Atel IWE1200A-G User manual

,:($*
USER’S MANUAL

IEEE 802.11b
Hotspot Access Gateway
(Wired and Wireless Editions)
User’s Guide
Version: 1.8
Last Updated: 11/24/2004

Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pur-
suant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference in a residential installation. This equipment generates, uses and can radiated ra-
dio frequency energy and, if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that interference will
not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is en-
couraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is con-
nected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: To assure continued compliance, (example – use only shielded interface cables when
connecting to computer or peripheral devices). Any changes or modifications not expressly approved
by the party responsible for compliance could void the user’s authority to operate this equipment.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environ-
ment. This equipment should be installed and operated with minimum distance 20 cm between the ra-
diator & your body.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two condi-
tions: (1) This device may not cause harmful interference, and (2) this device must accept any inter-
ference received, including interference that may cause undesired operation.
i

R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN
PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication
terminal equipment and the mutual recognition of their conformity (R&TTE).
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Termi-
nal Equipment and Satellite Earth Station Equipment) as of April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. How-
ever, special attention must be paid to the dangers of electric shock and static electricity when work-
ing with electrical equipment. All guidelines of this and of the computer manufacture must therefore
be allowed at all times to ensure the safe use of the equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark,
Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, Portugal, Spain, Sweden, The Neth-
erlands, and United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states Norway and Swit-
zerland.
EU Countries Not Intended for Use
None.
ii

Table of Contents
1. Introduction ......................................................................................................................... 1
1.1. Overview...................................................................................................................1
1.2. Features.................................................................................................................... 1
1.3. Feature Comparison ................................................................................................. 6
1.4. LED Definitions ......................................................................................................... 6
2. First-Time Installation and Configuration ............................................................................ 8
2.1. Powering the WLAN Hotspot Access Gateway ........................................................ 8
2.2. Mounting the WLAN Hotspot Access Gateway on a Wall ........................................ 8
2.3. Preparing for Configuration....................................................................................... 8
2.3.1. Connecting the Managing Computer and the WLAN Hotspot Access
Gateway ................................................................................................................... 9
2.3.2. Changing the TCP/IP Settings of the Managing Computer ............................ 9
2.4. Configuring the WLAN Hotspot Access Gateway................................................... 10
2.4.1. Entering the User Name and Password ....................................................... 10
2.4.2. ConfigWizard Step 1: Selecting an Operational Mode ................................. 12
2.4.3. ConfigWizard Step 2: Configuring TCP/IP Settings...................................... 13
2.4.3.1. Gateway with a PPPoE-Based DSL/Cable Connection ..................... 13
2.4.3.2. Gateway with a DHCP-Based DSL/Cable Connection....................... 13
2.4.3.3. Gateway with a Static-IP DSL/Cable Connection............................... 14
2.4.3.4. Gateway with Multiple DSL/Cable Connections ................................. 15
2.4.4. ConfigWizard Step 3: Configuring IEEE 802.11 Settings ............................. 15
2.4.5. ConfigWizard Step 4: Reviewing and Applying Settings .............................. 16
2.4.6. Configuring User Authentication Settings..................................................... 17
2.4.6.1. Web Redirection................................................................................. 17
2.4.6.2. IEEE 802.1x ....................................................................................... 17
2.4.7. Configuring RADIUS Settings....................................................................... 18
2.5. Deploying the WLAN Hotspot Access Gateway ..................................................... 19
2.6. Setting up Client Computers................................................................................... 19
2.6.1. Configuring IEEE 802.11b-Related Settings ................................................ 20
2.6.2. Configuring TCP/IP-Related Settings ........................................................... 20
2.7. Confirming the Settings of the WLAN Hotspot Access Gateway and Client
Computers ..................................................................................................................... 20
3. Using Web-Based Network Manager................................................................................ 23
3.1. Overview................................................................................................................. 23
3.1.1. Menu Structure ............................................................................................. 23
3.1.2. Save, Save & Restart, and Cancel Commands............................................ 25
3.1.3. Home and Refresh Commands .................................................................... 26
3.2. Viewing Status ........................................................................................................ 27
3.2.1. Associated Wireless Clients ......................................................................... 27
3.2.2. Authenticated Users ..................................................................................... 27
3.2.3. Current DHCP Mappings.............................................................................. 28
3.2.4. System Log................................................................................................... 29
3.2.5. Outgoing and Incoming User Traffic Sessions ............................................. 29
3.2.6. Managed LAN Devices................................................................................. 30
3.3. General Operations ................................................................................................ 30
3.3.1. Specifying Operational Mode ....................................................................... 30
3.3.2. Changing Password ..................................................................................... 31
3.3.3. Managing Firmware...................................................................................... 31
3.3.3.1. Upgrading Firmware by HTTP............................................................ 32
3.3.3.2. Backing up and Restoring Configuration Settings by HTTP............... 32
3.3.3.3. Upgrading Firmware by TFTP ............................................................ 33
3.3.3.4. Backing up and Restoring Configuration Settings by TFTP ............... 34
iii

3.3.3.5. Resetting Configuration to Factory Defaults....................................... 36
3.3.3.6. Uploading a Certificate and a Private Key File................................... 36
3.3.4. Setting Time Zone ........................................................................................ 36
3.4. Configuring TCP/IP Related Settings ..................................................................... 37
3.4.1. Addressing.................................................................................................... 37
3.4.1.1. Gateway with a PPPoE-Based DSL/Cable Connection ..................... 37
3.4.1.2. Gateway with a DHCP-Based DSL/Cable Connection....................... 38
3.4.1.3. Gateway with a Static-IP DSL/Cable Connection............................... 38
3.4.1.4. Gateway with Multiple DSL/Cable Connections ................................. 39
3.4.2. DNS Proxy/Server ........................................................................................ 39
3.4.2.1. Basic................................................................................................... 40
3.4.2.2. Host Address Resolution.................................................................... 40
3.4.3. NAT Server................................................................................................... 41
3.4.3.1. Basic................................................................................................... 41
3.4.3.2. Static NAT Mappings.......................................................................... 41
3.4.3.3. Virtual Server Mappings ..................................................................... 42
3.4.4. DHCP Server................................................................................................ 43
3.4.4.1. Basic................................................................................................... 43
3.4.4.2. Static DHCP Mappings....................................................................... 44
3.4.5. Dynamic DNS ............................................................................................... 44
3.4.6. Bandwidth Management............................................................................... 45
3.4.6.1. LAN-to-WAN Load Balancing............................................................. 45
3.4.6.2. Client Bandwidth Control.................................................................... 46
3.4.7. PPTP Client .................................................................................................. 48
3.4.7.1. Basic................................................................................................... 49
3.4.7.2. Virtual Second LAN ............................................................................ 49
3.4.8. Zero Client Reconfiguration.......................................................................... 49
3.5. Configuring IEEE 802.11b-Related Settings........................................................... 50
3.5.1. Communication............................................................................................. 50
3.5.1.1. Basic................................................................................................... 50
3.5.1.2. AP Load Balancing............................................................................. 50
3.5.1.3. Wireless Distribution System.............................................................. 51
3.5.2. Security......................................................................................................... 52
3.5.2.1. Basic................................................................................................... 52
3.5.2.2. MAC-Address-Based Access Control ................................................ 54
3.5.2.3. IEEE 802.1x ....................................................................................... 55
3.6. Configuring Authentication Settings........................................................................ 56
3.6.1. Web Redirection ........................................................................................... 56
3.6.1.1. Basic................................................................................................... 56
3.6.1.2. Unrestricted Clients ............................................................................ 59
3.6.1.3. Walled Garden ................................................................................... 60
3.6.2. RADIUS ........................................................................................................ 61
3.6.2.1. Basic................................................................................................... 61
3.6.2.2. Robustness ........................................................................................ 62
3.6.3. Authentication Session Control .................................................................... 62
3.6.4. Authentication Page Customization.............................................................. 63
3.6.4.1. Selecting an Authentication Page to Edit ........................................... 63
3.6.4.2. Log-On, Authentication Success, and Authentication Failure Pages . 63
3.7. Configuring Advanced Settings .............................................................................. 66
3.7.1. Filters and Firewall ....................................................................................... 66
3.7.1.1. Packet Filters...................................................................................... 66
3.7.1.2. VLAN .................................................................................................. 67
3.7.1.3. Firewall ............................................................................................... 67
3.7.1.4. URL Filters ......................................................................................... 68
3.7.2. Management................................................................................................. 68
iv

3.7.2.1. Basic................................................................................................... 68
3.7.2.2. UPnP .................................................................................................. 69
3.7.2.3. System Log ........................................................................................ 69
3.7.2.4. SNMP ................................................................................................. 70
3.7.3. Auto Recovery .............................................................................................. 70
3.7.3.1. Link Integrity Detection....................................................................... 70
3.7.3.2. Periodical Restart ............................................................................... 71
3.7.4. LAN Device Management............................................................................. 71
Appendix A: Default Settings ................................................................................................ 73
Appendix B: Troubleshooting................................................................................................ 75
B-1: TCP/IP Settings Problems ..................................................................................... 75
B-2: Other Problems ...................................................................................................... 77
Appendix C: Additional Information....................................................................................... 79
C-1: Firmware Upgrade Using Xmodem Upgrade......................................................... 79
C-2: Distances and Data Rates ..................................................................................... 80
v

1. Introduction
1.1. Overview
The IEEE 802.11b Hotspot Access Gateway enables wireless ISPs, enterprises, or schools to deploy
WLANs with user authentication support. Authentication can be achieved using the Web redirection
technology or IEEE 802.1x Port-Based Network Access Control.
Based on the Web redirection technology, when an unauthenticated wireless user is trying to access a
Web page, a logon page is shown instead of the requested page, so that the user can type his/her user
name and password for authentication. Based on IEEE 802.1x, after a wireless client computer asso-
ciates with the built-in access point of the access gateway, the wireless client computer uses the
logged-on user’s user credential for authentication. The user credential can be user name/password (if
EAP-MD5 is used) or digital certificate (if EAP-TLS is used).
After the access gateway acquires the user credential either through Web redirection or IEEE 802.1x,
it sends the user credential to a back-end RADIUS (Remote Authentication User Dial-In Service)
server to see if the wireless user is allowed to access the Internet. Furthermore, if a user is IEEE
802.1x EAP-TLS authenticated, wireless data transmitted between the access gateway and the wire-
less client computer can be encrypted for better security.
In Chapter 2, we describe the steps to install and configure a newly acquired WLAN hotspot access
gateway. Following the steps, the WLAN hotspot access gateway can be quickly set up to work. In
Chapter 3, detailed explanations of each Web management page are given for the user to understand
how to fine-tune the settings of a WLAN hotspot access gateway to meet his or her specific needs. In
the remainder of this guide, a WLAN hotspot access gateway is referred to as a gateway for short.
1.2. Features
User Authentication, Authorization, and Accounting (AAA)
Web redirection. When an unauthenticated wireless user is trying to access a Web page,
he/she is redirected to a logon page for entering the user name and password. Then, the
user credential information is sent to a back-end RADIUS server for authentication.
Local pages or external pages. The access gateway can be configured to use
log-on, log-off, authentication success, and authentication failure pages, which are
stored in itself or stored in an external Web server maintained by the WISP. The con-
tents of local authentication pages can be customized.
CGI-Based Authentication. Username/password information can be sent by di-
rectly calling a CGI (Common Gateway Interface) function on the access gateway.
This feature is useful for authentication automation achieved by a specifically de-
signed program running on the wireless client computer.
Advertisement links. The log-off authentication page can be configured to show a
sequence of advertisement banners.
Unrestricted clients. Client computers with specific IP addresses or MAC ad-
dresses can bypass the Web redirection-based access control. The MAC address list
can be uploaded by TFTP.
1

Walled garden. Some specific URLs can be accessed without authentication. These
URLs can be exploited by WISPs for advertisement purposes.
SSL username/password protection. Username/password information sent by
a wireless client to the access gateway can be encrypted by SSL (Secure Socket
Layer).
IEEE 802.1x. If a wireless client computer supports IEEE 802.1x Port-Based Network
Access Control, the user of the computer can be authenticated by the access gateway and
wireless data can be encrypted when the digital-certificate-based EAP-TLS authentication
method is selected.
RADIUS client. The WLAN hotspot access gateway communicates with a back-end
RADIUS server for wireless user authentication, authorization, and accounting. Authenti-
cation methods, including EAP-MD5, EAP-TLS/EAP-TTLS, PAP, and CHAP are sup-
ported.
Robustness. To enhance AAA integrity, the access gateway can be configured to
notify the RADIUS server after it reboots.
Showing authenticated users. Showing the status and statistics of every RA-
DIUS-authenticated user. And an authenticated user can be terminated at any time for
management purposes.
Authentication session control. Several mechanisms are provided for the network
administrator to control user authentication session lifetimes.
IEEE 802.11b
Access point. The wireless access gateway is equipped with a built-in Access Point (AP),
which bridges packets between the wireless IEEE 802.11b network interface and the wired
Ethernet interface
64-bit and 128-bit WEP (Wired Equivalent Privacy). For authentication and data
encryption.
Enabling/disabling SSID broadcasts. The user can enable or disable the SSID
broadcasts functionality for security reasons. When the SSID broadcasts functionality is
disabled, a client computer cannot associate the wireless AP with an “any” network name
(SSID, Service Set ID); the correct SSID has to be specified on client computers.
MAC-address-based access control. Blocking unauthorized wireless client com-
puters based on MAC (Media Access Control) addresses.
Repeater. A wireless AP can communicate with other wireless APs via WDS (Wireless
Distribution System). Therefore, the wireless AP can wirelessly forward packets from
wireless clients to another wireless AP, and then the later wireless AP forwards the packets
to the Ethernet network.
Wireless client isolation. Wireless-to-wireless traffic can be blocked so that the wire-
less clients cannot see each other. This capability can be used in hotspots applications to
prevent wireless hackers from attacking other wireless users’ computers.
AP load balancing. Several wireless APs can form a load-balancing group. Within a
group, wireless client associations and traffic load can be shared among the wireless APs.
2

Transmit power control. Transmit power of the wireless AP’s RF module can be ad-
justed to change RF coverage of the wireless AP.
Associated wireless clients status. Showing the status of every wireless client that is
associated with the wireless AP.
Detachable antennas. The factory-mounted antennas can be replaced with high-gain
antennas for different purposes.
Internet Connection Sharing
DNS proxy. The WLAN hotspot access gateway can forward DNS (Domain Name Sys-
tem) requests from client computers to DNS servers on the Internet. And DNS responses
from the DNS servers can be forwarded back to the client computers.
Host address resolution. The network administrator can specify static FQDN
(Fully Qualified Domain Name) to IP address mappings. Therefore, a host on the in-
ternal network can access a server also on the intranet by a registered FQDN.
DHCP server. The WLAN hotspot access gateway can automatically assign IP addresses
to client computers by DHCP (Dynamic Host Configuration Protocol).
Static DHCP mappings. The network administrator can specify static IP address
to MAC address mappings so that the specified IP addresses are always assigned to
the hosts with the specified MAC addresses.
Showing current DHCP mappings. Showing which IP address is assigned to
which host identified by an MAC address.
NAT server. Client computers can share a public IP address provided by an ISP (Internet
Service Provider) by NAT (Network Address Translation). And our NAT server function-
ality supports the following:
Virtual server. Exposing servers on the intranet to the Internet.
PPTP, IPSec, and L2TP passthrough. Passing VPN (Virtual Private Network)
packets through the intranet-Internet boundary. PPTP means Point-to-Point Tunneling
Protocol, IPSec means IP Security, and L2TP means Layer 2 Tunneling Protocol.
DMZ (DeMilitarized Zone). All unrecognized IP packets from the Internet can be
forwarded to a specific computer on the intranet.
Multiple public IP addresses support. An ISP may provide several public IP
addresses to a customer. The WLAN hotspot access gateway can map each of the
public IP addresses to a host with a private IP address on the intranet.
H.323 passthrough. Passing H.323 packets through the intranet-Internet boundary
so that users on the intranet can use VoIP (Voice over IP) applications.
MSN Messenger support. Supporting Microsoft MSN Messenger for chat, file
transfer, and real-time communication applications.
Session monitoring. Latest 50 incoming sessions and 50 outgoing sessions are
shown for monitoring user traffic.
DSL/Cable Modem Support. Supporting dynamic IP address assignment by PPPoE
3

(Point-to-Point Protocol over Ethernet) or DHCP and static IP address assignment.
Multiple DSL/Cable connections support. Supporting up to 4 DSL/cable-based
Internet connections. All outgoing traffic load from the internal network is shared among
the multiple Internet connections, so that total outgoing throughput is increased.
Load balancing control. Specific LAN-to-WAN traffic can be forced to go out to
the Internet through a specific Internet connection. LAN-to-WAN traffic can be clas-
sified by port range or by IP address range.
Bandwidth control. Network bandwidth consumed by each client can be limited.
Clients are identified by MAC address range or IP address range.
Zero client reconfiguration. The access gateway can be configured to ignore IP, DNS,
and/or SMTP (Simple Mail Transfer Protocol) settings of client computers. As a result, the
configuration of a client computer need not be changed to access the Internet through the
access gateway.
Network Security
Packet address and port filtering. Filtering outgoing packets based on IP address and
port number. (Incoming packet filtering is performed by NAT.)
URL filtering. Preventing client users from accessing unwelcome Web sites. The HTTP
(HeperText Transfer Protocol) traffic to the specified Web sites identified by URLs (Uni-
versal Resource Locators) is blocked.
WAN ICMP requests blocking. Some DoS (Denial of Service) attacks are based on
ICMP requests with large payloads. Such kind of attacks can be blocked.
Stateful Packet Inspection (SPI). Analyzing incoming and outgoing packets based on
a set of criteria for abnormal content. Therefore, SPI can detect hacker attacks, and can
summarily reject an attack if the packet fits a suspicious profile.
Wireless-to-Ethernet-LAN traffic blocking. Traffic between the wireless interface
and the Ethernet LAN interface can be blocked.
Changeable MAC Address of the Ethernet WAN Interface. Some ADSL modems work
only with Ethernet cards provided by the ISP. If a WLAN hotspot access gateway is used in such
an environment, the MAC address of the WAN interface of the gateway has to be changed to the
MAC address of the ISP-provided Ethernet network card.
SNTP. Support for absolute system time by SNTP (Simple Network Time Protocol).
Daylight saving time. Support for Daylight Saving Time.
Dynamic DNS. Support for dynamic DNS services provided by dyndns.org and no-ip.com, so
that the access gateway can be associated with a domain name even if it obtains an IP address
dynamically by PPP, PPPoE or DHCP.
LAN Device Management. Since the access gateway acts as an NAT server, to remotely
manage network devices (such as access points) on the private network needs special handling,
so that management packets from the Internet can be passed through the NAT server. The access
gateway supports two mechanisms for this purpose.
4

By NAT port mapping. By carefully configuring the NAT port mapping table, the ac-
cess gateway knows how to route management packets with specific IP ports to LAN de-
vices on the private network. Although the NAT Virtual Server function can be used for
this purpose, the access gateway is equipped with specific configuration pages for LAN
device management.
By PPTP and virtual second LAN. Alternatively, LAN device management can be
achieved by PPTP and virtual second LAN. Conceptually, wireless clients are in the physi-
cal first LAN within one IP subnet (ex. 192.168.0.xxx) and wireless access points that ex-
tend RF coverage are in the virtual second LAN within another IP subnet (ex. 10.0.0.xxx).
These two LANs are isolated by the access gateway so that no traffic between these two
LANs is allowed. After the built-in PPTP client of the access gateway establishes a PPTP
tunnel with a remote PPTP server, the access gateway can route packets between the PPTP
tunnel and the virtual second LAN. This way, the network administrator can manage the
access points on the virtual second LAN through the PPTP tunnel.
Firmware Tools
Firmware upgrade. The firmware of the WLAN hotspot access gateway can be up-
graded in the following methods:
Xmodem-based. Upgrading firmware over RS232.
TFTP-based. Upgrading firmware by TFTP (Trivial File Transfer Protocol).
HTTP-based. Upgrading firmware by HTTP (HeperText Transfer Protocol).
Configuration backup. The configuration settings of the WLAN hotspot access gate-
way can be backed up to a file via TFTP or HTTP for later restoring.
Configuration reset. Resetting the configuration settings to factory-default values.
Management
Web-based Network Manager for configuring and monitoring the WLAN hotspot ac-
cess gateway via a Web browser. The management protocol is HTTP (HeperText Transfer
Protocol)-based. The access gateway can be configured to be managed:
Only from the LAN side.
Both from the LAN side and WAN side.
Only from the WAN side.
In addition, it can also be configured to accept management commands only from specific
hosts.
UPnP. The access gateway responds to UPnP discovery messages so that a Windows XP
user can locate the access gateway in My Network Places and use a Web browser to con-
figure it.
SNMP. SNMP (Simple Network Management Protocol) MIB I, MIB II, IEEE 802.1d,
IEEE 802.1x, Private Enterprise MIB are supported.
System log. For system operational status monitoring.
Local log. System events are logged to the on-board RAM of the access gateway
5

and can be viewed using a Web browser.
Remote log by SNMP trap. Systems events are sent in the form of SNMP traps to
a remote SNMP management server.
Auto Recovery. In rare cases, the firmware of the access gateway gets stuck in an invalid state
and the access gateway appears to be locked up from end user perspective. The access gateway
provides the following mechanisms to automatically recover from the lockup situation, so that
availability is enhanced:
Link integrity detection. The access gateway periodically checks the connectivity be-
tween a reference host and itself. If the connectivity is broken anyhow, the access gateway
restarts automatically. This mechanism is aimed at solving lockup caused by firmware
bugs in the TCP/IP stack of the access gateway.
Periodical restart every day. The access gateway can be configured to restart at a spe-
cific time every day. This mechanism is aimed at solving lockup caused by firmware bugs
that surface only after the access gateway has operated for a long time.
Hardware watchdog timer. The access gateway firmware has to periodically reset the
hardware watchdog timer. If it fails to do this, the hardware watchdog timer restarts the
access gateway automatically. This mechanism is aimed at solving lockup caused by firm-
ware bugs in the OS (operating system) of the access gateway.
LAN/WAN Configurable Ethernet Switch Ports. The WLAN hotspot access gateway
provides a 4-port Ethernet switch so that a stand-alone Ethernet hub/switch is not necessary for
connecting Ethernet client computers to the gateway. These Ethernet ports can be configured as
WAN ports for multiple DSL/cable-based Internet connections support.
1.3. Feature Comparison
Wired Advanced Wireless Advanced
IEEE 802.11 AP functionality
IEEE 802.1x
SNMP IEEE 802.1x MIB
Wireless client isolation
AP load balancing
1.4. LED Definitions
There are several LED indicators on the housing of the WLAN hotspot access gateway. They are de-
fined as follows:
PWR: Power
PPP: PPP/PPPoE. Lights up when a PPP or PPPoE link has been established.
ALV:Alive. Blinks when the gateway is working normally.
ST1-ST2: Status 1 to 2 for status indication
WAN: Ethernet WAN interface
LNK: Link. Lights up when the Ethernet WAN interface is initialized successfully.
ACT: Active. Lights up when the Ethernet WAN interface is transmitting or receiving data.
100/10 1-4: 10/100 Ethernet LAN switch ports
LNK: Link. Lights up when an Ethernet cable is connected firmly to this Ethernet port.
ACT: Active. Lights up when this Ethernet port is transmitting or receiving data.
6

7

2. First-Time Installation and Configuration
2.1. Powering the WLAN Hotspot Access Gateway
1. Plug the power adapter to an AC socket.
2. Plug the connector of the power adapter to the power jack of the WLAN hotspot access gateway.
NOTE: This product is intended to be power-supplied by a Listed Power Unit, marked “Class 2” or
“LPS” and output rated “5V DC, 1 A minimum” or equivalent statement.
2.2. Mounting the WLAN Hotspot Access Gateway
on a Wall
The WLAN hotspot access gateway is wall-mountable.
1. Stick the supplied sticker for wall-mounting.
2. Use a
φ7.0mm driller to drill a 25mm-deep hole at each of the cross marks.
3. Plug in a supplied plastic conical anchor in each hole.
4. Screw a supplied screw in each plastic conical anchor for a proper depth so that the WLAN hot-
spot access gateway can be hung on the screws.
5. Hang the WLAN hotspot access gateway on the screws.
Fig. 1. Mounting the WLAN hotspot access gateway on a wall.
2.3. Preparing for Configuration
For you to configure a gateway, a managing computer with a Web browser is needed. For configura-
8

tion of a gateway, an Ethernet network interface card (NIC) should have been installed in the manag-
ing computer.
NOTE: If you are using the browser, Opera, to configure a gateway, click the menu item File, click
Preferences..., click File types, and edit the MIME type, text/html, to add a file extension “.sht” so
that Opera can work properly with the Web management pages of the gateway.
Since the configuration/management protocol is HTTP-based, you have to make sure that the IP ad-
dress of the managing computer and the IP address of the managed gateway are in the same IP
subnet. By default (see Appendix A-1, “Default Settings”), the DHCP server functionality of a gate-
way is enabled, so that if the managing computer is set to automatically obtain an IP address by
DHCP, the condition can be satisfied easily.
2.3.1. Connecting the Managing Computer and the WLAN
Hotspot Access Gateway
Connect the Ethernet managing computer to anyone of the LAN switch ports of the managed gateway
with a normal Ethernet cable (see Fig. 2).
NOTE: There are two types of Ethernet cables—normal and crossover.
Normal
Ethernet
cable
LAN 1-4
Port
Fig. 2. Connecting a managing computer and a WLAN hotspot access gateway via Ethernet.
Since the DHCP server functionality is factory-set to be enabled, it’s recommended that there are no
other computers connected to the other Ethernet switch ports of the gateway, so that you can be
100-percent sure that the gateway will be the DHCP server of the managing computer.
2.3.2. Changing the TCP/IP Settings of the Managing
Computer
Use the Windows Network Control Panel Applet to change the TCP/IP settings of the managing
computer, so that the IP address of the computer and the IP address of the gateway are in the same IP
subnet. If the managing computer is originally set a static IP address, you can either change the IP
address to 192.168.0.xxx (the default IP address of a gateway is 192.168.0.1) and the subnet mask to
255.255.255.0 or select an automatically-obtain-an-IP-address option.
TIP: You can use Wireless Router/AP Browser on the companion CD-ROM to scan for all the gate-
ways on the network. Double-click a scanned gateway to launch the default Web browser to manage
the gateway.
NOTE: On Windows 2000/XP, Wireless Router/AP Browser can only be run by a user with adminis-
trator privilege.
NOTE: For some versions of Windows, the computer needs to be restarted for the changes of TCP/IP
settings to take effect.
9

If the computer is already set to obtain an IP address automatically, you can use the Win-
dows-provided tool, WinIPCfg.exe (on Windows 9x/Me) or IPConfig.exe (on Windows 2000/XP),
to re-obtain an IP address from the gateway. WinIPCfg.exe is a GUI program, and has command
buttons for releasing the current IP address and re-obtaining an IP address. IPConfig.exe is a com-
mand-line program, and the /release option releases the current IP address and the /renew option
triggers the Windows DHCP client subsystem to re-obtain an IP address.
NOTE: By default, the first assignable IP address of the DHCP server on the gateway is 192.168.0.2.
2.4. Configuring the WLAN Hotspot Access Gateway
After the IP addressing issue is resolved, launch a Web browser on the managing computer. Then, go
to “http://192.168.0.1” to access the Web-based Network Manager start page.
NOTE: If you are using the browser, Opera (from Opera Software), to configure a gateway, click the
menu item File, click Preferences..., click File types, and edit the MIME type, text/html, to add a
file extension “.sht” so that Opera can work properly with the Web management pages of the gate-
way.
TIP: For maintenance configuration of a gateway, the gateway can be reached by its host name using
a Web browser. For example, if the gateway is named “gateway”, you can use the URL
“http://gateway” to access the Web-based Network Manager of the gateway.
2.4.1. Entering the User Name and Password
Before the start page is shown, you will be prompted to enter the user name and password to gain the
right to access the Web-based Network Manager. For first-time configuration, use the default user
name “root” and default password “root”, respectively.
Fig. 3. Entering the user name and password.
NOTE: It is strongly recommended that the password be changed to other value for security reasons.
On the start page, click the General, Password link to change the value of the password (see Section
3.3.2 for more information).
TIP: Since the start page shows the current settings and status of the gateway, it can be saved or
printed within the Web browser for future reference.
10

On the start page, click the ConfigWizard link to use a configuration wizard to quickly change the
configuration of the gateway.
Fig. 4. The Start page.
The first page of the configuration wizard is a welcome page. This page gives a brief description of
the configuration process. Click Next to continue. We’ll explain what to do step-by-step in the
following subsections.
11

2.4.2. ConfigWizard Step 1: Selecting an Operational Mode
Fig. 5. Operational modes.
If the gateway is to be used with a DSL or cable modem and the IP address assignment for the
Ethernet WAN interface is achieved by PPPoE, select Gateway with a PPPoE-Based
DSL/Cable Connection.
If the gateway is to be used with a DSL or cable modem and the IP address assignment for the
Ethernet WAN interface is achieved by DHCP, select Gateway with a DHCP-Based
DSL/Cable Connection.
If the gateway is to be used with a DSL or cable modem and the IP address of the Ethernet
WAN interface has to be manually set, select Gateway with a Static-IP DSL/Cable Connec-
tion.
If you have multiple ADSL/cable connections, select Gateway with nDSL/Cable Connections.
Select the number of connections using the drop-down list, and then specify the type, downlink
date rate and uplink data rate of each ADSL/cable connection. The specified data rates affect the
load-balancing engine of the gateway.
12

2.4.3. ConfigWizard Step 2: Configuring TCP/IP Settings
2.4.3.1. Gateway with a PPPoE-Based DSL/Cable Connection
Fig. 6. TCP/IP settings for Gateway with a PPPoE-Based DSL/Cable Connection mode.
If the gateway was set to be in Gateway with a PPPoE-Based DSL/Cable Connection mode, two IP
addresses are needed—one for the Ethernet LAN interface and the other for the WAN interface. The
LAN IP address must be set manually to a private IP address, say 192.168.0.xxx. The default LAN IP
address is 192.168.0.1 and the default subnet mask is 255.255.255.0. In most cases, these default set-
tings need no change.
As for the WAN IP address, it is obtained automatically by PPPoE from the ISP. Consult your ISP for
the correct User name, Password, and Service name settings.
The Trigger mode setting specifies the way a PPPoE connection is established. Your PPPoE connec-
tion can be established and torn down manually (Manual) by clicking the Connect and Disconnect
buttons on the Start page, respectively. Or you can choose to let the device automatically (Auto) es-
tablish a PPPoE connection at bootup time. In Auto mode, if the connection is disrupted, the device
will try to re-establish the broken connection automatically.
2.4.3.2. Gateway with a DHCP-Based DSL/Cable Connection
Fig. 7. TCP/IP settings for Gateway with a DHCP-Based DSL/Cable Connection mode.
If the gateway was set to be in Gateway with a DHCP-Based DSL/Cable Connection mode, two IP
addresses are needed—one for the Ethernet LAN interface and the other for the WAN interface. The
LAN IP address must be set manually to a private IP address, say 192.168.0.xxx. The default LAN IP
address is 192.168.0.1 and the default subnet mask is 255.255.255.0. In most cases, these default set-
tings need no change.
As for the WAN IP address, it is obtained by DHCP from the ISP. The Trigger mode setting affects
13
Table of contents
Other Atel Gateway manuals
Popular Gateway manuals by other brands

Wulian
Wulian WL-ZGWMDPB-G100-02 user manual

Philips
Philips Dynalite DMNG232 installation instructions

TEKTELIC Communications
TEKTELIC Communications KONA Enterprise quick start guide

Epygi
Epygi QXE1T1 installation guide

Lucent Technologies
Lucent Technologies orinoco Getting started

HMS
HMS Intesis INMBSOCP 0100 Series Installation sheet