3e Technologies 523E-900 WiMesh End Point Kit 900 MHz Option User Manual 3e 523 525N Family User Guide
3e Technologies International, Inc. WiMesh End Point Kit 900 MHz Option 3e 523 525N Family User Guide
User Manual Revised
AirGuard WiMesh 3e-523 Series Models: 3e–523A, 3e-523S, 3e-523E-900, and 3e-523M (OEM Module) User’s Guide Ultra Electronics, 3e TI 9713 Key West Ave, Suite 500 Rockville, MD 20850 (800) 449-3384 www.ultra-3eti.com October 2015 October 2015 Copyright 2015 Ultra Electronics, 3eTI 29000169-005 Revision C1 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide This page intentionally left blank. Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Copyright © 2015 Ultra Electronics, 3eTI, All rights reserved. No part of this document may be reproduced in any form or by any means or to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3eTI. 3eTI reserves the right to revise this document and to make changes in content from time to time without obligation on the part of 3eTI to provide notification of such revision or change. 3eTI provides this document without warranty, term or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms, or conditions of merchantability, satisfactory quality, and fitness for a particular purpose. 3eTI may make improvements or changes in the product(s) and/or the program(s) described in this document at any time. Certain features listed may have restricted availability and/or are subject to change without notice - please confirm material features when placing orders. If there is any software or removable media described in this document, it is furnished under a license agreement included with the product as a separate document, in the printed document, or on the removable media in a readable file such as license.txt or the like. If you are unable to locate a copy of the license, contact 3eTI and a copy will be provided to you. GOVERNMENT RIGHTS LEGEND The U.S. Government’s rights in this document, the products described, and all technical data and computer software are limited by DFARS 252.227 7014 pertaining to restricted rights software, and DFAR 252.227-7015 pertaining to limited rights technical data developed at private expense; or currently limited under DFARS 252.227-7018 small business innovative research programs, whichever is applicable. 3eTI, the 3eTI logo and AirGuard are registered trademarks. Sensus is a registered trademark of Sensus. ISA100.11A is a registered trademark of International Society of Automation. Windows is a registered trademark of Microsoft Corporation. Any other company and product name mentioned herein is a trademark of the respective company with which they are associated. EXPORT RESTRICTIONS This product contains components, software, and/or firmware exported from the United States in accordance with U.S. export administration regulations. Diversion contrary to U.S. law is prohibited. Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Table of Contents 1. Introduction…………. ....................................................................................................................... 6 1.1 Basic Features ............................................................................................................................ 6 1.2 Wireless Basics ........................................................................................................................... 7 1.2.1 Bridging / Mesh Operation .................................................................................................. 8 1.2.2 Access Point Operation ...................................................................................................... 8 1.2.3 Client Operation ................................................................................................................. 8 1.2.4 Data Encryption and Security ............................................................................................. 8 1.3 Device Management and Administration ...................................................................................... 9 1.4 Product Family Navigation Options .............................................................................................. 9 2. Device Configuration ..................................................................................................................... 10 2.1 Preliminary Configuration Steps ................................................................................................. 10 2.2 System Configuration ................................................................................................................ 13 2.2.1 General ……………………………………………………………………………………………...13 2.2.2 Operating Mode ............................................................................................................... 14 2.2.3 System Deployment ......................................................................................................... 16 2.2.4 WAN 2.2.5 Serial Port ........................................................................................................................ 17 2.2.6 WLAN QoS/WMM ............................................................................................................ 19 2.3 ........................................................................................................................... 16 Wireless AP and Bridge Mode ................................................................................................... 23 2.3.1 Radio Configuration for 3e-523A, 3e-523S and 3e-523M .................................................. 23 2.3.2 Radio Configuration for 3e-523E-900 ............................................................................... 24 2.3.3 Bridge Mode..................................................................................................................... 27 2.3.4 Bridge Encryption ............................................................................................................. 31 2.3.5 MAC Address Filtering ..................................................................................................... 32 2.3.6 AP Encryption .................................................................................................................. 33 2.3.7 Wireless VLAN ................................................................................................................. 35 2.3.8 AP MAC Filtering.............................................................................................................. 41 2.3.9 Rogue AP Detection ......................................................................................................... 42 2.3.10 AP Advanced ................................................................................................................... 43 2.4 Service Settings......................................................................................................................... 44 Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.4.1 SNMP Agent .................................................................................................................... 44 2.4.2 Serial Communication ...................................................................................................... 46 2.4.3 Remote Administration ..................................................................................................... 48 2.5 Admin User Management .......................................................................................................... 49 2.5.1 List All Users .................................................................................................................... 50 2.5.2 Add New User .................................................................................................................. 51 2.5.3 User Login Policy ............................................................................................................. 51 2.6 Monitoring/Reports .................................................................................................................... 53 2.6.1 System Status .................................................................................................................. 54 2.6.2 Bridging Status................................................................................................................. 54 2.6.3 Bridge Site Map................................................................................................................ 55 2.6.4 Wireless Clients ............................................................................................................... 56 2.6.5 Adjacent AP List ............................................................................................................... 57 2.7 Logs .......................................................................................................................... 57 2.7.1 System Log ...................................................................................................................... 58 2.7.2 Web Access Log .............................................................................................................. 58 2.8 Auditing ........................................................................................................................... 59 2.8.1 Audit Log.......................................................................................................................... 59 2.8.2 Report Query ................................................................................................................... 60 2.8.3 Configuration.................................................................................................................... 61 2.9 System Administration ............................................................................................................... 63 2.9.1 E-mail Notification Configuration....................................................................................... 63 2.9.2 Radio Tx Off Control......................................................................................................... 65 2.9.3 System Upgrade .............................................................................................................. 65 2.9.4 Factory Default ................................................................................................................. 67 2.9.5 Remote Logging ............................................................................................................... 68 2.9.6 Reboot ........................................................................................................................... 69 2.9.7 On Demand Self-test ........................................................................................................ 69 2.9.8 Periodic Self-test .............................................................................................................. 70 2.9.9 Utilities ........................................................................................................................... 71 2.9.10 Help 2.10 .......................................................................................................................... 72 Operational Configurations ........................................................................................................ 73 3. WiMesh End Points 3e-523A and 3e-523E-900 Hardware Installation ......................................... 82 Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3.1 3e-523A Hardware Installation ................................................................................................... 82 3.1.1 Connectors and Cabling ................................................................................................... 83 3.1.2 Indoor Accessory Kit Installation ....................................................................................... 84 3.1.3 Outdoor Accessory Kit Installation .................................................................................... 85 3.1.4 The Indicator Lights.......................................................................................................... 88 3.1.5 Reset Button .................................................................................................................... 89 3.2 3e-523E-900 Hardware Installation ............................................................................................ 90 3.2.1 Specifications ................................................................................................................... 90 3.2.2 Mounting Pattern .............................................................................................................. 91 3.2.3 Installation Requirements ................................................................................................. 92 3.2.4 RF Connections ............................................................................................................... 93 3.2.5 RF Safety Information ...................................................................................................... 93 4. WiMesh PAC-Link (3e-523S) Hardware Overview......................................................................... 94 5. WiMesh End Point OEM Module (3e-523M)................................................................................... 95 5.1.1 Mechanical Drawings ............................................................................................................ 103 6. Technical Support .................................................................................................................. 104 Appendix A: Glossary ................................................................................................................... 105 Appendix B: Two-Factor Authentication Overview and Configuration .......................................... 106 Appendix C: Common Criteria Supplement .................................................................................... 126 Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 1. Introduction This manual covers the installation and operation of the Ultra Electronics, 3eTI AirGuard WiMesh Series model numbers: 3e–523 family of products. These rugged secure data points have been designed and tested for use in harsh demanding environments were durability is a key requirement. The 3e-523 product family consists of the 3e-523A, 3e-523S, 3e-523M and the 3e-523E-900 (hereinafter referred to as the 3e-523, unless otherwise specified). The 3e-523 includes FIPS-140-2 certified AES/3DES cryptographic modules for wireless encryption and HTTPS/TLS, for secure web communication. The cryptographic modules provide the following encryption capabilities. AES (128/192/256 bit) AES-CCM (128 bit) 1.1 Basic Features The AirGuard WiMesh 3e-523 family of products is made up of four different products each designed to meet specific user needs and requirements. This section provides a general overview of interfaces and specific capabilities of each product. A more detailed description of the different products can be found in the product specific chapters found later in this manual. The WiMesh End Point 3e-523A provides the following interfaces: One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a wired network. Two 802.11a/b/g antenna ports. One DB-15 RS-232/422/485 & power connector. Device Reset button, provides ability to reset device to either user programmed configuration or factory default. Device grounding connector. The 3e-523A provides the following LED indicator lights: FIPS LED WLAN LED The WiMesh PAC-Link 3e-523S portable adaptive com-link provides the following interfaces: One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a wired network. One DB-9 RS-232 serial port for configuration or interfacing to a sensor. One 802.11a/b/g antenna port. One external power switch. The 3e-523S provides the following LED indicator lights: FIPS LED Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide WLAN LED The WiMesh 3e-523E-900 unit provides the following interfaces: One RJ-45 10 / 100 Mbps WAN Ethernet cable entry port for remote management and for interfacing to a wired network. One 900 MHz N-type female jack antenna connector. One power entry port. Device grounding connector. The WiMesh End Point OEM Module 3e-523M provides the following interface: One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a wired network. Two 802.11a/b/g antenna ports. One 16 pin RS-232/422/485 & Power connector. One 14 pin connector which brings out LED and Advanced Feature Signals. 1.2 Wireless Basics Wireless networking uses electromagnetic radio frequency waves to transmit and receive data. Communication occurs by establishing radio links between the wireless access point and devices configured to be part of the WLAN. The 3e-523 incorporates 802.11 Wi-Fi standards, and FIPS 140-2 compliant security for wireless communication. 802.11a - The IEEE 802.11a standard is an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5 GHz band. Depending on radio design and RF channel issues 802.11a devices can operation at rates between the 54 Mbps maximum and 6 Mbps. 802.11a uses an Orthogonal Frequency Division Multiplexing (OFDM) encoding scheme rather than Frequency-Hopping Spread Spectrum (FHSS) or Direct-Sequence Spread Spectrum (DSSS). 802.11b - The IEEE 802.11b compliant devices provide 11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps depending on signal strength) in the 2.4 GHz band. 802.11b devices operate using Direct-Sequence Spread Spectrum (DSSS) modulation techniques. Note that for the 3e-523E-900 this is the only mode used, and controls to change this are not available in the configuration software. 802.11g - The IEEE 802.11g standard is an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 2.4 GHz band. Depending on radio design and RF channel issues 802.11g devices can operation at rates between the 54 Mbps maximum and 6 Mbps. Like the 802.11a standard Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 802.11g uses an Orthogonal Frequency Division Multiplexing (OFDM) encoding scheme for data transmission. Because 802.11g is backwards-compatible with 802.11b, it is a popular component in LAN construction. 802.11g broadens 802.11b’s data rates to 54 Mbps within the 2.4 GHz band providing higher data transmission rates. 802.11b/g Mixed - 802.11b/g combines 802.11b and 802.11g data rates to offer a broader range of operation. 1.2.1 Bridging / Mesh Operation The 3e-523 functions as a bridge. There are a number of bridging configurations supported, including the following popular configurations: Point-to-point bridging of 2 Ethernet Links. Point-to-multipoint bridging (mesh) of several Ethernet links. Repeater mode (wireless client to wireless bridge). 1.2.2 Access Point Operation The 3e-523 functions as an access point. In this mode of operation the 3e-523 provides wireless networking to multiple client devices while providing connectivity into a local area network (LAN). 1.2.3 Client Operation The 3e-523 can functions as a wireless client. In this mode of operation the 3e-523 acts as a wireless endpoint providing a communication link into a wireless Local Area Network (LAN) network. 1.2.4 Data Encryption and Security The 3e-523 includes advanced wireless security features. Bridging encryption can be established between the 3e-523 using AES-ECB or AES-CCM encryption (approved by the National Institute of Standards and Technology (NIST) for U.S. Government and DoD agencies). There is also the option of no security, but some level of security is recommended. AES - The Advanced Encryption Standard (AES) was selected by National Institute of Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit block cipher algorithm and encryption technique for protecting computerized information. It has the ability to use even larger 192-bit and 256-bit keys, if desired. 802.11i and WPA2 employ AES CCM, which is a combination of AES Counter (CTR) mode per packet data encryption, combined with AES Cipher Block Chaining Message Authentication Code (CBC-MAC) per packet data integrity / authentication of the entire packet including the MAC header. AES CCMP has been deemed to surpass the RC4 stream cipher, upon which the older WEP and WPA security protocols are based. 3eTI was the first company to take its AES algorithm through the NIST CCM algorithm certification process, thereby ensuring that 3eTI’s AES CCMP is standards-based, non-proprietary, and ready for wide WPA2 interoperability usage. Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operation Authentication - Authentication mechanisms are used to authenticate an operator accessing the device and to verify that the operator is authorized to assume the requested role and perform services within that role. Access to the management screens for the 3e-523 requires knowledge of the assigned operator ID and Password. The Factory defaults are: ID: Password: CryptoOfficer CryptoFIPS The Crypto Officer initially installs and configures the 3e-523 after which the password should be changed from the default password. The ID and Password are case sensitive. 1.3 Device Management and Administration After initial setup, maintenance of the system and programming of security functions should be performed by personnel trained in the procedure using the embedded web-based management screens. The next chapter covers the basic procedure for configuration of 3e-523 devices. Table 1 provides a listing of the page organization of the 3e-523 data points. 1.4 Product Family Navigation Options The next chapter covers the basic procedure for setting up the hardware. Table 1 provides an overview of the web GUI screens and menu structure for used to manage and administer 3e-523 devices Table 1 - 3e–523 Data Point Navigation Options System Configuration General Operating Mode System Deployment WAN Serial Port WLAN QoS/WMM Wireless AP & Bridge Radio Bridge Mode Bridge Encryption Bridge MAC Filtering AP Encryption Wireless VLAN AP MAC Filtering Rogue AP Detection AP Advanced Services Settings SNMP Agent Serial Communication Remote Administration Admin User Management List All Users Add New User User Login Policy Monitoring/Reports System Status Bridging Status Bridging Site Map Wireless Clients Adjacent AP List Logs System Log Web Access Log Auditing Audit Log Report Query Configuration System Administration Email Notification Conf Radio Tx Off Control System Upgrade Factory Default Remote Logging Reboot On Demand Self-Test Periodic Self Test Utilities Help Copyright 2015 Ultra Electronics, 3eTI October 2015 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2. Device Configuration 2.1 Preliminary Configuration Steps For the initial configuration, the 3e–523 network administrator may need the following information: IP address – a list of IP addresses available on the organization's LAN that are available to be used for assignment to the 3e–523. Subnet Mask for the LAN. Default IP address of the 3e–523 (192.168.254.254) Local maintenance port IP address (192.168.15.1) DNS IP address. The MAC addresses of wireless card that will be used to access the 3e–523 network of Access Points (if manual bridging mode is used, or if MAC address filtering is to be enabled). The appropriate encryption key for Static AES or AEC_CCM, if state-of-the art key management will be used. Alternately, the appropriate WEP key. Default CW IP address Initial Setup using the LAN Ethernet Port - Plug one end of an RJ-45 Ethernet cable to the LAN RJ-45 Ethernet port of the 3e–523 and the other end to an Ethernet port on your laptop. In order to connect properly to the 3e–523 on the LAN port, the TCP/IP parameters on your laptop must be set to a static IP address. Go to your network connection settings and modify your LAN connection TCP/IP properties. Set the IP address and subnet mask. The IP address can be in the range of 192.168.254.xxx, where xxx can be from 2 to 253 (see Figure 1). Figure 1 - Internet Protocol Properties Copyright 2015 Ultra Electronics, 3eTI October 2015 10 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Now you can open a browser and connect to the 3e–523 to begin configuring the unit. Login - On your computer, pull up a browser window and put the default URL for the3e–523 Local LAN in the address line (Figure 2). https://192.168.254.254 Figure 2 - Login A warning window appears stating that it is unable to verify the identity of DMG gateway as a trusted site. Select "Accept this certificate temporarily for this session" and click Ok (Figure 3). Figure 3 - Web site certification Another security window pops open. Click Ok to continue (Figure 4). Figure 4 - Security window Copyright 2015 Ultra Electronics, 3eTI October 2015 11 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide A standard security alert window (Figure 5) appears. Click Yes to continue. Figure 5 - Security alert window The Device Login window appears (Figure6). You will be asked for your User Name and Password. The default is "CryptoOfficer" with the password "CryptoFIPS" to give full access for setup configuration. (This user name and password is case-sensitive.) Figure6–Login NOTE: If your login session is in-active for more than 10 minutes, then you will have to re-authenticate your identity. If after three times you fail to re-authenticate then your account will be locked. The exception Copyright 2015 Ultra Electronics, 3eTI October 2015 12 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide is if you are the last active CryptoOfficer on the system, then your account will not be locked. The Admin User Management - List All Users screen displays account status. If an account is locked, it will show a status of "Locked" and a reason of "bad passwd". Other accounts show status as "Active" and reason "Normal". The CryptoOfficer is the only role that can unlock an account once it has been locked. Go to the Admin User Management - List All Users screen and click the unlock button at the end of the user entry. Data Point Configuration and Operating Modes - To begin configuration of the 3e-523 Data Points you first must select the mode of operation. 3e-523 devices can operate in one of four different modes. Valid operating modes are provided in the following list below: Standalone Access Point operation. Standalone Bridge operation. Mixed Access Point and Bridge operation. Client only operation. The following subsections how to configure and operate 3e-523 Data Points. 2.2 System Configuration There are six options under System Configuration: General Operating Mode System Deployment WAN Serial Port WLAN QoS/WMM Each screen is described in detail in the following subsections. 2.2.1 General Upon access the 3e-523 web GUI, you will immediately be directed to the System Configuration General screen( Figure 7). This screen lists the firmware version number for your unit and allows you to set the Host Name and Domain Name as well as establish system date and time. (Host and Domain Names are both set at the factory for “default” but can optionally be assigned a unique name for each.) To set the date and time, you can do it manually or set it based on the NTP server. NOTE: The CryptoOfficer is the only user who can set the date and time. The system date must be set to a date after 01/01/2005. In the Description field you can enter a description of the physical location of the unit. This is useful when deploying units to remote locations. When you are satisfied with your changes, click Apply. Copyright 2015 Ultra Electronics, 3eTI October 2015 13 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 7 - System Configuration – General Next go next to the System Configuration - Operating Mode page. 2.2.2 Operating Mode This screen (Figure 8) allows you to set the operating mode to one of the following: Wireless Access Point Wireless Access Point & Bridge Wireless Bridge Copyright 2015 Ultra Electronics, 3eTI October 2015 14 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Wireless Client You only need to visit this page if you will be changing modes, or if you want to change your sub mode Note that if you change modes your configuration will be preserved. If you switch between FIPS 140-2 sub mode and non-FIPS, all previously entered information will be reset to factory settings for the selected wireless mode. Figure 8 - System Configuration - Operating Mode Sub mode There are two options under Sub mode: FIPS 140-2 Mode Use IPv6 Mode To use the 3e–523 in FIPS 140-2 mode, or in IPv6 mode, check the box and click Apply. Copyright 2015 Ultra Electronics, 3eTI October 2015 15 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.2.3 System Deployment The unit is programmed at the factory with the customer's country code. The country code (region) is read-only. The channel list and transmit power varies from region to region based on each country's regional regulations (see Figure 9). Figure 9 - System Configuration - System Deployment 2.2.4 WAN Click the entry on the left hand navigation panel for System Configuration - WAN. This directs you to the System Configuration - WAN screen (Figure 10). If not using DHCP to get an IP address, input the static IP information that the access point requires in order to be managed from the wired LAN. This will be the IP address, Subnet Mask, Default Gateway, and, where needed, DNS 1 and 2. Click Apply to accept changes. Copyright 2015 Ultra Electronics, 3eTI October 2015 16 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 10 - System Configuration - WAN NOTE: After changing the network address you will no longer be able to access the above configuration page with the default IP address. You will have to change the browser URL to reflect the new IP address and log in again. NOTE: If DHCP is selected, a new IP address would be given to the 3e–523 unit after clicking Apply. To log into to unit and keep setting it up, the new IP address needs to be obtained from your Network Administrator. Another way to obtain the new IP address is to set up “Remote Logging” before setting up WAN using DHCP. 2.2.5 Serial Port Click the entry on the left hand navigation panel for System Configuration - Serial Port (Figure 11). The serial settings control the type and format of the serial data to be transmitted and received. NOTE: You must also configure the settings under Services Settings - Serial Communication (Table 2) in order for the system to work. Copyright 2015 Ultra Electronics, 3eTI October 2015 17 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 11 - System Configuration - Serial Port Table 2. Service Settings Serial Settings Interface Type Duplex (RS485 only) Data Rate (bits per second) Data bits Parity Stop bits RS-232 RS-422 RS-485 Full-Duplex Half-Duplex 115200 57600 38400 19200 9600 4800 2400 1200 None Odd Even Select the interface type for the serial I/O port For use with RS-485 interface. In full duplex mode data is transmitted and received simultaneously. In half duplex mode data is transmitted or received but not at the same time. Select the data rate required. Select the number of data bits to be transmitted or received. Select parity to be used. Select number of stop bits to be used. Copyright 2015 Ultra Electronics, 3eTI October 2015 18 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Serial Settings For use with RS-232 interface. When None hardware flow control is selected, RTS and Hardware CTS are used. Flow control (RS232 only) 2.2.6 WLAN QoS/WMM The unit has a Quality of Service (QoS) / Wireless Multi-Media (WMM) capability (Figure 12). The QoS/WMM feature default is set to disable. Figure 12 - System Configuration - WLAN QoS If QoS is enabled, all traffic passing through the unit will be prioritized into four queues (low, normal, medium, high). The traffic can be prioritized by MAC/IP/TCP/UDP/port, etc. The 802.1d BPDU is honored the highest priority without further configuration. If a traffic pattern matches more than one rule in the policies configured, the highest priority among these rules is used. If a traffic pattern does not match any of the configured policies, then the priority is set to normal. There are four policy types to choose from: Application This is a layer 4 (transportation layer) policy. IP address This is a layer 3 (network layer) policy. MAC address This is a layer 2 (link layer) policy. Ethernet protocol This is a layer 2 (link layer) policy. Click on the New QoS Policy tab to configure your QoS policies. Copyright 2015 Ultra Electronics, 3eTI October 2015 19 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Create a policy name Select your priority level from the drop-down list Either enable or disable weather your want an 802.11 acknowledgement. For sensitive data packet loss, (e.g., file transfer), "Enable" is recommended. For less sensitive, non-critical, packet loss (e.g., video), "Disable" is recommended Select a policy type from the drop-down list and configure the policy fields The following screens (Figure 13, Figure 14, Figure 15, Figure 16, and Figure 17) show policy set ups based on type. Figure 13 - Application Policy Type Copyright 2015 Ultra Electronics, 3eTI October 2015 20 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 14 - Ethernet Protocol Policy Type Figure 15 - IP Address Policy Type Copyright 2015 Ultra Electronics, 3eTI October 2015 21 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 16 - MAC Address Policy Type To view any existing QoS policies, click on the "Existing QoS Policies" tab. Copyright 2015 Ultra Electronics, 3eTI October 2015 22 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 17 - Existing QoS Policies 2.3 Wireless AP and Bridge Mode The following subsections describe the screens used when configuring the access point and bridge. The following screens are available in Wireless AP & Bridge mode: Radio Bridge Mode Bridge Encryption Bridge MAC Filtering AP Encryption AP MAC Filtering Rogue AP Detection AP Advanced VLAN All other screens are the same as those described in the Client Mode section. 2.3.1 Radio Configuration for 3e-523A, 3e-523S and 3e-523M The Wireless AP & Bridge - Radio screen (Figure 18) contains wireless bridging information including the channel number, Tx rate, Tx power, spanning tree protocol (802.1d) enable/disable, and remote device's BSSID. This page is important in setting up your access point and bridging configurations. Table 3 below lists the various radio settings. Copyright 2015 Ultra Electronics, 3eTI October 2015 23 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 18 - Wireless AP & Bridge — Radio 2.3.2 Radio Configuration for 3e-523E-900 The Wireless AP and Bridge - Radio screen (shown in Figure 19, below) for the Model 3e-523E-900 contains wireless bridging information including Tx rate, Tx power mode and level, as well as advanced configuration options such as Beacon Interval and RTS Threshold. This page is important in setting up your access point and bridging configurations. Table 3 below lists the various radio settings. Figure 19 – 3e-523E-900 AP and Bridge -- Radio Copyright 2015 Ultra Electronics, 3eTI October 2015 24 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Table 3 - Radio Settings Radio Settings Wireless Mode (option is not available on the 3e-523E-900.) Tx Rate Sets the wireless mode for the wireless bridge. Note: If the device is enabled with 4.9GHz sub-band, you will have two more options: 802.11b/g Mixed 802.11a 802.11a Turbo 4.9G Federal 4.9G Public Safety 802.11b/g Mixed AUTO, 1, 2, 5.5, 11, 6, 9, 12, 18, 24, 36, 48, 54 Mbps (only some of these are available for the 3e-523E-900) 802.11a When set to AUTO, the card attempts to select the optimal rate for the channel. If a fixed rate is used, the card will only transmit at that rate. AUTO, 6, 9, 12, 18, 24, 36, 48, 54 Mbps When set to AUTO, the card attempts to select the optimal rate for the channel. If a fixed rate is used, the card will only transmit at that rate. 802.11a Turbo The card attempts to select the optimal rate for the channel. AUTO Channel Number (dependent on the radio country code configured; option is not available on the 3e-523E-900.) 802.11b/g Mixed 1 (2.412 GHz) 2 (2.417 GHz) 3 (2.422 GHz) 4 (2.427 GHz) 5 (2.432 GHz) 6 (2.437 GHz) 7 (2.442 GHz) 8 (2.447 GHz) 9 (2.452 GHz) 10 (2.457 GHz) 11 (2.462 GHz) 802.11a 52 (5.26 GHz) 56 (5.28 GHz) 60 (5.30 GHz) 64 (5.32 GHz) 149 (5.745 GHz) 153 (5.765 GHz) 157 (5.785 GHz) 161 (5.805 GHz) 165 (5.825 GHz) Sets the channel frequency for the wireless bridge. Sets the channel frequency for the wireless bridge. Copyright 2015 Ultra Electronics, 3eTI October 2015 25 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Radio Settings 802.11a Turbo 50 (5.25 GHz) 58 (5.29 GHz) 152 (5.76 GHz) 160 (5.80 GHz) Tx Pwr Mode Fixed Pwr Level Propagation Distance Sets the channel frequency for the wireless bridge. The Tx Pwr Mode defaults to AUTO, giving the largest range of radio transmission available under ambient conditions. The wireless bridge's broadcast range can be limited by setting the Tx Pwr Mode to Fixed and choosing from 1-8 for Fixed Pwr Level. If you want to prevent any radio frequency transmission from the wireless bridge, set the Tx Pwr Mode to OFF. This will not turn off RF transmissions from any associated wireless devices, but they will not be able to communicate with the wireless bridge when the Tx Pwr Mode is off. OFF FIXED, AUTO 1, 2, 3, 4, 5, 6, 7, 8 (3e-523E-900 transmit power options which start at 4.) < 5 Miles 5-10 Miles 11-15 Miles 16-20 Miles 21-25 Miles 26-30 Miles > 30 Miles (not changeable for the 3e-523E-900.) RTS Threshold Range 1-2346 Beacon Interval 20-1000 BSSID Enter hexadecimal numbers Note Select a range when Tx Pwr Mode is set to FIXED. Level 1 is the shortest distance, and Level 8 is the longest. Set the distance based on the space between this bridge and furthest bridge that is connected to it. The number of bytes used for the RTS/CTS handshake boundary. When a packet size is greater than the RTS threshold, the RTS/CTS handshaking is performed. The time interval in milliseconds in which the 802.11 Beacon is transmitted by the bridge. Add the MAC address of the remote bridge. The remote bridge's MAC address will appear at the bottom of the screen. You can enter a note that defines the location of the remote bridge. Copyright 2015 Ultra Electronics, 3eTI October 2015 26 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.3.3 Bridge Mode The Wireless Bridge - General screen (Figure 20) contains wireless bridging information. This page is important in setting up your bridge configuration. Table 4 lists the various auto bridging setting options. operation: Wireless bridging supports two modes of Manual wireless bridging Auto-forming wireless bridging (AWB) - with a maximum number of allowable bridges (the default is 32) Auto-forming Wireless Bridging - When the wireless bridge is in auto-forming mode, the wireless bridge sniffs for beacons from other wireless bridges and identifies devices that match a policy such as SSID and channel. Instead of simply adding the devices with the same SSID/channel to the network, a three-way association handshake is performed in order to control network access. To make a unit the root (leaf) STP node, set the bridge priority lower than any other node in the network. Figure 20 - Wireless Bridge — General Copyright 2015 Ultra Electronics, 3eTI October 2015 27 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Table 4 - Auto Bridging General Settings Options Auto Bridging General Settings Options Bridging Mode Auto Bridging auto bridging selected Can be any set of letters and numbers assigned by the network administrator. This nomenclature SSID numbers or letters has to be set on the wireless bridge and each wireless device in order for them to communicate. Max Auto Maximum number of auto bridges 1-32 Bridges allowed. Determines the root (leaf) STP node. The lowest bridge priority Bridge Priority 1-65535 in the network will become the STP root. RF signal fluctuates over time and the fluctuation varies in different operating environments. This parameter serves to smooth RSSI. The RSSI that applications use will be an average of last window-size RSSI samples. The sampling rate depends on the RSSI Window beacon interval of the neighbor 1-100 Size mesh node. This helps stabilize the network. For fixed location deployment, higher values are suggested for both window size and beacon interval. Lower value is recommended while adjusting antenna or distributing mobile mesh devices. 75% 60% On creating a bridge link, if the 51% signal strength is less than this 45% threshold, the link will not be Signal Strength 39% created. After a link is created, it will not be destroyed even after Threshold 27% the signal goes below this 21% threshold. This helps to stabilize 15% the network. 9% None Copyright 2015 Ultra Electronics, 3eTI October 2015 28 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Link Sensitivity Broadcast SSID Auto Bridging General Settings Options After a link is created, signal strength is mapped to RSTP path cost. Because RF signal fluctuates, path cost needs to be adjusted accordingly. However, 75% adjusting path cost too frequently 60% will cause network instability. This 51% field serves as a threshold to 45% adjust path cost. 39% Path cost is adjusted if signal 27% strength increases/decreases by 21% this value since the last 15% adjustment. If the value is set to 9% none, every link acts like 100% None signal and there will be no path cost adjustment later on. It is strongly recommended that the same value is set on all other nodes in the same network. When disabled, the AP hides the SSID in outgoing beacon frames and stations cannot obtain the SSID through passive scanning. Disable/Enable Also, when it is disabled, the bridge doesn’t send probe responses to probe requests with unspecified SSIDs. The signal strength of this wireless bridge will be indicated on the Signal Strength LED located on the front of the case. Signal Strength MAC Remote AP's MAC Address Displays the BSSID of remote bridges that were added on the Wireless Bridge - Radio screen. Read Only Manual Bridging - When the wireless bridge is in manual bridging mode (Figure 21), you can manually select a signal strength LED MAC and enable or disable spanning tree protocol. You can also delete remote AP's MAC addresses. Table 5 lists the various manual bridging settings. Copyright 2015 Ultra Electronics, 3eTI October 2015 29 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 21 - Wireless Bridge - Manual Bridging Table 5 - Manual Bridging General Settings Options Manual Bridging General Settings Options Manual Bridging manual bridging selected Allows you to set the number of the remote AP which will be listed at the bottom of the screen once the system is operational This wireless Signal Strength Not Assigned bridge becomes the guiding port LED MAC that is displayed in the WLAN LED on the front of the 523–3 and 3e-523-F1 as a signal. Enable STP if there is any possibility that a bridging loop could occur. If you are certain that there is no possibility that a bridging loop Spanning Tree Enable/Disable will occur, then disable STP. The Protocol (STP) bridge will be more efficient (faster) without it. If you are not sure, the safest solution is to enable STP. Displays the BSSID of remote Remote AP's bridges that were added on the Read Only MAC Address Wireless Bridge - Radio screen. Bridging Mode Copyright 2015 Ultra Electronics, 3eTI October 2015 30 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Monitoring - In the upper right-hand corner of the Wireless Bridge - General screen there is a button called Monitoring (Figure 22). If you click on this button, a pop-up window will appear (WDS Information). If you select Enable refresh, you can set the bridge refresh interval from 5 seconds to 30 minutes. Refreshing the screen allows you to see the effect of aiming the antenna to improve signal strength. Figure 22 - Wireless Bridge - Monitoring 2.3.4 Bridge Encryption The Wireless Bridge - Encryption screen (Figure 23) is used to configure static encryption keys for the wireless bridge. This is an important page to set up to ensure that your bridge is working correctly. The encryption key that you use on this screen must be the same for any bridge connected to your bridging network in order for communication to occur. On this screen you can select Static AES (128-bit, 192-bit, or 256-bit) or AES-CCM (128-bit) Figure 23 - . Wireless Bridge – AES-CCM Encryption Copyright 2015 Ultra Electronics, 3eTI October 2015 31 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Static AES Key - The Advanced Encryption Standard (AES) was selected by National Institute of Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit block cipher algorithm and encryption technique for protecting computerized information. With the ability to use even larger 192-bit and 256-bit keys, if desired, it offers higher security against brute-force attack than the old 56-bit DES keys (Figure 24). The Key Generator button automatically generates a randomized key of the appropriate length. This key is initially shown in plain text so the user has the opportunity to copy the key. Once the key is applied, the key is no longer displayed in plain text. Figure 24 - Wireless Bridge - Static AES 2.3.5 MAC Address Filtering The WirelessBridge - MAC Address Filtering screen (Figure 25)is used to set up MAC address filtering for the 3e–523 device. This option is only available in Auto Bridge Mode. The factory default for MAC Address filtering is Disabled. If you enable MAC Address filtering, you should also set the toggle for Filter Type. Copyright 2015 Ultra Electronics, 3eTI October 2015 32 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 25 - Wireless Bridge - MAC Address Filtering This works as follows: If Filtering is enabled and Filter Type is Deny All Except Those Listed Below, only those devices equipped with the authorized MAC addresses will be able to communicate with the 3e–523. In this case, input the MAC addresses of all the remote bridging units that will be authorized to access this 3e–523. The MAC address is engraved or written on the PC (PCMCIA) Card. If Filtering is enabled and Filter Type is Allow All Except Those Listed Below, those devices with a MAC address which has been entered in the MAC Address listing will NOT be able to communicate with the 3e–523. In this case, navigate to the report: Wireless Clients and copy the MAC address of any Wireless Client that you want to exclude from communication with the 3e–523 and input those MAC Addresses to the MAC Address list. 2.3.6 AP Encryption The Access Point - Encryption screen displays a default factory setting of no encryption, but for security reasons it will not communicate to any clients unless the encryption is set by the CryptoOfficer. There are different encryption options for the AP in FIPS Mode and in non-FIPS Mode. Table 6 below shows the differences. Table 6 - Encryption Options In FIPS 140-2 Mode FIPS Static AES FIPS 802.11i Encryption Options In non-FIPS AP Mode Static WEP 802.11i In the following explanations, the FIPS Mode security options are discussed first. Static AES Key - The Advanced Encryption Standard (AES) was selected by National Institute of Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit block cipher algorithm and encryption technique for protecting computerized information. Copyright 2015 Ultra Electronics, 3eTI October 2015 33 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide With the ability to use even larger 192-bit and 256-bit keys, if desired, it offers higher security against brute-force attack than the old 56-bit DES keys. See Figure 26. The Key Generator button automatically generates a randomized key of the appropriate length. This key is initially shown in plain text so the user has the opportunity to copy the key. Once the key is applied, the key is no longer displayed in plain text. Figure 26 - Static AES 802.11i - If you wish to use 802.11i on the 3e–523, enable either Pre-shared Key Settings or 802.1x Settings (Figure 27) If you are a SOHO user, selecting pre-shared key means that you don’t have the expense of installing a Radius Server. Simply input up to 63 character / numeric / hexadecimals in the Passphrase field. Enable pre-authentication to allow a client to authenticate in advance with the AP before the client is associated with it. Allowing the AP to pre-authenticate a client decreases the transition time when a client roams between APs. As an alternative, for business applications who have installed Radius Servers, select 802.1x and input the Primary Radius Server and RFC Backend security settings. Use of Radius Server for key management and authentication requires that you have installed a separate certification system and each client must have been issued an authentication certificate. Copyright 2015 Ultra Electronics, 3eTI October 2015 34 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Re-keying time is the frequency in which new encryption keys are generated and distributed to the client. The more frequent re-keying, the better the security. For highest security, select the lowest re-keying interval. Once you have selected the options you will use, click Apply. Figure 27 – FIPS 802.11i 2.3.7 Wireless VLAN Logical Internal Interfaces - In order to use the VLAN features of the 3e-523 series products correctly and flexibly, it’s recommended that user understand the logical internals. The following provides an overview of VLAN operation on the 3e-523 devices Figure 28 below shows the logical internal interfaces of the “Packet Bridging Core” which bridges packets between the logical and physical interfaces (WAN, AP, Bridge, and Management VLAN) of the 3e-523. Copyright 2015 Ultra Electronics, 3eTI October 2015 35 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 28 - Packet Bridging Logical Internals Note: The 3e-523 contains one radio and one Ethernet port. The radio operates in client mode, AP mode, Bridge mode, or AP & Bridge modes. Note that client mode does not offer VLAN capability and VLAN operation cannot be configured when operating in Client mode. AP Virtual Interface - The AP virtual interface is available in AP mode or AP & Bridge simultaneous mode. It can be configured to provide a maximum of 8 VLAN mappings. Each VLAN is mapped to one SSID. Packets in the air between AP radio and wireless clients contain no VLAN tag. Packets from a wireless client associated with a given SSID are VLAN tagged by the AP radio, according to the configuration mapping between SSID and VLAN. The tagging happens before packets enter the “Packet Bridging Core.” VLAN tags, in packets received from the WAN interface and to be transmitted to wireless clients associated with the AP radio, are removed before the packets are transmitted to the clients. Bridge Virtual Interface - The bridge virtual interface is available in Bridge or AP & Bridge mode. The bridge virtual interface always acts as VLAN trunk. Packets in and out from bridge radio are sent unmodified. So there’s no VLAN related configuration for the bridge virtual interface. Copyright 2015 Ultra Electronics, 3eTI October 2015 36 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide WAN Virtual Interface - Since the 3e-523 has one Ethernet port, both the WAN and LAN logical interfaces map to the Ethernet physical interface. IP/ARP packets with a fixed target IP address of 192.168.15.1 are always redirected to LAN virtual interface. All other packets go to WAN virtual interface. The WAN virtual interface always acts as VLAN trunk. Packets in and out from bridge radio are sent unmodified. So there’s no VLAN related configuration for WAN virtual interface. Web Management - Web management traffic from non-local port is on management VLAN. Packets originated from web management server are tagged with management VLAN before they reach “Packet Bridging Core”. Only packets with management VLAN tag can be forwarded by “Packet Bridging Core” to web management server and the VLAN tags are removed before they reach web management server. Figure 29 - VLAN Configuration GUI Overview Figure 29 above shows the web GUI configuration for 2 out of 4 interfaces listed in 1 “Logical Internal.” The “bridge virtual interface” and “WAN virtual interfaces” always work in VLAN trunk mode, therefore, there’s no VLAN related configuration for these two interfaces. The bottom half part shows the SSID to VLAN mappings as well as the security policies assigned to each VLAN. VLAN Configuration Detail - To enable the VLAN feature, click Wireless VLAN link on left menu (Figure 30, and Figure 31 below). Copyright 2015 Ultra Electronics, 3eTI October 2015 37 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 30 - Left Menu Figure 31 - VLAN Enable Page To create a SSID to VLAN mapping on an AP virtual interface, click Create VLAN tab on the Wireless VLAN page after enabling the Wireless VLAN option (Figure 32 and Figure 33). Copyright 2015 Ultra Electronics, 3eTI October 2015 38 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 32 - Create Wireless VLAN Tab Figure 33 - Create Wireless VLAN Page To edit an existing VLAN, select the target VLAN and then click the Edit button (Figure 34 and Figure 35) Copyright 2015 Ultra Electronics, 3eTI October 2015 39 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 34 - Edit VLAN step 1 Figure 35 - Edit VLAN step 2 Copyright 2015 Ultra Electronics, 3eTI October 2015 40 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide NOTES & TIPS 1. Most (not all) switch vendors treat VLAN 1 as an untagged VLAN. 3eTI devices make the VLAN 1 tag rule a user option. By default, 3eTI treats VLAN 1 as an untagged VLAN. It is recommended that users keep the same default setting for all devices in the same physical network. 2. “Treat VLAN 1 Untagged” setting is a device-wide option. The rule applies to all interfaces that are configured to be on VLAN 1. For example, if this option is enabled, management traffic from this device Also, wireless client traffic on VLAN 1 won’t have tag. 3. It’s always recommended to manage the device through the LAN virtual interface (192.168.15.1) when local access is available for the device. The LAN virtual interface is helpful especially when: A device IP address is unknown. The device has not obtained an IP address from a DHCP server. The Management VLAN is tagged. 2.3.8 AP MAC Filtering The Wireless Access Point - MAC Filtering screen ( Figure 36) is used to set up MAC address filtering for 3e–523 devices. The factory default for MAC Address filtering is Disabled. If you enable MAC Address filtering, you should also set the toggle for Filter Type. Figure 36 - Wireless Access Point - MAC Filtering MAC Filtering works as follows: Copyright 2015 Ultra Electronics, 3eTI October 2015 41 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide If Filtering is enabled and Filter Type is Deny All Except Those Listed Below, only those devices equipped with the authorized MAC addresses will be able to communicate with the access point. In this case, input the MAC addresses of all the PC cards that will be authorized to access this access point. If Filtering is enabled and Filter Type is Allow All Except Those Listed Below, those devices with a MAC address which has been entered in the MAC Address listing will NOT be able to communicate with the access point. In this case, navigate to the report: Wireless Clients and copy the MAC address of any Wireless Client that you want to exclude from communication with the access point and input those MAC Addresses to the MAC Address list. 2.3.9 Rogue AP Detection The Wireless Access Point - Rogue AP Detection screen (Figuer 37) allows the network administrator to set up rogue AP detection. Enable rogue AP detection and enter the MAC Address of each AP in the network that you want the AP being configured to accept as a trusted AP. (You may add up to 20 APs.) Enter an email address for notification of any rogue or non-trusted APs. (The MAC Address for the 3e–523 is located on the System Configuration - General screen. You can also select the following filter options. SSID Filter: Check the SSID option to only send rogue APs that match the AP's SSID or wireless bridge's SSID. Channel Filter: Check the channel filter option to only send rogue APs that match the AP's channel or the wireless bridge's channel. If both options are checked, only APs that match both the SSID and channel are sent. The Adjacent AP list, under Monitoring/Reports on the navigation menu, will detail any marauding APs. Copyright 2015 Ultra Electronics, 3eTI October 2015 42 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 37 - Wireless Access Point - Rogue AP Detection 2.3.10 AP Advanced The Wireless Access Point - Advanced screen (Fifure 38) allows you to enable or disable load balancing and to control Publicly Secure Packet Forwarding, which provides client isolation at the Layer 2 level. Load balancing is enabled by default. The load balancing feature balances the wireless clients between APs. If two APs with similar settings are in a conference room, depending on the location of the APs, all wireless clients could potentially associate with the same AP, leaving the other AP unused. Load balancing attempts to evenly distribute the wireless clients on both APs. Publicly Secure Packet Forwarding is disabled by default. Enabling this feature prevents wireless clients that associate with the same AP from communicating with each other. Copyright 2015 Ultra Electronics, 3eTI October 2015 43 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 38 - Wireless Access Point - Advanced Once you have made any changes, click Apply to save. 2.4 Service Settings There are two options under Service Settings: SNMP Agent Serial Communication Each screen is described in detail in the following subsections. 2.4.1 SNMP Agent The Service Settings - SNMP Agent screen (Figure 39) allows you to set up an SNMP Agent. The agent is a software module that collects and stores management information for use in a network management system. 3e–523 devices have an integrated SNMP agent software module that translates the device’s management information into a common form for interpretation by the SNMP Manager, which usually resides on a network administrator’s computer. Information is transported via SNMPv1 (Simple Network Management Protocol) or SNMPv2c, along with the associated Management Information Base (MIB), though trap-directed notifications. The idea behind trap-directed notification is as follows: if a manager is responsible for a large number of devices, and each device has a large number of objects, it is impractical for him to poll or request information from every object on every device. The solution is for each agent on the managed device to notify the manager without solicitation. It does this by sending a message known as a trap when an appropriate event occurs. After receiving the event, the manager displays it and may choose to take an action based on the event. For instance, the manager can poll the agent directly, or poll other associated device agents to get a better understanding of the event. Copyright 2015 Ultra Electronics, 3eTI October 2015 44 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Trap-directed notification can result in substantial savings of network and agent resources by eliminating the need for frivolous SNMP requests. However, it is not possible to totally eliminate SNMP polling. SNMP requests are required for discovery and topology changes. In addition, a managed device agent can not send a trap, if the device has had a catastrophic outage. SNMPv1 traps are defined in RFC 1157, with the following fields: Enterprise Agent address Provides the address of the managed object generating the trap. Generic trap type Indicates one of a number of generic trap types. Specific trap code Indicates one of a number of specific trap codes. Time stamp Provides the amount of time that has elapsed between the last network reinitialization and generation of the trap. Variable bindings The data field of trap containing PDU. Each variable binding associates a particular MIB object instance with its current value. Identifies the type of managed object generating the trap. Standard generic traps are: coldStart, warmStart, linkDown, linkUp, authenticationFailure, egpNeighborLoss. In the current release, 3eTI has implemented warmStart, link-Down, linkUp, and authenticationFailure 5 generic traps and transports those traps using SNMPx2, V2c Trap PDU format. For generic SNMPv1 traps, 3eTI also redefined some generic traps (see the 3eti-trap-mibs document) by adding some bound variables. For example, when a trap is received for a warmStart, the receiving system will be able to see one variable associated with this trap. The received variableName field will shows the 3eTI enterprise oid. The varibleValue field will indicate a warmStart reason. Additionally, a device does not send a trap to a network management system unless it is configured to do so. Copyright 2015 Ultra Electronics, 3eTI October 2015 45 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 39 - Service Settings - SNMP Agent The SNMP configuration consists of several fields, which are explained below: Community The Community field for Get (Read Only), Set (Read & Write), and Trap is simply the SNMP terminology for “password” for those functions. Source The IP address or name where the information is obtained. Access Control Defines the level of management interaction permitted. If using SNMPv3, enter a username (minimum of eight characters), authentication type with key and data encryption type with a key. If operating in FIPS mode, only SHA and AES are supported. This configuration information will also need to be entered in your MIB manager setup. 2.4.2 Serial Communication The Serial Communication Settings section (Figure 40) displays the current serial port mode of operation. One of two serial port profiles can be selected. Copyright 2015 Ultra Electronics, 3eTI October 2015 46 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Raw Socket - This allows serial devices connected to two 3e–523 devices to communicate across the network. It is bidirectional, multiple uni-casting and peer-to-peer communications. Figure 40 - Service Settings - Serial Communication TCP Socket - It is direct IP Mode using TCP. When using TCP sockets your serial server can be configured as a TCP server or TCP client (Figure 41). If the 3e–523 device is configured as a TCP server, other network devices can initiate a TCP connection with the serial device connected to the serial port. Network devices initiating connections must be configured with the IP address of the device and the TCP port number associated with its serial port. If the 3e–523 device is configured as a TCP client it will automatically establish a bi-directional TCP connection between the serial device and a server or other networked device. Copyright 2015 Ultra Electronics, 3eTI October 2015 47 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 41 - Service Settings - TCP Socket 2.4.3 Remote Administration The Service Settings – Remote Administration screen (Figure 42) allows you to set up access control policies for remote administration via HTTPs, SNMP and ICMP protocols. In the factory default configuration, Remote Administration Access Control option is disabled and hence remote administration is allowed for any source IP address and MAC address. When the Remote Administration Access Control option is enabled, the device validates the source IP and/or MAC addresses of administrative queries and control requests to insure that the message request is from an approved node. This enables secure remote administration from selected IP and/or MAC addresses. Copyright 2015 Ultra Electronics, 3eTI October 2015 48 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 42 - Service Settings – Remote Administration Access Control 2.5 Admin User Management There are three options under Admin User Management: List All Users Edit User Add New Users User Login Policy Each screen is described in detail in the following subsections. Copyright 2015 Ultra Electronics, 3eTI October 2015 49 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.5.1 List All Users The Admin User Management - List All Users screen (Figure 43) lists the Crypto Officer and administrator accounts configured for the unit. You can edit or delete users from this screen. Figure 43 - Admin User Management - List All Users If you click on Edit, the Admin User Management - Edit User screen (Figure 44) appears. On this screen you can edit the user ID, password, role, and note fields. Figure 44 - Admin User Management - Edit User Copyright 2015 Ultra Electronics, 3eTI October 2015 50 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.5.2 Add New User The Admin User Management - Add New User screen (Figure 45) allows you to add new Administrators and CryptoOfficers, assigning and confirming the password. Figure 45 - Admin User Management - Add New User The screen as shown in Figure 46 below, will appear in FIPS 140-2 mode. The Password complexity check and the Minimal Password length are established on the Admin User Management - User Login Policy screen. 2.5.3 User Login Policy The Admin User Management - User Login Policy screen (Figure 46) allows you to enable a Password Complexity Check. The "User Login Policy" applies to both admin users and end-users. If an admin account or an end-user account is locked for whatever reason, only a CryptoOfficer role user can unlock the account from the LAN port. The definition of a complex password is a password that contains characters from all of the following 4 groups and at least 2 of each group: uppercase letters, lowercase letters, numerals, and symbols found on the keyboard. The minimum password length is eight (8) characters and the maximum length is 30. The maximum password age is configurable from 30 to 90 days. The default is 90 days. If you do not change your password after the maximum password age expires, you will not have access to the unit. However, you have until 150 days of the password age to change the password. You will be prompted to change your password from 90-150 days. After 150 days, the account will be locked and the CryptoOfficer will have to unlock it for you. The only exception to this rule is if you are the last active CryptoOfficer user. Copyright 2015 Ultra Electronics, 3eTI October 2015 51 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide You can also set the password uniqueness depth. This means a former password cannot be reused. The depth is configurable from 3 to 10. For example, if the password uniqueness depth is set to 3, then the last 3 passwords cannot be reused when changing your password. The maximum bad password attempts can be set from 3 to 10 attempts. A user account will be locked after the number of attempts has been exceeded. The login session timeout range is from 3 to 60 minutes. If the admin user session is inactive for more than the timeout amount then the session automatically terminates. The default for the account lockout email notification is set to disable. If enabled, the system will send an email to the email address listed to inform that person that a user has been locked out of the system. To configure the email notification go to the System Administration - Email Notification Configuration screen. Click Apply to save your selection. Note: When password rule is set to be stricter, all users will be required to change their passwords. This is true for users whose passwords already meet the new password rules. The reason for this is that all passwords are saved in a one-way hash format. The unit does not know the plaintext format of any passwords. Copyright 2015 Ultra Electronics, 3eTI October 2015 52 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 46 - Admin User Management - User Login Policy 2.6 Monitoring/Reports This section gives you a variety of lists and status reports. Most of these are self-explanatory. There are up to five options under Monitoring/Reports, depending on the operating mode: System Status Bridging Status Bridging Site Map Wireless Clients Adjacent AP List Each screen is described in detail in the following subsections. Copyright 2015 Ultra Electronics, 3eTI October 2015 53 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.6.1 System Status The Monitoring/Report - System Status screen (Figure 47) displays the status of the 3e–523 device, the network interface, and the routing table. Figure 47 - Monitoring/Report — System Status There are some pop-up informational menus that give detailed information about CPU, PCI, Interrupts, Process, and Interfaces. 2.6.2 Bridging Status The Monitoring/Report - Bridging Status screen (Figure 48) displays the Ethernet Port STP status, Wireless Port STP status, and Wireless Bridging information. Copyright 2015 Ultra Electronics, 3eTI October 2015 54 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 48 - Monitoring/Report — Bridging Status 2.6.3 Bridge Site Map The Bridge Site Map (Figure 49) shows the spanning tree network topology of both wired and wireless nodes connected to the network. The root STP node is always on top and the nodes of the hierarchy are displayed below it. Wired links are double dotted lines and wireless links are single dotted lines. This map does not update dynamically. You must press the Update button to refresh the map. Copyright 2015 Ultra Electronics, 3eTI October 2015 55 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 49 - Monitoring/Report — Bridge Site Map 2.6.4 Wireless Clients The Monitoring/Report - Wireless Clients screen (Figure 50) displays the MAC Address of all wireless clients and their signal strength and transmit rate. The screen shown here emulates the FIPS 140-2 setup and contains a column for EMCON response. This column is not displayed if the AP is in non-FIPS mode. The EMCON feature only works with 3e-010F Crypto Client in FIPs mode. Copyright 2015 Ultra Electronics, 3eTI October 2015 56 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 50 - Monitoring/Report — Wireless Clients 2.6.5 Adjacent AP List The Monitoring/Report - Adjacent AP List screen (Figure 51) shows all the APs on the network. If you select the checkbox next to any AP shown, the AP will thereafter be accepted by the unit as a trusted AP. These APs are detected by the AP's wireless card and the wireless bridge's wireless card. The list of APs are only within the band that can be seen from a particular channel. For example, if the AP is on channel 1, it will display APs on channels 1-3. Figure 51 - Monitoring/Report — Adjacent AP List 2.7 Logs There are two logs available for viewing and exporting. Copyright 2015 Ultra Electronics, 3eTI October 2015 57 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.7.1 System Log The Logs - System Log screen (Figure 52) displays system facility messages with date and time stamp. These are messages documenting functions performed internal to the system, based on the system’s functionality. Generally, the Administrator would only use this information if trained as or working with a field engineer or as information provided to technical support. The System log continues to accumulate listings. If you wish you can export the log and save it as a file on your PC. Click on Export. Figure 52 - Logs — System Log 2.7.2 Web Access Log The Web Access Log (Figure 53) displays system facility messages with date and time stamp for any actions involving web access. For example, this log records when you set encryption mode, change operating mode, etc., using the web browser. It establishes a running record regarding what actions were performed and by whom. The Web access log will continue to accumulate listings. You can set an alert point. You will be notified by email when the alerts reach a certain threshold. If you wish you can export the log and save it as a file on your PC. Click on Export. Copyright 2015 Ultra Electronics, 3eTI October 2015 58 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 53 - Web Access Log 2.8 Auditing The unit collects audit data and provides an interface for authorized administrators to review generated audit records. It generates records for two separate classes of events: authentication/access to the system, and actions taken directly on the system. All audit records include the date/ time of the event, the identity associated with the event (such as the service, computer or user), the success/failure of the event and a definition of the event (by code or explanation). Every start and stop of the audit service is noted in the audit record. For audit events resulting from actions of identified users, the unit associates each auditable event with the identity of the user that caused the event. The unit includes or excludes auditable events from the set of audited events based on object identity, user identity, subject identity, host identity, and event type. The Auditing screens contain auditing functions for the system. The screens and functions are detailed in the following subsections. 2.8.1 Audit Log The Auditing—Audit Log screen (Figure 54) provides a listing of all the audit records. Copyright 2015 Ultra Electronics, 3eTI October 2015 59 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 54 - Auditing — Audit Log 2.8.2 Report Query The Auditing—Report Query screen (Figure 55) allows you to query on report based on start time, end time, MAC address, or unique record IDs. Copyright 2015 Ultra Electronics, 3eTI October 2015 60 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 55 - Auditing — Report Query 2.8.3 Configuration The Auditing—Configuration screen is used to configure the auditing settings. You can enable and disable the auditing function on this screen. You can select which audit event types you wish to log.Figure 56 below shows the screen and Table 7 lists event types and descriptions. Copyright 2015 Ultra Electronics, 3eTI October 2015 61 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 56 - Auditing — Configuration Table 7 - Auditing — Configuration Event Type and Description Event Type Audit Log Configuration Modified Key Transfer Error Description Any modification to the audit log configuration (enable/disable, recorded event types, etc) will trigger the creation of an audit record. Any error detected during the dynamic key exchange, either to the station or the authentication server. Copyright 2015 Ultra Electronics, 3eTI October 2015 62 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide The keys are zeroized including: 1. Transitioning from static key to DKE (and vice versa) 2. Transitioning to bypass mode Individual log messages appear from the application and driver since keys are held in both locations. A station's authentication request is dropped because it doesn't match the MAC address filter. A station successfully associates to the AP. The encryption algorithm is changed, including bypass mode. All HMAC/AES decrypt errors that can be detected. The MAC address filter is changed including adding/deleting, enable/disable, and changing filter type. Whenever the time is changed via the GUI or at bootup if the time is within two minutes of 11/30/1999, 0hr, 0min. The self-test function is run. Key Zeroized STA Failed Authentication STA Associated Encryption Algorithm Changed Failed FIPS Policy MAC Filter Changed Time Changed Self Test Activated 2.9 System Administration There are six options under System Administration: Email Notification Configuration System Upgrade Firmware Upgrade Local Configuration Upgrade Remote Configuration Upgrade Factory Default Remote Logging Reboot Utilities Each screen is described in detail in the following subsections. 2.9.1 E-mail Notification Configuration All system notification emails need to be set up using the System Administration - Email Notification Configuration screen (Figure 57). Your email server must support SMTP protocol. If you email server does not require authentication to send email then leave the username/password fields blank. If your email Copyright 2015 Ultra Electronics, 3eTI October 2015 63 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide server does not support SSL (Secure Socket Layer) then disable SSL on the 3e–523. You may also test your email setup using the test feature on this screen. NOTE: Check your connection to the mail server. Emails sent from the 3e–523 may be queued for a short period if the connection fails temporarily, but it will give up if the connection continues to fail. Figure 57 - System Administration — Email Notification Configuration Copyright 2015 Ultra Electronics, 3eTI October 2015 64 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.9.2 Radio Tx Off Control Figure 58 - System Administration — Radio Tx Off Control 2.9.3 System Upgrade The System Administration - System Upgrade screen (Figure 59) gives you the ability to upload updates to the 3e–523 device’s firmware as they become available. When a new upgrade file becomes available, you can do a firmware upgrade from the Firmware Upgrade window. There is also a configuration file transfer option which allows the system configuration file from one AP to be transferred to another AP, in order to minimize the administration of the APs. Only configuration parameters that can be shared between APs are downloaded in the configuration file. WAN IP address and hostname are not transferred in the configuration file. Only the Crypto Officer role can access this function. Firmware Upgrade - On the System Administration - System Upgrade screen (Figure 59), the Firmware Upgrade tab is the default view. Click browse and select the firmware file to be uploaded. Click on the Upload Firmware button. Copyright 2015 Ultra Electronics, 3eTI October 2015 65 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 59 - System Administration — Firmware Upgrade Local Configuration Upgrade - On the System Administration - System Upgrade screen ( Figure 60Figure 60), click on the Local Configuration Upgrade tab to upload and download configuration files to other 3e–523 devices connected to the network. To upload a configuration file, select the file using the browse button and enter the passphrase for that file. The passphrase protects the file from unauthorized users. It prevents unauthorized users from applying the system configuration file to an unauthorized device to gain access to the network. Before downloading the system configuration file to a local computer, the user must enter a passphrase to protect the file. Before the system configuration file can be uploaded onto another 3e–523 device, the passphrase must be entered on the remote 3e–523 device. Notes: 1. When downloading configuration files, keys are NOT downloaded. 2. When uploading configuration file to a device, if the device currently is configured to the same security options as those in the uploaded file, the keys are reused. Otherwise, the keys are zeroized and marked “key not set” from web GUI. e.g. Current device has 802.11i-PMK option on AP security. The configured to be uploaded will use 802.11i-PMK for AP security. Existing 256bit PMK is reused. Otherwise, AP security is marked “key not set”. 3. In VLAN scenario, VLAN ID (NOT the SSID) is the index to find matching security option. E.g. Current device has 3 VLAN configured as follows. a. VLAN ID = 1, SSID=area-1, security=802.11i pmk b. VLAN ID = 2, SSID=area-2, security=802.11i-dot1x c. VLAN ID = 3, SSID=area-3, security=static AES The configuration file to be uploaded has 4 VLAN configured as follows. a. VLAN ID = 1, SSID=test-1, security=802.11i pmk Copyright 2015 Ultra Electronics, 3eTI October 2015 66 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide b. VLAN ID = 2, SSID=area-1, security=802.11i-dot1x c. VLAN ID = 3, SSID=area-2, security=802.11i pmk d. VLAN ID = 4, SSID=area-3, security=static AES The device will have 4 VLANs configured as follows a. VLAN ID = 1, SSID=test-1, security=802.11i pmk (key set) b. VLAN ID = 2, SSID=area-1, security=802.11i-dot1x (key set) c. VLAN ID = 3, SSID=area-2, security=802.11i pmk (key not set) d. VLAN ID = 4, SSID=area-3, security=static AES (key not set) Figure 60 -System Administration — Local Configuration Upgrade 2.9.4 Factory Default The System Administration - Factory Default screen (Figure 61) is used to reset the 3e–523 to its factory settings. Copyright 2015 Ultra Electronics, 3eTI October 2015 67 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide The "Restore" button is a fallback troubleshooting function that should only be used to reset to original settings. Only the Crypto Officer role has access to the Restore button. Figure 61 - System Administration - Factory Default 2.9.5 Remote Logging The System Administration —Remote Logging screen (Figure 62) allows you to forward the syslog data from each machine to a central remote logging server. In the 3e–523, this function uses the syslogd daemon. If you enable Remote Logging, input a System Log Server IP Address and System Log Server Port. Click Apply to accept these values. Figure 62 - System Administration - Remote Logging Copyright 2015 Ultra Electronics, 3eTI October 2015 68 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 2.9.6 Reboot The System Administration - Reboot screen (Figure 63) allows you to reboot the 3e–523 without changing any preset functionality. Both Crypto Officer and Administrator functions have access to this function. Figure 63 - System Administration - Reboot 2.9.7 On Demand Self-test Self-tests are run to verify the correctness of cryptographic related functions. Two cryptographic libraries support these tests: OpenSSL crypto library – free software from the OpenSSL project. This library is used by user space applications. Kernel crypto library – This library is used by kernel space applications. It can be supported by hardware (if available) or software. All 3e525A-3 platforms will support the hardware kernel library. The following tests are available using the OpenSSL library: Advanced Encryption Standard (ECB mode) Triple DES Secure Hash Algorithm 1 Random Number Generator Hashed Message Authentication Code RSA Algorithm Firmware Integrity Check Bootloader Integrity Check The following tests are available using the kernel libraries: Copyright 2015 Ultra Electronics, 3eTI October 2015 69 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Advanced Encryption Standard (ECB mode) Advanced Encryption Standard (CCM mode) Secure Hash Algorithm 1 Hashed Message Authentication Code Key Error Detection – checks for corruption of keys stored in flash The following tests do not rely on crypto libraries: Key Error Detection – checks for corruption of keys stored in flash Test results are written to the system log. Test failures are also written to the console. The platform should not pass secure data while self tests are executing so network interfaces are disabled during self tests. The platform is halted if any self test fails. These tests are run during power up, on demand or periodically. All of the above tests are executed automatically when the platform is powered up. Links to initiate on-demand or periodic selftests are available on the platform’s web page under “System Administration” if the user is logged in as a crypto officer. On-demand Self-test - Selecting the “On Demand Self-test” link (Figure 64) and clicking on “Start Test” executes each self-test except the firmware and bootloader integrity checks. A web page will be displayed indicating if the tests passed or failed. Figure 64 - System Administration – On Demand Self-test 2.9.8 Periodic Self-test Selecting the “Periodic Self-test” link (Figure 65 allows the user to enable/disable periodic tests. A test iteration executes each selftest except the firmware and bootloader integrity checks. The “Periodic Test Interval” is the time between test iterations. Copyright 2015 Ultra Electronics, 3eTI October 2015 70 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 65 - System Administration – Periodic Self-test 2.9.9 Utilities The System Administration - Utilities screen (Figure 66) gives you ready access to two useful utilities: Ping and Traceroute. Simply enter the IP Address or hostname you wish to ping or traceroute and click either the Ping or Traceroute button, as appropriate. Copyright 2015 Ultra Electronics, 3eTI October 2015 71 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 66 - System Administration - Utilities 2.9.10 Help The System Administration - Help screen (Figure 67) displays detailed hardware and software version information. Figure 67 - System Administration - Help Copyright 2015 Ultra Electronics, 3eTI October 2015 72 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 68 - System Administration – Help ResultsA 2.10 Operational Configurations Setting Up Bridging Type Point-to-Point Bridge Configuration A point-to-point link (Figure 69) is a direct connection between two, and only two, locations or nodes. Figure 69 - Point-to-Point Link For the two bridges that are to be linked to communicate properly, they must be set up with compatible commands in the setup screens. Copyright 2015 Ultra Electronics, 3eTI October 2015 73 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide For instance, the bridges must have the same channel number. Because there is a separate WLAN card for bridging, there can be a separate WLAN on the AP WLAN card with no loss efficiency, as long as you set the channel numbers so there's no conflict or noise with the channel assigned to the bridge. Spanning Tree Protocol may be set to Enable, if there is any possibility of a bridging loop, or to Disable (which is more efficient) if there's no possibility of a bridging loop. Each bridge must contain the other's BSSID. (The BSSID of each is equivalent to the MAC address contained on the Wireless AP & Bridge — Radio setup page. Enter only hexadecimal numbers, no colons. Data entry is not case sensitive.) Finally, the wireless bridging encryption must be set to the appropriate type and key length and must be identical on each bridge. Table 8 and Table 9 below lists sample settings for manual bridging and auto bridging modes. Table 8 - Point-to-Point Bridging Setup Guide — Manual Mode Direction Bridge 1 Bridge 2 Wireless Bridge — Bridging Mode (Manual Bridging Mode) Bridging Mode Manual bridging selected Manual bridging selected Not Assigned (select from Not Assigned (select from Signal Strength LED MAC drop-down list) drop-down list) Enable (or Disable if no Enable (or Disable if no Spanning Tree Protocol bridging bridging (STP) loop possible) loop possible) Wireless Bridge — Radio Wireless Mode 802.11a 802.11a Tx Rate AUTO AUTO Must be the same as Must be the same as Channel No. Bridge 2 Bridge 1 Tx Power Mode Auto Auto Propagation Distance < 5 Miles < 5 Miles RTS Threshold 2346 2346 Beacon Interval 1000 1000 BSSID Add Bridge 2 MAC Add Bridge 1 MAC Wireless Bridge — Encryption Select appropriate key Select appropriate key type/length and value. type/length and value. Bridging encryption Must be the Must be the options same key as Bridge 2. same key as Bridge 1. Table 9 - Point-to-Point Bridging Setup Guide — Auto Mode Direction Bridge 1 Bridge 2 Wireless Bridge — Bridging Mode (Auto Bridging Mode) Bridging Mode Auto bridging selected Auto bridging selected Must be the same as Must be the same as SSID Bridge 2 Bridge 1 Max Auto Bridges 32 (range 1-32) 32 (range 1-32) Bridge Priority 32768 (range 1-65535) 32768 (range 1-65535) RSSI Window Size Signal Strength Threshold 9% 9% Link Sensitivity 15% 15% Copyright 2015 Ultra Electronics, 3eTI October 2015 74 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Broadcast SSID Signal Strength MAC Disable Enter from list at the bottom of the screen Wireless Bridge — Radio Wireless Mode Tx Rate 802.11a AUTO Must be the same as Channel No Bridge 2 Tx Power Mode Auto Propagation Distance < 5 Miles RTS Threshold 2346 Beacon Interval 1000 Wireless Bridge — Encryption Select appropriate key Bridging encryption type/length and value. options Must be same as Bridge 2. Disable Enter from list at the bottom of the screen 802.11a AUTO Must be the same as Bridge 1 Auto < 5 Miles 2346 1000 Select appropriate key type/length and value. Must be same as Bridge 1. The following sequence walks you through the setup of bridge 1. Bridge 2 would duplicate this procedure, with the BSSID of bridge 2 being the MAC address of bridge 1 and vice versa. Navigate to the Wireless Bridge — Radio screen (Figure 70). In the first section you will see the MAC Address of the bridging card. This is used as the BSSID on other 3e–523–3s that will be communicating with this one. Select the Wireless Mode to be used for bridging. Set the Tx Rate to a fixed transmit rate or select AUTO if you want the card to attempt to select the optimal rate for the channel If the Tx rate is set to a fixed rate, then the card will only transmit at that rate. Next select the Channel Number. The Channel Number must be set to the same frequency in order for each bridge to communicate. TX Pwr Mode can be left on Auto unless the power needs to be regulated. Select the Propagation Distance which is based on the distance between a bridge and the furthest bridge that is connected to it. Set the RTS Threshold which is the number of bytes used for the RTS/CTS handshake boundary. When a packet size is greater than the RTS threshold, the RTS/CTS handshaking is performed. Click Apply to accept your changes but stay on this screen. Add the BSSID of the remote bridge. The BSSID corresponds to that bridge’s MAC address. In entering the BSSID, enter only hexadecimal numbers, no colons. Data entry is not case sensitive. You may also enter a note that defines the location of the remote bridge. Then click Add to accept. The remote bridge’s BSSID will now appear at the bottom of the Wireless Bridge - Bridging Mode screen. Copyright 2015 Ultra Electronics, 3eTI October 2015 75 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 70 - Wireless Bridge - Radio Next go to the Wireless Bridge - Bridging Mode screen (Figure 71). Select either manual or auto bridging. If you choose Manual Bridging then you will have to set Spanning Tree Protocol to Enable unless you are sure that there is no chance of a loop. You can also assign a Signal Strength LED MAC. Signal strength LED MAC allows you to set the number of one of the Remote APs which will be listed at the bottom of the screen once the system is operational as the guiding port that you wish to have display in the WLANSS LED on the front of the 3e–523–3 as a signal. If you don’t wish to display any connection signal, simply leave this set at Not Assigned. From this screen you can also choose to delete a remote AP's MAC address. Click Apply to accept your changes. Copyright 2015 Ultra Electronics, 3eTI October 2015 76 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 71 - Wireless Bridge - Bridging Mode If you choose Auto Bridging mode (Figure 72), then you will need to enter the following information: Enter the SSID. This can be any set of letters and numbers assigned by the network administrator. This nomenclature has to be set on the wireless bridge and each wireless device in order for them to communicate. Enter a number from 1 to 32 for the Max Auto Bridges. Next enter the Bridge Priority (range from 1-65535). This determines the root (leaf) STP node. The lowest bridge priority in the network will become the STP root. Select the Signal Strength Threshold. Either enable or disable the Broadcast SSID. When disabled, the bridge hides the SSID in outgoing beacon frames and stations cannot obtain the SSID through passive scanning. Also, when it is disabled, the bridge doesn’t send probe responses to probe requests with unspecified SSIDs. Finally enter the Signal Strength MAC. The signal strength of this wireless bridge will be indicated on the Signal Strength LED located on the front of the case. Copyright 2015 Ultra Electronics, 3eTI October 2015 77 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 72 - Wireless Bridge - Auto Bridging Mode Next, navigate to the Wireless Bridge — Encryption screen (Figure 73). Select the appropriate key type and length and the key value. The encryption key value and type for Bridge 1 must be the same as for Bridge 2. For wireless bridging, only AES and 3DES are available for encryption. Figure 73 - Wireless Bridge - Encryption Configure the second of your two point-to-point bridges following the instructions given for Bridge 1 above. Point-to-Multipoint Bridge Configuration Copyright 2015 Ultra Electronics, 3eTI October 2015 78 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide A point-to-multipoint configuration (Figure 74) allows you to set up three or more 3e–523 units in bridging mode and accomplish bridging between 3 or more locations wirelessly. For the three bridges that are to be linked to communicate properly, they have to be set up with compatible commands in their setup screens. For instance, all bridges must have the same channel number. Spanning Tree Protocol will usually be set to Enable. If configured as in the diagram following, Bridge 1 must contain all of the others' BSSIDs, while Bridge 2 ~ n must only contain Bridge 1's BSSID. (The BSSID of each is equivalent to the MAC address found on the Wireless Bridge - Radio page. Enter only hexadecimal numbers. Data entry is not case sensitive.) Finally, the wireless bridging encryption of each must be set to the appropriate type and key length and must be the same on all. Figure 74 - Point-to-Multipoint Bridge Configuration Follow the steps of the procedure outlined in the point-to-point bridge section. Table 10 and Table 11 below describe the basic attributes. Table 10 - Point-to-Multipoint Bridging Setup Guide - Manual Mode Direction Wireless Bridge — Radio Wireless Mode Tx Rate Channel No. Tx Power Mode Propagation Distance Bridge 1 Bridge 2 ~ n 802.11a AUTO Same as Bridge 2~n Auto < 5 Miles 802.11a AUTO Same as Bridge 1 Auto < 5 Miles Copyright 2015 Ultra Electronics, 3eTI October 2015 79 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide RTS Threshold 2346 2346 Beacon Interval 1000 1000 BSSID Add Bridge 2~n MAC Add Bridge 1 MAC Wireless Bridge — Bridging Mode (Manual Bridging Mode) Bridging Mode Manual bridging selected Manual bridging selected Not Assigned (select from Not Assigned (select from Signal Strength LED MAC drop-down list) drop-down list) Enable (or Disable if no Enable (or Disable if no Spanning Tree Protocol bridging loop possible) bridging loop possible) Wireless Bridge — Encryption Select appropriate key Select appropriate key type/length and value. type/length and value. Bridging encryption Must be the same key as Must be the same key as options Bridge 2~n. Bridge 1. Table 11 - Point-to-Multipoint Bridging Setup Guide — Auto Mode Direction Bridge 1 Bridge 2 Wireless Bridge — Radio Wirelss Mode 802.11a 802.11a Tx Rate AUTO AUTO Channel No. Same as Bridge 2~n Same as Bridge 1 Tx Power Mode Auto Auto Propagation Distance < 5 Miles < 5 Miles RTS Threshold 2346 2346 Beacon Interval 1000 1000 BSSID Add Bridge 2~n MAC Add Bridge 1 MAC Wireless Bridge — Bridging Mode (Auto Bridging Mode) Bridging Mode Manual bridging selected Auto bridging selected Must be the same as Must be the same as SSID Bridge 2~n Bridge 2 Max Auto Bridges 32 (range 1-32) 32 (range 1-32) Bridge Priority 32768 (range 1-65535) 32768 (range 1-65535) RSSI Window Size Signal Strength Threshold 9% 9% Link Sensitivity 15% 15% Enter from list at the Enter from list at the Signal Strength MAC bottom of the screen bottom of the screen Wireless Bridge — Encryption Select appropriate key Select appropriate key Bridging encryption type/length and value. type/length and value. options Must be same as Bridge 2. Must be same as Bridge 1. The above recommended setup requires only Bridge 1 to be set in point-to-multipoint mode. It is possible to set all bridges in point-tomultipoint mode, in which case , each bridge would have to contain the BSSID for each of the other bridges and Spanning Tree Protocol must be Enabled. Copyright 2015 Ultra Electronics, 3eTI October 2015 80 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Repeater Bridge Configuration A repeater setup can be used to extend the wireless signal from one bridge connected to an Ethernet LAN wirelessly so that another bridge can control a wireless LAN at a distance (Figure 75). Table 12 describes the basic attributes. Figure 75 - Repeater Bridge Configuration Table 12 - Repeater Bridging Setup Guide — Manual Mode Direction Bridge 1 Wireless Bridge — Radio Wireless Mode 802.11a Tx Rate AUTO Channel No. Same as Bridge 2 Tx Power Mode Auto Propagation Distance < 5 Miles RTS Threshold 2346 Beacon Interval 1000 Bridge 2 802.11a AUTO Same as Bridge 1 Auto < 5 Miles 2346 1000 Add Bridge 1's and BSSID Add Bridge 2's MAC Bridge 3's MAC Wireless Bridge — Bridging Mode (Manual Bridging Mode) Bridging Mode Manual Manual Signal Strength Not Assigned (select Not Assigned (select LED MAC from drop-down list) from drop-down list) Enable (or Disable if Enable (or Disable if Spanning Tree no bridging loop no bridging loop Protocol possible) possible) Wireless Bridge — Encryption Select appropriate Select appropriate key type/length and key type/length and Wireless enter key value. Must enter key value. Must Configuration be the same as that be the same as that – Bridging Encryption on the other two on the other two Bridges Bridges Bridge 3 802.11a AUTO Same as Bridge 1 Auto < 5 Miles 2346 1000 Add Bridge 2's MAC Manual Not Assigned (select from drop-down list) Enable (or Disable if no bridging loop possible) Select appropriate key type/length and enter key value. Must be the same as that on the other two Bridges Copyright 2015 Ultra Electronics, 3eTI October 2015 81 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3. WiMesh End Points 3e-523A and 3e-523E-900 Hardware Installation 3.1 3e-523A Hardware Installation Preparation for Use This section deals with installation of the 3e–523A unit. The unit requires physical mounting and installation on the site, following a prescribed placement design to ensure optimum operation. The package includes the following items: The Device Documentation as PDF files (on CD-ROM) Registration and Warranty cards The device has the following available accessories: Outdoor Accessory Kit (3e-523-OAK) Indoor Accessory Kit (3e-523-IAK) DIN Rail Accessory Kit (3e-523-DINR-IN) The device can be mounted outdoors on a high post to achieve the best bridge result. If mounted outdoors, the outdoor accessory kit must be used to prevent lightning damage. IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antennas used with the 3e-523A must be installed with a minimum separation distance of 21.5 cm from all persons, and must not be co-located or operated in conjunction with any other antenna or transmitter. Installation should be accomplished using the authorized cables and/or connectors provided with the device or available from the manufacturer/distributor for use with this device. Changes or modifications not expressly approved by the manufacturer or party responsible for this FCC compliance could void the user’s authority to operate the equipment. Installation Instructions This manual deals only and specifically with a single device as a unit. The purpose of this chapter is to describe the device and its identifiable parts so that the user is sufficiently familiar to interact with the physical unit. Preliminary setup information provided below is intended for information and instruction of the wireless LAN system administration personnel. It is intended that the user not open the unit. Any maintenance required is limited to the external enclosure surface, cable connections, and to the management software (as described in Chapter 2) only. Minimum System and Component Requirements To complete the configuration, you should have at least the following components: Copyright 2015 Ultra Electronics, 3eTI October 2015 82 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide PCs with one of the following operating systems installed: Windows NT 4.0, Windows 2000 or Windows XP Access to at least one laptop or PC with an Ethernet card and cable that can be used to complete the initial configuration of the unit. A Web browser program (such as Microsoft Internet Explorer 6.0 or later, or Netscape 6.3 or later) installed on the PC or laptop you will be using to configure the Access Point. TCP/IP Protocol (usually comes installed on any Windows PC.) 3.1.1 Connectors and Cabling Figure 76 shows the external connectors on the device Figure 76 - device external connectors The RJ-45 Ethernet port is a standard 10/100 Ethernet connection. The DB-15 connector is a serial RS232/422/485 I/O port that is also the power interface. The power source should be +5V DC @ 3 amps. The top antenna is an 802.11 a/b/g antenna providing transmit (TX) and receive (RX) functions. The bottom antenna is an 802.11 a/b/g antenna providing the receive diversity functions. The pin out information for the DB-15 connector is listed in Table 13 Copyright 2015 Ultra Electronics, 3eTI October 2015 83 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Table 13 - DB-15 Pin Out Information Pin 10 11 12 13 14 15 Name COM 0 TX COM 0 NCTS Signal GND RS-485 TX– RS-485 RX– Power RTN Power RTN Power RTN COM 0 RX COM 0 NRTS RS-485 TX+ RS-485 RX+ Power RTN +5 VDC +5 VDC Figure 77 below illustrates the setup. Figure 77 - Setup 3.1.2 Indoor Accessory Kit Installation The indoor accessory kit (3e-523-IAK) contains the following items: Qty 2 - R-SMA antennas DB-15 connector housing with power supply Copyright 2015 Ultra Electronics, 3eTI October 2015 84 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Assemble the DB-15 connector for power and serial data signals. It is intended that the conductors intended for +5 VDC Power and Serial Data be routed through the compression nuts and sleeve inserts before entering the larger connector housing. Refer to Figure 78 below which illustrates the connector housing assembly. The example shown shows the wiring for +5 VDC Power. Figure 78 - Connector housing assembly 3.1.3 Outdoor Accessory Kit Installation If any portion of this system (enclosure, antennas, cables etc.) is mounted outdoors, it is strongly recommended that the Outdoor Accessory Kit (523-OAK) for this product be used. This kit contains lightning arrestors and ground cables designed for this product. If the system is mounted outdoors where CE Mark certification is required, use of the Outdoor Accessory Kit (or equivalent) is MANDATORY. Failure to install this protection will void the warranty. The Outdoor Accessory Kit (3e-523-OAK) contains the following items: Mounting Plate Pole Mounting Rear Plate Qty 2 - Outdoor omni-directional antennas Qty 2 - Right angle R-SMA to bulkhead N cable assemblies Qty 2 – Lightning Arrestors Qty 2 - Ground wires Qty 4 - 1/4-inch bolts Qty 4 - 1/4–20 Nut and washer Copyright 2015 Ultra Electronics, 3eTI October 2015 85 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Qty 4 - Hex socket cap screws Hex key wrench tool DB-15 connector housing with associated parts Large connector housing DB-15 screw housing insert Qty 2 - Rubber sleeves Qty 2 - Compression nuts Qty 2 - Flat head #4 self tapping screws Ferrite cylinder NOTE: You (the user) are required to ensure that the connection to a proper earth ground is made by properly certified and authorized personnel and must conform to all applicable codes and regulations. The materials required to connect to a proper ground are defined by local conditions and must be procured locally to ensure the correct safety environment is achieved. The cable used to connect to a proper ground must be AWG 10 or heavier. This cable should be kept as short as possible. ! WARNING ! Do not attempt to install any outdoor equipment during hazardous conditions such as a thunderstorm, where lightning could strike the equipment or installer. Failure to follow this warning could result in injury or death. 1. Install two Bulkhead N Cable Assemblies to the Mounting Plate. 2. Install unit on the Mounting Plate using the 4 hex socket cap screws. Orient the unit so that the larger rectangular bulkhead connector is facing away from the N connectors. Tighten with included hex key wrench tool. 3. Attach the one ground wire to each Lightning Arrestor. Note that one wire is longer than the other. Each lightning arrestor has a ring terminal attached, remove and discard this item. 4. Attach both Lightning Arrestors to the N Connectors on the Mounting Plate. Mount the Lightning Arrestor with the longer ground wire on the right side. 5. Route the ground wires to the ground stud on the unit. Secure with 10-32 Nut. wire must be routed from this point to a suitable earth ground. Note that a Assemble DB-15 Connector for power and serial data signals. It is intended that the conductors intended for +5 VDC Power and Serial Data be routed through the compression nuts and sleeve inserts before entering the larger connector housing. Refer to Figure 78 below to illustrate connector housing assembly. The example shown shows the wiring for +5 VDC Power. See for pin information for the entire connector. 6. Figure 78To reduce unintentional radio frequency interference (RFI), the +5 volt DC power provided to the device should be conditioned by passing the wires through the supplied ferrite cylinder (see Figure 79). Refer to the drawing below for guidance on how to pass the wires through the ferrite cylinder before terminating into the supplied DB-15 connector housing. The ferrite cylinder should be placed approximately two inches from the cap of the connector housing. 7. The Outdoor Accessory Kit can be mounted on a pole using the Pole Mounting Rear Plate. Copyright 2015 Ultra Electronics, 3eTI October 2015 86 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 78 - Connector housing assembly Figure 79 - Power conditioning Figure 80 - Outdoor accessory kit mounting Copyright 2015 Ultra Electronics, 3eTI October 2015 87 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Next is information on the physical dimensions (Figure 81) of the 3e–523–3 unit. Figure 81 - 3e-523 dimensions 3.1.4 The Indicator Lights The side panel of the 3e–523–3 contains two indicator lights (Light Emitting Diodes or LEDs) that help describe the state of various networking and connection operations (see Figure 82). Figure 82 - 3e-523 indicator lights Table 14 - Indicator Lights LED FIPS LED (further from the RJ-45 connector) WLAN LED (next to the RJ-45 connector) Description The Red LED indicates whether or not the 3e–523–3 is in FIPS mode. When this LED is lit, the system is in FIPS mode. When not lit, the system is in non-FIPS mode. The amber LED is the uplink signal strength, for the bridge or client radio link. When a strong signal is being received from the remote bridge radio (bridging mode) or the access point (when in client mode), then the LED will be on steady. As the received signal becomes weaker, the LED may blink fast for a moderate signal, blink slowly for a weak signal, or be dark when no connection is made. When the operating mode of the device is set for access point only mode, this LED is not used. Copyright 2015 Ultra Electronics, 3eTI October 2015 88 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3.1.5 Reset Button The reset button is located behind the Phillips (cross-tip) screw on the top side of the unit (Figure 83). Remove the screw to access the reset button. To reset the unit, use a small screw driver and perform the following: 1. Push in and hold the reset button for five seconds. Holding the button for more than five (5) seconds but less than 10 does a reset. Removing power, or going through the web interface are usually a better ways to reset, when possible. If you hold the button too long, you could factory default the unit by mistake, and wipe out your configuration. 2. If you continue to hold the button, after 20 seconds the unit will be reset to the factory default. 3. Make sure you reinstall the screw with gasket after using the reset button to keep water out of the unit. Figure 83 - Reset button Copyright 2015 Ultra Electronics, 3eTI October 2015 89 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3.2 3e-523E-900 Hardware Installation This section deals with installation of the 3e-523E-900 unit. The unit requires physical mounting and installation on the site, following a specific placement design ensuring optimum operation. FCC Regulations require that the 3e-523E-900 product be professionally installed by an installer certified by the National Association of Radio and Telecommunications Engineers or equivalent institution. The package includes the following items: The Device. Documentation as PDF files (housed on a CD-ROM). Registration and Warranty cards. Minimum System and Component Requirements To complete the configuration, you must have the following minimal components: PCs with one of the following operating systems installed: Windows NT 4.0, Windows 2000 or Windows XP. Access to at least one laptop or PC with an Ethernet card, and cable that can be used to complete the initial configuration of the unit. A Web browser program (such as Microsoft Internet Explorer 6.0 or later, or Netscape 6.3 or later) installed on the PC or laptop you will be using to configure the Access Point. 3.2.1 Specifications ELECTRICAL SPECIFICATIONS: Operating Voltage: 110/220VAC, 50/60Hz Power Requirements: 5.5 Watts (> 0°C) 15 Watts (< 0°C, internal heaters operating) External Interfaces: Ethernet, 10/100, standard RJ-45 interface N-type female jack antenna connector Radio Transmission : 902-928 MHz band ENVIRONMENTAL SPECIFICATIONS: Operating Temperature: -30 to +50°C External Ambient (-22 to +122 °F) Storage Temperature: -40 to +70°C (-40 to +158 °F) Relative Humidity: 90%, non-condensing Copyright 2015 Ultra Electronics, 3eTI October 2015 90 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide MECHANICAL / MOUNTING SPECIFICATIONS: Enclosure: Polycarbonate, polyurethane gasket, stainless steel hardware Weight : 8.8 lbs Features: Pad-lockable, outdoor deployment (weatherproof) Dimensions: 12.08” W x 13.57” H x 6.95” D 3.2.2 Mounting Pattern Copyright 2015 Ultra Electronics, 3eTI October 2015 91 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3.2.3 Installation Requirements ! WARNING ! Do not attempt to install any outdoor equipment during hazardous conditions such as a thunderstorm, where lightning could strike the equipment or installer. Failure to follow this warning could result in injury or death. Mounting feet (and screws) are supplied with the unit, attached inside of the cover. Installer must attach these to the enclosure prior to mounting. Drill holes per mounting pattern drawing and fasten with ¼” screws or bolts (provided by the installer), as appropriate for the installation. AC power cabling and cable gland (or conduit and hub) are to be provided by the installer as appropriate. Two cutouts provided, one for signal wire, one for power wiring, each at 1.109” diameter. Both holes must have appropriate cable glands or conduit hubs added for weatherproof installation. Install AC wiring per label. Ground to “G”, Line (black) to “L”, Neutral (white) to “N” terminals. Install cable gland or conduit hub, as appropriate for data cables and/or weather seal. Secure wires with gland/hub. Install power cable gland or conduit hub, as appropriate. External grounding wire is not provided with the unit. Protection for the user and unit require a minimum 10AWG safety ground be attached to the threaded stud at the bottom of the unit to a secure earth bonded surface. The length of this grounding wire should be kept to a minimum, 3eTI recommends less than 3 feet. NOTE: You (the user) are required to ensure that the connection to a proper earth ground is made by properly certified and authorized personnel and must conform to all applicable codes and regulations. The materials required to connect to a proper ground are defined by local conditions and must be procured locally to ensure the correct safety environment is achieved. Copyright 2015 Ultra Electronics, 3eTI October 2015 92 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide The cable used to connect to a proper ground must be AWG 10 or heavier. This cable should be kept as short as possible. 3.2.4 RF Connections NOTE: This radio transmitter IC: 6780A-523E900 has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. L-Com HGV906U, 6-dBi gain, Omni-Directional antenna L-Com HG906YE, 6-dBi gain, Yagi antenna RF cabling, lightning arrester, and antenna are not provided with the unit. 3.2.5 The installer should provide a suitable lightning arrestor that can attach directly to the N-male RF port at the bottom of the unit. Ground the lightning arrestor to the same earth bonded ground attachment as used for the unit. The installer should provide a suitable antenna to meet the RF coverage needs per application. LMR-400 cabling is recommended for longer than 10 feet of external RF cabling. Ensure this cable is routed and tied down to avoid undue mechanical stress on the lightning arrestor attached to the unit. RF Safety Information FCC: To comply with FCC RF exposure compliance requirements, the antennas used with the 3e-523E-900 product must be installed with a minimum separation distance of 21.5 cm from all persons and must not be co-located or operated in conjunction with any other antenna or transmitter. Installation should be accomplished using the authorized cables and / or connectors provided with the device or available from the manufacturer / distributor for use with this device. Changes or modifications not expressly approved by the manufacturer or party responsible for this FCC compliance could void the user’s authority to operate the equipment. Industry Canada: To comply with Industry Canada RF Exposure requirements, the antennas used with the 3e-523E-900 product must be installed with a minimum separation distance of 32 cm from all persons. NOTE: This equipment has been tested and found to comply with part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance to the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at their own expense. Copyright 2015 Ultra Electronics, 3eTI October 2015 93 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 4. WiMesh PAC-Link (3e-523S) Hardware Overview The 3e–523S, also called the Portable Adaptive Com-Link (PAC-Link), is an extremely portable, battery operated IP router used in mobile operations. The 3e–523S is intended to provide mobile IP connectivity for personnel on the move when the RF signal strength cannot be maintained to the base operations center. When the RF signal is disrupted, a 3e–523S can be used as a repeater which when situated in a suitable location, will provide suitable RF signal strength between the personnel and the base operations center. Multiple 3e–523S units can provide secure communications between personnel and the base operations center when large structures are penetrated or around the perimeter of large objects by simply tying the 3e–523S units to railings or other convenient tie points as the progress of personnel takes them beyond the signal range of the last 3e–523S–1 that was deployed. In this way, connectivity can be maintained between personnel and the base operations center. Inside the 3e–523S is the FIPS 140-2 Validated 3e–523M multifunction wireless data module. Also included is a rechargeable lithium-ion battery with a battery charge of approximately eight hours. The 3e–523S supports three different operating modes: Wireless Access Point (WAP) Wireless Client (STA) Wireless Bridge (WDS) The 3e–523S can be configured for FIPS or non-FIPS sub-mode. In addition, the 3e–523S supports 802.11i and Wi-Fi Protected Access 2 (WPA2), WPA and different EAP types, Temporal Key Integrity Protocol (TKIP) for WPA encryption and Advanced Encryption Standard (AES) for WPA2 encryption. With support of 802.11a/b/g standards, the 3e–523S delivers up to 22 Mbps of sustained data rate in 5 GHz and 2.4 GHz bands. Figure 84 below shows the Antenna and Ethernet sides of the 3e523S device. Figure 84 - 3e-523S Device (Antenna side) on left and 3e-523S Device (RS-232 side) on right. Copyright 2015 Ultra Electronics, 3eTI October 2015 94 29000169-005 Revision C AirGuard WiMesh 3e-523 Series User’s Guide 5. WiMesh End Point OEM Module (3e-523M) The 3e–523M is a secure multi-function wireless OEM Module which can be integrated into another product. The 3e–523M supports four different operating modes: Wireless Access Point (WAP) Wireless AP and Bridge simultaneous mode Wireless Client (STA) Wireless Bridge (WDS) The 3e–523M also can be configured for FIPS or non-FIPS sub mode. In addition, the 3e–523M supports 802.11i and Wi-Fi Protected Access 2 (WPA2), WPA and different EAP types. Temporal Key Integrity Protocol (TKIP) for WPA encryption and Advanced Encryption Standard (AES) for WPA2 encryption. With support of 802.11b/g/a standards, the 3e–523M delivers up to 54Mbps of data rate in 5GHz and 2.4 GHz bands. Figure 85 below illustrates a wireless system using the 3e–523M in all three modes. Figure 85 - 3e-523M wireless system Wireless Access Point Mode In the wireless access point mode, you can use the 3e–523M to connect wireless communication devices together to create a wireless network. The 3e–523M is usually connected to a wired network and can relay data between devices on each side. Many 3e–523Ms can be connected together to create a larger network that allows roaming ( Figure 86). In Wireless Access Point (WAP) mode the WAN interface has to connect to a backbone Ethernet switch in order to operate normally. It bridges the backbone Ethernet network and wireless interface. Figure 86 below shows how to setup the Ethernet cable and IP addressing. Copyright 2015 Ultra Electronics, 3eTI October 2015 95 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 86 - 3e-523M wireless access point mode There are numerous security methods provided in this mode. In non-FIPS mode: WEP, WPA (TKIP and AES-CCM) and WPA2 (TKIP and AES-CCM) are available. The 3e–523M also supports EAP-MD5, EAP-TTLS, EAP-TLS, PEAP, EAP-SIM protocols. In FIPS mode: static 128-, 192- and 256-bit AES, static 3DES and FIPS 802.11i are available. WPA is a subset of 802.11i that satisfies some of the requirements of the full 802.11i standard. Some of the significant features of WPA are: 1. It supports two authenticated key management protocols in infrastructure mode using 802.1X with pre-shared key and with EAP authentication. The IBSS approach described uses no authenticated key management protocol but uses a pre-shared key directly as the encryption/integrity key. 2. APs and stations use IEEE 802.11 open authentication when they use WPA. 3. APs must advertise what they support (Cipher suite, authentication modes). Stations must request the cipher suites and authenticated key management protocol they want. A propriety information element in the Beacon and probe response messages is used to carry this information. The station uses the same information element in association request message. 4. Authentication and Association are required. 5. TKIP encryption with the Michael integrity check is required. Wireless Bridging Mode In Wireless Bridging (WDS) mode the WAN interface may or may not need to connect to a backbone Ethernet switch. It depends on needs of infrastructure network. However, wireless bridging extends the network from an existing wired network easily without altering the network topology. Figure 87 below shows how to setup the Ethernet cable and IP addressing. Copyright 2015 Ultra Electronics, 3eTI October 2015 96 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 87 - 3e-523-F2 wireless bridging mode This type of infrastructure is decentralized. As each node needs only transmit as far as the next node. Nodes act as repeaters to transmit data from nearby nodes to peers that are too far away to reach, resulting in a network that can span large distances. The 3e–523M in bridging mode provides point-to-point or point-to-multipoint network topology. In bridging mode, the 3e–523M can be configured for FIPS or non-FIPS mode. In non-FIPS mode the 3e–523M supports AES-CCM for security. In FIPS mode, the 3e–523M supports Static 128-, 192- and 256-bit AES and static 3DES. Wireless Client Mode In Wireless Client/Client-Bridge mode, the WAN interface is NOT design for a backbone network connection. It is the interface for computer connected to it. The following diagram shows how to setup the Ethernet cable and IP addressing (Figure 88). Copyright 2015 Ultra Electronics, 3eTI October 2015 97 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 88 - Wireless client mode The 3e–523M can operate as a client device that communicates with a wireless access point. It supports 802.11a/b/g bands. In client mode, the 3e–523M can be configured for FIPS or non-FIPS mode. In non-FIPS mode the 3e–523M supports AES-CCM for security. In FIPS mode, the 3e–523M supports Static 128-, 192- and 256-bit AES and static 3DES. Network Topology Map Enhancement The 3e–523M contains an embedded network topology map ( 89 111) which can help you to envision the bridged network. The initial implementation provides the following tree structure where each indented entry is a child to the entry above it. The entry at the top of the tree is the STP root. The receive signal strength is indicated by the % on each link. The map shows the network layer 2 topology. APs that are part of another network are not displayed in the map. This map only reports all 3eTI devices (client-bridge, AP, bridge) and part of 3rd party switches running STP. 3eTI strongly recommends that you configure your 3rd party switch as root and make it the uplink for the 3eTI device cloud to the backbone network. This implementation is base-on the current design. Copyright 2015 Ultra Electronics, 3eTI October 2015 98 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 89 - Network topology map Hardware Installation The 3e-523M has multiple wired interfaces and functions available via the exposed connectors (Figure 90). These interface features on connector P1 consist of a Serial RS-232/422/485 IO port that also contains the power interface. Connector P2 contains the Reset Function, LED Indicators as well as advanced features to be activated in future revisions. There is a standard 10/100 RJ-45 Ethernet port. The wireless interface consists of one 802.11 a/b/g dual antenna wireless interface for diversity. It uses standard 50-ohm SMA connectors. The Reset Function is activated by shorting P2 - pin 1 to GND found at P2 – pin 7 or 8. Short for 5 seconds and release – simple reset, you can also power cycle the module Short for 11 seconds and release – resets all to factory defaults. This can be used when there’s no GUI access to the module. The 3.3 VDC pins shown on P2 – pins 3 and 4 are only to be used as a current source to illuminate any external LED indicators the user wishes to connect. DO NOT ATTEMPT TO SOURCE 3.3 VDC TO THE 3e523M THROUGH P2. This will void the warranty, damage the unit and may create a safety hazard. The LED Indicator signals are capable of sinking approximately 9 mA using the supplied +3.3 VDC from pins 3 and 4 of P2. Refer to the following Figure 91 to view the connection for these signals. Each LED Indicator signal from the 3e-523M processor contains a 287 ohm current limiting resistor, so no additional resistor is typically required. Power requirements: +5VDC +-5% 3 Amps Copyright 2015 Ultra Electronics, 3eTI October 2015 99 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 90 - Hardware Installation The 3e-523M unit can be used for either RS232 communications or for RS485/422 communications, but the two functions are mutually exclusive as they share a common UART. The pinout information for the P1 serial port is shown in Table 15 below. NOTE: For a rugged environment, the user should consider adding RTV to enforce the connectors. Table 15 - P1 Pin Out Information Pin Number 10 11 12 13 14 15 16 Serial Port Functionality RS232 TxD RS232 RxD RS232 CTS RS232 RTS GND RS485 TX+ RS485 TX RS485 RX+ RS485 RX GND GND +5VDC GND +5VDC GND +5VDC When the 3e-523M unit is run in full RS485 duplex mode each 485 signal pair is connected separately and when the interface is run in half duplex mode the Tx+/Rx+ and Tx-/Rx- wires are connected together. Copyright 2015 Ultra Electronics, 3eTI October 2015 100 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide The P2 serial port is used for LED indicators and advanced features. See Table 16 Table 16 - P2 Pin Out Information Pin Number 10 11 12 13 14 Serial Port Functionality RESET EXT GPIO +3.3 VDC +3.3 VDC USV D+ USB D GND GND WAN LINK WAN SPEED RF LINK RF DATA IIC CLK IIC DATA Pin Definition and schematics of the P1 serial port and power, 16 pin, double row, 100 mil header is illustrated in Figure 91 below. Figure 91 - P1 Pin setup Pin Definition and schematics of the P2 serial port and LED, 14 pin, double row, 100 mil header (Figure 92). Copyright 2015 Ultra Electronics, 3eTI October 2015 101 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 92 - P2 Pin setup Top view of P2 connector, the Pin 1 is closer to the Tx/Rx antenna connector (Figure 93). Table 17 and Table 18 below lists the mating connectors. Figure 93 Figure 93. Top View of P2 Connector Table 17 - Mating Connector Digi-Key Part Number Manufacturer Part Number Description WM2524-ND 022-55-2141 CONN RECEPT HOUSING 14POS .100 inch Table 18 - Mating Connector Contact Pin Digi-Key Part Number Manufacturer Part Number Description WM2511-ND 16-02-0096 CONN SOCKET CRIMP 24-30AWG TIN Pin Definition (Figure 94) and color code (Figure 95) for RJ45 of Ethernet port. Copyright 2015 Ultra Electronics, 3eTI October 2015 102 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 94 - Front view of RJ45 connector RJ45 connector signal names and color code per IEEE 802.3 spec. Figure 95 illustrates the mechanical drawing of 3e-523-F2. Figure 95 - RJ45 connector signal names and color code 5.1.1 Mechanical Drawings Figure 96 - Mechanical drawing of 3e-523-F2 Copyright 2015 Ultra Electronics, 3eTI October 2015 103 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 6. Technical Support Manufacturer’s Statement 3e–523 is provided with a standard warranty. It is not desired or expected that the user open the device. If a malfunction is experienced and all external causes are eliminated, the user should contact 3eTI for instructions on how to resolve the issue If you are experiencing trouble with this unit, the point of contact is: e-mail: support@3eti.com Phone: 1-800-449-3384 (Monday - Friday) or visit our website at www.ultra-3eti.com Radio Frequency Interference Requirements This device has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the Federal Communications Commission’s Rules and Regulations. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at their expense. Installation should be accomplished using the authorized cables and/or connectors provided with the device or available from the manufacturer/distributor for use with this device. Changes or modifications not expressly approved by the manufacturer or party responsible for this FCC compliance could void the user’s authority to operate the equipment. Copyright 2015 Ultra Electronics, 3eTI October 2015 104 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Appendix A: Glossary 3DES - Also referred to as Triple DES, a mode of the DES encryption algorithm that encrypts data three times. 802.11 - 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. The IEEE accepted the specification in 1997. Access Point - An access point is a gateway set up to allow a group of LAN users access to another group or a main group. The access point doesn’t use the DHCP server function and therefore accepts IP address assignment from the controlling network. AES - Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. Bridge - A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol, such as Ethernet or Token-Ring. DHCP - Short for Dynamic Host Configuration Protocol, DHCP is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device’s IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. Many ISPs use dynamic IP addressing for dial-up users. NMS (Network Management Station) - Includes such management software as HP Openview and IBM Netview. PC Card - A computer device packaged in a small card about the size of a credit card and conforming to the PCMCIA standard. PDA (Personal Digital Assistant) - A handheld device. SNMP (Simple Network Management Protocol) - A Network ID unique to a network. Only clients and access points that share the same SSID are able to communicate with each other. This string is case-sensitive. Wireless LANs offer several security options, but increasing the security also means increasing the time spent managing the system. Encryption is the key. The biggest threat is from intruders coming into the LAN. You set a seven-digit alphanumeric security code, called an SSID, in each wireless device and they thereafter operate as a group. WLAN (Wireless Local Area Network) - A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. Copyright 2015 Ultra Electronics, 3eTI October 2015 105 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Appendix B: Two-Factor Configuration Authentication Overview and B.1 Overview and Operation Two-factor authentication is the method of using two independent methods to increase the assurance that a user has been authorized to access a secure device. 3eTI devices have the ability to provide increased authentication assurance by providing for a user requiring 3eTI device access to be authenticated first via a centralized validation authority and user login / password access for a particular device. The 3eTI Data Points support Public Key Certificates issues and managed by a Certificate Authority. By networking 3eTI devices into a Public Key Infrastructure, a 3eTI Data Point can use the capabilities of the PKI network by requiring a user to first validate authentication capabilities using a Common Access Card (CAC) card and the PKI network when using a computer to gain access to the 3eTI Data Point. Once permission is granted through the PKI network a user then uses their login ID and password to gain access to the 3eTI device. Since the exact method of implementing and managing a PKI network may vary based on organization the following section provides details on how a 3eTI Data Point may be configured for two-factor authentication based on internal 3eTI configuration and testing of this feature. The following defines how to configure and use a Public Key Infrastructure (PKI) to manage and configure a 3e-523 Data Point. See Figure 97 for a block level overview of a PKI network. Figure 97 – Two-Factor Authentication PKI Network Overview Web Client IP Network OCSP Responder 3e-523 Family of Products 3e-525 Family of Products When enabled, a user with a valid Common Access Card (CAC) is authenticated through an existing PKI network to gain an access to a 3eTI Data Points web management interface. The 3eTI Data Point uses the Online Certificate Status Protocol (OCSP) to send requests to an OCSP Responder in the PKI network. Based on the information returned from the OCSP Responder, the Data Point determines if the users has permission to access the web management GUI of the device. Based on the current permission setting of the requestor, the OCSP responder will return receive one of three possible statuses in response to a request to check CAC certificates validity. The status in the response the Data Point can be unknown, revoked, or good. Copyright 2015 Ultra Electronics, 3eTI October 2015 106 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide If the OCSP Responder does not have access to a valid Certificate Revocation List (CRL) for the Certificate Authority (CA) owning the requesting CAC certificate then the status returned will be unknown. The unknown certificate status is treated by the AP as if the client certificate was invalid. If the responder has access to a valid CRL for the CA owning the certificate then the status depends upon whether or not the certificate is listed in the CRL as revoked. If revoked then the status returned is revoked, otherwise the status will be good. If the response returned is invalid or revoked the Data Point will not allow the requestor to login to the web management interface. If the response is good the Data Point provides the Login and password interface to the requestor. PKI Network Components The following components are required to implement and operate a PKI network providing Two-Factor authentication of 3eTI Data Points, see Figure 97 – for the components that make up a PKI network. Web Client A computer running a valid Web client / browser (Internet Explorer 6 or later) that is able to communicate to the Data Point thought either its LAN or WAN port. The web client PC must be running Windows XP SP3 or later and be equipped with smart card slot. The computer must have software installed that can read and process CAC card information. Also, the requestor must have a valid Common Access Card (CAC) (DoD CA-23) that will return a status of good from the OCSP Responder. Software such as ActivIdentity ActivClient (6.2 or later) will meet system requirements. OCSP Responder The OCSP Responder provides remote access to Certificate Revocation List (CRL) databases via the OCSP protocol. The responder is meant to aggregate and help manage large databases and control how a CRL is stored and managed within the network. Software such as Tumbleweed Validation Authority (4.9) running on Windows Server 2003 R2 platform is recommended. DoD CA-23 certificate and any corresponding CRL can be loaded to the OCSP Responder from a local file. Current DoD certificates and CRLs can be obtained from https://crl.chamb.disa.mil/. See Table 19 for the network component operational requirements. Table 19 - PKI Network Component Requirements System Element Web Client OCSP Responder 3eTI Data Points Operational Requirements Internet Explorer 6.0 or later, running on Windows XP SP3 or later. PC with smart card slot and ActivIdentity ActivClient (or similar) 6.2 or later software installed. DoD issued Common Access Card (CAC). Windows Server 2003 R2 Tumbleweed Valicert Validation Authority 4.9 or later Software Release 4.4 or later, valid for both 3e-523 and 3e-525 series of products B.2 Configuration of 3eTI Data Points for Two-Factor Authentication Configuring OCSP operation on 3eTI Data Points By default, OCSP is disabled. The following steps show how to enable and configure OCSP on 3eTI devices. Copyright 2015 Ultra Electronics, 3eTI October 2015 107 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Login onto the device and navigate to the User Login Policy web page, as shown in Figure 98. In order to start using OCSP, the CA certificate (DoD CA-23 certificate) that will used to issue / sign the CAC certificates must be uploaded to the AP. IMPORTANT NOTE: The CA certificate file must be in PEM format. DoD certificates downloaded from the DoD PKI Management web site (https://crl.chamb.disa.mil/) are typically received in the X.509 format (*.cer), if this is true the file will need to be converted to PEM format first. This can be accomplished using the OpenSSL utility that comes pre-installed on most Linux distributions or can be uploaded from the internet: The command for converting from X.509 format to PEM format is OpenSSL x509 -inform der -in DODCA_23.cer -out DODCA_23.pem Click the Load New Certificate link on the User Login Policy web page. This will take you to the “Update OCSP Certificate” web page shown in Figure 98 Click on the Browse button and navigate to the CA certificate file using the Choose File to Upload screen, select the file and click the Open button, see Figure 99. After the CA file in PEM format is selected, click the Upload Cert button, on the web page. A warning pop up window will be displayed, see Figure 100. IMPORTANT: Read the warning message carefully. If the CA certificate file is not correct and does not match the certificate on the CAC card and/or is not the same as what is installed on OCSP Responder the connection to web management interface of the 3eTI device may not be possible. WARNING: If the web client/AP/OCSP Responder are configured incorrectly, or there is no network connection to the Validation Authority software / OCSP Responder, the web client will not be able to access the device web GUI. If this occurs setting the 3eTI Data Point to its factory default configuration will disable OCSP, allowing a user to connect to device web GUI using factory default settings. Click the OK button of the pop up window. If the upload is successful the message page shown in Figure 101 will be displayed. – Click Back button. This will take you back to the User Login Policy web page, Figure 98 . The User Login Policy page will show information related to the uploaded CA under the OCSP Certificate banner on the page. Copyright 2015 Ultra Electronics, 3eTI October 2015 108 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 98 - User Login Policy Page Figure 99 - Loading OCSP Certificate File Copyright 2015 Ultra Electronics, 3eTI October 2015 109 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 100 - OCSP Certificate File Warning Figure 101 - OCSP Certificate File Upload Success Message Page Copyright 2015 Ultra Electronics, 3eTI October 2015 110 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Copyright 2015 Ultra Electronics, 3eTI October 2015 111 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 102 - User Login Policy with Upload Certificate Information Next OCSP communication to the OCSP Responder must be established. In order to enable OCSP, the OCSP Responder URL must be entered into the Data point. This is entered in the input box under theOCSP Configuration label, see Figure 102. OCSP supports two schemes, “http:” and “https:” The host name may be either an IP address or domain name. The latter can only be used if DNS is able to resolve the host name to IP address. Optionally, the port number can be specified separated from the host name by colon. Examples of the valid OCSP Responder URLs are: http://192.168.202.140 https://192.168.202.140 https://192.168.202.140:443 http://3ETI-ENGR https://3ETI-ENGR:443 Copyright 2015 Ultra Electronics, 3eTI October 2015 112 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide IMPORTANT: Before enabling the 3eTI Data Point for OCSP communication, it is recommended the communication with the OCSP Responder by verified. This can be done by a ping of the OCSP Responder from the 3eTI Data Point, see Figure 103. The ping capability can be found on the Utilities web page of the device. The IP address or host name of the OCSP Responder URL must be entered in the IP address or hostname text box, for example, 192.168.202.140 or 3ETI-ENGR. Click the Ping button next to the text box. If communication between the device and OCSP Respond can be established a ping success screen as shown in Figure 104 will be displayed. WARNING: If the ping is not successful do not proceed until networking issues preventing successful communication can be resolved. Figure 103 – 3eTI Data Point Utilities Web Page Copyright 2015 Ultra Electronics, 3eTI October 2015 113 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 104 – Ping Success Response Once connectivity to the OCSP Responder has been verified, navigate back to User Login Policy web page and enter OCSP Responder URL into the OCSP URL Responder text box, as shown in Figure 105. Click the Enable radio button. NOTE: The Use Nonce setting is optional. It should be left at Do Not Use Nonce for most installations. Copyright 2015 Ultra Electronics, 3eTI October 2015 114 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 105 – OCSP Responder Enable After setting the OCSP Configuration parameters, click the Apply button at the bottom of the screen. The a reboot required warning message will be displayed, see Figure 106. WARNING: If the web client/AP/OCSP Responder are configured incorrectly, or there is no network connection to the Validation Authority software / OCSP Responder, the web client will not be able to access the device web GUI. If this occurs setting the 3eTI Data Point to its factory default configuration will disable OCSP, allowing a user to connect to device web GUI using factory default settings. If all enter information is correct click the OK button and navigate to the Reboot web page, click the Reboot button. The following warning message will appear, see Figure 107. Click the OK button. The screen shown in Figure 108 will appear. Copyright 2015 Ultra Electronics, 3eTI October 2015 115 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 106 – OCSP Enabled Warning Figure 107 – Reboot Warning Copyright 2015 Ultra Electronics, 3eTI October 2015 116 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 108 – Reboot Success Once the device has completed it reboot sequence, click on the Main Page link, as shown in Figure 108. Depending on certificate caching options, caching history, and software being used to read and validate the CAC card, prompt(s) for validating the CAC will appear, these may be similar to those shown in as shown in Figure 109 . The Internet Explorer prompt for selecting the certificate to use for the connection will appear, as shown in Figure 110. Click on the certificate to use for accessing the device and click the OK button. A following warning message about the web server certificate will appear, see Figure 111. Click on the Continue to this website (not recommended) link. If a screen prompting you to add the web-site to the exceptions list appears, add the IP address to the exceptions list. If the IP address of this AP was previously added to the exceptions list, the following screen will appear as in Figure 112 Copyright 2015 Ultra Electronics, 3eTI October 2015 117 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 109 - ActivClient Password Prompt Figure 110 - Internet Explorer Certificate Prompt Copyright 2015 Ultra Electronics, 3eTI October 2015 118 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 111 - Internet Explorer Website Certificate Warning Click on Yes button. The certificate list to use with this website will appear as shown in Figure 113. Highlight the correct ID certificate and click the OK button. The login screen of the AP will appear as in Figure 114. Figure 112 - Internet Explorer Website Warning Copyright 2015 Ultra Electronics, 3eTI October 2015 119 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 113 - Internet Explorer Client Certificate List Figure 114 - Internet Explorer Data Point Login Screen Type the user name and password in the corresponding boxes. Click on the checkbox to accept the Terms and Conditions, and click the Sign In button (Figure 115). Copyright 2015 Ultra Electronics, 3eTI October 2015 120 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 115 - Internet Explorer Data Point Login Credentials If correct login credentials were specified, the General configuration web page of the AP will appear, as shown in Figure 116. If this screen appears the CAC certificate have been verified by the 3eTI device and the OCSP responder. You now have access to the web GUI and can configure and manage the device. Figure 116 - Internet Explorer Data Point General Configuration Web Page B.3 Optional 3rd party Device Configuration Overview Copyright 2015 Ultra Electronics, 3eTI October 2015 121 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide 3eTI has tested and validated the above capabilities using ActivIdentity ActivClient and Tumbleweed Valicert Validation Authority software providing an end to end validation capability. It is recognized that other OCSP based software may provide the same capabilities. This section is intended to provide an overview of configuring the above software for use within a PKI network. More detail on how to use and configure the software can be found in the respective user manuals for each product. Configuration Procedure Web Client Configuration Install the ActiveIdentity ActiveClient software as specified by the vendor Obtain a valid CAC card (3eTI has validated this feature using a DoD CA-23 issued CAC). Insert the CAC card into the smart card slot of the PC. Once the ActivClient software recognizes the CAC, double click on ActivClient icon in the System Tray to open the software window, shown in and navigate to Tools -> Advanced -> Make Certificates Available to Windows, as shown in Figure 117 Figure 117 - ActivClient Certificate Export Open Internet Explorer. Click on menu item Tools -> Internet Options. Click on Advanced tab and scroll down to SSL/TLS options. Make sure that Use SSL 2.0 and Use SSL 3.0 options are unchecked and Use TLS 1.0 option is checked, as shown in Figure 118. The software is ready to be used, please refer to the appropriate software configuration documentation to insure proper setup and operation. Copyright 2015 Ultra Electronics, 3eTI October 2015 122 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 118 - Internet Explorer Security Options OCSP Responder Configuration Install the Tumbleweed Valicert Validation Authority software as specified by the vendor Appropriate certificate and corresponding CRL available as described in previous sections (3eTI has tested the configuration using DoD CA-23 issued CAC) Open web GUI to the OCSP Responder and navigate to the CONFIGURATION -> Keys and Certificates -> Certificates page. Verify that the certificate (CAC issuer certificate) is installed. This is the same certificate that will be installed on the 3eTI Data Point. If the certificate is not installed, click the Add button and load the certificate from the local file. This is shown in the Figure 119. Copyright 2015 Ultra Electronics, 3eTI October 2015 123 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 119 - OCSP Responder Certificates Navigate to the CONFIGURATION -> CRLs -> Upload Crl screen and upload the correct certificate from the local file. Navigate to CONFIGURATION -> CRLs and OCSP Databases and verify that the certificate is listed as shown in Figure 120. Copyright 2015 Ultra Electronics, 3eTI October 2015 124 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Figure 120 - OCSP Responder CRLs Copyright 2015 Ultra Electronics, 3eTI October 2015 125 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Appendix C: Common Criteria Supplement If the 3e-525A-3 product family is to be operated in a Common Criteria certified environment, the product MUST be inspected upon arrival from 3e Technologies International. If the any of the red tamper-evident tapes indicate that the product or its CDROM sleeve have been opened, the user is not to use the product prior to contacting 3eTechnologies International: Ultra Electronics, 3eTI 9713 Key West Avenue Suite 500 Rockville, Maryland 20850 USA Telephone: 1-800-449-3384 FAX: 1-301-670-6989 Once the product is in the user’s possession, it is the responsibility of the user to use and maintain the product and its CDROM in a safe and secure manner as defined within this document. If the user finds any issues of the product and deems that is security related, the user shall contact 3eTI at the address above. In order to operate the 3e-525A-3 product in a Common Criteria certified environment, the following MUST be carried out. 1. On the System Configuration Operating Mode GUI screen: [FIPS 140-2 Mode] MUST be selected 2. The Administrator’s session timeout must be set to a minimum of 10 minutes. To operate in the Common Criteria environment, the Crypto-Officer and Administrators must enforce the following password policy. That is, all passwords required in the use of the 3e-525A-3 product must: have a minimum length of 8 characters, contain at least two uppercase characters (A, B, C, …) and two lowercase characters (a, b, c, …), contain at least two numeric characters (1, 2, 3, …), contain at least two special characters, have a 30 day expiration date, not be a common word, a word in any existing password dictionaries, or a word easily guessed (such as “password”). To operate in the Common Criteria environment, all Crypto-Officers and Administrators responsible for the 3e-525A-3 product must be non-hostile and appropriately trained, and must follow all of the guidance information contained in this document. To operate in the Common Criteria environment, the 3e-525A-3 product (plus associated clients and the 3e-030-2 as appropriate) shall be installed with appropriate physical security, commensurate with the value of the products and the data contained within. CryptoOfficer and Administrator have different privileges in managing the device, the table below shows the user-accessible functions and privilege all security parameters under the control of the user, indicating secure values as appropriate each type of security-relevant event relative to the user-accessible functions that need to be performed. Copyright 2015 Ultra Electronics, 3eTI October 2015 126 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operators Audit Events FIPS/Non-FI PS mode None AES 128 key: EVT_KEY_GENERATED 32 hex digits EVT_ENCRYPT_ALG_CHANGED Delete Add Set Delete Add Set Show Parameters Administrator Crypto Officer Features Show Categories System Configuration Operating Mode AP / Bridging Mode – FIPS AP / Bridging Mode – Non-FIPS Wireless Access Point Security AES (128-/192-256-bit) EVT_KEY_ZEROIZED EVT_STA_ASSOC AES 192 key: EVT_SELF_TEST_ACTIVATED 48 hex digits AES 256: 64 hex digits FIPS 802.11i Pre-Shared EVT_KEY_GENERATED EVT_KEY_ZEROIZED The operator can view this setting The operator can change this setting The operator can add a required input. For example: Adding an entry to the MAC address filtering table The operator can delete a particular entry. For example: Deleting an entry from the MAC address filtering table The operator can view this setting The operator can change this setting The operator can add a required input. For example: Adding an entry to the MAC address filtering table The operator can delete a particular entry. For example: Deleting an entry from the MAC address filtering table Copyright 2015 Ultra Electronics, 3eTI October 2015 127 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operators Parameters Delete Add Set Delete Add Set Show Audit Events Administrator Crypto Officer Features Show Categories key: 64 hex digits EVT_ENCRYPT_ALG_CHANGED EVT_STA_ASSOC EVT_SELF_TEST_ACTIVATED Radius Server IP: valid IPV4 address Shared secret: 10 to 95 characters Backend password: 10 to 95 characters Backend key: 10 to 95 characters Wireless Bridge Encryption AES (128-/192-256-bit) AES 128 key: EVT_KEY_GENERATED 32 hex digits EVT_ENCRYPT_ALG_CHANGED EVT_KEY_ZEROIZED EVT_STA_ASSOC AES 192 key: EVT_SELF_TEST_ACTIVATED 48 hex digits AES 256: 64 hex digits AES_CCMP 32 hex digits EVT_KEY_GENERATED EVT_KEY_ZEROIZED EVT_ENCRYPT_ALG_CHANGED EVT_STA_ASSOC Copyright 2015 Ultra Electronics, 3eTI October 2015 128 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operators Parameters Delete Add Set Delete Add Set Show Audit Events Administrator Crypto Officer Features Show Categories EVT_SELF_TEST_ACTIVATED Service Settings SNMP agent Enable/ Disable None None Community settings Secure User Configuration None None None EVT_USER_AUTH_INFO passwd complexity EVT_USER_AUTH_INFO System Information User Management List All Users Add New User User Password Policy Enable/Disable Policy setting enable/disa ble min passwd length: 8 to 30 characters max bad passwd entries 3 to 10 session timeout 3 to 60 minutes max passwd age 30 to 90 days uniqueness Copyright 2015 Ultra Electronics, 3eTI October 2015 129 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operators Parameters Delete Add Set Delete Add Set Show Audit Events Administrator Crypto Officer Features Show Categories depth 3 to 10 characters OSCP enable/disa ble Monitoring / Reports System Log Web Access Log Date/Time/Message None None None None Auditing Log Report Query Configuration None None None None None EVT_AUDIT_CFG_MOD None None None EVT_SELF_TEST_ACTIVATED None None None EVT_AUDIT_LOG_STATE_CHAN Enable/Disable Selectable items Firmware Upgrade Local Configuration Upgrade System Administration System Upgrade Remote Configuration Upgrade Self Tests Factory Defaults Remote Logging Perform Cryptographic algorithm KAT, key error detection test, software integrity check Enable/Disable Copyright 2015 Ultra Electronics, 3eTI October 2015 130 29000169-005 Revision C1 AirGuard WiMesh 3e-523 Series User’s Guide Operators Parameters Reboot Delete Add Set Delete Add Set Show Settings Audit Events Administrator Crypto Officer Features Show Categories GED None None Copyright 2015 Ultra Electronics, 3eTI October 2015 131 29000169-005 Revision C1
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Author : Keith Byerly Create Date : 2015:10:07 10:20:27-04:00 Modify Date : 2015:10:07 07:57:30-07:00 Language : en-US XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00 Format : application/pdf Creator : Keith Byerly Title : 3e-523_525N Family User Guide Creator Tool : Microsoft® Office Word 2007 Metadata Date : 2015:10:07 07:57:30-07:00 Producer : Microsoft® Office Word 2007 Document ID : uuid:65854765-f2ab-4afc-aed5-53d4b44ae250 Instance ID : uuid:6dc41fe6-fb59-482e-b793-abb61fc645d2 Page Count : 132EXIF Metadata provided by EXIF.tools