Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Include Page
_IW Academy
_IW Academy

Hide_comments

The "General Security settings" section allows to configure basic system parameters, described in the table belowdevice access and security settings.

This section includes two main csubsectionsfollowing subsections:

Table of Contents
minLevel2

Unit

...

Administrator access

Here you may change system administrator account login and password, to change the identification data, click the "Change admin password" button. We strongly recommend you to set a login and password after the first login to the device.

Scroll Title
title-alignmentcenter
titleFigure - Admin access

Image Added

Radius AAA

Here you may configure a device access control using a remote RADIUS server.

Center
Scroll Title
Unit
title-alignmentcenter
titleRadius server parameters description
Access Key
ParameterDescription
Device NameThe arbitrary wireless unit name which will be used by network administrators for unit identification. It will be shown in Web GUI side panel.
Link ID

Wireless link identificator used to avoid connecting a unit to a wrong peer if there are several co-located units using the same center frequency. Specify different ID values for different links. Both ends of the same link must have the same ID.

AddressSet the RADIUS server IP address.
Port

Set the RADIUS server port.

Secret

Set the server password.

Scroll Title
title-alignmentcenter
titleFigure - RADIUS parameters

Image Added

Command line interface

Allows to enable / disable remote device control by the command line using Telnet and SSH protocols.

SSH (Secure Shell) protocol provides secure remote control to network devices. Its functionality is similar to the Telnet protocol, but, unlike Telnet, SSH encodes all protocol messages, including transmitted passwords. By default, only access via Telnet is enabled.

Scroll Title
title-alignmentcenter
titleFigure - Access protocols

Image Added

Network access

This section is used to create a list of subnets from which access to the device will be allowed.

Scroll Title
title-alignmentcenter
titleFigure - Network access

Image Added

Radio authentication settings

Units at both ends of the wireless link should authorize each other before link establishment.

...

 Access key must be up to 64 characters long, without spaces

...

and must be the same at both ends of the link

...

.

Figure Unit parameters
Scroll Title
title
-

Image Removed

Account

Here you may change system administrator account login and password.

Note
titleNOTE

By default there is no login and password set. In security causes it's very important to set them before any configuration activities with the unit.

Center
Scroll Title
titleFigure - Account parameters

Image Removed

Regulatory domain

Regulatory domain automatically limits the wireless device operation which is may be needed to meet the local law requirements. Each regulatory domain may limits the following parameters:

  • Range of available center frequencies
  • Requirement of use LBT (Listen Before Talk) technique.
  • Maximum EIRP (Equivalent Isotropically Radiated Power) value.
  • Requirement of use radar detection technique.
Image Removed
Center
Scroll Title
titleFigure - Regulatory domain settings
alignmentcenter
titleUnit parameters description

Image Added