In accordance with 2004/108 EC Directive and 1999/5 EC-R & TTE Directive
Claus
■ EN 55022:1998Limits and methods of measurement of radio disturbanc
■ EN 61000-3-2:2000Disturbances in supply systems caused by household appliance
■ EN 61000-3-3:1995/Disturbances in supply systems caused by household appliance
A1:2001and similar electrical equipment "Voltage fluctuations
■ EN 55024:1998/A1Information Technology equipment-Immunity characteristics-Limi
:2001/A2:2003And methods of measuremen
■ CE markin
Description
characteristics of information technology equipme
and similar electrical equipment "Harmonics
Manufacturer/Importe
Signature :
Name :Albert Ye
Position/ Title:Vice President (Stamp)Date: 2008/10/9
AirLive IAS-2000 v2 CE Declaration Statement
Country Declaration Country Declaration
cs
Česky [Czech]
da
Dansk [Danish]
de
Deutsch
[German]
et
Eesti [Estonian]
en
English
es
Español
[Spanish]
el
Ελληνική [Greek]
fr
Français [French]
it
Italiano [Italian]
lv
Latviski [Latvian]
sv
Svenska
[Swedish]
OvisLink Corp. tímto prohlašuje, že tento AirLive
IAS-2000 v2 je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními
směrnice 1999/5/ES.
Undertegnede OvisLink Corp. erklærer herved, at
følgende udstyr AirLive IAS-2000 v2 overholder
de væsentlige krav og øvrige relevante krav i
direktiv 1999/5/EF.
Hiermit erklärt OvisLink Corp., dass sich das
Gerät AirLive IAS-2000 v2 in Übereinstimmung
mit den grundlegenden Anforderungen und den
übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Käesolevaga kinnitab OvisLink Corp. seadme
AirLive IAS-2000 v2 vastavust direktiivi
1999/5/EÜ põhinõuetele ja nimetatud direktiivist
tulenevatele teistele asjakohastele sätetele.
Hereby, OvisLink Corp., declares that this AirLive
IAS-2000 v2 is in compliance with the essential
requirements and other relevant provisions of
Directive 1999/5/EC.
Por medio de la presente OvisLink Corp. declara
que el AirLive IAS-2000 v2 cumple con los
requisitos esenciales y cualesquiera otras
disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp. ΔΗΛΩΝΕΙ
ΟΤΙ AirLive IAS-2000 v2 ΣΥΜΜΟΡΦΩΝΕΤΑΙ
ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ
ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ
1999/5/ΕΚ.
Par la présente OvisLink Corp. déclare que
l'appareil AirLive IAS-2000 v2 est conforme aux
exigences essentielles et aux autres dispositions
pertinentes de la directive 1999/5/CE
Con la presente OvisLink Corp. dichiara che
questo AirLive IAS-2000 v2 è conforme ai
requisiti essenziali ed alle altre disposizioni
pertinenti stabilite dalla direttiva 1999/5/CE.
Ar šo OvisLink Corp. deklarē, ka AirLive
IAS-2000 v2 atbilst Direktīvas 1999/5/EK
būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
Härmed intygar OvisLink Corp. att denna AirLive
IAS-2000 v2 står I överensstämmelse med de
väsentliga egenskapskrav och övriga relevanta
bestämmelser som framgår av direktiv
1999/5/EG.
lt
Lietuvių
[Lithuanian]
nl
Nederlands [Dutch
mt
Malti [Maltese]
hu
Magyar
[Hungarian]
pl
Polski [Polish]
pt
Português
[Portuguese]
sl
Slovensko
[Slovenian]
sk
Slovensky [Slovak]
fi
Suomi [Finnish]
Íslenska [Icelandic]
no
Norsk [Norwegian]
Šiuo OvisLink Corp. deklaruoja, kad šis AirLive
IAS-2000 v2 atitinka esminius reikalavimus ir kitas
1999/5/EB Direktyvos nuostatas.
Hierbij verklaart OvisLink Corp. dat het toestel AirLive
IAS-2000 v2 in overeenstemming is met de
essentiële eisen en de andere relevante bepalingen
van richtlijn 1999/5/EG.
Hawnhekk, OvisLink Corp, jiddikjara li dan AirLive
IAS-2000 v2 jikkonforma mal-ħtiġijiet essenzjali u ma
provvedimenti oħrajn relevanti li hemm fid-Dirrettiva
1999/5/EC.
Az OvisLink Corporation kijelenti, hogy az AirLive
IAS-2000 v2 megfelel az 1999/05/CE irányelv
alapvető követelményeinek és egyéb vonatkozó
rendelkezéseinek.
Niniejszym OvisLink Corp oświadcza, że AirLive
IAS-2000 v2 jest zgodny z zasadniczymi wymogami
oraz pozostałymi stosownymi postanowieniami
Dyrektywy 1999/5/EC.
OvisLink Corp declara que este AirLive IAS-2000 v2
está conforme com os requisitos essenciais e outras
disposições da Directiva 1999/5/CE.
OvisLink Corp izjavlja, da je ta AirLive IAS-2000 v2 v
skladu z bistvenimi zahtevami in ostalimi relevantnimi
določili direktive 1999/5/ES.
OvisLink Corp týmto vyhlasuje, že AirLive IAS-2000
v2 spĺňa základné požiadavky a všetky príslušné
ustanovenia Smernice 1999/5/ES.
OvisLink Corp vakuuttaa täten että AirLive IAS-2000
v2 tyyppinen laite on direktiivin 1999/5/EY oleellisten
vaatimusten ja sitä koskevien direktiivin muiden
ehtojen mukainen
Hér með lýsir OvisLink Corp yfir því að AirLive
IAS-2000 v2 er í samræmi við grunnkröfur og aðrar
kröfur, sem gerðar eru í tilskipun 1999/5/EC.
OvisLink Corp erklærer herved at utstyret AirLive
IAS-2000 v2 er i samsvar med de grunnleggende
krav og øvrige relevante krav i direktiv 1999/5/EF.
A copy of the full CE report can be obtained from the following address:
OvisLink Corp.
5F, No.6 Lane 130,
Min-Chuan Rd, Hsin-Tien City,
Taipei, Taiwan, R.O.C.
This equipment may be used in AT, BE, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, SK,
SI, ES, SE, GB, IS, LI, NO, CH, BG, RO, TR
This device uses software which is partly or completely licensed under the terms of the GNU General Public License. The author of the
software does not provide any warranty. This does not affect the warranty for the product itself.
To get source codes please contact: OvisLink Corp., 5F, No. 96, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C. A fee will be
charged for production and shipment for each copy of the source code.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public License is intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free Software Foundation software
is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to
surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the
software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal
permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no
warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we
have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it
may be distributed under the terms of this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee
is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by running the Program). Whether that is
true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and
give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection
in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all
of
these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any
change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the
Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running
for such interactive use in the most ordinary way, to print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if
the Program itself is interactive but does not normally print such an announcement, your work based on the Program
is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the
Program, and can be reasonably considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the
terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on
the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this
License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than
your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source
code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This
alternative is allowed only for noncommercial distribution and only if you received the program in object code or
executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable
work, complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place counts as distribution of the source code, even
though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not
accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a
license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a
consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you
could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest
validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to
time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,
write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to
the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of
preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software
generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS
IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to
where the full notice is found.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain
conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License.
Of course, the commands you use may be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright
disclaimer" for the program, if necessary. Here is
a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'
(which makes passes at compilers) written by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is
a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is
what you want to do, use the GNU Lesser General Public License instead of this License.
IAS-2000 v2
User’s Manual
Copyright
The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an
information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical,
magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
Trademarks
All products, company, brand names are trademarks or registered trademarks of their respective companies. They
are used for identification purpose only. Specifications are subject to be changed without prior notice.
FCC Interference Statement
The IAS-2000 v2 has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15
of the FCC Rules. These limits are designed to provide reasonable protection against radio interference in a
commercial environment. This equipment can generate, use and radiate radio frequency energy and, if not installed
and used in accordance with the instructions in this manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause interference, in which case the
user, at his own expense, will be required to take whatever measures are necessary to correct the interference.
CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility,
EN 55022:1998, EN 61000-3-2, EN 61000-3-3/A1, EN 55024/A1/A2, Class A.
.
1
IAS-2000 v2
User’s Manual
Contents
Chapter 1. Before You Start .....................................................................................................................................1
2.1Introduction of IAS-2000 v2..........................................................................................................................2
3.1Panel Function Descriptions...........................................................................................................................5
Chapter 5. Web Interface Configuration...............................................................................................................16
5.2.3Monitor IP List............................................................................................................................................56
5.2.4Walled Garden List .....................................................................................................................................58
5.2.5Proxy Server Properties ..............................................................................................................................59
5.3.3Black List Configuration.............................................................................................................................95
5.3.4Guest User Configuration...........................................................................................................................98
Appendix A. External Network Access...............................................................................................................141
Appendix B. Console Interface Configuration..................................................................................................143
Appendix C. Specifications.................................................................................................................................146
a.Hard ware Specification...................................................................................................................................146
Appendix D. Proxy Setting for Hotspot..............................................................................................................148
Appendix E. Proxy Setting for Enterprise..........................................................................................................151
.
ii
IAS-2000 v2
User’s Manual
Chapter 1. Before You Start
1.1 Audience
This manual is for Hotspot owners or administrators in enterpri ses to set up network environ ment using IAS-200 0 v2.
It contains step by step procedures and graphic examples to guide MIS staff or individuals with slight network
system knowledge to complete the installation.
1.2 Document Conventions
For any caution or warning that re quir es sp ecia l attention of readers, a highlight box with the eye-catching italic font
is used as below:
Warning: For security purposes, you should immediately change the Admi nistrator’s password.
Indicates that clicking this button will return to the homepage of this section.
Indicates that clicking this button will return to the previous page.
Indicates that clicking this button will apply all of your settings.
Indicates that clicking this button will clear what you set before these settings are applied.
.
1
IAS-2000 v2
User’s Manual
Chapter 2. Overview
2.1 Introduction of IAS-2000 v2
IAS-2000 v2 is a Network Access Control System specially designed for middle-scaled or large network
environments while retaining network efficiency. IAS-2000 v2 delivers “manageability”, “efficiency” and “friendly interface” and suits perfectly for campuses, libraries, gymnasiums, small and middle enterprises, factories,
Hotspots and community hospitals.
2.2 System Concept
IAS-2000 v2 is dedicatedly designed for controlling all network data passing through the system. The users under
the managed network must be authenticated to access the network beyond the managed area. The authentication
mechanism at the user’s end is provided by the IAS-2000 v2 server, and the SSL encryption is used to protect the
webpage. In the system, IAS-2000 v2 is responsible for authentication, authorization, and management functions.
The user account information is stored in the IAS-2000 v2 database, or other specified external authentication
databases.
The process of authenticating the user’s identity is executed via the SSL encrypted webpage. Using the web
interface, it can be ensured that the system is compatible to most desktop systems and palm computers. When a
user authentication is requested, the IAS-2000 v2 server software will check the authentication database at the rear
end to confirm the user’s access right. The authentication database can be the local dat abase of IAS-2000 v2 or any
external database that IAS-2000 v2 supports. If the user is not an authorized user, IAS-2000 v2 will refuse the user’s
2
.
IAS-2000 v2
User’s Manual
request for the access. In the meantime, IAS-2000 v2 will also continue blocking the user from accessing the
network. If the user is an authorized user, then IAS-2000 v2 will authorize the user with an appropriate access right,
so that the user can use the network. If the online user remains idle without using the network f or a time exceeding a
predetermined idle time on IAS-2000 v2 or the online user logs out of the system, IAS-2000 v2 will exit the working
stage of such user and terminate the user’s access right of the network.
The following figure provides a simple example of setti ng up a small enterprise n etwork. IAS-2000 v2 is set to control
a part of the company’s intranet. The whole managed network includes cable network users and wireless network
users. In the beginning, any user located at the managed network is unable to access the network resource without
permission. If the access right to the network beyond the managed area is required, an Internet browser such a s the
Internet Explorer must be opened and a connection to any website must be performed. When the browser attempts
to connect to a website, IAS-2000 v2 will force the browser to redirect to the user login webpage. The user must
enter the username and password for authentication. After the identity is authenticated successfully, the user will
gain proper access right defined on IAS-2000 v2.
Attention:Public LAN
Authentication is required for the users to get access of the network; And, Private LAN is referred to as the LAN
port with the authentication function disabled.
is
referred to as the LAN port with the authentication function enabled from where the
Another setup example is shown in the following figure. The WAN1 and WAN2 of IAS-2000 v2 simultaneously
supports the Switch of 802.3ad (Support Port Trunk), and the bandwidth of the Switch will be the sum of the WAN1
and WAN2 bandwidths, which aims at eliminating the bottleneck caused by the narrow bandwidth between
IAS-2000 v2 and the 802.3ad Switch.
3
.
IAS-2000 v2
User’s Manual
.
4
Chapter 3. Hardware Installation
3.1 Panel Function Descriptions
Front Panel
LED Color Status Description
POWER Green On Power on the device
Off BIOS running
Status LED Green
WAN1, LAN1,
WAN2, LAN2
(L)
WAN1, LAN1,
WAN2, LAN2
(R)
Orange Blink Sending / Receiving
Green
Orange On 1000 Mbps
Blink OS running
On System ready
Off 10 Mbps
On 100 Mbps
IAS-2000 v2
User’s Manual
Port Description
WAN1 / WAN2
LAN1 / LAN2
Console Port
Panel Button
LED: There are four kinds of LED, power, status, port speed and link/act, to indicate diff erent status of the system.
Console Port: The system can be configured via HyperTerminal. For example, if you need to set the Administrator’s
Password, you can connect a PC to this port as a Console Serial Port via a terminal connection program (such as
the super terminal with the parameters of 9600, 8, N, 1, None flow control) to change the Administrator’s Password.
LAN1/LAN2: The two LAN ports can be independently configured such that users cannot access Internet before
authentication. Thus, administrators can choose to force the authentication for users connected to these ports.
WAN1/WAN2: The two WAN ports are connected to a network which is not managed by the IAS-2000 v2 system,
and this port can be used to connect the ATU-Router of ADSL, the port of Cabl e Modem, or the Switch or Hub on the
Connect to Internet or Intranet
Connect to the open environment. It can be chosen to require authentication to
access network resources and Internet.
9-pin serial port connector to resume the factory defaults or reconfigures the
system.
LCD Panel to display system info and network interface info
LAN of a company.
.
5
Rear Panel
System Fan: Keep the machine cool.
Power Fan: Keep the power cool.
Power Socket: The power cord attaches here.
Power Switch: Turn on and off the machine.
3.2 Package Contents
IAS-2000 v2
User’s Manual
The standard package of IAS-2000 v2 includes:
y IAS-2000 v2 x 1
y CD-ROM x 1
y Power Cord x 1
y Ethernet Cable (Crossover) x 1
y Ethernet Cable (Straight) x1
y Console Cable x 1
y Accessory Packing x 1
3.3 System Requirement
y Standard 10/100BaseT including five network cables with RJ-45 connectors
y All PCs need to install the TCP/IP network protocol
.
6
3.4 Installation Steps
Please follow the following steps to install IAS-2000 v2:
1. Connect the power cord to the power socket on the rear panel.
2. Turn on the power switch on the rear panel. The Power LED will light up.
IAS-2000 v2
User’s Manual
3. Connect an Ethernet cable to one LAN port with the user authentication function enabled on the front panel.
The default port is LAN1 port. (Note: Authentication is requi red for the u sers to access the network via this LAN
port. The LAN port with authentication function is referred to as Public LAN.) Connect the other end of the
Ethernet cable to an AP or switch. The LED of this LAN port should be on to indicate a proper connection.
7
.
IAS-2000 v2
User’s Manual
4. Connect an Ethernet cable to one LAN port with the user authentication function disabled on the front panel.
The default port is LAN2 port. (Note: No authentication is required for the users to access the network via this
LAN port. The LAN port without authentication function is referred to as Private LAN and the administrator can
enter the administrative user interface to perform configurations via Private LAN.) Connect the other end of
the Ethernet cable to a client’s PC. The LED of this LAN port should be on to indicate a proper connection.
5. Connect an Ethernet cable to one of the WAN ports on the front panel. Connect the other end of the Ethernet
cable to ADSL modem, cable modem or a switch/hub of the internal network. The LED of this WAN should be
on to indicate a proper connection.
Attention: Usually a straight RJ-45 could be applied if IAS-2000 v2 is connected to a hub/computer which supports
automatic crossover, such as the Access Point. However, after the Access Point hardware reset, IAS-2000 v2
should not be able to connect to Access Point while connect ing with a straight cable unless t he cable wa s pulled out
and plug-in again. This scenario does NOT occur while using a crossover cable.
After the hardware of IAS-2000 v2 is installed completely, the system is ready to be configured in the following
sections. The manual will guide you step by step to set up the system using a single IAS-2000 v2 to manage the
network.
.
8
IAS-2000 v2
User’s Manual
Chapter 4. Network Configuration on PC
After IAS-2000 v2 is installed, the following configurations must be set up on the PC: Interne t Connection Setup
for Windows XP and TCP/IP Network Setup.
4.1. Internet Connection Setup for Windows XP
1. Choose Start > Control Panel > Internet Options.
2. Choose the “Connections” label, and then click
Setup.
.
9
3. ClickNext when Welcome to the New Connection
Wizard screen appears.
4. Choose “Connect to the Internet” and then click
Next.
IAS-2000 v2
User’s Manual
5. Choose “Set up my connection manually” and then
click Next.
.
10
6. Choose “Connect using a broadband connection
that is always on” and then click Next.
7. Finally, click Finish to exit the Connection Wizard.
Now, the setu p has been completed
IAS-2000 v2
User’s Manual
.
11
IAS-2000 v2
User’s Manual
4.2. TCP/IP Network Setup
If the operating system of the PC in use is Windows 95/98/ME/2000/XP, keep the default settings without any
change to directly start/restart the system. With the factory default settings, duri ng the process of st arting the system,
IAS-2000 v2 with DHCP function will automatically assign an appropriate IP address and related information for
each PC. If the Windows operating system is not a server version, the default settings of the TCP/IP will regard the
PC as a DHCP client, and this function is called “Obtain an IP address automatically”.
If checking the TCP/IP setup or use the static IP in the LAN1 or LAN2 section is needed, please follow the steps
below
Check the TCP/IP Setup of Window XP
1. Select Start > Control Panel > Network
Connections.
2. Click the right button of the mouse on the “Local Area
Connection” icon and select “Properties”
.
12
3. Select “General” label and choose “Internet Protocol
(TCP/IP)” and then click Properties. Now, choose to
use DHCP or specific IP address.
IAS-2000 v2
User’s Manual
4-1. Using DHCP: If using DHCP is desired, please cho o se
“Obtain an IP address automatically” and click OK.
This is also the default setting of Windows. Then,
reboot the PC to make sure an IP address is obtained
from IAS-2000 v2.
4-2. Using Specific IP Address: If using specific IP
address is desired, ask the network administrator for
the information of the IAS-2000 v2: IP address,
Subnet Mask, New gateway and DNS server
address.
Caution: If your PC has been set up completed, please inform the network administrator before modifying the
following setup.
.
13
y Please choose “Use the following IP
address:” and enter the information given from the network administrator in “IP address:” and
“Subnet mask:” as well as “Default gateway”
If the DNS Server column is blank, please
choose “Use the following DNS server addresses:” and then enter a known DNS
address or the DNS address provided by ISP
and then click OK.
IAS-2000 v2
User’s Manual
y Then, clickAdvanced in the window of
“Internet Protocol (TCP/IP) Properties”.
.
14
y Choose the “IP Settings” label and click “Add”
below the “Default gateways” column and the
“TCP/IP Gateway Address” window will
appear. Enter the gateway address of IAS-2000
v2 in the “Gateway:” of “TCP/IP Gateway Address” window, and then click Add. After
returning to the “IP Settings” label, click OK to
finish.
IAS-2000 v2
User’s Manual
.
15
IAS-2000 v2
User’s Manual
Chapter 5. Web Interface Configuration
This chapter will present further detailed settings. The followin g table shows all the functions of IAS-2000 v2.
OPTION
FUNCTION
System
Configuration
Configuration
Wizard
System
Information
WAN1
Configuration
WAN2 & Failover
LAN1
Configuration
LAN2
Configuration
IP Mobility
Network
Configuration
Network Address
Translation
Privilege List
Monitor IP List
Walled Garden
List
Proxy Server
Properties
Dynamic DNS Online Report
User
Authentication
Authentication
Configuration
Policy
Configuration
Black List
Configuration
Guest User
Configuration
Additional
Configuration
Utilities Status
Change Password System Status
Backup/Restore
Interface Status
Setting
Firmware Upgrade Current Users
Restart Traffic History
Notification
Configuration
Caution: After finishing the configuration of the settings, please click Apply and pay attention to see if a restart
message appears on the screen. If such message appears, system must be restarted to allow the settings to take
effect. All on-line users will be disconnected during restart.
After the basic installation shown previously has been completed, IAS-2000 v2 can be further configured with the
following steps
1. Use the network cable of the 10/100BaseT to connect a PC to the Private Port, and then start a browser (such
as Microsoft IE). Next, enter the gateway address for that port, the default is
https://192.168.2.254. In the
opened webpage, an administrative login page will appear. Enter “admin” as the default username and
password “airlive”. Click Enter to log in.
16
.
IAS-2000 v2
User’s Manual
Caution: If you can’t get the login page, you may have in correctly set your P C t o obtain an I P address au tom atically
from authentication LAN port or the IP address used does not have the same subnet as the URL. Please use default
IP address such as 192.168.2.xx in your network and then try it again.
2. After successfully logging into IAS-2000 v2, enter the web management interface and see the welcome page.
There is a Logout button on the upper right corner to log out the system.
17
.
IAS-2000 v2
User’s Manual
5.1 System Configuration
This section includes the following functions: Configuration Wizard, System Information, WAN1 Configuration,
WAN2 & Failover, LAN1 Configuration and LAN2 Configuration.
18
.
IAS-2000 v2
User’s Manual
5.1.1 Configuration Wizard (Also served as Quick Installation)
There are two ways to configure the system: using Configuration Wizard or change the setting by demands
manually. The Configuration Wizard has 7 steps providing a simple and easy way to set up IAS-2000 v2 and can be
served as Quick Installation. There are 7 steps as listed below:
1. Change Admin’s Password
2. Choose System’s Time Zone
3. Set System Information
4. Select the Connection Ty pe for WAN1 Port
5. Configure LAN1
6. Select Authentication Method
7. Restart
Now, click the System Configuration from the top menu and the System Configuration page will appear.
.
19
Then, click on Configuration Wizard and click the Run Wizard button to start the wizard.
yRunning the Wizard
A welcome screen that briefly introduces the 7 steps will
appear. Click Next to begin.
IAS-2000 v2
User’s Manual
yStep 1: Change Admin’s Password
Enter a new password for the admin account and retype
it in the verify password field (twenty-character
maximum and no spaces).
Click Next to continue.
.
20
yStep 2: Choose System’s Time Zone
Select a proper time zone via the pull-down menu.
Click Next to continue.
IAS-2000 v2
User’s Manual
yStep 3: Set System Information
Home Page: Enter the URL to where the clients should
be directed when they are properly authenticated.
NTP Server: Enter the URL of external time server for
IAS-2000 v2 time synchronization or use the default.
DNS Server: Enter a DNS Server provided by the ISP
(Internet Service Provider). Contact the ISP if the DNS
IP Address is unknown.
Click Next to continue.
yStep 4: Select the Connection Type for WAN1 Port
There are three types that WAN1 port supports: St atic IP Address, Dynamic IP Address and PPPoE Client.
Select a proper Internet connection type and click Next
to continue.
¾Dynamic IP Address
If this option is selected, an appropriate IP address
and related information will be assigned
automatically.
Click Next to continue.
21
.
¾ Static IP Address: Set WAN1 Port’s Static IP
Address
Enter the “IP Address”, “Subnet Mask” and
“Default Gateway” provided by the ISP.
Click Next to continue.
¾PPPoE Client: Set PPPoE Client’s Information
IAS-2000 v2
User’s Manual
Enter the “Username” and “Password” provided
by the ISP.
Click Next to continue.
yStep 5: Configure LAN1’s Information
IP Address: Enter the Public LAN port IP Address or
use the default.
Subnet Mask: Enter the Public LAN port Subnet Mask
or use the default.
Disable DHCP Server: If the DHCP server is disabled,
the clients in Public LAN must be configured with an IP
address manually.
Enable DHCP Server: When the option is selected,
IAS-2000 v2 will automatically provide the necessary IP
address to all clients in Public LAN.
Click Next to continue.
22
.
yStep 5: Set LAN1 DHCP Server
If Enable DHCP Server option is selected, fields marked
with red asterisk must be filled in.
Start IP Address: The start IP address that will be
assigned to the Public LAN clients.
End IP Address: The end IP address that will be
assigned to the Public LAN clients.
(Note: Be sure that IP addresses assigned from
Start IP address to End IP address are NOT used in
other settings by IAS-2000 v2.)
Domain Name: Enter a domain name provided by the
ISP (e.g. airlive.com).
IAS-2000 v2
User’s Manual
WINS Server: Enter the IP address of the WINS Server (Windows Internet Naming Service Server). This field
is optional.
Preferred DNS Server: The DNS Server settings are provided by the ISP. Only the Preferred DNS Server field
is mandatory. Contact the ISP if the DNS Server settings are unkn own.
Alternate DNS Server: The DNS Server settings are provided by the ISP. This field is optional.
Click Next to continue.
yStep 6: Select Default Authentica tion Server
Set the user’s information in advance. Enter an easy
identified name as the postfix name in the Postfix Name field (e.g. airlive) and choose an authentication
method.
Click Next to continue.
.
23
Loading...
+ 133 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.