Belden HIRSCHMANN BAT-C2 Configuration User Manual

Belden HIRSCHMANN BAT-C2 Configuration User Manual

Industrial wireless lan gateway
Table of Contents

Advertisement

Quick Links

Configuration User Manual
Industrial Wireless LAN Gateway
BAT-C2
Technical support
UM Configuration BAT-C2
Release 01.0.00 04/2019
https://hirschmann-support.belden.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HIRSCHMANN BAT-C2 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Belden HIRSCHMANN BAT-C2

  • Page 1 Configuration User Manual Industrial Wireless LAN Gateway BAT-C2 Technical support UM Configuration BAT-C2 Release 01.0.00 04/2019 https://hirschmann-support.belden.com...
  • Page 2: Open Source Information

    not be taken to The naming of copyrighted trademarks in this manual, even when not specially indicated, should mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone. ©...
  • Page 3: Warranty Regarding Further Use Of The Open Source Software

    against payment of the shipping and handling charges - for a period of at least 3 years since purchase of the product. Please send your specific request, within 3 years of the purchase date of this product, together with the name and ID number of the product to be found at the label of the product to: Hirschmann Automation and Control GmbH Head of R&D...
  • Page 4 ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish);...
  • Page 5 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow.
  • Page 6 is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application.
  • Page 7 When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library.
  • Page 8 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities.
  • Page 9 may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.
  • Page 10 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;...
  • Page 11 For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
  • Page 12 under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole.
  • Page 13 actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
  • Page 14 NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 15 `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker.
  • Page 16 However, programs must still identify their use of libwebsockets. The following example statement can be included in user documentation to satisfy this requirement: "[program] is based in part on the work of the libwebsockets project (https://libwebsockets.org)" 3) Some sources included have their own, more liberal licenses, or options to get original sources with the liberal terms.
  • Page 17 the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.
  • Page 18 the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.
  • Page 19 work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
  • Page 20 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
  • Page 21 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
  • Page 22 Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation;...
  • Page 23 Also add information on how to contact you by electronic and paper mail. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker.
  • Page 24 “Secondary License” means either the GNU General Public License, Version 2.0, or any later versions of that license, including any exceptions or additional permissions as identified by the initial Contributor. 2. GRANT OF RIGHTS a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non- exclusive, worldwide, royalty-free copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, Distribute and sublicense the Contribution of such Contributor, if any, and such Derivative Works.
  • Page 25 iv) requires any subsequent distribution of the Program by any party to be under a license that satisfies the requirements of this section 3. 3.2 When the Program is Distributed as Source Code: a) it must be made available under this Agreement, or if the Program (i) is combined with other material in a separate file or files made available under a Secondary License, and (ii) the initial Contributor attached to the Source Code the notice described in Exhibit A of this Agreement, then the Program may be made available under the terms of such Secondary Licenses, and...
  • Page 26 HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 27 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"...
  • Page 28 * 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.
  • Page 29 notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)"...
  • Page 30 * source code is used in accordance with the relevant license agreements * and can be used freely for any purpose (the GNU license being the most * restrictive); see below for details. [However, none of that term is relevant at this point in time. All of these restrictively licenced software components which he talks about have been removed from OpenSSH, i.e., - RSA is no longer included, found in the OpenSSL library...
  • Page 31 * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. * Modification and redistribution in source and binary forms is * permitted provided that due credit is given to the author and the * OpenBSD project by leaving this copyright notice intact. The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the public domain and distributed with the following license: * @version 3.0 (December 2000)
  • Page 32 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 33 Copyright (c) 2011-2019 The Bootstrap Authors Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial...
  • Page 34 permission to use PSF trademarks or trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party. 8. By copying, installing or otherwise using Python, Licensee agrees to be bound by the terms and conditions of this License Agreement.
  • Page 35 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 3: Cambridge Broadband Ltd.
  • Page 36 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 37 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
  • Page 38 DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH...
  • Page 39 When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.
  • Page 40 a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To “convey” a work means any kind of propagation that enables other parties to make or receive copies.
  • Page 41 for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed;...
  • Page 42 You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • Page 43 must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM). The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed.
  • Page 44 If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions;...
  • Page 45 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”. A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the...
  • Page 46 example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program. 13.
  • Page 47 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
  • Page 48 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
  • Page 49 distributes. Licensor reserves the right to satisfy this obligation by placing a machine-readable copy of the Source Code in an information repository reasonably calculated to permit inexpensive and convenient access by You for as long as Licensor continues to distribute the Original Work, and by publishing the address of that information repository in a notice immediately following the copyright notice that applies to the Original Work.
  • Page 50 the rights granted to You in Section 1 herein, You indicate Your acceptance of this License and all of its terms and conditions. 10) Termination for Patent Action. This License shall terminate automatically and You may no longer exercise any of the rights granted to You by this License as of the date You commence an action, including a cross-claim or counterclaim, against Licensor or any licensee alleging that the Original Work infringes a patent.
  • Page 51 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  • Page 52 a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.
  • Page 53 a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities, conveyed under the terms of this License. b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
  • Page 54 source code. If you link a program with the library, you must provide complete object files to the recipients so that they can relink them with the library, after making changes to the library and recompiling it. And you must show them these terms so they know their rights. Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library.
  • Page 55 The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language.
  • Page 56 In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
  • Page 57 You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License.
  • Page 58 and all its terms and conditions for copying, distributing or modifying the Library or works based on 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions.
  • Page 59 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 60 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  • Page 61 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Julian Seward, jseward@bzip.org bzip2/libbzip2 version 1.0.6 of 6 September 2010 zlib v1.2.8 (C) 1995-2013 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty.
  • Page 62 Neither the names of the University of Illinois, NCSA, nor the names of its contributors may be  used to endorse or promote products derived from this Software without specific prior written permission. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 63 libpcre v8.38 PCRE LICENCE ------------ PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 8 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc"...
  • Page 64 Redistributions of source code must retain the above copyright notice, this list of conditions  and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions  and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 65 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
  • Page 66 TERMS AND CONDITIONS FOR ACCESSING OR OTHERWISE USING THIS SOFTWARE =================================================================== LICENSE AGREEMENT ----------------- 1. This LICENSE AGREEMENT is between the copyright holder of this product, and the Individual or Organization ("Licensee") accessing and otherwise using this product in source or binary form and its associated documentation.
  • Page 67 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 68 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of PyZMQ nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 69 This software consists of contributions made by Zope Corporation and many individuals on behalf of Zope Corporation. Specific attributions are listed in the accompanying credits file. PYTHON SOFTWARE FOUNDATION LICENSE VERSION 2 -------------------------------------------- 1. This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and the Individual or Organization ("Licensee") accessing and otherwise using this software ("Python") in source or binary form and its associated documentation.
  • Page 70 prepared by Licensee. 3. BeOpen is making the Software available to Licensee on an "AS IS" basis. BEOPEN MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, BEOPEN MAKES NO AND DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.
  • Page 71 THAT THE USE OF PYTHON 1.6.1 WILL NOT INFRINGE ANY THIRD PARTY RIGHTS. 5. CNRI SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON 1.6.1 FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE USING PYTHON 1.6.1, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.
  • Page 72: Table Of Contents

    Table of Contents Open Source Information ____________________________________________________2 Open Source Software used in the product ___________________________________ 2 Warranty regarding further use of the Open Source Software _____________________3 Using This Guide Purpose and Audience _____________________________________________________ 79 Summary of Chapters ______________________________________________________ 79 Additional Documentation ___________________________________________________ 79 Safety Instructions _________________________________________________________ 80 Introduction Key Features _____________________________________________________________ 82...
  • Page 73 Wireless (wlan0) Network ___________________________________________________ 98 Wireless (wlan0) Network Interface ________________________________________ 99 To Configure Wireless Network Interface Settings ____________________________ 101 Wireless (wlan0) Network Link ___________________________________________ 101 Smart Roam _________________________________________________________ 102 To Configure Network Link Settings _______________________________________ 103 Wireless (wlan0) Network QoS ___________________________________________ 103 To View or Configure Wireless Network QoS Settings _________________________ 104 Wireless (wlan0) Network Failover ________________________________________ 104 To View or Configure Wireless Network Failover Settings ______________________ 105...
  • Page 74 To Ping a Remote Host ________________________________________________ 118 Processes ______________________________________________________________ 118 To View Process Information ____________________________________________ 119 Routes _________________________________________________________________ 119 Threads ________________________________________________________________ 119 To View Thread Information _____________________________________________ 119 Traceroute ______________________________________________________________ 119 To Perform a Traceroute _______________________________________________ 120 Administration Actions ________________________________________________________________ 121 To Configure Action Settings ____________________________________________ 122 Python _____________________________________________________________ 122 Applications _____________________________________________________________ 122...
  • Page 75 Credentials __________________________________________________________ 136 To Create a New Credential _____________________________________________ 136 To Delete a Credential _________________________________________________ 136 To Configure an SSL Credential to Use an Uploaded Certificate _________________ 137 To Configure an SSL Credential to Use a Self-Signed Certificate ________________ 138 Trusted Authorities ____________________________________________________ 138 To Upload an Authority Certificate ________________________________________ 138 CSR (Certificate Signing Request) ________________________________________ 139...
  • Page 76 List of Figures Figure 2-1 BAT-C2 Usage Mode for Ethernet to Wi-Fi ____________________________________ 81 Figure 3-1 Components of the Web Manager Page ______________________________________ 85 Figure 3-2 Expandable Menu Bar Selections ___________________________________________ 85 Figure 3-3 Status Page (Part 1 of 2) __________________________________________________ 86 Figure 3-4 Status Page (Part 2 of 2) __________________________________________________ 87 UM Configuration BAT-C2 Release 01.0.00 04/2019...
  • Page 77 List of Tables Table 3-5 Web Manager Pages ____________________________________________________ 87 Table 4-1 Access Point Settings ____________________________________________________ 89 Table 4-2 Bridge Settings _________________________________________________________ 92 Table 4-3 Wired (eth0) Network Interface _____________________________________________ 94 Table 4-4 Link (eth0) Configuration__________________________________________________ 96 Table 4-5 Wired (eth0) Network QoS Settings _________________________________________ 97 Table 4-6 Wired (eth0) Network Failover Settings ______________________________________ 98 Table 4-7 Wireless (wlan0) Interface Configuration _____________________________________ 99 Table 4-8 Wireless (wlan0) Link Configuration ________________________________________ 101...
  • Page 78 Table 7-10 Routing Table ________________________________________________________ 128 Table 7-11 Adding a New Static Route ______________________________________________ 128 Table 7-13 (Existing) Static Leases ________________________________________________ 129 Table 7-14 Adding a Static Lease __________________________________________________ 129 Table 7-15 Routing Protocol Settings _______________________________________________ 130 Table 7-16 Existing Virtual IP Listings_______________________________________________ 131 Table 7-17 Adding a Virtual IP ____________________________________________________ 131 Table 7-18 GRE Settings ________________________________________________________ 131 Table 7-19 HTTP Configuration ___________________________________________________ 132...
  • Page 79: Using This Guide

    Using This Guide Purpose and Audience This document provides information needed to configure, use, and update the Industrial Wireless LAN Gateway BAT-C2. It is intended for software developers and system integrators who are embedding this product into their designs. Summary of Chapters The remaining chapters in this guide include: Chapter Description...
  • Page 80: Safety Instructions

    1: Using This Guide Safety Instructions WARNING UNCONTROLLED MACHINE ACTIONS To avoid uncontrolled machine actions caused by data loss, configure all the data transmission devices individually. Before you start any machine which is controlled via data transmission, be sure to complete the configuration of all the data transmission devices. Failure to follow these instructions can result in death, serious injury, or equipment damage.
  • Page 81: Introduction

    Introduction The device allows a cost-effective and energy-saving WLAN installation for applications with limited installation space. Figure 2-1 BAT-C2 Usage Mode for Ethernet to Wi-Fi Due to its robust design and compact dimensions, the device is suitable for use in a variety of stationary and mobile WLAN applications in industrial environments.
  • Page 82: Key Features

    2: Introduction Key Features First industrial rated 802.11ac Wi-Fi module (2.4 GHz and 5 GHz)  Up to 433 Mbps (1x1 802.11ac) and up to 150 Mbps (802.11n) peak data rates  High performance embedded Ethernet to Wi-Fi bridge and router modes ...
  • Page 83: Configuration Methods

    2: Introduction Configuration Methods After installation, the BAT-C2 requires configuration. For the unit to operate correctly on a network, it must have a unique IP address on the network. There are four basic methods for logging into the BAT-C2 and assigning IP addresses and other configurable settings: Web Manager: View and configure all settings easily through a web browser using the ...
  • Page 84: Configuration Using Web Manager

    Configuration Using Web Manager This chapter describes how to configure the BAT-C2 using Web Manager, the Hirschmann browser-based configuration tool. The gateway’s configuration is stored in non-volatile memory and is retained across gateway reset and during loss of power to the gateway. All changes take effect immediately, unless otherwise noted.
  • Page 85: Web Manager Components

    3: Configuration Using Web Manager Web Manager Components The layout of a typical Web Manager page is below. Logout (click admin Header to access logout) Status and/or Menu Bar Configuration Area Figure 3-1 Components of the Web Manager Page Web Manager pages have these sections: The Status, Network, Filesystem, Diagnostics and Administration tabs located in the ...
  • Page 86: Status Page

    3: Configuration Using Web Manager Status Page The Status page appears upon logging into Web Manager and when you click the Status tab. The upper left vertical menu bar allows you to jump to a specific section on the Status page. Click a particular item in the menu bar to jump to that particular section.
  • Page 87: Navigating Web Manager

    3: Configuration Using Web Manager Figure 3-4 Status Page (Part 2 of 2) Navigating Web Manager The table below provides a shortcut to the various software features available for viewing and configuration through Web Manager. Web Manager Page Description Page Status Shows product information, network, line, and tunneling settings.
  • Page 88: Table 3-5 Web Manager Pages

    3: Configuration Using Web Manager Web Manager Page Description Page Gateway Shows statistics and lets you change the current configuration for the gateway. Allows you to view and configure GRE settings. Hardware Shows hardware status and configuration options. HTTP Shows Hyper Text Transfer Protocol (HTTP) statistics and lets you change the current configuration and authentication settings.
  • Page 89: Network Settings

    Network Settings Network settings for the BAT-C2 can be viewed and modified under the Network tab in the Web Manager user interface. Network settings include: Access Point  Bridge  Wired (eth0) Network  Wireless (wlan0) Network  Protocol Stack ...
  • Page 90: To View Or Configure Access Point Settings

    4: Network Settings Access Point Field Description Last Client Disconnect Enter the number of seconds for the Last Client Disconnect Timeout. After Timeout the last client has disconnected the SoftAP interface will stay up this amount of time, giving clients an opportunity to reconnect. If, at the end of the Last Client Disconnect Timeout no clients have reconnected, the SoftAP interface will immediately go down.
  • Page 91: Bridge

    4: Network Settings Using XML Include in your file: <configgroup name=”access point”>  Bridge The BAT-C2 bridges traffic between an Ethernet and WLAN interface. For example, br0 is a bridge between eth0 and wlan0. When a bridge is enabled, the Wired (eth0) Network configuration is used for configuring direct connections into the BAT-C2 over the primary interface;...
  • Page 92: Bridge Status And Configuration

    4: Network Settings Bridge Status and Configuration View-only status information on the Bridge1 (br0) Status page displays whether bridging is currently enabled, active, and the following (if any): Ethernet link, WLAN link, primary interface, bridging MAC, Ethernet MAC, WLAN MAC, bridging IP address, and bridging IPv6 address. Ethernet to WLAN and WLAN to Ethernet statistics are provided for unicast, nonunicast, discards and octets.
  • Page 93: To View Or Configure Bridge Settings

    4: Network Settings Bridge Fields Description Bridging MAC Address Enter the bridging MAC address which specifies the MAC address of bridgeable traffic between the Ethernet and WLAN interfaces. When bridging is active, this MAC Address will be used as the MAC address of the WLAN interface.
  • Page 94: Wired (Eth0) Interface Status And Configuration

    4: Network Settings Wired (eth0) Interface Status and Configuration Table 4-3 displays the wired interface status and configuration information. The view-only status information is available on the Wired (eth0) Network Interface Status page. This same information is configurable on the Wired (eth0) Network Interface Configuration page. Field/Button Description State...
  • Page 95: To Configure Network Interface Settings

    4: Network Settings Field/Button Description Secondary DNS Enter the IP address of the secondary domain name server. Note: This setting will be used when either Static IP or Auto IP is active, or if DHCP/BOOTP is active and no DNS server was acquired from the server. IPv6 State Select to enable or disable.
  • Page 96: Wired (Eth0) Link Status And Configuration

    4: Network Settings Wired (eth0) Link Status and Configuration Table 4-4 displays the wired link status and configuration information. The view-only status information is available on the Wired (eth0) Network Ethernet Link page. This same information is configurable on the Wired (eth0) Network Ethernet Link Configuration page. Field/Button Description Speed...
  • Page 97: To View And Configure Wired Network Qos Settings

    4: Network Settings Excellent Effort: Bandwidth allocation is at minimum 10%.  Best Effort: Bandwidth allocation is at minimum 10%.  Background: Bandwidth allocation is at minimum 5% and has the lowest priority.  Table 4-5 Wired (eth0) Network QoS Settings shows the network QoS settings that can be configured including adding new filters.
  • Page 98: Wired (Eth0) Network Failover

    4: Network Settings Using XML Include in your file: <configgroup name="ethernet" instance="eth0">  Wired (eth0) Network Failover The BAT-C2 gateway provides WAN network failover, in the form of a "dead remote host reachability" mechanism (essentially a ping against a known host). If the remote host is determined to be not reachable, the BAT-C2 will failover to the Wi-Fi interface.
  • Page 99: Wireless (Wlan0) Network Interface

    4: Network Settings Network Priority  Network IP Address  Network DHCP Client ID  If DHCP is turned on, any configured IP Address, Network Mask, Gateway, Hostname, or Domain will be ignored. DHCP will auto-discover and eclipse those configuration items. When DHCP fails to discover an IP Address, a new address will automatically be generated using AutoIP.
  • Page 100 4: Network Settings Field/Button Description Domain Enter the domain name suffix for the interface. Note: This setting will be used when either Static IP or Auto IP is active, or if DHCP/BOOTP is active and no Domain Suffix was acquired from the server. DHCP Client ID Enter the ID if the DHCP server requires a DHCP Client ID option.
  • Page 101: To Configure Wireless Network Interface Settings

    4: Network Settings To Configure Wireless Network Interface Settings Using Web Manager To view the wireless (wlan0) network interface status, on the Network page, then select  Wireless Network > Interface. To configure wireless (wlan0) network interface settings, on the Network page, select ...
  • Page 102: Smart Roam

    4: Network Settings Field/Button Description Scanning Latency Select the desired Scanning Latency: Standard performs a complete unbroken scan of a list of channels. Scanning  Channel List accepts list of channels. Enhanced Throughput breaks the scanning into small blocks of channels, ...
  • Page 103: To Configure Network Link Settings

    4: Network Settings Radio Settings Description Scan Threshold For 5 The 5 GHz RSSI threshold. When the signal drops below the scan threshold, the radio attempts to roam. Table 4-9 Smart Roam Settings (continued) To Configure Network Link Settings Using Web Manager To view wireless (wlan0) link statistics, on the Network page, select Wireless Network >...
  • Page 104: To View Or Configure Wireless Network Qos Settings

    4: Network Settings Adding or Deleting Description Wireless Network (QoS) Settings Delete Click the checkbox to the left of any existing QoS filter to be deleted and click the Submit button. Filter type Select the filter type from the drop-down window: Mac Address ...
  • Page 105: To View Or Configure Wireless Network Failover Settings

    4: Network Settings Settings Description State Click to enable or disable state. Failover Interface Always select eth0 in the BAT-C2 gateway. Hostname Enter the remote host to specify the DNS Hostname or IP Address of a remote host where connectivity should always be present. Method Select ICMP or TCP based ping.
  • Page 106: To Configure Ip Protocol Stack Settings

    4: Network Settings To Configure IP Protocol Stack Settings Using Web Manager To configure IP protocol settings, on the Network page, click Protocol Stack > IP.  Using XML Include in your file: <configgroup name=”ip”>  ICMP Settings This page contains lower level ICMP Network Stack specific configuration items. Protocol Stack ICMIP Description Settings...
  • Page 107: To Configure Arp Network Stack Settings

    4: Network Settings To Configure ARP Network Stack Settings Using Web Manager To configure ARP protocol settings, on the Network page, click Protocol Stack > ARP.  Using XML Include in your file: <configgroup name=”arp”>  Access VPN statistics and configuration options on this page. VPN Setting Description Statistics...
  • Page 108 4: Network Settings VPN Setting Description Interface Select the interface to use to connect to VPN Gateway.  eth0  wlan0  Remote Network Endpoint Enter the remote VPN Gateway’s IP Address. Subnet Enter the subnet behind the VPN Gateway. Enter the identifier expected to receive from the remote host during Phase 1 negotiation.
  • Page 109: Configuring Vpn Settings

    4: Network Settings VPN Setting Description Unreachable Host Detection Host Enter the unreachable detection host monitoring the connectivity with the host on the remote network. Ping Interval Enter the Ping Interval to monitor connectivity with a host on the remote network.
  • Page 110: To Initiate Wps

    4: Network Settings To Initiate WPS Using Web Manager To initiate WPS, on the Network page, click Wi-Fi Protected Setup.  Using XML Not applicable.  To Show WPS Status Using XML Not applicable.  WLAN Scan/QuickConnect Going to this page initiates a scan of wireless networks within range of the BAT-C2 and allows users to add a WLAN profile after testing it.
  • Page 111: To View Wlan Link Scan And Status Information

    4: Network Settings WLAN Quick Connect Description Settings (continued) RSSI A real-time value that indicates the signal strength of the network. Green indicates the strongest, yellow indicates average, and red indicates the weakest signal strength. The received signal strength indication (RSSI) that is reported in scan results is a single sample.
  • Page 112: Configuring Wlan Profile Settings

    4: Network Settings WLAN Profile Settings Description Name Click an existing WLAN profile listed under the Name column to reveal the (link to WLAN profile) configuration options as shown in Table 4-20 Individual WLAN Profile Settings. Modify configuration options as desired. Name Enter the name of a new profile and click Submit to add it.
  • Page 113 4: Network Settings WLAN Profile Settings Description Select one of the following options regarding protected management frames (PMF): Disabled (default)  Optional  Required  Note: This option is available when the WPA2/WPA mixed mode suite and the IEEE 802.1x authentication settings are selected. Key Type Select a key Hex or Passphrase key type after indicating the security suite type.
  • Page 114 4: Network Settings WLAN Profile Settings Description EAP-TTLS Option Select a security protocol: EAP-MSCHAPV2  MSCHAPV2  MSCHAP  CHAP   EAP-MD5  Note: This option is available when the WPA2/WPA mixed mode suite, the IEEE 802.1x authentication, and EAP-TTLS settings are selected. PEAP Option Select EAP-MSCHAPV2, EAP-MD5 or EAP-TLS.
  • Page 115: Filesystem

    Filesystem The Filesystem page provides statistics and current usage information for the flash filesystem. From here you may format the entire filesystem. Directories can be created, deleted, moved, and renamed. A directory must be empty before it  can be deleted. Files can be created, deleted, moved, renamed, uploaded via HTTP, and transfered to and ...
  • Page 116: Diagnostics

    Diagnostics Diagnostic settings for the BAT-C2 can be viewed and modified under the Diagnostics tab in the Web Manager user interface. This chapter describes the following diagnostic settings:  Hardware  IP Sockets   Memory  Ping  Processes ...
  • Page 117: Hardware

    6: Diagnostics Using XML Include in your file: <configgroup name=”interface” instance="wlan0">  Hardware View the CPU type, CPU speed, RAM size and flash size of the hardware on this Web Manager page. To View Hardware Information Using Web Manager To view hardware information, on the Diagnostics page, click Hardware. ...
  • Page 118: To Configure The Diagnostic Log Output

    6: Diagnostics To Configure the Diagnostic Log Output Using Web Manager To configure the Diagnostic Log output, on the Diagnostics page, click Log.  Using XML Include in your file: <configgroup name=”diagnostics”>  Memory The memory information includes the total and available memory in kilobytes. To View Memory Usage Using Web Manager To view memory information, on the Diagnostics page, click Memory.
  • Page 119: To View Process Information

    6: Diagnostics To View Process Information Using Web Manager To view process information, on the Diagnostics page, click Processes.  Using XML Include in your file: <statusgroup name="processes">  Routes Routing allows one system to find the network path to another system, from a gateway to a destination.
  • Page 120: To Perform A Traceroute

    6: Diagnostics To Perform a Traceroute Using Web Manager To view traceroute information, on the Diagnostics page, click Traceroute.  UM Configuration BAT-C2 Release 01.0.00 04/2019...
  • Page 121: Administration

    Administration Administrative features for the BAT-C2 are organized beneath the Administration tab in the Web Manager user interface. This chapter describes the following administrative settings: Actions  Applications  Clock  Relay Contact  Gateway   HTTP  SNMP ...
  • Page 122: To Configure Action Settings

    7: Administration To Configure Action Settings Using Web Manager To view Action status, on the Administration page, click Action > Status on the menu.  To modify Action information, on the Administration page, click Action > Configuration on  the menu and select a specific action from the drop-down menu. Using XML Include in your file: <configgroup name = "action"...
  • Page 123: To Configure Application Settings

    7: Administration Notice: Python scripts could allow inadvertent resource usage or access. Use care when installing and running scripts. Script Settings Description Reserved Start Port Enter the Reserved Start Port. The range is between 1024 and 65535. Reserved Ports Enter a Reserved Port. The range is between 2 and 32. Script (Number) Click the Run button to manually execute the script.
  • Page 124: Clock

    7: Administration Clock You can view current clock settings at the bottom of the screen, and also either manually update or synchronize the clock with an SNTP server. If you select SNTP, you can choose automatic time zone detection. Clock Fields Description Method Select Manual or SNTP from the drop-down window.
  • Page 125: Gateway

    7: Administration Gateway The BAT-C2 can be configured as a wireless router with DHCP server functionality. Status This page displays the current configuration and statistics information for the gateway. To view gateway status: on the Administration page, click Gateway > Status. ...
  • Page 126: Wan Mac Address Filters

    7: Administration WAN MAC Address Filters Accept or drop traffic on the WAN interface that was chosen in WAN configuration from specified MAC addresses using the settings below. Adding or Deleting New MAC Description Address Filter Settings Delete Click the checkbox to the left of any existing MAC address filter to be deleted (if any) and click the Submit button.
  • Page 127: To Configure Gateway Port Forwarding Settings

    7: Administration Adding New Port Description Forwarding Rule Settings Ingress IP Address Enter the destination address of the packets. This option can only be used with single ports and not with port range. Optional. Start Port Enter the starting port number. End Port Enter the end port number (optional).
  • Page 128: To Configure Gateway Static Route Settings

    7: Administration Routing Table Access Description Routing Table (Header/Link) Click this header/link to reveal the current s ystem IPv4 and IPv6 routing tables. Please note that some fields may differ from static route definitions. The following information displays in the IPv4 routing table: Network ...
  • Page 129: To Configure Gateway Dhcp Server Settings

    7: Administration DHCP Settings Description State Enable or Disable the DHCP server for the DHCP settings. Enabled: DHCP server is enabled  Disabled: DHCP server is disabled (default).  DHCP Relay Enable for the gateway to operate as a DHCP relay agent between the DHCP server on the network and connected Ethernet devices.
  • Page 130: Routing Protocols

    7: Administration Using XML Include in your file: <configgroup name = "dhcp server">  Routing Protocols The BAT-C2 allows the configuration of routing protocols. Routing protocols specify how routers communicate with each other, disseminating information that enables the selection of routes between any two nodes on a computer network.
  • Page 131: Virtual Ip

    7: Administration Virtual IP The BAT-C2 allows the configuration of Virtual IP addresses. Virtual IP is a means to map an externally visible IP address to LAN-side IP addresses. BAT-C2 will support creating up to three virtual IP address mappings by creating loop back interfaces and publishing this information via the routing protocols.
  • Page 132: To Configure Gre Settings

    7: Administration GRE Settings Description Enter the number of bytes indicating the largest physical packet size that the network can transmit. Default MTU is 1500 bytes. Local Network Select the local network to use the GRE tunnel. Select vpn 1 to use the VPN network.
  • Page 133: To View Or Configure Http

    7: Administration HTTP Settings Description Secure Protocols Select to enable or disable the following protocols: SSL3 = Secure Sockets Layer version 3. Disabled by default.  TLS1.0 = Transport Layer Security version 1.0. TLS 1.0 is the successor of  SSL3 as defined by the IETF.
  • Page 134: To Configure Http Authentication

    7: Administration Using XML Include in your file: <configgroup name="http server">  The HTTP Server can be configured with many different authentication directives. The authentication is hierarchical in that any URI can be given an authentication directive in order to override a parent URI authentication directive.
  • Page 135: To Configure Snmp Settings

    7: Administration SNMP Settings Description Read Community Specify the read community used by the agent (defaults to public community). The password for the read community is: For SNMPv2c: public  For SNMPv3: publicpublic  For the SNMPv3 read community, the username is user. Write Community Specify the write community used by the agent (defaults to private community).The password for the write community is:...
  • Page 136: Credentials

    7: Administration Credentials The BAT-C2 can generate self-signed certificates and their associated keys for both RSA and DSA certificate formats. When you generate certificates, assign them a credential name to help identify them on the BAT-C2. Once you create your credentials, then configure them with the desired certificates.
  • Page 137: To Configure An Ssl Credential To Use An Uploaded Certificate

    7: Administration Upload Certificate Description Settings Submit (button) Click the Submit button to enter the settings. The Submit button appears when new settings are entered. Table 7-22 SSL Credential - Upload Certificate (continued) Field Description Country (2 Letter Code) Enter the 2 letter code for the country where the organization is located. This is a two-letter ISO code (e.g., “US”...
  • Page 138: To Configure An Ssl Credential To Use A Self-Signed Certificate

    7: Administration To Configure an SSL Credential to Use a Self-Signed Certificate 1. In the Web Manager, click the Administration tab. 2. Click SSL. 3. Click Credentials. 4. Under View or Edit, click the credential you wish to modify to access the information page for that credential.
  • Page 139: Csr (Certificate Signing Request)

    7: Administration Notes: Ensure that the certificate is formatted properly with a valid open and close tag.  Ensure that the Private Key is associated to the selected certificate and that it is  formatted properly with a valid open and close tag. If the New Certificate field is set to None, the certificate is not supported.
  • Page 140: To Configure Syslog Settings

    7: Administration Note: The system log is saved to local storage but is not retained through reboots. To allow the administrator to save the complete system log, save the system log to a server that supports remote logging services. For details, refer to RFC 3164. The default port is 514.
  • Page 141: To Access System Settings

    7: Administration System Settings Description Interval Enter the interval number in the field. Then select the type of interval from the drop-down menu: Hours  Days (default)  Weeks  Months  Note: This configuration option appears when the Interval schedule is selected.
  • Page 142: User Management

    7: Administration Using XML Include in your file: <configgroup name="xml import control">  Include in your file: <configgroup name="reboot schedule">  Include in your file: <configgroup name="device">  User Management This page displays the configuration of users. The Admin Password is used for initial login access from the HTTP.
  • Page 143: To Configure User Management

    7: Administration The system-defined default roles that come with the BAT-C2 along with any Admin-created user roles are listed here. Admin-created custom roles can be deleted or altered. Current Role Description Delete Click the check box beside a specific custom role to be deleted and click the Submit button which appears (or click Cancel to cancel the deletion).
  • Page 144: Xml

    7: Administration Using XML Include in your file: <configgroup name="user management">  This page is used to clone the current system configuration. The generated file can be imported at a later time to restore the configuration. Notice: The 'User Management', 'WLAN Profile', 'HTTP Authentication', and SSL groups must be imported with secrets manually filled in (e.g., passwords and private key) before import.
  • Page 145: To Export Status

    7: Administration Ensure that the group list is comma delimited and encased in double-quotes. Note: To view the list of available groups, type xcr list. 8. Click Export. Note: Though keys are not exported with XML objects and variables, there is a placeholder value included in the XML variable that would need to be populated with the correct key value when using an exported configuration for an import operation.
  • Page 146: Table 7-32 Configuration From Filesystem

    7: Administration 2. Click XML. 3. Click Import Configuration. 4. Select where to import configuration information: Configuration from External file picks up all the settings from the external file. For this  option, click Browse... to locate and select the XML configuration file that you wish to import.
  • Page 147: Quick Setup

    7: Administration Quick Setup Quick Setup provides a place to configure all basic settings in one place. You may access Quick Setup through the Administration menu or whenever you reset your system to factory defaults. Note: The “Installation User Manual” provides for instructions on accessing Web Manager via SoftAP.
  • Page 148: To Utilize Quick Setup

    7: Administration Setting Description Show entries (drop- Select the number of entries to show on the page at a time. down menu) Search (field) Enter characters within the name of an SSID in the Search field to limit scan results to SSIDs with characters typed. Table 7-37 Available Networks (continued) To Utilize Quick Setup Using Web Manager...
  • Page 149: Further Support

    You find the addresses of our partners on the Internet at http://www.hirschmann.com. A list of local telephone numbers and email addresses for technical support directly from Hirschmann is available at https://hirschmann-support.belden.com. This site also includes a free of charge knowledge base and a software download section.

Table of Contents