serial console Telnet console SSH console and HTTPS console The serial console connection method which requires using a short serial cable to connect the AWK 5232 to a PC s COM port can be used if you do not know the AWK 5232 s IP address The other consoles can be used to access the AWK 5232 over an Ethernet LAN or over the Internet The following topics are covered in this chapter O RS 232 Console Configuration 115200 None 8 1 VT100 O Configuration by Telnet and SSH Consoles O Configuration by Web Browser with HTTPS SSL O Disabling Telnet and Browser Access AWK 5232 Other Console Configurations ATTENTION E You CANNOT connect to the AWK 5232 by two or more of these console configurations simultaneously 2 You can connect to the AWK 5232 simultaneously by web browser and serial Telnet SSH console However we strongly suggest that you do NOT use more than one connection method at the same time Following this advice will allow you to maintain better control over the configuration of your AWK 5232 RS 232 Console Configuration 115200 None 8 1 VT100 NOTE The ser
81. ser configured event is triggered If a user configured event does not occur the relay circuit will remain closed For safety reasons the relay circuit is kept open when the AWK 5232 is not powered The AWK 5232 s relay status is Summarized as follows Power Status Off 1 4 AWK 5232 Introduction Antennae units mm in oTo o0 e O O in O 67 5 2 66 74 55 2 94 The AWK 5232 supports 802 11 a b g n with 2x2 MIMO technology and a dual RF solution Antennas 1A and 1B are the MIMO antennas associated with RF1 and 2A and 2B are the MIMO antennas associated with RF2 1 5 2 Getting Started This chapter explains how to install Moxa s AirWorks AWK 5232 for the first time to quickly set up your wireless network and test whether the connection is running well With this function guide you will gain access to the functions you need easily The following topics are covered in this chapter O First time Installation and Configuration O Communication Testing O Function Guiding Map AWK 5232 Getting Started First time Installation and Configuration A NOTE Before installing the AWK 5232 make sure that all items in the Package Checklist are in the box In addition you will need access to a notebook computer or PC equipped with an Ethernet port The AWK 5232 has a default IP address that you must use when connecting to the device for the first time Step 1 Select the power source The
82. sis This parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium providing the wireless clients are capable of handling the configured rate Guarding Interval Guarding Interval Guarding interval is used to ensure that distinct transmissions 800ns do not interfere with one another You can select the guarding interval manually for Wireless N connections The two options are Short 400ns and Long 800ns RF type 2 4 GHz Auto Specifies wireless signal coverage by automatically selecting Full the strength of Tx power Each antenna port s Tx power at Full e US model 18 dBm e EU model 16 dBm e JP model 18 dBm RF type 5 GHz Auto Specifies wireless signal coverage by automatically selecting Full the strength of Tx power Each antenna port s Tx power at Full e US model 14 dBm e EU model 16 dBm e JP model 14 dBm Beacon Interval for AP Master mode only Beacon Interval Indicates the frequency interval of the beacon 100 ms 40 to 1000 ms DTI M Interval for AP Master mode only Data Beacon Rate Indicates how often the AWK 5232 sends out a Delivery Traffic 1 1 to 15 Indication Message 3 20 AWK 5232 Web Console Configuration Fragmentation threshold Fragment Length Specifies the maximum size a data packet before splitting and 2346 256 to 2346 creating another new packet RTS threshold RTS CTS Threshold
83. sponding entity with up to 31 characters Remember to check the Active check box for each entity to activate the setting TCP UDP Port Filters Enable Disable Policy Drop No fictive Source port Destination port Protocol Application name 1 C Eo o ES EO bE ke Eo 2 E sn TCP 3 Ho ES eE eA E Enable Enables TCP UDP port filter Disables TCP UDP port filter Policy Any packet fitting the entities on list will be denied Accept Only the packets fitting the entities on list can be allowed ATTENTI ON Be careful when you enable the filter function Drop no entity on list is activated all packets are allowed Accept no entity on list is activated all packets are denied RSTP Settings for Master or Slave mode only AWK 5232 supports IEEE802 1D Spanning Tree Protocol and IEEE802 1w Rapid STP standards In addition to eliminating unexpected path looping STP RSTP can provide a backup path recovery if a wired wireless path fails accidentally The reliability and availability can increase because this fail over function AWK 5232 s STP RSTP feature is disabled by default To be completely effective you must enable RSTP STP on every AWK 5232 connected to your network The following figures indicate which Spanning Tree Protocol parameters can be configured A more detailed explanation of each parameter is given below the figure RSTP Settings for Master or Slave mode only
84. stallation Guide AWK Search Utility Installing AWK Search Utility 1 Click the INSTALL UTILITY button in the AWK Installation CD auto run window to install AWK Search Utility Once the program starts running click Yes to proceed 2 Click Next when the Welcome screen opens to proceed with the installation i Setup AWK Search Utility Jia Ex Welcome to the AWK Search Utility Setup Wizard This will install AWE Search Utility on pour computer Iki recommended that you close all other applications before Continuing Click Nest to continue or Cancel to exit Setup T Setup AWE Search Utility Select Destination Location Where should AE Search Utility be installed q y Setup will instal AWE Search Utility into the following folder To continue click Next IF you would like to select a different folder click Browse C Program Files MoxaiaweE WME Search Utility Al least 2 5 MB of free disk space is required 4 Click Next to create the program s shortcut files to the default directory or click Browse to select an alternate location 4 2 AWK 5232 Software I nstallation Configuration A Setup AWE Search Utility Select Start Menu Folder Where should Setup place the program s shortcuts l m Setup will create the program s shortcuts in the following Start Menu folder To continue click Nest IF you would like to select a different folder click Browse AWK Search Utility
85. t for AP mode only V WV System Log Yy Relay Status DI and Power Status Maintenance Console Settings Ping Firmware Upgrade Config Import Export Load Factory Default Password VV YV Y Y V Y Misc Settings Save Configuration Restart Logout AWK 5232 Web Console Configuration Configuration by Web Browser NOTE Moxa AWK 5232 s web browser interface provides a convenient way to modify its configuration and access the built in monitoring and network administration functions The recommended web browser is Microsoft Internet Explorer 5 5 or 6 0 with JVM Java Virtual Machine installed To use the AWK 5232 s management and monitoring functions from a PC host connected to the same LAN as the AWK 5232 you must make sure that the PC host and AWK 5232 are on the same logical subnet Similarly if the AWK 5232 is configured for other VLAN settings you must make sure your PC host is on the management VLAN The Moxa AWK 5232 s default IP is 192 168 127 253 Follow the steps below to access the AWK 5232 s web based console management 1 Open your web browser ex Internet Explorer and type the AWK 5232 s IP address in the address field Then press Enter to establish the connection 5 about blank Microsoft Internet Explorer E x File Edit View Favorites Tools Help 2 The Web Console Login page will open Enter the password Username is set as admin the default password is root if a new passwor
86. the Overview page SNMP information and alarm emails Setting System Info items makes it easier to identify the different AWK 5232s connected to your network System Info Settings Device name lap_01 1 Device location Area 32 5th Floor Device description No 11 of ABC supporting system Device contact sale Sasi ies John Davis sysop abc com Device name Max 31 Characters This option is useful for specifying the role or application of AWK 5232_ lt Serial different AWK 5232 units No of this AWK 5232 gt Device location Max 31 Characters To specify the location of different AWK 5232 units Device description Max 31 Characters Use this space to record more detailed description of AWK 5232 Device name Max 31 Characters To provide information about whom to contact in order to None resolve problems Use this space to record contact information of the person responsible for maintaining this AWK 5232 Network Settings The Network Settings configuration allows you to modify the usual TCP IP network parameters An explanation of each configuration item is given below Network Settings IP configuration IP address Subnet mask Gateway Primary DNS server E Secondary ONS server Po 3 4 AWK 5232 Web Console Configuration IP configuration DHCP The AWK 5232 s IP address will be assigned automatically by Static the network s DHCP server Set up the AWK 5232 s IP address manually IP addr
87. tication type Key type HEx Key length 64 bits Key index WEP key 1 A WEP key 2 WEP key 3 A WEP key 4 es 3 13 AWK 5232 Web Console Configuration Authentication type Data encryption is enabled but no authentication Data encryption and authentication are both enabled Key type Factory Default Specifies WEP keys in hex decimal number form HEX Specifies WEP keys in ASCII form Key length Setting Description Factory Default 64 bits Uses 40 bit secret keys with 24 bit initialization vector 64 bits 128 bits Uses 104 bit secret key with 24 bit initialization vector Key index 1 4 Specifies which WEP key is used WEP key 1 4 ASCII type A string that can be used as a WEP Seed for RC4 encryption None 64 bits 5 chars engine 128 bits 13chars HEX type 64 bits 10 hex chars 128 bits 26 hex chars WPA WPA2 Personal WPA Wi Fi Protected Access and WPA2 are significantly improved encryption methods of WEP WPA is a security standard based on 802 11i draft 3 while WPA2 is based on the fully ratified version of 802 11i The initial vector is transmitted encrypted and enhanced with its 48 bits twice as long as WEP The key is regularly changed so that true session is secured Even though AES encryption is only included in the WPA2 standard it is widely available in the WPA security mode of some wireless APs and clients as well The AWK 5232 also supports AES algorithms in WP
88. trator with tools to manage the AWK 5232 and wired wireless networks Console Settings You can enable or disable access permission for the following consoles HTTP HTTPS Telnet and SSH connections For more security we recommend you only allow access to the two secured consoles HTTPS and SSH Console Settings HTTP console Enable Disable HTTPS console Enable Disable Telnet console Enable Disable SSH console e Enable Disable Submit Ping helps to diagnose the integrity of wired or wireless networks By inputting a node s IP address in the Destination field you can use the ping command to make sure it exists and whether or not the access path is available Ping Destination 192 168 253 2 Ping If the node and access path are available you will see that all packets were successfully transmitted with no loss Otherwise some or even all packets may get lost as shown in the following figure Ping Destination Ping PING 192 168 127 2 192 168 127 2 56 data bytes 192 168 127 2 ping statistics 4 packets transmitted O packets received 100 packet loss 3 41 AWK 5232 Web Console Configuration Firmware Upgrade The AWK 5232 can be enhanced with more value added functions by installing firmware upgrades The latest firmware is available at Moxa s download center Before running a firmware upgrade make sure the AWK 5232 is off line Click the Browse button to specify
89. uped events All default values are enabled checked The log for system events can be seen in Status gt System Log 3 32 AWK 5232 Web Console Configuration System log Event Types Event group Enable log System related events Network related events Config related events Power events 2322727 DI events System related events Event is triggered when System restart warm start The AWK 5232 is rebooted such as when its settings are changed IP address subnet mask etc Network related events Event is triggered when LAN 1 or LAN 2 link on The LAN port is connected to a device or network LAN 1 or LAN 2 link off The port is disconnected e g the cable is pulled out or the opposing device shuts down Client joined left for WLAN 1 or WLAN 2 A wireless client is associated or disassociated WLAN 1 or WLAN 2 connected to AP The AWK 5232 is associated with an AP for Redundant Client Client or Slave mode WLAN 1 or WLAN 2 disconnected The AWK 5232 is disassociated from an AP for Redundant Client Client or Slave mode 5232 i ia PoE E event istriggeredwnen SSS Syslog This function provides the event logs for the Syslog server The function supports up to three configurable Syslog servers and Syslog server UDP port numbers When an event occurs the event will be sent as a Syslog UDP packet to the specified Syslog servers Syslog Event Types Detail information for the grouped events is shown
90. used to locate all AWK 5232 APs that are connected to the same LAN as your computer After locating an AWK 5232 you will be able to change its IP address Since the Broadcast Search function searches by TCP packet and not IP address it doesn t matter if the AWK 5232 is configured as an AP or Client In either case APs and Clients connected to the LAN will be located regardless of whether or not they are part of the same subnet as the host 1 Start the AWK Search Utility program When the Login page appears select the Search AWK only option to search for AWKs and to view each AWK s configuration Select the AWK management option to assign IPs upgrade firmware and locate devices 4 4 AWK 5232 Software I nstallation Configuration AWE Search Utility Login AWE management Password uf OK 2 Cancel 2 Open the AWK Search Utility and then click the Search icon AWK Search Utility File Edit Function Tools Help amp B jag Ff Search Ex Locate Web Telnet Assign F Unlock Upgrade IP address Device MAC address The Searching window indicates the progress of the search amp nM FL Exit Refresh Refresh All 3 Whenthe search is complete all AWKs that were located will be displayed in the AWK Search Utility window 4 5 AWK 5232 Software I nstallation Configuration File Edit Function Tools Help TL a E dE l Search Search Ex Locate Web Assign IP J
91. vkifivtldddkddlda Di ita AA AA A AS 7 3 PEGCAMICAlSUDOOFE Contact TTTFOFITTOLIOfiT7is6isssiis606s00s0ia00x0050550a9a0000180x0x60300x813043 4304a00x01a0 0100a0050 5805 x8i00006 4E0l006i116 aR 7 5 1 Introduction Moxa AirWorks AWK 5232 with dual RF wireless capability allows wireless users to access network resources more reliably The AWK 5232 is rated to operate at temperatures ranging from 0 to 60 C for standard models and 40 to 75 C for extended temperature models and is rugged enough for any harsh industrial environment The following topics are covered in this chapter O Overview Package Checklist Product Features Product Specifications 0 000 Functional Design gt LED Indicators gt Beeper gt Reset Button gt Relay Digital Output gt Antenna AWK 5232 Introduction Overview The AWK 5232 Industrial a b g n Wireless AP Bridge Client is an ideal wireless solution for connecting mobile equipment connected over a TCP IP network in hard to wire situations The AWK 5232 provides faster throughput than standard 802 11g devices and at temperatures ranging from 0 to 60 C for standard models to 40 to 75 C for wide temperature models making the AWK 5232 series rugged enough for any industrial environment With two independent RF modules the AWK 5232 supports a great variety of wireless configurations and applications and the redundant wireless connections increase the reliability of the entire wireless network
Download Pdf Manuals
Related Search
Related Contents
品番 BY-HPE11KT Apollo Indoor MkIV UG 0102.qxd BP3213111 - Domstore Elettrodomestici da Incasso e Libera Magnese MA-301056 Philips HDMI cable SWV2454W Copyright © All rights reserved.
Failed to retrieve file