ICC Link Series User manual

Link Series Access Control System
Web User Guide
Link1000ACS & Link2000ACS
Link Series Access Control System
Web User Guide
Link1000ACS & Link2000ACS
www.intcomcorp.com
© 2017 All rights reserved. International Communications Corp.

ICC Networking’s industry-leading flexible unified Access Control System (ACS) platform with
enhanced capabilities, has added software features, enhanced Security with 11 different Wireless
Intrusion Detection methods, Architecture flexibility with premise and virtual capabilities, and
enhanced Content Control driven by software features to ensure performance and return-on-
investment.
The Link1000ACS and Link2000ACS share the same software platforms and as a result, the same
GUI interface. This makes it easy for any institution to learn on one device and transfer knowledge
between different parts of their networks. The examples used in this manual applies to both
products.
ICC Networking’s industry-leading flexible unified Access Control System (ACS) platform with
enhanced capabilities, has added software features, enhanced Security with 11 different Wireless
Intrusion Detection methods, Architecture flexibility with premise and virtual capabilities, and
enhanced Content Control driven by software features to ensure performance and return-on-
investment.
The Link1000ACS and Link2000ACS share the same software platforms and as a result, the same
GUI interface. This makes it easy for any institution to learn on one device and transfer knowledge
between different parts of their networks. The examples used in this manual applies to both
products.

This is the Link Series ACS Wireless Web Interface User’s Manual. It contains instructions to configure the wireless components of the
Link Series ACS Access Control WLAN (Link1000ACS and Link2000ACS) and any of its associated access points (AP).
Intended audience
This manual is designed to be used by network managers, administrators, and technicians who are responsible for installing networking
equipment in enterprise and service provider environments. Knowledge of telecommunication and Internet protocol (IP) technologies and
advanced knowledge of LAN/WLAN networking is assumed.
Documentation
icXchange®product and support documentation consists of a variety of manuals, installation guides, videos, knowledge articles, sample
designs, and troubleshooting and FAQ guides to assist you with the deployment of your new and innovative solution.
These and other documents are available for download at http://www.intcomcorp.com/warranty-support/.
To view PDF files, use Adobe Acrobat Reader®5.0 or newer. Download Acrobat Reader®for free from the Adobe website:
www.adobe.com/products.
Contact information
Phone: (951)934-0531
E-mail: [email protected]
sales@intcomcorp.com
ICONS
This is the Link Series ACS Wireless Web Interface User’s Manual. It contains instructions to configure the wireless components of the
Link Series ACS Access Control WLAN (Link1000ACS and Link2000ACS) and any of its associated access points (AP).
Intended audience
This manual is designed to be used by network managers, administrators, and technicians who are responsible for installing networking
equipment in enterprise and service provider environments. Knowledge of telecommunication and Internet protocol (IP) technologies and
advanced knowledge of LAN/WLAN networking is assumed.
Documentation
icXchange®product and support documentation consists of a variety of manuals, installation guides, videos, knowledge articles, sample
designs, and troubleshooting and FAQ guides to assist you with the deployment of your new and innovative solution.
These and other documents are available for download at http://www.intcomcorp.com/warranty-support/.
To view PDF files, use Adobe Acrobat Reader®5.0 or newer. Download Acrobat Reader®for free from the Adobe website:
www.adobe.com/products.
Contact information
Phone: (951)934-0531
E-mail: support@intcomcorp.com
ICONS

iiWireless Web Interface User’s Manual
Safety precautions
For safe and efficient use, read the following information.
Text conventions
Table 0-1: Text conventions
Icon Description
NOTE
Emphasizes information to improve product use.
IMPORTANT Indicates important information or instructions that must be followed.
Indicates how to avoid equipment damage or faulty application.
Issues warnings to avoid personal injury.
Below is a listing of safety precautions and definitions.
Table 0-2: Safety precautions
Icon Description
Before working on this equipment, be aware of good safety practices and the hazards involved
with electrical circuits.
To reduce risk of fire hazard and electric shock, do not install the unit near a damp location.
To reduce the risk of fire, use only number 26 AWG or larger UL Listed or CSA Certified
telecommunication line cord for all network and telecommunication connections.
• Keep the product in a clean and dust-free location. Use only a soft, damp cloth to clean the product.
• DO NOT expose the product to liquid or moisture.
• DO NOT expose the product to extreme temperatures.
CAUTION
CAUTION
WARNING
WARNING
WARNING

iiiWireless Web Interface User’s Manual
Intended audience .......................................................................................i
Documentation ............................................................................................i
Contact information ....................................................................................i
Icons...............................................................................................................i
Safety precautions..................................................................ii
Text conventions.........................................................................................ii
Table of Contents...................................................................iii
Chapter 1: Introduction to Web Page Configuration..........1
1.1 Configuration preparation ..................................................................1
1.1.1 Computer requirements ..........................................................1
1.1.2 The Link2000ACS management through Web ......................1
1.2 Web interface introduction .................................................................5
1.2.1 Log in to the Link2000ACS.......................................................5
1.2.2 Web interface introduction.....................................................5
1.2.3 Menu introduction....................................................................6
1.2.4 Exiting the Web interface of the Link2000ACS.....................8
Chapter 2: Dashboard.............................................................9
2.1 System info............................................................................................9
2.2 Managed access point ........................................................................10
2.3 Device info...........................................................................................10
2.4 Support ................................................................................................10
Chapter 3: Fast configuration............................................. 11
3.1 IP configuration ..................................................................................11
3.2 AP group configuration......................................................................12
3.3 Network configuration.......................................................................12
3.3.1 SSID ..........................................................................................12
3.3.2 Security ....................................................................................13
Chapter 4: System configuration ....................................... 15
4.1 WLAN enable.......................................................................................15
4.2 Auto IP assign mode...........................................................................15
4.3 AP authentication mode ....................................................................16
4.4 AP validation method.........................................................................16
4.5 Radius authentication server ............................................................17
4.6 Radius accounting mode....................................................................17
4.7 Radius accounting server...................................................................17
4.8 Client-QoS global mode .....................................................................17
4.9 Country code .......................................................................................18
4.10 Peer group ID ....................................................................................18
4.11 Cluster priority..................................................................................18
Chapter 5: Networks............................................................ 19
5.1 Configure network ID.........................................................................19
5.2 Configure authentication mode........................................................19
5.2.1 Open authentication mode ..................................................19
5.2.2 Static WEP authentication mode .........................................20
5.2.3 WEP 802.1x..............................................................................20
5.2.4 WPA personal..........................................................................21
5.2.5 WPA enterprise.......................................................................21
5.3 Configure VLAN ..................................................................................22
5.4 MAC authentication............................................................................22
5.5 Portal instance ....................................................................................22
5.6 Client QoS............................................................................................23
Chapter 6: AP group management..................................... 24
6.1 Add/modify/delete AP group............................................................24
6.1.1 Normal attribute.....................................................................25
6.1.2 AP configuration.....................................................................25
6.1.3 Radio .......................................................................................26
6.1.4 VAP...........................................................................................27
6.1.5 QoS ...........................................................................................28
6.1.6 TSPEC .......................................................................................29
6.2 Copy AP group.....................................................................................29
6.3 Apply AP group ...................................................................................30
Chapter 7: Security authentication.................................... 31
7.1 Radius configuration ..........................................................................31
7.1.1 Global configuration ..............................................................31
7.1.2 Radius authentication server configuration .......................32
7.1.3 Radius accounting server configuration ..............................32
7.1.4 Radius group manage.............................................................33
7.1.5 Radius configuration ..............................................................33
7.2 LDAP configuration ............................................................................34
Table of Contents

ivWireless Web Interface User’s Manual
Chapter 8: Discovery............................................................ 36
8.1 IP discovery..........................................................................................36
8.1.1 Enable and disable IP discovery............................................36
8.1.2 Add IP of L3/IP discovery.......................................................36
8.1.3 Delete IP address from L3/IP discovery list ........................36
8.2 L2 VLAN discovery..............................................................................36
8.2.1 Enable L2 VLAN discovery .....................................................36
8.2.2 Add VLAN of L2/VLAN discovery..........................................37
8.2.3 Delete VLAN from L2 VLAN discovery list ..........................37
Chapter 9: Provisioning....................................................... 38
9.1 AP provisioning...................................................................................38
9.2 AC provisioning...................................................................................39
9.3 Mutual authentication .......................................................................40
Chapter 10: Provisioning over NAT.................................... 41
10.1 NAT provisioning configuration......................................................42
10.1.1 NAT ports...............................................................................42
10.1.2 Access point NAT configuration .........................................42
10.2 Link2000ACS access controller NAT configuration ......................43
10.2.1 NAT ports...............................................................................43
10.2.2 Link2000ACS NAT configuration ........................................43
Chapter 11: WIDS security .................................................. 45
11.1 WIDS AP configuration.....................................................................46
11.2 WIDS client configuration................................................................47
11.3 Known client......................................................................................48
11.3.1 MAC authentication mode ..................................................48
11.3.2 Black/white list configuration ............................................49
Chapter 12: Captive portal.................................................. 50
12.1 Global configuration ........................................................................50
12.2 Captive portal authentication type................................................51
12.3 Portal server configuration.............................................................51
12.4 Free resource configuration............................................................52
12.5 MAC portal configuration................................................................53
12.6 Portal instance configuration .........................................................54
Chapter 13: Configuration push......................................... 56
13.1 Configuration push...........................................................................56
13.2 Configuration push option ..............................................................56
Chapter 14: AP image upgrade........................................... 58
14.1 AP manual upgrade configuration..................................................58
Chapter 15: Load balance.................................................... 63
15.1 Create template................................................................................63
15.2 AP profile associated load balance template................................64
15.3 Delete load balance template.........................................................64
Chapter 16: Data transfer ................................................... 65
16.1 Centralized L2 tunnel configuration ..............................................65
16.1.1 VLAN config ..........................................................................65
16.1.2 Station isolation VLAN ........................................................66
Chapter 17: Time limit policy.............................................. 67
17.1 Network time limit configuration...................................................67
17.2 Radio time limit configuration........................................................68
Chapter 18: Organization unique identifier (OUI) ........... 69
18.1 Add OUI..............................................................................................69
18.2 Delete OUI.........................................................................................69
Chapter 19: Trap and syslog................................................ 70
19.1 SNMP traps........................................................................................70
19.1.1 Wireless global traps ...........................................................70
19.2 Syslog configuration ........................................................................71
19.2.1 Wireless syslog configuration.............................................71
19.2.2 Captive portal syslog configuration...................................71
Chapter 20: Monitor ............................................................ 72
20.1 AC .......................................................................................................72
20.1.1 Cluster ...................................................................................73
20.1.2 Each AC status/statistics .....................................................76
20.2 AP .......................................................................................................78
20.2.1 Basic AP information............................................................78
20.2.2 AP detail ................................................................................79
20.2.3 Failure AP list ........................................................................82
20.3 Wireless client...................................................................................83
20.3.1 Associated client list ............................................................83
20.3.2 Associated client detail .......................................................84
20.3.3 Detected client list...............................................................85
20.3.4 Detected client detail ..........................................................86
20.4 RF scan ...............................................................................................88

vWireless Web Interface User’s Manual
20.4.1 AP RF scan status..................................................................88
20.4.2 AP RF scan detail ..................................................................88
20.4.3 Client dynamic blacklist.......................................................90
Chapter 21: Management ................................................... 91
21.1 Basic configuration...........................................................................91
21.1.1 Login user configuration .....................................................91
21.1.2 Login user authentication method configuration ............92
21.1.3 Login user security IP management ...................................93
21.1.4 Basic configuration...............................................................93
21.1.5 Save current running-configuration...................................94
21.2 SNMP configuration .........................................................................95
21.2.1 SNMP Authentication ..........................................................95
21.2.2 SNMP management..............................................................99
21.2.3 Community managers ..........................................................99
21.2.4 Configure SNMP manager security IP..............................100
21.2.5 SNMP Statistics...................................................................101
21.3 SSH management............................................................................101
21.3.1 Switch on-o SSH ...............................................................102
21.3.2 SSH management ...............................................................102
21.4 Firmware update.............................................................................103
21.4.1 TFTP client service .............................................................105
21.4.2 TFTP server service ............................................................106
21.4.3 FTP client service ...............................................................107
21.4.4 FTP server service ..............................................................108
21.5 Telnet server configuration...........................................................109
21.5.1 Telnet server state .............................................................109
21.5.2 Max numbers of telnet access connection ......................109
21.6 Maintenance and debugging command.......................................110
21.6.1 Debug command.................................................................111
21.6.2 Others ..................................................................................112
Regulatory and compliance .............................................. 114
Warranty ............................................................................. 117

1Wireless Web Interface User’s Manual
Chapter 1: Introduction to Web Page Configuration
This chapter details the Web configuration page.
1.1 Configuration preparation
Manage the Link2000ACS by connecting to the Web via an Ethernet interface.
1.1.1 Computer requirements
• Compatible operating systems (Win XP®/Win 7®/Win 8®/Mac OS® 10.6/7)
• Web browser (IE 8/9/10/11, Google Chrome™, Firefox®, Safari®)
1.1.2 The Link2000ACS management through Web
To configure the Link2000ACS locally, the PC’s and the Link2000ACS’s IP addresses should be configured in the same subnet. The
Link2000ACS default IP address is 192.168.1.1, and the subnet mask is 255.255.255.0.
The following are steps to create a network connection.
Step 1: Set up the environment.
Figure 1-1: Web management configuration environment
Connect the PC Ethernet port to the Link2000ACS Ethernet port with an Ethernet cable.

2Wireless Web Interface User’s Manual
Step 2: Set up the network connection (as shown with Windows 7®).
Click Start. Select Control Panel. Click View network status and tasks, and then click Local Area Connection. The Local Area
Connection Status dialog box will appear, as shown in Figure 1-2.
Figure 1-2: Local area connection status
Click Properties to open the Local Area Connection Properties dialog box, as shown in Figure 1-3.
Figure 1-3: Local area connection properties

3Wireless Web Interface User’s Manual
Select Internet Protocol Version 4 (TCP/IPv4), and then click Properties to open the Internet Protocol (TCP/IP) Properties
dialog box. Select Use the following IP address, type the IP address (between 192.168.1.2 and 192.168.1.254) and the subnet mask
(255.255.255.0), then click OK.
Figure 1-4: Internet protocol (TCP/IP) properties
Step 3: Use PING command to ensure the connection status between the PC and the Link2000ACS.
Click Start, and then type CMD in the text box. Press ENTER to generate the Command Prompt window. Type ping 192.168.1.1 (the
Link2000ACS’s default IP address), and then press ENTER. If the network is connected, the window will include the following text (Figure
1-5).
If this text is not shown, confirm the network connection is plugged in properly, the Ethernet cable is functioning properly, and that the PC
has the correct IP address, as configured previously.

4Wireless Web Interface User’s Manual
Figure 1-5: Dialog box for command lines
Step 4: Cancel proxy server.
If the current PC uses the proxy server to access the Internet, the proxy server must be disabled. Complete the following steps to disable
the proxy server:
1. In Internet Explorer, select Tools, and then select Internet Options to open the Internet Options window.
2. Select Connections in the Internet Options window, and then click LAN Settings to open the Local Area Network (LAN) Settings
dialog box, as shown in Figure 1-6.
Figure 1-6: Local area network (LAN) settings
3. Ensure that Use a proxy server for your LAN is not selected. Otherwise, clear the selection, and then click OK.

5Wireless Web Interface User’s Manual
1.2 Web interface introduction
1.2.1 Log in to the Link2000ACS
Open the Web browser, type the IP address 192.168.1.1 in the address bar, and press ENTER to open the login page for the Link2000ACS.
Type the username and password (the default username is admin, and the password is admin), click Login, or press ENTER to open the
Web Configuration page. The figure is shown as follows:
1.2.2 Web interface introduction
Upon logging in, the dashboard will appear, showing the basic information of the current Link2000ACS and the managed AP status.
Chapter 2 provides a detailed introduction to the dashboard.
At the top of the screen are tabs for each functional module. Click the corresponding tab to configure the wireless or wired functions.

6Wireless Web Interface User’s Manual
1.2.3 Menu introduction
On the top right of the main Graphical User Interface (GUI) screen there are three fields; user account name, Save Configuration and
Logout.
• user account name - The name of the user’s login account. Admin will be displayed if the user is logged in under an admin account. A
user can create multiple login accounts with various privilege levels as discussed in Chapter 21.
• Save Configuration – Click Save Configuration to retain the running configuration. This saved configuration will be used by the
Link2000ACS after a reboot.
• Logout – Click Logout to exit the current configuration session.
Users can check the connected configuration interface function with each menu option, as noted in the following table.
Menu Page Page Function
Dashboard
WLAN configuration Fast Configuration
System Configuration
Networks
AP Group Management
Security Authentication
Discovery
Provisioning
WIDS Security
Captive Portal
Advanced Configuration Configuration Push
AP Image Upgrade
Load Balance
Data Transfer
Time Limit Policy
Organization Unique Identifier (OUI)
Trap and Syslog
Monitor AC
AP
Wireless Client
RF Scan

7Wireless Web Interface User’s Manual
Menu Page Page Function
Management Switch Basic Configuration Login User Configuration
Login User Authentication Method Configuration
Login User Security IP Management
Basic Configuration
Save Current Running-Configuration
SNMP Configuration SNMP Authentication
SNMP Management
Community Managers
Configure SNMP Manager Security IP
SNMP Statistics
SSH Management Switch on-off SSH
SSH Management
Firmware Update TFTP Service
FTP Service
Telnet Server Configuration Telnet Server State
Max Numbers of Telnet Access Connection
Maintenance and Debugging Command Debug Command
Show Clock
Show CPU Usage
Show Memory Usage
Show Flash
Show Running-config
Show Switchport Interface
ShowTCP
Show UDP
Show Telnet Login
Show Version

8Wireless Web Interface User’s Manual
1.2.4 Exiting the Web interface of the Link2000ACS
Click Logout to exit and return to the Login page.
The chapters that follow describe how to enable and configure various features offered by the icXchange® solution. To properly access
the advanced configuration options for a particular feature, the feature must first be enabled by following the configuration steps for that
feature as described in this user manual. If the feature is not enabled, users may not be able to perform advanced configuration for that
feature. Warning messages may be displayed identifying that the feature must first be enabled before the configuration can be completed.

9Wireless Web Interface User’s Manual
Chapter 2: Dashboard
The dashboard includes four parts: System Info, Managed AP, Device Info, and Support.
2.1 System info
System Info for the Link2000ACS is as follows:
The information in the figure is as follows:
• Name: the name of the Link2000ACS is Link2000ACS.
• IP Address: the wireless address of the Link2000ACS is 192.168.1.1.
• MAC Address: the MAC address of the Link2000ACS is f8-f7-d3-2c-fe-24.
• System Uptime: the normal running time: 1 day, 4 hours, and 2 minutes.
• Maximum Managed APs: 16.
• S/N: WLD006510D709000028.
• Version: 7.0.3.0(R0041.0019).
• : click to refresh the information.

10Wireless Web Interface User’s Manual
2.2 Managed access point
Managed AP shows the MAC Address, Location, IP Address, Profile, Software Version, Status, Configuration Status and Age.
• MAC Address: AP’s MAC address
• Location: location of AP
• IP Address: IP address of AP
• Profile: profile that the AP belongs to
• Software Version: version of AP
• Status: AP’s current management status
• Configuration Status: AP’s current configuration status
• Age: AP keep alive age - will only increment on AP failure
Click the AP’s MAC address to access the Detailed AP List page.
2.3 Device info
Device Info displays the total number of managed APs and authenticated clients in the cluster.
2.4 Support
Support provides the company’s email address, hotline phone number, and the website address.

11Wireless Web Interface User’s Manual
Chapter 3: Fast configuration
Click WLAN Configuration->Fast Configuration to configure the WLAN functions, including the WLAN managed IP address, AP groups,
and the basic network configuration. This configuration is submitted to the Link2000ACS.
Note: Fast Configuration is a simple way to perform initial configurations on the Link2000ACS. However, using the Fast Configuration
option will overwrite all previous configurations that were previously configured on the Link2000ACS.
3.1 IP configuration
IP Configuration is used to configure the wireless IP address. Type the wireless IP address. The IP address entered will be configured as
the wireless IP address.

12Wireless Web Interface User’s Manual
3.2 AP group configuration
AP Group Configuration adds and updates the ID and hardware type of the AP group.
Example: Type 2 in the Group ID box. Select 22 - ARC2000MAP, Indoor Dual Band Radio 802.11N as the corresponding AP Hardware
Type, and then click Add to add them to the page.
Note: You must click Submit after entering all information on the Fast Configuration page to save the configuration to the Link2000ACS,
or the modification will be lost.
3.3 Network configuration
Network Configuration configures the network used by AP. The network configuration can configure SSID and security settings for
Network1, which are applied to the VAP for all AP groups.
3.3.1 SSID
SSID is the service set mark of the WLAN; in this example, it is the name of the WLAN. SSID can divide one WLAN into subnets that need
different ID authentication. Only the user who passes the ID authentication can access the corresponding subnet. It can prevent users
without appropriate permissions from accessing this network.
Example: Type the name of the network in the SSID box, such as Network1. Select None for Security. Click Submit.

13Wireless Web Interface User’s Manual
3.3.2 Security
Security can configure the access control of the security authentication. The methods of authentication include Static WEP, WEP
IEEE802.1x, WPA/WPA2 Personal, and WPA/WPA2 Enterprise.
3.3.2.1 WEP mode
Select WEP to access the quick WEP authentication configuration. Under WEP, there are two types of modes: Static WEP and WEP
IEEE802.1x.
Static WEP has the same configuration as WLAN Configuration->Network Config (detailed in Chapter 5: Networks).
Select WEP IEEE802.1x to configure it.
Example: Type the Radius Group Name as radius. Type the Authentication Host Address and Accounting Host Address as 192.168.1.100.
Enter the Radius Server Key that corresponds to the Key set on the configured radius server, and then click Submit.
Note: Only the RADIUS authentication and accounting server without configuration can be configured in Fast Configuration. If they
were already configured, they cannot be deleted or modified in the configuration (detailed in Chapter 7: Security authentication).
This manual suits for next models
2
Table of contents
Other ICC Wireless Access Point manuals