RWV Reference Guide 1 13
RWV Reference Guide 1 13
RWV Reference Guide 1 13
Version 1.13
Website at http://www.demarctech.com
Downloads / Updates
• For firmware downloads and updated information, Please visit: http://www.demarctech.com/ on
the software downloads page
• All Modes (RWV-2/3/4XXX) act as a Client unit, which enables the end user to access the
Internet connection from more than one machine with either standard or NAT IP addresses.
• All Models (RWV-2/3/4XXX) act as an AP (Access Point) unit, which allows wireless
connections and routing on the ISP side of the Internet service.
• RWV Servers (RWV-4XXX) only acts as an IS (Internet Server) with the following services:
DNS, Transparent caching-Proxy, Routing, NAT, DHCP, Firewall, and Bandwidth Control.
• All Models (RWV-2/3/4XXX) act as a Router with the following services: Routing, NAT,
DHCP, Firewall, and Bandwidth Control.
Features
• Each interface can contain up to 255 IP addresses with the ability to enable, disable and add
comments to each one
• One interface can be selected to be configured by DHCP.
• Bandwidth shaping based IP and/or Protocol with optional Auto Fallback.
• Firewall scripting interface provides the ability to set up and protect your network in no time
• Up to 255 static routes are supported, ability to enable, disable and add a comment to each
route
• Full support for the 802.1d Spanning Tree Protocol
• Ability to set up large amounts of static and dynamic NAT rules
• Support for 250 simultaneous wireless station associations
• Signal Strength Meter, for easy client antenna alignment or signal level troubleshooting.
• Ability to monitor both noise level and connection rate for each link to the AP
• Ability to monitor each client's MAC address, and assign a name for easy tracking
• Monitor last used IP address, so you can see in an instant what IP your customer is using
• RX and TX data transfer statistics for both Ethernet and Radio interfaces
• Remote firmware Upgrade
• DHCP server with the ability to group, manage and assign IP’s dynamically or statically
• DHCP Proxy to forward DHCP requests to a remote DHCP server
• SSH (v2) server is provided to allow for remote configuration of the server
• Remote Report Viewing via telnet ports of system specific information
• Proxy Server with the ability to do Web and FTP caching (Internet Server)
• Recursive DNS Server to help preserve valuable bandwidth (Internet Server)
• Eezee configuration
• “Captive Portal” web login hotspot
• RIP, OSPF and BGP4+ routing
• PPPoE, PPTP Tunneling protocols
• Radius server and authentication for PPPoE, PPTP and Hotspot authentication (Internet
Server)
RWV Base Station - Router Setup Quick Start Guide
Step 1: Logging in: Using a SSH you will be provided with a login prompt. The default
username is "admin" and the default password is "1234". You should change this as
soon as possible (see section 7 for instructions).
Step 2: Setting up the Ethernet cards: Under the Interfaces menu choose Ether1 then IP
Assignments menu. Click the Create button to give the card an IP address. The IP you
provide will be the address that the RWV will use to connect to the up-stream network.
Continue by choosing Ether2 as needed for local networks that will be connecting to the
RWV through Ethernet ports. Under each interface click the Create button to give the
card an IP address. The IP you provide will be the address that the machines on each of
these local networks will use as their gateway address.
Step 3: Setting up the Wireless cards: Under the Wireless menu, select the wireless card you
wish to setup, and then select Config Current Card. If this wireless card is to be an
Access Point Set the ESSID you wish to use and select Access Point in the Network
Type field. If this wireless card is NOT to be an Access Point Set the ESSID field to the
ESSID of the Access Point that it will be connecting to and select Infrastructure in the
Network Type field.
Step 4: Continue setting up the Wireless cards: Under the Interfaces menu choose the
wireless interface wish to setup then IP Assignments menu. Click the Create button
and provide the wireless card with the IP address and subnet mask. The IP you provide
will be the address that the RWV on your wireless networks will use as their gateway
address.
Step 5: Set up routing: Under the Routing menu, select Static and Default Routes. Click on
the 0.0.0.0/0 route and click on Edit. Enter your gateway address and click on Make
Default Route. Click on OK and close window. Also setup a static router for each IP
subnet that was set for each interface.
Step 6: Select the File menu and Save Change. Select the File menu and Activate Changes
RWV Base Station - Bridge Setup Quick Start Guide
Step 1: Logging in: Using a SSH you will be provided with a login prompt. The default
username is "admin" and the default password is "1234". You should change this as
soon as possible (see section 7 for instructions).
Step 2: Setting up the Ethernet cards: Under the Interfaces menu choose Ether1 then IP
Assignments menu. If needed select the default IP 192.168.1.1 then click the Edit
button to change the card the IP address. The IP you provide will be the address that the
RWV will use to connect to the up-stream network. On the bottom of this screen change
the Ethernet Bridge Number to 1.
Step 3: Setting up the Wireless cards: Under the Wireless menu, select the wireless card you
wish to setup, and then select Config Current Card. If this wireless card is to be an
Access Point Set the ESSID you wish to use and select Access Point in the Network
Type field. If this wireless card is NOT to be an Access Point Set the ESSID field to the
ESSID of the Access Point that it will be connecting to and select Infrastructure in the
Network Type field.
Step 4: Continue setting up the Wireless cards: Under the Interfaces menu choose the
wireless interface wish to setup then IP Assignments menu. On the bottom of this
screen change the Ethernet Bridge Number to 1. Note: in bridge mode only the
Ethernet interface will have an IP not the wireless.
Step 5: Select the File menu and Save Change. Select the File menu and Activate Changes
User Interface
First Login
The factory default IP for the system is 192.168.1.1. You can interface with the device by connecting
to your computer via the Ethernet port. You will require a SSH client in order to access the user
interface. PuTTY, a freeware SSH client, is available for download via a link on our tech support
page (http://www.demarctech.com).
Execute the putty program. In the Host Name (or IP address) box, type in the default IP
address (192.168.1.1). Make sure that the SSH radio button is active. Save your session
and then click the Open button.
The following instructions for the User Interface are for both methods of connection. In order to make
changes, you will need to login to the device using 'admin' as your username and '1234' as your
password. (You will be able to change your password once you enter the configuration utility)
Once the correct username and password are entered, the configuration screen will appear.
System Configuration
This is the main display. It provides a “heads-up” of the system’s current status including memory
usage, CPU utilization, active services and network usage.
The top of the screen has several menu options that are used to configure and manage the system.
You may navigate the menus using either your keyboard, or a mouse.
If you are using an SSH program such as Putty or SecureCRT you can navigate the menu system
using your mouse!
Several hot-keys are also available in the main screen and throughout the RWV’s interface:
• F1-F10 will display a list of users currently associated with each Wireless interface on your
system. For example, pressing F2 would display associated users on the second Wireless
NIC.
• F9 brings up the kernel message log. This displays low-level information about the system
and is useful for debugging.
• F10 will activate the file menu.
Using the keyboard
Please note, you may use a mouse to point, click, double click, and select text but you can also
navigate through the system faster by using these shortcuts:
Pressing ALT-A 7 2 will bring up the advanced firewall and port forwarding screen
• The 'Esc' key will close the active window and allow you to back out of menu choices
• The 'Enter' key will choose the currently highlighted selection
• When selecting text, 'Ctrl+K+B' will begin the text block. You may use the arrow keys to
move the selection area to the desired size.
• 'Ctrl+C' is the command for Copy, 'Ctrl+X' is the command for Cut, 'Ctrl+V' is the command
for Paste, and 'Ctrl+Y' is the command for delete line.
• When text is selected, the 'Del' key will delete the selected text.
• Because the user interface is text based, when selecting text with a mouse, you will not see
the selection until after the mouse button is let up.
• Whenever you make changes to Ethernet card setting, Wireless card setting, or any other
settings (routing, DHCP, NAT, DNS, etc.) you need to save and activate your changes before
the services or settings will take effect.
A note about making, saving and activating changes.
Any changes you make will not be made, or saved, immediately. You must use the Activate
Changes command located in the File Menu for changes to come into effect.
Likewise, any changes you make will not be saved. If the system is rebooted, the changes will be lost.
You must Save Changes for your new settings to take effect the next time the system is rebooted.
The admin password must be changed when you have logged in. To do this, select the System
menu and choose Change Password.
The software will ask for you to confirm the Change Password choice. Once you confirm your
choice, you will be led through the steps of changing your password.
Please be sure to save your changes under File menu, Save Changes.
Failing to change the admin password from the default of 1234 is a sure way of having
someone tamper with your system! Change it!
Updating RWV’s
• New versions of the firmware are released on a fairly regular basis. To update the software, you
will need a copy of rwv-util-xx.exe available from http://www.demarctech.com/ on the software
downloads page
Step 1: Download the latest .bin firmware update release and rwv-util-xx.exe from our website.
Step 3: The firmware will upload to the RWV system. When the new firmware has been uploaded
you will see a message similar to, “Please select the ‘Upgrade Firmware’ option on the server to
finish.”
For example, if you wish to extend a 5.8 link, try using a value of 400 or more as a
starting point.
All values are 1/4 of a microsecond (usec). 100usec equals an ACK value of 400
Country Code Specifies the regulatory region that the system is operating in. Please refer to the
Regulatory Country Codes table for a list of supported regions.
TX Power Override the card’s default power output. Valid values are 1 to 30 dBm.
Override Note: Max values will only be what the radio is capable of and not more.
Network Type Sets the card to act as either an Access Point, or a Station which connects to an
access point. Ad-Hoc is presently not supported.
Operating This determines what protocols the card will operate in. By default, auto mode is
Mode enabled.
Setting up an Access Point with the Prism 2.5 Radio
From the Wireless menu click the wlan device you want to act as the Access Point and select the 1
config current card menu option.
ESSID The name of your Wireless Network that clients will connect to.
Station Name A descriptive name of this device, suggested examples include “lobby AP”,
“internet gateway”, etc.
RTS Threshold For advanced users only! Adjusts the RTS fragmentation threshold. Click
on the HELP button for more information on what this does.
Network Type Specifies the mode this Access Point will operate in. Select Access Point
to have this radio act as a master repeater in the Wireless Network. Select
Ad-Hoc/IBSS if you want this radio to act in a Peer to Peer network that
does not use an Access Point.
AP Stealth Turns off beacons that announce the presence of your network. This
function can help deter some war drivers but should not be solely relied
upon for security.
InterBSS Relay Allows associated wireless clients to communicate between each other.
Rate Control Specifies the maximum speed that your clients can connect to this access
point at.
Use fw v1.71 (Intersil Prism cards only!) Some cards may exhibit problems acting as an
and v1.74 access point. If you have difficulties using a Prism based radio as an AP,
check this box.
1. The SSID should be set to the same name as the Access Point you are connecting to.
2. The Network Type should be set to Infrastructure (or Station, if you are using an Atheros
device).
If you are connecting to an Ad-Hoc network, set the Network Type to Ad-Hoc/IBSS. Please note
that Ad-Hoc is not supported with Atheros.
IP Address Configuration
You will need to assign an IP address to each Network interface (Ethernet and Wireless) in your RWV
system when setup as a router. Your Internet Service Provider may have provided a range of
addresses for you to use. If you do not have IP addresses from your ISP, you can also used
addresses out of the Private Internet Address Space:
By default, the first Ethernet adapter in your RWV system will be configured to use the following
settings:
• IP Address: 192.168.1.1
• Netmask: 255.255.255.0
• Default Gateway: none
IP Address settings are configured from the interfaces main menu. From the interfaces menu, select
the network interface to configure, and then choose the ip assignments option.
A list of IP Addresses on the Network Interface will be displayed. From here, you may Create,
Remove, Edit or Enable/Disable an address.
• Addresses listed with a * beside them are Disabled. This can occur for a variety of reasons:
o The Address is already in use by another system on the network.
o The address may be configured on another interface in the same RWV system.
o You manually disabled the address.
When editing or adding an address, a dialog similar to the one below will be shown. Enter the IP Address,
the Network Mask and an optional comment.
Assigning IP addresses to your users
Using DHCP
Example:
This configuration will automatically configure client computers to use the following parameters:
o Domain Name: domain.com
o Name Servers: 192.168.1.254 and 192.168.1.253
o An IP address from 10.0.0.10 through 10.0.0.100
o A default router address of 10.0.0.1
Some customers may need a static IP address (for example: they may run an Email or Web server).
You can do so by adding a configuration block similar to:
host customers.name.foowireless.net {
# Your customer's MAC address
hardware ethernet 00:4F:4E:0D:12:FF;
# IP address to assign - not part of
dynamic IP group above
fixed-address 10.0.0.200;
}
To configure the DHCP relay server, select “configure service” from the dhcp relay server menu
under services.
Specify “Load service on boot” to have the service start at bootup time, and enter in the IP address of
your DHCP server.
IP Masquerading provides a mechanism for relaying a packet from your private network out to the
Internet by encapsulating it in a packet with a valid public IP number. Masquerading stuffs your local
workstation's real (private) IP address inside the packet, along with the rest of the packet's data, and
then puts a public IP address on the outside of the packet. Hence your workstation's packet is said to
"masquerade" as a packet with a valid IP address.
When the RWV is being used as a CPE (Customer Premise Equipment) with the wireless card being
the connection to the Internet via a RWV Base Station Server / Base Station Router or other AP
device.
The eth0 device is "inward facing", to the home network, and wlan0 device is "outward facing", to the
Internet. These two devices can be configured so that packets are permitted to flow, or be
"forwarded", from one device to the other. However, you don't want raw packets to be forwarded
between the two network devices without intervention.
We want to process the packets as they pass through the router by using software that will
masquerade our internal packets so they can travel to the Internet and then inspect the return
packets and then relaying the packets to the correct PC on the home network.
In addition you may want to inspect incoming packets for packets that shouldn't be coming in. That is,
you may want to establish a set of rules under Advanced Firewall and Port Filtering that define which
packets to let in, and which not to. You want to protect your internal network by filtering packets
through a set of firewall / filtering rules.
The assumption being made from this point on is that you have your two network devices working
properly. Your inward-facing NIC (e.g., eth0) is connected to your internal LAN and you can ping the
Station Router from all the workstations on your home network. Your outward-facing NIC (e.g.
wvlan0) is connected to your via a RWV Base Station Server / Base Station Router or other AP
device and you can ping the Station Router from a location external to your local network.
In order to route, or forward, network packets from your inward-facing device to your outward-facing
device, and vice versa, you must modify the configuration files under the Advances section in both
the Nat and Static Nat and Advanced Firewall and Port Filtering sections following instructions
included in those files.
Configuring the Caching Proxy Server (Server Only)
The Proxy Caching manages web requests from your clients and keeps a local copy of web pages
and their content. The cache can reduce the amount of bandwidth to the Internet by serving your
clients a local copy of a web page instead of having to retrieve it on each request.
A comprehensive list of configuration settings for Proxy Caching system is available from:
http://www.demarctech.com/XXXXX
You must have a hard drive installed into the system running the Proxy and/or Radius, the RWV
Server can not store this information on the flash device.
To prepare a drive for use, select the “prepare a hdd for proxy and radius use” from the services ->
caching proxy server menu.
Are you sure you wish to repartition the selected hard disk? [y/n]:
Answering ‘y’ will setup the disk for RWV Servers’s use. This will also delete any existing data on the
drive.
You will be asked if you want to create a SWAP partition. If you plan on running a heavily loaded
server without much memory, answer “Y”, otherwise answer “N”.
The RWV Server will start formatting the drive, you should see message similar to:
Partitioning disk...
Formatting disk...
• The bootup settings menu specifies whether the Radius server should be started on boot-up.
You probably want to enable this.
• The service activation menu allows you to Stop, Start and Restart the Radius server
immediately. You will need to restart the radius server for changes to the user or client database
to come into effect.
The users database is a plain text file which stores user entries in the following format:
The username is specified in the first column, while the rest of the user attributes are spaced away
from the beginning of the line. These are known as radius attributes.
######## ENTRIES BELOW THIS LINE ARE MAINTAINED BY USER INTERFACE ########
All entries below this line are modified by the web based user interface. You should not adjust these
entries unless you are confident of what you are doing.
Other access points on your network can also use the radius server. Each Radius client (not end-
user, but each access point) must be configured with a secret. The secret guarantees that only
authorized access points can communicate with the radius server.
To modify or delete an
existing user, just select the
username from the top left
drop down box, and click
either “Select” or “Delete
Account”.
IP Accounting
RWV’s can keep track of the number of Bytes and Packets transmitted and received for hosts on your
network. IP Accounting will present you with a summary based on source and destination IP address
that can be retrieved using an HTTP client or a custom tool that you have written yourself.
To configure IP Accounting, select the ip accounting option from the advanced menu.
Allowing
By default the RWV is configured to allow traffic from anywhere to anywhere with a few exceptions.
You may find it necessary to restrict all traffic with only a few exceptions to one of your sub-networks
such as a commercial VPN customer or a sensitive accounting network.
The allow command is used to explicitly allow traffic through. Some of the RWV’s built in services
such as IP Accounting are configured to deny traffic. If you wanted to allow your accounting server,
192.168.1.3 to collect statistics you could add the line:
Denying
This will specifically deny a certain type of traffic. A popular (and present in the default installation of
the RWV) rule is to deny all TCP and UDP traffic destined ports 135 coming in from the Internet:
deny tcp from any to any 135 in via $net # RPC port, used by many worms
deny udp from any to any 135 in via $net # RPC port, used by many worms
Another common rule is dealing with a person on the Internet who is causing problems for one of your
clients.
Logging
Firewall logging can be done to a remote syslog server using the ‘log’ command.
Example:
Would log all TCP packets going to the 192.168.3.1 network destined for port 31337.
Forwarding
The forward command can be used to redirect traffic to another system. This could be used to
redirect clients to a caching proxy server to reduce bandwidth on your Internet feed, or to have a
service available to the Internet on a different port number not attached to the server itself.
Variables
The “not” (pronounced “not”, not “exclamation mark”) boolean operator can be used in conjunction with
variables to setup flexible firewall and forwarding rules.
For example, the RWV is preconfigured to allow access from 127.0.0.1 (the system’s local address) to
the services using ports 791-801.
Instead of changing each and every one of these lines to give access to your account system you can
simply change $admin_ip to the IP address of the server.
Remote logging
The RWV supports remote logging to syslog hosts. syslog is a Unix and Unix flavoured logging
daemon that comes with most variations of Unix including Linux and FreeBSD.
Configuring syslogd
Most Unix variants including Linux and FreeBSD ship with ‘syslogd’, the system logging daemon.
You may wish to keep the RWV’s logs separately from the rest of your main logs. Most syslogd’s can
be configured to log messages from specific hosts.
Please consult the syslog.conf man page that ships with your operating system.
Traffic Monitor
The traffic monitor displays current TCP and UDP sessions on the particular interface.
This is particularly useful for identifying which users are placing an extra load on your network. In the
picture above you see that the flow rate is 1461 kbit/s, a little under 1.5Mbps. You see a connection
between 192.168.2.199 and 192.168.65.5 with a constant packet size of 1500 and a window size of
58400 indicating that this client is using a fair bit of network bandwidth.
Traffic Statistics
The traffic statistics screen gives you an overall view of what protocols, packet rates and throughput
are going across a particular interface.
udp/tcp monitor
The UDP/TCP Monitor displays a packet and byte count based on TCP and UDP port numbers. You
can sort the display by one of:
• Port Number
• Total Packets
• Total Bytes
• Packets to, or packets coming into the interface.
• Bytes to, or bytes coming into the interface
• Packets from, or packets sent from the interface
• Bytes from, or bytes sent from the interface
The protocol display is particularly useful in diagnosing network problems that may be caused by
excessive use of a particular protocol, such as Kazza or another Peer to Peer application.
Packet Size Counts
This allows you to gauge the use of your system. Generally lots of small packets will result in lower
system throughput. The radios have a specification called packets per second and it does not mater
whether the packet is small or the maximum size. Therefore a system that is passing predominately
small packets will pass less traffic than a system with large packets.
The packet size monitor displays counts based on size of packets traveling through the interface.
Lan Station monitoring
The Lan Station monitor displays Packet, IP packet, and Byte counts To and From each station on the
local area network. Statistics are aggregated to each user’s MAC address, not IP address.
Setting up a “Hotspot”
A “captive portal” is a Web Browser based login system that forces your users to enter a Username
and Password to gain access to the rest of your network (in most cases a Captive portal is used to
limit access to the Internet).
When a user associates to your wireless access point and tries to visit a website, they are greeted with
a login page similar to:
Provided the user has a username and password with you, they would simply enter in their information
and the hotspot would allow them through to the Internet. You could also provide a signup link by
editing the hotspot login page to take them to a website with an account creation page, for example.
The Hotspot Menu
The hotspot -> hotspot menu controls the system’s hotspot core functionality including:
The default CBQ rate is the speed at which your customers will be able to transfer data through the
hotspot.
The hotspot supports both server and client white lists. A server white list specifies IP addresses that
un-authenticated users may visit. This is particularly useful if you want to provide a “new user signup
page”, for example.
The client white list specifies MAC addresses of clients who will never be captured by the portal.
These addresses will have complete access through your hotspot regardless of whether they have a
username and password.
First, add the IP address of the website that hosts the new user signup page. For example, if you your
website IP address 192.168.5.100 then you would add:
192.168.5.100
into the hotspot -> hotspot whitelists -> server whitelist setup screen.
You might want to give yourself unfettered access to the hotspot’s you are setting up. Just add your
MAC address to the client whitelist setup:
00:02:2D:32:54:A4
Setting up eeZee configuration
eeZee configuration is a special option supported by the RWV’s
that enables clients to access the network regardless of their IP
settings. This is especially useful in hotspot environments where
users may have any sort of IP networking configuration and is
invaluable if you ever have to redesign your IP layout and some
customers are not using DHCP.
eeZee configuration will put a client onto the network even if they
have hard-coded their TCP/IP settings.
NOTE: The IP Addresses you enter in must not be used anywhere else on your network, otherwise
routing and assignment conflicts may occur.
Channel Selection
As each DSSS channel is 22 Mhz wide the best channel selection without overlap would only give you
3 usable channels in most cases you can use 4 channels with overlap.
This is a list of channels used by 802.11 (a, b and g) devices. These channels may be entered into
the Atheros configuration page.
Country codes can be used on cards with Regulatory Type (RT): ALL_COUNTRIES as shown in the regulatory
information box.
net mask:
4-bit m m m m
2-bit m m
(.1) 0 0 0 0 0 0 0 1 (.2) 0 0 0 0 0 0 1 0
(.17) 0 0 0 1 0 0 0 1 (.18) 0 0 0 1 0 0 1 0
(.33) 0 0 1 0 0 0 0 1 (.34) 0 0 1 0 0 0 1 0
(.49) 0 0 1 1 0 0 0 1 (.50) 0 0 1 1 0 0 1 0
(.65) 0 1 0 0 0 0 0 1 (.66) 0 1 0 0 0 0 1 0
(.129) 1 0 0 0 0 0 0 1 (.130) 1 0 0 0 0 0 1 0
(.193) 1 1 0 0 0 0 0 1 (.194) 1 1 0 0 0 0 1 0
(.225) 1 1 1 0 0 0 0 1 (.226) 1 1 1 0 0 0 1 0
Younker's tables
Here's a table showing the relationship between the / notation, the byte
notation, and the corresponding binary numbers (with a dot every eight
digits) for the 32 bit addresses. I've thrown in a count of how many
Class A/B/C networks the larger networks encompass.
11000000 => 128*1 + 64*1 + 32*0 + 16*0 + 8*0 + 4*0 + 2*0 + 1*0
= 128 + 64 + 0 + 0 + 0 + 0 + 0 + 0
= 128 + 64
= 192
10000100 => 128*1 + 64*0 + 32*0 + 16*0 + 8*0 + 4*1 + 2*0 + 1*0
= 128 + 0 + 0 + 0 + 0 + 4 + 0 + 0
= 128 + 4
= 132