all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Users Manual | Users Manual | 570.83 KiB | November 10 2004 | |||
1 | Cover Letter(s) | November 10 2004 | ||||||
1 | External Photos | November 10 2004 | ||||||
1 | Internal Photos | November 10 2004 | ||||||
1 | ID Label/Location Info | November 10 2004 | ||||||
1 | RF Exposure Info | November 10 2004 | ||||||
1 | RF Exposure Info | November 10 2004 | ||||||
1 | RF Exposure Info | November 10 2004 | ||||||
1 | External Photos | September 12 2004 / November 10 2004 | ||||||
1 | Test Report | November 10 2004 | ||||||
1 | Test Setup Photos | November 10 2004 | ||||||
1 | Test Report | September 12 2004 / November 10 2004 |
1 | Users Manual | Users Manual | 570.83 KiB | November 10 2004 |
Cellular Gateway User Guide Version 1.4 Document version: 23 Copyright 2003 Alliant Networks, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior consent of Alliant Networks, Inc. The following are copyrights of their respective companies or organizations:
GoAhead Open Source WebServer from GoAhead Software, Inc. Copyright 2003, 2004 GoAhead Software, Inc. All rights reserved. Portions of this software may have been derived from OpenBSD, FreeBsd or other sources, and are covered by the appropriate copyright disclaimers. Portions created by Red Hat: Copyright 2002 Red Hat, Inc. All Rights Reserved. Portions of this software may have been derived from Berkeley source code: Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California - All rights reserved. OpenSSL software is based on the OpenSSL Project. Copyright 1999-2003 The OpenSSL Project - All rights reserved. Product and technical information in this document is subject to change without notice and does not represent a commitment on the part of Alliant Networks, Inc. Cellular Gateway is a trademark of Alliant Networks, Inc. Many designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear, Alliant Networks acknowledges a trademark claim. Export restrictions: OpenSSL software uses strong cryptography, and it falls under certain export/import and/or use restrictions in some parts of the world. IT IS YOUR RESPONSIBLITY TO OBEY THESE LAWS. REGULATORY COMPLIANCE INFORMATION This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Modifications not expressly approved by, Alliant Networks, Inc. could void the user's authority to operate the equipment. NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Exposure to Radio Frequency Radiation To comply with RF safety requirements, please maintain a separation distance of 20cm from the antennas located on the sides of the device. The internal wireless radio operates within guidelines found in radio frequency safety standards and recommendations, which reflect the consensus of the scientific community. Alliant Networks, Inc. therefore believes the internal wireless radio is safe for use by consumers. The level of energy emitted is far less than the electromagnetic energy emitted by wireless devices such as mobile phones. However, the use of wireless radios may be restricted in some situations or environments, such as aboard airplanes. If you are unsure of restrictions, you are encouraged to ask for authorization before turning on the wireless radio. Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. ONE-YEAR LIMITED WARRANTY Alliant Networks Inc., networking products are warranted to be free of defects in material and workmanship for one year from date of purchase. Alliant Networks Inc. will, at its election, repair, or replace or make appropriate adjustment where Alliant Networks, Inc. inspection discloses any such defects occurring in normal usage within the warranty period. Alliant Networks Inc. is not responsible for removal shipping, or installation costs. IMPLIED WARRANTIES INCLUDING THAT OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY LIMITED IN DURATION TO THE DURATION OF THIS WARRANTY. ALLIANT NETWORKS, Inc., DISCLAIMS ANY LIABILITY FOR SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES. Some states/provinces do not allow limitations on how long an implied warranty lasts, or the exclusion or limitation of special, incidental or consequential damages so these limitations and exclusions may not apply to you. This warranty gives you specific legal rights. You may also have other rights which vary from state/
province to state/province. This is our exclusive written warranty. WARRANTY RETURN POLICY If you have a problem with your product, please call Alliant Networks Technical Support at 408-744-1500. Alliant Networks Technical Support will assist with resolving any technical difficulties you may have with your product. After calling Alliant Networks Technical Support, if your product is found to be defective, you may return the product to Alliant Networks after obtaining an RMA (Return Merchandise Authorization) number from Alliant Networks Customer Service. The product must be returned in its original or secure packaging. The RMA number should be clearly marked on the outside of the box. Alliant Networks cannot be held responsible for any product returned without an RMA number, and no product will be accepted without an RMA number. RIGHT TO CHANGE Alliant Networks, Inc. reserves the right to make changes without notice to any products herein for any reason at any time, including but not limited to improving the reliability, form, fit, function or design. Alliant Networks does not assume any liability arising out of use, misuse or application of any product or circuit described herein, nor does it convey any license under its patent rights nor the rights of others. Information and specifications in this manual are checked, however no responsibilities for inaccuracies can be assumed by Alliant Networks. Please consult an Alliant Networks salesperson to obtain the latest specifications before placing your order for Alliant products. LIFE SUPPORT POLICY Alliant Networks' products are not designed, intended, or authorized for use as components in systems intended for surgical implant into the body, or other applications intended to support or sustain life, or for any other application in which the failure of the Alliant Networks product could create a situation where personal injury or death may occur. Authorization for such use may only be given in the form of express written approval of the president of Alliant Networks. Should the buyer or user purchase or use Alliant Networks products for any such unintended or unauthorized application, both buyer and user shall indemnify and hold harmless Alliant Networks and its officers, employees, subsidiaries, affiliates, suppliers, and distributors against all claims, costs, damages, and expenses, and attorney fees arising out of, directly or indirectly, any claim of personal injury or death associated with such unintended or unauthorized use, even if such claim alleges that Alliant Networks was negligent regarding the design or manufacture of the device, or was aware of a defect that could cause malfunction. FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio Technologies. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
This device contains an 802.11b/g transmitter which has been approved under FCC certification, with FCC ID:
SHE-WL007. When used with a Cellular PC Card, the Cellular Gateway can be considered a co-transmitting device. The following are power density estimates under this configuration:
1. Maximum EIRP for possible Cellular 1900 Co-transmitter is 4.79 W 2. Maximum EIRP for possible Cellular 850 Co-transmitter is 2.7 W (1.64 W ERP) Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. EUROPEAN TELETECHNOLOGIES STANDARDS INSTITUTE Statement of Compliance Information to User This equipment has been tested and found to comply with the European Telecommunication Standard ETS 300.328. This standard covers Wideband Data Transmission Systems referred to in the CEPT recommendation T/R 10.01. This type of accepted equipment is designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio Technologies. Contents Introduction........................................................................................................ 13 Cellular access standards ........................................................................... 14 Supported PC Cards ................................................................................... 15 Operating components................................................................................... 15 Example applications ..................................................................................... 16 Hardware description ..................................................................................... 17 Back panel................................................................................................... 17 Configuration button .................................................................................... 19 LEDs............................................................................................................ 20 Features and specifications ........................................................................... 21 Wired or wireless LAN support.................................................................... 21 Web management interface ........................................................................ 22 Secure network authentication .................................................................... 22 Network encryption...................................................................................... 22 Network address translation (NAT) ............................................................. 22 DHCP server ............................................................................................... 23 DHCP Client ................................................................................................ 23 DNS proxy ................................................................................................... 24 Backup and restore ..................................................................................... 24 Firmware upgrade ....................................................................................... 24 Advanced operations features..................................................................... 24 SNMP ....................................................................................................... 24 Serial and Telnet command line interface ................................................ 25 SYSLOG................................................................................................... 25 Serial passthrough.................................................................................... 26 I/O passthrough ........................................................................................ 26 Data transfer protocol ............................................................................... 26 About this guide ............................................................................................. 26 Contact information........................................................................................ 27 Installation.......................................................................................................... 28 Package contents........................................................................................... 28 Installation Instructions................................................................................... 29 Cellular Gateway GPRS CGW101 .............................................................. 29 Other requirements................................................................................... 29 Installation steps....................................................................................... 30 Installing the SIM card (model 1000 only) ................................................ 30 Attaching the cellular antenna .................................................................. 32 Connecting power..................................................................................... 32 Cellular Gateway CDMA Model CGW102................................................... 32 Other requirements................................................................................... 32 Installation steps....................................................................................... 33 Attaching the cellular antenna .................................................................. 33 Connecting power..................................................................................... 33 Cellular Gateway PC Card Model CGW103................................................ 34 Other requirements................................................................................... 34 Installation steps....................................................................................... 34 Insert the PC Card.................................................................................... 34 Connecting power..................................................................................... 35 Installing Software ....................................................................................... 35 LAN connection ........................................................................................... 35 Wired Ethernet.......................................................................................... 35 Wireless LAN............................................................................................ 36 Connecting multiple Ethernet computers.................................................. 36 Customizing your gateway............................................................................. 36 Direct browser access ................................................................................. 37 Configuring the GPRS Connection (T-Mobile only)..................................... 37 Using the Discovery Tool ............................................................................ 38 Using the Web Configuration Interface........................................................... 39 Launching a gateway configuration................................................................ 39 Direct browser access ................................................................................. 39 Using the Discovery Tool ............................................................................ 40 About the Web configuration interface........................................................... 41 Network.......................................................................................................... 42 Basic............................................................................................................ 43 DHCP Server............................................................................................... 44 Cellular ........................................................................................................ 45 NAT ............................................................................................................. 46 System ........................................................................................................... 47 Web ............................................................................................................. 47 Backup & Restore ....................................................................................... 48 Upgrade....................................................................................................... 49 Serial CLI..................................................................................................... 50 Telnet CLI.................................................................................................... 50 SNMP .......................................................................................................... 51 SYSLOG...................................................................................................... 52 ADP ............................................................................................................. 52 CDP............................................................................................................. 53 Log .............................................................................................................. 53 Advanced .................................................................................................... 54 Information .................................................................................................. 54 Security .......................................................................................................... 55 802.11 Encryption ....................................................................................... 56 802.11 Authentication.................................................................................. 57 Certificate .................................................................................................... 59 RADIUS....................................................................................................... 59 Authentication........................................................................................... 59 Accounting................................................................................................ 60 Access List .................................................................................................. 60 Add a user ................................................................................................ 61 Change password..................................................................................... 61 Remove a user ......................................................................................... 61 Ethernet Supplicant ..................................................................................... 61 M2M ............................................................................................................... 62 Network settings.......................................................................................... 62 Hardware settings ....................................................................................... 63 Link................................................................................................................. 64 802.11 ......................................................................................................... 64 802.11 PQ Mapping.................................................................................. 65 802.11 User classification......................................................................... 66 802.11 Protocol Filter................................................................................ 69 802.11 Statistics ....................................................................................... 70 Ethernet Protocol Filter................................................................................ 70 Ethernet Statistics ....................................................................................... 70 Bridge .......................................................................................................... 71 802.11 Static MACs.................................................................................. 71 Ethernet Static MACs ............................................................................... 71 Restoring factory defaults .............................................................................. 71 Upgrading the System.................................................................................... 72 Backing up a Configuration............................................................................ 73 Restoring a Configuration .............................................................................. 74 Solving Problems .............................................................................................. 76 Configuring XP Advanced Wireless Security ................................................. 76 Configuring your Ethernet Network................................................................ 78 Unable to access the Internet ........................................................................ 78 Restore to factory defaults ............................................................................. 78 Getting FTP to work ....................................................................................... 79 Index ................................................................................................................... 80 Introduction Introduction The Alliant Networks Cellular Gateway combines the convenience of standard networking with the flexibility and coverage of cellular networks. Using the gateway, anyone can set up an instant personal network and connect to the Internet from any location that supports cellular phone service. FCC regulations require the use of an external antenna with the Cellular PC Card. The cellular antenna must be located at least 20cm from the wireless LAN antennas. Although it is simple to install and easy to use in its default configuration, the gateway can be configured for sophisticated machine-to-machine communication applications. It extends 13 Introduction Cellular access standards the serial interface across the cellular network to IP-based protocols, so that sensing, mechanical, and control devices can report to Internet computers. For those who only need quick and reliable Internet access, the gateway is ready to use right out of the box. For users with more complex requirements, the gateway offers both Web-based, SNMP and Command Line Interface configuration tools. By uniting three networking mediaEthernet, serial, and cellularthe gateway can provide Internet access to embedded products that are difficult to network with conventional wired solutions. Equipment that generates Ethernet or serial data can communicate with computers on the Internet by making a data connection to the cellular service provider. The gateway does not interpret serial data, thereby eliminating the need to modify legacy products to allow them to leverage its features. Cellular access standards The Cellular Gateway comes in three different models; identified in the table below. Different cellular service providers employ different access standards for carrying data over the cellular network. Your choice of gateway depends on the service provider you have chosen. The CGW101 and CGW102 contain an internal radio. The CGW103 requires an additional PCMCIA/PC Card that can be either GPRS or CDMA 1.x. The list of supported PC Cards are shown in the CGW103 row. Installation depends on the model and is covered in Installation Instructions on page 29. Model CGW101 Standard GPRS Cellular service providers T-Mobile AT&T Wireless 14 Introduction Supported PC Cards Model CGW102 Standard CDMA 1x CGW103 Depends on the PC Card. Cellular service providers Sprint Verizon Verizon Wireless AirDirect 555D Supported PC Cards The CGW103 product requires a PC Card with an associated cellular-with-data plan, which can be purchased from an appropriate cellular store or qualified reseller. Some PC Cards come with a SIM. Refer to the PC Cards installation for more detail. The table below lists Along with the PC Card a cellular-with-data plan is also required. A PC Card may also required a SIM ch PC Card CGW101 Standard GPRS CGW102 CDMA 1x CGW103 Depends on the PC Card. Operating components LAN gateway Cellular service providers T-Mobile AT&T Wireless Sprint Verizon Verizon Wireless AirDirect 555D Like home gateway, cable, or DSL modems, the Cellular Gateway provides Internet connectivity for one or more computers over a standard wired Ethernet connection or through 802.11 wireless association. Because it forwards standard IP traffic onto the 15 Introduction Example applications Internet, no special software is needed on the computers or devices inside or outside the gateway. (Devices connected to the gateway through the Ethernet or serial ports or through wireless association are considered to be inside the gateway. Computers connected to the Internet (but not to the gateway itself) are considered to be outside the gateway.) The gateway is well-suited for local area network (LAN) applications where Internet connectivity is required and alternative connections are not available due to technical or economic constraints, or to the need for mobility. You can set up a LAN quickly and easily using the gateway in its default configuration. The gateway performs Network Address Translation (NAT) to support a full IP subnetwork with one cellular connection. Connections to the outside must be initiated by an inside device, providing protection against unsolicited connection. Once a connection is established, data can flow in both directions. Serial passthrough The Cellular Gateway extends the serial interface across the cellular network to IP-based protocols, so that sensing, mechanical, and control devices can report to Internet computers. The connection protocol is configurable (TCP or UDP). The gateway does not interpret or change serial data. Example applications Mobile LANs The Cellular Gateway is not tethered to any wired infrastructure, so you can create an instant personal network with Internet connectivity wherever needed. Because it works anywhere that has cellular-with-data service, it can be installed in mobile environments such as trucks, recreational vehicles, and even boats. Convenience LANs 16 Introduction Hardware description The Cellular Gateway requires no installation of telephone, DSL, or cable lines. The gateway is ideal for situations that require fast, easy connection to the Internet, such as emergency and disaster relief teams, remote field offices, construction trailers, and booths at trade shows and conventions. Machine status Because it is completely self-contained and does not require a wire to make a data connection, the gateway is ideal for embedding inside devices such as vending machines, as part of a sensing and control network. The I/O lines on the gateway can be used to report inventory and digital status information. The thermocouple can be used to report the temperature of the refrigerated or ambient sections of the machine. Telemetry The gateway allows remote or inaccessible test and measurement equipment to report data back to a central location. It can support power line sensors, electric and gas meters, and a host of other specialized devices. Hardware description Back panel The various ports and the power connector are located on the back panel, as shown and described below. 17 Introduction Back panel power 10/100 1 2 I/O 3 serial 4 Item Description 1. Power connector 2. Ethernet port 3. 4. Serial port For use with the supplied 12 volt DC power supply at 25 Watts. 10/100 Ethernet with auto-negotiation and auto MDI/MDIX crossover. I/O passthrough port Used for serial bridging to the DB25 digital I/O interface. For more information, see the Advanced Operations Guide. High speed DB9 UART supports serial data transfer at the following baud rates: 1200, 2400, 4800, 9600, 19200, 38400, 57600 and 115200. 18 Introduction Configuration button The Configuration button is located on the side of the unit, as shown. Configuration button You can use the Configuration button to restore the software to factory defaults or, if serial passthrough is running, to disable it so that you can use the serial command line interface. Insert a pointed object (such as the end of a straightened paper clip) into the reset hole to press the button. To restore to factory defaults: Press and hold the button for 5 seconds. To disable serial passthrough and put the serial CLI command mode: Press and release the button. 19 Introduction LEDs LEDs When power is connected, the LEDs on the front panel light to indicate the operating conditions, as shown and described below. 1 2 3 4 5 LED Description 1. 802.11 Wireless Signal Strength/Activity 2. Serial (UART) Activity 3. Power/Error 4. 802.3 Wired Ethernet Link Speed/Activity GREEN. Faster blinking indicates greater activity. GREEN indicates transmission. YELLOW indicates reception. GREEN indicates that the gateway is receiving power. YELLOW indicates CPU error. GREEN indicates 100 Mbps YELLOW indicates 10 Mbps Faster blinking indicates greater activity. 20 Introduction Features and specifications 1 2 3 4 5 LED Description 5. Cellular Signal Strength/Activity
(GPRS or CDMA) GREEN indicates excellent signal. YELLOW indicates good signal. RED indicates poor signal. Faster blinking indicates greater activity. Features and specifications The major features of the Cellular Gateway are described in the following sections. Wired or wireless LAN support The gateway supports 802.3 wired Ethernet and 802.11 wireless LANs. The wireless feature complies with IEEE 802.11b and 802.11g standards, ensuring interoperability with third-party wireless equipment that also complies with these standards. 21 Introduction Web management interface Web management interface You can configure and manage the gateway through your Web browser. A Java-based discovery utility assists in connecting to the gateway configuration user interface during initial setup. Secure network authentication The gateway provides a variety of options for authentication. It can act as either a supplicant to another authenticator, or it can act as an authenticator for 802.11 clients. When acting as a supplicant, the gateway requests authorization from an authenticator to be on the network. Acting as an authenticator, the gateway processes requests for network authentication from clients, and allows or disallows the client access to the network as a result. Authentication is achieved using either the IEEE 802.1X standard or the IEEE 802.11i standard, depending on the configuration. Network encryption The gateway can also provide encryption for 802.11 wireless links. To support legacy equipment, Shared Key WEP is supported, though not recommended. Other encryption support includes Pairwise Key WEP, Robust Secure Network (RSN) TKIP, Robust Secure Network (RSN) AES, Wireless Public Access (WPA) TKIP, and Wireless Public Access
(WPA) AES. These options are described in more detail in 802.11 Encryption on page 56. Network address translation (NAT) NAT is an Internet standard that enables the network inside the gateway to use one set of IP addresses for inside traffic and a single second address for outside traffic, resulting in two main benefits:
22 Introduction DHCP server Provides a level of security by hiding internal IP addresses and blocking connections from outside devices. Enables the use of any set of IP addresses for the inside network. Because the addresses are only used internally, there is no possibility of a conflict with outside IP addresses. The gateway allows up to 1024 simultaneous connections with outside computers. DHCP server The Dynamic Host Configuration Protocol (DHCP) provides a means for IEEE 802.3 client devices to receive IP addresses for the network. A DHCP client computer (or other type of network device) begins by asking a DHCP server for an IP address. The server provides an address, creates a lease period for that client, and keeps track of the address assigned to that client. The client then uses that IP address and periodically renews the lease if it exceeds the lease period. You can specify the following major DHCP server features:
A range of IP addresses to be assigned to clients (known as the address pool). The domain name. The primary and secondary DNS servers (or you can defer to values retrieved over the cellular connection). The lease period. The gateway DHCP server allows up to 1024 DHCP clients. DHCP Client The device can also act as a DHCP client to be configured by an existing DHCP server. 23 Introduction DNS proxy DNS proxy DNS proxy allows the device to handle and forward DNS requests to remote DNS servers. This allows inside clients to use convenient naming such as www.alliantnetworks.com when addressing remote computers. Backup and restore The gateway provides a means of backing up and restoring its configuration via TFTP. It is prudent to back up the gateway configuration before altering functionality. Firmware upgrade From time to time new firmware with improvements to gateway functionality becomes available. The gateway provides a means of upgrading firmware via TFTP. Advanced operations features SNMP You can configure and manage the gateway through the Simple Network Management Protocol (SNMP) using any MIB browser. Parameters are stored in MIBs (Management Information Base), which provide a standard format for accessing data of various types. The gateway supports versions 1, 2c, and 3 of the SNMP protocol. SNMP V2c adds additional error status reporting over SNMP V1, while SNMP V3 adds secure authentication and encryption for reading and writing MIBs. For more information, see the Advanced Operations Guide. 24 Introduction Serial and Telnet command line interface Serial and Telnet command line interface You can configure and manage the gateway through a Command Line Interface (CLI), which provides access to every configurable aspect of the product. There are two ways to connect to the gateway and access the CLI:
Through the DB9 interface (serial CLI) The serial CLI shares the DB9 interface with the serial passthrough feature. If serial passthrough is running, pressing and releasing the configuration button disables serial passthrough and brings up the serial CLI. The default serial settings are 38400 N-8-1. Over Ethernet (Telnet CLI) The Telnet CLI allows access from any computer connected directly or indirectly to the 802.3 port on the gateway. The Telnet CLI allows only one connection at a time. The two access mechanisms provide access to the same set of CLI commands. For more information on the CLI, see the Advanced Operations Guide. SYSLOG SYSLOG is the standard protocol described in RFC 3164 for logging system events. It was initially used by Unix systems and is now commonly used by switches, routers and other embedded devices. Using SYSLOG, you can send a log of system events to a SYSLOG server, centralizing important management information. Two important aspects of system events are severity and message. The gateway provides functionality for filtering out events based on severity and for specifying multiple SYSLOG servers to receive event logs. A limited amount of SYSLOG information is stored in the gateway using on-board logging, which provides the same filtering functionality and allows you to view events through the CLI. 25 Introduction Serial passthrough Serial passthrough The serial passthrough converts serial data from the DB9 interface to IP network traffic. With this passthrough, a TCP or UDP socket-based application can communicate with a serial device. The gateway does not interpret or change any of the serial data. For more information, see the Advanced Operations Guide. I/O passthrough The I/O passthrough converts data from the DB25 interface to IP network traffic. Like serial passthrough, this type of passthrough supports the connection modes TCP Connect, TCP Listen, and UDP. For more information, see the Advanced Operations Guide. Data transfer protocol The I/O passthrough data format uses XML to transfer information between the remote host and the bridge. For more information, see the Advanced Operations Guide. About this guide This guide is intended primarily to be viewed on your computer, and it provides hot links to referenced topics. If you print this guide, references and indexes list page numbers, so you can easily find referenced topics by turning to the listed page number. Turn or jump to the following topics for more information:
For detailed installation instructions, see Installation on page 28. For a description of the Alliant Web Configuration Interface, which allows you to configure device features, see Using the Web Configuration Interface on page 39. 26 Introduction Contact information For a description of the CLI structure and an exhaustive list of CLI commands, see the Advanced Operations Guide. Contact information Alliant Networks technical support:
Email: support@alliantnetworks.com Telephone: 408-744-1500 (extension 112) 27 Installation Installation Package contents The Cellular Gateway must be installed in a location that has access to a standard 110 V power outlet and is within the coverage area of your cellular service provider. Make sure the gateway model you have chosen matches the access standard used by your cellular service provider. For details, see Cellular access standards on page 14. Once installed, the gateway is ready for use as an Internet gateway. If further configuration is necessary, the gateway can be configured through its Web-based configuration interface. For details, see Using the Web Configuration Interface on page 39. For more sophisticated applications, see the Advanced Operations Guide. Package contents In addition to the gateway itself, the following items are shipped with all models:
Basic Setup Guide CD containing documentation, firmware and the Alliant Discovery Tool. DB9 serial modem cable Ethernet cable DC power supply Cellular antenna 28 Installation Installation Instructions Installation Instructions The installation instructions depends on the product. The directions below provides details on how to setup and install software for the Cellular Gateway GPRS, Cellular Gateway CDMA and Cellular Gateway PC Card. Once setup, install software, connecting to an existing LAN and customization are all the same. Discussions of these topics start on page page 35. Cellular Gateway GPRS CGW101 Other requirements A cellular-with-data service contract with a cellular service provider whose data protocol is compatible with the gateway. All cellular-with-data service contracts require an IMEI number. The Cellular Gateway IMEI number is located on the bottom of the device as a bar code labeled IMEI.The number is unique to each product and is used by the cellular carrier to track your product. If you are purchasing a T-Mobile plan, make sure to ask for an appropriate APN (for example, internet2.voicestream.com). The APN is specific to the type of data plan. T-
Mobile users must configure the gateway with this APN. This extra step is not required for AT&T data plan users. See the list of providers in Cellular access standards on page 14. The Cellular Gateway 1000 requires a GPRS cellular SIM card, received when you purchase a cellular-with-data service contract. The SIM card enables the gateway to communicate with the cellular network. (The Cellular Gateway 1100 does not require a SIM card. For LAN connection, your computer must be equipped with a 10/100 Mbps Ethernet network interface card or a compatible 802.11 PCI or PCMCIA wireless card. 29 Installation Installation steps Installation steps The basic installation of the Cellular Gateway involves attaching the cellular antenna, connecting power, and making a LAN connection (wired or wireless). The Cellular Gateway 1000 requires that you first install a GPRS cellular SIM card (not provided) into the gateway. Instructions for installing the SIM card are given in Installing the SIM card (model 1000 only), below. The Cellular Gateway 1100 comes with a CDMA 1x cellular SIM card already installed. Installing the SIM card (model 1000 only) Refer to the illustration below and follow these steps to insert the SIM card:
1. Disconnect the gateway from power and place it on a flat work surface. 30 Installation Installing the SIM card (model 1000 only) 2. If the gateway is attached to the mounting plate, remove the mounting plate. Grasp the mounting plate and pull to release it from the unit. 3. Locate the removable Door (see illustration). 4. Remove one screw (see illustration) and remove the Door to reveal the SIM card hatch. Set the Door and screw aside. 5. Slide the SIM card hatch lid to the Open position. Mounting Plate Screw Door 6. Lift the hatch lid. 7. Align the SIM card to the guides in the hatch. Make sure the gold connectors on the card are facing down. The cards gold connectors must make contact with the hatchs gold pins. 8. Lower the hatch lid and slide the hatch lid to the Closed position. 9. Replace the Door and the screw. 31 Installation Attaching the cellular antenna Attaching the cellular antenna To attach the antenna, insert the SMA connector on the end of the antenna cord into the connection point on the side of the gateway and hand-tighten the thumbscrew. To minimize interference, place the cellular antenna as far away as possible from the 802.11 antennas.
(See the illustration on page 13.) Connecting power Connect the provided power supply to the gateway power port and to a standard 110 V power outlet. (For the location of the power connection on the gateway, see Back panel on page 17.) When it is connected to power, the LEDs light. For a description of the LEDs, see LEDs on page 20. Cellular Gateway CDMA Model CGW102 Other requirements A cellular-with-data service contract with a cellular service provider whose data protocol is compatible with the gateway. All cellular-with-data service contracts require an IMEI number. The Cellular Gateway IMEI number is located on the bottom of the device as a bar code labeled IMEI.The number is unique to each product and is used by the cellular carrier to track your product. See the list of providers in Cellular access standards on page 14. 32 Installation Installation steps For LAN connection, your computer must be equipped with a 10/100 Mbps Ethernet network interface card or a compatible 802.11 PCI or PCMCIA wireless card. Installation steps The basic installation of the Cellular Gateway involves attaching the cellular antenna, connecting power, and making a LAN connection (wired or wireless). Attaching the cellular antenna To attach the antenna, insert the SMA connector on the end of the antenna cord into the connection point on the side of the gateway and hand-tighten the thumbscrew. To minimize interference, place the cellular antenna as far away as possible from the 802.11 antennas.
(See the illustration on page 13.) Connecting power Connect the provided power supply to the gateway power port and to a standard 110 V power outlet. (For the location of the power connection on the gateway, see Back panel on page 17.) When it is connected to power, the LEDs light. For a description of the LEDs, see LEDs on page 20. 33 Installation Cellular Gateway PC Card Model CGW103 Cellular Gateway PC Card Model CGW103 Other requirements The Cellular Gateway PC Card requires a PC Card. The Verizon Wireless AirDirect 555D is the supported card for this product. This card can be purchased from any Verizon store or qualified reseller. A cellular-with-data service contract with a cellular service provider whose data protocol is compatible with the gateway. A service plan can be purchased from any Verizon store or qualified reseller. For LAN connection, your computer must be equipped with a 10/100 Mbps Ethernet network interface card or a compatible 802.11 PCI or PCMCIA wireless card. Installation steps The basic installation of the Cellular Gateway involves inserting the PC Card, attaching the cellular antenna, connecting power, and making a LAN connection (wired or wireless). Insert the PC Card. Refer to the illustration to the right and follow these steps to insert the PC card:
1. Disconnect the gateway from power and 2. place it on a flat work surface. Insert PC Card in the slot located in the back of the gateway. 34 Installation Connecting power Connecting power Connect the provided power supply to the gateway power port and to a standard 110 V power outlet. (For the location of the power connection on the gateway, see Back panel on page 17.) When it is connected to power, the LEDs light. For a description of the LEDs, see LEDs on page 20. Installing Software The CD provided contains manuals and a few other advanced items. Insert the CD into the CD drive and follow the directions. For home use the minimal installation is adequate. The maximum install and custom provide an additional discovery tool usually only needed in a corporate environment. LAN connection You can use the gateway in its default configuration as the Internet gateway for one or more computers equipped for wired Ethernet connection or wireless LAN association. It is assumed that your computer is configured to acquire its IP address from a DHCP server. Refer the applicable instructions below. Wired Ethernet This method of connection requires that you have a 10/100 Mbps Ethernet network interface card installed in your computer. Connect one end of the provided Ethernet cable to the Ethernet port on the gateway and the other end to the Ethernet port on your computer. (For the location of the Ethernet port on the gateway, see Back panel on page 17.) 35 Installation Wireless LAN Wireless LAN This method requires that you have an 802.11 capable computer or a 802.11 wireless PCI or PCMCIA card installed in your desktop or laptop computer. The wireless settings listed below are compatible with the gateway in its default configuration. (For information on configuring your card, consult the manufacturers documentation.) ESSID: attach to any ESSID automatically or specifically use CellularGateway Security Setting: no security (open system) IP Network Settings: obtain automatically (DHCP Client) Connecting multiple Ethernet computers In order to connect multiple computers with Ethernet, you must purchase a 10/100 hub or switch and additional Ethernet cables. This product works with all hubs and switches. Connect the Uplink port on your hub or switch to the 10/100 port of the Cellular Gateway. Use additional cables to connect your computers to the hub. Customizing your gateway The gateway provides Internet access once you have configured the cellular connection. There are three ways to configure it:
Through the Web Interface, which allows you to configure many features using your Web browser, as described in Direct browser access below. Through the Alliant Networks Discovery Tool, which must be installed from the CD.This tool finds the gateway then launches your web browser for configuration, as described in Using the Discovery Tool below. 36 Installation Direct browser access Through the Command Line Interface, which allows access to all features. This tool, which is meant only for the most sophisticated configuration tasks, is described in the Advanced Operations Guide. Direct browser access If the gateway is set to the factory defaults and your computer is set to acquire its IP address from DHCP, follow these steps:
1. Connect the gateway to your computer as described in Wired Ethernet or Wireless LAN sections. 2. Turn on your computer in order to acquire an IP address from the gateway. 3. Launch your browser and point it to http://192.168.0.1 (the gateways default IP address). You will be prompted for a user name and password. The default password is: public. The default user name is admin. The configurable items are described in Using the Web Configuration Interface on page 39. T-Mobile users must follow the instructions in the next section. Configuring the GPRS Connection (T-Mobile only) If you purchased a T-Mobile cellular data plan, an additional step is required to enable the gateway. T-Mobile must provide you with the appropriate APN and you must add the APN to the device configuration. If you do not know your APN, contact T-Mobile customer support. To add the APN to the gateway configuration, follow these steps:
1. From the Web pages, Click Network. 2. 3. In the Network page, click GPRS. In the GPRS page, locate the APN field and enter the APN you received from the service provider. (An example APN is internet2.voicestream.com.) 4. Click Change. 37 Installation Using the Discovery Tool After about 60 seconds, you should be able to browse the Internet. Using the Discovery Tool Selecting maximum or custom will install the Alliant Discovery Tool. The Discovery Tool helps you find and configure the gateway. This tool is usually only needed when installing the gateway in a corporate environment, the gateway has already been configured and the IP information is unknown or on a non 192.168.X.X subnet. 1. To install the Alliant Networks Discovery Tool select custom or maximum installation. During the installation you will be prompted to install Java as well. 2. Start the discovery tool, select the gateway, and right-click to launch the configuration. (If a password is set on the gateway, enter it when prompted. The default user name is admin and the default password is public.) The configurable items are described in Using the Web Configuration Interface on page 39. 3. To launch the Alliant Discovery Tool Under start, Programs, Alliant, CG 1000, select Discovery Tool. The Discovery Tool window appears. 4. Select the Discovery Devices button. The gateway should appear below. 5. Right mouse-click and select browser(user) to launch you web browser. Now you can use the Web interface to configure the device, see Using the Web Configuration Interface on page 39. After you change and save the configuration, disconnect the gateway from the computer and connect it in its permanent place in the network. If you have difficulty discovering the device connect your computer directly to the gateway with the supplied Ethernet cable. 38 Using the Web Configuration Interface Launching a gateway configuration Using the Web Configuration Interface If the configuration that was set at the factory does not meet your network requirements, or if you want to customize the settings, you can use the Alliant Networks Web Configuration Interface to change the configuration. Launching a gateway configuration You can only configure gateways that are on the same subnet as your computer. The installation instructions assume that your computer is configured to acquire its IP address from a DHCP server. This guarantees that your computer and the gateway have the same IP information, because when it is connected to the gateway, your computer acquires its IP information from the gateway. If your network does not allow this situation, the Alliant Discovery Tool can help you find and configure the gateway. The two ways to launch a gateway configuration are described below. Direct browser access Make sure that the gateway is either wired to the same network, associating with the same wireless network, or connected directly to the computer, and that the gateway is connected to power. If you know that the gateway is on the same subnet as your computer, and you know the gateway IP address, enter the IP address in your browser address pane. (The factory default IP address is 192.168.0.1.) The gateway Web configuration start page appears in your browser window. (The default user name is admin and the default password is password.) 39 Using the Web Configuration Interface Using the Discovery Tool Using the Discovery Tool Initially, the gateway may not match your networks subnet. This prevents your computer from accessing the gateway configuration web pages. The Alliant Discovery Tool solves this problem by finding the gateway on your network and allowing you to assign it an IP address on the same subnet as your computer, and launch the gateway configuration pages in a Web browser. The Discovery Tool must be installed on a computer that has an Ethernet adapter or a wireless card. After the Discovery Tool is installed on your computer (see Using the Discovery Tool), make sure that the gateway is either wired to the same network, associating with the same wireless network, or connected directly to the computer, and that the gateway is connected to power. If more than one gateway is connected, make a note of the MAC address of the gateway you want to select so that you can identify it in the Discovery Tool. 1. To launch the Alliant Discovery Tool:
Windows: Select Start /Programs /Alliant / Discovery Tool. Unix: From a shell, enter the following command: discHost The Discovery Tool window appears. 2. Click Discover devices. 3. All detected Alliant Networks gateways on the network are listed in the Device List pane. In the Device List pane, select the gateway you want to configure. If more than one gateway is listed, you can identify the one you want by its MAC address. To select the gateway, click anywhere in its listing. In the Device Properties list, make a note of the gateway IP address and subnet mask. Enter a new IP address in the space provided. (The default is: 192.168.0.1) Optionally, you can enter the Subnet mask for the gateway. 4. Right click anywhere in the Discovery Tool window to launch the Web configuration interface. 40 Using the Web Configuration Interface About the Web configuration interface The gateway Web configuration start page appears in your browser. (If a password is set on the gateway, enter it when prompted. The default user name is admin and the default password is password.) 5. Change the configuration as desired, and save the changes. 6. Back in the Discovery Tool, click Discover devices. 7. Locate the gateway and restore the IP address, subnet mask, and gateway to their original settings. 8. To end the Discovery Tool session, select File:Exit. The following table describes the functions of the buttons in the Alliant Discovery Tool window. Item File menu Edit menu Description Contains the Exit command, which ends the Discovery Tool session. Contains the following commands:
Configure: Sets the browser. Enter one of the following browser names (in lower case characters) for the Browser Application: iexp, mozilla, or netscape. ADP (Alliant Discovery Protocol):
About Displays the version of the Discovery Tool. About the Web configuration interface The interface has a row of links across the top that lead to major configuration pages. Each major page has an associated menu of links on the left browser pane. The menu links lead to subpages, which are displayed to the right. On each subpage, you can change properties by entering values in the fields, selecting from lists, and clicking radio buttons. 41 Using the Web Configuration Interface Network Configuration pages have two buttons, Change and Revert, which function as follows:
Change stores the settings permanently in the device nonvolatile memory. After you click Change, the new configuration settings take effect and you can see the changes on the System Summary page. Revert returns the settings to their last previous values. NOTE: If you forget to click Change before moving to a new configuration page or closing your browser, your changes are lost. The following table shows a summary of the Web configuration pages. Major page Network System Security M2M Link Configurable items Basic (IP, subnet mask, gateway and DNS); DHCP server; Cellular (cellular interface); NAT
(Network address translation) Web (Enable, SSL, Device password); Backup and Restore; Upgrade; Serial CL; Telnet CLI;
SNMP; SYSLOG; ADP; CDP; Log, Advanced, Information RADIUS, Acess List, 802.11 Encryption (WEP and AES wireless encryption); 802.11 Authentication; Ethernet Supplicant Serial Passthrough network and hardware settings 802.11, PQ Mapping, User Classification, Protocol Filter, Statistics; Ethernet Protocol Filer and Statistics; Bridge 802.11 Static MACS and Ethernet Static MACS Network From the start page, click Network. The network pages allow you to configure IP features
(layer 3 and 4), such as DHCP server and NAT. These features are global in nature. Their configuration affects all interfaces on the device and how the device communicates through 42 Using the Web Configuration Interface Basic the inside Ethernet (eth0) and the outside cellular routing (cell0) interfaces. These features should not be confused with layer 2 features found on the Link pages. Basic From the Network page, click Basic. The following table describes the basic network properties. When you are finished, click Change. Setting Device name Device location DHCP client IP address Subnet mask Gateway Primary DNS Secondary DNS Description Specify a name to identify the device. Specify the real-world location of the device. Click Obtain an IP address from a DHCP Server to enable the DHCP client feature. Click Specify IP information below to specify a static IP address. Specify static IP information for this device. If you change the IP address information and click Change, you cannot continue to configure the device using the old IP address. The browser will lose connection. To reestablish a connection, enter the new IP address into the browser:
Specify the subnet mask for this device. Specify the IP address of the Gateway for this device. To specify that this devices cellular link will be the Gateway, use the keyword cell0. Specify the IP address of a DNS server for this device. To indicate that you want to use the Primary DNS retrieve from the cellular link use the keyword cell0. Specify the IP address of a secondary DNS server for this device. To indicate that you want to use the Secondary DNS retrieve from the cellular link use the keyword cell0. 43 Using the Web Configuration Interface DHCP Server Setting Current Gateway Current Primary DNS Current Secondary DNS Description This is the Gateway IP Address that is given out to DHCP clients. This is how you know the IP adress when the Gateway is set to cell0. This is the Primary DNS that is given out to DHCP clients. This is how you know the IP adress when the Primary DNS is set to cell0. This is the Secondary DNS that is given out to DHCP clients. This is how you know the IP adress when the Secondary DNS is set to cell0. DNS-proxy Click the radio button to enable or disable DNS proxy for this device. DHCP Server From the Network page, click DHCP Server. This page allows you to set properties for the device DHCP server feature. When you are finished, click Change. Setting DHCP server Is running IP Address Description Click to enable or disable the device DHCP server feature. If enabled, the DHCP client feature (specified on the Network:Basic page) is disabled automatically. Indicates DHCP server status. Specify static IP information for this device. If you change the IP address information and click Change, you cannot continue to configure the device using the old IP address. The browser will lose connection. To reestablish a connection, enter the new IP address into the browser:
Subnet Mask Primary DNS server Specify the subnet mask for this device. Specify an IP address for the primary DNS server, or specify LOCAL. 44 Using the Web Configuration Interface Cellular Setting Description Secondary DNS server Specify an IP address for the optional secondary DNS server, or specify LOCAL. Domain name IP range Lease time Cellular Specify the domain name to be given out to DHCP clients. Specify the pool of IP addresses to be given out to DHCP clients. The default IP range is from (low) 192.168.0.3 to (high) 192.168.0.254. The gateways default IP address is 192.168.0.1. The subnet mask is taken from eth0 interface setting. Specify the maximum length of time (in days, hours, and minutes) that a client has to renew its IP address before the IP address is placed back into the pool of available IP addresses. Normally clients renew their IP addresses when they reach half the lease time. From the Network page, click Cellular. This page allows you to configure settings for the cellular interface. When you are finished, click Change. Setting Cellular Type Mode Description This displays the type of cellular device being used by the Gateway. For the CGW103 product, this information reflects the type of PC-card inserted. Select one of the following options from the list:
manual: The Start button must be used to bring up the interface manually. automatic: The interface comes up automatically at boot time. Current operator Indicates the cellular service provider. 45 Using the Web Configuration Interface NAT Setting Username Password APN Signal strength Status Start and Stop buttons Statistics button Description Specify the Username which is provided from the service provider. Not all service providers require a username. Specify the Password which is provided from the service provider. Not all service providers require a password. Specify the Access Point Network (from the service provider). Indicates the strength of the cellular interface signal. Indicates the status of the cellular interface. Click to start or stop connection to the cellular network. Click to view how many packets have gone in and out and how many bytes have gone in and out since the Gateway was last restarted. NAT From the Network page, click NAT. This page allows you to configure settings to control Network Address Translation between the Ethernet interface(eth0) and the cellular interface
(cell0). Network Address Translation remaps outbound traffic from internal interfaces to a single IP address and a random port. This gives the perception that outbound traffic originates from a single node, allowing you to provide Internet access to an entire IP subnetwork with one outbound link. All devices in the subnetwork appear to come from a single IP address established by the outbound link. When you are finished, click Change. 46 Using the Web Configuration Interface System Setting Status Maximum connections Translation timeout Description Specify whether NAT should be enabled or disabled. If NAT is disabled, only one computer can use the cellular link. Specify the total number of connections allowed from inside computers through the cellular link. This is not the number of computers allowed to access the Internet; a computer generates several connections. Up to 1024 connections are allowed. Specify the length of time communication can be idle before a NAT connection is closed, allowing internal resources to be reclaimed. This timeout value should be increased if traffic is extremely intermittent. System From the start page, click System. These pages allow you to perform administrative tasks. Web From the System page, click Web. This page allows you to control the device web server. When you are finished, click Change. Setting Enable Description Click to specify whether the web server is enabled or disabled. If on, you can configure the device through a web browser. If off, you can only configure the device through Serial CLI, Telnet CLI, or SNMP. 47 Using the Web Configuration Interface Backup & Restore Setting SSL Backup & Restore Description Click to specify whether Secure Socket Layer (SSL) technology is used to encrypt information between the computer and the device during a configuration session. When this option is turned on, data is protected during the configuration session. When it is turned off, data could be intercepted during the configuration session. When this option is on, you must specify https:// in the browser address pane to reach the configuration. From the System page, click Backup & Restore. The gateway maintains the current configuration in FLASH memory. Once you have configured the gateway to your preferred functionality, it is useful to store a backup copy of the configuration so that you can restore it if necessary, or copy it to another gateway. A backup operation stores the current configuration in a plain text file on a TFTP server. All information is transferred, including sensitive information such as the password of the device. Sensitive information is encrypted and stored as such in the file. This page has the following buttons:
BackupCopies the entire configuration and stores it in the specified location. Full RestoreReplaces the entire configuration with the specified file. Partial RestoreReplaces the items identified in the configuration file as partial.This is useful for setting up a group of standard parameters for use across multiple devices. The device merges its current configuration with any new values transferred in the configuration file. 48 Using the Web Configuration Interface Upgrade Setting Description TFTP Servers IP address File name Specify the IP address of a TFTP server where the configuration is to be stored. Make sure that you can reach the TFTP server and that the server accepts connections from any client. Specify the full path name of file being written or restored. The path must exist on the server. The file name extension is arbitrary, but it is recommended that you use the extension .arf Upgrade From the System page, click Upgrade. This page allows you to replace the current firmware either from a firmware image stored on a TFTP server or from an image stored on the local computer. To ensure uninterrupted operation, the gateway stores two firmware images. This command automatically replaces the oldest image. On the next reboot, the latest firmware image is automatically used. To upgrade from a firmware image stored on a TFTP server:
1. In the TFTP Servers IP address field, specify the IP address of a TFTP server where the firmware image is to stored. Make sure that you can reach the TFTP server and that the server accepts connections from any client. (For details on setting up a TFTP server, see the Advanced Operations Guide.) In the upper File name field, specify the full path name of firmware image file. 2. 3. Click Upgrade. To upgrade from a firmware image stored on the local computer:
1. Click Browse. In the File Upload window, navigate to the firmware image file. Select the file and click Open. 2. Click Upgrade. 49 Using the Web Configuration Interface Serial CLI Serial CLI From the System page, click Serial CLI. This page allows you to enable or disable the Serial CLI feature. The Serial CLI must be disabled if Serial Passthrough is in use. When you are finished, click Change. Setting Enable on Reboot Timeout Currently Running?
Start and Stop buttons Description Click to specify whether the Serial CLI is enabled (on) or disabled (off) at startup. Specify the length of time to wait before disabling Serial CLI. Shows the current status of the Serial CLI Click to enable of disable the serial cli. Telnet CLI From the System page, click Telnet CLI. This page allows you to enable or disable the Telnet CLI feature. When you are finished, click Change. Setting Enable Timeout Who is connected Close button Description Click to specify whether the Telnet CLI is enabled (on) or disabled (off). Specify the length of time to wait before disabling Telnet CLI. Identifies the IP address of the Telnet connection. Click to terminate a Telnet CLI session immediately. 50 Using the Web Configuration Interface SNMP SNMP From the System page, click SNMP. This page allows you to configure SNMP settings. Simple Network Management Protocol (SNMP) is the standard for device management. This device supports SNMP versions V1, V2c, and V3. SNMP V2c adds additional error reporting over V1; V3 adds security via password-based authentication and encryption. The use of V3 is required for any write actions (and for most read actions) by default. While it may be disabled, the use of SNMP V3 is recommended. (For more information on SNMP, see the Advanced Operations Guide.) When you are finished, click Change. Setting Enable Read community string Write community string Require V3 Enable authentication traps Description Click to specify whether SNMPis enabled (on) or disabled (off). Specify the community string used for accessing the public read-only MIBs. Specify the community string used for accessing all of the MIBs with the ability to write to the writable MIBs. Choose ON to specify that SNMP V3 is required to access the write community MIBs (recommended). Click to specify whether or not SNMP Authentication traps are enabled (on) or disabled (off). Traps can be enabled on a primary and a secondary server. The following fields can be configured for each server:
Community: Sets the community string used for authenticating trap events to the server. IP Address: Sets the IP address of the trap server to send trap events. Port: Sets the destination port used for sending traps (the UDP port on the trap server). 51 Using the Web Configuration Interface SYSLOG SYSLOG From the System page, click SYSLOG. This page allows you to enable or disable the SYSLOG logging feature. When you are finished, click Change. Setting Enable Primary IP address Secondary IP address Severity threshold Description Specify whether logging is enabled (on) or disabled (off). Specify the IP address of the primary SYSLOG server. Specify the IP address of the secondary SYSLOG server. Controls by severity which events are sent to the SYSLOG servers. Events less than or equal to this value are sent to the SYSLOG server. The highest priority is 0 and the lowest priority is 7. Only severity levels 0, 3, 6 and 7 occur on this gateway. Severity 6 events are strictly informative. They occur during bootup and shutdown and describe the gateways functional behavior. Errors (severity 3) indicate failures that are not catastrophic but do affect gateway functionality. For details on the severity levels, see the Advanced Operations Guide. ADP From the System page, click ADP. This page enables or disables Alliant Discovery Tool and sets the port used by the tool. When you are finished, click Change. 52 Using the Web Configuration Interface CDP CDP Log Setting Enable Port Description Specify whether the Discovery Tool is enabled (on) or disabled (off). Identifies the port used by the Discovery Tool. This value must match the port setting on the Tool. From the System page, click CDP. This page enables or disables Cisco Discovery Protocol. When you are finished, click Change. Setting Enable Period Hold Description Specify whether the protocol is enabled (on) or disabled (off). Identifies the rate at which CDP packets are sent. Identifies the length of time, in seconds, that remote CDP-aware products store information in the device. From the System page, click Log. This page displays a log of information about device activity. Setting Description Logging Threshold Select the level of events to be logged. 53 Using the Web Configuration Interface Advanced Setting Uptime Advanced Description This is how long they Gateway has been running since it was last turned on or reset. From the System page, click Advanced. This page allows you to reset the device or restore the configuration to factory defaults. Button Reset Restore Information Description If the gateway stops responding correctly, click to perform a reset, which disrupts the network temporarily, but does not affect gateway configuration settings that have already been applied with Change. (Changes stored only in cache memory are lost in a reset.) Click to restore the configuration to the factory defaults (which are stored on the gateway) and reset the gateway. This command deletes any user defined configuration information from the gateway. See Restoring factory defaults on page 71 From the system page, click Information to view your Gateways model number, serial number, manufacturing date, manufacturing ID, vendor name, product name, hardware version, software version, MAC address, cellular type, cellular ID, and firmware information. 54 Using the Web Configuration Interface Security Security From the start page, click Security. The Security page appears, where you can configure security settings. All but the supplicant settings affect only 802.11 wireless clients. To maintain wireless association, the settings on wireless clients and the device must match exactly. This product provides numerous encryption and authentication solutions. The acceptable combination of authentication and encryption options are captured in the table below. Client support is also required. Notably XP users should note the EAP-PEAP authentication with Pairwise WEP encryption, refer to Configuring XP Advanced Wireless Security on page 76 WPA Pairwise TKIP Yes Encryption Authentication None Shared WEP Pairwise WEP Pairwise TKIP Yes Yes Yes Yes Yes Open Shared WEP EAP-RADIUS EAP-TTLS-PAP EAP-TTLS-MS-CHAPv2 EAP-PEAP WPA-RADIUS WPA-TTLS-PAP Yes Yes Yes Yes 55 Yes Yes Using the Web Configuration Interface 802.11 Encryption Encryption Authentication None Shared WEP Pairwise WEP Pairwise TKIP WPA Pairwise TKIP WPA-TTLS-MS-CHAPv2 WPA-PEAP 802.11 Encryption Yes Yes From the Security page, click Encryption. The Encryption page appears, where you can configure the settings for wireless encryption. You can change the settings by clicking the radio buttons and entering values in the fields. When you are finished, click Change. The following table describes the encryption modes. Setting Encryption mode Description Open: No encryption. This mode is the default. Shared-WEP: Supported only to maintain compatibility with legacy equipment. Not recommended, due to security problems with the algorithm. Pairwise-WEP: Sometimes known as dynamic key encryption. Uses the WEP algorithm, but dynamically generates encryption keys during the authentication process. Can only be used with IEEE 802.1X authentication modes (eap-radius, eap-ttls). Pairwise-TKIP: A dynamic key encryption mode which uses larger encryption keys and a more secure key negotiation protocol. Only usable for RSN or WPA authentication modes (rsn-radius, rsn-ttls, wpa-radius, wpa-ttls). 56 Using the Web Configuration Interface 802.11 Authentication Setting Description Pairwise-AES-Comp: Another dynamic key encryption mode which uses the AES algorithm for encryption, and a more secure key negotiation protocol. Only usable for RSN or WPA authentication modes (rsn-radius, rsn-ttls, wpa-radius, wpa-ttls). Select the WEP key to use for Shared-WEP. Select the encryption length to use for Shared-WEP. Specify the keys to use for Shared-WEP. Each key must be either a string of 5 to 13 characters with no spaces, or a hexadecimal value of 10 or 26 hex digits, starting with 0x. All four keys must match for any received data. WEP shared index Encryption length Key 1, Key 2, Key 3, Key 4 802.11 Authentication From the Security page, click Authentication. The Authentication page appears, where you can configure authentication for the 802.11 wireless interface. You can change the authentication by selecting one of the drop-down settings. When you are finished, click Change. Setting Description Authentication mode Open: No authentication is performed. Shared Wep: A legacy mode only applicable to using shared WEP encryption. EAP-RADIUS: Authentication is performed as an IEEE 802.1X Authenticator, using a centralized RADIUS Server as a backend authentication server. This mode may or may not require encryption settings. Note that the Pairwise-TKIP encryption mode is not an option with this authentication mode. 57 Using the Web Configuration Interface 802.11 Authentication Setting Description EAP-TTLS-PAP: Authentication is performed as an IEEE 802.1X Authenticator, using an on-device EAP-TTLS backend authentication server. This mode generates pairwise encryption keys, and it is highly recommended that wireless interfaces enable the pairwise-wep encryption mode when using this authentication mode. In that case, make sure the supplicants have their Encryption mode set to WEP and the box Key will be generated automatically is checked. There are multiple possible settings for TTLS. Supplicant credentials are verified using the PAP authentication method Note that the Pairwise-TKIP encryption mode is not an option with this . EAP-TTLS-MS-CHAPv2: Authentication is performed as an IEEE 802.1X Authenticator, using an on-device EAP-TTLS backend authentication server. This mode generates pairwise encryption keys, and it is highly recommended that wireless interfaces enable the Pairwise-WEP encryption mode when using this authentication mode. In that case, make sure the supplicants have their Encryption mode set to WEP and the box Key will be generated automatically is checked. There are multiple possible settings for TTLS. Credential verifiaction uses the MS-CHAPv2 authentication verification. EAP-PEAP: Authentication is performed as an IEEE 802.1X Authenticator, using an on-device EAP-PEAP backend authentication server. This mode generates pairwise encryption keys, and it is highly recommended that wireless interfaces nable the pairwise-wep encryption mode when using this authentication mode. In that case, make sure the supplicants have their Encryption mode set to WEP and the box Key will be generated automatically is checked. WPA-RADIUS: Authentication is performed as a WPA Authenticator, using a centralized RADIUS Server as a backend authentication server. This authentication mode requires the use of the Pairwise-TKIP encryption mode. WPA-TTLS: Authentication is performed as a WPA Authenticator, using an on-
device EAP-TTLS backend authentication server. This authentication mode requires the use of the pairwise-tkip encryption mode. 58 Using the Web Configuration Interface Certificate Setting Description WPA-PEAP: Authentication is performed as an IEEE 802.1X Authenticator, using an on-device EAP-PEAP backend authentication server. This mode generates pairwise encryption keys, and it is highly recommended that wireless interfaces nable the Pairwise-TKIP encryption mode when using this authentication mode. In that case, make sure the supplicants are configured for WPA association and TKIP encryption. Certificate This command lets you load a new certificate. Click on browse to find the file, or type in its name, then click on Update to update your certificate. RADIUS From the Security page, click RADIUS. The RADIUS page appears, where you can configure the settings for RADIUS authentication and accounting. You can change the settings for primary and optional secondary servers by clicking the radio buttons and entering values in the fields. When you are finished, click Change. Authentication The RADIUS authentication grouping provides settings for a RADIUS authentication server. Setting Primary Column Description Specify the primary RADIUS authentication server IP address, port and shared secret. 59 Using the Web Configuration Interface Accounting Setting Secondary Column Accounting Description Specify the optional secondary RADIUS authentication server. If the primary cannot be contacted, the gateway will attempt to communicate with the secondary. The RADIUS accounting grouping provides settings for a RADIUS accounting server. NOTE: Accounting is only applicable if the authentication mode is not Open. Setting Accounting enable Update interval Primary Secondary Description Click to enable (on) or disable (off) RADIUS accounting. Specify how often (in seconds) that RADIUS Accounting will send interim-update messages to the RADIUS Accounting Server. Specify the primary RADIUS accounting server IP address, port and shared secret. Specify the optional secondary RADIUS accounting server. If the primary cannot be contacted, the gateway will attempt to communicate with the secondary. Access List Is a database of user names and passwords stored on the device. Primarily this list is used for local TTLS. Local TTLS provides the same level of security as a RADIUS server without the need to set up another computer, the RADIUS server. From this page, users can be added, removed or you can change their password. The device always has the admin user, which can never be removed. 60 Using the Web Configuration Interface Add a user Add a user 1. Type in a name in the User Name field. 2. Type in the password in the Password field 3. Type in the password again in the Confirm Password field. 4. Click Add/Change The new name should appear in the table. Change password 1. Select a row in the table. The user name will appear in the user name field. 2. Type in the password in the password field 3. Type in the password again in the Confirm password field. 4. Click Add/Change The table will not change but the password will be updated in the device. Remove a user 1. Select a row in the table. The user name will appear in the user name field. 2. Click Remove The user name will be removed from the table. Ethernet Supplicant From the Security page, click Supplicant. The Supplicant page appears, where you can configure authentication for the 802.3 Ethernet interface. You can change the authentication 61 Using the Web Configuration Interface M2M by selecting one of the drop-down settings. For settings other than Open, enter a user name and password. When you are finished, click Change. Setting Supplicant mode Description Open: No authentication is performed. User name Password M2M Supplicant-MD5: Authentication is performed as an IEEE 802.1X Supplicant, using EAP-MD5 as the authenticating protocol. Specify the user name to use for authentication (a string from 1 to 32 characters containing no spaces). Specify the password to use for authentication (a string from 1 to 32 characters containing no spaces). From the start page, click M2M. The M2M page appears, where you can configure network and hardware settings for the Serial Passthrough feature. Network settings From the M2M page, click Network settings. The Serial Passthrough page appears, where you can configure network settings for the serial passthrough feature. When you are finished, click Change. 62 Using the Web Configuration Interface Hardware settings Setting Enable on reboot Description Click on to specify that the passthrough application should restart itself when a disconnection occurs. Otherwise, click off. This overrides the Serial CLIs enable on reboot. Socket type Sets the socket type to use for the passthrough application:
Local port Remote IP address Remote port Network Timeout Serial Timeout Line length TCP listen: A socket that accepts connections from remote systems. TCP connect: A TCP socket that initiates a connection with a remote system. UDP: A UDP socket type. Specify the local port number for use with UDP and TCP-Listen modes. Specify the IP address of the remote system that will be communicating with the serial interface. Specify the port number of the remote system that will be communicating with the serial interface. Specify the length of time to wait (in milliseconds) for data from the network before automatically disconnecting. Specify the length of time to wait (in milliseconds) for data from the serial device before sending it to the socket. Specify the length of the serial input buffer, defining how many characters will be read from the serial port before sending the data to the socket. Start and Stop buttons Start or stop the Serial Passthrough feature. Hardware settings From the M2M page, click Hardware settings. The Serial Passthrough:Hardware Settings page appears, where you can configure hardware settings for the serial port. 63 Using the Web Configuration Interface Link When you are finished, click Change. Setting Baudrate Data bits Parity Stop bits Flow control Description Select a baud rate from the list. Select the number of data bits from the list. Select a parity from the list. Select the number of stop bits from the list. Select the type of flow control from the list. Link 802.11 From the start page, click Link. The Link pages allow you to configure layer 2 features. From the Link page, click 802.11. This page allows you to set the 802.11 radio device name, location, and service area for the inside wireless network (not to be confused with the cellular gateway). When you are finished, click Change. 64 Using the Web Configuration Interface 802.11 PQ Mapping Setting Service area Supported clients Channel Basic rates Data preamble Beacon period Description The ESSID is the identifying name of an 802.11b wireless network. By specifying the ESSID in your client setup is how you make sure that you connect to your wireless network instead of your neighbors network by mistake. Controls which clients are allowed to connect. By default, both b and g clients are allowed to connect. Controls the frequency this product uses. Clients must be setup to use the same frequency. Changing this value can avoid interference from other wireless devices. This option controls the support data rates. Unchecking any boxes prevents clients from using that specific data rate. A shorter preamble improves network effeincey since less control data is sent. However older clients or slower data rates may not operate with a short-
preamble. The time between this device sending a beacon. Clients listen for beacons to find networks. Receive radio antenna diversity Antenna diversity enabled can improve network performance. Transmit power A rough control on how much power is used to send traffic Transmit ESSID in beacon When disabled the ESSID is not sent in beacons. 802.11 PQ Mapping From the Link page, click PQ Mapping. The VLAN mapping table is displayed. The gateway supports the QoS model described in the 802.11 Task Group E. This group is responsible for defining QoS for wireless traffic. 802.11 traffic can be given a priority from 0 to 7. By default, VLAN priorities map to the matching 802.11 priority number. For example, 65 Using the Web Configuration Interface 802.11 User classification VLAN priority 1 maps to 802.11 priority 1. You can change this mapping by clicking Enable and changing the values in the 802.11 Priority column. When you are finished, click Change. 802.11 User classification From the Link page, click User Classification. User classification provides a means of classifying or dropping frames. Classification provides privileges to higher priority frames, which are sent before lower priority frames. User Classification is only available for the 802.11 interface (eth1). The user classification page provides a way for users to construct a tree of rules, known as a decision tree. The goal is for each frame to migrate through the decision tree. Eventually, a frame gets to a rule indicating a classification, dropped, or no action. The decision tree is presented as a table where each row has an index value. The first row is 0, and so on. Each rule identifies a field in the frame, an operator, one or more values, a true rule index, and a false rule index. The operator identifies how to compare the field in the frame against the value(s). The fields that are applicable to the rules are:
SRC/DST MAC Address Ethernet II Ether Type TCP and UDP source ports TCP and UDP destination ports PQ mapping is applied to frames before User Classification rules are applied. The Priority field refers to the frames current priority. If the frame has already been classified, the 802.1 P/Q priority IP Protocol 66 Using the Web Configuration Interface 802.11 User classification frames priority will be between 0 and 7, otherwise it will be -1 for a nonclassified frame. Nonclassified frames are treated as the lowest priority frame. These simple rules govern the classification rules in the order presented:
1. Rule 0 is applied first to the frame. 2. If the field does not exist in the frame, then the result is always FALSE. This is determined by parsing through the frame. For example, an Ether II frame does not contain an IP port and would fail if the rule required one. If the field exists, then the operator is applied along with the provided values. If the result is true, then the rule identified by the true index is used next. If the result is false, then the rule identified by the false index is used next. If a row does not exist, then this is equivalent to do nothing (see below). 4. Eventually a leaf node is reached. In which case, one of three actions can occur:
The frame can be classified. A priority is assigned to the frame and it is then sent to the 3. next DISC. The frame is dropped. Do nothing. Even though the rules are conceptually a tree, they are organized in a table with six columns. The table below shows how users can classify UDP frames not already classified that are destined to ports between 1 and 90 to a priority of 3. Index 1 2 3 Frame Field Priority IP
Dst Port Between Operator Value1 Value2 True False unassigned UDP 1 67 2 3 4 5 5 5 90 Using the Web Configuration Interface 802.11 User classification 4 5 Classify nothing 3 Setting Description User classification Click to enable or disable classification. Index Frame field The row in the table to add a frame rule. Select one of the following:
SRC MAC: Use the source MAC address of the frame to compare against the mac_address value(s). DST MAC: Use the destination MAC address of the frame to compare against the mac_address value(s). Ether Type: Use the Ethernet type from the frame to compare against the integer value(s). IP Protocol: The IP protocol field of the frame. SRC Port: Use the UDP or TCP source port of the frame to compare against the integer value(s). Dst Port: Use the UDP or TCP destination port of the frame to compare against the integer value(s). Priority: Compare the frames current priority against the integer value(s). Operator Select one of the following:
!=: Not equal.
==: Equal.
<: Less than. 68 Using the Web Configuration Interface 802.11 Protocol Filter Setting Value 1 Value 2 True index False index Add button Description
>: Greater than.
<=: Less than or equal.
>=: Greater than or equal. between: Between two values. This operator requires two values. Values depend on the field selected in the rule. do nothing: Add a rule to the table to do nothing. drop: Set a rule to drop a frame. classify: Add a rule to classify a frame. An integer or MAC address in the form of AA:BB:CC:DD:EE:FF to compare against the ether_type, src_port, dst_port or priority fields. An integer or MAC address in the form of AA:BB:CC:DD:EE:FF to compare against the ether_type, src_port, dst_port or priority fields. Required only with the between operator. The next row to compare against if the field, operator and values are true. The next row to compare against if the field, operator and values are false. Click to add a new rule. Remove buttons Enter an index number from the table and click to remove that rule. 802.11 Protocol Filter From the Link page, click Protocol Filter. The Protocol Filter page allows you to filter out Ethernet packet frames that match the selected Ethernet protocol types. 1. Click Enable to enable filtering for reception (IN) or transmission (OUT). 69 Using the Web Configuration Interface 802.11 Statistics 2. Select the filtering action from the Mode list:
allow - allow packets of this type to pass through drop - drop packets of this type 3. Check the boxes of the protocols that you want to filter. 4. When you are finished, click Change. 802.11 Statistics From the Link page, click Statistics. A table of statistics and values for the 802.11 interface is displayed. Ethernet Protocol Filter From the Link page, click Protocol Filter. The Protocol Filter page allows you to filter out Ethernet packet frames that match the selected Ethernet protocol types. 1. Click Enable to enable filtering for reception (IN) or transmission (OUT). 2. Select the filtering action from the Mode list:
allow - allow packets of this type to pass through drop - drop packets of this type 3. Check the boxes of the protocols that you want to filter. 4. When you are finished, click Change. Ethernet Statistics From the Link page, click Statistics. A table of statistics and values for the 802.3 interface is displayed. 70 Using the Web Configuration Interface Bridge Bridge From the Link page, click Bridge. The forwarding table is displayed. 802.11 Static MACs MAC addresses in this list are never removed from the forwarding table. They are placed in the forwarding table during boot up, initializing the forwarding table. Setting MAC address Ethernet Static MACs Description To add a MAC address, enter the MAC address in this field and hit add. To remove a MAC address, select one from the table and hit remove. MAC addresses in this list are never removed from the forwarding table. They are placed in the forwarding table during boot up, initializing the forwarding table. Setting MAC address Description To add a MAC address, enter the MAC address in this field and hit add. To remove a MAC address, select one from the table and hit remove. Restoring factory defaults You can restore gateway settings to the defaults that were set at the factory either manually or through software. 71 Using the Web Configuration Interface Upgrading the System In the start page, click System. In the System page menu, click Advanced. To restore the settings manually, insert a pointed object (such as the end of a straightened paper clip) into the reset hole to press the Configuration button. Press and hold the button for 10 seconds. Through the web pages:
1. 2. 3. Click Restore. If the gateway was using an IP address setting other than the default, restoring the factory defaults will change the IP address back to 192.168.0.1 and a subnet mask of 255.255.255.0. Discovery tool can help find the device and assist in configuration, do the following:
1. Close your browser. 2. Return to the Alliant Discovery Tool and click Discover device. 3. Select the device and right-click to start a new configuration session. Upgrading the System You can download firmware and configuration management system upgrades from the Alliant Web site and install those upgrades on the gateway. To locate an upgrade file and download it to your computer:
1. Log on to the Alliant Web site at http://www.alliantnetworks.com. 2. Locate the download file and download the file into a directory on your computer (or move the file to the TFTP server upload/download directory). To install an upgrade from a TFTP server:
1. From the System page, click Upgrade. 72 Using the Web Configuration Interface Backing up a Configuration 2. In the TFTP servers IP address field, specify the IP address of a TFTP server where the firmware image is to stored. Make sure that you can reach the TFTP server and that the server accepts connections from any client. (For details on setting up a TFTP server, see the Advanced Operations Guide. In the upper File name field, specify the full path name of firmware image file. 3. 4. Click Upgrade. To upgrade from a firmware image stored on the local computer:
1. From the System page, click Upgrade. 2. Click Browse. In the File Upload window, navigate to the firmware image file. Select the file and click Open. 3. Click Upgrade. Backing up a Configuration As part of system maintenance, you should save and back up the configurations of individual gateways in case you need to reload them in the future. The backup saves all the parameters of the selected gateway in a file on your computer. The file can be used later to restore the full configuration on this gateway or a partial configuration on another gateway. The configuration is stored in a structured, plain text file, called a configuration file. Sensitive information is encrypted in the file. 1. On the System page, click Backup & Restore gateway. 2. Specify an IP address of the TFTP server and a name of the backup file, and click Backup. 73 Using the Web Configuration Interface Restoring a Configuration Restoring a Configuration Restoring a configuration facilitates two useful purposes:
The first is to return a gateway to a known state. The restore process fully replaces the gateways configuration to a known state from a previously created backup file. Alternatively, the gateway supports a partial restore, where only part of the configuration file is used to replace the settings. It is useful to create a single file with standard settings that can be used to configure all the gateways in your environment. Moreover, the configuration file can be altered and used as an alternative means of configuring a gateway through a partial restore. If you have stored a backup configuration on your computer, you can restore the configuration as follows:
1. From the System page, click Backup & Restore. 2. In the spaces provided, specify the IP address of the TFTP server where the configuration is stored, and the full path name of the file. Make sure that you can reach the TFTP server and that the server accepts connections from any client. 3. Click one of the following buttons:
Full RestoreReplaces the entire configuration with the specified file. Partial RestoreReplaces the items identified in the configuration file as partial.This is useful for setting up a group of standard parameters for use across multiple devices. The device merges its current configuration with any new values transferred in the configuration file. The configuration is restored and activated on the gateway. This operation may cause the gateway to reboot. When restoring the gateways configuration from a file, the IP address may be changed. If you want to continue configuring the gateway, do the following:
74 Using the Web Configuration Interface Restoring a Configuration 1. Close your browser. 2. Return to the Alliant Discovery Tool and click Discover device. 3. Select the device and right-click to start a new configuration session. 75 Solving Problems Solving Problems Configuring XP Advanced Wireless Security If you have difficulty using the gateway, refer to the following topics for information on how to diagnose and solve problems. Configuring XP Advanced Wireless Security Microsoft XP can manage your wireless PC Cards and provide advance wireless security. Configuration requires two major stages. First, configure the Cellular Gateway, afterwhich youll loose wireless access till the XP client is configured. Dont worry. You can always access the Cellular Gateway through the Ethernet interface. Second, configure your wireless card. Youll need to add your login user name and password to the CellularGateway, which requires that the password is at least eight characters. If your password is less than eight characters, change it on your computer before proceeding. On the Gateway, 1. Assuming you have not changed the Cellular Gateways default IP address, browse to http://192.168.0.1 2. Select Security 3. Select Access List 4. Enter your user name and password. Make sure to click Add/Change 5. Select Authentication. 6. Configure authentication to be EAP-PEAP. Make sure to click Change. 7. Select Encryption 8. Configure encryption to be Pairwise WEP.Make sure to click Change. 76 Solving Problems Configuring XP Advanced Wireless Security On an XP client:
1. Edit properties for the 802.11 interface 2. Select "Wireless Networks" at the top of the window 3. Make sure that Use Windows to configure my wireless network settings at the top of the page is checked. 4. Make sure the AP you want to use is in the "Preferred Networks" list-if its not, add it. 5. Select the wireless network you will be using for this test, then click the properties button below the list. 6. Check the box for "Data encryption(WEP enabled)"
7. Check the box for "The key is provided for me automatically"
8. Select the "Authentication" tab at the top of the window 9. Check the box for "Enable IEEE 802.1x authentication for this network"
10.Uncheck Authenticate as computers when computer inforation is available. 11. Set the EAP type to "Protected EAP(PEAP) 12.Click the Properties button 13.Uncheck the box for "Validate server certificate"
14.Select Authentication Method as "Secured password (EAP-MSCHAP v2) 15.Uncheck the box for "Enable Fast Reconnect"
16.Click the Configure button to the right of the pulldown for Authentication Method. 17.Check the box for "Automatically use my Windows logon name and password"
18.Keep clicking "OK" until all windows are closed 19.Verify network connectivity by pinging the bridge and other devices on the network. 77 Solving Problems Configuring your Ethernet Network Configuring your Ethernet Network Unable to access the Internet First check to see if the device is connected. From the Web pages, select Network then Cellular. The Status link should say connected. If not then try the following:
Make sure the PC Card is inserted. If the status is Stopped, click Start once then use the refresh button to see the current status. If the Mode is manual, then either click Start or change the mode to Automatic. If you have just turned on the unit, connecting to the cellular network might take several minutes. Select refresh periodically to check the current status of the connection. If after 10 minutes you still are not connected try the next bulleted item. Make sure the PC card was inserted before plugging in the device. If you are not sure, unplug the device, insert the PC card, then plug in the device. Restore to factory defaults Restoring the configuration of the device to manufacturing defaults guarantees an operational configuration. This operation can be completed through a management interface or manually, through the configuration hole on the side of the device. To restore to factory defaults through the WEB interface:
1. Select the System link. 2. Select the Advanced link. 3. Press the Restore button. 78 Solving Problems Getting FTP to work To restore to factory defaults manually:
1. Power on the device. 2. As soon as the middle LED comes on, insert a paper clip into the configuration hole and hold the button until three LEDs are lit. 3. Release the paper clip. The device can take up to 30 seconds to resume operation. Getting FTP to work FTP clients must enable passive mode when accessing an FTP server through our product. Most clients use passive mode by default with the exception of the client that ships with all Microsoft Windows platforms. 79 Index Numerics 802.11 wireless association 15 A address pool 23, 45 Alliant Discovery Tool 28, 40 Alliant Networks Discovery Tool 36 Alliant Networks Web Configuration Interface 39 APN 29, 37, 46 assignment of IP addresses 45 authentication 22 settings 57 B backing up and restoring 48 configurations 73 bridge maintaining configurations 73 C cellular interface 45 Change button 42 classification, frame 66 CLI 50 Command Line Interface (CLI) 25 community strings 51 80 configuration backing up 73 button 19 file 73 interface 22 launching in a browser 39 maintenance for bridges 73 restoring 74 connecting the gateway to a hub 36 current operator 45 D device inside 15 outside 15 DHCP client 43 DHCP server 44 disabling serial passthrough 19 discovery tool 22, 40 launching 38, 40 DNS-proxy 44 domain name 45 Dynamic Host Configuration Protocol (DHCP) 23 E encryption 22 settings 56 Ethernet connection 35 factory defaults, restoring manually 19 file port 18 extension, file, registry 49 F factory defaults restoring 71 restoring manually 72 configuration 73 extension, registry 49 filter, protocol 69, 70 firmware upgrade 49, 72 forwarding table 71 frame classification 66 full restore 48, 74 G GPRS cellular interface 45 guidelines, security 55 H hub connection 36 I IMEI number 29, 32 inside device 15 installation 28 interface web configuration 39 interoperating with third-party equipment 21 IP address assignment 45 pool 23, 45 renewal 45 L launching a gateway configuration 39 launching the discovery tool 38, 40 layer 2 43, 64 layer 3 and 4 42 lease time 45 LEDs 20 locating devices 40 locating devices 40 log 53 logging 52 logging system events 25 M MAC address use in locating devices 40 N network address translation (NAT) 22, 46 O operator 45 outside device 15 81 P partial restore 48, 74 passthrough serial 26 pool, IP address 23, 45 power 18, 28 connecting 32, 33, 35 connector 17 requirements 28 Primary DNS 43 problem solving 76 protocol filter 69, 70 R RADIUS 59 registry file extension 49 resetting, through software 54 restore 54 and backing up 48 configuration 74 factory defaults 71 full configuration 48, 74 partial configuration 48, 74 settings to factory defaults, manually 19 restore, manually factory defaults 72 Revert button 42 82 S Secondary DNS 43 Secure Socket Layer (SSL) 48 security authentication 57 encryption 56 guidelines 55 serial CLI 25 port 18 serial CLI 50 serial passthrough 26, 62 disabling 19 server DHCP 44 Service area 65 SIM card 29, 30 installing 30 versions 51 SNMP community strings 51 SNMP traps 51 solving problems 76 statistics 802.11 70 802.3 70 SYSLOG 25, 52 system log 53 Simple Network Management Protocol (SNMP) 24, 51 T table forwarding 71 VLAN mapping 65 Telnet CLI 25, 50 third-party interoperability 21 traps, SNMP 51 troubleshooting 76 U upgrading firmware 49, 72 user classification 66 V VLAN mapping table 65 W web configuration interface 39 Web management interface 22 wireless LAN association 15 83
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2004-10-11 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2004-10-11
|
||||
1 | Applicant's complete, legal business name |
Alliant Networks, Inc.
|
||||
1 | FCC Registration Number (FRN) |
0011450996
|
||||
1 | Physical Address |
1259 Birchwood Drive
|
||||
1 |
Sunnyvale, California 94089
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
g******@ict.cetecom.de
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
SHE
|
||||
1 | Equipment Product Code |
WL007
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
J****** H****
|
||||
1 | Title |
Hardware Engineer
|
||||
1 | Telephone Number |
408-7******** Extension:
|
||||
1 | Fax Number |
408-7********
|
||||
1 |
j******@alliantnetworks.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Cellular Gateway | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Cetecom Inc.
|
||||
1 | Name |
L**** S******
|
||||
1 | Telephone Number |
408-5********
|
||||
1 | Fax Number |
510-2********
|
||||
1 |
l******@cetecomusa.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 36 | 2412.00000000 | 2462.00000000 | 0.6030000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC