Home
User Manual
Contents
1. sssss 17 2 6 1 Connecting the Wireless Broadband Switch Router to Ethernet Client COMPUTO NR nn ee ee eee ee eee os 17 Ze Vi Wg Eo U LC PORNO OE CREE 17 PA SRI IA JIG pr BJ NET 17 2 6 2 Connecting the Wireless Broadband Switch Router to a Modem 17 2 7 Setting up Client ComputerS ee ae aaa anna aaa aaa aaa zana aaa aaa aaa aaa aaa nnn nnn nnne 18 2 7 1 Configuring IEEE 802 11b Related Settings saaaaaaanaaaasaaansaa 18 2 7 2 Configuring TCP IP Related Settings seeeeeeeeeeeeeeeeese 18 2 8 Confirming the Settings of the Wireless Broadband Switch Router and Client COPE aa mm 19 2 8 1 Checking if the IEEE 802 11b Related Settings Work 19 2 8 2 Checking if the TCP IP Related Settings Work 19 2 9 Installing the Print Client Components Switch Router suse 20 3 Using Web Based Network Manage ccccccccceecceeeceeeeeeeeeeeeeeeeeeeeueseueceeeseeeseeeaeeeaaes 21 ONG rRR 21 LAlEMENEOPUCIE PT cies 21 3 1 2 Save Save amp Restart and Cancel Commands suuuseuus 22 3 1 3 Home and Refresh Commands ccccceccceecceeeeceeeceececeeeeeueeseeeseeeseeesaees 23 9 2 WIIG AUS ecc botas a A EC EEE ene AAAA l 23 3 2 1 Associated W
2. 7 2 4 Preparing for CONfIQuration cccccccscccseccceeeceneeseeeceeeeseeeseeeesaeeseueesaeeseeeesueeseeesens 8 2 4 1 Connecting the Managing Computer and the Wireless Broadband Switch siege ERR 8 Pe Von BOUIE NRI RR 8 2222 OW CM ROO EE 9 2 4 2 Changing the TCP IP Settings of the Managing Computer 9 2 5 Configuring the Wireless Broadband Switch Router ccccccccseeeeeeeeeeeeeeeees 10 2 5 1 Entering the User Name and Password cccccccceecceeeeeeeeeeeseeeseeeeeeeeeees 10 2 5 2 ConfigWizard Step 1 Selecting an Operational Mode 12 2 5 3 ConfigWizard Step 2 Configuring TCP IP Settings 12 29 905 MPE ACCESS TPOIDE o srutor o a A OE idum ER EE ERE EORNM 12 2 5 3 2 Router with a PPPoE Based DSL Cable Connection 13 2 5 3 3 Router with a DHCP Based DSL Cable Connection 13 2 5 3 4 Router with a Static IP DSL Cable Connection 14 2 5 3 5 Router with a Dial Up Connection eeeeeeeeeeeeeeeeeee 15 2 5 4 ConfigWizard Step 3 Configuring IEEE 802 11 Settings 15 2 5 5 ConfigWizard Step 4 Reviewing and Applying Settings 16 2 6 Deploying the Wireless Broadband Switch Router
3. PoE is optional on the wireless broadband router Ethernet switching and printer sharing are available only on the wireless broadband switch router 1 4 LED Definitions There are several LED indicators on the housing of the WIASA They are defined as follows Wireless Broadband Router PPP PPP PPPoE Lights up when a PPP or PPPoE link has been established ALV Alive Blinks when the WIASA is working normally RF IEEE 802 11b interface LAN Ethernet LAN interface WAN Ethernet WAN interface PWR Power Wireless Broadband Switch Router e PWR Power e RFE IEEE 802 11b interface M LNK Link Lights up when the IEEE 802 11b interface is initialized successfully WB ACT Active Lights up when the IEEE 802 11b interface is transmitting or receiving data PPP PPP PPPoE Lights up when a PPP or PPPoE link has been established ALV Alive Blinks when the WIASA is working normally ST1 ST2 Status 1 to 2 for status indication WAN Ethernet WAN interface B LNK Link Lights up when the Ethernet WAN interface is initialized successfully M ACT Active Lights up when the Ethernet WAN interface is transmitting or receiving data 100 10 1 4 10 100 Ethernet LAN switch ports M LNK Zink Lights up when an Ethernet cable is connected firmly to this Ethernet port WB ACT Active Lights up when this Ethernet port is transmitting or receiving data 2 First Time Installation and Configuration 2 1 Inserting the Accom
4. eesaeeaaa ea wana anawa aaa aaaa zana eene nnns 48 3 6 T1 Filters and Firewall kanada AOR EB REGA a A 48 3 01 do PacKeb PISTES acid Gai EZ Aa ee 48 9 9 1 2 FE eur cesta to fantasies ER a A creo dcus fes hus 49 26T em AN cs 49 2 02ManaJemeMiuc ai o A dba gute dia A a o0 3 6 2 1 Remote Web Based Management aesaaa aaa aaa aaa szan aaanaca 50 3 0 22 BI o PT 50 9 0 2 9 OSIEM OO to O ie e nega Mcd ace LO MEME UE 50 9 0 2 4 ON i eiii rostris duod iaces enu R ID Mcd 51 Appendix A Default Settings x o cveik onse b o GC ge xD Qu bx s Fabi E ra va Eire R EON o Da rn 52 Appendix B Troublesnoolligssnievendid OE eret WR R ce rra dE 54 D T Wireless Settings PrOoDIGlfiS deco hd ka e iin dare ete taa educi eoa e o o dc eon o4 D 2 CPAPSGUNJS FIOBIEM Sea eo Ad EOB tea vui uiui Oa o 55 p 3 UNKNOWN FTODIOM S ui aoi A R qd asas Eau oleo ait AO redu Or Ent Ex tute of Appendix C Additional InfOFtTielltlOll ok ch di ark A tutu nani pn e I OM Deux bM 58 C 1 Firmware Upgrade Using Xmodem Upgrade esaau aaa a aaa aaa a aawaaaaaazansaa 58 2 Distahces and Data RIOS cator iet E dO hr AG e p e ei Mei enm RR MS 59 1 Introduction 1 1 Overview The wireless broadband switch router enables IEEE 802 1 lb and Ethernet client computers to share an Internet connection provided by an Internet service provider ISP The Internet connection can be DSL cable V 90 or
5. At the bottom of each status page that shows read only information there are two buttons Home and Refresh Clicking Home brings you back to the start page Clicking Refresh updates the shown status information 3 2 Viewing Status 3 2 1 Associated Wireless Clients Wireless Clients Status No MAC Address IP Address Name Tx Bytes Rx Bytes Last Activity Time 1 00 90 4B 00 40 94 192 168 168 226 7521 1162 00h 01m 56s Fig 19 Status of associated wireless clients On this page the status information of each associated client including its MAC address IP address user name if the client has been IEEE 802 1x authenticated number of bytes it has send number of bytes it has received and the time of its last activity is shown 23 3 2 2 Current DHCP Mappings DHCP Mapping Table MAC Address IP Address Type 00 90 4B 00 B9 BD 192 168 168 214 Static DO BB DE A amp D BE EF 192 168 168 224 In use OO 90 48 00 40 94 192 168 168 220 Dynamic n 40 01 43 1D E8 192 168 168 230 In use Fig 20 Current DHCP mappings On this page all the current static or dynamic DHCP mappings are shown A DHCP mapping is a correspondence relationship between an IP address assigned by the DHCP server and a computer or device that obtains the IP address A computer or device that acts as a DHCP client is identified by its MAC address A static mapping indicates that the DHCP client always obtains the specified IP address from the DHC
6. IEEE 802 11b related communication settings include Regulatory domain Channel number and Network name SSID Regulatory domain FEC S Channel number 11 Network name SSID wireless Fig 12 IEEE 802 11b communication settings The number of available RF channels depends on local regulations therefore you have to choose an appropriate regulatory domain to comply with local regulations The SSID of a wireless client com puter and the SSID of the WIASA must be identical for them to communicate with each other 15 2 5 5 ConfigWizard Step 4 Reviewing and Applying Set tings Wireless Broadband Router Settings and Info Model Router Ady BIOS Firmware Version BRYS v1 30 1 5 10 3190 Router with a PPPoE based DSL Cable Connection MAC Address BSSID OU 06 F4 00 Bs 19 System Up Time hr min sec Operational Mode 0 03 IQ WAN Connection Status e Acquired IP 192 168 100 1 e Acquired netmask 255 255 255 0 e Acquired DNS server l 0 0 0 0 e Acquired DNS a 0 0 0 0 WAN Interface e Service name servicename e User name david e Password 1 545 Fig 13 Settings changes are highlighted in red Regulatory domain FCC LI S e Channel number 6 e Transmit power High 16 17 dBm ZAB BAN wireless e Security mode Open system Authentication algorithm aa Wireless Settings e AP functionality Enabled SSID broadcasts Enabled e Wireless client isolation
7. IHIEEE 802 11 LL FH Advanced BIOS Firmware Version BRYS v1 30 1 5 10 3190 Wireless Broadband Router Settings and Info Model Fouter Adv Router with a Sg8tatic IPFP DSL Cable Connection MAC Address BSSID 00 06 F4 00 BB 19 Operational Mode System Up Time hr min sec UG UB TA WAH Interface e IP address Loe L6G i100 l e Subnet mask 255 255 455 0 Default qateway a Custom MAC address of WAN Disabled interface LAH Interface a IP address 192 168 168 646 Subnet mask 2oo 2505 42455 U Jm TT PITT s Deak gt l 0 0 0 0 Fig 15 The Start page 3 1 1 Menu Structure The left side of the start page contains a menu for you to carry out commands Here is a brief descrip tion of the hyperlinks on the menu Home For going back to the start page e ConfigWizard For you to quickly set up the WIASA e Status Status information m Wireless Clients The status of the wireless clients currently associated with the WI ASA DHCP Mappings Current IP MAC address mappings m System Log System events log 21 General Global operations m Operational Mode Operational mode of the WIASA based on the type of the Internet connection provided by the ISP m Password For gaining rights to change the settings of the WIASA Firmware Tools For upgrading the firm
8. MAC address based access control e AP load balancing Disabled e Number of WDS 0 links KTH Save amp Restart 77A Fig 14 Settings review Disabled Disabled On the final page you can review all the settings you have made Changes are highlighted in red If they are OK click Save amp Restart to apply the new settings Or you can go back to previous pages to 16 make modifications Or you can click Cancel to leave the configuration process without any changes NOTE About 7 seconds are needed for the WIASA to complete its restart process 2 6 Deploying the Wireless Broadband Switch Router After the settings have been configured deploy the WIASA to the field application environment Connect Ethernet client computers to the Ethernet switch ports of the WIASA If the WIASA is con figured as a router also connect a DSL modem cable modem V 90 modem or ISDN TA to the WI ASA 2 6 1 Connecting the Wireless Broadband Switch Router to Ethernet Client Computers 2 6 1 1 Router To connect the router with Ethernet client computers 1 Plug one connector of a normal Ethernet cable to the LAN CONFIG Ethernet jack of the WI ASA 2 Plug the other connector of this cable to a free Ethernet port of the switch hub to which all the Ethernet client computers have been connected 2 6 1 2 Switch Router To connect the switch router with Ethernet client computers 1 Plug one connector of a normal not c
9. 88 11 22 33 44 56 86 11 22 33 44 66 Fig 58 Sample MAC ACL file To download a MAC ACL file from a TFTP server l Specify the IP address of the TFTP server in the TFTP server IP address text box 2 Specify the name of the MAC ACL file on the TFTP server in the MAC ACL file name text box 3 Click Download 3 5 3 IEEE 802 1x RADIUS IEEE 802 1x Port Based Network Access Control is a new standard for solving some security issues associated with IEEE 802 11 such as lack of user based authentication and dynamic encryption key distribution With IEEE 802 1x and the help of a RADIUS Remote Authentication Dial In User Ser vice server and a user account database an enterprise or ISP Internet Service Provider can manage its mobile users access to its wireless LANs Before granted access to a wireless LAN supporting IEEE 802 1x a user has to issue his or her user name and password or digital certificate to the backend RADIUS server by EAPOL Extensible Authentication Protocol Over LAN The RADIUS server can record accounting information such as when a user logs on to the wireless LAN and logs off from the wireless LAN for monitoring or billing purposes The IEEE 802 1x functionality of the WIASA is controlled by the security mode see Section 3 5 1 1 46 So far the WIASA supports two authentication mechanisms EAP MD5 Message Digest version 5 and EAP TLS Transport Layer Security If EAP MDS is used the user has to gi
10. Enabling disabling SSID broadcasts The administrator can enable or disable the SSID broadcasts functionality for security reasons When the SSID broadcasts functional ity is disabled a client computer cannot connect to the wireless router with an any net work name SSID Service Set ID the correct SSID has to be specified on client com puters MAC address based access control Blocking unauthorized wireless client com puters based on MAC Media Access Control addresses The ACL Access Control List can be downloaded from a TFTP server IEEE 802 1x RADIUS User authentication and dynamic encryption key distribution can be achieved by IEEE 802 1x Port Based Network Access Control and RADIUS Remote Authentication Dial In User Service Repeater A wireless router can communicate with other wireless APs routers via WDS Wireless Distribution System Therefore a wireless router can wirelessly forward packets from wireless clients to another wireless AP router and then the later AP router forwards the packets to the Ethernet network Wireless client isolation Wireless to wireless traffic can be blocked so that the wire less clients cannot see each other This capability can be used in hotspots applications to prevent wireless hackers from attacking other wireless users computers AP load balancing Several wireless APs routers can form a load balancing group Within a group wireless client associations and traffic load can b
11. Fixthe alignment of the antenna on one side 4 Adjust the alignment of the antenna on other side by using response time information obtained from PINGing run PING exe the fixed side computer 5 Fine tune the alignment of the antenna until you get a best response time 6 Increase the data rate of each bridge simultaneously until a maximal workable data rate is reached You may not be able to use the highest data rate 1 1 Mbps because of the distance and the gain of the antennas Fig 54 illustrates the idea Adjust antenna alignment te 34 WDS Link ICMP Echo Reply Computer 1 Computer 2 Fig 54 Adjusting alignments of external directional antennas NOTE There are two antenna connectors on one side of the bridge Connect your high gain antenna to the connector labeled Primary 43 3 9 2 Security IEEE 802 11b security settings include SSID broadcasts Wireless client isolation Security mode IEEE 802 11 Authentication algorithm WEP keys MAC Address Based Access Control 3 5 2 1 Basic SSID broadcasts Enabled gt Wireless client isolation Disabled Security mode Static WEP Authentication algorithm Ato gt Key length E4 Bits gt Selected key Key 1 key 1 KEY 2 key 3 key g Fig 55 Basic IEEE 802 11b security settings For security reasons it s highly recommended that the security mode be set to options other than Open System When the s
12. PRZEDSI BIORSTWO HANDLOWE EXPORT IMPORT HURT BIURO HANDLOWE WARSZAWA ATEL ELECTRONICS HH 01 797 Warszawa 45 323 Opole ul Powazkowska 15 ul Zielonog rska 3 ELECTR po NICS tel 0 22 669 10 11 tel 0 77 455 60 76 fax 0 22 669 11 60 fax 0 77 455 80 56 e mail cust atel com pl www atel com pl IWEL100 R USER S MANUAL Wireless Broadband Switch Router Pro Advanced Advanced User s Guide Version 2 12 Last Updated 09 09 2003 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pur suant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiated ra dio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is en couraged to try to correct the interference by one of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e X Connect the equipment into an outlet on a circ
13. r Block ICMP PING from Internet Fig 62 Packet filters and firewall settings SPI analyzes incoming and outgoing packets based on a set of criteria for abnormal content Therefore SPI can detect hacker attacks and can summarily reject an attack if the packet fits a suspicious profile To enable SPI select the Enable SPI Stateful Packet Inspection check box Some DoS Denial of Service attacks are based on sending invalid ICMP request packets to hosts The WIASA can be set to not accept any ICMP requests on the Ethernet WAN interface to defense against attacks of this kind Enable this capability by selecting the Block ICMP PING from Internet check box NOTE Because some of the WIASA s CPU resources are spent in checking packets for these secu rity features you may feel networking performance degradation if the security functions are enabled 3 6 1 3 URL Filters Functionality Disabled Enabled URL Enabled E veww nba com Fig 63 URL filters settings The WIASA is capable of blocking HTTP traffic from the intranet to specified unwelcome Web sites To block HTTP traffic to an unwelcome Web site 49 l Specify the URL ex www xxx com of the unwelcome Web site 2 Select the corresponding Enabled check box NOTE Do not type http when specifying a URL Just type the domain name 3 6 2 Management 3 6 2 1 Remote Web Based Management r Enable remote Web based management HTTP port 8
14. 255 255 255 0 Primary DNS server 19216801 Secondary DNS server First allocatable IP address 192 168 0 2 Allocatable IP address 2n count Fig 43 Basic DHCP server settings The WIASA can automatically assign IP addresses to client computers by DHCP In this section of the management page you can specify the Default gateway Subnet mask Primary DNS server and Secondary DNS server settings that will be sent to a client at its request Additionally you can specify the first IP address that will be assigned to the clients and the number of allocateable IP ad dresses In most cases Default gateway and Primary DNS server should be set to the IP address of the WI ASA s LAN interfaces e g the default LAN IP address is 192 168 0 1 and Subnet mask is set to 255 255 255 0 NOTE There should be only one DHCP server on the LAN otherwise DHCP would not work prop erly If there is already a DHCP server on the LAN disable the DHCP server functionality of the WIASA 3 4 4 2 Static DHCP Mappings Enabled Desc MAC Address IP Address l Bill o0 22 32 6 0 50 02 32 158 0 2 13 7 5 Fig 44 Static DHCP mappings IP addresses of servers are often static so that clients could always locate the servers by the static IP addresses By Static DHCP Mappings you can ensure that a host will get the same IP address when 38 it requests one from the DHCP server Therefore instead of configur
15. NOTE After the firmware is upgraded be sure to delete the contents of the Web browser cache so that the Web management pages can be shown correctly NOTE A failed upgrade may corrupt the firmware and make the WIASA unstartable When this oc curs call for technical support TIP The firmware of a deployed WIASA can also be upgraded remotely from the Internet In this case you must have configured the WIASA to be remotely manageable see Section 3 6 2 1 and ad just the Timeout and Max no of retries settings of TFTP Server for remote TFTP upgrade to suc ceed 3 3 3 4 Backing up and Restoring Configuration Settings by TFTP Configuration Backup Restore Restore Fig 31 Configuration backup restore To back up configuration of the WIASA by TFTP l Get a computer that will be used as a TFTP server and as a managing computer to trigger the backup process 2 Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet cable 3 Configure the IP address of the computer so that the computer and the WIASA are in the same IP subnet 4 On the computer run the TFTP Server utility Select the Accept write requests check box and specify the folder to which the configuration settings of the WIASA will be saved 5 Onthe computer run a Web browser and click the General Firmware Tools hyperlink 6 Choose TFTP as the Firmware management protocol 7 Within the Configuration Backup Restore section specif
16. and Cancel Clicking Save stores the settings changes to the memory of the WIASA and brings you back to the start page Clicking Save amp Restart stores the settings changes to the memory of the WIASA and restarts the WIASA immediately for the settings changes to take effect Clicking Cancel discards any settings changes and brings you back to the start page If you click Save the start page will reflect the fact that the configuration settings have been changed by showing two buttons Restart and Cancel In addition changes are highlighted in red Clicking Cancel discards all the changes Clicking Restart restarts the WIASA for the settings changes to take 22 effect The settings have been changed Click Restart Cancel Restart to restart the router for the settings to take effect Wireless Broadband Router Settings and Info Model Router Adw BIOS Firmware Version ERYS wL 30 1 5 10 3130 Operational Mode Router with a DHCP based DSL Cable Connection MAC Address BSSID U0U 06 F4 00 B5 13 System Up Time hr min sec 0 05 06 WAN Connection Status e Acquired IP 192 168 100 1 e Acquired netmask gt 00 2 a a e GAL Acquired DNS server 0 0 0 0 WAN Interface Obtain from a DHCP server Custom MAC address of WAM interface Heartbeat Disabled Heartbeat login Disabled e User name Fig 17 Settings have been changed 3 1 3 Home and Refresh Commands Fig 18 Home and Refresh
17. their IEEE 602 1 1b related settings must also match those of the WIASA 2 7 1 Configuring IEEE 802 11b Related Settings Before the TCP IP networking system of a wireless client computer can communicate with other hosts the underlying wireless link must be established between this wireless computer and a WIASA To establish a wireless link to a WIASA l Launch the configuration monitoring utility provided by the vendor of the installed WLAN NIC 2 Use the utility to make appropriate Operating Mode SSID and WEP settings NOTE A client must be in infrastructure mode so that it can associate with a wireless access point or broadband router NOTE The SSID of the wireless client computer and the SSID of the WIASA must be identical Or in case the SSID broadcasts capability of the WIASA is enabled by default the SSID of the wire less client computer could be set to any NOTE Both the wireless client computer and the WIASA must have the same WEP settings for them to communicate with each other NOTE For better wireless security IEEE 802 1x capability of the WIASA must be enabled so that only authenticated wireless users can access the wireless network Refer to the IEEE 802 1x related white papers on the companion CD ROM for more information about deploying secure WLANs with IEEE 802 1x support 2 7 2 Configuring TCP IP Related Settings Use Windows Network Control Panel Applet to change the TCP IP settings of the cli
18. 168 0 xxx The default LAN IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it is obtained automatically by DHCP from the ISP If you are using Tel stra BigPond cable based Internet service select the Connect with BigPond Cable check box and specify the User name Password and the IP address of your Login server which is provided by your ISP 2 5 3 4 Router with a Static IP DSL Cable Connection Ethernet WAN Interface IP address 192 168 100 1 Subnet mask 255 255 255 0 Default gateway n a 0 0 Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 DNS Proxy Functionality Enabled Primary DNS server 0 0 0 Secondary DNS server 0 0 0 Fig 10 TCP IP settings for Router with a Static IP DSL Cable Connection mode If the WIASA was set to be in Router with a Static IP DSL Cable Connection mode two IP ad dresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN inter face The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default LAN IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it must be manually set Consult your IS
19. 2 Switch Router Connect the Ethernet managing computer to anyone of the LAN switch ports of the managed WIASA with a normal Ethernet cable see Fig 3 NOTE There are two types of Ethernet cables normal and crossover Normal Ethernet cable Fig 3 Connecting a managing computer and a wireless broadband switch router via Ethernet Since the DHCP server functionality is factory set to be enabled it s recommended that there are no other computers connected to the other Ethernet switch ports of the WIASA so that you can be 100 percent sure that the WIASA will be the DHCP server of the managing computer 2 4 2 Changing the TCP IP Settings of the Managing Computer Use the Windows Network Control Panel Applet to change the TCP IP settings of the managing computer so that the IP address of the computer and the IP address of the WIASA are in the same IP subnet If the managing computer is originally set a static IP address you can either change the IP address to 192 168 0 xxx the default IP address of a WIASA is 192 168 0 1 and the subnet mask to 255 255 255 0 or select an automatically obtain an IP address option NOTE For some versions of Windows the computer needs to be restarted for the changes of TCP IP settings to take effect TIP After you have connected the managing computer and the WIASA via Ethernet you can install Wireless Network Manager on the managing computer and use it to configure the WIASA without bei
20. Dial Up CONNECTION ccccccecceeeeeeeeeeeeeeeeaeeteeeeseenees 34 Sud ONS PTOX GRO a Adik OO WA i Ed 34 93 2 d15BdslC Zad ui mctu Itb aaa T dO Ar 35 34 2 2 Stall DNS Map DINGS iiia Soo GR cn pact Oni ai A AEG 35 SAONA SENSORA concitus apu Du dm o ACR 35 he Oe IM mra ici CMM OE TUR TP TT A MEN E DENEN UT R AA 35 3 4 9 2 Stati NAT Mappings nie tx EE RR CE d icd caue vb ub etu 36 3 4 3 3 Virtual Server Mappings c ccccseecseeceeeceeeceeeeseceeeceeeeeeetseeteeeeeeenaes 37 34 dq PRRECPOCWOENEA R aS USED OE i ob o med CU 38 90 4 1 BAS scc c xr ep R A AR A eH diei tam pum OPAC MN TUE 38 3 4 4 2 Static DHCP MappingS cccccecceeecseeteeeceeeeseeeneeeneteneteeetseenaeenaes 38 3 5 Configuring IEEE 802 11b Related SettingS s aueaaa aaa aaa aaa aaaa zana azansaaa 39 3 9 1s COMMUNIC allo Meransen ta ta cera wand ov tube e dr ab di 39 99 1 1 5D asl NNS RR a OC AGO M MM LI MEC MT 39 99 122 LINK Intedllby R R a Z O A 39 3 0 1 05 ASSOCIAHON Controls acz Seele crba a s tesi OO Plon Cu ML Du 40 320 AAP Load Badla NCN NR ETE 40 3 5 1 5 Wireless Distribution System esuae aaa aaa aa aaa anawa aaaaaaaaaaazaanace 41 SOZZSECUM Yea Ex 44 D ari Onara mt 44 3 5 2 2 MAC Address Based Access Control eeeeeeeeessss 45 9 5 9 WEEE COZ TXIISADIDS ac A uer extus Paese edges oed R Fest usb ptus 46 3 6 Configuring Advanced Settings
21. Global Password Operational Mode Router with a Static IP DSL Cable Con nection NN High High MAC Address See the label on the accompanying PCMCIA card or the label on the housing of the WIASA MAC Address Based Access Disabled Control Association Control Block Clients if Traffic Load Disabled Exceeds WAN Interface o PPR G y 52 User Name username Password Not set Service Name servicename PPPOE LAN Interface Subnet Mask i Default Gateway DHCP Server o O Subnet Mask 255 255 255 0 NAT Server _ O Virtual Server Mappings DNS Proxy Filters Firewall O Management ee System Log SNMP SNMP read community SNMP write community 53 Appendix B Troubleshooting Check the following first Make sure that the power of the WIASA is on and the Ethernet cables are connected firmly to the RJ 45 jacks of the WIASA Make sure that the LED ALV of the WIASA is blinking to indicate the WIASA is working Make sure the types of the Ethernet cables are correct Recall that there are two types normal and crossover Make sure that the DSL cable V 90 or ISDN modem connected with the WIASA is powered on B 1 Wireless Settings Problems The wireless client computer cannot associate with an access point m Is the wireless client set in infrastructure mode 9 Check the operating mode of the WLAN NIC m
22. IP Address AND Source Subnet Mask M Destination IP address range Destination IP Address AND Destination Subnet Mask M Port ranges A source destination IP address range is determined by performing an AND operation on the source destination IP address field and the source destination subnet mask field For example if the source IP address field is 192 168 0 1 and the source subnet mask field 1s 255 255 255 0 the resultant source IP address range is 192 168 0 0 to 192 168 0 255 48 Up to 5 port ranges can be specified in a rule and these ranges must be separated by commas For example 21 80 85 89 140 200 230 in the destination port field signifies 5 port ranges To set a rule for packet filtering l Specify the protocol type source IP address source IP mask destination IP address desti nation IP mask and destination port for the rule Then specify in the Action setting how to deal with a packet that meets the rule 2 Select the corresponding Enabled check box NOTE Set the rules with great care since incorrect rules would make the WIASA inaccessible The last resort to restore the WIASA to service may be resetting its configuration to factory default values by pressing the Default or SF Reset switch on the housing of the WIASA However Wireless Network Manager can always be used to configure the WIASA even if the filtering rules are incorrect 3 6 1 2 Firewall C Enable SPI stateful Packet Inspection
23. ISDN based In addition it also serves as a wireless access point so that the wireless client computers and the Ethernet client computers can reach one another There are 3 different model variations Pro Advanced and Advanced which are classified in terms of features The Pro edition provides the fewest features while the Advanced edition provides the most With the sleek Web based user interface and Windows based user interface Wireless Network Manager a network administrator can easily and clearly manage the wireless broadband switch router Since the wireless broadband switch router provides rich TCP IP and WLAN Wireless Local Area Network functionality a basic understanding of the inner workings of TCP IP and IEEE 802 11b is necessary Essential TCP IP concepts include IP addressing IP routing IP name resolution DHCP Dynamic Host Configuration Protocol and PPP Point to Point Protocol Essential IEEE 802 11b concepts include channel numbers and WEP Wired Equivalent Privacy In Chapter 2 we describe the steps to install and configure a newly acquired wireless broadband switch router Following the steps the wireless broadband switch router can be quickly set up to work In Chapter 3 detailed explanation of each Web management page is given for the user to un derstand how to fine tune the settings of a wireless broadband router to meet his or her specific needs In the remainder of this guide a wireless broadband
24. Is the SSID of the WLAN NIC identical to that of the prospective access point or WIASA 9 Check the SSID setting of the WLAN NIC and of the WIASA m Is the WEP functionality of the prospective access point or WIASA enabled 9 Make appropriate WEP settings of the client computer to match those of the access point or WIASA m Is the prospective access point or WIASA within range of wireless communication 9 Check the signal strength and link quality sensed by the WLAN NIC o4 B 2 TCP IP Settings Problems Correspondent Host Ch e IEEE 802 11b Ethernet RS232 Ma Ethernet LAN Stage A State B Stage C l l l l l l l Stage D l l Client WIASA ADSL Cable Default Gateway DNS Server Computer V 90 ISDN of WIASA of WIASA Modem Fig 68 Communication stages for a client to reach its correspondent host For a client computer to communicate with a correspondent host on the Internet by the host s domain name e g http www wi fi com it first sends a DNS request to a DNS server on the Internet The DNS request travels first to the WIASA then the WIASA relays this request to the default gateway of the WIASA through a modem Finally this request is forwarded by the gateway to the DNS server on the Internet The DNS reply issued by the DNS server is transmitted back to the client computer fol lowing a reverse path When the client computer receives the DNS reply it knows the IP address of th
25. a IP address 192 166 168 646 Subnet mask 255 255 255 0 TAMT Trak d gt A 0 0 0 0 Fig 5 The Start page The first page of the configuration wizard is a welcome page This page gives a brief description of the configuration process Click Next to continue We ll explain what to do step by step in the fol lowing subsections 11 2 5 2 ConfigWizard Step 1 Selecting an Operational Mode Simple Access Point C Router with a PPPoE Based DSL Cable Connection C Router with a DHCP Based DSL Cable Connection Router with a Static IP DSL Cable Connection C Router with a Dial up Connection Fig 6 Operational modes Ifthe WIASA is to be used simply as a wireless to Ethernet access point select Simple Access Point In this mode the Ethernet WAN interface 1s disabled Ifthe WIASA is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by PPPoE select Router with a PPPoE Based DSL Cable Connection Ifthe WIASA is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface 1s achieved by DHCP select Router with a DHCP Based DSL Cable Connection Ifthe WIASA is to be used with a DSL or cable modem and the IP address of the Ethernet WAN interface has to be manually set select Router with a Static IP DSL Cable Connection Ifthe WIASA is to be used with a V 90 modem or ISDN TA select Router with a
26. address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default LAN IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it is obtained automatically by DHCP from the ISP If you are using Tel stra BigPond cable based Internet service select the Connect with BigPond Cable check box and specify the User name Password and the IP address of your Login server which is provided by the ISP Custom MAC Address of WAN Interface enables you to change the MAC address of the Ethernet WAN interface Therefore if the ISP provided DSL or cable modem works only with the ISP provided Ethernet card for a computer the WAN interface of the WIASA can mimic the ISP provided Ethernet card by changing its MAC address to the Ethernet card s MAC address 32 3 4 1 4 Router with a Static IP DSL Cable Connection Ethernet WAN Interface Custom MAC address of WAM 00 06 Fa 00 B8 19 interface IP address 192 168 100 1 Subnet mask 255 255 255 0 Default gateway 0 0 0 Host name router Domain DNS suffix Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 36 TCP IP settings for Router with a Static IP DSL Cable Connection mode If the WIASA was set to be in Router with a Static IP DSL Cable Connection mode two IP ad dresses are needed one for
27. cases leave the setting to Auto The transmit power of the RF module of the WIASA can be adjusted so that the RF coverage of the WIASA can be changed 3 5 1 2 Link Integrity Fig 46 Link integrity settings 39 When the Ethernet LAN interface is detected to be disconnected from the wired network all currently associated wireless clients are disassociated by the WIASA and no wireless client can associate with the WIASA The detection mechanism is based on pinging the IP address specified in Reference host 3 5 1 3 Association Control Max number of clients 1 64 p4 Block clients if traffic load exceeds Disabled Fig 47 Association control settings If the number of currently associated wireless clients exceeds the value specified in the Max number of clients setting no more wireless client can associate with the WIASA If traffic load of the WIASA exceeds the load specified in the Block clients if traffic load exceeds setting no more wireless client can associate with the WIASA 3 5 1 4 AP Load Balancing Functionality Enabled Group ID APLB Group Policy by Number of Users Fig 48 AP load balancing settings Several WIASAs and APs can form a load balancing group if they are set the same Group ID The load balancing policy can be by Number of Users or by Traffic Load If the by number of users policy is selected a new wireless user can only associate with an AP that has the smallest n
28. in terface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default LAN IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it is obtained automatically by PPPoE from the ISP Consult your ISP for the correct User name Password and Service name settings The WIASA automatically disconnects the PPPoE connection after there has been no traffic to the Internet for a period specified by Idle disconnect time NOTE If Idle disconnect time is set to 0 the PPPoE connection will not be disconnected 2 5 3 3 Router with a DHCP Based DSL Cable Connection Ethernet WAN Interface Host name router Heartbeat for BigPond Cable C Connect with BigPond Cable leer name Password Login server Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 9 TCP IP settings for Router with a DHCP Based DSL Cable Connection mode If the WIASA was set to be in Router with a DHCP Based DSL Cable Connection mode two IP 13 addresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN in terface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192
29. is obtained automatically by PPPoE from the ISP Consult your ISP for the correct User name Password and Service name settings Custom MAC Address of WAN Interface enables you to change the MAC address of the Ethernet WAN interface Therefore if the ISP provided DSL or cable modem works only with the ISP provided Ethernet card for a computer the WAN interface of the WIASA can mimic the 31 ISP provided Ethernet card by changing its MAC address to the Ethernet card s MAC address The WIASA automatically disconnects the PPPoE connection after there has been no traffic to the Internet for a period specified by Idle disconnect time NOTE If Idle disconnect time is set to 0 the PPPoE connection will not be disconnected 3 4 1 3 Router with a DHCP Based DSL Cable Connection Ethernet WAN Interface Z Custom MAC address of WAM Doo Fa00 B8 19 interface Host name router Domain DNS suffix Heartbeat for BigPond Cable C Connect with BigPond Cable User name Password Login server Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 35 TCP IP settings for Router with a DHCP Based DSL Cable Connection mode If the WIASA was set to be in Router with a DHCP Based DSL Cable Connection mode two IP addresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN in terface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP
30. responds to UPnP discovery messages so that a Windows XP user can locate the wireless router in My Network Places and use a Web browser to con figure it M Telnet The user is enabled to manage the wireless router by using Telnet m System log For system operational status monitoring Local log System events are logged to the on board RAM of the wireless router and can be viewed using a Web browser Remote log by SNMP trap Systems events are sent in the form of SNMP traps to a remote SNMP management server 4 Port Ethernet Switch The wireless broadband switch router provides a 4 port Ethernet switch so that a stand alone Ethernet hub switch is not necessary for connecting Ethernet client computers to the router e Power over Ethernet optional Supplying power to a wireless broadband router over an Ethernet cable using PowerDsine http www powerdsine com technology IEEE 802 3af com pliant in the future This feature facilitates large scale wireless LAN deployment e Hardware Watchdog Timer If the firmware gets stuck in an invalid state the hardware watchdog timer will detect this situation and restart the wireless router This way the wireless router can provide continuous services 1 3 Feature Comparison Pro Advanced Advanced IEEE 802 1x RADIUS MN HW SNMP IEEE 802 1xMIB MW Ww Wireless clientisolation 0 E AP load balancing Lo M Association control Lo 1 1 M
31. switch router is often referred to as a WIASA Wireless Internet Access Server Appliance for short In addition to using Web based management user interface to configure a WIASA the Windows based Wireless Network Manager can also be used to configure and monitor deployed WIASAs See the on line help of Wireless Network Manager for more information 1 2 Features Operational modes m Simple Access Point In this mode the WAN interface is disabled and the device acts as a wireless to Ethernet IEEE 802 1 1b access point Router with a PPPoE Based DSL Cable Connection In this mode the device is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by PPPoE Router with a PPPoE Based DSL Cable Connection In this mode the device is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by DHCP Router with a Static IP DSL Cable Connection In this mode the device is to be used with a DSL or cable modem and the IP address of the Ethernet WAN interface has to be manually configured m Router with a Dial up Connection In this mode the device is to be used with a V 90 modem or ISDN TA IEEE 802 11b Access point Bridging packets between the wireless IEEE 802 11b network interface and the wired Ethernet LAN interface 64 bit and 128 bit WEP Wired Equivalent Privacy For authentication and data encryption
32. technical support representatives to report this problem so that the bugs can be static in future firmware versions If the WIASA still does not work after restarting there may be hardware component fail ures in the WIASA Contact our technical support representatives for repair 57 Appendix C Additional Information C 1 Firmware Upgrade Using Xmodem Upgrade RS232 Based Firmware Upgrade serial part codi gt Connect Folder FN Browse File progress PO po teint Total progress EEEE Erase Contig lt lt Less ku Fig 70 Xmodem Upgrade To upgrade the firmware of WIASA using Xmodem Upgrade over RS232 l Power off the WIASA whose firmware will be upgraded 2 Connect the managing PC and the DRBAP with an RS232 Null Modem cable 3 Select the serial port COMI or COM2 you use for connecting the device from the Serial port drop down list and click Connect 4 Chose the folder in which the firmware files reside by click Browse 5 Power on the WIASA and you ll see bootup information 6 Click Start to begin upgrade the firmware of the WIASA 7 You will be prompted when the upgrade process completes Click Erase Config to reset the configuration settings of the WIASA to default values 58 C 2 Distances and Data Rates Important Notice Maximum distances posted below are actual tested distance thresholds However there are many variables such as barrier compo
33. values by press the Default or SF Reset switch 56 B 3 Unknown Problems The router has been set to be in Simple Access Point mode and to obtain an IP address automatically by DHCP How can I know its acquired IP address so that I can manage it using a Web browser The WIASA stops working and does not respond to Web management requests Use the utility Wireless Router AP Browser WLBrwsr exe in the Utilities folder on the companion CD ROM disc This utility can discover nearby WIASAs and show their MAC addresses and IP addresses In addition it can launch the default Web browser on your computer El Wireless Routen AF Browser E ES X retest Link CIFE 53073 PCI Fast Ethernet Adapter Rev 6 Discovered wireless routers AP Refresh MAC Address LAN IP Address brouter O0 00 00 00 00 00 132 158 113 1 IE Brouter DD BD B 3 BF 83 L 5 192 168 168 1 advap DD DB F 4 DO SE LA 132 158 0 1 router DD BD B 3 BF BB 2B 132 158 158 30 router DD BD B S BF AB F4 192 168 168 201 Description Select a wireless router AF and then click the Web Based Management button to manage it using a web browser Web Based Management Fig 69 Wireless Router AP Browser The firmware of the WIASA may be stuck in an incorrect state Press the Reset button on the housing of the WIASA or unplug the power connector from the power jack and then re plug the connector to restart the WIASA Contact our
34. 080 Fig 64 Remote Web based management setting The WIASA can also be managed from the Internet using a Web browser To enable this capability select the Enable remote Web based management check box To manage the WIASA from the Internet connect to the WIASA within a Web browser but be sure to specify the port 8080 For ex ample if the WAN interface of a WIASA is configured to be 61 16 33 113 the URL for managing this WIASA is http 61 16 33 113 8080 3 6 2 2 UPnP Functionality Enabled Device friendly name wireless Router Fig 65 UPnP settings UPnP Universal Plug and Play enables a Windows XP user to automatically discover peripheral de vices by HTTP When the UPnP functionality is enabled you can see the WIASA in My Network Places of Windows XP The WIASA can be given a friend name that will be shown in My Network Places Double clicking the icon in Network Neighborhood that stands for the WIASA will launch the default Web browser for you to configure the WIASA 3 6 2 3 System Log Re Local log Remote log by SNMP trap Event Types R General Iv Build in AP Iw MIB II traps R RADILIS user authentication Fig 66 System log settings System events can be logged to the on board RAM of the WIASA Local log or sent to a remote computer on which an SNMP trap monitor program runs Remote log by SNMP trap See the next subsection for more information about SNMP trap settings 50 The system even
35. 3 3 1 Specifying Operational Mode Simple Access Point Router with a PPPoE Based DSL Cable Connection Router with a DHCP Based DSL Cable Connection Router with a Static IP DSL Cable Connection Router with a Dial up Connection Fig 22 Operational modes On this page you can specify the operational mode for the WIASA Currently 5 modes are available Simple Access Point In this mode the Ethernet WAN interface is disabled The WIASA acts as a bridge between the Ethernet LAN interface and the IEEE 802 11b wireless LAN inter face Router with a PPPoE based DSL Cable Connection In this mode the WIASA assumes that a DSL or cable modem is connected to its Ethernet WAN interface The client computers can therefore share this DSL cable based Internet connection by the NAT server functionality The IP address of the Ethernet WAN interface is obtained automatically by PPPoE from the ISP Router with a DHCP based DSL Cable Connection In this mode the WIASA assumes that a DSL or cable modem is connected to its Ethernet WAN interface The client computers can therefore share this DSL cable based Internet connection by the NAT server functionality The IP address of the Ethernet WAN interface is obtained automatically by DHCP from the ISP Router with a Static IP DSL Cable Connection In this mode the WIASA assumes that a DSL or cable modem is connected to its Ethernet WAN interface The client computers can therefore share this DSL ca
36. Dial up Connection NOTE The LAN interfaces include the IEEE 802 11b wireless LAN interface and the Ethernet LAN interfaces These two interfaces share a LAN IP address 2 5 3 ConfigWizard Step 2 Configuring TCP IP Settings 2 5 3 1 Simple Access Point Method of obtaining an IP address 8et Manually IP address 192 168 0 88 Subnet mask 255 255 255 0 Default gateway 192 168 0 1 Host name router Fig 7 TCP IP settings for Simple Access Point mode If the WIASA was set to be in Simple Access Point mode one IP address is needed This IP address can be manually set or automatically assigned by a DHCP server on the LAN If you are manually setting the IP address Subnet mask and Default gateway settings set them appropriately so that 12 they comply with your LAN environment In addition you can specify the Host name of the WIASA 2 5 3 2 Router with a PPPoE Based DSL Cable Connection Ethernet WAN Interface User name ussmme Password FO Password again FO Service name sewicename Idle disconnect time min 3 Host name router Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 8 TCP IP settings for Router with a PPPoE Based DSL Cable Connection mode If the WIASA was set to be in Router with a PPPoE Based DSL Cable Connection mode two IP addresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN
37. NOTE The PoE capability of the bridge is PowerDsine compatible Please visit the Web site of Pow erDsine for more information http www powerdsine com 2 3 Mounting the Wireless Broadband Router on a Wall The wireless broadband router is wall mountable 1 Stick the supplied sticker for wall mounting 2 Useao7 0mm driller to drill a 25mm deep hole at each of the cross marks 3 Plug ina supplied plastic conical anchor in each hole 4 Screw a supplied screw in each plastic conical anchor for a proper depth so that the wireless broadband router can be hung on the screws 5 Hang the wireless broadband router on the screws HE 77 ST39 16mm ZZ HOLES FOR GH i FASTENING SCREWS 70 4 R2 0 i x c9 HOLES FOR ch FASTENING SCREWS Fig 1 Mounting the wireless broadband router on a wall 2 4 Preparing for Configuration For you to configure a WIASA a managing computer with a Web browser is needed For first time configuration of a WIASA an Ethernet network interface card NIC should have been installed in the managing computer For maintenance configuration of a deployed WIASA either a wireless com puter or a wired computer can be employed as the managing computer NOTE If you are using the browser Opera to configure a WIASA click the menu item File click Preferences click File types and edit the MIME type text html to add a file extension sht so that Opera can wo
38. P for the correct IP address Default gateway Subnet mask Primary DNS server and Secondary DNS server settings 14 2 5 3 5 Router with a Dial up Connection Dial Up WAN Interface ISP Telephone number EEEE User name uissmme Password EEEE Password again EEEE Idle disconnect time min Host name router Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 11 TCPAP settings for Router with a Dial up Connection mode If the WIASA was set to be in Router with a Dial up Connection mode two IP addresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN interface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default settings need no change As for the WAN IP address it is obtained automatically by PPP from the ISP Consult your ISP for the correct User name Password and Telephone number settings The WIASA automatically disconnects the PPP dial up connection after there has been no traffic to the Internet for a period specified by Idle disconnect time NOTE If Idle disconnect time is set to 0 the PPP dial up connection will not be disconnected 2 5 4 ConfigWizard Step 3 Configuring IEEE 802 11 Set tings
39. P server You can set static DHCP mappings in the Static DHCP Mappings section of the DHCP Server configuration page see Section 3 4 4 A dynamic mapping indicates that the DHCP server chooses an IP address from the IP address pool specified by the First allocateable IP address and Allocateable IP address count settings on the DHCP Server configuration page 3 2 3 System Log Model Router Ady BIOS Firmware version ERYS v1 30 1 5 10 3190 Operational made Router with a Static IP DSL Cable connection Current time 12 26 2002 17 16 45 12 26 2002 16 51 49 SYSTEM START UP 12 26 2002 16 51 49 Wireless LAN interface initializes success 12 26 2002 16 51 49 BSSID O0 06 F4 00 B8 19 12 26 2002 16 51 49 LAN IP address gt 192 168 158 88 12 26 2002 16 51 49 WAN IP address gt 192 168 100 1 12 26 2002 16 51 49 Default router IP address 0 0 0 0 12 26 2002 16 51 49 Primary ONS IP address gt 0 0 0 0 12 26 2002 16 51 49 Secondary ONS IP address gt 0 0 0 0 Fig 21 System log System events such as PPPoE dialup results are recorded in the memory of the WIASA The logged information is useful for troubleshooting purposes For example if the password configured for PPPoE is incorrect this error can be easily spotted by inspecting the system log The system events are divided into several categories and you can select which categories of events to log See Section 3 6 2 3 for more information 24 3 3 General Operations
40. To restore configuration of the WIASA by HTTP l Click Browse and then select a correct configuration hex file You have to make sure the file name is the WIASA s MAC address The firmware file path will be shown in the Firmware file name text box 2 Click Restore to upload the configuration file to the WIASA 3 3 3 3 Upgrading Firmware by TFTP TFTP server IP address 192 168 0 19 Max number af retries 30 Timeout 10 SEC Fig 28 TFTP server settings When use TFTP as the firmware management protocol you can configure settings for the WIASA s TFTP client to communicate with a TFTP server If the TFTP client does not get a response from the TFTP server within a period specified by the Timeout setting it will resend the previous request The Max number of retries setting specifies the maximal number of resend before the TFTP client stops communicating with the TFTP server Within the folder Utilities on the companion CD ROM disk we offered a TFTP server program TftpSrvr exe for firmware upgrade Run this program on the computer that is to serve as a TFTP server 2f Firmware Upgrade Fig 29 Firmware upgrade by TFTP To upgrade firmware of the WIASA by TFTP l Get a computer that will be used as a TFTP server and as a managing computer to trigger the upgrade process 2 Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet cable 3 Configure IP address of the com
41. address of the computer which acts as a TFTP server If you don t know the IP address of the computer open a Com mand Prompt and type IpConfig then press the Enter key 8 Trigger the restoring process by clicking Restore The WIASA will then download the configu ration backup file from the TFTP server NOTE Make sure the file is a valid configuration backup file for the WIASA TIP The configuration of a deployed WIASA can also be backed up or restored remotely from the Internet In this case you must have configured the WIASA to be remotely manageable see Section 3 6 2 1 and adjust the Timeout and Max no of retries settings of TFTP Server for remote TFTP configuration backup restore to succeed 3 3 3 5 Resetting Configuration to Factory Defaults Configuration Reset Factory Defaults Reset Fig 32 Configuration reset Clicking the Reset button resets the device configuration to factory defaults WARNING Think twice before clicking the Reset button You ll lose all your current configuration settings 3 4 Configuring TCP IP Related Settings 3 4 1 Addressing The addressing settings depend on the operational mode of the WIASA Each operational mode re quires different addressing settings 30 3 4 1 1 Simple Access Point Method of obtaining an IP address Set Manually IP address 192 168 0 88 Subnet mask 255 255 255 0 Default gateway 192 168 0 1 Host name router Domain DNS
42. address with a private IP address 1 Specify the public IP address and the private IP address for the association 2 Select the corresponding Enabled check box 36 3 4 3 3 Virtual Server Mappings Priwate IP Enabled Service Mame dics Port Protocol a s 5 7 3i Fon a RPM MAPA Res e sme fs rep gt pos 0 0 moe cr mewer O Ps tr I HTTP hb meg b eA hb hes hb e hb e Fig 42 Virtual server mappings The WIASA enables you to expose internal servers on the intranet through NAT to the Internet for public use The exposed internal servers are called virtual servers because from perspective of hosts on the Internet these servers are invisible in terms of TCP IP To expose preset internal servers l Select the corresponding Enabled check boxes for the kinds of servers FTP IMAP4 SMTP POP3 TELNET and HTTP you want to expose 2 Specify the private IP addresses of the internal servers To expose other internal servers l Specify the Service Name Private IP Address Port Number and whether the service is TCP based or UDP based for a non preset internal server you want to expose 2 Select the corresponding Enabled check box for the internal server 3 Repeat Steps I to 2 for other non preset internal servers 37 3 4 4 DHCP Server 3 4 4 1 Basic Functionality Enabled gt Default gateway 192 188 01 subnet mask
43. art page of the Web based Net work Manager NOTE If the WIASA is set to be in Router with a PPPoE Based DSL Cable Connection or Router with a Dial up Connection it needs some time to establish a PPPoE or PPP link to the ISP Therefore this step will fail but the WIASA will be triggered to establish a link to the ISP Wait for a few seconds and then try again 5 Type ping wiasa Ist dns server where wiasa Ist dns server is a placeholder for the IP ad dress of the primary DNS server of the WIASA Then press Enter If this DNS server responds go to the next step else see Appendix B 2 TCP IP Settings Prob lems for troubleshooting TIP You can view the primary and secondary DNS servers of the WIASA on the start page of the Web based Network Manager 6 Type ping wiasa 2nd dns server where wiasa 2nd dns server is a placeholder for the IP address of the secondary DNS server of the WIASA Then press Enter If this DNS server responds the client should have no problem with TCP IP networking else see Appendix B 2 TCP IP Settings Problems for troubleshooting 2 9 Installing the Print Client Components Switch Router The print server components on the WIASA work in conjunction with the print client components on a client computer and they communicate through TCP IP The print client components expose a vir tual communication port on the client computer so that on the client computer the driver of the printer
44. ble based Internet connection by the NAT server functionality The IP address of the Ethernet WAN interface must be manually set Router with a Dial up Connection In this mode the WIASA assumes that a V 90 modem or ISDN TA is connected to its RS232 COM port The client computers can therefore share this V 90 ISDN based Internet connection by the NAT server functionality TIP When you have selected the operational mode of the WIASA go to the TCP IP Addressing section of the management UI see Section 3 4 1 to configure the addressing settings of the WAN and LAN interfaces 25 3 3 2 Changing Password Old password Mew user name Mew password Mew password again Fig 23 Password On this page you can change the user name and password for the right to modify the configuration of the WIASA The new password must be typed twice for confirmation 3 3 3 Managing Firmware Firmware management protocol HTTP Fig 24 Firmware management protocol setting Firmware management operations for the WIASA include firmware upgrade configuration backup configuration restore and configuration reset Firmware upgrade configuration backup and con figuration restore can be achieved via HTTP or TFTP The HTTP based way is suggested because it s more user friendly However due to different behavior of different Web browser types and versions HTTP based firmware management operations may not work properly with some W
45. e correspondent host and sends further packets to this IP address As illustrated in Fig 68 the communication path could be broken at some of the stages The OS provided network diagnostic tool ping exe can be employed to find out TCP IP related commu nication problems NOTE If two or more NICs are installed and operating on a client computer TCP IP may not work properly due to incorrect entries in the routing table Use the OS provided command line network tool route exe to add or delete entries from the routing table Or use Windows provided Device Manager to disable unnecessary NICs Solve the following problems in order The WIASA does not respond to ping from the client computer m Are two or more NICs installed on the client computer Use the OS provided command line network tool route exe to modify the contents of the routing table 9 Use Windows provided Device Manager to disable unnecessary NICs m Is the underlying link Ethernet or IEEE 802 11b established 55 Make sure the Ethernet link is OK Make sure the wireless settings of the wireless client computer and of the WIASA match m Are the IP address of the client computer and the IP address of the WIASA in the same IP subnet 9 Use WinIPCfg exe or IPConfig exe to see the current IP address of the client com puter Make sure the IP address of the client computer and the IP address of the WI ASA are in the same IP subnet TIP If you
46. e shared among the wire less APs routers Transmit power control Transmit power of the wireless router s RF module can be adjusted to change RF coverage of the wireless router Link integrity When the Ethernet LAN interface is detected to be disconnected from the wired network all currently associated wireless clients are disassociated by the wireless router and no wireless client can associate with it Association control The wireless router can be configured to deny association requests when it has served too many wireless clients or traffic load is too heavy Associated wireless clients status Showing the status of all wireless clients that are associated with the wireless router Detachable antennas The factory mounted antennas can be replaced with high gain antennas for different purposes Internet Connection Sharing DNS proxy The wireless router can forward DNS Domain Name System requests from client computers to DNS servers on the Internet And DNS responses from the DNS serv ers can be forwarded back to the client computers Static DNS mappings The administrator can specify static FQDN Fully Quali fied Domain Name to IP address mappings Therefore a host on the internal network can access a server also on the intranet by a registered FQDN DHCP server The wireless router can automatically assign IP addresses to client com puters by DHCP Dynamic Host Configuration Protocol Static DHCP mappings The ad
47. eb browsers If you cannot successfully perform HTTP based firmware management operations with your Web browser try the TFTP based way TIP You can use Upgrade Wizard of Wireless Network Manager to upgrade firmware See the on line help of Wireless Network Manager for more information 3 3 3 1 Upgrading Firmware by HTTP Firmware Upgrade Firmware file name Browse Fig 25 Firmware upgrade by HTTP To upgrade firmware of the WIASA by HTTP 1 Click Browse and then select a correct firmware bin file The firmware file path will be shown in the Firmware file name text box 2 Click Upgrade to begin the upgrade process 26 3 3 3 2 Backing up and Restoring Configuration Settings by HTTP Configuration Backup Fig 26 Firmware backup by HTTP To back up configuration of the WIASA by HTTP l Click Back Up 2 You ll be prompted to open or save the configuration file Click Save 3 The configuration file is named by the WIASA s MAC address For example if the WIASA s MAC address is 00 01 02 33 44 55 the configuration backup file should be 000102334455 hex Don t change the configuration file name in the Save As dialog box Se lect a folder in which the configuration file is to be stored And then click Save NOTE The procedure may be a little different with different Web browsers Configuration Restore Configuration file name Browse Resfore Fig 27 Configuration restore by HTTP
48. ecurity mode is set to Open System no authentication and data encryption will be performed Additionally you can disable the SSID broadcasts functionality so that a wireless client computer with an any SSID cannot associate with the WIASA When the Wireless client isolation setting is set to This AP Only wireless clients of this WIASA as an AP cannot see each other and wireless to wireless traffic is blocked When the setting is set to AII APs in This Subnet traffic among wireless users of different APs in the same IP subnet is blocked This feature is useful for WLANs deployed in public places In this way hackers have no chance to attack other wireless users in a hotspot There are up to 5 security modes depending on WIASA model variations Open System No authentication no data encryption e Static WEP WEP Wired Equivalent Privacy keys must be manually configured e IEEE 802 1x EAP without Encryption The IEEE 802 1x functionality is enabled and the user name password based EAP MDS authentication is used No data encryption e IEEE 802 1x EAP with Static WEP The IEEE 802 1x functionality is enabled and the user name password based EAP MD5 authentication is used Data encryption is achieved by static WEP e IEEE 802 1x EAP with Dynamic WEP The IEEE 802 1x functionality is enabled and dy namic WEP key distribution authentication EAP TLS EAP TTLS or PEAP is used Data en cryption is achieved by dynamic WEP See Sect
49. ent computers so that the IP addresses of the client computers and the IP address of the WIASA are in the same IP subnet If a client computer is originally set a static IP address you can either change its IP address to match the IP address of the WIASA or select an automatically obtain an IP address option if the DHCP server functionality of the WIASA is enabled 18 NOTE For some versions of Windows the computer needs to be restarted for the changes of TCP IP settings to take effect If the computer is already set to obtaim an IP address automatically you can use the Win dows provided tool WinIPCfg exe on Windows 9x or IPConfig exe on Windows 2000 to re obtain an IP address from the WIASA WinIPCfg exe is a GUI program and has command but tons for releasing the current IP address and re obtaining an IP address IPConfig exe is a command line program and the release option releases the current IP address and the renew option triggers the Windows DHCP client subsystem to re obtain an IP address 2 8 Confirming the Settings of the Wireless Broad band Switch Router and Client Computers After you have completed deploying the WIASA and setting up client computers you have to make sure the settings you have made are correct 2 8 1 Checking if the IEEE 802 11b Related Settings Work To check if a wireless client computer can associate with the WIASA l Launch the configuration monitoring utility provided by the ve
50. forget the current IP address of the WIASA use Wireless Router AP Browser to get the information see Appendix B 3 The default gateway of the WIASA does not respond to ping from the client computer m Solve the preceding problem first m s the modem working 9 You may find out the answer by directly connecting the modem to a computer Refer to the manual of the modem if necessary B Are the IP address of the WIASA and the IP address of the gateway in the same IP subnet Find out the answer on the start page of the Web Based Network Manager m Is the NAT server functionality of the WIASA enabled Find out the answer on the start page of the Web Based Network Manager m Ifyou cannot find any incorrect settings of the WIASA the default gateway of the WIASA may be really down or there are other communication problems on the network backbone The DNS server s of the WIASA do not respond to ping from the client computer m Solve the preceding problems first m If you cannot find any incorrect settings of the WIASA the default gateway of the WIASA may be really down or there are other communication problems on the network backbone Cannot access the Internet M Solve the preceding problems first M Make sure there are no incorrect packet filter settings that would block the traffic from the local computer to the Internet In case you are not sure the last resort may be resetting the configuration settings of the WIASA to default
51. her end of the WDS link 2 Select the corresponding Enabled check box For example assume you want a WIASA and an AP with MAC addresses 00 02 65 01 62 C5 and 00 02 65 01 62 C6 respectively to establish a WDS link between them On WIASA 00 02 65 01 62 C5 set the peer MAC address of port 1 to 00 02 65 01 62 C6 and on AP 00 02 65 01 62 C6 set the peer MAC address of port 1 to 00 02 65 01 C5 TIP Plan your wireless network and draw a diagram so that you know how a bridge is connected to other peer bridges by WDS See the following figure for an example network planning diagram LAN Segment 2 LAN Segment 1 Bridge AM Segment 5 Bridge 5 LAN Segment 4 Fig 52 Sample wireless bridge network topology WARNING Don t let your network topology consisting of wireless bridges Ethernet switches Ethernet links and WDS links contain oops If any loops exist packets will circle around the loops and network performance will be seriously degraded 42 Ethernet Switch Hub Bridge 3 Ethernet link WDS link Fig 53 Network topology containing a loop Bridge 2 If external high gain directional antennas are used it s difficult to align the antennas when the dis tance between the bridges is long To adjust the alignments of a pair of bridges directional antennas l Connect each bridge to a computer via Ethernet 2 Configure the date rate of each bridge to the lowest value IMbps 3
52. ing the IP address of an intranet server manually you can configure the server to obtain an IP address by DHCP and it is always as signed the same IP address To always assign a static IP address to a specific DHCP client l Specify the MAC address of the DHCP client and the IP address to be assigned to it Then give a description for this mapping 2 Select the corresponding Enabled check box 3 5 Configuring IEEE 802 11b Related Settings 3 5 1 Communication 3 5 1 1 Basic Basic IEEE 802 11b related communication settings include AP functionality Regulatory domain Channel number Network name SSID Data rate and Transmit power AP functionality Enabled Regulatory domain FEC U S Channel number 11 Network name SSID wireless Data rate Auto Transmit power High Fig 45 IEEE 802 11b basic communication settings For specific needs such as configuring the WIASA as a wireless LAN to LAN bridge the AP func tionality can be disabled so that no wireless client can associate with the WIASA The number of available RF channels depends on local regulations therefore you have to choose an appropriate regulatory domain to comply with local regulations The SSID of a wireless client com puter and the SSID of the WIASA must be identical for them to communicate with each other If there is RF interference you may want to reduce the Data rate for more reliable wireless transmis sion In most
53. ion 3 5 3 for more information about IEEE 802 1x According to the IEEE 802 11 standard WEP can be used for authentication and data encryption 44 Normally Shared Key authentication is used if WEP data encryption is enabled In rare cases Open System authentication may be used when WEP data encryption is enabled The Authentication algo rithm setting is provided for better compatibility with wireless clients with various WLAN network adapters There are three options available including Open System Shared Key and Auto When WEP is enabled by a security mode the Key length can be specified to be 64 Bits or 128 Bits The Selected key setting specifies the key to be used as a send key for encrypting traffic from the AP side to the wireless client side All 4 WEP keys are used as receive keys to decrypt traffic from the wireless client side to the AP side NOTE Each field of a WEP key setting is a hex decimal number from 00 to FF For example when the security mode is Static WEP and the key length is 64 Bits you could set Key 1 to 00012E3ADF 3 5 2 2 MAC Address Based Access Control Functionality Enabled Access control type inclusive exclusive MAC address format Q0 02 DD 30 03 1E MAC Address Delete oo So c2 01 96 40 Delete 00 09 92 01 02 55 Delete Fig 56 MAC address based access control settings With MAC Address Based Access Control you can specify the wireless client computers that are pe
54. ireless Clients ue aaa aaa aaa aaa aa aaa aaa aaa aa azaa anawa azaaazanaa ia 23 3 2 2 C rent DHCP Wi DIOS ana W OHNE AA EGW 24 0 2 ey SUS LOO caesar AE AA AEO PA ad 24 2 1 General ODO a HONS A o ic FARRA T TT 25 3 3 1 Specifying Operational Mode eeaaa eau aa aaa aaa aaa aa aa aaaa zaa zaaaazaaazaasa ia 25 9 9 2 Changing PassWord eeu AKA W AE EEEE O Oa A ENEE SNEEN KAARE 26 9 9 9 Managing FIT AN all AAA a O oC 26 3 3 3 1 Upgrading Firmware by HTTP e aee aaa aaa wa aawa wawa wawa wawawawaaaeaaaec 26 3 3 3 2 Backing up and Restoring Configuration Settings by HTTP 2f 3 3 3 3 Upgrading Firmware by TFTP ccccccceccceeeceeceeeceeeseeesseeseeeseesaes 27 3 3 3 4 Backing up and Restoring Configuration Settings by TFTP 29 3 3 3 5 Resetting Configuration to Factory Defaults 30 3 4 Configuring TCP IP Related Settings easaa aaa aa aa aaa aa aa aaaa aaa aaaaaaaaazansa a 30 SAAN Addressing aoi R eed aed vaa ad asa ad kod l i tr aad A 30 5 KASE SIMPIEACCESSIPOMI SRO waa RO A ORO RAR A RER AE 31 3 4 1 2 Router with a PPPoE Based DSL Cable Connection 31 3 4 1 3 Router with a DHCP Based DSL Cable Connection 32 3 4 1 4 Router with a Static IP DSL Cable Connection 33 3 4 1 5 Router with a
55. ivate IP address of the computer to be used as a DMZ host and select the corre sponding check box 3 4 3 2 Static NAT Mappings Public IP Private IP Address Address Enabled Fig 41 Static NAT mappings An ISP may provide more than one public IP address to its customer A customer could use each of the public IP addresses for one type of server to be accessed from the Internet This requirement can be satisfied by Static NAT Mappings This functionality can be enabled only when the WIASA is in Router with a Static IP DSL Cable Connection mode For example say an ISP provides 5 public IP addresses 61 16 33 114 to 61 16 33 118 inclusive to its customer WIASA Technology The network administrator of WIASA Technology decides to use 61 16 33 114 for the wireless broadband router 61 16 33 115 for their public Web server and 61 16 33 116 for their public POP3 server And the administrator has registered with InterNIC Inter net Network Information Center some domain name to IP address mappings www wiasa com to 61 16 33 115 and pop3 wiasa com to 61 16 33 116 However the public Web server and POP3 server for WIASA Technology sit on the intranet and use private IP addresses 192 168 0 2 and 192 168 0 3 respectively To expose the servers in this situation the network administrator needs two static NAT mappings to associate 61 16 33 115 with 192 168 0 2 and 61 16 33 116 with 192 168 0 3 respec tively To associate a public IP
56. ministrator can specify static IP address to MAC address mappings so that the specified IP addresses are always assigned to the hosts with the specified MAC addresses Showing current DHCP mappings Showing which IP address is assigned to which host identified by an MAC address NAT server Client computers can share a public IP address provided by an ISP Internet Service Provider by NAT Network Address Translation And our NAT server function ality supports the following Virtual server Exposing servers on the intranet to the Internet PPTP IPSec and L2TP passthrough Passing VPN Virtual Private Network packets through the intranet Internet boundary PPTP means Point to Point Tunneling Protocol IPSec means IP Security and L2TP means Layer 2 Tunneling Protocol DMZ DeMilitarized Zone All unrecognized IP packets from the Internet can be forwarded to a specific computer on the intranet Multiple public IP addresses support An ISP may provide several public IP addresses to a customer The wireless router can map each of the public IP addresses to a host with a private IP address on the intranet H 323 passthrough Passing H 323 packets through the intranet Internet boundary so that users on the intranet can use VoIP Voice over IP applications MSN Messenger support Supporting Microsoft MSN Messenger for chat file transfer and real time communication applications DSL Cable Modem Support Supporting dy
57. most care for the safety of those who install and use it How ever special attention must be paid to the dangers of electric shock and static electricity when work ing with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Greece Ireland Italy Luxembourg Portugal Spain Sweden The Netherlands and United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Norway and Swit zerland EU Countries Not Intended for Use None Potential Restrictive Use France only channels 10 11 12 and 13 Table of Contents Ml APU OG LIC HO JE EEEE 1 141 OVENI W 1 EIE IT ee EE O AR EA EE AES EO EO RO 1 1 3 Feature COMBANSOM ona AGA GRO ACE airo didum sepes hide 5 RC EB BNB aie NEU T T 5 2 First Time Installation and Configuration ccccecccceccceeeeeseeceeeeeeeeseceseuceaseeseeessueesseesaues 7 2 1 Inserting the Accompanying PCMCIA WLAN Card esee T 2 2 Selecting a Power Supply Method eeeeeesseessessseeeneeenennnnnnn nnne T 2 3 Mounting the Wireless Broadband Router on a Wall
58. must be configured to print to this virtual port When an application on the client computer is printing the print data 1s sent through the virtual port by the print client components to the WIASA And then the print data is directed to the printer which is connected to the parallel port of the WI ASA by the print server components To install the print client components on a client computer l Connect the printer to the Printer port of the WIASA with a parallel cable 2 Insert the companion CD ROM disk of the WIASA into drive D of the client computer where D is the name of the CD ROM drive substitute the real name of your CD ROM drive for D if necessary 3 Run D PrntCiInt Setup exe on the client computer 4 Specify the IP address of the WIASA s LAN interfaces when prompted by the setup program 5 Restart Windows as prompted by the setup program 6 Add a new local printer using Start Settings Printers Add Printer and select the WIASA Print Client port for the local printer within the Add New Printer Wizard 7 Print a test page to check if the client computer can print to the printer that is connected to the WIASA 20 3 Using Web Based Network Manager In this chapter we ll explain each Web management page of the Web based Network Manager 3 1 Overview Web Based Network Management You can click Restart to restart the s Restart e Config Wizard LI router H Status H General HH TCP IP
59. namic IP address assignment by PPPoE Point to Point Protocol over Ethernet or DHCP and static IP address assignment Telstra BigPond support Supporting Telstra BigPond http www bigpond com for user authentication on the cable based Internet connection service V 90 ISDN Modem Support Supporting PPP Point to Point Protocol dial up networking over RS232 Auto dial When the wireless router detects outgoing packets to the Internet it dials up to the ISP automatically This functionality applies to PPP and PPPoE Network Security Packet address and port filtering Filtering outgoing packets based on IP address and 3 port number Incoming packet filtering is performed by NAT m URL filtering Preventing users from accessing unwelcome Web sites The HTTP HeperText Transfer Protocol traffic to the specified Web sites identified by URLs Uni versal Resource Locators is blocked WAN ICMP requests blocking Some DoS Denial of Service attacks are based on ICMP requests with large payloads Such kind of attacks can be blocked m Stateful Packet Inspection SPI Analyzing incoming and outgoing packets based on a set of criteria for abnormal content Therefore SPI can detect hacker attacks and can summarily reject an attack 1f the packet fits a suspicious profile e Printer Sharing The wireless broadband switch router can serve as a print server for Win dows 9x 2000 client computers e Changeable MAC Address of the E
60. ndary DNS server 0 0 0 Fig 38 Basic DNS proxy settings In this section of the page you can specify the IP addresses of the DNS servers when the WIASA is in Router with a Static IP DSL Cable Connection mode In other modes the WIASA obtains the DNS server information automatically from the ISP 3 4 2 2 Static DNS Mappings Enabled Domain Name IP Address E www company name com 192 188 0 201 p E E Fig 39 Static DNS mappings By Static DNS Mappings an internal server can be given a domain name so that other hosts on the intranet can access the server by its domain name instead of by its IP address For example an inter nal Web server for the intranet say 192 168 0 2 may be associated with the domain name Www wiasa com To give an internal server a domain name l Specify the domain name and the private IP address of the internal server 2 Select the corresponding Enabled check box for the internal server 3 4 3 NAT Server 3 4 3 1 Basic Functionality Enabled C DMZ host Fig 40 Basic NAT server settings When the WIASA is in Router with a Static IP DSL Cable Connection mode the NAT server functionality can be enabled or disabled A DMZ DeMilitarized Zone host receives all unrecognized TCP IP packets from the NAT server on the WIASA therefore TCP IP networking applications running on the DMZ host would have better compatibility with NAT 35 To specify the DMZ host Enter the pr
61. ndor of the installed WLAN NIC 2 Check if the client computer is associated to an access point and the access point is the WIASA If the check fails see Appendix B 1 Wireless Settings Problems for troubleshooting 2 8 2 Checking if the TCP IP Related Settings Work To check if a client computer can access the Internet l Open a Windows Command Prompt window on the client computer 2 Type ping wiasa where wiasa is a placeholder for the IP address of the WIASA Replace it with your real IP address for example 192 168 0 1 Then press Enter If the WIASA responds go to the next step else see Appendix B 2 TCP IP Settings Prob lems for troubleshooting 3 Type ping default gateway where default gateway 1s a placeholder for the IP address of the default gateway of the client computer Then press Enter NOTE If the WIASA is set to be in router mode the default gateway of the client computer should be the WIASA You can skip this step in this case If the gateway responds go to the next step else see Appendix B 2 TCP IP Settings Prob lems for troubleshooting 4 Type ping wiasa default gateway where wiasa default gateway 1s a placeholder for the IP address of the default gateway of the WIASA Then press Enter If this gateway responds go to the next step else see Appendix B 2 TCP IP Settings Prob lems for troubleshooting 19 TIP You can view the default gateway of the WIASA on the st
62. ng concerned about the TCP IP settings of the managing computer Refer to the on line help of Wireless Network Manager for more information If the computer is already set to obtain an IP address automatically you can use the Win dows provided tool WinIPCfg exe on Windows 9x Me or IPConfig exe on Windows 2000 XP to re obtain an IP address from the WIASA WinIPCfg exe is a GUI program and has command buttons for releasing the current IP address and re obtaining an IP address IPConfig exe is a com mand line program and the release option releases the current IP address and the renew option triggers the Windows DHCP client subsystem to re obtain an IP address NOTE By default the first assignable IP address of the DHCP server on the WIASA is 192 168 0 2 2 5 Configuring the Wireless Broadband Switch Router After the IP addressing issue is resolved launch a Web browser on the managing computer Then go to http 192 168 0 1 to access the Web based Network Manager start page TIP For maintenance configuration of a WIASA the WIASA can be reached by its host name using a Web browser For example if the WIASA is named wiasa you can use the URL http wiasa to access the Web based Network Manager of the WIASA 2 5 1 Entering the User Name and Password Before the start page is shown you will be prompted to enter the user name and password to gain the right to access the Web based Network Manager For first
63. panying PCMCIA WLAN Card For some models the wireless interface of a WIASA is a WLAN PCMCIA card inserted into the PCMCIA socket labeled Wireless LAN Card Since a WIASA and its accompanying WLAN PCMCIA card are placed separately within a package you have to insert the PCMCIA card to the socket of the WIASA after they are taken out of the package And then plug the connector of the power adapter to the power jack of the WIASA to power it on NOTE Unless a WIASA is to be packed and moved to a distant place don t pluck out the PCMCIA card from the socket 2 2 Selecting a Power Supply Method Optionally the wireless broadband router can be powered by the supplied power adapter or PoE Power over Ethernet The wireless broadband router automatically selects the suitable one depend ing on your decision To power the wireless broadband switch router by the supplied power adapter 1 Plug the power adapter to an AC socket 2 Plug the connector of the power adapter to the power jack of the wireless broadband switch router NOTE This product is intended to be power supplied by a Listed Power Unit marked Class 2 or LPS and output rated SV DC I A minimum or equivalent statement To power the wireless broadband router by PoE l Plug one connector of an Ethernet cable to an available port of a PoE hub 2 Plug the other connector of the Ethernet cable to the LAN CONFIG port of the wireless broad band router
64. puter so that the WIASA and the computer are in the same IP subnet 4 Onthe computer run the TFTP Server utility And specify the folder in which the firmware files reside 5 Onthe computer run a Web browser and click the General Firmware Tools hyperlink 6 Choose TFTP as the Firmware management protocol 7 Specify the IP address of the computer which acts as a TFTP server If you don t know the IP address of the computer open a Command Prompt and type IpConfig then press the Enter key 8 Trigger the firmware upgrade process by clicking Upgrade EB TFTP Server 1 x vw Accept read requests Accept write requests Working folder Dy Project V C Project TFTP Tfip rwr Timeout 1 sec Max no of sessions 1 Max no of retries 20 View PESADOS lose Sessians Event log Clear Log Fig 30 TFTP Server NOTE After the dialog box of the TFTP server program appears be sure to specify the working folder within which the downloaded firmware files reside NOTE Make sure the Accept read requests check box of TFTP Server is selected 28 NOTE The LAN IP address of the WIASA and the IP address of the TFTP server must be in the same IP subnet for TFTP to work NOTE Due to the unreliable nature of wireless media it s highly recommended that the TFTP server and the to be upgraded wireless WIASA be connected by Ethernet and on the same LAN so that the upgrade process would be smooth
65. re needed one for the Ethernet wireless LAN interfaces and the other for the WAN interface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default settings need no change As for the WAN IP address it is obtained automatically by PPP from the ISP Consult your ISP for the correct User name Password and Telephone number settings The WIASA automatically disconnects the PPP dial up connection after there has been no traffic to the Internet for a period specified by Idle disconnect time NOTE If Idle disconnect time is set to 0 the PPP dial up connection will not be disconnected The AT commands settings are for modem compatibility The default AT commands for dial up and hang up are suitable for most modems However if your modem or TA needs special AT commands for these purposes set them in the corresponding fields You may need to consult the manual of the modem or TA for proper AT commands 3 4 2 DNS Proxy The DNS Proxy component of the WIASA forwards DNS requests and reply messages between client computers and DNS servers To client computers the WIASA acts like a DNS server to DNS servers the WIASA acts like a client 34 3 4 2 1 Basic Functionality Enabled Primary DNS server 0 0 0 Seco
66. rk properly with the Web management pages of the WIASA since the configuration management protocol is HTTP based we have to make sure that the IP ad dress of the managing computer and the IP address of the managed WIASA are in the same IP subnet By default see Appendix A 1 Default Settings the DHCP server functionality of a WI ASA is enabled so that if the managing computer is set to automatically obtain an IP address by DHCP the condition can be satisfied easily 2 4 1 Connecting the Managing Computer and the Wire less Broadband Switch Router 2 4 1 1 Router To connect the Ethernet managing computer and the managed router for first time configuration you have two choices as illustrated in Fig 3 Cross over Ethernet cable Normal Normal E Ethernet Ethernet cable cable sna Ethernet Managed ging Hub Switch WIASA Computer Fig 2 Connecting a managing computer and a wireless broadband router via Ethernet You can use either a cross over Ethernet cable included in the package or a switch hub with 2 nor mal Ethernet cables Since the DHCP server functionality is factory set to be enabled it s recom mended that there are no other computers connected to the switch hub so that you can be 100 percent sure that the WIASA will be the DHCP server of the managing computer NOTE One connector of the Ethernet cable must be plugged into the LAN CONFIG Ethernet jack of the WIASA for configuration 2 4 1
67. rmitted or not permitted to associate with the WIASA When the table type is set to inclusive en tries in the table are permitted to associate with the WIASA When the table type is set to exclusive entries in the table are not permitted to associate with the WIASA To deny wireless clients access to the wireless network l Select Enabled from the Functionality drop down list 2 Set the Access control type to exclusive 3 Specify the MAC address of a wireless client to be denied access and then click Add 4 Repeat Steps 3 for other wireless clients To grant wireless clients access to the wireless network l Select Enabled from the Functionality drop down list 2 Set the Access control type to inclusive 3 Specify the MAC address of a wireless client to be denied access and then click Add 4 Repeat Steps 3 for other wireless clients To delete an entry in the access control table 45 Click Delete next to the entry NOTE The size of the access control table is 64 TFTP server IP address 192 168 0 125 MAC ACL file name MacAcl t t Download Fig 57 MAC ACL download settings Instead of manually entering MAC addresses to the access control table one by one you can prepare a text file that contains all the MAC addresses and put it on a TFTP server and then command the WI ASA to download the MAC ACL Access Control List file from the TFTP server Fig 58 shows the contents of a sample ACL file
68. rossover Ethernet cable to a LAN Ethernet switch port of the WIASA and the other connector to the Ethernet jack of the Ethernet NIC of a client com puter 2 Ifnecessary use a normal Ethernet cable to connect the WIASA to another Ethernet switch hub via the UP LINK port 2 6 2 Connecting the Wireless Broadband Switch Router to a Modem To connect the WIASA with a DSL or cable modem l Plug one connector of a crossover Ethernet cable to the Ethernet WAN jack of the WIASA 2 Plug the other connector of this cable to the Ethernet jack of the DSL or cable modem Refer to the user s manual of the modem 1f necessary TIP If the WIASA has been connected to the DSL or cable modem successfully the WAN LED in dicator on the housing lights up when both devices are powered on If not flip the Normal Crossover 17 switch on the side plate of the WIASA if it exists flip the switch until the WAN LED indicator lights on To connect the WIASA with a V 90 modem or ISDN TA l Plug one connector of a normal RS232 cable to the RS232 COM port of the WIASA 2 Plug the other connector of this cable to the RS232 port of the V 90 modem or ISDN TA Refer to the user s manual of the modem or TA if necessary 2 7 Setting up Client Computers Before the client computers can use the services provided by the WIASA their TCP IP settings must be configured adequately to match those of the WIASA Furthermore for wireless client computers
69. sition and construction and local environmental inter ference that may impact your actual distances and cause you to experience distance thresholds far lower than those we post below IEEE 802 11b Maximum Distance Table Environmental Condition Speed and Distance Ranges 11 Mbps 5 5 Mbps 2 Mbps 1 Mbps Environment A line of sight environment 160 m 270 m 400 m 457 m with no interference or obstruc 524 ft 886 ft 1312 ft 1500 ft tions between Access Point and Users Semi Open Environment An environment with no major 50 m 70 m 90m 120m obstructions such as walls or 164 ft 230 ft 295 ft 394 ft privacy cubicles between Ac cess Point and users Closed Environment A typical office or home envi 25 m 35m 45m 55m ronment with floor to ceiling 82 ft 115 ft 148 ft 180 ft obstructions between Access Point and users 59
70. suffix Fig 33 TCP IP settings for Simple Access Point mode If the WIASA was set to be in Simple Access Point mode one IP address is needed This IP address can be manually set or automatically assigned by a DHCP server on the LAN If you are manually setting the IP address Subnet mask and Default gateway settings set them appropriately so that they comply with your LAN environment In addition you can specify the Host name and Domain DNS suffix of the WIASA 3 4 1 2 Router with a PPPoE Based DSL Cable Connection Ethernet WAN Interface a Custom MAC address of VV AN DOOEFAOUBO O interface User name david Password Password again Service name Idle disconnect time tmin Hast name Domain DNS suffix Ethernet Wireless LAN Interfaces IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 34 TCP IP settings for Router with a PPPoE Based DSL Cable Connection mode If the WIASA was set to be in Router with a PPPoE Based DSL Cable Connection mode two IP addresses are needed one for the Ethernet wireless LAN interfaces and the other for the WAN in terface The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default LAN IP address 1s 192 168 0 1 and the default subnet mask 1s 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it
71. the Ethernet wireless LAN interfaces and the other for the WAN inter face The IEEE 802 11b interface and the Ethernet LAN interface share the LAN IP address The LAN IP address must be set manually to a private IP address say 192 168 0 xxx The default LAN IP address is 192 168 0 1 and the default subnet mask is 255 255 255 0 In most cases these default set tings need no change As for the WAN IP address it must be manually set Consult your ISP for the correct IP address Default gateway Subnet mask Primary DNS server and Secondary DNS server settings Custom MAC Address of WAN Interface enables you to change the MAC address of the Ethernet WAN interface Therefore if the ISP provided DSL or cable modem works only with the ISP provided Ethernet card for a computer the WAN interface of the WIASA can mimic the ISP provided Ethernet card by changing its MAC address to the Ethernet card s MAC address 33 3 4 1 5 Router with a Dial up Connection Dial Up WAN Interface ISP Telephone number ERE User name david Password Password again Idle disconnect time min Host name Domain DNS suffix AT Commands Modem init command 1 Modem init command 2 Hang up command Ethernet Wireless LAN Interface IP address 192 168 0 1 Subnet mask 255 255 255 0 Fig 37 TCP IP settings for Router with a Dial up Connection mode If the WIASA was set to be in Router with a Dial up Connection mode two IP addresses a
72. thernet WAN Interface Some ADSL modems work only with Ethernet cards provided by the ISP If a wireless router is used in such an environment the MAC address of the WAN interface of the router has to be changed to the MAC address of the ISP provided Ethernet network card e Firmware Tools B Firmware upgrade The firmware of the wireless router can be upgraded in the follow ing methods Xmodem based Upgrading firmware over RS232 9 TFTP based Upgrading firmware by TFTP Trivial File Transfer Protocol HTTP based Upgrading firmware by HTTP HeperText Transfer Protocol Configuration backup The configuration settings of the wireless router can be backed up to a file via TFTP or HTTP for later restoring W Configuration reset Resetting the configuration settings to factory default values e Management Windows based Wireless Network Manager for configuring monitoring and diag nosing the local computer and neighboring wireless APs routers The management protocol is MAC based m Web based Network Manager for configuring and monitoring the wireless broadband router via a Web browser The management protocol is HTTP HeperText Transfer Proto col based m Remote Web based management The wireless router can be managed from the Internet using a Web browser m SNMP SNMP Simple Network Management Protocol MIB I MIB II IEEE 802 1d IEEE 802 1x and Private Enterprise MIB are supported m UPnP The wireless router
73. time configuration use the default user name root and default password root respectively Enter Network Password i E Please type your user name and password Site 192 168 0 1 Realm System Setup User Mame Password Save this password in your password list cancel Fig 4 Entering the user name and password 10 NOTE It is strongly recommended that the password be changed to other value for security reasons On the start page click the General Password link to change the value of the password see Section 3 3 2 for more information TIP Since the start page shows the current settings and status of the WIASA it can be saved or printed within the Web browser for future reference On the start page click the ConfigWizard link to use a configuration wizard to quickly change the configuration of the WIASA Web Based Network Management You can click Restart to restart the router e Config Wizard H Status H General Wireless Broadband Router Settings and Info HH TCP IP mae HIEEE 802 11 El Advanced BIOS Firmware Version BRYS v1 30 1 5 10 3190 Router Adv Router with a Sg8tatic IPFP DSL Cable Connection MAC Address BSSID 00 6 amp F4 0 B8 1959 Operational Mode System Up Time hr min sec 0 00 14 WAH Interface e IP address 192 160 100 1 e Subnet mask 255 255 455 0 Default qateway a Custom MAC address of WAN Disabled interface LAH Interface
74. ts are divided into the following categories M General system and network connectivity status changes M Built in AP wireless client association and WEP authentication status changes M MIB II traps Cold Start Warm Start Link Up Link Down and SNMP Authentication Failure RADIUS user authentication RADIUS user authentication status changes NOTE The SNMP Authentication Failure trap is issued when using an incorrect community string to manage the WIASA via SNMP and the SNMP MIB II OID snmpEnableAuthenTraps is enabled disabled by default 3 6 2 4 SNMP Functionality Enabled gt Read only community f Read write community mmm 0 SNMP Trap Table IP Address Community F 6216802 ooo r 0 0 0 0 ooo ooo Fig 67 SNMP settings The WIASA can be managed by SNMP Simple Network Management Protocol and the SNMP management functionality can be disabled You can specify the name used as a password of the read only and read write community In addition up to 5 SNMP trap targets can be set in the SNMP Trap Table To specify a trap target l Type the IP address of the target host 2 Type the Community for the host 3 Select the corresponding check box next to the IP address text box 51 Appendix A Default Settings TIP Press the Default or SF Reset switch on the housing of a powered on WIASA to reset the configuration settings to factory default values Setting Name Default Value
75. uit different from that to which the receiver is con nected e Consult the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environ ment This equipment should be installed and operated with minimum distance 20 cm between the ra diator amp your body This device complies with Part 15 of the FCC Rules Operation is subject to the following two condi tions 1 This device may not cause harmful interference and 2 this device must accept any inter ference received including interference that may cause undesired operation R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Termi nal Equipment and Satellite Earth Station Equipment as of April 8 2000 Safety This equipment is designed with the ut
76. umber of associated wireless users in the group On the other hand if the by traffic load policy is selected a new wireless user can only associate with an AP that has the less traffic load in the group 40 3 5 1 5 Wireless Distribution System Notebook Computer WDS AP 2 u Fig 49 Wireless Distribution System Traditionally access points are connected by Ethernet By Wireless Distribution System WDS APs can communicate with one another wirelessly For example in Fig 49 AP 2 acts as an access point for the notebook computers and it forwards packets sent from the notebook computers to AP 1 through WDS Then AP 1 forwards the packets to the Ethernet LAN Packets destined for the note book computers follow a reverse path from the Ethernet LAN through the APs to the notebook com puters In this way AP 2 plays a role of AP repeater Bridge 1 Bridge 2 Fig 50 LAN to LAN bridging By WDS two or more LAN segments can be connected wirelessly As illustrated in Fig 50 a pair of wireless LAN to LAN bridges is used to connect two LAN segments Since the WIASA is WDS enabled it can be used as a wireless bridge NOTE A WIASA can have up to 6 WDS links to other WIASAs APs or wireless bridges 41 Peer MAC Port Enabled Form E o0 02 6 F L1 52 C5 Fig 51 Wireless Distribution System settings To enable a WDS link l Specify the MAC address of the AP or wireless bridge at the ot
77. ve his or her user name and password for authentication If EAP TLS is used the wireless client computer automati cally gives the user s digital certificate that is stored in the computer hard disk or a smart card for au thentication And after a successful EAP TLS authentication a session key is automatically generated for wireless packets encryption between the wireless client computer and its associated WIASA To sum up EAP MDS supports only user authentication while EAP TLS supports user authentication as well as dynamic encryption key distribution Wireless Wireless Router AP a RADIUS User s eh Ves Server Database Fig 59 IEEE 802 1x and RADIUS A WIASA supporting IEEE 802 1x can be configured to communicate with two RADIUS servers When the primary RADIUS server fails to respond the WIASA will try to communicate with the secondary RADIUS server You can specify the length of timeout and the number of retries before communicating with the secondary RADIUS server after failing to communicate with the primary RADIUS server An IEEE 802 1x capable WIASA and its RADIUS server s share a secret key so that they can au thenticate each other In addition to its IP address a WIASA can identify itself by an NAS Network Access Server identifier Each IEEE 802 1x capable WIASA must have a unique NAS identifier Primary RADIUS server 192 168 168 220 Secondary RADIUS server fo Authentication port s
78. ware of the WIASA backing up and restoring configuration and configuration reset settings of the WIASA TCP IP TCP IP related settings Addressing IP address settings for the WIASA to work with TCP IP or user name and password provided by the ISP E DNS Proxy DNS Domain Name System proxy settings WB NAT Server Settings for the NAT Network Address Translation server on the WIASA m DHCP Server Settings for the DHCP Dynamic Host Configuration Protocol server on the WIASA e IEEE 802 11 IEEE 802 11b related settings Communication Basic settings for the IEEE 802 11b interface of the WIASA to work properly with wireless clients M Security Security settings for authenticating wireless users and encrypting wireless data m IEEE 802 1x RADIUS IEEE 802 1x Port Based Network Access Control and RADIUS Remote Authentication Dial In User Service settings for better wireless security Advanced Advanced settings of the WIASA m Filters 8 Firewall Packet filtering and firewall settings for user access control and protection from hacker attacks from the Internet respectively m Management Remote Web based management UPnP System Log and SNMP settings 3 1 2 Save Save amp Restart and Cancel Commands Save amp Restart Cancel Fig 16 Save Save amp Restart and Cancel At the bottom of each page that contains settings you can configure there are up to three but tons Save Save amp Restart
79. y the IP address of the computer which acts as a TFTP server If you don t know the IP address of the computer open a Com mand Prompt and type IpConfig then press the Enter key 8 Trigger the backup process by clicking Back Up The WIASA s configuration settings will be saved as AaBbCcDdEeFf hex by the TFTP server where AaBbCcDdEeFf is the WIASA s MAC address For example if the WIASA s MAC address is 00 01 02 33 44 55 the configura tion backup file will be 000102334455 hex NOTE Remember to select the Accept write requests check box of TFTP Server 29 To restore configuration of the WIASA by TFTP l Get a computer that will be used as a TFTP server and as a managing computer to trigger the restoring process 2 Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet cable 3 Configure the IP address of the computer so that the computer and the WIASA are in the same IP subnet 4 On the computer run the TFTP Server utility And specify the folder in which the configuration backup file resides A configuration backup file is named by the WIASA s MAC address For example if the WIASA s MAC address is 00 01 02 33 44 55 the configuration backup file should be 000102334455 hex 5 Onthe computer run a Web browser and click the General Firmware Tools hyperlink 6 Choose TFTP as the Firmware management protocol 7 Within the Configuration Backup Restore section specify the IP
80. z Accounting port hea Timeout sec E Max number of retries f Shared key Identifier of this NAS Fig 60 IEEE 802 1x RADIUS settings 47 TIP Refer to the IEEE 802 1x related white papers on the companion CD ROM for more information about deploying secure WLANs with IEEE 802 1x support 3 6 Configuring Advanced Settings 3 6 1 Filters and Firewall 3 6 1 1 Packet Filters Functionality Disabled Policy for unmatched packets Pass Rules Destination Port Destination IP Address Source IP da ee Subnet Mask Action Protocol Subnet Mask r Block mat Pp r Block mat L1 LL DL r Block mat I L1 LL DL r Block mati L L1 Fig 61 Packet filters settings You can specify rules for the firewall component of WIASA to check outgoing packets Packets that meet the rules can be permitted or denied The protocol field source IP address field destination IP address field and destination port field of a packet s IP header are inspected to see if it meets a rule A packet that meets a rule can be dropped Block or accepted Accept as specified in the Action set ting of the rule Packets that do not meet any rules can be dropped Discard or accepted Pass as specified in the Policy setting A rule is composed of 5 parts m What to do if a packet meets this rule Action Protocol type All ICMP TCP UDP m Source IP address range Source
Download Pdf Manuals
Related Search
Related Contents
Acronis Backup & Recovery 10 Server, Windows Lince Italia SpA - Ilprezzobasso.it Rigger Spec Sheet 1.13.cdr Base Pan Heater Installation Manual シリコンライトα GL10 取扱説明書 Airstream LAND YACHT MOTORHOME User's Manual GSG 300 Professional UV照射システム 総合カタログ Télécharger - CRDP de Montpellier Copyright © All rights reserved.
Failed to retrieve file