In accordance with 2004/108 EC Directive and 1999/5 EC-R & TTE Directive
Claus
■ EN 55022:1998Limits and methods of measurement of radio disturbanc
■ EN 61000-3-2:2000Disturbances in supply systems caused by household appliance
■ EN 61000-3-3:1995/Disturbances in supply systems caused by household appliance
A1:2001and similar electrical equipment "Voltage fluctuations
■ EN 55024:1998/A1Information Technology equipment-Immunity characteristics-Limi
:2001/A2:2003And methods of measuremen
■ CE markin
Description
characteristics of information technology equipme
and similar electrical equipment "Harmonics
Manufacturer/Importe
Signature :
Name :Albert Ye
Position/ Title:Vice President (Stamp)Date: 2008/10/9
AirLive IAS-2000 v2 CE Declaration Statement
Country Declaration Country Declaration
cs
Česky [Czech]
da
Dansk [Danish]
de
Deutsch
[German]
et
Eesti [Estonian]
en
English
es
Español
[Spanish]
el
Ελληνική [Greek]
fr
Français [French]
it
Italiano [Italian]
lv
Latviski [Latvian]
sv
Svenska
[Swedish]
OvisLink Corp. tímto prohlašuje, že tento AirLive
IAS-2000 v2 je ve shodě se základními
požadavky a dalšími příslušnými ustanoveními
směrnice 1999/5/ES.
Undertegnede OvisLink Corp. erklærer herved, at
følgende udstyr AirLive IAS-2000 v2 overholder
de væsentlige krav og øvrige relevante krav i
direktiv 1999/5/EF.
Hiermit erklärt OvisLink Corp., dass sich das
Gerät AirLive IAS-2000 v2 in Übereinstimmung
mit den grundlegenden Anforderungen und den
übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Käesolevaga kinnitab OvisLink Corp. seadme
AirLive IAS-2000 v2 vastavust direktiivi
1999/5/EÜ põhinõuetele ja nimetatud direktiivist
tulenevatele teistele asjakohastele sätetele.
Hereby, OvisLink Corp., declares that this AirLive
IAS-2000 v2 is in compliance with the essential
requirements and other relevant provisions of
Directive 1999/5/EC.
Por medio de la presente OvisLink Corp. declara
que el AirLive IAS-2000 v2 cumple con los
requisitos esenciales y cualesquiera otras
disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp. ΔΗΛΩΝΕΙ
ΟΤΙ AirLive IAS-2000 v2 ΣΥΜΜΟΡΦΩΝΕΤΑΙ
ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ
ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ
1999/5/ΕΚ.
Par la présente OvisLink Corp. déclare que
l'appareil AirLive IAS-2000 v2 est conforme aux
exigences essentielles et aux autres dispositions
pertinentes de la directive 1999/5/CE
Con la presente OvisLink Corp. dichiara che
questo AirLive IAS-2000 v2 è conforme ai
requisiti essenziali ed alle altre disposizioni
pertinenti stabilite dalla direttiva 1999/5/CE.
Ar šo OvisLink Corp. deklarē, ka AirLive
IAS-2000 v2 atbilst Direktīvas 1999/5/EK
būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
Härmed intygar OvisLink Corp. att denna AirLive
IAS-2000 v2 står I överensstämmelse med de
väsentliga egenskapskrav och övriga relevanta
bestämmelser som framgår av direktiv
1999/5/EG.
lt
Lietuvių
[Lithuanian]
nl
Nederlands [Dutch
mt
Malti [Maltese]
hu
Magyar
[Hungarian]
pl
Polski [Polish]
pt
Português
[Portuguese]
sl
Slovensko
[Slovenian]
sk
Slovensky [Slovak]
fi
Suomi [Finnish]
Íslenska [Icelandic]
no
Norsk [Norwegian]
Šiuo OvisLink Corp. deklaruoja, kad šis AirLive
IAS-2000 v2 atitinka esminius reikalavimus ir kitas
1999/5/EB Direktyvos nuostatas.
Hierbij verklaart OvisLink Corp. dat het toestel AirLive
IAS-2000 v2 in overeenstemming is met de
essentiële eisen en de andere relevante bepalingen
van richtlijn 1999/5/EG.
Hawnhekk, OvisLink Corp, jiddikjara li dan AirLive
IAS-2000 v2 jikkonforma mal-ħtiġijiet essenzjali u ma
provvedimenti oħrajn relevanti li hemm fid-Dirrettiva
1999/5/EC.
Az OvisLink Corporation kijelenti, hogy az AirLive
IAS-2000 v2 megfelel az 1999/05/CE irányelv
alapvető követelményeinek és egyéb vonatkozó
rendelkezéseinek.
Niniejszym OvisLink Corp oświadcza, że AirLive
IAS-2000 v2 jest zgodny z zasadniczymi wymogami
oraz pozostałymi stosownymi postanowieniami
Dyrektywy 1999/5/EC.
OvisLink Corp declara que este AirLive IAS-2000 v2
está conforme com os requisitos essenciais e outras
disposições da Directiva 1999/5/CE.
OvisLink Corp izjavlja, da je ta AirLive IAS-2000 v2 v
skladu z bistvenimi zahtevami in ostalimi relevantnimi
določili direktive 1999/5/ES.
OvisLink Corp týmto vyhlasuje, že AirLive IAS-2000
v2 spĺňa základné požiadavky a všetky príslušné
ustanovenia Smernice 1999/5/ES.
OvisLink Corp vakuuttaa täten että AirLive IAS-2000
v2 tyyppinen laite on direktiivin 1999/5/EY oleellisten
vaatimusten ja sitä koskevien direktiivin muiden
ehtojen mukainen
Hér með lýsir OvisLink Corp yfir því að AirLive
IAS-2000 v2 er í samræmi við grunnkröfur og aðrar
kröfur, sem gerðar eru í tilskipun 1999/5/EC.
OvisLink Corp erklærer herved at utstyret AirLive
IAS-2000 v2 er i samsvar med de grunnleggende
krav og øvrige relevante krav i direktiv 1999/5/EF.
A copy of the full CE report can be obtained from the following address:
OvisLink Corp.
5F, No.6 Lane 130,
Min-Chuan Rd, Hsin-Tien City,
Taipei, Taiwan, R.O.C.
This equipment may be used in AT, BE, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, SK,
SI, ES, SE, GB, IS, LI, NO, CH, BG, RO, TR
This device uses software which is partly or completely licensed under the terms of the GNU General Public License. The author of the
software does not provide any warranty. This does not affect the warranty for the product itself.
To get source codes please contact: OvisLink Corp., 5F, No. 96, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C. A fee will be
charged for production and shipment for each copy of the source code.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public License is intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free Software Foundation software
is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to
surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the
software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal
permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no
warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we
have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it
may be distributed under the terms of this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee
is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by running the Program). Whether that is
true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and
give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection
in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all
of
these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any
change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the
Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running
for such interactive use in the most ordinary way, to print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if
the Program itself is interactive but does not normally print such an announcement, your work based on the Program
is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the
Program, and can be reasonably considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the
terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on
the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this
License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than
your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source
code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This
alternative is allowed only for noncommercial distribution and only if you received the program in object code or
executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable
work, complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place counts as distribution of the source code, even
though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not
accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a
license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a
consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you
could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest
validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to
time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,
write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to
the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of
preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software
generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS
IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to
where the full notice is found.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain
conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License.
Of course, the commands you use may be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright
disclaimer" for the program, if necessary. Here is
a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'
(which makes passes at compilers) written by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is
a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is
what you want to do, use the GNU Lesser General Public License instead of this License.
IAS-2000 v2
User’s Manual
Copyright
The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an
information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical,
magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
Trademarks
All products, company, brand names are trademarks or registered trademarks of their respective companies. They
are used for identification purpose only. Specifications are subject to be changed without prior notice.
FCC Interference Statement
The IAS-2000 v2 has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15
of the FCC Rules. These limits are designed to provide reasonable protection against radio interference in a
commercial environment. This equipment can generate, use and radiate radio frequency energy and, if not installed
and used in accordance with the instructions in this manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause interference, in which case the
user, at his own expense, will be required to take whatever measures are necessary to correct the interference.
CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility,
EN 55022:1998, EN 61000-3-2, EN 61000-3-3/A1, EN 55024/A1/A2, Class A.
.
1
IAS-2000 v2
User’s Manual
Contents
Chapter 1. Before You Start .....................................................................................................................................1
2.1Introduction of IAS-2000 v2..........................................................................................................................2
3.1Panel Function Descriptions...........................................................................................................................5
Chapter 5. Web Interface Configuration...............................................................................................................16
5.2.3Monitor IP List............................................................................................................................................56
5.2.4Walled Garden List .....................................................................................................................................58
5.2.5Proxy Server Properties ..............................................................................................................................59
5.3.3Black List Configuration.............................................................................................................................95
5.3.4Guest User Configuration...........................................................................................................................98
Appendix A. External Network Access...............................................................................................................141
Appendix B. Console Interface Configuration..................................................................................................143
Appendix C. Specifications.................................................................................................................................146
a.Hard ware Specification...................................................................................................................................146
Appendix D. Proxy Setting for Hotspot..............................................................................................................148
Appendix E. Proxy Setting for Enterprise..........................................................................................................151
.
ii
IAS-2000 v2
User’s Manual
Chapter 1. Before You Start
1.1 Audience
This manual is for Hotspot owners or administrators in enterpri ses to set up network environ ment using IAS-200 0 v2.
It contains step by step procedures and graphic examples to guide MIS staff or individuals with slight network
system knowledge to complete the installation.
1.2 Document Conventions
For any caution or warning that re quir es sp ecia l attention of readers, a highlight box with the eye-catching italic font
is used as below:
Warning: For security purposes, you should immediately change the Admi nistrator’s password.
Indicates that clicking this button will return to the homepage of this section.
Indicates that clicking this button will return to the previous page.
Indicates that clicking this button will apply all of your settings.
Indicates that clicking this button will clear what you set before these settings are applied.
.
1
IAS-2000 v2
User’s Manual
Chapter 2. Overview
2.1 Introduction of IAS-2000 v2
IAS-2000 v2 is a Network Access Control System specially designed for middle-scaled or large network
environments while retaining network efficiency. IAS-2000 v2 delivers “manageability”, “efficiency” and “friendly interface” and suits perfectly for campuses, libraries, gymnasiums, small and middle enterprises, factories,
Hotspots and community hospitals.
2.2 System Concept
IAS-2000 v2 is dedicatedly designed for controlling all network data passing through the system. The users under
the managed network must be authenticated to access the network beyond the managed area. The authentication
mechanism at the user’s end is provided by the IAS-2000 v2 server, and the SSL encryption is used to protect the
webpage. In the system, IAS-2000 v2 is responsible for authentication, authorization, and management functions.
The user account information is stored in the IAS-2000 v2 database, or other specified external authentication
databases.
The process of authenticating the user’s identity is executed via the SSL encrypted webpage. Using the web
interface, it can be ensured that the system is compatible to most desktop systems and palm computers. When a
user authentication is requested, the IAS-2000 v2 server software will check the authentication database at the rear
end to confirm the user’s access right. The authentication database can be the local dat abase of IAS-2000 v2 or any
external database that IAS-2000 v2 supports. If the user is not an authorized user, IAS-2000 v2 will refuse the user’s
2
.
IAS-2000 v2
User’s Manual
request for the access. In the meantime, IAS-2000 v2 will also continue blocking the user from accessing the
network. If the user is an authorized user, then IAS-2000 v2 will authorize the user with an appropriate access right,
so that the user can use the network. If the online user remains idle without using the network f or a time exceeding a
predetermined idle time on IAS-2000 v2 or the online user logs out of the system, IAS-2000 v2 will exit the working
stage of such user and terminate the user’s access right of the network.
The following figure provides a simple example of setti ng up a small enterprise n etwork. IAS-2000 v2 is set to control
a part of the company’s intranet. The whole managed network includes cable network users and wireless network
users. In the beginning, any user located at the managed network is unable to access the network resource without
permission. If the access right to the network beyond the managed area is required, an Internet browser such a s the
Internet Explorer must be opened and a connection to any website must be performed. When the browser attempts
to connect to a website, IAS-2000 v2 will force the browser to redirect to the user login webpage. The user must
enter the username and password for authentication. After the identity is authenticated successfully, the user will
gain proper access right defined on IAS-2000 v2.
Attention:Public LAN
Authentication is required for the users to get access of the network; And, Private LAN is referred to as the LAN
port with the authentication function disabled.
is
referred to as the LAN port with the authentication function enabled from where the
Another setup example is shown in the following figure. The WAN1 and WAN2 of IAS-2000 v2 simultaneously
supports the Switch of 802.3ad (Support Port Trunk), and the bandwidth of the Switch will be the sum of the WAN1
and WAN2 bandwidths, which aims at eliminating the bottleneck caused by the narrow bandwidth between
IAS-2000 v2 and the 802.3ad Switch.
3
.
IAS-2000 v2
User’s Manual
.
4
Chapter 3. Hardware Installation
3.1 Panel Function Descriptions
Front Panel
LED Color Status Description
POWER Green On Power on the device
Off BIOS running
Status LED Green
WAN1, LAN1,
WAN2, LAN2
(L)
WAN1, LAN1,
WAN2, LAN2
(R)
Orange Blink Sending / Receiving
Green
Orange On 1000 Mbps
Blink OS running
On System ready
Off 10 Mbps
On 100 Mbps
IAS-2000 v2
User’s Manual
Port Description
WAN1 / WAN2
LAN1 / LAN2
Console Port
Panel Button
LED: There are four kinds of LED, power, status, port speed and link/act, to indicate diff erent status of the system.
Console Port: The system can be configured via HyperTerminal. For example, if you need to set the Administrator’s
Password, you can connect a PC to this port as a Console Serial Port via a terminal connection program (such as
the super terminal with the parameters of 9600, 8, N, 1, None flow control) to change the Administrator’s Password.
LAN1/LAN2: The two LAN ports can be independently configured such that users cannot access Internet before
authentication. Thus, administrators can choose to force the authentication for users connected to these ports.
WAN1/WAN2: The two WAN ports are connected to a network which is not managed by the IAS-2000 v2 system,
and this port can be used to connect the ATU-Router of ADSL, the port of Cabl e Modem, or the Switch or Hub on the
Connect to Internet or Intranet
Connect to the open environment. It can be chosen to require authentication to
access network resources and Internet.
9-pin serial port connector to resume the factory defaults or reconfigures the
system.
LCD Panel to display system info and network interface info
LAN of a company.
.
5
Rear Panel
System Fan: Keep the machine cool.
Power Fan: Keep the power cool.
Power Socket: The power cord attaches here.
Power Switch: Turn on and off the machine.
3.2 Package Contents
IAS-2000 v2
User’s Manual
The standard package of IAS-2000 v2 includes:
y IAS-2000 v2 x 1
y CD-ROM x 1
y Power Cord x 1
y Ethernet Cable (Crossover) x 1
y Ethernet Cable (Straight) x1
y Console Cable x 1
y Accessory Packing x 1
3.3 System Requirement
y Standard 10/100BaseT including five network cables with RJ-45 connectors
y All PCs need to install the TCP/IP network protocol
.
6
3.4 Installation Steps
Please follow the following steps to install IAS-2000 v2:
1. Connect the power cord to the power socket on the rear panel.
2. Turn on the power switch on the rear panel. The Power LED will light up.
IAS-2000 v2
User’s Manual
3. Connect an Ethernet cable to one LAN port with the user authentication function enabled on the front panel.
The default port is LAN1 port. (Note: Authentication is requi red for the u sers to access the network via this LAN
port. The LAN port with authentication function is referred to as Public LAN.) Connect the other end of the
Ethernet cable to an AP or switch. The LED of this LAN port should be on to indicate a proper connection.
7
.
IAS-2000 v2
User’s Manual
4. Connect an Ethernet cable to one LAN port with the user authentication function disabled on the front panel.
The default port is LAN2 port. (Note: No authentication is required for the users to access the network via this
LAN port. The LAN port without authentication function is referred to as Private LAN and the administrator can
enter the administrative user interface to perform configurations via Private LAN.) Connect the other end of
the Ethernet cable to a client’s PC. The LED of this LAN port should be on to indicate a proper connection.
5. Connect an Ethernet cable to one of the WAN ports on the front panel. Connect the other end of the Ethernet
cable to ADSL modem, cable modem or a switch/hub of the internal network. The LED of this WAN should be
on to indicate a proper connection.
Attention: Usually a straight RJ-45 could be applied if IAS-2000 v2 is connected to a hub/computer which supports
automatic crossover, such as the Access Point. However, after the Access Point hardware reset, IAS-2000 v2
should not be able to connect to Access Point while connect ing with a straight cable unless t he cable wa s pulled out
and plug-in again. This scenario does NOT occur while using a crossover cable.
After the hardware of IAS-2000 v2 is installed completely, the system is ready to be configured in the following
sections. The manual will guide you step by step to set up the system using a single IAS-2000 v2 to manage the
network.
.
8
IAS-2000 v2
User’s Manual
Chapter 4. Network Configuration on PC
After IAS-2000 v2 is installed, the following configurations must be set up on the PC: Interne t Connection Setup
for Windows XP and TCP/IP Network Setup.
4.1. Internet Connection Setup for Windows XP
1. Choose Start > Control Panel > Internet Options.
2. Choose the “Connections” label, and then click
Setup.
.
9
3. ClickNext when Welcome to the New Connection
Wizard screen appears.
4. Choose “Connect to the Internet” and then click
Next.
IAS-2000 v2
User’s Manual
5. Choose “Set up my connection manually” and then
click Next.
.
10
6. Choose “Connect using a broadband connection
that is always on” and then click Next.
7. Finally, click Finish to exit the Connection Wizard.
Now, the setu p has been completed
IAS-2000 v2
User’s Manual
.
11
IAS-2000 v2
User’s Manual
4.2. TCP/IP Network Setup
If the operating system of the PC in use is Windows 95/98/ME/2000/XP, keep the default settings without any
change to directly start/restart the system. With the factory default settings, duri ng the process of st arting the system,
IAS-2000 v2 with DHCP function will automatically assign an appropriate IP address and related information for
each PC. If the Windows operating system is not a server version, the default settings of the TCP/IP will regard the
PC as a DHCP client, and this function is called “Obtain an IP address automatically”.
If checking the TCP/IP setup or use the static IP in the LAN1 or LAN2 section is needed, please follow the steps
below
Check the TCP/IP Setup of Window XP
1. Select Start > Control Panel > Network
Connections.
2. Click the right button of the mouse on the “Local Area
Connection” icon and select “Properties”
.
12
3. Select “General” label and choose “Internet Protocol
(TCP/IP)” and then click Properties. Now, choose to
use DHCP or specific IP address.
IAS-2000 v2
User’s Manual
4-1. Using DHCP: If using DHCP is desired, please cho o se
“Obtain an IP address automatically” and click OK.
This is also the default setting of Windows. Then,
reboot the PC to make sure an IP address is obtained
from IAS-2000 v2.
4-2. Using Specific IP Address: If using specific IP
address is desired, ask the network administrator for
the information of the IAS-2000 v2: IP address,
Subnet Mask, New gateway and DNS server
address.
Caution: If your PC has been set up completed, please inform the network administrator before modifying the
following setup.
.
13
y Please choose “Use the following IP
address:” and enter the information given from the network administrator in “IP address:” and
“Subnet mask:” as well as “Default gateway”
If the DNS Server column is blank, please
choose “Use the following DNS server addresses:” and then enter a known DNS
address or the DNS address provided by ISP
and then click OK.
IAS-2000 v2
User’s Manual
y Then, clickAdvanced in the window of
“Internet Protocol (TCP/IP) Properties”.
.
14
y Choose the “IP Settings” label and click “Add”
below the “Default gateways” column and the
“TCP/IP Gateway Address” window will
appear. Enter the gateway address of IAS-2000
v2 in the “Gateway:” of “TCP/IP Gateway Address” window, and then click Add. After
returning to the “IP Settings” label, click OK to
finish.
IAS-2000 v2
User’s Manual
.
15
IAS-2000 v2
User’s Manual
Chapter 5. Web Interface Configuration
This chapter will present further detailed settings. The followin g table shows all the functions of IAS-2000 v2.
OPTION
FUNCTION
System
Configuration
Configuration
Wizard
System
Information
WAN1
Configuration
WAN2 & Failover
LAN1
Configuration
LAN2
Configuration
IP Mobility
Network
Configuration
Network Address
Translation
Privilege List
Monitor IP List
Walled Garden
List
Proxy Server
Properties
Dynamic DNS Online Report
User
Authentication
Authentication
Configuration
Policy
Configuration
Black List
Configuration
Guest User
Configuration
Additional
Configuration
Utilities Status
Change Password System Status
Backup/Restore
Interface Status
Setting
Firmware Upgrade Current Users
Restart Traffic History
Notification
Configuration
Caution: After finishing the configuration of the settings, please click Apply and pay attention to see if a restart
message appears on the screen. If such message appears, system must be restarted to allow the settings to take
effect. All on-line users will be disconnected during restart.
After the basic installation shown previously has been completed, IAS-2000 v2 can be further configured with the
following steps
1. Use the network cable of the 10/100BaseT to connect a PC to the Private Port, and then start a browser (such
as Microsoft IE). Next, enter the gateway address for that port, the default is
https://192.168.2.254. In the
opened webpage, an administrative login page will appear. Enter “admin” as the default username and
password “airlive”. Click Enter to log in.
16
.
IAS-2000 v2
User’s Manual
Caution: If you can’t get the login page, you may have in correctly set your P C t o obtain an I P address au tom atically
from authentication LAN port or the IP address used does not have the same subnet as the URL. Please use default
IP address such as 192.168.2.xx in your network and then try it again.
2. After successfully logging into IAS-2000 v2, enter the web management interface and see the welcome page.
There is a Logout button on the upper right corner to log out the system.
17
.
IAS-2000 v2
User’s Manual
5.1 System Configuration
This section includes the following functions: Configuration Wizard, System Information, WAN1 Configuration,
WAN2 & Failover, LAN1 Configuration and LAN2 Configuration.
18
.
IAS-2000 v2
User’s Manual
5.1.1 Configuration Wizard (Also served as Quick Installation)
There are two ways to configure the system: using Configuration Wizard or change the setting by demands
manually. The Configuration Wizard has 7 steps providing a simple and easy way to set up IAS-2000 v2 and can be
served as Quick Installation. There are 7 steps as listed below:
1. Change Admin’s Password
2. Choose System’s Time Zone
3. Set System Information
4. Select the Connection Ty pe for WAN1 Port
5. Configure LAN1
6. Select Authentication Method
7. Restart
Now, click the System Configuration from the top menu and the System Configuration page will appear.
.
19
Then, click on Configuration Wizard and click the Run Wizard button to start the wizard.
yRunning the Wizard
A welcome screen that briefly introduces the 7 steps will
appear. Click Next to begin.
IAS-2000 v2
User’s Manual
yStep 1: Change Admin’s Password
Enter a new password for the admin account and retype
it in the verify password field (twenty-character
maximum and no spaces).
Click Next to continue.
.
20
yStep 2: Choose System’s Time Zone
Select a proper time zone via the pull-down menu.
Click Next to continue.
IAS-2000 v2
User’s Manual
yStep 3: Set System Information
Home Page: Enter the URL to where the clients should
be directed when they are properly authenticated.
NTP Server: Enter the URL of external time server for
IAS-2000 v2 time synchronization or use the default.
DNS Server: Enter a DNS Server provided by the ISP
(Internet Service Provider). Contact the ISP if the DNS
IP Address is unknown.
Click Next to continue.
yStep 4: Select the Connection Type for WAN1 Port
There are three types that WAN1 port supports: St atic IP Address, Dynamic IP Address and PPPoE Client.
Select a proper Internet connection type and click Next
to continue.
¾Dynamic IP Address
If this option is selected, an appropriate IP address
and related information will be assigned
automatically.
Click Next to continue.
21
.
¾ Static IP Address: Set WAN1 Port’s Static IP
Address
Enter the “IP Address”, “Subnet Mask” and
“Default Gateway” provided by the ISP.
Click Next to continue.
¾PPPoE Client: Set PPPoE Client’s Information
IAS-2000 v2
User’s Manual
Enter the “Username” and “Password” provided
by the ISP.
Click Next to continue.
yStep 5: Configure LAN1’s Information
IP Address: Enter the Public LAN port IP Address or
use the default.
Subnet Mask: Enter the Public LAN port Subnet Mask
or use the default.
Disable DHCP Server: If the DHCP server is disabled,
the clients in Public LAN must be configured with an IP
address manually.
Enable DHCP Server: When the option is selected,
IAS-2000 v2 will automatically provide the necessary IP
address to all clients in Public LAN.
Click Next to continue.
22
.
yStep 5: Set LAN1 DHCP Server
If Enable DHCP Server option is selected, fields marked
with red asterisk must be filled in.
Start IP Address: The start IP address that will be
assigned to the Public LAN clients.
End IP Address: The end IP address that will be
assigned to the Public LAN clients.
(Note: Be sure that IP addresses assigned from
Start IP address to End IP address are NOT used in
other settings by IAS-2000 v2.)
Domain Name: Enter a domain name provided by the
ISP (e.g. airlive.com).
IAS-2000 v2
User’s Manual
WINS Server: Enter the IP address of the WINS Server (Windows Internet Naming Service Server). This field
is optional.
Preferred DNS Server: The DNS Server settings are provided by the ISP. Only the Preferred DNS Server field
is mandatory. Contact the ISP if the DNS Server settings are unkn own.
Alternate DNS Server: The DNS Server settings are provided by the ISP. This field is optional.
Click Next to continue.
yStep 6: Select Default Authentica tion Server
Set the user’s information in advance. Enter an easy
identified name as the postfix name in the Postfix Name field (e.g. airlive) and choose an authentication
method.
Click Next to continue.
.
23
¾Local User- Add User
A new user can be added to the local user data
base. To add a user here, enter the Username (e.g.
test), Password (e.g. test), MAC (optional) and
assign it a policy (or use the default). Upon
completing a user adding, more users can be
added to this authentication method by clicking the
ADD bottom.
Click Next to continue.
¾POP3 User- Authentication Method-POP3
IAS-2000 v2
User’s Manual
Enter IP/Domain Name and server port of the POP3
server provided by the ISP, and then choose enable
SSL or not.
Click Next to continue.
¾RADIUS User- Authentication-RADIUS
Enter RADIUS server IP/Domain Name,
authentication port, accounting port and secret key.
Then choose to enable accounting service or not,
and choose the desired authentication method.
Click Next to continue.
.
24
¾LDAP User- Authentication Method-LDAP
Add a new user to the LDAP user data base. Enter
the “LDAP Server”, “Server Port” and “Base
DN” and select one kind of Binding Type and
Account Attribute to access the LDAP server .
If User Account binding type is selected, the
system will use the Base DN to be the user account
to access the LDAP server .
If Anonymous binding type is selected, the system
IAS-2000 v2
User’s Manual
will access the LDAP servers without requiring
authentication.
If Specified DN binding type is selected , username
and password in the “Bind RDN” and “Bind Password” fields must be entered to access the
LDAP server .
.
25
If Windows AD binding type is selected, please
enter the domain name of Windows AD to access
the LDAP server.
Click Next to continue.
¾NT Domain User- Authentication Method-NT
IAS-2000 v2
User’s Manual
Domain
When NT Domain User is selected, enter the
information for “Server IP Address”, and
enable/disable “Transparent Login”. After this
setup is completed, click Next to continue.
yStep 7: Restart
Click Restart to save the current settings and restart
IAS-2000 v2. The Setup Wizard is now completed.
.
26
IAS-2000 v2
User’s Manual
yDuring IAS-2000 v2 restart, a “Restarting now. Wait
for a minute.” message will appear on the screen.
Please do not interrupt IAS-2000 v2 until the message
has disappeared. This indicates that a complete and
successful restart proce ss has finished.
Caution: During every step of the wizard, if you wish to go back to modify the setting. Please click the Back button
to go back to the previous step.
.
27
IAS-2000 v2
User’s Manual
5.1.2 System Information
These are some main information about IAS-2000 v2. Please refer to the following description for these blanks:
y System Name: Set the system’s name or use the default.
y Device Name: FQDN (Fully-Qualified Domain Name). This is used as the domain name used in login p age. For
example, if Device Name=IAS-2000v2.com, the URL of login page will be
https://IAS-2000v2.com/loginpages/login.shtml
yHome Page: Enter the website of a Web Server to be the homepage. When users log in successfully, they will
be directed to the homepage set here. Usually, the homepage is the company’s website or a popular website,
such as
redirect to this page after login.
http://www.airlive.com. Regardless of the original webpage set in the users’ computer, they will be
yRemote Management IP: Set a specific IP or the IP range or subnet with a system which is able to connect to
the web management interface via the WAN port. For example, 10.2.3.0/24 means that as long as an
administrator is within the IP address range of 10.2.3.0/24, user can reach the administration page of IAS-2000.
ySNMP: IAS-2000 v2 supports SNMPv2 and SNMPv3. If the function is enabled, assign the Manager IP and the
community of SNMPv2 and SNMPv3 to access the management information base (MIB) of the system.
yUser Logon SSL: Enable SSL when user login with encryption to have a safer login process.
28
.
IAS-2000 v2
User’s Manual
ySystem Time: IAS-2000 v2 supports NTP communication protocol to synchronize the network time. Please
specify the IP address of a NTP server and select the desi red time zone in the system configuration interfa ce for
adjusting the time automatically. (Universal Time is Greenwich Mean Time, GMT). Time can also be set
manually when by selecting “Set Device Date and Time”. Please enter the date and time for these fields.
yHistory Report Interval: T i me interval for sending the history notice.
.
29
IAS-2000 v2
User’s Manual
5.1.3 WAN1 Configuration
There are 3 methods that WAN1 Port supports: Static IP Address, Dynamic IP Address, and PPPoE Client.
yStatic IP Address: Manually specifying the IP address of the WAN1 Port which is applicable for the network
environment where the DHCP service is unavailable. The option of 802.3ad for WAN2 is only available when
WAN1 is using a static IP address. The fields with red asterisks are required. Please fill in these fields.
¾ IP Address: The IP address of the WAN1 port.
¾ Subnet Mask: The subnet mask of the WAN1 port.
¾ Default Gateway: The gateway of the W A N1 port.
¾ Preferred DNS Server: The primary DNS Server of the W A N1 port.
¾ Alternate DNS Server: The substitute DNS Server of the WAN1 port. This is not required.
¾ Enable Bridge Mode: WAN1 is set to use a static IP address and “Enable Bridge Mode” is checked,
WAN2 and all LAN ports will share the WAN1 IP address an d go into bridge mode as well. See the following
figures. The PC connected to LAN1 or LAN 2 must be set to static IP address manually, or it can receive the
IP address from upper DHCP server via WAN1. The IP address they received is the same IP subnet with
WAN1 IP.
.
30
IAS-2000 v2
User’s Manual
yDynamic IP address: It is only applicable for the network environment where the DHCP Server is available in
the network. Click the Renew button to get an IP address.
31
.
IAS-2000 v2
User’s Manual
yPPPoE Client: When selecting PPPoE to connect to the network, please enter the “Username” and
“Password”. There is a Dial on demand function under PPPoE. If this function is enabled, you can set a
Maximum Idle Time. When the idle time is reached, the system will automatically disconnect itself.
32
.
IAS-2000 v2
User’s Manual
5.1.4 WAN2 & Failover
There are 3 methods of obtaining an IP address for the WAN2 Port: None, Static IP Address, and Dynamic IP
Address.
y None: The W A N2 Port is not functional.
¾ Warning of Internet Disconnection: Enable to dete ct the WAN1 port connection status.
y Static IP Address: Specify the IP Address, Subnet Mask, Default Gateway of WAN2 Port and Preferred DNS
Server, which should be applicable for the network environment. Up to three URLs can be entered. Check
“Warning of Internet Disconnection” to work with the WAN Failover function.
¾ WAN Failover: When WAN1 connection fails, the traffic will be routed to WAN2 automatically.
¾ Fallback to WAN1 when possible: When WAN1 connection is recovered, the routed traffic will be back to
WAN1.
33
.
IAS-2000 v2
User’s Manual
yDynamic IP Address: Select this when WAN2 Port can obtain IP address automatically, such as a DHCP
Server available from WAN2 Port. Up to three URLs can be entered. Check “Warning of Internet Disconnection” to work with the WANFailover function.
34
.
User’s Manual
For Dynamic IP Address, WAN Failover and Fallback to WAN1 when possible also can be enabled like as
the function for Static IP Address. If Warning of Internet Disconnection is enabled, a warning message can
be entered to indicate what the system should display when Internet connection is down.
IAS-2000 v2
.
35
IAS-2000 v2
User’s Manual
5.1.5 LAN1 Configuration
User authentication can be chosen to enable or disable in LAN1 port. In this part, you can set the related
configurations about LAN1 port and DHCP server.
36
.
y DHCP Server Configuration
¾ Disable DHCP Server: Disable the function of the DHCP Server.
IAS-2000 v2
User’s Manual
¾Enable DHCP Server: Enter proper setting of Start IP Address, End IP Address, Preferred DNS Server,
Alternate DNS Server, Domain Name, WINS Server, Lease Time, and Reserved IP Address List. See the
following figure. Fields marked with red asterisks must be filled in.
37
.
IAS-2000 v2
User’s Manual
Reserved IP Address List: Click on the Reserv ed IP Address List on the management inte rface to
fill in the reserved IP addresses if desired. Then, the setup of the Reserved IP Address List as shown
in the following figure will appear. Enter the related Reserved IP Address, MAC, and Description (not
compulsory). When finished, click Apply to complete the setup.
¾Enable DHCP Relay:Specify other DHCP Server IP address if using DHCP Relay is desired. See the
following figure.
38
.
IAS-2000 v2
User’s Manual
yEnable VLAN: If you want to split LAN1 to several VLANs, please select the Enable VLAN. After Enable VLAN
is selected, the following screen will appear. Choose the desired Item and click Edit for further configuration.
See the following figure.
The system will need confirmation for enabling individual VLAN segment. Click Enable to continue. See the
following figure.
After enabling this VLAN segment, the following screen will appear. See the following description and figure for
details.
.
39
yEnable User Authentication (on this individual VLAN):
IAS-2000 v2
User’s Manual
¾ Enable: Enable this VLAN segment.
¾ Enable User Authentication: Choose to enable or disable user authentication for this individual VLAN
segment.
¾ VLAN T ag : Enter any integ er number within the range of 2~4094 as the Tag for this VLAN segment.
¾ Mode: Two modes are provided: NAT mode and ROUTER mode.
NAT: All IP addresses externally connected through the VLAN port (these IP addresses must belong
to the same network of the VLAN port) will be converted into the IP address of the WAN1 port
by IAS-2000 v2 and onward to outside the network.
Router: All IP addresses externally connected through the VLAN port use its original IP addresses
for external connection. Thus, IAS-2000 v2 acts like a Router.
¾ IP Address: Enter the desired IP address for this VL AN.
¾ Subnet Mask: Enter the desired Subnet Mask for this VLAN.
.
40
IAS-2000 v2
User’s Manual
y VLAN DHCP Configuration
¾ Disable DHCP Server: Disable the function of the DHCP Server of IAS-2000 v2.
¾ Enable DHCP Server: If you want to use the DHCP Server function of IAS-2000 v2, set proper
configurations is necessary. Related information needed on setting up the DHCP Server is described as
follows: Start IP Address, End IP Address, Preferr ed DNS Server, Alternate DNS Server, Domain Name, WINS Server, Lease Time, and Reserved IP Address List. See the following figure.
41
.
IAS-2000 v2
User’s Manual
Reserved IP Address List: If you want to use the reserved IP address function, click on the
Reserved IP Address List on the management interface. Then, the setup of the Reserved IP
Address List as shown in the following figure will appear. Enter the related Reserved IP Address,
MAC, and Description (not compulsory). When finished, click Apply to complete the setup.
¾Enable DHCP Relay: If you want to enable this function, you must specify a DHCP Server IP address. See
the following figure.
42
.
5.1.6 LAN2 Configuration
User authentication can be chosen to enable or disable in LAN2 port. In this part, you can set the related
configurations about LAN2 port and DHCP server.
IAS-2000 v2
User’s Manual
43
.
y DHCP Server Configuration
¾ Disable DHCP Server: Disable the function of the DHCP Server.
IAS-2000 v2
User’s Manual
¾Enable DHCP Server: Enter proper setting of Start IP Address, End IP Address, Preferred DNS Server,
Alternate DNS Server, Domain Name, WINS Server, Lease Time, and Reserved IP Address List. See the
following figure. Fields marked with red asterisks must be filled in.
44
.
IAS-2000 v2
User’s Manual
Reserved IP Address List: Click on the Reserv ed IP Address List on the management inte rface to
fill in the reserved IP addresses if desired. Then, the setup of the Reserved IP Address List as shown
in the following figure will appear. Enter the related Reserved IP Address, MAC, and Description (not
compulsory). When finished, click Apply to complete the setup.
¾Enable DHCP Relay:Specify other DHCP Server IP address if using DHCP Relay is desired. See the
following figure.
45
.
IAS-2000 v2
User’s Manual
yEnable VLAN: If you want to split LAN2 to several VLANs, please select the Enable VLAN. After Enable VLAN
is selected, the following screen will appear. Choose the desired Item and click Edit for further configuration.
See the following figure.
The system will need confirmation for enabling individual VLAN segment. Click Enable to continue. See the
following figure.
After enabling this VLAN segment, the following screen will appear. See the following description and figure for
details.
yEnable User Authentication (on this individual VLAN):
46
.
IAS-2000 v2
User’s Manual
¾ Enable: Enable this VLAN segment.
¾ Enable User Authentication: Choose to enable or disable user authentication for this individual VLAN
segment.
¾ VLAN T ag : Enter any integ er number within the range of 2~4094 as the Tag for this VLAN segment.
¾ Mode: Two modes are provided: NAT mode and ROUTER mode.
NAT: All IP addresses externally connected through the VLAN port (these IP addresses must belong
to the same network of the VLAN port) will be converted into the IP address of the WAN1 port
by IAS-2000 v2 and onward to outside the network.
Router: All IP addresses externally connected through the VLAN port use its original IP addresses
for external connection. Thus, IAS-2000 v2 acts like a Router.
¾ IP Address: Enter the desired IP address for this VL AN.
¾ Subnet Mask: Enter the desired Subnet Mask for this VLAN.
y VLAN DHCP Configuration
¾ Disable DHCP Server: Disable the function of the DHCP Server of IAS-2000 v2.
¾ Enable DHCP Server: If you want to use the DHCP Server function of IAS-2000 v2, set proper
configurations is necessary. Related information needed on setting up the DHCP Server is described as
follows: Start IP Address, End IP Address, Preferr ed DNS Server, Alternate DNS Server, Domain Name, WINS Server, Lease Time, and Reserved IP Address List. See the following figure.
47
.
IAS-2000 v2
User’s Manual
Reserved IP Address List: If you want to use the reserved IP address function, click on the
Reserved IP Address List on the management interface. Then, the setup of the Reserved IP
Address List as shown in the following figure will appear. Enter the related Reserved IP Address,
MAC, and Description (not compulsory). When finished, click Apply to complete the setup.
¾Enable DHCP Relay: If you want to enable this function, you must specify a DHCP Server IP address. See
the following figure.
48
.
IAS-2000 v2
User’s Manual
5.2 Network Configuration
This section includes the following functions: Network Address Translation, Privilege List, Monitor IP List,
Walled Garden List, Proxy Server Properties, Dynamic DNS and IP Mobility.
.
49
IAS-2000 v2
User’s Manual
5.2.1 Network Address Translation
There are three parts, DMZ, Virtual Servers and Port and IP Redirect, need to be set.
yDMZ
DMZ (De-Militarized Zone) allows administrators to define mandatory external to internal IP mapping; hence a
user on WAN side network can access the private machine via the external IP (similar to DMZ usage in firewall
product). There are 40 sets of static Internal IP Address and External IP Address available. If a host needs a
static IP address to access the network through WAN port, set a static IP for the host. These settings will
become effective immediately after clicking the Apply button.
50
.
IAS-2000 v2
User’s Manual
yVirtual Servers
This function allows the administrator to set 40 virtual servers at most, so that the computers not belonging to
the managed network can access the servers in the managed network via WAN port IP of IAS-2000 v2. Please
enter the “External Service Port”, “Local Server IP Address” and “Local Server Port”. According to the
different services provided, the network service can use the TCP protocol or the UDP protocol. In the Enable
column, check the desired server to enable. These settings will become effective immediately after clicking the
Apply button.
yPort and IP Redirection
This function allows the administrator to set 40 sets of the IP addresses at most for redirection purpose. When
the user attempts to connect to a destination IP address listed here, the connection p acket will be converted and
redirected to the corresponding destination. Please enter the “IP Address” and “Port” of Original Destination,
and the “IP Address” and “Port” of Redirect to. According to the different services provided, choose the
“TCP” protocol or the “UDP” protocol. These settings will become ef fective immediately after clicking Apply.
51
.
IAS-2000 v2
User’s Manual
52
.
IAS-2000 v2
User’s Manual
5.2.2 Privilege List
There are two parts, Privilege IP Address List and Privilege MAC Address List, need to be set.
yPrivilege IP Address List
If there are some workstations belonging to the managed server that need to access the network without
authentication, and enter the IP addresses of these workstations in this list. The “Remark” blank is not
necessary but is useful to keep track. IAS-2000 v2 allows 100 privilege IP addresses at most. These settings will
become effective immediately after clicking Apply.
Warning: Permitting specific IP addresses to have network access rights without going through standard
authentication process at the authenticated LAN may cause se curity problems.
53
.
IAS-2000 v2
User’s Manual
yPrivilege MAC Address List
In addition to the IP address, the MAC address of the workstations that need to access the network without
authentication can also be set in this list. IAS-2000 v2 allows 100 privilege MAC addresses at most. The list can
be created by entering data in the table or by import from a file. The list can be exported as well.
Be sure to enter the MAC address (the format is xx:xx:xx:xx:xx:xx) as well as the remark (not necessary) if
manually creating the list is desired, and select a policy for the individual entry. These settings will become
effective immediately after clicking Apply.
Attention: No matter how you choose to create the list, you must select an Access Gateway first.
Warning: Permitting specific MAC addresses to have network access rights without going through standard
authentication process at the authenticated LAN may cause se curity problems.
54
.
IAS-2000 v2
User’s Manual
¾ Import List: Select an Access Gateway and then click Import Listto enter the Upload Privilege MAC
Address List interface. Click the Browse button to select the text file for the user account upload. Then click
Submit to complete the upload.
The uploading file should be a text file and
the format of each line is " MAC, Policy, Remark" without the quotes.
There must be no spaces between the fields and commas. The MAC field could be omitted but the trailing
comma must be retained. When adding user accounts by uploading a file, the existing accounts in the
embedded database will not be replaced by new ones.
¾Export List: Click this to
export the Mac List to create a .txt file and then save it on disk.
55
.
IAS-2000 v2
User’s Manual
5.2.3 Monitor IP List
The system will send out a packet periodically to monitor the connection status of the IP addresses on the list. If the
monitored IP address does not respond, the system will send an e-mail to notify the administrator that such
destination is not reachable. After entering the related information, click Apply and these settings will become
effective immediately. Click Monitor to check the current status of all the monitored IP. The system provides 40 IP
addresses a most on the “Monitor IP List”.
ySend From: The e-mail address of the administrator in charge of the monitoring. This will show up as the
sender’s e-mail.
y Send To: The e-mail address of the person whom the monitoring result is for. This will be the receiver’s e-mail.
y Interval: The time interval to send the e-mail report.
y SMTP Server: The IP address of the SMTP server .
56
.
IAS-2000 v2
User’s Manual
yAuth Method: The system provides four authentication methods, PLAIN, LOGIN, CRAM-MD5 and NTLMv1, or
“NONE” to use none of the above. Depending on which authentication method selected, enter the Account
Name, Password and Domain.
y Send Test Email: Click “Send” to send out a test e-mail of the IP monitoring report.
y IP Address: The IP addresses under monitoring.
In the Monitor IP result page, green light means the IP address is alive and reachable. On the other hand, red light
means the IP address is not reachable now. The administrator can understand the some networking devices by this
feature.
.
57
IAS-2000 v2
User’s Manual
5.2.4 Walled Garden List
This function provides some free services to the users to access websites listed here before login and authe ntication.
Up to 20 addresses or domain names of the websites can be defined in this list. Users without the network access
right can still have a chance to experience the actual network service free of charge. Please enter the website IP Address or Domain Name in the list and these settings will become effective immediately after clicking Apply.
58
.
IAS-2000 v2
User’s Manual
5.2.5 Proxy Server Properties
IAS-2000 v2 supports Internal Proxy Server and External Proxy Server functions. Please perform the necessary
configurations.
yInternal Proxy Server: IAS-2000 v2 has a built-in proxy server. If this function is enabled, the end users will be
forced to treat IAS-2000 v2 as the proxy server regardless of the end-users’ o riginal proxy settings.
yExternal Proxy Server: Under the IAS-2000 v2 security management, the system will match the External Proxy
Server list to the end-users’ proxy setting. If there isn’t a matching, then the end-users will no be able to reach
the login page and thus unable to access the network. If there is a matching, then the end-users will be directed
to the system first for authentication. After a successful authentication, the end-users will be redirected back to
the desired proxy servers depending on various situations.
Please click Apply and these settings will become effective immediately.
For more details about how to set proxy servers, please see Appendix D and E.
59
.
IAS-2000 v2
User’s Manual
5.2.6 Dynamic DNS
IAS-2000 v2 provides a convenient DNS function to translate the IP address of WAN port to a domain name that
helps the administrator memorize and connect to WAN port. If the DHCP is activated at WAN port, this function will
also update the newest IP address regularly to the DNS server. These settings will become effective immediately
after clicking Apply.
y DDNS: Enabling or disabling of this function.
y Provider: Select the DNS provider.
y Host name: The IP address/domain name of the WAN port.
y Username/E-mail: The register ID (username or e-mail) for the DNS provider.
y Password/Key: The register password for the DNS provider.
Please click Apply and these settings will become effective immediately.
.
60
IAS-2000 v2
User’s Manual
5.2.7 IP Mobility
yIP PNP
Clients can use any IP address to connect to the syst em. Regardless of what the IP address at the client end is,
he or she can still authenticate through IAS-2000 v2 and access the network.
yMobile IP
If several sets of IAS-2000 v2 are used to construct a network environment, a client can use the same group of
IP configurations. When a client roams into different locations, the connection will be kept alive; therefore no
disconnection will occur when, for example, downloading data.
.
61
IAS-2000 v2
User’s Manual
5.3 User Authentication
This section includes the following functions: Authentication Configuration, Policy Configuration, Black List
Configuration, Guest User Configuration and Additional Configuration.
62
.
IAS-2000 v2
User’s Manual
5.3.1 Authentication Configuration
This function is to configure the settings for different authentication servers. The system provides 10 servers (Local,
POP3, RADIUS, LDAP and NT Domain), one On-demand User and one PMS User that the administrator can apply
with different policies. Click on the server name to set the related configurations for that particular server. After
completing and clicking Apply to save the settings, go back to the previous screen to choose a server to be the
default server and enable or disable any server on the list.
.
63
5.3.1.1 Local Server
This server is only for “Local User” and the authentication method can not be changed for this server.
IAS-2000 v2
User’s Manual
yServer Name: Set a name for the server using numbers (0 to 9), alphabets (a to z or A to Z), dash (-),
underline (_) and dot (.) with a maximum of 40 characters, all other letters are not allowed.
y Sever Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yBlacklist: There are five sets of the black lists. Select one of them or choose “None”. Please refer to 5.3.3
Black List Configuration
y Local User Account: Click the Local User Setting hyperlink to set the further configuration.
y Policy Name: There are ten policies to choose from to apply to this particular server.
.
64
Click the Local User Setting hyperlink for further configuration.
yEdit Local User List: Click this to enter the“Local User List” screen.
IAS-2000 v2
User’s Manual
¾ Add User: Click this button to enter the Add User page. Fill in the necessary information such as
“Username”, “Password”, “MAC” (optional) and “Remark” (optional). Select a desired Maximum
Bandwidth, Request Band width and Policy.
65
.
Click Apply to complete adding the user or users
IAS-2000 v2
User’s Manual
¾Import User: Click this to enter the Upload UserAccount page. Click the Browse button to select the text
file for the user account upload. Then click Submit to complete the upload process.
66
.
IAS-2000 v2
User’s Manual
The uploading file should be a text file and the format of each line is "ID, Password, MAC, Policy , Remark" or
“ID, Password, MAC, Max bandwidth, Request bandwidth, Policy, Remark” without the quotes. There
must be no spaces between the fields and commas. The MAC field could be omitted but the trailing comma
must be retained. When adding user accounts by uploading a file, the existing accounts in the embedded
database will not be replaced by new ones.
67
.
¾Export List: Click this to create a .txt file and then save it on disk.
IAS-2000 v2
User’s Manual
¾Refresh: Click this to refresh the list.
68
.
IAS-2000 v2
User’s Manual
¾Search: Enter a keyword of a username to be searched in the text filed and click this button to perform the
search. All usernames matching the keyword will be listed.
¾ Del All: This will delete all the users at once.
¾ Delete: This will delete the users individually.
¾ Edit User: If editing the content of individual user account is needed, click the username of the desired user
account to enter the Edit User Interface for that particular user, and then modify or add any desired
information such as “Username”, “Password”, “MAC”, “Maximum Bandwidth”, “Request Bandwidth”,
“Policy” and “Remark” (optional) . Then, click Apply to complete the modification.
.
69
IAS-2000 v2
User’s Manual
yRadius Roaming Out / 802.1x Authentication: These 2 functions can be enabled or disabled by checking the
radio button. Checking either of them makes the hyperlink called Radius Client List show up.
Click the hyperlink of Radius Client List to enter the Radius Client Configuration interface. Choose the
desired type, Disable, Roaming Out or 802.1x and key in the relat ed dat a and then cli ck Apply to complete the
settings.
¾Radius Roaming Out: When “Radius Roaming Out” is selected, local users can login from other domai n s
by using their original accounts.
¾802.1x Authentication: 802.1x is a security standard for wired and wireless LANs. It encapsulates EAP
(Extensible Authentication Protocol) processes into Ethernet packets instead of using the protocol's native
PPP (Point-to-Point Protocol) environment, thus reducing some network overhead. It also puts the bulk of
the processing burden upon the client (called a supplicant in 802.1x parlance) and the authentication server
(such as a RADIUS), letting the "authenticator" middleman simply pass the packets back and forth.
70
.
IAS-2000 v2
User’s Manual
5.3.1.2 POP3 Server
POP3, RADIUS, LDAP and NT Domain Server can be chosen to be the authentication method. Choose “POP3” in
the Authentication Method field, the hyperlink beside the pull-down menu will become “POP3 Setting”.
yServer Name: Set a name for the server using numbers (0 to 9), alphabets (a to z or A to Z), dash (-),
underline (_) and dot (.) with a maximum of 40 characters, all other letters are not allowed.
y Sever Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yBlacklist: There are five sets of the black lists. Select one of them or choose “None”. Please refer to 5.3.3
Black List Configuration
yAuthentication Method: There are four authentication methods, POP3, Radius, LDAP and NTDomain to
configure from. Select the desired method and then click the link besides the pull-down menu for more
advanced configuration.
yPolicy Name: There are ten policies to choose from to apply to this particular server.
.
71
IAS-2000 v2
User’s Manual
Click the hyperlink of POP3 Setting for further configuration. Enter the related information for the primary server
and/or the secondary server (the secondary server is not required). The blanks with red asterisks are necessary
information. These settings will become effective immediately after clicking the Apply button.
y Server IP: Enter the IP address/domain name given by the ISP.
y Port: Enter the Port given by the ISP. The default value is 110.
y SSL Setting: If this option is enabled, the POP3 protocol will perform the authentication.
.
72
IAS-2000 v2
User’s Manual
5.3.1.3 Radius Server
Choose “Radius” in the Authentication Method field, the hyperlink beside the pull-down menu will become
“RADIUS Setting”.
yServer Name: Set a name for the server using numbers (0 to 9), alphabets (a to z or A to Z), dash (-),
underline (_) and dot (.) with a maximum of 40 characters, all other letters are not allowed.
y Sever Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yBlacklist: There are five sets of the black lists. Select one of them or choose “None”. Please refer to 5.3.3
Black List Configuration
yAuthentication Method: There are four authentication methods, POP3, Radius, LDAP and NTDomain to
configure from. Select the desired method and then click the link besides the pull-down menu for more
advanced configuration.
yPolicy Name: There are ten policies to choose from to apply to this particular server.
.
73
IAS-2000 v2
User’s Manual
Click the hyperlink of RADIUS Setting for further configuration. The Radius server sets the external authentication
for user accounts. Enter the related information for the primary server and/or the secondary server (the secondary
server is not required). The blanks with red asterisks are necessary information. These settings will become
effective immediately after clicking the Apply button.
y802.1X Authentication: Enable this function and the hyperlink of Radius Client List will appear. Click the
hyperlink to get into the Radius Client Configuration list for further configuration. Please refer to Radius Roaming Out/802.1x Authentication in 5.3.1.1 Local User.
yTrans Full Name: When e nable d, the ID and po stfix will be transferred to the RADIUS server for authentication.
When disabled, only the ID will be transferred to RADIUS server for authentication.
y Server IP: Enter the IP address/domain name of the RADIUS server.
y Authentication Port: Enter the authentication port of the RADIUS server and the default valu e is 1812.
y Accounting Port: Enter the accounting port of the RADIUS server and the default value is 1813.
y Secret Key: Enter the key for encryption and decryption.
y Accounting Service: Select this to enable or disable the “Accounting Service” for accounting capabilities.
y Authentication Protocol: There are two methods, CHAP and PAP for selection.
Notice: If Radius Server does not assign idle-timeout value, IAS-2000 v2 will use the local idle-timeout instead.
74
.
IAS-2000 v2
User’s Manual
5.3.1.4 LDAP Server
Choose “LDAP” in the Authentication Method field, the hyperlink beside the pull-down menu will become “LDAP
Setting”.
yServer Name: Set a name for the server using numbers (0 to 9), alphabets (a to z or A to Z), dash (-),
underline (_) and dot (.) with a maximum of 40 characters, all other letters are not allowed.
y Sever Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yBlacklist: There are five sets of the black lists. Select one of them or choose “None”. Please refer to 5.3.3
Black List Configuration
yAuthentication Method: There are four authentication methods, POP3, Radius, LDAP and NTDomain to
configure from. Select the desired method and then click the link besides the pull-down menu for more
advanced configuration.
yPolicy Name: There are ten policies to choose from to apply to this particular server.
.
75
IAS-2000 v2
User’s Manual
Click the hyperlink of LDAP Setting for further configuration. Enter the related information for the primary server
and/or the secondary server (the secondary server is not required). The blanks with red asterisks are necessary
information. These settings will become effective immediately after clicking the Apply button.
y Server IP: Enter the IP address/domain name of the LDAP server.
y Port: Enter the Port of the LDAP server, and the default value is 389.
y Base DN: Enter the distinguished name of the LDAP server.
y Binding Ty pe: There are four binding types, User Ac count, Anonymous, Specific DN and Windows AD to select.
¾ User Account: Use the user account’s login usernam e and p a ssword of the syst em, and th en sele ct one
Account Attribute (UID, CN or sAMAccountName) to access the LDAP server.
76
.
IAS-2000 v2
User’s Manual
¾Anonymous: Access the LDAP servers without requiring authentication but only select one Account
Attribute (UID, CN or sAMAccountName).
¾Specified DN: Enter more information for the specific DN username and password in the “Bind RDN”
and “Bind Password” fields, and then select one Ac count Attribute (UID, CN or sAMAccountName) to
access the LDAP server.
¾Windows AD: Enter the domain name of Windows AD to access the LDAP server.
.
77
IAS-2000 v2
User’s Manual
5.3.1.5 NT Domain Server
Choose “NTDomain” in the Authentication Method field, the hyperlink beside the pull-down menu will become “NT Domain Setting”.
yServer Name: Set a name for the server using numbers (0 to 9), alphabets (a to z or A to Z), dash (-),
underline (_) and dot (.) with a maximum of 40 characters, all other letters are not allowed.
y Sever Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yBlacklist: There are five sets of the black lists. Select one of them or choose “None”. Please refer to 5.3.3
Black List Configuration
yAuthentication Method: There are four authentication methods, POP3, Radius, LDAP and NTDomain to
configure from. Select the desired method and then click the link besides the pull-down menu for more
advanced configuration.
yPolicy Name: There are ten policies to choose from to apply to this particular server.
Click the hyperlink of NT Domain Setting for further configuration. Enter the server IP address and enable/disable
the transparent login function. These settings will become effective immediately after clicking the Apply button.
y Server IP address: Enter the server IP address of the NT domain controller.
y Transparent Login: If this function is enabled, when users log into the Windows domain, they will log into
IAS-2000 v2 automatically.
78
.
IAS-2000 v2
User’s Manual
5.3.1.6 On Demand User
This is for the customer’s need in a store environment. When the customers need to use wireless Internet in the
store, they have to get a printed receipt with username and passwo rd from the st ore to log in the system for wirel ess
access. There are 2000 On-demand User accounts available.
y Server Status: The status shows that the server is enabled or disabled.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
yReceipt Header: There are two fields, Receipt Header 1 and Receipt Header 2 , for the receipt’ s head er. Enter
receipt header message or use the default.
y Receipt Footer: Enter receipt footer message here or use the default.
y Monetary Unit: Select the desired monet ary unit for a region or input the needed monetary unit if not listed.
y Policy Name: Select a policy for the on-demand user.
y WLAN ESSID: Enter the ESSID of the AP.
y WEP Key: Enter the WEP key of the AP.
y Remark: Enter any additional information that will appear at the bottom of the receipt.
y Billing Notice Interval: While the on-demand user is still logged in, the system will update the billing notice of
the login successful page by the time interval defined here.
79
.
IAS-2000 v2
User’s Manual
yUsers List: Click to enter the On-demand User List screen. In the On-demand User List, detailed information
will be documented here. By default, the On-demand user database is empty.
¾Search: Enter a keyword of a username to be searched in the text filed and click this button to perform
the search. All usernames matching the keyword will be listed.
¾ Username: The login name of the on-demand user.
¾ Password: The login password of the on-demand user.
¾ Remain Time/Volume: The total time/Volume that the user can use currently.
¾ Status: The status of the account. Normal indicates that the account is not in-use and not overdue.
Online indicates that the account is in-use and not overdue. Expire indicates that the account is overdue
and cannot be used.
¾ Expire Time: The expiration time of the account.
¾ Delete All: This will delete all the users at once.
¾ Delete: This will delete the users individually.
.
80
IAS-2000 v2
User’s Manual
yBilling Configuration: Click this to enter the Billing Configuration screen. In the Billing Configuration page,
Administrator may configure up to 10 billing plans.
¾ Status: Select to enable or disable this billing plan.
¾ Type: Set the billing plan by “Data” (the maximum volume allowed is 999,999 Mbyte) or “Time” (the
maximum days allowed is 999 Hrs).
¾Expired Info: This is the duration of time that the user can use the account after the generation of the
account. If the account is not activated during this duration, the account will self-expire.
¾Valid Duration: This is the duration of time that the user can use the account after the activation of the
account. After this duration, the account will self-expire.
¾Price: The price charged for this billing plan.
.
81
y Create On-demand User: Click this to enter the On-demand User Generate page.
¾ Pressing the Create button for the desired plan, an On-demand user will be created, then click Printout
to print a receipt which will contain this on-demand user’s information. There are 2000 On-demand user
accounts available.
IAS-2000 v2
User’s Manual
82
.
IAS-2000 v2
User’s Manual
5.3.1.7 PMS User
The system integrates a hotel in-door billing system, PMS, developed by Micros Fidelio, and it is usually used in the
hotel environment. When the customers need to use wireless Internet in the hotel, they have to get printed receipts
with usernames and passwords from the hotel to log in the system for wireless access.
y Server Status: The status shows that the server is enabled or disabled.
y PMS Server IP: Enter the IP address of the PMS server.
y PMS Server Port: Enter the Port of the PMS server.
y Postfix: Set a postfix that is easy to distinguish (e.g. Local) for the server by using numbers (0 to 9), alphabets
(a to z or A to Z), dash (-), underline (_) and dot (.) with a maximum of 40 characters, all other letters are not
allowed.
y Policy Name: There are ten policies to select from.
y Receipt Header: There are two fields, Receipt Header 1 and Receip t Header 2, for the receipt’s header.
Enter receipt header message or use the default.
y Receipt Footer: Enter receipt footer message here or use the default.
y WLAN ESSID: Enter the ESSID of the AP.
y WEP Key: Enter the WEP key of the AP.
y Remark: Enter any additional information that will appear at the bottom of the receipt.
y Users List: Click to enter the PMS User List page. In the PMS User List page, detailed information will be
documented here. By default, the PMS user database is empty.
.
83
User’s Manual
¾Search: Enter a keyword of a username to be searched in the text filed and click this button to perform
the search. All usernames matching the keyword will be listed.
¾ Room No.: The room number of the PMS user.
¾ User Name: The login name of the PMS user.
¾ Password: The login password of the PMS user.
¾ Remain Time: The total Time/Volume th at the user can use currently.
¾ Status: The status of the account. Normal indicates that the account is not in-use and not overdue.
IAS-2000 v2
Online indicates that the account is in-use and not overdue. Expire indicates that the account is overdue
and cannot be used.
¾Expire/Valid Time: The Valid Time indicates the duration of time that the user can use the Internet
service after the account is activated. After this duration, the account will self-expire. The Expire Time
indicates the duration of time that the account needs to be activated after the generation. If the account is
not activated during this duration, the account will self-expire.
¾ Delete All: This will delete all the users at once.
¾ Delete: This will delete users individually.
y Billing Configuration: Click this to enter the PMS User Billing Configuration page. In the PMS Billing
Configuration page, the administrator may configure up to 5 billing plans.
84
.
IAS-2000 v2
User’s Manual
¾ Status: Select to enable or disable this billing plan.
¾ Hr. Purchased: This is the duration of time that the user purchases. 1-99 9 hour(s) can be entered.
¾ Valid Period: This is the duration of time that the user can use the Internet service after the activation of
the account. After this duration, the account will self-expire. 1-999 hours can be entered.
¾ Assign to Policy: Assign a policy for this billing plan.
¾ Price: The price charged for this billing plan.
Note: There is an Auto Expired mechanism is for preventing that an account is created but never logged in. If the
account is created but never been logged in, the account will be invalid after a period.
yCreate PMS User: Click this to enter the PMS User Generation page. There are 5000 PMS user accounts
available.
85
.
IAS-2000 v2
User’s Manual
By default, the PMS user database is empty. After entering “Room Number” and “Maximum User” then
pressing Create button by the desired plan, a PMS user will be created. Click Printout to print a receipt
which will contain this PMS user’s information. See the following figure.
.
86
IAS-2000 v2
User’s Manual
5.3.2 Policy Configuration
There are ten policies that IAS-2000 v2 supports and a Global policy. Every Policy has three profiles, Firewall
Profile, Specific Route Profile, and Schedule Profile as well as one Bandwidth setting for that policy. But Global
policy only has Firewall Profile and Specific Route Profile settings.
y Global Policy
¾ Select Policy: Select Global to set the Firewall Profile and Specific Route Profile.
¾ Firewall Profile: Click the hyperlink of Setting for Firewall Profile, the Firewall Profiles page will appear .
Click the numbers of Filter Rule Item to edit individual rules and click Apply to save the settings. The
rule status will show on the list. Check “Active” to enable that rule.
.
87
Rule Item: This is the rule selected.
Rule Name: The rule name can be changed here.
Enable this Rule: After checking this function, the rule will be enabled.
IAS-2000 v2
User’s Manual
Action: There are two options, Block and Pass. Block is to prevent packets from passing and
Pass is to permit packets passing.
Protocol: There are three protocols to select, TCP, UDP and ICMP, or choose ALL to use all three
protocols.
Source MAC Address: The MAC address of the source IP address. This is for specific MAC
address filter.
Source/Destination Interface: There are five interfaces to choose, ALL, WAN1, WAN2, LAN1 and
LAN2.
Source/Destination IP: Enter the source and destination IP addresses.
Source/Destination Subnet Mask: Enter the source and destination subnet masks.
.
88
User’s Manual
¾Specific Route Profile: Click the hyperlink of Settingfor Specific Route Profile, the Specific Route
Profile page will appear.
IAS-2000 v2
Profile Name: The profile name can be changed here.
Destination IP Address: The destination IP address of the host or the network.
Destination Subnet Netmask: Select a destination subnet netmask of the host or the network.
Gateway IP Address: The IP address of the next router to the destination.
View System Route T able: Click the hyperlink of V iew Sy stem Route Table to see the information
of the hosts or the networks.
89
.
User’s Manual
¾Maximum Concurrent Sessions: The concurrent sessions for each user; it can be restricted by
administrator. When a user reaches the session limit, this user will be implicitly suspended from any new
connection for a fixed time period.
yPolicy 1~Policy 10
IAS-2000 v2
¾ Select Policy / Policy Name: Select a desired policy and rename it in the Policy Name field if desired.
¾ Firewall Profile: Click the hyperlink of Setting for Firewall Profile, the Firewall Profiles page will appear .
Click the numbers of Filter Rule Item to edit individual rules and click Apply to save the settings. The
rule status will show on the list. Check “Active” to enable that rule.
90
.
IAS-2000 v2
User’s Manual
Rule Item: This is the rule selected.
Rule Name: The rule name can be changed here.
Enable this Rule: After checking this function, the rule will be enabled.
Action: There are two options, Block and Pass. Block is to prevent packets from passing and
Pass is to permit packets passing.
Protocol: There are three protocols to select, TCP, UDP and ICMP, or choose ALL to use all three
protocols.
Source MAC Address: The MAC address of the source IP address. This is for specific MAC
address filter.
91
.
User’s Manual
Source/Destination Interface: There are five interfaces to choose, ALL, WAN1, WAN2, LAN1 and
LAN2.
Source/Destination IP: Enter the source and destination IP addresses.
Source/Destination Subnet Mask: Enter the source and destination subnet masks.
¾ Specific Route Profile: Click the hyperlink of Setting for Specific Route Profile, the Specific Route
Profile page will appear.
IAS-2000 v2
Profile Name: The profile name can be changed here.
Destination IP Address: The destination IP address of the host or the network.
Destination Subnet Netmask: Select a destination subnet netmask of the host or the network.
Gateway IP Address: The IP address of the next router to the destination.
Default: Check this option to apply to the default values.
¾ Schedule Profile: Click the hyperlink of Setting for Schedule Profile to enter the Schedule Profile list.
Select “Enable” to show the list. This function is used to restrict the time the users can log in. Please
enable/disable the desired time slot and click Apply to save the settings. These settings will become
effective immediately after clicking the Apply button.
92
.
IAS-2000 v2
User’s Manual
¾Bandwidth: Choose one bandwidth limit for that particular policy.
93
.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.