3e Technologies 523E-900 WiMesh End Point Kit 900 MHz Option User Manual 3e 523 525N Family User Guide

3e Technologies International, Inc. WiMesh End Point Kit 900 MHz Option 3e 523 525N Family User Guide

User Manual Revised

Copyright 2015 Ultra Electronics, 3eTI
October 2015
i
29000169-005 Revision C1
AirGuard WiMesh 3e-523 Series
Models: 3e523A, 3e-523S, 3e-523E-900,
and 3e-523M (OEM Module)
Users Guide
Ultra Electronics, 3e TI
9713 Key West Ave, Suite 500
Rockville, MD 20850
(800) 449-3384
www.ultra-3eti.com
October 2015
29000169-005 Revision C1
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
1
29000169-005 Revision C1
This page intentionally left blank.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
2
29000169-005 Revision C1
Copyright © 2015 Ultra Electronics, 3eTI, All rights reserved. No part of this document may be reproduced
in any form or by any means or to make any derivative work (such as translation, transformation, or
adaptation) without written permission from 3eTI.
3eTI reserves the right to revise this document and to make changes in content from time to time without
obligation on the part of 3eTI to provide notification of such revision or change.
3eTI provides this document without warranty, term or condition of any kind, either implied or expressed,
including, but not limited to, the implied warranties, terms, or conditions of merchantability, satisfactory
quality, and fitness for a particular purpose. 3eTI may make improvements or changes in the product(s)
and/or the program(s) described in this document at any time. Certain features listed may have restricted
availability and/or are subject to change without notice - please confirm material features when placing
orders.
If there is any software or removable media described in this document, it is furnished under a license
agreement included with the product as a separate document, in the printed document, or on the removable
media in a readable file such as license.txt or the like. If you are unable to locate a copy of the license,
contact 3eTI and a copy will be provided to you.
GOVERNMENT RIGHTS LEGEND
The U.S. Government’s rights in this document, the products described, and all technical data and
computer software are limited by DFARS 252.227 7014 pertaining to restricted rights software, and DFAR
252.227-7015 pertaining to limited rights technical data developed at private expense; or currently limited
under DFARS 252.227-7018 small business innovative research programs, whichever is applicable. 3eTI,
the 3eTI logo and AirGuard are registered trademarks.
Sensus is a registered trademark of Sensus.
ISA100.11A is a registered trademark of International Society of Automation.
Windows is a registered trademark of Microsoft Corporation. Any other company and product name
mentioned herein is a trademark of the respective company with which they are associated.
EXPORT RESTRICTIONS
This product contains components, software, and/or firmware exported from the United States in
accordance with U.S. export administration regulations. Diversion contrary to U.S. law is prohibited.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
3
29000169-005 Revision C1
Table of Contents
1. Introduction…………. ....................................................................................................................... 6
1.1 Basic Features ............................................................................................................................ 6
1.2 Wireless Basics ........................................................................................................................... 7
1.2.1 Bridging / Mesh Operation .................................................................................................. 8
1.2.2 Access Point Operation ...................................................................................................... 8
1.2.3 Client Operation ................................................................................................................. 8
1.2.4 Data Encryption and Security ............................................................................................. 8
1.3 Device Management and Administration ...................................................................................... 9
1.4 Product Family Navigation Options .............................................................................................. 9
2. Device Configuration ..................................................................................................................... 10
2.1 Preliminary Configuration Steps ................................................................................................. 10
2.2 System Configuration ................................................................................................................ 13
2.2.1 General ……………………………………………………………………………………………...13
2.2.2 Operating Mode ............................................................................................................... 14
2.2.3 System Deployment ......................................................................................................... 16
2.2.4 WAN ........................................................................................................................... 16
2.2.5 Serial Port ........................................................................................................................ 17
2.2.6 WLAN QoS/WMM ............................................................................................................ 19
2.3 Wireless AP and Bridge Mode ................................................................................................... 23
2.3.1 Radio Configuration for 3e-523A, 3e-523S and 3e-523M .................................................. 23
2.3.2 Radio Configuration for 3e-523E-900 ............................................................................... 24
2.3.3 Bridge Mode..................................................................................................................... 27
2.3.4 Bridge Encryption ............................................................................................................. 31
2.3.5 MAC Address Filtering ..................................................................................................... 32
2.3.6 AP Encryption .................................................................................................................. 33
2.3.7 Wireless VLAN ................................................................................................................. 35
2.3.8 AP MAC Filtering .............................................................................................................. 41
2.3.9 Rogue AP Detection ......................................................................................................... 42
2.3.10 AP Advanced ................................................................................................................... 43
2.4 Service Settings......................................................................................................................... 44
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
4
29000169-005 Revision C1
2.4.1 SNMP Agent .................................................................................................................... 44
2.4.2 Serial Communication ...................................................................................................... 46
2.4.3 Remote Administration ..................................................................................................... 48
2.5 Admin User Management .......................................................................................................... 49
2.5.1 List All Users .................................................................................................................... 50
2.5.2 Add New User .................................................................................................................. 51
2.5.3 User Login Policy ............................................................................................................. 51
2.6 Monitoring/Reports .................................................................................................................... 53
2.6.1 System Status .................................................................................................................. 54
2.6.2 Bridging Status ................................................................................................................. 54
2.6.3 Bridge Site Map................................................................................................................ 55
2.6.4 Wireless Clients ............................................................................................................... 56
2.6.5 Adjacent AP List ............................................................................................................... 57
2.7 Logs .......................................................................................................................... 57
2.7.1 System Log ...................................................................................................................... 58
2.7.2 Web Access Log .............................................................................................................. 58
2.8 Auditing ........................................................................................................................... 59
2.8.1 Audit Log.......................................................................................................................... 59
2.8.2 Report Query ................................................................................................................... 60
2.8.3 Configuration.................................................................................................................... 61
2.9 System Administration ............................................................................................................... 63
2.9.1 E-mail Notification Configuration ....................................................................................... 63
2.9.2 Radio Tx Off Control......................................................................................................... 65
2.9.3 System Upgrade .............................................................................................................. 65
2.9.4 Factory Default ................................................................................................................. 67
2.9.5 Remote Logging ............................................................................................................... 68
2.9.6 Reboot ........................................................................................................................... 69
2.9.7 On Demand Self-test ........................................................................................................ 69
2.9.8 Periodic Self-test .............................................................................................................. 70
2.9.9 Utilities ........................................................................................................................... 71
2.9.10 Help .......................................................................................................................... 72
2.10 Operational Configurations ........................................................................................................ 73
3. WiMesh End Points 3e-523A and 3e-523E-900 Hardware Installation ......................................... 82
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
5
29000169-005 Revision C1
3.1 3e-523A Hardware Installation ................................................................................................... 82
3.1.1 Connectors and Cabling ................................................................................................... 83
3.1.2 Indoor Accessory Kit Installation ....................................................................................... 84
3.1.3 Outdoor Accessory Kit Installation .................................................................................... 85
3.1.4 The Indicator Lights .......................................................................................................... 88
3.1.5 Reset Button .................................................................................................................... 89
3.2 3e-523E-900 Hardware Installation ............................................................................................ 90
3.2.1 Specifications ................................................................................................................... 90
3.2.2 Mounting Pattern .............................................................................................................. 91
3.2.3 Installation Requirements ................................................................................................. 92
3.2.4 RF Connections ............................................................................................................... 93
3.2.5 RF Safety Information ...................................................................................................... 93
4. WiMesh PAC-Link (3e-523S) Hardware Overview......................................................................... 94
5. WiMesh End Point OEM Module (3e-523M) ................................................................................... 95
5.1.1 Mechanical Drawings ............................................................................................................ 103
6. Technical Support .................................................................................................................. 104
Appendix A: Glossary ................................................................................................................... 105
Appendix B: Two-Factor Authentication Overview and Configuration .......................................... 106
Appendix C: Common Criteria Supplement .................................................................................... 126
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
6
29000169-005 Revision C1
1. Introduction
This manual covers the installation and operation of the Ultra Electronics, 3eTI AirGuard WiMesh Series
model numbers: 3e523 family of products. These rugged secure data points have been designed and
tested for use in harsh demanding environments were durability is a key requirement. The 3e-523 product
family consists of the 3e-523A, 3e-523S, 3e-523M and the 3e-523E-900 (hereinafter referred to as the
3e-523, unless otherwise specified).
The 3e-523 includes FIPS-140-2 certified AES/3DES cryptographic modules for wireless encryption and
HTTPS/TLS, for secure web communication.
The cryptographic modules provide the following encryption capabilities.
AES (128/192/256 bit)
AES-CCM (128 bit)
1.1 Basic Features
The AirGuard WiMesh 3e-523 family of products is made up of four different products each designed to
meet specific user needs and requirements. This section provides a general overview of interfaces and
specific capabilities of each product. A more detailed description of the different products can be found in
the product specific chapters found later in this manual.
The WiMesh End Point 3e-523A provides the following interfaces:
One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a
wired network.
Two 802.11a/b/g antenna ports.
One DB-15 RS-232/422/485 & power connector.
Device Reset button, provides ability to reset device to either user programmed configuration or
factory default.
Device grounding connector.
The 3e-523A provides the following LED indicator lights:
FIPS LED
WLAN LED
The WiMesh PAC-Link 3e-523S portable adaptive com-link provides the following interfaces:
One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a
wired network.
One DB-9 RS-232 serial port for configuration or interfacing to a sensor.
One 802.11a/b/g antenna port.
One external power switch.
The 3e-523S provides the following LED indicator lights:
FIPS LED
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
7
29000169-005 Revision C1
WLAN LED
The WiMesh 3e-523E-900 unit provides the following interfaces:
One RJ-45 10 / 100 Mbps WAN Ethernet cable entry port for remote management and for
interfacing to a wired network.
One 900 MHz N-type female jack antenna connector.
One power entry port.
Device grounding connector.
The WiMesh End Point OEM Module 3e-523M provides the following interface:
One RJ-45 10 / 100 Mbps WAN Ethernet port for remote management and for interfacing to a
wired network.
Two 802.11a/b/g antenna ports.
One 16 pin RS-232/422/485 & Power connector.
One 14 pin connector which brings out LED and Advanced Feature Signals.
1.2 Wireless Basics
Wireless networking uses electromagnetic radio frequency waves to transmit and receive data.
Communication occurs by establishing radio links between the wireless access point and devices
configured to be part of the WLAN.
The 3e-523 incorporates 802.11 Wi-Fi standards, and FIPS 140-2 compliant security for wireless
communication.
802.11a - The IEEE 802.11a standard is an extension to 802.11 that applies to wireless LANs and
provides up to 54 Mbps in the 5 GHz band. Depending on radio design and RF channel issues 802.11a
devices can operation at rates between the 54 Mbps maximum and 6 Mbps. 802.11a uses an Orthogonal
Frequency Division Multiplexing (OFDM) encoding scheme rather than Frequency-Hopping Spread
Spectrum (FHSS) or Direct-Sequence Spread Spectrum (DSSS).
802.11b - The IEEE 802.11b compliant devices provide 11 Mbps transmission (with a fallback to 5.5, 2 and
1 Mbps depending on signal strength) in the 2.4 GHz band. 802.11b devices operate using
Direct-Sequence Spread Spectrum (DSSS) modulation techniques. Note that for the 3e-523E-900 this is
the only mode used, and controls to change this are not available in the configuration software.
802.11g - The IEEE 802.11g standard is an extension to 802.11 that applies to wireless LANs and
provides up to 54 Mbps in the 2.4 GHz band. Depending on radio design and RF channel issues 802.11g
devices can operation at rates between the 54 Mbps maximum and 6 Mbps. Like the 802.11a standard
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
8
29000169-005 Revision C1
802.11g uses an Orthogonal Frequency Division Multiplexing (OFDM) encoding scheme for data
transmission.
Because 802.11g is backwards-compatible with 802.11b, it is a popular component in LAN construction.
802.11g broadens 802.11b’s data rates to 54 Mbps within the 2.4 GHz band providing higher data
transmission rates.
802.11b/g Mixed - 802.11b/g combines 802.11b and 802.11g data rates to offer a broader range of
operation.
1.2.1 Bridging / Mesh Operation
The 3e-523 functions as a bridge. There are a number of bridging configurations supported, including the
following popular configurations:
Point-to-point bridging of 2 Ethernet Links.
Point-to-multipoint bridging (mesh) of several Ethernet links.
Repeater mode (wireless client to wireless bridge).
1.2.2 Access Point Operation
The 3e-523 functions as an access point. In this mode of operation the 3e-523 provides wireless
networking to multiple client devices while providing connectivity into a local area network (LAN).
1.2.3 Client Operation
The 3e-523 can functions as a wireless client. In this mode of operation the 3e-523 acts as a wireless
endpoint providing a communication link into a wireless Local Area Network (LAN) network.
1.2.4 Data Encryption and Security
The 3e-523 includes advanced wireless security features. Bridging encryption can be established between
the 3e-523 using AES-ECB or AES-CCM encryption (approved by the National Institute of Standards and
Technology (NIST) for U.S. Government and DoD agencies). There is also the option of no security, but
some level of security is recommended.
AES - The Advanced Encryption Standard (AES) was selected by National Institute of Standards and
Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit
block cipher algorithm and encryption technique for protecting computerized information. It has the ability
to use even larger 192-bit and 256-bit keys, if desired.
802.11i and WPA2 employ AES CCM, which is a combination of AES Counter (CTR) mode per packet
data encryption, combined with AES Cipher Block Chaining
Message Authentication Code (CBC-MAC) per packet data integrity / authentication of the entire packet
including the MAC header. AES CCMP has been deemed to surpass the RC4 stream cipher, upon which
the older WEP and WPA security protocols are based. 3eTI was the first company to take its AES
algorithm through the NIST CCM algorithm certification process, thereby ensuring that 3eTI’s AES CCMP
is standards-based, non-proprietary, and ready for wide WPA2 interoperability usage.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
9
29000169-005 Revision C1
Operation Authentication - Authentication mechanisms are used to authenticate an operator accessing
the device and to verify that the operator is authorized to assume the requested role and perform services
within that role.
Access to the management screens for the 3e-523 requires knowledge of the assigned operator ID and
Password. The Factory defaults are:
ID: CryptoOfficer
Password: CryptoFIPS
The Crypto Officer initially installs and configures the 3e-523 after which the password should be changed
from the default password. The ID and Password are case sensitive.
1.3 Device Management and Administration
After initial setup, maintenance of the system and programming of security functions should be performed
by personnel trained in the procedure using the embedded web-based management screens.
The next chapter covers the basic procedure for configuration of 3e-523 devices. Table 1 provides a listing
of the page organization of the 3e-523 data points.
1.4 Product Family Navigation Options
The next chapter covers the basic procedure for setting up the hardware. Table 1 provides an overview of
the web GUI screens and menu structure for used to manage and administer 3e-523 devices
Table 1 - 3e523 Data Point Navigation Options
System Configuration
Monitoring/Reports
General
System Status
Operating Mode
Bridging Status
System Deployment
Bridging Site Map
WAN
Wireless Clients
Serial Port
Adjacent AP List
WLAN QoS/WMM
Logs
Wireless AP & Bridge
System Log
Radio
Web Access Log
Bridge Mode
Auditing
Bridge Encryption
Audit Log
Bridge MAC Filtering
Report Query
AP Encryption
Configuration
Wireless VLAN
System Administration
AP MAC Filtering
Email Notification Conf
Rogue AP Detection
Radio Tx Off Control
AP Advanced
System Upgrade
Services Settings
Factory Default
SNMP Agent
Remote Logging
Serial Communication
Reboot
Remote Administration
On Demand Self-Test
Admin User Management
Periodic Self Test
List All Users
Utilities
Add New User
Help
User Login Policy
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
10
29000169-005 Revision C1
2. Device Configuration
2.1 Preliminary Configuration Steps
For the initial configuration, the 3e523 network administrator may need the following information:
IP address a list of IP addresses available on the organization's LAN that are available to be
used for assignment to the 3e523.
Subnet Mask for the LAN.
Default IP address of the 3e523 (192.168.254.254)
Local maintenance port IP address (192.168.15.1)
DNS IP address.
The MAC addresses of wireless card that will be used to access the 3e523 network of Access
Points (if manual bridging mode is used, or if MAC address filtering is to be enabled).
The appropriate encryption key for Static AES or AEC_CCM, if state-of-the art key management
will be used. Alternately, the appropriate WEP key.
Default CW IP address
Initial Setup using the LAN Ethernet Port - Plug one end of an RJ-45 Ethernet cable to the LAN RJ-45
Ethernet port of the 3e523 and the other end to an Ethernet port on your laptop. In order to connect
properly to the 3e523 on the LAN port, the TCP/IP parameters on your laptop must be set to a static IP
address. Go to your network connection settings and modify your LAN connection TCP/IP properties.
Set the IP address and subnet mask. The IP address can be in the range of 192.168.254.xxx, where xxx
can be from 2 to 253 (see Figure 1).
Figure 1 - Internet Protocol Properties
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
11
29000169-005 Revision C1
Now you can open a browser and connect to the 3e523 to begin configuring the unit.
Login - On your computer, pull up a browser window and put the default URL for the3e523 Local LAN in
the address line (Figure 2).
https://192.168.254.254
Figure 2 - Login
A warning window appears stating that it is unable to verify the identity of DMG gateway as a trusted site.
Select "Accept this certificate temporarily for this session" and click Ok (Figure 3).
Figure 3 - Web site certification
Another security window pops open. Click Ok to continue (Figure 4).
Figure 4 - Security window
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
12
29000169-005 Revision C1
A standard security alert window (Figure 5) appears. Click Yes to continue.
Figure 5 - Security alert window
The Device Login window appears (Figure6).
You will be asked for your User Name and Password. The default is "CryptoOfficer" with the password
"CryptoFIPS" to give full access for setup configuration. (This user name and password is case-sensitive.)
Figure6Login
NOTE: If your login session is in-active for more than 10 minutes, then you will have to re-authenticate
your identity. If after three times you fail to re-authenticate then your account will be locked. The exception
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
13
29000169-005 Revision C1
is if you are the last active CryptoOfficer on the system, then your account will not be locked. The Admin
User Management - List All Users screen displays account status. If an account is locked, it will show a
status of "Locked" and a reason of "bad passwd". Other accounts show status as "Active" and reason
"Normal".
The CryptoOfficer is the only role that can unlock an account once it has been locked. Go to the Admin
User Management - List All Users screen and click the unlock button at the end of the user entry.
Data Point Configuration and Operating Modes - To begin configuration of the 3e-523 Data Points you
first must select the mode of operation. 3e-523 devices can operate in one of four different modes. Valid
operating modes are provided in the following list below:
Standalone Access Point operation.
Standalone Bridge operation.
Mixed Access Point and Bridge operation.
Client only operation.
The following subsections how to configure and operate 3e-523 Data Points.
2.2 System Configuration
There are six options under System Configuration:
General
Operating Mode
System Deployment
WAN
Serial Port
WLAN QoS/WMM
Each screen is described in detail in the following subsections.
2.2.1 General
Upon access the 3e-523 web GUI, you will immediately be directed to the System Configuration -
General screen(
Figure 7).
This screen lists the firmware version number for your unit and allows you to set the Host Name and
Domain Name as well as establish system date and time. (Host and Domain Names are both set at the
factory for “default” but can optionally be assigned a unique name for each.) To set the date and time, you
can do it manually or set it based on the NTP server.
NOTE: The CryptoOfficer is the only user who can set the date and time. The system date must be set to a
date after 01/01/2005.
In the Description field you can enter a description of the physical location of the unit. This is useful when
deploying units to remote locations. When you are satisfied with your changes, click Apply.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
14
29000169-005 Revision C1
Figure 7 - System Configuration General
Next go next to the System Configuration - Operating Mode page.
2.2.2 Operating Mode
This screen (Figure 8) allows you to set the operating mode to one of the following:
Wireless Access Point
Wireless Access Point & Bridge
Wireless Bridge
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
15
29000169-005 Revision C1
Wireless Client
You only need to visit this page if you will be changing modes, or if you want to change your sub mode
Note that if you change modes your configuration will be preserved. If you switch between FIPS 140-2 sub
mode and non-FIPS, all previously entered information will be reset to factory settings for the selected
wireless mode.
Figure 8 - System Configuration - Operating Mode
Sub mode
There are two options under Sub mode:
FIPS 140-2 Mode
Use IPv6 Mode
To use the 3e523 in FIPS 140-2 mode, or in IPv6 mode, check the box and click Apply.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
16
29000169-005 Revision C1
2.2.3 System Deployment
The unit is programmed at the factory with the customer's country code. The country code (region) is
read-only. The channel list and transmit power varies from region to region based on each country's
regional regulations (see Figure 9).
Figure 9 - System Configuration - System Deployment
2.2.4 WAN
Click the entry on the left hand navigation panel for System Configuration - WAN. This directs you to the
System Configuration - WAN screen (Figure 10).
If not using DHCP to get an IP address, input the static IP information that the access point requires in
order to be managed from the wired LAN. This will be the IP address, Subnet Mask, Default Gateway, and,
where needed, DNS 1 and 2.
Click Apply to accept changes.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
17
29000169-005 Revision C1
Figure 10 - System Configuration - WAN
NOTE: After changing the network address you will no longer be able to access the above configuration
page with the default IP address. You will have to change the browser URL to reflect the new IP address
and log in again.
NOTE: If DHCP is selected, a new IP address would be given to the 3e523 unit after clicking Apply. To
log into to unit and keep setting it up, the new IP address needs to be obtained from your Network Admin-
istrator. Another way to obtain the new IP address is to set up “Remote Logging” before setting up WAN
using DHCP.
2.2.5 Serial Port
Click the entry on the left hand navigation panel for System Configuration - Serial Port (Figure 11). The
serial settings control the type and format of the serial data to be transmitted and received.
NOTE: You must also configure the settings under Services Settings - Serial Communication (Table 2)
in order for the system to work.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
18
29000169-005 Revision C1
Figure 11 - System Configuration - Serial Port
Table 2. Service Settings
Serial Settings
Interface Type
RS-232
RS-422
RS-485
Select the interface type for the serial I/O port
Duplex
(RS485 only)
Full-Duplex
Half-Duplex
For use with RS-485 interface. In full duplex
mode data is transmitted and received
simultaneously.
In half duplex mode data is transmitted or
received but not at the same time.
Data Rate
(bits per second)
115200
57600
38400
19200
9600
4800
2400
1200
Select the data rate required.
Data bits
8
7
6
5
Select the number of data bits to be transmit-
ted or received.
Parity
None
Odd
Even
Select parity to be used.
Stop bits
1
2
Select number of stop bits to be used.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
19
29000169-005 Revision C1
Serial Settings
Flow control
(RS232 only)
None
Hardware
For use with RS-232 interface. When
hardware flow control is selected, RTS and
CTS are used.
2.2.6 WLAN QoS/WMM
The unit has a Quality of Service (QoS) / Wireless Multi-Media (WMM) capability (Figure 12). The
QoS/WMM feature default is set to disable.
Figure 12 - System Configuration - WLAN QoS
If QoS is enabled, all traffic passing through the unit will be prioritized into four queues (low, normal,
medium, high). The traffic can be prioritized by MAC/IP/TCP/UDP/port, etc. The 802.1d BPDU is honored
the highest priority without further configuration.
If a traffic pattern matches more than one rule in the policies configured, the highest priority among these
rules is used. If a traffic pattern does not match any of the configured policies, then the priority is set to
normal.
There are four policy types to choose from:
Application This is a layer 4 (transportation layer) policy.
IP address This is a layer 3 (network layer) policy.
MAC address This is a layer 2 (link layer) policy.
Ethernet protocol This is a layer 2 (link layer) policy.
Click on the New QoS Policy tab to configure your QoS policies.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
20
29000169-005 Revision C1
Create a policy name
Select your priority level from the drop-down list
Either enable or disable weather your want an 802.11 acknowledgement. For sensitive data packet loss,
(e.g., file transfer), "Enable" is recommended. For less sensitive, non-critical, packet loss (e.g., video),
"Disable" is recommended
Select a policy type from the drop-down list and configure the policy fields
The following screens (Figure 13, Figure 14, Figure 15, Figure 16, and Figure 17) show policy set ups
based on type.
Figure 13 - Application Policy Type
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
21
29000169-005 Revision C1
Figure 14 - Ethernet Protocol Policy Type
Figure 15 - IP Address Policy Type
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
22
29000169-005 Revision C1
Figure 16 - MAC Address Policy Type
To view any existing QoS policies, click on the "Existing QoS Policies" tab.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
23
29000169-005 Revision C1
Figure 17 - Existing QoS Policies
2.3 Wireless AP and Bridge Mode
The following subsections describe the screens used when configuring the access point and bridge.
The following screens are available in Wireless AP & Bridge mode:
Radio
Bridge Mode
Bridge Encryption
Bridge MAC Filtering
AP Encryption
AP MAC Filtering
Rogue AP Detection
AP Advanced
VLAN
All other screens are the same as those described in the Client Mode section.
2.3.1 Radio Configuration for 3e-523A, 3e-523S and 3e-523M
The Wireless AP & Bridge - Radio screen (Figure 18) contains wireless bridging information including the
channel number, Tx rate, Tx power, spanning tree protocol (802.1d) enable/disable, and remote device's
BSSID. This page is important in setting up your access point and bridging configurations. Table 3 below
lists the various radio settings.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
24
29000169-005 Revision C1
Figure 18 - Wireless AP & Bridge Radio
2.3.2 Radio Configuration for 3e-523E-900
The Wireless AP and Bridge - Radio screen (shown in Figure 19, below) for the Model 3e-523E-900
contains wireless bridging information including Tx rate, Tx power mode and level, as well as advanced
configuration options such as Beacon Interval and RTS Threshold. This page is important in setting up
your access point and bridging configurations. Table 3 below lists the various radio settings.
Figure 19 3e-523E-900 AP and Bridge -- Radio
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
25
29000169-005 Revision C1
Table 3 - Radio Settings
Radio Settings
Wireless Mode
(option is not
available on the
3e-523E-900.)
802.11b/g Mixed
802.11a
802.11a Turbo
Sets the wireless mode for the wireless
bridge.
Note: If the device is enabled with 4.9GHz
sub-band, you will have two more
options:
4.9G Federal
4.9G Public Safety
Tx Rate
802.11b/g Mixed
AUTO, 1, 2, 5.5, 11, 6, 9,
12, 18, 24, 36, 48, 54 Mbps
(only some of these are
available for the
3e-523E-900)
When set to AUTO, the card attempts to
select the optimal rate for the channel.
If a fixed rate is used, the card will only
transmit at that rate.
802.11a
AUTO, 6, 9, 12, 18, 24, 36,
48, 54 Mbps
When set to AUTO, the card attempts to
select the optimal rate for the channel.
If a fixed rate is used, the card will only
transmit at that rate.
802.11a Turbo
AUTO
The card attempts to select the optimal
rate for the channel.
Channel Number
(dependent on the
radio country code
configured; option
is not available on
the 3e-523E-900.)
802.11b/g Mixed
1 (2.412 GHz)
2 (2.417 GHz)
3 (2.422 GHz)
4 (2.427 GHz)
5 (2.432 GHz)
6 (2.437 GHz)
7 (2.442 GHz)
8 (2.447 GHz)
9 (2.452 GHz)
10 (2.457 GHz)
11 (2.462 GHz)
Sets the channel frequency for the
wireless bridge.
802.11a
52 (5.26 GHz)
56 (5.28 GHz)
60 (5.30 GHz)
64 (5.32 GHz)
149 (5.745 GHz)
153 (5.765 GHz)
157 (5.785 GHz)
161 (5.805 GHz)
165 (5.825 GHz)
Sets the channel frequency for the
wireless bridge.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
26
29000169-005 Revision C1
Radio Settings
802.11a Turbo
50 (5.25 GHz)
58 (5.29 GHz)
152 (5.76 GHz)
160 (5.80 GHz)
Sets the channel frequency for the
wireless bridge.
Tx Pwr Mode
OFF FIXED, AUTO
The Tx Pwr Mode defaults to AUTO,
giving the largest range of radio
transmission available under ambient
conditions.
The wireless bridge's broadcast range
can be limited by setting the Tx Pwr
Mode to Fixed and choosing from 1-8 for
Fixed Pwr Level.
If you want to prevent any radio
frequency transmission from the wireless
bridge, set the Tx Pwr Mode to OFF. This
will not turn off RF transmissions from
any associated wireless devices, but they
will not be able to communicate with the
wireless bridge when the Tx Pwr Mode is
off.
Fixed Pwr Level
1, 2, 3, 4, 5, 6, 7, 8
(3e-523E-900 transmit
power options which start at
4.)
Select a range when Tx Pwr Mode is set
to FIXED. Level 1 is the shortest
distance, and Level 8 is the longest.
Propagation
Distance
< 5 Miles
5-10 Miles
11-15 Miles
16-20 Miles
21-25 Miles
26-30 Miles
> 30 Miles
(not changeable for the
3e-523E-900.)
Set the distance based on the space
between this bridge and furthest bridge
that is connected to it.
RTS Threshold
Range 1-2346
The number of bytes used for the
RTS/CTS handshake boundary. When a
packet size is greater than the RTS
threshold, the RTS/CTS handshaking is
performed.
Beacon Interval
20-1000
The time interval in milliseconds in which
the 802.11 Beacon is transmitted by the
bridge.
BSSID
Enter hexadecimal numbers
Add the MAC address of the remote
bridge. The remote bridge's MAC
address will appear at the bottom of the
screen.
Note
You can enter a note that defines the
location of the remote bridge.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
27
29000169-005 Revision C1
2.3.3 Bridge Mode
The Wireless Bridge - General screen (Figure 20) contains wireless bridging information. This page is
important in setting up your bridge configuration.
Table 4 lists the various auto bridging setting options. Wireless bridging supports two modes of
operation:
Manual wireless bridging
Auto-forming wireless bridging (AWB) - with a maximum number of allowable bridges (the default
is 32)
Auto-forming Wireless Bridging - When the wireless bridge is in auto-forming mode, the wireless bridge
sniffs for beacons from other wireless bridges and identifies devices that match a policy such as SSID and
channel.
Instead of simply adding the devices with the same SSID/channel to the network, a three-way association
handshake is performed in order to control network access.
To make a unit the root (leaf) STP node, set the bridge priority lower than any other node in the network.
Figure 20 - Wireless Bridge General
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
28
29000169-005 Revision C1
Table 4 - Auto Bridging General Settings Options
Auto Bridging General Settings Options
Bridging Mode
Auto Bridging
auto bridging selected
SSID
numbers or letters
Can be any set of letters and
numbers assigned by the network
administrator. This nomenclature
has to be set on the wireless
bridge and each wireless device
in order for them to communicate.
Max Auto
Bridges
1-32
Maximum number of auto bridges
allowed.
Bridge Priority
1-65535
Determines the root (leaf) STP
node. The lowest bridge priority
in the network will become the
STP root.
RSSI Window
Size
1-100
RF signal fluctuates over time
and the fluctuation varies in
different operating environments.
This parameter serves to smooth
RSSI. The RSSI that applications
use will be an average of last
window-size RSSI samples. The
sampling rate depends on the
beacon interval of the neighbor
mesh node. This helps stabilize
the network. For fixed location
deployment, higher values are
suggested for both window size
and beacon interval. Lower value
is recommended while adjusting
antenna or distributing mobile
mesh devices.
Signal Strength
Threshold
75%
60%
51%
45%
39%
27%
21%
15%
9%
None
On creating a bridge link, if the
signal strength is less than this
threshold, the link will not be
created. After a link is created, it
will not be destroyed even after
the signal goes below this
threshold. This helps to stabilize
the network.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
29
29000169-005 Revision C1
Auto Bridging General Settings Options
Link Sensitivity
75%
60%
51%
45%
39%
27%
21%
15%
9%
None
After a link is created, signal
strength is mapped to RSTP path
cost. Because RF signal
fluctuates, path cost needs to be
adjusted accordingly. However,
adjusting path cost too frequently
will cause network instability. This
field serves as a threshold to
adjust path cost.
Path cost is adjusted if signal
strength increases/decreases by
this value since the last
adjustment. If the value is set to
none, every link acts like 100%
signal and there will be no path
cost adjustment later on. It is
strongly recommended that the
same value is set on all other
nodes in the same network.
Broadcast
SSID
Disable/Enable
When disabled, the AP hides the
SSID in outgoing beacon frames
and stations cannot obtain the
SSID through passive scanning.
Also, when it is disabled, the
bridge doesn’t send probe
responses to probe requests with
unspecified SSIDs.
Signal Strength
MAC
The signal strength of this
wireless bridge will be indicated
on the Signal Strength LED
located on the front of the case.
Remote AP's
MAC Address
Read Only
Displays the BSSID of remote
bridges that were added on the
Wireless Bridge - Radio screen.
Manual Bridging - When the wireless bridge is in manual bridging mode (Figure 21), you can manually
select a signal strength LED MAC and enable or disable spanning tree protocol. You can also delete
remote AP's MAC addresses. Table 5 lists the various manual bridging settings.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
30
29000169-005 Revision C1
Figure 21 - Wireless Bridge - Manual Bridging
Table 5 - Manual Bridging General Settings Options
Manual Bridging General Settings Options
Bridging Mode
Manual Bridging
manual bridging selected
Signal Strength
LED MAC
Not Assigned
Allows you to set the number of the
remote AP which will be listed at the
bottom of the screen once the
system is operational This wireless
bridge becomes the guiding port
that is displayed in the WLAN LED
on the front of the 5233 and
3e-523-F1 as a signal.
Spanning Tree
Protocol (STP)
Enable/Disable
Enable STP if there is any
possibility that a bridging loop could
occur. If you are certain that there is
no possibility that a bridging loop
will occur, then disable STP. The
bridge will be more efficient (faster)
without it. If you are not sure, the
safest solution is to enable STP.
Remote AP's
MAC Address
Read Only
Displays the BSSID of remote
bridges that were added on the
Wireless Bridge - Radio screen.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
31
29000169-005 Revision C1
Monitoring - In the upper right-hand corner of the Wireless Bridge - General screen there is a button
called Monitoring (Figure 22). If you click on this button, a pop-up window will appear (WDS Information). If
you select Enable refresh, you can set the bridge refresh interval from 5 seconds to 30 minutes.
Refreshing the screen allows you to see the effect of aiming the antenna to improve signal strength.
Figure 22 - Wireless Bridge - Monitoring
2.3.4 Bridge Encryption
The Wireless Bridge - Encryption screen (Figure 23) is used to configure static encryption keys for the
wireless bridge. This is an important page to set up to ensure that your bridge is working correctly. The
encryption key that you use on this screen must be the same for any bridge connected to your bridging
network in order for communication to occur. On this screen you can select Static AES (128-bit, 192-bit, or
256-bit) or AES-CCM (128-bit)
Figure 23 - . Wireless Bridge AES-CCM Encryption
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
32
29000169-005 Revision C1
Static AES Key - The Advanced Encryption Standard (AES) was selected by National Institute of
Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES
uses a 128-bit block cipher algorithm and encryption technique for protecting computerized information.
With the ability to use even larger 192-bit and 256-bit keys, if desired, it offers higher security against
brute-force attack than the old 56-bit DES keys (Figure 24).
The Key Generator button automatically generates a randomized key of the appropriate length. This key is
initially shown in plain text so the user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
Figure 24 - Wireless Bridge - Static AES
2.3.5 MAC Address Filtering
The WirelessBridge - MAC Address Filtering screen (Figure 25)is used to set up MAC address filtering
for the 3e523 device. This option is only available in Auto Bridge Mode.
The factory default for MAC Address filtering is Disabled. If you enable MAC Address filtering, you should
also set the toggle for Filter Type.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
33
29000169-005 Revision C1
Figure 25 - Wireless Bridge - MAC Address Filtering
This works as follows:
If Filtering is enabled and Filter Type is Deny All Except Those Listed Below, only those
devices equipped with the authorized MAC addresses will be able to communicate with the
3e523. In this case, input the MAC addresses of all the remote bridging units that will be
authorized to access this 3e523. The MAC address is engraved or written on the PC (PCMCIA)
Card.
If Filtering is enabled and Filter Type is Allow All Except Those Listed Below, those devices
with a MAC address which has been entered in the MAC Address listing will NOT be able to
communicate with the 3e523. In this case, navigate to the report: Wireless Clients and copy the
MAC address of any Wireless Client that you want to exclude from communication with the
3e523 and input those MAC Addresses to the MAC Address list.
2.3.6 AP Encryption
The Access Point - Encryption screen displays a default factory setting of no encryption, but for security
reasons it will not communicate to any clients unless the encryption is set by the CryptoOfficer. There are
different encryption options for the AP in FIPS Mode and in non-FIPS Mode. Table 6 below shows the
differences.
Table 6 - Encryption Options
Encryption Options
In FIPS 140-2 Mode
In non-FIPS AP Mode
FIPS Static AES
Static WEP
FIPS 802.11i
802.11i
In the following explanations, the FIPS Mode security options are discussed first.
Static AES Key - The Advanced Encryption Standard (AES) was selected by National Institute of
Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES
uses a 128-bit block cipher algorithm and encryption technique for protecting computerized information.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
34
29000169-005 Revision C1
With the ability to use even larger 192-bit and 256-bit keys, if desired, it offers higher security against
brute-force attack than the old 56-bit DES keys. See Figure 26.
The Key Generator button automatically generates a randomized key of the appropriate length. This key is
initially shown in plain text so the user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
Figure 26 - Static AES
802.11i - If you wish to use 802.11i on the 3e523, enable either Pre-shared Key Settings or 802.1x
Settings (Figure 27)
If you are a SOHO user, selecting pre-shared key means that you don’t have the expense of installing a
Radius Server. Simply input up to 63 character / numeric / hexadecimals in the Passphrase field.
Enable pre-authentication to allow a client to authenticate in advance with the AP before the client is
associated with it. Allowing the AP to pre-authenticate a client decreases the transition time when a client
roams between APs.
As an alternative, for business applications who have installed Radius Servers, select 802.1x and input the
Primary Radius Server and RFC Backend security settings. Use of Radius Server for key management
and authentication requires that you have installed a separate certification system and each client must
have been issued an authentication certificate.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
35
29000169-005 Revision C1
Re-keying time is the frequency in which new encryption keys are generated and distributed to the client.
The more frequent re-keying, the better the security. For highest security, select the lowest re-keying
interval.
Once you have selected the options you will use, click Apply.
Figure 27 FIPS 802.11i
2.3.7 Wireless VLAN
Logical Internal Interfaces - In order to use the VLAN features of the 3e-523 series products correctly
and flexibly, it’s recommended that user understand the logical internals. The following provides an
overview of VLAN operation on the 3e-523 devices
Figure 28 below shows the logical internal interfaces of the “Packet Bridging Core” which bridges packets
between the logical and physical interfaces (WAN, AP, Bridge, and Management VLAN) of the 3e-523.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
36
29000169-005 Revision C1
Figure 28 - Packet Bridging Logical Internals
Note: The 3e-523 contains one radio and one Ethernet port. The radio operates in client mode, AP mode,
Bridge mode, or AP & Bridge modes. Note that client mode does not offer VLAN capability and VLAN
operation cannot be configured when operating in Client mode.
AP Virtual Interface - The AP virtual interface is available in AP mode or AP & Bridge simultaneous
mode. It can be configured to provide a maximum of 8 VLAN mappings. Each VLAN is mapped to one
SSID. Packets in the air between AP radio and wireless clients contain no VLAN tag.
Packets from a wireless client associated with a given SSID are VLAN tagged by the AP radio, according
to the configuration mapping between SSID and VLAN. The tagging happens before packets enter the
“Packet Bridging Core.”
VLAN tags, in packets received from the WAN interface and to be transmitted to wireless clients
associated with the AP radio, are removed before the packets are transmitted to the clients.
Bridge Virtual Interface - The bridge virtual interface is available in Bridge or AP & Bridge mode. The
bridge virtual interface always acts as VLAN trunk. Packets in and out from bridge radio are sent
unmodified. So there’s no VLAN related configuration for the bridge virtual interface.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
37
29000169-005 Revision C1
WAN Virtual Interface - Since the 3e-523 has one Ethernet port, both the WAN and LAN logical interfaces
map to the Ethernet physical interface. IP/ARP packets with a fixed target IP address of 192.168.15.1 are
always redirected to LAN virtual interface. All other packets go to WAN virtual interface.
The WAN virtual interface always acts as VLAN trunk. Packets in and out from bridge radio are sent
unmodified. So there’s no VLAN related configuration for WAN virtual interface.
Web Management - Web management traffic from non-local port is on management VLAN. Packets
originated from web management server are tagged with management VLAN before they reach “Packet
Bridging Core”. Only packets with management VLAN tag can be forwarded by “Packet Bridging Core” to
web management server and the VLAN tags are removed before they reach web management server.
Figure 29 - VLAN Configuration GUI Overview
Figure 29 above shows the web GUI configuration for 2 out of 4 interfaces listed in 1 “Logical Internal.” The
“bridge virtual interface” and “WAN virtual interfaces” always work in VLAN trunk mode, therefore, there’s
no VLAN related configuration for these two interfaces.
The bottom half part shows the SSID to VLAN mappings as well as the security policies assigned to each
VLAN.
VLAN Configuration Detail - To enable the VLAN feature, click Wireless VLAN link on left menu (Figure
30, and Figure 31 below).
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
38
29000169-005 Revision C1
Figure 30 - Left Menu
Figure 31 - VLAN Enable Page
To create a SSID to VLAN mapping on an AP virtual interface, click Create VLAN tab on the Wireless
VLAN page after enabling the Wireless VLAN option (Figure 32 and Figure 33).
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
39
29000169-005 Revision C1
Figure 32 - Create Wireless VLAN Tab
Figure 33 - Create Wireless VLAN Page
To edit an existing VLAN, select the target VLAN and then click the Edit button (Figure 34 and Figure 35)
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
40
29000169-005 Revision C1
Figure 34 - Edit VLAN step 1
Figure 35 - Edit VLAN step 2
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
41
29000169-005 Revision C1
NOTES & TIPS
1. Most (not all) switch vendors treat VLAN 1 as an untagged VLAN. 3eTI devices make the VLAN 1
tag rule a user option. By default, 3eTI treats VLAN 1 as an untagged VLAN. It is recommended
that users keep the same default setting for all devices in the same physical network.
2. “Treat VLAN 1 Untagged” setting is a device-wide option. The rule applies to all interfaces that are
configured to be on VLAN 1. For example, if this option is enabled, management traffic from this
device Also, wireless client traffic on VLAN 1 won’t have tag.
3. It’s always recommended to manage the device through the LAN virtual interface (192.168.15.1)
when local access is available for the device. The LAN virtual interface is helpful especially when:
o A device IP address is unknown.
o The device has not obtained an IP address from a DHCP server.
o The Management VLAN is tagged.
2.3.8 AP MAC Filtering
The Wireless Access Point - MAC Filtering screen (
Figure 36) is used to set up MAC address filtering for 3e523 devices. The factory default for MAC
Address filtering is Disabled. If you enable MAC Address filtering, you should also set the toggle for Filter
Type.
Figure 36 - Wireless Access Point - MAC Filtering
MAC Filtering works as follows:
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
42
29000169-005 Revision C1
If Filtering is enabled and Filter Type is Deny All Except Those Listed Below, only those
devices equipped with the authorized MAC addresses will be able to communicate with the access
point. In this case, input the MAC addresses of all the PC cards that will be authorized to access
this access point.
If Filtering is enabled and Filter Type is Allow All Except Those Listed Below, those devices
with a MAC address which has been entered in the MAC Address listing will NOT be able to
communicate with the access point. In this case, navigate to the report: Wireless Clients and
copy the MAC address of any Wireless Client that you want to exclude from communication with
the access point and input those MAC Addresses to the MAC Address list.
2.3.9 Rogue AP Detection
The Wireless Access Point - Rogue AP Detection screen (Figuer 37) allows the network administrator
to set up rogue AP detection. Enable rogue AP detection and enter the MAC Address of each AP in the
network that you want the AP being configured to accept as a trusted AP. (You may add up to 20 APs.)
Enter an email address for notification of any rogue or non-trusted APs. (The MAC Address for the 3e523
is located on the System Configuration - General screen. You can also select the following filter options.
SSID Filter: Check the SSID option to only send rogue APs that match the AP's SSID or wireless
bridge's SSID.
Channel Filter: Check the channel filter option to only send rogue APs that match the AP's
channel or the wireless bridge's channel.
If both options are checked, only APs that match both the SSID and channel are sent.
The Adjacent AP list, under Monitoring/Reports on the navigation menu, will detail any marauding APs.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
43
29000169-005 Revision C1
Figure 37 - Wireless Access Point - Rogue AP Detection
2.3.10 AP Advanced
The Wireless Access Point - Advanced screen (Fifure 38) allows you to enable or disable load balancing
and to control Publicly Secure Packet Forwarding, which provides client isolation at the Layer 2 level.
Load balancing is enabled by default. The load balancing feature balances the wireless clients between
APs. If two APs with similar settings are in a conference room, depending on the location of the APs, all
wireless clients could potentially associate with the same AP, leaving the other AP unused. Load
balancing attempts to evenly distribute the wireless clients on both APs.
Publicly Secure Packet Forwarding is disabled by default. Enabling this feature prevents wireless clients
that associate with the same AP from communicating with each other.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
44
29000169-005 Revision C1
Figure 38 - Wireless Access Point - Advanced
Once you have made any changes, click Apply to save.
2.4 Service Settings
There are two options under Service Settings:
SNMP Agent
Serial Communication
Each screen is described in detail in the following subsections.
2.4.1 SNMP Agent
The Service Settings - SNMP Agent screen (Figure 39) allows you to set up an SNMP Agent. The agent
is a software module that collects and stores management information for use in a network management
system. 3e–523 devices have an integrated SNMP agent software module that translates the device’s
management information into a common form for interpretation by the SNMP Manager, which usually
resides on a network administrator’s computer.
Information is transported via SNMPv1 (Simple Network Management Protocol) or SNMPv2c, along with
the associated Management Information Base (MIB), though trap-directed notifications.
The idea behind trap-directed notification is as follows: if a manager is responsible for a large number of
devices, and each device has a large number of objects, it is impractical for him to poll or request
information from every object on every device. The solution is for each agent on the managed device to
notify the manager without solicitation. It does this by sending a message known as a trap when an
appropriate event occurs.
After receiving the event, the manager displays it and may choose to take an action based on the event.
For instance, the manager can poll the agent directly, or poll other associated device agents to get a better
understanding of the event.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
45
29000169-005 Revision C1
Trap-directed notification can result in substantial savings of network and agent resources by eliminating
the need for frivolous SNMP requests. However, it is not possible to totally eliminate SNMP polling. SNMP
requests are required for discovery and topology changes. In addition, a managed device agent can not
send a trap, if the device has had a catastrophic outage.
SNMPv1 traps are defined in RFC 1157, with the following fields:
Enterprise Identifies the type of managed object generating the trap.
Agent address Provides the address of the managed object generating the trap.
Generic trap type Indicates one of a number of generic trap types.
Specific trap code Indicates one of a number of specific trap codes.
Time stamp Provides the amount of time that has elapsed between the last network
reinitialization and generation of the trap.
Variable bindings The data field of trap containing PDU. Each variable binding associates a
particular MIB object instance with its current value.
Standard generic traps are: coldStart, warmStart, linkDown, linkUp, authenticationFailure,
egpNeighborLoss.
In the current release, 3eTI has implemented warmStart, link-Down, linkUp, and authenticationFailure 5
generic traps and transports those traps using SNMPx2, V2c Trap PDU format.
For generic SNMPv1 traps, 3eTI also redefined some generic traps (see the 3eti-trap-mibs document) by
adding some bound variables.
For example, when a trap is received for a warmStart, the receiving system will be able to see one variable
associated with this trap. The received variableName field will shows the 3eTI enterprise oid. The
varibleValue field will indicate a warmStart reason.
Additionally, a device does not send a trap to a network management system unless it is configured to do
so.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
46
29000169-005 Revision C1
Figure 39 - Service Settings - SNMP Agent
The SNMP configuration consists of several fields, which are explained below:
Community The Community field for Get (Read Only), Set (Read & Write), and Trap is
simply the SNMP terminology for “password” for those functions.
Source The IP address or name where the information is obtained.
Access Control Defines the level of management interaction permitted.
If using SNMPv3, enter a username (minimum of eight characters), authentication type with key and data
encryption type with a key. If operating in FIPS mode, only SHA and AES are supported. This configuration
information will also need to be entered in your MIB manager setup.
2.4.2 Serial Communication
The Serial Communication Settings section (Figure 40) displays the current serial port mode of
operation. One of two serial port profiles can be selected.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
47
29000169-005 Revision C1
Raw Socket - This allows serial devices connected to two 3e523 devices to communicate across the
network. It is bidirectional, multiple uni-casting and peer-to-peer communications.
Figure 40 - Service Settings - Serial Communication
TCP Socket - It is direct IP Mode using TCP. When using TCP sockets your serial server can be
configured as a TCP server or TCP client (Figure 41).
If the 3e523 device is configured as a TCP server, other network devices can initiate a TCP connection
with the serial device connected to the serial port. Network devices initiating connections must be
configured with the IP address of the device and the TCP port number associated with its serial port.
If the 3e523 device is configured as a TCP client it will automatically establish a bi-directional TCP
connection between the serial device and a server or other networked device.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
48
29000169-005 Revision C1
Figure 41 - Service Settings - TCP Socket
2.4.3 Remote Administration
The Service Settings Remote Administration screen (Figure 42) allows you to set up access control
policies for remote administration via HTTPs, SNMP and ICMP protocols. In the factory default
configuration, Remote Administration Access Control option is disabled and hence remote administration
is allowed for any source IP address and MAC address.
When the Remote Administration Access Control option is enabled, the device validates the source IP
and/or MAC addresses of administrative queries and control requests to insure that the message request
is from an approved node. This enables secure remote administration from selected IP and/or MAC
addresses.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
49
29000169-005 Revision C1
Figure 42 - Service Settings Remote Administration Access Control
2.5 Admin User Management
There are three options under Admin User Management:
List All Users
o Edit User
Add New Users
User Login Policy Each screen is described in detail in the following subsections.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
50
29000169-005 Revision C1
2.5.1 List All Users
The Admin User Management - List All Users screen (Figure 43) lists the Crypto Officer and
administrator accounts configured for the unit. You can edit or delete users from this screen.
Figure 43 - Admin User Management - List All Users
If you click on Edit, the Admin User Management - Edit User screen (Figure 44) appears. On this screen
you can edit the user ID, password, role, and note fields.
Figure 44 - Admin User Management - Edit User
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
51
29000169-005 Revision C1
2.5.2 Add New User
The Admin User Management - Add New User screen (Figure 45) allows you to add new Administrators
and CryptoOfficers, assigning and confirming the password.
Figure 45 - Admin User Management - Add New User
The screen as shown in Figure 46 below, will appear in FIPS 140-2 mode. The Password complexity
check and the Minimal Password length are established on the Admin User Management - User
Login Policy screen.
2.5.3 User Login Policy
The Admin User Management - User Login Policy screen (Figure 46) allows you to enable a Password
Complexity Check. The "User Login Policy" applies to both admin users and end-users. If an admin
account or an end-user account is locked for whatever reason, only a CryptoOfficer role user can unlock
the account from the LAN port.
The definition of a complex password is a password that contains characters from all of the following 4
groups and at least 2 of each group: uppercase letters, lowercase letters, numerals, and symbols found on
the keyboard. The minimum password length is eight (8) characters and the maximum length is 30.
The maximum password age is configurable from 30 to 90 days. The default is 90 days. If you do not
change your password after the maximum password age expires, you will not have access to the unit.
However, you have until 150 days of the password age to change the password. You will be prompted to
change your password from 90-150 days. After 150 days, the account will be locked and the CryptoOfficer
will have to unlock it for you. The only exception to this rule is if you are the last active CryptoOfficer user.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
52
29000169-005 Revision C1
You can also set the password uniqueness depth. This means a former password cannot be reused.
The depth is configurable from 3 to 10. For example, if the password uniqueness depth is set to 3, then
the last 3 passwords cannot be reused when changing your password.
The maximum bad password attempts can be set from 3 to 10 attempts. A user account will be locked after
the number of attempts has been exceeded.
The login session timeout range is from 3 to 60 minutes. If the admin user session is inactive for more
than the timeout amount then the session automatically terminates.
The default for the account lockout email notification is set to disable. If enabled, the system will send an
email to the email address listed to inform that person that a user has been locked out of the system. To
configure the email notification go to the System Administration - Email Notification Configuration
screen.
Click Apply to save your selection.
Note: When password rule is set to be stricter, all users will be required to change their passwords. This is
true for users whose passwords already meet the new password rules. The reason for this is that all
passwords are saved in a one-way hash format. The unit does not know the plaintext format of any
passwords.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
53
29000169-005 Revision C1
Figure 46 - Admin User Management - User Login Policy
2.6 Monitoring/Reports
This section gives you a variety of lists and status reports. Most of these are self-explanatory.
There are up to five options under Monitoring/Reports, depending on the operating mode:
System Status
Bridging Status
Bridging Site Map
Wireless Clients
Adjacent AP List
Each screen is described in detail in the following subsections.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
54
29000169-005 Revision C1
2.6.1 System Status
The Monitoring/Report - System Status screen (Figure 47) displays the status of the 3e523 device, the
network interface, and the routing table.
Figure 47 - Monitoring/Report System Status
There are some pop-up informational menus that give detailed information about CPU, PCI, Interrupts,
Process, and Interfaces.
2.6.2 Bridging Status
The Monitoring/Report - Bridging Status screen (Figure 48) displays the Ethernet Port STP status,
Wireless Port STP status, and Wireless Bridging information.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
55
29000169-005 Revision C1
Figure 48 - Monitoring/Report Bridging Status
2.6.3 Bridge Site Map
The Bridge Site Map (Figure 49) shows the spanning tree network topology of both wired and wireless
nodes connected to the network. The root STP node is always on top and the nodes of the hierarchy are
displayed below it. Wired links are double dotted lines and wireless links are single dotted lines. This map
does not update dynamically. You must press the Update button to refresh the map.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
56
29000169-005 Revision C1
Figure 49 - Monitoring/Report Bridge Site Map
2.6.4 Wireless Clients
The Monitoring/Report - Wireless Clients screen (Figure 50) displays the MAC Address of all wireless
clients and their signal strength and transmit rate. The screen shown here emulates the FIPS 140-2 setup
and contains a column for EMCON response. This column is not displayed if the AP is in non-FIPS mode.
The EMCON feature only works with 3e-010F Crypto Client in FIPs mode.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
57
29000169-005 Revision C1
Figure 50 - Monitoring/Report Wireless Clients
2.6.5 Adjacent AP List
The Monitoring/Report - Adjacent AP List screen (Figure 51) shows all the APs on the network. If you
select the checkbox next to any AP shown, the AP will thereafter be accepted by the unit as a trusted AP.
These APs are detected by the AP's wireless card and the wireless bridge's wireless card. The list of APs
are only within the band that can be seen from a particular channel. For example, if the AP is on channel 1,
it will display APs on channels 1-3.
Figure 51 - Monitoring/Report Adjacent AP List
2.7 Logs
There are two logs available for viewing and exporting.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
58
29000169-005 Revision C1
2.7.1 System Log
The Logs - System Log screen (Figure 52) displays system facility messages with date and time stamp.
These are messages documenting functions performed internal to the system, based on the system’s
functionality. Generally, the Administrator would only use this information if trained as or working with a
field engineer or as information provided to technical support.
The System log continues to accumulate listings. If you wish you can export the log and save it as a file on
your PC. Click on Export.
Figure 52 - Logs System Log
2.7.2 Web Access Log
The Web Access Log (Figure 53) displays system facility messages with date and time stamp for any
actions involving web access. For example, this log records when you set encryption mode, change
operating mode, etc., using the web browser. It establishes a running record regarding what actions were
performed and by whom.
The Web access log will continue to accumulate listings. You can set an alert point. You will be notified by
email when the alerts reach a certain threshold. If you wish you can export the log and save it as a file on
your PC. Click on Export.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
59
29000169-005 Revision C1
Figure 53 - Web Access Log
2.8 Auditing
The unit collects audit data and provides an interface for authorized administrators to review generated
audit records. It generates records for two separate classes of events: authentication/access to the
system, and actions taken directly on the system. All audit records include the date/ time of the event, the
identity associated with the event (such as the service, computer or user), the success/failure of the event
and a definition of the event (by code or explanation).
Every start and stop of the audit service is noted in the audit record. For audit events resulting from actions
of identified users, the unit associates each auditable event with the identity of the user that caused the
event. The unit includes or excludes auditable events from the set of audited events based on object
identity, user identity, subject identity, host identity, and event type.
The Auditing screens contain auditing functions for the system. The screens and functions are detailed in
the following subsections.
2.8.1 Audit Log
The AuditingAudit Log screen (Figure 54) provides a listing of all the audit records.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
60
29000169-005 Revision C1
Figure 54 - Auditing Audit Log
2.8.2 Report Query
The AuditingReport Query screen (Figure 55) allows you to query on report based on start time, end
time, MAC address, or unique record IDs.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
61
29000169-005 Revision C1
Figure 55 - Auditing Report Query
2.8.3 Configuration
The AuditingConfiguration screen is used to configure the auditing settings. You can enable and
disable the auditing function on this screen. You can select which audit event types you wish to log.Figure
56 below shows the screen and Table 7 lists event types and descriptions.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
62
29000169-005 Revision C1
Figure 56 - Auditing Configuration
Table 7 - Auditing Configuration Event Type and Description
Event Type
Description
Audit Log Configuration Modified
Any modification to the audit log
configuration (enable/disable,
recorded event types, etc) will trigger
the creation of an audit record.
Key Transfer Error
Any error detected during the
dynamic key exchange, either to the
station or the authentication server.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
63
29000169-005 Revision C1
Key Zeroized
The keys are zeroized including:
1. Transitioning from static key to
DKE (and vice versa)
2. Transitioning to bypass mode
Individual log messages appear from
the application and driver since keys
are held in both locations.
STA Failed Authentication
A station's authentication request is
dropped because it doesn't match the
MAC address filter.
STA Associated
A station successfully associates to
the AP.
Encryption Algorithm Changed
The encryption algorithm is changed,
including bypass mode.
Failed FIPS Policy
All HMAC/AES decrypt errors that
can be detected.
MAC Filter Changed
The MAC address filter is changed
including adding/deleting,
enable/disable, and changing filter
type.
Time Changed
Whenever the time is changed via the
GUI or at bootup if the time is within
two minutes of 11/30/1999, 0hr, 0min.
Self Test Activated
The self-test function is run.
2.9 System Administration
There are six options under System Administration:
Email Notification Configuration
System Upgrade
Firmware Upgrade
Local Configuration Upgrade
Remote Configuration Upgrade
Factory Default
Remote Logging
Reboot
Utilities
Each screen is described in detail in the following subsections.
2.9.1 E-mail Notification Configuration
All system notification emails need to be set up using the System Administration - Email Notification
Configuration screen (Figure 57). Your email server must support SMTP protocol. If you email server
does not require authentication to send email then leave the username/password fields blank. If your email
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
64
29000169-005 Revision C1
server does not support SSL (Secure Socket Layer) then disable SSL on the 3e523. You may also test
your email setup using the test feature on this screen.
NOTE: Check your connection to the mail server. Emails sent from the 3e523 may be queued for a short
period if the connection fails temporarily, but it will give up if the connection continues to fail.
Figure 57 - System Administration Email Notification Configuration
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
65
29000169-005 Revision C1
2.9.2 Radio Tx Off Control
Figure 58 - System Administration Radio Tx Off Control
2.9.3 System Upgrade
The System Administration - System Upgrade screen (Figure 59) gives you the ability to upload updates
to the 3e–523 device’s firmware as they become available. When a new upgrade file becomes available,
you can do a firmware upgrade from the Firmware Upgrade window.
There is also a configuration file transfer option which allows the system configuration file from one AP to
be transferred to another AP, in order to minimize the administration of the APs. Only configuration
parameters that can be shared between APs are downloaded in the configuration file. WAN IP address
and hostname are not transferred in the configuration file.
Only the Crypto Officer role can access this function.
Firmware Upgrade - On the System Administration - System Upgrade screen (Figure 59), the
Firmware Upgrade tab is the default view.
Click browse and select the firmware file to be uploaded. Click on the Upload Firmware button.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
66
29000169-005 Revision C1
Figure 59 - System Administration Firmware Upgrade
Local Configuration Upgrade - On the System Administration - System Upgrade screen (
Figure 60Figure 60), click on the Local Configuration Upgrade tab to upload and download configuration
files to other 3e523 devices connected to the network.
To upload a configuration file, select the file using the browse button and enter the passphrase for that file.
The passphrase protects the file from unauthorized users. It prevents unauthorized users from applying
the system configuration file to an unauthorized device to gain access to the network. Before downloading
the system configuration file to a local computer, the user must enter a passphrase to protect the file.
Before the system configuration file can be uploaded onto another 3e523 device, the passphrase must be
entered on the remote 3e523 device.
Notes:
1. When downloading configuration files, keys are NOT downloaded.
2. When uploading configuration file to a device, if the device currently is configured to the same
security options as those in the uploaded file, the keys are reused. Otherwise, the keys are
zeroized and marked key not setfrom web GUI.
e.g. Current device has 802.11i-PMK option on AP security. The configured to be uploaded will
use 802.11i-PMK for AP security. Existing 256bit PMK is reused. Otherwise, AP security is
marked “key not set”.
3. In VLAN scenario, VLAN ID (NOT the SSID) is the index to find matching security option.
E.g. Current device has 3 VLAN configured as follows.
a. VLAN ID = 1, SSID=area-1, security=802.11i pmk
b. VLAN ID = 2, SSID=area-2, security=802.11i-dot1x
c. VLAN ID = 3, SSID=area-3, security=static AES
The configuration file to be uploaded has 4 VLAN configured as follows.
a. VLAN ID = 1, SSID=test-1, security=802.11i pmk
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
67
29000169-005 Revision C1
b. VLAN ID = 2, SSID=area-1, security=802.11i-dot1x
c. VLAN ID = 3, SSID=area-2, security=802.11i pmk
d. VLAN ID = 4, SSID=area-3, security=static AES
The device will have 4 VLANs configured as follows
a. VLAN ID = 1, SSID=test-1, security=802.11i pmk (key set)
b. VLAN ID = 2, SSID=area-1, security=802.11i-dot1x (key set)
c. VLAN ID = 3, SSID=area-2, security=802.11i pmk (key not set)
d. VLAN ID = 4, SSID=area-3, security=static AES (key not set)
Figure 60 -System Administration Local Configuration Upgrade
2.9.4 Factory Default
The System Administration - Factory Default screen (Figure 61) is used to reset the 3e523 to its
factory settings.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
68
29000169-005 Revision C1
The "Restore" button is a fallback troubleshooting function that should only be used to reset to original
settings. Only the Crypto Officer role has access to the Restore button.
Figure 61 - System Administration - Factory Default
2.9.5 Remote Logging
The System Administration Remote Logging screen (Figure 62) allows you to forward the syslog data
from each machine to a central remote logging server. In the 3e523, this function uses the syslogd
daemon. If you enable Remote Logging, input a System Log Server IP Address and System Log Server
Port. Click Apply to accept these values.
Figure 62 - System Administration - Remote Logging
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
69
29000169-005 Revision C1
2.9.6 Reboot
The System Administration - Reboot screen (Figure 63) allows you to reboot the 3e523 without
changing any preset functionality. Both Crypto Officer and Administrator functions have access to this
function.
Figure 63 - System Administration - Reboot
2.9.7 On Demand Self-test
Self-tests are run to verify the correctness of cryptographic related functions. Two cryptographic libraries
support these tests:
OpenSSL crypto library free software from the OpenSSL project. This library is used by user space
applications.
Kernel crypto library This library is used by kernel space applications. It can be supported by hardware (if
available) or software. All 3e525A-3 platforms will support the hardware kernel library.
The following tests are available using the OpenSSL library:
Advanced Encryption Standard (ECB mode)
Triple DES
Secure Hash Algorithm 1
Random Number Generator
Hashed Message Authentication Code
RSA Algorithm
Firmware Integrity Check
Bootloader Integrity Check
The following tests are available using the kernel libraries:
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
70
29000169-005 Revision C1
Advanced Encryption Standard (ECB mode)
Advanced Encryption Standard (CCM mode)
Secure Hash Algorithm 1
Hashed Message Authentication Code
Key Error Detection checks for corruption of keys stored in flash
The following tests do not rely on crypto libraries:
Key Error Detection checks for corruption of keys stored in flash
Test results are written to the system log. Test failures are also written to the console. The platform should
not pass secure data while self tests are executing so network interfaces are disabled during self tests.
The platform is halted if any self test fails.
These tests are run during power up, on demand or periodically. All of the above tests are executed
automatically when the platform is powered up. Links to initiate on-demand or periodic selftests are
available on the platform’s web page under “System Administration” if the user is logged in as a crypto
officer.
On-demand Self-test - Selecting the “On Demand Self-test” link (Figure 64) and clicking on “Start Test”
executes each self-test except the firmware and bootloader integrity checks. A web page will be displayed
indicating if the tests passed or failed.
Figure 64 - System Administration On Demand Self-test
2.9.8 Periodic Self-test
Selecting the “Periodic Self-test” link (Figure 65 allows the user to enable/disable periodic tests. A test
iteration executes each selftest except the firmware and bootloader integrity checks. The “Periodic Test
Interval” is the time between test iterations.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
71
29000169-005 Revision C1
Figure 65 - System Administration Periodic Self-test
2.9.9 Utilities
The System Administration - Utilities screen (Figure 66) gives you ready access to two useful utilities:
Ping and Traceroute. Simply enter the IP Address or hostname you wish to ping or traceroute and click
either the Ping or Traceroute button, as appropriate.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
72
29000169-005 Revision C1
Figure 66 - System Administration - Utilities
2.9.10 Help
The System Administration - Help screen (Figure 67) displays detailed hardware and software version
information.
Figure 67 - System Administration - Help
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
73
29000169-005 Revision C1
Figure 68 - System Administration Help ResultsA
2.10 Operational Configurations
Setting Up Bridging Type Point-to-Point Bridge Configuration
A point-to-point link (Figure 69) is a direct connection between two, and only two, locations or nodes.
Figure 69 - Point-to-Point Link
For the two bridges that are to be linked to communicate properly, they must be set up with compatible
commands in the setup screens.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
74
29000169-005 Revision C1
For instance, the bridges must have the same channel number. Because there is a separate
WLAN card for bridging, there can be a separate WLAN on the AP WLAN card with no loss
efficiency, as long as you set the channel numbers so there's no conflict or noise with the channel
assigned to the bridge. Spanning Tree Protocol may be set to Enable, if there is any possibility of a
bridging loop, or to Disable (which is more efficient) if there's no possibility of a bridging loop. Each
bridge must contain the other's BSSID. (The BSSID of each is equivalent to the MAC address
contained on the Wireless AP & Bridge Radio setup page. Enter only hexadecimal numbers,
no colons. Data entry is not case sensitive.) Finally, the wireless bridging encryption must be set to
the appropriate type and key length and must be identical on each bridge.
Table 8 and Table 9 below lists sample settings for manual bridging and auto bridging modes.
Table 8 - Point-to-Point Bridging Setup Guide Manual Mode
Direction
Bridge 1
Bridge 2
Wireless Bridge Bridging Mode (Manual Bridging Mode)
Bridging Mode
Manual bridging selected
Manual bridging selected
Signal Strength LED MAC
Not Assigned (select from
drop-down list)
Not Assigned (select from
drop-down list)
Spanning Tree Protocol
(STP)
Enable (or Disable if no
bridging
loop possible)
Enable (or Disable if no
bridging
loop possible)
Wireless Bridge Radio
Wireless Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Must be the same as
Bridge 2
Must be the same as
Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
Beacon Interval
1000
1000
BSSID
Add Bridge 2 MAC
Add Bridge 1 MAC
Wireless Bridge Encryption
Bridging encryption
options
Select appropriate key
type/length and value.
Must be the
same key as Bridge 2.
Select appropriate key
type/length and value.
Must be the
same key as Bridge 1.
Table 9 - Point-to-Point Bridging Setup Guide Auto Mode
Direction
Bridge 1
Bridge 2
Wireless Bridge Bridging Mode (Auto Bridging Mode)
Bridging Mode
Auto bridging selected
Auto bridging selected
SSID
Must be the same as
Bridge 2
Must be the same as
Bridge 1
Max Auto Bridges
32 (range 1-32)
32 (range 1-32)
Bridge Priority
32768 (range 1-65535)
32768 (range 1-65535)
RSSI Window Size
5
5
Signal Strength Threshold
9%
9%
Link Sensitivity
15%
15%
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
75
29000169-005 Revision C1
Broadcast SSID
Disable
Disable
Signal Strength MAC
Enter from list at the
bottom of the screen
Enter from list at the
bottom of the screen
Wireless Bridge Radio
Wireless Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No
Must be the same as
Bridge 2
Must be the same as
Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
Beacon Interval
1000
1000
Wireless Bridge Encryption
Bridging encryption
options
Select appropriate key
type/length and value.
Must be same as Bridge 2.
Select appropriate key
type/length and value.
Must be same as Bridge 1.
The following sequence walks you through the setup of bridge 1. Bridge 2 would duplicate this procedure,
with the BSSID of bridge 2 being the MAC address of bridge 1 and vice versa.
Navigate to the Wireless Bridge Radio screen (Figure 70).
In the first section you will see the MAC Address of the bridging card. This is used as the BSSID on other
3e5233s that will be communicating with this one.
Select the Wireless Mode to be used for bridging. Set the Tx Rate to a fixed transmit rate or select AUTO
if you want the card to attempt to select the optimal rate for the channel If the Tx rate is set to a fixed rate,
then the card will only transmit at that rate.
Next select the Channel Number. The Channel Number must be set to the same frequency in order for
each bridge to communicate. TX Pwr Mode can be left on Auto unless the power needs to be regulated.
Select the Propagation Distance which is based on the distance between a bridge and the furthest bridge
that is connected to it.
Set the RTS Threshold which is the number of bytes used for the RTS/CTS handshake boundary. When
a packet size is greater than the RTS threshold, the RTS/CTS handshaking is performed.
Click Apply to accept your changes but stay on this screen.
Add the BSSID of the remote bridge. The BSSID corresponds to that bridge’s MAC address. In entering
the BSSID, enter only hexadecimal numbers, no colons. Data entry is not case sensitive. You may also
enter a note that defines the location of the remote bridge. Then click Add to accept. The remote bridge’s
BSSID will now appear at the bottom of the Wireless Bridge - Bridging Mode screen.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
76
29000169-005 Revision C1
Figure 70 - Wireless Bridge - Radio
Next go to the Wireless Bridge - Bridging Mode screen (Figure 71). Select either manual or auto
bridging. If you choose Manual Bridging then you will have to set Spanning Tree Protocol to Enable
unless you are sure that there is no chance of a loop. You can also assign a Signal Strength LED MAC.
Signal strength LED MAC allows you to set the number of one of the Remote APs which will be listed at
the bottom of the screen once the system is operational as the guiding port that you wish to have display in
the WLANSS LED on the front of the 3e523–3 as a signal. If you don’t wish to display any connection
signal, simply leave this set at Not Assigned. From this screen you can also choose to delete a remote
AP's MAC address.
Click Apply to accept your changes.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
77
29000169-005 Revision C1
Figure 71 - Wireless Bridge - Bridging Mode
If you choose Auto Bridging mode (Figure 72), then you will need to enter the following information:
Enter the SSID. This can be any set of letters and numbers assigned by the network administrator. This
nomenclature has to be set on the wireless bridge and each wireless device in order for them to
communicate.
Enter a number from 1 to 32 for the Max Auto Bridges. Next enter the Bridge Priority (range from
1-65535). This determines the root (leaf) STP node. The lowest bridge priority in the network will become
the STP root.
Select the Signal Strength Threshold.
Either enable or disable the Broadcast SSID. When disabled, the bridge hides the SSID in outgoing
beacon frames and stations cannot obtain the SSID through passive scanning. Also, when it is disabled,
the bridge doesn’t send probe responses to probe requests with unspecified SSIDs.
Finally enter the Signal Strength MAC. The signal strength of this wireless bridge will be indicated on the
Signal Strength LED located on the front of the case.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
78
29000169-005 Revision C1
Figure 72 - Wireless Bridge - Auto Bridging Mode
Next, navigate to the Wireless Bridge Encryption screen (Figure 73). Select the appropriate key type
and length and the key value. The encryption key value and type for Bridge 1 must be the same as for
Bridge 2. For wireless bridging, only AES and 3DES are available for encryption.
Figure 73 - Wireless Bridge - Encryption
Configure the second of your two point-to-point bridges following the instructions given for Bridge 1 above.
Point-to-Multipoint Bridge Configuration
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
79
29000169-005 Revision C1
A point-to-multipoint configuration (Figure 74) allows you to set up three or more 3e523 units in bridging
mode and accomplish bridging between 3 or more locations wirelessly.
For the three bridges that are to be linked to communicate properly, they have to be set up with compatible
commands in their setup screens.
For instance, all bridges must have the same channel number. Spanning Tree Protocol will usually be set
to Enable. If configured as in the diagram following, Bridge 1 must contain all of the others' BSSIDs, while
Bridge 2 ~ n must only contain Bridge 1's BSSID. (The BSSID of each is equivalent to the MAC address
found on the Wireless Bridge - Radio page. Enter only hexadecimal numbers. Data entry is not case
sensitive.) Finally, the wireless bridging encryption of each must be set to the appropriate type and key
length and must be the same on all.
Figure 74 - Point-to-Multipoint Bridge Configuration
Follow the steps of the procedure outlined in the point-to-point bridge section. Table 10 and Table 11
below describe the basic attributes.
Table 10 - Point-to-Multipoint Bridging Setup Guide - Manual Mode
Direction
Bridge 1
Bridge 2 ~ n
Wireless Bridge Radio
Wireless Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Same as Bridge 2~n
Same as Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
80
29000169-005 Revision C1
RTS Threshold
2346
2346
Beacon Interval
1000
1000
BSSID
Add Bridge 2~n MAC
Add Bridge 1 MAC
Wireless Bridge Bridging Mode (Manual Bridging Mode)
Bridging Mode
Manual bridging selected
Manual bridging selected
Signal Strength LED MAC
Not Assigned (select from
drop-down list)
Not Assigned (select from
drop-down list)
Spanning Tree Protocol
Enable (or Disable if no
bridging loop possible)
Enable (or Disable if no
bridging loop possible)
Wireless Bridge Encryption
Bridging encryption
options
Select appropriate key
type/length and value.
Must be the same key as
Bridge 2~n.
Select appropriate key
type/length and value.
Must be the same key as
Bridge 1.
Table 11 - Point-to-Multipoint Bridging Setup Guide Auto Mode
Direction
Bridge 1
Bridge 2
Wireless Bridge Radio
Wirelss Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Same as Bridge 2~n
Same as Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
Beacon Interval
1000
1000
BSSID
Add Bridge 2~n MAC
Add Bridge 1 MAC
Wireless Bridge Bridging Mode (Auto Bridging Mode)
Bridging Mode
Manual bridging selected
Auto bridging selected
SSID
Must be the same as
Bridge 2~n
Must be the same as
Bridge 2
Max Auto Bridges
32 (range 1-32)
32 (range 1-32)
Bridge Priority
32768 (range 1-65535)
32768 (range 1-65535)
RSSI Window Size
5
5
Signal Strength Threshold
9%
9%
Link Sensitivity
15%
15%
Signal Strength MAC
Enter from list at the
bottom of the screen
Enter from list at the
bottom of the screen
Wireless Bridge Encryption
Bridging encryption
options
Select appropriate key
type/length and value.
Must be same as Bridge 2.
Select appropriate key
type/length and value.
Must be same as Bridge 1.
The above recommended setup requires only Bridge 1 to be set in point-to-multipoint mode. It is possible
to set all bridges in point-tomultipoint mode, in which case , each bridge would have to contain the BSSID
for each of the other bridges and Spanning Tree Protocol must be Enabled.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
81
29000169-005 Revision C1
Repeater Bridge Configuration
A repeater setup can be used to extend the wireless signal from one bridge connected to an Ethernet LAN
wirelessly so that another bridge can control a wireless LAN at a distance (Figure 75). Table 12
describes the basic attributes.
Figure 75 - Repeater Bridge Configuration
Table 12 - Repeater Bridging Setup Guide Manual Mode
Direction
Bridge 1
Bridge 2
Bridge 3
Wireless Bridge Radio
Wireless Mode
802.11a
802.11a
802.11a
Tx Rate
AUTO
AUTO
AUTO
Channel No.
Same as Bridge 2
Same as Bridge 1
Same as Bridge 1
Tx Power Mode
Auto
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
2346
Beacon Interval
1000
1000
1000
BSSID
Add Bridge 2's MAC
Add Bridge 1's and
Bridge 3's MAC
Add Bridge 2's MAC
Wireless Bridge Bridging Mode (Manual Bridging Mode)
Bridging Mode
Manual
Manual
Manual
Signal Strength
LED MAC
Not Assigned (select
from drop-down list)
Not Assigned (select
from drop-down list)
Not Assigned (select
from drop-down list)
Spanning Tree
Protocol
Enable (or Disable if
no bridging loop
possible)
Enable (or Disable if
no bridging loop
possible)
Enable (or Disable if
no bridging loop
possible)
Wireless Bridge Encryption
Wireless
Configuration
Bridging Encryption
Select appropriate
key type/length and
enter key value. Must
be the same as that
on the other two
Bridges
Select appropriate
key type/length and
enter key value. Must
be the same as that
on the other two
Bridges
Select appropriate
key type/length and
enter key value. Must
be the same as that
on the other two
Bridges
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
82
29000169-005 Revision C1
3. WiMesh End Points 3e-523A and 3e-523E-900 Hardware
Installation
3.1 3e-523A Hardware Installation
Preparation for Use
This section deals with installation of the 3e523A unit. The unit requires physical mounting and
installation on the site, following a prescribed placement design to ensure optimum operation.
The package includes the following items:
The Device
Documentation as PDF files (on CD-ROM)
Registration and Warranty cards
The device has the following available accessories:
Outdoor Accessory Kit (3e-523-OAK)
Indoor Accessory Kit (3e-523-IAK)
DIN Rail Accessory Kit (3e-523-DINR-IN)
The device can be mounted outdoors on a high post to achieve the best bridge result. If mounted outdoors,
the outdoor accessory kit must be used to prevent lightning damage.
IMPORTANT NOTE:
To comply with FCC RF exposure compliance requirements, the antennas
used with the 3e-523A must be installed with a minimum separation distance of
21.5 cm from all persons, and must not be co-located or operated in conjunction
with any other antenna or transmitter. Installation should be accomplished using
the authorized cables and/or connectors provided with the device or available from
the manufacturer/distributor for use with this device. Changes or modifications not
expressly approved by the manufacturer or party responsible for this FCC
compliance could void the user’s authority to operate the equipment.
Installation Instructions
This manual deals only and specifically with a single device as a unit. The purpose of this chapter is to
describe the device and its identifiable parts so that the user is sufficiently familiar to interact with the
physical unit. Preliminary setup information provided below is intended for information and instruction of
the wireless LAN system administration personnel.
It is intended that the user not open the unit. Any maintenance required is limited to the external enclosure
surface, cable connections, and to the management software (as described in Chapter 2) only.
Minimum System and Component Requirements
To complete the configuration, you should have at least the following components:
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
83
29000169-005 Revision C1
PCs with one of the following operating systems installed: Windows NT 4.0, Windows 2000 or
Windows XP
Access to at least one laptop or PC with an Ethernet card and cable that can be used to complete
the initial configuration of the unit.
A Web browser program (such as Microsoft Internet Explorer 6.0 or later, or Netscape 6.3 or later)
installed on the PC or laptop you will be using to configure the Access Point.
TCP/IP Protocol (usually comes installed on any Windows PC.)
3.1.1 Connectors and Cabling
Figure 76 shows the external connectors on the device
Figure 76 - device external connectors
The RJ-45 Ethernet port is a standard 10/100 Ethernet connection. The DB-15 connector is a serial
RS232/422/485 I/O port that is also the power interface. The power source should be +5V DC @ 3 amps.
The top antenna is an 802.11 a/b/g antenna providing transmit (TX) and receive (RX) functions. The
bottom antenna is an 802.11 a/b/g antenna providing the receive diversity functions.
The pin out information for the DB-15 connector is listed in Table 13
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
84
29000169-005 Revision C1
Table 13 - DB-15 Pin Out Information
Pin
Name
1
COM 0 TX
2
COM 0 NCTS
3
Signal GND
4
RS-485 TX
5
RS-485 RX
6
Power RTN
7
Power RTN
8
Power RTN
9
COM 0 RX
10
COM 0 NRTS
11
RS-485 TX+
12
RS-485 RX+
13
Power RTN
14
+5 VDC
15
+5 VDC
Figure 77 below illustrates the setup.
Figure 77 - Setup
3.1.2 Indoor Accessory Kit Installation
The indoor accessory kit (3e-523-IAK) contains the following items:
Qty 2 - R-SMA antennas
DB-15 connector housing with power supply
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
85
29000169-005 Revision C1
Assemble the DB-15 connector for power and serial data signals. It is intended that the conductors
intended for +5 VDC Power and Serial Data be routed through the compression nuts and sleeve inserts
before entering the larger connector housing. Refer to Figure 78 below which illustrates the connector
housing assembly. The example shown shows the wiring for +5 VDC Power.
Figure 78 - Connector housing assembly
3.1.3 Outdoor Accessory Kit Installation
If any portion of this system (enclosure, antennas, cables etc.) is mounted outdoors, it is strongly
recommended that the Outdoor Accessory Kit (523-OAK) for this product be used. This kit contains
lightning arrestors and ground cables designed for this product.
If the system is mounted outdoors where CE Mark certification is required, use of the Outdoor Accessory
Kit (or equivalent) is MANDATORY. Failure to install this protection will void the warranty.
The Outdoor Accessory Kit (3e-523-OAK) contains the following items:
Mounting Plate
Pole Mounting Rear Plate
Qty 2 - Outdoor omni-directional antennas
Qty 2 - Right angle R-SMA to bulkhead N cable assemblies
Qty 2 Lightning Arrestors
Qty 2 - Ground wires
Qty 4 - 1/4-inch bolts
Qty 4 - 1/420 Nut and washer
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
86
29000169-005 Revision C1
Qty 4 - Hex socket cap screws
Hex key wrench tool
DB-15 connector housing with associated parts
Large connector housing
DB-15 screw housing insert
Qty 2 - Rubber sleeves
Qty 2 - Compression nuts
Qty 2 - Flat head #4 self tapping screws
Ferrite cylinder
NOTE: You (the user) are required to ensure that the connection to a proper earth ground is made by
properly certified and authorized personnel and must conform to all applicable codes and regulations.
The materials required to connect to a proper ground are defined by local conditions and must be
procured locally to ensure the correct safety environment is achieved. The cable used to connect to a
proper ground must be AWG 10 or heavier. This cable should be kept as short as possible.
! WARNING !
Do not attempt to install any outdoor equipment during hazardous conditions
such as a thunderstorm, where lightning could strike the equipment or installer.
Failure to follow this warning could result in injury or death.
1. Install two Bulkhead N Cable Assemblies to the Mounting Plate.
2. Install unit on the Mounting Plate using the 4 hex socket cap screws. Orient the unit so that the
larger rectangular bulkhead connector is facing away from the N connectors. Tighten with
included hex key wrench tool.
3. Attach the one ground wire to each Lightning Arrestor. Note that one wire is longer than the
other. Each lightning arrestor has a ring terminal attached, remove and discard this item.
4. Attach both Lightning Arrestors to the N Connectors on the Mounting Plate. Mount the
Lightning Arrestor with the longer ground wire on the right side.
5. Route the ground wires to the ground stud on the unit. Secure with 10-32 Nut. Note that a
wire must be routed from this point to a suitable earth ground.
Assemble DB-15 Connector for power and serial data signals. It is intended that the
conductors intended for +5 VDC Power and Serial Data be routed through the compression
nuts and sleeve inserts before entering the larger connector housing. Refer to Figure 78
below to illustrate connector housing assembly. The example shown shows the wiring for +5
VDC Power. See for pin information for the entire connector.
6. Figure 78To reduce unintentional radio frequency interference (RFI), the +5 volt DC power
provided to the device should be conditioned by passing the wires through the supplied ferrite
cylinder (see Figure 79). Refer to the drawing below for guidance on how to pass the wires
through the ferrite cylinder before terminating into the supplied DB-15 connector housing. The
ferrite cylinder should be placed approximately two inches from the cap of the connector
housing.
7. The Outdoor Accessory Kit can be mounted on a pole using the Pole Mounting Rear Plate.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
87
29000169-005 Revision C1
Figure 78 - Connector housing assembly
Figure 79 - Power conditioning
Figure 80 - Outdoor accessory kit mounting
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
88
29000169-005 Revision C1
Next is information on the physical dimensions (Figure 81) of the 3e5233 unit.
Figure 81 - 3e-523 dimensions
3.1.4 The Indicator Lights
The side panel of the 3e5233 contains two indicator lights (Light Emitting Diodes or LEDs) that help
describe the state of various networking and connection operations (see Figure 82).
Figure 82 - 3e-523 indicator lights
Table 14 - Indicator Lights
LED
Description
FIPS LED (further
from the RJ-45
connector)
The Red LED indicates whether or not the 3e5233 is in FIPS mode. When this
LED is lit, the system is in FIPS mode. When not lit, the system is in non-FIPS
mode.
WLAN LED
(next to the RJ-45
connector)
The amber LED is the uplink signal strength, for the bridge or client radio link.
When a strong signal is being received from the remote bridge radio (bridging
mode) or the access point (when in client mode), then the LED will be on steady.
As the received signal becomes weaker, the LED may blink fast for a moderate
signal, blink slowly for a weak signal, or be dark when no connection is made.
When the operating mode of the device is set for access point only mode, this LED
is not used.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
89
29000169-005 Revision C1
3.1.5 Reset Button
The reset button is located behind the Phillips (cross-tip) screw on the top side of the unit (Figure 83).
Remove the screw to access the reset button. To reset the unit, use a small screw driver and perform the
following:
1. Push in and hold the reset button for five seconds. Holding the button for more than five (5)
seconds but less than 10 does a reset. Removing power, or going through the web interface
are usually a better ways to reset, when possible. If you hold the button too long, you could
factory default the unit by mistake, and wipe out your configuration.
2. If you continue to hold the button, after 20 seconds the unit will be reset to the factory default.
3. Make sure you reinstall the screw with gasket after using the reset button to keep water out of
the unit.
Figure 83 - Reset button
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
90
29000169-005 Revision C1
3.2 3e-523E-900 Hardware Installation
This section deals with installation of the 3e-523E-900 unit. The unit requires physical mounting and
installation on the site, following a specific placement design ensuring optimum operation.
FCC Regulations require that the 3e-523E-900 product be professionally installed by an installer
certified by the National Association of Radio and Telecommunications Engineers or equivalent
institution.
The package includes the following items:
The Device.
Documentation as PDF files (housed on a CD-ROM).
Registration and Warranty cards.
Minimum System and Component Requirements
To complete the configuration, you must have the following minimal components:
PCs with one of the following operating systems installed: Windows NT 4.0, Windows 2000 or
Windows XP.
Access to at least one laptop or PC with an Ethernet card, and cable that can be used to complete
the initial configuration of the unit.
A Web browser program (such as Microsoft Internet Explorer 6.0 or later, or Netscape 6.3 or later)
installed on the PC or laptop you will be using to configure the Access Point.
3.2.1 Specifications
ELECTRICAL SPECIFICATIONS:
Operating Voltage:
110/220VAC, 50/60Hz
Power Requirements:
5.5 Watts (> 0°C)
15 Watts (< 0°C, internal heaters operating)
External Interfaces:
Ethernet, 10/100, standard RJ-45 interface
N-type female jack antenna connector
Radio Transmission :
902-928 MHz band
ENVIRONMENTAL SPECIFICATIONS:
Operating
Temperature:
-30 to +50°C External Ambient (-22 to +122 °F)
Storage Temperature:
-40 to +70°C (-40 to +158 °F)
Relative Humidity:
90%, non-condensing
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
91
29000169-005 Revision C1
MECHANICAL / MOUNTING SPECIFICATIONS:
Enclosure:
Polycarbonate, polyurethane gasket, stainless steel hardware
Weight :
8.8 lbs
Features:
Pad-lockable, outdoor deployment (weatherproof)
Dimensions:
12.08” W x 13.57” H x 6.95” D
3.2.2 Mounting Pattern
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
92
29000169-005 Revision C1
3.2.3 Installation Requirements
! WARNING !
Do not attempt to install any outdoor equipment during hazardous conditions such
as a thunderstorm, where lightning could strike the equipment or installer. Failure
to follow this warning could result in injury or death.
Mounting feet (and screws) are supplied with the unit, attached inside of the cover. Installer must
attach these to the enclosure prior to mounting.
Drill holes per mounting pattern drawing and fasten with ¼” screws or bolts (provided by the
installer), as appropriate for the installation.
AC power cabling and cable gland (or conduit and hub) are to be provided by the installer as
appropriate. Two cutouts provided, one for signal wire, one for power wiring, each at 1.109”
diameter. Both holes must have appropriate cable glands or conduit hubs added for weatherproof
installation.
External grounding wire is not provided with the unit. Protection for the user and unit require a
minimum 10AWG safety ground be attached to the threaded stud at the bottom of the unit to a
secure earth bonded surface. The length of this grounding wire should be kept to a minimum, 3eTI
recommends less than 3 feet.
NOTE: You (the user) are required to ensure that the connection to a proper earth ground is
made by properly certified and authorized personnel and must conform to all applicable codes
and regulations. The materials required to connect to a proper ground are defined by local
conditions and must be procured locally to ensure the correct safety environment is achieved.
Install power cable
gland or conduit
hub, as appropriate.
Install AC wiring per label.
Ground to “G”, Line (black) to
“L”, Neutral (white) to “N”
terminals.
Secure wires with gland/hub.
Install cable gland
or conduit hub, as
appropriate for
data cables and/or
weather seal.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
93
29000169-005 Revision C1
The cable used to connect to a proper ground must be AWG 10 or heavier. This cable should
be kept as short as possible.
3.2.4 RF Connections
NOTE: This radio transmitter IC: 6780A-523E900 has been approved by Industry Canada to operate with
the antenna types listed below with the maximum permissible gain indicated. Antenna types not included
in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for
use with this device.
L-Com HGV906U, 6-dBi gain, Omni-Directional antenna
L-Com HG906YE, 6-dBi gain, Yagi antenna
RF cabling, lightning arrester, and antenna are not provided with the unit.
The installer should provide a suitable lightning arrestor that can attach directly to the
N-male RF port at the bottom of the unit. Ground the lightning arrestor to the same earth
bonded ground attachment as used for the unit.
The installer should provide a suitable antenna to meet the RF coverage needs per
application.
LMR-400 cabling is recommended for longer than 10 feet of external RF cabling. Ensure
this cable is routed and tied down to avoid undue mechanical stress on the lightning
arrestor attached to the unit.
3.2.5 RF Safety Information
FCC: To comply with FCC RF exposure compliance requirements, the antennas used with
the 3e-523E-900 product must be installed with a minimum separation distance of 21.5 cm
from all persons and must not be co-located or operated in conjunction with any other
antenna or transmitter. Installation should be accomplished using the authorized cables
and / or connectors provided with the device or available from the manufacturer / distributor
for use with this device. Changes or modifications not expressly approved by the
manufacturer or party responsible for this FCC compliance could void the user’s authority to
operate the equipment.
Industry Canada: To comply with Industry Canada RF Exposure requirements, the antennas
used with the 3e-523E-900 product must be installed with a minimum separation distance of
32 cm from all persons.
NOTE: This equipment has been tested and found to comply with part 15 of the FCC Rules.
These limits are designed to provide reasonable protection against harmful interference
when the equipment is operated in a commercial environment. This equipment generates,
uses, and can radiate radio frequency energy and, if not installed and used in accordance to
the instruction manual, may cause harmful interference to radio communications. Operation
of this equipment in a residential area is likely to cause harmful interference in which case the
user will be required to correct the interference at their own expense.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
94
29000169-005 Revision C
4. WiMesh PAC-Link (3e-523S) Hardware Overview
The 3e523S, also called the Portable Adaptive Com-Link (PAC-Link), is an extremely portable, battery
operated IP router used in mobile operations. The 3e523S is intended to provide mobile IP connectivity
for personnel on the move when the RF signal strength cannot be maintained to the base operations
center. When the RF signal is disrupted, a 3e523S can be used as a repeater which when situated in a
suitable location, will provide suitable RF signal strength between the personnel and the base operations
center.
Multiple 3e523S units can provide secure communications between personnel and the base operations
center when large structures are penetrated or around the perimeter of large objects by simply tying the
3e523S units to railings or other convenient tie points as the progress of personnel takes them beyond
the signal range of the last 3e523S1 that was deployed. In this way, connectivity can be maintained
between personnel and the base operations center.
Inside the 3e523S is the FIPS 140-2 Validated 3e523M multifunction wireless data module. Also
included is a rechargeable lithium-ion battery with a battery charge of approximately eight hours. The
3e523S supports three different operating modes:
Wireless Access Point (WAP)
Wireless Client (STA)
Wireless Bridge (WDS)
The 3e523S can be configured for FIPS or non-FIPS sub-mode. In addition, the 3e523S supports
802.11i and Wi-Fi Protected Access 2 (WPA2), WPA and different EAP types, Temporal Key Integrity
Protocol (TKIP) for WPA encryption and Advanced Encryption Standard (AES) for WPA2 encryption. With
support of 802.11a/b/g standards, the 3e523S delivers up to 22 Mbps of sustained data rate in 5 GHz and
2.4 GHz bands.
Figure 84 below shows the Antenna and Ethernet sides of the 3e523S device.
Figure 84 - 3e-523S Device (Antenna side) on left and 3e-523S Device (RS-232 side) on right.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
95
29000169-005 Revision C1
5. WiMesh End Point OEM Module (3e-523M)
The 3e523M is a secure multi-function wireless OEM Module which can be integrated into another
product.
The 3e523M supports four different operating modes:
Wireless Access Point (WAP)
Wireless AP and Bridge simultaneous mode
Wireless Client (STA)
Wireless Bridge (WDS)
The 3e523M also can be configured for FIPS or non-FIPS sub mode. In addition, the 3e523M supports
802.11i and Wi-Fi Protected Access 2 (WPA2), WPA and different EAP types. Temporal Key Integrity
Protocol (TKIP) for WPA encryption and Advanced Encryption Standard (AES) for WPA2 encryption.
With support of 802.11b/g/a standards, the 3e523M delivers up to 54Mbps of data rate in 5GHz and 2.4
GHz bands. Figure 85 below illustrates a wireless system using the 3e523M in all three modes.
Figure 85 - 3e-523M wireless system
Wireless Access Point Mode
In the wireless access point mode, you can use the 3e523M to connect wireless communication devices
together to create a wireless network. The 3e523M is usually connected to a wired network and can relay
data between devices on each side. Many 3e523Ms can be connected together to create a larger
network that allows roaming (
Figure 86).
In Wireless Access Point (WAP) mode the WAN interface has to connect to a backbone Ethernet switch in
order to operate normally. It bridges the backbone Ethernet network and wireless interface.
Figure 86 below shows how to setup the Ethernet cable and IP addressing.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
96
29000169-005 Revision C1
Figure 86 - 3e-523M wireless access point mode
There are numerous security methods provided in this mode. In non-FIPS mode: WEP, WPA (TKIP and
AES-CCM) and WPA2 (TKIP and AES-CCM) are available. The 3e523M also supports EAP-MD5,
EAP-TTLS, EAP-TLS, PEAP, EAP-SIM protocols. In FIPS mode: static 128-, 192- and 256-bit AES, static
3DES and FIPS 802.11i are available.
WPA is a subset of 802.11i that satisfies some of the requirements of the full 802.11i standard. Some of
the significant features of WPA are:
1. It supports two authenticated key management protocols in infrastructure mode using 802.1X
with pre-shared key and with EAP authentication. The IBSS approach described uses no
authenticated key management protocol but uses a pre-shared key directly as the
encryption/integrity key.
2. APs and stations use IEEE 802.11 open authentication when they use WPA.
3. APs must advertise what they support (Cipher suite, authentication modes). Stations must
request the cipher suites and authenticated key management protocol they want. A propriety
information element in the Beacon and probe response messages is used
to carry this information. The station uses the same information element in association request
message.
4. Authentication and Association are required.
5. TKIP encryption with the Michael integrity check is required.
Wireless Bridging Mode
In Wireless Bridging (WDS) mode the WAN interface may or may not need to connect to a backbone
Ethernet switch. It depends on needs of infrastructure network. However, wireless bridging extends the
network from an existing wired network easily without altering the network topology.
Figure 87 below shows how to setup the Ethernet cable and IP addressing.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
97
29000169-005 Revision C1
Figure 87 - 3e-523-F2 wireless bridging mode
This type of infrastructure is decentralized. As each node needs only transmit as far as the next node.
Nodes act as repeaters to transmit data from nearby nodes to peers that are too far away to reach,
resulting in a network that can span large distances.
The 3e523M in bridging mode provides point-to-point or point-to-multipoint network topology.
In bridging mode, the 3e523M can be configured for FIPS or non-FIPS mode.
In non-FIPS mode the 3e523M supports AES-CCM for security. In FIPS mode, the 3e523M supports
Static 128-, 192- and 256-bit AES and static 3DES.
Wireless Client Mode
In Wireless Client/Client-Bridge mode, the WAN interface is NOT design for a backbone network
connection. It is the interface for computer connected to it. The following diagram shows how to setup the
Ethernet cable and IP addressing (Figure 88).
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
98
29000169-005 Revision C1
Figure 88 - Wireless client mode
The 3e523M can operate as a client device that communicates with a wireless access point. It supports
802.11a/b/g bands.
In client mode, the 3e523M can be configured for FIPS or non-FIPS mode.
In non-FIPS mode the 3e523M supports AES-CCM for security. In FIPS mode, the 3e523M supports
Static 128-, 192- and 256-bit AES and static 3DES.
Network Topology Map Enhancement
The 3e523M contains an embedded network topology map ( 89 111) which can help you to envision the
bridged network. The initial implementation provides the following tree structure where each indented entry
is a child to the entry above it. The entry at the top of the tree is the STP root. The receive signal strength is
indicated by the % on each link.
The map shows the network layer 2 topology. APs that are part of another network are not displayed in the
map. This map only reports all 3eTI devices (client-bridge, AP, bridge) and part of 3rd party switches
running STP. 3eTI strongly recommends that you configure your 3rd party switch as root and make it the
uplink for the 3eTI device cloud to the backbone network.
This implementation is base-on the current design.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
99
29000169-005 Revision C1
Figure 89 - Network topology map
Hardware Installation
The 3e-523M has multiple wired interfaces and functions available via the exposed connectors (Figure
90). These interface features on connector P1 consist of a Serial RS-232/422/485 IO port that also
contains the power interface. Connector P2 contains the Reset Function, LED Indicators as well as
advanced features to be activated in future revisions. There is a standard 10/100 RJ-45 Ethernet port.
The wireless interface consists of one 802.11 a/b/g dual antenna wireless interface for diversity. It uses
standard 50-ohm SMA connectors.
The Reset Function is activated by shorting P2 - pin 1 to GND found at P2 pin 7 or 8.
Short for 5 seconds and release simple reset, you can also power cycle the module
Short for 11 seconds and release resets all to factory defaults. This can be used when there’s no
GUI access to the module.
The 3.3 VDC pins shown on P2 pins 3 and 4 are only to be used as a current source to illuminate any
external LED indicators the user wishes to connect. DO NOT ATTEMPT TO SOURCE 3.3 VDC TO THE
3e523M THROUGH P2. This will void the warranty, damage the unit and may create a safety hazard.
The LED Indicator signals are capable of sinking approximately 9 mA using the supplied +3.3 VDC from
pins 3 and 4 of P2. Refer to the following Figure 91 to view the connection for these signals. Each LED
Indicator signal from the 3e-523M processor contains a 287 ohm current limiting resistor, so no additional
resistor is typically required.
Power requirements: +5VDC +-5% 3 Amps
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
100
29000169-005 Revision C1
Figure 90 - Hardware Installation
The 3e-523M unit can be used for either RS232 communications or for RS485/422 communications, but
the two functions are mutually exclusive as they share a common UART. The pinout information for the
P1 serial port is shown in Table 15 below.
NOTE: For a rugged environment, the user should consider adding RTV to enforce the connectors.
Table 15 - P1 Pin Out Information
Pin Number
Serial Port Functionality
1
RS232 TxD
2
RS232 RxD
3
RS232 CTS
4
RS232 RTS
5
GND
6
RS485 TX+
7
RS485 TX
8
RS485 RX+
9
RS485 RX
10
GND
11
GND
12
+5VDC
13
GND
14
+5VDC
15
GND
16
+5VDC
When the 3e-523M unit is run in full RS485 duplex mode each 485 signal pair is connected separately and
when the interface is run in half duplex mode the Tx+/Rx+ and Tx-/Rx- wires are connected together.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
101
29000169-005 Revision C1
The P2 serial port is used for LED indicators and advanced features. See Table 16
Table 16 - P2 Pin Out Information
Pin Number
Serial Port Functionality
1
RESET
2
EXT GPIO
3
+3.3 VDC
4
+3.3 VDC
5
USV D+
6
USB D
7
GND
8
GND
9
WAN LINK
10
WAN SPEED
11
RF LINK
12
RF DATA
13
IIC CLK
14
IIC DATA
Pin Definition and schematics of the P1 serial port and power, 16 pin, double row, 100 mil header is
illustrated in Figure 91 below.
Figure 91 - P1 Pin setup
Pin Definition and schematics of the P2 serial port and LED, 14 pin, double row, 100 mil header (Figure
92).
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
102
29000169-005 Revision C1
Figure 92 - P2 Pin setup
Top view of P2 connector, the Pin 1 is closer to the Tx/Rx antenna connector (Figure 93). Table 17 and
Table 18 below lists the mating connectors. Figure 93
Figure 93. Top View of P2 Connector
Table 17 - Mating Connector
Digi-Key Part Number
WM2524-ND
Manufacturer Part Number
022-55-2141
Description
CONN RECEPT HOUSING 14POS .100
inch
Table 18 - Mating Connector Contact Pin
Digi-Key Part Number
WM2511-ND
Manufacturer Part Number
16-02-0096
Description
CONN SOCKET CRIMP 24-30AWG TIN
Pin Definition (Figure 94) and color code (Figure 95) for RJ45 of Ethernet port.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
103
29000169-005 Revision C1
Figure 94 - Front view of RJ45 connector
RJ45 connector signal names and color code per IEEE 802.3 spec. Figure 95 illustrates the mechanical
drawing of 3e-523-F2.
Figure 95 - RJ45 connector signal names and color code
5.1.1 Mechanical Drawings
Figure 96 - Mechanical drawing of 3e-523-F2
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
104
29000169-005 Revision C1
6. Technical Support
Manufacturers Statement
3e523 is provided with a standard warranty. It is not desired or expected that the user open the device. If
a malfunction is experienced and all external causes are eliminated, the user should contact 3eTI for
instructions on how to resolve the issue
If you are experiencing trouble with this unit, the point of contact is:
e-mail: support@3eti.com
Phone: 1-800-449-3384 (Monday - Friday)
or visit our website at www.ultra-3eti.com
Radio Frequency Interference Requirements
This device has been tested and found to comply with the limits for a Class A digital device, pursuant to
Part 15 of the Federal Communications Commission’s Rules and Regulations. These limits are designed
to provide reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at their expense.
Installation should be accomplished using the authorized cables and/or connectors provided with the
device or available from the manufacturer/distributor for use with this device. Changes or modifications not
expressly approved by the manufacturer or party responsible for this FCC compliance could void the
user’s authority to operate the equipment.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
105
29000169-005 Revision C1
Appendix A: Glossary
3DES - Also referred to as Triple DES, a mode of the DES encryption algorithm that encrypts data three
times.
802.11 - 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology.
802.11 specifies an over-the-air interface between a wireless client and a base station or between two
wireless clients. The IEEE accepted the specification in 1997.
Access Point - An access point is a gateway set up to allow a group of LAN users access to another
group or a main group. The access point doesn’t use the DHCP server function and therefore accepts IP
address assignment from the controlling network.
AES - Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique
developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S government adopted
the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES
works at multiple network layers simultaneously.
Bridge - A device that connects two local-area networks (LANs), or two segments of the same LAN that
use the same protocol, such as Ethernet or Token-Ring.
DHCP - Short for Dynamic Host Configuration Protocol, DHCP is a protocol for assigning dynamic IP
addresses to devices on a network. With dynamic addressing, a device can have a different IP address
every time it connects to the network. In some systems, the device’s IP address can even change while it
is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing
simplifies network administration because the software keeps track of IP addresses rather than requiring
an administrator to manage the task. This means that a new computer can be added to a network without
the hassle of manually assigning it a unique IP address. Many ISPs use dynamic IP addressing for dial-up
users.
NMS (Network Management Station) - Includes such management software as HP Openview and IBM
Netview.
PC Card - A computer device packaged in a small card about the size of a credit card and conforming to
the PCMCIA standard.
PDA (Personal Digital Assistant) - A handheld device.
SNMP (Simple Network Management Protocol) - A Network ID unique to a network. Only clients and
access points that share the same SSID are able to communicate with each other. This string is
case-sensitive. Wireless LANs offer several security options, but increasing the security also means
increasing the time spent managing the system. Encryption is the key. The biggest threat is from intruders
coming into the LAN. You set a seven-digit alphanumeric security code, called an SSID, in each wireless
device and they thereafter operate as a group.
WLAN (Wireless Local Area Network) - A type of local-area network that uses high-frequency radio
waves rather than wires to communicate between nodes.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
106
29000169-005 Revision C1
Appendix B: Two-Factor Authentication Overview and
Configuration
B.1 Overview and Operation
Two-factor authentication is the method of using two independent methods to increase the assurance that
a user has been authorized to access a secure device. 3eTI devices have the ability to provide increased
authentication assurance by providing for a user requiring 3eTI device access to be authenticated first via
a centralized validation authority and user login / password access for a particular device. The 3eTI Data
Points support Public Key Certificates issues and managed by a Certificate Authority. By networking
3eTI devices into a Public Key Infrastructure, a 3eTI Data Point can use the capabilities of the PKI network
by requiring a user to first validate authentication capabilities using a Common Access Card (CAC) card
and the PKI network when using a computer to gain access to the 3eTI Data Point. Once permission is
granted through the PKI network a user then uses their login ID and password to gain access to the 3eTI
device.
Since the exact method of implementing and managing a PKI network may vary based on organization the
following section provides details on how a 3eTI Data Point may be configured for two-factor
authentication based on internal 3eTI configuration and testing of this feature. The following defines how to
configure and use a Public Key Infrastructure (PKI) to manage and configure a 3e-523 Data Point. See
Figure 97 for a block level overview of a PKI network.
Figure 97 Two-Factor Authentication PKI Network Overview
When enabled, a user with a valid Common Access Card (CAC) is authenticated through an existing PKI
network to gain an access to a 3eTI Data Points web management interface. The 3eTI Data Point uses the
Online Certificate Status Protocol (OCSP) to send requests to an OCSP Responder in the PKI network.
Based on the information returned from the OCSP Responder, the Data Point determines if the users has
permission to access the web management GUI of the device. Based on the current permission setting of
the requestor, the OCSP responder will return receive one of three possible statuses in response to a
request to check CAC certificates validity. The status in the response the Data Point can be unknown,
revoked, or good.
Web
Client
3e-525
Family of
Products
OCSP
Responder
3e-523
Family of
Products
IP
Network
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
107
29000169-005 Revision C1
If the OCSP Responder does not have access to a valid Certificate Revocation List (CRL) for the
Certificate Authority (CA) owning the requesting CAC certificate then the status returned will be unknown.
The unknown certificate status is treated by the AP as if the client certificate was invalid. If the responder
has access to a valid CRL for the CA owning the certificate then the status depends upon whether or not
the certificate is listed in the CRL as revoked. If revoked then the status returned is revoked, otherwise the
status will be good. If the response returned is invalid or revoked the Data Point will not allow the
requestor to login to the web management interface. If the response is good the Data Point provides the
Login and password interface to the requestor.
PKI Network Components
The following components are required to implement and operate a PKI network providing Two-Factor
authentication of 3eTI Data Points, see Figure 97 for the components that make up a PKI network.
Web Client
A computer running a valid Web client / browser (Internet Explorer 6 or later) that is able to communicate
to the Data Point thought either its LAN or WAN port. The web client PC must be running Windows XP
SP3 or later and be equipped with smart card slot. The computer must have software installed that can
read and process CAC card information. Also, the requestor must have a valid Common Access Card
(CAC) (DoD CA-23) that will return a status of good from the OCSP Responder. Software such as ActivI-
dentity ActivClient (6.2 or later) will meet system requirements.
OCSP Responder
The OCSP Responder provides remote access to Certificate Revocation List (CRL) databases via the
OCSP protocol. The responder is meant to aggregate and help manage large databases and control how
a CRL is stored and managed within the network. Software such as Tumbleweed Validation Authority (4.9)
running on Windows Server 2003 R2 platform is recommended. DoD CA-23 certificate and any
corresponding CRL can be loaded to the OCSP Responder from a local file. Current DoD certificates and
CRLs can be obtained from https://crl.chamb.disa.mil/. See Table 19 for the network component
operational requirements.
Table 19 - PKI Network Component Requirements
System Element
Operational Requirements
Web Client
Internet Explorer 6.0 or later, running on Windows XP
SP3 or later.
PC with smart card slot and ActivIdentity ActivClient (or
similar) 6.2 or later software installed.
DoD issued Common Access Card (CAC).
OCSP Responder
Windows Server 2003 R2
Tumbleweed Valicert Validation Authority 4.9 or later
3eTI Data Points
Software Release 4.4 or later, valid for both 3e-523 and
3e-525 series of products
B.2 Configuration of 3eTI Data Points for Two-Factor Authentication
Configuring OCSP operation on 3eTI Data Points
By default, OCSP is disabled. The following steps show how to enable and configure OCSP on 3eTI
devices.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
108
29000169-005 Revision C1
Login onto the device and navigate to the User Login Policy web page, as shown in Figure 98.
In order to start using OCSP, the CA certificate (DoD CA-23 certificate) that will used to issue / sign the
CAC certificates must be uploaded to the AP.
IMPORTANT NOTE: The CA certificate file must be in PEM format. DoD certificates downloaded from the
DoD PKI Management web site (https://crl.chamb.disa.mil/) are typically received in the X.509 format
(*.cer), if this is true the file will need to be converted to PEM format first. This can be accomplished using
the OpenSSL utility that comes pre-installed on most Linux distributions or can be uploaded from the
internet:
The command for converting from X.509 format to PEM format is
OpenSSL x509 -inform der -in DODCA_23.cer -out DODCA_23.pem
Click the Load New Certificate link on the User Login Policy web page. This will take you to the
“Update OCSP Certificate” web page shown in Figure 98
Click on the Browse button and navigate to the CA certificate file using the Choose File to Upload
screen, select the file and click the Open button, see Figure 99.
After the CA file in PEM format is selected, click the Upload Cert button, on the web page. A
warning pop up window will be displayed, see Figure 100.
IMPORTANT: Read the warning message carefully. If the CA certificate file is not correct and does not
match the certificate on the CAC card and/or is not the same as what is installed on OCSP Responder the
connection to web management interface of the 3eTI device may not be possible.
WARNING: If the web client/AP/OCSP Responder are configured incorrectly, or there is no network
connection to the Validation Authority software / OCSP Responder, the web client will not be able to
access the device web GUI. If this occurs setting the 3eTI Data Point to its factory default configuration will
disable OCSP, allowing a user to connect to device web GUI using factory default settings.
Click the OK button of the pop up window. If the upload is successful the message page shown in
Figure 101 will be displayed.
Click Back button. This will take you back to the User Login Policy web page, Figure 98
. The User Login Policy page will show information related to the uploaded CA under the OCSP
Certificate banner on the page.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
109
29000169-005 Revision C1
Figure 98 - User Login Policy Page
Figure 99 - Loading OCSP Certificate File
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
110
29000169-005 Revision C1
Figure 100 - OCSP Certificate File Warning
Figure 101 - OCSP Certificate File Upload Success Message Page
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
111
29000169-005 Revision C1
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
112
29000169-005 Revision C1
Figure 102 - User Login Policy with Upload Certificate Information
Next OCSP communication to the OCSP Responder must be established. In order to enable OCSP, the
OCSP Responder URL must be entered into the Data point. This is entered in the input box under
theOCSP Configuration label, see Figure 102. OCSP supports two schemes, “http:” and “https:” The host
name may be either an IP address or domain name. The latter can only be used if DNS is able to resolve
the host name to IP address. Optionally, the port number can be specified separated from the host name
by colon.
Examples of the valid OCSP Responder URLs are:
o http://192.168.202.140
o https://192.168.202.140
o https://192.168.202.140:443
o http://3ETI-ENGR
o https://3ETI-ENGR:443
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
113
29000169-005 Revision C1
IMPORTANT: Before enabling the 3eTI Data Point for OCSP communication, it is recommended
the communication with the OCSP Responder by verified. This can be done by a ping of the
OCSP Responder from the 3eTI Data Point, see Figure 103. The ping capability can be found on
the Utilities web page of the device. The IP address or host name of the OCSP Responder URL
must be entered in the IP address or hostname text box, for example, 192.168.202.140 or
3ETI-ENGR.
Click the Ping button next to the text box.
If communication between the device and OCSP Respond can be established a ping success screen as
shown in Figure 104 will be displayed.
WARNING: If the ping is not successful do not proceed until networking issues preventing successful
communication can be resolved.
Figure 103 3eTI Data Point Utilities Web Page
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
114
29000169-005 Revision C1
Figure 104 Ping Success Response
Once connectivity to the OCSP Responder has been verified, navigate back to User Login Policy
web page and enter OCSP Responder URL into the OCSP URL Responder text box, as shown in
Figure 105. Click the Enable radio button.
NOTE: The Use Nonce setting is optional. It should be left at Do Not Use Nonce for most installations.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
115
29000169-005 Revision C1
Figure 105 OCSP Responder Enable
After setting the OCSP Configuration parameters, click the Apply button at the bottom of the
screen. The a reboot required warning message will be displayed, see Figure 106.
WARNING: If the web client/AP/OCSP Responder are configured incorrectly, or there is no network
connection to the Validation Authority software / OCSP Responder, the web client will not be able to
access the device web GUI. If this occurs setting the 3eTI Data Point to its factory default configuration will
disable OCSP, allowing a user to connect to device web GUI using factory default settings.
If all enter information is correct click the OK button and navigate to the Reboot web page, click
the Reboot button. The following warning message will appear, see Figure 107.
Click the OK button. The screen shown in Figure 108 will appear.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
116
29000169-005 Revision C1
Figure 106 OCSP Enabled Warning
Figure 107 Reboot Warning
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
117
29000169-005 Revision C1
Figure 108 Reboot Success
Once the device has completed it reboot sequence, click on the Main Page link, as shown in
Figure 108.
Depending on certificate caching options, caching history, and software being used to read and validate
the CAC card, prompt(s) for validating the CAC will appear, these may be similar to those shown in as
shown in Figure 109 .
The Internet Explorer prompt for selecting the certificate to use for the connection will appear, as shown in
Figure 110.
Click on the certificate to use for accessing the device and click the OK button. A following warning
message about the web server certificate will appear, see Figure 111.
Click on the Continue to this website (not recommended) link. If a screen prompting you to add
the web-site to the exceptions list appears, add the IP address to the exceptions list. If the IP
address of this AP was previously added to the exceptions list, the following screen will appear as
in Figure 112
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
118
29000169-005 Revision C1
Figure 109 - ActivClient Password Prompt
Figure 110 - Internet Explorer Certificate Prompt
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
119
29000169-005 Revision C1
Figure 111 - Internet Explorer Website Certificate Warning
Click on Yes button. The certificate list to use with this website will appear as shown in Figure
113.
Highlight the correct ID certificate and click the OK button. The login screen of the AP will appear
as in Figure 114.
Figure 112 - Internet Explorer Website Warning
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
120
29000169-005 Revision C1
Figure 113 - Internet Explorer Client Certificate List
Figure 114 - Internet Explorer Data Point Login Screen
Type the user name and password in the corresponding boxes. Click on the checkbox to accept
the Terms and Conditions, and click the Sign In button (Figure 115).
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
121
29000169-005 Revision C1
Figure 115 - Internet Explorer Data Point Login Credentials
If correct login credentials were specified, the General configuration web page of the AP will appear, as
shown in Figure 116. If this screen appears the CAC certificate have been verified by the 3eTI device and
the OCSP responder. You now have access to the web GUI and can configure and manage the device.
Figure 116 - Internet Explorer Data Point General Configuration Web Page
B.3 Optional 3rd party Device Configuration Overview
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
122
29000169-005 Revision C1
3eTI has tested and validated the above capabilities using ActivIdentity ActivClient and Tumbleweed
Valicert Validation Authority software providing an end to end validation capability. It is recognized that
other OCSP based software may provide the same capabilities. This section is intended to provide an
overview of configuring the above software for use within a PKI network. More detail on how to use and
configure the software can be found in the respective user manuals for each product.
Configuration Procedure Web Client Configuration
Install the ActiveIdentity ActiveClient software as specified by the vendor
Obtain a valid CAC card (3eTI has validated this feature using a DoD CA-23 issued CAC).
Insert the CAC card into the smart card slot of the PC.
Once the ActivClient software recognizes the CAC, double click on ActivClient icon in the System
Tray to open the software window, shown in and navigate to Tools -> Advanced -> Make
Certificates Available to Windows, as shown in Figure 117
Figure 117 - ActivClient Certificate Export
Open Internet Explorer. Click on menu item Tools -> Internet Options. Click on Advanced tab
and scroll down to SSL/TLS options. Make sure that Use SSL 2.0 and Use SSL 3.0 options are
unchecked and Use TLS 1.0 option is checked, as shown in Figure 118.
The software is ready to be used, please refer to the appropriate software configuration documentation to
insure proper setup and operation.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
123
29000169-005 Revision C1
Figure 118 - Internet Explorer Security Options
OCSP Responder Configuration
Install the Tumbleweed Valicert Validation Authority software as specified by the vendor
Appropriate certificate and corresponding CRL available as described in previous sections (3eTI
has tested the configuration using DoD CA-23 issued CAC)
Open web GUI to the OCSP Responder and navigate to the CONFIGURATION -> Keys and
Certificates -> Certificates page. Verify that the certificate (CAC issuer certificate) is installed.
This is the same certificate that will be installed on the 3eTI Data Point.
If the certificate is not installed, click the Add button and load the certificate from the local file. This
is shown in the Figure 119.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
124
29000169-005 Revision C1
Figure 119 - OCSP Responder Certificates
Navigate to the CONFIGURATION -> CRLs -> Upload Crl screen and upload the correct
certificate from the local file.
Navigate to CONFIGURATION -> CRLs and OCSP Databases and verify that the certificate is
listed as shown in Figure 120.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
125
29000169-005 Revision C1
Figure 120 - OCSP Responder CRLs
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
126
29000169-005 Revision C1
Appendix C: Common Criteria Supplement
If the 3e-525A-3 product family is to be operated in a Common Criteria certified environment, the product
MUST be inspected upon arrival from 3e Technologies International. If the any of the red tamper-evident
tapes indicate that the product or its CDROM sleeve have been opened, the user is not to use the product
prior to contacting 3eTechnologies International:
Ultra Electronics, 3eTI
9713 Key West Avenue
Suite 500
Rockville, Maryland 20850 USA
Telephone: 1-800-449-3384
FAX: 1-301-670-6989
Once the product is in the user’s possession, it is the responsibility of the user to use and maintain the
product and its CDROM in a safe and secure manner as defined within this document. If the user finds any
issues of the product and deems that is security related, the user shall contact 3eTI at the address above.
In order to operate the 3e-525A-3 product in a Common Criteria certified environment, the following MUST
be carried out.
1. On the System Configuration Operating Mode GUI screen:
[FIPS 140-2 Mode] MUST be selected
2. The Administrator’s session timeout must be set to a minimum of 10 minutes.
To operate in the Common Criteria environment, the Crypto-Officer and Administrators must enforce the
following password policy. That is, all passwords required in the use of the 3e-525A-3 product must:
have a minimum length of 8 characters,
contain at least two uppercase characters (A, B, C, …) and two
lowercase characters (a, b, c, …),
contain at least two numeric characters (1, 2, 3, …),
contain at least two special characters,
have a 30 day expiration date,
not be a common word, a word in any existing password dictionaries, or a word easily guessed
(such as “password”).
To operate in the Common Criteria environment, all Crypto-Officers and Administrators responsible for the
3e-525A-3 product must be non-hostile and appropriately trained, and must follow all of the guidance
information contained in this document.
To operate in the Common Criteria environment, the 3e-525A-3 product (plus associated clients and the
3e-030-2 as appropriate) shall be installed with appropriate physical security, commensurate with the
value of the products and the data contained within.
CryptoOfficer and Administrator have different privileges in managing the device, the table below shows
the user-accessible functions and privilege all security parameters under the control of the user, indicating
secure values as appropriate each type of security-relevant event relative to the user-accessible functions
that need to be performed.
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
127
29000169-005 Revision C1
Categories
Features
Operators
Parameters
Audit Events
Crypto Officer
Administrator
Show1
Set2
Add3
Delete4
Show5
Set6
Add7
Delete8
System
Configuration
Operating
Mode
AP / Bridging Mode
FIPS
AP / Bridging Mode
Non-FIPS
X
X
X
X
X
X
X
FIPS/Non-FI
PS mode
None
Wireless Access
Point
Security
AES (128-/192-256-bit)
X
X
AES 128
key:
32 hex
digits
AES 192
key:
48 hex
digits
AES 256:
64 hex
digits
EVT_KEY_GENERATED
EVT_KEY_ZEROIZED
EVT_ENCRYPT_ALG_CHANGED
EVT_STA_ASSOC
EVT_SELF_TEST_ACTIVATED
FIPS 802.11i
X
X
Pre-Shared
EVT_KEY_GENERATED
EVT_KEY_ZEROIZED
1 The operator can view this setting
2 The operator can change this setting
3 The operator can add a required input. For example: Adding an entry to the MAC address filtering table
4 The operator can delete a particular entry. For example: Deleting an entry from the MAC address filtering table
5 The operator can view this setting
6 The operator can change this setting
7 The operator can add a required input. For example: Adding an entry to the MAC address filtering table
8 The operator can delete a particular entry. For example: Deleting an entry from the MAC address filtering table
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
128
29000169-005 Revision C1
Categories
Features
Operators
Parameters
Audit Events
Crypto Officer
Administrator
Show1
Set2
Add3
Delete4
Show5
Set6
Add7
Delete8
key:
64 hex
digits
Radius
Server IP:
valid
IPV4
address
Shared
secret:
10 to 95
characters
Backend
password:
10 to 95
characters
Backend
key:
10 to 95
characters
EVT_ENCRYPT_ALG_CHANGED
EVT_STA_ASSOC
EVT_SELF_TEST_ACTIVATED
Wireless Bridge
Encryption
AES (128-/192-256-bit)
X
X
AES 128
key:
32 hex
digits
AES 192
key:
48 hex
digits
AES 256:
64 hex
digits
EVT_KEY_GENERATED
EVT_KEY_ZEROIZED
EVT_ENCRYPT_ALG_CHANGED
EVT_STA_ASSOC
EVT_SELF_TEST_ACTIVATED
AES_CCMP
X
X
X
32 hex digits
EVT_KEY_GENERATED
EVT_KEY_ZEROIZED
EVT_ENCRYPT_ALG_CHANGED
EVT_STA_ASSOC
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
129
29000169-005 Revision C1
Categories
Features
Operators
Parameters
Audit Events
Crypto Officer
Administrator
Show1
Set2
Add3
Delete4
Show5
Set6
Add7
Delete8
EVT_SELF_TEST_ACTIVATED
Service Settings
SNMP agent
Enable/ Disable
Community settings
Secure User
Configuration
System Information
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
None
None
User Management
List All Users
X
X
X
X
None
None
Add New User
X
None
EVT_USER_AUTH_INFO
User
Password
Policy
Enable/Disable
Policy setting
X
X
X
X
passwd
complexity
enable/disa
ble
min passwd
length:
8 to 30
characters
max bad
passwd
entries
3 to 10
session
timeout
3 to 60
minutes
max passwd
age
30 to 90
days
uniqueness
EVT_USER_AUTH_INFO
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
130
29000169-005 Revision C1
Categories
Features
Operators
Parameters
Audit Events
Crypto Officer
Administrator
Show1
Set2
Add3
Delete4
Show5
Set6
Add7
Delete8
depth
3 to 10
characters
OSCP
enable/disa
ble
Monitoring /
Reports
System Log
Date/Time/Message
X
X
X
X
None
None
Web Access
Log
X
X
X
X
None
None
Auditing
Log
X
X
None
None
Report Query
X
X
None
None
Configuration
Enable/Disable
Selectable items
X
X
X
X
None
EVT_AUDIT_CFG_MOD
System
Administration
System
Upgrade
Firmware Upgrade
Local Configuration
Upgrade
Remote Configuration
Upgrade
X
X
X
X
X
X
None
None
Self Tests
Perform Cryptographic
algorithm KAT, key error
detection test, software
integrity check
X
X
None
EVT_SELF_TEST_ACTIVATED
Factory
Defaults
X
None
None
Remote
Logging
Enable/Disable
X
X
X
X
None
EVT_AUDIT_LOG_STATE_CHAN
AirGuard WiMesh 3e-523 Series User’s Guide
Copyright 2015 Ultra Electronics, 3eTI
October 2015
131
29000169-005 Revision C1
Categories
Features
Operators
Parameters
Audit Events
Crypto Officer
Administrator
Show1
Set2
Add3
Delete4
Show5
Set6
Add7
Delete8
Settings
X
X
X
X
GED
Reboot
X
X
X
None
None

Navigation menu