AirLive IAS-2000 User Manual v2

IAS-2000 v2
Internet Access Gateway
User’s Manual
1
e
e
n
s
s
t
t
g
h
r
n
Declaration of Conformity
We, Manufacturer/Importer
OvisLink Corp.
5F., NO.6, Lane 130, Min-Chuan Rd.,
Hsin-Tien City, Taipei County, Taiwa
Declare that the product
Internet Access Gateway
AirLive IAS-2000 v2
is in conformity with
In accordance with 2004/108 EC Directive and 1999/5 EC-R & TTE Directive
Claus
EN 55022:1998 Limits and methods of measurement of radio disturbanc
EN 61000-3-2:2000 Disturbances in supply systems caused by household appliance
EN 61000-3-3:1995/ Disturbances in supply systems caused by household appliance
A1:2001 and similar electrical equipment "Voltage fluctuations
EN 55024:1998/A1 Information Technology equipment-Immunity characteristics-Limi
:2001/A2:2003 And methods of measuremen
CE markin
Description
characteristics of information technology equipme
and similar electrical equipment "Harmonics
Manufacturer/Importe
Signature
Name Albert Ye
Position/ Title: Vice President (Stamp) Date2008/10/9
AirLive IAS-2000 v2 CE Declaration Statement
Country Declaration Country Declaration
cs
Česky [Czech]
da
Dansk [Danish]
de
Deutsch [German]
et
Eesti [Estonian]
en
English
es
Español [Spanish]
el
Ελληνική [Greek]
fr
Français [French]
it
Italiano [Italian]
lv
Latviski [Latvian]
sv
Svenska [Swedish]
OvisLink Corp. tímto prohlašuje, že tento AirLive IAS-2000 v2 je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Undertegnede OvisLink Corp. erklærer herved, at følgende udstyr AirLive IAS-2000 v2 overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. Hiermit erklärt OvisLink Corp., dass sich das Gerät AirLive IAS-2000 v2 in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet. Käesolevaga kinnitab OvisLink Corp. seadme AirLive IAS-2000 v2 vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. Hereby, OvisLink Corp., declares that this AirLive IAS-2000 v2 is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Por medio de la presente OvisLink Corp. declara que el AirLive IAS-2000 v2 cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp. ΔΗΛΩΝΕΙ ΟΤΙ AirLive IAS-2000 v2 ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ
1999/5/ΕΚ. Par la présente OvisLink Corp. déclare que l'appareil AirLive IAS-2000 v2 est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE Con la presente OvisLink Corp. dichiara che questo AirLive IAS-2000 v2 è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar šo OvisLink Corp. deklarē, ka AirLive IAS-2000 v2 atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. Härmed intygar OvisLink Corp. att denna AirLive IAS-2000 v2 står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
lt
Lietuvių [Lithuanian]
nl
Nederlands [Dutch
mt
Malti [Maltese]
hu
Magyar [Hungarian]
pl
Polski [Polish]
pt
Português [Portuguese]
sl
Slovensko [Slovenian]
sk
Slovensky [Slovak]
fi
Suomi [Finnish]
Íslenska [Icelandic]
no
Norsk [Norwegian]
Šiuo OvisLink Corp. deklaruoja, kad šis AirLive IAS-2000 v2 atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
Hierbij verklaart OvisLink Corp. dat het toestel AirLive IAS-2000 v2 in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Hawnhekk, OvisLink Corp, jiddikjara li dan AirLive IAS-2000 v2 jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Az OvisLink Corporation kijelenti, hogy az AirLive IAS-2000 v2 megfelel az 1999/05/CE irányelv alapvető követelményeinek és egyéb vonatkozó rendelkezéseinek. Niniejszym OvisLink Corp oświadcza, że AirLive IAS-2000 v2 jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. OvisLink Corp declara que este AirLive IAS-2000 v2 está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE.
OvisLink Corp izjavlja, da je ta AirLive IAS-2000 v2 v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES.
OvisLink Corp týmto vyhlasuje, že AirLive IAS-2000 v2 spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.
OvisLink Corp vakuuttaa täten että AirLive IAS-2000 v2 tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen Hér með lýsir OvisLink Corp yfir því að AirLive IAS-2000 v2 er í samræmi við grunnkröfur og aðrar kröfur, sem gerðar eru í tilskipun 1999/5/EC.
OvisLink Corp erklærer herved at utstyret AirLive IAS-2000 v2 er i samsvar med de grunnleggende krav og øvrige relevante krav i direktiv 1999/5/EF.
A copy of the full CE report can be obtained from the following address:
OvisLink Corp. 5F, No.6 Lane 130, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C.
This equipment may be used in AT, BE, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, SK, SI, ES, SE, GB, IS, LI, NO, CH, BG, RO, TR
This device uses software which is partly or completely licensed under the terms of the GNU General Public License. The author of the software does not provide any warranty. This does not affect the warranty for the product itself.
To get source codes please contact: OvisLink Corp., 5F, No. 96, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C. A fee will be charged for production and shipment for each copy of the source code.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
one line to give the program's name and an idea of what it does. Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker.
signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
IAS-2000 v2
User’s Manual
Copyright
The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical, magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
Trademarks
All products, company, brand names are trademarks or registered trademarks of their respective companies. They are used for identification purpose only. Specifications are subject to be changed without prior notice.
FCC Interference Statement
The IAS-2000 v2 has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against radio interference in a commercial environment. This equipment can generate, use and radiate radio frequency energy and, if not installed and used in accordance with the instructions in this manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause interference, in which case the user, at his own expense, will be required to take whatever measures are necessary to correct the interference.
CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022:1998, EN 61000-3-2, EN 61000-3-3/A1, EN 55024/A1/A2, Class A.
.
1
IAS-2000 v2
User’s Manual
Contents
Chapter 1. Before You Start .....................................................................................................................................1
1.1 Audience ........................................................................................................................................................1
1.2 Document Conventions..................................................................................................................................1
Chapter 2. Overview.................................................................................................................................................2
2.1 Introduction of IAS-2000 v2..........................................................................................................................2
2.2 System Concept..............................................................................................................................................2
Chapter 3. Hardware Installation............................................................................................................................5
3.1 Panel Function Descriptions...........................................................................................................................5
3.2 Package Contents...........................................................................................................................................6
3.3 System Requirement ......................................................................................................................................6
3.4 Installation Steps............................................................................................................................................7
Chapter 4. Network Configuration on PC...............................................................................................................9
4.1. Internet Connection Setup for Windows XP..................................................................................................9
4.2. TCP/IP Network Setup.................................................................................................................................12
Chapter 5. Web Interface Configuration...............................................................................................................16
5.1 System Configuration...................................................................................................................................18
5.1.1 Configuration Wizard (Also served as Quick Installation).........................................................................19
5.1.2 System Information.....................................................................................................................................28
5.1.3 WAN1 Configuration..................................................................................................................................30
5.1.4 WAN2 & Failover.......................................................................................................................................33
5.1.5 LAN1 Configuration...................................................................................................................................36
5.1.6 LAN2 Configuration...................................................................................................................................43
5.2 Network Configuration ................................................................................................................................49
5.2.1 Network Address Translation......................................................................................................................50
5.2.2 Privilege List...............................................................................................................................................53
5.2.3 Monitor IP List............................................................................................................................................56
5.2.4 Walled Garden List .....................................................................................................................................58
5.2.5 Proxy Server Properties ..............................................................................................................................59
5.2.6 Dynamic DNS.............................................................................................................................................60
5.2.7 IP Mobility ..................................................................................................................................................61
5.3 User Authentication......................................................................................................................................62
5.3.1 Authentication Configuration .....................................................................................................................63
i
.
IAS-2000 v2
User’s Manual
5.3.2 Policy Configuration...................................................................................................................................87
5.3.3 Black List Configuration.............................................................................................................................95
5.3.4 Guest User Configuration...........................................................................................................................98
5.3.5 Additional Configuration............................................................................................................................99
5.4 Utilities.......................................................................................................................................................118
5.4.1 Change Password......................................................................................................................................119
5.4.2 Backup/Restore Setting.............................................................................................................................120
5.4.3 Firmware Upgrade....................................................................................................................................121
5.4.4 Restart.......................................................................................................................................................122
5.5 Status..........................................................................................................................................................123
5.5.1 System Status............................................................................................................................................124
5.5.2 Interface Status..........................................................................................................................................127
5.5.3 Current Users............................................................................................................................................129
5.5.4 Traffic History...........................................................................................................................................130
5.5.5 Notification Configuration........................................................................................................................135
5.5.6 Online Report............................................................................................................................................138
5.6 Help............................................................................................................................................................140
Appendix A. External Network Access...............................................................................................................141
Appendix B. Console Interface Configuration..................................................................................................143
Appendix C. Specifications.................................................................................................................................146
a. Hard ware Specification...................................................................................................................................146
b. Technical Specification...................................................................................................................................146
Appendix D. Proxy Setting for Hotspot..............................................................................................................148
Appendix E. Proxy Setting for Enterprise..........................................................................................................151
.
ii
IAS-2000 v2
User’s Manual

Chapter 1. Before You Start

1.1 Audience

This manual is for Hotspot owners or administrators in enterpri ses to set up network environ ment using IAS-200 0 v2. It contains step by step procedures and graphic examples to guide MIS staff or individuals with slight network system knowledge to complete the installation.

1.2 Document Conventions

For any caution or warning that re quir es sp ecia l attention of readers, a highlight box with the eye-catching italic font is used as below:
Warning: For security purposes, you should immediately change the Admi nistrator’s password.
Indicates that clicking this button will return to the homepage of this section.
Indicates that clicking this button will return to the previous page.
Indicates that clicking this button will apply all of your settings. Indicates that clicking this button will clear what you set before these settings are applied.
.
1
IAS-2000 v2
User’s Manual

Chapter 2. Overview

2.1 Introduction of IAS-2000 v2

IAS-2000 v2 is a Network Access Control System specially designed for middle-scaled or large network environments while retaining network efficiency. IAS-2000 v2 delivers “manageability”, “efficiency” and “friendly interface” and suits perfectly for campuses, libraries, gymnasiums, small and middle enterprises, factories, Hotspots and community hospitals.

2.2 System Concept

IAS-2000 v2 is dedicatedly designed for controlling all network data passing through the system. The users under the managed network must be authenticated to access the network beyond the managed area. The authentication mechanism at the user’s end is provided by the IAS-2000 v2 server, and the SSL encryption is used to protect the webpage. In the system, IAS-2000 v2 is responsible for authentication, authorization, and management functions. The user account information is stored in the IAS-2000 v2 database, or other specified external authentication databases.
The process of authenticating the user’s identity is executed via the SSL encrypted webpage. Using the web interface, it can be ensured that the system is compatible to most desktop systems and palm computers. When a user authentication is requested, the IAS-2000 v2 server software will check the authentication database at the rear end to confirm the user’s access right. The authentication database can be the local dat abase of IAS-2000 v2 or any external database that IAS-2000 v2 supports. If the user is not an authorized user, IAS-2000 v2 will refuse the user’s
2
.
IAS-2000 v2
User’s Manual
request for the access. In the meantime, IAS-2000 v2 will also continue blocking the user from accessing the network. If the user is an authorized user, then IAS-2000 v2 will authorize the user with an appropriate access right, so that the user can use the network. If the online user remains idle without using the network f or a time exceeding a predetermined idle time on IAS-2000 v2 or the online user logs out of the system, IAS-2000 v2 will exit the working stage of such user and terminate the user’s access right of the network. The following figure provides a simple example of setti ng up a small enterprise n etwork. IAS-2000 v2 is set to control a part of the company’s intranet. The whole managed network includes cable network users and wireless network users. In the beginning, any user located at the managed network is unable to access the network resource without permission. If the access right to the network beyond the managed area is required, an Internet browser such a s the Internet Explorer must be opened and a connection to any website must be performed. When the browser attempts to connect to a website, IAS-2000 v2 will force the browser to redirect to the user login webpage. The user must enter the username and password for authentication. After the identity is authenticated successfully, the user will gain proper access right defined on IAS-2000 v2.
Attention: Public LAN Authentication is required for the users to get access of the network; And, Private LAN is referred to as the LAN port with the authentication function disabled.
is
referred to as the LAN port with the authentication function enabled from where the
Another setup example is shown in the following figure. The WAN1 and WAN2 of IAS-2000 v2 simultaneously supports the Switch of 802.3ad (Support Port Trunk), and the bandwidth of the Switch will be the sum of the WAN1 and WAN2 bandwidths, which aims at eliminating the bottleneck caused by the narrow bandwidth between IAS-2000 v2 and the 802.3ad Switch.
3
.
IAS-2000 v2
User’s Manual
.
4

Chapter 3. Hardware Installation

3.1 Panel Function Descriptions

Front Panel
LED Color Status Description
POWER Green On Power on the device
Off BIOS running
Status LED Green
WAN1, LAN1,
WAN2, LAN2
(L)
WAN1, LAN1,
WAN2, LAN2
(R)
Orange Blink Sending / Receiving
Green
Orange On 1000 Mbps
Blink OS running
On System ready
Off 10 Mbps On 100 Mbps
IAS-2000 v2
User’s Manual
Port Description
WAN1 / WAN2
LAN1 / LAN2
Console Port
Panel Button
LED: There are four kinds of LED, power, status, port speed and link/act, to indicate diff erent status of the system. Console Port: The system can be configured via HyperTerminal. For example, if you need to set the Administrator’s
Password, you can connect a PC to this port as a Console Serial Port via a terminal connection program (such as the super terminal with the parameters of 9600, 8, N, 1, None flow control) to change the Administrator’s Password. LAN1/LAN2: The two LAN ports can be independently configured such that users cannot access Internet before authentication. Thus, administrators can choose to force the authentication for users connected to these ports. WAN1/WAN2: The two WAN ports are connected to a network which is not managed by the IAS-2000 v2 system, and this port can be used to connect the ATU-Router of ADSL, the port of Cabl e Modem, or the Switch or Hub on the
Connect to Internet or Intranet Connect to the open environment. It can be chosen to require authentication to
access network resources and Internet. 9-pin serial port connector to resume the factory defaults or reconfigures the system. LCD Panel to display system info and network interface info
LAN of a company.
.
5
Rear Panel
System Fan: Keep the machine cool. Power Fan: Keep the power cool. Power Socket: The power cord attaches here. Power Switch: Turn on and off the machine.

3.2 Package Contents

IAS-2000 v2
User’s Manual
The standard package of IAS-2000 v2 includes:
y IAS-2000 v2 x 1 y CD-ROM x 1 y Power Cord x 1 y Ethernet Cable (Crossover) x 1 y Ethernet Cable (Straight) x1 y Console Cable x 1 y Accessory Packing x 1

3.3 System Requirement

y Standard 10/100BaseT including five network cables with RJ-45 connectors y All PCs need to install the TCP/IP network protocol
.
6

3.4 Installation Steps

Please follow the following steps to install IAS-2000 v2:
1. Connect the power cord to the power socket on the rear panel.
2. Turn on the power switch on the rear panel. The Power LED will light up.
IAS-2000 v2
User’s Manual
3. Connect an Ethernet cable to one LAN port with the user authentication function enabled on the front panel. The default port is LAN1 port. (Note: Authentication is requi red for the u sers to access the network via this LAN port. The LAN port with authentication function is referred to as Public LAN.) Connect the other end of the Ethernet cable to an AP or switch. The LED of this LAN port should be on to indicate a proper connection.
7
.
IAS-2000 v2
User’s Manual
4. Connect an Ethernet cable to one LAN port with the user authentication function disabled on the front panel. The default port is LAN2 port. (Note: No authentication is required for the users to access the network via this LAN port. The LAN port without authentication function is referred to as Private LAN and the administrator can enter the administrative user interface to perform configurations via Private LAN.) Connect the other end of the Ethernet cable to a client’s PC. The LED of this LAN port should be on to indicate a proper connection.
5. Connect an Ethernet cable to one of the WAN ports on the front panel. Connect the other end of the Ethernet cable to ADSL modem, cable modem or a switch/hub of the internal network. The LED of this WAN should be on to indicate a proper connection.
Attention: Usually a straight RJ-45 could be applied if IAS-2000 v2 is connected to a hub/computer which supports automatic crossover, such as the Access Point. However, after the Access Point hardware reset, IAS-2000 v2 should not be able to connect to Access Point while connect ing with a straight cable unless t he cable wa s pulled out and plug-in again. This scenario does NOT occur while using a crossover cable.
After the hardware of IAS-2000 v2 is installed completely, the system is ready to be configured in the following sections. The manual will guide you step by step to set up the system using a single IAS-2000 v2 to manage the network.
.
8
IAS-2000 v2
User’s Manual

Chapter 4. Network Configuration on PC

After IAS-2000 v2 is installed, the following configurations must be set up on the PC: Interne t Connection Setup for Windows XP and TCP/IP Network Setup.

4.1. Internet Connection Setup for Windows XP

1. Choose Start > Control Panel > Internet Options.
2. Choose the “Connections” label, and then click
Setup.
.
9
3. Click Next when Welcome to the New Connection
Wizard screen appears.
4. Choose “Connect to the Internet” and then click
Next.
IAS-2000 v2
User’s Manual
5. Choose “Set up my connection manually” and then
click Next.
.
10
6. Choose “Connect using a broadband connection
that is always on” and then click Next.
7. Finally, click Finish to exit the Connection Wizard.
Now, the setu p has been completed
IAS-2000 v2
User’s Manual
.
11
IAS-2000 v2
User’s Manual

4.2. TCP/IP Network Setup

If the operating system of the PC in use is Windows 95/98/ME/2000/XP, keep the default settings without any change to directly start/restart the system. With the factory default settings, duri ng the process of st arting the system, IAS-2000 v2 with DHCP function will automatically assign an appropriate IP address and related information for each PC. If the Windows operating system is not a server version, the default settings of the TCP/IP will regard the PC as a DHCP client, and this function is called “Obtain an IP address automatically”. If checking the TCP/IP setup or use the static IP in the LAN1 or LAN2 section is needed, please follow the steps below
Check the TCP/IP Setup of Window XP
1. Select Start > Control Panel > Network
Connections.
2. Click the right button of the mouse on the “Local Area
Connection” icon and select “Properties”
.
12
3. Select “General” label and choose “Internet Protocol
(TCP/IP)” and then click Properties. Now, choose to
use DHCP or specific IP address.
IAS-2000 v2
User’s Manual
4-1. Using DHCP: If using DHCP is desired, please cho o se
“Obtain an IP address automatically” and click OK. This is also the default setting of Windows. Then, reboot the PC to make sure an IP address is obtained from IAS-2000 v2.
4-2. Using Specific IP Address: If using specific IP
address is desired, ask the network administrator for the information of the IAS-2000 v2: IP address,
Subnet Mask, New gateway and DNS server address.
Caution: If your PC has been set up completed, please inform the network administrator before modifying the
following setup.
.
13
y Please choose “Use the following IP
address:” and enter the information given from the network administrator in “IP address:” and “Subnet mask:” as well as “Default gateway”
If the DNS Server column is blank, please choose “Use the following DNS server addresses:” and then enter a known DNS address or the DNS address provided by ISP and then click OK.
IAS-2000 v2
User’s Manual
y Then, click Advanced in the window of
“Internet Protocol (TCP/IP) Properties”.
.
14
y Choose the “IP Settings” label and click “Add”
below the “Default gateways” column and the “TCP/IP Gateway Address” window will appear. Enter the gateway address of IAS-2000 v2 in the “Gateway:” of “TCP/IP Gateway Address” window, and then click Add. After returning to the “IP Settings” label, click OK to finish.
IAS-2000 v2
User’s Manual
.
15
IAS-2000 v2
User’s Manual

Chapter 5. Web Interface Configuration

This chapter will present further detailed settings. The followin g table shows all the functions of IAS-2000 v2.
OPTION
FUNCTION
System
Configuration
Configuration
Wizard
System
Information
WAN1
Configuration
WAN2 & Failover
LAN1
Configuration
LAN2
Configuration
IP Mobility
Network
Configuration
Network Address
Translation
Privilege List
Monitor IP List
Walled Garden
List
Proxy Server
Properties
Dynamic DNS Online Report
User
Authentication
Authentication
Configuration
Policy
Configuration
Black List
Configuration
Guest User
Configuration
Additional
Configuration
Utilities Status
Change Password System Status
Backup/Restore
Interface Status
Setting
Firmware Upgrade Current Users
Restart Traffic History
Notification
Configuration
Caution: After finishing the configuration of the settings, please click Apply and pay attention to see if a restart message appears on the screen. If such message appears, system must be restarted to allow the settings to take effect. All on-line users will be disconnected during restart.
After the basic installation shown previously has been completed, IAS-2000 v2 can be further configured with the following steps
1. Use the network cable of the 10/100BaseT to connect a PC to the Private Port, and then start a browser (such
as Microsoft IE). Next, enter the gateway address for that port, the default is
https://192.168.2.254. In the
opened webpage, an administrative login page will appear. Enter “admin” as the default username and password “airlive”. Click Enter to log in.
16
.
IAS-2000 v2
User’s Manual
Caution: If you can’t get the login page, you may have in correctly set your P C t o obtain an I P address au tom atically from authentication LAN port or the IP address used does not have the same subnet as the URL. Please use default IP address such as 192.168.2.xx in your network and then try it again.
2. After successfully logging into IAS-2000 v2, enter the web management interface and see the welcome page. There is a Logout button on the upper right corner to log out the system.
17
.
IAS-2000 v2
User’s Manual

5.1 System Configuration

This section includes the following functions: Configuration Wizard, System Information, WAN1 Configuration, WAN2 & Failover, LAN1 Configuration and LAN2 Configuration.
18
.
IAS-2000 v2
User’s Manual
5.1.1 Configuration Wizard (Also served as Quick Installation)
There are two ways to configure the system: using Configuration Wizard or change the setting by demands manually. The Configuration Wizard has 7 steps providing a simple and easy way to set up IAS-2000 v2 and can be served as Quick Installation. There are 7 steps as listed below:
1. Change Admin’s Password
2. Choose System’s Time Zone
3. Set System Information
4. Select the Connection Ty pe for WAN1 Port
5. Configure LAN1
6. Select Authentication Method
7. Restart
Now, click the System Configuration from the top menu and the System Configuration page will appear.
.
19
Then, click on Configuration Wizard and click the Run Wizard button to start the wizard.
y Running the Wizard
A welcome screen that briefly introduces the 7 steps will appear. Click Next to begin.
IAS-2000 v2
User’s Manual
y Step 1: Change Admin’s Password
Enter a new password for the admin account and retype it in the verify password field (twenty-character maximum and no spaces). Click Next to continue.
.
20
y Step 2: Choose System’s Time Zone
Select a proper time zone via the pull-down menu. Click Next to continue.
IAS-2000 v2
User’s Manual
y Step 3: Set System Information
Home Page: Enter the URL to where the clients should
be directed when they are properly authenticated. NTP Server: Enter the URL of external time server for IAS-2000 v2 time synchronization or use the default. DNS Server: Enter a DNS Server provided by the ISP (Internet Service Provider). Contact the ISP if the DNS IP Address is unknown. Click Next to continue.
y Step 4: Select the Connection Type for WAN1 Port
There are three types that WAN1 port supports: St atic IP Address, Dynamic IP Address and PPPoE Client. Select a proper Internet connection type and click Next to continue. ¾ Dynamic IP Address
If this option is selected, an appropriate IP address and related information will be assigned automatically. Click Next to continue.
21
.
¾ Static IP Address: Set WAN1 Port’s Static IP
Address Enter the “IP Address”, “Subnet Mask” and “Default Gateway” provided by the ISP.
Click Next to continue.
¾ PPPoE Client: Set PPPoE Client’s Information
IAS-2000 v2
User’s Manual
Enter the “Username” and “Password” provided by the ISP. Click Next to continue.
y Step 5: Configure LAN1’s Information
IP Address: Enter the Public LAN port IP Address or
use the default. Subnet Mask: Enter the Public LAN port Subnet Mask or use the default. Disable DHCP Server: If the DHCP server is disabled, the clients in Public LAN must be configured with an IP address manually. Enable DHCP Server: When the option is selected, IAS-2000 v2 will automatically provide the necessary IP address to all clients in Public LAN. Click Next to continue.
22
.
y Step 5: Set LAN1 DHCP Server
If Enable DHCP Server option is selected, fields marked with red asterisk must be filled in. Start IP Address: The start IP address that will be assigned to the Public LAN clients. End IP Address: The end IP address that will be assigned to the Public LAN clients.
(Note: Be sure that IP addresses assigned from Start IP address to End IP address are NOT used in other settings by IAS-2000 v2.)
Domain Name: Enter a domain name provided by the ISP (e.g. airlive.com).
IAS-2000 v2
User’s Manual
WINS Server: Enter the IP address of the WINS Server (Windows Internet Naming Service Server). This field is optional. Preferred DNS Server: The DNS Server settings are provided by the ISP. Only the Preferred DNS Server field is mandatory. Contact the ISP if the DNS Server settings are unkn own. Alternate DNS Server: The DNS Server settings are provided by the ISP. This field is optional. Click Next to continue.
y Step 6: Select Default Authentica tion Server
Set the user’s information in advance. Enter an easy identified name as the postfix name in the Postfix Name field (e.g. airlive) and choose an authentication method. Click Next to continue.
.
23
Loading...
+ 133 hidden pages