AirLive IAS-2000 V2 User manual

IAS-2000 v2
Internet Access Gateway
Use
r
’s Manual
1

Claus
e
Description
■ EN 55022:1998 Limits and methods of measurement of radio disturbanc
e
characteristics of information technology equipme
n
■ EN 61000-3-2:2000 Disturbances in supply systems caused by household appliance
s
and similar electrical equipment "Harmonics
■ EN 61000-3-3:1995/ Disturbances in supply systems caused by household appliance
s
A1:2001 and similar electrical equipment "Voltage fluctuations
■ EN 55024:1998/A1 Information Technology equipment-Immunity characteristics-Limi
t
:2001/A2:2003 And methods of measuremen
t
■ CE markin
g
Signature :
Name :Albert Ye
h
Position/ Titl
e
:Vice President (Stamp) Date: 2008/10/9
AirLive IAS-2000 v2
is in conformity with
In accordance with 2004/108 EC Directive and 1999/5 EC-R & TTE Directive
Manufacturer/Importe
r
Hsin-Tien City, Taipei County, Taiwa
n
Declare that the product
Internet Access Gateway
Declaration of Conformity
We, Manufacturer/Importer
OvisLink Corp.
5F., NO.6, Lane 130, Min-Chuan Rd.,

AirLive IAS-2000 v2 CE Declaration Statement
Country Declaration Country Declaration
cs
Česky [Czech]
OvisLink Corp. tímto prohlašuje, že tento AirLive
IAS-2000 v2 je ve shoděse základními
požadavky a dalšími příslušnými ustanoveními
směrnice 1999/5/ES.
lt
Lietuvių
[Lithuanian]
Šiuo OvisLink Corp. deklaruoja, kad šis AirLive
IAS-2000 v2 atitinka esminius reikalavimus ir kitas
1999/5/EB Direktyvos nuostatas.
da
Dansk [Danish]
Undertegnede OvisLink Corp. erklærer herved, at
følgende udstyr AirLive IAS-2000 v2 overholder
de væsentlige krav og øvrige relevante krav i
direktiv 1999/5/EF.
nl
Nederlands [Dutch
Hierbij verklaart OvisLink Corp. dat het toestel AirLive
IAS-2000 v2 in overeenstemming is met de
essentiële eisen en de andere relevante bepalingen
van richtlijn 1999/5/EG.
de
Deutsch
[German]
Hiermit erklärt OvisLink Corp., dass sich das
Gerät AirLive IAS-2000 v2 in Übereinstimmung
mit den grundlegenden Anforderungen und den
übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
mt
Malti [Maltese]
Hawnhekk, OvisLink Corp, jiddikjara li dan AirLive
IAS-2000 v2 jikkonforma mal-ħtiġijiet essenzjali u ma
provvedimenti oħrajn relevanti li hemm fid-Dirrettiva
1999/5/EC.
et
Eesti [Estonian]
Käesolevaga kinnitab OvisLink Corp. seadme
AirLive IAS-2000 v2 vastavust direktiivi
1999/5/EÜ põhinõuetele ja nimetatud direktiivist
tulenevatele teistele asjakohastele sätetele.
hu
Magyar
[Hungarian]
Az OvisLink Corporation kijelenti, hogy az AirLive
IAS-2000 v2 megfelel az 1999/05/CE irányelv
alapvetőkövetelményeinek és egyéb vonatkozó
rendelkezéseinek.
en
English
Hereby, OvisLink Corp., declares that this AirLive
IAS-2000 v2 is in compliance with the essential
requirements and other relevant provisions of
Directive 1999/5/EC.
pl
Polski [Polish]
Niniejszym OvisLink Corp oświadcza, że AirLive
IAS-2000 v2 jest zgodny z zasadniczymi wymogami
oraz pozostałymi stosownymi postanowieniami
Dyrektywy 1999/5/EC.
es
Español
[Spanish]
Por medio de la presente OvisLink Corp. declara
que el AirLive IAS-2000 v2 cumple con los
requisitos esenciales y cualesquiera otras
disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
pt
Português
[Portuguese]
OvisLink Corp declara que este AirLive IAS-2000 v2
está conforme com os requisitos essenciais e outras
disposições da Directiva 1999/5/CE.
el
Ελληνική [Greek]
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp. ΔΗΛΩΝΕΙ
ΟΤΙ AirLive IAS-2000 v2 ΣΥΜΜΟΡΦΩΝΕΤΑΙ
ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ
ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ
1999/5/ΕΚ.
sl
Slovensko
[Slovenian]
OvisLink Corp izjavlja, da je ta AirLive IAS-2000 v2 v
skladu z bistvenimi zahtevami in ostalimi relevantnimi
določili direktive 1999/5/ES.
fr
Français [French]
Par la présente OvisLink Corp. déclare que
l'appareil AirLive IAS-2000 v2 est conforme aux
exigences essentielles et aux autres dispositions
pertinentes de la directive 1999/5/CE
sk
Slovensky [Slovak]
OvisLink Corp týmto vyhlasuje, že AirLive IAS-2000
v2 spĺňa základné požiadavky a všetky príslušné
ustanovenia Smernice 1999/5/ES.
it
Italiano [Italian]
Con la presente OvisLink Corp. dichiara che
questo AirLive IAS-2000 v2 è conforme ai
requisiti essenziali ed alle altre disposizioni
pertinenti stabilite dalla direttiva 1999/5/CE.
fi
Suomi [Finnish]
OvisLink Corp vakuuttaa täten että AirLive IAS-2000
v2 tyyppinen laite on direktiivin 1999/5/EY oleellisten
vaatimusten ja sitä koskevien direktiivin muiden
ehtojen mukainen
lv
Latviski [Latvian]
Ar šo OvisLink Corp. deklarē, ka AirLive
IAS-2000 v2 atbilst Direktīvas 1999/5/EK
būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
Íslenska [Icelandic]
Hér með lýsir OvisLink Corp yfir því að AirLive
IAS-2000 v2 er í samræmi við grunnkröfur og aðrar
kröfur, sem gerðar eru í tilskipun 1999/5/EC.
sv
Svenska
[Swedish]
Härmed intygar OvisLink Corp. att denna AirLive
IAS-2000 v2 står I överensstämmelse med de
väsentliga egenskapskrav och övriga relevanta
bestämmelser som framgår av direktiv
1999/5/EG.
no
Norsk [Norwegian]
OvisLink Corp erklærer herved at utstyret AirLive
IAS-2000 v2 er i samsvar med de grunnleggende
krav og øvrige relevante krav i direktiv 1999/5/EF.
A copy of the full CE report can be obtained from the following address:
OvisLink Corp.
5F, No.6 Lane 130,
Min-Chuan Rd, Hsin-Tien City,
Taipei, Taiwan, R.O.C.
This equipment may be used in AT, BE, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, SK,
SI, ES, SE, GB, IS, LI, NO, CH, BG, RO, TR

This device uses software which is partly or completely licensed under the terms of the GNU General Public License. The author of the
software does not provide any warranty. This does not affect the warranty for the product itself.
To get source codes please contact: OvisLink Corp., 5F, No. 96, Min-Chuan Rd, Hsin-Tien City, Taipei, Taiwan, R.O.C. A fee will be
charged for production and shipment for each copy of the source code.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU
General Public License is intended to guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free Software Foundation software
is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to
surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the
software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal
permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no
warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors
of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we
have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it
may be distributed under the terms of this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee
is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by running the Program). Whether that is
true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and
give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection
in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all
of
these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any
change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the
Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running
for such interactive use in the most ordinary way, to print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if
the Program itself is interactive but does not normally print such an announcement, your work based on the Program
is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the
Program, and can be reasonably considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the
same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the
terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on
the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this
License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than
your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source
code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This
alternative is allowed only for noncommercial distribution and only if you received the program in object code or
executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable
work, complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place counts as distribution of the source code, even
though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.
Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not
accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a
license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You
may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to
patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a
consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you
could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest
validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus
excluded. In such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to
time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which
applies to it and "any later version", you have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,
write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to
the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of
preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software
generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS
IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve
this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most
effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to
where the full notice is found.
one line to give the program's name and an idea of what it does.
Copyright (C) yyyy name of author
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later
version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public
License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain
conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License.
Of course, the commands you use may be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright
disclaimer" for the program, if necessary. Here is
a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'
(which makes passes at compilers) written by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is
a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is
what you want to do, use the GNU Lesser General Public License instead of this License.

IAS-2000 v2
User’s Manual
.
1
Copyright
The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an
information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical,
magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
Trademarks
All products, company, brand names are trademarks or registered trademarks of their respective companies. They
are used for identification purpose only. Specifications are subject to be changed without prior notice.
FCC Interference Statement
The IAS-2000 v2 has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15
of the FCC Rules. These limits are designed to provide reasonable protection against radio interference in a
commercial environment. This equipment can generate, use and radiate radio frequency energy and, if not installed
and used in accordance with the instructions in this manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause interference, in which case the
user, at his own expense, will be required to take whatever measures are necessary to correct the interference.
CE Declaration of Conformity
This equipment complies with the requirements relating to electromagnetic compatibility,
EN 55022:1998, EN 61000-3-2, EN 61000-3-3/A1, EN 55024/A1/A2, ClassA.

IAS-2000 v2
User’s Manual
.
i
Contents
Chapter 1. Before You Start .....................................................................................................................................1
1.1 Audience ........................................................................................................................................................1
1.2 Document Conventions..................................................................................................................................1
Chapter 2. Overview.................................................................................................................................................2
2.1 Introduction of IAS-2000 v2..........................................................................................................................2
2.2 System Concept..............................................................................................................................................2
Chapter 3. Hardware Installation............................................................................................................................5
3.1 Panel Function Descriptions...........................................................................................................................5
3.2 Package Contents ...........................................................................................................................................6
3.3 System Requirement ......................................................................................................................................6
3.4 Installation Steps............................................................................................................................................7
Chapter 4. Network Configuration on PC...............................................................................................................9
4.1. Internet Connection Setup for Windows XP..................................................................................................9
4.2. TCP/IP Network Setup.................................................................................................................................12
Chapter 5. Web Interface Configuration...............................................................................................................16
5.1 System Configuration...................................................................................................................................18
5.1.1 Configuration Wizard (Also served as Quick Installation) .........................................................................19
5.1.2 System Information.....................................................................................................................................28
5.1.3 WAN1 Configuration..................................................................................................................................30
5.1.4 WAN2 & Failover.......................................................................................................................................33
5.1.5 LAN1 Configuration...................................................................................................................................36
5.1.6 LAN2 Configuration...................................................................................................................................43
5.2 Network Configuration ................................................................................................................................49
5.2.1 Network Address Translation......................................................................................................................50
5.2.2 Privilege List...............................................................................................................................................53
5.2.3 Monitor IP List............................................................................................................................................56
5.2.4 Walled Garden List .....................................................................................................................................58
5.2.5 Proxy Server Properties ..............................................................................................................................59
5.2.6 Dynamic DNS.............................................................................................................................................60
5.2.7 IP Mobility..................................................................................................................................................61
5.3 User Authentication......................................................................................................................................62
5.3.1 Authentication Configuration .....................................................................................................................63

IAS-2000 v2
User’s Manual
.
ii
5.3.2 Policy Configuration...................................................................................................................................87
5.3.3 Black List Configuration.............................................................................................................................95
5.3.4 Guest User Configuration ...........................................................................................................................98
5.3.5 Additional Configuration............................................................................................................................99
5.4 Utilities.......................................................................................................................................................118
5.4.1 Change Password......................................................................................................................................119
5.4.2 Backup/Restore Setting.............................................................................................................................120
5.4.3 Firmware Upgrade....................................................................................................................................121
5.4.4 Restart.......................................................................................................................................................122
5.5 Status..........................................................................................................................................................123
5.5.1 System Status............................................................................................................................................124
5.5.2 Interface Status..........................................................................................................................................127
5.5.3 Current Users............................................................................................................................................129
5.5.4 Traffic History...........................................................................................................................................130
5.5.5 Notification Configuration........................................................................................................................135
5.5.6 Online Report............................................................................................................................................138
5.6 Help............................................................................................................................................................140
Appendix A. External Network Access...............................................................................................................141
Appendix B. Console Interface Configuration..................................................................................................143
Appendix C. Specifications.................................................................................................................................146
a. Hardware Specification...................................................................................................................................146
b. Technical Specification...................................................................................................................................146
Appendix D. Proxy Setting for Hotspot..............................................................................................................148
Appendix E. Proxy Setting for Enterprise..........................................................................................................151

IAS-2000 v2
User’s Manual
.
1
Chapter 1. Before You Start
1.1 Audience
This manual is for Hotspot owners or administrators in enterprises to set up network environment using IAS-2000 v2.
It contains step by step procedures and graphic examples to guide MIS staff or individuals with slight network
system knowledge to complete the installation.
1.2 Document Conventions
For any caution or warning that requires special attention of readers, a highlight box with the eye-catching italic font
is used as below:
Warning: For security purposes, you should immediately change the Administrator’s password.
Indicates that clicking this button will return to the homepage of this section.
Indicates that clicking this button will return to the previous page.
Indicates that clicking this button will apply all of your settings.
Indicates that clicking this button will clear what you set before these settings are applied.

IAS-2000 v2
User’s Manual
.
2
Chapter 2. Overview
2.1 Introduction of IAS-2000 v2
IAS-2000 v2 is a Network Access Control System specially designed for middle-scaled or large network
environments while retaining network efficiency. IAS-2000 v2 delivers “manageability”, “efficiency” and “friendly
interface” and suits perfectly for campuses, libraries, gymnasiums, small and middle enterprises, factories,
Hotspots and community hospitals.
2.2 System Concept
IAS-2000 v2 is dedicatedly designed for controlling all network data passing through the system. The users under
the managed network must be authenticated to access the network beyond the managed area. The authentication
mechanism at the user’s end is provided by the IAS-2000 v2 server, and the SSL encryption is used to protect the
webpage. In the system, IAS-2000 v2 is responsible for authentication, authorization, and management functions.
The user account information is stored in the IAS-2000 v2 database, or other specified external authentication
databases.
The process of authenticating the user’s identity is executed via the SSL encrypted webpage. Using the web
interface, it can be ensured that the system is compatible to most desktop systems and palm computers. When a
user authentication is requested, the IAS-2000 v2 server software will check the authentication database at the rear
end to confirm the user’s access right. The authentication database can be the local database of IAS-2000 v2 or any
external database that IAS-2000 v2 supports. If the user is not an authorized user, IAS-2000 v2 will refuse the user’s

IAS-2000 v2
User’s Manual
.
3
request for the access. In the meantime, IAS-2000 v2 will also continue blocking the user from accessing the
network. If the user is an authorized user, then IAS-2000 v2 will authorize the user with an appropriate access right,
so that the user can use the network. If the online user remains idle without using the network for a time exceeding a
predetermined idle time on IAS-2000 v2 or the online user logs out of the system, IAS-2000 v2 will exit the working
stage of such user and terminate the user’s access right of the network.
The following figure provides a simple example of setting up a small enterprise network. IAS-2000 v2 is set to control
a part of the company’s intranet. The whole managed network includes cable network users and wireless network
users. In the beginning, any user located at the managed network is unable to access the network resource without
permission. If the access right to the network beyond the managed area is required, an Internet browser such as the
Internet Explorer must be opened and a connection to any website must be performed. When the browser attempts
to connect to a website, IAS-2000 v2 will force the browser to redirect to the user login webpage. The user must
enter the username and password for authentication. After the identity is authenticated successfully, the user will
gain proper access right defined on IAS-2000 v2.
Attention: Public LAN
is
referred to as
the LAN port with
the
authentication function
enabled
from
where
the
Authentication is required for the users to get access
of the network;
And,
Private LAN
is referred to as the LAN
port with the authentication function
disabled.
Another setup example is shown in the following figure. The WAN1 and WAN2 of IAS-2000 v2 simultaneously
supports the Switch of 802.3ad (Support Port Trunk), and the bandwidth of the Switch will be the sum of the WAN1
and WAN2 bandwidths, which aims at eliminating the bottleneck caused by the narrow bandwidth between
IAS-2000 v2 and the 802.3ad Switch.

IAS-2000 v2
User’s Manual
.
4

IAS-2000 v2
User’s Manual
.
5
Chapter 3. Hardware Installation
3.1 Panel Function Descriptions
Front Panel
LED Color Status Description
POWER Green On Power on the device
Off BIOS running
Blink OS running
Status LED Green On System ready
WAN1, LAN1,
WAN2, LAN2
(L) Orange Blink Sending / Receiving
Off 10 Mbps
Green On 100 Mbps
WAN1, LAN1,
WAN2, LAN2
(R) Orange On 1000 Mbps
Port Description
WAN1 / WAN2 Connect to Internet or Intranet
LAN1 / LAN2 Connect to the open environment. It can be chosen to require authentication to
access network resources and Internet.
Console Port 9-pin serial port connector to resume the factory defaults or reconfigures the
system.
Panel Button LCD Panel to display system info and network interface info
LED: There are four kinds of LED, power, status, port speed and link/act, to indicate different status of the system.
Console Port: The system can be configured via HyperTerminal. For example, if you need to set the Administrator’s
Password, you can connect a PC to this port as a Console Serial Port via a terminal connection program (such as
the super terminal with the parameters of 9600, 8, N, 1, None flow control) to change the Administrator’s Password.
LAN1/LAN2: The two LAN ports can be independently configured such that users cannot access Internet before
authentication. Thus, administrators can choose to force the authentication for users connected to these ports.
WAN1/WAN2: The two WAN ports are connected to a network which is not managed by the IAS-2000 v2 system,
and this port can be used to connect the ATU-Router of ADSL, the port of Cable Modem, or the Switch or Hub on the
LAN of a company.

IAS-2000 v2
User’s Manual
.
6
Rear Panel
System Fan: Keep the machine cool.
Power Fan: Keep the power cool.
Power Socket: The power cord attaches here.
Power Switch: Turn on and off the machine.
3.2 Package Contents
The standard package of IAS-2000 v2 includes:
yIAS-2000 v2 x 1
yCD-ROM x 1
yPower Cord x 1
yEthernet Cable (Crossover) x 1
yEthernet Cable (Straight) x1
yConsole Cable x 1
yAccessory Packing x 1
3.3 System Requirement
yStandard 10/100BaseT including five network cables with RJ-45 connectors
yAll PCs need to install the TCP/IP network protocol

IAS-2000 v2
User’s Manual
.
7
3.4 Installation Steps
Please follow the following steps to install IAS-2000 v2:
1. Connect the power cord to the power socket on the rear panel.
2. Turn on the power switch on the rear panel. The Power LED will light up.
3. Connect an Ethernet cable to one LAN port with the user authentication function enabled on the front panel.
The default port is LAN1 port. (Note:Authentication is required for the users to access the network via this LAN
port. The LAN port with authentication function is referred to as Public LAN.) Connect the other end of the
Ethernet cable to an AP or switch. The LED of this LAN port should be on to indicate a proper connection.

IAS-2000 v2
User’s Manual
.
8
4. Connect an Ethernet cable to one LAN port with the user authentication function disabled on the front panel.
The default port is LAN2 port. (Note: No authentication is required for the users to access the network via this
LAN port. The LAN port without authentication function is referred to as Private LAN and the administrator can
enter the administrative user interface to perform configurations via Private LAN.) Connect the other end of
the Ethernet cable to a client’s PC. The LED of this LAN port should be on to indicate a proper connection.
5. Connect an Ethernet cable to one of the WAN ports on the front panel. Connect the other end of the Ethernet
cable to ADSL modem, cable modem or a switch/hub of the internal network. The LED of this WAN should be
on to indicate a proper connection.
Attention: Usually a straight RJ-45 could be applied if IAS-2000 v2 is connected to a hub/computer which supports
automatic crossover, such as the Access Point. However, after the Access Point hardware reset, IAS-2000 v2
should not be able to connect to Access Point while connecting with a straight cable unless the cable was pulled out
and plug-in again. This scenario does NOT occur while using a crossover cable.
After the hardware of IAS-2000 v2 is installed completely, the system is ready to be configured in the following
sections. The manual will guide you step by step to set up the system using a single IAS-2000 v2 to manage the
network.

IAS-2000 v2
User’s Manual
.
9
Chapter 4. Network Configuration on PC
After IAS-2000 v2 is installed, the following configurations must be set up on the PC: Internet Connection Setup
for Windows XP and TCP/IP Network Setup.
4.1.Internet Connection Setup for Windows XP
1. Choose Start > Control Panel > Internet Options.
2. Choose the “Connections” label, and then click
Setup.

IAS-2000 v2
User’s Manual
.
10
3. Click Next when Welcome to the New Connection
Wizard screen appears.
4. Choose “Connect to the Internet” and then click
Next.
5. Choose “Set up my connection manually” and then
click Next.

IAS-2000 v2
User’s Manual
.
11
6. Choose “Connect using a broadband connection
that is always on” and then click Next.
7. Finally, click Finish to exit the Connection Wizard.
Now, the setup has been completed

IAS-2000 v2
User’s Manual
.
12
4.2.TCP/IP Network Setup
If the operating system of the PC in use is Windows 95/98/ME/2000/XP, keep the default settings without any
change to directly start/restart the system. With the factory default settings, during the process of starting the system,
IAS-2000 v2 with DHCP function will automatically assign an appropriate IP address and related information for
each PC. If the Windows operating system is not a server version, the default settings of the TCP/IP will regard the
PC as a DHCP client, and this function is called “Obtain an IP address automatically”.
If checking the TCP/IP setup or use the static IP in the LAN1 or LAN2 section is needed, please follow the steps
below
Check the TCP/IP Setup of Window XP
1. Select Start > Control Panel > Network
Connections.
2. Click the right button of the mouse on the “Local Area
Connection” icon and select “Properties”

IAS-2000 v2
User’s Manual
.
13
3. Select “General” label and choose “Internet Protocol
(TCP/IP)” and then click Properties. Now, choose to
use DHCP or specific IP address.
4-1.Using DHCP: If using DHCP is desired, please choose
“Obtain an IP address automatically” and click OK.
This is also the default setting of Windows. Then,
reboot the PC to make sure an IP address is obtained
from IAS-2000 v2.
4-2.Using Specific IP Address: If using specific IP
address is desired, ask the network administrator for
the information of the IAS-2000 v2: IP address,
Subnet Mask, New gateway and DNS server
address.
Caution: If your PC has been set up completed, please inform the network administrator before modifying the
following setup.
Table of contents
Other AirLive Gateway manuals

AirLive
AirLive RS-3000 User manual

AirLive
AirLive RS-1200 User manual

AirLive
AirLive VH-4GW User manual

AirLive
AirLive RS-2500 User manual

AirLive
AirLive IGR-1500 User manual

AirLive
AirLive RS-1200 User manual

AirLive
AirLive MW-2000SV2 User manual

AirLive
AirLive RS-2000 User manual

AirLive
AirLive VH-4GW User manual

AirLive
AirLive AirMax4GW User manual

AirLive
AirLive SKY-211 User manual

AirLive
AirLive RS-2000 User manual

AirLive
AirLive VOIP-111A User manual

AirLive
AirLive MW-1000S User manual

AirLive
AirLive IAS 2000 User manual

AirLive
AirLive RS-1200 User manual

AirLive
AirLive AirMax4GW User manual

AirLive
AirLive AirMax4GW User manual

AirLive
AirLive MW-2000S User manual

AirLive
AirLive IGR-1500 User manual