all | frequencies |
|
|
|
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
various |
|
(AWK-3131A) UserMan | Users Manual | 4.56 MiB | ||||
various |
|
(TAP-213-XX-CT-T) UserMan 12-29 | Users Manual | 3.91 MiB | November 01 2017 | |||
various |
|
TAP-213 UM e1 | Users Manual | 3.76 MiB | February 05 2017 | |||
various |
|
Users Manual | Users Manual | 1.13 MiB | / January 08 2018 | |||
various |
|
WAPN008- UserMan 0816 | Users Manual | 4.31 MiB | ||||
various |
|
WAPN008- UserMan 20180911 | Users Manual | 2.34 MiB | ||||
various |
|
WAPN008- UserMan AWK-3131A-M12-RCC 20180820 | Users Manual | 3.58 MiB | ||||
various |
|
WAPN008- UserMan AWK-3131A-M12-RTG 20180820 | Users Manual | 3.55 MiB | ||||
various | Attestation Statements | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | Internal Photos | |||||||
various | RF Exposure Info | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | Cover Letter(s) | |||||||
various | Internal Photos | |||||||
various | Internal Photos | |||||||
various | Internal Photos | |||||||
various | RF Exposure Info | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | ID Label/Location Info | |||||||
various | Test Report | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | Cover Letter(s) | |||||||
various | Internal Photos | |||||||
various | ID Label/Location Info | |||||||
various | ID Label/Location Info | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | ID Label/Location Info | |||||||
various | Internal Photos | |||||||
various | Internal Photos | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | Cover Letter(s) | / January 08 2018 | ||||||
various | Cover Letter(s) | / January 08 2018 | ||||||
various | RF Exposure Info | / January 08 2018 | ||||||
various | Test Report | / January 08 2018 | ||||||
various | Test Report | / January 08 2018 | ||||||
various | Test Setup Photos | / January 08 2018 | ||||||
various | Test Setup Photos | / January 08 2018 | ||||||
various | External Photos | / January 08 2018 | ||||||
various | Test Report | / January 08 2018 | ||||||
various | Test Setup Photos | / January 08 2018 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | External Photos | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Internal Photos | August 09 2016 | ||||||
various | ID Label/Location Info | August 09 2016 | ||||||
various | ID Label/Location Info | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | RF Exposure Info | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Cover Letter(s) | August 09 2016 | ||||||
various | Cover Letter(s) | February 05 2017 | ||||||
various | Test Report | June 09 2016 | ||||||
various | Test Setup Photos | June 09 2016 | ||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | Cover Letter(s) | |||||||
various | Internal Photos | |||||||
various | ID Label/Location Info | |||||||
various | ID Label/Location Info | |||||||
various | Cover Letter(s) | |||||||
various | RF Exposure Info | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) |
various | (AWK-3131A) UserMan | Users Manual | 4.56 MiB |
AirWorks AWK-3131A Users Manual First Edition, June 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. AirWorks AWK-3131A Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice Copyright 2015 Moxa Inc. Reproduction without permission is prohibited. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free: 1-888-669-2872
+1-714-528-6777 Tel:
Fax:
+1-714-528-6778 Moxa Europe Tel:
Fax:
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99 800-820-5036
+86-21-5258-9955
+86-21-5258-5505 Moxa China (Shanghai office) Toll-free:
Tel:
Fax:
Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents First-time Installation and Configuration ................................................................................................ Communication Testing ....................................................................................................................... Function Map ..................................................................................................................................... 1. Introduction ...................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 1-2 Product Features ................................................................................................................................ Product Specifications ......................................................................................................................... 1-3 1-5 Functional Design ............................................................................................................................... LED Indicators ............................................................................................................................ 1-5 Beeper ....................................................................................................................................... 1-6 Reset Button ............................................................................................................................... 1-6 Relay (Digital Output) .................................................................................................................. 1-7 2. Getting Started.................................................................................................................................. 2-1 2-2 2-3 2-5 3. Web Console Configuration ............................................................................................................... 3-1 Web Browser Configuration .................................................................................................................. 3-2 Overview ........................................................................................................................................... 3-3 Basic Settings .................................................................................................................................... 3-4 System Info Settings ................................................................................................................... 3-4 Network Settings ......................................................................................................................... 3-5 Time Settings ............................................................................................................................. 3-6 Wireless Settings ................................................................................................................................ 3-7 Operation Mode .................................................................................................................................. 3-7 Basic Wireless Settings ........................................................................................................................ 3-8 WLAN Security Settings.............................................................................................................. 3-10 Advanced Wireless Settings ........................................................................................................ 3-16 WLAN Certification Settings (for EAP-TLS in Client/Slave mode only) ............................................... 3-19 Advanced Settings ............................................................................................................................ 3-20 Using Virtual LAN ...................................................................................................................... 3-20 Configuring Virtual LAN .............................................................................................................. 3-21 DHCP Server (for AP mode only) ................................................................................................. 3-22 Packet Filters ............................................................................................................................ 3-23 RSTP Settings (for Master or Slave mode only) ............................................................................. 3-26 SNMP Agent.............................................................................................................................. 3-28 Link Fault Pass-Through (for Client/Slave mode only) .................................................................... 3-30 Auto Warning Settings ....................................................................................................................... 3-30 System Log .............................................................................................................................. 3-30 Syslog ..................................................................................................................................... 3-31 E-mail ...................................................................................................................................... 3-32 Relay ....................................................................................................................................... 3-33 Trap ........................................................................................................................................ 3-34 Status ............................................................................................................................................. 3-35 Wireless Status ......................................................................................................................... 3-35 Associated Client List (for AP/Master mode only) ........................................................................... 3-35 DHCP Client List (for AP mode only)............................................................................................. 3-36 System Log .............................................................................................................................. 3-36 Relay Status ............................................................................................................................. 3-37 DI and Power Status .................................................................................................................. 3-37 RSTP Status ............................................................................................................................. 3-37 Maintenance .................................................................................................................................... 3-38 Console Settings ....................................................................................................................... 3-38 Ping ......................................................................................................................................... 3-38 Firmware Upgrade ..................................................................................................................... 3-39 Config Import Export ................................................................................................................. 3-39 Load Factory Default .................................................................................................................. 3-40 Password.................................................................................................................................. 3-40 Misc. Settings ........................................................................................................................... 3-40 Save Configuration ........................................................................................................................... 3-41 Restart ............................................................................................................................................ 3-42 Logout............................................................................................................................................. 3-42 4. Software Installation and Configuration ........................................................................................... 4-1 Overview ........................................................................................................................................... 4-2 AWK Search Utility .............................................................................................................................. 4-2 Installing AWK Search Utility ........................................................................................................ 4-2 Configuring AWK Search Utility ..................................................................................................... 4-4 5. Other Console Considerations ........................................................................................................... 5-1 RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 5-2 Configuration by Telnet and SSH Consoles ............................................................................................. 5-3 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-4 Disabling Telnet and Browser Access ..................................................................................................... 5-5 A. References ........................................................................................................................................ A-1 Beacon .............................................................................................................................................. A-2 DTIM ................................................................................................................................................. A-2 Fragment ........................................................................................................................................... A-2 RTS Threshold .................................................................................................................................... A-2 STP and RSTP .................................................................................................................................... A-2 The STP/RSTP Concept ................................................................................................................ A-2 Differences between RSTP and STP ................................................................................................ A-3 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery ............................................................................................................................. B-2 DoC (Declaration of Conformity) ........................................................................................................... B-3 Federal Communication Commission Interference Statement ............................................................ B-3 R&TTE Compliance Statement ....................................................................................................... B-4 1 Introduction The AWK-3131A industrial a/b/g/n high speed wireless Access Point products are ideal wireless solutions for hard-to-wire applications that use mobile equipment connected over a TCP/IP network. The AWK-3131A is rated to operate at temperatures ranging from 0 to 60C for standard models and -40 to 75C for wide temperature models, and is rugged enough for any harsh industrial environment. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LED Indicators Beeper Reset Button Relay (Digital Output) AirWorks AWK-3131A Overview Introduction The AWK-3131A is 802.11n compliant to deliver speed, range, and reliability to support even the most bandwidth-intensive applications. The 802.11n standard incorporates multiple technologies, including Spatial Multiplexing MIMO (Multi-In, Multi-Out), 20 and 40 MHz channels, and dual bands (2.4 GHz and 5 GHz) to generate lightning speeds, while still being able to communicate with legacy 802.11a/b/g devices. The AWK's operating temperature ranges from -25 to 60C for standard models and -40 to 75C for wide temperature models, and is rugged enough for all types of harsh industrial environments. Installation of the AWK is easy using DIN-Rail mounting or distribution boxes, and with its wide operating temperature range, IP30-rated housing with LED indicators, and DIN-Rail mounting it is a convenient yet reliable solution for all types of industrial wireless applications. Package Checklist NOTE Moxas AWK-3131A is shipped with the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. 1 AWK-3131A 2 dual-band omni-directional antennas (2dBi, RP-SMA, 2.4/5 GHz) Cable holder with one screw 2 plastic RJ45 protective caps Documentation and software CD Quick installation guide (printed) Warranty card The above items come with the standard AWK-3131A model, but the package contents may vary for customized versions. Product Features Advanced wireless security IEEE802.11a/b/g/n compliant 64-bit and 128-bit WEP/WPA/WPA2 SSID Hiding/IEEE 802.1X/RADIUS Packet access control & filtering STP/RSTP support for network system redundancy Long-distance transmission support Turbo Roaming enables rapid handover (Client mode) ABC-01 for configuration import/export RS-232 console management 2DI+1DO for on-site monitoring and warnings Wide -40 to 75C operating temperature range (-T model) Redundant 24 VDC power inputs or IEEE802.3af Power over Ethernet DIN-Rail or wall mounting IP30 protected high-strength metal housing 1-2 Introduction AirWorks AWK-3131A Product Specifications WLAN Interface Standards:
IEEE 802.11a/b/g/n for Wireless LAN IEEE 802.11i for Wireless Security IEEE 802.3 for 10BaseT IEEE 802.3u for 100BaseTX IEEE 802.3ab for 1000BaseT IEEE 802.3af for Power-over-Ethernet IEEE 802.1D for Spanning Tree Protocol IEEE 802.1w for Rapid STP IEEE 802.1Q VLAN Spread Spectrum and Modulation (typical):
DSSS with DBPSK, DQPSK, CCK OFDM with BPSK, QPSK, 16QAM, 64QAM 802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 11 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps 802.11n: 64QAM @ 300 Mbps to BPSK @ 6.5 Mbps (multiple rates supported) Operating Channels (central frequency):
US:
2.412 to 2.462 GHz (11 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels)*
5.500 to 5.700 GHz (8 channels - excludes 5.600 to 5.640 GHz)* 5.745 to 5.825 GHz (5 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels)*
5.500 to 5.700 GHz (11 channels)*
JP:
2.412 to 2.484 GHz (14 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels)*
5.500 to 5.700 GHz (11 channels)*
*Note: DFS (Dynamic Frequency Selection) channels. Security:
SSID broadcast enable/disable Firewall for MAC/IP/Protocol/Port-based filtering 64-bit and 128-bit WEP encryption, WPA /WPA2-Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Transmission Rates:
802.11b: 1, 2, 5.5, 11 Mbps 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps 802.11n: 6 to 300 Mbps (multiple rates supported) 1-3 AirWorks AWK-3131A Introduction TX Transmit Power:
802.11b (2.4GHz):
Typ. 231.5 dBm @ 1 Mbps, Typ. 201.5 dBm @ 5 Mbps, Typ. 191.5 dBm @ 11 Mbps 802.11g (2.4GHz):
Typ. 201.5 dBm @ 6 to 24 Mbps, Typ. 191.5 dBm @ 36 Mbps, Typ. 181.5 dBm @ 48 Mbps, Typ. 171.5 dBm @ 54 Mbps 802.11n (2.4GHz):
Typ. 201.5 dBm @ MCS0/8 20 MHz, Typ. 161.5 dBm @ MCS7/15 20 MHz Typ. 201.5 dBm @ MCS0/8 40 MHz, Typ. 161.5 dBm @ MCS7/15 40 MHz 802.11a (5GHz):
Typ. 201.5 dBm @ 6 to 24 Mbps, Typ. 191.5 dBm @ 36 Mbps, Typ. 161.5 dBm @ 48 Mbps, Typ. 151.5 dBm @ 54 Mbps 802.11n (5GHz):
Typ. 191.5 dBm @ MCS0/8 20 MHz, Typ. 141.5 dBm @ MCS7/15 20 MHz Typ. 181.5 dBm @ MCS0/8 40 MHz, Typ. 141.5 dBm @ MCS7/15 40 MHz RX Sensitivity:
802.11b (2.4GHz):
-92 dBm @ 1 Mbps, -90 dBm @ 2 Mbps, -88 dBm @ 5.5 Mbps, -84 dBm @ 11 Mbps 802.11g (2.4GHz):
-87 dBm @ 6 Mbps, -86 dBm @ 9 Mbps, -85 dBm @ 12 Mbps, -82 dBm @ 18 Mbps, -80 dBm @ 24 Mbps, -
76 dBm @ 36 Mbps, -74 dBm @ 48 Mbps, -72 dBm @ 54 Mbps 802.11n (2.4GHz):
-71 dBm @ MCS7 20MHz, -69 dBm @ MCS15 20MHz
-70 dBm @ MCS7 40MHz, -68 dBm @ MCS15 40MHz 802.11a (5GHz):
-87 dBm @ 6 Mbps, -86 dBm @ 9 Mbps, -85 dBm @ 12 Mbps, -82 dBm @ 18 Mbps, -80 dBm @ 24 Mbps, -
76 dBm @ 36 Mbps, -74 dBm @ 48 Mbps, -72 dBm @ 54 Mbps 802.11n (5GHz):
-71 dBm @ MCS7 20MHz, -69 dBm @ MCS15 20MHz
-70 dBm @ MCS7 40MHz, -68 dBm @ MCS15 40MHz Protocol Support General Protocols: Proxy ARP, DNS, HTTP, HTTPS, IP, ICMP, SNTP, TCP, UDP, RADIUS, SNMP, PPPoE, DHCP, LLDP AP-only Protocols: ARP, BOOTP, DHCP, STP/RSTP (IEEE 802.1D/w) Interface Default Antennas: 2 dual-band omni-directional antennas, 2 dBi, RP-SMA (male) Connector for External Antennas: RP-SMA (female) LAN Ports: 1, 10/100/1000BaseT(X), auto negotiation speed (RJ45-type) Console Port: RS-232 (RJ45-type) LED Indicators: PWR1, PWR2, PoE, FAULT, STATE, signal strength, WLAN, LAN Alarm Contact (Digital Output): 1 relay output with current carrying capacity of 1 A @ 24 VDC Digital Inputs: 2 electrically isolated inputs
+13 to +30 V for state 1
+3 to -30 V for state 0 Max. input current: 8 mA Physical Characteristics Housing: Metal, IP30 protection Weight: 970 g Dimensions: 53.6 x 135 x 105 mm (2.11 x 5.31 x 4.13 in) Installation: DIN-Rail mounting (standard), wall mounting (optional) Environmental Limits Operating Temperature:
Standard Models: 0 to 60C (32 to 140F) Wide Temp. Models: -40 to 75C (-40 to 167F) 1-4 AirWorks AWK-3131A Introduction Storage Temperature: -40 to 85C (-40 to 185F) Ambient Relative Humidity: 5% to 95% (non-condensing) Power Requirements Input Voltage: 12 to 48 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) Connector: 10-pin removable terminal block Power Consumption: 12 to 48 VDC, 700 mA (max.) Reverse Polarity Protection: Present Standards and Certifications Safety: UL 60950-1, EN 60950-1 Hazardous Location: UL/cUL Class I Division 2, ATEX Zone 2 EMC: EN 301 489-1/17, FCC Part 15 Subpart B Class B, EN 55022/55024 Radio: EN 300 328, EN 301 893, TELEC Note: Please check Moxas website for the most up-to-date certification status. Warranty Warranty Period: 5 years Details: See www.moxa.com/warranty ATTENTION For EXPLOSION-PROOF application, model AWK-3131A are designed and certified to meet ATEX shall be mounted in a suitable enclosure rate to at least IP54 and Pollution Degree 2 as defined in EN60529 and used within its rated electrical and environmental ratings. ATTENTION The AWK-3131A is NOT a portable mobile device and should be located at least 20 cm away from the human body. The AWK-3131A is NOT designed for the general public. A well-trained technician should be enlisted to ensure safe deployment of AWK-3131A units, and to establish a wireless network. Functional Design LED Indicators The LEDs on the front panel of the AWK-3131A provide a quick and easy means of determining the current operational status and wireless settings. The FAULT LED indicates system failures and user-configured events. If the AWK-3131A cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one second intervals. The SIGNAL LEDs indicate signal strength, and only operate in Client mode. The following table summarizes how to read the devices wireless settings from the LED displays. More information is available in Chapter 3 in the Basic Wireless Settings section. 1-5 State Introduction Description Error condition does not exist. IP address conflict (interval: 0.5 sec) Front Panel LED Indicators (System) On Off On Power is being supplied from power input 1. Power is not being supplied frompower input 1. Power is being supplied from power input 2. Power is not being supplied from Off power input 2. On Power is being supplied via PoE. Off Power is not being supplied via PoE. Blink Cannot get an IP address from the
(slow) DHCP server (interval: 1 sec) Blink
(fast) Off Green Software Ready Green The AWK has been located by AWK Blink Search Utility. (interval: 1sec) Red Booting error condition On Off On WLAN function is in Client/Slave mode and AWK has established a link Blink WLAN data communication is run in Client/Slave mode Off WLAN is not in Client Mode or AWK has not established a link with an On WLAN functions in AP/Master mode. Blink WLANs data communication is run in AP/Master mode Off WLAN is not in use or not working properly On Blink Data is being transmitted at 1000 Mbps Off On Blink Data is being transmitted at 10/100 Mbps Off LAN ports 1000 Mbps link is inactive LAN ports 10/100 Mbps link is active. Signal level(for Client/Slave mode only) LAN ports 10/100 Mbps link is inactive LAN ports 1000 Mbps link is active. with an AP. AP. PoE Red LED PWR2 PWR1 Color Green Green FAULT STATE Amber AirWorks AWK-3131A Green/
Red SIGNAL
(5 LEDs) ATTENTION Amber Amber WLAN Green Green Green LAN Beeper When the system fails to boot, the LEDs for STATE (Green), FAULT, and WLAN will all light up simultaneously and blink at one-second intervals. This may be due to improper operation or uncontrollable issues, such as an unexpected shutdown while updating the firmware. To recover the firmware, refer to the Firmware Recovery section in Chapter 6. The beeper emits two short beeps when the system is ready. Reset Button The RESET button is located on the top panel of the AWK-3131A. You can reboot the AWK-3131A or reset it to factory default settings by pressing the RESET button with a pointed object such as an unfolded paper clip. System reboot: Hold the RESET button down for under 5 seconds and then release. 1-6 AirWorks AWK-3131A Introduction Reset to factory default: Hold the RESET button down for over 5 seconds until the STATE LED starts blinking green. Release the button to reset the AWK-3131A. Relay (Digital Output) The AWK-3131A has one relay output consisting of the 2 terminal block contacts on the top panel, as shown below. These relay contacts are used to forward system failures and user-configured events. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the AWK-3131A is not powered up. Summary of the AWK-3131As Relay Status Power Status Event Off On Yes No Relay Open Open Short 1-7 2 Getting Started This chapter explains how to install Moxas AirWorks AWK-3131A for the first time, and quickly set up your wireless network and test whether the connection is running well. The Function Map discussed in the third section provides a convenient means of determining which functions you need to use. The following topics are covered in this chapter:
First-time Installation and Configuration Communication Testing Function Map A AWK-3131A AirWorks A First-
Getti ng Started
-time Insta llatio n and Conf igurat tion efore installing Be ne eed access to ddress that mu ad g the AWK-31 a notebook co ust be used w 131A, make su omputer or PC when connectin ure that all ite C equipped wi ng to the devi ems in the Pa th an Etherne ce for the firs ackage Checkl et port. The AW st time. list are in the WK-3131A ha box. You will l as a default IP P Step 1: Sel The AWK-31 will use whic Step 2: Con Since the AW crossover ca port will ligh Step 3: Set Choose an I is 192.168. computer to ect the powe 131A can be chever power nnect the AW WK-3131A su able to conne ht up when a c t up the com P address on
.127.253, an o 192.168.12 er source. powered by a source you ch WK-3131A to pports MDI/M ct the AWK-3 connection is puters IP ad the same sub d the subnet 27.xxx. a DC power in hoose. o a notebook MDI-X auto-se 3131A to a co established. ddress. bnet as the AW mask is 255.2 nput or PoE (
(Power over E Ethernet). The e AWK-3131A A k or PC. nsing, you ca omputer. The n use either a LED indicator a straight-thro r on the AWK ough cable or r
-3131As LAN N WK-3131A. Sin 255.255.0, y nce the AWK-
you should set 3131As defau t the IP addre ult IP address s ss of the Aft ter you select Maintenanc ce Load Fa ctory Defaul lt and click th e Submit but K-3131A will be e reset to facto ory default se ettings and the e IP address w will be reset to o 192.168.12 tton, the AWK 27.253. Step 4: Use Open your c the homepa the user nam default user e the web-ba computers we ge of the web me and passw name and pa ased manage eb browser an b-based Netwo word as shown assword and t er to configu d type http:/
ork Manager. n in the follow hen click on t ure the AWK-
//192.168.1 Before the ho ing figure. Fo he Login butt
-3131A 27.253 in the omepage open r first-time co ton:
e address field ns, you will ne onfiguration, e d to access eed to enter enter the d: User lt user name a Nam Pass Fo or security rea aintenance Ma and password me: admin sword: root asons, we stro Password ongly recomme d, and then fo end changing ollow the on-s the default p creen instruct assword. To d tions to chang do so, select ge the passwo ord. 2-2 NOTE NOTE Defau A AWK-3131A AirWorks A NOTE Aft ter you click S Submit to app ply changes th he web page w will refresh (U a b blinking remin nder will be sh hown on the u upper-right co orner of the we Updated) will eb page:
Getti ng Started appear on th he page and To o activate the changes click k Restart and then Save a nd Restart a ge the setting gs. About 30 0 seconds are needed for th he AWK-3131A A to complete e the reboot p fter you chan rocedure. Step 5: Sel By default, t Settings operation ca ect the AWK the AWK-3131 Basic Wirele an be found in K-3131A ope 1As operation ess Settings n Chapter 3. ration mode n mode is set
. Detailed info
. to AP. You ca ormation abou n change to C ut configuring Client mode in the AWK-313 n Wireless 31As Step 6: Tes In the follow connection h st communic wing sections w has been esta cations. we describe tw blished. wo test metho ods that can b be used to ens sure that a ne etwork Comm munic cation Testi ng Aft ter installing th he AWK-3131A A you can run a a sample test t to make sure t he AWK-3131A A and wireless connection are e functioning n normally. Two t testing method ds are describe ed below. Use t the first metho sing only one AW WK-3131A devi ice, and use th he second meth hod if you are using two or m more AWK-313 od if you are us 1A units. How w to Test One AWK K-3131A you are only If ca rd. Configure ch hange the IP a no otebook (Note using one AW e the WLAN c address of th book A), whic WK-3131A, yo card to conne e second not ch is connecte ou will need a ect to the AW ebook (Noteb ed to the AWK Af wi fter configurin ndow on Note ng the WLAN ebook B. At th pi ng <IP addre ess of noteboo card, establi sh a wireless pe he prompt, typ ok A>
a second note WK-3131A (N book B) so th K-3131A. s connection ebook compu OTE: the def at it is on the ter equipped fault SSID is e same subne with a WLAN N MOXA), and d et as the first t with the AWK K-3131A and open a DOS S an nd then pres ommunication co ca se, recheck th ss Enter (se was successf he configurati ee the figure ful. A Reque on to make su e below). A est timed out. ure the conne Reply from response m ections are cor IP address means the com rrect. response mmunication f e means the e failed. In this s 2-3 AirWorks AWK-3131A How to Test Two or More AWK-3131A Units Getting Started If you have two or more AWK-3131A units, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the first AWK-3131A connected to notebook A and change the second or third AWK-3131A connected to notebook B to Client mode, and then configure the notebooks and AWK-3131A units properly. After setting up the testing environment, open a DOS window on notebook B. At the prompt, type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 2-4 AirWorks AWK-3131A Function Map Getting Started Quick overview of the AWK-3131As status Basic settings for administering the AWK-3131A Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional. Application-oriented device management functions to set up events, traps, and reactions via relay warning, e-mail, and SNMP notification Note: These functions are all optional. Current status information for monitoring wired/wireless network performance, advanced services, and device management functions. Functions for maintaining the AWK-3131A, and for diagnosing the network. On-demand functions to support the web-
based console management operation. 2-5 3 Web Console Configuration In this chapter, we explain all aspects of web-based console configuration. Moxas easy-to-use management functions help you set up your AWK-3131A and make it easy to establish and maintain your wireless network. The following topics are covered in this chapter:
Web Browser Configuration Overview Basic Settings Wireless Settings Operation Mode Basic Wireless Settings WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (for EAP-TLS in Client/Slave mode only) Console Settings Ping Firmware Upgrade Config Import Export Load Factory Default Password Misc. Settings System Info Settings Network Settings Time Settings Save Configuration Restart Logout Maintenance Advanced Settings Using Virtual LAN Configuring Virtual LAN DHCP Server (for AP mode only) Packet Filters RSTP Settings (for AP mode only) SNMP Agent Auto Warning Settings System Log Syslog E-mail Relay Trap Status Wireless Status Associated Client List (for AP/Master mode only) DHCP Client List (for AP mode only) System Log Relay Status DI and Power Status RSTP Status AirWorks AWK-3131A Web Browser Configuration Web Console Configuration Moxa AWK-3131As web browser interface provides a convenient way to modify its configuration and access the built-in monitoring and network administration functions. The recommended web browser is Microsoft Internet Explorer 7.0 or 8.0 with JVM (Java Virtual Machine) installed. To use the AWK-3131As management and monitoring functions from a PC host connected to the same LAN as the AWK-3131A, you must make sure that the PC host and the AWK-3131A are on the same logical subnet. Similarly, if the AWK-3131A is configured for other VLAN settings, you must make sure your PC host is on the management VLAN. The Moxa AWK-3131As default IP is 192.168.127.253. Follow these steps to access the AWK-3131As web-based console management interface. 1. Open your web browser (e.g., Internet Explorer) and type the AWK-3131As IP address in the address field. Press Enter to establish the connection. 2. The Web Console Login page will open. Enter the password (default Username = admin; default Password = root) and then click Login to continue. 3. You may need to wait a few moments for the web page to download to your computer. Note that the Model name and IP address of your AWK-3131A are both shown in the title bar of the web page. This information can be used to help you identify multiple AWK-3131A units. 4. Use the menu tree on the left side of the window to open the function pages to access each of the AWK-3131As functions. 3-2 NOTE A AWK-3131A AirWorks A Web C Console Con nfiguration In is the following available in th paragraphs, his manual in we describe e the Function each AWK-313 n Map section 31A managem ment function 2. n of Chapter 2 in detail. A qu uick overview e model name Th co ountry code in an n example in reen may be sc e of the AWK-
ndicates the A the following different than
-3131A is sho AWK-3131A ve figures. (The the one show own as AWK-3 ersion and wh e country code wn here.) 3131A-XX, wh hich bandwidth e and model ere XX indicat h it uses. We name that ap tes the countr use AWK-31 ppears on you ry code. The 131A-US as ur computer Overv view Th he Overview page summar rizes the AWK K-3131As curr he information n is categorize ed into se everal groups:
System info o, Device info o, and 802.1 rent status. Th 1 info. Cli ick on SSID f for more detai iled 802.11 in formation, as shown in the e following figu ure. Th e 802.11 inf fo that is displ layed may be different for d different oper ration modes. Current BS SSID is not a vailable in Cli ent mode, an d Signal stre ength is not a available in AP For example, P mode. 3-3 NOTE NOTE Web Console Configuration AirWorks AWK-3131A Basic Settings System Info Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the AWK-3131A. The System Info items, especially Device name and Device description, are displayed and included on the Overview page, in SNMP information, and in alarm emails. Setting System Info items makes it easier to identify the different AWK-3131A units connected to your network. Device name Setting Max. 31 of characters This option is useful for specifying the role or application of Description Device location Setting Max. of 31 characters Specifies the location of different AWK-3131A units. different AWK-3131A units. Description Device description Setting Max. of 31 characters Use this space to record a more detailed description of the Description AWK-3131A Device contact information Setting Max. of 31 characters Provides information about whom to contact in order to resolve None Description problems. Use this space to record contact information of the person responsible for maintaining this AWK-3131A. Factory Default AWK-3131A_<Serial No. of this AWK-3131A>
Factory Default None Factory Default None Factory Default 3-4 AirWorks AWK-3131A Network Settings Web Console Configuration The Network Settings configuration panel allows you to modify the usual TCP/IP network parameters. An explanation of each configuration item is given below. IP configuration Setting DHCP Factory Default Static IP address Setting AWK-3131As IP address Subnet mask Setting AWK-3131As subnet mask Description The AWK-3131As IP address will be assigned automatically by Static the networks DHCP server Set up the AWK-3131As IP address manually. Description Identifies the AWK-3131A on a TCP/IP network. Description Identifies the type of network to which the AWK-3131A is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Description The IP address of the router that connects the LAN to an outside None network. Gateway Setting AWK-3131As default gateway Primary/ Secondary DNS server Setting Description The IP address of the DNS Server used by your network. After None IP address of the entering the DNS Servers IP address, you can input the Primary/Secondary DNS server AWK-3131As URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default 192.168.127.253 Factory Default 255.255.255.0 Factory Default Factory Default 3-5 AirWorks AWK-3131A Time Settings Web Console Configuration NOTE The AWK-3131A has a time calibration function based on information from an NTP server or user specified Date and Time information. Functions such as Auto warning can add real-time information to the message. The Current local time shows the AWK-3131As system time when you open this web page. You can click on the Set Time button to activate the updated date and time parameters. An (Updated) string will appear to indicate that the change is complete. Local time settings will be immediately activated in the system without running Save and Restart. The AWK-3131A has a built-in real time clock (RTC). We strongly recommend that users update the Local time for the AWK-3131A after the initial setup or a long-term shutdown, especially when the network does not have an Internet connection for accessing the NTP server or there is no NTP server on the LAN. Current local time Setting User adjustable time Factory Default Description The date and time parameters allow configuration of the local None time, with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss Description Factory Default The time zone setting allows conversion from GMT (Greenwich GMT (Greenwich Mean Time) to local time. Mean Time) Time zone Setting User selectable time zone ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Enable/ Disable Description Daylight saving time (also know as DST or summer time) involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. When Daylight saving time is enabled, the following parameters will be shown:
Starts at: The date that daylight saving time begins. Stops at: The date that daylight saving time ends. Time offset: Indicates how many hours forward the clock should be advanced. Factory Default Disable 3-6 AirWorks AWK-3131A Web Console Configuration Factory Default Description IP or Domain name of the NTP time server. The 2nd NTP server time.nist.gov will be used if the 1st NTP server fails to connect. Description This parameter determines how often the time is updated from 600 (seconds) the NTP server. Factory Default Time server 1/2 Setting IP/Name of Time Server 1/2 Query period Setting Query period time
(1 to 9999 seconds) Wireless Settings The essential settings for wireless networks are presented in this function group. Settings must be properly set before establishing your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP: In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Client: When the AWK-3131A is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adaptor. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. Operation Mode The AWK-3131A supports four main operation modesAP, Client, Master, and Slaveeach of which plays a distinct role on the wireless network. Wireless Enable Setting Enable/Disable Operation Mode Setting AP Client Master Slave Factory Default Description The RF (Radio Frequency) module can be manually turned on or Enable off. This function is available in AP operation mode only. Description The AWK-3131A plays the role of wireless Access Point The AWK-3131A plays the role of wireless Client This mode collocates with AWK-5232/6232s Wireless bridge mode. The AWK-3131A plays the role of wireless Master. This mode collocates with AWK-5232/6232s Wireless bridge mode. The AWK-3131A plays the role of wireless Slave. Factory Default AP 3-7 AirWorks AWK-3131A Basic Wireless Settings Web Console Configuration The WLAN Basic Setting Selection panel is used to add and edit SSIDs. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. You can configure your AWK to use up to 9 SSIDs, and configure each SSID differently. All of the SSIDs are active at the same time; that is, client devices can use any of the SSIDs to associate with the access point. Click on Add SSID to create more SSIDs. Click on Edit to assign different configuration settings to each SSID. The configuration panel appears as follows:
3-8 AirWorks A NOTE Wh pa fig W A AWK-3131A Web C Console Con nfiguration hen you switc anel. Click the gure. You can ireless Setting ch to Client e Site Surve click on the S gs page. Click mode, a Site y button to SSID of an ent k the Refresh e Survey but view informa tity and bring button to re-
tton will be a ation about av the value of scan and upd available on th he Basic Wire vailable APs, as shown in its SSID onto the SSID fiel ate the table. eless Settings s the following g d of the Basic c NOTE If t re ar the Gateway minding you t e only plannin y field in Basic to set the defa ng a local netw c Settings ault gateway w work and pack Network Se when Client m kets will not b ettings is emp mode is enabl be sent outside pty, a warning g message wil led. You can i gnore this me k. e the network l appear, essage if you F type RF etting Se 4 GHz 2. B G
/G Mixed B/
/N Mixed G/
/G/N Mixed B/
z) Only (2.4GHz N GHz 5 A
/N Mixed A/
Only (5GHz) N ry Default Mixed scription Des Only Only Supp at a Supp at a Sup oper Only Only Supp at a Only y supports the y supports the ports IEEE 80 slower speed ports IEEE 80 slower speed ports IEEE 80 rate at a slowe y supports the e IEEE 802.11 e IEEE 802.11 2.11b/g stand d if when 802. 2.11g/n stand d if 802.11g cl 02.11b/g/n sta er speed if 802 e 2.4 GHz IEE b standard g standard dards, but 802 11b clients ar dards, but 802 ients are on t andards, but 8 2.11b clients a E 802.11n sta y supports the ports IEEE 80 slower speed y supports the e IEEE 802.11 2.11a/n stand d if 802.11a cl e 5 Ghz IEEE 8 a standard dards, but 802 ients are on t 802.11n stand Factor B/G/N erate 2.11g may ope work re on the netw erate 2.11n may ope the network ay 802.11g/n ma twork are on the net andard erate 2.11n may ope the network dard 3-9 AirWorks AWK-3131A Web Console Configuration Description Factory Default 6 (in B/G/N Mixed mode) Channel (for AP mode only) Setting Available channels vary The AWK-3131A plays the role of wireless AP. with RF type Channel Width (for any 11N RF type only) Setting 20 MHz 20/40 MHz Channel bonding If 20/40 MHz only is the Channel Width setting, this channel bonding will auto set the channel based on your channel setting. SSID Setting Max. of 31 characters The SSID of a client and the SSID of the AP must be identical for MOXA Description Select your channel width, If you are not sure which option to 20 MHz use, select 20/ 40MHz (Auto) Factory Default Factory Default Description SSID broadcast (for AP mode only) Setting Enable/ Disable the client and AP to be able to communicate with each other. Factory Default Enable Description SSID can be broadcast or not NOTE The AWK-3131A-JP (for Japanese frequency bands) only connects SSID-hidden APs for IEEE 802.11a channels, and IEEE 802.11g/n channels 1 to 11. The AWK-3131A-EU (for European frequency bands) only connects SSID-hidden APs for IEEE 802.11b/g/n channels. WLAN Security Settings The AWK-3131A provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the AWK-
3131A by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE802.1X. The AWK-3131A can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. Security mode Setting Open WEP WPA*
WPA2*
Description No authentication Static WEP is used WPA is used Fully supports IEEE802.11i with TKIP/AES + 802.1X Factory Default Open 3-10 AirWorks AWK-3131A Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP (only for legacy mode) Web Console Configuration NOTE Moxa includes WEP security mode only for legacy purposes. WEP is highly insecure and is considered fully deprecated by the Wi-Fi alliance. We do not recommend the use of WEP security under any circumstances. According to the IEEE802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared (or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The AWK-3131A provides 4 entities of WEP key settings that can be selected to use with Key index. The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-
bit (or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Setting Open Shared Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 Description Data encryption is enabled, but without authentication Data encryption and authentication are both enabled. Description Specifies WEP keys in hex-decimal number form Specifies WEP keys in ASCII form Description Uses 40-bit secret keys with 24-bit initialization vector Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used 3-11 Factory Default Open Factory Default HEX Factory Default 64 bits Factory Default Open AirWorks AWK-3131A Web Console Configuration Factory Default WEP key 1-4 Setting Description A string that can be used as a WEP seed for the RC4 encryption None ASCII type:
engine. 64 bits: 5 chars 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The AWK-3131A also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also know as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default AES
** This option is only available with 802.11a/b/g standard
* This option is available for legacy mode in AP/Master only, and does not support AES-enabled clients. Passphrase Setting 8 to 63 characters Description Master key to generate keys for encryption and decryption Key renewal (for AP/Master mode only) Setting 60 to 86400 seconds
(1 minute to 1 day) Description Specifies the time period of group key renewal Factory Default None Factory Default 3600 (seconds) 3-12 AirWorks AWK-3131A NOTE Web Console Configuration The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. WPA/WPA2-Enterprise (for AP/Master mode) By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or passphrases. WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default AES
** This option is only available with 802.11a/b/g standard
* This option is available for legacy mode in AP/Master only, and does not support AES-enabled clients. Primary/Secondary RADIUS server IP Setting The IP address of RADIUS server Description Specifies the delegated RADIUS server for EAP Primary/Secondary RADIUS port Setting Port number Description Specifies the port number of the delegated RADIUS server Primary/ Secondary RADIUS shared key Setting Max. of 31 characters The secret key shared between AP and RADIUS server Description 3-13 Factory Default None Factory Default 1812 Factory Default None AirWorks AWK-3131A Web Console Configuration Description Specifies the time period of group key renewal Key renewal Setting 60 to 86400 seconds
(1 minute to 1 year) WPA/WPA2-Enterprise (for Client/Slave mode) When used as a client, the AWK-3131A can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Factory Default 3600 (seconds) Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Encryption method Setting TKIP**
AES
**This option is only available with 802.11a/b/g standard. EAP Protocol Setting TLS TTLS PEAP Description Specifies Transport Layer Security protocol Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Factory Default TKIP Factory Default TLS Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections. EAP-TLS TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use Basic Wireless Settings WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired 3-14 AirWorks AWK-3131A Web Console Configuration EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel (EAP-TLS for example), and validate whether the network is trustworthy with digital certificates on the authentication server. This step establishes a tunnel that protects the next step (or inner authentication), and consequently is sometimes referred to as outer authentication. The TLS tunnel is then used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The AWK-3131A provides some non-cryptographic EAP methods, including PAP, CHAP, MS-CHAP, and MS-
CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS and PEAP. Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, with the true user name only shown through the encrypted channel. Keep in mind that not all client software supports anonymous alteration. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. TTL Inner Authentication Setting PAP CHAP MS-CHAP MS-CHAP-V2 Anonymous Setting Max. of 31 characters A distinct name used for outer authentication User name & Password Setting Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used Microsoft CHAP version 2 is used Description Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None 3-15 AirWorks AWK-3131A Web Console Configuration PEAP There are a few differences in the TTLS and PEAP inner authentication procedures. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The AWK-3131A provides MS-CHAP-V2 merely as an EAP method for inner authentication. Inner EAP protocol Setting MS-CHAP-V2 Anonymous Setting Max. of 31 characters A distinct name used for outer authentication User name & Password Setting Description Microsoft CHAP version 2 is used Description Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate Setting Auto Available rates Description The AWK-3131A senses and adjusts the data rate automatically Auto Users can manually select a target transmission data rate but does't support when RF type are G/N mixed, B/G/N mixed and A/N mixed. Factory Default 3-16 AirWorks AWK-3131A Web Console Configuration NOTE Multicast Rate Setting Available rates Guarding Interval Setting Guarding Interval Transmission Power Setting Available power Factory Default Description 6M You can set a fixed multicast rate for the transmission of broadcast and multicast packets on a per-radio basis. This parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, providing the wireless clients are capable of handling the configured rate Factory Default Description Guarding interval is used to ensure that distinct transmissions 800ns. do not interfere with one another. You can select the guarding interval manually for Wireless-N connections. The two options are Short (400ns) and Long (800ns). Factory Default Description Indicates the frequency interval of the beacon Description Users can manually select a target power to mask max output 10 power. Because different transmission rate would have it own max output power, please reference product datasheet. For 802.11bg, the available setting is from 0 to 20 Factory Default 100 (ms) Factory Default 1 Factory Default Description Indicates how often the AWK-3131A sends out a Delivery Traffic Indication Message Description Specifies the maximum size a data packet before splitting and 2346 creating another new packet Description Determines how large a packet can be before the Access Point 2346 coordinates transmission and reception to ensure efficient communication Factory Default Beacon Interval (for AP/Master mode only) Setting Beacon Interval
(40 to 1000 ms) DTIM Interval (for AP/Master mode only) Setting Data Beacon Rate
(1 to 15) Fragmentation threshold Setting Fragment Length
(256 to 2346) RTS threshold Setting RTS/CTS Threshold
(256 to 2346) You can refer to the related glossaries in Chapter 5 for detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. Transmission distance (for 802.11a/n only) Setting Distance or max. range Specifies the transmission distance or max. range between two 500 for transmission
(500 to 2500 m) AWK devices. This parameter should be set properly, especially for long-distance communication. Factory Default Description 3-17 AirWorks AWK-3131A Web Console Configuration NOTE Description Adjusts the interference coping capability of the wireless signal. Disable This option should be enabled for communication distance under 500 meters, and should be disabled for communication distances over 500 meters. Noise protection Setting Enable/Disable Make sure the same Transmission distance parameters are set in both AP and Client. When this parameter is greater than 500, an optimal algorithm will be enabled to support long-distance transmission. Factory Default Note that Transmission enhancement only supports 802.11a/n mode; 802.11b/g/n mode is not supported. Transmission enhancement is also recommended to enable communication at both ends when long-
distance transmission is required. A high-gain antenna installed at a fixed antenna connector can also improve performance. WMM Setting Enable/Disable Description WMM is a QoS standard for WLAN traffic. Voice and video data Enable will be given priority bandwidth when enabled with WMM supported wireless clients. Note: WMM will always be enabled under 802.11n mode. Factory Default Full 11a channel support Setting Enable/Disable Description Full 11a channel support allows users to select one channel Disable from 802.11a, including channels in licensed and unlicensed bands. Turbo Roaming (for Client mode only) Setting Enable/ Disable Description Moxas Turbo Roaming can enable rapid handover when the AWK-3131A, as a client, roams among a group of APs. When Turbo Roaming is enabled, the RF type, AP alive check, and Scan channels will be shown as follows. RF type shows the current RF type that this client is using. AP alive check will check if the AP connection is still available. When this function is enabled, a check will be done every 10 ms. You can set up Scan channels for the APs among which this client is going to roam. There are three Scan channels available. Note that the Scan channels may need to be modified when the RF type is changed. (For example, channel 36 is not available in B, G, N or B/G/N Mix mode.) 3-18 Factory Default Factory Default Disable Certific cation S Settings s (for E EAP-TLS S in Clie ent/Sla ve Web C Console Con nfiguration A AWK-3131A AirWorks A WLAN mode o only) hen EAP-TLS W nterprise. The En Sy yntax Standar ccompanying p ac is used, a e AWK-3131A rd, certificate public key cer WLAN Certific can support e formats tha rtificates, prot cate will be the PKCS #
t define file ected with a p required at t
#12, also kno formats comm password-bas the client en own as Perso monly used t ed symmetric d to support onal Informat to store priva c key. t WPA/WPA2-
-
tion Exchange e ate keys with h NOTE Cu urrent Status s displays info ormation for t he current WL e, which has b been imported d into the LAN certificate t available. AW WK-3131A. No othing will be shown if a ce Ce ertificate issu ued to: Show ws the certifica Ce ertificate issu ued by: Show ws the certific rtificate is not ate user ate issuer Ce ertificate exp piration date e: Indicates w when the certif ficate has exp ired Yo ou can import a new WLAN certificate in I Import WLA AN Certificate e by following these steps, in order:
key) in the Ce ertificate pri ivate passwo ord field and t then click 1. 2. 3. Input the co Submit to s The passwo in Select ce Click Upload information password co orresponding p set the passwo rd will be disp ertificate/ke d Certificate uploaded in C orrectly and th password (or ord. played in the y file and sel e File to impo Current Certi hen import the Certificate pr ect the certific rt the certifica ificate. If it fa e certificate fi rivate passwo cate file. ate file. If the ails, you may le again. rd field. Click k on the Brow wse button e import succe need to retur eeds, you can rn to step 1 to see the o set the e WLAN certif Th een on the Cur se ficate will rem rrent Certific main after the cate. AWK-3131A r reboots. Even though it is e expired, it can still be 3-19 AirWorks AWK-3131A Advanced Settings Web Console Configuration Several advanced functions are available to increase the functionality of your AWK-3131A and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer 2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the AWK-3131A can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your AWK series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Secure network restricts members to resources on their own VLAN Clients roam without compromising security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless Improve network performance and reduce latency Increase security users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. 3-20 AirWorks AWK-3131A Web Console Configuration Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. Configuring Virtual LAN VLAN Settings To configure the AWKs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Port Type LAN WLAN Factory Default 1 Trunk Port Yes Description Set the management VLAN of this AWK. Description This port is the LAN port on the AWK. This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Factory Default Description Port PVID Setting VLAN ID ranging from 1 Set the ports VLAN ID for devices that connect to the port. The 1 to 4094 Factory Default VLAN Tagged Setting A comma-seperated list Specify which VLANs can communicate with this specific VLAN. (Empty) of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. port can be a LAN port or WLAN ports. Description 3-21 Web Console Configuration AirWorks AWK-3131A NOTE The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. DHCP Server (for AP mode only) DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The AWK-3131A can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The AWK-3131A provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server Setting Enable Disable Default gateway Setting IP address of a default The IP address of the router that connects to an outside gateway Description Enables AWK-3131A as a DHCP server Disable DHCP server function Description network Factory Default Disable Factory Default None 3-22 AirWorks AWK-3131A Web Console Configuration Factory Default None Factory Default Description Identifies the type of sub-network (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network) Subnet mask Setting subnet mask Primary/ Secondary DNS server Setting Description IP address of Primary/ The IP address of the DNS Server used by your network. After None Secondary DNS server entering the DNS Servers IP address, you can use URL as well. Start IP address Setting Factory Default IP address Maximum number of users Setting 1 999 Client lease time Setting 1 10 days The Secondary DNS server will be used if the Primary DNS server fails to connect. Description Indicates the IP address which AWK-3131A can start assigning None Description Specifies how many IP address can be assigned continuously None Description The lease time for which an IP address is assigned. The IP address may go expired after the lease time is reached. Packet Filters Factory Default 10 (days) Factory Default The AWK-3131A includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The AWK-3131As MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The AWK-3131A provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Disable Factory Default Drop 3-23 Web Console Configuration AirWorks AWK-3131A ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied IP Protocol Filter The AWK-3131As IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The AWK-3131A provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Description Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied Factory Default Disable Factory Default ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. 3-24 AirWorks AWK-3131A Web Console Configuration TCP/UDP Port Filter The AWK-3131As TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The AWK-3131A provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger then the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables TCP/UDP port filter Disables TCP/UDP port filter Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Disable Factory Default Drop ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied 3-25 AirWorks AWK-3131A RSTP Settings (for Master or Slave mode only) Web Console Configuration AWK-3131A supports IEEE802.1D Spanning Tree Protocol and IEEE802.1w Rapid STP standards. In addition to eliminating unexpected path looping, STP/RSTP can provide a backup path recovery if a wired/ wireless path fails accidentally. The reliability and availability can increase because this fail-over function. AWK-3131As STP/RSTP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every AWK-3131A connected to your network. If AWK-3131A plays a Slave role, which is connected to a device (PLC, RTU, etc.) as opposed to network switch equipment, it is not necessary to enable STP/RSTP. The reason is that it will cause unnecessary negotiation. AWK-3131As support STP/RSTP in Master or Slave mode only. The following figures indicate which Spanning Tree Protocol parameters can be configured. A more detailed explanation of each parameter is given below the figure. RSTP status This field will appear only when selected to operate STP/RSTP. It indicates whether this AWK-3131A is the Root of the Spanning Tree (the root is determined automatically) or not. Bridge priority Setting Numerical value selected by user Hello time Setting Numerical value input The root of the Spanning Tree topology periodically sends out a 2 (seconds) by user
(1 10 seconds) Description You can increase the bridge priority by selecting a lower number. A higher bridge priority brings a greater chance of being established as the root of the Spanning Tree topology. Description Factory Default 32768 Factory Default hello message to other devices on the network to check if the topology is healthy. Hello time indicates how often the root sends hello messages. Factory Default Description Forwarding delay Setting Numerical value input The amount of time this device waits before checking to see if it 15 (seconds) by user
(4 30 seconds) Max. age Setting Numerical value input As a non-root role, if the device has not received a hello by user
(6 40 seconds) should change to a different topology. Description message from the root longer than Max. age, it will reconfigure itself as a root. Once two or more devices on the network are recognized as a root, the devices will renegotiate to set up a Factory Default 20 (seconds) 3-26 Web Console Configuration Factory Default
(unchecked) Factory Default 128 Factory Default Enable RSTP Setting Enable/ disable Port priority Setting Numerical value selected by user Port cost Setting Enable/ Disable Edge port Setting Checked/ unchecked new Spanning Tree topology. Description Enables or disables the port as a node on the Spanning Tree Disable topology. Description Increase this ports priority as a node on the Spanning Tree topology by inputting a lower number. Description Input a higher cost to indicate that this port is less suitable as a 2000000 node for the Spanning Tree topology Description Sets a port, which no BPDU expectedly goes through, as an edge port AirWorks AWK-3131A NOTE We recommend you set an edge port for the port, which is connected to a non-STP/RSTP sub-network or an end device (PLC, RTU, etc.) as opposed to network equipment. This can prevent unnecessary waiting and negotiation of STP/RSTP protocol, and accelerate system initialization. When an edge port receives BPDUs, it can still function as an STP/RSTP port and start negotiation. Setting an edge port is different from disabling STP/RSTP on a port. If you disable STP/RSTP, a port will not deal with STP/RSTP BPDUs at all. Port Status Port Status indicates the current Spanning Tree status of this port. Use Forwarding for normal transmission, or Blocking to block transmission. Factory Default unchecked, except AP port 3-27 AirWorks AWK-3131A SNMP Agent Web Console Configuration The AWK-3131A supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The AWK-3131As MIB can be found in the software CD and supports reading the attributes via SNMP.
(Only get method is supported.) SNMP security modes and security levels supported by the AWK-3131A are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Protocol Setting on Version SNMP V1, V2c Community string Encryption No Authenticatio Data UI web page n Type V1, V2c Read Community V1, V2c Write/Read string Community Community No SNMP V3 No-Auth No No MD5 or SHA Authenticatio No MD5 or SHA Authenticatio Data n based on MD5 or SHA n based on MD5 or SHA encryption key Method Use a community string match for authentication Use a community string match for authentication Use account with admin or user to access objects Provides authentication based on HMAC-MD5, or HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-MD5 or HMAC-SHA algorithms, and data encryption key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below the following figure. Enable Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Factory Default Disable 3-28 AirWorks AWK-3131A Web Console Configuration Description Allow remote management via SNMP agent Disallow remote management via SNMP agent Factory Default Disable Factory Default public Remote Management Setting Enable Disable Read community (for V1, V2c) Setting V1, V2c Read Community Write community (for V1, V2c) Setting V1, V2c Read /Write Community SNMP agent version Setting V1, V2c, V3, or V1, V2c, or V3 only Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Factory Default private Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. Factory Default Description Select the SNMP protocol version used to manage the switch. V1, V2c Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 SHA Description Use admin account to access objects. No authentication Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Description No data encryption DES-based data encryption AES-based data encryption Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Private key A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also know as OID. This is the AWK-3131As enterprise value. It is fixed. Factory Default No Auth Factory Default Disable 3-29 AirWorks AWK-3131A Link Fault Pass-Through (for Client/Slave mode only) Web Console Configuration This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, AWK will try to connect to AP. If wireless is disconnected, AWK restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, AWK will try to recover the Ethernet link. System log will indicate the link fault pass through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Enables Link Fault Pass-Through Disables Link Fault Pass-Through Factory Default Disable Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the AWK-3131A supports different approaches to warn engineers automatically, such as SNMP trap, e-mail, and relay output. It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output. System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. RSSI report events (Only for Client mode) is good for site survey stage and need to use special Utility to draw RSSI as a table. But this function would make extra traffic load, we recommend disable this function in normal using. 3-30 NOTE AirWorks AWK-3131A Web Console Configuration The AWK-3131A is associated with an AP. Event is triggered when The AWK-3131A is rebooted, such as when its settings are changed (IP address, subnet mask, etc.). Event is triggered when The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. System-related events System restart (warm start) Network-related events LAN link on LAN link off Client joined/ left
(for AP/Master mode) WLAN connected to AP
(for Client/Slave mode) WLAN disconnected
(for Client/Slave mode) Config-related events Configuration Changed Configuration file import via Web Console The configuration file is imported to the AWK-3131A. Console authentication failure Firmware upgraded Power events Power 1/2 transition (On -> Off) PoE transition (On -> Off) Power 1/2 transition (Off -> On) PoE transition (Off -> On) DI events DI1/2 transition (On -> Off) DI1/2 transition (Off -> On) An incorrect password is entered. The AWK-3131As firmware is updated. Event is triggered when The AWK-3131A is powered down in PWR1/2. The AWK-3131A is powered down in PoE. The AWK-3131A is powered via PWR1/2. The AWK-3131A is powered via PoE. Event is triggered when Digital Input 1/2 is triggered by on to off transition Digital Input 1/2 is triggered by off to on transition Event is triggered when A configuration item has been changed. The AWK-3131A is disassociated from an AP. Syslog This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detail information for the grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. 3-31 Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Web Console Configuration AirWorks AWK-3131A Syslog server 1/ 2/ 3 Setting IP address Syslog port Setting Port destination
(1 to 65535) E-mail Description Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server Description Enter the UDP port of the corresponding Syslog server Factory Default None Factory Default 514 E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. 3-32 AirWorks AWK-3131A E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the AWK-3131A. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses work well. More detailed explanations about these parameters are given after the following figure. Web Console Configuration Relay Mail server (SMTP) Setting IP address User name & Password Setting From e-mail address Setting Max. 63 characters To E-mail address 1/ 2/ 3/ 4 Setting Max. 63 characters Description The IP Address of your email server. Description User name and password used in the SMTP server Description Enter the administrators e-mail address which will be shown in None the From field of a warning e-mail. Description Enter the receivers e-mail addresses. Factory Default None Factory Default None Factory Default Factory Default None The AWK-3131A has one relay output, which consists of 2 terminal block contacts on the AWK-3131As top panel. These relay contacts are used to indicate user-configured events and system failure. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the AWK-3131A is not powered. Relay Event Types You can check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found in the System log Event Types table on page 3-31. 3-33 AirWorks AWK-3131A Trap Web Console Configuration Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. Trap Event Types SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. Description SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 1st / 2nd Trap version Setting V1 V2 1st / 2nd Trap server IP/name Setting IP address or host name Description Enter the IP address or name of the trap server used by your None network. 3-34 Factory Default V1 Factory Default AirWorks AWK-3131A Web Console Configuration 1st / 2nd Trap community Setting Max. of 31 characters Use a community string match with a maximum of 31 characters for authentication. Description Status Wireless Status Factory Default alert The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Certain values for 802.11 info may not show up due to different operation modes. As a result, Current BSSID and Signal strength are not available in AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the AWK-3131A in Client mode. Associated Client List (for AP/Master mode only) Associated Client List shows all the clients that are currently associated to a particular AWK-3131A. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. 3-35 AirWorks AWK-3131A DHCP Client List (for AP mode only) Web Console Configuration The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. You can press Select all button to select all content in the list for further editing. System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-36 AirWorks AWK-3131A Relay Status Web Console Configuration The status of user-configurable events can be found under Relay Status. The status will refresh every 5 seconds if the Auto refresh box is checked. If an event is triggered, it will be noted on this list. System administrators can click Acknowledge Event when he has acknowledged the event and addressed it. DI and Power Status The status of power inputs and digital inputs is shown on this web page. The status will refresh every 5 seconds if the Auto refresh box is checked. The following figures indicate the status which Spanning Tree Protocol parameters have been configured. RSTP Status 3-37 AirWorks AWK-3131A Maintenance Web Console Configuration Maintenance functions provide the administrator with tools to manage the AWK-3131A and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. 3-38 Ping AirWorks AWK-3131A Firmware Upgrade Web Console Configuration The AWK-3131A can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. Before running a firmware upgrade, make sure the AWK-3131A is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the AWK-3131A will reboot itself. When upgrading your firmware, the AWK-3131As other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your AWK-3131A. Config Import Export First way you can back up or restore the AWK-3131As configuration with Config Import Export. In the Config Import section, click Browse to specify the configuration file and click Config Import button to begin importing the configuration. In the Config Export section, click the Config Export button and save the configuration file onto your local storage media. The configuration file is a text file and you can view and edit it with a general text-editing tool. You can also back up or restore the ABC-01 configuration with Config Import Export. 3-39 AirWorks AWK-3131A To download the configuration to the AWK:
1. Turn off the AWK. 2. Plug in the ABC-01 to the AWKs RS-232 console. 3. Turn on AWK. 4. AWK will detect ABC-01 during bootup, and download the configuration from the ABC-01 to the AWK Web Console Configuration automatically. Once the configuration downloads and if configuration format is correct, the AWK will emit three short beeps, then continue the boot up. 5. Once the AWK has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. Load Factory Default Use this function to reset the AWK-3131A and roll all settings back to the factory default values. You can also reset the hardware by pressing the reset button on the top panel of the AWK-3131A. Password You can change the administration password for each of the AWK-3131As console managers by using the Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password root, and remember to change the administration password regularly. Misc. Settings Reset button Setting Always enable Disable after 60 sec Additional settings to help you manage your AWK-3131A, are available on this page. Description The AWK-3131As Reset button works normally. The AWK-3131As reset to default function will be inactive 60 seconds after the AWK-3131A finishes booting up. Factory Default Always enable 3-40 AirWorks AWK-3131A Save Configuration Web Console Configuration The following figure shows how the AWK-3131A stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the AWK-3131A is shutdown or rebooted unless they are y. Because the AWK-3131A starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the AWK-3131A. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. 3-41 AirWorks AWK-3131A Restart Web Console Configuration If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the AWK-3131A directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the AWK-3131A. If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. You will not be able to run any of the AWK-3131As functions while the system is rebooting. Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. Logout 3-42 4 Software Installation and Configuration The following topics are covered in this chapter:
Overview AWK Search Utility Installing AWK Search Utility Configuring AWK Search Utility AirWorks AWK-3131A Overview Software Installation and Configuration The Documentation & Software CD included with your AWK-3131A is designed to make the installation and configuration procedure easy and straightforward. This auto-run CD includes AWK Search Utility (to broadcast search for all AWKs accessible over the network), the AWK-3131A Users Manual, and Quick Installation Guide. AWK Search Utility Installing AWK Search Utility Click the INSTALL UTILITY button in the AWK Installation CD auto-run window to install AWK Search Utility. Once the program starts running, click Yes to proceed. 1. Click Next when the Welcome screen opens to proceed with the installation. 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 4-2 AirWorks AWK-3131A Software Installation and Configuration 3. Click Next to create the programs shortcut files to the default directory, or click Browse to select an alternate location. 4. Click Next to select additional tasks. 5. Click Next to proceed with the installation. The installer then displays a summary of the installation options. 4-3 AirWorks AWK-3131A Software Installation and Configuration 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 7. Click Finish to complete the installation of AWK Search Utility. Configuring AWK Search Utility The Broadcast Search function is used to locate all AWK-3131A APs that are connected to the same LAN as your computer. After locating an AWK-3131A, you will be able to change its IP address. Since the Broadcast Search function searches by TCP packet and not IP address, it doesnt matter if the AWK-3131A is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the AWK Search Utility program. When the Login page appears, select the Search AWK only option to search for AWKs and to view each AWKs configuration. Select the AWK management option to assign IPs, upgrade firmware, and locate devices. 2. Open the AWK Search Utility and then click the Search icon. 4-4 AirWorks AWK-3131A Software Installation and Configuration 3. The Searching window indicates the progress of the search. When the search is complete, all AWKs that were located will be displayed in the AWK Search Utility window. 4. Click Locate to cause the selected device to beep. 5. Make sure your AWK is unlocked before using the search utilitys icons setting. The AWK will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. 6. Go to Tools AWK login Options to manage and unlock additional AWKs. 7. Use the scroll down list to select the MAC addresses of those AWKs you would like to manage, and then click Add. Key in the password for the AWK device and then click OK to save. If you return to the search page and search for the AWK again, you will find that the AWK will unlock automatically. 4-5 AirWorks A AT A AWK-3131A N TTENTION or security pur Fo e default. th Software e Installati ion and Con nfiguration rposes, we su ggest you can n change the A AWK search u utility login pas ssword instea ad of using To ta We o modify the c ke you to the eb Console, f configuration o web console, for informatio of the highligh
, where you c n on how to u hted AWK, clic can make all c use the web co ck on the Web configuration onsole. b icon to open changes. Refe n the web con er to Chapter nsole. This will l 3, Using the e Cli ick on Telnet t if you would like to use te Cli ick Assign IP P to change th he IP setting. lnet to configu ure your AWK Ks. 4-6 Software Installation and Configuration The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time lapsed between retries. AirWorks AWK-3131A Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the AWK search Utility. 4-7 5 Other Console Considerations This chapter explains how to access the AWK-3131A for the first time. In addition to HTTP access, there are four ways to access AWK-3131A: serial console, Telnet console, SSH console, and HTTPS console. The serial console connection method, which requires using a short serial cable to connect the AWK-3131A to a PCs COM port, can be used if you do not know the AWK-3131As IP address. The other consoles can be used to access the AWK-3131A over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
RS-232 Console Configuration (115200, None, 8, 1, VT100) Configuration by Telnet and SSH Consoles Configuration by Web Browser with HTTPS/SSL Disabling Telnet and Browser Access AirWorks AWK-3131A RS-232 Console Configuration (115200, None, 8, 1, VT100) Other Console Considerations The serial console connection method, which requires using a short serial cable to connect the AWK-3131A to a PCs COM port, can be used if you do not know the AWK-3131As IP address. It is also convenient to use serial console configurations when you cannot access the AWK-3131A over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. ATTENTION Do not use the RS-232 console manager when the AWK-3131A is powered at reversed voltage (ex. -
48VDC), even though reverse voltage protection is supported. If you need to connect the RS-232 console at reversed voltage, Moxas TCC-82 isolator is your best solution. NOTE We recommend using Moxa PComm (Lite) Terminal Emulator, which can be downloaded free of charge from Moxas website. Before running PComm Terminal Emulator, use an RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the AWK-3131As RS-232 console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the RS-232 console utility. 1. From the Windows desktop, open the Start menu and start PComm Terminal Emulator in the PComm
(Lite) group. 2. Select Open under Port Manager to open a new connection. 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue. 5-2 AirWorks AWK-3131A Other Console Considerations 4. The Console login screen will appear. Log into the RS-232 console with the login name (default: admin) and password (default: root, if no new password is set). 5. The AWK-3131As device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the RS-232 cable or trigger DTR, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. Configuration by Telnet and SSH Consoles You may use Telnet or SSH client to access the AWK-3131A and manage the console over a network. To access the AWK-3131As functions over the network from a PC host that is connected to the same LAN as the AWK-3131A, you need to make sure that the PC host and the AWK-3131A are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. The AWK-3131As default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0
(for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. 5-3 NOTE NOTE Other Console Considerations AirWorks AWK-3131A Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, run Start Run, and then use Telnet to access the AWK-3131As IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). 2. When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the AWK-3131As IP address, specifying 22 for the SSH connection port. 3. The Console login screen will appear. Please refer to the previous paragraph RS-232 Console Configuration and for login and administration. Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the AWK-3131A supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the AWK-3131As web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<AWK-3131As IP address> in the address field. Press Enter to establish the connection. 2. Warning messages will pop out to warn users that the security certificate was issued by a company they have not chosen to trust. 5-4 AirWorks AWK-3131A Other Console Considerations 3. Select Yes to accept the certificate issued by Moxa IW and then enter the AWK-3131As web browser interface secured via HTTPS/SSL. (You can see the protocol in URL is https.) Then you can use the menu tree on the left side of the window to open the function pages to access each of AWK-3131As functions. Disabling Telnet and Browser Access If you are connecting the AWK-3131A to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-5 A References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you administer your AWK-3131As and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP AirWorks AWK-3131A Beacon References A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports (AP and WDS1-
WDS8) of the same AWK-3131A. This feature is particularly helpful when the AWK-3131A connects to older equipment, such as legacy switches. A-2 AirWorks AWK-3131A Differences between RSTP and STP References RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. A-3 B Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery DoC (Declaration of Conformity) Federal Communication Commission Interference Statement R&TTE Compliance Statement AirWorks AWK-3131A Firmware Recovery Supporting Information When the LEDs of FAULT, Signal Strength and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The AWK-3131A is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the AWK-3131As ES-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. Press Ctrl - C and the following message will appear. Enter 2 to change the network setting. Specify where the AWK-3131As firmware file on the TFTP server and press y to write the settings into flash memory. AWK-3131A restarts, and the Press Ctrl-C to enter Firmware Recovery Process message will reappear. Press Ctrl-C to enter the menu and select 1 to start the firmware upgrade process. B-2 AirWorks AWK-3131A Supporting Information Select 0 in the sub-menu to load the firmware image via LAN, and then enter the file name of the firmware to start the firmware recovery. DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Increase the separation between the equipment and receiver. FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator & your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. ThisradiotransmitterFCCID:SLEWAPN008hasbeenapprovedbyFCCtooperatewiththeantennatypes listedbelowwiththemaximumpermissiblegainandrequiredantennaimpedanceforeachantennatype indicated.Antennatypesnotincludedinthislist,havingagaingreaterthanthemaximumgainindicated forthattype,arestrictlyprohibitedforusewiththisdevice. AntennaList No. Manufacturer PartNo. AntennaType PeakGain 1 KINSUN ANTWDBO2BK Dipole 2.9dBifor2.4GHz 2.34dBifor5GHz 2 KINSUN ANTWDBANM0502 Dipole 4.62dBifor2.4GHz 1.41dBifor5GHz Note:TheantennaconnectorisReverseSMAtype. B-3 AirWorks AWK-3131A R&TTE Compliance Statement Supporting Information Moxa declares that the apparatus AWK-3131A complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. B-4
various | (TAP-213-XX-CT-T) UserMan 12-29 | Users Manual | 3.91 MiB | November 01 2017 |
Moxa Tough AP TAP-213 Users Manual Edition 1.0, April 2016 www.moxa.com/product 2016 Moxa Inc. All rights reserved. Moxa Tough AP TAP-213 Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2016 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free:
Tel:
Fax:
Moxa Europe Tel:
Fax:
Moxa India Tel:
Fax:
1-888-669-2872
+1-714-528-6777
+1-714-528-6778
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99
+91-80-4172-9088
+91-80-4132-1045 800-820-5036
+86-21-5258-9955
+86-21-5258-5505 Moxa China (Shanghai office) Toll-free:
Tel:
Fax:
Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents 1. Introduction .................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................. 1-2 Product Specifications .......................................................................................................................... 1-3 Functional Design ............................................................................................................................... 1-6 LAN Port..................................................................................................................................... 1-6 LED Indicators............................................................................................................................. 1-6 Beeper ....................................................................................................................................... 1-7 Reset Button ............................................................................................................................... 1-8 2. Getting Started ................................................................................................................................ 2-1 First-Time Installation and Configuration ................................................................................................ 2-2 Communication Testing ....................................................................................................................... 2-3 Function Map...................................................................................................................................... 2-5 3. Web Console Configuration.............................................................................................................. 3-1 Web Browser Configuration .................................................................................................................. 3-2 Overview ........................................................................................................................................... 3-3 Basic Settings..................................................................................................................................... 3-4 System Info Settings ................................................................................................................... 3-4 Network Settings ......................................................................................................................... 3-5 Time Settings .............................................................................................................................. 3-6 Wireless Settings ................................................................................................................................ 3-7 Operation Mode .................................................................................................................................. 3-7 Basic Wireless Settings ........................................................................................................................ 3-8 WLAN Security Settings .............................................................................................................. 3-12 Advanced Wireless Settings ........................................................................................................ 3-18 WLAN Certification Settings (for EAP-TLS in Client/Slave mode only) ................................................ 3-21 Advanced Settings ............................................................................................................................ 3-22 Using Virtual LAN ...................................................................................................................... 3-22 Configuring Virtual LAN .............................................................................................................. 3-23 DHCP Server (for AP mode only) ................................................................................................. 3-24 Packet Filters ............................................................................................................................ 3-25 RSTP Settings (for AP/Master mode only) ..................................................................................... 3-27 SNMP Agent .............................................................................................................................. 3-29 Link Fault Pass-Through (for Client/Slave mode only) ..................................................................... 3-31 NAT/Port Forwarding .................................................................................................................. 3-31 Auto Warning Settings ....................................................................................................................... 3-31 System Log .............................................................................................................................. 3-32 Syslog...................................................................................................................................... 3-33 E-mail ...................................................................................................................................... 3-34 Relay ....................................................................................................................................... 3-35 Trap ........................................................................................................................................ 3-36 Status ............................................................................................................................................. 3-37 Wireless Status ......................................................................................................................... 3-37 Associated Client List (for AP/Master mode only) ............................................................................ 3-37 DHCP Client List (for AP mode only) ............................................................................................. 3-38 System Log .............................................................................................................................. 3-38 Relay Status ............................................................................................................................. 3-39 DI and Power Status .................................................................................................................. 3-39 RSTP Status .............................................................................................................................. 3-39 Maintenance ..................................................................................................................................... 3-40 Console Settings........................................................................................................................ 3-40 Ping ......................................................................................................................................... 3-40 Firmware Upgrade ..................................................................................................................... 3-40 Config Import/Export ................................................................................................................. 3-41 Default Config Import................................................................................................................. 3-42 Load Factory Default .................................................................................................................. 3-42 Password .................................................................................................................................. 3-42 Misc. Settings ........................................................................................................................... 3-43 Save Configuration ............................................................................................................................ 3-43 Restart ............................................................................................................................................ 3-44 Logout............................................................................................................................................. 3-44 4. Software Installation and Configuration .......................................................................................... 4-1 Overview ........................................................................................................................................... 4-2 Wireless Search Utility ......................................................................................................................... 4-2 Installing Wireless Search Utility .................................................................................................... 4-2 Configuring Wireless Search Utility ................................................................................................. 4-5 5. Other Console Considerations ............................................................................................................ 5-1 USB Console Configuration (115200, None, 8, 1, VT100) ......................................................................... 5-2 Configuration by Telnet and SSH Consoles ............................................................................................. 5-4 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-5 Disabling Telnet and Browser Access ..................................................................................................... 5-6 A. References ........................................................................................................................................ A-1 Beacon ..............................................................................................................................................A-2 DTIM.................................................................................................................................................A-2 Fragment...........................................................................................................................................A-2 RTS Threshold ....................................................................................................................................A-2 STP and RSTP ....................................................................................................................................A-2 The STP/RSTP Concept ................................................................................................................A-2 Differences between RSTP and STP................................................................................................A-3 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery .............................................................................................................................B-2 DoC (Declaration of Conformity) ...........................................................................................................B-3 Federal Communication Commission Interference Statement ............................................................B-3 R&TTE Compliance Statement .......................................................................................................B-4 1 Introduction The TAP-213 outdoor wireless AP/client is the ideal ruggedized wireless solution for railway onboard Cecilia_Fernandes train-to-ground applications such as CCTV and CBTC communications. It can provide up to 300 Mbps with IEEE 2016-04-21 09:00:22
--------------------------------------------
802.11n technology. The TAP-213s dust-tight/weatherproof design is IP68-rated, and it can operate at I suggest:
temperatures ranging from -40 to 75C, allowing you to extend wireless networks to outdoor locations and It can provide speeds of up to 300 critical environments. Mbps... The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LAN Port LED Indicators Beeper Reset Button Tough AP TAP-213 Overview Introduction The TAP-213 is 802.11n compliant to deliver speed, range, and reliability to support even the most bandwidth-intensive applications. The 802.11n standard incorporates multiple technologies, including MIMO
(Multi-In, Multi-Out) Spatial Multiplexing, multiple channels (5, 10, 20 and 40 MHz), and dual bands (2.4 GHz and 5 GHz) to achieve high speeds, while still being able to communicate with legacy 802.11a/b/g devices. The TAP-213 is compliant with the EN 50155 standard that covers operating temperature range, power input voltage, surge, ESD, and vibration. The TAP can be easily mounted on to a DIN rail or in distribution boxes. Its wide operating temperature range, IP68-rated housing with LED indicators, and the DIN-rail mounting capability make the TAP-213 a convenient yet reliable solution for all types of industrial wireless applications. Package Checklist Moxas TAP-213 is shipped with the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. 1 TAP-213 1 Wall mounting kit 1 plastic protective caps for LAN-1 X-coded port 3 metal protective caps for LAN-2 fiber port, USB console port and ABC-02 USB storage port DIN-rail mounting kit Quick Installation Guide (printed) Product Warranty Card Cecilia_Fernandes 2016-04-21 09:02:02
--------------------------------------------
The preliminary datasheet has the following items listed:
TAP-213 Wall mounting kit (includes 2 supports) Metal cap to cover M12-female connector We support WiFi client mode, one-to-many Access Point mode, and one-to-one Wireless Bridge mode. For devices, depending on the type of antenna used (point-to-point or point-to-multipoint), the target power is fixed by the manufacturer prior to shipment, the antenna is delivered with the device and is configured by a professional installer, so that the radio does not exceed the EIRP allowed per regulatory domain. Point to Multipoint:
No. Manufacturer 1 KINSUN Part No. ANT-WDB-O-2 BK Antenna Type Dipole 2 KINSUN ANT-WDB-ANM-0502 Dipole Point to Point:
No. Manufacturer 1 MOXA Part No. ANT-WDB-PNF-1518 Antenna Type Directional panel MAX Gain 2.9dBi for 2.4 GHz 2.34dBi for 5GHz 4.62dBi for 2.4 GHz 1.41dBi for 5GHz MAX Gain 15dBi for 2.4 GHz 18dBi for 5GHz 1-2 Tough AP TAP-213 Introduction Product Features Designed specifically for the wireless communication requirements in rail onboard CCTV and CBTC systems Compliant with EN 50155 Three-in-one design (AP/Bridge/Client) Advanced wireless security IEEE802.11a/b/g/n compliant Cecilia_Fernandes 2016-04-21 09:04:22
--------------------------------------------
The preliminary datasheet has the following information: 24 to 110 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) 64-bit and 128-bit WEP/WPA/WPA2 SSID Hiding/IEEE 802.1X/RADIUS Packet access control & filtering STP/RSTP support for network system redundancy Long-distance transmission support Turbo Roaming enables rapid handover (Client mode) ABC-02 for configuration import/export RS-232 console management Wide -40 to 75C operating temperature range Redundant 24 VDC power inputs or IEEE802.3af Power over Ethernet DIN-rail mounting or wall mounting IP68-rated high-strength metal housing 1-3 Tough AP TAP-213 Introduction Product Specifications WLAN Interface Standards:
IEEE 802.11a/b/g/n for Wireless LAN IEEE 802.11i for Wireless Security IEEE 802.3 for 10BaseT IEEE 802.3u for 100BaseT(X) IEEE 802.3ab for 1000BaseT IEEE 802.3af for Power-over-Ethernet IEEE 802.1D for Spanning Tree Protocol IEEE 802.1w for Rapid STP IEEE 802.1p for Class of Service IEEE 802.1Q for VLAN Spread Spectrum and Modulation (typical):
DSSS with DBPSK, DQPSK, CCK OFDM with BPSK, QPSK, 16QAM, 64QAM 802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 1 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps 802.11n: 64QAM @ 300 Mbps to BPSK @ 6.5 Mbps (multiple rates supported) Operating Channels (central frequency):
US:
2.412 to 2.462 GHz (11 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (8 channels; excludes 5.600 to 5.640 GHz)*
5.745 to 5.825 GHz (5 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
JP:
2.412 to 2.484 GHz (14 channels, DSSS) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
*Special frequency bands (up to 6.0 GHz) are available for customization. Security:
SSID broadcast enable/disable Firewall for MAC/IP/Protocol/Port-based filtering 64-bit and 128-bit WEP encryption, WPA /WPA2 Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Transmission Rates:
802.11b: 1, 2, 5.5, 11 Mbps 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps 802.11n: 6.5 to 300 Mbps (multiple rates supported) 1-4 Tough AP TAP-213 TX Transmit Power:
2.4 GHz 802.11b:
Typ. 261.5 dBm @ 1 to 11 Mbps 802.11g:
Introduction Typ. 251.5 dBm @ 6 to 24 Mbps, Typ. 231.5 dBm @ 36 Mbps, Typ. 201.5 dBm @ 48 Mbps, Typ. 201.5 dBm @ 54 Mbps 802.11n (20 MHz):
MCS0, 8@20 MHz: Typ. 23 dBm (1.5 dBm); MCS7, 15@20 MHz:
Typ. 17 dBm (1.5 dBm); MCS0, 8@40 MHz: Typ. 23 dBm (1.5 dBm);
MCS7, 15@40 MHz: Typ. 17 dBm (1.5 dBm) 5 GHz 802.11a:
Typ. 231.5 dBm @ 6 to 24 Mbps, Typ. 211.5 dBm @ 36 Mbps, Typ. 201.5 dBm @ 48 Mbps, Typ. 181.5 dBm @ 54 Mbps 802.11n (20/40 MHz):
MCS0, 8@20 MHz: Typ. 23 dBm (1.5 dBm); MCS7, 15@20 MHz:
Typ. 18 dBm (1.5 dBm); MCS0, 8@40 MHz: Typ. 23 dBm (1.5 dBm);
MCS7, 15@40 MHz: Typ. 18 dBm (1.5 dBm) RX Sensitivity:
2.4 GHz 802.11b:
-93 dBm @ 1 Mbps, -93 dBm @ 2 Mbps,
-93 dBm @ 5.5 Mbps, -88 dBm @ 11 Mbps 802.11g:
-88 dBm @ 6 Mbps, -86 dBm @ 9 Mbps, -85 dBm @ 12 Mbps,
-86 dBm @ 18 Mbps, -85 dBm @ 24 Mbps, -82 dBm @ 36 Mbps,
-78 dBm @ 48 Mbps, -74 dBm @ 54 Mbps 802.11n:
-67 dBm @ MCS15 40 MHz, -69 dBm @ MCS15 20 MHz,
-67 dBm @ MCS7 40 MHz, -70 dBm @ MCS7 20 MHz 5 GHz 802.11a:
-90 dBm @ 6 Mbps, -88 dBm @ 9 Mbps, -88 dBm @ 12 Mbps,
-85 dBm @ 18 Mbps, -81 dBm @ 24 Mbps, -78 dBm @ 36 Mbps,
-74 dBm @ 48 Mbps, -74 dBm @ 54 Mbps 802.11n:
-68 dBm @ MCS15 40 MHz, -71 dBm @ MCS15 20 MHz,
-63 dBm @ MCS7 40 MHz, -69 dBm @ MCS7 20 MHz Protocol Support General Protocols: Proxy ARP, DNS, HTTP, HTTPS, IP, ICMP, SNTP, TCP, UDP, RADIUS, SNMP, PPPoE, DHCP AP-only Protocols: ARP, BOOTP, DHCP, STP/RSTP (IEEE 802.1D/w) Interface Connector for External Antennas: N-type (female) Fiber Ports: 1000Base SFP slot M12 Ports: 1, M12-type, 8-pin X-coding (female), 10/100/1000BaseT(X) auto negotiation speed, F/H duplex mode, and auto MDI/MDI-X connection Console Port: USB Console (M12 5-pin A-coded connector female) USB Port: M12 B-coded connector for ABC-02 Reset: Present LED Indicators: PWR, FAULT, STATE, WLAN, LAN 1, LAN 2 1-5 Tough AP TAP-213 Introduction Physical Characteristics Housing: Metal, IP68 protection Weight: 1.5 kg Dimensions: 220 x 150 x 55 mm (8.66 x 5.90 x 2.16 in) Installation: Wall mounting (standard), DIN-rail mounting (optional) Environmental Limits Operating Temperature: -40 to 75C (-40 to 167F) Storage Temperature: -40 to 85C (-40 to 185F) Ambient Relative Humidity: 5% to 100% (non-condensing) Power Requirements Input Voltage: 24 to 110 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) Input Current: 24 to 110 VDC, 15 W (max.) Connector: M12 male connector Reverse Polarity Protection: Present Standards and Certifications Safety: UL 60950-1, IEC 60950-1(CB) EMC: EN 61000-6-2/6-4, EN 61000-6-1/6-3 EMI: FCC Part 15B Class A EMS:
IEC 61000-4-2 ESD: Contact: 6 kV; Air: 8 kV IEC 61000-4-3 RS: 80 MHz to 1 GHz: 20 V/m IEC 61000-4-4 EFT: Power: 2 kV; Signal: 2 kV IEC 61000-4-5 Surge: Power: 2 kV; Signal: 2 kV IEC 61000-4-6 CS: 10 V IEC 61000-4-8 Radio: EN 301 489-1/17, EN 300 328, EN 301 893, DFS, TELEC Rail Traffic: EN 50155 (essential compliance*), EN 50121-4
*Moxa defines essential compliance to include those EN 50155 requirements that make products more suitable for rolling stock railway applications. Note: Please check Moxas website for the most up-to-date certification status. Fire and Smoke: EN 45545 MTBF (mean time between failures) Time: 400,000 hrs Warranty Warranty Period: 5 years Details: See www.moxa.com/warranty ATTENTION The TAP-213 is NOT a portable mobile device and should be located at least 20 cm away from the human body. The TAP-213 is NOT designed for the general public. A well-trained technician should be enlisted to ensure safe deployment of TAP-213 units, and to establish a wireless network. 1-6 Tough AP TAP-213 Introduction Functional Design LAN Port The standard model of the TAP-213 is provided with one M12 X code Gigabit port. The LAN LED will light up when the LAN-1 cable is inserted. Cecilia_Fernandes 2016-04-21 09:06:09
--------------------------------------------
The label on the product is
"LAN1" I suggest:
The LAN LED will light up when you insert the cable in the LAN1 port and a connection is established. ATTENTION Do not use a PoE (Power over Ethernet) Injector for the PoE device(s). Instead, use an IEEE 802.3af or IEEE 802.3at compliant PSE (Power Sourcing Equipment). Cecilia_Fernandes 2016-04-21 09:06:35
--------------------------------------------
Content modified, please check LED Indicators The LEDs on the front panel provide a quick and easy means of determining the current operational status and wireless settings of the TAP-213. The FAULT LED indicates system failures and user-configured events. If the TAP-213 cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one-second intervals. Cecilia_Fernandes 2016-04-21 09:07:36
--------------------------------------------
What does the fault LED indicate about user-configured events. We need to explain this as it is not clear. 1-7 Tough AP TAP-213 Introduction The following table summarizes how to read the devices wireless settings based on the LED displays. More information is available in Chapter 3 in the Basic Wireless Settings section. LED PWR FAULT STATE WLAN LAN1/LAN2 Description Cecilia_Fernandes Power is being supplied (from power input 1) 2016-04-21 09:08:35
--------------------------------------------
Power is not being supplied. Cecilia_Fernandes I suggest:
System is booting up, or a system configuration error. 2016-04-21 09:08:54 Power is on (supplied from power input Cannot get an IP address from the DHCP server
--------------------------------------------
1) I suggest removing this. If we must mention it then I suggest "...or a system configuration error exists."
IP address conflict Cecilia_Fernandes 2016-04-21 09:09:24 Error condition does not exist.
--------------------------------------------
System startup is complete and the system is in operation. I suggest:
AeroLink Protection is enabled and is currently in Backup state. No error condition exists. Device has been located by Wireless Utility Color Green Red Green State On Off On Blinking (fast at intervals) Blinking
(slow at 1-second intervals) Off On Blinking (fast at intervals) Blinking
(slow at 1-second intervals) Red On On System is booting up. WLAN is functioning in Client/Slave mode. Green Blinking WLAN is transmitting data in Client/Slave mode. Off On WLAN is not in Client/Slave/Client-Router mode or has not established a link with an AP. WLAN is in AP/Master mode. Amber Blinking WLAN is transmitting data in AP/Master mode. Off On Green Blinking Off On Amber Blinking Off WLAN is not in use or is not working properly. LAN ports 1000 Mbps link is active. Data is being transmitted at 1000 Mbps. LAN ports 1000 Mbps link is inactive. LAN ports 10/100 Mbps link is active. Data is being transmitted at 10/100 Mbps. LAN ports 10/100 Mbps link is inactive. ATTENTION When the system fails to boot, the LEDs for STATE (Green), FAULT, and WLAN will all light up simultaneously and blink at one-second intervals. This may be due to improper operation or uncontrollable issues, such as an unexpected shutdown while updating the firmware. To recover the firmware, refer to the Firmware Recovery section in Chapter 6. Cecilia_Fernandes 2016-04-21 09:09:46
--------------------------------------------
I suggest removing this content. Beeper The beeper emits two short beeps when the system is ready. 1-8 Tough AP TAP-213 Reset Button Introduction The Reset button is located on the top panel of the TAP-213. You can reboot the TAP-213 or reset it to factory default settings by pressing the Reset button with a pointed object such as an unfolded paper clip. System reboot: Hold the Reset button down for under 5 seconds and then release. Reset to factory default: Hold the Reset button down for over 5 seconds until the STATE LED starts blinking green light. Release the button to reset the TAP-213. 1-9 2 Getting Started This chapter explains how to install Moxas AirWorks TAP-213 for the first time to quickly set up your wireless network and how to test whether the connection is working well. The function map provided in Chapter 3 is a convenient reference to the various functions available on the TAP-213 and to determine the functions that you need to use. The following topics are covered in this chapter:
First-Time Installation and Configuration Communication Testing Function Map Tough AP TAP-213 Getting Started First-Time Installation and Configuration Before installing the TAP-213, make sure that all items mentioned in the package checklist are in the box. You will also need access to a notebook computer or PC equipped with an Ethernet port. The TAP-213 has a default IP address that you must use when connecting to the device for the first time. Step 1: Select the power source. The TAP-213 can be powered by a DC power input or PoE (Power over Ethernet). Step 2: Connect the TAP-213 to a notebook or PC. Since the TAP-213 is provided with the MDI/MDI-X auto-sensing capability, you can use either a straight-through cable or crossover cable to connect it to a computer. When the connection between the TAP-213 and the computer is established, the LED indicator on the TAP-213s LAN port lights up. Step 3: Set up the computers IP address. After you select Maintenance Load Factory Default and click the Submit button, the TAP-213 will be reset to factory default settings and the IP address will be reset to 192.168.127.253. Set an IP address for the computer so that it is on the same subnet as that of the TAP-213. Since the TAP-213s default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, set the IP address of the computer in the 192.168.127.xxx IP range and subnet mask to 255.255.255.0. Cecilia_Fernandes 2016-04-21 09:14:43
--------------------------------------------
If we mention this here, if sounds like we also have to set the default IP address of the TAP. Load Factory Default is covered on page 59 (3-42) and used only in exceptional cases as per my understanding. Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based Network Manager. Before the homepage opens, you will need to enter the user name and password as shown in the following figure. For first-time configuration, enter the following default user name and password and click on the Login button:
Step 4: Use the web-based manager to configure the TAP-213 User Name:
Password:
admin root For security reasons, we strongly recommend changing the default password. To change the password, select Maintenance Password and follow the instructions on the screen. 2-2 Tough AP TAP-213 Getting Started After you click Submit to apply changes, the web page is refreshed and an (Updated) indicator is displayed next to the page heading along with a blinking reminder to restart the device. To activate the changes, click Restart and then click Save and Restart after you change the settings. The TAP-213 will take about 30 seconds to complete the reboot process. Step 5: Select the operation mode for the TAP-213. By default, the operation mode of the TAP-213 is set to AP. You can change this setting to Client mode at Wireless Settings Basic Wireless Settings. Detailed information about configuring the TAP-213 is available in Chapter 3. Cecilia_Fernandes 2016-04-21 09:16:09
--------------------------------------------
Can you please confirm this. When we click on Restart, doesn't the TAP reboot?
Step 6: Test the network connection. In the following sections we describe two methods that you can use to test that a network connection has been established. Communication Testing After installing the TAP-213 you can run a sample test to make sure the wireless connection on the TAP-213 is functioning normally. Two testing methods are described below. Use the first method if you are using only one TAP-213 device, and the second method if you are using two or more TAP-213 units. How to Test One TAP-213 If you are only using one TAP-213, you will need one additional notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the TAP-213 (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (Notebook B) so that it is on the same subnet as the first notebook (Notebook A), which is connected to the TAP-213. After configuring the WLAN card, establish a wireless connection with the TAP-213 and open a DOS window on Notebook B. At the prompt, type the following:
ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 3-2 Tough AP TAP-213 Getting Started How to Test Two or More TAP-213 Units If you have two or more TAP-213 units, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the first TAP-213 connected to notebook A and change the second or third TAP-213 connected to notebook B to Client mode, and then configure the notebooks and TAP-213 units properly. After setting up the testing environment, open a DOS window on notebook B. At the prompt type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In the latter case, recheck the configuration to make sure the connections are correct. Cecilia_Fernandes 2016-04-21 09:16:55
--------------------------------------------
Are we talking about the physical connections or the settings in the web manager?
4-2 Tough AP TAP-213 Function Map Getting Started Quick overview of the TAP-213s status Basic settings for administering the TAP-213 Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional Application-oriented device management functions to set up events, traps, and reactions via relay warning, e-mail, and SNMP notification Note: These functions are all optional Current status information for monitoring wired/wireless network performance, advanced services, and device management functions Functions for maintaining the TAP-213, and for diagnosing the network On-demand functions to support the web-based console management operation 5-2 3 Web Console Configuration In this chapter, we explain all aspects of web-based console configuration. Moxas easy-to-use management functions help you set up your TAP-213 and make it easy to establish and maintain your wireless network. The following topics are covered in this chapter:
Web Browser Configuration Overview Basic Settings System Info Settings Network Settings Time Settings Wireless Settings Operation Mode Basic Wireless Settings WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (for EAP-TLS in Client/Slave mode only) Advanced Settings Using Virtual LAN Configuring Virtual LAN DHCP Server (for AP mode only) Packet Filters RSTP Settings (for AP/Master mode only) SNMP Agent Link Fault Pass-Through (for Client/Slave mode only) NAT/Port Forwarding Auto Warning Settings Status Wireless Status Associated Client List (for AP/Master mode only) DHCP Client List (for AP mode only) System Log Relay Status DI and Power Status RSTP Status Maintenance Console Settings Ping Firmware Upgrade Config Import/Export Default Config Import Load Factory Default Password Misc. Settings Save Configuration Restart Logout System Log Syslog E-mail Relay Trap Tough AP TAP-213 Web Console Configuration Web Browser Configuration The web interface provides a convenient way to modify the configuration of the TAP-213 and access its built-in monitoring and network administration functions. The recommended web browser is Microsoft Internet Explorer 7.0 or 8.0 with JVM (Java Virtual Machine) installed. To use the management and monitoring functions of the TAP-213 from a PC host connected to the same LAN as the TAP-213, you must make sure that the PC host and the TAP-213 are on the same logical subnet. Similarly, if the TAP-213 is configured for other VLAN settings, you must make sure your PC host is on the management VLAN. Cecilia_Fernandes 2016-04-21 09:17:45
--------------------------------------------
What other VLAN settings? Please help clarify this content. The default IP address of the TAP is 192.168.127.253. To access the web interface of the TAP-213, do the following:
1. Open a web browser (e.g., Internet Explorer), type in the default IP address of the TAP-213 in the address field, and press Enter. 2. In the login page that is displayed, enter the Username and Password (default Username = admin;
default Password = root) and click Login to continue. You may need to wait a few moments for the main page to download to your computer. Note that the model name and IP address of the TAP-213 are both shown in the title bar of the web page. You can identify the web interfaces of multiple TAP-213 units using this information. 3. Use the menu tree on the left side of the window to open the configuration pages for the TAP-213s functions. 3-2 Tough AP TAP-213 Web Console Configuration In the following paragraphs, we describe each TAP-213 management function in detail. An overview of all the functions is available in the Function Map section of this manual. The model name of the TAP-213 is shown as TAP-213-XX, where XX indicates the country code. The country code indicates the TAP-213 version and the bandwidth it uses. We use TAP-213-US as an example in the following figures. (The country code and model name that appears on your computer screen may be different than the one shown here.) Cecilia_Fernandes 2016-04-21 09:19:21
--------------------------------------------
The country code does not indicate the TAP-213 version or does it? I suggest removing this part. Overview The Overview page summarizes the TAP-213s current status. The information is categorized into the following groups: System Info, Device Info, and 802.11 Info. 3-3 Tough AP TAP-213 Web Console Configuration Click on the SSID (MOXA, in this case) to display detailed 802.11 information, as shown below:
The 802.11 Info that is displayed may differ based on the operation mode selected. For example, Current BSSID is not available in Client mode, and Signal strength/Noise Floor is not available in AP mode. Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the TAP-213. System Info Settings The System Info related settings that you configure here, especially the Device name and Device description, are displayed on the Overview page. They are also included in the SNMP information and emails. Configuring the System Info settings for each TAP-213 makes it easier to identify the different TAP-213 units connected to your network. alarm Cecilia_Fernandes 2016-04-21 09:20:05
--------------------------------------------
I suggest:
alert or warning Device name Setting Maximum of 31 characters Device location Setting Maximum. of 31 characters Device description Setting Maximum of 31 characters Description Specifies the role or application of this TAP-213 unit. Description Specifies the location of this TAP-213 unit. Description You can use this space to record a more detailed description of this TAP-213 3-4 Cecilia_Fernandes Factory Default 2016-04-21 09:20:29
--------------------------------------------
TAP-213_<Serial No. of I this TAP-213>
suggest:
Format Cecilia_Fernandes Factory Default 2016-04-21 09:20:35
--------------------------------------------
None I suggest:
Format Cecilia_Fernandes 2016-04-21 09:20:41 Factory Default
--------------------------------------------
None I suggest:
Format Tough AP TAP-213 Web Console Configuration Device contact information Setting Maximum of 31 characters Description You can use this space to record the contact information of the person responsible for maintaining this TAP-213. Factory Default None Cecilia_Fernandes 2016-04-21 09:20:48
--------------------------------------------
I suggest:
Format Network Settings The Network Settings configuration panel allows you to modify the TCP/IP parameters of the network. An explanation of each configuration item is given below:
Description Select this option if you want the TAP-213s IP address to be assigned automatically. Select this option if you want to manually set the IP address of the TAP-213. Factory Default Static IP configuration Setting DHCP Static IP address Setting TAP-213s IP address Description Identifies the TAP-213 on a TCP/IP network. Subnet mask Setting TAP-213s subnet mask Identifies the type of network to which the TAP-213 is Description connected (e.g., 255.255.0.0 for a Class B network and 255.255.255.0 for a Class C network). Factory Default 192.168.127.253 Factory Default 255.255.255.0 Gateway Setting TAP-213s default gateway Description The IP address of the router that connects the LAN to an outside network. Factory Default None Primary/ Secondary DNS server Setting IP address of the primary/secondary DNS server Description The IP address of the DNS server used by your network. After you have entering the DNS servers IP address here, you can use the URL of the TAP-213 (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The secondary DNS server will be used if the primary DNS server fails to connect. Factory Default None In the Client-Router mode, the WAN (wireless interface) and LAN (wired interface) are configured separately. 3-5 Tough AP TAP-213 Time Settings Web Console Configuration The TAP-213 has a time calibration function that can update the date and time information based on an NTP server or the date and time information specified by the user. Functions such as Auto warning can add real-time information to the message. Cecilia_Fernandes 2016-04-21 09:21:52
--------------------------------------------
Please help clarify. The Auto warning option is not available on this screen. The Current local time shows the TAP-213s system time when you open this web page. After you update the date and time setting, click on the Set Time button to activate the new date and time. An (Updated) string is displayed next to the date and time fields to indicate that the change is complete. Local time settings will be immediately activated in the system without running Save and Restart. Cecilia_Fernandes Cecilia_Fernandes 2016-04-21 09:22:07 2016-04-21 09:23:17
--------------------------------------------
--------------------------------------------
please confirm I suggest:
Cecilia_Fernandes Any change in the time and date 2016-04-21 09:24:47
--------------------------------------------
setting is effective immediately and We should say why it is important to does not need a system restart. sync the time setting with the built-in RTC. Current local time Setting User-specified date and time Time zone Setting User-specified time zone Description The date and time parameters allow configuration of the local time with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss Factory Default None Description The time zone setting allows the conversion from GMT
(Greenwich Mean Time) to the local time. Factory Default GMT ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Enable/ Disable Description Daylight saving time (also known as DST or summer time) involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. Factory Default Disable When Daylight saving time is enabled, the following parameters will be shown:
Starts at: The date that daylight saving time begins. Stops at: The date that daylight saving time ends. 3-6 Tough AP TAP-213 Web Console Configuration Time offset: Indicates the number of hours the clock should be advanced. Time server 1/2 Setting IP address of the name of the Time Server 1/2 Query period Setting The query period to sync with the time server
(1 to 9999 seconds) Description IP address or domain name of the NTP time server. The second NTP server will be used if the first NTP server fails to connect. Factory Default time.nist.gov Description This parameter determines how often the time is updated from the NTP server. Factory Default 600 (seconds) Wireless Settings The essential settings for wireless networks are presented in the wireless settings function group. You must configure these settings correctly before you establish your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP: In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Client: When the TAP-213 is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adapter. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. Operation Mode The TAP-213 supports five main operation modesAP, Client, Master, Slave, and ACCeach of which plays a distinct role on the wireless network. Wireless Enable Setting Enable/Disable Operation Mode Setting AP Client Master Slave Description Use this function to turn the RF (Radio Frequency) module on or off manually. NOTE: This function is available in AP operation mode only. Factory Default Enable Description The TAP-213 plays the role of a wireless AP The TAP-213 plays the role of a wireless AP Client This mode collocates with TAP-5232/6232s Wireless bridge mode. The TAP-213 plays the role of a wireless master. This mode collocates with TAP-5232/6232s Wireless bridge mode. The TAP-213 plays the role of a wireless slave. Factory Default AP Cecilia_Fernandes 2016-04-21 09:25:49
--------------------------------------------
We do not describe the Client-Router mode here. Please provide information Cecilia_Fernandes 2016-04-21 09:26:19 on this mode. Cecilia_Fernandes
--------------------------------------------
2016-04-21 09:26:41 Can we just say "wireless client"?
--------------------------------------------
Please help clarify this content. 3-7 Tough AP TAP-213 Web Console Configuration Basic Wireless Settings You can add new SSIDs or edit existing ones in the WLAN Basic Setting Selection panel. You can configure up to 9 SSIDs for a TAP and configure each SSID differently. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. All of the SSIDs that you configure for an AP are active at the same time. That is, client devices can use any of the SSIDs to associate with the AP. Cecilia_Fernandes 2016-04-21 09:27:20
--------------------------------------------
I suggest:
with different modes of operation. To create an SSID for your TAP, click on Add SSID. To edit an existing SSID and assign different configuration settings to it, click on the Edit button corresponding to the SSID. A configuration panel is displayed as follows:
3-8 Tough AP TAP-213 Web Console Configuration When you switch to Client mode, a Site Survey button will be available on the Basic Wireless Settings panel. Use the Site Survey function to view information about available APs, as shown in the following figures.. You can click on the SSID of an entity and bring the value of its SSID onto the SSID field of the Basic Wireless Settings page. Click the Refresh button to update the site survey table. Cecilia_Fernandes 2016-04-21 09:27:42
--------------------------------------------
Can you please help clarify this content If this client is connecting to an AP, a brief disconnection will occur when you click on Site Survey. RF type Setting 2.4 GHz B G B/G Mixed G/N Mixed B/G/N Mixed N Only (2.4GHz) 5 GHz A A/N Mixed N Only (5GHz) Auto Channel Setting Enable Disable Factory Default B/G/N Mixed Description Only supports the IEEE 802.11b standard Only supports the IEEE 802.11g standard Supports IEEE 802.11b/g standards, but 802.11g might operate at a slower speed when 802.11b clients are on the network Supports IEEE 802.11g/n standards, but 802.11n might operate at a slower speed if 802.11g clients are on the network Supports IEEE 802.11b/g/n standards, but 802.11g/n might operate at a slower speed if 802.11b clients are on the network Only supports the 2.4 GHz IEEE 802.11n standard Only supports the IEEE 802.11a standard Supports IEEE 802.11a/n standards, but 802.11n may operate at a slower speed if 802.11a clients are on the network Only supports the 5 GHz IEEE 802.11n standard
?
Cecilia_Fernandes 2016-04-21 09:28:16
--------------------------------------------
We should specify the factory default or say "None". Description Enable this function to set the TAP to scan the 3 predefined channels for the least crowded channel and use it as the operating channel. Factory Default Disable 3-9 Tough AP TAP-213 Web Console Configuration Channel (for AP/Master mode only) Setting The available channels vary with the RF type setting Description The channel on which the TAP should operate. The TAP-213 plays the role of a wireless AP or Master here. Factory Default 6 (in B/G/N Mixed mode) Channel 2, 3 Setting The available channels vary with RF type Description These channels are candidate channels for auto channel selection. Factory Default N/A Channel Width (for any 11N RF type only) Setting 20 MHz 20/40 MHz Description Select the channel width. If you are not sure, use the 20/40 MHz (Auto) option Factory Default 20 MHz Channel bonding If you have selected 20/40 MHz only is the Channel Width setting, this setting will automatically set the channel based on your channel setting. SSID Setting Maximum of 31 characters Description The SSID of a client and the SSID of the AP must be identical for the client and AP to be able to communicate with each other. Factory Default MOXA Primary/Secondary/Third SSID (Client or Client-Router mode only) Setting The name of the primary, secondary, and tertiary SSID Description This is the profile setting that allows multiple SSID profiles to be stored on the TAP client so that the TAP can connect to any of the predefined SSID in order of priority (Primary >
Secondary > Third) Factory Default MOXA MOXA_secondary MOXA_third SSID broadcast (for AP/Master mode only) Setting Enable/ Disable Description Use this setting to specify if the SSID can be broadcast or not Enable Factory Default Client Isolation (for AP mode only) Client isolation is used to isolate the associated wireless clients in one or more APs. Isolated clients cannot communicate with each other, so the level of security is increased. Depending on the type of client isolation, you may also define the exception clients inside the isolation network. It can be used in server access. Cecilia_Fernandes 2016-04-21 09:28:46
--------------------------------------------
Can you please help clarify this content?
3-10 Tough AP TAP-213 Web Console Configuration Client Isolation Setting No isolation Isolated within the same AP Isolated within the same subnet Gateway Setting Gateway for client isolation function Netmask Setting Netmask for client isolation function Factory Default No isolation Description No isolation is applied. All clients associated with this AP will be isolated from each other. All clients in the specified subnet will be isolated from each other. The subnet is defined by the following two parameters:
Gateway and Netmask. Description This setting is used when you have selected the client isolation option, Isolated within the same subnet. Factory Default None Description This setting is used when you have selected the client isolation option, Isolated within the same subnet. Factory Default None Allowed subnet with TCP/UDP port The Allowed subnet with TCP/UDP port setting is used to define the subnets (or hosts) that are excluded when the Isolated within the same subnet option is selected. You can define up to eight subnets or hosts. Active Setting Enable/Disable the subnet rule Description This checkbox enables or disables a rule for Allowed subnet with TCP/UDP port. Factory Default Disable IP Setting The IP address of the allowed subnet Description The IP address for the allowed subnet definition. Hosts in this subnet can be accessed by other hosts or wireless clients in the same subnet. Factory Default None 3-11 Tough AP TAP-213 Web Console Configuration Netmask Setting The netmask for allowed subnet definition Protocol Setting The protocol for allowed subnet definition Port Description The netmask of the subnet definition. Hosts in this subnet can be accessed by other hosts or wireless clients in the same subnet. You can also define the exception host by entering 255.255.255.255 in this field. Factory Default None Description The protocol of the subnet definition. Hosts in this subnet can be accessed by other hosts or wireless clients in the same subnet. Factory Default All Setting The range of ports for the allowed subnet definition Description The port range of the subnet definition. Hosts in this subnet can be accessed by other hosts or wireless clients in the same subnet. Factory Default None The TAP-213-EU (for European frequency bands) only connects SSID-hidden APs for IEEE 802.11b/g/n channels. Auto Channel arguments You can configure the following parameters to set the scan timing intervals for the auto channel selection process. Use the default values unless specific channel selection intervals are required. Selection Interval Setting 0-1440 mins Monitoring Interval Setting 100-3000 ms Monitoring times Setting 1-10 Description The time between each channel re-selection. For example, if you set this field to 60 minutes, the AP scans for the least crossed channel every 60 minutes. Factory Default 60 Description The channel scanning duration. Factory Default 1000 Description The number of times the AP performs the channel scanning before selecting a clear channel to use. Factory Default 3 WLAN Security Settings The TAP-213 provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the TAP-213 by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE802.1X. 3-12 Tough AP TAP-213 Web Console Configuration The TAP-213 can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. Security mode Setting Open WEP WPA*
WPA2*
Description No authentication Static WEP is used WPA is used Fully supports IEEE802.11i with TKIP/AES + 802.1X Factory Default Open Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP According to the IEEE802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared (or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The TAP-213 provides 4 entities of WEP key settings that can be selected to use with Key index. The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit
(or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Setting Open Shared Key type Setting HEX Description Data encryption is enabled, but without authentication Data encryption and authentication are both enabled. Factory Default Open Description Specifies WEP keys in hex-decimal number form Factory Default HEX 3-13 Tough AP TAP-213 Web Console Configuration Specifies WEP keys in ASCII form Description Uses 40-bit secret keys with 24-bit initialization vector Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used Factory Default 64 bits Factory Default Open Description A string that can be used as a WEP seed for the RC4 encryption engine. Factory Default None ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Setting ASCII type:
64 bits: 5 chars 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The TAP-213 also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. WPA type Setting Personal Enterprise Encryption method Setting TKIP AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default TKIP
*This option is available in AP/Master mode only, and does not support AES-enabled clients. 3-14 Tough AP TAP-213 Web Console Configuration Passphrase Setting 8 to 63 characters Description Master key to generate keys for encryption and decryption Factory Default None Key renewal (for AP/Master mode only) Setting 60 to 86400 seconds
(1 minute to 1 day) Description Specifies the time period of group key renewal Factory Default 3600 (seconds) The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. WPA/WPA2-Enterprise (for AP/Master mode) By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or passphrases. WPA type Setting Personal Enterprise Encryption method Setting TKIP AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default TKIP
*This option is available in AP/Master mode only, and cannot support AES-enabled clients. Primary/Secondary RADIUS server IP Setting The IP address of RADIUS server Description Specifies the delegated RADIUS server for EAP Factory Default None Primary/Secondary RADIUS port Description Setting Port number Specifies the port number of the delegated RADIUS server Factory Default 1812 3-15 Tough AP TAP-213 Web Console Configuration Primary/ Secondary RADIUS shared key Setting Max. of 31 characters Description The secret key shared between AP and RADIUS server Factory Default None Key renewal Setting 60 to 86400 seconds
(1 minute to 1 year) Description Specifies the time period of group key renewal Factory Default 3600 (seconds) WPA/WPA2-Enterprise (for Client/Slave mode) When used as a client, the TAP-213 can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP AES EAP Protocol Setting TLS TTLS PEAP Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Description Specifies Transport Layer Security protocol Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Factory Default TKIP Factory Default TLS Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections. EAP-TLS TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use Basic Wireless Settings WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. 3-16 Tough AP TAP-213 Web Console Configuration You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel (EAP-TLS for example), and validate whether the network is trustworthy with digital certificates on the authentication server. This step establishes a tunnel that protects the next step (or inner authentication), and consequently is sometimes referred to as outer authentication. The TLS tunnel is then used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The TAP-213 provides some non-cryptographic EAP methods, including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS and PEAP. Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, with the true user name only shown through the encrypted channel. Keep in mind that not all client software supports anonymous alteration. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. TTL Inner Authentication Setting PAP CHAP MS-CHAP MS-CHAP-V2 Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used Microsoft CHAP version 2 is used Anonymous Setting Max. of 31 characters Description A distinct name used for outer authentication User name & Password Setting Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None 3-17 Tough AP TAP-213 Web Console Configuration PEAP There are a few differences in the TTLS and PEAP inner authentication procedures. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The TAP-213 provides MS-CHAP-V2 merely as an EAP method for inner authentication. Inner EAP protocol Setting MS-CHAP-V2 Anonymous Setting Max. of 31 characters Description Microsoft CHAP version 2 is used Description A distinct name used for outer authentication User name & Password Setting Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate Setting Description 3-18 Factory Default Tough AP TAP-213 Auto Available rates The TAP-213 senses and adjusts the data rate automatically Users can manually select a target transmission data rate Multicast Rate (for AP/Master mode only) Setting Multicast rate
(6M ~ 54M) Description You can set a fixed multicast rate for the transmission of broadcast and multicast packets on a per-radio basis. This parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configured rate. Web Console Configuration Auto Factory Default 6M Guarding Interval Setting Guarding Interval Description Guarding interval is used to ensure that distinct transmissions do not interfere with one another. You can select the guarding interval manually for Wireless-N connections. The two options are Short (400ns) and Long (800ns). Factory Default 800ns. Transmission Power for 2.4 GHz Setting Transmission Power Description Specifies transmission power for the radio in the unit of dBm. Transmission Power for 5 GHz Setting Auto Description Specifies transmission power for the radio in the unit of dBm. Beacon Interval (for AP/Master mode only) Setting Beacon Interval
(40 to 1000 ms) Description Indicates the frequency interval of the beacon DTIM Interval (for AP/Master mode only) Setting Data Beacon Rate
(1 to 15) Description Indicates how often the TAP-213 sends out a Delivery Traffic Indication Message Fragmentation threshold Setting Fragment Length
(256 to 2346) Description Specifies the maximum size a data packet before splitting and creating another new packet Factory Default 10dBm Factory Default 10dBm Factory Default 100 (ms) Factory Default 1 Factory Default 2346 RTS threshold Setting RTS/CTS Threshold
(256 to 2346) Description Determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication Factory Default 2346 NOTE Transmission power indicates the maximum value of transmission power which the user plans. However, the real transmitted power depends on the radio module and some facts, such as country, regulatory limitations and data rate. Please check the Transmission power in Status > Wireless Status for a real and updated value of transmission power, which the TAP is currently using. You can refer to the related glossaries in the reference section for detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. 3-19 Tough AP TAP-213 Noise protection Setting Enable/Disable WMM Setting Enable/Disable Web Console Configuration Description Adjusts the interference coping capability of the wireless signal. This option should be enabled for communication distance under 500 meters, and should be disabled for communication distances over 500 meters. Factory Default Enable Description WMM is a QoS standard for WLAN traffic. Voice and video data will be given priority bandwidth when enabled with WMM supported wireless clients. Factory Default Disable Full 11a channel support Setting Enable/Disable Description Full 11a channel support allows users to select one channel from 802.11a, including channels in licensed and unlicensed bands. Factory Default Disable Turbo Roaming (for Client mode only) Setting Enable/ Disable Description Moxas Turbo Roaming can enable rapid handover when the TAP-213, as a client, roams among a group of APs. Factory Default Disable When Turbo Roaming is enabled, the RF type, AP alive check, and Scan channels parameters will be shown as follows. The RF type shows the current RF type that this client is using. The AP alive check parameter will check if the AP connection is still available. When this function is enabled, a check will be done every 10 ms. You can set up Scan channels for the APs among which this client is going to roam. There are three Scan channels available. Note that the Scan channels may need to be modified when the RF type is changed. (For example, channel 36 is not available in B, G, N or B/G/N Mix mode.) Traffic Control Setting Enable/Disable Description Enable this function to limit the bandwidth for a client device with the specified IP address settings. Enter maximum bandwidth (80 to 10240 kbps) to limit the wireless bandwidth allocated to clients to prevent a client from hoarding the wireless bandwidth. Factory Default Disable 3-20 Tough AP TAP-213 Web Console Configuration WLAN Certification Settings (for EAP-TLS in Client/Slave mode only) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The TAP-213 can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current Status displays information for the current WLAN certificate, which has been imported into the TAP-213. Nothing will be shown if a certificate is not available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired You can import a new WLAN certificate in Import WLAN Certificate by following these steps, in order:
1. Input the corresponding password (or key) in the Certificate private password field and then click Submit to set the password. 2. The password will be displayed in the Certificate private password field. Click on the Browse button in Select certificate/key file and select the certificate file. 3. Click Upload Certificate File to import the certificate file. If the import succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. The WLAN certificate will remain after the TAP-213 reboots. Even though it is expired, it can still be seen on the Current Certificate. 3-21 Tough AP TAP-213 Web Console Configuration Advanced Settings Several advanced functions are available to increase the functionality of your TAP-213 and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer 2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the TAP-213 can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your TAP series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Secure network restricts members to resources on their own VLAN Clients roam without compromising security Improve network performance and reduce latency Increase security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. 3-22 Tough AP TAP-213 Web Console Configuration Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. Configuring Virtual LAN VLAN Settings To configure the TAPs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Description Set the management VLAN of this TAP. Factory Default 1 Port Type LAN WLAN Description This port is the LAN port on the TAP. This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Trunk Port Yes Port PVID Setting VLAN ID ranging from 1 to 4094 Description Set the ports VLAN ID for devices that connect to the port. The port can be a LAN port or WLAN ports. Factory Default 1 3-23 Tough AP TAP-213 Web Console Configuration VLAN Tagged Setting A comma-separated list of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. Description Specify which VLANs can communicate with this specific VLAN. Factory Default
(Empty) The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. DHCP Server (for AP mode only) DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The TAP-213 can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The TAP-213 provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server Setting Enable Disable Description Enables TAP-213 as a DHCP server Disable DHCP server function 3-24 Factory Default Disable Tough AP TAP-213 Web Console Configuration Default gateway Setting IP address of a default gateway Subnet mask Setting subnet mask Description The IP address of the router that connects to an outside network Factory Default None Description Identifies the type of sub-network (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network) Factory Default None Primary/ Secondary DNS server Setting IP address of Primary/
Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can use URL as well. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default None Start IP address Setting IP address Description Indicates the IP address which TAP-213 can start assigning Factory Default None Maximum number of users Setting 1 999 Description Specifies how many IP address can be assigned continuously Client lease time Setting 1 10 days Packet Filters Description The lease time for which an IP address is assigned. The IP address may go expired after the lease time is reached. Factory Default None Factory Default 10 (days) The TAP-213 includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The TAP-213s MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The TAP-213 provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Description Enables MAC filter Disables MAC filter 3-25 Factory Default Disable Tough AP TAP-213 Web Console Configuration Policy Setting Accept Drop ATTENTION Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Drop Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied IP Protocol Filter The TAP-213s IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The TAP-213 provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied Factory Default ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. 3-26 Tough AP TAP-213 Web Console Configuration TCP/UDP Port Filter The TAP-213s TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The TAP-213 provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger than the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables TCP/UDP port filter Disables TCP/UDP port filter Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Disable Factory Default Drop ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied RSTP Settings (for AP/Master mode only) TAP-213 supports IEEE802.1D Spanning Tree Protocol and IEEE802.1w Rapid STP standards. In addition to eliminating unexpected path looping, STP/RSTP can provide a backup path recovery if a wired/ wireless path fails accidentally. The reliability and availability can increase because this fail-over function. TAP-213s STP/RSTP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every TAP-213 connected to your network. If TAP-213 plays a Client role, which is connected to a device (PLC, RTU, etc.) as opposed to network switch equipment, it is not necessary to enable STP/RSTP. The reason is that it will cause unnecessary negotiation. TAP-213s support STP/RSTP in AP mode only. 3-27 Tough AP TAP-213 Web Console Configuration The following figures indicate which Spanning Tree Protocol parameters can be configured. A more detailed explanation of each parameter is given below the figure. RSTP status This field will appear only when selected to operate STP/RSTP. It indicates whether this TAP-213 is the Root of the Spanning Tree (the root is determined automatically) or not. Bridge priority Setting Numerical value selected by user Hello time Setting Numerical value input by user
(1 10 seconds) Forwarding delay Setting Numerical value input by user
(4 30 seconds) Max. age Setting Numerical value input by user
(6 40 seconds) Enable RSTP Setting Enable/ disable Port priority Setting Numerical value selected by user Description You can increase the bridge priority by selecting a lower number. A higher bridge priority brings a greater chance of being established as the root of the Spanning Tree topology. Factory Default 32768 Description The root of the Spanning Tree topology periodically sends out a hello message to other devices on the network to check if the topology is healthy. Hello time indicates how often the root sends hello messages. Factory Default 2 (seconds) Description The amount of time this device waits before checking to see if it should change to a different topology. Factory Default 15 (seconds) Description As a non-root role, if the device has not received a hello message from the root longer than Max. age, it will reconfigure itself as a root. Once two or more devices on the network are recognized as a root, the devices will renegotiate to set up a new Spanning Tree topology. Factory Default 20 (seconds) Description Enables or disables the port as a node on the Spanning Tree topology. Factory Default Disable
(unchecked) Description Increase this ports priority as a node on the Spanning Tree topology by inputting a lower number. Factory Default 128 3-28 Tough AP TAP-213 Web Console Configuration Port cost Setting Enable/ Disable Edge port Setting Checked/ unchecked Description Input a higher cost to indicate that this port is less suitable as a node for the Spanning Tree topology Factory Default 2000000 Description Sets a port, which no BPDU expectedly goes through, as an edge port Factory Default unchecked, except AP port We recommend you set an edge port for the port, which is connected to a non-STP/RSTP sub-network or an end device (PLC, RTU, etc.) as opposed to network equipment. This can prevent unnecessary waiting and negotiation of STP/RSTP protocol, and accelerate system initialization. When an edge port receives BPDUs, it can still function as an STP/RSTP port and start negotiation. Setting an edge port is different from disabling STP/RSTP on a port. If you disable STP/RSTP, a port will not deal with STP/RSTP BPDUs at all. Port Status Port Status indicates the current Spanning Tree status of this port. Use Forwarding for normal transmission, or Blocking to block transmission. SNMP Agent The TAP-213 supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The TAP-213s MIB can be found in the software CD and supports reading the attributes via SNMP. (Only get method is supported.) SNMP security modes and security levels supported by the TAP-213 are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Protocol Version SNMP V1, V2c Setting on UI web page V1, V2c Read Community V1, V2c Write/Read Community Authentication Type Community string No Data Encryption Method Use a community string match for authentication Community string No Use a community string match for authentication SNMP V3 No-Auth No No No MD5 or SHA Authentication based on MD5 or SHA MD5 or SHA Authentication based on MD5 or SHA Data encryption key 3-29 Use account with admin or user to access objects Provides authentication based on HMAC-MD5, or HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-MD5 or HMAC-SHA algorithms, and data encryption key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. Tough AP TAP-213 Web Console Configuration The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below the following figure. Enable Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Remote Management Setting Enable Disable Description Allow remote management via SNMP agent Disallow remote management via SNMP agent Read community (for V1, V2c) Setting V1, V2c Read Community Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Factory Default Disable Factory Default Disable Factory Default public Write community (for V1, V2c) Setting V1, V2c Read /Write Community Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. Factory Default private SNMP agent version Setting V1, V2c, V3, or V1, V2c, or V3 only Description Select the SNMP protocol version used to manage the switch. Factory Default V1, V2c Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Use admin account to access objects. No authentication Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Factory Default No Auth SHA 3-30 Tough AP TAP-213 Web Console Configuration Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Description No data encryption DES-based data encryption AES-based data encryption Factory Default Disable Private key A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also known as OID. This is the TAP-213s enterprise value. It is fixed. Link Fault Pass-Through (for Client/Slave mode only) This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, TAP will try to connect to AP. If wireless is disconnected, TAP restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, TAP will try to recover the Ethernet link. System log will indicate the link fault pass through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Enables Link Fault Pass-Through Disables Link Fault Pass-Through NAT/Port Forwarding Factory Default Disable Set the NAT/Port Forwarding settings to allow the TAP to route specified outgoing and incoming traffic to other subnets. You can select the port forwarding protocol and enter the WAN port whose traffic the TAP forwards to a device with the defined LAN port and IP address. Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or 3-31 Tough AP TAP-213 Web Console Configuration clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the TAP-213 supports different approaches to warn engineers automatically, such as SNMP trap, e-mail, and relay output. It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output. System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. System-related events System restart (warm start) Network-related events LAN link on LAN link off Event is triggered when The TAP-213 is rebooted, such as when its settings are changed
(IP address, subnet mask, etc.). Event is triggered when The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. The TAP-213 is associated with an AP. The TAP-213 is disassociated from an AP. Event is triggered when A configuration item has been changed. Client joined/ left
(for AP/Master mode) WLAN connected to AP
(for Client/Slave mode) WLAN disconnected
(for Client/Slave mode) Config-related events Configuration Changed Configuration file import via Web Console The configuration file is imported to the TAP-213. Console authentication failure Firmware upgraded Power events Power 1/2 transition (On -> Off) PoE transition (On -> Off) Power 1/2 transition (Off -> On) PoE transition (Off -> On) DI events DI1/2 transition (On -> Off) DI1/2 transition (Off -> On) An incorrect password is entered. The TAP-213s firmware is updated. Event is triggered when The TAP-213 is powered down in PWR1/2. The TAP-213 is powered down in PoE. The TAP-213 is powered via PWR1/2. The TAP-213 is powered via PoE. Event is triggered when Digital Input 1/2 is triggered by on to off transition Digital Input 1/2 is triggered by off to on transition 3-32 Tough AP TAP-213 Syslog Web Console Configuration This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detail information for the grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Syslog server 1/ 2/ 3 Setting IP address Syslog port Setting Port destination
(1 to 65535) Description Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server Factory Default None Description Enter the UDP port of the corresponding Syslog server Factory Default 514 3-33 Tough AP TAP-213 E-mail Web Console Configuration E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the TAP-213. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses work well. More detailed explanations about these parameters are given after the following figure. Mail server (SMTP) Setting IP address Description The IP Address of your email server. Factory Default None 3-34 Tough AP TAP-213 Web Console Configuration User name & Password Setting Description User name and password used in the SMTP server Factory Default None From e-mail address Setting Max. 63 characters Description Enter the administrators e-mail address which will be shown in the From field of a warning e-mail. Factory Default None To E-mail address 1/ 2/ 3/ 4 Setting Max. 63 characters Description Enter the receivers e-mail addresses. Factory Default None Relay The TAP-213 has one relay output, which consists of 2 terminal block contacts on the TAP-213s top panel. These relay contacts are used to indicate user-configured events and system failure. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the TAP-213 is not powered. Relay Event Types You can check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found in the System log Event Types table on page 3-31. 3-35 Tough AP TAP-213 Trap Web Console Configuration Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. Trap Event Types SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 1st / 2nd Trap version Setting V1 V2 Description SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 Factory Default V1 3-36 Tough AP TAP-213 Web Console Configuration 1st / 2nd Trap server IP/name Setting IP address or host name Description Enter the IP address or name of the trap server used by your network. Factory Default None 1st / 2nd Trap community Setting Max. of 31 characters Use a community string match with a maximum of 31 Description Factory Default alert characters for authentication. Status Wireless Status The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Certain values for 802.11 info may not show up due to different operation modes. As a result, Current BSSID and Signal strength are not available in AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the TAP-213 in Client, Slave, or ACC mode. The transmission power indicated is the current transmission power being updated periodically. Associated Client List (for AP/Master mode only) Associated Client List shows all the clients that are currently associated to a particular TAP-213. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. 3-37 Tough AP TAP-213 Web Console Configuration DHCP Client List (for AP mode only) The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. You can press Select all button to select all content in the list for further editing. System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-38 Tough AP TAP-213 Relay Status Web Console Configuration The status of user-configurable events can be found under Relay Status. The status will refresh every 5 seconds if the Auto refresh box is checked. If an event is triggered, it will be noted on this list. System administrators can click Acknowledge Event when he has acknowledged the event and addressed it. DI and Power Status The status of power inputs and digital inputs is shown on this web page. The status will refresh every 5 seconds if the Auto refresh box is checked. RSTP Status The following figures indicate the status which Spanning Tree Protocol parameters have been configured. 3-39 Tough AP TAP-213 Maintenance Web Console Configuration Maintenance functions provide the administrator with tools to manage the TAP-213 and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. Firmware Upgrade The TAP-213 can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. 3-40 Tough AP TAP-213 Web Console Configuration Before running a firmware upgrade, make sure the TAP-213 is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the TAP-213 will reboot itself. When upgrading your firmware, the TAP-213s other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your TAP-213. Config Import/Export You can back up and restore the TAP-213s configuration with Config Import and Config Export functions. In the Config Import section, click Browse to specify the configuration file and click on the Config Import button to begin importing the configuration. You can also back up or restore the ABC-02 (HW Rev. 1.1 support only) configuration with Config Import Export. Cecilia_Fernandes 2016-04-21 09:30:26
--------------------------------------------
Is this the latest information?
To download the configuration to the TAP:
1. Turn off the TAP. 2. Plug in the ABC-02 to the TAPs RS-232 console. 3. Turn on TAP. 4. TAP will detect ABC-02 during the boot up process, and download the configuration from the ABC-01 to the TAP automatically. Once the configuration downloads and if configuration format is correct, the TAP will emit three short beeps, then continue the boot up. 5. Once the TAP has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. 3-41 Tough AP TAP-213 Web Console Configuration SNMP MIB file for TAP-213 is embedded in the device. To export the MIB file, simply click on the MIB Export button and save it to your local drive. Default Config Import You can use the Default Config Import screen to import a default configuration file on the TAP. This default configuration file is used when you reset the TAP to the defaults. Load Factory Default Use this function to reset the TAP-213 and roll all settings back to the factory or customized (using imported configuration file in the Default Config Import screen) default values. You can also reset the hardware by pressing the reset button on the top panel of the TAP-213. Password You can change the administration password for each of the TAP-213s console managers by using the Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password root, and remember to change the administration password regularly. 3-42 Tough AP TAP-213 Misc. Settings Web Console Configuration Additional settings to help you manage your TAP-213, are available on this page. Reset button Setting Always enable Disable restore to default function after 60 sec Booting beeper Setting Enable/Disable Web auto-logout time Setting 5 to 120 min. Description The TAP-213s Reset button works normally. The TAP-213s reset to default function will be inactive 60 seconds after the TAP-213 finishes booting up. Factory Default Always enable Description Disable this function to turn off the beeper when the TAP is booting up. Factory Default Enable Description This sets the inactivity timeout. When the web console is idle for the specified time, the system automatically logs out the user. Factory Default 5 Save Configuration The following figure shows how the TAP-213 stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the TAP-213 is shutdown or rebooted unless they are y. Because the TAP-213 starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the TAP-213. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. 3-43 Tough AP TAP-213 Web Console Configuration Restart If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the TAP-213 directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the TAP-213. If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. You will not be able to run any of the TAP-213s functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. 3-44 4 Software Installation and Configuration The following topics are covered in this chapter:
Overview Wireless Search Utility Installing Wireless Search Utility Configuring Wireless Search Utility Tough AP TAP-213 Overview Software Installation and Configuration The Documentation & Software CD included with your TAP-213 is designed to make the installation and configuration procedure easy and straightforward. This auto-run CD includes TAP Search Utility (to broadcast search for all TAPs accessible over the network), the TAP-213 Users Manual, and Quick Installation Guide. Cecilia_Fernandes 2016-04-21 09:31:15
--------------------------------------------
Please confirm if we have removed the software CD. If yes, then I need to rewrite this content. Wireless Search Utility Installing Wireless Search Utility Click the INSTALL UTILITY button in the TAP Installation CD auto-run window to install Wireless Search Utility. Once the program starts running, click Yes to proceed. 1. Click Next when the Welcome screen opens to proceed with the installation. Cecilia_Fernandes 2016-04-21 09:31:20
--------------------------------------------
Please confirm if we have removed the software CD. If yes, then I need to rewrite this content. 4-2 Tough AP TAP-213 Software Installation and Configuration 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 3. Click Next to create the programs shortcut files to the default directory, or click Browse to select an alternate location. 4-3 Tough AP TAP-213 Software Installation and Configuration 4. Click Next to select additional tasks. 5. Click Next to proceed with the installation. The installer then displays a summary of the installation options. 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 4-4 Tough AP TAP-213 Software Installation and Configuration 7. Click Finish to complete the installation of Wireless Search Utility. Configuring Wireless Search Utility The Broadcast Search function is used to locate all TAP-213 APs that are connected to the same LAN as your computer. After locating a TAP-213, you will be able to change its IP address. Since the Broadcast Search function searches by TCP packet and not IP address, it doesnt matter if the TAP-213 is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the Wireless Search Utility program. When the Login page appears, select the Device Search only option to search for TAPs and to view each TAPs configuration. Select the Device management option to assign IPs, upgrade firmware, and locate devices. 4-5 Tough AP TAP-213 Software Installation and Configuration 2. Open the Wireless Search Utility and then click the Search icon. 3. The Searching window indicates the progress of the search. When the search is complete, all TAPs that were located will be displayed in the Wireless Search Utility window. 4-6 Tough AP TAP-213 Software Installation and Configuration 4. Click Locate to cause the selected device to beep. 5. Make sure your TAP is unlocked before using the search utilitys icons setting. The TAP will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. 6. Go to Tools Login Options to manage and unlock additional TAPs. 4-7 Tough AP TAP-213 Software Installation and Configuration 7. Use the scroll down list to select the MAC addresses of those TAPs you would like to manage, and then click Add. Key in the password for the TAP device and then click OK to save. If you return to the search page and search for the TAP again, you will find that the TAP will unlock automatically. ATTENTION For security purposes, we suggest you can change the wireless search utility login password instead of using the default. To modify the configuration of the highlighted TAP, click on the Web icon to open the web console. This will take you to the web console, where you can make all configuration changes. Refer to Chapter 3, Using the Web Console, for information on how to use the web console. Click on Telnet if you would like to use telnet to configure your TAPs. 4-8 Tough AP TAP-213 Software Installation and Configuration Click Assign IP to change the IP setting. The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time elapsed between retries. 4-9 Tough AP TAP-213 Software Installation and Configuration Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the Wireless Search Utility. 4-10 5 Other Console Considerations This chapter explains how to access the TAP-213 for the first time. In addition to HTTP access, there are four ways to access TAP-213: serial console, Telnet console, SSH console, and HTTPS console. The serial console connection method, which requires using a short serial cable to connect the TAP-213 to a PCs COM port, can be used if you do not know the TAP-213s IP address. The other consoles can be used to access the TAP-213 over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
USB Console Configuration (115200, None, 8, 1, VT100) Configuration by Telnet and SSH Consoles Configuration by Web Browser with HTTPS/SSL Disabling Telnet and Browser Access Tough AP TAP-213 Other Console Considerations USB Console Configuration (115200, None, 8, 1, VT100) The serial console connection method, which requires using a short serial cable to connect the TAP-213 to a PCs COM port, can be used if you do not know the TAP-213s IP address. It is also convenient to use serial console configurations when you cannot access the TAP-213 over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. We recommend using Moxa PComm (Lite) Terminal Emulator, which can be downloaded free of charge from Moxas website. Before running PComm Terminal Emulator, use an RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the TAP-213s USB console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the RS-232 console utility. 1. From the Windows desktop, open the Start menu and start PComm Terminal Emulator in the PComm
(Lite) group. 2. Select Open under Port Manager to open a new connection. 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue. 5-2 Tough AP TAP-213 Other Console Considerations 4. The Console login screen will appear. Log into the USB console with the login name (default: admin) and password (default: root, if no new password is set). 5. The TAP-213s device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. ATTENTION If you unplug the USB cable or trigger DTR, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. 5-3 Tough AP TAP-213 Other Console Considerations Configuration by Telnet and SSH Consoles You may use Telnet or SSH client to access the TAP-213 and manage the console over a network. To access the TAP-213s functions over the network from a PC host that is connected to the same LAN as the TAP-213, you need to make sure that the PC host and the TAP-213 are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. NOTE The TAP-213s default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, run Start Run, and then use Telnet to access the TAP-213s IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). 2. When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the TAP-213s IP address, specifying 22 for the SSH connection port. 3. The Console login screen will appear. Please refer to the previous paragraph RS-232 Console Configuration and for login and administration. 5-4 Tough AP TAP-213 Other Console Considerations Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the TAP-213 supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the TAP-213s web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<TAP-213s IP address> in the address field. Press Enter to establish the connection. 2. Warning messages will pop out to warn users that the security certificate was issued by a company they have not chosen to trust. 3. Select Yes to accept the certificate issued by Moxa IW and then enter the TAP-213s web browser interface secured via HTTPS/SSL. (You can see the protocol in URL is https.) Then you can use the menu tree on the left side of the window to open the function pages to access each of TAP-213s functions. 5-5 Tough AP TAP-213 Other Console Considerations Disabling Telnet and Browser Access If you are connecting the TAP-213 to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-6 A References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you administer your TAP-213s and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP Tough AP TAP-213 Beacon References A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports (AP, Master, Slave, and ACC modes) of the same TAP-213. This feature is particularly helpful when the TAP-213 connects to older equipment, such as legacy switches. A-2 Tough AP TAP-213 Differences between RSTP and STP References RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. A-3 B Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery DoC (Declaration of Conformity) Federal Communication Commission Interference Statement R&TTE Compliance Statement Tough AP TAP-213 Supporting Information Firmware Recovery When the LEDs of FAULT, Signal Strength, CLIENT, BRIDGE and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The TAP-213 is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the TAP-213s ES-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. Press Ctrl - C and the following message will appear. Enter 2 to change the network setting. Specify where the TAP-213s firmware file on the TFTP server and press y to write the settings into flash memory. TAP-213 restarts, and the Press Ctrl-C to enter Firmware Recovery Process message will reappear. Press Ctrl-C to enter the menu and select 1 to start the firmware upgrade process. B-2 Tough AP TAP-213 Supporting Information Select 0 in the sub-menu to load the firmware image via LAN, and then enter the file name of the firmware to start the firmware recovery. DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Increase the separation between the equipment and receiver. Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator & your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC 15.407(e): Within the 5.15-5.25 GHz band, U-NII devices will be restricted to indoor operations to reduce any potential for harmful interference to co-channel MSS operations. B-3 Tough AP TAP-213 R&TTE Compliance Statement Supporting Information Moxa declares that the apparatus TAP-213 complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. Cecilia_Fernandes 2016-04-21 09:33:08
--------------------------------------------
I am not sure if this is a stray character of part of the content. please confirm B-4
various | TAP-213 UM e1 | Users Manual | 3.76 MiB | February 05 2017 |
Moxa Tough AP TAP-213 Users Manual Edition 1.0, February 2017 www.moxa.com/product 2017 Moxa Inc. All rights reserved. Moxa Tough AP TAP-213 Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2017 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free:
Tel:
Fax:
Moxa Europe Tel:
Fax:
Moxa India Tel:
Fax:
1-888-669-2872
+1-714-528-6777
+1-714-528-6778
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99
+91-80-4172-9088
+91-80-4132-1045 800-820-5036
+86-21-5258-9955
+86-21-5258-5505 Moxa China (Shanghai office) Toll-free:
Tel:
Fax:
Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents 1. Introduction .................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................. 1-2 Product Specifications .......................................................................................................................... 1-3 Functional Design ............................................................................................................................... 1-7 LAN Port..................................................................................................................................... 1-7 LED Indicators............................................................................................................................. 1-7 Beeper ....................................................................................................................................... 1-9 Reset Button ............................................................................................................................... 1-9 2. Getting Started ................................................................................................................................ 2-1 First-Time Installation and Configuration ................................................................................................ 2-2 Communication Testing ....................................................................................................................... 2-3 Function Map...................................................................................................................................... 2-5 3. Web Console Configuration.............................................................................................................. 3-1 Web Browser Configuration .................................................................................................................. 3-2 Overview ........................................................................................................................................... 3-3 Basic Settings..................................................................................................................................... 3-4 System Info Settings ................................................................................................................... 3-4 Network Settings ......................................................................................................................... 3-5 Port Settings ............................................................................................................................... 3-7 Time Settings .............................................................................................................................. 3-8 Wireless Settings ................................................................................................................................ 3-9 Operation Mode .................................................................................................................................. 3-9 Basic Wireless Settings (Multiple SSID) ................................................................................................ 3-10 WLAN Security Settings .............................................................................................................. 3-13 Advanced Wireless Settings ........................................................................................................ 3-20 WLAN Certification Settings (for EAP-TLS in Client mode only) ......................................................... 3-26 WAC Settings (AP mode only) ..................................................................................................... 3-27 Advanced Settings ............................................................................................................................ 3-27 Using Virtual LAN ...................................................................................................................... 3-27 Configuring Virtual LAN .............................................................................................................. 3-29 DHCP Server ............................................................................................................................. 3-30 Packet Filters ............................................................................................................................ 3-31 Static Route (For Client-Router mode only) ................................................................................... 3-33 NAT Settings/Port Forwarding (For Client-Router mode only) ........................................................... 3-34 SNMP Agent .............................................................................................................................. 3-35 Mobile IP Settings ...................................................................................................................... 3-37 Link Fault Pass-Through (for Client mode only) .............................................................................. 3-39 Auto Warning Settings ....................................................................................................................... 3-39 System Log .............................................................................................................................. 3-39 Syslog...................................................................................................................................... 3-40 E-mail ...................................................................................................................................... 3-41 Traps ....................................................................................................................................... 3-42 Status ............................................................................................................................................. 3-44 Wireless Status ......................................................................................................................... 3-44 Associated Client List (for AP mode only) ...................................................................................... 3-44 DHCP Client List ........................................................................................................................ 3-45 System Log .............................................................................................................................. 3-45 Power Status ............................................................................................................................ 3-46 AeroLink Protection Status (For Client Mode Only).......................................................................... 3-46 Routing Table............................................................................................................................ 3-46 LAN Status ............................................................................................................................... 3-47 Maintenance ..................................................................................................................................... 3-47 Console Settings........................................................................................................................ 3-47 Ping ......................................................................................................................................... 3-47 Firmware Upgrade ..................................................................................................................... 3-48 Config Import/Export ................................................................................................................. 3-48 Load Factory Default .................................................................................................................. 3-50 Username/Password .................................................................................................................. 3-50 Locate Device ........................................................................................................................... 3-50 Misc. Settings ........................................................................................................................... 3-51 Save Configuration ............................................................................................................................ 3-51 Restart ............................................................................................................................................ 3-52 Logout............................................................................................................................................. 3-52 4. Software Installation and Configuration .......................................................................................... 4-1 Overview ........................................................................................................................................... 4-2 Wireless Search Utility ......................................................................................................................... 4-2 Installing Wireless Search Utility .................................................................................................... 4-2 Configuring Wireless Search Utility ................................................................................................. 4-5 5. Using Other Consoles ........................................................................................................................ 5-1 USB Console Configuration (115200, None, 8, 1, VT100) ......................................................................... 5-2 Configuration via Telnet and SSH Consoles ............................................................................................. 5-4 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-5 Disabling Telnet and Browser Access ..................................................................................................... 5-6 A. References ........................................................................................................................................ A-1 Beacon ..............................................................................................................................................A-2 DTIM.................................................................................................................................................A-2 Fragment...........................................................................................................................................A-2 RTS Threshold ....................................................................................................................................A-2 STP and RSTP ....................................................................................................................................A-2 The STP/RSTP Concept ................................................................................................................A-2 Differences between RSTP and STP................................................................................................A-3 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery .............................................................................................................................B-2 DoC (Declaration of Conformity) ...........................................................................................................B-3 Federal Communication Commission Interference Statement ............................................................B-3 Antenna Gain and RF Radiated Power ............................................................................................B-4 R&TTE Compliance Statement .......................................................................................................B-6 1 Introduction The TAP-213 outdoor wireless AP/client is the ideal ruggedized wireless solution for railway onboard train-to-ground applications such as CCTV and CBTC communications. It can provide speeds of up to 300 Mbps with IEEE 802.11n technology. The TAP-213s dust-tight/weatherproof design is IP68-rated, and it can operate at temperatures ranging from -40 to 75C, allowing you to extend wireless networks to outdoor locations and critical environments. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LAN Port LED Indicators Beeper Reset Button Tough AP TAP-213 Overview Introduction The TAP-213 is 802.11n compliant to deliver speed, range, and reliability to support even the most bandwidth-intensive applications. The 802.11n standard incorporates multiple technologies, including MIMO
(Multi-In, Multi-Out) Spatial Multiplexing, multiple channels (5, 10, 20 and 40 MHz), and dual bands (2.4 GHz and 5 GHz) to achieve high speeds, while still being able to communicate with legacy 802.11a/b/g devices. The TAP-213 is compliant with the EN 50155 standard that covers operating temperature range, power input voltage, surge, ESD, and vibration. The TAP can be easily mounted on to a wall, DIN rail or in distribution boxes. Its wide operating temperature range, IP68-rated housing with LED indicators, and the DIN-rail mounting capability make the TAP-213 a convenient yet reliable solution for all types of industrial wireless applications. Package Checklist Moxas TAP-213 is shipped with the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. 1 TAP-213 1 wall-mounting kit, which includes 2 plates 1 plastic protective cap for LAN-1 X-coded port 3 metal protective caps for LAN-2 fiber port, USB console port and ABC-02 USB storage port 1 metal M12 male 4-pin A-coded screw-type crimp circular connector for power 2 antennas which support both 2.4 GHz /5 GHz Quick Installation Guide (printed) Product warranty statement NOTE We support WiFi client mode, one-to-many Access Point mode, and one-to-one Wireless Bridge mode. For devices, depending on the type of antenna used (point-to-point or point-to-multipoint), the target power is fixed by the manufacturer prior to shipment, the antenna is delivered with the device and is configured by a professional installer, so that the radio does not exceed the EIRP allowed per regulatory domain. The following sections contain the FCC rules to adapt the product transmit power to the antenna used. Point-to-Multipoint No. Manufacturer 1 KINSUN Part No. ANT-WDB-O-2 BK Antenna Type Dipole ANT-WDB-ANM-0502 Dipole MAX Gain 2.9dBi for 2.4 GHz 2.34dBi for 5GHz 4.62dBi for 2.4 GHz 1.41dBi for 5GHz Antenna Gain No. Manufacturer 1 MOXA Point-to-Point:
KINSUN 2 Part No. ANT-WDB-PNF-1518 Antenna Type Directional panel MAX Gain 15dBi for 2.4 GHz 18dBi for 5GHz 1-2 Tough AP TAP-213 Product Features Introduction Designed specifically for the wireless communication requirements in train-to-ground communication (E.g., CBTC, CCTV) and rail onboard communication systems. IEEE802.11a/b/g/n compliant Compliant with EN 50155 Three-in-one design (AP/Bridge/Client) Advanced wireless security 64-bit and 128-bit WEP/WPA/WPA2 SSID Hiding/IEEE 802.1X/RADIUS Packet access control & filtering STP/RSTP support for network system redundancy Long-distance transmission support Turbo Roaming enables rapid handover (Client mode) ABC-02 for configuration import/export USB console management Wide -40 to 75C operating temperature range 24 to 110 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) Wall mounting or DIN-rail mounting IP68-rated high-strength metal housing 1-3 Tough AP TAP-213 Introduction Product Specifications WLAN Interface Standards:
IEEE 802.11a/b/g/n for Wireless LAN IEEE 802.11i for Wireless Security IEEE 802.3 for 10BaseT IEEE 802.3u for 100BaseT(X) IEEE 802.3ab for 1000BaseT IEEE 802.3af for Power-over-Ethernet IEEE 802.1D for Spanning Tree Protocol IEEE 802.1w for Rapid STP IEEE 802.1p for Class of Service IEEE 802.1Q for VLAN Spread Spectrum and Modulation (typical):
DSSS with DBPSK, DQPSK, CCK OFDM with BPSK, QPSK, 16QAM, 64QAM 802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 1 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps 802.11n: 64QAM @ 300 Mbps to BPSK @ 6.5 Mbps (multiple rates supported) Operating Channels (central frequency):
US:
2.412 to 2.462 GHz (11 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (8 channels; excludes 5.600 to 5.640 GHz)*
5.745 to 5.825 GHz (5 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
JP:
2.412 to 2.484 GHz (14 channels, DSSS) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
*Special frequency bands (up to 6.0 GHz) are available for customization. Security:
SSID broadcast enable/disable Firewall for MAC/IP/Protocol/Port-based filtering 64-bit and 128-bit WEP encryption, WPA /WPA2 Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Transmission Rates:
802.11b: 1, 2, 5.5, 11 Mbps 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps 802.11n: 6.5 to 300 Mbps (multiple rates supported) 1-4 Tough AP TAP-213 Transmitter Power:
802.11b:
Introduction Typ. 261.5 dBm @ 1 Mbps Typ. 261.5 dBm @ 2 Mbps Typ. 261.5 dBm @ 5.5 Mbps Typ. 251.5 dBm @ 11 Mbps 802.11g:
Typ. 231.5 dBm @ 6 to 24 Mbps Typ. 221.5 dBm @ 36 Mbps Typ. 201.5 dBm @ 48 Mbps Typ. 191.5 dBm @ 54 Mbps 802.11n (2.4 GHz):
Typ. 231.5 dBm @ MCS0/8 20 MHz Typ. 181.5 dBm @ MCS7/15 20 MHz Typ. 231.5 dBm @ MCS0/8 40 MHz Typ. 171.5 dBm @ MCS7/15 40 MHz 802.11a:
Typ. 231.5 dBm @ 6 to 24 Mbps Typ. 211.5 dBm @ 36 Mbps Typ. 201.5 dBm @ 48 Mbps Typ. 181.5 dBm @ 54 Mbps 802.11n (5 GHz):
Typ. 231.5 dBm @ MCS0/8 20 MHz Typ. 181.5 dBm @ MCS7/15 20 MHz Typ. 231.5 dBm @ MCS0/8 40 MHz Typ. 181.5 dBm @ MCS7/15 40 MHz 1-5 Tough AP TAP-213 Introduction Receiver Sensitivity:
802.11b:
-93 dBm @ 1 Mbps
-93 dBm @ 2 Mbps
-93 dBm @ 5.5 Mbps
-88 dBm @ 11 Mbps 802.11g:
-88 dBm @ 6 Mbps
-86 dBm @ 9 Mbps
-85 dBm @ 12 Mbps
-85 dBm @ 18 Mbps
-85 dBm @ 24 Mbps
-82 dBm @ 36 Mbps
-78 dBm @ 48 Mbps
-74 dBm @ 54 Mbps 802.11n (2.4 GHz):
-70 dBm @ MCS7 20 MHz
-69 dBm @ MCS15 20 MHz
-67 dBm @ MCS7 40 MHz
-67 dBm @ MCS15 40 MHz 802.11a:
-90 dBm @ 6 Mbps
-88 dBm @ 9 Mbps
-88 dBm @ 12 Mbps
-85 dBm @ 18 Mbps
-81 dBm @ 24 Mbps
-78 dBm @ 36 Mbps
-74 dBm @ 48 Mbps
-72 dBm @ 54 Mbps 802.11n (5 GHz):
-69 dBm @ MCS7 20 MHz
-71 dBm @ MCS15 20 MHz
-63 dBm @ MCS7 40 MHz
-68 dBm @ MCS15 40 MHz Protocol Support General Protocols: Proxy ARP, DNS, HTTP, HTTPS, IP, ICMP, SNTP, TCP, UDP, RADIUS, SNMP, PPPoE, DHCP AP-only Protocols: ARP, BOOTP, DHCP, STP/RSTP (IEEE 802.1D/w) Interface Connector for External Antennas: N-type (female) LAN Ports: 1, M12 X-coded 8-pin female connector, 10/100/1000BaseT(X) auto negotiation speed, F/H duplex mode, and auto MDI/MDI-X connection Fiber Port: 100/1000Base SFP slot Console Port: M12 B-coded 5-pin female connector for the USB console USB Port: M12 A-coded 5-pin female connector for ABC-02 USB storage Reset: Present LED Indicators: PWR, FAULT, STATE, WLAN, LAN 1, LAN 2 Physical Characteristics Housing: Metal, IP68 protection Weight: 1.5 kg Dimensions: 220 x 150 x 50.5 mm (8.66 x 5.90 x 1.99 in) Installation: Wall mounting (standard), DIN-rail mounting (optional), pole mounting (optional) Environmental Limits Operating Temperature: -40 to 75C (-40 to 167F) Storage Temperature: -40 to 85C (-40 to 185F) 1-6 Tough AP TAP-213 Introduction Ambient Relative Humidity: 5% to 95% (non-condensing) Power Requirements Input Voltage: 24 to 110 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) Input Current: 0.65 A @ 24 VDC, 0.16 A @ 110 VDC Power Consumption: 17.6 W (max.) Connector: M12 A-coded 4-pin male connector Reverse Polarity Protection: Present Standards and Certifications Safety: UL 60950-1, IEC 60950-1(CB), LVD EN 60950-1 EMC: EN 61000-6-2/6-4 EMI: CISPR 22, FCC Part 15B Class A EMS:
IEC 61000-4-2 ESD: Contact: 6 kV; Air: 8 kV IEC 61000-4-3 RS: 80 MHz to 1 GHz: 20 V/m IEC 61000-4-4 EFT: Power: 2 kV; Signal: 2 kV IEC 61000-4-5 Surge: Power: 2 kV; Signal: 2 kV IEC 61000-4-6 CS: 10 V IEC 61000-4-8 Radio: EN 301 489-1/17, EN 300 328, EN 301 893, DFS, TELEC Rail Traffic: EN 50155 (essential compliance*), EN 50121-4
*Moxa defines essential compliance to include those EN 50155 requirements that make products more suitable for rolling stock railway applications. Note: Please check Moxas website for the most up-to-date certification status. Fire and Smoke: EN 45545-2 MTBF (mean time between failures) Time: 758,369 hrs Standard: Telcordia SR332 Warranty Warranty Period: 5 years Details: See www.moxa.com/warranty ATTENTION The TAP-213 is NOT a portable mobile device and should be located at least 20 cm away from the human body. The TAP-213 is NOT designed for the general public. A well-trained technician should be enlisted to ensure safe deployment of TAP-213 units, and to establish a wireless network. 1-7 Tough AP TAP-213 Introduction Functional Design LAN Port The standard model of the TAP-213 is provided with one M12 X code Gigabit port. The LAN LED will light up when you insert the cable in the LAN1 port and a connection is established. ATTENTION Do not use a PoE (Power over Ethernet) Injector for the PoE device(s). Instead, use an IEEE 802.3af or IEEE 802.3at compliant PSE (Power Sourcing Equipment). LED Indicators The LEDs on the front panel provide a quick and easy means of determining the current operational status and wireless settings of the TAP-213. The FAULT LED indicates system failures. If the TAP-213 cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one-second intervals. 1-8 Tough AP TAP-213 Introduction The following table summarizes how to read the devices wireless settings based on the LED displays. More information is available in Chapter 3 in the Basic Wireless Settings section. LED PWR FAULT STATE WLAN LAN1
(10/100/10 00 Ethernet port) LAN2
(100/1000 fiber optical port) Description Power is on Power is not being supplied. System is booting up Cannot get an IP address from the DHCP server IP address conflict No error condition exist System startup is complete and the system is in operation. AeroLink Protection is enabled and is currently in Backup state. Device has been located by the Wireless Utility Color Green Red Green State On Off On Blinking
(slow at 1-second intervals) Blinking
(fast at 0.5-second intervals) Off On Blinking
(fast at 0.5-second intervals) Blinking
(slow at 1-second intervals) Red On On System is booting up. WLAN is functioning in client/ client-router mode. Green Blinking WLAN is transmitting data in client/ client-router mode. Off On WLAN is not in client/ client-router mode or has not established a link with an AP. WLAN is in AP mode. Amber Blinking WLAN is transmitting data in AP mode. Off On Green Blinking Off On Amber Blinking Green Amber Off On Blinking Off On Blinking Off WLAN is not in use or is not working properly. LAN ports 1000 Mbps link is active. Data is being transmitted at 1000 Mbps. LAN ports 1000 Mbps link is inactive. LAN ports 10/100 Mbps link is active. Data is being transmitted at 10/100 Mbps. LAN ports 10/100 Mbps link is inactive. LAN ports 1000 Mbps link is active. Data is being transmitted at 1000 Mbps. LAN ports 1000 Mbps link is inactive. LAN ports 100 Mbps link is active. Data is being transmitted at 100 Mbps. LAN ports 100 Mbps link is inactive. ATTENTION When the system fails to boot, the LEDs for STATE (Green), FAULT, and WLAN will all light up simultaneously and blink at one-second intervals. This may be due to improper operation or issues such as an unexpected shutdown while updating the firmware. To recover the firmware, refer to the Firmware Recovery section in Chapter 6. 1-9 Tough AP TAP-213 Beeper The beeper emits two short beeps when the system is ready. Reset Button Introduction The Reset button is located on the bottom panel of the TAP-213. You can reboot the TAP-213 or reset it to factory default settings by pressing the Reset button with a pointed object such as an unfolded paper clip. System reboot: Hold the Reset button down for under 5 seconds and then release. Reset to factory default: Hold the Reset button down for over 5 seconds until the STATE LED starts blinking green light. Release the button to reset the TAP-213. 1-
10 2 Getting Started This chapter explains how to install Moxas AirWorks TAP-213 for the first time to quickly set up your wireless network and how to test whether the connection is working well. The function map provided in Chapter 3 is a convenient reference to the various functions available on the TAP-213 and to determine the functions that you need to use. The following topics are covered in this chapter:
First-Time Installation and Configuration Communication Testing Function Map Tough AP TAP-213 Getting Started First-Time Installation and Configuration Before installing the TAP-213, make sure that all items mentioned in the package checklist are in the box. You will also need access to a notebook computer or PC equipped with an Ethernet port. The TAP-213 has a default IP address that you must use when connecting to the device for the first time. Step 1: Select the power source. The TAP-213 can be powered by a DC power input or PoE (Power over Ethernet). Step 2: Connect the TAP-213 to a notebook or PC. Since the TAP-213 is provided with the MDI/MDI-X auto-sensing capability, you can use either a straight-through cable or crossover cable to connect it to a computer. When the connection between the TAP-213 and the computer is established, the LED indicator on the TAP-213s LAN port lights up. Step 3: Set up the computers IP address. Set an IP address for the computer so that it is on the same subnet as that of the TAP-213. Since the TAP-213s default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, set the IP address of the computer in the 192.168.127.xxx IP range and subnet mask to 255.255.255.0. Step 4: Use the web-based manager to configure the TAP-213 Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based Network Manager. Before the homepage opens, you will need to enter the user name and password as shown in the following figure. For first-time configuration, enter the following default user name and password and click on the Login button:
User Name:
Password:
admin moxa NOTE For security reasons, we strongly recommend changing the default password. To change the password, select Maintenance Password and follow the instructions on the screen. NOTE After you click Submit to apply changes, the web page is refreshed and an (Updated) indicator is displayed next to the page heading along with a blinking reminder to restart the device. To activate the changes, click Restart and then click Save and Restart after you change the settings. The TAP-213 will take about 30 seconds to complete the reboot process. 2-2 Tough AP TAP-213 Getting Started Step 5: Select the operation mode for the TAP-213. By default, the operation mode of the TAP-213 is set to AP. You can change this setting to Client mode at Wireless Settings WLAN Basic Wireless Settings. Detailed information about configuring the TAP-213 is available in Chapter 3. Step 6: Test the network connection. In the following sections we describe two methods that you can use to test that a network connection has been established. Communication Testing After installing the TAP-213 you can run a sample test to make sure the wireless connection on the TAP-213 is functioning normally. Two testing methods are described below. Use the first method if you are using only one TAP-213 device and the second method if you are using two or more TAP-213 units. How to Test One TAP-213 If you are only using one TAP-213, you will need one additional notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the TAP-213 (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (Notebook B) so that it is on the same subnet as the first notebook (Notebook A), which is connected to the TAP-213. After configuring the WLAN card, establish a wireless connection with the TAP-213 and open a DOS window on Notebook B. At the prompt, type the following:
ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 3-2 Tough AP TAP-213 Getting Started How to Test Two or More TAP-213 Units If you have two or more TAP-213 units, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the first TAP-213 connected to notebook A and change the second or third TAP-213 connected to notebook B to Client mode, and then configure the notebooks and TAP-213 units properly. After setting up the testing environment, open a DOS window on notebook B. At the prompt type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In the latter case, recheck the configuration to make sure the settings are correct. 4-2 Tough AP TAP-213 Function Map Getting Started Quick overview of the TAP-213s status Basic settings for administering the TAP-213 Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional Application-oriented device management functions to set up events, traps, and reactions via e-
mail and SNMP notifications Note: These functions are all optional Current status information for monitoring wired/wireless network performance, advanced services, and device management functions On-demand functions to support the web-based console management operation Functions for maintaining the TAP-213, and for diagnosing the network 5-2 3 Web Console Configuration In this chapter, we explain all aspects of web-based console configuration. Moxas easy-to-use management functions help you set up your TAP-213 and make it easy to establish and maintain your wireless network. The following topics are covered in this chapter:
Web Browser Configuration Overview Basic Settings System Info Settings Network Settings Port Settings Time Settings Wireless Settings Operation Mode Basic Wireless Settings (Multiple SSID) WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (for EAP-TLS in Client mode only) WAC Settings (AP mode only) Advanced Settings Using Virtual LAN Configuring Virtual LAN DHCP Server Packet Filters NAT Settings/Port Forwarding (For Client-Router mode only) SNMP Agent Mobile IP Settings Link Fault Pass-Through (for Client mode only) Auto Warning Settings Status Wireless Status Associated Client List (for AP mode only) DHCP Client List System Log Power Status AeroLink Protection Status (For Client Mode Only) Routing Table LAN Status Maintenance Console Settings Ping Firmware Upgrade Config Import/Export Load Factory Default Username/Password Locate Device Misc. Settings Save Configuration Restart Logout System Log Syslog E-mail Traps Tough AP TAP-213 Web Console Configuration Web Browser Configuration The web interface provides a convenient way to modify the configuration of the TAP-213 and access its built-in monitoring and network administration functions. The recommended web browser is Microsoft Internet Explorer 7.0 or 8.0 with JVM (Java Virtual Machine) installed. NOTE To use the management and monitoring functions of the TAP-213 from a PC host connected to the same LAN as the TAP-213, you must make sure that the PC host and the TAP-213 are on the same logical subnet. Similarly, if the TAP-213 is configured on a different VLAN than the PC, you must make sure your PC host is on the management VLAN so that it can access the TAP-213. The default IP address of the TAP is 192.168.127.253. To access the web interface of the TAP-213, do the following:
1. Open a web browser (e.g., Internet Explorer), type in the default IP address of the TAP-213 in the address field, and press Enter. 2. In the login page that is displayed, enter the Username and Password (default Username = admin;
default Password = moxa) and click Login to continue. You may need to wait a few moments for the main page to download to your computer. Note that the model name and IP address of the TAP-213 are both shown in the title bar of the web page. You can identify the web interfaces of multiple TAP-213 units using this information. 3-2 Tough AP TAP-213 Web Console Configuration 3. Use the menu tree on the left side of the window to open the configuration pages for the TAP-213s functions. In the following paragraphs, we describe each TAP-213 management function in detail. An overview of all the functions is available in the Function Map section of this manual. NOTE The model name of the TAP-213 is shown as TAP-213-XX, where XX indicates the country code. The model name indicates the TAP-213 version and the bandwidth it uses. We use TAP-213-US as an example in the following figures. (The country code and model name that appears on your computer screen may be different.) Overview The Overview page summarizes the TAP-213s current status. The information is categorized into the following groups: System Info, Device Info, and 802.11 Info. 3-3 Tough AP TAP-213 Web Console Configuration Click on the SSID (MOXA, in this case) to display detailed information on 802.11as shown below:
NOTE The 802.11 Info that is displayed may differ based on the operation mode selected. For example, Current BSSID is not available in Client mode, and Signal strength/Noise Floor is not available in AP mode. Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the TAP-213. System Info Settings The System Info related settings that you configure here, especially the Device name and Device description, are displayed on the Overview page. They are also included in the SNMP information and email alerts. Configuring the System Info settings for each TAP-213 makes it easier to identify the different TAP-213 units connected to your network. Description Specifies the role or application of this TAP-213 unit. Factory Default TAP-213_<Serial No. of this TAP-213>
Description Specifies the location of this TAP-213 unit. Factory Default None Device name Format Maximum of 31 characters Device location Format Maximum. of 31 characters 3-4 Tough AP TAP-213 Web Console Configuration Device description Format Maximum of 31 characters Description You can use this space to record a more detailed description of this TAP-213 Factory Default None Device contact information Format Maximum of 31 characters Description You can use this space to record the contact information of the person responsible for maintaining this TAP-213. Factory Default None Network Settings The Network Settings configuration panel allows you to modify the usual TCP/IP network parameters. However, due to the addition of the client-router operation mode, this panel provides two different sets of network parameters. Explanations for both types of configuration are given below. Network Settings for AP/Client Operation Mode IP address assignment Setting DHCP Static IP address Description The TAP-213s IP address will be assigned automatically by the networks DHCP server Set up the TAP-213s IP address manually. Factory Default Static Setting TAP-213s IP address Description Identifies the TAP-213 on a TCP/IP network. Subnet mask Description Setting TAP-213s subnet mask Identifies the type of network to which the TAP-213 is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Factory Default 192.168.127.253 Factory Default 255.255.255.0 Gateway Setting TAP-213s default gateway Description The IP address of the router that connects the LAN to an outside network. Factory Default None 3-5 Tough AP TAP-213 Web Console Configuration Setting IP address of the Primary/Secondary DNS server Primary/ Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can input the TAP-213s URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default None Network Settings for Client-Router Operation Mode WLAN IP address assignment Setting DHCP Static Description The TAP-213 WLAN interfaces IP address will be assigned automatically by the networks DHCP server Set up the TAP-213 WLAN interfaces IP address manually. Factory Default Static WLAN IP address Setting TAP-213 WLAN interfaces IP address Description Identifies the TAP-213 WLAN interfaces IP address on a TCP/IP network. Factory Default 192.168.128.253 WLAN subnet mask Setting TAP-213 WLAN interfaces subnet mask Description Identifies the type of network to which the TAP-213s WLAN interface is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Factory Default 255.255.255.0 WLAN gateway Setting TAP-213 WLAN interfaces default gateway Description The IP address of the router that connects the WLAN to an outside network. Factory Default None 3-6 Tough AP TAP-213 Web Console Configuration Setting IP address of the Primary/Secondary DNS server Primary/Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can input the TAP-213s URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default None LAN IP address Setting TAP-213 LAN interfaces IP address Description Identifies the TAP-213 LAN interfaces IP address on a TCP/IP network. Factory Default 192.168.127.253 LAN subnet mask Setting TAP-213 LAN interfaces subnet mask Description Identifies the type of network to which the TAP-213s LAN interface is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Factory Default 255.255.255.0 Port Settings Port settings give users control over port access. Setting Enable/Disable Description Allows/blocks data transmission through the port. Factory Default Enable 3-7 Tough AP TAP-213 Time Settings Web Console Configuration The TAP-213 has a time calibration function that can update the date and time information based on an NTP server or the date and time information specified by the user. The Current local time shows the TAP-213s system time when you open this web page. After you update the date and time setting, click on the Set Time button to activate the new date and time. An (Updated) string is displayed next to the date and time fields to indicate that the change is complete. Any change in the date and time setting is effective immediately and does not need a system restart. NOTE The TAP-213 has a built-in real time clock (RTC). The RTC is a computer clock (most often in the form of an integrated circuit) that keeps track of the current time. We strongly recommend that users update the Time Settings of the TAP-213 after the initial setup is complete or when the TAP is switched on after a long-term shutdown, especially if the network does not have an Internet connection for accessing a NTP server or there is no NTP server on the LAN. Current local time Setting User-specified date and time Time zone Setting User-specified time zone Description The date and time parameters allow configuration of the local time with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss Factory Default None Description The time zone setting allows the conversion from GMT
(Greenwich Mean Time) to the local time. Factory Default GMT ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Enable/ Disable Description Daylight saving time (also known as DST or summer time) involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. Factory Default Disable When Daylight saving time is enabled, the following parameters will be shown:
Starts at: The date that daylight saving time begins. Stops at: The date that daylight saving time ends. Time offset: Indicates the number of hours the clock should be advanced. 3-8 Tough AP TAP-213 Web Console Configuration Time server 1/2 Setting IP address of the name of the Time Server 1/2 Query period Setting The query period to sync with the time server
(1 to 9999 seconds) Description IP address or domain name of the NTP time server. The second NTP server will be used if the first NTP server fails to connect. Factory Default time.nist.gov Description This parameter determines how often the time is updated from the NTP server. Factory Default 600 (seconds) Wireless Settings The essential settings for wireless networks are presented in the wireless settings function group. You must configure these settings correctly before you establish your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP: In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Client: When the TAP-213 is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adapter. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. Operation Mode The TAP-213 supports five main operation modesAP, Client, and Client-Router, each of which plays a distinct role on the wireless network. Wireless Enable Setting Enable/Disable Operation Mode Setting AP Client Client-Router Sniffer Description Use this function to turn the RF (Radio Frequency) module on or off manually. NOTE: This function is available in AP operation mode only. Factory Default Enable Description The most common mode used by a TAP-213 wherein it plays the role of a wireless AP In this mode, the TAP-213 can connect to wireless AP devices The TAP-213 plays the role of a wireless client and a router. Turns the device into a remote Wireshark interface to capture 802.11 packets for analysis. Factory Default AP 3-9 Tough AP TAP-213 Web Console Configuration Sniffer Mode Instructions:
1. Set operation mode to Sniffer mode on the TAP-213 and then save/reboot the device. 2. Connect the TAP-213 to a laptop with Wireshark installed (v1.12.0 or later release) via Ethernet. 3. Add a remote interface by entering the IP address of the TAP-213. Detailed Wireshark instructions can be found at:
https://www.wireshark.org/docs/wsug_html_chunked/ChCapInterfaceRemoteSection.html 4. Start capturing 802.11 wireless packets with Wireshark. Basic Wireless Settings (Multiple SSID) You can add new SSIDs or edit existing ones in the WLAN Basic Setting Selection panel. You can configure up to 9 SSIDs for a TAP and configure each SSID differently. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. All of the SSIDs that you configure for an AP are active at the same time. That is, client devices can use any of the SSIDs to associate with the AP. 3-10 Tough AP TAP-213 Web Console Configuration To create an SSID for your TAP, click on Add SSID. To edit an existing SSID and assign different configuration settings to it, click on the Edit button corresponding to the SSID. A configuration panel is displayed as follows:
NOTEWhen you switch to Client mode, a Site Survey button will be available on the Basic Wireless Settings panel. Use the Site Survey function to view information about available APs, as shown in the following figures. You can also click on an SSID listed on the Site Survey page to bring the details of the SSID onto the Basic Wireless Settings page. To update the site survey table, click the Refresh button. If this client is connecting to an AP, a brief disconnection will occur when you click on Site Survey. 3-11 Tough AP TAP-213 Web Console Configuration Factory Default B/G/N Mixed RF type Setting 2.4 GHz B G B/G Mixed G/N Mixed B/G/N Mixed N Only (2.4GHz) 5 GHz A A/N Mixed N Only (5GHz) Description Only supports the IEEE 802.11b standard Only supports the IEEE 802.11g standard Supports IEEE 802.11b/g standards, but 802.11g might operate at a slower speed when 802.11b clients are on the network Supports IEEE 802.11g/n standards, but 802.11n might operate at a slower speed if 802.11g clients are on the network Supports IEEE 802.11b/g/n standards, but 802.11g/n might operate at a slower speed if 802.11b clients are on the network Only supports the 2.4 GHz IEEE 802.11n standard Only supports the IEEE 802.11a standard Supports IEEE 802.11a/n standards, but 802.11n may operate at a slower speed if 802.11a clients are on the network Only supports the 5 GHz IEEE 802.11n standard Channel (for AP mode only) Setting The available channels vary with the RF type setting Description The channel on which the TAP should operate. The TAP-213 plays the role of a wireless AP here. Channel Width (for any 11N RF type only) Setting 20 MHz 20/40 MHz Description Select the channel width. If you are not sure, use the 20/40 MHz (Auto) option Factory Default 6 (in B/G/N Mixed mode) Factory Default 20 MHz Channel bonding If you have selected 20/40 MHz only in the Channel Width setting, this setting will automatically set the channel based on the Channel setting. SSID Setting Maximum of 31 characters Description The SSID of a client and the SSID of the AP must be identical for the client and AP to be able to communicate with each other. Factory Default MOXA SSID broadcast (for AP mode only) Setting Description Use this setting to specify if the SSID can be broadcast or not Enable Enable/Disable Factory Default Management frame encryption Setting Enable/Disable Description Enables management frame encryption to protect your wireless network from DoS attacks. This function only works with Moxa's TAP series. 50ms Turbo Roaming (controller-based) Setting Enable/Disable Description Determines whether or not the TAP-213 supports 50 ms roaming. This function only works with the WAC-1001, WAC-2004, and TAP series. Factory Default Disable Factory Default Disable 3-12 Tough AP TAP-213 Web Console Configuration WLAN Security Settings The TAP-213 provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the TAP-213 by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE 802.1X. The TAP-213 can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. Description No authentication Static WEP is used WPA is used Fully supports IEEE 802.11i with TKIP/AES + 802.1X Factory Default Open Security mode Setting Open WEP WPA WPA2 Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP (only for legacy mode) NOTE Moxa includes WEP security mode only for legacy purposes. WEP is highly insecure and is considered fully deprecated by the Wi-Fi alliance. We do not recommend the use of WEP security under any circumstances. According to the IEEE 802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared
(or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The TAP-213 provides 4 entities of WEP key settings that can be selected to use with Key index. 3-13 Tough AP TAP-213 Web Console Configuration The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit (or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Description Data encryption is enabled, but without authentication Data encryption and authentication are both enabled. Description Specifies WEP keys in hex-decimal number form Specifies WEP keys in ASCII form Description Uses 40-bit secret keys with 24-bit initialization vector Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used Factory Default Open Factory Default HEX Factory Default 64 bits Factory Default Open Description A string that can be used as a WEP seed for the RC4 encryption engine. Factory Default None Setting Open Shared Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Setting ASCII type:
64 bits: 5 chars 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The TAP-213 also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. 3-14 Tough AP TAP-213 Web Console Configuration WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default AES
** This option is only available with 802.11a/b/g standard
* This option is only available for legacy mode in APs and does not support AES-enabled clients. Passphrase Setting 8 to 63 characters Description Master key to generate keys for encryption and decryption Factory Default None Key renewal (for AP mode only) Description Specifies the time period of group key renewal Setting 60 to 86400 seconds
(1 minute to 1 day) Factory Default 3600 (seconds) The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. NOTE 3-15 Tough AP TAP-213 Web Console Configuration WPA/WPA2-Enterprise (for AP mode) By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or passphrases. WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default Personal Factory Default AES
** This option is only available with 802.11a/b/g standard
* This option is available only for legacy mode in APs and does not support AES-enabled clients. Primary/Secondary RADIUS server IP Setting The IP address of RADIUS server Description Specifies the delegated RADIUS server for EAP Factory Default None Primary/Secondary RADIUS port Setting Port number Description Specifies the port number of the delegated RADIUS server Factory Default 1812 Primary/ Secondary RADIUS shared key Setting Max. of 31 characters Description The secret key shared between AP and RADIUS server Factory Default None 3-16 Tough AP TAP-213 Web Console Configuration Key renewal Setting 60 to 86400 seconds
(1 minute to 1 day) Description Specifies the time period of group key renewal Factory Default 3600 (seconds) WPA/WPA2-Enterprise (for Client/Client-Router mode) When used as a client, the TAP-213 can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP**
AES Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled
**This option is only available with 802.11a/b/g standard. EAP protocol Setting TLS TTLS PEAP Description Specifies Transport Layer Security protocol Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Factory Default TKIP Factory Default TLS Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections. EAP-TLS TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. 3-17 Tough AP TAP-213 Web Console Configuration You can use Basic WLAN Setup WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel (EAP-TLS for example), and validate whether the network is trustworthy with digital certificates on the authentication server. This step establishes a tunnel that protects the next step (or inner authentication), and consequently is sometimes referred to as outer authentication. The TLS tunnel is then used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The TAP-213 provides some non-cryptographic EAP methods, including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS and PEAP. 3-18 Tough AP TAP-213 Web Console Configuration Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, with the true user name only shown through the encrypted channel. Keep in mind that not all client software supports anonymous alteration. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. TTL inner authentication Setting PAP CHAP MS-CHAP MS-CHAP-V2 Anonymous Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used Microsoft CHAP version 2 is used Factory Default MS-CHAP-V2 Setting Max. of 31 characters Description A distinct name used for outer authentication Factory Default None User name & Password Setting PEAP Description User name and password used in inner authentication Factory Default None There are a few differences in the TTLS and PEAP inner authentication procedures. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The TAP-213 provides MS-CHAP-V2 merely as an EAP method for inner authentication. 3-19 Tough AP TAP-213 Web Console Configuration Inner EAP protocol Setting MS-CHAP-V2 Anonymous Description Microsoft CHAP version 2 is used Setting Max. of 31 characters Description A distinct name used for outer authentication User name & Password Factory Default MS-CHAP-V2 Factory Default None Setting Description User name and password used in inner authentication Factory Default None Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate (for A, B, G, B/G mixed, and N modes only) Setting Auto Available rates Description The TAP-213 senses and adjusts the data rate automatically Users can manually select a target transmission data rate Multicast Rate (for AP mode only) Description Setting Multicast rate You can set a fixed multicast rate for the transmission of broadcast and multicast packets on a per-radio basis. This
(6M ~ 54M) parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configured rate. Factory Default Auto Factory Default 6M 3-20 Tough AP TAP-213 Web Console Configuration Guard Interval Setting Guard Interval Description Guard interval is used to ensure that distinct transmissions do not interfere with one another. You can select the guard interval manually for Wireless-N connections. The two options are Short (400 ns) and Long (800 ns). NOTE: This function can be modified in N mode only. Factory Default 800 ns. Maximum transmission power Setting Available Power Description Users can manually select a target power to mask max output power. Because different transmission rates might have their own max output power, please reference product datasheet. The available setting is from 3 to 26. dBm/MHz: The density of transmission power in channel width. Factory Default 12 dBm
(-1 dBm/MHz) NOTE Most countries define a limit for the Equivalent Isotropically Radiated Power (EIRP) for an RF transmitting system. The EIRP should not exceed the allowed value. EIRP = transmission power + antenna gain (dBi). NOTE Transmission power indicates the maximum value of transmission power which the user plans. However, the real transmitted power depends on the radio module and some facts, such as country, regulatory limitations and data rate. Please check the Transmission power in Status > Wireless Status for a real and updated value of transmission power, which the TAP is currently using. You can refer to the related glossaries in the reference section for detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. Beacon Interval (for AP mode only) Setting Beacon Interval
(40 to 1000 ms) Description Indicates the frequency interval of the beacon DTIM Interval (for AP mode only) Setting Description Indicates how often the TAP-213 sends out a Delivery Traffic Data Beacon Rate
(1 to 15) Indication Message Fragmentation threshold Setting Fragment Length
(256 to 2346) Description Specifies the maximum size a data packet before splitting and creating another new packet Factory Default 100 (ms) Factory Default 1 Factory Default 2346 RTS threshold Setting RTS/CTS Threshold
(256 to 2346) Description Determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication Factory Default 2346 3-21 Tough AP TAP-213 Web Console Configuration Antenna Setting A/B/Both Description Specifies the output antenna port. Setting Antenna to Auto allows 2x2 MIMO communication under 802.11n and 2T2R*
communication in legacy 802.11a/b/g modes. Factory Default Both
*Note: Different from 802.11ns multiple spatial data stream (2x2 MIMO), which doubles the throughput, 2T2R is transmits/receives the same piece of data on both antenna ports. WMM Setting Enable/Disable Description WMM is a QoS standard for WLAN traffic. Voice and video data will be given priority bandwidth when enabled with WMM supported wireless clients. NOTE: This setting can be enabled/disabled only in A, B, and B/G Mixed modes. For N, G/N Mixed, B/G/N Mixed, and A/N Mixed modes, this setting is enabled by default. Factory Default Disable READ THIS BEFORE CHANGING THE DFS SETTING DFS (Dynamic Frequency Selection) is a mechanism to allow unlicensed wireless devices to share spectrum with existing radar systems by detecting radar systems and avoid causing interference with them. Roaming Priority (Only for AP mode) Setting Priority 1/2 Description The roaming priority should be set based on how the radios are deployed along the trackside. Priority 1: radios along the trackside are deployed with open air radiating antennas. Priority 2: radios along the trackside are deployed with leaky feeder like coverage patterns. Due to the differences in coverage patterns between different deployment scenarios, the roaming priority you select will impact roaming performance. Factory Default Priority 2 RF Index Setting RF Index1/ RF Index 2 Description In an L3 roaming scenario, trackside APs can be arranged in different VLAN gateways within different subnets. The RF index setting identifies the AP within a particular VLAN gateway. Factory Default RF Index 1 AeroLink Protection (Only for Client mode) Setting Disable/L2/L3 Description Enable AeroLink Protection to allow wireless clients on the Factory Default Disabled same LAN network to automatically negotiate with each other and form a redundant wireless communication. For more details, see Status AeroLink Protection Status. Select L2 for roaming on an L2 trackside network. Select L3 for roaming on an L3 trackside network. 3-22 Tough AP TAP-213 Web Console Configuration When L3 is selected, Virtual LAN IP and Virtual WLAN IP are shown as additional setting parameters. Virtual LAN IP: This IP should be defined as the gateway IP for onboard devices so that all incoming and outgoing traffic can be routed properly via this common IP in case of any role changes of the onboard clients. All AeroLink protected clients within the same subnet need to be configured with the same virtual LAN IP. Virtual WLAN IP: This IP should be defined as the virtual gateway IP for the wayside router, which can route traffic to any onboard client regardless of the clients home WAC. This IP only needs to be configured when different clients have to backup each other while the clients are registered to different WAC units. For the router to work properly, all clients and the wayside router will need to be configured to have this routing rule (i.e., to use this virtual WLAN IP). How AeroLink Protection Works In vehicle-to-ground applications, it is essential to minimize system downtime and maximize system availability of the train to ground link to ensure proper communication. Moxas AeroLink Protection provides a reliable wireless network-level redundancy protocol to ensure that there will always be a live onboard-to-ground link, even when failures occur:
1. Communication Failover: AeroLink Protection members can negotiate with each other to automatically elect an Active node for data communication. If the Active node is no long capable of sending data across to its access point, it will inform other Backup nodes to resume the communication via another path. 2. Frequency-Interference Failover: This concept is similar to Communication Failover. If the communication frequency is interfered with and data can no longer transmit over the Active frequency, it will also resume the connection via another Backup frequency. 3. Device Failover: After handling communication and frequency failures, in order to provide a wireless network free of single points of failure, AeroLink Protection also checks the device status. If the Active node has a power failure, the Backup nodes will automatically resume the wireless communication. 4. Scalable: AeroLink Protection is designed to allow multiple backup paths, making it possible for users to realize a complete redundant wireless network free from all the above failure types. 5. Fast Recovery: In addition to maintaining a redundant wireless network, equally important is providing uninterrupted communication even when a failure occurs. AeroLink Protection is designed to recover any failure in under 300 ms. 3-23 Tough AP TAP-213 Web Console Configuration Turbo Roaming Setting Enable/ Disable Description Moxas Turbo Roaming can enable rapid handover when the TAP-213, as a client or client-router, roams among a group of APs. Factory Default Disable When Turbo Roaming is enabled, Turbo Roaming type, RF type, Dual link option, and Scan channels will be shown as follows. There are two options available for Turbo Roaming type; 50ms (controller-based) that only works with the RTG version of the access point and the WAC-1001 and WAC-2004, and 150ms
(client-based) that supports all brands of AP. Dual link reduces the packet-loss rate when roaming between difference APs; this function only works with a single channel roaming structure. The RF type shows the current RF type that this client is using. There are three Scan channels available. Note that the Scan channels may need to be modified when the RF type is changed. (For example, channel 36 is not available in B, G, or B/G Mix mode.) If you set Turbo Roaming type to 150ms (client-based), three additional roaming parameters, 802.11b/g
(or b/a) roaming threshold, 802.11b/g (or b/a) roaming offset, and 802.11b/g (or b/a) roaming alive are shown as follows:
3-24 Tough AP TAP-213 Web Console Configuration Roaming Parameters Setting 802.11b/g (or a) roaming threshold
(RSSI) 802.11b/g (or a) roaming difference
(RSSI) 802.11b/g (or a) AP alive check threshold
(RSSI) Description When the current RSSI value is lower than the roaming threshold, the client will start the roaming process. Factory Default
-75 When the RSSI of a candidate AP is greater than the current RSSI value plus the roaming difference, the client will roam to this new candidate AP. When AP alive check is enabled, the client will actively send alive check packets over the wireless network; APs who receive the packets will respond to indicate that they are currently available. By doing this, the client can maintain a ready list of available APs, and then quickly hand over to a new AP once it loses contact with the AP it is currently connected to. 7
-82 Roaming Threshold Concept T1 = Probing for new AP candidate to connect (background scan) T2 = At this point is when the roaming difference conditions are met and the client will initiate the roaming T3 = At this point the client has successfully roamed over to the new AP2 When 50 ms Turbo Roaming is enabled without using the WAC-1001 or WAC-2004, the connection between the AP and client will not work. NOTE 3-25 Tough AP TAP-213 Web Console Configuration WLAN Certification Settings (for EAP-TLS in Client mode only) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The TAP-213 can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current Status displays information for the current WLAN certificate, which has been imported into the TAP-213. Nothing will be shown if a certificate is not available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired You can import a new WLAN certificate in Import WLAN Certificate by following these steps, in order:
1. Input the corresponding password (or key) in the Certificate private password field and then click Submit to set the password. 2. The password will be displayed in the Certificate private password field. Click on the Browse button in Select certificate/key file and select the certificate file. 3. Click Upload Certificate File to import the certificate file. If the import succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. NOTE The WLAN certificate will remain after the TAP-213 reboots. Even though it has expired, it can still be seen on the Current Certificate. 3-26 Tough AP TAP-213 Web Console Configuration WAC Settings (AP mode only) Controller-based Turbo Roaming function is automatically enabled when you enable the 50ms Turbo Roaming
(controller-based) option on the Wireless Settings > WLAN > Basic Wireless Settings > Edit page. The Primary WAC IP address, Backup WAC IP address, and Roaming domain fields are displayed. Primary WAC IP address Setting IP address Description Enter the IP address of the primary WAC-1001 or WAC-2004 Backup WAC IP address Setting IP address Description Enter the IP address of the backup WAC-1001 or WAC-2004 Primary WAC IP address Setting 6 Hex characters Description Specifies the area served by the WAC-1001 or WAC-2004. All related controllers, APs, and clients use this IP address as identification to work and communicate with each other. Factory Default None Factory Default None Factory Default None Advanced Settings Several advanced functions are available to increase the functionality of your TAP-213 and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer-2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the TAP-213 can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your TAP series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. 3-27 Tough AP TAP-213 Web Console Configuration The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Secure network restricts members to resources on their own VLAN Clients roam without compromising security Improve network performance and reduce latency Increase security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. 3-28 Tough AP TAP-213 Web Console Configuration Configuring Virtual LAN VLAN Settings To configure the TAPs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Description Set the management VLAN of this TAP. Factory Default 1 Port Type LAN WLAN Port PVID Setting VLAN ID ranging from 1 to 4094 VLAN Tagged Setting A comma-separated list of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. For example: 1,2,3,4. Description This port is the LAN port on the TAP. This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Trunk Port Yes Description Set the ports VLAN ID for devices that connect to the port. The port can be a LAN port or WLAN ports. Factory Default 1 Description Specify which VLANs can communicate with this specific VLAN. Factory Default
(Empty) The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. NOTE 3-29 Tough AP TAP-213 DHCP Server Web Console Configuration DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The TAP-213 can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The TAP-213 provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server Setting Enable Disable Default gateway Setting IP address of a default gateway Subnet mask Setting subnet mask Description Enables TAP-213 as a DHCP server Disable DHCP server function Description The IP address of the router that connects to an outside network Factory Default Disable Factory Default None Description Identifies the type of sub-network (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network) Factory Default None 3-30 Tough AP TAP-213 Web Console Configuration Primary/ Secondary DNS server Setting IP address of Primary/
Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can use URL as well. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default None Start IP address Setting IP address Description Indicates the IP address which TAP-213 can start assigning Factory Default None Maximum number of users Setting 1128 users Description Specifies how many IP address can be assigned continuously Client lease time Setting 5-1440 minutes Packet Filters Description The lease time for which an IP address is assigned. The IP address may go expired after the lease time is reached. Factory Default None Factory Default 5 (minutes) The TAP-213 includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The TAP-213s MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The TAP-213 provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Disable Factory Default Drop ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied 3-31 Tough AP TAP-213 Web Console Configuration IP Protocol Filter The TAP-213s IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The TAP-213 provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.1.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied Factory Default ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. 3-32 Tough AP TAP-213 Web Console Configuration TCP/UDP Port Filter The TAP-213s TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The TAP-213 provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger than the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Description Enables TCP/UDP port filter Disables TCP/UDP port filter Description Only the packets fitting the entities on list can be allowed. Any packet fitting the entities on list will be denied. Factory Default Disable Factory Default Drop Enable Setting Enable Disable Policy Setting Accept Drop ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied Static Route (For Client-Router mode only) The Static Routing page is used to configure TAP-213s static routing table. Active Click the checkbox to enable Static Routing. Destination You can specify the destination IP address. Netmask This option is used to specify the subnet mask for this IP address. 3-33 Tough AP TAP-213 Web Console Configuration Gateway The IP address of the router that connects the LAN to an external network. Metric Use this option to specify a cost for accessing the neighboring network. Interface You can select which interface does your routing rules would be set. NAT Settings/Port Forwarding (For Client-Router mode only) Network Address Translation (NAT)or more specifically, one-to-many NAT, NAPT, or PATis supported to facilitate the Client-Router operation mode. This feature translates the out-going communication from multiple private IPs to a single external IP (WLAN IP) with randomly assigned port for return traffic. Port Forwarding is needed to allow external devices to initiate communication. Port Forwarding specifies a static map between external ports (WAN Port) and internal IP/port combos (LAN IP/LAN Port) 3-34 Tough AP TAP-213 Web Console Configuration Enabling NAT and Port Forwarding provides the following benefits:
Uses the NAT function to hide the Internal IP address of a critical network or device to increase the level of security of industrial network applications. Uses the same private IP address for different, but identical, groups of Ethernet devices. For example, 1-to-1 NAT makes it easy to duplicate or extend identical production lines NAT Setting Enable/Disable Description Enables or disables the NAT translation Factory Default Disable Port Forwarding Active: Click the checkbox to enable Port Forwarding rule(s). Protocol: Specifies the communication protocol. WAN Port: Specifies the external port to be forwarded to. LAN IP: Specifies the forward to LAN IP. LAN Port: Specifies the forward to LAN Port. SNMP Agent The TAP-213 supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The TAP-213s MIB can be found in the software CD and supports reading the attributes via SNMP. (Only get method is supported.) SNMP security modes and security levels supported by the TAP-213 are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Protocol Version SNMP V1, V2c Setting on UI web page V1, V2c Read Community V1, V2c Write/Read Community Authentication Type Community string No Data Encryption Community string No Method Use a community string match for authentication Use a community string match for authentication SNMP V3 No-Auth No MD5 or SHA Authentication based on MD5 or SHA No No 3-35 Use account with admin or user to access objects Provides authentication based on HMAC-MD5, or HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Tough AP TAP-213 Protocol Version Setting on UI web page MD5 or SHA Authentication Type Authentication based on MD5 or SHA Data Encryption Data encryption key Web Console Configuration Method Provides authentication based on HMAC-MD5 or HMAC-SHA algorithms, and data encryption key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below:
Enable Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Remote Management Setting Enable Disable Description Allow remote management via SNMP agent Disallow remote management via SNMP agent Read community (for V1, V2c) Setting V1, V2c Read Community Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Factory Default Disable Factory Default Disable Factory Default public Write community (for V1, V2c) Setting V1, V2c Read /Write Community Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. Factory Default private SNMP agent version Setting V1, V2c, V3, or V1, V2c, or V3 only Description Select the SNMP protocol version used to manage the switch. Factory Default V1, V2c 3-36 Tough AP TAP-213 Web Console Configuration Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Use admin account to access objects. No authentication Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. SHA Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Description No data encryption DES-based data encryption AES-based data encryption Factory Default No Auth Factory Default Disable Private key A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also known as the OID, this is the TAP-213s enterprise value and is a fixed value. Mobile IP Settings The mobile IP technology enables the TAP-213 to roam between Layer 3 networks with a roaming break time less than 50 ms. When the TAP-213 is in client/client router mode, it is a mobile node (MN) that is able to roam across different subnets without changing its IP address. Mobile IP Topology Example:
3-37 Tough AP TAP-213 Web Console Configuration Terminology Mobile Node (MN) Home network Home address Foreign network Home agent (HA) Correspondent Node (CN) Co-located Care-of Address
(CCoA) Binding Description A host or router that changes its location from one network to another. The network within which the MN receives its identifying IP address (home address) The IP address assigned to the MN within its home network The network in which an MN is operating when away from its home network A router on the home network that provides services to the MN. The home agent intercepts packets sent to the MN within the home network, encapsulates them, and then tunnels them to the MN. A peer with which a mobile node is communicating The new IP address of the MN when operating on a foreign network. The association of the home address with a CCoA Setting Mobile IP Subnet Binding Description Enable/disable mobile IP capability of the client (mobile node) for L3 controller based roaming Define a subnet of devices connected behind the client (MN) so that data will be forwarded to the corresponding device subnets. Proper IP planning is required to avoid configuring the subnet binding IP to limit access to the TAP. Factory Default Disable Disable Note that when the Mobile IP is enabled, the corresponding AP and WAC (HA) controller will also need to be configured properly (with 50 ms roaming enabled) to ensure correct operation of the L3 roaming network. 3-38 Tough AP TAP-213 Web Console Configuration Link Fault Pass-Through (for Client mode only) This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, TAP will try to connect to AP. If wireless is disconnected, TAP restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, TAP will try to recover the Ethernet link. System log will indicate the link fault pass-through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Enables the Link Fault Pass-Through function Disables the Link Fault Pass-Through function Auto Warning Settings Factory Default Disable Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the TAP-213 supports different approaches to warn engineers automatically, such as SNMP trap and e-mail. It also supports two digital inputs to integrate sensors into your system to automate alarms by email. System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. 3-39 Tough AP TAP-213 Web Console Configuration System-related events System restart (warm start) Network-related events LAN link on LAN link off Event is triggered when The TAP-213 is rebooted, such as when its settings are changed
(IP address, subnet mask, etc.). Event is triggered when The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. The TAP-213 is associated with an AP. Client joined/ left
(for AP mode) WLAN connected to AP
(for Client mode) WLAN disconnected
(for Client mode) Config-related events Configuration Changed Configuration file import via Web Console The configuration file is imported to the TAP-213. Console authentication failure Firmware upgraded Event is triggered when A configuration item has been changed. An incorrect password is entered. The TAP-213s firmware is updated. The TAP-213 is disassociated from an AP. Power events Power 1/2 transition (On -> Off) PoE transition (On -> Off) Power 1/2 transition (Off -> On) PoE transition (Off -> On) Event is triggered when The TAP-213 is powered down in PWR1/2. The TAP-213 is powered down in PoE. The TAP-213 is powered via PWR1/2. The TAP-213 is powered via PoE. Syslog This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detail information for the grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. NOTE The RSSI report events option is only supported in client mode. 3-40 Tough AP TAP-213 Web Console Configuration Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Description Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server Factory Default None Description Enter the UDP port of the corresponding Syslog server Factory Default 514 Syslog server 1/ 2/ 3 Setting IP address Syslog port Setting Port destination
(1 to 65535) E-mail E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the TAP-213. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses work well. More detailed explanations about these parameters are given after the following figure. 3-41 Tough AP TAP-213 Web Console Configuration Mail server (SMTP) Setting IP address Description The IP Address of your email server. User name & Password Setting Description User name and password used in the SMTP server Factory Default None Factory Default None From e-mail address Setting Max. 63 characters Description Enter the administrators e-mail address which will be shown in the From field of a warning e-mail. Factory Default None To E-mail address 1/ 2/ 3/ 4 Setting Max. 63 characters Description Enter the receivers e-mail addresses. Factory Default None Traps Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. 3-42 Tough AP TAP-213 Web Console Configuration Trap Event Types SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 1st / 2nd Trap version Setting V1 V2 Description SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 1st / 2nd Trap server IP/name Setting IP address or host name Description Enter the IP address or name of the trap server used by your network. Factory Default V1 Factory Default None 1st / 2nd Trap community Setting Max. of 31 characters Use a community string match with a maximum of 31 Description Factory Default alert characters for authentication. 3-43 Tough AP TAP-213 Status Wireless Status Web Console Configuration The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Depending on the operation mode, certain 802.11 info values may not be displayed. For example, the Current BSSID and Signal strength parameters are not available in the AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the TAP-213 in Client mode. The transmission power indicated is the current transmission power being updated periodically. Associated Client List (for AP mode only) Associated Client List shows all the clients that are currently associated to a particular TAP-213. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. 3-44 Tough AP TAP-213 DHCP Client List Web Console Configuration The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. You can press Select all button to select all content in the list for further editing. System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-45 Tough AP TAP-213 Power Status Web Console Configuration The TAP-213 series supports two power suppliespower input 1 and power input 2. The M12 4-pin male connector on the bottom panel of the TAP-213 is used for the dual power inputs. The status of the power inputs is shown on the Power Status page. If you check the Auto refresh option, the status of the power supply inputs are refreshed every 5 seconds. AeroLink Protection Status (For Client Mode Only) After enabling AeroLink Protection from the Advanced WLAN Setup panel, the following table shows the current state of the AeroLink Protection for easier diagnosis. An AeroLink Protection member could be in 1 or 7 different states:
Initiation State (Init): Initiates the AeroLink Protection Protocol. Discovering State (Discover): Discovers other AeroLink Protection members for further negotiation. Idle State (Idle): Internal protocol checkpoint. Negotiation State (Nego): Negotiates with other AeroLink Protection members and selects Active node. Backup State (Backup): After negotiation, this node is assigned as the Backup node. All traffic will pass through the Active node. NOTE: When a node is acting as a Backup node, the STATE LED for the node will blink to advertise this fact to nearby support engineers. Active State (Active): After negotiation, this node is assigned Active node status, which means that all traffic will pass through that node. Role Change State (Change): If the Active node is no longer capable of data transmission via the WLAN, the device will enter change state, which will result in the device going back to Nego state (likely becoming the Backup device since the active link is down). Routing Table The Routing Table page shows all routing entries. 3-46 Tough AP TAP-213 LAN Status Web Console Configuration The LAN Status page shows the LAN information, which includes speed, duplex, link status, and packet status. Maintenance Maintenance functions provide the administrator with tools to manage the TAP-213 and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet, and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. 3-47 Tough AP TAP-213 Web Console Configuration If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. Firmware Upgrade The TAP-213 can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. Before running a firmware upgrade, make sure the TAP-213 is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the TAP-213 will reboot itself. When upgrading your firmware, the TAP-213s other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your TAP-213. Config Import/Export You can back up and restore the TAP-213s configuration with Config Import and Config Export functions. In the Config Import section, click Browse to specify the configuration file and click on the Config Import button to begin importing the configuration. 3-48 Tough AP TAP-213 Web Console Configuration Downloading the Configuration from a TFTP Server You can download a configuration file from a TFTP server on to your TAP-213 as follows:
1. Start your TFTP server. 2. Copy the TAP-213 configuration file to a folder on the TFTP server. 3. On the TAP-213 Config Import page, input your TFTP server IP and Configuration path. NOTE The configuration path is the path of the configuration file, which is a relative path. If your configuration file is already available in a folder on the TFTP server, you can leave this field blank. 4. Input your configuration File name with the filename extension or click on the Config Import button to browse to the file. Once the configuration downloads successful, you will see "TFTP import success" information on the web page. 5. Click Save and then Restart on the top-right side. You can also back up or restore the ABC-02 configuration with Config Import Export. To download the configuration to the TAP:
1. Turn off the TAP. 2. Plug in the ABC-02 to the TAPs USB port. 3. Turn on TAP. 4. TAP will detect ABC-02 during the boot up process, and download the configuration from the ABC-02 to the TAP automatically. Once the configuration downloads and if configuration format is correct, the TAP will emit three short beeps, and then continue the boot up. 5. Once the TAP has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. 3-49 Tough AP TAP-213 Web Console Configuration SNMP MIB file for TAP-213 is embedded in the device. To export the MIB file, simply click on the MIB Export button and save it to your local drive. Load Factory Default Use this function to reset the TAP-213 and roll all settings back to the factory or customized (using imported configuration file in the Default Config Import screen) default values. You can also reset the hardware by pressing the reset button on the bottom panel of the TAP-213. Username/Password You can change the administration username and password for each of the TAP-213s console managers by using the Username/Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password moxa, and remember to change the administration password regularly. Locate Device The AP can be identified by a beeping sound and flashing LED when clicking on the start to locate button. To stop the beeping, click on the stop locating button. 3-50 Tough AP TAP-213 Misc. Settings Web Console Configuration Additional settings to help you manage your TAP-213 are available on this page. Reset button Setting Always enable Always disable Disable restore to default function after 60 sec Description The TAP-213s reset button works normally. The TAP-213s reset button will not work. The TAP-213s reset to default function will be inactive 60 seconds after the TAP-213 finishes booting up. Factory Default Always enable Save Configuration The following figure shows how the TAP-213 stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the TAP-213 is shutdown or rebooted unless they are y. Because the TAP-213 starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the TAP-213. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. 3-51 Tough AP TAP-213 Restart Web Console Configuration If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the TAP-213 directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the TAP-213. If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. You will not be able to run any of the TAP-213s functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. 3-52 4 Software Installation and Configuration The following topics are covered in this chapter:
Overview Wireless Search Utility Installing Wireless Search Utility Configuring Wireless Search Utility Tough AP TAP-213 Overview Software Installation and Configuration The Wireless Search Utility can be downloaded from the Moxa website at www.moxa.com. Wireless Search Utility Installing Wireless Search Utility Once the Wireless Search Utility is downloaded, run the setup executable to start the installation. 1. Click Next in the Welcome screen to proceed with the installation. 4-2 Tough AP TAP-213 Software Installation and Configuration 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 3. Click Next to create the programs shortcut files to the default directory, or click Browse to select an alternate location. 4-3 Tough AP TAP-213 Software Installation and Configuration 4. Click Next to select additional tasks. 5. Click Next to proceed with the installation. The installer then displays a summary of the installation options. 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 4-4 Tough AP TAP-213 Software Installation and Configuration 7. Click Finish to complete the installation of Wireless Search Utility. Configuring Wireless Search Utility The Broadcast Search function is used to locate all TAP-213 APs that are connected to the same LAN as your computer. After locating a TAP-213, you will be able to change its IP address. Since the Broadcast Search function searches by UDP packets and not IP address, it doesnt matter if the TAP-213 is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the Wireless Search Utility program. When the Login page appears, select the Device Search only option to search for TAPs and to view each TAPs configuration. Select the Device management option to assign IPs, upgrade firmware, and locate devices. 4-5 Tough AP TAP-213 Software Installation and Configuration 2. Open the Wireless Search Utility and then click the Search icon. 3. The Searching window indicates the progress of the search. When the search is complete, all TAPs that were located will be displayed in the Wireless Search Utility window. 4-6 Tough AP TAP-213 Software Installation and Configuration 4. Click Locate to cause the selected device to beep. 5. Make sure your TAP is unlocked before using the search utilitys icons setting. The TAP will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. 6. Go to Tools Login Options to manage and unlock additional TAPs. 4-7 Tough AP TAP-213 Software Installation and Configuration 7. Use the scroll down list to select the MAC addresses of those TAPs you would like to manage, and then click Add. Key in the password for the TAP device and then click OK to save. If you return to the search page and search for the TAP again, you will find that the TAP will unlock automatically. ATTENTION For security purposes, we suggest you can change the wireless search utility login password instead of using the default. To modify the configuration of the highlighted TAP, click on the Web icon to open the web console. This will take you to the web console, where you can make all configuration changes. Refer to Chapter 3, Using the Web Console, for information on how to use the web console. Click on Telnet if you would like to use telnet to configure your TAPs. 4-8 Tough AP TAP-213 Software Installation and Configuration Click Assign IP to change the IP setting. The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time elapsed between retries. 4-9 Tough AP TAP-213 Software Installation and Configuration Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the Wireless Search Utility. 4-10 5 Using Other Consoles This chapter explains how to access the TAP-213 for the first time. In addition to HTTP access, there are four ways to access TAP-213: USB console, Telnet console, SSH console, and HTTPS console. The USB console connection method, which requires using a short USB cable to connect the TAP-213 to a PCs COM port, can be used if you do not know the TAP-213s IP address. The other consoles can be used to access the TAP-213 over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
USB Console Configuration (115200, None, 8, 1, VT100) Configuration via Telnet and SSH Consoles Configuration by Web Browser with HTTPS/SSL Disabling Telnet and Browser Access Tough AP TAP-213 Using Other Console USB Console Configuration (115200, None, 8, 1, VT100) The USB console connection method, which requires using a short USB cable to connect the TAP-213 to a PCs COM port, can be used if you do not know the TAP-213s IP address. It is also convenient to use USB console configurations when you cannot access the TAP-213 over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. NOTE We recommend using the Moxa PComm (Lite) Terminal Emulator, which is available for download at:
http://www.moxa.com/product/download_pcommlite_info.htm. Before running PComm Terminal Emulator, use an M12 5-pin B-coded to USB type A cable to connect the TAP-213s USB console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the USB console utility. 1. From the Windows desktop, open the Start menu and run the PComm Terminal Emulator from the PComm (Lite) group. 2. In the Port Manager menu, select Open to open a new connection. 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue. NOTE
-The USB driver is available for download at: http://www.moxa.com/product/UPort_2210.htm
-You will see two COM ports. Select the first port (COM1) to connect to the TAP-213 USB console. The COM2 port is reserved for future use. 5-2 Tough AP TAP-213 Using Other Console 4. The Console login screen will appear. Log into the USB console with the login name (default: admin) and password (default: moxa, if no new password is set). 5. The TAP-213s device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. NOTE To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the USB cable or trigger DTR, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. 5-3 Tough AP TAP-213 Using Other Console Configuration via Telnet and SSH Consoles You may use Telnet or SSH client to access the TAP-213 and manage the console over a network. To access the TAP-213s functions over the network from a PC host that is connected to the same LAN as the TAP-213, you need to make sure that the PC host and the TAP-213 are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. NOTE The TAP-213s default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, go to Start Run, and then use Telnet to access the TAP-213s IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). 2. When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the TAP-213s IP address, specifying 22 for the SSH connection port. The console login screen is displayed. Refer to the USB Console Configuration section for login and administration information. 3. Log in into the command page (default username/password is admin/moxa, if no new password is set). TAP-213 supports the CLI mode. You can use the TAB key to check a related CLI command. 5-4 Tough AP TAP-213 Using Other Console Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the TAP-213 supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the TAP-213s web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<TAP-213s IP address> in the address field. Press Enter to establish the connection. 2. Click on continue to this website. The protocol in the URL changes to HTTPS. You can now enter your username and password to login into the function page. 5-5 Tough AP TAP-213 Using Other Console Disabling Telnet and Browser Access If you are connecting the TAP-213 to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-6 A References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you manage your TAP-213s and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP Tough AP TAP-213 Beacon References A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports of the same TAP-213. This feature is particularly helpful when the TAP-213 connects to older equipment, such as legacy switches. A-2 Tough AP TAP-213 Differences between RSTP and STP References RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. A-3 B Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery DoC (Declaration of Conformity) Federal Communication Commission Interference Statement Antenna Gain and RF Radiated Power R&TTE Compliance Statement Tough AP TAP-213 Supporting Information Firmware Recovery When the LEDs of FAULT, Signal Strength, CLIENT, BRIDGE and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The TAP-213 is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the TAP-213s ES-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. Press Ctrl - C and the following message will appear. Enter 2 to change the network setting. Specify the location of the TAP-213s firmware file on the TFTP server and press y to write the settings into flash memory. TAP-213 restarts, and the Press Ctrl-C to enter Firmware Recovery Process message will reappear. Press Ctrl-C to enter the menu and select 1 to start the firmware upgrade process. B-2 Tough AP TAP-213 Supporting Information Select 0 in the sub-menu to load the firmware image via LAN, and then enter the file name of the firmware to start the firmware recovery. DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Increase the separation between the equipment and receiver. Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator & your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC 15.407(e): Within the 5.15-5.25 GHz band, U-NII devices will be restricted to indoor operations to reduce any potential for harmful interference to co-channel MSS operations. B-3 Tough AP TAP-213 Supporting Information R&TTE Compliance Statement Moxa declares that the apparatus TAP-213 complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. B-4
various | Users Manual | Users Manual | 1.13 MiB | / January 08 2018 |
Moxa 802.11a/b/g/n WAPN008 Users Manual www.moxa.com First Edition, July 2015 2015 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. WAPN008 Users Manual The hardware and software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice Copyright 2015 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. MOXA is a registered trademark of Moxa Inc. Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Disclaimer Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas:
Toll-free: 1-888-669-2872 Tel:
+1-714-528-6777
+1-714-528-6778 Fax:
Moxa China (Shanghai office):
Toll-free: 800-820-5036 Tel:
Fax:
+86-21-5258-9955
+86-10-6872-3958 Moxa Europe:
Tel:
Fax:
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99 Moxa Asia-Pacific:
Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents Chapter 1 Introduction Overview Specification Chapter 2 Getting Started Module Layout Block Diagram Hardware Installation Software Installation WAPN008 Users Manual Introduction 11 Chapter 1 Introduction The following topics are covered in this chapter:
Overview Specifications WAPN008 Users Manual Introduction Overview WAPN008 PCI module is designed to provide wireless communication for Moxa industrial wireless products. It communicates via the standard 802.11a/b/g/n protocols on standard 2.4GHz/5GHz and 5GHz DFS channels. The WAPN008 uses the AR9344 SoC Wireless chipset from Atheros. Specification Features Chipset Baseband Processor (BBP) security engine Connectors Power requirement Dimension Operating Temperature Storage Temperature:
Operates in 2.4 and 5 GHz frequency bands. WAPN008 Atheros AR9344
- DSSS with DBPSK, DQPSK, CCK
- OFDM with BPSK, QPSK, 16QAM, 64QAM
-
-
802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 11 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps 802.11n: 64QAM @ 300 Mbps to BPSK @ 6.5 Mbps (multiple rates supported)
-
- 64-bit and 128-bit WEP encryption, WPA /WPA2-Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Defined BTB connector is using 2x40 pins header, and Support PCI Express standard. 3.3V +/-10%
60mm x 60mm x 1.2mm
-40 to +80
-40 to +150 US:
2.412 to 2.462 GHz (11 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels) 5.500 to 5.700 GHz (11 channels) 5.745 to 5.825 GHz (5 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels) 5.500 to 5.700 GHz (11 channels) JP:
2.412 to 2.484 GHz (14 channels) 5.180 to 5.240 (4 channels) 5.260 to 5.320 (4 channels) 5.500 to 5.700 GHz (11 channels) TX Transmit Power: 802.11b:
Typ. 261.5 dBm @ 1 Mbps, Typ. 261.5 dBm @ 2 Mbps, Typ. 261.5 dBm @ 5.5 Mbps, Typ. 251.5 dBm @ 11 Mbps 802.11g:
WAPN008 Users Manual Introduction RX Receive Sensitivity:
Typ. 241.5 dBm @ 6 to 24 Mbps, Typ. 221.5 dBm @ 36 Mbps, Typ. 201.5 dBm @ 48 Mbps, Typ. 181.5 dBm @ 54 Mbps 802.11n (2.4 GHz):
Typ. 231.5 dBm @ MCS0/8 20 MHz, Typ. 171.5 dBm @ MCS7/15 20 MHz Typ. 231.5 dBm @ MCS0/8 40 MHz, Typ. 171.5 dBm @ MCS7/15 40 MHz 802.11a:
Typ. 231.5 dBm @ 6 to 24 Mbps, Typ. 211.5 dBm @ 36 Mbps, Typ. 201.5 dBm @ 48 Mbps,Typ. 181.5 dBm @ 54 Mbps 802.11n (5 GHz):
Typ. 231.5 dBm @ MCS0/8 20 MHz, Typ. 181.5 dBm @ MCS7/15 20 MHz Typ. 231.5 dBm @ MCS0/8 40 MHz, Typ. 181.5 dBm @ MCS7/15 40 MHz 802.11b:
-93 dBm @ 1 Mbps, -93 dBm @ 2 Mbps,
-93 dBm @ 5.5 Mbps, -88 dBm @ 11 Mbps 802.11g:
-88 dBm @ 6 Mbps, -88 dBm @ 9 Mbps,
-85 dBm @ 12 Mbps, -85 dBm @ 18 Mbps,
-85 dBm @ 24 Mbps, -82 dBm @ 36 Mbps,
-78 dBm @ 48 Mbps, -74 dBm @ 54 Mbps 802.11n (2.4 GHz):
-70 dBm @ MCS7 20 MHz, -69 dBm @ MCS15 20 MHz
-67 dBm @ MCS7 40MHz, -67 dBm @ MCS15 40 MHz 802.11a:
-90 dBm @ 6 Mbps, -88 dBm @ 9 Mbps,
-85 dBm @ 12 Mbps, -85 dBm @ 18 Mbps,
-81 dBm @ 24 Mbps, -78 dBm @ 36 Mbps,
-78 dBm @ 48 Mbps, -72 dBm @ 54 Mbps 802.11n (5 GHz):
-69 dBm @ MCS7 20MHz, -71 dBm @ MCS15 20 MHz
-66 dBm @ MCS7 40MHz, -68 dBm @ MCS15 40 MHz 22 Chapter 2 Getting Started This chapter covers the module layout, and block diagram, hardware installation of the WAPN008. Software installation is covered in the next chapter. The following topics are covered:
Module Layout Block Diagram Hardware Installation Software Installation WAPN008 Users Manual Getting Started Module Layout Top and Bottom Block Diagram Below is a block diagram of the WAPN008. WAPN008 Users Manual Getting Started Connector Locations WAPN008 Users Manual Getting Started WAPN008 Users Manual Getting Started PCI Bus Connector PIN Assignments Function Connect to Pin Pin Function Connect to 3.3v 3.3v 3.3v 3.3v 3.3v 3.3v 3.3v GPIO 16 GPIO 17 GND GPIO 21 GPIO 1 GND GPIO 4 GND GPIO 0 GND GPIO 3 GPIO 9 GPIO 10 GPIO 13 GPIO 14 GPIO 20 GND GPIO 22 GND GPIO 2 GND GPIO 11 GND GPIO 12 GND GPIO 15 GND SYS_RST_L AVDD18 AVDD18 AVDD18 GND GND 3.3v 3.3v 3.3v 3.3v 3.3v 3.3v 3.3v I2C_SCLK I2C_DATA GND POWER 2 JP1 Debug GND S17_INT GND I2C_INT0 GND UR_DSR UR_SIN UR_SOUT MDC MDIO POWER 1 GND POWER 3 GND UR_DTR GND Reset GND LAN 10/100 GND Reserved GND GIGA PHY Reset Fast Ethernet bios Fast Ethernet bios Fast Ethernet bios GND GND 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49 51 53 55 57 59 61 63 65 67 69 71 73 75 77 79 GND GND ERXD3 ERXD2 ERXD1 ERXD0 GND GND ETX_CLK GND GND ETX_EN GND GND ETXD3 ETXD2 ETXD1 ETXD0 GND GND ERX_CLK GND GND ERX_EN GND GND EMDC EMDIO GND GND TXP0 TXN0 GND RXP0 RXN0 GND GND USB_DM USB_DP GND GND GND PHY RGMII PHY RGMII PHY RGMII PHY RGMII GND GND ETX_CLK GND GND ETX_EN GND GND PHY RGMII PHY RGMII PHY RGMII PHY RGMII GND GND ERX_CLK GND GND ERX_EN GND GND GIGA PHY GIGA PHY GND GND 10/100 LAN 10/100 LAN GND 10/100 LAN 10/100 LAN GND GND USB port USB port GND WAPN008 Users Manual Getting Started Hardware Installation The WAPN008 can be installed into all Moxa wireless system board series. Step for Installation 1. Install the WAPN008 PCI card on the system board. Apply pressure to both bus connectors and gently press the board onto the stack. The board should slide into the matching bus connectors. Do not attempt to force the board, as this can lead to bent/broken pins. 2. Screw on the WAPN008 PCI card. 3. Screw on the all the necessary chassis. Software Installation After physically installing the WAPN008, your operating system must be configured to recognize the new system board. Step for Installation 1. Apply power to the system board. 2. Connect system board and PC with Ethernet cable. 3. Open a browser and type: 192.168.127.253 to open the system login webpage. 4. Login the webpage with default password: root in order to verify that all of the hardware is install properly. WAPN008 Users Manual Getting Started Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution:
To assure continued compliance, (example - use only shielded interface cables when connecting to computer or peripheral devices) any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE:
This module is restricted to mobile configuration. To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. This transmitter module must not be co-located or operating in conjunction with any other antenna or transmitter CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment. End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20cm may be maintained between the antenna and users. The final end product must be labeled in a visible area with the following: "Contains FCC ID: SLE-WAPN008 WAPN008 Users Manual Getting Started Information for the OEMs and Integrators The following statement must be included with all versions of this document supplied to an OEM or integrator, but should not be distributed to the end user. 1) This device is intended for OEM integrators only. 2) Please see the full Grant of Equipment document for other restrictions. This radio transmitter FCCID: SLE-WAPN008 has been approved by FCC to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. Antenna List No. Manufacturer Part No. Antenna Type Peak Gain 1 2 3 4 5 6 7 8 9 MOXA MOXA MOXA ANT-WDB-O-2 BK ANT-WDB-ANM-0502 ANT-WDB-PNF-1518 Dipole Dipole 2.9dBi for 2.4 GHz 2.34dBi for 5GHz 4.62dBi for 2.4 GHz 1.41dBi for 5GHz Directional Panel 15dBi for 2.4 GHz MOXA ANT-WDB-ANM-0306 Omni-directional 3.5dBi For 2.4GHz 6.0dBi For 5GHz MOXA MAT-WDB-CA-RM-2-0205 Omni-directional 2.0dBi For 2.4GHz 5.0dBi for 5 GHz MOXA MAT-WDB-DA-RM-2-0203-1m Omni-directional 2.0dBi For 2.4GHz 3.0 Bi for 5 GHz MOXA ANT-WDB-ARM-0202 Omni-directional 1.8dBi For 2.4GHz 1.8dBi for 5 GHz MOXA MOXA ANT-WSB-AHRM-05-1.5m BK Omni-directional 5.0dBi For 2.4GHz ANT-WDB-ARM-02 Omni-directional 2.0dBi For 2.4GHz 2.0dBi for 5 GHz 10 MOXA ANT-WDB-ANM-0502 Omni-directional 5.0dBi For 2.4GHz 2.0dBi for 5GHz 11 12 MOXA MOXA ANT-WSB-ANF-09 Omni-directional 9.0dBi For 2.4GHz ANT-WDB-ANF-0407 Omni-directional 4.0dBi For 2.4GHz 7.0dBi for 5 GHz 13 MOXA ANT-WDB-ANM-0407 Omni-directional 4.0dBi For 2.4GHz 7.0dBi for 5 GHz 14 MOXA ANT-WDB-ANF-0609 Omni-directional 6.0dBi For 2.4GHz 9.0dBi for 5 GHz 15 MOXA ANT-WDB-ANM-0609 Omni-directional 6.0dBi For 2.4GHz MOXA ANT-WSB5-ANF-12 Omni-directional 12dBi for 5 GHz 9.0dBi for 5 GHz 16 WAPN008 Users Manual Getting Started NCC :
(OEM Integrator)
(End Product) NCC :
CCXXxxYYyyyZzW
various | WAPN008- UserMan 0816 | Users Manual | 4.31 MiB |
Moxa Tough AP TAP-323 Users Manual Edition 1.0, November 2017 www.moxa.com/product 2017 Moxa Inc. All rights reserved. Moxa Tough AP TAP-323 Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2017 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support
+1-714-528-6777
+1-714-528-6778 Moxa Americas Toll-free: 1-888-669-2872 Tel:
Fax:
Moxa Europe Tel:
Fax:
Moxa India Tel:
Fax:
+91-80-4172-9088
+91-80-4132-1045
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99
+86-21-5258-9955
+86-21-5258-5505 Moxa China (Shanghai office) Toll-free: 800-820-5036 Tel:
Fax:
Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents 1. Introduction ...................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................ 1-2 Product Specifications ......................................................................................................................... 1-3 Functions ........................................................................................................................................... 1-7 LED Indicators ............................................................................................................................ 1-7 Reset Button ............................................................................................................................... 1-9 2. Getting Started ................................................................................................................................. 2-1 First-Time Installation and Configuration ............................................................................................... 2-2 Communication Testing ....................................................................................................................... 2-3 How to Test One TAP-323............................................................................................................. 2-3 How to Test Two or More TAP Units ............................................................................................... 2-4 Function Guide Map ............................................................................................................................ 2-5 3. Web Console Configuration ............................................................................................................... 3-1 Configuration by Web Browser ............................................................................................................. 3-2 Overview ........................................................................................................................................... 3-3 Basic Settings .................................................................................................................................... 3-4 System Info Settings ................................................................................................................... 3-4 Network and LAN Port Settings ..................................................................................................... 3-5 Time Settings ............................................................................................................................. 3-6 Wireless Settings ................................................................................................................................ 3-8 Operation Mode .......................................................................................................................... 3-8 WLAN Security Settings ............................................................................................................. 3-11 Advanced Wireless Settings ........................................................................................................ 3-19 WLAN Certification Settings (for EAP-TLS in Slave mode only) ........................................................ 3-22 WAC Settings (AP Mode Only) ..................................................................................................... 3-22 Advanced Settings ............................................................................................................................ 3-23 Using Virtual LAN ...................................................................................................................... 3-23 DHCP Server (for AP operation mode only) ................................................................................... 3-26 Packet Filters ............................................................................................................................ 3-27 Introduction to Redundancy Protocol ........................................................................................... 3-29 RSTP/Turbo Chain Settings (For Master or Slave Mode Only) .......................................................... 3-35 SNMP Agent ............................................................................................................................. 3-39 PoE Settings ............................................................................................................................. 3-40 Mobile IP Settings ..................................................................................................................... 3-41 Auto Warning Settings ....................................................................................................................... 3-42 System Log .............................................................................................................................. 3-43 Syslog ..................................................................................................................................... 3-44 E-mail ...................................................................................................................................... 3-45 Trap ........................................................................................................................................ 3-46 Status ............................................................................................................................................. 3-47 Wireless Status ......................................................................................................................... 3-47 Associated Client List (for AP or Master Mode only) ........................................................................ 3-48 DHCP Client List (for AP mode only) ............................................................................................ 3-49 System Log .............................................................................................................................. 3-49 RSTP Status ............................................................................................................................. 3-50 Turbo Chain Status .................................................................................................................... 3-50 LAN Status ............................................................................................................................... 3-50 Maintenance .................................................................................................................................... 3-50 Console Settings ....................................................................................................................... 3-51 Ping ......................................................................................................................................... 3-51 Firmware Upgrade ..................................................................................................................... 3-51 Config Import Export ................................................................................................................. 3-52 MIB Export ............................................................................................................................... 3-53 Load Factory Default .................................................................................................................. 3-53 Username/Password .................................................................................................................. 3-54 Locate Device ........................................................................................................................... 3-54 Misc. Settings ........................................................................................................................... 3-54 Save Configuration ........................................................................................................................... 3-55 Restart ............................................................................................................................................ 3-55 Logout ............................................................................................................................................ 3-56 4. Software Installation/Configuration ................................................................................................. 4-1 Overview ........................................................................................................................................... 4-2 Wireless Search Utility ......................................................................................................................... 4-2 Installing Wireless Search Utility ................................................................................................... 4-2 Configuring Wireless Search Utility ................................................................................................ 4-5 5. Using Other Consoles ........................................................................................................................ 5-1 USB Console Configuration (115200, None, 8, 1, VT100) ......................................................................... 5-2 Configuration via Telnet and SSH Consoles ............................................................................................ 5-4 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-5 Disabling Telnet and Browser Access ..................................................................................................... 5-6 A. References ........................................................................................................................................ A-1 Beacon .............................................................................................................................................. A-2 DTIM ................................................................................................................................................. A-2 Fragment ........................................................................................................................................... A-2 RTS Threshold .................................................................................................................................... A-2 STP and RSTP .................................................................................................................................... A-2 The STP/RSTP Concept ................................................................................................................ A-2 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery ............................................................................................................................. B-2 DoC (Declaration of Conformity) ........................................................................................................... B-3 Federal Communication Commission Interference Statement ............................................................ B-3 Canada, Industry Canada (IC) Notices ........................................................................................... B-4 Antenna Gain and RF Radiated Power ............................................................................................ B-5 RED Compliance Statement ....................................................................................................... B-7 1 1. Introduction Moxa Tough AP TAP-323 with dual-RF wireless capability allows wireless users to access network resources more reliably. The TAP-323 is rated to operate at temperatures ranging from -40 to 75C and is rugged enough for any harsh industrial environment. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functions LED Indicators Reset Button TAP-323 Overview Introduction The TAP-323 outdoor dual-RF track-side wireless AP provides a complete and flexible solution for railway train-to-ground applications in demanding environments. The TAP-323 is rated to operate at temperatures ranging from -40 to 75C, and its dustproof and weatherproof design is IP68-rated, allowing you to install the unit outdoors in the open or in tunnels. With two independent RF modules, the TAP-323 supports a greater variety of wireless configurations and applications. It can also increase the reliability of your entire wireless network by enabling redundant wireless connections. The TAP-323 has two AC power inputs for redundancy to increase the reliability of the power supply, and can be powered via PoE. The TAP-323 is a fully integrated AP and switch, with fiber ports and AC power supply in one box, and is ideal for use as a track-side AP for train-to-ground communication applications, including Communication Based Train Control (CBTC) and Closed-Circuit Television (CCTV). Package Checklist 1 TAP-323 1 wall-mounting kit, including 2 plates 1 fiber panel mounting kit 6 metal protective caps for Ethernet ports LAN-1 to LAN-4, the USB console port, and the ABC-02 USB storage port*
5 metal protective caps for 4 antenna ports and 1 optional antenna port 3 antenna glands for top side antenna 1 metal M23 male 6-pin crimp connector for power 1 plastic M23 dust cover for power Quick installation guide (printed) Warranty card NOTE
*The ABC-02 and SFP modules are not included and can be purchased separately. For a list of recommended optional accessories, refer to the TAP-323 datasheet, available at:
http://www.moxa.com/product/TAP-323.htm Product Features All-in-one design that combines a dual access point, a switch, and AC to DC power supply in one box to Power supply through 4 PoE ports for wayside PoE devices avoid interoperability issues between different components IP68-rated high-strength metal housing Isolated 110 to 220 VDC/VAC power input Dual-RF design 2 fiber SFP ports for backbone installation 2x2 MIMO technology Rugged M12 design for Ethernet port, console port, and USB port Certified against the EN 50121-4 railway standard Controller-based Turbo Roaming Supports Moxas Turbo Chain*, which is a redundancy technology to provide fast recovery time and ensure
-40 to 75C operating temperature range non-stop operation of your wayside network Supports RSTP function to prevent network looping Supports 5.8 GHz band in the standard model 1-2 TAP-323 Introduction Supports QoS function, which can help assign high priority to your critical traffic Provides advanced wireless security settings Provides 64-bit and 128-bit WEP/WPA/WPA2 encryption SSID Hiding, IEEE 802.1x security, and RADIUS Packet access control and filtering Supports SNMP, SNTP, SSH, HTTPS, TFTP for remote management Long-distance transmission support
(There are many factors that affect the performance of a device when it is used in long-distance applications. These factors include: 1. Test architecture 2. Installation distance 3. Car speed 4. Antenna gain 5. Band 6. Transmission Power 7. Signal Strength. For details, please contact your Moxa sales representative. ) Wall mountable
*100 ms recovery time Product Specifications WLAN Interface Standards:
IEEE 802.11a/b/g/n for Wireless LAN IEEE 802.11i for Wireless Security IEEE 802.3 for 10BaseT IEEE 802.3u for 100BaseT(X) IEEE 802.3ab for 1000BaseT IEEE 802.3af for Power-over-Ethernet IEEE 802.1D for Spanning Tree Protocol IEEE 802.1w for Rapid STP IEEE 802.1p for Class of Service IEEE 802.1Q for VLAN Spread Spectrum and Modulation (typical):
DSSS with DBPSK, DQPSK, CCK OFDM with BPSK, QPSK, 16QAM, 64QAM 802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 11 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps Operating Channels (central frequency):
US:
2.412 to 2.462 GHz (11 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (8 channels; excludes 5.600 to 5.640 GHz)* 5.745 to 5.825 GHz (5 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
JP:
2.412 to 2.484 GHz (14 channels, DSSS) 5.180 to 5.240 GHz (4 channels) 5.260 to 5.320 GHz (4 channels)*
5.500 to 5.700 GHz (11 channels)*
*Special frequency bands (such as 5.9 GHz) are available for customization. 1-3 TAP-323 Introduction Security:
SSID broadcast enable/disable Firewall for MAC/IP/Protocol/Port-based filtering 64-bit and 128-bit WEP encryption, WPA /WPA2-Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Transmission Rates:
802.11b: 1, 2, 5.5, 11 Mbps 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps 1-4 TAP-323 Introduction Protocol Support General Protocols: Proxy ARP, DNS, HTTP, HTTPS, IP, ICMP, SNTP, TCP, UDP, RADIUS, SNMP v1/v2/v3, PPPoE, DHCP AP-only Protocols: ARP, BOOTP, DHCP, STP/RSTP (IEEE 802.1D/w) Interface Connector for External Antennas: N-type (female) Fast Ethernet ports: 4, side cabling, M12 D-coded 4-pin female connector, 10/100BaseT(X) auto negotiation speed, F/H duplex mode, and auto MDI/MDI-X connection, 802.1af PoE power budget Console Port: M12 B-coded 5-pin female connector for the USB console USB Port: M12 A-coded 5-pin female connector for ABC-02 USB storage Fiber Ports: 2, 100/1000BaseSFP slot LED Indicators: PWR1, PWR2, PoE1-4, FAULT1, FAULT2, STATUS, HEAD, TAIL, LAN1-6, WLAN1, WLAN2 Physical Characteristics Housing: Metal, IP68 protection Weight: 10 kg (22.22 lb) Dimensions: 324 x 279 x 156 mm (12.76 x 10.98 x 6.142 in) Installation: Wall mounting Environmental Limits Operating Temperature: -40 to 75C (-40 to 167F) Storage Temperature: -40 to 85C (-40 to 185F) 1-5 TAP-323 Introduction Ambient Relative Humidity: 5% to 95% (non-condensing) Power Requirements Input Voltage: 110/220 VDC/VAC (88 to 300 VDC, 85 to 264 VAC) Connector: M23 Input Current:
AC input: 110 to 220 VAC, 50 to 60 Hz, 1.1 A (max.) DC input: 110 to 220 VDC, 1.1 A (max.) Power Consumption:
Maximum 85 watts (with PSE ports fully loaded) Reverse Polarity Protection: Present Overload Current Protection: Present Standards and Certifications Safety: UL 60950-1, IEC 60950-1(CB), LVD EN 60950-1 EMC: EN 301 489-1/17, EN 55032/55024 EMI: CISPR 22, FCC Part 15B Class A EMS :
IEC 61000-4-2 ESD: Contact: 6 kV; Air: 8 kV IEC 61000-4-3 RS: 80 MHz to 1 GHz: 20 V/m IEC 61000-4-4 EFT: Power: 2 kV; Signal: 2 kV IEC 61000-4-5 Surge: Power: 2 kV; Signal: 2 kV IEC 61000-4-6 CS: 10 V IEC 61000-4-8 Radio: EN 301 489-1/17, EN 300 328, EN 301 893, TELEC, DFS, FCC, IC, WPC Rail Traffic: EN 50155 (mandatory compliance*), EN 50121-4
*This product is suitable for rolling stock railway applications, as defined by the EN 50155 standard. For a more detailed statement, click here: www.moxa.com/doc/specs/EN_50155_Compliance.pdf. Reliability MTBF (mean time between failures):
290,937 hrs Standard : Telcordia SR332 Warranty Warranty Period: 5 years Details: See www.moxa.com/warranty ATTENTION The TAP-323 is NOT a portable mobile device and should be located at least 20 cm away from the human body. The TAP-323 is NOT designed for the general consumer. A well-trained technician is required to safely deploy TAP-323 units and establish a wireless network. 1-6 TAP-323 Functions LED Indicators Introduction The LEDs on the front panel of TAP-323 allow you to quickly identity the wireless status and settings. The FAULT LED will light up to indicate system failure or user-configured events. If the TAP-323 cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one second intervals. The following table is a summary of the wireless settings and LED displays. You can check the status of the TAP-323 by reading these LEDs. More information about Basic Wireless Settings is presented in Chapter 3. LED PWR1 Color Green PWR2 Green FAULT1 Red STATUS Green Red State On Off On Off On Blinking (slow at 1-second intervals) Blinking (fast at 0.5-second intervals) Off On Blinking (slow at 1-second intervals) On Description Power is being supplied (from power input 1) Power is not being supplied Power is being supplied (from power input 2) Power is not being supplied System is booting up Cannot get an IP address from the DHCP server IP address conflict Normal status System startup is complete and the system is in operation. The AWK Search Utility has located the AWK device. System is booting up 1-7 TAP-323 LED HEAD Color Green State On Blinking Off TAIL Green On WLAN 1 Green Amber WLAN 2 Green Amber LAN 1-4 Amber LAN 5-6 Green Amber PoE 1-4 Green Blinking Off On Blinking Off On Blinking Off On Blinking Off On Blinking Off On Blinking Off On Blinking Off On Blinking Off On Off Introduction Description The TAP unit is configured as the HEAD TAP unit of a Turbo Chain The TAP units head port link is disconnected The TAP unit is not configured as the HEAD TAP unit of a Turbo Chain The TAP unit is configured as a TAIL TAP unit of a Turbo Chain The TAP TAIL units port link is disconnected or in blocking state The TAP unit is not configured as the TAIL TAP unit of a Turbo Chain The WLAN is in Slave mode The WLAN is transmitting data in Slave mode The WLAN is not in use or is not working properly The WLAN is in AP/ Master mode The WLAN is transmitting data in AP/ Master mode The WLAN is not in use or is not working properly The WLAN is in Slave mode. The WLAN is transmitting data in Slave mode The WLAN is not in use or is not working properly The WLAN is in AP/Bridge/Master mode The WLAN is transmitting data in AP/Bridge/Master mode The WLAN is not in use or is not working properly The LAN ports 10/100 Mbps link is active Data is being transmitted at 10/100 Mbps The LAN ports 10/100 Mbps link is inactive The LAN ports 1000 Mbps link is active Data is being transmitted at 1000 Mbps The LAN ports 1000 Mbps link is inactive The LAN ports 100 Mbps link is active Data is being transmitted at 100 Mbps The LAN ports 100 Mbps link is inactive The PSE port is supplying power to a powered device The PSE port is not supplying power Note: The FAULT2 LED is reserved for future use. ATTENTION When the LEDs for STATE (Green), FAULT, WLAN1, and WLAN2 all light up simultaneously and blink at one-second intervals, it means that the system failed to boot. This may be due to an improper operation or issues such as an unexpected shutdown during a firmware update. To recover the firmware, refer to Firmware Recovery in Chapter 7. 1-8 TAP-323 Reset Button Introduction The RESET button is located on the bottom panel of the TAP-323. You can reboot the TAP-323 or reset it to factory default settings by pressing the RESET button with a pointed object such as an unfolded paper clip. System reboot: Hold the RESET button down for less than 5 seconds and then release. Reset to factory default: Hold the RESET button down for over 5 seconds until the STATE LED starts blinking green. Release the button to reset the TAP-323. For security reasons, the reset button can be configured to be disabled for 60 seconds after the device reboots. STEP 1:
Remove the reset button cover. STEP 2:
Using a pointed object, press and hold the reset button. NOTE 1-9 2 2. Getting Started This chapter explains how to install Moxas TAP-323 for the first time, quickly set up your wireless network, and test whether or not the connection is running properly. With the function guide, you can easily find the functions you need. The following topics are covered in this chapter:
First-Time Installation and Configuration Communication Testing How to Test One TAP-323 How to Test Two or More TAP Units Function Guide Map TAP-323 Getting Started First-Time Installation and Configuration Take the following steps to configure your TAP-323. Refer to the section Panel Layout of the TAP-323 below to see where the various ports are located on the product. Step 1: Select a power source Connect the TAP-323 to either a 110 to 220 VDC or 110 to 220 VAC power source. Step 2: Connect the TAP-323 to a computer Use either a straight-through or crossover Ethernet cable to connect the TAP-323 to a computer. When the connection between the TAP-323 and the computer is established, the LED indicator on the TAP-323s LAN port will light up. See the section 10/100BaseT(X) Ethernet Ports below for detailed instructions. Step 3: Set up the computers IP address. The computers IP address must be on the same subnet as the TAP-323. Since the TAP-323s default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, set the computers IP address to 192.168.127.252
(for example), and subnet mask to 255.255.255.0. NOTE After you select Maintenance Load Factory Default and click the Submit button, the TAP-323 will reset to factory default settings and the IP address will also reset to 192.168.127.253. Step 4: Use the web-based manager to configure the TAP-323 Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based manager. Enter the User name and Password to open the TAP-323 homepage. If you are configuring the TAP-323 for the first time, enter the following:
NOTE Default user name and password:
admin moxa User Name:
Password:
For security reasons, we strongly recommend changing the default password. To do so, select Maintenance Password, and then follow the on-screen instructions. NOTE After you click Submit to apply changes, the web page will refresh, and then the string (Updated) and a blinking reminder will be displayed on the upper-right corner of the page, as illustrated below. To make the changes effective, click Restart and then Save and Restart after you change the settings. About 30 seconds are needed for the TAP-323 to complete its restart process. Step 5: Select the operation mode By default, the TAP-323s operation mode is set to Wireless redundancy. If you would like to use Wireless bridge or AP mode instead, you can change the setting in Wireless Settings Operation mode. Detailed information about configuring the TAP-323s operation mode can be found in Chapter 3. Step 6: Test the network connection In the following sections we describe two methods that you can use to test that a network connection has been established. 2-2 TAP-323 Getting Started Communication Testing After installing the TAP-323 you can run a sample test to make sure the wireless connection on the TAP-323 is functioning normally. Two testing methods are described below. Use the first method if you are using only one TAP-323 device and the second method if you are using two or more TAP units. How to Test One TAP-323 If you are only using one TAP-323, you will need one additional notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the TAP-323 (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (Notebook B) so that it is on the same subnet as the first notebook (Notebook A), which is connected to the TAP-323. After configuring the WLAN card, establish a wireless connection with the TAP-323 and open a DOS window on Notebook B. At the prompt, type the following:
ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 2-3 TAP-323 Getting Started How to Test Two or More TAP Units If you have one TAP-323 and oneTAP-323 unit, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the TAP-323 connected to notebook A and change the TAP-323 connected to notebook B to Client mode, and then configure the notebooks and TAP units properly. After setting up the testing environment, open a DOS window on notebook B. At the prompt type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In the latter case, recheck the configuration to make sure the settings are correct. 2-4 TAP-323 Getting Started Function Guide Map The management functions are organized in a tree and shown in the left field of the web-based management console. You can efficiently locate the function you need with the following guiding map. A quick overview of the TAP-323s status Basic settings for administering the TAP-323 Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional. Application-oriented device management functions to set up events, traps, and reactions via relay warning, e-mail, and SNMP notification Note: These functions are all optional. Real-time status information to monitor wired/wireless network performance, advanced services, and device management functions On-demand functions to support the operation of the web-based console Functions to maintain the TAP-323 and diagnose the network 2-5 3 3. Web Console Configuration In this chapter, we will explain each web management page of the web-based console configuration. Moxas easy-to-use management functions will help you set up your TAP-323, as well as establish and maintain your wireless network easily. The following topics are covered in this chapter:
Configuration by Web Browser Overview Basic Settings System Info Settings Network and LAN Port Settings Time Settings Wireless Settings Operation Mode WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (for EAP-TLS in Slave mode only) WAC Settings (AP Mode Only) Advanced Settings Using Virtual LAN DHCP Server (for AP operation mode only) Packet Filters Introduction to Redundancy Protocol RSTP/Turbo Chain Settings (For Master or Slave Mode Only) SNMP Agent PoE Settings Auto Warning Settings System Log Syslog E-mail Trap Status Wireless Status Associated Client List (for AP or Master Mode only) DHCP Client List (for AP mode only) System Log RSTP Status Turbo Chain Status LAN Status Maintenance Console Settings Ping Firmware Upgrade Config Import Export MIB Export Load Factory Default Username/Password Locate Device Misc. Settings Save Configuration Restart Logout TAP-323 Web Console Configuration Configuration by Web Browser Moxa TAP-323s web browser interface provides a convenient way to modify its configuration and access the built-in monitoring and network administration functions. NOTE To use the TAP-323s management and monitoring functions from a PC host connected to the same LAN as the TAP-323, you must make sure that the PC host and TAP-323 are on the same logical subnet. Similarly, if the TAP-323 is configured for other VLAN settings, you must make sure your PC host is on the management VLAN. The Moxa TAP-323s default IP is 192.168.127.253. Follow the steps below to access the TAP-323s web-based console management. 1. Open your web browser (e.g., Internet Explorer) and type the TAP-323s IP address in the address field. Press Enter to establish the connection. 2. The Web Console Login page will open. Enter the password (User Name is set as admin; the default password is moxa if a new password has not been set.) and then click Login to continue. You may need to wait a few moments for the web page to load on your computer. Note that the Model name and IP address of your TAP-323 are both displayed in the web page title. This information can help you identify multiple TAP-323 units. You can use the menu tree on the left side of the window to open the function pages to access each of TAP-323s functions. 3. Use the menu tree on the left side of the window to open the configuration pages for the TAP-323s functions. 3-2 TAP-323 Web Console Configuration In the following sections, we will review each of the TAP-323s management functions in detail. You can also get a quick overview of these functions in the Function Guide Map section of Chapter 2. ATTENTION The model name of the TAP-323 is shown as TAP-323-XX where XX indicates the country code. The country code represents the TAP-323 version and which bandwidth it uses. We use TAP-323-US as an example in the following figures. The country code of the model name on the screen may vary if you are using a different version (band) TAP-323. ATTENTION For security reasons, you will need to log back into the TAP-323 after a 3-minute time-out. Overview The Overview page summarizes the TAP-323s current status. The information is categorized into the groups:
System info, Device info, and 802.11 info. Click on the SSID (MOXA, in this case) to display detailed information on 802.11as shown below:
3-3 TAP-323 Web Console Configuration Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the TAP-323. System Info Settings The System Info items, especially Device name and Device description, are displayed and included on the Overview page. Setting System Info items makes it easier to identify the different TAP-323s connected to your network. Device name Setting Max. 31 Characters Device location Setting Max. 31 Characters Device description Setting Max. 31 Characters Description This option is useful for specifying the role or application of different TAP-323 units. Factory Default TAP-323_<Serial No. of this TAP-323>
Description To specify the location of different TAP-323 units. Factory Default None Description Use this space to record a more detailed description of the TAP-323 Factory Default None Device contact information Setting Max. 31 Characters Description Use this space to record contact information of the person responsible for maintaining this TAP-323. Factory Default None 3-4 TAP-323 Web Console Configuration Network and LAN Port Settings The Network and LAN Settings configuration allows you to modify the usual TCP/IP network parameters. An explanation of each configuration item is given below. The TAP-323s LAN ports also support management functions including queue scheduling, traffic rate limitation on the LAN ports for bandwidth management, and CoS (Class of Service). Description The TAP-323s IP address will be assigned automatically by the networks DHCP server Set up the TAP-323s IP address manually. Factory Default Static IP configuration Setting DHCP Static IP address Setting TAP-323s IP address Description Identifies the TAP-323 on a TCP/IP network. Subnet mask Setting TAP-323s subnet mask Identifies the type of network to which the TAP-323 is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Description Factory Default 192.168.127.253 Factory Default 255.255.255.0 Gateway Setting TAP-323s default gateway Description The IP address of the router that connects the LAN to an outside network. Factory Default None 3-5 TAP-323 Web Console Configuration Primary/ Secondary DNS server Setting IP address of Primary/
Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can input the TAP-323s URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Queue Scheduling Setting Queue Scheduling Enable Rate limit Set CoS CoS Value (0~7) Flow Control Description Weight: This method services all traffic queues, with priority given to the higher priority queues. In most circumstances, the weight method gives precedence to high priority over low priority, but if the high priority traffic does not reach the link capacity, lower priority traffic is not blocked. Strict: This method services high traffic queues first; low priority queues are delayed until no more high priority data needs to be sent. The strict method always gives precedence to high priority over low priority. Checked: Allows data transmission through the port. Unchecked: Immediately shuts off port access. Select the LAN traffic rate limit (% of max. throughput) for all packets, from the following options: Not Limited, 3%, 5%, 10%, 15%, 25%, 35%, 50%, 65%, 85%
Checked or unchecked the Moxa TAP for inspecting 802.1p CoS tags in the MAC frame to determine the priority of each frame. Maps different CoS values to 4 different egress queues. 0: Low 1: Low 2: Normal 3: Normal 4: Medium 5: Medium 6: High 7: High This setting enables or disables flow control for the port when the ports Speed is set to Auto. The final result will be determined by the Auto process between the Moxa TAP and connected devices. Checked: Enables flow control for this port when the ports Speed is set to Auto. Unchecked: Disables flow control for this port when the ports Speed is set to Auto. Factory Default None Factory Default Strict checked No limit unchecked 0 Unchecked Time Settings The TAP-323 has a time calibration function that can update the date and time information based on an NTP server or the date and time information specified by the user. 3-6 TAP-323 Web Console Configuration The Current local time shows the TAP-323s system time when you open this web page. After you update the date and time setting, click on the Set Time button to activate the new date and time. An (Updated) string is displayed next to the date and time fields to indicate that the change is complete. Any change in the date and time setting is effective immediately and does not need a system restart. NOTE The TAP-323 has a built-in real time clock (RTC). The RTC is a computer clock (most often in the form of an integrated circuit) that keeps track of the current time. We strongly recommend that users update the Time Settings of the TAP-323 after the initial setup is complete or when the TAP is switched on after a long-term shutdown, especially if the network does not have an Internet connection for accessing a NTP server or there is no NTP server on the LAN. Current local time Setting User adjustable time Time zone Setting User selectable time zone Description The date and time parameters allow configuration of the local time with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss Factory Default None Description The time zone setting allows the conversion from GMT
(Greenwich Mean Time) to the local time. Factory Default GMT ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Enable/ Disable Description Daylight saving time (also known as DST or summer time) involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. Factory Default Disable When Daylight saving time is enabled, the following parameters can be shown:
The Starts at parameter allows users to enter the date that daylight saving time begins. The Stops at parameter allows users to enter the date that daylight saving time ends. The Time offset parameter indicates how many hours forward the clock should be advanced. 3-7 TAP-323 Web Console Configuration Time server 1/2 Setting The 1st/2nd time server IP/Name Query period Setting Query period time
(1 to 9999 seconds) Description IP or Domain address of NTP time server. The 2nd time will be used if the 1st NTP server fails to connect. Factory Default time.nist.gov Description This parameter determines how often the time is updated from the NTP server. Factory Default 600 (seconds) Wireless Settings The essential settings for wireless networks are presented in this function group. You must configure the settings correctly before establishing your wireless network. Operation Mode The essential settings for wireless networks are presented in the wireless settings function group. You must configure these settings correctly before you establish your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP NOTE In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Matching Table for APs WLANs:
WLAN 1 AP WLAN 2 AP Allowable Setting Allow TAP-323 units are meant to be used as trackside access points and hence the client operation mode is not supported. 3-8 TAP-323 Web Console Configuration Wireless Bridge A bridge is a network component that connects two networks. The TAP-323s bridge operation is based on the AP (Master) and Client (Slave) concept. Both sides of the connection must have the same RF type, SSID, and security settings. For single RF mesh networks, we can use WDS to establish a static bridge link. In this case, the APs at both ends of the WDS link must be configured manually with each others MAC addresses. The performance of a single RF bridge will be poor if more nodes are added. The TAP-323s dual RF bridge concept is different from using a single RF, because the TAP-323 has dual RFs that offer users a cascade link to bridge the two ends without narrowing down the throughput. WLAN 1/WLAN 2 Enable Setting WLAN1 enable WLAN2 enable Description Turn on/off the WLAN 1 radio by selecting Enable or Disable Turn on/off the WLAN 2 radio by selecting Enable or Disable WLAN 1/WLAN 2 Operation mode Description Setting Master mode can build a connection with a Slave that has the Master same RF type, SSID, and security settings. Slave mode can build a connection with a master that has the same RF type, SSID, and security settings. The most common mode used by a TAP-323 wherein it plays the role of a wireless AP Slave AP Factory Default Enable Factory Default AP for WLAN 1 Master for WLAN 2 Basic Wireless Settings (Multiple SSIDs) You can add new SSIDs or edit existing ones in the WLAN Basic Setting Selection panel. You can configure up to 9 SSIDs for a TAP and configure each SSID differently. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. All of the SSIDs that you configure for an AP are active at the same time. That is, client devices can use any of the SSIDs to associate with the AP. 3-9 TAP-323 Web Console Configuration To create an SSID for your TAP, click on Add SSID. To edit an existing SSID and assign different configuration settings to it, click on the Edit button corresponding to the SSID. A configuration panel is displayed as follows:
Factory Default B/G/N Mixed RF type Setting 2.4 GHz B G B/G Mixed G/N Mixed B/G/N Mixed N Only (2.4GHz) 5 GHz A A/N Mixed N Only (5GHz) Description Only supports the IEEE 802.11b standard Only supports the IEEE 802.11g standard Supports IEEE 802.11b/g standards, but 802.11g might operate at a slower speed when 802.11b clients are on the network Supports IEEE 802.11g/n standards, but 802.11n might operate at a slower speed if 802.11g clients are on the network Supports IEEE 802.11b/g/n standards, but 802.11g/n might operate at a slower speed if 802.11b clients are on the network Only supports the 2.4 GHz IEEE 802.11n standard Only supports the IEEE 802.11a standard Supports IEEE 802.11a/n standards, but 802.11n may operate at a slower speed if 802.11a clients are on the network Only supports the 5 GHz IEEE 802.11n standard Channel (for AP mode only) Setting The available channels vary with the RF type setting Description The channel on which the TAP should operate. The TAP-323 plays the role of a wireless AP here. Channel Width (for any 11N RF type only) Setting 20 MHz 20/40 MHz Description Select the channel width. If you are not sure, use the 20/40 MHz (Auto) option Factory Default 6 (in B/G/N Mixed mode) Factory Default 20 MHz Channel bonding If you have selected 20/40 MHz only in the Channel Width setting, this setting will automatically set the channel based on the Channel setting. SSID Setting Maximum of 31 characters Description The SSID of a client and the SSID of the AP must be identical for the client and AP to be able to communicate with each other. Factory Default MOXA 3-10 TAP-323 Web Console Configuration SSID broadcast (for AP mode only) Setting Enable/Disable Description Use this setting to specify if the SSID can be broadcast or not Enable Factory Default Management frame encryption Setting Enable/Disable Description Enables management frame encryption to protect your wireless network from DoS attacks. This function only works with Moxa's TAP series. 50ms Turbo Roaming (controller-based) Setting Enable/Disable Description Determines whether or not the TAP-323 supports 50 ms roaming. This function only works with the WAC-1001, WAC-2004, and TAP series. Factory Default Disable Factory Default Disable Wireless Bridge Modes Master You can change this APs functionality to Enable or Disable on the basic wireless settings page. If AP functionality is set to Enable, the Status will appear as Active, which means that the WLAN is ready to operate in the selected operation mode. For AP functionality settings, click on Edit, as described below. Click on Add SSID and enter a unique SSID to add a virtual SSID to the Master interface to service other clients. Click on Edit to configure the virtual AP interface. WLAN Security Settings The TAP-323 provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the TAP-323 by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE 802.1X. 3-11 TAP-323 Web Console Configuration The TAP-323 can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. Description No authentication Static WEP is used WPA is used Fully supports IEEE 802.11i with TKIP/AES + 802.1X Factory Default Open Security mode Setting Open WEP WPA WPA2 Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP (Only for Legacy Mode) NOTE Moxa includes WEP security mode only for legacy purposes. WEP is highly insecure and is considered fully deprecated by the Wi-Fi alliance. We do not recommend the use of WEP security under any circumstances. According to the IEEE 802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared (or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The TAP-323 provides 4 entities of WEP key settings that can be selected to use with Key index. The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. 3-12 TAP-323 Web Console Configuration The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit
(or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Setting Open Shared Description Data encryption is enabled, but no authentication. Data encryption and authentication are both enabled. Factory Default Open Description Specifies WEP keys in hex-decimal number form Specifies WEP keys in ASCII form Factory Default HEX Description Uses 40-bit secret keys with 24-bit initialization vector Uses 104-bit secret key with 24-bit initialization vector Factory Default 64 bits Description Specifies which WEP key is used Factory Default Open Description A string that can be used as a WEP seed for an RC4 encryption engine. Factory Default None Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Setting ASCII type:
64 bits: 5 chars 128 bits: 13 chars HEX type:
64 bits: 10 HEX chars 128 bits: 26 HEX chars 3-13 TAP-323 Web Console Configuration WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The TAP-323 also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. WPA Type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Factory Default Personal Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Note: This option is available in AP or Master mode only, and cannot support AES-enabled clients. Factory Default AES
* This option is only available for legacy mode in APs and does not support AES-enabled clients.
** This option is only available with 802.11a/b/g standard Passphrase Setting 8 to 63 characters Description Master key to generate keys for encryption and decryption Factory Default None Key renewal (for AP or Master Mode only) Setting 60 to 86400 seconds
(1 minute to 1 day) Description Specifies the time period of group key renewal Factory Default 3600 (seconds) 3-14 TAP-323 Web Console Configuration NOTE The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. WPA/WPA2-Enterprise (for AP or Master Mode) By selecting WPA type as Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out efficient connection authentication on a large-scale network. In this case, it is not necessary to exchange keys or pass phrases. WPA Type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Provides Pre-Shared Key-enabled WPA and WPA2 Provides enterprise-level security for WPA and WPA2 Factory Default Personal Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used. Factory Default TKIP
* This option is available only for legacy mode in APs and does not support AES-enabled client.
** This option is only available with 802.11a/b/g standard Primary/Secondary RADIUS server IP Setting The IP address of RADIUS server Description Specifies the delegated RADIUS server for EAP Factory Default None 3-15 TAP-323 Web Console Configuration Primary/Secondary RADIUS port Setting Description Specifies the port number of the delegated RADIUS server Port number Primary/Secondary RADIUS shared key Setting Max. 31 characters Description The secret key shared between AP and RADIUS server Factory Default 1812 Factory Default None Key renewal Setting 60 to 86400 seconds
(1 minute to 1 day) Description Specifies the time period of group key renewal Factory Default 3600 (seconds) WPA/WPA2-Enterprise (for Slave mode) In a slave role, the TAP-323 can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP**
AES
** This option is only available with 802.11a/b/g standard Description Temporal Key Integrity Protocol is enabled Advance Encryption System is enabled EAP Protocol Setting TLS TTLS PEAP Description Specifies Transport Layer Security protocol Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Factory Default TKIP Factory Default TLS Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections:
3-16 TAP-323 EAP-TLS Web Console Configuration TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use WLAN 1/2 WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user. Certificate issued by: Shows the certificate issuer. Certificate expiration date: Indicates when the certificate expires EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than create a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel, like EAP-TLS, and validate whether the network is trustworthy with digital certificates on the authentication server. This step is run to establish a tunnel that protects the next step (or inner authentication) so it is sometimes referred to as the outer authentication. Then the TLS tunnel is used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for the outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The TAP-323 provides some non-cryptographic EAP methods including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS or PEAP. Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, while the true user name is shown only through the encrypted channel. Remember, not all client software supports anonymous altercation. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. 3-17 TAP-323 Web Console Configuration TTL Inner Authentication Setting PAP CHAP MS-CHAP MS-CHAP-V2 Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used Microsoft CHAP version 2 is used Anonymous Setting Max. 31 characters Description A distinct name used for outer authentication User name & Password Setting Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None PEAP There are a few differences in the inner authentication procedures for TTLS and PEAP. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The TAP-323 provides MS-CHAP-V2 merely as an EAP method for inner authentication. 3-18 TAP-323 Web Console Configuration Inner EAP protocol Setting MS-CHAP-V2 Anonymous Setting Max. 31 characters Description Microsoft CHAP version 2 is used Description A distinct name used for outer authentication User name & Password Setting Description User name and password used in inner authentication Factory Default MS-CHAP-V2 Factory Default None Factory Default None Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate (for A, B, G, B/G mixed, and N modes only) Setting Auto Available rates Description The TAP-323 will sense and adjust the data rate automatically Auto Users can manually select a target transmission data rate Factory Default Multicast Rate (for AP mode only) Description Setting You can set a fixed multicast rate for the transmission of Multicast rate broadcast and multicast packets on a per-radio basis. This
(6-54 M) parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configuration rate. Factory Default 6 M 3-19 TAP-323 Web Console Configuration NOTE Guard Interval Setting Guard Interval
(6-54 M) Description Guard interval is used to ensure that distinct transmissions do not interfere with one another. You can select the guard interval manually for Wireless-N connections. The two options are Short (400 ns) and Long (800 ns). NOTE: This function can be modified in N mode only Factory Default 800 ns. Multicast Rate (for AP mode only) Setting Description You can set a fixed multicast rate for the transmission of Multicast rate broadcast and multicast packets on a per-radio basis. This
(6-54 M) parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configuration rate. Factory Default 6 M Maximum Transmission Power Setting Available Power Description Users can manually select a target power to mask max output power. Because different transmission rates might have their own max output power, please reference product datasheet. The available setting is from 3 to 26.dBm/MHz, which gives the density of the transmission power in channel width. Factory Default 12 dBm
(-1 dBm/MHz) Most countries define a limit for the Equivalent Isotropically Radiated Power (EIRP) for an RF transmitting system. The EIRP should not exceed the allowed value. EIRP = transmission power + antenna gain (dBi). Beacon Interval (for AP and Master mode only) Setting Beacon Interval
(40 to 1000 ms) Description This value indicates the frequency interval of the beacon DTIM Interval (for AP and Master mode only) Setting Data Beacon Rate
(1 to 15) Description This value indicates how often the TAP-323 sends out a Delivery Traffic Indication Message Factory Default 100 (ms) Factory Default 1 Fragment threshold Setting Fragment Length
(256 to 2346) RTS threshold Setting RTS/CTS Threshold
(256-2346) Antenna Setting A/B/Both Description This parameter specifies the maximum size a data packet must be before splitting and creating a new packet Factory Default 2346 Description Determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication Factory Default 2346 Description Specifies the output antenna port. Setting Antenna to Auto allows 2x2 MIMO communication under 802.11n and 2T2R*
communication in legacy 802.11a/b/g modes. Factory Default Both
*Note: Different from 802.11ns multiple spatial data stream (2x2 MIMO), which doubles the throughput. 2T2R transmits/receives the same piece of data on both antenna ports. 3-20 TAP-323 Web Console Configuration WMM WMM is a QoS standard for WLAN traffic. Voice and video data will be given priority bandwidth when enabled with WMM supported wireless clients. NOTE: This setting can be enabled/disabled only in A, B, and B/G Mixed modes. For N, G/N Mixed, B/G/N Mixed, and A/N Mixed modes, this setting is enabled by default. Setting Enable/Disable Description WMM is a Quality of Service standard for WLAN traffic. Voice and video data will be given priority bandwidth when enabled with WMM supported wireless clients. Factory Default Disable Background 802.1p Priority WMM Access Category 1 2 0 3 4 5 6 7 Best effort Video Video READ THIS BEFORE CHANGING THE DFS SETTING DFS (Dynamic Frequency Selection) is a mechanism to allow unlicensed wireless devices to share spectrum with existing radar systems by detecting radar systems and avoid causing interference with them. Roaming Priority (only for AP mode) Setting Priority 1/2 Description The roaming priority should be set according to the radio deployment method along the trackside. Priority 1: radios along the trackside are deployed with leaky feeder-like coverage patterns. Priority 2: radios along the trackside are deployed with open air radiating antennas. Due to the difference in coverage pattern between different deployment scenarios, properly selecting the roaming priority will impact the roaming performance. Factory Default Priority 2 RF Index Setting RF Index 1 /RF Index 2 In an L3 roaming scenario, trackside APs can be arranged in Description Factory Default RF Index 1 different VLAN gateways within different subnets. The RF index setting identifies the AP within a particular VLAN gateway. NOTE 3-21 TAP-323 Web Console Configuration WLAN Certification Settings (for EAP-TLS in Slave mode only) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The TAP-323 can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current Status displays information for the current WLAN certificate, which has been imported into the TAP-323. Nothing will be shown if a certificate is not available. Certificate issued to: shows the certificate user Certificate issued by: shows the certificate issuer Certificate expiration date: indicates when the certificate becomes invalid You can import a new WLAN certificate in Import WLAN Certificate by following these steps, in order:
1. Input the corresponding password (or key) in the Certificate private password field, and then click Submit to set the password. 2. The password will be displayed in the Certificate private password field. Click on the Browse button in Select certificate/key file and select the certificate file. 3. Click Upload Certificate File to import the certificate file. If the import succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. NOTE The WLAN certificate will remain after the TAP-323 reboots. Even though it is expired, it can still be seen on Current Certificate. WAC Settings (AP Mode Only) Controller-based Turbo Roaming function is automatically enabled when you enable the 50ms Turbo Roaming (controller-based) option on the Wireless Settings > WLAN > Basic Wireless Settings > Edit page. The Primary WAC IP address, Backup WAC IP address, and Roaming domain fields are displayed. 3-22 TAP-323 Web Console Configuration Primary WAC IP address Setting IP address Description Enter the IP address of the primary WAC-1001 Backup WAC IP address Setting IP address Description Enter the IP address of the backup WAC-1001 Roaming domain Setting 6 Hex characters Description Specifies the area served by the WAC-1001/2004. All related controllers, APs, and clients use this as identification to work and communicate with each other Factory Default None Factory Default None Factory Default None Advanced Settings Several advanced functions are available to increase the functionality of your TAP-323 and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer-2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the TAP-323 can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your AWK series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, or VLAN, is a collection of hosts with a common set of requirements. The hosts communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows you to group end stations together even if they are not connected to the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs can extend as far as the access point signal can reach. Clients can be segmented into wireless sub-networks based on SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Secure networks limit members to using resources on their own VLAN Clients can roam without compromising security Improve network performance and reduce latency Increase security 3-23 TAP-323 Web Console Configuration VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN, eliminating unnecessary traffic on the wireless LAN, conserving bandwidth, and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resources department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resources, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resources department could be restricted to a gateway that allowed access to only the Internet. A member of the human resources department could send and receive email and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. 3-24 TAP-323 Web Console Configuration Configuring a Virtual LAN VLAN Settings To configure a VLAN on the AWK, use the VLAN Settings page to configure the ports. Management VLAN ID Setting VLAN ID
(ranges from 1 to 4094) Description Set the management VLAN of this AWK. Factory Default 1 Port Type LAN WLAN Port PVID Setting VLAN ID ranging from 1 to 4094 VLAN Tagged Setting A comma-separated list of VLAN IDs. Each VLAN ID must be between 1 and 4094. Description This port is the LAN port on the AWK. This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Trunk Port Yes Description Set the ports VLAN ID for devices that connect to the port. The port can be a LAN port or WLAN ports. Factory Default 1 Description Specify which VLANs can communicate with this specific VLAN. (Empty) Factory Default NOTE The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. 3-25 TAP-323 Web Console Configuration DHCP Server (for AP operation mode only) DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The TAP-323 can act as a simplified DHCP server and easily assign IP addresses to your wireless clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The TAP-323 provides a Static DHCP mapping list with up to 16 entities. Remember to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server (AP only) Setting Enable Disable Description Enables TAP-323 as a DHCP server Disables the DHCP server function Factory Default Disable Default gateway Setting IP address of a default gateway Subnet mask Setting subnet mask Description The IP address of the router that connects to an outside network Factory Default None Description Identifies the type of sub-network (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network) Factory Default None 3-26 TAP-323 Web Console Configuration Primary/ Secondary DNS server Setting IP address of Primary/
Secondary DNS server Description The IP address of the DNS Server used by your network. After entering the DNS Servers IP address, you can use URLs. The Secondary DNS server will be used if the Primary DNS server fails to connect. Factory Default None Start IP address Setting IP address Description Indicates the starting IP address that the TAP-323 can assign. None Factory Default Maximum number of users Setting 1 to 128 users Description Specifies how many IP addresses can be assigned continuously None Factory Default Client lease time Setting 5 1440 minutes Packet Filters Description The lease time for which an IP address is assigned. The IP address may expire after the lease time is reached. Factory Default 5 minutes The TAP-323 includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The TAP-323s MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The TAP-323 provides eight fields for filtered MAC addresses. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Factory Default Disable Description Only the packets from the listed addresses will be allowed. Any packet from the listed addresses will be denied. Factory Default Drop 3-27 TAP-323 Web Console Configuration ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed (i.e., drop nothing) Accept + no entity on list is activated = all packets are denied (i.e., accept nothing) IP Protocol Filter The TAP-323s IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The TAP-323 provides eight fields for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.255. Remember to check the Active check box for each entity to activate the setting. Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Only the packets from the listed addresses will be allowed Any packet from the listed addresses will be denied Factory Default Drop Enable Setting Enable Disable Policy Setting Accept Drop ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed (i.e., drop nothing) Accept + no entity on list is activated = all packets are denied (i.e., accept nothing) 3-28 TAP-323 Web Console Configuration TCP/UDP Port Filter The TAP-323s TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The TAP-323 provides eight fields for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger than the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop ATTENTION Description Enables TCP/UDP port filter Disables TCP/UDP port filter Description Only packets from the listed ports are allowed. Any packet from the listed ports will be denied. Factory Default Disable Factory Default Drop Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed (i.e., drop nothing) Accept + no entity on list is activated = all packets are denied (i.e., accept nothing) Introduction to Redundancy Protocol Setting up Redundancy Protocol on your network helps protect critical links against failure, protects against network loops, and keeps network downtime at a minimum. Redundancy Protocol allows you to set up redundant loops in the network to provide a backup data transmission route in the event that a cable is inadvertently disconnected or damaged. This is a particularly important feature for industrial applications, since it could take several minutes to locate the disconnected or severed cable. For example, if the Moxa TAP-323 is used as a key communications component of a production line, several minutes of downtime could cause a big loss in production and revenue. The Moxa TAP-323 supports two protocols to support this Redundancy Protocol function:
Turbo Chain Rapid Spanning Tree and Spanning Tree Protocols (IEEE 802.1W/802.1D-2004) When configuring a redundant chain, all APs on the same chain must be configured to use the same redundancy protocol. You cannot mix the Turbo Chain and STP/RSTP protocols on the same chain. 3-29 TAP-323 Web Console Configuration The following table lists the key differences between the features of each protocol. Use this information to evaluate the benefits of each, and then determine which features are most suitable for your network. redundancy protocol. You cannot mix the Turbo Chain and STP/RSTP protocols on the same chain. The following table lists the key differences between the features of each protocol. Use this information to evaluate the benefits of each, and then determine which features are most suitable for your network. Topology Fast Ethernet Recovery Time Gigabit Ethernet Recovery Time Turbo Chain Chain
<20 ms
<50 ms RSTP Ring, Mesh Up to 5 sec. The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures on a network, and provide an automatic means of avoiding loops. This is particularly important for networks that have a complicated architecture, since unintended loops in the network can cause broadcast storms. Moxa switches STP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every Moxa switch connected to your network. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE 802.1D-2004. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backwards compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on different ports of the same switch, which is particularly helpful when switch ports connect to older equipment such as legacy switches. You get essentially the same functionality with RSTP and STP. To see how the two systems differ, see the Differences between STP and RSTP section in this chapter. NOTE The STP protocol is part of the IEEE Std. 802.1D, 2004 Edition bridge specification. The following explanation uses bridge instead of switch. What is STP?
STP (802.1D) is a bridge-based system that is used to implement parallel paths for network traffic. STP uses a loop-detection process to:
Locate and then disable less efficient paths (i.e., paths that have a lower bandwidth). Enable one of the less efficient paths if a more efficient path fails. 3-30 TAP-323 Web Console Configuration The figure below shows a network made up of three LANs separated by three bridges. Each segment uses at most two paths to communicate with the other segments. Since this configuration can give rise to loops, the network will overload if STP is NOT enabled. If STP is enabled, it will detect duplicate paths and prevent, or block, one of the paths from forwarding traffic. In the following example, STP determined that traffic from LAN segment 2 to LAN segment 1 should flow through bridges C and A since this path has a greater bandwidth and is therefore more efficient. 3-31 TAP-323 Web Console Configuration What happens if a link failure is detected? As shown in next figure, the STP process reconfigures the network so that traffic from LAN segment 2 flows through bridge B. STP will determine which path between each bridged segment is most efficient, and then assign a specific reference point on the network. When the most efficient path has been identified, the other paths are blocked. In the previous 3 figures, STP first determined that the path through bridge C was the most efficient, and as a result, blocked the path through bridge B. After the failure of bridge C, STP re-evaluated the situation and opened the path through Bridge B. How STP Works When enabled, STP determines the most appropriate path for traffic through a network. The way it does this is outlined in the sections below. STP Requirements Before STP can configure the network, the system must satisfy the following requirements:
All bridges must be able to communicate with each other. The communication is carried out using Bridge Protocol Data Units (BPDUs), which are transmitted in packets with a known multicast address. Each bridge must have a Bridge Identifier that specifies which bridge acts as the central reference point, or Root Bridge, for the STP systembridges with a lower Bridge Identifier are more likely to be designated as the Root Bridge. The Bridge Identifier is calculated using the MAC address of the bridge and a priority defined for the bridge. For example, the default priority setting of Moxa switches is 32768. Each port has a cost that specifies the efficiency of each link. The efficiency cost is usually determined by the bandwidth of the link, with less efficient links assigned a higher cost. 3-32 TAP-323 Web Console Configuration STP Calculation The first step of the STP process is to perform calculations. During this stage, each bridge on the network transmits BPDUs. The following items will be calculated:
Which bridge should be the Root Bridge? The Root Bridge is the central reference point from which the network is configured. The Root Path Costs for each bridge. This is the cost of the paths from each bridge to the Root Bridge. The identity of each bridges Root Port. The Root Port is the port on the bridge that connects to the Root Bridge via the most efficient path. In other words, the port connected to the Root Bridge via the path with the lowest Root Path Cost. The Root Bridge, however, does not have a Root Port. The identity of the Designated Bridge for each LAN segment. The Designated Bridge is the bridge with the lowest Root Path Cost from that segment. If several bridges have the same Root Path Cost, the one with the lowest Bridge Identifier becomes the Designated Bridge. Traffic transmitted in the direction of the Root Bridge will flow through the Designated Bridge. The port on this bridge that connects to the segment is called the Designated Bridge Port. STP Configuration After all of the bridges on the network agree on the identity of the Root Bridge, and all other relevant parameters have been established, each bridge is configured to forward traffic only between its Root Port and the Designated Bridge Ports for the respective network segments. All other ports are blocked, which means that they will not be allowed to receive or forward traffic. STP Reconfiguration Once the network topology has stabilized, each bridge listens for Hello BPDUs transmitted from the Root Bridge at regular intervals. If a bridge does not receive a Hello BPDU after a certain interval (the Max Age time), the bridge assumes that the Root Bridge, or a link between itself and the Root Bridge, has ceased to function. This will trigger the bridge to reconfigure the network to account for the change. If you have configured an SNMP trap destination, the first bridge to detect the change will send out an SNMP trap when the topology of your network changes. Differences between STP and RSTP RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. STP and RSTP spanning tree protocols operate without regard to a networks VLAN configuration, and maintain one common spanning tree throughout a bridged network. Thus, these protocols map one loop-free, logical topology on a given physical topology. 3-33 TAP-323 STP Example Web Console Configuration The LAN shown in the following figure has three segments, with adjacent segments connected using two possible links. The various STP factors, such as Cost, Root Port, Designated Bridge Port, and Blocked Port are shown in the figure. Bridge A has been selected as the Root Bridge, since it was determined to have the lowest Bridge Identifier on the network. Since Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1. Port 1 on Bridge A is selected as the Designated Bridge Port for LAN Segment 1. Ports 1 of Bridges B, C, X, and Y are all Root Ports since they are nearest to the Root Bridge, and therefore have the most efficient path. Bridges B and X offer the same Root Path Cost for LAN segment 2. However, Bridge B was selected as the Designated Bridge for that segment since it has a lower Bridge Identifier. Port 2 on Bridge B is selected as the Designated Bridge Port for LAN Segment 2. Bridge C is the Designated Bridge for LAN segment 3, because it has the lowest Root Path Cost for LAN Segment 3:
The route through bridges C and B costs 200 (C to B=100, B to A=100) The route through bridges Y and B costs 300 (Y to B=200, B to A=100) The Designated Bridge Port for LAN Segment 3 is port 2 on bridge C. 3-34 TAP-323 Web Console Configuration RSTP/Turbo Chain Settings (For Master or Slave Mode Only) The TAP-323 supports IEEE 802.1D Spanning Tree Protocol and IEEE 802.1w Rapid STP standards. In addition to eliminating unexpected path looping, STP/RSTP can provide a backup recovery path if a wired/wireless path fails accidentally. This fail-over function can increase the reliability and availability of the network. The TAP-323 also supports Turbo Chain on its fiber interfaces. The TAP-323s STP/RSTP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every TAP-323 connected to your network. The following figures indicate which Spanning Tree Protocol parameters can be configured. A more detailed explanation of each parameter is given below the figure. Bridge priority Setting Numerical value selected by user Hello time Setting Numerical value input by user
(1 to 10 seconds) Forwarding delay Setting Numerical value input by user
(4 to 30 seconds) Max. age Setting Numerical value input by user
(6 to 40 seconds) Description Increase this devices bridge priority by selecting a lower number. A device with a higher bridge priority has a greater chance of being established as the root of the Spanning Tree topology. Factory Default 32768 Description The root of the Spanning Tree topology periodically sends out a hello message to other devices on the network to check if the topology is healthy. The hello time is the amount of time the root waits between sending hello messages. Factory Default 2 (seconds) Description The amount of time this device waits before checking to see if it should change to a different state. Factory Default 15 (seconds) Description If this device is not the root, and it has not received a hello message from the root in an amount of time equal to Max. Age, then this device will reconfigure itself as a root. Once two or more devices on the network are recognized as a root, the devices will renegotiate a new Spanning Tree topology. Factory Default 20 (seconds) 3-35 TAP-323 Web Console Configuration Enable RSTP Setting Enable/Disable Port priority Setting Numerical value selected by user Port cost Setting Numerical value input by user Edge port Setting Checked/unchecked Description Select to enable the port as a node on the Spanning Tree topology. Factory Default Disable Description Increase this ports priority as a node on the Spanning Tree topology by inputting a lower number. Factory Default 128 Description Input a higher cost to indicate that this port is less suitable as a node for the Spanning Tree topology Factory Default 20000 Description Sets a port, which no BPDU is expected to go through, as an edge port Factory Default unchecked, except WLAN1/2 ports NOTE We recommend that you use the edge port setting for ports that are only connected to non-STP/RSTP sub-networks or end devices (PLCs, RTUs, etc.) as opposed to network equipment. This can prevent unnecessary waiting and negotiation for the STP/RSTP protocol, and accelerate system initialization. When an edge port receives BPDUs, it can still function as an STP/RSTP port and start negotiation. Setting an edge port is different from disabling STP/RSTP on a port. If you disable STP/RSTP, a port will not deal with STP/RSTP BPDUs at all. Port Status Port Status indicates the current Spanning Tree status of this port. Use Forwarding for normal transmission, or Blocking to block transmission. The Turbo Chain Concept Moxas Turbo Chain is an advanced software-technology that gives network administrators the flexibility of constructing any type of redundant network topology. When using the chain concept, you first connect the APs in a chain and then simply link the two ends of the chain to an Ethernet network, as illustrated in the following figure. Turbo Chain can be used on industrial networks that have a complex topology. If the industrial network uses a multi-ring architecture, Turbo Chain can be used to create flexible and scalable topologies with a fast media-recovery time. 3-36 TAP-323 Web Console Configuration Setting Up a Turbo Chain 1. Select the Head AP, Tail AP, and Member AP. 2. Configure one port as the Head port and one port as the Member port in the Head AP, configure one port as the Tail port and one port as the Member port in the Tail AP, and configure two ports as Member ports in each of the Member switches. 3. Connect the Head AP, Tail AP, and Member APs as shown in the above diagram. The path connecting to the Head port is the main path, and the path connecting to the Tail port is the backup path of the Turbo Chain. Under normal conditions, packets are transmitted through the Head Port to the LAN network. If any Turbo Chain path is disconnected, the Tail Port will be activated so that packet transmission can continue. Configuring Turbo Chain Use the scrollbar at the top of the Redundancy Protocol page to select Turbo Chain and RSTP. Note that the configuration pages for these two protocols are different. Protocol Setting Turbo Chain RSTP (IEEE 802.1D-2004) Description Select this item to change to the Turbo Chain configuration page. Select this item to change to the RSTP configuration page. Factory Default None 3-37 TAP-323 Web Console Configuration The following figures indicate which Turbo Chain parameters can be configured. A more detailed explanation of each parameter follows. Head TAP Configuration Member TAP Configuration Tail TAP Configuration Turbo Chain Status Indicates whether Turbo Chain is enabled or disabled on the TAP-323. Device Role Setting Head, Member, or Tail Select this AP as Head, member, or Tail AP Description Factory Default Head Port Setting Setting Port Number / Role /
Status Description Configure the LAN port and define its role in the Turbo Chain topology. Factory Default LAN5 as Head LAN6 as Member 3-38 TAP-323 SNMP Agent Web Console Configuration The TAP-323 supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The TAP-323s MIB can be found in the software CD and supports reading the attributes via SNMP. (Only get method is supported.) SNMP security modes and security levels supported by the TAP-323 are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Authentication Type Community string No Data Encryption Community string No Method Use a community string match for authentication Use a community string match for authentication Protocol Version SNMP V1, V2c SNMP V3 Setting on UI web page V1, V2c Read Community V1, V2c Write/Read Community No-Auth MD5 or SHA None Authentication based on MD5 or SHA No No MD5 or SHA Authentication based on MD5 or SHA Data encryption key Use admin or user account to access objects Provides authentication based on HMAC-MD5, or HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-MD5 or HMAC-SHA algorithms, and data encryption key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below the following figure. Enable Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Factory Default Disable 3-39 TAP-323 Web Console Configuration Remote Management Setting Enable Disable Description Allow remote management via SNMP agent Disallow remote management via SNMP agent Read community (for V1, V2c, V3 or V1, V2c) Setting Read Community Description Use a community string match with a maximum of 31 characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Factory Default Disable Factory Default public Write community (for V1, V2c, V3 or V1, V2c) Setting Read/Write Community Use a community string match with a maximum of 31 Description Factory Default private characters for authentication. This means that the SNMP agent can access all objects with read/write permissions using this community string. SNMP agent version Setting V1, V2c, V3, or V1, V2c, or V3 only Description Select the SNMP protocol version used to manage the switch. V1, V2c Factory Default Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Use admin account to access objects. No authentication Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. SHA Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Description No data encryption DES-based data encryption AES-based data encryption Factory Default No Auth Factory Default Disable Private Key A data encryption key is the minimum requirement for data encryption (maximum of 63 characters). Private MIB Information Device Object ID Also known as an OID. This is the TAP-323s enterprise value and is a fixed value. PoE Settings The TAP-323 has 4 PSE ports that can supply PoE power to PD devices, such as video cameras, on the trackside. 3-40 TAP-323 Web Console Configuration PoE Enable Setting Enable/Disable Description Enable or disable the LAN port (LAN1 to LAN4) for PoE Factory Default Enable Mobile IP Settings The mobile IP technology enables the TAP-323 to roam between Layer 3 networks with a roaming break time less than 50 ms. When the TAP-323 is in client/client router mode, it is a mobile node (MN) that is able to roam across different subnets without changing its IP address. Mobile IP Topology Example:
Terminology Mobile Node (MN) Home network Home address Foreign network Home agent (HA) Description A host or router that changes its location from one network to another. The network within which the MN receives its identifying IP address (home address) The IP address assigned to the MN within its home network The network in which an MN is operating when away from its home network A router on the home network that provides services to the MN. The home agent intercepts packets sent to the MN within the home network, encapsulates them, and then tunnels them to the MN. Correspondent Node (CN) A peer with which a mobile node is communicating Co-located Care-of Address
(CCoA) Binding The association of the home address with a CCoA The new IP address of the MN when operating on a foreign network. 3-41 TAP-323 Web Console Configuration Setting Mobile IP Subnet Binding Description Enable/disable mobile IP capability of the client (mobile node) for L3 controller based roaming Define a subnet of devices connected behind the client (MN) so that data will be forwarded to the corresponding device subnets. Proper IP planning is required to avoid configuring the subnet binding IP to limit access to the TAP. Factory Default Disable Disable Note that when the Mobile IP is enabled, the corresponding AP and WAC (HA) controller will also need to be configured properly (with 50 ms roaming enabled) to ensure correct operation of the L3 roaming network. Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. This way even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the TAP-323 supports different approaches to warn engineers automatically, such as SNMP trap, e-mail, and relay output. It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output. 3-42 TAP-323 System Log System Log Event Types Web Console Configuration Detailed information for grouped events is shown in the following table. You can check the Enable log box to enable event groups. By default all the values are enabled (checked). The log for system events can be seen in Status System Log. System-related events System restart (warm start) Network-related events LAN 1 or LAN 2 link on LAN 1 or LAN 2 link off Event triggers when The TAP-323 is rebooted, such as when its settings are changed (IP address, subnet mask, etc.). Event triggers when The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. The TAP-323 is associated with an AP. The TAP-323 is disassociated from an AP. Client joined/ left for WLAN 1 or WLAN 2
(for AP or Master mode) WLAN 1 or WLAN 2 connected to AP
(for Slave mode) WLAN 1 or WLAN 2 disconnected
(for Slave mode) Config-related events Configuration Changed Configuration file import via Web Console The configuration file is imported to the TAP-323. Console authentication failure Firmware upgraded Power events Power 1/2 transition (On Off) PoE transition (On Off) Power 1/2 transition (Off On) PoE transition (Off On) An incorrect password is entered. The TAP-323s firmware is updated. Event triggers when The TAP-323 is powered down in PWR1/2. The TAP-323 is powered down in PoE. The TAP-323 is powered via PWR1/2. The TAP-323 is powered via PoE. Event triggers when A configuration item has been changed. 3-43 TAP-323 Syslog Web Console Configuration This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detailed information for the grouped events is shown in the following table. You can check the Enable log box to enable event groups. By default all values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. Syslog Server Settings You can configure the parameters for your Syslog servers on this page. Syslog server 1/2/3 Setting IP address Syslog port Setting Port destination
(1 to 65535) Description Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server Factory Default None Description Enter the UDP port of the corresponding Syslog server Factory Default 514 3-44 TAP-323 E-mail E-mail Event Types Web Console Configuration Check the Active box to enable the event items. By default all values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-24. E-mail Server Settings You can set up to four email addresses to receive alarm emails from the TAP-323. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and email addresses are working. More detailed explanations about these parameters are given after the following figure. Mail server (SMTP) Setting IP address Description The IP Address of your email server. Factory Default None 3-45 TAP-323 Web Console Configuration User name & Password Setting Description User name and password used in the SMTP server Factory Default None From e-mail address Setting Max. 63 characters Description Enter the administrators email address, which will be shown in the From field of a warning email. Factory Default None To E-mail address 1/ 2/ 3/ 4 Setting Max. 63 characters Description Enter the receivers email addresses. Factory Default None Trap Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overwhelming for the management station to poll or send requests to query every object on every device. It would be more effective for the managed device agent to notify the management station when necessary by sending a message known as a trap. Trap Event Types 3-46 TAP-323 Web Console Configuration SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 1st / 2nd Trap version Setting V1 V2 Description SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 Factory Default V1 1st / 2nd Trap server IP/name Setting IP address or host name Description Enter the IP address or name of the trap server used by your network. Factory Default None 1st / 2nd Trap community Setting Max. 31 characters Description Use a community string match with a maximum of 31 characters for authentication. Factory Default alert Status Wireless Status The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Depending on the operation mode, certain 802.11 info values may not be displayed. For example, the Current BSSID and Signal strength parameters are not available in the AP mode. It is helpful to use the continuously updated information option on this page, such as Signal strength, to monitor the signal strength of the TAP-323 in Slave mode. The transmission power indicated is the current transmission power being updated periodically. 3-47 TAP-323 Web Console Configuration Associated Client List (for AP or Master Mode only) Associated Client List shows all the clients that are currently associated with a particular TAP-323. Click Select all to select all the content in the list for further editing. Click Refresh to refresh the list. 3-48 TAP-323 Web Console Configuration DHCP Client List (for AP mode only) When you enable the DHCP server, the DHCP Client List shows all the clients that require and have successfully received IP assignments. Click the Refresh button to refresh the list. Click Select all to select all content in the list for further editing. System Log Triggered events are recorded in the System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-49 TAP-323 RSTP Status Web Console Configuration This status field will appear only when STP/RSTP is enabled. It indicates whether or not this TAP-323 is the Root of the Spanning Tree (the root is determined automatically) and the status of each port. Turbo Chain Status The status and configuration of the Turbo Chain ports can be monitored on this status page. LAN Status Each LAN ports status can be monitored on this page. Parameters include LAN speed, half/full duplex, link status, and number of Tx and Rx packets. Maintenance Maintenance functions provide the administrator with tools to manage the TAP-323 and wired/wireless networks. 3-50 TAP-323 Web Console Configuration Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet, and SSH connections. For more security, we recommend that you only allow access to the two secure consoles, HTTPS and SSH. Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and discover whether or not the access path is available. If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may be lost, as shown in the following figure. Firmware Upgrade The TAP-323 can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available from Moxas download center. Before running a firmware upgrade, make sure the TAP-323 is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the TAP-323 will reboot itself. 3-51 TAP-323 Web Console Configuration When upgrading your firmware, the TAP-323s other functions are deactivated. ATTENTION Make sure the power source is stable when you upgrade your firmware. An unexpected power interruption may damage your TAP-323. Config Import Export You can back up or restore the TAP-323s configuration with Config Import Export. In the Config Import section, click Browse to specify the configuration file and click the Config Import button to begin importing the configuration. In the Config Export section, click the Config Export button and save the configuration file onto your local storage media. The configuration file is a text file and you can view and edit it with a general text editor. Downloading the Configuration from a TFTP Server You can download a configuration file from a TFTP server on to your TAP-323 as follows:
1. Start your TFTP server. 2. Copy the TAP-323 configuration file to a folder on the TFTP server. 3. On the TAP-323 Config Import page, input your TFTP server IP and Configuration path. Note. The configuration path is the path of the configuration file, which is a relative path. If your configuration file is already available in a folder on the TFTP server, you can leave this field blank. 3-52 TAP-323 Web Console Configuration 4. Input your configuration File name with the filename extension or click on the Config Import button to browse to the file. Once the configuration downloads successful, you will see "TFTP import success"
information on the web page. 5. Click Save and then Restart on the top-right side. To download the configuration to the TAP:
1. Turn off the TAP. 2. Plug in the ABC-02 to the TAPs USB port. 3. Turn on TAP 4. TAP will detect ABC-02 during the boot up process, and download the configuration from the ABC-02 to the TAP automatically. Once the configuration downloads and if configuration format is correct, the TAP will emit three short beeps, and then continue the boot up. 5. Once the TAP has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. MIB Export The SNMP MIB file for TAP-323 is embedded in the device. To export the MIB file, simply click on the MIB Export button and save it to your local drive. Load Factory Default Use this function to reset the TAP-323 and roll all settings back to the factory default values. You can also reset the hardware by pressing the reset button on the top panel of the TAP-323. 3-53 TAP-323 Web Console Configuration Username/Password You can change the administration username and password for each of the TAP-323s console managers by using the Username/Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password moxa, and remember to change the administration password regularly. Locate Device The AP can be identified by a beeping sound and flashing LED when clicking on the start to locate button. To stop the beeping, click on the stop locating button. Misc. Settings Additional settings that can help you manage your TAP-323 are available on this page. Reset button Setting Always enable Always disable Disable the restore to default function after 60 seconds Description The TAP-323s reset button works normally The TAP-323s reset button will not work The TAP-323s reset to default function will be inactive 60 seconds after the TAP-323 completes the boot-up process. Factory Default Always enable 3-54 TAP-323 Web Console Configuration Save Configuration The following figure shows how the TAP-323 stores the setting changes into volatile and non-volatile memory. Unless it is saved, all data stored in volatile memory will disappear when the TAP-323 is shut down or rebooted. Because the TAP-323 starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the TAP-323. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. Restart If you submitted configuration changes, you will see blinking text in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the TAP-323 directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the TAP-323. 3-55 TAP-323 Web Console Configuration If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. You will not be able to run any of the TAP-323s functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend that you log out before quitting console manager. 3-56 4 4. Software Installation/Configuration The following topics are covered in this chapter:
Overview Wireless Search Utility Configuring Wireless Search Utility TAP-323 Overview Software Installation/Configuration The Wireless Search Utility can be downloaded from the Moxa website at www.moxa.com. Wireless Search Utility Installing Wireless Search Utility Once the Wireless Search Utility is downloaded, run the setup executable to start the installation. 1. Click Next in the Welcome screen to proceed with the installation. 4-2 TAP-323 Software Installation/Configuration 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 3. Click Next to install the programs shortcut files in the default directory, or click Browse to select an alternate location. 4-3 TAP-323 Software Installation/Configuration 4. Click Next to select additional tasks. 5. Click Install to proceed with the installation. The installer then displays a summary of the installation options. 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 4-4 TAP-323 Software Installation/Configuration 7. Click Finish to complete the installation of Wireless Search Utility. Configuring Wireless Search Utility The Broadcast Search function is used to locate all TAP-323 APs that are connected to the same LAN as your computer. After locating a TAP-323, you will be able to change its IP address. Since the Broadcast Search function searches by UDP packets and not IP address, it doesnt matter if the TAP-323 is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the Wireless Search Utility program. When the Login page appears, select the Device Search only option to search for TAPs and to view each TAPs configuration. Select the Device management option to assign IPs, upgrade firmware, and locate devices. 4-5 TAP-323 Software Installation/Configuration 2. Open the Wireless Search Utility and then click the Search icon. 3. The Searching window indicates the progress of the search. When the search is complete, all TAPs that were located will be displayed in the Wireless Search Utility window. 4-6 TAP-323 Software Installation/Configuration 4. Click Locate to cause the selected device to beep. 5. Make sure your TAP is unlocked before using the search utilitys icons setting. The TAP will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. 6. Go to Tools Login Options to manage and unlock additional TAPs. 4-7 TAP-323 Software Installation/Configuration 7. Use the scroll down list to select the MAC addresses of those TAPs you would like to manage, and then click Add. Key in the password for the TAP device and then click OK to save. If you return to the search page and search for the TAP again, you will find that the TAP will unlock automatically. ATTENTION For security purposes, we suggest you can change the wireless search utility login password instead of using the default. To modify the configuration of the highlighted TAP, click on the Web icon to open the web console. This will take you to the web console, where you can make all configuration changes. Refer to Chapter 3, Using the Web Console, for information on how to use the web console. Click on Telnet if you would like to use telnet to configure your TAPs. 4-8 TAP-323 Software Installation/Configuration Click Assign IP to change the IP setting. 4-9 TAP-323 Software Installation/Configuration The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time elapsed between retries. Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. 4-10 TAP-323 Software Installation/Configuration Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the Wireless Search Utility. 4-11 5 5. Using Other Consoles This chapter explains how to access the TAP-323 for the first time. In addition to HTTP access, there are four ways to access the TAP-323: USB console, Telnet console, SSH console, and HTTPS console. The USB console connection method, which requires using a short USB cable to connect the TAP-323 to a PCs COM port, can be used if you do not know the TAP-323s IP address. The other consoles can be used to access the TAP-323 over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
USB Console Configuration (115200, None, 8, 1, VT100) Configuration via Telnet and SSH Consoles USB Console Configuration (115200, None, 8, 1, VT100) The USB console connection method, which requires using a short USB cable to connect the TAP-323 to a PCs COM port, can be used if you do not know the TAP-323s IP address. It is also convenient to use USB console configurations when you cannot access the TAP-323 over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. NOTE We recommend using the Moxa PComm (Lite) Terminal Emulator, which is available for download at:
http://www.moxa.com/product/download_pcommlite_info.htm. Before running PComm Terminal Emulator, use an M12 5-pin B-coded to USB type A cable to connect the TAP-323s USB console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the USB console utility. 1. From the Windows desktop, open the Start menu and run the PComm Terminal Emulator from the PComm (Lite) group. 2. In the Port Manager menu, select Open to open a new connection. 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue.
-The USB driver is available for download at: http://www.moxa.com/product/UPort_2210.htm
-You will see two COM ports. Select the first port (COM1) to connect to the TAP-323 USB console. The COM2 port is reserved for future use. NOTE 5-2 4. The Console login screen will appear. Log into the USB console with the login name (default: admin) and password (default: moxa, if no new password is set). 5. The TAP-323s device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. NOTE To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the USB cable or trigger DTR, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. 5-3 Configuration via Telnet and SSH Consoles You may use Telnet or SSH client to access the TAP-323 and manage the console over a network. To access the TAP-323s functions over the network from a PC host that is connected to the same LAN as the TAP-323, you need to make sure that the PC host and the TAP-323 are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. NOTE The TAP-323s default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, go to Start Run, and then use Telnet to access the TAP-323s IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). 2. When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the TAP-323s IP address, specifying 22 for the SSH connection port. The console login screen is displayed. Refer to the USB Console Configuration section for login and administration information. 3. Log in into the command page (default username/password is admin/moxa, if no new password is set). TAP-323 supports the CLI mode. You can use the TAB key to check a related CLI command. 5-4 Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the TAP-323 supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the TAP-323s web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<TAP-323s IP address> in the address field. Press Enter to establish the connection. 2. Click on continue to this website. The protocol in the URL changes to HTTPS. You can now enter your username and password to login into the function page. 5-5 Disabling Telnet and Browser Access If you are connecting the TAP-323 to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-6 A A. References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you manage your TAP-323s and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept TAP-323 UM Beacon References A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept The Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports of the same TAP-323. This feature is particularly helpful when the TAP-323 connects to older equipment, such as legacy switches. A-2 B B. Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery Federal Communication Commission Interference Statement Canada, Industry Canada (IC) Notices RED Compliance Statement TAP-323 Support Information Firmware Recovery When the LEDs of FAULT, Signal Strength, CLIENT, BRIDGE and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The TAP-323 is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the TAP-323s ES-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. Press Ctrl - C and the following message will appear. Enter 2 to change the network setting. Specify the location of the TAP-323s firmware file on the TFTP server and press y to write the settings into flash memory. TAP-323 restarts, and the Press Ctrl-C to enter Firmware Recovery Process message will reappear. Press Ctrl-C to enter the menu and select 1 to start the firmware upgrade process. B-2 TAP-323 Support Information Select 0 in the sub-menu to load the firmware image via LAN, and then enter the file name of the firmware to start the firmware recovery. DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Increase the separation between the equipment and receiver. Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator & your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC 15.407(e): Within the 5.15-5.25 GHz band, U-NII devices will be restricted to indoor operations to reduce any potential for harmful interference to co-channel MSS operations. B-3 TAP-323 Support Information Canada, Industry Canada (IC) Notices This device complies with Industry Canadas license-exempt RSS standard(s). Operation is subject to the following two conditions:
1. This device may not cause interference, and 2. This device must accept any interference, including interference that may cause undesired operation of the device. Warning:
Users should also be advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices. Canada, avis d'Industry Canada (IC) Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes :
(1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. Devraient galement tre informs les utilisateurs que les radars haute puissance sont dsigns comme utilisateurs principaux (c.--utilisateurs prioritaires) des bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient provoquer des interfrences et / ou endommager les appareils LE-LAN. Radio Frequency (RF) Exposure Information The radiated output power of this wireless device is below the Industry Canada (IC) radio frequency exposure limits. This wireless device should be used in such a manner such that the potential for human contact during normal operation is minimized. This device has also been evaluated and shown compliant with the IC RF Exposure limits under mobile exposure conditions (i.e., the device antennas are greater than 20 cm from a person's body). Informations concernant l'exposition aux frquences radio (RF) La puissance de sortie mise par lappareil de sans fil est infrieure la limite d'exposition aux frquences radio d'Industry Canada (IC). Utilisez lappareil de sans fil de faon minimiser les contacts humains lors du fonctionnement normal. Ce priphrique a galement t valu et dmontr conforme aux limites d'exposition aux RF d'IC dans des conditions d'exposition des appareils mobiles (antennes sont suprieures 20 cm partir du corps d'une personne). B-4 TAP-323 Support Information Antenna Gain and RF Radiated Power The following sections contain the FCC rules regarding adapting the product transmission power based on the antenna used. This radio transmitter FCCID: SLE-WAPN008 has been approved by FCC to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. AntennaList Antenna Part No. ANT-WDB-O-2 BK Antenna Type Dipole ANT-WDB-ANM-0502 Dipole Maximum Antenna Gain*
2.9dBifor2.4GHz 2.34dBifor5GHz 4.62dBifor2.4GHz 1.41dBifor5G B-5 TAP-323 Support Information RED Compliance Statement Moxa declares that the apparatus TAP-323 complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. The essential requirements laid down in Directive 1999/5/EC which are relevant to fixed-line terminal equipment, i.e. to ensure the protection of health and safety of persons and of domestic animals and the protection of prop-erty and an adequate level of electromagnetic compatibility, are appropriately covered by Directive 2014/35/EU of the European Parliament and of the Council and Directive 2014/30/EU of the European Parliament and of the Council . This Directive should therefore not apply to fixed-line terminal equipment. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. B-6
various | WAPN008- UserMan 20180911 | Users Manual | 2.34 MiB |
AirWorks AWK-4131A Users Manual First Edition, October 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. AirWorks AWK-4131A Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2015 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free: 1-888-669-2872 Tel:
Fax:
+1-714-528-6777
+1-714-528-6778 Moxa Europe Tel:
Fax:
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99 Moxa India Tel:
Fax:
+91-80-4172-9088
+91-80-4132-1045 Moxa China (Shanghai office) Toll-free: 800-820-5036 Tel:
Fax:
+86-21-5258-9955
+86-21-5258-5505 Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator
& your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC 15.407(e): Within the 5.15-5.25 GHz band, U-NII devices will be restricted to indoor operations to reduce any potential for harmful interference to co-channel MSS operations. AirWorks AWK-4131A Supporting Information B-4 R&TTE Compliance Statement Moxa declares that the apparatus AWK-4131A complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC
(Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. Table of Contents 1. Introduction ...................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................ 1-2 Product Specifications ......................................................................................................................... 1-3 Functional Design ............................................................................................................................... 1-5 LED Indicators ............................................................................................................................ 1-5 Beeper ....................................................................................................................................... 1-6 Reset Button ............................................................................................................................... 1-6 Relay (Digital Output) .................................................................................................................. 1-6 2. Getting Started .................................................................................................................................. 2-1 First-time Installation and Configuration ................................................................................................ 2-2 Communication Testing ....................................................................................................................... 2-3 Function Guide ................................................................................................................................... 2-5 3. Web Console Configuration ............................................................................................................... 3-1 Configuration by Web Browser.............................................................................................................. 3-2 Overview ........................................................................................................................................... 3-4 Basic Settings .................................................................................................................................... 3-5 System Info Settings ................................................................................................................... 3-5 Network Settings ......................................................................................................................... 3-6 Time Settings ............................................................................................................................. 3-7 Wireless Settings ................................................................................................................................ 3-9 Operation Mode ................................................................................................................................ 3-10 Basic Wireless Settings ...................................................................................................................... 3-10 WLAN Security Settings.............................................................................................................. 3-12 Advanced Wireless Settings ........................................................................................................ 3-19 WLAN Certification Settings (for EAP-TLS in Client mode only) ........................................................ 3-22 Advanced Settings ............................................................................................................................ 3-23 Using Virtual LAN .............................................................................................................................. 3-23 The Virtual LAN (VLAN) Concept .................................................................................................. 3-23 Configuring Virtual LAN .............................................................................................................. 3-24 DHCP Server (for AP mode only) ................................................................................................. 3-25 Packet Filters ............................................................................................................................ 3-26 RSTP Settings (for WDS, Maste, or Slave mode only) ..................................................................... 3-28 SNMP Agent.............................................................................................................................. 3-30 Link Fault Pass-Through (for Client/Slave mode only) .................................................................... 3-33 Auto Warning Settings ....................................................................................................................... 3-33 System Log .............................................................................................................................. 3-33 Syslog ..................................................................................................................................... 3-34 E-mail ...................................................................................................................................... 3-35 Relay ....................................................................................................................................... 3-36 Trap ........................................................................................................................................ 3-37 Status ............................................................................................................................................. 3-38 Wireless Status ......................................................................................................................... 3-38 Associated Client List (for AP mode only) ...................................................................................... 3-39 DHCP Client List (for AP mode only) ............................................................................................. 3-39 System Log .............................................................................................................................. 3-40 Relay Status ............................................................................................................................. 3-40 DI and Power Status .................................................................................................................. 3-41 Maintenance .................................................................................................................................... 3-41 Console Settings ....................................................................................................................... 3-41 Ping ......................................................................................................................................... 3-41 Firmware Upgrade ..................................................................................................................... 3-42 Config Import Export ................................................................................................................. 3-42 Load Factory Default .................................................................................................................. 3-43 Password.................................................................................................................................. 3-43 Misc. Settings ........................................................................................................................... 3-44 Save Configuration ........................................................................................................................... 3-44 Restart ............................................................................................................................................ 3-45 Logout............................................................................................................................................. 3-45 4. Software Installation/Configuration ................................................................................................. 4-1 Overview ........................................................................................................................................... 4-2 AWK Search Utility .............................................................................................................................. 4-2 Installing AWK Search Utility ........................................................................................................ 4-2 Configuring AWK Search Utility ..................................................................................................... 4-4 5. Other Console Configurations ............................................................................................................ 5-1 RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 5-2 Configuration by Telnet and SSH Consoles ............................................................................................. 5-4 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-4 Disabling Telnet and Browser Access ..................................................................................................... 5-5 6. References ........................................................................................................................................ 6-1 Wireless Distribution System (WDS)...................................................................................................... 6-2 Beacon .............................................................................................................................................. 6-3 DTIM ................................................................................................................................................. 6-3 Fragment ........................................................................................................................................... 6-4 RTS Threshold .................................................................................................................................... 6-4 STP and RSTP .................................................................................................................................... 6-4 The STP/RSTP Concept ................................................................................................................ 6-4 Differences between RSTP and STP ................................................................................................ 6-4 7. Supporting Information..................................................................................................................... 7-1 About This Users Manual ..................................................................................................................... 7-2 DoC (Declaration of Conformity) ........................................................................................................... 7-2 Federal Communication Commission Interference Statement ............................................................ 7-2 R&TTE Compliance Statement ....................................................................................................... 7-3 Firmware Recovery ............................................................................................................................. 7-4 Technical Support Contact Information .................................................................................................. 7-5 1 Introduction Moxas AirWorks AWK-4131A enables wireless access to network resources. The AWK-4131A is rated to operate at temperatures ranging from -40 to 75C and is rugged enough for any harsh industrial environment. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LED Indicators Beeper Reset Button Relay (Digital Output) AirWorks AWK-4131A Introduction Overview The AWK-4131A outdoor wireless Access Point is an ideal solution for industrial applications that are hard to wire, too expensive to wire, or use mobile equipment that connect to a TCP/IP network. The AWK-4131A is rated to operate at temperatures ranging from -40 to 75C, and its dust-tight and weatherproof design is IP68-rated. An IP68 rating means the device is completely protected from dust and is protected against the effects of immersion in water between 15cm and 1m in depth. This means you can set up a WLAN or extend existing wired networks to outdoor locations and still maintain a reliable connection. The AWK-4131A has two redundant DC power inputs for increased reliability, can be powered via PoE, and is easy to deploy. Package Checklist Moxas AWK-4131A is shipped with the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. AWK-4131A omni-directional antennas (5/2 dBi, N-type male, 2.4/5 GHz) Wall mounting kit Field-installable power plug Field-installable RJ45 plug Metal cap to cover M12 female DI/O connector Metal cap to cover RJ45 connector Documentation and software CD Quick installation guide (printed) Warranty card NOTE The above items come with the AWK-4131A standard version. The package contents may vary in different customized versions. Product Features IEEE802.11a/b/g/n Compliant. Three-in-one design (AP/Bridge/Client). Advanced Wireless Security:
64-bit and 128-bit WEP/WPA/WPA2. SSID Hiding/IEEE 802.1X/RADIUS. Packet access control & filtering. STP/RSTP support for redundancy of system networking (for Master and Slave mode only). Long-distance transmission support. Turbo Roaming enables rapid handover (for Client mode only). ABC-01 for configuration import/export Customized antenna selection. RS-232 console management. 2DI+1DO for on-site monitoring and warming. Operating temperature range from -40 to 75. Power input via PoE (Power over Ethernet) or redundant 24 VDC power inputs. Wall mounting ability. 1-2 AirWorks AWK-4131A Introduction IP68-rated metal housing. Waterproof RJ45 connectors and M12 connectors. Product Specifications WLAN Interface Standards:
IEEE 802.11a/b/g/n for Wireless LAN IEEE 802.11i for Wireless Security. IEEE 802.3 for 10BaseT IEEE 802.3u for 100BaseT(X) IEEE 802.3ab for 1000BaseT IEEE 802.3af for Power-over-Ethernet IEEE 802.1D for Spanning Tree Protocol IEEE 802.1w for Rapid STP IEEE 802.1Q VLAN Spread Spectrum and Modulation (typical):
DSSS with DBPSK, DQPSK, CCK OFDM with BPSK, QPSK, 16QAM, 64QAM 802.11b: CCK @ 11/5.5 Mbps, DQPSK @ 2 Mbps, DBPSK @ 11 Mbps 802.11a/g: 64QAM @ 54/48 Mbps, 16QAM @ 36/24 Mbps, QPSK @ 18/12 Mbps, BPSK @ 9/6 Mbps Operating Channels (central frequency):
US:
2.412 to 2.462 GHz (11 channels) 5.18 to 5.24 GHz (4 channels) EU:
2.412 to 2.472 GHz (13 channels) 5.18 to 5.24 GHz (4 channels) JP:
2.412 to 2.472 GHz (13 channels, OFDM) 2.412 to 2.484 GHz (14 channels, DSSS) 5.18 to 5.24 GHz (4 channels for W52) Security:
SSID broadcast enable/disable Firewall for MAC/IP/Protocol/Port-based filtering 64-bit and 128-bit WEP encryption, WPA /WPA2 Personal and Enterprise (IEEE 802.1X/RADIUS, TKIP and AES) Transmission Rates:
802.11b: 1, 2, 5.5, 11 Mbps 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps TX Transmit Power:
802.11b:
Typ. 23 1.5 dBm @ 1 to 11 Mbps 802.11g:
Typ. 20 1.5 dBm @ 6 to 24 Mbps, Typ. 19 1.5 dBm @ 36 Mbps, Typ. 18 1.5 dBm @ 48 Mbps, Typ. 17 1.5 dBm @ 54 Mbps 802.11a:
Typ. 18 1.5 dBm @ 6 to 24 Mbps, Typ. 16 1.5 dBm @ 36 to 48 Mbps, Typ. 15 1.5 dBm @ 54 Mbps 1-3 AirWorks AWK-4131A RX Sensitivity:
802.11b:
Introduction
-97 dBm @ 1 Mbps, -94 dBm @ 2 Mbps, -92 dBm @ 5.5 Mbps, -90 dBm @ 11 Mbps 802.11g:
-93 dBm @ 6 Mbps, -91 dBm @ 9 Mbps, -90 dBm @ 12 Mbps, -88 dBm @ 18 Mbps, -84 dBm @ 24 Mbps, -80 dBm @ 36 Mbps, -76 dBm @ 48 Mbps, -74 dBm @ 54 Mbps 802.11a:
-90 dBm @ 6 Mbps, -89 dBm @ 9 Mbps, -89 dBm @ 12 Mbps, -85 dBm @ 18 Mbps, -83 dBm @ 24 Mbps, -79 dBm @ 36 Mbps, -75 dBm @ 48 Mbps, -74 dBm @ 54 Mbps Protocol Support General Protocols: Proxy ARP, DNS, HTTP, HTTPS, IP, ICMP, SNTP, TCP, UDP, RADIUS, SNMP, PPPoE, DHCP, LLDP AP-only Protocols: ARP, BOOTP, DHCP, STP/RSTP (IEEE 802.1D/w) Interface Default Antennas: 2 dual-band omni-directional antennas, 5 dBi at 2.4 GHz, 2 dBi at 5 GHz, N-type (male) Connector for External Antennas: N-type (female) LAN Ports: 1, 10/100/1000BaseT(X), auto negotiation speed (waterproof RJ45-type) Console Port: RS-232 (waterproof RJ45-type) LED Indicators: PWR, FAULT, STATE, WLAN, LAN Alarm Contact (digital output, M12 connector): 1 relay output with current carrying capacity of 1 A @ 24 VDC Digital Inputs (M12 connector): 2 electrically isolated inputs
+13 to +30 V for state 1
+3 to -30 V for state 0 Max. input current: 8 mA Physical Characteristics Housing: Metal, IP68 protection Weight: 1.5 kg Dimensions: 224 x 147.7 x 64.5 mm (8.82 x 5.82 x 2.54 in) Installation: Wall mounting (standard), DIN-Rail mounting (optional), pole mounting (optional) Environmental Limits Operating Temperature: -40 to 75C (-40 to 167F) Storage Temperature: -40 to 85C (-40 to 185F) Ambient Relative Humidity: 5% to 100% (non-condensing) Power Requirements Input Voltage: 12 to 48 VDC, redundant dual DC power inputs or 48 VDC Power-over-Ethernet (IEEE 802.3af compliant) Connector: M12 connector with A-coding Power Consumption:
0.121 to 0.494 A @ 12 to 48 VDC 0.3 A @ 24 VDC Reverse Polarity Protection: Present Standards and Certifications Safety: UL 60950-1, EN 60950-1 EMC: EN 301 489-1/17, FCC Part 15 Subpart B Class B, EN 55022/55024 Radio: EN 300 328, EN 301 893, TELEC Note: Please check Moxas website for the most up-to-date certification status. Reliability MTBF (mean time between failures): 364,564 hours Warranty Warranty Period: 5 years Details: See www.moxa.com/warranty 1-4 AirWorks AWK-4131A Introduction ATTENTION The AWK-4131A is NOT a portable mobile device and should be located at least 20cm away from the human body. The AWK-4131A is NOT designed for the general public. To deploy AWK-4131As and establish a wireless network safely, a well-trained technician is required for installation. Functional Design LED Indicators The LEDs on the front panel of AWK-4131A allow you to identity the status and wireless settings quickly. The LED for FAULT indicates the system failure and user-configured events. If the AWK-4131A cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at an interval of one second. The following table is a summary for the wireless settings and LED displays. You can check the status of the AWK-4131A by reading these LEDs. More information about Basic Wireless Settings is presented in Chapter 3. LED Color State Description PWR FAULT WLAN LAN Green Front Panel LED Indicators (System) On Off Power is being supplied
(from power input 1 or 2, or PoE). Power is not being supplied Blink (slow) Cannot get an IP address from the DHCP server (interval: 1 sec) Red Blink (fast) IP address conflict (interval: 0.5 sec) Off On Error condition does not exist. WLAN functions is in Client/Slave mode. Green Blink WLANs data communication is run in Client/Slave mode Off On WLAN is not in use or not working properly WLAN functions in AP/Bridge mode. Amber Blink WLANs data communication is run in AP/Master mode Off On WLAN is not in use or not working properly. LAN ports 100Mbps link is active. Green Blink Data is being transmitted at 100Mbps Off On LAN ports 100Mbps link is inactive. LAN ports 10Mbps link is active. Amber Blink Data is being transmitted at 10Mbps Off LAN ports 10Mbps link is inactive. 1-5 AirWorks AWK-4131A Introduction ATTENTION When the LEDs for STATE (Green), FAULT, and WLAN all light up simultaneously and blink at one-second intervals, it means the system failed to boot. This may be due to improper operation or uncontrollable issues, such as an unexpected shutdown during firmware update. To recover the firmware, refer to Firmware Recovery in Chapter 6. Beeper The beeper signals that the system is ready with two short beeps. Reset Button The RESET button is located on the bottom panel of the AWK-4131A. You can reboot the AWK-4131A or reset it to factory default settings by pressing the RESET button with a pointed object such as an unfolded paper clip. System reboot: Hold the RESET button down for under 5 seconds and then release. Reset to factory default: Hold the RESET button down for over 5 seconds until the STATE LED starts blinking green. Release the button to reset the AWK-4131A. STEP 1:
STEP 2:
Remove the reset button cover. Using a pointed object, press and hold the reset button. Relay (Digital Output) The AWK-4131A has one relay output, which consists of the 2 contacts for the 8-pin M12 connector on the bottom panel, as shown below. These relay contacts forward system failure and user-configured events. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reason, the relay circuit is kept open when the AWK-4131A is not powered. The AWK-4131As relay status is summarized as follows:
Power Status Event Off On
---
Yes No Relay Open Open Short 1-6 AirWorks AWK-4131A Introduction Digital Inputs and Relay-out Pin Assignment (8-pin M12 connector) PIN 1 2 3 4 5 6 7 8 Function DOUT_I DOUT_O DI0+
DI0-
DI1+
DI1-
reserved reserved 1-7 2 Getting Started This chapter explains how to install Moxas AirWorks AWK-4131A for the first time, quickly set up your wireless network, and test whether the connection is running well. With the function guide, you can easily locate the functions you need. The following topics are covered in this chapter:
First-time Installation and Configuration Communication Testing Function Guide AirWorks AWK-4131A Getting Started First-time Installation and Configuration Before installing the AWK-4131A, make sure all items in the Package Checklist are in the box. In addition, you will need access to a notebook computer or PC equipped with an Ethernet port. The AWK-4131A has a default IP address that you must use when connecting to the device for the first time. Step 1: Select the power source. The AWK-4131A can be powered by DC power input or PoE (Power over Ethernet). The AWK-4131A will use whichever power source you choose. Step 2: Connect the AWK-4131A to a notebook or PC. Since the AWK-4131A supports MDI/MDI-X auto-sensing, you can use either a straight-through cable or crossover cable to connect the AWK-4131A to a computer. If the LED indicator on AWK-4131As LAN port lights up, it means the connection is established. Step 3: Set up the computers IP address. Set an IP address on the same subnet as the AWK-4131A. Since the AWK-4131As default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, you should set the IP address of the computer to 192.168.127.xxx. NOTE After you select Maintenance Load Factory Default and click the Submit button, the AWK-4131A will be reset to factory default settings and the IP address will be also reset to 192.168.127.253. Step 4: Use the web-based manager to configure AWK-4131A Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based Network Manager. Before the homepage opens, you will need to enter the user name and password as shown in the following figure. For first-time configuration, enter the default user name and password and then click on the Login button:
NOTE Default user name and password:
User Name:
admin Password:
root For security reasons, we strongly recommend changing the default password. To do so, select Maintenance >
Password, and then follow the on-screen instructions to change the password. 2-2 AirWorks AWK-4131A Getting Started NOTE Clicking Submit will apply your changes refresh the web page. The string (Updated) and a blinking reminder will appear in the upper-right corner of web page, as follows. To make the changes effective, click Restart and then Save and Restart after you change the settings. It will take about 30 seconds for the AWK-4131A to restart. Step 5: Select the operation mode for the AWK-4131A. By default, the AWK-4131As operation mode is set to AP. You can change the setting in Wireless Settings Basic Wireless Settings if you would like to use the Client mode instead. Detailed information about configuring the AWK-4131As operation can be found in Chapter 3. Step 6: Test communications. We will describe 2 test methods to make sure the network connection has been established. Please refer to the following section for more details. Communication Testing After installation, you can run a sample test to make sure the AWK-4131A and wireless connection are functioning normally. Two testing methods are explained in the following sections. Use the first method if you are using only one AWK-4131A device, and use the second method if you are using two or more AWK-4131As. Testing Method for one AWK-4131A If you are only using one AWK-4131A, you will need a second notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the AWK-4131A (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (B) so that it is on the same subnet as the first notebook (A), which is connected to the AWK-4131A. After configuring the WLAN card, establish a wireless connection with the AWK-4131A and open a DOS window on Notebook B. At the prompt, type ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. SSID: Moxa AWK-4131A IP: 192.168.127.253 PING Notebook B IP: 192.168.127.1 Notebook A IP: 192.168.127.2 3-2 AirWorks AWK-4131A Getting Started Testing Method for two or more AWK-4131As If you have two or more AWK-4131As, you will need a second notebook computer (B) equipped with an Ethernet port. Use the default settings for the first AWK-4131A connected to notebook A and change the second or third AWK-4131A connected to notebook B to Client mode. Then, configure the notebooks and AWK-4131As properly. AWK-4131A / Client IP: 192.168.127.252 SSID: Moxa AWK-4131A / AP IP:192.168.127.253 PING Notebook B Notebook A IP: 192.168.127.1 IP: 192.168.127.2 After setting up the testing environment, open a DOS window on notebook B. At the prompt, type ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 4-2 AirWorks AWK-4131A Getting Started Function Guide The management functions are categorized in a tree and shown in the left field of the web-based management console. You can efficiently locate the function you need with the following guide. Quick overview of the AWK-4131As status 5-2 AirWorks AWK-4131A Getting Started Basic settings for administering the AWK-4131A Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional. Application-oriented device management functions to set up events, traps, and reactions via relay warning, e-mail, and SNMP notification Note: These functions are all optional. Real-time status information for monitoring wired/wireless network performance, advanced services, and device management functions. Functions for maintaining the AWK-4131A, and for diagnosing the network. On-demand functions to support the web-based console management operation. 6-2 3 Web Console Configuration In this chapter, we will explain each web management page of the web-based console configuration. Moxas easy-to-use management functions will help you set up your AWK-4131A, as well as establish and maintain your wireless network easily. The following topics are covered in this chapter:
Configuration by Web Browser Status Overview Basic Settings Wireless Status Associated Client List (for AP mode only) System Info Settings DHCP Client List (for AP mode only) Network Settings Time Settings Wireless Settings Operation Mode System Log Relay Status DI and Power Status Maintenance Basic Wireless Settings Console Settings WLAN Security Settings Ping Advanced Wireless Settings Firmware Upgrade WLAN Certification Settings (for EAP-TLS in Config Import Export Client mode only) Advanced Settings Using Virtual LAN Load Factory Default Password Misc. Settings The Virtual LAN (VLAN) Concept Save Configuration Configuring Virtual LAN DHCP Server (for AP mode only) Packet Filters Restart Logout RSTP Settings (for WDS, Maste, or Slave mode only) SNMP Agent Link Fault Pass-Through (for Client/Slave mode only) Auto Warning Settings System Log Syslog E-mail Relay Trap AirWorks AWK-4131A Web Console Configuration Configuration by Web Browser Moxa AWK-4131As web browser interface provides a convenient way to modify its configuration and access the built-in monitoring and network administration functions. The recommended web browser is Microsoft Internet Explorer 7.0 or 8.0 with JVM (Java Virtual Machine) installed. NOTE To use the AWK-4131As management and monitoring functions from a PC host connected to the same LAN as the AWK-4131A, you must make sure that the PC host and AWK-4131A are on the same logical subnet. Similarly, if the AWK-4131A is configured for other VLAN settings, you must make sure your PC host is on the management VLAN. The Moxa AWK-4131As default IP address is 192.168.127.253. Follow the steps below to access the AWK-4131As web-based console management. 1. Open your web browser (ex. Internet Explorer) and type the AWK-4131As IP address in the address field. Then press Enter to establish the connection. 2. The Web Console Login page will open. Enter the password (User Name is set as admin; the default password is root if a new password has not been set.) and then click Login to continue. 3-2 AirWorks AWK-4131A Web Console Configuration You may need to wait a few moments for the web page to download onto your computer. Please note that the model name and IP address of your AWK-312 are both shown in the title of the web page. This information can help you identify multiple AWK-4131As. You can use the menu tree on the left side of the window to open the function pages to access each of AWK-4131As functions. In the following paragraphs, we will go through each of the AWK-4131As management functions in detail. You can also get a quick overview of these functions in the Function Guide section of Chapter 2. ATTENTION The model name of the AWK-4131A is shown as AWK-4131A-XX where XX indicates the country code. The country code represents the AWK-4131A version and which bandwidth it uses. We use AWK-4131A-US as an example in the following figures. The country code for the model name on your screen may vary if you are using a different version (band) AWK-4131A. ATTENTION For security reasons, you will need to log back into the AWK-4131A after the 5-minute time-out. 3-3 AirWorks AWK-4131A Web Console Configuration Overview The Overview page summarizes the AWK-4131As current status. The information is categorized into several groups: System info, Device info and 802.11 info. Click on SSID for more detailed 802.11 information, as shown in the following figure. NOTE The 802.11 info that is displayed may be different for different operation modes. For example, Current BSSID is not available in Client mode, and Signal strength is not available in AP mode. 3-4 AirWorks AWK-4131A Web Console Configuration Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the AWK-4131A. System Info Settings The System Info items, especially Device name and Device description, are displayed and included on the Overview page, SNMP information, and alarm emails. Setting System Info items makes it easier to identify the different AWK-4131As connected to your network. Device name Setting Description Factory Default Max. 31 Characters This option is useful for specifying the role or application of AWK-4131A_<Serial different AWK-4131A units. No. of this AWK-4131A>
Device location Setting Description Factory Default Max. 31 Characters This specifies the location of different AWK-4131A units. None Device description Setting Description Factory Default Max. 31 Characters Use this space to record more detailed description of None AWK-4131A. Device name Setting Description Factory Default Max. 31 Characters To provide information about whom to contact in order to None resolve problems, use this space to record contact information of the person responsible for maintaining this AWK-4131A. 3-5 AirWorks AWK-4131A Web Console Configuration Network Settings The Network Settings configuration allows you to modify the usual TCP/IP network parameters. An explanation of each configuration item is given below. IP configuration Setting DHCP Description Factory Default The AWK-4131As IP address will be assigned automatically by Static Static Set up the AWK-4131As IP address manually. the networks DHCP server IP address Setting Description AWK-4131As IP Identifies the AWK-4131A on a TCP/IP network. Factory Default 192.168.127.253 address Subnet mask Setting Description Factory Default AWK-4131As subnet Identifies the type of network to which the AWK-4131A is 255.255.255.0 mask connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Gateway Setting Description Factory Default AWK-4131As default The IP address of the router that connects the LAN to an None gateway outside network. Primary/ Secondary DNS server Setting Description Factory Default IP address of Primary/
The IP address of the DNS Server used by your network. After None Secondary DNS server entering the DNS Servers IP address, you can input the AWK-4131As URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. 3-6 AirWorks AWK-4131A Web Console Configuration Time Settings The AWK-4131A has a time calibration function based on information from an NTP server or user specified Date and Time information. Functions such as Auto warning can add real-time information to the message. Current local time shows the AWK-4131As system time when you open this web page. You can click on the Set Time button to activate the update after setting up the date and time parameters. An (Updated) string will appear to indicate that the change is complete. Local time settings will be immediately activated in the system without running Save and Restart. NOTE The AWK-4131A has a real time clock (RTC). Users are strongly recommended to update the Local time for the AWK-4131A after initial setup or long-term shutdown, especially when the network does not have an Internet connection for accessing the NTP server or there is no NTP server on the LAN. Current local time Setting Description Factory Default User adjustable time The date and time parameters allow configuration of the local None time with aimmediate activation.
(yyyy/mm/dd hh:mm:ss format;
24-hour format.) Time zone Setting Description Factory Default User selectable time The time zone setting allows conversion from GMT (Greenwich GMT (Greenwich zone Mean Time) to local time. Mean Time) ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Description Factory Default Enable/ Disable Daylight saving time (also know as DST or summer time) Disable involves advancing clocks (usually 1hour) during the summer time to provide an extra hour of daylight in the afternoon. 3-7 AirWorks AWK-4131A Web Console Configuration 3-8 AirWorks AWK-4131A Web Console Configuration When Daylight Saving Time is enabled, the following parameters are shown:
The Starts at parameter allows users to enter the date that daylight saving time begins. The Stops at parameter allows users to enter the date that daylight saving time ends. The Time offset parameter indicates how many hours forward the clock should be advanced. Time server 1/ 2 Setting Description Factory Default The 1st/ 2nd time IP or Domain address of NTP time server. The 2nd time will be time.nist.gov server IP/Name used if the 1st NTP server fails to connect. Query period Setting Description Factory Default Query period time This parameter determines how often the time is updated from 600 (seconds)
(1- 9999 seconds) the NTP server. Wireless Settings The essential settings for wireless networks are presented in this function group. Settings must be properly set before establishing your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP/Bridge: This mode provides both Access Point and Static LAN-to-LAN Bridging functionality. The static LAN-to-LAN bridging function is supported by the Wireless Distribution System (WDS). Client: This mode is for Dynamic LAN-to-LAN Bridging or Device-to-LAN scenarios. The Client automatically establishes bridge links with other APs. In either AP/Bridge or Client mode, the AWK-4131A forwards packets between its Ethernet interface (LAN) and wireless interface (WLAN) to connect wired hosts on the Ethernet side with wireless host(s) on the wireless side. There are two types of wireless links specified by the IEEE802.11 standard:
STA-AP: This type of wireless link is established between an IEEE802.11 Station (STA) and an IEEE802.11 Access Point (AP). An STA is usually a client computer (PC or PDA) with a WLAN network interface card
(NIC). The Client mode is actually an STA. WDS: This type of wireless link is established between two IEEE802.11 APs. Wireless packets transmitted along the WDS link comply with the IEEE802.11 WDS (Wireless Distribution System) format at the link layer. Refer to the Wireless Distribution System (WDS) section in Chapter 5 for details. Keep in mind that WPA/WPA2 CANNOT be supported in WDS. To establish a static bridge link based on the WDS, the APs at both end of the WDS link must be configured manually with each others MAC addresses. To establish a dynamic bridge link between an AP and a Client, both devices must be configured with the same channel, and security settings (see WLAN Security Settings for details). Moreover, the same SSID is also needed for clients that roam the APs in Bridge mode. The Client automatically scans for any AP that is using the matched SSID and establishes a bridge link with the scanned AP. When the AWK-4131A is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adapter. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. NOTE Although it is more convenient to use dynamic bridging, there is a limitationthe Client can only transmit IP-based packets between its wireless interface (WLAN) and Ethernet interface (LAN); other types of traffic
(such as IPX and AppleTalk) are not forwarded. 3-9 AirWorks AWK-4131A Web Console Configuration Operation Mode The AWK-4131A supports four main operation modesClient, AP, Master, and Slaveeach of which plays a distinct role on the wireless network. Wireless Enable Setting Description Factory Default Enable/Disable The RF (Radio Frequency) module can be manually turned on or Enable off. This function is available in AP operation mode only. Operation Mode Setting AP Client Master Description Factory Default The AWK-4131A plays the role of wireless AP/Bridge AP The AWK-4131A plays the role of wireless Client This mode collocates with AWK-5222/5232/6222/6232s Wireless bridge mode. The AWK-4131A plays the role of wireless Master. Slave This mode collocates with AWK-5222/5232/6222/6232s Wireless bridge mode. The AWK-4131A plays the role of wireless Slave. Basic Wireless Settings The WLAN Basic Setting Selection panel is used to add and edit SSIDs. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. You can configure your AWK to use up to 9 SSIDs, and configure each SSID differently. All of the SSIDs are active at the same time; that is, client devices can use any of the SSIDs to associate with the access point. Click on Add SSID to create more SSIDs. 3-10 AirWorks AWK-4131A Web Console Configuration Click on Edit to assign different configuration settings to each SSID. The configuration panel appears as follows:
NOTE When you switch to Client mode, a Site Survey button will be available on the Basic Wireless Settings panel. Click the Site Survey button to view information about available APs, as shown in the following figure. You can click on the SSID of an entity and bring the value of its SSID onto the SSID field of the Basic Wireless Settings page. Click the Refresh button to re-scan and update the table. NOTE If the Gateway field in Basic Settings Network Settings is empty, a warning message will appear, reminding you to set the default gateway when Client mode is enabled. You can ignore this message if you are only planning a local network and no packets will be sent outside the network. RF type Setting A B G Description Supports IEEE802.11a standard only Supports IEEE802.11b standard only Supports IEEE802.11g standard only B/G Mixed Supports both of IEEE802.11b/g standards, but 802.11g can be slowed down when 802.11b clients are on the network Factory Default B/G Mixed 3-11 with RF type SSID Setting AirWorks AWK-4131A Web Console Configuration Channel (for AP/Master mode only) Setting Description Available channels vary AWK-4131A plays a role of wireless AP. Factory Default 6 (in B/G Mixed mode) Description Factory Default Max. 31 Characters The SSID of a client and the SSID of the AP must be identical for MOXA them to communicate with each other. SSID broadcast (for AP/Master mode only) Setting Description Enable/ Disable SSID can be broadcast or not. Factory Default Enable NOTE The AWK-4131A-JP (for Japanese frequency bands) only connects SSID-hidden APs in all IEEE802.11a channels and IEEE802.11g channel 1 to 11. The AWK-4131A-EU (for European frequency bands) only connects SSID-hidden APs in all IEEE802.11b/g channels. WDS (for AP mode only) Setting Description Enable/ Disable AWK-4131A supports WDS or not. Factory Default Disable NOTE When WDS is enabled, you can choose to use a pure point-to-point WDS link by disabling AP functionality. The AWK-4131A provides 8 entities for WDS settings and can support up to 8 WDS links to other APs or wireless bridges. The list appears when WDS Enable is checked. Enter the MAC address to set up a WDS link. Remember to activate a WDS link by checking the Active check box. WLAN Security Settings The AWK-4131A provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2. Several types of security models are available in AWK-4131A by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be manually configured. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE802.1X. The AWK-4131A can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. 3-12 AirWorks AWK-4131A Web Console Configuration Security mode Setting Open WEP WPA*
WPA2*
Factory Default Open Description No authentication Static WEP is used WPA is used Fully supports IEEE802.11i with TKIP/AES + 802.1X
* WPA and WPA2 cannot be supported in WDS (Bridge) mode. Open For security reasons, it is highly recommended that the security mode should be set to the options other than Open System. When the security mode is set to Open System, no authentication or data encryption will be performed. WEP According to the IEEE802.11 standard, WEP can be used for authentication and data encryption
(confidentiality). Shared (or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is often used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The AWK-4131A provides 4 entities of WEP key settings that can be selected to use with Key index. The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key type, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit
(or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. 3-13 AirWorks AWK-4131A Web Console Configuration Authentication type Setting Open Shared Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Description Factory Default Data encryption is enabled, but no authentication Open Data encryption and authentication are both enabled. Description Factory Default Specifies WEP keys in hex-decimal number form HEX Specifies WEP keys in ASCII form Description Factory Default Uses 40-bit secret keys with 24-bit initialization vector 64 bits Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used Factory Default Open Setting Description Factory Default ASCII type:
A string that can be used as a WEP seed for RC4 encryption None 64 bits: 5 chars engine. 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 are significantly improved encryption methods of WEP. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so for added security. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The AWK-4131A also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also know as WPA/WPA-PSK (Pre-Shared Key), provides a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complex and as long as possible. The number of ASCII characters of the Passphrase must be at least 8 and can go up to 63. For security reason, this passphrase should be disclosed to the relevant users only and changed regularly. 3-14 AirWorks AWK-4131A Web Console Configuration WPA type Setting Personal Enterprise Encryption method Setting TKIP AES Mixed*
Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 Description Factory Default Temporal Key Integrity Protocol is enabled TKIP Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy clients. This option is rarely used.
*This option is available in AP/Master mode only, and cannot support AES-enabled clients. Passphrase Setting Description Factory Default 8 63 characters Master key to generate keys for encryption and decryption None Key renewal (for AP/Master mode only) Setting Description 60 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 day) Factory Default 3600 (seconds) NOTE The value for key renewal instructs the wireless AP how often it should change the encryption keys. Usually the security level will be higher if you set this value shorter so that the encryption keys are changed more often. Default value is 3600 seconds (6 minutes). Longer time periods can be considered if traffic is not so busy. WPA/WPA2-Enterprise (for AP/Master mode) By selecting WPA type as Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication in a large-scaled network. It is not necessary to exchange keys or pass phrases. WPA type Setting Personal Enterprise Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 3-15 AirWorks AWK-4131A Web Console Configuration Encryption method Setting Description Factory Default TKIP AES Mixed Temporal Key Integrity Protocol is enabled TKIP Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy clients. This option is rarely used.
*This option is available in AP/Master mode only, and cannot support AES-enabled clients. Primary/ Secondary RADIUS server IP Setting Description Factory Default The IP address of Specifies the delegated RADIUS server for EAP None RADIUS server Primary/ Secondary RADIUS port Setting Description Factory Default Port number Specifies the port number of the delegated RADIUS server 1812 Primary/ Secondary RADIUS shared key Setting Description Factory Default Max. 31 characters The secret key shared between AP and RADIUS server None Key renewal Setting Description 60 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 year) Factory Default 3600 (seconds) WPA/WPA2-Enterprise (for Client/Slave mode) In a client role, the AWK-4131A can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP AES EAP Protocol Description Factory Default Temporal Key Integrity Protocol is enabled TKIP Advance Encryption System is enabled Setting Description Factory Default TLS TTLS PEAP Specifies Transport Layer Security protocol TLS Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP 3-16 AirWorks AWK-4131A Web Console Configuration Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections:
EAP-TLS TLS is the standards-based successor to the Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use Basic Wireless Settings WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. You can check the current certificate status in Current Status if it is available. Certificate issued to: shows the certificate user Certificate issued by: shows the certificate issuer Certificate expiration date: indicates when the certificate gets invalid EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel, like EAP-TLS, and validate whether the network is trustworthy with digital certificates on the authentication server. This step is run to establish a tunnel that protects the next step (or inner authentication) so it is sometimes referred to as the outer authentication. Then the TLS tunnel is used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for the outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The AWK-4131A provides some non-cryptographic EAP methods including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS or PEAP. Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, while the true user name is shown only through the encrypted channel. Remember, not all client software supports anonymous altercation. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. 3-17 AirWorks AWK-4131A Web Console Configuration TTL Inner Authentication Setting PAP CHAP MS-CHAP Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used MS-CHAP-V2 Microsoft CHAP version 2 is used Anonymous Factory Default MS-CHAP-V2 Setting Description Factory Default Max. 31 characters A distinct name used for outer authentication None User name & Password Setting Description Factory Default User name and password used in inner authentication None PEAP There are a few differences in the inner authentication procedures for TTLS and PEAP. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The AWK-4131A provides MS-CHAP-V2 merely as an EAP method for inner authentication. Inner EAP protocol Setting Description MS-CHAP-V2 Microsoft CHAP version 2 is used Anonymous Factory Default MS-CHAP-V2 Setting Description Factory Default Max. 31 characters A distinct name used for outer authentication None User name & Password Setting Description Factory Default User name and password used in inner authentication None 3-18 AirWorks AWK-4131A Web Console Configuration Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate Setting Auto Description Factory Default The AWK-4131A will sense and adjust the data rate Auto automatically Available rates User can manually select a target transmission data rate Transmission Power Setting Auto Full High Medium Low Description Factory Default Specifies wireless signal coverage by automatically selecting Full the strength of Tx power Equivalent to 0 full Tx power
-5 dB of full Tx power
-10 dB of full Tx power
-15 dB of full Tx power NOTE NOTE Tx power at Full US model: 17 dB EU model: 16 dB JP model: 18 dB RF type = A (Channel 36 ~ 48) Setting Auto Full High Medium Low Description Factory Default Specifies wireless signal coverage by automatically selecting Full the strength of Tx power Equivalent to 0 full Tx power
-4 dB of full Tx power
-8 dB of full Tx power
-12 dB of full Tx power 3-19 AirWorks AWK-4131A Web Console Configuration NOTE Tx power at Full US model: 14 dB EU model: 16 dB JP model: 14 dB Beacon Interval (for AP/Master mode only) Setting Description Factory Default Beacon Interval This value indicates the frequency interval of the beacon 100 (ms)
(40-1000 ms) DTIM Interval (for AP/Master mode only) Setting Description Factory Default Data Beacon Rate This value indicates how often the AWK-4131A sends out a 1
(1-15) Delivery Traffic Indication Message Fragmentation threshold Setting Description Factory Default Fragment Length This parameter specifies the maximum size a data packet 2346
(256-2346) before splitting and creating another new packet RTS threshold Setting Description Factory Default RTS/CTS Threshold This setting determines how large a packet can be before the 2346
(256-2346) Access Point coordinates transmission and reception to ensure efficient communication NOTE You can refer to the related glossaries in Chapter 5 for more detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. Transmission distance Setting Description Factory Default Distance or max. range The distance specifies the transmission distance or max. range 500 for transmission between two AWK devices. This parameter should be set
(500-10000m) properly, especially for long-distance communication. Noise protection Setting Description Factory Default Enable/Disable Adjusts the interference coping capability of the wireless signal. Disable This option should be enabled for communication distances under 500 meters, and should be disabled for communication distances over 500 meters. Transmission enhancement Setting Description Factory Default Enable/ Disable This setting can enhance communication by strengthening the Disable AWK-4131As transmission power. It is quite useful for long-distance transmission or countering environmental interference. The user must carefully evaluate and measure the transmission power of the entire system to make sure that it is still below the regulative limit. Note, too, that RF type 802.11a mode cannot be used if this function is enabled. 3-20 AirWorks AWK-4131A Web Console Configuration NOTE When Transmission enhancement is enabled, the Tx Power is at Full RF type = B/G/Mixed (Channel1~13) US model: 22 dB EU model: 20 dB JP model: 20 dB RF type = A (Channel 36 ~ 48) US model: 17 dB EU model: 17 dB JP model: 17 dB NOTE Make sure the same Transmission distance parameters are set in both AP and Client sides, and both Bridges. When this parameter is more than 500, an optimal algorithm will be enabled to support long-distance transmission. Transmission enhancement only supports 802.11b/g mode; 802.11a mode is not supported. Transmission enhancement is also recommended to enable communication at both ends when long-distance transmission is required. A high-gain antenna installed at a fixed antenna connector can also improve performance. (Select Antenna at MAIN or AUX.) Antenna Setting Auto MAIN AUX EAPOL version Description Factory Default The AWK-4131A uses two antennas (MAIN and AUX) and Auto enables the diversity function for reducing multipath effects. Diversity function is disabled. Only MAIN antenna is in use. Diversity function is disabled. Only AUX antenna is in use. Setting Description Factory Default 1 2 WMM Setting EAPOL version 1 was standardized in the 2001 version of 1 802.1X, which is much more commonly implemented. EAPOL version 2 was specified in 802.1X-2004. Description Factory Default Enable/ Disable WMM is a QoS standard for WLAN traffic. Voice and video data Disable will be given priority bandwidth when enabled with WMM supported wireless clients. Full 11a channel support Setting Description Factory Default Enable/ Disable Full 11a channel support allows users to select one channel Disable from 802.11a, including channels in licensed and unlicensed bands. Turbo Roaming (for Client mode only) Setting Description Factory Default Enable/ Disable Moxas Turbo Roaming can enable rapid handover when the Disable AWK-4131A, as a client, roams among a group of APs. When Turbo Roaming is enabled, RF type and Scan channels will be shown as follows. RF type shows the current RF type, which this client is using now. You can set up Scan channels for the APs among which this client is going to roam. There are three Scan channels available. Please note that the Scan channels may need to be modified when the RF type is changed. (For example, channel 36 is not available in B, G or B/G Mix mode.) 3-21 AirWorks AWK-4131A Web Console Configuration WLAN Certification Settings (for EAP-TLS in Client mode only) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The AWK-4131A can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current status displays information for the current WLAN certificate, which has been imported into the AWK-4131A. Nothing will be shown if no certificate is available. Certificate issued to: shows the certificate user Certificate issued by: shows the certificate issuer Certificate expiration date: indicates when the certificate gets invalid You can import a new WLAN certificate in Import WLAN Certificate by following these steps in order:
1. Input the corresponding password (or key) in the Certificate private password field. Then click Submit to set the password. 2. You can see the password displayed in the Certificate private password field. Then click on the Browse button in Select certificate/key file and select the certificate file. 3. Click Upload Certificate File to import the certificate file. If it succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. NOTE The WLAN certificate will remain after the AWK-4131A reboots. Even though it is expired, it can still be seen on Current Certificate. 3-22 AirWorks AWK-4131A Web Console Configuration Advanced Settings Several advanced functions are available to increase the functionality of your AWK-4131A and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer 2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the AWK-4131A can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your AWK series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Improve network performance and reduce latency Increase security Secure network restricts members to resources on their own VLAN Clients roam without compromising security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. 3-23 AirWorks AWK-4131A Web Console Configuration In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. Configuring Virtual LAN VLAN Settings To configure the AWKs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Port Type LAN WLAN Description Factory Default Set the management VLAN of this AWK. 1 Description This port is the LAN port on the AWK. Trunk Port Yes This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. WDS This is the WDS port on the AWK Yes 3-24 AirWorks AWK-4131A Web Console Configuration Port PVID Setting Description Factory Default VLAN ID ranging from 1 Set the ports VLAN ID for devices that connect to the port. The 1 to 4094 port can be a LAN port or WLAN ports. VLAN Tagged Setting Description Factory Default A comma-seperated list Specify which VLANs can communicate with this specific VLAN. (Empty) of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. NOTE The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. DHCP Server (for AP mode only) DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The AWK-4131A can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The AWK-4131A provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. 3-25 AirWorks AWK-4131A Web Console Configuration DHCP server Setting Enable Disable Default gateway Description Enables AWK-4131A as a DHCP server Disable DHCP server function Factory Default Disable Setting Description Factory Default IP address of a default The IP address of the router that connects to an outside None gateway network Subnet mask Setting Description Factory Default subnet mask Identifies the type of sub-network (e.g., 255.255.0.0 for a None Class B network, or 255.255.255.0 for a Class C network) Primary/ Secondary DNS server Setting Description Factory Default IP address of Primary/
The IP address of the DNS Server used by your network. After None Secondary DNS server entering the DNS Servers IP address, you can use URL as well. The Secondary DNS server will be used if the Primary DNS server fails to connect. Start IP address Setting IP address Description Factory Default Indicates the IP address which AWK-4131A can start assigning None Maximum number of users Setting 1 999 Client lease time Description Factory Default Specifies how many IP address can be assigned continuously None Setting Description Factory Default 1 10 days The lease time for which an IP address is assigned. The IP 10 (days) address may go expired after the lease time is reached. Packet Filters The AWK-4131A includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The AWK-4131As MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The AWK-4131A provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. 3-26 AirWorks AWK-4131A Web Console Configuration Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Factory Default Disable Description Factory Default Only the packets fitting the entities on list can be allowed. Drop Any packet fitting the entities on list will be denied. ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied IP Protocol Filter The AWK-4131As IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The AWK-4131A provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Factory Default Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. 3-27 AirWorks AWK-4131A Web Console Configuration TCP/UDP Port Filter The AWK-4131As TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The AWK-4131A provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger then the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables TCP/UDP port filter Disables TCP/UDP port filter Factory Default Disable Description Factory Default Only the packets fitting the entities on list can be allowed. Drop Any packet fitting the entities on list will be denied. ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied RSTP Settings (for WDS, Maste, or Slave mode only) AWK-4131A supports IEEE802.1D Spanning Tree Protocol and IEEE802.1w Rapid STP standards. In addition to eliminating unexpected path looping, STP/RSTP can provide a backup path recovery if a wired/ wireless path fails accidentally. The reliability and availability can increase because this fail-over function. AWK-4131As STP/RSTP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every AWK-4131A connected to your network. If AWK-4131A plays a Client role, which is connected to a device (PLC, RTU, etc.) as opposed to network switch equipment, it is not necessary to enable STP/RSTP. The reason is that it will cause unnecessary negotiation. AWK-4131As support STP/RSTP in AP mode (including WDS) only. The following figures indicate which Spanning Tree Protocol parameters can be configured. A more detailed explanation of each parameter is given below the figure. 3-28 AirWorks AWK-4131A Web Console Configuration RSTP status This field will appear only when selected to operate STP/RSTP. It indicates whether this AWK-4131A is the Root of the Spanning Tree (the root is determined automatically) or not. Bridge priority Setting Description Factory Default Numerical value You can increase the bridge priority by selecting a lower 32768 selected by user Hello time Setting number. A higher bridge priority brings a greater chance of being established as the root of the Spanning Tree topology. Description Factory Default Numerical value input The root of the Spanning Tree topology periodically sends out a 2 (seconds) by user hello message to other devices on the network to check if the
(1 10 seconds) topology is healthy. Hello time indicates how often the root sends hello messages. Forwarding delay Setting Description Factory Default Numerical value input The amount of time this device waits before checking to see if it 15 (seconds) by user should change to a different topology.
(4 30 seconds) Max. age Setting Description Factory Default Numerical value input As a non-root role, if the device has not received a hello 20 (seconds) by user message from the root longer than Max. age, it will reconfigure
(6 40 seconds) itself as a root. Once two or more devices on the network are recognized as a root, the devices will renegotiate to set up a new Spanning Tree topology. The AWK-4131A comes with 10 ports for RSTP settings. Numbers 3-10 (WDS1-WDS8) are available only when WDS is enabled in AP mode. Enable RSTP Setting Description Factory Default Enable/ disable Enables or disables the port as a node on the Spanning Tree Disable (unchecked) topology. Port priority Setting Description Factory Default Numerical value Increase this ports priority as a node on the Spanning Tree 128 selected by user topology by inputting a lower number. 3-29 AirWorks AWK-4131A Web Console Configuration Port cost Setting Description Factory Default Enable/ Disable Input a higher cost to indicate that this port is less suitable as a 2000000 node for the Spanning Tree topology Edge port Setting Description Factory Default Checked/ unchecked Sets a port, which no BPDU expectedly goes through, as an unchecked, except edge port AP port NOTE We recommend you set an edge port for the port, which is connected to a non-STP/RSTP sub-network or an end device (PLC, RTU, etc.) as opposed to network equipment. This can prevent unnecessary waiting and negotiation of STP/RSTP protocol, and accelerate system initialization. When an edge port receives BPDUs, it can still function as an STP/RSTP port and start negotiation. Setting an edge port is different from disabling STP/RSTP on a port. If you disable STP/RSTP, a port will not deal with STP/RSTP BPDUs at all. Port Status Port Status indicates the current Spanning Tree status of this port. Use Forwarding for normal transmission, or Blocking to block transmission. SNMP Agent The AWK-4131A supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The AWK-4131As MIB can be found in the software CD and supports reading the attributes via SNMP. (Only get method is supported.) This model also supports MXview network management software. In the AWK settings, please make sure that the SNMP settings match MXview's SNMP configuration settings. SNMP security modes and security levels supported by the AWK-4131A are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. 3-30 AirWorks AWK-4131A Web Console Configuration Protocol Setting on Authentication Data Method Version UI web page Type Encryption SNMP V1, V2c Community No Use a community string match for V1, V2c Read string authentication Community V1, V2c Community No Use a community string match for Write/Read string Community authentication SNMP V3 No-Auth No No Use account with admin or user to access MD5 or SHA Authentication No Provides authentication based on objects based on MD5 or HMAC-MD5, or HMAC-SHA algorithms. SHA 8-character passwords are the minimum requirement for authentication. MD5 or SHA Authentication Data Provides authentication based on HMAC-MD5 based on MD5 or encryption or HMAC-SHA algorithms, and data SHA key encryption key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below the following figure. Enable Setting Enable Disable Remote Management Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Factory Default Disable Description Factory Default Allow remote management via SNMP agent Disable Disallow remote management via SNMP agent 3-31 AirWorks AWK-4131A Web Console Configuration Read community (for V1, V2c) Setting Description Factory Default V1, V2c Read Use a community string match with a maximum of 31 public Community characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Write community (for V1, V2c) Setting Description Factory Default V1, V2c Read /Write Use a community string match with a maximum of 31 private Community characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. SNMP agent version Setting Description Factory Default V1, V2c, V3, or Select the SNMP protocol version used to manage the switch. V1, V2c V1, V2c, or V3 only Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Factory Default Use admin account to access objects. No authentication No Auth Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. SHA Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Private key Description No data encryption DES-based data encryption AES-based data encryption Factory Default Disable A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also know as OID. This is the AWK-4131As enterprise value. It is fixed. 3-32 AirWorks AWK-4131A Web Console Configuration Link Fault Pass-Through (for Client/Slave mode only) This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, AWK will try to connect to AP. If wireless is disconnected, AWK restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, AWK will try to recover the Ethernet link. System log will indicate the link fault pass through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Enables Link Fault Pass-Through Disable Link Fault Pass-Through Factory Default Disable Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the AWK-4131A supports different approaches to warn engineers automatically, such as SNMP trap, e-mail, and relay output. It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output. System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. 3-33 AirWorks AWK-4131A Web Console Configuration System-related events Event is triggered when System restart (warm start) The AWK-4131A is rebooted, such as when its settings are Network-related events Event is triggered when changed (IP address, subnet mask, etc.). LAN link on LAN link off Client joined/ left
(for AP/Master mode) WLAN connected to AP
(for Client/Slave mode) WLAN disconnected
(for Client/Slave mode) The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. The AWK-4131A is associated with an AP. The AWK-4131A is disassociated from an AP. Config-related events Event is triggered when Configuration Changed A configuration item has been changed. Configuration file import via Web Console The configuration file is imported to the AWK-4131A. Console authentication failure An incorrect password is entered. Firmware upgraded The AWK-4131As firmware is updated. Power events Event is triggered when Power 1/2 transition (On Off) The AWK-4131A is powered down in PWR1/2. PoE transition (On Off) The AWK-4131A is powered down in PoE. Power 1/2 transition (Off On) The AWK-4131A is powered via PWR1/2. PoE transition (Off On) The AWK-4131A is powered via PoE. DI events Event is triggered when DI1/2 transition (On Off) Digital Input 1/2 is triggered by on to off transition DI1/2 transition (Off On) Digital Input 1/2 is triggered by off to on transition Syslog This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detail information for the grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. 3-34 AirWorks AWK-4131A Web Console Configuration Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Syslog server 1/ 2/ 3 Setting IP address Syslog port Description Factory Default Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server None Setting Description Factory Default Port destination Enter the UDP port of the corresponding Syslog server 514
(1 to 65535) E-mail E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. 3-35 AirWorks AWK-4131A Web Console Configuration E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the AWK-4131A. The following parameters can be configured on the E-mail Server Settings page. Besides, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses are working. More detailed explanations for these parameters are provided after the following figure. Mail server (SMTP) Setting IP address Description The IP address of your email server. Factory Default None User name & Password Setting Description Factory Default User name and password used in the SMTP server None From e-mail address Setting Description Factory Default Max. 63 characters Enter the administrators e-mail address which will be shown in None the From field of a warning e-mail. To E-mail address 1/ 2/ 3/ 4 Setting Description Factory Default Max. 63 characters Enter the receivers e-mail addresses. None Relay The AWK-4131A has one relay output, which consists of 2 terminal block contacts on the AWK-4131As top panel. These relay contacts are used to indicate user-configured events and system failure. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the AWK-4131A is not powered. 3-36 AirWorks AWK-4131A Web Console Configuration Relay Event Types You can check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found in the System log Event Types table on page 3-31. Trap Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. Trap Event Types SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 3-37 AirWorks AWK-4131A Web Console Configuration 1st / 2nd Trap version Setting Description V1 V2 SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 1st / 2nd Trap server IP/name Setting Description Factory Default V1 Factory Default IP address or host Enter the IP address or name of the trap server used by your None name network. 1st / 2nd Trap community Setting Description Factory Default Max. 31 characters Use a community string match with a maximum of 31 Alert characters for authentication. Status Wireless Status The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Certain values for 802.11 info may not show up due to different operation modes. As a result, Current BSSID and Signal strength are not available in AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the AWK-4131A in Client mode. 3-38 AirWorks AWK-4131A Web Console Configuration Associated Client List (for AP mode only) Associated Client List shows all the clients that are currently associated with a specific AWK-4131A. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. DHCP Client List (for AP mode only) The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. You can press Select all button to select all content in the list for further editing. 3-39 AirWorks AWK-4131A Web Console Configuration System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. Relay Status The status of user-configurable events can be found under Relay Status. The status will refresh every 5 seconds if the Auto refresh box is checked. If an event is triggered, it will be noted on this list. System administrators can click Acknowledge Event when he has acknowledged the event and addressed it. 3-40 AirWorks AWK-4131A Web Console Configuration DI and Power Status The status of power inputs and digital inputs is shown on this web page. The status will refresh every 5 seconds if the Auto refresh box is checked. Maintenance Maintenance functions provide the administrator with tools to manage the AWK-4131A and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. 3-41 AirWorks AWK-4131A Web Console Configuration Firmware Upgrade The AWK-4131A can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. Before running a firmware upgrade, make sure the AWK-4131A is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the AWK-4131A will reboot itself. When upgrading your firmware, the AWK-4131As other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your AWK-4131A. Config Import Export You can back up or restore the AWK-4131As configuration with Config Import Export. In the Config Import section, click Browse to specify the configuration file and click Config Import button to begin importing the configuration. In the Config Export section, click the Config Export button and save the configuration file onto your local storage media. The configuration file is a text file and you can view and edit it with a general text-editing tool. 3-42 AirWorks AWK-4131A Web Console Configuration You can also back up or restore the ABC-01 (HW Rev. 1.1 support only) configuration with Config Import Export. To download the configuration to the AWK:
1. Turn off the AWK. 2. Plug in the ABC-01 to the AWKs RS-232 console. 3. Turn on AWK. 4. AWK will detect ABC-01 during bootup, and download the configuration from the ABC-01 to the AWK automatically. Once the configuration downloads and if configuration format is correct, the AWK will emit three short beeps, then continue the boot up. 5. Once the AWK has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. Load Factory Default Use this function to reset the AWK-4131A and roll all settings back to the factory default values. You can also reset the hardware by pressing the reset button on the top panel of the AWK-4131A. Password You can change the administration password for each of the AWK-4131As console managers by using the Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password root, and remember to change the administration password regularly. 3-43 AirWorks AWK-4131A Web Console Configuration Misc. Settings This section provides additional settings that can be used to manage your AWK-4131A more conveniently. Reset button Setting Description Factory Default Always enable The AWK-4131As Reset button works normally. Always enable Disable after 60 sec The AWK-4131As reset to default function will become invalid 60 seconds after the AWK-4131A finishes booting up. Save Configuration The following figure shows how the AWK-4131A stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the AWK-4131A is shutdown or rebooted unless they are y. Because the AWK-4131A starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the AWK-4131A. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. 3-44 AirWorks AWK-4131A Web Console Configuration Restart If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the AWK-4131A directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the AWK-4131A. If you run the Restart function without changing any configurations or with all changes already saved, you will see just one Restart button on your screen. You will not be able to run any of the AWK-4131As functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. 3-45 4 Software Installation/Configuration The following topics are covered in this chapter:
Overview AWK Search Utility Installing AWK Search Utility Configuring AWK Search Utility AirWorks AWK-4131A Software Installation/Configuration Overview The Documentation & Software CD included with your AWK-4131A is designed to make the installation and configuration procedure easy and straightforward. This auto-run CD includes AWK Search Utility (to broadcast search for all AWKs accessible over the network), the AWK-4131A Users Manual, and Quick Installation Guide. AWK Search Utility Installing AWK Search Utility 1. Click the INSTALL UTILITY button in the AWK Installation CD auto-run window to install AWK Search Utility. Once the program starts running, click Yes to proceed. 2. Click Next when the Welcome screen opens to proceed with the installation. 3. Click Next to install program files to the default directory, or click Browse to select an alternate location. 4-2 AirWorks AWK-4131A Software Installation/Configuration 4. Click Next to create the programs shortcut files to the default directory, or click Browse to select an alternate location. 5. Click Next to select additional tasks. 4-3 AirWorks AWK-4131A Software Installation/Configuration 6. Click Next to proceed with the installation. The installer then displays a summary of the installation options. 7. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 8. Click Finish to complete the installation of AWK Search Utility. Configuring AWK Search Utility The Broadcast Search function is used to locate all AWK-4131A APs that are connected to the same LAN as your computer. After locating an AWK-4131A, you will be able to change its IP address. Since the Broadcast Search function searches by TCP packet and not IP address, it doesnt matter if the AWK-4131A is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the AWK Search Utility program. When the Login page appears, select the Search AWK only option to search for AWKs and to view each AWKs configuration. Select the AWK management option to assign IPs, upgrade firmware, and locate devices. 4-4 AirWorks AWK-4131A Software Installation/Configuration 2. Open the AWK Search Utility and then click the Search icon. The Searching window indicates the progress of the search. 3. When the search is complete, all AWKs that were located will be displayed in the AWK Search Utility window. 4-5 AirWorks AWK-4131A Software Installation/Configuration 4. Click Locate to cause the selected device to beep. Make sure your AWK is unlocked before using the search utilitys icons setting. The AWK will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. Go to Tools AWK login Options to manage and unlock additional AWKs. Use the scroll down list to select the MAC addresses of those AWKs you would like to manage, and then click Add. Key in the password for the AWK device and then click OK to save. If you return to the search page and search for the AWK again, you will find that the AWK will unlock automatically. ATTENTION For security purposes, we suggest you can change the AWK search utility login password instead of using default. 4-6 AirWorks AWK-4131A Software Installation/Configuration To modify the configuration of the highlighted AWK, click on the Web icon to open the web console. This will take you to the web console, where you can make all configuration changes. Refer to Chapter 3, Using the Web Console, for information on how to use the web console. 4-7 AirWorks AWK-4131A Software Installation/Configuration Click on Telnet if you would like to use telnet to configure your AWKs. Click Assign IP to change the IP setting. The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
4-8 AirWorks AWK-4131A Software Installation/Configuration Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time lapsed between retries. Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. 4-9 AirWorks AWK-4131A Software Installation/Configuration Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the AWK search Utility. 4-10 5 Other Console Configurations This chapter explains how to access the AWK-4131A for the first time. In addition to HTTP access, there are four ways to access AWK-4131A: serial console, Telnet console, SSH console, and HTTPS console. The serial console connection method, which requires using a short serial cable to connect the AWK-4131A to a PCs COM port, can be used if you do not know the AWK-4131As IP address. The other consoles can be used to access the AWK-4131A over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
RS-232 Console Configuration (115200, None, 8, 1, VT100) Configuration by Telnet and SSH Consoles Configuration by Web Browser with HTTPS/SSL Disabling Telnet and Browser Access AirWorks AWK-4131A Other Console Configurations ATTENTION You CANNOT connect to the AWK-4131A by two ore more of these console configurations simultaneously. You can connect to the AWK-4131A simultaneously by web browser and serial/ Telnet /SSH console. However, we strongly suggest that you do NOT use more than one connection method at the same time. Following this advice will allow you to maintain better control over the configuration of your AWK-4131A. RS-232 Console Configuration (115200, None, 8, 1, VT100) The serial console connection method, which requires using a short serial cable to connect the AWK-4131A to a PCs COM port, can be used if you do not know the AWK-4131As IP address. It is also convenient to use serial console configurations when you cannot access the AWK-4131A over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. ATTENTION Do not use the RS-232 console manager when the AWK-4131A is powered at reversed voltage (ex. -48VDC), even though reverse voltage protection is supported. If you need to connect the RS-232 console at reverse voltage, Moxas TCC-82 isolator is your best solution. NOTE We recommend using Moxa PComm (Lite) Terminal Emulator, which can be downloaded free of charge from Moxas website. Before running PComm Terminal Emulator, use an RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the AWK-4131As RS-232 console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the RS-232 console utility. 1. From the Windows desktop, open the Start menu and start PComm Terminal Emulator in the PComm
(Lite) group. 2. Select Open under Port Manager to open a new connection. 5-2 AirWorks AWK-4131A Other Console Configurations 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. 4. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue. 5. The Console login screen will appear. Log into the RS-232 console with the login name (default: admin) and password (default: root, if no new password is set). 6. The AWK-4131As device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. NOTE To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the RS-232 cable or trigger DTR, you will automatically be logged out for network security. You will need to log in again to resume operation. 5-3 AirWorks AWK-4131A Other Console Configurations Configuration by Telnet and SSH Consoles You may use Telnet or SSH client to access the AWK-4131A and manage the console over a network. To access the AWK-4131As functions over the network from a PC host that is connected to the same LAN as the AWK-4131A, you need to make sure that the PC host and the AWK-4131A are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. NOTE The AWK-4131As default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, run Start Run, and then use Telnet to access the AWK-4131As IP address from the Windows Run window. (You may also issue the telnet command from the MS-DOS prompt.) When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the AWK-4131As IP address, specifying 22 for the SSH connection port. 2. The Console login screen will appear. Please refer to the previous paragraph RS-232 Console Configuration and for login and administration. Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the AWK-4131A supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the AWK-4131As web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<AWK-4131As IP address> in the address field. Press Enter to establish the connection.
\
5-4 AirWorks AWK-4131A Other Console Configurations 2. Warning messages will pop out to warn users that the security certificate was issued by a company they have not chosen to trust. 3. Select Yes to accept the certificate issued by Moxa IW and then enter the AWK-4131As web browser interface secured via HTTPS/SSL. (You can see the protocol in URL is https.) Then you can use the menu tree on the left side of the window to open the function pages to access each of the AWK-4131As functions. Disabling Telnet and Browser Access If you are connecting the AWK-4131A to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-5 6 References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you administer your AWK-4131As and plan your industrial wireless network better. The following topics are covered in this chapter:
Wireless Distribution System (WDS) Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP AirWorks AWK-4131A References Wireless Distribution System (WDS) Traditionally, APs are connected via Ethernet LAN ports. By using a Wireless Distribution System (WDS), APs can communicate with one another wirelessly. For example, AP 2 acts as an access point for the notebook computers or other IEEE802.11-enabled clients, and forwards packets sent from the notebook computers to AP 1 through WDS. Then, AP 1 forwards the packets to the Ethernet LAN. Packets destined for the notebook computers follow a reverse path from the Ethernet LAN through the APs to the notebook computers. In this way, AP 2 acts as an AP repeater. By using WDS, two or more LAN segments can be connected wirelessly. As illustrated in the above figure, a pair of wireless LAN-to-LAN bridges is used to connect two LAN segments. Since the AP is WDS-enabled, it can be used as a wireless bridge. It is a good idea to plan your wireless network by drawing a diagram so that you know how each AWK-4131A is connected to other peer APs or wireless bridges by WDS, and how bridges are connected to other peer bridges by WDS. See the following figure for an example of a network-planning diagram. 6-2 AirWorks AWK-4131A References ATTENTION Be sure to eliminate loops from networks that consist of wireless bridges, Ethernet switches, Ethernet links, and WDS links. If any loops exist, packets will circle around the loops and network performance will be seriously degraded. The following figure shows a network topology containing a loop. Beacon A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. 6-3 AirWorks AWK-4131A References Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports (AP and WDS1-WDS8) of the same AWK-4131A. This feature is particularly helpful when the AWK-4131A connects to older equipment, such as legacy switches. Differences between RSTP and STP RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. 6-4 7 Supporting Information This chapter presents additional information about this manual and product. You can also learn how to contact Moxa for technical support. The following topics are covered in this chapter:
About This Users Manual DoC (Declaration of Conformity) Federal Communication Commission Interference Statement R&TTE Compliance Statement Firmware Recovery Technical Support Contact Information AirWorks AWK-4131A Supporting Information About This Users Manual This manual is mainly designed for, but no limited to, the following hardware and firmware for the AWK-4131A:
Hardware Rev: 1.1 Firmware Ver: 1.10 You are strongly recommended to visit Moxas website (http://www.moxa.com) and find the latest product datasheet, firmware, QIG (Quick Installation Guide), UM (Users Manual) and related information. NOTE You can find out the hardware revision number of AWK-4131A on the side label. The firmware version number can be seen on the Overview page, as follow:
DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. 7-2 AirWorks AWK-4131A Supporting Information FCC Caution: To assure continued compliance, (example use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 cm between the radiator & your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE The availability of some specific channels and / or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. Antenna Gain and RF Radiated Power This radio transmitter FCCID: SLE-WAPN008, has been approved by FCC to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. Antenna List No. Manufacturer Part No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 KINSUN ANT-WDB-ANM-0502 MOXA ANT-WDB-ANM-0306 MOXA MAT-WDB-CA-RM-2-0205 MOXA MAT-WDB-DA-RM-2-0203-1m MOXA ANT-WDB-ARM-0202 MOXA ANT-WSB-AHRM-05-1.5m BK MOXA ANT-WDB-ARM-02 MOXA ANT-WDB-ANM-0502 MOXA ANT-WSB-ANF-09 MOXA ANT-WDB-ANF-0407 MOXA ANT-WDB-ANM-0407 MOXA ANT-WDB-ANF-0609 MOXA ANT-WDB-ANM-0609 MOXA ANT-WSB5-ANF-12 Antenna Type Dipole Omni Omni Omni Omni Omni Omni Omni Omni Omni Omni Omni Omni Omni Gain(2.4GHz) Gain(5GHz)
(dBi) 4.62 3.5 2 2 1.8 5 2 5 9 4 4 6 6
(dBi) 1.41 6 5 3 1.8 2 2 7 7 9 9 12 7-3 AirWorks AWK-4131A Supporting Information R&TTE Compliance Statement Moxa declares that the apparatus AWK-3121 complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. 7-4 AirWorks AWK-4131A Supporting Information Firmware Recovery When the LEDs of FAULT, Signal Strength, CLIENT, BRIDGE and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The AWK-4131A is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the AWK-4131As ES-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. Press Ctrl - C and the following message will appear. Enter 2 to change the network setting. Specify where the AWK-4131As firmware file on the TFTP server and press y to write the settings into flash memory. AWK-4131A restarts, and the Press Ctrl-C to enter Firmware Recovery Process message will reappear. Press Ctrl-C to enter the menu and select 1 to start the firmware upgrade process. Select 0 in the sub-menu to load the firmware image via LAN, and then enter the file name of the firmware to start the firmware recovery. 7-5 AirWorks AWK-4131A Supporting Information Technical Support Contact Information Customer satisfaction is our number one concern, and to ensure that customers receive the full benefit of our products, Moxa Internet Services has been set up to provide technical support, driver updates, product information, certification status, installation guide and users manual updates. The following services are provided:
E-mail for technical support:
support@moxa.com (Worldwide) support@usa.moxa.com (The Americas) World Wide Web (WWW) Site for product information:
http://www.moxa.com 7-6
various | WAPN008- UserMan AWK-3131A-M12-RCC 20180820 | Users Manual | 3.58 MiB |
AirWorks AWK-3131A-M12-RCC Users Manual Edition 1.0, August 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. AirWorks AWK-3131A-M12-RCC Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2018 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free: 1-888-669-2872 Tel:
Fax:
+1-714-528-6777
+1-714-528-6778 Moxa Europe Tel:
Fax:
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99 Moxa India Tel:
Fax:
+91-80-4172-9088
+91-80-4132-1045 Moxa China (Shanghai office) Toll-free: 800-820-5036 Tel:
Fax:
+86-21-5258-9955
+86-21-5258-5505 Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents 1. Introduction ...................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................ 1-2 Product Specifications ......................................................................................................................... 1-3 Functional Design ............................................................................................................................... 1-8 LAN Port .................................................................................................................................... 1-8 LED Indicators ............................................................................................................................ 1-9 Beeper ..................................................................................................................................... 1-10 Reset Button ............................................................................................................................. 1-10 Relay (Digital Output) ................................................................................................................ 1-11 2. Getting Started .................................................................................................................................. 2-1 First-Time Installation and Configuration ............................................................................................... 2-2 Communication Testing ....................................................................................................................... 2-3 Function Map ..................................................................................................................................... 2-5 3. Web Console Configuration ............................................................................................................... 3-1 Web Browser Configuration .................................................................................................................. 3-3 Overview ........................................................................................................................................... 3-4 Basic Settings .................................................................................................................................... 3-5 System Info Settings ................................................................................................................... 3-5 Network Settings ......................................................................................................................... 3-6 Time Settings ............................................................................................................................. 3-7 Wireless Settings ................................................................................................................................ 3-8 Operation Mode .................................................................................................................................. 3-9 Basic Wireless Settings ........................................................................................................................ 3-9 WLAN Security Settings .............................................................................................................. 3-13 Advanced Wireless Settings ........................................................................................................ 3-21 WLAN Certification Settings (For EAP-TLS in Client/Slave Mode Only) ............................................... 3-23 Extended Control Settings (AP Mode Only) ................................................................................... 3-24 Advanced Settings ............................................................................................................................ 3-25 Using Virtual LAN ...................................................................................................................... 3-26 Configuring Virtual LAN .............................................................................................................. 3-27 DHCP Server (For AP Mode Only)................................................................................................. 3-28 Packet Filters ............................................................................................................................ 3-29 RSTP Settings (for AP/Master/ACC mode only) .............................................................................. 3-31 SNMP Agent .............................................................................................................................. 3-33 Link Fault Pass-Through (for Client/Slave mode only) .................................................................... 3-35 Auto Warning Settings....................................................................................................................... 3-35 System Log .............................................................................................................................. 3-36 Syslog ..................................................................................................................................... 3-37 E-mail ...................................................................................................................................... 3-38 Relay ....................................................................................................................................... 3-39 Trap ........................................................................................................................................ 3-40 Status ............................................................................................................................................. 3-41 Wireless Status ......................................................................................................................... 3-41 Associated Client List (For AP/Master/ACC Mode Only) ................................................................... 3-42 AP Throughput .......................................................................................................................... 3-42 DHCP Client List (For AP Mode Only) ............................................................................................ 3-42 System Log .............................................................................................................................. 3-43 Relay Status ............................................................................................................................. 3-44 DI and Power Status .................................................................................................................. 3-44 RSTP Status .............................................................................................................................. 3-44 LAN Status ............................................................................................................................... 3-45 Maintenance .................................................................................................................................... 3-45 Console Settings ....................................................................................................................... 3-45 Ping ......................................................................................................................................... 3-45 Firmware Upgrade ..................................................................................................................... 3-46 Config Import Export ................................................................................................................. 3-46 Load Factory Default .................................................................................................................. 3-47 Username/Password .................................................................................................................. 3-47 Locate Device ........................................................................................................................... 3-48 Misc. Settings ........................................................................................................................... 3-48 Save Configuration ........................................................................................................................... 3-48 Restart ............................................................................................................................................ 3-49 Logout............................................................................................................................................. 3-50 4. Software Installation and Configuration ........................................................................................... 4-1 Overview ........................................................................................................................................... 4-2 AWK Search Utility .............................................................................................................................. 4-2 Installing AWK Search Utility ......................................................................................................... 4-2 Configuring AWK Search Utility ..................................................................................................... 4-5 5. Other Console Considerations ........................................................................................................... 5-1 RS-232 Console Configuration (115200, None, 8, 1, VT100)..................................................................... 5-2 Configuring Through Telnet and SSH Consoles ....................................................................................... 5-4 Configuring HTTPS/SSL Secure Access Through a Web Browser ................................................................ 5-5 Disabling Telnet and Browser Access ..................................................................................................... 5-6 A. References ........................................................................................................................................ A-1 Beacon ..............................................................................................................................................A-2 DTIM.................................................................................................................................................A-2 Fragment...........................................................................................................................................A-2 RTS Threshold ....................................................................................................................................A-2 STP and RSTP ....................................................................................................................................A-2 The STP/RSTP Concept ................................................................................................................A-2 Differences between RSTP and STP................................................................................................A-3 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery .............................................................................................................................B-2 DoC (Declaration of Conformity) ...........................................................................................................B-6 Federal Communication Commission Interference Statement ............................................................B-6 Antenna Gain and RF Radiated Power ............................................................................................B-6 R&TTE Compliance Statement .......................................................................................................B-8 1 Introduction The AWK-3131A-M12-RCC Series consists of 3-in-1 industrial AP/bridge/client devices designed specifically for rail carriage-to-carriage communication and can provide up to 300 Mbps with IEEE 802.11n technology. The new operation mode in the AWK-3131A-M12-RCC, Auto Carriage Connection (ACC), enables automatic wireless connections between two adjacent train carriages. The AWK-3131A-M12-RCC is rated to operate at temperatures ranging from -25 to 60C for standard models and -40 to 75C for wide-temperature models, and is rugged enough for any harsh industrial environment. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LAN Port LED Indicators Beeper Reset Button Relay (Digital Output) AWK-3131A-M12-RCC Introduction Overview The AWK-3131A-M12-RCC is 802.11n compliant to deliver speed, range, and reliability to support even the most bandwidth-intensive applications. The 802.11n standard incorporates multiple technologies, including Spatial Multiplexing MIMO (Multi-In, Multi-Out), 20 and 40 MHz channels, and dual bands (2.4 GHz and 5 GHz) to generate enough speeds, while still being able to communicate with legacy 802.11a/b/g devices. The AWK-3131A-M12-RCC is compliant with EN 50155, covering operating temperature, power input voltage, surge, ESD, and vibration. Installation of the AWK is easy using DIN-rail mounting or distribution boxes, and with its wide operating temperature range, IP30-rated housing with LED indicators, and DIN-rail mounting it is a convenient yet reliable solution for all types of industrial wireless applications. Package Checklist Before installing the AWK-3131A-M12-RCC, ensure that the package contains the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. 1 AWK-3131A-M12-RCC Cable holder with 1 screw 2 plastic RJ45 protective caps for console port DIN-rail kit Quick installation guide (printed) Warranty card NOTE Antennas are not included and should be purchased separately. Product Features Designed specifically for rail carriage-to-carriage communication Compliant with EN 50155 IEEE802.11a/b/g/n compliant Three-in-one design (AP/ACC/Client) Advanced wireless security 64-bit and 128-bit WEP/WPA/WPA2 SSID Hiding/IEEE 802.1X/RADIUS Packet access control & filtering STP/RSTP support for network system redundancy Long-distance transmission support Turbo Roaming enables rapid handover (Client mode) ABC-01 for configuration import/export RS-232 console management 2DI+1DO for on-site monitoring and alerts Wide -40 to 75C operating temperature range (-T model) Redundant 24 VDC power inputs or IEEE802.3af Power-over-Ethernet DIN-rail and wall mounting options IP30-rated protection and high-strength metal housing 1-2 AWK-3131A-M12-RCC Introduction Functional Design LAN Port The AWK-3131A-M12-RCC comes standard with 1 M12 Gigabit port. The LAN LED will light up when the LAN cable is inserted. ATTENTION Do not use the PoE Injector. Instead, use an IEEE 802.3af or IEEE 802.3at compliant PSE (Power Sourcing Equipment) for the PoE (Power over Ethernet) device. Patent http://www.moxa.com/doc/operations/Moxa_Patent_Marking.pdf ATTENTION The AWK-3131A-M12-RCC is NOT a portable mobile device and should be located at least 20 cm away from the human body. The AWK-3131A-M12-RCC is NOT designed for the general public. A well-trained technician should be enlisted to ensure safe deployment of AWK-3131A-M12-RCC units, and to establish a wireless network. 1-3 AWK-3131A-M12-RCC Introduction LED Indicators The LEDs on the front panel of the AWK-3131A-M12-RCC provide a quick and easy means of determining the current operational status and wireless settings. The FAULT LED indicates system failures and user-configured events. If the AWK-3131A-M12-RCC cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one second intervals. The SIGNAL LEDs indicate signal strength, and only operate in Client mode. The following table summarizes how to read the devices wireless settings from the LED displays. More information is available in Chapter 3 in the Basic Wireless Settings section. LED Color State Description PWR1 Green PWR2 Green PoE Amber FAULT Red STATE SIGNAL
(5 LEDs) Green/
Red Green CLIENT Green On Off On Off On Off On Blinking
(slowly at 1-sec intervals) Blinking
(fast at 0.5-sec intervals) Off Green Green Blinking at 1-sec intervals Power is being supplied from power input 1 Power is not being supplied from power input 1 Power is being supplied from power input 2 Power is not being supplied from power input 2 Power is being supplied via PoE Power is not being supplied via PoE System is booting or A system configuration error exists or A relay event has occurred Cannot get an IP address from the DHCP server IP address conflict Error condition does not exist System is ready The AWK has been located by the AWK Search Utility Red On Off On Off Booting error condition Signal level (for Client/Slave/ACC Slave mode only) WLAN is in Client/Slave mode or ACC Slave mode with connection established AP/Master/Sniffer/ACC Master mode or connection is NOT established in ACC Slave mode 1-4 AWK-3131A-M12-RCC Introduction LED Color State Description WLAN Amber WLAN is in AP/Master mode Amber On WLAN is in Client/Slave/ACC Master/ACC Slave mode with connection established Amber/Blinking Traffic in AP/Client/Master/Slave/ACC mode. WLAN is in Sniffer mode. Off WLAN is in Client/Slave/ACC Master/ACC Slave mode without a connection being established or WLAN is not working properly. Green LAN ports 10/100/1000 Mbps link is active. LAN Green Green/Blinking Data traffic at the LAN port. Green Off LAN port is disconnected. ATTENTION When the system fails to boot, the LEDs for STATE (Green), FAULT, and WLAN will all light up simultaneously and blink at one-second intervals. This may be due to improper operation or other issues, such as an unexpected shutdown while updating the firmware. To recover the firmware, refer to the Firmware Recovery section in Appendix B Supporting Information. Beeper The beeper emits two short beeps when the system is ready. Reset Button The RESET button is located on the top panel of the AWK-3131A-M12-RCC. You can reboot the AWK-3131A-M12-RCC or reset it to factory default settings by pressing the RESET button with a pointed object such as an unfolded paper clip. System reboot: Hold the RESET button down for under 5 seconds and then release it. Reset to factory default: Hold the RESET button down for over 5 seconds until the STATE LED starts blinking green. Release the button to reset the AWK-3131A-M12-RCC. 1-10 AWK-3131A-M12-RCC Introduction Relay (Digital Output) The AWK-3131A-M12-RCC has one relay output consisting of the 2 terminal block contacts on the top panel, as shown below. These relay contacts are used to forward system failures and user-configured events. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the AWK-3131A-M12-RCC is not powered up. Summary of the AWK-3131A-M12-RCCs Relay Status Power Status Event Relay Off On Yes No Open Open Short 1-11 2 Getting Started This chapter explains how to install Moxas AirWorks AWK-3131A-M12-RCC for the first time, and quickly set up your wireless network and test whether the connection is running well. The Function Map discussed in the third section provides a convenient means of determining which functions you need to use. The following topics are covered in this chapter:
First-Time Installation and Configuration Communication Testing Function Map AWK-3131A-M12-RCC Getting Started First-Time Installation and Configuration Before installing the AWK-3131A-M12-RCC, make sure that all items in the Package Checklist are in the box. You will need access to a notebook computer or PC equipped with an Ethernet port. The AWK-3131A-M12-RCC has a default IP address that must be used when connecting to the device for the first time. Step 1: Select the power source. The AWK-3131A-M12-RCC can be powered by a DC power input or PoE (Power over Ethernet). The AWK-3131A-M12-RCC will use whichever power source you choose. Step 2: Connect the AWK-3131A-M12-RCC to a notebook or PC. Since the AWK-3131A-M12-RCC supports MDI/MDI-X auto-sensing, you can use either a straight-through cable or crossover cable to connect the AWK-3131A-M12-RCC to a computer. The LED indicator on the AWK-3131A-M12-RCCs LAN port will light up when a connection is established. Step 3: Set up the computers IP address. Choose an IP address on the same subnet as the AWK-3131A-M12-RCC. Since the AWK-3131A-M12-RCCs default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, you should set the IP address of the computer to 192.168.127.xxx. NOTE After you select Maintenance Load Factory Default and click the Submit button, the AWK-3131A-M12-RCC will be reset to factory default settings and the IP address will be reset to 192.168.127.253. Step 4: Use the web-based manager to configure the AWK-3131A-M12-RCC Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based Network Manager. Before the homepage opens, you will need to enter the user name and password as shown in the following figure. For first-time configuration, enter the default user name and password and then click on the Login button:
NOTE Default user name and password:
User Name:
admin Password:
moxa For security reasons, we strongly recommend changing the default password. To do so, select Maintenance Password, and then follow the on-screen instructions to change the password. 2-2 AWK-3131A-M12-RCC Getting Started NOTE After you click Submit to apply changes the web page will refresh (Updated) will appear on the page and a blinking reminder will be shown on the upper-right corner of the web page:
To activate the changes click Restart and then Save and Restart after you change the settings. About 30 seconds are needed for the AWK-3131A-M12-RCC to complete the reboot procedure. Step 5: Select the AWK-3131A-M12-RCC operation mode. By default, the AWK-3131A-M12-RCCs operation mode is set to AP. You can change to Client mode in Wireless Settings Operation Mode. Detailed information about configuring the AWK-3131A-M12-RCCs operation can be found in Chapter 3. Step 6: Test communications. In the following sections we describe two test methods that can be used to ensure that a network connection has been established. Communication Testing After installing the AWK-3131A-M12-RCC you can run a sample test to make sure the AWK-3131A-M12-RCC and wireless connection are functioning normally. Two testing methods are described below. Use the first method if you are using only one AWK-3131A-M12-RCC device, and use the second method if you are using two or more AWK-3131A-M12-RCC units. How to Test One AWK-3131A-M12-RCC If you are only using one AWK-3131A-M12-RCC, you will need a second notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the AWK-3131A-M12-RCC (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (Notebook B) so that it is on the same subnet as the first notebook (Notebook A), which is connected to the AWK-3131A-M12-RCC. After configuring the WLAN card, establish a wireless connection with the AWK-3131A-M12-RCC and open the Windows Command Prompt on Notebook B. At the prompt, type ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 3-2 AWK-3131A-M12-RCC Getting Started How to Test Two or More AWK-3131A-M12-RCC Units If you have two or more AWK-3131A-M12-RCC units, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the first AWK-3131A-M12-RCC connected to notebook A and change the second or third AWK-3131A-M12-RCC connected to notebook B to Client mode, and then configure the notebooks and AWK-3131A-M12-RCC units properly. After setting up the testing environment, open the Windows Command Prompt on notebook B. At the prompt, type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 4-2 AWK-3131A-M12-RCC Getting Started Function Map 5-2 Web Console Configuration 3 In this chapter, we explain all aspects of web-based console configuration. Moxas easy-to-use management functions help you set up your AWK-3131A-M12-RCC and make it easy to establish and maintain your wireless network. The following topics are covered in this chapter:
Web Browser Configuration Overview Basic Settings System Info Settings Network Settings Time Settings Wireless Settings Operation Mode Basic Wireless Settings WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (For EAP-TLS in Client/Slave Mode Only) Extended Control Settings (AP Mode Only) Advanced Settings Using Virtual LAN Configuring Virtual LAN DHCP Server (For AP Mode Only) Packet Filters RSTP Settings (for AP/Master/ACC mode only) SNMP Agent Link Fault Pass-Through (for Client/Slave mode only) Auto Warning Settings System Log Syslog E-mail Relay Trap Status Wireless Status Associated Client List (For AP/Master/ACC Mode Only) AP Throughput DHCP Client List (For AP Mode Only) System Log Relay Status AWK-3131A-M12-RCC Web Console Configuration DI and Power Status RSTP Status LAN Status Maintenance Console Settings Ping Firmware Upgrade Config Import Export Load Factory Default Username/Password Locate Device Misc. Settings Save Configuration Restart Logout 3-2 AWK-3131A-M12-RCC Web Console Configuration Web Browser Configuration Moxa AWK-3131A-M12-RCCs web browser interface provides a convenient way to modify its configuration and access the built-in monitoring and network administration functions. NOTE To use the AWK-3131A-M12-RCCs management and monitoring functions from a PC host connected to the same LAN as the AWK-3131A-M12-RCC, you must make sure that the PC host and the AWK-3131A-M12-RCC are on the same logical subnet. Similarly, if the AWK-3131A-M12-RCC is configured for other VLAN settings, you must make sure your PC host is on the management VLAN. The Moxa AWK-3131A-M12-RCCs default IP is 192.168.127.253. Follow these steps to access the AWK-3131A-M12-RCCs web-based console management interface. 1. Open your web browser (e.g., Internet Explorer) and type the AWK-3131A-M12-RCCs IP address in the address field. Press Enter to establish the connection. 2. The Web Console Login page will open. Enter the password (default Username = admin; default Password
= moxa) and then click Login to continue. 3. You may need to wait a few moments for the web page to download to your computer. Note that the Model name and IP address of your AWK-3131A-M12-RCC are both shown in the title bar of the web page. This information can be used to help you identify multiple AWK-3131A-M12-RCC units. 3-3 AWK-3131A-M12-RCC Web Console Configuration 4. Use the menu tree on the left side of the window to open the function pages to access each of the AWK-3131A-M12-RCCs functions. In the following paragraphs, we describe each AWK-3131A-M12-RCC management function in detail. A quick overview is available in this manual in the Function Map section of Chapter 2. NOTE The model name of the AWK-3131A-M12-RCC is shown as AWK-3131A-M12-RCC-XX, where XX indicates the country code. The country code indicates the AWK-3131A-M12-RCC version and which bandwidth it uses. We use AWK-3131A-M12-RCC-US as an example in the following figures. (The country code and model name that appears on your computer screen may be different than the one shown here.) Overview The Overview page summarizes the AWK-3131A-M12-RCCs current status. The information is categorized into several groups: System info, Device info, and 802.11 info. 3-4 AWK-3131A-M12-RCC Web Console Configuration Click on SSID for more detailed 802.11 information, as shown in the following figure. NOTE The 802.11 info that is displayed may be different for different operation modes. For example, Current BSSID is not available in Client mode, and Signal strength is not available in AP mode. Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the AWK-3131A-M12-RCC. System Info Settings The System Info items, especially Device name and Device description, are displayed and included on the Overview page, in SNMP information, and in alarm emails. Setting System Info items makes it easier to identify the different AWK-3131A-M12-RCC units connected to your network. Device name Setting Description Factory Default Max. 31 of characters This option is useful for specifying the role or application of AWK-3131A-M12-R different AWK-3131A-M12-RCC units. 3-5 CC_<Last 3 bytes of this AWK-3131A-M12-R CC>
AWK-3131A-M12-RCC Web Console Configuration Device location Setting Description Factory Default Max. of 31 characters Specifies the location of different AWK-3131A-M12-RCC units. None Device description Setting Description Factory Default Max. of 31 characters Use this space to record a more detailed description of the None AWK-3131A-M12-RCC Device contact information Setting Description Factory Default Max. of 31 characters Provides information about whom to contact in order to resolve None problems. Use this space to record contact information of the person responsible for maintaining this AWK-3131A-M12-RCC. Network Settings The Network Settings configuration panel allows you to modify the usual TCP/IP network parameters. An explanation of each configuration item is given below. IP configuration Setting DHCP Description Factory Default The AWK-3131A-M12-RCCs IP address will be assigned Static automatically by the networks DHCP server Static Set up the AWK-3131A-M12-RCCs IP address manually. IP address Setting Description Factory Default AWK-3131A-M12-RCCs Identifies the AWK-3131A-M12-RCC on a TCP/IP network. 192.168.127.253 IP address NOTE DO NOT set the local subnet IP or the broadcast IP as the AWK-3131A-M12-RCC's IP address. For example, 192.168.127.0 and 192.168.127.255 cannot be assigned to the AWK-3131A-M12-RCC if the subnet mask is set to 255.255.255.0. Subnet mask Setting Description AWK-3131A-M12-RCCs Identifies the type of network to which the subnet mask AWK-3131A-M12-RCC is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Factory Default 255.255.255.0 3-6 AWK-3131A-M12-RCC Web Console Configuration Gateway Setting Description Factory Default AWK-3131A-M12-RCCs The IP address of the router that connects the LAN to an None default gateway outside network. Primary/ Secondary DNS server Setting Description Factory Default IP address of the The IP address of the DNS Server used by your network. After None Primary/Secondary entering the DNS Servers IP address, you can input the DNS server AWK-3131A-M12-RCCs URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Time Settings The AWK-3131A-M12-RCC has a time calibration function based on information from an NTP server or user specified Date and Time information. Functions such as Auto warning can add real-time information to the message. The Current local time shows the AWK-3131A-M12-RCCs system time when you open this web page. You can click on the Set Time button to activate the updated date and time parameters. An (Updated) string will appear to indicate that the change is complete. Local time settings will be immediately activated in the system without running Save and Restart. NOTE The AWK-3131A-M12-RCC has a built-in real time clock (RTC). It is strongly recommended that users update the Local time for the AWK-3131A-M12-RCC after the initial setup or a long-term shutdown, especially when the network does not have an Internet connection for accessing the NTP server or there is no NTP server on the LAN. Current local time Setting Description Factory Default User adjustable time The date and time parameters allow configuration of the local None time, with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss 3-7 AWK-3131A-M12-RCC Web Console Configuration Time zone Setting Description Factory Default User selectable time The time zone setting allows conversion from GMT (Greenwich GMT (Greenwich zone Mean Time) to local time. Mean Time) ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Description Factory Default Enable/ Disable Daylight saving time (also known as DST or summer time) Disable involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. When Daylight saving time is enabled, the following parameters will be shown:
Starts at: The date that daylight saving time begins. Stops at: The date that daylight saving time ends. Time offset: Indicates how many hours forward the clock should be advanced. Time server 1/2 Setting Description Factory Default IP/Name of Time IP or Domain name of the NTP time server. The 2nd NTP server Time.nist.gov Server will be used if the 1st NTP server fails to connect. Query period Setting Description Factory Default Query period time This parameter determines how often the time is updated from 600 (seconds)
(1 to 9999 seconds) the NTP server. Wireless Settings The essential settings for wireless networks are presented in this function group. Settings must be properly set before establishing your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP: In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Client: When the AWK-3131A-M12-RCC is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adaptor. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. 3-8 AWK-3131A-M12-RCC Web Console Configuration Operation Mode The AWK-3131A-M12-RCC supports five main operation modesAP, Client, Master, Slave, and ACCeach of which plays a distinct role on the wireless network. Wireless Enable Setting Description Factory Default Enable/Disable The RF (Radio Frequency) module can be manually turned on or Enable off. This function is available in AP operation mode only. Operation Mode Setting AP Client Master Description Factory Default The AWK-3131A-M12-RCC plays the role of wireless AP AP The AWK-3131A-M12-RCC plays the role of wireless AP Client This mode collocates with AWK-5232/6232s Wireless bridge mode. The AWK-3131A-M12-RCC plays the role of wireless Master. Slave This mode collocates with AWK-5232/6232s Wireless bridge mode. The AWK-3131A-M12-RCC plays the role of wireless Slave. ACC This mode collocates with another AWK-3131A-M12-RCCs ACC mode to form an ACC link. Both AWK-3131A-M12-RCCs must have the same basic wireless settings and security settings. Sniffer Turns the device into a remote Wireshark interface to capture 802.11 packets for analysis. Basic Wireless Settings The WLAN Basic Setting Selection panel is used to add and edit SSIDs. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. You can configure your AWK to use up to 9 SSIDs, and configure each SSID differently. All of the SSIDs are active at the same time; that is, client devices can use any of the SSIDs to associate with the access point. Click on Add SSID to create more SSIDs. 3-9 AWK-3131A-M12-RCC Web Console Configuration Click on Edit to assign different configuration settings to each SSID. The configuration panel appears as follows:
NOTE When you switch to Client mode, a Site Survey button will be available on the Basic Wireless Settings panel. Click the Site Survey button to view information about available APs, as shown in the following figure. You can click on the SSID of an entity and bring the value of its SSID onto the SSID field of the Basic Wireless Settings page. Click the Refresh button to re-scan and update the table. If this client is connecting to an AP, a brief disconnection will occur during site survey. 3-10 AWK-3131A-M12-RCC Web Console Configuration RF type Setting 2.4 GHz B G Description Factory Default Only supports the IEEE 802.11b standard B/G/N Mixed Only supports the IEEE 802.11g standard B/G Mixed Supports IEEE 802.11b/g standards, but 802.11g may operate at a slower speed if when 802.11b clients are on the network G/N Mixed Supports IEEE 802.11g/n standards, but 802.11n may operate at a slower speed if 802.11g clients are on the network B/G/N Mixed Supports IEEE 802.11b/g/n standards, but 802.11g/n may operate at a slower speed if 802.11b clients are on the network N Only (2.4GHz) Only supports the 2.4 GHz IEEE 802.11n standard 5 GHz A Only supports the IEEE 802.11a standard A/N Mixed Supports IEEE 802.11a/n standards, but 802.11n may operate N Only (5GHz) Only supports the 5 GHz IEEE 802.11n standard at a slower speed if 802.11a clients are on the network Channel Width (for any 11N RF type only) Setting 20 MHz Description Factory Default Select your channel width, If you are not sure which option to 20 MHz 20/40 MHz use, select 20/ 40MHz (Auto) Channel bonding If 20/40 MHz only is the Channel Width setting, this channel bonding will auto set the channel based on your channel setting. Channel (for AP/Master/ACC mode only) Setting Description Factory Default Available channels vary The AWK-3131A-M12-RCC plays the role of wireless AP, 6 (in B/G/N Mixed with RF type Master, or ACC. mode) SSID Setting Description Factory Default Max. of 31 characters The SSID of a client and the SSID of the AP must be identical for MOXA the client and AP to be able to communicate with each other. SSID broadcast (for AP/Master/ACC mode only) Setting Description Enable/ Disable SSID can be broadcast or not Management frame encryption Setting Description Factory Default Enable Factory Default Enable/ Disable Enables management frame encryption to protect your wireless Disable network from DoS attacks. This function only works with Moxa's Wireless device such as TAP, AWK-RCC, and RTG series devices. NOTE Product models such as the AWK-3131A-M12-RCC-EU Series use EU bands that are under ETSI regulation. Users must disable the SSID broadcast setting in these models when they use 5 GHz channels 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, and 140. Client Isolation (for AP mode only) Client isolation is used to isolate the associated wireless clients connected to one or more APs. Isolated clients cannot communicate with each other, so the level of security is increased. Depending on the type of client 3-11 AWK-3131A-M12-RCC Web Console Configuration isolation used, you can specify exceptions (for clients) within the isolation network. This function can be, for example, used in the case of an enterprise server service. Client Isolation Setting Description No isolation No isolation is applied. Factory Default No isolation Isolated within the All clients associated to this AP will be isolated from each other. same AP Isolated within the All clients in the specified subnet will be isolated from each same subnet other. The subnet is defined by the following two parameters, gateway and netmask. Subnet type Setting Description Factory Default Static/DHCP This setting can be used to specify the subnet type when the Static Isolated within the same subnet option is selected. For applications that use a fixed IP address use the Static value. For example, maintenance of hand held devices or tablets that already have a fixed IP in the same subnet as the AP. If your application requires wireless clients to retrieve new IP addresses from the onboard DHCP server (or from the build-in DHCP server) each time the clients connect to an AP, select the DHCP option. Gateway Setting Description Factory Default Gateway for client This setting can be used when the Isolated within the same None isolation function subnet option is selected. The gateway setting along with the netmask is used to define the network in which wireless clients will be isolated from each other. If the Subnet Type is set to Static, this setting must be applied. If the Subnet Type is set to DHCP, this field can be left blank and the gateway address will be assigned by the DHCP server. 3-12 AWK-3131A-M12-RCC Web Console Configuration Netmask Setting Description Factory Default Netmask for client This setting can be used when the Isolated within the same None isolation function subnet option is selected. If the Subnet Type is set to Static, this setting must be applied. If the Subnet Type is set to DHCP, this field can be left blank and the gateway address will be assigned by the DHCP server. The Allowed subnet with TCP/UDP port setting is used to specify the exceptions (subnets or hosts) when the Isolated within the same subnet option is selected. Up to eight subnets or hosts can be included in the list. Active Setting Description Factory Default Enable/Disable This checkbox enables or disables the rule for allowed subnet Disable settings. IP Setting Description Factory Default IP address for allowed The IP address of the subnet definition. Hosts in this subnet can None subnet definition be accessed by other hosts or wireless clients in the same subnet. Netmask Setting Description Factory Default Netmask for allowed The netmask of the subnet definition. Hosts in this subnet can None subnet definition be accessed by other hosts or wireless clients in the same subnet. You can also define the exception host by entering 255.255.255.255 in this field. Protocol Setting Description Factory Default Protocol for allowed The protocol of the subnet definition. Hosts in this subnet can All subnet definition be accessed by other hosts or wireless clients in the same subnet. Port Setting Description Factory Default Port for allowed subnet The port range of the subnet definition. Hosts in this subnet can None definition be accessed by other hosts or wireless clients in the same subnet. WLAN Security Settings The AWK-3131A-M12-RCC provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the AWK-3131A-M12-RCC by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE802.1X. The AWK-3131A-M12-RCC can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. 3-13 AWK-3131A-M12-RCC Web Console Configuration Security mode Setting Open WEP WPA*
WPA2*
Open Description No authentication Static WEP is used WPA is used Fully supports IEEE802.11i with TKIP/AES + 802.1X Factory Default Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP According to the IEEE802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared (or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The AWK-3131A-M12-RCC provides 4 entities of WEP key settings that can be selected to use with Key index. The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit
(or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Setting Open Shared Description Factory Default Data encryption is enabled, but without authentication Open Data encryption and authentication are both enabled. 3-14 AWK-3131A-M12-RCC Web Console Configuration Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Description Factory Default Specifies WEP keys in hex-decimal number form HEX Specifies WEP keys in ASCII form Description Factory Default Uses 40-bit secret keys with 24-bit initialization vector 64 bits Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used Factory Default Open Setting Description Factory Default ASCII type:
A string that can be used as a WEP seed for the RC4 encryption None 64 bits: 5 chars engine. 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The AWK-3131A-M12-RCC also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. WPA type Setting Personal Enterprise Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 3-15 AWK-3131A-M12-RCC Web Console Configuration Encryption method Setting TKIP*
AES Mixed**
Description Factory Default Temporal Key Integrity Protocol is enabled AES Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used.
*This option is only available with 802.11a/b/g standard
**This option is only available for legacy mode in APs and does not support AES-enabled clients. Passphrase Setting Description Factory Default 8 to 63 characters Master key to generate keys for encryption and decryption None Key renewal (for AP/Master mode only) Setting Description 60 to 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 day) Factory Default 3600 (seconds) NOTE The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. WPA/WPA2-Enterprise (for AP/Master mode) By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or passphrases. WPA type Setting Personal Enterprise Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 3-16 AWK-3131A-M12-RCC Web Console Configuration Encryption method Setting TKIP*
AES Mixed**
Description Factory Default Temporal Key Integrity Protocol is enabled AES Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used.
*This option is only available with 802.11a/b/g standard
**This option is available only for legacy mode in APs and does not support AES-enabled clients. Primary/Secondary RADIUS server IP Setting Description Factory Default The IP address of Specifies the delegated RADIUS server for EAP None RADIUS server Primary/Secondary RADIUS port Setting Description Factory Default Port number Specifies the port number of the delegated RADIUS server 1812 Primary/ Secondary RADIUS shared key Setting Description Factory Default Max. of 31 characters The secret key shared between AP and RADIUS server None Key renewal Setting Description 60 to 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 year) WPA/WPA2-Enterprise (for Client/Slave mode) Factory Default 3600 (seconds) When used as a client, the AWK-3131A-M12-RCC can support three EAP methods (or EAP protocols):
EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP AES Description Factory Default Temporal Key Integrity Protocol is enabled AES Advance Encryption System is enabled 3-17 AWK-3131A-M12-RCC Web Console Configuration EAP Protocol Setting Description Factory Default TLS TTLS PEAP Specifies Transport Layer Security protocol TLS Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections. EAP-TLS TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use Basic Wireless Settings WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel (EAP-TLS for example), and validate whether the network is trustworthy with digital certificates on the authentication server. This step establishes a tunnel that protects the next step (or inner authentication), and consequently is sometimes referred to as outer authentication. The TLS tunnel is then used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. 3-18 AWK-3131A-M12-RCC Web Console Configuration The AWK-3131A-M12-RCC provides some non-cryptographic EAP methods, including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS and PEAP. Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, with the true user name only shown through the encrypted channel. Keep in mind that not all client software supports anonymous alteration. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. TTL Inner Authentication Setting PAP CHAP MS-CHAP Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used MS-CHAP-V2 Microsoft CHAP version 2 is used Anonymous Factory Default MS-CHAP-V2 Setting Description Factory Default Max. of 31 characters A distinct name used for outer authentication None User name & Password Setting Description Factory Default User name and password used in inner authentication None 3-19 AWK-3131A-M12-RCC Web Console Configuration PEAP There are a few differences in the TTLS and PEAP inner authentication procedures. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The AWK-3131A-M12-RCC provides MS-CHAP-V2 merely as an EAP method for inner authentication. Inner EAP protocol Setting Description MS-CHAP-V2 Microsoft CHAP version 2 is used Anonymous Factory Default MS-CHAP-V2 Setting Description Factory Default Max. of 31 characters A distinct name used for outer authentication None User name & Password Setting Description Factory Default User name and password used in inner authentication None 3-20 AWK-3131A-M12-RCC Web Console Configuration Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate Setting Auto Description Factory Default The AWK-3131A-M12-RCC senses and adjusts the data rate Auto automatically Available rates Users can manually select a target transmission data rate Multicast Rate (for AP/Master/ACC mode only) Setting Description Factory Default Multicast rate You can set a fixed multicast rate for the transmission of 6M
(6M ~ 54M) broadcast and multicast packets on a per-radio basis. This parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configured rate. Guarding Interval Setting Description Factory Default Guarding Interval Guarding interval is used to ensure that distinct transmissions 800 ns. do not interfere with one another. You can select the guarding interval manually for Wireless-N connections. The two options are Short (400ns) and Long (800ns). Maximum transmission Power Setting Description Factory Default Transmission Power Specifies transmission power for the radio in the unit of dBm. 12 dBm 3-21 AWK-3131A-M12-RCC Web Console Configuration Beacon Interval (for AP/Master/ACC mode only) Setting Description Factory Default Beacon Interval Indicates the frequency interval of the beacon 100 (ms)
(40 to 1000 ms) DTIM Interval (for AP/Master/ACC mode only) Setting Description Factory Default Data Beacon Rate Indicates how often the AWK-3131A-M12-RCC sends out a 1
(1 to 15) Delivery Traffic Indication Message Fragmentation threshold Setting Description Factory Default Fragment Length Specifies the maximum size a data packet before splitting and 2346
(256 to 2346) creating another new packet RTS threshold Setting Description Factory Default RTS/CTS Threshold Determines how large a packet can be before the Access Point 2346
(256 to 2346) coordinates transmission and reception to ensure efficient communication NOTE Most countries define a limit for the Equivalent Isotropically Radiated Power (EIRP) for an RF transmitting system. The EIRP should not exceed the permitted limit for the country of operation. EIRP = transmission power + antenna gain (dBi). NOTE Transmission power indicates the maximum value of transmission power which the user plans. However, the real transmitted power depends on the radio module and some facts, such as country, regulatory limitations and data rate. Please check the Transmission power in Status > Wireless Status for a real and updated value of transmission power, which the AWK is currently using. You can refer to the related glossaries in the reference section for detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. Antenna Setting A/B/Both WMM Setting Description Factory Default Specifies the output antenna port. Setting Antenna to Both Both allows 2x2 MIMO communication under 802.11n and 2T2R communication in legacy 802.11a/b/g modes. Description Factory Default Enable/Disable WMM is a QoS standard for WLAN traffic. Voice and video data Disable will be given priority bandwidth when enabled with WMM supported wireless clients. ACC Connection Threshold Setting Description Factory Default ACC Connection If the signal strength of an AWK-3131A-M12-RCC can be above
-60dBm Threshold this value for the period of time specified in the ACC Connection Time field, this AWK-3131A-M12-RCC will be considered as a connecting candidate. 3-22 AWK-3131A-M12-RCC Web Console Configuration ACC Disconnection Threshold Setting Description Factory Default ACC Disconnection If the signal strength of the AWK-3131A-M12-RCC is below this
-60dBm Threshold threshold value for the period of time specified in the ACC Disconnection Time field, the ACC link will be brought down. ACC Connection Time Setting Description Factory Default ACC Connection This is the period of time for an AWK-3131A-M12-RCC to be 60 seconds Time considered as a connecting candidate. ACC Disconnection Time Setting Description Factory Default ACC Disconnection This is the period of time for an ACC link to be considered as a 60 seconds Time poor connection. The ACC link will be brought down after the specified time period. WLAN Certification Settings (For EAP-TLS in Client/Slave Mode Only) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The AWK-3131A-M12-RCC can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current Status displays information for the current WLAN certificate, which has been imported into the AWK-3131A-M12-RCC. Nothing will be shown if a certificate is not available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired You can import a new WLAN certificate in Import WLAN Certificate by following these steps, in order:
1. Input the corresponding password (or key) in the Certificate private password field and then click Submit to set the password. 2. The password will be displayed in the Certificate private password field. Click on the Browse button in Select certificate/key file and select the certificate file. 3-23 AWK-3131A-M12-RCC Web Console Configuration 3. Click Upload Certificate File to import the certificate file. If the import succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. NOTE The WLAN certificate will remain after the AWK-3131A-M12-RCC reboots. Even though it is expired, it can still be seen on the Current Certificate. Extended Control Settings (AP Mode Only) Use this function to quickly switch to your favorite profiles recorded in the device. The function allows you to easily demo or change the settings in your device. In the following example, we demonstrate how to quickly change from the 2.4G band to the 5G band. Extended Control Setting (AP mode only) Setting Description Factory Default Enable/Disable Enable the function to quickly switch to your favorite profile. Disable 3-24 AWK-3131A-M12-RCC Web Console Configuration Favorite Profile Setting Profile 1/
Profile 2 Description Factory Default Choose your favorite profile to quickly switch RF type, channel, No Extended Control transmission power, beacon interval, and beacon broadcast status. Advanced Settings Several advanced functions are available to increase the functionality of your AWK-3131A-M12-RCC and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer 2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the AWK-3131A-M12-RCC can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. 3-25 AWK-3131A-M12-RCC Web Console Configuration Using Virtual LAN Setting up Virtual LANs (VLANs) on your AWK series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Improve network performance and reduce latency Increase security Secure network restricts members to resources on their own VLAN Clients roam without compromising security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. 3-26 AWK-3131A-M12-RCC Web Console Configuration Configuring Virtual LAN VLAN Settings To configure the AWKs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Port Type LAN WLAN Port PVID Setting Description Factory Default Set the management VLAN of this AWK. 1 Description This port is the LAN port on the AWK. Trunk Port Yes This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Description Factory Default VLAN ID ranging from 1 Set the ports VLAN ID for devices that connect to the port. The 1 to 4094 port can be a LAN port or WLAN ports. VLAN Tagged Setting Description Factory Default A comma-separated list Specify which VLANs can communicate with this specific VLAN. (Empty) of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. NOTE The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. 3-27 AWK-3131A-M12-RCC Web Console Configuration DHCP Server (For AP Mode Only) DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The AWK-3131A-M12-RCC can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The AWK-3131A-M12-RCC provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server Setting Enable Disable Default gateway Description Factory Default Enables AWK-3131A-M12-RCC as a DHCP server Disable Disable DHCP server function Setting Description Factory Default IP address of a default The IP address of the router that connects to an outside None gateway network Subnet mask Setting Description Factory Default subnet mask Identifies the type of sub-network (e.g., 255.255.0.0 for a None Class B network, or 255.255.255.0 for a Class C network) Primary/ Secondary DNS server Setting Description Factory Default IP address of Primary/
The IP address of the DNS Server used by your network. After None Secondary DNS server entering the DNS Servers IP address, you can use URL as well. The Secondary DNS server will be used if the Primary DNS server fails to connect. 3-28 AWK-3131A-M12-RCC Web Console Configuration Start IP address Setting IP address Description Factory Default Indicates the IP address which AWK-3131A-M12-RCC can start None assigning Maximum number of users Setting 1 253 Client lease time Description Factory Default Specifies how many IP address can be assigned continuously None Setting Description Factory Default 5 1440 minutes The lease time for which an IP address is assigned. The IP 5 (minutes) address may go expired after the lease time is reached. Packet Filters The AWK-3131A-M12-RCC includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The AWK-3131A-M12-RCCs MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The AWK-3131A-M12-RCC provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Factory Default Disable Description Factory Default Only the packets fitting the entities on list can be allowed. Accept Any packet fitting the entities on list will be denied. ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied 3-29 AWK-3131A-M12-RCC Web Console Configuration IP Protocol Filter The AWK-3131A-M12-RCCs IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The AWK-3131A-M12-RCC provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Factory Default Only the packets fitting the entities on the list can be allowed Accept Any packet fitting the entities on the list will be denied ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. TCP/UDP Port Filter The AWK-3131A-M12-RCCs TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The AWK-3131A-M12-RCC provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger than the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Description Enables TCP/UDP port filter Disables TCP/UDP port filter Factory Default Disable 3-30 AWK-3131A-M12-RCC Web Console Configuration Policy Setting Accept Drop ATTENTION Description Factory Default Only the packets fitting the entities on list can be allowed. Accept Any packet fitting the entities on list will be denied. Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied RSTP Settings (for AP/Master/ACC mode only) AWK-3131A-M12-RCC supports IEEE802.1D Spanning Tree Protocol and IEEE802.1w Rapid STP standards. In addition to eliminating unexpected path looping, STP/RSTP can provide a backup path recovery if a wired/
wireless path fails accidentally. The reliability and availability can increase because this fail-over function. AWK-3131A-M12-RCCs STP/RSTP feature is disabled by default. To be completely effective, you must enable RSTP/STP on every AWK-3131A-M12-RCC connected to your network. If AWK-3131A-M12-RCC plays a Client role, which is connected to a device (PLC, RTU, etc.) as opposed to network switch equipment, it is not necessary to enable STP/RSTP. The reason is that it will cause unnecessary negotiation. AWK-3131A-M12-RCCs support STP/RSTP in AP mode only. The following figures indicate which Spanning Tree Protocol parameters can be configured. A more detailed explanation of each parameter is given below the figure. RSTP status This field will appear only when selected to operate STP/RSTP. It indicates whether this AWK-3131A-M12-RCC is the Root of the Spanning Tree (the root is determined automatically) or not. Bridge priority Setting Description Factory Default Numerical value You can increase the bridge priority by selecting a lower 32768 selected by user Hello time Setting number. A higher bridge priority brings a greater chance of being established as the root of the Spanning Tree topology. Description Factory Default Numerical value input The root of the Spanning Tree topology periodically sends out a 2 (seconds) by user hello message to other devices on the network to check if the
(1 10 seconds) topology is healthy. Hello time indicates how often the root sends hello messages. 3-31 AWK-3131A-M12-RCC Web Console Configuration Forwarding delay Setting Description Factory Default Numerical value input The amount of time this device waits before checking to see if it 15 (seconds) by user should change to a different topology.
(4 30 seconds) Max. age Setting Description Factory Default Numerical value input As a non-root role, if the device has not received a hello 20 (seconds) by user message from the root longer than Max. age, it will reconfigure
(6 40 seconds) itself as a root. Once two or more devices on the network are recognized as a root, the devices will renegotiate to set up a new Spanning Tree topology. Enable RSTP Setting Description Factory Default Enable/ disable Enables or disables the port as a node on the Spanning Tree Disable topology.
(unchecked) Port priority Setting Description Factory Default Numerical value Increase this ports priority as a node on the Spanning Tree 128 selected by user topology by inputting a lower number. Port cost Setting Description Factory Default Enable/ Disable Input a higher cost to indicate that this port is less suitable as a 2000000 node for the Spanning Tree topology Edge port Setting Description Factory Default Checked/ unchecked Sets a port, which no BPDU expectedly goes through, as an unchecked, except edge port AP port NOTE We recommend you set an edge port for the port, which is connected to a non-STP/RSTP sub-network or an end device (PLC, RTU, etc.) as opposed to network equipment. This can prevent unnecessary waiting and negotiation of STP/RSTP protocol, and accelerate system initialization. When an edge port receives BPDUs, it can still function as an STP/RSTP port and start negotiation. Setting an edge port is different from disabling STP/RSTP on a port. If you disable STP/RSTP, a port will not deal with STP/RSTP BPDUs at all. Port Status Port Status indicates the current Spanning Tree status of this port. Use Forwarding for normal transmission, or Blocking to block transmission. 3-32 AWK-3131A-M12-RCC Web Console Configuration SNMP Agent The AWK-3131A-M12-RCC supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The AWK-3131A-M12-RCCs MIB can be found in the software CD and supports reading the attributes via SNMP.
(Only get method is supported.) SNMP security modes and security levels supported by the AWK-3131A-M12-RCC are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Protocol Setting on Authentication Data Method Version UI web page Type Encryption SNMP V1, V2c Community string No Use a community string match for V1, V2c Read Community authentication V1, V2c Community string No Use a community string match for Write/Read Community authentication SNMP V3 No-Auth No No Use account with admin or user to access objects MD5 or SHA Authentication No Provides authentication based on HMAC-MD5, based on MD5 or or HMAC-SHA algorithms. 8-character SHA passwords are the minimum requirement for authentication. MD5 or SHA Authentication Data Provides authentication based on HMAC-MD5 based on MD5 or encryption or HMAC-SHA algorithms, and data encryption SHA key key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below the following figure. 3-33 AWK-3131A-M12-RCC Web Console Configuration Enable Setting Enable Disable Remote Management Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Factory Default Disable Description Factory Default Allow remote management via SNMP agent Disable Disallow remote management via SNMP agent Read community (for V1, V2c) Setting Description Factory Default V1, V2c Read Use a community string match with a maximum of 31 public Community characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Write community (for V1, V2c) Setting Description Factory Default V1, V2c Read /Write Use a community string match with a maximum of 31 private Community characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. SNMP agent version Setting Description Factory Default V1, V2c, V3, or Select the SNMP protocol version used to manage the switch. V1, V2c V1, V2c, or V3 only Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Factory Default Use admin account to access objects. No authentication No Auth Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. SHA Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Private key Description No data encryption DES-based data encryption AES-based data encryption Factory Default Disable A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also known as OID. This is the AWK-3131A-M12-RCCs enterprise value. It is fixed. 3-34 AWK-3131A-M12-RCC Web Console Configuration Link Fault Pass-Through (for Client/Slave mode only) This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, AWK will try to connect to AP. If wireless is disconnected, AWK restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, AWK will try to recover the Ethernet link. System log will indicate the link fault pass through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Enables Link Fault Pass-Through Disables Link Fault Pass-Through Factory Default Disable Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the AWK-3131A-M12-RCC supports different approaches to warn engineers automatically, such as SNMP trap, e-mail, and relay output. It also supports two digital inputs to integrate sensors into your system to automate alarms by email and relay output. 3-35 AWK-3131A-M12-RCC Web Console Configuration System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. System-related events Event is triggered when System restart (warm start) The AWK-3131A-M12-RCC is rebooted, such as when its settings Network-related events Event is triggered when are changed (IP address, subnet mask, etc.). LAN link on LAN link off Client joined/ left
(for AP/Master mode) WLAN connected to AP
(for Client/Slave mode) WLAN disconnected
(for Client/Slave mode) The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). A wireless client is associated or disassociated. The AWK-3131A-M12-RCC is associated with an AP. The AWK-3131A-M12-RCC is disassociated from an AP. Config-related events Event is triggered when Configuration Changed A configuration item has been changed. Configuration file import via Web Console The configuration file is imported to the AWK-3131A-M12-RCC. Console authentication failure An incorrect password is entered. Firmware upgraded Power events The AWK-3131A-M12-RCCs firmware is updated. Event is triggered when Power 1/2 transition (On -> Off) The AWK-3131A-M12-RCC is powered down in PWR1/2. PoE transition (On -> Off) The AWK-3131A-M12-RCC is powered down in PoE. Power 1/2 transition (Off -> On) The AWK-3131A-M12-RCC is powered via PWR1/2. PoE transition (Off -> On) The AWK-3131A-M12-RCC is powered via PoE. DI events Event is triggered when DI0/1 transition (On -> Off) Digital Input 0/1 is triggered by on to off transition DI0/1 transition (Off -> On) Digital Input 0/1 is triggered by off to on transition 3-36 AWK-3131A-M12-RCC Web Console Configuration Syslog This function provide event logs for the Syslog server. Up to three configurable Syslog servers and Syslog server UDP port numbers are supported. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog server. Syslog Event Types Detail information for the grouped events is shown in the following table. By default, the logs for all event groups are enabled (checked). If you want to enable logging for a specific event group, check the corresponding box under Enable log. Additional details on the event groups are available in the System log Event Types table above. Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Syslog server 1/ 2/ 3 Setting IP address Syslog port Description Factory Default Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server None Setting Description Factory Default Port destination Enter the UDP port of the corresponding Syslog server 514
(1 to 65535) 3-37 AWK-3131A-M12-RCC Web Console Configuration E-mail E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the AWK-3131A-M12-RCC. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses work well. More detailed explanations about these parameters are given after the following figure. Mail server (SMTP) Setting IP address Description The IP Address of your email server. Factory Default None User name & Password Setting Description Factory Default User name and password used in the SMTP server None 3-38 AWK-3131A-M12-RCC Web Console Configuration From e-mail address Setting Description Factory Default Max. 63 characters Enter the administrators e-mail address which will be shown in None the From field of a warning e-mail. To E-mail address 1/ 2/ 3/ 4 Setting Description Factory Default Max. 63 characters Enter the receivers e-mail addresses. None Relay The AWK-3131A-M12-RCC has one relay output, which consists of 2 terminal block contacts on the AWK-3131A-M12-RCCs top panel. These relay contacts are used to indicate user-configured events and system failure. The two wires attached to the relay contacts form an open circuit when a user-configured event is triggered. If a user-configured event does not occur, the relay circuit will remain closed. For safety reasons, the relay circuit is kept open when the AWK-3131A-M12-RCC is not powered. Relay Event Types You can check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found in the System log Event Types table on page 3-31. 3-39 AWK-3131A-M12-RCC Web Console Configuration Trap Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. Trap Event Types SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 1st / 2nd Trap version Setting Description V1 V2 SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 Factory Default V1 3-40 AWK-3131A-M12-RCC Web Console Configuration 1st / 2nd Trap server IP/name Setting Description Factory Default IP address or host Enter the IP address or name of the trap server used by your None name network. 1st / 2nd Trap community Setting Description Factory Default Max. of 31 characters Use a community string match with a maximum of 31 alert characters for authentication. Status Wireless Status The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Certain values for 802.11 info may not show up due to different operation modes. As a result, Current BSSID and Signal strength are not available in AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the AWK-3131A-M12-RCC in Client, Slave, or ACC mode. The transmission power indicated is the current transmission power being updated periodically. 3-41 AWK-3131A-M12-RCC Web Console Configuration Associated Client List (For AP/Master/ACC Mode Only) Associated Client List shows all the clients that are currently associated to a particular AWK-3131A-M12-RCC. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. AP Throughput Per radio interface, the AP throughput page shows the overall throughput continuously. DHCP Client List (For AP Mode Only) The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. 3-42 AWK-3131A-M12-RCC Web Console Configuration You can press Select all button to select all content in the list for further editing. System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-43 AWK-3131A-M12-RCC Web Console Configuration Relay Status The status of user-configurable events can be found under Relay Status. The status will refresh every 5 seconds if the Auto refresh box is checked. If an event is triggered, it will be noted on this list. System administrators can click Acknowledge Event when he has acknowledged the event and addressed it. DI and Power Status The status of power inputs and digital inputs is shown on this web page. The status will refresh every 5 seconds if the Auto refresh box is checked. RSTP Status The following figures indicate the status which Spanning Tree Protocol parameters have been configured. 3-44 AWK-3131A-M12-RCC Web Console Configuration LAN Status This page shows the LAN information, which includes speed, duplex, link status, and packet status. Maintenance Maintenance functions provide the administrator with tools to manage the AWK-3131A-M12-RCC and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. 3-45 AWK-3131A-M12-RCC Web Console Configuration If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. Firmware Upgrade The AWK-3131A-M12-RCC can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. Before running a firmware upgrade, make sure the AWK-3131A-M12-RCC is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the AWK-3131A-M12-RCC will reboot itself. When upgrading your firmware, the AWK-3131A-M12-RCCs other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your AWK-3131A-M12-RCC. Config Import Export You can back up or restore the AWK-3131A-M12-RCCs configuration with Config Import Export. In the Config Import section, click Browse to specify the configuration file and click Config Import button to begin importing the configuration. You can also back up or restore the ABC-01 (HW Rev. 1.1 support only) configuration with Config Import Export. 3-46 AWK-3131A-M12-RCC Web Console Configuration To download the configuration to the AWK:
1. Turn off the AWK. 2. Plug in the ABC-01 to the AWKs RS-232 console. 3. Turn on AWK. 4. AWK will detect ABC-01 during boot-up, and download the configuration from the ABC-01 to the AWK automatically. Once the configuration downloads and if configuration format is correct, the AWK will emit three short beeps, then continue the boot up. 5. Once the AWK has booted up successfully, it will emit the normal two beeps, and the ready LED will turn to solid green. SNMP MIB file for AWK-3131A-M12-RCC is embedded in the device. To export the MIB file, simply click on the MIB Export button and save it to your local drive. Load Factory Default Use this function to reset the AWK-3131A-M12-RCC and roll all settings back to the factory default values. You can also reset the hardware by pressing the reset button on the top panel of the AWK-3131A-M12-RCC. Username/Password You can change the administration password for each of the AWK-3131A-M12-RCCs console managers on this page. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password moxa, and remember to change the administration password regularly. NOTE Default password: moxa 3-47 AWK-3131A-M12-RCC Web Console Configuration Locate Device When you click on the Start to Locate button, the AP will beep and the APs LED will flash making it easy to identify the AP. To stop the beeping, click on the Stop locating button. Misc. Settings Additional settings to help you manage your AWK-3131A-M12-RCC, are available on this page. Reset button Setting Description Factory Default Always enable The AWK-3131A-M12-RCCs Reset button works normally. Always enable Disable restore to The AWK-3131A-M12-RCCs reset to default function will be default function after inactive 60 seconds after the AWK-3131A-M12-RCC finishes 60 sec booting up. Save Configuration The following figure shows how the AWK-3131A-M12-RCC stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the AWK-3131A-M12-RCC is shutdown or rebooted unless they are y. Because the AWK-3131A-M12-RCC starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the AWK-3131A-M12-RCC. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. 3-48 AWK-3131A-M12-RCC Web Console Configuration After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. Restart If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the AWK-3131A-M12-RCC directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the AWK-3131A-M12-RCC. If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. 3-49 AWK-3131A-M12-RCC Web Console Configuration You will not be able to run any of the AWK-3131A-M12-RCCs functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. 3-50 Software Installation and Configuration 4 The following topics are covered in this chapter:
Overview AWK Search Utility Installing AWK Search Utility Configuring AWK Search Utility AWK-3131A-M12-RCC Software Installation and Configuration Overview The Documentation & Software CD included with your AWK-3131A-M12-RCC is designed to make the installation and configuration procedure easy and straightforward. This auto-run CD includes AWK Search Utility (to broadcast search for all AWKs accessible over the network), the AWK-3131A-M12-RCC Users Manual, and Quick Installation Guide. AWK Search Utility Installing AWK Search Utility 1. Download the Windows AWK Search Utility from Moxas website: https://www.moxa.com/support/. Extract the contents of the zip file and double-click on the WirelessSearchUtility_x.x_Build_xxxxxxxx file to run the utility. 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 4-2 AWK-3131A-M12-RCC Software Installation and Configuration 3. Click Next to create the programs shortcut files to the default directory, or click Browse to select an alternate location. 4. Click Next to select additional tasks. 4-3 AWK-3131A-M12-RCC Software Installation and Configuration 5. Click Next to proceed with the installation. The installer displays a summary of the installation options selected. 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 7. Click Finish to complete the installation of the AWK Search Utility. 4-4 AWK-3131A-M12-RCC Software Installation and Configuration Configuring AWK Search Utility The Broadcast Search function is used to locate all AWK-3131A-M12-RCC APs that are connected to the same LAN as your computer (host). After locating an AWK-3131A-M12-RCC, you will be able to change its IP address. Since the Broadcast Search function searches by TCP packet and not IP address, it doesnt matter if the AWK-3131A-M12-RCC is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. First-time installation of the AWK Search Utility requires you to key in the management password. For security reasons, be sure to have a system administrator install the AWK Search Utility on your computer. NOTE The default management password for the AWK Search Utility is moxa. 1. Start the AWK Search Utility program. When the Login page appears, select the Search AWK only option to search for AWKs and to view each AWKs configuration. Select the AWK management option to assign IPs, upgrade firmware, and locate devices. 4-5 AWK-3131A-M12-RCC Software Installation and Configuration 2. Open the AWK Search Utility and then click the Search icon. 3. The Searching window indicates the progress of the search. When the search is complete, all AWKs that were located will be displayed in the AWK Search Utility window. 4-6 AWK-3131A-M12-RCC Software Installation and Configuration 4. To access the advanced configuration, close the AWK Search Utility and start it again. Select the Device Management option and click OK. 5. Make sure your AWK is unlocked. To unlock the device, right click on the device and select Unlock. Specify the Username and Password for the device to unlock the device. 4-7 AWK-3131A-M12-RCC Software Installation and Configuration 6. Click Locate to cause the selected device to beep. Click on the OK button for the utility to stop locating the device. 4-8 AWK-3131A-M12-RCC Software Installation and Configuration To unlock a specific product without requiring to enter the Username/password each time, go to Tools Login Options to manage and unlock multiple products. Use the scroll down list to select the MAC addresses of the AWKs that you would like to manage, and then click Add. Key in the password for the AWK device and then click OK to save the password. If you return to the search page and search for the AWK device, you will find that the AWK will unlock automatically. 4-9 AWK-3131A-M12-RCC Software Installation and Configuration ATTENTION For security purposes, we suggest that you can change the AWK search utility login password instead of using the default. 7. To modify the configuration of the selected product, click on the Web icon to open the web UI. For additional details, refer to Chapter 3, Web Console Configuration for information on how to use the web console. 8. Click on the Telnet icon if you would like to use telnet to configure the selected device. 4-10 AWK-3131A-M12-RCC Software Installation and Configuration 9. Click Assign IP to change the IP setting. The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time lapse between retries. Multicast retry (default=3): Indicates how many times the search by multicasting will be retried automatically. 4-11 AWK-3131A-M12-RCC Software Installation and Configuration Connection Connection timeout (sec): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (sec): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. Protocol timeout (msec): It defines the default timeout while applying any operation, such as assigning a new IP address to the selected product. Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the AWK search Utility. 4-12 Other Console Considerations 5 This chapter explains how to access the AWK-3131A-M12-RCC for the first time. In addition to HTTP access, there are four ways to access AWK-3131A-M12-RCC: serial console, Telnet console, SSH console, and HTTPS console. The serial console connection method, which requires using a short serial cable to connect the AWK-3131A-M12-RCC to a PCs COM port, can be used if you do not know the AWK-3131A-M12-RCCs IP address. The other consoles can be used to access the AWK-3131A-M12-RCC over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
RS-232 Console Configuration (115200, None, 8, 1, VT100) Configuring Through Telnet and SSH Consoles Configuring HTTPS/SSL Secure Access Through a Web Browser Disabling Telnet and Browser Access AWK-3131A-M12-RCC Other Console Considerations RS-232 Console Configuration (115200, None, 8, 1, VT100) The serial console connection method, which requires using a short serial cable to connect the AWK-3131A-M12-RCC to a PCs COM port, can be used if you do not know the AWK-3131A-M12-RCCs IP address. It is also convenient to use serial console configurations when you cannot access the AWK-3131A-M12-RCC over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. ATTENTION Do not use the RS-232 console when the AWK-3131A-M12-RCC is powered by a reversed voltage.
(e.g., -48 VDC), even though reverse voltage protection is supported. If you need to connect the RS-232 console at a reverse voltage potential, ensure that the serial port on the PC/laptop is well protected before attaching it to the AWK that is supplied by a -48 VDC system. An isolated USB-to-serial converter like Moxa UPort 1250I is recommended to create a reliable connection with an AWK device. Alternatively, be sure to use a serial isolator, such as Moxa TCC-82, to protect both the AWK's serial console and your serial port. NOTE We recommend using Moxa PComm (Lite) Terminal Emulator, which can be downloaded free of charge from Moxas website (www.moxa.com/support). Before running the PComm Terminal Emulator program, use an RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the AWK-3131A-M12-RCCs RS-232 console port to your PCs COM port (COM1 or COM2, depending on how your system is set up). After installing the PComm Terminal Emulator, take the following steps to access the RS-232 console utility. 1. From the Windows Start menu, select PComm (Lite) > PComm Terminal Emulator. 2. In the Port Manager menu of the emulator, click on Open. The Property window opens up. 5-2 AWK-3131A-M12-RCC Other Console Considerations 3. Configure the following settings:
In the Communication Parameter page, select the appropriate COM port for Console Connection and set 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for the Terminal Type. Click on OK to continue. The Console login screen opens up. 4. Log into the RS-232 console with the login name (default: admin) and password (default: moxa, if no new password is set). 5-3 AWK-3131A-M12-RCC Other Console Considerations The AWK-3131A-M12-RCCs device information and Main Menu options are displayed 5. Key in the number corresponding to the menu option that you would like to select. NOTE To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the RS-232 cable or disable the DTR signal, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. NOTE The AWK's serial console needs to detect a DSR signal to activate the console output. Be sure to use a full 8-wire serial cable instead of a 3-wire (Tx/Rx/GND only). For a good connection to the AWK device we recommend using Moxa serial console cable - CBL-RJ45F9-150. Configuring Through Telnet and SSH Consoles You may use Telnet or SSH client to access the AWK-3131A-M12-RCC and manage the console over a network. To access the AWK-3131A-M12-RCCs functions over the network from a PC host that is connected to the same LAN as the AWK-3131A-M12-RCC, you need to make sure that the PC host and the AWK-3131A-M12-RCC are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. 5-4 AWK-3131A-M12-RCC Other Console Considerations NOTE The AWK-3131A-M12-RCCs default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, run Start Run, and then use Telnet to access the AWK-3131A-M12-RCCs IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). NOTE Telnet is not a default service in Windows 7 and later versions for a PC/laptop. In order to use the telnet service, you will need to activate it from Control Panel Programs Turn Windows features on or off. Select Telnet Client and press OK. 2. When using the SSH client (e.g., PuTTY), run the client program and then input the AWK-3131A-M12-RCCs IP address, specifying 22 for the SSH connection port. 3. The Console login screen will appear. Please refer to the previous paragraph RS-232 Console Configuration and for login and administration. Configuring HTTPS/SSL Secure Access Through a Web Browser To secure your HTTP access, the AWK-3131A-M12-RCC supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the AWK-3131A-M12-RCCs web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<AWK-3131A-M12-RCCs IP address> in the address field. Press Enter to establish the connection. 5-5 AWK-3131A-M12-RCC Other Console Considerations 2. Warning messages will pop out to warn users that the security certificate was issued by a company they have not chosen to trust. 3. Select Yes to accept the certificate issued by Moxa IW and then enter the AWK-3131A-M12-RCCs web browser interface secured via HTTPS/SSL. (You can see the protocol in URL is https.) Then you can use the menu tree on the left side of the window to open the function pages to access each of AWK-3131A-M12-RCCs functions. Disabling Telnet and Browser Access If you are connecting the AWK-3131A-M12-RCC to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-6 A References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you administer your AWK-3131A-M12-RCCs and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP AWK-3131A-M12-RCC References Beacon A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your PC from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports (AP, Master, Slave, and ACC modes) of the same AWK-3131A-M12-RCC. This feature is particularly helpful when the AWK-3131A-M12-RCC connects to older equipment, such as legacy switches. A-2 AWK-3131A-M12-RCC References Differences between RSTP and STP RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. A-3 B Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery DoC (Declaration of Conformity) Federal Communication Commission Interference Statement Antenna Gain and RF Radiated Power R&TTE Compliance Statement AWK-3131A-M12-RCC Supporting Information Firmware Recovery If the FAULT, Signal Strength, CLIENT, BRIDGE and WLAN LEDs light up simultaneously and blink at one-second intervals, this indicates that the system boot up has failed. Boot-up failure may result from some wrong operation or other issues, such as an unexpected shutdown during firmware update. The AWK-3131A-M12-RCC is designed to help administrators recover such damage and quickly resume system operation. Refer to the following instructions to recover the firmware on an AWK-3131A-M12-RCC:
1. Connect to the AWK-3131A-M12-RCCs RS-232 console using the setting 115200 bps, None, 8, and 1. The following message is shown on the terminal emulator every second. B-2 AWK-3131A-M12-RCC Supporting Information 2. Press Ctrl - C and the following message will appear. 3. In the console terminal, select 2 and press Enter 4. Specify the IP addresses of the AWK and the TFTP Server, and the firmware filename. NOTE You should have the address of a TFTP server, where the correct firmware file is stored, handy before performing this step. 5. Press Enter to proceed. B-3 AWK-3131A-M12-RCC Supporting Information NOTE The firmware file downloaded from Moxas website has a complex filename, which may not be convenient for use during a firmware recovery operation. It is recommended that you rename the file to give it a short file name, e.g.:18041016.rom, to ease the recovery process. Here is an example that uses the shareware, tftpd (http://tftpd32.jounin.net/). 6. Confirm that the settings are correct and press 1 and then Enter to proceed. B-4 AWK-3131A-M12-RCC Supporting Information The following message is displayed on the console terminal. After the firmware recovering process is successfully completed, you will hear two short beeps and the STATE led on the device will turn green. B-5 AWK-3131A-M12-RCC Supporting Information DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Caution: Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment. RF exposure warning This equipment must be installed and operated in accordance with provided instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, End-users and installers must be provide with antenna installation instructions and transmitter. End-users and installers must be provide with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Antenna List Antenna Part No. Antenna Type Maximum Antenna Gain ANT-WDB-WDB-O-2-BK Dipole Antenna ANT-WDB-ARM-0202 Dipole Antenna 2.34 dBi for 5.25~5.35GHz 2.34 dBi for 5.47~5.725GHz 1.6 dBi for 5.25~5.35 GHz 1.8 dBi for 5.47~5.725 GHz B-6 AWK-3131A-M12-RCC NCC (National Communication Commission)
:
Supporting Information
, ,, ,
, ,,
,, B-7 AWK-3131A-M12-RCC Supporting Information R&TTE Compliance Statement Moxa declares that the apparatus AWK-3131A-RTG complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. B-8
various | WAPN008- UserMan AWK-3131A-M12-RTG 20180820 | Users Manual | 3.55 MiB |
Moxa AWK-3131A-RTG Users Manual Edition 1.0, July 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. Moxa AWK-3131A-RTG Users Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice 2018 Moxa Inc. All rights reserved. Trademarks All other trademarks or registered marks in this manual belong to their respective manufacturers. The MOXA logo is a registered trademark of Moxa Inc. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Toll-free: 1-888-669-2872 Tel:
Fax:
+1-714-528-6777
+1-714-528-6778 Moxa Europe Tel:
Fax:
+49-89-3 70 03 99-0
+49-89-3 70 03 99-99 Moxa India Tel:
Fax:
+91-80-4172-9088
+91-80-4132-1045 Moxa China (Shanghai office) Toll-free: 800-820-5036 Tel:
Fax:
+86-21-5258-9955
+86-21-5258-5505 Moxa Asia-Pacific Tel:
Fax:
+886-2-8919-1230
+886-2-8919-1231 Table of Contents 1. Introduction ...................................................................................................................................... 1-1 Overview ........................................................................................................................................... 1-2 Package Checklist ............................................................................................................................... 1-2 Product Features ................................................................................................................................ 1-2 Product Specifications ......................................................................................................................... 1-3 Functional Design ............................................................................................................................... 1-3 LAN Port .................................................................................................................................... 1-3 LED Indicators ............................................................................................................................ 1-4 Beeper ....................................................................................................................................... 1-5 Reset Button ............................................................................................................................... 1-5 2. Getting Started .................................................................................................................................. 2-1 First-Time Installation and Configuration ............................................................................................... 2-2 Communication Testing ....................................................................................................................... 2-3 Function Map ..................................................................................................................................... 2-5 3. Web Console Configuration ............................................................................................................... 3-1 Web Browser Configuration .................................................................................................................. 3-3 Overview ........................................................................................................................................... 3-4 Basic Settings .................................................................................................................................... 3-5 System Info Settings ................................................................................................................... 3-6 Network Settings ......................................................................................................................... 3-6 Time Settings ............................................................................................................................. 3-8 Wireless Settings .............................................................................................................................. 3-10 Operation Mode ................................................................................................................................ 3-10 Basic Wireless Settings (Multiple SSID) ............................................................................................... 3-11 WLAN Security Settings .............................................................................................................. 3-14 Advanced Wireless Settings ........................................................................................................ 3-21 WLAN Certification Settings (Only For EAP-TLS in Client Mode) ....................................................... 3-26 WAC Settings (AP Mode Only) ..................................................................................................... 3-27 Advanced Settings ............................................................................................................................ 3-27 Using Virtual LAN ...................................................................................................................... 3-28 Configuring Virtual LAN .............................................................................................................. 3-29 DHCP Server ............................................................................................................................. 3-30 Packet Filters ............................................................................................................................ 3-31 Static Route (For Client-Router Mode Only) .................................................................................. 3-33 NAT Settings/Port Forwarding (For Client-Router Mode Only) .......................................................... 3-35 SNMP Agent .............................................................................................................................. 3-36 Mobile IP Settings ...................................................................................................................... 3-38 Link Fault Pass-Through (For Client Mode Only) ............................................................................ 3-39 Auto Warning Settings....................................................................................................................... 3-40 System Log .............................................................................................................................. 3-40 Syslog ..................................................................................................................................... 3-41 E-mail ...................................................................................................................................... 3-42 Traps ....................................................................................................................................... 3-43 Status ............................................................................................................................................. 3-45 Wireless Status ......................................................................................................................... 3-45 Associated Client List (For AP Mode Only) ..................................................................................... 3-45 DHCP Client List ........................................................................................................................ 3-46 System Log .............................................................................................................................. 3-46 Relay Status ............................................................................................................................. 3-47 DI and Power Status .................................................................................................................. 3-47 AeroLink Protection Status (For Client Mode Only) ......................................................................... 3-47 Routing Table ........................................................................................................................... 3-48 LAN Status ............................................................................................................................... 3-48 Maintenance .................................................................................................................................... 3-48 Console Settings ....................................................................................................................... 3-48 Ping ......................................................................................................................................... 3-49 Firmware Upgrade ..................................................................................................................... 3-49 Config Import/Export ................................................................................................................. 3-50 Load Factory Default .................................................................................................................. 3-51 Username/Password .................................................................................................................. 3-51 Locate Device ........................................................................................................................... 3-51 Misc. Settings ........................................................................................................................... 3-52 Save Configuration ........................................................................................................................... 3-52 Restart ............................................................................................................................................ 3-53 Logout............................................................................................................................................. 3-53 4. Software Installation and Configuration ........................................................................................... 4-1 Overview ........................................................................................................................................... 4-2 Wireless Search Utility ......................................................................................................................... 4-2 Installing Wireless Search Utility ................................................................................................... 4-2 Configuring Wireless Search Utility ................................................................................................ 4-5 5. Using Other Consoles ........................................................................................................................ 5-1 USB Console Configuration (115200, None, 8, 1, VT100) ......................................................................... 5-2 Configuration via Telnet and SSH Consoles ............................................................................................ 5-4 Configuration by Web Browser with HTTPS/SSL ...................................................................................... 5-5 Disabling Telnet and Browser Access ..................................................................................................... 5-6 A. References ........................................................................................................................................ A-1 Beacon ..............................................................................................................................................A-2 DTIM.................................................................................................................................................A-2 Fragment...........................................................................................................................................A-2 RTS Threshold ....................................................................................................................................A-2 STP and RSTP ....................................................................................................................................A-2 The STP/RSTP Concept ................................................................................................................A-2 Differences between RSTP and STP................................................................................................A-3 B. Supporting Information .................................................................................................................... B-1 Firmware Recovery .............................................................................................................................B-2 DoC (Declaration of Conformity) ...........................................................................................................B-3 Federal Communication Commission Interference Statement ............................................................B-3 RED Compliance Statement ..........................................................................................................B-3 Canada, Industry Canada (IC) Notices ...........................................................................................B-4 Antenna Gain and RF Radiated Power ............................................................................................B-5 R&TTE Compliance Statement .......................................................................................................B-7 1 Introduction The AWK-3131A-RTG series wireless AP/client is the wireless solution for railway train-to-ground applications such as CCTV and CBTC communications. It can provide speeds of up to 300 Mbps with IEEE 802.11n technology. The AWK-3131A-RTG series can operate at temperatures ranging from -25 to 60C for standard models and -40 to 75C for extended temperature models, and is rugged enough for rolling stock environments. Installation is easy, with either DIN-rail mounting or distribution boxes, and the DIN-rail mounting capability, wide operating temperature range, and IP30 housing with LED indicators make the AWK-3131A-RTG a convenient yet reliable solution for any rolling stock application. The following topics are covered in this chapter:
Overview Package Checklist Product Features Product Specifications Functional Design LAN Port LED Indicators Beeper Reset Button AWK-3131A-RTG UM Overview Introduction The AWK-3131A-RTG is 802.11n compliant to deliver speed, range, and reliability to support even the most bandwidth-intensive applications. The 802.11n standard incorporates multiple technologies, including MIMO
(Multi-In, Multi-Out) Spatial Multiplexing, multiple channels (5, 10, 20 and 40 MHz), and dual bands (2.4 GHz and 5 GHz) to achieve high speeds, while still being able to communicate with legacy 802.11a/b/g devices. The AWK-3131A-RTG is compliant with the EN 50155 standard that covers operating temperature range, power input voltage, surge, ESD, and vibration. The AWK-3131A-RTG can be easily mounted on to a wall, DIN rail or in distribution boxes. Its wide operating temperature range, IP68-rated housing with LED indicators, and the DIN-rail mounting capability make the AWK-3131A-RTG a convenient yet reliable solution for all types of industrial wireless applications. Package Checklist Moxas AWK-3131A-RTG is shipped with the following items. If any of these items is missing or damaged, please contact your customer service representative for assistance. 1 AWK-3131A-RTG 1 DIN-rail kit 2 plastic RJ45 protective cap: One for the console port and the other for use as a backup 1 plastic protective cap for fiber port (AWK-3131A-SSC-RTG only) Cable holder with one screw Quick installation guide (printed) Warranty card NOTE Antennas are not included and should be purchased separately. Product Features Designed specifically for the wireless communication requirements in train-to-ground communication (e.g.:
CBTC and CCTV). 2x2 MIMO technology M12 anti-vibration connectors (AWK-3131A-M12-RTG) SC optical fiber connection (AWK-3131A-SSC-RTG)
-40 to 75C operating temperature range (T models) Certified against the EN 50121-4 railway standard Complies with all EN 50155 mandatory test items*
Controller-based Turbo Roaming (handover time < 50 ms @ 3 channels, WPA2) - available only when used with the WAC-1001 or WAC-2004 Supports 5.8 GHz band in the standard model Supports QoS function, which can help assign high priority to your critical traffic Provides advanced wireless security settings Provides 64-bit and 128-bit WEP/WPA/WPA2 encryption SSID Hiding, IEEE 802.1X security, and RADIUS Packet access control and filtering Supports SNMP, SNTP, SSH, HTTPS, TFTP for remote management Wall mountable Long-distance transmission support 1-2 AWK-3131A-RTG UM Introduction There are many factors that affect the performance of a device when it is used in long-distance applications. These factors include:
Test architecture Installation distance Car speed Antenna gain Band Transmission Power Signal Strength Channel interference For details, please contact your Moxa sales representative. Product Specifications NOTE The latest specifications for Moxas products can be found at https://www.moxa.com. Functional Design LAN Port The standard model of the AWK-3131A-RTG is provided with one M12 D code Megabit port. The LAN LED will light up when you insert the cable in the LAN port and a connection is established. The standard model of AWK-3131A-SSC-RTG is provided with one SC fiber port. The 100M LED will light up when you insert the cable in the SC fiber port and a connection is established. ATTENTION The AWK-3131A-RTG is NOT a portable mobile device and should be located at least 20 cm away from the human body. The AWK-3131A-RTG is NOT designed for the general public. To establish a wireless network safely using the AWK-3131A-RTG, a well-trained technician should be consulted for installation. 1-3 AWK-3131A-RTG UM Introduction ATTENTION Do not use a PoE (Power over Ethernet) Injector for the PoE device(s). Instead, use an IEEE 802.3af or IEEE 802.3at compliant PSE (Power Sourcing Equipment). LED Indicators The LEDs on the front panel provide a quick and easy means of determining the current operational status and wireless settings of the AWK-3131A-RTG. The FAULT LED indicates system failures. If the AWK-3131A-RTG cannot retrieve the IP address from a DHCP server, the FAULT LED will blink at one-second intervals. The following table summarizes how to read the devices wireless settings based on the LED displays. More information is available in Chapter 3 in the Basic Wireless Settings section. LED Color State Description PWR1 Green PWR2 Green PoE
(AWK-3131A-
Amber M12-RTG only) On Off On Off On Off Power is being supplied from power input 1. Power is not being supplied from power input 1. Power is being supplied from power input 2. Power is not being supplied from power input 2. Power is being supplied via PoE. Power is not being supplied via PoE. Blinking Cannot get an IP address from the DHCP server
(slow at 1-second intervals) FAULT Red Blinking IP address conflict STATE SIGNAL
(5 LEDs) Green CLIENT MODE Green
(fast at 0.5-second intervals) Off Green No errors System startup is complete and the system is in operation Green/
Green (blinking at The AWK has been located by the Wireless Search Utility. Red 1-second intervals) Red Boot up error On Off On Off Signal level
(for Client and Client-Router mode only) The AWK is functioning in Client or Client-Router Mode. The AWK is not functioning in Client or Client-Router Mode. 1-4 AWK-3131A-RTG UM Introduction LED Color State Description On Off On WLAN is in use. WLAN is not in use. 100 Mbps link is active. Green Blinking Data is being transmitted at 100 Mbps. Off 100 Mbps link is inactive. WLAN Amber LAN/
100M*
ATTENTION When the system fails to boot, the LEDs for STATE (Green), FAULT, and WLAN will all light up simultaneously and blink at one-second intervals. This may be due to improper operation or issues such as an unexpected shutdown while updating the firmware. To recover the firmware, refer to the Firmware Recovery section in Appendix B Supporting Information. Beeper The beeper emits two short beeps when the system is ready. Reset Button The Reset button is located on the bottom panel of the AWK-3131A-RTG. You can reboot the AWK-3131A-RTG or reset it to factory default settings by pressing the Reset button with a pointed object such as an unfolded paper clip. System reboot: Hold the Reset button down for under 5 seconds and then release. Reset to factory default: Hold the Reset button down for over 5 seconds until the STATE LED starts blinking green light. Release the button to reset the AWK-3131A-RTG. 1-5 2 Getting Started This chapter explains how to install Moxas AirWorks AWK-3131A-RTG for the first time to quickly set up your wireless network and how to test whether the connection is working well. The function map provided in Chapter 3 is a convenient reference to the various functions available on the AWK-3131A-RTG and to determine the functions that you need to use. The following topics are covered in this chapter:
First-Time Installation and Configuration Communication Testing Function Map AWK-3131A-RTG UM Getting Started First-Time Installation and Configuration Before installing the AWK-3131A-RTG, make sure that all items mentioned in the package checklist are in the box. You will also need access to a notebook computer or PC equipped with an Ethernet port. The AWK-3131A-RTG has a default IP address that you must use when connecting to the device for the first time. Step 1: Select the power source. The AWK-3131A-RTG can be powered by a DC power input or PoE (Power over Ethernet). Step 2: Connect the AWK-3131A-RTG to a notebook or PC. Since the AWK-3131A-RTG is provided with the MDI/MDI-X auto-sensing capability, you can use either a straight-through cable or crossover cable to connect it to a computer. When the connection between the AWK-3131A-RTG and the computer is established, the LED indicator on the AWK-3131A-RTGs LAN port lights up. Step 3: Set up the computers IP address. Set an IP address for the computer so that it is on the same subnet as that of the AWK-3131A-RTG. Since the AWK-3131A-RTGs default IP address is 192.168.127.253, and the subnet mask is 255.255.255.0, set the IP address of the computer in the 192.168.127.xxx IP range and subnet mask to 255.255.255.0. Step 4: Use the web-based manager to configure the AWK-3131A-RTG Open your computers web browser and type http://192.168.127.253 in the address field to access the homepage of the web-based Network Manager. Before the homepage opens, you will need to enter the user name and password as shown in the following figure. For first-time configuration, enter the following default user name and password and click on the Login button:
User Name:
admin Password:
moxa NOTE For security reasons, we strongly recommend changing the default password. To change the password, select Maintenance Password and follow the instructions on the screen. NOTE After you click Submit to apply changes, the web page is refreshed and an (Updated) indicator is displayed next to the page heading along with a blinking reminder to restart the device. To activate the changes, click Restart and then click Save and Restart after you change the settings. The AWK-3131A-RTG will take about 30 seconds to complete the reboot process. 2-2 AWK-3131A-RTG UM Getting Started Step 5: Select the operation mode for the AWK-3131A-RTG. By default, the operation mode of the AWK-3131A-RTG is set to AP. You can change this setting to Client mode at Wireless Settings WLAN Basic Wireless Settings. Detailed information about configuring the AWK-3131A-RTG is available in Chapter 3. Step 6: Test the network connection. In the following sections we describe two methods that you can use to test that a network connection has been established. Communication Testing After installing the AWK-3131A-RTG you can run a sample test to make sure the wireless connection on the AWK-3131A-RTG is functioning normally. Two testing methods are described below. Use the first method if you are using only one AWK-3131A-RTG device and the second method if you are using two or more AWK-3131A-RTG units. How to Test One AWK-3131A-RTG If you are only using one AWK-3131A-RTG, you will need one additional notebook computer equipped with a WLAN card. Configure the WLAN card to connect to the AWK-3131A-RTG (NOTE: the default SSID is MOXA), and change the IP address of the second notebook (Notebook B) so that it is on the same subnet as the first notebook (Notebook A), which is connected to the AWK-3131A-RTG. After configuring the WLAN card, establish a wireless connection with the AWK-3131A-RTG and open a DOS window on Notebook B. At the prompt, type the following:
ping <IP address of notebook A>
and then press Enter (see the figure below). A Reply from IP address response means the communication was successful. A Request timed out. response means the communication failed. In this case, recheck the configuration to make sure the connections are correct. 3-2 AWK-3131A-RTG UM Getting Started How to Test Two or More AWK-3131A-RTG Units If you have two or more AWK-3131A-RTG units, you will need a second notebook computer (Notebook B) equipped with an Ethernet port. Use the default settings for the first AWK-3131A-RTG connected to notebook A and change the second or third AWK-3131A-RTG connected to notebook B to Client mode, and then configure the notebooks and AWK-3131A-RTG units properly. After setting up the testing environment, open a DOS window on notebook B. At the prompt type:
ping <IP address of notebook A>
and then press Enter. A Reply from IP address response means the communication was successful. A Request timed out response means the communication failed. In the latter case, recheck the configuration to make sure the settings are correct. 4-2 AWK-3131A-RTG UM Getting Started Function Map Quick overview of the AWK-3131A-M12-RTGs status Basic settings for administering the AWK-3131A-M12-RTG Essential settings related to establishing a wireless network Advanced features to support additional network management and secure wired and wireless communication Note: These advanced functions are all optional Application-oriented device management functions to set up events, traps, and reactions via e-mail and SNMP notifications Note: These functions are all optional Current status information for monitoring wired/wireless network performance, advanced services, and device management functions On-demand functions to support the web-based console management operation Functions for maintaining the AWK-3131A-M12-RTG, and for diagnosing the network 5-2 Web Console Configuration 3 In this chapter, we explain all aspects of web-based console configuration. Moxas easy-to-use management functions help you set up your AWK-3131A-RTG and make it easy to establish and maintain your wireless network. The following topics are covered in this chapter:
Web Browser Configuration Overview Basic Settings System Info Settings Network Settings Time Settings Wireless Settings Operation Mode Basic Wireless Settings (Multiple SSID) WLAN Security Settings Advanced Wireless Settings WLAN Certification Settings (Only For EAP-TLS in Client Mode) WAC Settings (AP Mode Only) Advanced Settings Using Virtual LAN Configuring Virtual LAN DHCP Server Packet Filters NAT Settings/Port Forwarding (For Client-Router Mode Only) SNMP Agent Mobile IP Settings Link Fault Pass-Through (For Client Mode Only) Auto Warning Settings System Log Syslog E-mail Traps Status Wireless Status Associated Client List (For AP Mode Only) DHCP Client List System Log Relay Status DI and Power Status AWK-3131A-RTG UM Web Console Configuration AeroLink Protection Status (For Client Mode Only) Routing Table LAN Status Maintenance Console Settings Ping Firmware Upgrade Config Import/Export Load Factory Default Username/Password Locate Device Misc. Settings Save Configuration 3-2 AWK-3131A-RTG UM Web Console Configuration Restart Logout Web Browser Configuration The web interface provides a convenient way to modify the configuration of the AWK-3131A-RTG and access its built-in monitoring and network administration functions. The recommended web browser is Microsoft Internet Explorer 11.0 with JVM (Java Virtual Machine) installed. NOTE To use the management and monitoring functions of the AWK-3131A-RTG from a PC host connected to the same LAN as the AWK-3131A-RTG, you must make sure that the PC host and the AWK-3131A-RTG are on the same logical subnet. Similarly, if the AWK-3131A-RTG is configured on a different VLAN than the PC, you must make sure your PC host is on the management VLAN so that it can access the AWK-3131A-RTG. The default IP address of the AWK is 192.168.127.253. To access the web interface of the AWK-3131A-RTG, do the following:
1. Open a web browser (e.g., Internet Explorer), type in the default IP address of the AWK-3131A-RTG in the address field, and press Enter. 2. In the login page that is displayed, enter the Username and Password (default Username = admin;
default Password = moxa) and click Login to continue. 3-3 AWK-3131A-RTG UM Web Console Configuration You may need to wait a few moments for the main page to download to your computer. Note that the model name and IP address of the AWK-3131A-RTG are both shown in the title bar of the web page. You can identify the web interfaces of multiple AWK-3131A-RTG units using this information. 3. Use the menu tree on the left side of the window to open the configuration pages for the AWK-3131A-RTGs functions. In the following paragraphs, we describe each AWK-3131A-RTG management function in detail. An overview of all the functions is available in the Function Map section of this manual. NOTE The model name of the AWK-3131A-RTG is shown as AWK-3131A-RTG-XX, where XX indicates the country code. The model name indicates the AWK-3131A-RTG version and the bandwidth it uses. We use AWK-3131A-RTG-US as an example in the following figures. (The country code and model name that appears on your computer screen may be different.) Overview The Overview page summarizes the AWK-3131A-RTGs current status. The information is categorized into the following groups: System Info, Device Info, and 802.11 Info. 3-4 AWK-3131A-RTG UM Web Console Configuration Click on the SSID (MOXA, in this case) to display detailed information on 802.11as shown below:
NOTE The 802.11 Info that is displayed may differ based on the operation mode selected. For example, Current BSSID is not available in Client mode, and Signal strength/Noise Floor is not available in AP mode. Basic Settings The Basic Settings group includes the most commonly used settings required by administrators to maintain and control the AWK-3131A-RTG. 3-5 AWK-3131A-RTG UM Web Console Configuration System Info Settings The System Info related settings that you configure here, especially the Device name and Device description, are displayed on the Overview page. They are also included in the SNMP information and email alerts. Configuring the System Info settings for each AWK-3131A-RTG makes it easier to identify the different AWK-3131A-RTG units connected to your network. Device name Format Description Factory Default Maximum of 31 Specifies the role or application of this AWK-3131A-RTG AWK-3131A-RTG_<Serial characters unit. Device location No. of this AWK-3131A-RTG>
Format Description Factory Default Maximum. of 31 Specifies the location of this AWK-3131A-RTG unit. None characters Device description Format Description Factory Default Maximum of 31 You can use this space to record a more detailed None characters description of this AWK-3131A-RTG Device contact information Format Description Factory Default Maximum of 31 You can use this space to record the contact information of the None characters person responsible for maintaining this AWK-3131A-RTG. Network Settings The Network Settings configuration panel allows you to modify the usual TCP/IP network parameters. However, due to the addition of the client-router operation mode, this panel provides two different sets of network parameters. Explanations for both types of configuration are given below. Network Settings for AP/Client Operation Mode 3-6 AWK-3131A-RTG UM Web Console Configuration IP address assignment Setting DHCP Description Factory Default The AWK-3131A-RTGs IP address will be assigned Static Static Set up the AWK-3131A-RTGs IP address manually. automatically by the networks DHCP server IP address Setting Description Factory Default AWK-3131A-RTGs IP Identifies the AWK-3131A-RTG on a TCP/IP network. 192.168.127.253 address Subnet mask Setting Description Factory Default AWK-3131A-RTGs Identifies the type of network to which the AWK-3131A-RTG is 255.255.255.0 subnet mask connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Gateway Setting Description Factory Default AWK-3131A-RTGs The IP address of the router that connects the LAN to an None default gateway outside network. Primary/ Secondary DNS server Setting Description Factory Default IP address of the The IP address of the DNS Server used by your network. After None Primary/Secondary entering the DNS Servers IP address, you can input the DNS server AWK-3131A-RTGs URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. Network Settings for Client-Router Operation Mode WLAN IP address assignment Setting DHCP Description Factory Default The AWK-3131A-RTG WLAN interfaces IP address will be Static assigned automatically by the networks DHCP server 3-7 AWK-3131A-RTG UM Web Console Configuration Static Set up the AWK-3131A-RTG WLAN interfaces IP address manually. WLAN IP address Setting Description Factory Default AWK-3131A-RTG Identifies the AWK-3131A-RTG WLAN interfaces IP address on 192.168.128.253 WLAN interfaces IP a TCP/IP network. address WLAN subnet mask Setting Description Factory Default AWK-3131A-RTG Identifies the type of network to which the AWK-3131A-RTGs 255.255.255.0 WLAN interfaces WLAN interface is connected (e.g., 255.255.0.0 for a Class B subnet mask network, or 255.255.255.0 for a Class C network). WLAN gateway Setting Description Factory Default AWK-3131A-RTG The IP address of the router that connects the WLAN to an None WLAN interfaces outside network. default gateway Primary/Secondary DNS server Setting Description Factory Default IP address of the The IP address of the DNS Server used by your network. After None Primary/Secondary entering the DNS Servers IP address, you can input the DNS server AWK-3131A-RTGs URL (e.g., http://ap11.abc.com) in your browsers address field instead of entering the IP address. The Secondary DNS server will be used if the Primary DNS server fails to connect. LAN IP address Setting Description Factory Default AWK-3131A-RTG LAN Identifies the AWK-3131A-RTG LAN interfaces IP address on a 192.168.127.253 interfaces IP address TCP/IP network. LAN subnet mask Setting Description Factory Default AWK-3131A-RTG LAN Identifies the type of network to which the AWK-3131A-RTGs 255.255.255.0 interfaces subnet mask LAN interface is connected (e.g., 255.255.0.0 for a Class B network, or 255.255.255.0 for a Class C network). Time Settings The AWK-3131A-RTG has a time calibration function that can update the date and time information based on an NTP server or the date and time information specified by the user. 3-8 AWK-3131A-RTG UM Web Console Configuration The Current local time shows the AWK-3131A-RTGs system time when you open this web page. After you update the date and time setting, click on the Set Time button to activate the new date and time. An
(Updated) string is displayed next to the date and time fields to indicate that the change is complete. Any change in the date and time setting is effective immediately and does not need a system restart. NOTE The AWK-3131A-RTG has a built-in real time clock (RTC). The RTC is a computer clock (most often in the form of an integrated circuit) that keeps track of the current time. We strongly recommend that users update the Time Settings of the AWK-3131A-RTG after the initial setup is complete or when the AWK-3131A-RTG is switched on after a long-term shutdown, especially if the network does not have an Internet connection for accessing a NTP server or there is no NTP server on the LAN. Current local time Setting Description Factory Default User-specified date and The date and time parameters allow configuration of the local None time time with immediate activation. Use 24-hour format: yyyy/mm/dd hh:mm:ss Time zone Setting Description Factory Default User-specified time The time zone setting allows the conversion from GMT GMT zone
(Greenwich Mean Time) to the local time. ATTENTION Changing the time zone will automatically adjust the Current local time. You should configure the Time zone before setting the Current local time. Daylight saving time Setting Description Factory Default Enable/ Disable Daylight saving time (also known as DST or summer time) Disable involves advancing clocks (usually 1 hour) during the summer time to provide an extra hour of daylight in the afternoon. When Daylight saving time is enabled, the following parameters will be shown:
Starts at: The date that daylight saving time begins. Stops at: The date that daylight saving time ends. Time offset: Indicates the number of hours the clock should be advanced. Time server 1/2 Setting Description Factory Default IP address of the name of IP address or domain name of the NTP time server. The time.nist.gov the Time Server 1/2 second NTP server will be used if the first NTP server fails to 3-9 AWK-3131A-RTG UM Web Console Configuration connect. Query period Setting Description Factory Default The query period to sync This parameter determines how often the time is updated 600 (seconds) with the time server from the NTP server.
(1 to 9999 seconds) Wireless Settings The essential settings for wireless networks are presented in the wireless settings function group. You must configure these settings correctly before you establish your wireless network. Familiarize yourself with the following terms before starting the configuration process:
AP: In a wireless local area network (WLAN), an access point is a station that transmits and receives data. Client: When the AWK-3131A-RTG is configured for Client mode, it can be used as an Ethernet-to-wireless (or LAN-to-WLAN) network adapter. For example, a notebook computer equipped with an Ethernet adaptor but no wireless card can be connected to this device with an Ethernet cable to provide wireless connectivity to another AP. Operation Mode The AWK-3131A-RTG supports five main operation modesAP, Client, and Client-Router, each of which plays a distinct role on the wireless network. Wireless Enable Setting Description Factory Default Enable/Disable Use this function to turn the RF (Radio Frequency) module on or Enable off manually. NOTE: This function is available in AP operation mode only. Operation Mode Setting AP Description Factory Default The most common mode used by the AWK-3131A-RTG wherein AP 3-10 AWK-3131A-RTG UM Web Console Configuration Client it plays the role of a wireless AP In this mode, the AWK-3131A-RTG can connect to wireless AP devices Client-Router The AWK-3131A-RTG plays the role of a wireless client and a router. Sniffer Turns the device into a remote Wireshark interface to capture 802.11 packets for analysis. Sniffer Mode Instructions:
1. Set operation mode to Sniffer mode on the AWK-3131A-RTG and then save/reboot the device. 2. Connect the AWK-3131A-RTG to a laptop with Wireshark installed (v1.12.0 or later release) via Ethernet. 3. Add a remote interface by entering the IP address of the AWK-3131A-RTG. Detailed Wireshark instructions can be found at:
https://www.wireshark.org/docs/wsug_html_chunked/ChCapInterfaceRemoteSection.html 4. Start capturing 802.11 wireless packets with Wireshark. Basic Wireless Settings (Multiple SSID) You can add new SSIDs or edit existing ones in the WLAN Basic Setting Selection panel. You can configure up to 9 SSIDs for an AWK and configure each SSID differently. An SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access points on a network or sub-network can use the same SSIDs. All of the SSIDs that you configure for an AP are active at the same time. That is, client devices can use any of the SSIDs to associate with the AP. To create an SSID for your AWK, click on Add SSID. To edit an existing SSID and assign different configuration settings to it, click on the Edit button corresponding to the SSID. A configuration panel is displayed as follows:
3-11 AWK-3131A-RTG UM Web Console Configuration NOTE When you switch to Client mode, a Site Survey button will be available on the Basic Wireless Settings panel. Use the Site Survey function to view information about available APs, as shown in the following figures. You can also click on an SSID listed on the Site Survey page to bring the details of the SSID onto the Basic Wireless Settings page. To update the site survey table, click the Refresh button. If this client is connecting to an AP, a brief disconnection will occur when you click on Site Survey. RF type Setting 2.4 GHz B G Description Factory Default Only supports the IEEE 802.11b standard B/G/N Mixed Only supports the IEEE 802.11g standard 3-12 AWK-3131A-RTG UM Web Console Configuration B/G Mixed Supports IEEE 802.11b/g standards, but 802.11g might operate at a slower speed when 802.11b clients are on the network G/N Mixed Supports IEEE 802.11g/n standards, but 802.11n might operate at a slower speed if 802.11g clients are on the network B/G/N Mixed Supports IEEE 802.11b/g/n standards, but 802.11g/n might operate at a slower speed if 802.11b clients are on the network N Only (2.4GHz) Only supports the 2.4 GHz IEEE 802.11n standard 5 GHz A Only supports the IEEE 802.11a standard A/N Mixed Supports IEEE 802.11a/n standards, but 802.11n may operate N Only (5GHz) Only supports the 5 GHz IEEE 802.11n standard at a slower speed if 802.11a clients are on the network Channel (for AP mode only) Setting Description Factory Default The available channels The channel on which the AWK should operate. The 6 (in B/G/N Mixed vary with the RF type AWK-3131A-RTG plays the role of a wireless AP here. mode) setting Channel Width (for any 11N RF type only) Setting 20 MHz 20/40 MHz Channel bonding Description Select the channel width. Factory Default 20 MHz If you are not sure, use the 20/40 MHz (Auto) option If you have selected 20/40 MHz only in the Channel Width setting, this setting will automatically set the channel based on the Channel setting. SSID Setting Description Factory Default Maximum of 31 The SSID of a client and the SSID of the AP must be identical for MOXA characters the client and AP to be able to communicate with each other. SSID broadcast (for AP mode only) Setting Description Factory Default Enable/Disable Use this setting to specify if the SSID can be broadcast or not Enable Management frame encryption Setting Description Factory Default Enable/Disable Enables management frame encryption to protect your wireless Disable network from DoS attacks. This function only works with Moxa's TAP and AWK-RTG series. 50ms Turbo Roaming (controller-based) Setting Description Factory Default Enable/Disable Determines whether or not the AWK-3131A-RTG supports 50 Disable ms roaming. This function only works with the WAC-1001, WAC-2004, TAP, and AWK-RTG series. 3-13 AWK-3131A-RTG UM Web Console Configuration WLAN Security Settings The AWK-3131A-RTG provides four standardized wireless security modes: Open, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2. Several security modes are available in the AWK-3131A-RTG by selecting Security mode and WPA type:
Open: No authentication, no data encryption. WEP: Static WEP (Wired Equivalent Privacy) keys must be configured manually. WPA/WPA2-Personal: Also known as WPA/WPA2-PSK. You will need to specify the Pre-Shared Key in the Passphrase field, which will be used by the TKIP or AES engine as a master key to generate keys that actually encrypt outgoing packets and decrypt incoming packets. WPA/WPA2-Enterprise: Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication, WPA/WPA2-Enterprise enables user-based authentication via IEEE 802.1X. The AWK-3131A-RTG can support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP. Security mode Setting Description Open WEP WPA WPA2 Open No authentication Static WEP is used WPA is used Fully supports IEEE 802.11i with TKIP/AES + 802.1X Factory Default Open For security reasons, you should NOT set security mode to Open System, since authentication and data encryption are NOT performed in Open System mode. WEP (only for legacy mode) NOTE Moxa includes WEP security mode only for legacy purposes. WEP is highly insecure and is considered fully deprecated by the Wi-Fi alliance. We do not recommend the use of WEP security under any circumstances. According to the IEEE 802.11 standard, WEP can be used for authentication and data encryption to maintain confidentiality. Shared
(or Shared Key) authentication type is used if WEP authentication and data encryption are both needed. Normally, Open (or Open System) authentication type is used when WEP data encryption is run with authentication. When WEP is enabled as a security mode, the length of a key (so-called WEP seed) can be specified as 64/128 bits, which is actually a 40/104-bit secret key with a 24-bit initialization vector. The AWK-3131A-RTG provides 4 entities of WEP key settings that can be selected to use with Key index. 3-14 AWK-3131A-RTG UM Web Console Configuration The selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the wireless client side to the AP side. The WEP key can be presented in two Key types, HEX and ASCII. Each ASCII character has 8 bits, so a 40-bit
(or 64-bit) WEP key contains 5 characters, and a 104-bit (or 128-bit) key has 13 characters. In hex, each character uses 4 bits, so a 40-bit key has 10 hex characters, and a 128-bit key has 26 characters. Authentication type Setting Open Shared Description Factory Default Data encryption is enabled, but without authentication Open Data encryption and authentication are both enabled. Key type Setting HEX ASCII Key length Setting 64 bits 128 bits Key index Setting 1-4 WEP key 1-4 Description Factory Default Specifies WEP keys in hex-decimal number form HEX Specifies WEP keys in ASCII form Description Factory Default Uses 40-bit secret keys with 24-bit initialization vector 64 bits Uses 104-bit secret key with 24-bit initialization vector Description Specifies which WEP key is used Factory Default Open Setting Description Factory Default ASCII type:
A string that can be used as a WEP seed for the RC4 encryption None 64 bits: 5 chars engine. 128 bits: 13chars HEX type:
64 bits: 10 hex chars 128 bits: 26 hex chars WPA/WPA2-Personal WPA (Wi-Fi Protected Access) and WPA2 represent significant improvements over the WEP encryption method. WPA is a security standard based on 802.11i draft 3, while WPA2 is based on the fully ratified version of 802.11i. The initial vector is transmitted, encrypted, and enhanced with its 48 bits, twice as long as WEP. The key is regularly changed so that true session is secured. Even though AES encryption is only included in the WPA2 standard, it is widely available in the WPA security mode of some wireless APs and clients as well. The AWK-3131A-RTG also supports AES algorithms in WPA and WPA2 for better compatibility. Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as possible. There must be at least 8 ASCII characters in the Passphrase, and it could go up to 63. For security reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly. 3-15 AWK-3131A-RTG UM Web Console Configuration WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 Description Factory Default Temporal Key Integrity Protocol is enabled AES Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used.
** This option is only available with 802.11a/b/g standard
* This option is only available for legacy mode in APs and does not support AES-enabled clients. Passphrase Setting Description Factory Default 8 to 63 characters Master key to generate keys for encryption and decryption None Key renewal (for AP mode only) Setting Description 60 to 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 day) Factory Default 3600 (seconds) NOTE The key renewal value dictates how often the wireless AP encryption keys should be changed. The security level is generally higher if you set the key renewal value to a shorter number, which forces the encryption keys to be changed more frequently. The default value is 3600 seconds (6 minutes). Longer time periods can be considered if the line is not very busy. WPA/WPA2-Enterprise (for AP mode) By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or passphrases. 3-16 AWK-3131A-RTG UM Web Console Configuration WPA type Setting Personal Enterprise Encryption method Setting TKIP**
AES Mixed*
Description Factory Default Provides Pre-Shared Key-enabled WPA and WPA2 Personal Provides enterprise-level security for WPA and WPA2 Description Factory Default Temporal Key Integrity Protocol is enabled AES Advance Encryption System is enabled Provides TKIP broadcast key and TKIP+AES unicast key for some legacy AP clients. This option is rarely used.
** This option is only available with 802.11a/b/g standard
* This option is available only for legacy mode in APs and does not support AES-enabled clients. Primary/Secondary RADIUS server IP Setting Description Factory Default The IP address of Specifies the delegated RADIUS server for EAP None RADIUS server Primary/Secondary RADIUS port Setting Description Factory Default Port number Specifies the port number of the delegated RADIUS server 1812 Primary/ Secondary RADIUS shared key Setting Description Factory Default Max. of 31 characters The secret key shared between AP and RADIUS server None Key renewal Setting Description 60 to 86400 seconds Specifies the time period of group key renewal
(1 minute to 1 day) Factory Default 3600 (seconds) 3-17 AWK-3131A-RTG UM Web Console Configuration WPA/WPA2-Enterprise (for Client/Client-Router mode) When used as a client, the AWK-3131A-RTG can support three EAP methods (or EAP protocols): EAP-TLS, EAP-TTLS, and EAP-PEAP, corresponding to WPA/WPA-Enterprise settings on the AP side. Encryption method Setting TKIP**
AES Description Factory Default Temporal Key Integrity Protocol is enabled TKIP Advance Encryption System is enabled
**This option is only available with 802.11a/b/g standard. EAP protocol Setting Description Factory Default TLS TTLS PEAP Specifies Transport Layer Security protocol TLS Specifies Tunneled Transport Layer Security Specifies Protected Extensible Authentication Protocol, or Protected EAP Before choosing the EAP protocol for your WPA/WPA2-Enterpise settings on the client end, please contact the network administrator to make sure the system supports the protocol on the AP end. Detailed information on these three popular EAP protocols is presented in the following sections. EAP-TLS TLS is the standards-based successor to Secure Socket Layer (SSL). It can establish a trusted communication channel over a distrusted network. TLS provides mutual authentication through certificate exchange. EAP-TLS is also secure to use. You are required to submit a digital certificate to the authentication server for validation, but the authentication server must also supply a certificate. You can use Basic WLAN Setup WLAN Certificate Settings to import your WLAN certificate and enable EAP-TLS on the client end. 3-18 AWK-3131A-RTG UM Web Console Configuration You can check the current certificate status in Current Status if it is available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired EAP-TTLS It is usually much easier to re-use existing authentication systems, such as a Windows domain or Active Directory, LDAP directory, or Kerberos realm, rather than creating a parallel authentication system. As a result, TTLS (Tunneled TLS) and PEAP (Protected EAP) are used to support the use of so-called legacy authentication methods. TTLS and PEAP work in a similar way. First, they establish a TLS tunnel (EAP-TLS for example), and validate whether the network is trustworthy with digital certificates on the authentication server. This step establishes a tunnel that protects the next step (or inner authentication), and consequently is sometimes referred to as outer authentication. The TLS tunnel is then used to encrypt an older authentication protocol that authenticates the user for the network. As you can see, digital certificates are still needed for outer authentication in a simplified form. Only a small number of certificates are required, which can be generated by a small certificate authority. Certificate reduction makes TTLS and PEAP much more popular than EAP-TLS. The AWK-3131A-RTG provides some non-cryptographic EAP methods, including PAP, CHAP, MS-CHAP, and MS-CHAP-V2. These EAP methods are not recommended for direct use on wireless networks. However, they may be useful as inner authentication methods with TTLS and PEAP. 3-19 AWK-3131A-RTG UM Web Console Configuration Because the inner and outer authentications can use distinct user names in TTLS and PEAP, you can use an anonymous user name for the outer authentication, with the true user name only shown through the encrypted channel. Keep in mind that not all client software supports anonymous alteration. Confirm this with the network administrator before you enable identity hiding in TTLS and PEAP. TTL inner authentication Setting PAP CHAP MS-CHAP Description Password Authentication Protocol is used Challenge Handshake Authentication Protocol is used Microsoft CHAP is used MS-CHAP-V2 Microsoft CHAP version 2 is used Factory Default MS-CHAP-V2 Anonymous Setting Description Factory Default Max. of 31 characters A distinct name used for outer authentication None User name & Password Setting PEAP Description Factory Default User name and password used in inner authentication None There are a few differences in the TTLS and PEAP inner authentication procedures. TTLS uses the encrypted channel to exchange attribute-value pairs (AVPs), while PEAP uses the encrypted channel to start a second EAP exchange inside of the tunnel. The AWK-3131A-RTG provides MS-CHAP-V2 merely as an EAP method for inner authentication. Inner EAP protocol Setting Description MS-CHAP-V2 Microsoft CHAP version 2 is used Factory Default MS-CHAP-V2 3-20 AWK-3131A-RTG UM Web Console Configuration Anonymous Setting Description Factory Default Max. of 31 characters A distinct name used for outer authentication None User name & Password Setting Description Factory Default User name and password used in inner authentication None Advanced Wireless Settings Additional wireless-related parameters are presented in this section to help you set up your wireless network in detail. Transmission Rate (for A, B, G, B/G mixed, and N modes only) Setting Auto Description Factory Default The AWK-3131A-RTG senses and adjusts the data rate Auto Available rates Users can manually select a target transmission data rate automatically Multicast Rate (for AP mode only) Setting Description Factory Default Multicast rate You can set a fixed multicast rate for the transmission of 6M
(6M ~ 54M) broadcast and multicast packets on a per-radio basis. This parameter can be useful in an environment where multicast video streaming is occurring in the wireless medium, provided that the wireless clients are capable of handling the configured rate. Guard Interval Setting Description Factory Default Guard Interval Guard interval is used to ensure that distinct transmissions do 800 ns. 3-21 AWK-3131A-RTG UM Web Console Configuration not interfere with one another. You can select the guard interval manually for Wireless-N connections. The two options are Short (400 ns) and Long (800 ns). NOTE: This function can be modified in N mode only. Maximum transmission power Setting Description Factory Default Available Power Users can manually select a target power to mask max output 12 dBm power. Because different transmission rates might have their
(-1 dBm/MHz) own max output power, please reference product datasheet. The available setting is from 3 to 26. dBm/MHz: The density of transmission power in channel width. NOTE Most countries define a limit for the Equivalent Isotropically Radiated Power (EIRP) for an RF transmitting system. The EIRP should not exceed the allowed value. EIRP = transmission power + antenna gain (dBi). NOTE Transmission power indicates the maximum value of transmission power which the user plans. However, the real transmitted power depends on the radio module and some facts, such as country, regulatory limitations and data rate. Please check the Transmission power in Status > Wireless Status for a real and updated value of transmission power, which the AWK is currently using. You can refer to the related glossaries in the reference section for detailed information about the above-mentioned settings. By setting these parameters properly, you can better tune the performance of your wireless network. Beacon Interval (for AP mode only) Setting Description Factory Default Beacon Interval Indicates the frequency interval of the beacon 100 (ms)
(40 to 1000 ms) DTIM Interval (for AP mode only) Setting Description Factory Default Data Beacon Rate Indicates how often the AWK-3131A-RTG sends out a Delivery 1
(1 to 15) Traffic Indication Message Fragmentation threshold Setting Description Factory Default Fragment Length Specifies the maximum size a data packet before splitting and 2346
(256 to 2346) creating another new packet RTS threshold Setting Description Factory Default RTS/CTS Threshold Determines how large a packet can be before the Access Point 2346
(256 to 2346) coordinates transmission and reception to ensure efficient communication Antenna Setting A/B/Both Description Factory Default Specifies the output antenna port. Setting Antenna to Auto Both allows 2x2 MIMO communication under 802.11n and 2T2R*
3-22 AWK-3131A-RTG UM Web Console Configuration communication in legacy 802.11a/b/g modes.
*Note: Different from 802.11ns multiple spatial data stream (2x2 MIMO), which doubles the throughput, 2T2R is transmits/receives the same piece of data on both antenna ports. WMM Setting Description Factory Default Enable/Disable WMM is a QoS standard for WLAN traffic. Voice and video data Disable will be given priority bandwidth when enabled with WMM supported wireless clients. NOTE: This setting can be enabled/disabled only in A, B, and B/G Mixed modes. For N, G/N Mixed, B/G/N Mixed, and A/N Mixed modes, this setting is enabled by default. READ THIS BEFORE CHANGING THE DFS SETTING DFS (Dynamic Frequency Selection) is a mechanism to allow unlicensed wireless devices to share spectrum with existing radar systems by detecting radar systems and avoid causing interference with them. Roaming Priority (Only for AP mode) Setting Priority 1/2 Description Factory Default The roaming priority should be set based on how the radios are Priority 2 deployed along the trackside. Priority 1: radios along the trackside are deployed with open air radiating antennas. Priority 2: radios along the trackside are deployed with leaky feeder like coverage patterns. Due to the differences in coverage patterns between different deployment scenarios, the roaming priority you select will impact roaming performance. AeroLink Protection (Only for Client mode) Setting Description Factory Default Disable/L2/L3 Enable AeroLink Protection to allow wireless clients on the Disabled same LAN network to automatically negotiate with each other and form a redundant wireless communication. For more details, see Status AeroLink Protection Status. Select L2 for roaming on an L2 trackside network. Select L3 for roaming on an L3 trackside network. When L3 is selected, Virtual LAN IP and Virtual WLAN IP are shown as additional setting parameters. 3-23 AWK-3131A-RTG UM Web Console Configuration Virtual LAN IP: This IP should be defined as the gateway IP for onboard devices so that all incoming and outgoing traffic can be routed properly via this common IP in case of any role changes of the onboard clients. All AeroLink protected clients within the same subnet need to be configured with the same virtual LAN IP. Virtual WLAN IP: This IP should be defined as the virtual gateway IP for the wayside router, which can route traffic to any onboard client regardless of the clients home WAC. This IP only needs to be configured when different clients have to backup each other while the clients are registered to different WAC units. For the router to work properly, all clients and the wayside router will need to be configured to have this routing rule (i.e., to use this virtual WLAN IP). How AeroLink Protection Works In vehicle-to-ground applications, it is essential to minimize system downtime and maximize system availability of the train-to-ground link to ensure proper communication. Moxas AeroLink Protection provides a reliable wireless network-level redundancy protocol to ensure that there will always be a live onboard-to-ground link, even when failures occur:
1. Communication Failover: AeroLink Protection members can negotiate with each other to automatically elect an Active node for data communication. If the Active node is no longer capable of sending data across to its access point, it will inform other Backup nodes to resume the communication via another path. 2. Frequency-Interference Failover: This concept is similar to Communication Failover. If the communication frequency is interfered with and data can no longer be transmitted over the current active frequency, the connection is resumed via a backup frequency. 3. Device Failover: After handling communication and frequency failures, in order to provide a wireless network free of single points of failure, AeroLink Protection also checks the device status. If the Active node has a power failure, the Backup nodes will automatically resume the wireless communication. 4. Scalable: AeroLink Protection is designed to allow multiple backup paths, making it possible for users to realize a complete redundant wireless network free from all the above failure types. 5. Fast Recovery: In addition to maintaining a redundant wireless network, providing uninterrupted communication when a failure occurs is equally important. AeroLink Protection is designed to recover from a failure in under 300 ms. NOTE When you enable the AeroLink Protection function, management packets will be broadcast every 10 ms so that the devices can negotiate with each other. If these broadcast packets are overwhelming your network, you can disable this function Turbo Roaming Setting Description Factory Default Enable/ Disable Moxas Turbo Roaming can enable rapid handover when the Disable AWK-3131A-RTG, as a client or client-router, roams among a group of APs. 3-24 AWK-3131A-RTG UM Web Console Configuration When Turbo Roaming is enabled, Turbo Roaming type, RF type, Dual link option, and Scan channels will be shown as follows. There are two options available for Turbo Roaming type; 50ms (controller-based) that only works with the RTG version of the access point and the WAC-1001 and WAC-2004, and 150ms
(client-based) that supports all brands of AP. Dual link reduces the packet-loss rate when roaming between difference APs; this function only works with a single channel roaming structure. The RF type shows the current RF type that this client is using. There are three Scan channels available. Note that the Scan channels may need to be modified when the RF type is changed. (For example, channel 36 is not available in B, G, or B/G Mix mode.) If you set Turbo Roaming type to 150ms (client-based), three additional roaming parameters, Roaming threshold, Roaming difference and AP alive check for 802.11b/g (or b/a) are shown as follows:
Roaming Parameters Setting Description Factory Default Roaming threshold When the current RSSI value is lower than the roaming
-75 Roaming difference When the RSSI of a candidate AP is greater than the current 7 threshold, the client will start the roaming process. RSSI value plus the roaming difference, the client will roam to this new candidate AP. AP alive check When AP alive check is enabled, the client will actively send
-82 alive-check packets over the wireless network; APs who receive the packets will respond to indicate that they are currently available. By doing this, the client can maintain a ready list of available APs, and then quickly hand over to a new AP once it loses contact with the AP it is currently connected to. 3-25 AWK-3131A-RTG UM Web Console Configuration Roaming Threshold Concept T1 = Probing for new AP candidate to connect (background scan) T2 = At this point is when the roaming difference conditions are met and the client will initiate the roaming T3 = At this point the client has successfully roamed over to the new AP2 NOTE When 50 ms Turbo Roaming is enabled without using the WAC-1001 or WAC-2004, the connection between the AP and client will not work. WLAN Certification Settings (Only For EAP-TLS in Client Mode) When EAP-TLS is used, a WLAN Certificate will be required at the client end to support WPA/WPA2-Enterprise. The AWK-3131A-RTG can support the PKCS #12, also known as Personal Information Exchange Syntax Standard, certificate formats that define file formats commonly used to store private keys with accompanying public key certificates, protected with a password-based symmetric key. Current Status displays information for the current WLAN certificate, which has been imported into the AWK-3131A-RTG. Nothing will be shown if a certificate is not available. Certificate issued to: Shows the certificate user Certificate issued by: Shows the certificate issuer Certificate expiration date: Indicates when the certificate has expired You can import a new WLAN certificate in Import WLAN Certificate by following these steps, in order:
1. Input the corresponding password (or key) in the Certificate private password field and then click Submit to set the password. 2. The password will be displayed in the Certificate private password field. Click on the Browse button in Select certificate/key file and select the certificate file. 3-26 AWK-3131A-RTG UM Web Console Configuration 3. Click Upload Certificate File to import the certificate file. If the import succeeds, you can see the information uploaded in Current Certificate. If it fails, you may need to return to step 1 to set the password correctly and then import the certificate file again. NOTE The WLAN certificate will remain after the AWK-3131A-RTG reboots. Even though it has expired, it can still be seen on the Current Certificate. WAC Settings (AP Mode Only) Controller-based Turbo Roaming function is automatically enabled when you enable the 50ms Turbo Roaming (controller-based) option on the Wireless Settings > WLAN > Basic Wireless Settings > Edit page. The Primary WAC IP address, Backup WAC IP address, and Roaming domain fields are displayed. Primary WAC IP address Setting IP address Description Factory Default Enter the IP address of the primary WAC-1001 or WAC-2004 None Backup WAC IP address Setting IP address Description Factory Default Enter the IP address of the backup WAC-1001 or WAC-2004 None Primary WAC IP address Setting Description Factory Default 6 Hex characters Specifies the area served by the WAC-1001 or WAC-2004. All None related controllers, APs, and clients use this IP address as identification to work and communicate with each other. Advanced Settings Several advanced functions are available to increase the functionality of your AWK-3131A-RTG and wireless network system. A VLAN is a collection of clients and hosts grouped together as if they were connected to the broadcast domains in a layer-2 network. The DHCP server helps you deploy wireless clients efficiently. Packet filters provide security mechanisms, such as firewalls, in different network layers. Moreover, the 3-27 AWK-3131A-RTG UM Web Console Configuration AWK-3131A-RTG can support STP/RSTP protocol to increase reliability across the entire network, and SNMP support can make network management easier. Using Virtual LAN Setting up Virtual LANs (VLANs) on your AWK series increases the efficiency of your network by dividing the LAN into logical segments, as opposed to physical segments. In general, VLANs are easier to manage. The Virtual LAN (VLAN) Concept What is a VLAN?
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs now extend as far as the reach of the access point signal. Clients can be segmented into wireless sub-networks via SSID and VLAN assignment. A Client can access the network by connecting to an AP configured to support its assigned SSID/VLAN. Benefits of VLANs VLANs are used to conveniently, efficiently, and easily manage your network in the following ways:
Manage adds, moves, and changes from a single point of contact Define and monitor groups Reduce broadcast and multicast traffic to unnecessary destinations Improve network performance and reduce latency Increase security Secure network restricts members to resources on their own VLAN Clients roam without compromising security VLAN Workgroups and Traffic Management The AP assigns clients to a VLAN based on a Network Name (SSID). The AP can support up to 9 SSIDs per radio interface, with a unique VLAN configurable per SSID. The AP matches packets transmitted or received to a network name with the associated VLAN. Traffic received by a VLAN is only sent on the wireless interface associated with that same VLAN. This eliminates unnecessary traffic on the wireless LAN, conserving bandwidth and maximizing throughput. In addition to enhancing wireless traffic management, the VLAN-capable AP supports easy assignment of wireless users to workgroups. In a typical scenario, each user VLAN represents a department workgroup; for example, one VLAN could be used for a marketing department and the other for a human resource department. In this scenario, the AP would assign every packet it accepted to a VLAN. Each packet would then be identified as marketing or human resource, depending on which wireless client received it. The AP would insert VLAN headers or tags with identifiers into the packets transmitted on the wired backbone to a network switch. 3-28 AWK-3131A-RTG UM Web Console Configuration Finally, the switch would be configured to route packets from the marketing department to the appropriate corporate resources such as printers and servers. Packets from the human resource department could be restricted to a gateway that allowed access to only the Internet. A member of the human resource department could send and receive e-mail and access the Internet, but would be prevented from accessing servers or hosts on the local corporate network. Configuring Virtual LAN VLAN Settings To configure the AWKs VLAN, use the VLAN Setting page to configure the ports. Management VLAN ID Setting VLAN ID ranges from 1 to 4094 Port Type LAN WLAN Port PVID Setting Description Factory Default Set the management VLAN of this AWK. 1 Description This port is the LAN port on the AWK. Trunk Port Yes This is a wireless port for the specific SSID. This field will refer to the SSID that you have created. If more SSIDs have been created, new rows will be added. Description Factory Default VLAN ID ranging from 1 Set the ports VLAN ID for devices that connect to the port. The 1 to 4094 port can be a LAN port or WLAN ports. VLAN Tagged Setting Description Factory Default A comma-separated list Specify which VLANs can communicate with this specific VLAN. (Empty) of VLAN IDs. Each of the VLAN IDs range from 1 to 4094. For example: 1,2,3,4. 3-29 AWK-3131A-RTG UM Web Console Configuration NOTE The VLAN feature can allow wireless clients to manage the AP. If the VLAN Management ID matches a VLAN ID, then those wireless clients who are members of that VLAN will have AP management access. CAUTION: Once a VLAN Management ID is configured and is equivalent to one of the VLAN IDs on the AP, all members of that User VLAN will have management access to the AP. Be careful to restrict VLAN membership to those with legitimate access to the AP. DHCP Server DHCP (Dynamic Host Configuration Protocol) is a networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses. The AWK-3131A-RTG can act as a simplified DHCP server and easily assign IP addresses to your DHCP clients by responding to the DHCP requests from the client ends. The IP-related parameters you set on this page will also be sent to the client. You can also assign a static IP address to a specific client by entering its MAC address. The AWK-3131A-RTG provides a Static DHCP mapping list with up to 16 entities. Be reminded to check the Active check box for each entity to activate the setting. You can check the IP assignment status under Status DHCP Client List. DHCP server Setting Enable Disable Default gateway Description Factory Default Enables AWK-3131A-RTG as a DHCP server Disable Disable DHCP server function Setting Description Factory Default IP address of a default The IP address of the router that connects to an outside None gateway network 3-30 AWK-3131A-RTG UM Web Console Configuration Subnet mask Setting Description Factory Default subnet mask Identifies the type of sub-network (e.g., 255.255.0.0 for a None Class B network, or 255.255.255.0 for a Class C network) Primary/ Secondary DNS server Setting Description Factory Default IP address of Primary/
The IP address of the DNS Server used by your network. After None Secondary DNS server entering the DNS Servers IP address, you can use URL as well. The Secondary DNS server will be used if the Primary DNS server fails to connect. Start IP address Setting IP address Description Factory Default Indicates the IP address which AWK-3131A-RTG can start None assigning Maximum number of users Setting Description Factory Default 1128 users Specifies how many IP address can be assigned continuously None Client lease time Setting Description Factory Default 5-1440 minutes The lease time for which an IP address is assigned. The IP 5 (minutes) address may go expired after the lease time is reached. Packet Filters The AWK-3131A-RTG includes various filters for IP-based packets going through LAN and WLAN interfaces. You can set these filters as a firewall to help enhance network security. MAC Filter The AWK-3131A-RTGs MAC filter is a policy-based filter that can allow or filter out IP-based packets with specified MAC addresses. The AWK-3131A-RTG provides 8 entities for setting MAC addresses in your filtering policy. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables MAC filter Disables MAC filter Factory Default Disable Description Factory Default Only the packets fitting the entities on list can be allowed. Drop Any packet fitting the entities on list will be denied. 3-31 AWK-3131A-RTG UM Web Console Configuration ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied IP Protocol Filter The AWK-3131A-RTGs IP protocol filter is a policy-based filter that can allow or filter out IP-based packets with specified IP protocol and source/destination IP addresses. The AWK-3131A-RTG provides 8 entities for setting IP protocol and source/destination IP addresses in your filtering policy. Four IP protocols are available: All, ICMP, TCP, and UDP. You must specify either the Source IP or the Destination IP. By combining IP addresses and netmasks, you can specify a single IP address or a range of IP addresses to accept or drop. For example, IP address 192.168.1.1 and netmask 255.255.255.255 refers to the sole IP address 192.168.1.1. IP address 192.168.1.1 and netmask 255.255.255.0 refers to the range of IP addresses from 192.168.1.1 to 192.168.1.255. Remember to check the Active check box for each entity to activate the setting. Enable Setting Enable Disable Policy Setting Accept Drop Description Enables IP protocol filter Disables IP protocol filter Factory Default Disable Description Factory Default Only the packets fitting the entities on the list can be allowed Drop Any packet fitting the entities on the list will be denied ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed. Accept + no entity on list is activated = all packets are denied. TCP/UDP Port Filter The AWK-3131A-RTGs TCP/UDP port filter is a policy-based filter that can allow or filter out TCP/UDP-based packets with a specified source or destination port. The AWK-3131A-RTG provides 8 entities for setting the range of source/destination ports of a specific protocol. In addition to selecting TCP or UDP protocol, you can set either the source port, destination port, or both. The end port can be left empty if only a single port is specified. Of course, the end port cannot be larger than the start port. The Application name is a text string that describes the corresponding entity with up to 31 characters. Remember to check the Active check box for each entity to activate the setting. 3-32 AWK-3131A-RTG UM Web Console Configuration Enable Setting Enable Disable Policy Setting Accept Drop Description Enables the TCP/UDP port filter Disables the TCP/UDP port filter Factory Default Disable Description Factory Default Only the packets fitting the entities on list can be allowed. Drop Any packet fitting the entities on list will be denied. ATTENTION Be careful when you enable the filter function:
Drop + no entity on list is activated = all packets are allowed Accept + no entity on list is activated = all packets are denied Static Route (For Client-Router Mode Only) The Static Routing page is used to configure AWK-3131A-RTGs static routing table. Active Click the checkbox to enable Static Routing. Destination You can specify the destination IP address. Netmask This option is used to specify the subnet mask for this IP address. Gateway The IP address of the router that connects the LAN to an external network. Metric Use this option to specify a cost for accessing the neighboring network. Interface You can select which interface does your routing rules would be set. 3-33 AWK-3131A-RTG UM Web Console Configuration 3-34 AWK-3131A-RTG UM Web Console Configuration NAT Settings/Port Forwarding (For Client-Router Mode Only) Network Address Translation (NAT)or more specifically, one-to-many NAT, NAPT, or PATis supported to facilitate the Client-Router operation mode. This feature translates the out-going communication from multiple private IPs to a single external IP (WLAN IP) with randomly assigned port for return traffic. Port Forwarding is needed to allow external devices to initiate communication. Port Forwarding specifies a static map between external ports (WAN Port) and internal IP/port combos (LAN IP/LAN Port) Enabling NAT and Port Forwarding provides the following benefits:
Uses the NAT function to hide the Internal IP address of a critical network or device to increase the level of security of industrial network applications. Uses the same private IP address for different, but identical, groups of Ethernet devices. For example, 1-to-1 NAT makes it easy to duplicate or extend identical production lines 3-35 AWK-3131A-RTG UM Web Console Configuration Factory Default Disable NAT Setting Description Enable/Disable Enables or disables the NAT translation Port Forwarding Active: Click the checkbox to enable Port Forwarding rule(s). Protocol: Specifies the communication protocol. WAN Port: Specifies the external port to be forwarded to. LAN IP: Specifies the forward to LAN IP. LAN Port: Specifies the forward to LAN Port. SNMP Agent The AWK-3131A-RTG supports SNMP V1/V2c/V3. SNMP V1 and SNMP V2c use a community string match for authentication, which means that SNMP servers access all objects with read-only or read/write permissions using the community string public/private (default value). SNMP V3, which requires you to select an authentication level of MD5 or SHA, is the most secure protocol. You can also enable data encryption to enhance data security. The AWK-3131A-RTGs MIB can be found in the software CD and supports reading the attributes via SNMP.
(Only get method is supported.) SNMP security modes and security levels supported by the AWK-3131A-RTG are shown in the following table. Select the security mode and level that will be used to communicate between the SNMP agent and manager. Protocol Setting on Authentication Data Method Version UI web page Type Encryption SNMP V1, V2c Community string No Use a community string match for V1, V2c Read Community authentication V1, V2c Community string No Use a community string match for Write/Read Community authentication SNMP V3 No-Auth No No Use account with admin or user to access objects MD5 or SHA Authentication No Provides authentication based on HMAC-MD5, based on MD5 or or HMAC-SHA algorithms. 8-character SHA passwords are the minimum requirement for authentication. MD5 or SHA Authentication Data Provides authentication based on HMAC-MD5 based on MD5 or encryption or HMAC-SHA algorithms, and data encryption SHA key key. 8-character passwords and a data encryption key are the minimum requirements for authentication and encryption. The following parameters can be configured on the SNMP Agent page. A more detailed explanation of each parameter is given below:
3-36 AWK-3131A-RTG UM Web Console Configuration Enable Setting Enable Disable Remote Management Setting Enable Disable Description Enables SNMP Agent Disables SNMP Agent Factory Default Disable Description Factory Default Allow remote management via SNMP agent Disable Disallow remote management via SNMP agent Read community (for V1, V2c) Setting Description Factory Default V1, V2c Read Use a community string match with a maximum of 31 public Community characters for authentication. This means that the SNMP agent can access all objects with read-only permissions using this community string. Write community (for V1, V2c) Setting Description Factory Default V1, V2c Read /Write Use a community string match with a maximum of 31 private Community characters for authentication. This means that the SNMP agent can accesses all objects with read/write permissions using this community string. SNMP agent version Setting Description Factory Default V1, V2c, V3, or Select the SNMP protocol version used to manage the switch. V1, V2c V1, V2c, or V3 only Admin auth type (for V1, V2c, V3, and V3 only) Setting No Auth MD5 Description Factory Default Use admin account to access objects. No authentication No Auth Provide authentication based on the HMAC-MD5 algorithms. 8-character passwords are the minimum requirement for authentication. SHA Provides authentication based on HMAC-SHA algorithms. 8-character passwords are the minimum requirement for authentication. 3-37 AWK-3131A-RTG UM Web Console Configuration Admin private key (for V1, V2c, V3, and V3 only) Setting Disable DES AES Private key Description No data encryption DES-based data encryption AES-based data encryption Factory Default Disable A data encryption key is the minimum requirement for data encryption (maximum of 63 characters) Private MIB Information Device Object ID Also known as the OID, this is the AWK-3131A-RTGs enterprise value and is a fixed value. Mobile IP Settings The mobile IP technology enables the AWK-3131A-RTG to roam between Layer 3 networks with a roaming break time less than 50 ms. When the AWK-3131A-RTG is in client/client router mode, it is a mobile node (MN) that is able to roam across different subnets without changing its IP address. Mobile IP Topology Example:
Terminology Description Mobile Node (MN) A host or router that changes its location from one network to another. Home network The network within which the MN receives its identifying IP address (home address) Home address The IP address assigned to the MN within its home network Foreign network The network in which an MN is operating when away from its home network Home agent (HA) A router on the home network that provides services to the MN. The home agent intercepts packets sent to the MN within the home network, encapsulates them, and then tunnels them to the MN. Correspondent Node (CN) A peer with which a mobile node is communicating Co-located Care-of Address The new IP address of the MN when operating on a foreign network.
(CCoA) Binding The association of the home address with a CCoA 3-38 AWK-3131A-RTG UM Web Console Configuration Setting Mobile IP Description Factory Default Enable/disable mobile IP capability of the client (mobile node) Disable Subnet Binding Define a subnet of devices connected behind the client (MN) so Disable for L3 controller based roaming that data will be forwarded to the corresponding device subnets. Proper IP planning is required to avoid configuring the subnet binding IP to limit access to the AWK. Note that when the Mobile IP is enabled, the corresponding AP and WAC (HA) controller will also need to be configured properly (with 50 ms roaming enabled) to ensure correct operation of the L3 roaming network. Link Fault Pass-Through (For Client Mode Only) This function means if Ethernet port is link down, wireless connection will be forced to disconnect. Once Ethernet link is recovered, AWK will try to connect to AP. If wireless is disconnected, AWK restarts auto-negotiation on Ethernet port but always stays in the link failure state. Once the wireless connection is recovered, AWK will try to recover the Ethernet link. System log will indicate the link fault pass-through events in addition to the original link up/down events. Link Fault Pass-Through Setting Enable Disable Description Factory Default Enables the Link Fault Pass-Through function Disable Disables the Link Fault Pass-Through function 3-39 AWK-3131A-RTG UM Web Console Configuration Auto Warning Settings Since industrial-grade devices are often located at the endpoints of a system, these devices will not always know what is happening elsewhere on the network. This means that these devices, including wireless APs or clients, must provide system maintainers with real-time alarm messages. Even when system administrators are out of the control room for an extended period, they can still be informed of the status of devices almost instantaneously when exceptions occur. In addition to logging these events, the AWK-3131A-RTG supports different approaches to warn engineers automatically, such as SNMP trap and e-mail. It also supports two digital inputs to integrate sensors into your system to automate alarms by email. System Log System Log Event Types Detail information for grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). The log for system events can be seen in Status System Log. System-related events Event is triggered when System restart (warm start) The AWK-3131A-RTG is rebooted, such as when its settings are Network-related events Event is triggered when changed (IP address, subnet mask, etc.). LAN link on LAN link off The LAN port is connected to a device or network. The port is disconnected (e.g., the cable is pulled out, or the opposing device shuts down). Client joined/ left (for AP mode) A wireless client is associated or disassociated. WLAN connected to AP (for Client mode) The AWK-3131A-RTG is associated with an AP. WLAN disconnected (for Client mode) The AWK-3131A-RTG is disassociated from an AP. Config-related events Event is triggered when Configuration Changed A configuration item has been changed. Configuration file import via Web Console The configuration file is imported to the AWK-3131A-RTG. Console authentication failure An incorrect password is entered. Firmware upgraded Power events The AWK-3131A-RTGs firmware is updated. Event is triggered when Power 1/2 transition (On -> Off) The AWK-3131A-RTG is powered down in PWR1/2. PoE transition (On -> Off) The AWK-3131A-RTG is powered down in PoE. Power 1/2 transition (Off -> On) The AWK-3131A-RTG is powered via PWR1/2. PoE transition (Off -> On) The AWK-3131A-RTG is powered via PoE. DI events DI0/DI1 (On -> Off) DI0/DI1 (Off -> On) Event is triggered when Digital Input 0/1 is triggered by on-to-off transition. Digital Input 0/1 is triggered by off-to-on transition. 3-40 AWK-3131A-RTG UM Web Console Configuration Syslog This function provides the event logs for the Syslog server. The function supports up to three configurable Syslog servers and Syslog server UDP port numbers. When an event occurs, the event will be sent as a Syslog UDP packet to the specified Syslog servers. Syslog Event Types Detail information for the grouped events is shown in the following table. You can check the box for Enable log to enable the grouped events. All default values are enabled (checked). Details for each event group can be found on the System log Event Types table on page 3-31. NOTE The RSSI report events option is only supported in client mode. Syslog Server Settings You can configure the parameters for your Syslog servers in this page. Syslog server 1/ 2/ 3 Setting IP address Syslog port Description Factory Default Enter the IP address of the 1st/ 2nd/ 3rd Syslog Server None Setting Description Factory Default Port destination Enter the UDP port of the corresponding Syslog server 514
(1 to 65535) 3-41 AWK-3131A-RTG UM Web Console Configuration E-mail E-mail Event Types Check the box for Active to enable the event items. All default values are deactivated (unchecked). Details for each event item can be found on the System log Event Types table on page 3-31. E-mail Server Settings You can set up to 4 e-mail addresses to receive alarm emails from the AWK-3131A-RTG. The following parameters can be configured on the E-mail Server Settings page. In addition, a Send Test Mail button can be used to test whether the Mail server and e-mail addresses work well. More detailed explanations about these parameters are given after the following figure. Mail server (SMTP) Setting IP address Description The IP Address of your email server. Factory Default None 3-42 AWK-3131A-RTG UM Web Console Configuration User name & Password Setting Description Factory Default User name and password used in the SMTP server None From e-mail address Setting Description Factory Default Max. 63 characters Enter the administrators e-mail address which will be shown in None the From field of a warning e-mail. To E-mail address 1/ 2/ 3/ 4 Setting Description Factory Default Max. 63 characters Enter the receivers e-mail addresses. None Traps Traps can be used to signal abnormal conditions (notifications) to a management station. This trap-driven notification can make your network more efficient. Because a management station usually takes care of a large number of devices that have a large number of objects, it will be overloading for the management station to poll or send requests to query every object on every device. It would be better if the managed device agent could notify the management station by sending a message known as a trap for the event. Trap Event Types 3-43 AWK-3131A-RTG UM Web Console Configuration SNMP Trap Receiver Settings SNMP traps are defined in SMIv1 MIBs (SNMPv1) and SMIv2 MIBs (SNMPv2c). The two styles are basically equivalent, and it is possible to convert between the two. You can set the parameters for SNMP trap receivers through the web page. 1st / 2nd Trap version Setting Description V1 V2 SNMP trap defined in SNMPv1 SNMP trap defined in SNMPv2 1st / 2nd Trap server IP/name Setting Description Factory Default V1 Factory Default IP address or host Enter the IP address or name of the trap server used by your None name network. 1st / 2nd Trap community Setting Description Factory Default Max. of 31 characters Use a community string match with a maximum of 31 alert characters for authentication. 3-44 AWK-3131A-RTG UM Web Console Configuration Status Wireless Status The status for 802.11 info parameters, such as Operation mode and Channel, are shown on the Wireless Status page. The status will refresh every 5 seconds if the Auto refresh box is checked. Depending on the operation mode, certain 802.11 info values may not be displayed. For example, the Current BSSID and Signal strength parameters are not available in the AP mode. It is helpful to use the continuously updated information on this page, such as Signal strength, to monitor the signal strength of the AWK-3131A-RTG in Client mode. The transmission power indicated is the current transmission power being updated periodically. Associated Client List (For AP Mode Only) Associated Client List shows all the clients that are currently associated to a particular AWK-3131A-RTG. You can click Select all to select all the content in the list for further editing. You can click Refresh to refresh the list. 3-45 AWK-3131A-RTG UM Web Console Configuration DHCP Client List The DHCP Client List shows all the clients that require and have successfully received IP assignments. You can click the Refresh button to refresh the list. You can press Select all button to select all content in the list for further editing. System Log Triggered events are recorded in System Log. You can export the log contents to an available viewer by clicking Export Log. You can use the Clear Log button to clear the log contents and the Refresh button to refresh the log. 3-46 AWK-3131A-RTG UM Web Console Configuration Relay Status The status of user-configurable events can be found under Relay Status. The status will refresh every 5 seconds if the Auto refresh box is checked. If an event is triggered, it will be noted on this list. System administrators can click Acknowledge Event when they have acknowledged the event and addressed it. DI and Power Status The status of power inputs and digital inputs is shown here. The status will refresh every 5 seconds if the Auto refresh box is checked. AeroLink Protection Status (For Client Mode Only) After enabling AeroLink Protection from the Advanced WLAN Setup panel, the following table shows the current state of the AeroLink Protection for easier diagnosis. An AeroLink Protection member could be in 1 or 7 different states:
Initiation State (Init): Initiates the AeroLink Protection Protocol. Discovering State (Discover): Discovers other AeroLink Protection members for further negotiation. Idle State (Idle): Internal protocol checkpoint. Negotiation State (Nego): Negotiates with other AeroLink Protection members and selects Active node. Backup State (Backup): After negotiation, this node is assigned as the Backup node. All traffic will pass through the Active node. NOTE: When a node is acting as a Backup node, the STATE LED for the node will blink to advertise this fact to nearby support engineers. Active State (Active): After negotiation, this node is assigned Active node status, which means that all traffic will pass through that node. 3-47 AWK-3131A-RTG UM Web Console Configuration Role Change State (Change): If the Active node is no longer capable of data transmission via the WLAN, the device will enter change state, which will result in the device going back to Nego state (likely becoming the Backup device since the active link is down). Routing Table The Routing Table page shows all routing entries. LAN Status The LAN Status page shows the LAN information, which includes speed, duplex, link status, and packet status. Maintenance Maintenance functions provide the administrator with tools to manage the AWK-3131A-RTG and wired/wireless networks. Console Settings You can enable or disable access permission for the following consoles: HTTP, HTTPS, Telnet, and SSH connections. For more security, we recommend you only allow access to the two secured consoles, HTTPS and SSH. 3-48 AWK-3131A-RTG UM Web Console Configuration Ping Ping helps to diagnose the integrity of wired or wireless networks. By inputting a nodes IP address in the Destination field, you can use the ping command to make sure it exists and whether or not the access path is available. If the node and access path are available, you will see that all packets were successfully transmitted with no loss. Otherwise, some, or even all, packets may get lost, as shown in the following figure. Firmware Upgrade The AWK-3131A-RTG can be enhanced with more value-added functions by installing firmware upgrades. The latest firmware is available at Moxas download center. Before running a firmware upgrade, make sure the AWK-3131A-RTG is off-line. Click the Browse button to specify the firmware image file and click Firmware Upgrade and Restart to start the firmware upgrade. After the progress bar reaches 100%, the AWK-3131A-RTG will reboot itself. When upgrading your firmware, the AWK-3131A-RTGs other functions are forbidden. ATTENTION Please make sure the power source is stable when you upgrade your firmware. An unexpected power breakup may damage your AWK-3131A-RTG. 3-49 AWK-3131A-RTG UM Web Console Configuration Config Import/Export You can back up and restore the AWK-3131A-RTGs configuration with Config Import and Config Export functions. In the Config Import section, click Browse to specify the configuration file and click on the Config Import button to begin importing the configuration. Downloading the Configuration from a TFTP Server You can download a configuration file from a TFTP server on to your AWK-3131A-RTG as follows:
1. Start your TFTP server. 2. Copy the AWK-3131A-RTG configuration file to a folder on the TFTP server. 3. On the AWK-3131A-RTG Config Import page, input your TFTP server IP and Configuration path. NOTE The configuration path is the path of the configuration file, which is a relative path. If your configuration file is already available in a folder on the TFTP server, you can leave this field blank. 4. Input your configuration File name with the filename extension or click on the Config Import button to browse to the file. Once the configuration downloads successful, you will see "TFTP import success" information on the web page. 5. Click Save and then Restart on the top-right side. You can also back up or restore the ABC-01 configuration with Config Import Export. 3-50 AWK-3131A-RTG UM Web Console Configuration You can also get the SNMP MIB file by clicking on MIB Export in the SNMP MIB file Export section. SNMP MIB file for AWK-3131A-RTG is embedded in the device. To export the MIB file, simply click on the MIB Export button and save it to your local drive. Load Factory Default Use this function to reset the AWK-3131A-RTG and roll all settings back to the factory or customized (using imported configuration file in the Default Config Import screen) default values. You can also reset the hardware by pressing the reset button on the bottom panel of the AWK-3131A-RTG. Username/Password You can change the administration username and password for each of the AWK-3131A-RTGs console managers by using the Username/Password function. Before you set up a new password, you must input the current password and reenter the new password for confirmation. For your security, do not use the default password moxa, and remember to change the administration password regularly. Locate Device The AP can be identified by a beeping sound and flashing LED when clicking on the start to locate button. To stop the beeping, click on the stop locating button. 3-51 AWK-3131A-RTG UM Web Console Configuration Misc. Settings Additional settings to help you manage your AWK-3131A-RTG are available on this page. Reset button Setting Description Factory Default Always enable The AWK-3131A-RTGs reset button works normally. Always enable Always disable The AWK-3131A-RTGs reset button will not work. Disable restore to default The AWK-3131A-RTGs reset to default function will be function after 60 sec inactive 60 seconds after the AWK-3131A-RTG finishes booting up. Save Configuration The following figure shows how the AWK-3131A-RTG stores the setting changes into volatile and non-volatile memory. All data stored in volatile memory will disappear when the AWK-3131A-RTG is shutdown or rebooted unless they are y. Because the AWK-3131A-RTG starts up and initializes with the settings stored in flash memory, all new changes must be saved to flash memory before restarting the AWK-3131A-RTG. This also means the new changes will not work unless you run either the Save Configuration function or the Restart function. After you click on Save Configuration in the left menu box, the following screen will appear. Click Save if you wish to update the configuration settings in the flash memory at this time. Alternatively, you may choose to run other functions and put off saving the configuration until later. However, the new setting changes will remain in the non-volatile memory until you save the configurations. 3-52 AWK-3131A-RTG UM Web Console Configuration Restart If you submitted configuration changes, you will find a blinking string in the upper right corner of the screen. After making all your changes, click the Restart function in the left menu box. One of two different screens will appear. If you made changes recently but did not save, you will be given two options. Clicking the Restart button here will reboot the AWK-3131A-RTG directly, and all setting changes will be ignored. Clicking the Save and Restart button will apply all setting changes and then reboot the AWK-3131A-RTG. If you run the Restart function without changing any configurations or saving all your changes, you will see just one Restart button on your screen. You will not be able to run any of the AWK-3131A-RTGs functions while the system is rebooting. Logout Logout helps users disconnect the current HTTP or HTTPS session and go to the Login page. For security reasons, we recommend you logout before quitting the console manager. 3-53 Software Installation and Configuration 4 The following topics are covered in this chapter:
Overview Wireless Search Utility Installing Wireless Search Utility Configuring Wireless Search Utility AWK-3131A-RTG UM Software Installation and Configuration Overview The Wireless Search Utility can be downloaded from the Moxa website at www.moxa.com. Wireless Search Utility Installing Wireless Search Utility Once the Wireless Search Utility is downloaded, run the setup executable to start the installation. 1. Click Next in the Welcome screen to proceed with the installation. 4-2 AWK-3131A-RTG UM Software Installation and Configuration 2. Click Next to install program files to the default directory, or click Browse to select an alternate location. 3. Click Next to install the programs shortcut files in the default directory, or click Browse to select an alternate location. 4-3 AWK-3131A-RTG UM Software Installation and Configuration 4. Click Next to select additional tasks. 5. Click Install to proceed with the installation. The installer then displays a summary of the installation options. 6. Click Install to begin the installation. The setup window will report the progress of the installation. To change the installation settings, click Back and navigate to the previous screen. 4-4 AWK-3131A-RTG UM Software Installation and Configuration 7. Click Finish to complete the installation of Wireless Search Utility. Configuring Wireless Search Utility The Broadcast Search function is used to locate all AWK-3131A-RTG APs that are connected to the same LAN as your computer. After locating the AWK-3131A-RTG, you will be able to change its IP address. Since the Broadcast Search function searches by UDP packets and not IP address, it doesnt matter if the AWK-3131A-RTG is configured as an AP or Client. In either case, APs and Clients connected to the LAN will be located, regardless of whether or not they are part of the same subnet as the host. 1. Start the Wireless Search Utility program. When the Login page appears, select the Device Search only option to search for AWKs and to view each AWKs configuration. Select the Device management option to assign IPs, upgrade firmware, and locate devices. 4-5 AWK-3131A-RTG UM Software Installation and Configuration 2. Open the Wireless Search Utility and then click the Search icon. 3. The Searching window indicates the progress of the search. When the search is complete, all AWKs that were located will be displayed in the Wireless Search Utility window. 4-6 AWK-3131A-RTG UM Software Installation and Configuration 4. Click Locate to cause the selected device to beep. 5. Make sure your AWK is unlocked before using the search utilitys icons setting. The AWK will unlock automatically if the password is set to the default. Otherwise you must enter the new password manually. 6. Go to Tools Login Options to manage and unlock additional AWKs. 4-7 AWK-3131A-RTG UM Software Installation and Configuration 7. Use the scroll down list to select the MAC addresses of those AWKs you would like to manage, and then click Add. Key in the password for the AWK device and then click OK to save. If you return to the search page and search for the AWK again, you will find that the AWK will unlock automatically. ATTENTION For security purposes, we suggest you can change the wireless search utility login password instead of using the default. To modify the configuration of the highlighted AWK, click on the Web icon to open the web console. This will take you to the web console, where you can make all configuration changes. Refer to Chapter 3, Using the Web Console, for information on how to use the web console. 4-8 AWK-3131A-RTG UM Software Installation and Configuration Click on Telnet if you would like to use telnet to configure your AWKs. Click Assign IP to change the IP setting. 4-9 AWK-3131A-RTG UM Software Installation and Configuration The three advanced optionsSearch, Connection, and Miscellaneousare explained below:
Search Retry count (default=5): Indicates how many times the search will be retried automatically. Retry interval (ms): The time elapsed between retries. Connection Connection timeout (secs): Use this option to set the waiting time for the Default Login, Locate, Assign IP, Upload Firmware, and Unlock to complete. Upgrade timeout (secs): Use this option to set the waiting time for the connection to disconnect while the firmware is upgrading. Use this option to set the waiting time for the Firmware to write to flash. 4-10 AWK-3131A-RTG UM Software Installation and Configuration Misc. Search on start: Checkmark this box if you would like the search function to start searching for devices after you log in to the Wireless Search Utility. 4-11 5 Using Other Consoles This chapter explains how to access the AWK-3131A-RTG for the first time. In addition to HTTP access, there are four ways to access the AWK-3131A-RTG: USB console, Telnet console, SSH console, and HTTPS console. The USB console connection method, which requires using a short USB cable to connect the AWK-3131A-RTG to a PCs COM port, can be used if you do not know the AWK-3131A-RTGs IP address. The other consoles can be used to access the AWK-3131A-RTG over an Ethernet LAN, or over the Internet. The following topics are covered in this chapter:
USB Console Configuration (115200, None, 8, 1, VT100) Configuration via Telnet and SSH Consoles Configuration by Web Browser with HTTPS/SSL Disabling Telnet and Browser Access AWK-3131A-RTG UM Using Other Consoles USB Console Configuration (115200, None, 8, 1, VT100) The serial console connection method, which requires using a short serial cable to connect the AWK-3131A-RTG to a PCs COM port, can be used if you do not know the AWK-3131A-RTGs IP address. It is also convenient to use USB console configurations when you cannot access the AWK-3131A-RTG over Ethernet LAN, such as in the case of LAN cable disconnections or broadcast storming over the LAN. ATTENTION Do not use the RS-232 console manager when the AWK-3131A-RTG is powered at reversed voltage (ex.
-48VDC), even though reverse voltage protection is supported. If you need to connect the RS-232 console at reversed voltage, Moxas TCC-82 isolator is your best solution. NOTE We recommend using the Moxa PComm (Lite) Terminal Emulator, which is available for download at:
http://www.moxa.com/product/download_pcommlite_info.htm. Before running PComm Terminal Emulator, use a RJ45 to DB9-F (or RJ45 to DB25-F) cable to connect the AWK-3131A-RTGs RS-232 console port to your PCs COM port (generally COM1 or COM2, depending on how your system is set up). After installing PComm Terminal Emulator, take the following steps to access the RS-232 console utility. 1. From the Windows desktop, open the Start menu and run the PComm Terminal Emulator from the PComm (Lite) group. 2. In the Port Manager menu, select Open to open a new connection. 3. The Communication Parameter page of the Property window opens. Select the appropriate COM port for Console Connection, 115200 for Baud Rate, 8 for Data Bits, None for Parity, and 1 for Stop Bits. Click on the Terminal tab, and select VT100 (or ANSI) for Terminal Type. Click on OK to continue. 5-2 AWK-3131A-RTG UM Using Other Consoles 4. The Console login screen will appear. Log into the USB console with the login name (default: admin) and password (default: moxa, if no new password is set). 5. The AWK-3131A-RTGs device information and Main Menu will be displayed. Please follow the description on screen and select the administration option you wish to perform. NOTE To modify the appearance of the PComm Terminal Emulator window, select Edit Font and then choose the desired formatting options. ATTENTION If you unplug the USB cable or trigger DTR, a disconnection event will be evoked to enforce logout for network security. You will need to log in again to resume operation. 5-3 AWK-3131A-RTG UM Using Other Consoles Configuration via Telnet and SSH Consoles You may use Telnet or SSH client to access the AWK-3131A-RTG and manage the console over a network. To access the AWK-3131A-RTGs functions over the network from a PC host that is connected to the same LAN as the AWK-3131A-RTG, you need to make sure that the PC host and the AWK-3131A-RTG are on the same logical subnet. To do this, check your PC hosts IP address and subnet mask. NOTE The AWK-3131A-RTGs default IP address is 192.168.127.253 and the default subnet mask is 255.255.255.0 (for a Class C network). If you do not set these values properly, please check the network settings of your PC host and then change the IP address to 192.168.127.xxx and subnet mask to 255.255.255.0. Follow the steps below to access the console utility via Telnet or SSH client. 1. From Windows Desktop, go to Start Run, and then use Telnet to access the AWK-3131A-RTGs IP address from the Windows Run window (you may also issue the telnet command from the MS-DOS prompt). 2. When using SSH client (ex. PuTTY), please run the client program (ex. putty.exe) and then input the AWK-3131A-RTGs IP address, specifying 22 for the SSH connection port. The console login screen is displayed. Refer to the USB Console Configuration section for login and administration information. 3. Log in into the command page (default username/password is cliadmin/moxa, if no new password is set). AWK-3131A-RTG supports the CLI mode. You can use the TAB key to check a related CLI command. 5-4 AWK-3131A-RTG UM Using Other Consoles Configuration by Web Browser with HTTPS/SSL To secure your HTTP access, the AWK-3131A-RTG supports HTTPS/SSL encryption for all HTTP traffic. Perform the following steps to access the AWK-3131A-RTGs web browser interface via HTTPS/SSL. 1. Open your web browser and type https://<AWK-3131A-RTGs IP address> in the address field. Press Enter to establish the connection. 2. Click on continue to this website. The protocol in the URL changes to HTTPS. You can now enter your username and password to login into the function page. 5-5 AWK-3131A-RTG UM Using Other Consoles Disabling Telnet and Browser Access If you are connecting the AWK-3131A-RTG to a public network but do not intend to use its management functions over the network, then we suggest disabling both Telnet Console and Web Configuration. Please run Maintenance Console Settings to disable them, as shown in the following figure. 5-6 A References This chapter provides more detailed information about wireless-related technologies. The information in this chapter can help you manage your AWK-3131A-RTGs and plan your industrial wireless network better. The following topics are covered in this appendix:
Beacon DTIM Fragment RTS Threshold STP and RSTP The STP/RSTP Concept Differences between RSTP and STP AWK-3131A-RTG UM References Beacon A beacon is a packet broadcast by the AP to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination address, a time stamp, Delivery Traffic Indicator Maps
(DTIM), and the Traffic Indicator Message (TIM). Beacon Interval indicates the frequency interval of AP. DTIM Delivery Traffic Indication Map (DTIM) is contained in beacon frames. It is used to indicate that broadcast and multicast frames buffered by the AP will be delivered shortly. Lower settings result in more efficient networking, while preventing your wireless client from dropping into power-saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power. Fragment A lower setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold RTS Threshold (256-2346) This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2,346. When you encounter inconsistent data flow, only minor modifications are recommended. STP and RSTP The STP/RSTP Concept Spanning Tree Protocol (STP) was designed to help reduce link failures in a network, and provide protection from loops. Networks that have a complicated architecture are prone to broadcast storms caused by unintended loops in the network. The STP protocol is part of the IEEE802.1D standard, 1998 Edition bridge specification. Rapid Spanning Tree Protocol (RSTP) implements the Spanning Tree Algorithm and Protocol defined by IEEE802.1w-2001 standard. RSTP provides the following benefits:
The topology of a bridged network will be determined much more quickly compared to STP. RSTP is backward compatible with STP, making it relatively easy to deploy. For example:
Defaults to sending 802.1D-style BPDUs if packets with this format are received. STP (802.1D) and RSTP (802.1w) can operate on the LAN ports and WLAN ports of the same AWK-3131A-RTG. This feature is particularly helpful when the AWK-3131A-RTG connects to older equipment, such as legacy switches. A-2 AWK-3131A-RTG UM References Differences between RSTP and STP RSTP is similar to STP, but includes additional information in the BPDUs that allow each bridge to confirm that it has taken action to prevent loops from forming when it decides to enable a link to a neighboring bridge. Adjacent bridges connected via point-to-point links will be able to enable a link without waiting to ensure that all other bridges in the network have had time to react to the change. The main benefit of RSTP is that the configuration decision is made locally rather than network-wide, allowing RSTP to carry out automatic configuration and restore a link faster than STP. A-3 B Supporting Information This chapter presents additional information about this product. You can also learn how to contact Moxa for technical support. The following topics are covered in this appendix:
Firmware Recovery DoC (Declaration of Conformity) Federal Communication Commission Interference Statement RED Compliance Statement Canada, Industry Canada (IC) Notices Antenna Gain and RF Radiated Power R&TTE Compliance Statement AWK-3131A-RTG UM Supporting Information Firmware Recovery When the LEDs of FAULT, Signal Strength, CLIENT, and WLAN all light up simultaneously and blink at one-second interval, it means the system booting has failed. It may result from some wrong operation or uncontrollable issues, such as an unexpected shutdown during firmware update. The Firmware Recovery mode is designed to help administrators recover such damage and resume system operation rapidly. You can refer to the following instructions to recover the firmware:
Connect to the AWK-3131A-RTGs RS-232 console with 115200bps and N-8-1. You will see the following message shown on the terminal emulator every one second. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. please set-up TFTP server 192.168.127.1 contains awk3131a-rtg.rom for firmware recovery. To initiate a firmware recovery process, do the following:
1. Change the IP address of the laptop to 192.168.127.1. 2. Set up a TFTP sever on your laptop. 3. Download the AWK-3131A-RTGs firmware from Moxas Website. 4. Change the firmware file name to awk3131a-rtg.rom 5. Connect to the AWK-3131A-RTGs M12 Ethernet port or SC fiber port. If the setting is correct, you will see the following message shown on the terminal emulator, and the AWK-3131A-RTG will reboot when the firmware recovery process has finished. Trying eth0 Using eth0 device TFTP from server 192.168.127.1; our IP address is 192.168.127.253 Filename 'awk3131a-rtg.rom'. Load address: 0x80060000 Loading:
*#################################################################
#################################################################
#################################################################
B-2 AWK-3131A-RTG UM Supporting Information DoC (Declaration of Conformity) Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Caution: Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment. RF exposure warning This equipment must be installed and operated in accordance with provided instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, End-users and installers must be provide with antenna installation instructions and transmitter. End-users and installers must be provide with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Antenna List Antenna Part No. Antenna Type Maximum Antenna Gain ANT-WDB-WDB-O-2-BK Dipole Antenna ANT-WDB-ARM-0202 Dipole Antenna 2.34 dBi for 5.25~5.35GHz 2.34 dBi for 5.47~5.725GHz 1.6 dBi for 5.25~5.35 GHz 1.8 dBi for 5.47~5.725 GHz B-3 AWK-3131A-RTG UM Supporting Information RED Compliance Statement Hereby, Moxa declares that this AWK-3131A-RTG is in compliance with the essential requirements and other relevant provisions of Directive 2014/53/EU. The 5150 5350 MHz frequency range is restricted to indoor use only. Outdoor operation in this range is prohibited. Moxa declares that the apparatus AWK-3131A-RTG complies with the essential requirements and other relevant provisions of Directive 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE directive repeals and replaces the Directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the manufacturer must therefore be followed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. Canada, Industry Canada (IC) Notices This device complies with Industry Canadas license-exempt RSS standard(s). Operation is subject to the following two conditions:
1. This device may not cause interference, and 2. This device must accept any interference, including interference that may cause undesired operation of the device. Warning:
Users should also be advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices. Canada, avis d'Industry Canada (IC) Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes:
(1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. Devraient galement tre informs les utilisateurs que les radars haute puissance sont dsigns comme utilisateurs principaux (c.--utilisateurs prioritaires) des bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient provoquer des interfrences et / ou endommager les appareils LE-LAN. B-4 AWK-3131A-RTG UM Supporting Information Radio Frequency (RF) Exposure Information The radiated output power of this wireless device is below the Industry Canada (IC) radio frequency exposure limits. This wireless device should be used in such a manner such that the potential for human contact during normal operation is minimized. This device has also been evaluated and shown compliant with the IC RF Exposure limits under mobile exposure conditions (i.e., the device antennas are greater than 20 cm from a person's body). Informations concernant l'exposition aux frequences radio (RF) La puissance de sortie mise par lappareil de sans fil est infrieure la limite d'exposition aux frquences radio d'Industry Canada (IC). Utilisez lappareil de sans fil de faon minimiser les contacts humains lors du fonctionnement normal. Ce priphrique a galement t valu et dmontr conforme aux limites d'exposition aux RF d'IC dans des conditions d'exposition des appareils mobiles (antennes sont suprieures 20 cm partir du corps d'une personne). Antenna Gain and RF Radiated Power The following sections contain the FCC rules regarding adapting the product transmission power based on the antenna used. Antenna Part No. Antenna Type Maximum Antenna Gain ANT-WDB-WDB-O-2-BK Dipole Antenna ANT-WDB-ARM-0202 Dipole Antenna 2.34 dBi for 5.25~5.35GHz 2.34 dBi for 5.47~5.725GHz 1.6 dBi for 5.25~5.35 GHz 1.8 dBi for 5.47~5.725 GHz B-5 AWK-3131A-RTG UM Supporting Information NCC (National Communication Commission)
:
, ,, ,
, ,,
,, B-6 AWK-3131A-RTG UM Supporting Information R&TTE Compliance Statement Moxa declares that the apparatus AWK-3131A-RTG complies with the essential requirements and other relevant provisions of Directive 1999/5/EC. This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions), Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Netherlands, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states Norway and Switzerland. EU Countries Not Intended for Use None. Potential Restrictive Use France: only channels 10, 11, 12, and 13. B-7
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2019-06-26 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 5500 ~ 5700 | NII - Unlicensed National Information Infrastructure TX | ||
3 | 2018-09-24 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | |
4 | 2412 ~ 2462 | DTS - Digital Transmission System | ||
5 | 2018-09-19 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | |
6 | 2412 ~ 2462 | DTS - Digital Transmission System | ||
7 | 2018-09-13 | 2412 ~ 2462 | DTS - Digital Transmission System | |
8 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | ||
9 | 2018-08-01 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | |
10 | 2412 ~ 2462 | DTS - Digital Transmission System | ||
11 | 2017-01-18 | 2412 ~ 2462 | DTS - Digital Transmission System | |
12 | 2017-01-17 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | |
13 | 2016-08-28 | 2412 ~ 2462 | DTS - Digital Transmission System | |
14 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | ||
15 | 2016-08-21 | 2412 ~ 2462 | DTS - Digital Transmission System | |
16 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | ||
17 | 2016-06-07 | 2412 ~ 2462 | DTS - Digital Transmission System | |
18 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | ||
19 | 2015-10-27 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | |
20 | 2015-08-25 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX | Original Equipment |
21 | 2412 ~ 2462 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
various | Effective |
2019-06-26
|
||||
various |
2018-09-24
|
|||||
various |
2018-09-19
|
|||||
various |
2018-09-13
|
|||||
various |
2018-08-01
|
|||||
various |
2017-01-18
|
|||||
various |
2017-01-17
|
|||||
various |
2016-08-28
|
|||||
various |
2016-08-21
|
|||||
various |
2016-06-07
|
|||||
various |
2015-10-27
|
|||||
various |
2015-08-25
|
|||||
various | Applicant's complete, legal business name |
Moxa Inc.
|
||||
various | FCC Registration Number (FRN) |
0011650785
|
||||
various | Physical Address |
4F, No.135, Lane 235, BAOQIAO Rd. XINDIAN DIST.
|
||||
various |
NEW TAIPEI CITY, N/A
|
|||||
various |
Taiwan
|
|||||
app s | TCB Information | |||||
various | TCB Application Email Address |
c******@telefication.com
|
||||
various |
h******@acbcert.com
|
|||||
various | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
various | Grantee Code |
SLE
|
||||
various | Equipment Product Code |
WAPN008
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
various | Name |
O****** C****
|
||||
various | Title |
Assistant Manager
|
||||
various | Telephone Number |
886-2******** Extension:
|
||||
various | Fax Number |
886-2********
|
||||
various |
o******@moxa.com
|
|||||
app s | Technical Contact | |||||
various | Firm Name |
DEKRA Testing and Certification Co., Ltd.
|
||||
various |
DEKRA Testing and Certification Co.,
|
|||||
various |
DEKRA Testing and Certification Co., Ltd
|
|||||
various |
QuieTek Corporation
|
|||||
various | Name |
M**** C****
|
||||
various |
V****** W******
|
|||||
various | Physical Address |
No.5-22, Ruishukeng, Linkou Dist., New Taipei City
|
||||
various |
No.5-22, Ruishukeng, Linkou Dist.
|
|||||
various |
No. 5-22, Rueishu Keng, Linkou Dist.
|
|||||
various |
No.5-22, Rueishu Keng, Linkou Dist.
|
|||||
various |
New Taipei City, 24451
|
|||||
various |
New Taipei city, 24451
|
|||||
various |
New Taipei City
|
|||||
various |
Taiwan
|
|||||
various | Telephone Number |
886-2******** Extension:
|
||||
various |
886-2********
|
|||||
various |
886-2******** Extension:
|
|||||
various |
886-2********
|
|||||
various |
886-2******** Extension:
|
|||||
various |
886-2******** Extension:
|
|||||
various | Fax Number |
886-2********
|
||||
various |
886-2********
|
|||||
various |
866-2********
|
|||||
various |
886-2********
|
|||||
various |
v******@dekra.com
|
|||||
various |
m******@dekra.com
|
|||||
various |
m******@quietek.com
|
|||||
app s | Non Technical Contact | |||||
various | Firm Name |
DEKRA Testing and Certification Co.,
|
||||
various |
DEKRA Testing and Certification Co., Ltd.
|
|||||
various |
QuieTek Corporation
|
|||||
various | Name |
M****** C********
|
||||
various |
V******** W****
|
|||||
various |
M**** C********
|
|||||
various | Physical Address |
No.5-22, Ruishukeng, Linkou Dist., New Taipei City
|
||||
various |
No.5-22, Rueishu Keng, Linkou Dist.
|
|||||
various |
Taiwan
|
|||||
various | Telephone Number |
886-2******** Extension:
|
||||
various |
886-2********
|
|||||
various |
886-2******** Extension:
|
|||||
various | Fax Number |
886-2********
|
||||
various |
886-2********
|
|||||
various |
886-2********
|
|||||
various |
v******@dekra.com
|
|||||
various |
m******@quietek.com
|
|||||
app s | Confidentiality (long or short term) | |||||
various | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
various | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
various | Is this application for software defined/cognitive radio authorization? | No | ||||
various | Equipment Class | DTS - Digital Transmission System | ||||
various | NII - Unlicensed National Information Infrastructure TX | |||||
various | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | MOXA IEEE 802.11 a/b/g/n | ||||
various | TAP-213 series Rail Onboard IP68 802.11n AP/Client | |||||
various | Industrial 802.11a/b/g/n AP/Client/Bridge | |||||
various | Industrial 802.11n Access Point | |||||
various | Industrial 802.11a/b/g/n Outdoor Access Point | |||||
various | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
various | Yes | |||||
various | Modular Equipment Type | Single Modular Approval | ||||
various | Does not apply | |||||
various | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
various | Original Equipment | |||||
various | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
various | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
various | Grant Comments | C2PC: Addition one Patch antenna, antenna type is different with the original application. Reduce the output power through firmware. Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. | ||||
various | C2PC: Addition one Patch antenna, antenna type is different with the original application. Reduce the output power through firmware. Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. Class II Permissive Change with a decrease in the Output Power through firmware and adding the omni-directional antennas as documented in this filing. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change with a decrease in the Output Power through firmware and adding the omni-directional antennas as documented in this filing. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. Class II Permissive Change: (1) The device embeds in the Hosts, model number: MOXA, AWK-3131A-M12-RCC, AWK-3131A-M12-RTG, AWK-3131A-SSC-RTG and operating in Master mode via software (non SDR). (2) Addition the antenna, the antenna type is same with original grant, but antenna gain is lower. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change: (1) The device embeds in the Hosts, model number: MOXA, AWK-3131A-M12-RCC, AWK-3131A-M12-RTG, AWK-3131A-SSC-RTG and operating in Master mode via software (non SDR). (2) Addition the antenna, the antenna type is same with original grant, but antenna gain is lower. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change: The device embed in the Host, model number: MOXA, TAP-323XXXXXXXXXXXXXXX (X=0-9,A-Z, blank or dash or any character ; for marketing purpose and no impact safety related critical components and constructions) and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. Class II Permissive Change: The device embed in the Host, model number: MOXA, TAP-323XXXXXXXXXXXXXXX (X=0-9,A-Z, blank or dash or any character ; for marketing purpose and no impact safety related critical components and constructions) and operating in Master mode via software (non SDR). | |||||
various | C2PC: Addition twelve omni-directional antenna, antenna type is different with the original application. Reduce the output power through firmware. Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. | |||||
various | C2PC: Addition twelve omni-directional antenna, antenna type is different with the original application. Reduce the output power through firmware. Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change: The device embed in the Host, model number: MOXA TAP-213-XX-CT-T and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. Class II Permissive Change: The device embed in the Host, model number: MOXA TAP-213-XX-CT-T and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change: The device embed in the Host, model number: MOXA AWK-3131AXXXXXX and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. Class II Permissive Change: The device embed in the Host, model number: MOXA AWK-3131AXXXXXX and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. Class II Permissive Change: The device embed in the Host, model number: MOXA AWK-11xuz-p-t and operating in Master mode via software (non SDR). | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. Class II Permissive Change: The device embed in the Host, model number: MOXA AWK-11xuz-p-t and operating in Master mode via software (non SDR). | |||||
various | C2PC: addition of directional panel antenna type (MOXA, part No. ANT-WDB-PNF-1518). Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. | |||||
various | C2PC: addition of directional panel antenna type (MOXA, part No. ANT-WDB-PNF-1518). Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 33 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. | |||||
various | Class II Permissive Change: (1) The device embed in the Host and operating in Master mode via software (non SDR). (2) Reduce the Output Power of U-NII-1 band (5150-5250 MHz) through firmware. Power Output listed is conducted. Device is an 802.11a/b/g/n device in 2x2 Spatial Multiplexing MIMO configuration as described in this filing. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and not be collocated with any other transmitters except in accordance with FCC multi transmitter product procedures. End users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This device has a 20 MHz, 40MHz and bandwidth mode. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidth modes. DFS operation is slave without radar detection. | |||||
various | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. | |||||
various | Is there an equipment authorization waiver associated with this application? | No | ||||
various | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
various | Firm Name |
DEKRA TESTING AND CERTIFICATION Lin Kou Lab.
|
||||
various |
DEKRA TESTING AND CERTIFICATION CO., LTD. LinKou
|
|||||
various |
DEKRA Testing and Certification Co., Ltd.
|
|||||
various | Name |
V****** L********
|
||||
various |
S******** H********
|
|||||
various | Telephone Number |
88628******** Extension:
|
||||
various |
+886-******** Extension:
|
|||||
various |
886-2******** Extension:
|
|||||
various | Fax Number |
88628********
|
||||
various |
+886-********
|
|||||
various |
886-2********
|
|||||
various |
v******@dekra.com
|
|||||
various |
s******@dekra.com
|
|||||
various |
s******@quietek.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15E | CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
2 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
2 | 4 | 15E | CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15E | CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
3 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
3 | 3 | 15E | CC MO ND | 5500 | 5580 | 0.22 | |||||||||||||||||||||||||||||||||||
3 | 4 | 15E | CC MO ND | 5660 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
3 | 5 | 15E | CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
5 | 1 | 15E | CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
5 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
5 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
5 | 4 | 15E | CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
6 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
7 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
8 | 1 | 15E | CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
8 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
8 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
8 | 4 | 15E | CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
9 | 1 | 15E | CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
9 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
9 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
9 | 4 | 15E | CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
10 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
11 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
12 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
12 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
12 | 3 | 15E | 38 CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
12 | 4 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
13 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
14 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
14 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
14 | 3 | 15E | 38 CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
14 | 4 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
15 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
16 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
16 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
16 | 3 | 15E | 38 CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
16 | 4 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
17 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
18 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
18 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
18 | 3 | 15E | 38 CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
18 | 4 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
19 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
19 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
19 | 3 | 15E | 38 CC MO ND | 5500 | 5580 | 0.22 | |||||||||||||||||||||||||||||||||||
19 | 4 | 15E | 38 CC MO ND | 5660 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
19 | 5 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
20 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.24 | |||||||||||||||||||||||||||||||||||
20 | 2 | 15E | 38 CC MO ND | 5260 | 5320 | 0.23 | |||||||||||||||||||||||||||||||||||
20 | 3 | 15E | 38 CC MO ND | 5500 | 5700 | 0.22 | |||||||||||||||||||||||||||||||||||
20 | 4 | 15E | 38 CC MO | 5745 | 5825 | 0.17 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
21 | 1 | 15C | CC MO | 2412.00000000 | 2462.00000000 | 0.8100000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC