FWBD0501 User’s Guide Revision 1.0 1 November 2012 Copyright © 2012 Deliberant www.deliberant.
Copyright © 2012 Deliberant This user’s guide and the software described in it are copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of Deliberant. Notice Deliberant reserves the right to change specifications without prior notice.
List of additional approval antenna: Omni Directional (fiberglass pole) EXTRALINK OMNI 12dBi Omni Directional (Rubber Duck Omni Antenna (RPSMA)) 3dBi Sector FWA-5 16dBi Panel FWA-24 8dBi Panel FWA18 14dBi Dish RocketDish 24dBi Antenna Installation Warning: 1, It is installer’s responsibility to ensure that when using the authorized antennas in the United States (Or where FCC rules only); 2, only those antennas certified with the product are used; 3, the use of any antenna other than those certified with th
This radio transmitter (identify the device by certification number, or model number if Category II) has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device.
User’s Guide Contents Copyright ............................................................................................................................................. 2 Notice .................................................................................................................................................. 2 Trademarks ......................................................................................................................................... 2 CONTENTS ...................
User’s Guide Security Settings ....................................................................................................................................... 42 Advanced Wireless Settings...................................................................................................................... 43 Virtual AP .......................................................................................................................................44 Wireless ACL ...............................
User’s Guide About this Guide Prerequisite Skills and Knowledge To use this document effectively, you should have a working knowledge of Local Area Networking (LAN) concepts and wireless Internet access infrastructures. Conventions Used in this Document The following typographic conventions and symbols are used throughout this document: Additional information that may be helpful but which is not required. Important information that should be observed.
User’s Guide Abbreviation Description MAC Media Access Control Mbps Megabits per second MHz Megahertz MIMO Multiple Input, Multiple Output MSCHAPv2 Microsoft version of the Challenge-handshake authentication protocol, CHAP.
User’s Guide To access the Web management interface, configure your PC with a static IP address on the 192.168.2.0 subnet with mask 255.255.255.0. Connect the AP device in to the same physical network as your PC. Open the Web browser and type the default IP address of the APC device https://192.168.2.66/ and the login page will be loaded.
User’s Guide The initial login screen looks as follow: Step 5. Confirm the disclaimer of the APC. According to the chosen country the regulatory domain settings may differ. You are not allowed to select radio channels and RF output power values other the permitted values for your country and regulatory domain. Step 6. Enter the default password, and then press the Login button to enter the AP web management page.
User’s Guide Step 7.
User’s Guide Step 8. Navigate to the Configuration | Wireless tab, choose Access Point wireless mode with WDS enabled, specify the SSID with Broadcast enabled, Security parameters and IEEE mode and click Save&Apply: Step 9. Verify connection.
User’s Guide The initial login screen looks as follow: Step 5. Confirm the disclaimer of the APC. According to the chosen country the regulatory domain settings may differ. You are not allowed to select radio channels and RF output power values other the permitted values for your country and regulatory domain. Step 6. Enter the default password, and then press the Login button to enter the APC web management page.
User’s Guide Step 7.
User’s Guide Step 8. Navigate to the Configuration | Wireless tab, choose Station WDS wireless mode, click Scan button near the SSID entry field to choose the SSID of the AP where the station will be associated to. Specify the Security parameters for the AP, check IEEE mode (these settings must conform with AP wireless settings) and click Save&Apply: Step 9. Verify connection. Navigate to the Status | Information page. The Information page will display wireless information of the link with AP.
User’s Guide Network Operation Modes The device can operate as transparent Bridge or Router. Bridge Mode The device can act as a wireless network bridge and establish wireless links with other APs. In this mode all LAN port and Wireless interface will be a part of the Bridge. Figure 2 – Bridge Mode With a Bridge, all connected computers are in the same network subnet. The only data that is allowed to cross the bridge is data that is being sent to a valid address on the other side of the bridge.
User’s Guide General Device Operation Web Management Structure The main web management menu is displayed after successfully login into the system (see the figure below). From this menu all essential configuration pages are accessed. The active menu tab is displayed in a different color: By default the Status | Information menu is activated where the main device information is displayed.
User’s Guide Site Survey – information about other wireless networks in the local area. Delayed reboot – setup delayed reboot for APC unit. Ping – perform ping command. Traceroute – perform graphical traceroute command. Spectrum analyzer – check the signal strength on available channels.
User’s Guide Configuration Guide This document contain product‘s powerful web management interface configuration description allowing setups ranging from very simple to very complex. Status Information The Information page displays a summary of status information of your device. It shows important information for the APC operating mode, network settings. System information – displays general information about the device. Wireless information – displays general information about the wireless connection.
User’s Guide IP address – displays the IP address of the particular interface. MAC – displays the MAC address of the particular interface. Received – displays the number of received packets. RX errors – displays the number of the RX errors. Transmitted – displays the number of transmitted packets. TX errors – displays the number of the TX errors. DHCP leases – table displays information about leased DHCP addresses. This table appears only on AP which acts as Router and have DHCP server enabled.
User’s Guide The Wireless statistics displays the receive/transmit statistics between AP and successfully associated wireless clients: Figure 5 – Access Point's Wireless Statistics In case the access point has more than one wireless interface (VAPs), the appropriate number of tables with information about connected wireless clients will be displayed. Peer MAC – displays MAC address of the successfully connected wireless client.
User’s Guide ARP The ARP page displays the ARP (Address Resolution Protocol) table currently recorded on the device. Use Refresh button to reload ARP table results. Figure 7 – ARP Table Records Configuration Network The Configuration | Network page allows you to control the network configuration and settings of the device. First, the device operation mode must be defined to work as a bridge or router.
User’s Guide When device is configured to operate in Bridge mode, only device LAN settings should be configured on the Network page: Figure 9 – Bridge Mode Settings IGMP snooping (only on AP or iPoll Bridge modes) – when enabled AP will passively snoop on IGMP Report and Leave packets transferred between it's clients and IP Multicast hosts. It checks IGMP packets passing through it, picks out the group registration information and generates internal L2 MAC forwarding table.
User’s Guide VLAN to SSID Mapping Virtual Local Area Networks (VLANs) are logical groupings of network resources. Figure 10 - VLAN to SSID Mapping VLAN to SSID mapping – specify the VLAN ID for traffic tagging on required radio interface [2-4095]. The Station devices that associate using the particular SSID will be grouped into this VLAN. Management VLAN Available only on Bridge network mode. Access to the AP for management purposes can further be limited using VLAN tagging.
User’s Guide Router Mode This section allows customizing parameters of the Router to suit the needs of network, including ability to use the built-in DHCP server. When device is configured to operate as Router, the following sections should be specified: WAN network settings, LAN network settings and LAN DHCP settings.
User’s Guide WAN Settings WAN network settings include settings related to the WAN interface. The access type of the WAN interface can be configured as: Static IP, Dynamic IP, PPPoE client. WAN mode – choose Static IP to specify IP settings for device WAN interface: Figure 13 – Router WAN Settings: Static IP MAC address – specify the clone MAC address if required. The ISPs registers the MAC address of the router, and allows only that MAC address to connect to their network.
User’s Guide WAN mode – choose Dynamic IP to enable DHCP client on the WAN side. This option does not need any parameters: Figure 14 – Routers WAN Settings: Dynamic IP MAC address – specify the clone MAC address if required. The ISPs registers the MAC address of the router, and allows only that MAC address to connect to their network.
User’s Guide WAN mode – choose PPPoE to configure WAN interface to connect to an ISP via a PPPoE: Figure 15 – Routers WAN Settings: PPPoE client MAC address – specify the clone MAC address if required. The ISPs registers the MAC address of the router, and allows only that MAC address to connect to their network.
User’s Guide Figure 16 – Router LAN Settings IP address – specify the IP address of the device LAN interface. Subnet mask – specify the subnet mask of the device LAN interface. LAN DHCP Settings DHCP mode – choose disabled to disable DHCP on LAN interface. Figure 17 – Router LAN Settings: DHCP Disabled DHCP mode – choose relay to enable DHCP relay. The DHCP relay forwards DHCP messages between subnets with different sublayer broadcast domains.
User’s Guide Wireless The Wireless tab is divided in three sections: Basic, Security and Advanced configuration sections. The Basic section contains all parameters that required to configure in order have working wireless link. Security section is used to select authentication and encryption settings. Advanced section contains parameters allowing optimizing the link capacity. Before changing radio settings manually verify that your settings will comply with local government regulations.
User’s Guide Wireless Mode: Access Point (auto WDS) Use Basic Wireless Settings to setup radio interface of the device. Figure 21 – Access Point Wireless Settings Basic Wireless Settings SSID – specify the SSID of the wireless network device. Broadcast SSID – enables or disables the broadcasting of the SSID for AP. IEEE mode – specify the wireless network mode. Channel width – The default channel bandwidth for 802.11 radio is 20MHz. The 802.
User’s Guide Security Settings Both sides (AP and Station) of the link must have the same security settings. Device supports various authentication/encryption methods: Open – no encryption. WEP – 64bit and 128bit key. Personal – preshared key encryption with WPA/WPA2 using AES or TKIP. Enterprise – RADIUS server based authentication with WPA/WPA2 encryption using AES or TKIP (requires configured RADIUS server). UAM – Web browser based user authentication method.
User’s Guide Figure 25 – Security: Enterprise WPA/WPA2 Encryption The properly configured RADIUS server is required for Enterprise WPA/WPA2 encryption.
User’s Guide Enable ATPC – select to enable Automatic Transmit Power Control (ATPC). If enabled, device radio will continuously communicate with remote unit’s radio in order to adjust the optimal transmit power automatically. Fragmentation – specify the Fragmentation threshold using slider or enter the value manually [2562346 bytes]. This is the maximum size for a packet before data is fragmented into multiple packets. Setting the Fragmentation threshold too low may result in poor network performance.
User’s Guide Wireless Mode: Station Station WDS has the same wireless settings. The Station wireless settings a bit differ from the Access Point’s settings: there is possibility to scan SSID of the surrounding APs and choose the required one. Use Wireless Settings to setup radio interface of the device. Figure 27 – Station Wireless Settings Basic Wireless Settings SSID – specify the SSID of the wireless network device. Scan – click this button to scan for surrounding wireless networks.
User’s Guide Security Settings Both sides (AP and Station) of the link must have the same security settings. Device supports various authentication/encryption methods: Open – no encryption. WEP – 64bit and 128bit key. Personal – preshared key encryption with WPA/WPA2 using AES or TKIP. Enterprise – RADIUS server based authentication with WPA/WPA2 encryption using AES or TKIP (requires configured RADIUS server).
User’s Guide Figure 31 – Security: Enterprise WPA/WPA2 Encryption Encryption – choose WPA/WPA2 encryption type: AES – data encrypted with AES method; TKIP – data encrypted with TKIP method; EAP method – choose EAP method: EAP-TTLS-MSCHAPv2 PEAP/ MSCHAPv2 Identity – specify the identity of the authentication to the RADIUS server. Password – specify the password of the authentication to the RADIUS server.
User’s Guide RTS – specify the RTS threshold using slider or enter the value manually [0-2347 bytes]. The RTS threshold determines the packet size of a transmission and, through the use of an access point, helps control traffic flow. Quality of service (WMM) – enable to support quality of service for traffic prioritizing. Enable DFS – select to enable radar detection. With enabled DFS, APC unit monitors the operating frequency for radar signals.
User’s Guide Figure 33 – iPoll Access Point’s Wireless Settings Basic Settings Use Basic section to setup basic operating settings of the iPoll Access Point’s radio. iPoll Access Point and iPoll Station will operate in 802.11n IEEE mode only. SSID – specify the SSID of the wireless network device. Broadcast SSID – enables or disables the broadcasting of the SSID for iPoll AP. Channel width – The default channel bandwidth for 802.11n radio is 20MHz. The 802.
User’s Guide Security Settings Both sides (iPoll Access Point and iPoll Station) of the link must have the same security settings. The APC device working, in iPoll Access Point wireless mode, supports authentication/encryption methods listed below: Open – no encryption. Personal WPA – preshared key encryption with WPA using AES method. Personal WPA2 – preshared key encryption with WPA2 using AES method.
User’s Guide Enable DFS – select to enable a radar detection. With enabled DFS, iPoll AP monitors the operating frequency for radar signals. If radar signals are detected on the channel, the unit randomly selects a different channel. Note that if APC is operating on channel where DFS is required, this option automatically will be enabled. Mode – choose the unit’s antenna operating mode: SISO – single input single output. The device will use only one antenna for data transfer.
User’s Guide Wireless Mode: iPoll Station The iPoll Station is a wireless client mode which can connect to the iPoll Access Points. Figure 37 – iPoll Station's Wireless Settings Basic Settings Use this section to setup basic operating settings of the iPoll Station radio. iPoll Access Point and iPoll Station will operate in 802.11n IEEE mode only. SSID – specify the SSID of the wireless network device manually, or use Scan functionality.
User’s Guide Open – no encryption. Personal WPA – preshared key encryption with WPA using AES method. Personal WPA 2 – preshared key encryption with WPA2 using AES method. By default there is no encryption enabled on the device: Figure 38 – iPoll Security: Open Personal WPA/WPA2 encryption must be specified with the pre-shared key: Figure 39 – iPoll Security: Private WPA/WPA2 Encryption Passphrase – specify the WPA or WPA2 passphrase [8-63 characters].
User’s Guide Max data rate – select the device data transmission rates in Mbps from the drop-down list. The unit will attempt to transmit data at the highest data rate set. If there will be an interference encountered, the iPoll Station will step down to the highest rate that allows data transmission. Virtual AP Virtual AP functionality is available only in Access Point (auto WDS) wireless mode. Use the Configuration | Virtual AP page to configure to create up to 3 additional Virtual AP interfaces.
User’s Guide Personal – preshared key encryption with WPA/WPA2 using AES or TKIP. Enterprise – RADIUS server based authentication with WPA/WPA2 encryption using AES or TKIP (requires configured RADIUS server). UAM – Web browser based user authentication method. UAM authentication is available only if Access Point is working in router mode. For UAM configuration details refer at the respective chapter Universal Access Method (UAM).
User’s Guide Figure 44 – Traffic Shaping Configuration Limit all traffic Enable download shaping – select to enable limitation of the download traffic. Download limit, kbps – specify the maximum download (from wireless interface to Ethernet interface) bandwidth value in Kbps. Download burst, kbytes – specify the download burst size in kbytes. Enable upload shaping – select to enable limitation of the upload traffic.
User’s Guide Port Forwarding Port forwarding is active only in Router network mode.. Port Forwarding, UPnP and DMZ is effective only if NAT is enabled. The Port forwarding section gives the ability to pass traffic behind an interface that has NAT enabled. For instance if the unit is in router mode with NAT enabled on the WAN interface, no devices on the outside of the WAN interface can see any private IPs on the LAN side of the unit.
User’s Guide Static Routes Static routes is active only in Router network mode. A routing rule is defined by the destination subnet (Destination IP address and netmask) and/or gateway where to route the target traffic. To add a new static route, specify the following parameters: Figure 47 – Static Route Configuration Destination IP – specify the destination IP address. Netmask – specify destination netmask. Gateway – specify the gateway address for the route. 0.0.0.
User’s Guide System alerts The device is able to send external alerts when there are system errors. The alerts can be sent via SNMP Traps or/and SMTP notifications. Figure 48 – Device Alerts Enable alerts – select to enable alert notifications on the system. System check interval, s – specify interval in seconds at which the device will send notifications of unexpected system behavior. System alerts: Wireless link status change – system will send notification on Wireless link status change.
User’s Guide SNMP Traps Settings Manager address – specify the IP address or hostname of SNMP Trap receiver. Manager port – specify the port number of the Trap receiver. Default port number is 162. Trap community - specify the SNMP community string. This community string acts as password between SNMP manager and device by default Trap community string is "public". Use inform – select to wait for an acknowledgment from SNMP manager that trap was received.
User’s Guide Contact information – specify the identification of the contact person for this managed device, together with information on how to contact this person. R/O community – specify the read-only community name for SNMP version 1 and version 2c. The read-only community allows a manager to read values, but denies any attempt to change values. R/O user – specify the user name for read-only SNMPv3 access. The read-only community allows a manager to read values, but denies any attempt to change values.
User’s Guide Figure 53 – SSH Port Configuration Enabled – enable or disable SSH access to device. Port – the SSH service port. By default SSH port is 22. HTTP Use this menu to control HTTP connection on device web management: Figure 54 – HTTP Settings Enable management through HTTP – select tis option to enable or disable HTTP access to the device management. Port – specify HTTP port. Standard HTTP port is 80. HTTPS connection via the standard port 8080 is always enabled.
User’s Guide System Administration For security reasons it is recommended to change the default administrator username and password as soon as possible. System menu allows you to manage main system settings and perform main system actions (reboot, restore configuration, etc.). The section is divided into further three sections: Device settings, Account settings and system functions.
User’s Guide System functions Reboot device – reboot device with the last saved configuration. Reset device to factory defaults – click to restore unit's factory configuration. Resetting the device is an irreversible process. Current configuration and the administrator password will be set back to the factory default. Download troubleshooting file – click to download the troubleshooting file.
User’s Guide Forward port – specify the port to which syslog messages will be forwarded [0-65535]. Default: 514. Forward message level – specify the level of the message which will be sent to the remote syslog server. The level determines the importance of the message and the volume of messages generated by the device. The levels are in order of increasing importance [emergency/alert/critical/error/warning/notice/information/debug]. Default: information.
User’s Guide Firmware Upgrade To update your device firmware use the System | Firmware upgrade menu. Press Upload firmware, select the firmware file and click the Upload firmware button: Current version – displays version of the current firmware. Upload firmware – click the button to select the new firmware image for uploading it to the device. The device system firmware upgrade is compatible with all configuration settings.
User’s Guide Tools Antenna Alignment The Antenna Alignment tool measures signal quality between the Station and AP. For best results during the antenna alignment test, turn off all wireless networking devices within range of the device except the device(s) with which you are trying to align the antenna. Watch the constantly updated display in the Alignment Test window as you adjust the antenna. Figure 59 – Antenna Alignment Start – press this button to start antenna alignment.
User’s Guide Delayed Reboot This tool is extremely useful while tuning radio settings – once you defined hypothetic radio parameters and set them with Apply button (not written to the permanent memory), device starts operating with the new settings, and in case the link fails, device will be rebooted in specified minutes, thus the old settings will be set back. Figure 60 – Delayed Reboot Configuration Reboot after – specify time in minutes, after which the device will be rebooted.
User’s Guide Traceroute This tool is a route-tracing utility used to determine the path that an IP packet has taken to reach a destination. This is useful when trying to find out why destination is unreachable, as you will be able to see where the connection fails. Figure 62 – Traceroute Results Destination IP or Hostname – specify hostname or IP address of the target host. Max Hops –Specifies the maximum number of hops to search for target. Start/Stop – click to start or stop traceroute tool.
User’s Guide Spectrum Analyzer The Spectrum analyzer test displays detailed information about signal level of each APC unit’s antenna on each available frequency. This enables administrator choose the best available frequency/channel for the unit operation. The frequency list depends on the Country at which the unit is operating, and chosen channel width. Do not use the Spectrum analyzer on the remote unit of the link, as the connection to the device will be lost during the test.
User’s Guide Universal Access Method (UAM) Universal Access Method (UAM) is a simple Web browser based user authentication method. On initial HTTP request to any Web site, client’s browser is redirected to the authentication page for login to the network. The login page can be served by internal Web server or by external Web Application Server. UAM Overview When using internal UAM, the Login page is the first page a client receives when he starts his Web browser and enters any URL.
User’s Guide Use Security section on Wireless or VAP (depending on the interface on which the UAM will be configured) page for UAM configuration: choose the security option UAM: Figure 64 – UAM Settings RADIUS Settings NAS ID – specify the NAS identifier. RADIUS server 1 – specify the name or IP address of the primary RADIUS server. RADIUS server 2 – specify the name or IP address of the secondary RADIUS server. RADIUS secret – specify the RADIUS shared secret.
User’s Guide Key – upload a PEM formatted private key file. Certificate – upload a PEM formatted certificate file. WISPr Settings WISPr location name – specify the WISPr location name. Operator name – specify the operator’s name Network name – specify the network name ISO country code – specify the country code in ISO standard. E.164 country code – specify the country code in E.164 standard. E.164 area code – specify the area code in E.164 standard.
User’s Guide Appendix A) Resetting Device to Factory Defaults Device has the capability of being reset to defaults by pinging the device with a certain packet size when the radio is booting. During the startup of the device, when the drivers of the Ethernet interfaces are loaded, the discovery daemon is started. The daemon suspends startup process for 3 seconds and waits for ICMP "echo request" packet of length 369 bytes. If the packet received, the discoveryd resets the device to default configuration.
User’s Guide B) RADIUS Attributes The following RADIUS attributes and messages are supported by the DLB APC. General Attributes Attribute Description User-name (1) Full username as entered by the user. User-Password (2) Used for UAM as alternative to CHAP-Password and CHAP-Challenge.
User’s Guide Attribute Description Access-reject chilli will validate that the Message-Authenticator is correct. Acct-Interim-Interval (85) If present in Access-Accept chilli will generate interim accounting records with the specified interval (seconds). MS-MPPE-Send-Key (311,16) Used for WPA MS-MPPE-Recv-Key (311,17) Used for WPA WISPr Attributes Attribute Description WISPr-Location-ID (14122, 1) Location ID is set to the radiuslocationid option if present.
User’s Guide Attribute Description disconnected.