background image

 

DPtech WCS 7000 Series Wireless Access Controller User Configuraiton Guide 

 

19 

Item 

 

                                        Description  

Collisions  

Displays the collision number of the current network traffic. 

Receiving packet partition statistic 

(length) 

Displays the receiving packet partition statistic, according to the packet length to statistic. 

 

2.5  Administrator 

2.5.1  Introduction to administrator 

The Administrator feature provides user for adding, modifying, deleting administrator. User can log into web 

management interface according to different permission, different authentication method, and different Web access 

protocol and port.  

        Table2-6 describes the details of the administrator feature. 

Table2-6

 

Administrator management feature 

Item 

 

                                            Description 

Current administrator  

Displays  a  list  of  the  administrators  who  have  logged  into  web  management  interface.  Current 

administrator can kick out other administrator.  

Administrator settings 

You  can  add  or  delete  an  administrator,  and  modify  the  password  of  an  administrator,  and  the 

permission  of  an  administrator  who  isn’t  login  to  the  device,  and  modify  the  status  of  an 

administrator except the administrator itself.  

Administrator  authentication 

settings 

You  can  configure  the  login  authentication  parameter,  including  local  authentication,  Radius 

authentication and Tac Plus authentication.  

Logon parameter settings 

You can configure the Logon parameter, including timeout time, login lock times and unlock time. 

 

2.5.2  Administrator  

2.5.2.1 Current administrator 

Current administrator lists the administrators who have logged into device. 

Select 

AC > System management > Administrator > Administrator 

from navigation tree to enter the 

current administrator page, as shown in Figure2-19. 

Summary of Contents for WCS7000 Series

Page 1: ...i DPtech WCS7000 Series Wireless Access Controller User Configuration Guide...

Page 2: ...upport If you need any help please contact Hangzhou DPtech Technologies Co Ltd and its sale agent according to where you purchase their products Hangzhou DPtech Technologies Co Ltd Address 6th floor z...

Page 3: ...oduct upgrading or other reasons information in this manual is subject to change Hangzhou DPtech Technology Co Ltd has the right to modify the content in this manual as it is a user guides Hangzhou DP...

Page 4: ...TO RMON 17 2 4 2 ALARM ENTRY 17 2 5 ADMINISTRATOR 19 2 5 1 INTRODUCTION TO ADMINISTRATOR 19 2 5 2 ADMINISTRATOR 19 2 5 3 CONFIGURATION RANGE 25 2 5 4 WEB ACCESS PROTOCOL SETTINGS 25 2 5 5 INTERFACE S...

Page 5: ...54 3 8 3 DHCP RELAY 55 3 8 4 DHCP IP ADDRESS TABLE 56 3 9 DIAGNOSTIC TOOLS 57 CHAPTER 4 AP MANAGEMENT 58 4 1 AP CONFIGURATION 58 4 1 1 AP TEMPLATE 58 4 1 2 AP CONFIGURE 62 4 1 3 AP BASIC INFORMATION...

Page 6: ...E 88 5 11 2 BLACKLIST QUERY 89 5 11 3 BLACKNAME LOG QUERY 89 5 12 MAC IP BINDING 90 5 12 1 MAC IP BINDING 90 5 12 2 AUTO LEARNING 92 5 12 3 USER MAC BINDING 93 5 12 4 USER IP BINDING 94 5 12 5 BINDING...

Page 7: ...ATION LOG 107 6 3 1 LATEST LOG 107 6 3 2 OPERATION LOG QUERY 109 6 3 3 LOG FILE OPERATION 110 6 3 4 OPERATION LOG CONFIGURATION 110 6 4 SERVICE LOG 111 6 4 1 SERVICE LOG CONFIGURATION 111 CHAPTER 7 US...

Page 8: ...18 Figure2 19 Current administrator 20 Figure2 20 Administrator settings 20 Figure2 21 Administrator authentication settings 23 Figure2 22 Logon administrator settings 24 Figure2 23 Configuration ran...

Page 9: ...58 Figure4 1 AP configuration 59 Figure4 2 AP configure 62 Figure4 3 AP basic information 64 Figure4 4 AP version control 64 Figure4 5 Basic configuration 65 Figure4 6 STA display management 65 Figure...

Page 10: ...Session log configuration 97 Figure5 37 bandwidth guarantee basic set 97 Figure5 38 Traffic classification 98 Figure5 39 Congestion avoidance 99 Figure5 40 Congestion management 99 Figure5 41 Traffic...

Page 11: ...object 37 Table3 2 Address object group 38 Table3 3 MAC group 39 Table3 4 MAC address table 40 Table3 5 Displaying basic routing table 43 Table3 6 Displaying detailed routing table 43 Table3 7 RIP ad...

Page 12: ...le5 18 Blacklist log query 89 Table5 19 MAC IP binding 91 Table5 20 Switches table 92 Table5 21 Auto learning 92 Table5 22 User Mac binding 93 Table5 23 User IP binding 94 Table5 24 binding log query...

Page 13: ...ies Co Ltd for the telecom operators It can realize wireless network comprehensive management for FIT AP AC mode and simply network configuration realizing network monitoring status and enhance networ...

Page 14: ...ddress is 192 168 0 1 Both of the default username and the default password are admin You can use the default username for the first login but it is strongly recommended that you should change your pa...

Page 15: ...sts all of the Web management function menus You can choose the desired function menu which is shown in the configuration area Shortcut area Shows the directory of the current page as well as the stat...

Page 16: ...device and system related management functions including Device management SNMP configuration RMON configuration Administrator Configuration file Signature database Software version NTP configuration...

Page 17: ...nd device hardware related information includes system name system time system time zone memory size external memory information device serial number PCB hardware version software version factory defa...

Page 18: ...apacity of the hardware device Device serial number Displays the serial number of the hardware device PCB hardware version Displays the version information of hardware PCB Software version Displays th...

Page 19: ...isplays memory real time utilization If the memory usage exceeds the threshold is displayed otherwise is displayed Harddisk usage Displays harddisk real time utilization If the harddisk usage exceeds...

Page 20: ...ystem management Device management Configuration Information settings from navigation tree to enter the device information page as shown inFigure2 4 Figure2 4 Device information settings System name f...

Page 21: ...select the Chinese log option or the English log option for the log sending method Select AC System management Device management Configuration Information settings from navigation tree to enter the l...

Page 22: ...imit and upper limit of the CPU temperature threshold Mainboard usage threshold Configure the lower limit and upper limit of the mainboard temperature threshold To configure the system threshold you s...

Page 23: ...cator on the device status page will become red meanwhile please contact administrator to solve the problem 2 2 3 2 System parameter settings System parameter settings is mainly to configure the fast...

Page 24: ...ce SNMP features the following advantages Automatic network management Network administrator can utilize SNMP platform on the network node retrieving information modifying information and discovering...

Page 25: ...A community name plays a similar role as a password and can be used to control access from NMS to Agent SNMP packets with community names that do not pass the authentication on the device are simply d...

Page 26: ...hentication protocol can be selected For the authentication password if you don t select None option you can enter the authentication password For the encryption algorithm if you don t select None opt...

Page 27: ...the left box Click Ok button in the upper right corner on the webpage IP address list will take effect immediately 2 4 RMON Configuration 2 4 1 Introduction to RMON Remote Monitoring RMON realization...

Page 28: ...table Packet loss event Displays the event number of network packet loss Number of bytes Displays the number of bytes of the current network traffic Packet number Displays the packet number of the cur...

Page 29: ...lays a list of the administrators who have logged into web management interface Current administrator can kick out other administrator Administrator settings You can add or delete an administrator and...

Page 30: ...rator who has logged into the device Operation Click kick out icon that a logged in administrator can be quitted forcedly 2 5 2 2 Administrator settings Administrator settings allow user to create mod...

Page 31: ...ission for the administrator Configuration permission has 5 levels 1 to 5 the minimum number has the highest privilege Advanced configuration Configure the IP address of the administrator which has lo...

Page 32: ...n the upper right corner on the webpage Caution Default password can t be used when you add an administrator You should create the password corresponding to the rule You cannot lock an administrator w...

Page 33: ...icate the username and password of the administrator through Radius server Server address Authentication port number Shared key Authentication packet timeout time Authentication packet retransmission...

Page 34: ...ttings Configure the timeout time for the current administrator If the administrator didn t perform any operations in that time the system will quit the administrator forcedly Login locked times The a...

Page 35: ...nterface which can configure all modules System configuration Administrator can access to the web management interface which can configure system management and network management module without the m...

Page 36: ...er HTTPS protocol configuration Allows you to enable HTTPS protocol and configure the port number To enhance security you can enable the administrator certificate authentication if you configured digi...

Page 37: ...er management Remote user management feature allows user to set the login method of remote user and configure the maximum number of remote login user Select AC System management Administrator Remote u...

Page 38: ...nfigure one of them and export configuration to the local disk and then import it from local disk for other device so that it can avoid user to repeat configuration Select AC System management Configu...

Page 39: ...lick Browse button behind the file path and then select a configuration file click Download configuration file button The downloaded configuration file exists in the configuration file list and then c...

Page 40: ...rsion will run File path Software version download file path Click Browse button and then select a software version file and then click Download software version button Download address Software versi...

Page 41: ...server mode Table2 17 NTP server mode Item Description NTP server address Configure IP address and domain name for the NTP server Is it a primary server Select whether the server is a primary server N...

Page 42: ...authentication To configure the NTP client mode Select NTP client mode as NTP configuration Configure NTP server address or domain name Select whether to enable the authentication function Click Ok b...

Page 43: ...on ARP configuration DNS configuration DHCP configuration BFD configuration Diagnostic tools Lan Switch Figure3 1 Network management menu 3 2 Interface management Interface management is used to view...

Page 44: ...terface you should configure the IP address of layer 3 Select AC Network management Interface management Network configuration from navigation tree as shown in Figure3 2 Figure3 2 Network configuratio...

Page 45: ...VLAN ID in batch and allows user to view the type and include which port Select AC Network management Interface management VLAN configuration from navigation tree as shown in Figure3 4 Figure3 4 VLAN...

Page 46: ...rity zone Select AC Network management Network object Security zone from navigation tree to enter the security zone page as shown in Figure3 7 Figure3 7 Security zone 3 3 2 IP address IP address funct...

Page 47: ...roup Policy reference Displays the policy to be applied on the user group Operation Click copy or delete icon to copy or delete the user group To create an address object you should Click copy icon of...

Page 48: ...it Select an IP address object and drag it to the right box to the IP address object group Click Ok button in the upper right corner Caution Click modify icon to modify IP address object group Click d...

Page 49: ...Click add icon of MAC address group and enter a name Select a MAC address object and drag it to the right box to the new created MAC address object group Click Ok button in the upper right corner Caut...

Page 50: ...f the VLAN to which the MAC address belongs Out port Displays the out port of MAC address Type Displays the type of MAC address 3 4 Forwarding configuration 3 4 1 Forwarding configuration Select AC Ne...

Page 51: ...nk layer address and forward the packet only after the next hop address is specified When specifying the output interface note that If the output interface is a Null 0 or loopback interface there is n...

Page 52: ...IPv4 unicast routing Static route Monitoring from navigation tree to enter the health check page as shown in Figure3 15 Figure3 15 Health check 3 5 2 Routing table 3 5 2 1 Displaying basic routing tab...

Page 53: ...search the routing table as all routes or specific destination segment protocol as shown in Figure3 17 Figure3 17 Displaying detailed routing table Table3 6 describes the configuration items of displ...

Page 54: ...function Select AC Network management IPv4 unicast routing Equal cost route from navigation tree to enter the equivalent routing page as shown in Figure3 18 Figure3 18 Equivalent routing 3 5 4 RIP 3 5...

Page 55: ...Allows you to configure garbage collection timer Table3 8 describes the configuration items of the RIP interface configuration Table3 8 RIP interface configuration Item Description Interface name Disp...

Page 56: ...algorithm according to collected link states so no route loops are generated Area partition Allows an AS to be split into different areas for ease of management and routing information transmitted be...

Page 57: ...Add or delete NBMA neighbor of the device Introduced route Configure the introduce route of the OSPF protocol GR capacity settings Configure the GR capability GR timeout time Configure the GR timeout...

Page 58: ...for the area configuration Configure the advanced configuration for the area Click Ok button in the upper right corner on the webpage Table3 11 describes the details of the OSPF interface configurati...

Page 59: ...om navigation tree to enter the Displaying OSPF interface information page as shown in Figure3 22 Figure3 22 Displaying OSPF interface information Table3 12 describes the details of the displaying OSP...

Page 60: ...3 Displaying OSPF neighbor information Item Description Querying item Allows you to select an item to be queried Keyword Interface information that contains keyword Neighbor ID Displays the ID number...

Page 61: ...eiver But it is not enough to have an IP address because IP data packets must be encapsulated into a frame that can be sent through the physical network so it needs a mapping from IP address to physic...

Page 62: ...nterface which receives the ARP packet Operation Click the copy icon to copy a static ARP entry Click the delete icon to delete a static ARP entry 3 6 3 Gratuitous ARP sending In a gratuitous ARP pack...

Page 63: ...igation tree to enter the DNS configuration as shown in Figure3 27 Figure3 27 DNS To configure DNS configuration you should Enter an IP address for the preferred DNS server IP Enter an IP address for...

Page 64: ...rver Select AC Network management MPLS DHCP server from navigation tree to enter the DHCP server page as shown in Figure3 28 Figure3 28 DHCP Server Table3 16 describes the configuration items of DHCP...

Page 65: ...copy icon to copy an entry of the DHCP host address Click delete icon to delete an entry of the DHCP host address To configure DHCP address pool you should Select an interface In the address pool col...

Page 66: ...ows you to Operations Click the delete icon and then you can delete the address pool To configure the DHCP relay configuration you should Enable DHCP relay agent function In the DHCP relay list column...

Page 67: ...ls The diagnostic tool Ping command is used to detect whether a host is alive or detect whether the network is connected By using of Ping command users can inspect whether a specific IP address is rea...

Page 68: ...can share the resource of wired local area network by AP even in the wide area network resources Theoretically if a wireless AP increased in the network it can expand its network covering diameter man...

Page 69: ...nsmit power Configure the wireless radio transmit power 11n configuration Configure several parameter of the 11n Includes spatial flow channel bandwidth A MPDU A MSDU packet sending intervals Wireless...

Page 70: ...s DTIM Period 1 255 default is 1 Number of beacon intervals between delivery traffic indication message DTIM transmissions The AP sends buffered broadcast multicast frames when the DTIM counter reache...

Page 71: ...dden option Advanced configuration QOS option allows you to enable or disable QOS STA isolation allows you to enable or disable the STA isolation function Black white list if you configure the black l...

Page 72: ...2 AP configure Table4 4 describes the details of AP configuration Table4 4 Viewing AP Item Description Serial number Displays the serial number of the AP settings Basic information Type displays the t...

Page 73: ...n reliability Beacon interval time unit 100 1000 default is 100 interval for sending beacon frames Beacon frames are transmitted at a regular interval to allow mobile clients to join the network Beaco...

Page 74: ...equence number of the AP basic information Type Displays the type of AP device Serial number Displays the serial number of the AP device SSID group Displays and sets the SSID group Description Conveni...

Page 75: ...figure the software version download path Operation Click copy icon to add software version control policy Click delete icon to delete software version control policy 4 1 5 Basic configuration Select...

Page 76: ...e associate with STA Description Displays the AP description information of the AP associate with STA State information Uplink flow total uplink flow Downlink flow total downlink flow Rate state conne...

Page 77: ...inFigure4 9 Figure4 9 BLACK NAME Management Table4 8 describes the details of the black white list management Table4 8 Black white list management Item Description Sequence number Displays the serial...

Page 78: ...service module can control Packet filtering policy IPv6 packet filtering NAT NAT_PT Basic attack protection Session limit Service limit IPV4 Basic DDOS Blacklist MAC IP Binding Session Management QoS...

Page 79: ...the source domain destination domain originator source IP originator destination IP originator source MAC originator destination MAC service IP fragment flow re mark action for every data packet Selec...

Page 80: ...range of packet destination MAC Service Select a service for the packet filtering policy IP fragment Select whether to permit fragment packet passing through the device Valid time Select a time range...

Page 81: ...icy Per IP rate limitation Select per IP limitation rule which will apply to the packet filtering policy Access control Select access control rule which will apply to the packet filtering policy URL f...

Page 82: ...match packet filtering policy The default is that interface with higher security level can access the interface with lower security level but interface with lower security level cannot access higher s...

Page 83: ...ination port code Displays the destination port code of the packet filtering policy Inbound interface Displays the inbound interface of the packet filtering policy Outbound interface Displays the outb...

Page 84: ...filtering policy 5 4 NAT 5 4 1 Introduction to NAT NAT Network Address Translation provides a way of translating the IP address in an IP packet header to another IP address In practice NAT is primari...

Page 85: ...d the pre defined service object Public IP address pool Configure the public address pool of the source NAT policy Operation Click copy icon to copy an item of the source NAT policy Click delete icon...

Page 86: ...ed configuration of the destination policy Operation Click copy icon and then you can copy a destination NAT policy Click delete icon and then you can delete a destination NAT policy To configure dest...

Page 87: ...plays the inner address of one to one NAT policy Public address Displays the public address of one to one NAT policy Operation Click the copy icon and then you copy a one to one NAT policy Click the d...

Page 88: ...l policy Click delete icon and then you can delete an address pool policy To configure address pool configuration you should Click icon of the address pool Configure the ID number Configure the start...

Page 89: ...t in principle It can be simply understand that the NAT technology translate IPv4 private network address to the public network address in order to solve the problem of IPv4 public network address lac...

Page 90: ...work with attack packets which interference hosts receiving normal packets Basic attack protection block attack packets and send logs to a remote host or displays logs on local device Select AC Advanc...

Page 91: ...he attack count Clear counter Clear the attack count statistics Time interval per second Select how much time it sending log per second Terms interval Select how many log it report the new log To conf...

Page 92: ...the attack Action Displays the action for the attack To query the basic attack log query In each item enter the parameter that you want to query Click Query button then you can view the searching resu...

Page 93: ...o enter the defend object management page as shown in Figure5 18 Figure5 18 Defend Object Management Table5 12 describes the details of Defend Object Management Table5 12 Defend Object Management Item...

Page 94: ...uration and tendency from navigation tree to enter the traffic status and monitoring page as shown in Figure5 19 Figure5 19 Traffic status and monitoring Table5 13 describes the configuration items of...

Page 95: ...reshold Set the number of the threshold To modify DDOS defend settings you should click Open checkbox and select manual configure threshold and auto learning threshold option Configure a number for th...

Page 96: ...endency 5 10 1 1 Protection History Select AC Firewall Advanced DDOS Protection Protection history from navigation tree to enter the protection history page as shown in Figure5 22 Figure5 22 Protectio...

Page 97: ...t Select AC Firewall Advanced DDOS Protection Protection history Traffic Trend chart from navigation tree to enter the traffic trend chart page as shown in Figure5 23 Figure5 23 Traffic Trend Art 5 10...

Page 98: ...ick the Enable blacklist option IP address mask Specifies the IP address to be blacklisted Source IP Displays the entry of the remaining life time in which you can view the remaining time of blacklist...

Page 99: ...id time Remaining time Displays the remaining time and the time when you create the black list Cause Displays the add reason of a blacklisted IP address 5 11 3 Blackname Log Query Select AC Advance Bl...

Page 100: ...rt button to export blacklist log to CSV file Click Delete button to delete the logs that you have searched on the black list log query page 5 12 MAC IP Binding 5 12 1 MAC IP Binding MAC IP binding is...

Page 101: ...method Operation Click the icon and then you can copy a binding record from the table Click the icon and then you can delete a binding record from the table To create MAC IP binding rule you should E...

Page 102: ...e webpage 5 12 2 Auto learning device can analyze network traffic and automatically learn MAC and IP address You should add the binding information to the system ARP form Select AC Advance MAC IP bind...

Page 103: ...ser MAC Binding Select AC Advance learning User MAC binding from navigation tree to enter the user MAC binding page as shown in Figure5 30 Figure5 30 User MAC binding Table5 22 describes the details o...

Page 104: ...nding Item Description Username The user IP binding function provides user with two kind of methods of User IP binding including manual configure and auto learn methods IP address Configure an add IP...

Page 105: ...binding log query table Detailed information Displays the detailed information about binding log query To query the MAC IP binding log you should Enter the parameters that you want to query Click Que...

Page 106: ...as shown in Figure5 33 Figure5 33 Session list 5 13 2 Session Parameter Select AC Advance Session Management Session Parameter page from navigation tree to enter the session parameter page as shown i...

Page 107: ...uration page as shown in Figure5 36 Figure5 36 Session log configuration 5 14 QoS QoS can ensure bandwidth with configuring VIP bandwidth guarantee and traffic classification 5 14 1 VIP Bandwidth Guar...

Page 108: ...y a VIP bandwidth guarantee rule Click delete icon and then you can delete a VIP bandwidth guarantee rule 5 14 2 Traffic Classification Select AC Advance QOS Traffic classification from navigation tre...

Page 109: ...enabled The minimum rate of dropping package Set the minimum rate of dropping package The maximum rate of dropping package Set the maximum rate of dropping package Operation Click copy icon and then...

Page 110: ...low priority protected Priority setting Configure the congestion management priority settings Operation Click copy icon and then you can copy a rule of congestion management Click delete icon and then...

Page 111: ...fing VLAN ID Displays the VLAN ID scanned by anti arp spoofing Interface Displays the interface scanned by anti arp spoofing Type Displays the obtaining method of anti arp spoofing 5 15 2 ARP Configur...

Page 112: ...raiton Guide 102 Figure5 43 ARP configuration Table5 29 describes the details of ARP configuration Table5 29 ARP configuration Item Description Interface name Displays the all interfaces name of the d...

Page 113: ...n log Business log Select Basic Log management from navigation tree to enter the log management menu as shown in Figure6 1 Figure6 1 Log management menu 6 2 System Log 6 2 1 Latest log The system log...

Page 114: ...ch column that you can view system logs displayed as ascending or descending order Table6 1 Latest log Item Description Serial number Displays the serial number of latest system log Time stamp Display...

Page 115: ...ror and warning White shading color stands for status information unknown information 6 2 2 System Log Query System log query function allows users to query the system log as their requirement Select...

Page 116: ...file operation function allows you to backup or delete one day s logs Select AC Log management System log Log file operation from navigation to enter into system log file operation page as shown in Fi...

Page 117: ...figuration items Table6 4 System log configuration items Item Description Output to remote syslog server Set remote syslog server parameters including Remote syslog server IP address Service port Time...

Page 118: ...enerating Client type Displays the type of client who generate operation log including Web means administrator manages the device through web Console means administrator manages the device through con...

Page 119: ...en the system prompt you that you can open or save the CSV file to your local system Click Query button to view the logs you have queried Click Jump to and Page right drop down list you can view the s...

Page 120: ...r local system If you want to delete one day s system logs Click Delete button to delete the system log file Table6 7 describes the details of operation log configuration items Table6 7 Operation log...

Page 121: ...erver IP address Service port Time stamp Days for saving Select the max saving day for system log file and then system will delete the expired system log file You can select one week two weeks or thre...

Page 122: ...o select brief log option Audit log Allows you to select whether to enable audit log sending to server function Local save audit log Allows you to select audit log local save function Log aggregation...

Page 123: ...figuraiton Guide 113 Item Description mail address User name Set the mail server username Password Set the mail server password Number of e mails sent out per minute Configure a number for e mail sent...

Page 124: ...ate their user name and password before access to the Internet Authentication Config Web Auth Notice Behavior Listen Proscenium Management Terminal Management Online User Local User Select AC User aut...

Page 125: ...ction Avoid auth IP Allows you to set the free authentication IP address User group Allows you to select a user group Auth mode Allows you to select and configure authentication mode Unique authentica...

Page 126: ...Allows you to use proxy server to authenticate web users and allows you to configure the proxy server IP address HTTP HTTPS Allows you to enable authenticate HTTP HTTPS configuration Using USB key All...

Page 127: ...Client download URL Type client download URL for the TAC configuration MAC match Select whether to enable the MAC match function Aged by traffic Select whether to enable the aged by traffic function...

Page 128: ...ms of the customer configuration Table7 4 Customer configuration Item Description Login page Select an option that the login page will skip to the specific page Default Upload the return page URL addr...

Reviews: