Caution Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge. To protect your device, always: Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
Page 7
In this user’s manual, it will not only tell you how to install and connect your network system but configure and monitor the IWP-2000-68 through the built-in web UI step-by-step. Many explanations in details of hardware and software functions are shown as well as the examples of the operation for web-based interface.
The IWP-2000-68 also operates as multi-function wireless system that includes MESH, Point-to-Point/Point-to-Multipoint Bridge, Access Point, Wireless Client, and Repeater. The dual radio of IWP-2000-68 can be functioned dual band and maintain each radio up to 54Mbps data rate simultaneously on both directions. Key Features in the Device •...
1-2. Specification General 802.11b: 1, 2, 5.5, 11Mbps Data Rates 802.11g: 6,9,12,18,24,36,48,54 Mbps 802.11a: 6,9,12,18,24,36,48,54 Mbps IEEE802.11 a/b/g, IEEE802.1x, IEEE802.3, IEEE802.3u,I Standards EEE802.3af Power Active Ethernet (Power over Ethernet) 48 VDC/1A Requirements External Power Unit: Auto sensing 100/240 VAC; 50/60 Hz FCC/CE (by request), IP68 Regulation Certifications...
Page 10
Web‐ based configuration (HTTP/HTTPS) Remote Configuration Upgrade firmware via WEB, TFTP and FTP Firmware Upgrade 32 users (simultaneously) per radio Max Client Network management Lantech-Wireless-View • Operating: -30°C to 80°C Environmental • Storage: -40°C to 80°C Temperature Range 5%~95% Typical Humidity...
1-3. Package Contents Make sure that you have following items: 1. 1 x IWP-2000-68 Outdoor Wireless Access Point unit 2. 1 x Power Cord 3. 1 x 100~240VAC, 50~60Hz AC to 48V/1A Power Supply 4. 1 x Grounding wire 1.8m 5.
2. Installation 2-1. Full View of IWP-2000-68 Interface on the IWP-2000-68 Unit: eth1: For connecting the RJ-45 CAT-5 Ethernet cable to receiving the power and for user to configure the Access Point. eth0: For connecting and provide power to other device, such as IPCAM.
Power and Data Interface location on the PoE denoted by numbers 3-5. 2-3. Mount Kit for IWP-2000-68 The IWP-2000-68 can be mounted on a pole or wall; user can use the Pole Mount kit to mount the IWP-2000-68 as shown in Figure 2-1 and Wall Mount kit to mount the IWP-2000-68 as shown in Figure 2-2.
This works great in areas where you may not have power, like house roof. This also allows you to place the IWP-2000-68 unit closer to the antenna, to make installation easier more thus reducing signal loss over antenna cabling.
Before installing IWP-2000-68 for outdoor application or hard-to-reach location, we recommend configure and test all the devices first. For configuring the IWP-2000-68, please follow the quick steps below to power up the IWP-2000-68. Refer to Figure 2-3 for steps 1 through IWP-2000-68 Figure 2-3 Step1: Connect the power cord into the Power Input Port of the POE Injector and the AC plug into a power outlet.
3. Operation of Web-based Management 3.1 Basic Configuration This chapter instructs user how to configure and manage the IWP-2000-68 through the web user interface. The default values of the AP are listed in the table below: IP Address 192.168.1.1 Subnet Mask 255.255.255.0...
Figure 3-2 3.2 AP-Bridge Mode The default operating model for IWP-2000-68 is AP-Bridge, this model is to set the device as a normal AP. The functions and settings are list as following: ▽...
Bridge Status ● WIFI Status ● ● System time ● Reboot ● ▽ LAN Bridge LAN settings ● ▽ WIRELESS WIFI ath0 Setting ● WIFI ath1 Setting ● WIFI ath2 Setting ● WIFI ath3 Setting ● WIFI ath4 Setting ● WIFI ath5 Setting ●...
Page 19
Figure 3-2-1 3.2.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-2-2. These settings allow user to configure the device Name, language, model, password, remote management and WIFI Loading Warning Threshold. Device Name This is a host name or system name for the device.
Page 20
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.2.1.2 Firmware Update...
Page 21
Figure 3-2-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP server utility and specify the folder in which the firmware file located.
Page 22
Figure 3-2-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-2-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-2-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device, click on...
Page 23
Figure 3-2-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-2-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-2-10 3.2.1.4 General Status In this page user could see the detail settings of this device, including...
Page 24
Figure 3-2-11 3.2.1.5 Power Control/Status In this page user can enable the PoE power forwarding function for eth0 port.
Page 25
Figure 3-2-12 3.2.1.6 Bridge Status In this page user could see the bridge interfaces information of this device, such as interface information, STP status, mac address information etc. Figure 3-2-13 3.2.1.7 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station.
Page 26
Figure 3-2-14 3.2.1.8 Log In this page user could see the system logs record of this device. Figure 3-2-15 3.2.1.9 System time Select Setting Type Setting by: User can set system time in two ways. One is manual setting, the other one is synchronize with an Internet Time Server. Manual Setting User can manually enter the Year/ Month/ Day and Hour: Minute: Second.
Figure 3-2-16 3.2.1.10 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Page 28
lowest priority will be elected 'root bridge' Hello Time: Set the bridge's 'bridge hello time' value (seconds). Forwarding Delay: Set the bridge's 'bridge forward delay' value (seconds). Max Age: Set the bridge's 'maximum message age' value (seconds) Port Cost: Set the port cost of the port. Port Priority: Set the port priority of the port (interface).
3.2.3 Wireless User can configure the wireless related settings in this page. Figure 3-2-19 3.2.3.1 WIFI ath0~7 Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that user wants to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g.
Page 30
number between 1 and 255 to specify. Fragment Threshold: It is the maximum frame size that wireless device can transmit without fragmenting the frame. Enter a value between 256 and 2346 to specify the Fragment Threshold. RTS/CTS Threshold: Packets larger than the value are transmitted by the RTS/CTS handshake.
Page 31
Select Key: Check the radio box in front of the key that user would like to use for this AP. Figure 3-2-22 WPA-Personal: The method of authentication is similar to WEP, user can define a ‘Pre-Shared Key’, once the key is confirmed and satisfied on both the client and access point, then access is granted.
Page 32
QoS WMM: Enable/disable WMM support. MAX Associated Station: Maximum number of stations allowed in station table. Common Parameters: CWmin: Minimum Contention Window. The valid values for ‘CWmin’ are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, or 4095.
wireless medium (WM). This value specifies (in milliseconds) the Transmission Opportunity (TXOP) for Client Station; that is, the interval of time when the WMM AP has the right to initiate transmissions on the wireless network. ACM: Admission control mandatory. Figure 3-2-25 3.2.4 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s).
Figure 3-2-26 3.2.5 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.2.5.1 Basic Setting SNMP Agent Check the <Enable> check box to turn on SNMP. Please Note: Enable the SNMP will also enable the LLDP (Link Layer Discovery Protocol) function.
Page 35
have the correct community name, user can't retrieve any data (get) or make any change (set). Multiple SNMP managers may be organized in a specified community. V3 The SNMP V3 is a Security Enhancement for SNMP, it provides secure access to devices by a combination of userID, authenticating and encrypting packets over the network.
Page 36
3.2.5.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 37
View Create a view for user to let the groups have rights to view the MIB tree. Index: Index of View. Tick the checkbox to enable the recordset. View Name: The name of view. Include: Assign include or exclude in this record for certain subtree.
Page 38
Figure 3-2-30 3.2.5.3 SNMP Trap It is an SNMP application that uses the SNMP TRAP operation to send information to a network management system. SNMP Trap Trap Active: To enable or disable SNMP Trap function. Version: Indicate the traps will be sent in v1 or v2c or not send (disable).
Figure 3-2-32 3.2.6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-2-33 3.2.7 Log Out User can manually logout by click on <Log Out>. Figure 3-2-34 3.3 AP-CB-Bridge Mode AP-CB-Bridge mode is to set this device as an AP and Client Bridge device, the setting and functions as following: ▽...
Page 41
Language Select This function allows user to select a language for the UI, the options available are: English, Simplified Chinese and Traditional Chinese. Model Select OLSR-AP: To set this device as an AP with layer 3 MESH function. AODV-AP: To set this device as an AP with layer 3 MESH function. AP-Bridge: To set this device as a normal AP.
Page 42
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.3.1.2 Firmware Update...
Page 43
Using FTP On FTP server, there should have valid firmware which includes fs-opn.img and/or kernel-opn.img. On the Firmware Update - FTP page, enter the IP address of the FTP server, firmware name and FTP user name and password. Then click on <APPLY> button to start the firmware upgrade process.
Page 44
Click on <Backup Settings> button on next page to save the settings of this device to a file named ‘configs.tar’ on user’s PC. To Restore the settings, click on <Browse> button and select the correct file path and file name. Then, click on <Restore Settings> button to start the restore settings process.
Page 45
Figure 3-3-11 3.3.1.5 Power Control/Status In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-3-12...
Page 46
3.3.1.6 Bridge Status In this page user could see the bridge interfaces information of this device, such as interface information, STP status, mac address information etc. Figure 3-3-13 3.3.1.7 WIFI Status In this page user can click WIFI Interfaces to see each WIFI’s information of this device, such as: Interface information, Security information, Associated AP/Station.
Page 47
The Figure 3-3-15shows that the ath3 (CB model) has connected to an AP, and display the relevant information. Figure 3-3-15 The Figure 3-3-16 shows ath4 (AP model) information. Figure 3-3-16 3.3.1.8 Log In this page user could see the system logs record of this device. Figure 3-3-17 3.3.1.9 System time Select Setting Type...
User can manually enter the Year/ Month/ Day and Hour: Minute: Second. Using Internet Time Server Hours from GMT: User can enter the Hours from GMT, for example Taiwan is GMT +8 Hours. Server IP: User should enter the Internet time server IP address. Time Update for Every: User can set time update interval by enter the days, hours, and minutes.
Page 49
User can change the network settings of this device from LAN Configuration; it is including IP address, Subnet mask, and Gateway address. Bridge STP Setting User can also set the Bridge STP setting in this page. STP/RSTP: Disable the bridge STP or set the bridge mode as STP or RSTP mode.
3.3.3 Wireless User can set the wireless related setting here. Figure 3-3-21 3.3.3.1 Rogue AP Scan Rogue Enable Check the radio box in front of <Enable> to enable the Rogue AP detection, and Press <Add> or <Del> button to apply. Allow AP The allowable AP list.
Page 51
The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network. In station mode (CB), this SSID must be same as the AP that user wish to connect. User can either type in the SSID by themself or simply press the <Scan>...
Page 52
Figure 3-3-23 SSID Security Mode Authentication: User can choose which authentication type to secure the wireless net work. There are four options for authentication: Disable, WEP, WPA-personal and WPA-enterprise. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11 standard.
Page 53
Figure 3-3-25 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus support the 802.1x authentication. To use this function, a separate RADIUS server is required User should enter their account and password to pass the authentication. Figure 3-3-26 Please Note: In wifi station model, the security setting must be same as the AP that user wish to connect.
Page 54
Figure 3-3-27 Advanced Settings Peer Node Distance: Set the distance between this device and it’s adjacent. If select 'manual', the distance will be determined by 'Slot time', 'ACK timeout' and 'CTS timeout' three values. Beacon Period: This item contains the length of the beacon interval. Enter a value between 20 and 1000 to specify the Beacon Period.
Page 55
Figure 3-3-28 SSID Security Mode Authentication: User can choose which authentication type to secure the wireless net work. There are four options for authentication: Disable, WEP, WPA-personal and WPA-enterprise. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11 standard.
Page 56
(broadcast/multicast encryption keys) in seconds. Figure 3-3-30 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus support the 802.1x authentication. To use this function, a separate RADIUS server is required. User should enter the IP and port number of the Authentication Server and Shared Secret here.
Page 57
This affects traffic flowing from the access point to the client station. These parameters are used by the access point when transmitting frames to the clients. AP Tx-Best Effort: Medium Priority. Medium throughput and delay. Most traditional IP data is sent to this queue. AP Tx-Background: Low Priority.
Reject: All PCs/interfaces can access this AP except those interfaces/PCs with MAC address in the MAC address table. Figure 3-2-32 3.3.5 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.3.5.1 Basic Setting SNMP Agent Check the <Enable>...
Page 59
Lantech-Wireless-View to remote management the AP and draw the network topography. System Information Contact: Specify the contact name for this managed node as well as information about how to contact this person. Location: It is used to define the location of the host on which the SNMP agent is running.
Page 60
Figure 3-2-34 3.3.5.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 61
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 62
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-3-38 Trap Items Enable/Disable which trap items to send. Figure 3-3-39 3.3.6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-3-40 3.3.7 Log Out User can manually logout by click on <Log Out>. Figure 3-3-41...
3.4 AP-CB-Route Mode AP-CB-Route mode is to set this device as a router device with AP and CB functions. The setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Control ● WIFI Status ●...
3.4.1 System This page shows the current status and some basic settings of the device, including Administrator, Firmware, Configuration Tools, General Status, Power Control, WIFI Status, Log, System Time and Reboot; screen as shown in Figure 3-4-1 Figure 3-4-1 3.4.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-4-2.
Page 66
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.4.1.2 Firmware Update...
Page 67
Figure 3-4-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 68
Figure 3-4-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-4-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-4-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 69
Figure 3-4-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-4-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-4-10 3.4.1.4 General Status In this page user could see the detail settings of this device, including...
Page 70
Figure 3-4-11 3.4.1.5 Power Control/Status In this page user can enable the eth0 port to provide PoE power and data forwarding function.
Page 71
Figure 3-4-12 3.4.1.6 WIFI Status In this page user can click WIFI Interfaces to see each WIFI information of this device, such as: Interface information, Security information, Associated AP/Station. The Figure 3-4-13 shows the ath3 (CB) interface is waiting for connecting to an AP.
Page 72
3.4.1.7 Log In this page user could see the system logs record of this device. Figure 3-4-16 3.4.1.8 System time Select Setting Type Setting by: User can set system time in two ways. One is manual setting, the other one is synchronize with an Internet Time Server. Manual Setting User can manually enter the Year/ Month/ Day and Hour: Minute: Second.
Figure 3-4-18 3.4.2 WAN Configuration 3.4.2.1 WAN Settings This function is to establish a connection with user’s WAN network, select the IP Allocation Mode that ISP is used. Interface ath3 Setting IP Authentication: Indicate how the IP address of this device will be assigned.
User can press <Add> button to add IP address to the Bandwidth Limitation list. User can tick the check box and press <Del> button to delete the IP address from the Bandwidth Limitation list. Figure 3-4-20 3.4.3 LAN Configuration User can change the local network settings of this device from LAN Configuration for eth0~eth1 and ath4~ath7, which include the IP address, Subnet mask and DHCP server related settings.
Figure 3-4-21 3.4.4 Wireless User can set the wireless related setting here. Figure 3-4-22 3.4.4.1 Rogue AP Scan Rogue Enable Check the radio box in front of <Enable> to enable the Rogue AP detection, and Press <Add> or <Del> button to apply. Allow AP The allowable AP list.
Page 76
Press <WIFIx> button to Re-scan the APs nearby which are scanned by wifi card x (x:1 or 2) Figure 3-4-23 3.4.4.2 WIFI ath3 Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that user wants to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g.
Page 77
specify the value of the RTS /CTS Threshold. Tx Power: To set the tx power as off to turn off the tx power, set auto to let device determine the tx power value automatically, or set manual to set the tx power value. The max value is depending on the wireless module.
Page 78
granted. The encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP). WPA MODE: In this setting, user can choose WPA or WPA2 or WPA & WPA2. (WPA2 is far superior to WPA, because the encryption of method used is Advanced Encryption Standard (AES).) Share Key: User should define the pre-share key in here;...
Page 79
radio channels. Channel: Set the operating frequency/channel for this device. Figure 3-4-28 Advanced Settings Peer Node Distance: Set the distance between this device and it’s adjacent. If select 'manual', the distance will be determined by 'Slot time', 'ACK timeout' and 'CTS timeout' three values. Beacon Period: This item contains the length of the beacon interval.
Page 80
Figure 3-4-29 SSID Security Mode Authentication: User can choose which authentication type to secure the wireless net work. There are four options for authentication: Disable, WEP, WPA-personal and WPA-enterprise. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11 standard.
Page 81
(broadcast/multicast encryption keys) in seconds. Figure 3-4-31 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus support the 802.1x authentication. To use this function, a separate RADIUS server is required. User should enter the IP and port number of the Authentication Server and Shared Secret here.
Page 82
This affects traffic flowing from the access point to the client station. These parameters are used by the access point when transmitting frames to the clients. AP Tx-Best Effort: Medium Priority. Medium throughput and delay. Most traditional IP data is sent to this queue. AP Tx-Background: Low Priority.
3.4.5 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to user’s network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
MAC address in the MAC address table. Figure 3-4-35 3.4.6 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.4.6.1 Basic Setting SNMP Agent Check the <Enable> check box to turn on SNMP. Please Note: Enable the SNMP will also enable the LLDP (Link Layer Discovery Protocol) function.
Page 85
SNMP Community provides a simple protection by using the community name to control the access to the SNMP. The community name can be thought of as a password. If user don’t have the correct community name, user can’t retrieve any data (get) or make any change (set).
Page 86
Figure 3-4-36 3.4.6.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 87
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 88
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-4-40 Trap Items Enable/Disable which trap items to send. Figure 3-4-41 3.4.7 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-4-42 3.4.8 Log Out User can manually logout by click on <Log Out>. Figure 3-4-43...
3.5 CB-CB-Route Mode CB-CB-Route mode is to set this device as a router device with two CBs (Station mode). For example, one CB connects to an Internet Provider’s AP for WAN connection; another CB connects to the intranet’s AP. The setting and functions list as following: ▽...
3.5.1 System This page shows the current status and some basic settings of the device, including Administrator, Firmware, Configuration Tools, General Status, Power Control, WIFI Status, Log, System time and Reboot; screen as shown in Figure 3-5-1 Figure 3-5-1 3.5.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-5-2.
Page 92
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.5.1.2 Firmware Update...
Page 93
Figure 3-5-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 94
Figure 3-5-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-5-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-5-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 95
Figure 3-5-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-5-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-5-10 3.5.1.4 General Status In this page user could see the detail settings of this device, including...
Page 96
Figure 3-5-11 3.5.1.5 Power Control/Status In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-5-12...
Page 97
3.5.1.6 WIFI Status In this page user can click WIFI Interfaces to see each WIFI information of this device, such as: Interface information, Security information, Associated AP/Station. The Figure 3-5-13 shows the ath3/ath7 (CB) interface is waiting for connecting to an AP. Figure 3-5-13 The Figure 3-5-14 shows that the ath3/ath7 (CB model) has connected to an AP, and display the relevant information.
Using Internet Time Server Hours from GMT: User can enter the Hours from GMT, for example Taiwan is GMT +8 Hours. Server IP: User should enter the Internet time server IP address here. Time Update for Every: User can set time update interval by enter the days, hours, and minutes.
Figure 3-5-18 3.5.2.2 Bandwidth Management This function allows user to set the limitation of total upload/download bandwidth on WAN interface, and also can set the limitation of upload/download bandwidth for each user or a group of users by IP address. Bandwidth Management Bandwidth Management: Enable bandwidth limitation function.
User can change the network settings of this interface from LAN configuration; it is including IP address, Subnet mask and enable/disable the DHCP server Function. DHCP Server Parameters Primary / Secondary DNS Address: The domain-name-servers option specifies a list of Domain Name System name servers available to the client IP Pool Starting / Ending Address: The IP Address range which will be assigned.
Page 101
Figure 3-5-22 3.5.4.1 Rogue AP Scan Rogue Enable Check the radio box in front of <Enable> to enable the Rogue AP detection, and Press <Add> or <Del> button to apply. Allow AP The allowable AP list. The AP in the list is a legal AP for CB to connect.
Page 102
user’s wireless network. In station mode (CB), this SSID must be same as the AP that user wish to connect. User can either type in the SSID by themself or simply press the <Scan> button and select the AP form the popup list, then click <submit>. MAC Cloning: This feature controls the MAC Address of the Wireless Bridge seen by other devices (wired or wireless).
Page 103
Figure 3-5-24 SSID Security Mode Authentication: User can choose which authentication type to secure the wireless net work. There are four options for authentication: Disable, WEP, WPA-personal and WPA-enterprise. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11 standard.
Figure 3-5-26 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus support the 802.1x authentication. To use this function, a separate RADIUS server is required User should enter their account and password to pass the authentication. Figure 3-5-27 Please Note: In wifi station model, the security setting must be same as the AP that user wish to connect.
Figure 3-5-28 3.5.5.2 MAC Filtering User can block certain clients from accessing this AP based on its MAC address. Use Filtering type to define the filtering scenario: General Disabled: Disable this filtering function. If this option is selected, all PCs can access this AP. Accept: All PCs are filtered out except those MAC addresses in the following MAC address table.
Figure 3-5-29 3.5.6 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.5.6.1 Basic Setting SNMP Agent Check the <Enable> check box to turn on SNMP. Please Note: Enable the SNMP will also enable the LLDP (Link Layer Discovery Protocol) function.
Page 107
community name can be thought of as a password. If user don't have the correct community name, user can't retrieve any data (get) or make any change (set). Multiple SNMP managers may be organized in a specified community. V3 The SNMP V3 is a Security Enhancement for SNMP, it provides secure access to devices by a combination of userID, authenticating and encrypting packets over the network.
Page 108
Figure 3-5-30 3.5.6.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 109
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 110
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-5-34 Trap Items Enable/Disable which trap items to send. Figure 3-5-35 3.5.7 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-5-36 3.5.8 Log Out User can manually logout by click on <Log Out>. Figure 3-5-37...
3.6 VLAN AP Mode To set this device as a VLAN-AP. Each AP bridge (SSID) has its own VLAN ID, the setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Control ●...
Page 113
Figure 3-6-1 3.6.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-6-2. These settings allow user to configure the Device Name, Language, Model, Password, Remote Management and WIFI Loading Warning Threshold. Device Name This is a host name or system name for the device.
Page 114
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.6.1.2 Firmware Update...
Page 115
Figure 3-6-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 116
Figure 3-6-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-6-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-6-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 117
Figure 3-6-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-6-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-6-10 3.6.1.4 General Status In this page user could see the detail settings of this device, including...
Page 118
Figure 3-6-11 3.6.1.5 Power Control/Status In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-6-12...
Page 119
3.6.1.6 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station. Figure 3-6-13 3.6.1.7 Log In this page user could see the system logs record of this device. Figure 3-6-14 3.6.1.8 System time Select Setting Type...
Figure 3-6-15 3.6.1.9 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Page 121
Figure 3-6-18 3.6.3.1 WIFI ath0~7 Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that user wants to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. VLAN ID: It is only available in VLAN_AP model. It is the VLAN tag value.
Page 122
number between 1 and 255 to specify. Fragment Threshold: It is the maximum frame size that wireless device can transmit without fragmenting the frame. Enter a value between 256 and 2346 to specify the Fragment Threshold. RTS/CTS Threshold: Packets larger than the value are transmitted by the RTS/CTS handshake.
Page 123
Select Key: Check the radio box in front of the key that user would like to use for this AP. Figure 3-6-21 WPA-Personal: The method of authentication is similar to WEP, user can define a ‘Pre-Shared Key’, once the key is confirmed and satisfied on both the client and access point, then access is granted.
Page 124
QoS WMM Enable/disable WMM support. MAX Associated Station: Maximum number of stations allowed in station table. Common Parameters: CWmin: Minimum Contention Window. The valid values for ‘CWmin’ are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, or 4095.
wireless medium (WM). This value specifies (in milliseconds) the Transmission Opportunity (TXOP) for Client Station; that is, the interval of time when the WMM AP has the right to initiate transmissions on the wireless network. ACM: Admission control mandatory. Figure 3-6-24 3.6.4 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s).
Figure 3-6-25 3.6.5 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.6.5.1 Basic Setting SNMP Agent Check the <Enable> check box to turn on SNMP. Please Note: Enable the SNMP will also enable the LLDP (Link Layer Discovery Protocol) function.
Page 127
community name can be thought of as a password. If user don't have the correct community name, user can't retrieve any data (get) or make any change (set). Multiple SNMP managers may be organized in a specified community. V3 The SNMP V3 is a Security Enhancement for SNMP, it provides secure access to devices by a combination of userID, authenticating and encrypting packets over the network.
Page 128
Figure 3-6-26 3.6.5.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 129
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 130
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Auth Level: Assign security level in this record. The Options are: NoAuthNoPriv, AuthNoPriv, AuthPriv. Figure 3-6-30 Trap Items Enable/Disable which trap items to send. Figure 3-6-31 3.6.6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device.
3.7 AP_WDS_Bridge Mode To set this device as a WDS device, the setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Control ● Bridge Status ● WIFI Status ● ● System time ●...
Page 133
Figure 3-7-1 3.7.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-7-2. These settings allow user to configure the Device Name, Language, Model, Password, Remote Management and WIFI Loading Warning Threshold. Device Name This is a host name or system name for the device.
Page 134
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.7.1.2 Firmware Update...
Page 135
Figure 3-7-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 136
Figure 3-7-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-7-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-7-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 137
Figure 3-7-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-7-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-7-10 3.7.1.4 General Status In this page user could see the detail settings of this device, including...
Page 138
Figure 3-7-11 3.7.1.5 Power Control/Status In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-7-12...
Page 139
3.7.1.6 Bridge Status In this page user could see the bridge interfaces information of this device, such as interface information, STP ststus, mac address information etc. Figure 3-7-13 3.7.1.7 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station.
Page 140
Figure 3-7-14 3.7.1.8 Log In this page user could see the system logs record of this device. Figure 3-7-15 3.7.1.9 System time Select Setting Type Setting by: User can set system time in two ways. One is manual setting, the other one is Synchronize with an Internet Time Server. Manual Setting User can manually enter the Year/ Month/ Day and Hour: Minute: Second.
Figure 3-7-16 3.7.1.10 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Max Age: Set the bridge's 'maximum message age' value (seconds) Port Cost: Set the port cost of the port. Port Priority: Set the port priority of the port (interface). It is used in the designated port and root port selection algorithms. P to P: If a bridge port is operating in full-duplex mode, than the port is functioning as point-to-point.
Page 143
3.7.3.1 WIFI ath0 and ath4 Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that user wants to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network.
Page 144
other. WEP Key Setting: It uses two kinds of WEP Encryption key length: 5-bytes and 13-bytes. The key format can either use 'ASCII' to set the key values (ie. 0~9, a~z) Or use 'HEX' to set the key value in hexadecimal.
Page 145
WPA-Personal: The method of authentication is similar to WEP, user can define a ‘Pre-Shared Key’, once the key is confirmed and satisfied on both the client and access point, then access is granted. The encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP).
Page 146
CWmin: Minimum Contention Window. The valid values for ‘CWmin’ are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, or 4095. The value for ‘CWmin’ must be lower than the value for ‘CWmax’. CWmax: Maximum Contention Window. The Valid values for ‘cwmax’...
Figure 3-7-25 3.7.4 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to user’s network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
Figure 3-7-26 3.7.5 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.7.5.1 Basic Setting SNMP Agent Check the <Enable> check box to turn on SNMP. Please Note: Enable the SNMP will also enable the LLDP (Link Layer Discovery Protocol) function.
Page 149
community name can be thought of as a password. If user don't have the correct community name, user can't retrieve any data (get) or make any change (set). Multiple SNMP managers may be organized in a specified community. V3 The SNMP V3 is a Security Enhancement for SNMP, it provides secure access to devices by a combination of userID, authenticating and encrypting packets over the network.
Page 150
Figure 3-7-27 3.7.5.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 151
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 152
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-7-31 Trap Items Enable/Disable which trap items to send. Figure 3-7-32 3.7.6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-7-33 3.7.7 Log Out User can manually logout by click on <Log Out>. Figure 3-7-34...
3.8 AP4 WDS Bridge Mode To set this device as a WDS device, the setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Control ● Bridge Status ● WIFI Status ● ●...
Page 155
Figure 3-8-1 3.8.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-8-2. These settings allow user to configure the Device Name, Language, Model, Password, Remote Management and WIFI Loading Warning Threshold. Device Name This is a host name or system name for the device.
Page 156
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.8.1.2 Firmware Update...
Page 157
Figure 3-8-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 158
Figure 3-8-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-8-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-8-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 159
Figure 3-8-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-8-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-8-10 3.8.1.4 General Status In this page user could see the detail settings of this device, including...
Page 160
Figure 3-8-11 3.8.1.5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-8-12...
Page 161
3.8.1.6 Bridge Status In this page user could see the bridge interfaces information of this device, such as interface information, STP status, mac address information etc. Figure 3-8-13 3.8.1.7 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station.
Page 162
Figure 3-8-14 3.8.1.8 Log In this page user could see the system logs record of this device. Figure 3-8-15 3.8.1.9 System time Select Setting Type Setting by: User can set system time in two ways. One is manual setting, the other one is Synchronize with an Internet Time Server. Manual Setting User can manually enter the Year/ Month/ Day and Hour: Minute: Second.
Figure 3-8-16 3.8.1.10 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Max Age: Set the bridge's 'maximum message age' value (seconds) Port Cost: Set the port cost of the port. Port Priority: Set the port priority of the port (interface). It is used in the designated port and root port selection algorithms. P to P: If a bridge port is operating in full-duplex mode, than the port is functioning as point-to-point.
Page 165
Figure 3-8-19 3.8.3.1 WIFI ath0 Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that user wants to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network.
Page 166
Tx Power: To set the tx power as off to turn off the tx power, set auto to let device determine the tx power value automatically, or set manual to set the tx power value. The max value is depending on the wireless module.
Page 167
transmitted without encryption. If the 'Restricted' selected, all the packets are transmitted with encryption. Select Key: Check the radio box in front of the key you would like to use for this AP. igure 3-8-23 WPA-Personal: The method of authentication is similar to WEP, user can define a ‘Pre-Shared Key’, once the key is confirmed and satisfied on both the client and access point, then access is granted.
Page 168
Figure 3-8-25 QoS WMM: Enable/disable WMM support. MAX Associated Station: Maximum number of stations allowed in station table. Common Parameters: CWmin: Minimum Contention Window. The valid values for ‘CWmin’ are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, or 4095.
Page 169
transmitted to the access point. STA Tx-Best Effort: Medium Priority, Medium throughput and delay. Most traditional IP data will be sending to this queue. STA Tx-Background: Low Priority, High throughput. Bulk data that requires maximum throughput and it’s not time-sensitive will be sending to this queue (FTP data, for example).
Page 170
Figure 3-8-27 Advanced Settings Peer Node Distance: Set the distance between this device and it’s adjacent. If select 'manual', the distance will be determined by 'Slot time', 'ACK timeout' and 'CTS timeout' three values. Beacon Period: This item contains the length of the beacon interval. Enter a value between 20 and 1000 to specify the Beacon Period.
Page 171
Figure 3-8-28 SSID Security Mode Authentication: User can choose which authentication type to secure the wireless net work. There are four options for authentication: Disable, WEP, WPA-personal and WPA-enterprise. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11 standard.
Page 172
(broadcast/multicast encryption keys) in seconds. Figure 3-8-30 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus support the 802.1x authentication. To use this function, a separate RADIUS server is required. User should enter the IP and port number of the Authentication Server and Shared Secret here.
Page 173
AP Parameters: This affects traffic flowing from the access point to the client station. These parameters are used by the access point when transmitting frames to the clients. AP Tx-Best Effort: Medium Priority. Medium throughput and delay. Most traditional IP data is sent to this queue. AP Tx-Background: Low Priority.
Reject: All PCs/interfaces can access this AP except those interfaces/PCs with MAC address in the MAC address table. Figure 3-8-33 3.8.5 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.8.5.1 Basic Setting SNMP Agent Check the <Enable>...
Page 175
Protocol) function. This function will be used if user wants Lantech-Wireless-View to remote management the AP and draw the network topography. System Information Contact: Specify the contact name for this managed node as well as information about how to contact this person.
Page 176
Figure 3-8-34 3.8.5.2 VACM Setting User can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 177
Map the security names into group names. (For SNMP V3, the security Name is the user ID in Basic setting.) Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights.
Page 178
Access The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
NoAuthNoPriv, AuthNoPriv, authPriv. Figure 3-8-38 Trap Items Enable/Disable which trap items to send. Figure 3-8-39 3.8.6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-8-40 3.8.7 Log Out User can manually logout by click on <Log Out>.
3.9 OLSR_AP Mode To set this device as a MESH device, the setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Control ● WIFI Status ● ● System time ● Reboot ●...
3.9.1 System This page shows the current status and some basic settings of the device, including Administrator, Firmware, Configuration Tools, General Status, Power Control, WIFI Status, Log, System Time and Reboot; screen as shown in Figure 3-9-1 Figure 3-9-1 3.9.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-9-2.
Page 182
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.9.1.2 Firmware Update...
Page 183
Figure 3-9-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 184
Figure 3-9-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-9-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-9-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 185
Figure 3-9-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-9-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-9-10 3.9.1.4 General Status In this page user could see the detail settings of this device, including...
Page 186
Figure 3-9-11 3.9.1.5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-9-12...
Page 187
3.9.1.6 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station. Figure 3-9-13 3.9.1.7 Log In this page user could see the system logs record of this device. Figure 3-9-14 3.9.1.8 System time Select Setting Type...
Figure 3-9-15 3.9.1.9 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Page 189
Figure 3-9-17 3.9.2.2 Bandwidth Management This function allows user to set the limitation of total upload/download bandwidth on WAN interface, and also can set the limitation of upload/download bandwidth for each user or a group of users by IP address. Bandwidth Management Bandwidth Management: Enable bandwidth limitation function.
3.9.3 LAN Configuration The Access Point must have an IP address for the (wireless) local area network. User can also enable DHCP service to assign IP address to the wireless clients. (Please Note: The DHCP service for MESH network is inhibited.) 3.9.3.1 Eth0 Settings Network IP Parameters...
Lease Time: How long does the IP address can be leased by DHCP server. Figure 3-9-20 3.9.3.3 MESH WLAN Settings User can configure the IP address for MESH ath0 interface in here. The IP address for MESH ath0 must be in the same subnet with other MESH device’s ath0 interface, and must be in different subnet with WAN, AP WLAN IP address.
Page 192
Figure 3-9-22 3.9.4.2 OLSR-ADMIN In this page, user can set the MESH related settings that shows in OLSR-CONFIG Change basic settings Pollrate [0.0-m.n]: This option sets the interval in seconds, which the mesh scheduler should be poll for events every 0.2 seconds if the pollrate is set to 0.2.
Page 193
Fisheye [Enable, Disable]: To increase stability in a mesh, TC messages should be sent quite frequently. However, the network would then suffer from the resulting overhead. The idea is to frequently send TC messages to adjacent nodes, i.e. nodes that are likely to be involved in routing loops, without flooding the whole mesh with each sent TC message.
Page 194
Figure 3-9-24 3.9.4.4 OLSR-LINKS LINKS Local IP Remote IP lost total 192.168.0.2 192.168.0.1 1.000 1.000 1.00 This table contains the links to our neighbors. It contains the following columns. Local IP: The IP address of the interface that have contacted to the neighbor.
will: The neighbor's willingness. 2_Hop_Neighbors: The IP address of 2 hops neighbors. Topology entries Source_IP Dest_IP 10.0.0.6 192.168.0.2 1.000 1.000 1.00 10.0.0.6 10.0.0.5 1.000 1.000 1.00 This table displays the topology information that mesh system has gathered from LQ TC messages. It states which nodes in the network report links to which other nodes and what quality does these links have.
Page 196
Figure 3-9-26 3.9.5.1 WIFI AP Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that you want to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network.
Page 197
RTS/CTS Threshold: Packets larger than the value are transmitted by the RTS/CTS handshake. Enter a value between 1 and 2346 to specify the value of the RTS /CTS Threshold. Tx Power: To set the tx power as off to turn off the tx power, set auto to let device determine the tx power value automatically, or set manual to set the tx power value.
Page 198
Figure 3-9-29 WPA-Personal: The method of authentication is similar to WEP, user can define a ‘Pre-Shared Key’, once the key is confirmed and satisfied on both the client and access point, then access is granted. The encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP).
Page 199
MAX Associated Station: Maximum number of stations allowed in station table. Common Parameters: CWmin: Minimum Contention Window. The valid values for ‘CWmin’ are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, or 4095. The value for ‘CWmin’ must be lower than the value for ‘CWmax’.
Page 200
interval of time when the WMM AP has the right to initiate transmissions on the wireless network. ACM: Admission control mandatory. Figure 3-9-32 3.9.5.2 WIFI MESH Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that you want to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g.
Page 201
number between 1 and 255 to specify. Fragment Threshold: It is the maximum frame size that wireless device can transmit without fragmenting the frame. Enter a value between 256 and 2346 to specify the Fragment Threshold. RTS/CTS Threshold: Packets larger than the value are transmitted by the RTS/CTS handshake.
Select Key: Check the radio box in front of the key you would like to use for this AP. Figure 3-9-35 3.9.6 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to user’s network.
Reject: All PCs/interfaces can access this AP except those interfaces/PCs with MAC address in the MAC address table. Figure 3-9-37 3.9.7 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.9.7.1 Basic Setting SNMP Agent Check the <Enable>...
Page 204
V1/V2C User can change user’s SNMP community settings on this page. Access Right: Select an access right for the SNMP manager. 'Read' is read only, 'Write' is read-write, and 'Deny' means this community name is not implemented. Community: Specify the name of community for the SNMP manager.
Page 205
Figure 3-9-38 3.9.7.2 VACM Setting You can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 206
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 207
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-9-42 Trap Items Enable/Disable which trap items to send. Figure 3-9-43 3.9.8 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-9-44 3.9.9 Log Out User can manually logout by click on <Log Out>. Figure 3-9-45...
3.10 AODV_AP Mode To set this device as a MESH device, the setting and functions as following: ▽ SYSTEM Administrator ● Firmware ● Configuration Tools ● General Status ● Power Concrol ● WIFI Status ● ● System time ● Reboot ●...
Page 210
Status, Power Control, WIFI Status, Log, System Time and Reboot; screen as shown in Figure 3-10-1 Figure 3-10-1 3.10.1.1 Administrator By selecting the item of Administrator under System, User will see the screen shown in Figure 3-10-2. These settings allow user to configure the Device Name, Language, Model, Password, Remote Management and WIFI Loading Warning Threshold.
Page 211
The threshold value is used by Lantech-Wireless-View. Lantech-Wireless-View will monitor the WIFI loading, when the loading is over this value, Lantech-Wireless-View will change the color of the link line on network topology to notify the user about condition of the link quality. The threshold value is between 5 and 3.10.1.2 Firmware Update...
Page 212
Figure 3-10-3 Using TFTP On any computer in the network or a compute direct connect to the AP. Install a TFTP Server utility, and put the firmware file named ‘upgradeFW.tar’ in a folder. Run TFTP utility and specify the folder in which the firmware file located.
Page 213
Figure 3-10-4 Restore Factory Default Configuration: To reset configuration settings to the factory default values, just click on <NEXT> button beside ‘Restore Factory Default Configuration’. Figure 3-10-5 Then click on <Restore> button on next page, now the system will reset to factory default value. Figure 3-10-6 Local Backup Settings/Restore settings To backup or restore the configuration for this device.
Page 214
Figure 3-10-8 Remote Backup Settings/Restore settings User can also backup/restore the configuration of this device remotely. Click on <NEXT> button beside ‘Local Backup settings/Restore settings’, Figure 3-10-9 Enter the necessary setting in next page, then click on <Backup To Server> or <Restore From Server> to start the process. Figure 3-10-10 3.10.1.4 General Status In this page user could see the detail settings of this device, including...
Page 215
Figure 3-10-11 3.10.1.5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function. Figure 3-10-12...
Page 216
3.10.1.6 WIFI Status In this page user could see the WIFI information of this device, such as: Interface information, Security information, Associated AP/Station. Figure 3-10-13 3.10.1.7 Log In this page user could see the system logs record of this device. Figure 3-10-14 3.10.1.8 System time Select Setting Type...
Figure 3-10-15 3.10.1.9 Reboot User can perform reboot function in case of the device is not function normally, or after user change some major settings for example: change system model. The existing settings will not be changed. To perform the reboot, click on the <Reboot> button and click on <OK> on pop-up screen to confirm user’s decision.
Page 218
Figure 3-10-16 3.10.2.2 Bandwidth Management This function allows user to set the limitation of total upload/download bandwidth on WAN interface, and also can set the limitation of upload/download bandwidth for each user or a group of users by IP address. Bandwidth Management Bandwidth Management: Enable bandwidth limitation function.
3.10.3 LAN Configuration 3.10.3.1 Eth0 Settings Network IP Parameters User can change the network settings of this interface from LAN configuration; it is including IP address, Subnet mask, and enable/disable the DHCP server Function. DHCP Server Parameters Primary / Secondary DNS Address: The domain-name-servers option specifies a list of Domain Name System name servers available to the client IP Pool Starting / Ending Address: The IP Address range which will...
Figure 3-10-19 3.10.3.3 MESH WLAN Settings User can configure the IP address for MESH ath0 interface in here. The IP address for MESH ath0 must be in the same subnet with other MESH device’s ath0 interface, and must be in different subnet with WAN, AP WLAN IP address.
Active Internet: It will provide interfaces to provide internet. When set 'on', the eth1 will be the interface to internet. The default gateway is set within WAN setting page. When set 'off', the default gateway will set on the AODV interface (ath0). RREQ Gratuitous: Force the gratuitous flag to be set on all RREQ's.
Page 222
Wireless Mode: Select which wireless mode that you want to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network. The SSID must be identical for all access points in the network.
Page 223
5-bytes and 13-bytes. The key format can either use 'ASCII' to set the key values (ie. 0~9, a~z) Or use 'HEX' to set the key value in hexadecimal. (ie. 0~9, a~f). User can set maximum 4 keys, but only one key will functional at one time. Figure 3-10-23 SSID Security Mode Authentication: User can choose which authentication type to...
Page 224
length of the key is (8-23 characters). WPA Encryption: User can choose the encryption method of the pre-shared key here; there are three options: Auto, AES and TKIP. Group Key Update Interval: Time interval for rekeying the GTK (broadcast/multicast encryption keys) in seconds. Figure 3-10-25 WPA-enterprise: WPA-Enterprise includes all of the features of WPA-PSK plus...
Page 225
ms) for bursting. AP Parameters: This affects traffic flowing from the access point to the client station. These parameters are used by the access point when transmitting frames to the clients. AP Tx-Best Effort: Medium Priority. Medium throughput and delay. Most traditional IP data is sent to this queue.
Page 226
Figure 3-10-27 3.10.5.2 WIFI MESH Setting General Radio Power: Turn this interface on or off Wireless Mode: Select which wireless mode that you want to use. The options available here are: 802.11a, 802.11b, 802.11g and 802.11b+g. SSID: The SSID (service set identifier) is an identifier of an AP in user’s wireless network.
Page 227
between 256 and 2346 to specify the Fragment Threshold. RTS/CTS Threshold: Packets larger than the value are transmitted by the RTS/CTS handshake. Enter a value between 1 and 2346 to specify the value of the RTS /CTS Threshold. Tx Power: To set the tx power as off to turn off the tx power, set auto to let device determine the tx power value automatically, or set manual to set the tx power value.
Figure 3-10-30 3.10.6 Filtering The MAC address filter can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to user’s network. A MAC address is a unique ID assigned by the manufacturer of the network adapter.
PCs/interfaces can access this AP except those interfaces/PCs with MAC address in the MAC address table. Figure 3-10-32 3.10.7 SNMP The IWP-2000-68 support SNMP V1/V2C/V3, this page is for defines the SNMP access control and SNMP traps. 3.10.7.1 Basic Setting SNMP Agent Check the <Enable>...
Page 230
V1/V2C User can change user’s SNMP community settings on this screen. Access Right: Select an access right for the SNMP manager. 'Read' is read only, 'Write' is read-write, and 'Deny' means this community name is not implemented. Community: Specify the name of community for the SNMP manager.
Page 231
Figure 3-10-33 3.10.8.2 VACM Setting You can use the View-based Access Control Model (VACM) to define whether access to a specified managed object is authorized. Access control is done at the following points: When processing retrieval request messages from the SNMP manager.
Page 232
Index: Index of Group. Tick the checkbox to enable the recordset. Group Name: A group name is given to a group of users and is used when managing their access rights. Security Model: Assign security model for group. Security Name: Assign security name for group. This field will obtain from the ‘Security Name’...
Page 233
The Access table grants the groups access right to certain views. Each group can have multiple access rights. The most secure access right is chosen. Index: Index of Access. Tick the checkbox to enable recordset. Group: Returned and lookup the ‘Group Name’ from the Group table.
Figure 3-10-37 Trap Items Enable/Disable which trap items to send. Figure 3-10-38 3.10.8 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device. Figure 3-10-39 3.10.9 Log Out User can manually logout by click on <Log Out>. Figure 3-10-40...
Page 235
Caution The Part 15 radio device operates on a non-interference basis with other devices operating at this frequency when using integrated antennas. Any changes or modification to the product not expressly approved by Original Manufacture could void the user's authority to operate this device. Caution To meet regulatory restrictions and the safety of the installation, strongly recommends this product to be professionally installed.
Need help?
Do you have a question about the IWP-2000-68 and is the answer not in the manual?
Questions and answers