Manuale d’uso / di manutenzione del prodotto WL-575 del fabbricante 3Com
Vai alla pagina of 293
www .3Com.c om User Gu ide 3Com Outdoor 11a Buildi ng to Building Bridg e and 11bg Ac cess Point 3CRWEASY A73 / WL- 575 Part Numbe r 10015232 Rev . AA Published August, 2006.
3Com Corporation 350 Camp us Drive Marlbor ough, MA 01752-30 64 Copyright © 2006 3Com Corp oration. A ll rights reserved. No pa rt of this docum entation may be reproduced in any form o r by any means or used to make any derivative work (such as translation, tra nsformation, or adaptation) w ithout written permission from 3Com Corpora tion.
iii Contents 1 Introduction Product Features 1-1 Radio C haracteri stics 1-2 APPROVED CHANNELS 1-2 Pack age C hec kli st 1-3 Ha rd w a re D es c r i pt i o n 1-4 Integra ted High- Gain Ante nna 1- 4 E.
iv Using t he Pole -Moun ting Brack et 3- 2 Using t he Wall-Mounting Bracke t 3-4 Connect Exter nal Antenn as 3-6 Connect Cables to the Unit 3-7 Connect the Po wer In jector 3-7 Check the LED Indicato.
v RSSI 5-35 Radio Int erface 5-37 802.11a I nterface 5-38 Config uring Radio S ettings 5-38 Config uring Commo n Radio S ettings 5-39 802.11b/g I nterfa ce 5-43 Config uring W i- Fi Mu ltimed ia 5-45 .
vi Straigh t-Through W i ring B-3 Crosso ve r W iri ng B-4 8-Pin DI N Conn ector Pin out B- 5 8-Pin DI N to RJ-4 5 Cable W iring B-6 Glossary Index.
vii T ERMINO LOGY Access Point —A n internet wor king device that seaml essly conne cts wir ed and wireles s networks. Ad Hoc —An ad hoc wir eless LAN is a group of compute rs, each with wir eless ada pters, conn ected as an independent wireles s LAN.
viii RT S Thresho ld —T ransmitte rs contending f or the medium may not be awar e of each other (the y ar e “hidden nodes”) . The RTS/CT S mecha nism can solve th is problem . If the packet size is smalle r than the pr eset RTS Thr eshold size, t he RTS/CTS mechanis m will not be enabl ed.
1-1 1 I NTR ODUCTIO N The 3Com Out door 11a Bui lding to Build ing Bridge and 11bg A ccess Point syst em provides point-to -poin t or p oint-to- mul tipoint bridge link s betw een remote Ether ne t LA Ns, a nd wi reless ac cess point serv ices fo r clie nts in the lo cal L AN a rea.
1-2 Pr ovides access poi nt services for the 5 GHz and 2. 4 GHz radios using various external an t enna options Maxim um data rate up to 108 Mb ps on the 802.
1-3 P ACKAGE C HECKLIST The 3Com O utdoor 11a Bui lding to Build ing Bridge an d 11bg Access Poi nt package in cludes: One 3Co m Outdoo r 11a Buildi ng to Building Br idge and 11bg Access Po int .
1-4 H AR DWAR E D ES CRIP TION I NTEGRATED H IGH -G AIN A NTENNA The WL-5 75 bridge includ es an integra t ed high- gain (17 dBi ) flat -panel antenna for 5 GH z ope ration. W ith this antenna , in a direct li ne-of-si ght lin k usin g a point -to-point dep loyment, the rang e can be as lo ng as 15 km (9.
1-5 Exte r nal an tennas conne ct to th e N-type R F connector s on th e wireles s bridg e using the optional RF coaxial cables . Using the exte rna l antenn as in a poin t-to-mul tipoin t depl oyment , the m aximu m range fo r brid ge li nks are: 802.
1-6 networ k interco nnection device s such as a switch or r outer that provide MDI- X ports . However , when connecti ng the access poi nt to a workstatio n or other device t hat does not have MD I-X ports, you must use cro ssover twi sted-pair cable.
1-7 W ALL - AN D P OLE -M OUNTI N G B RACKET K IT The wir eless bri dge includes a br acket kit tha t can be used to mo unt the bridge t o a wall, pole, radio ma st, or part of a tower structure. S YSTEM C ONFIGURATION At e ach location where a unit is installed, it must be connected t o th e local networ k using the power injector modu le.
1-8 The wir eless brid ge modes connect two or more wir ed networks, f or example networ ks in dif fere nt building s with no wir ed connect ions. Y ou will n eed a 3Com Outdoor 11a Buildin g to Building Br idge and 11bg A ccess Point unit on both sides of the connection.
1-9 The foll owing f igure shows a p oint-to-m ultipo int “in-li ne” co nfigurati on with one bridg e set to “Master” an d using a dir ectional panel an tenna.
1-10.
2-1 2 B RIDGE L INK P LANNING The 3Com O utdoor 11a Bui lding to Build ing Bridge an d 11bg Access Poi nt suppor ts fixed p oint-to -point o r poin t-to-mu ltipoin t wireless link s. A sing le lin k between two point s can be used to conn ect a remote sit e to la rger core ne twork.
2-2 D ATA R ATES Using t he 5.0 GHz integr ated antenna, t wo WL-575 bri dges can operate ove r a range of u p to 15 .4 k m ( 9.6 mi les) or provide a hi gh-sp eed c onn ectio n of 54 Mb ps (108 Mbps in turbo mode ). However , the maximum data rate for a link decr eases as the operat i ng range in creases.
2-3 R ADIO P ATH P LAN N ING Alth ough the wir eless bridge us es IEEE 802.11 a radio technol ogy , which is capable of reduc ing the eff ect of multi path signals du e to obstructi ons, the wir eless brid ge link requi res a “radio line -of-sigh t” between the two ant ennas for optimum perform ance.
2-4 • Be sur e ther e is enough clear ance from bu ildings and t hat no building constr uction may e ventually block the p ath. • Check the t opology of the la nd between the ante nnas using topo .
2-5 Note tha t to av oid an y obstructi on al ong th e path, the he ight of the object mu st be adde d to the minimum cle arance req uired for a clear radio line -of-sight. Consid er the follow ing sim ple e xampl e, il lustrated in th e figu re below .
2-6 A NTENNA P OSITION AND O RIENTA TION Once the required anten na height has be en determ ined, other factors affecting the pr ecise pos ition of the wir eless bri dge must be conside red: • Be su.
2-7 R ADIO I NTER FEREN CE The avoida nce of radio inte rferen ce is an importan t part of wir eless link plann ing. Interf erence is caused by othe r radio tra nsmissions usi ng the same or an adjacent channel freque ncy .
2-8 • Snow and Ice — Fall ing snow , like rain, has no si gnificant ef fect on th e radio signal. However , a build up of snow or ice on antennas may cause the link to fail. In t his case, the sno w or ice has to b e cleared from the an tenna s to restore opera tion of th e link.
3-1 3 H AR DWAR E I NSTALLATION Befor e moun ting ant ennas to set up you r wirel ess bri dge links, be sur e you ha ve select ed approp riate locati ons for each ant enna. Foll ow the guidance an d inform ation in Chapter 2, “W i reless Link Plannin g.
3-2 T ESTING B AS IC L INK O PERATION Set up the un its over a very short ran ge (15 to 25 feet ), either outd oors or indoo rs. Conn ect the u nits as i ndicate d in th is chapt er and be sure to perform a ll the bas ic configurati on tasks outl ined in Chapter 4, “Init ial Configur ation.
3-3 2 Fit the edg es of the V -shaped part in t o the slots i n the rectang ular plate, and tight en the nuts. 3 Attach the adjust able recta ngular plate to the b r idge wit h supplied scr ews.
3-4 4 Attach the bridge with brack et to the plate already fixed to the p ole. 5 Use the in cluded nuts t o secure the wir eles s bridge to the p ole bracket. No te that the wir eless bridg e tilt an gle may need to be adjust ed during the antenn a alignment pr ocess.
3-5 1 Always attach th e bracket to a wall wi th flat sid e flush a gainst th e wall (see followi ng figu re). 2 Position the brac ket in th e inten ded l ocation and mark th e positio n of the four mounting screw holes.
3-6 C ONNECT E XTER NAL A NTENNAS The bri dge’ s prima ry anten na is it’ s built-i n internal ante nna. For some applica tions when de ploying an WL-57 5 unit for a bridg e link or access point operati on, you may need to moun t external antenna s and connect them to the bridg e.
3-7 C ONNECT C ABLES TO THE U NIT 1 Attach the Ether net cabl e to the Ethernet port on the wir eless bridg e. 2 For ext ra prot ection against rain or moist ure, a pply weatherpr oofing tap e (not includ ed) around the Ethernet con nector .
3-8 1 Conne ct the E ther net cable from the wireless br idge to the RJ-45 p ort labe led “Outp ut” on t he po wer injec tor . 2 Connec t a strai ght-through un shield ed twiste d-pair (UTP) cable f rom a local LAN swit ch to the RJ-45 port labeled “Input ” on the power inje ctor .
3-9 C HECK TH E LED I NDICA TORS The bri dge’ s 11a and 11b/ g LEDs operate in t wo display modes, whi ch are confi gurable thr ough the soft ware. T he default AP mod e indicates data traff ic rates. The RSSI m ode indicates t he rece ived signal p ower and is for use when aligni ng antenn as in a bridge li nk.
3-10 A LIGN A NTENNAS After wireless b ridge units ha ve been moun ted, co nnected , and th eir radio s are operati ng, bridge link anten nas must be accurat ely aligned to ensur e optimum performa nce. Thi s align ment process i s particu larly im portan t for lo ng-rang e point -to-point links.
3-11 When you m ove the an tenna durin g ali gnment, the rad io sign al from the remote antenn a can be s een to hav e a str ong c entral main lobe and smaller side lob es. The object of the align ment process is to set the antenna so th at it is r eceiving the strongest signal from the ce ntral ma in lobe .
3-12 1 Pan the antenna hori zontally b ack and forth whi le checking t he LEDs. If u sing the pole -mount ing bra cket w ith the u nit, you must rotate the moun ting bracket around the po le. Other external antenn a brackets may r equire a dif ferent horizontal adjustment.
4-1 4 I NITI AL C ONFIGURATION The 3Com Out door 11a Buil ding to Buildi ng Bridge and 11 bg Access Point of fers a variet y of management opt ions, incl uding a web-based interfac e. The init ial configurat ion steps can be mad e through the web br owser inter face.
4-2 C HAPTER 4: I NITIAL C ONFIGURAT ION 1 Connect a comp uter dir ectly to the Access Point using the suppli ed standard Categor y 5 UTP Ethernet cable. 2 Enter the Acc ess Point’ s defa ult IP addr ess (169.2 54.2.1) int o the computer’ s web browser .
4-3 Figure 1 W ireles s Interf ace Device M anager Click on the Pr operties button to se e the followi ng screen Figure 2 W ireles s Interf ace Device M anager - Propertie s.
4-4 C HAPTER 4: I NITIAL C ONFIGURAT ION Directly connect to th e de vice through it s Ether n et port or consol e port . Follow t he instructi ons below to logi n into the AP Conf iguration sc reen: 1 Load a we b browser a nd enter < http://1 69.25 4.
4-5 Using the Setup Wizard Loggin g In – Enter the username “admin,” an d passwor d “passwor d,” then click L OG IN. For info rmat ion on conf iguri ng a use r nam e an d pass word, s ee pa ge 23 .
4-6 C HAPTER 4: I NITIAL C ONFIGURAT ION The hom e page dis plays th e Main Menu. Figure 4 Home Page Launch ing the Setu p Wizar d – T o p erfo rm ini tial conf igurat ion, cli ck Se tup Wizard on th e home page, se lect the V AP you wish to co nfigur e, then click on the [Next] bu tton to start the process.
4-7 Using the Setup Wizard Figure 6 Setup Wizar d - St ep 1 2 Radio Channel – Y ou must ena ble radio commu nications for 802 .11a and 802.11 b/g, and set the op erating radi o channel. Figure 7 Setup Wizar d - St ep 2 NOTE: Availabl e channel setting s are limited by lo cal regu latio ns, whi ch deter mine the chann els th at are av ailab le.
4-8 C HAPTER 4: I NITIAL C ONFIGURAT ION 802.11 a T urbo Mode – If you sel ect Enable, t he access poin t will ope rate in turb o mode with a data ra te of u p to 1 08 Mbps. Norm al mode sup port 13 channels, T urbo mod e supports onl y 5 chan nels.
4-9 Using the Setup Wizard 4S e c u r i t y – Set the Authentica tion T ype to “O pen” to allow op en access withou t authentica tion, or “Shar ed” to r equir e authentic ation based on a shar ed key . Enab le encryption to encrypt da t a trans missions.
4-10 C HAPTER 4: I NITIAL C ONFIGURAT ION 5 Click Finish. 6 Click the OK butto n to com plete th e wizard. Figure 10 Setup Wizar d - Co mpleted NOTE: All wireles s devi ces mus t be co nfigured with th e same Ke y ID values to communi cate with the acces s point.
5-1 5 S YSTEM C ONFI GURATION Befor e continui ng with advance d configurat ion, first co mplete the init ial configur ation steps descri bed in C hapte r 4 to set u p an IP address for th e access point. The access poi nt can be managed by any comput er using a web brows er (suc h as Internet Explor er 5.
5-2 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 11 Advanced Setup The inform ation in thi s chapte r is orga nized to reflect the structure of th e web scr eens for easy r eference.
5-3 Advan ced Se tup SNMP Configures SNMP set tings 5-19 Administration Configures user na me and passw ord for managem ent access; upgrades so ftw are fr om local file, F TP or TF TP server; res et s.
5-4 C HAPTER 5: S YSTEM C ONFIGURA TION S YSTEM I DE NTIFICATIO N The system na me for the access poin t can be l eft at its d efault settin g. However , modif ying thi s para met er can h elp yo u to more easi ly di stingu ish di fferent devi ces in yo ur netw ork.
5-5 TCP / IP Settings TCP / IP S ETTINGS Configur ing the access point with an I P address expand s your abili ty to manage the acces s point. A nu mber of access poi nt featur es depend on IP ad dres sing to operate.
5-6 C HAPTER 5: S YSTEM C ONFIGURA TION DHCP Cli ent (Enable) – Select this option to obtai n the IP settings fo r the access point fr om a DHCP (Dynami c Host Conf iguration Pro tocol) serve r .
5-7 TCP / IP Settings Figure 14 Sm art Monitor By enabl ing Smart Monitor ( known as Link In tegrity i n the CLI) and se tting a target IP addr ess, the AP wil l periodicall y (set by the ping in terval) check to see i f the tar get addr ess res ponds to pings .
5-8 C HAPTER 5: S YSTEM C ONFIGURA TION RADIUS Remote Authentica tion Dial-i n User Se rvice (RADI US) is an au thenticati on protocol that uses sof tware running on a central serve r to control access to RADIUS -aware devices on the network.
5-9 RADIUS Figure 15 RADIUS Authenticat ion Primary Radius Server Setup – Config ure the fo llowing setti ngs to use RADIU S authenticatio n on the access poin t. IP Addr ess: Sp ecifies the IP add ress or ho st name of the RADI US server . Port: Th e UDP port nu mber used by the RADIUS ser ver for authentica tion mess ages.
5-10 C HAPTER 5: S YSTEM C ONFIGURA TION Secondary Rad ius Server Setup – Confi gure a sec ondary RADIU S server to pr ovide a backup in ca se the prim ary server fails. The acce ss point uses the secondary server if th e primary server fails or b eco mes inaccessible.
5-11 Authenti c ation The access poin t can also operate in a 802.1X supplic ant mode. This enables t he access point itself to be authent icated with a RADIU S server usin g a configured MD5 use r name and pas sword. This prev ents ro gue access points from gain ing access to the networ k.
5-12 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 16 Authe nticat ion MAC Authe ntication – Y ou can co nfigur e a list of t he MAC addre sses for wi reless clients t hat are authori zed to access the networ k. This provi des a basic level of authenticat ion for wirele ss clients attempting to ga in access to the netwo rk.
5-13 Authenti c ation Authe ntication s ection of thi s web page to set up the local dat abase, and confi gure all access points in the wireless net work service area wit h the same MAC a ddress dat abase. Radius MA C : The MAC add ress of the associating stat ion is sent to a conf igured RADIUS server for a uthenticatio n.
5-14 C HAPTER 5: S YSTEM C ONFIGURA TION Session Ke y Refresh Rate: The i nterval a t which the access point re freshes unicast session keys for associated clients. (Range: 0-1440 minutes; Default: 0 means disabled ) 802.1X Reauthenti cation Refr esh Rate: Th e time period afte r which a connect ed client must be re-aut henticated .
5-15 Filter C ontrol F ILTER C ONTROL The access poin t can emplo y network t raffic fra me filtering to cont rol access to network r esour ces and increase security . Y ou can pr event communicat ions between wir eless clients and preven t access point man agement from wireless clients.
5-16 C HAPTER 5: S YSTEM C ONFIGURA TION Pr event Intra V AP clie nt communicat ion: When enab led, cli ents associated with a spec ific V AP inte rface cannot establish wireless co mmunication s with each othe r . Clients can communicate wit h clients associ ated to other V AP interfaces.
5-17 Filter C ontrol VLAN The acces s point can emplo y VLAN tagging s upport to contr ol access t o network r e sources and incr ease security . VLAN s separate traffic passing between the access point , associated client s, and the wi red network.
5-18 C HAPTER 5: S YSTEM C ONFIGURA TION A VLAN ID ( 1-4094) can be ass igned to a client after successful IEEE 802.1X authen tication. The cl ient VLAN IDs must be configur ed on the RADI US server for each use r authorized to ac cess the network .
5-19 SNMP SNMP Simple N etwork Management Protoco l (SNMP) is a communi cation prot ocol desi gned spec ifical ly f or man aging de vice s on a netw ork .
5-20 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 19 SNMP SNMP – Enables or di sables SNMP management acce ss and also enables the access point t o send SNMP traps ( notificat ions). (D efault: D isable) Location – A text string that describe s the system location .
5-21 SNMP Trap Des tinat ion Com mun ity N ame – The communi ty string sent w ith t he notifi cation operat ion. (Maxim um length: 23 char acters, case s ensitive; Default: pu blic ) Engine I D – Sets the engine ident ifier for the SNMPv 3 agent that r esides on the access point.
5-22 C HAPTER 5: S YSTEM C ONFIGURA TION dot1xMacAddrAuthSuccess - A client station has successfully authenticated its MAC addr ess with th e RADIUS ser ver. dot1xM acAddrAuthF ail - A client s tation has fai led MAC addres s authentication with the R ADIUS serve r.
5-23 Administratio n Auth T ype – The authenti cation type used for the SNM P user; either MD5 or none. Wh en MD5 is selected, en ter a passwor d in the corre sponding Passphrase field. Priv T ype – The data encrypti on type use d for the S N MP us er; either DES or none.
5-24 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 22 Adm inistration Username – The name of the user . The default name is “admi n.” (Length: 3-16 characters , case sensitive) New Password – The pass word fo r management acces s. (Length: 3-16 characte rs, case sensit ive) Confi rm New Password – Enter the password again for ve rification.
5-25 Administratio n T eln et S erver Sta tus: Ena ble s or d isabl es the T eln et se rver . (Def ault : En able d) SSH Server Status : Enables o r disables t he SSH serv er . (De fault: En abled) SSH Server Port : Sets the UDP port for the SSH ser ver .
5-26 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 24 Firmware Upgrade Before upgradin g new software, verify that the access p oint is con nected to th e networ k and has been c onfigur ed with a comp atible IP address a nd subnet mas k.
5-27 Administratio n If up grading from an FTP server, be sure that you have an account configure d on the server with a user name and password . If VLAN s are configur ed on the access po int.
5-28 C HAPTER 5: S YSTEM C ONFIGURA TION Restore Factory Settings – Click th e Restore b utton in t he use r interface to reset the conf iguration setti ngs for the ac cess point to the f actory defaul ts and re boot the system. Note that all use r configured info rmation wil l be lost.
5-29 WDS and Spanning Tr ee Settings Figure 25 WDS and Spanning T ree Settings WDS Br idge – Up to six WD S bridge or r epeater lin ks (MAC addr esses) per radio interf ace can be specif ied for each uni t in the wirel ess bridge network. One unit only must be co nfig ured as the “root bri dge ” in th e wirele ss n etwor k.
5-30 C HAPTER 5: S YSTEM C ONFIGURA TION • Root Bridge: Operates as the root bridg e in the wirel ess bridge networ k. Up to six ”Chi ld” links are a vai lable to ot her b ridge s in the netwo rk. Mast er/Slave Mode – Selects b etween Master a nd Slave mo de.
5-31 WDS and Spanning Tr ee Settings Figure 27 Spanning T ree Pr otocol Spannin g T ree Protoc ol – STP uses a distributed algor ithm to select a bridging device (STP-complian t switch, br idge or r outer) t hat serves as t he roo t of the spann ing tree ne twork.
5-32 C HAPTER 5: S YSTEM C ONFIGURA TION • Range: 0- 65535 • Defaul t: 32768 Brid ge Ma x Age – The maximum time (in seconds) a devi ce can wait without receivi ng a confi guration mess age before a ttempti ng to reconf igure.
5-33 System Log the Span ning Tree Protocol is detecting net work loops. Where mor e than one port is assig ned the h ighest prio rity, the port with lo west nume ric identifie r will be ena bled .
5-34 C HAPTER 5: S YSTEM C ONFIGURA TION Logging Host – Enabl es the sendin g of log message s to a Sys log server host . Up to four Syslo g servers are supported on t he access point. (Def ault: Disable) Server Name / IP – Spe cifies a Syslog s erver name or IP ad dress.
5-35 RSSI The access po int acts as an SNTP clie nt, periodical ly sending time synchr onizati on requests to spe cific ti me servers. Y o u can configure u p to two time s erver IP addr esses. The access point wil l attempt to poll each server in the co nfigured sequence.
5-36 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 29 RSSI RSSI: Auto Refr esh – E nab les or di sa bles the ref res hing of R SSI info rma tion . RSSI Val ue – The displa yed RSSI value for a selected por t. Port Nu mber – Selects a spe cific WDS port for which to di splay the RSSI ou t put value.
5-37 Radio In te rface LED Statu s: Mode – Sel ect s AP m ode or Bri dge m ode. Bridge Port – A llows the user to select the bridg e port for the LE D display. (Def ault:1; Range : 1~6) Ther e are curr ently no equi valent CLI command s for the RSSI contr ols.
5-38 C HAPTER 5: S YSTEM C ONFIGURA TION 802.11 A I NTERFACE The IEEE 8 02.11a inter face operates withi n the 5 GHz band, at up to 54 Mbps in normal mode or up to 1 08 Mbps in T urbo mode.
5-39 Radio In te rface Closed System – When enabled , the V AP interface does not i nclude its SSID in beacon me ssages. Nor does it respond to probe r equests fr om clients that do no t includ e a fixed S SID.
5-40 C HAPTER 5: S YSTEM C ONFIGURA TION Description – Adds a comment or des cription t o the wirel ess interfa ce. (Range: 1-80 char acters ) T urbo Mode – The normal 8 02.11a wir eless op eration mode provi des connecti ons up to 54 Mbps. T urbo Mode i s an enhance d mode (not r egulated in IEEE 802.
5-41 Radio In te rface Radi o Channel – The radi o channel that the acce ss point uses to communica te w ith wirel ess clients. When multiple access po ints ar e deployed in the sam e area, set t he channel on neigh boring access points a t least fo ur chan nels apa rt to avo id interference with each other .
5-42 C HAPTER 5: S YSTEM C ONFIGURA TION Maximum T ransmit Data Ra te – The ma ximum data rate at which the access poin t transmits u nicast packets on the wireless interfa ce. The maximum transm ission distance i s affected by th e data ra te. The lower t he data rate, the longer the tran smission dist ance.
5-43 Radio In te rface nego tiate the sen ding of a data frame. A fter r eceiving an RTS fram e, the station sends a C TS (cle ar to se nd) fra me to notify the sendin g statio n that it can start sendi ng data. If the RTS threshold i s set to 0, the access point always sends RTS signals.
5-44 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 32 Radio Settings B/G Client Acce ss M ode – Selects the operat ing mode for the 802 .11g wirel ess inter face. (De f aul t: 802.11b+g ) 802.11 b+g: Both 802. 11b and 802.11g clients can commu nicate with the access point (up to 54 Mbps ).
5-45 Radio In te rface Super Mo de – The Ath eros pr o prietary S uper G pe rformance enhan cements ar e supported by the access po int. These enhance ments include burs ting, compr ession, fa st frames and dynami c turbo. Maximum thr oughput range s betwee n 40 to 60 Mb ps for conn ection s to A theros- comp atible clie nts.
5-46 C HAPTER 5: S YSTEM C ONFIGURA TION The access poin t implements QoS usi ng the W i-Fi Multimed ia (WMM) standar d. Using WMM , the access poi nt is able to pri oritize traf fic and opt imize perfor mance when multiple app lications compete f or wireless net work bandwi dth at the same ti me.
5-47 Radio In te rface resolution me chanism first selects data wi th the highes t priori ty to be gra nted a transmit o pportu nity . Then t he sam e colli sion resolutio n me chanism is us ed exter nally to d etermin e which device ha s access to the wireless medi um.
5-48 C HAPTER 5: S YSTEM C ONFIGURA TION Figure 34 WMM Conf iguration WMM – Sets the WMM operati onal mode on the access po int. When enabl ed, the parame ters for each AC queu e will be employed on the access point an d QoS capabil ities are adverti sed to WMM-enabled cli ents.
5-49 Radio In te rface init ial wait time is a rando m value between zer o and the CWMin value. Specif y the CW Min value in th e range 0-15 m icroseconds.
5-50 C HAPTER 5: S YSTEM C ONFIGURA TION S ECURITY The access poi nt is configur ed by default as an “open syst em,” which bro adcasts a beacon sign al including the con figure d SSID.
5-51 Security The acces s point can sim ultaneously suppor t clients usin g various dif fer ent security mec hanisms. The config uration for these secur ity combination s ar e outlin ed in th e follow ing tab le.
5-52 C HAPTER 5: S YSTEM C ONFIGURA TION Dynamic WE P (802.1x) only Authentication: Open System Encryption: Enable 802.1x: Requir e d Set 802.1x key refresh and r e auth entication rates Local, RADIUS , or Dis abled Ye s c 802.1x WP A only Authentication: WP A Encryption: Enable WP A Configuration: Required Cipher Suite: TKIP 802.
5-53 Security W IRED E QUI VALENT P RIVACY (W EP) WEP pr ovides a basic le vel of security , preven ting unauthori zed access to the network, an d encryptin g data tra nsmitted b etween wireless clients a nd the acce ss point.
5-54 C HAPTER 5: S YSTEM C ONFIGURA TION Note that al l clients shar e the same keys, which ar e used for user aut hentication and data encrypti on. Up to four keys can be speci fied. These four keys ar e used for all V AP in terfaces on t he same ra dio.
5-55 Security Encryption – Ena ble or disa ble the access point to use data encrypt ion (WEP , TKIP , or AES). If this option is selected when using sta tic WEP keys, you must confi gure at least o ne key on the acces s point a nd all client s.
5-56 C HAPTER 5: S YSTEM C ONFIGURA TION Hexadecimal : Enter keys as 10 hexadecim al di gits (0-9 an d A-F) for 64 bit k eys, 26 hex adecimal digit s for 128 bit keys, or 32 hex adecimal digit s for 152 bit keys (802.1 1a ra dio only). This is th e defau lt set ting.
5-57 Security Key Ty pe – Select the p referred met hod of ente r ing W EP encryption ke ys on the access poi nt and enter up to f our keys: • Hexadecim al: Ente r keys as 10 hexadeci mal digits ( 0-9 and A-F) for 64 bit keys, 26 hex adec imal digits for 128 bit k eys, or 32 h exad ecimal digi ts for 1 52 bit keys (802.
5-58 C HAPTER 5: S YSTEM C ONFIGURA TION T empora l Key I ntegrit y Protocol (TKIP): WP A specifies TKIP as the data encrypti on method to r eplace WEP .
5-59 Security for WP A2. However , the comp utational in tensive ope rations of AES-CCMP r equires hardwar e suppor t on client devices. Ther efore to implement WP A2 in the ne twork, wir eless cl ients must be upgraded to WP A2-compl iant har dware.
5-60 C HAPTER 5: S YSTEM C ONFIGURA TION Status Information The Status pa ge includes informa tion on the follow ing items: Access Point St at us The AP Statu s window display s basic system co nfiguration set tings, as well as the settings fo r the wireless i nterface.
5-61 Security HTTP Server : Shows if management acce ss via HTTP i s enabled . HTTP Serv er Port: Shows the TCP port use d by the HTTP interface . Version: Sho ws the software version nu mber. 802.1X : Shows if IEEE 80 2.1X access contro l for wireless clients is enab led.
5-62 C HAPTER 5: S YSTEM C ONFIGURA TION syste m” and “s hare d key .” Ope n-sy stem authentication accep ts any clien t attempting to conn ect to th e access po int w ithout veri fying its identi ty.
5-63 Security Access po int was set to “Ope n Authenti cation”, but a client sent an authenticat ion reques t frame with a “Shared ke y.” Access point wa s set to “S hared Key A uthentica tion,” but a client se nt an authenticat ion frame for “O pen System.
5-64 C HAPTER 5: S YSTEM C ONFIGURA TION.
6-1 6 C OMMAND L INE I NTERFACE U SING TH E C OMMAND L INE I NTE R FACE A CCESSING THE CLI When accessin g the managem ent in terface fo r the over a direct conne ction to the con sole port, or via a T elnet conne ction, the acces s point can b e managed by entering comman d keywords an d para meters a t the prompt .
6-2 C HAPTER 6: C OMMAND L INE I NTERFACE T elnet Connection T elnet ope rate s over the I P tran sport protoco l. In this environm ent, your managemen t station and any ne twork device you want to manage over the networ k must have a valid I P address .
6-3 Using th e Command Line Interface E NTERING C OMMANDS This s ectio n des cribes how to ent er CLI comm ands . Keywor ds and Arguments A CLI command i s a series of keywords an d arguments. Keywor ds identify a command, and argu ments specify co nfiguration pa rameters.
6-4 C HAPTER 6: C OMMAND L INE I NTERFACE Showing Commands If you ente r a “?” at the command pr ompt, the system wi ll display the fir st level of ke ywords for the c urre nt configur ation mode (Exec, Global Co nfiguration, or Interf ace). Y ou can also dis play a list of vali d keyword s for a spe cific command.
6-5 Using th e Command Line Interface Negating the Effect of Commands For many con figuration comm ands you can enter th e prefix key word “ no ” to cancel t he effect of a command or r eset the config uration to the d efault value. For exa mple, the logging command will log system messages to a host server .
6-6 C HAPTER 6: C OMMAND L INE I NTERFACE Configuration Commands Configu ration comma nds are used to modi fy access point s ettings. Thes e commands modify the runnin g configurat ion and are s aved in memory .
6-7 Using th e Command Line Interface Ta b l e 8 Keystroke Commands C OMMAND G RO U P S The syst em commands can be br oken down into the funct ional group s shown below . Ta b l e 9 Command Groups Keystr oke Function Ctrl -A Shifts cursor to start of comma nd line.
6-8 C HAPTER 6: C OMMAND L INE I NTERFACE The acces s mode sho wn in the following t ables is indicat ed by these abbr eviations: Exec ( Executive Mode) , GC (Global Conf igura tion ), IC-E (Interface -Ether net Co nfigura tion), IC-W (Inter face-Wireles s Configurat ion), and IC-W-V AP (Inte rfac e-W ireless V AP C on figur ation ).
6-9 Using th e Command Line Interface Default Settin g None Comm and Mode Exec Exam ple Relate d Comm ands end (6- 9) end This co mmand returns to the pr evious config uration mode.
6-10 C HAPTER 6: C OMMAND L INE I NTERFACE exit This co mmand returns t o the Exec mode or exit s the configura tion pro gram. Default Settin g None Comm and Mode Any Exam ple This ex ample sho ws how.
6-11 Using th e Command Line Interface - Desti nation unreachab le - The gate way for this destin ation indicate s that the destin ation is unreach able. - Network or host unreachabl e - The gateway f ound no corres ponding entry in the rout e table. • Press <Esc> to stop pinging.
6-12 C HAPTER 6: C OMMAND L INE I NTERFACE show history This command shows the cont ents of the command history bu ffer . Default Settin g None Comm and Mode Exec Comman d Usage • The hi story buffer s ize is fixed at 10 comm ands. • Use the u p or do wn arrow k eys to scroll th rough the comm ands in t he histor y buffer.
6-13 Using th e Command Line Interface System Management Co mmands These command s are used to conf igure the use r name, passwor d, system log s, br owser manage ment options, cl ock setting s, and a varie ty of other sys tem inform ation.
6-14 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax country < country_code > countr y_code - A two cha racter code that id entifies the country of operation.
6-15 Using th e Command Line Interface Default Settin g US - for un its sold in the Unite d States 99 (no co untry set) - for units so ld in o ther cou ntries Comm and Mode Exec Comman d Usage • If you purchased an acce ss point outsi de of the United States, the count ry code must be set befor e radio func tions are enab led.
6-16 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g Outdoor 11a Buildi ng to Building Comm and Mode Globa l Configura tion Exam ple system name This command specifies or modifies the system name for this device . Use the no form to restore the de fault system nam e.
6-17 Using th e Command Line Interface Default Settin g admin Comm and Mode Globa l Configura tion Exam ple passwor d After initia lly logging onto the s ystem, you shoul d set the passwo rd. Remembe r to r ecord it in a safe pla ce. Use the no form to reset the de fault passwo rd.
6-18 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Interface Confi guration (Ether net) Comman d Usage • The acce ss point suppor ts Secure Shell ver sion 2.0 only. • After boot u p, the SSH server ne eds abou t two minute s to generate host encrypti on keys.
6-19 Using th e Command Line Interface Comm and Mode Interface Confi guration (Ether net) Exam ple ip http p ort This comman d specifie s the TCP port number used by the web browser interface.
6-20 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Globa l Configura tion Exam ple Relate d Comm ands ip http port (6- 19) ip https po rt Use this command to speci fy the UDP port number use d for HTTPS/SSL connection to t he access po int’ s Web interfa ce.
6-21 Using th e Command Line Interface Exam ple ip https server Use this command to enable the secure hypertext transfer protoco l (HTTPS) over the Se cure So cket La yer (S SL), providing secure ac cess (i .e., an en crypte d conne ction) to the access point’ s Web interfa ce.
6-22 C HAPTER 6: C OMMAND L INE I NTERFACE w eb -re d i re ct Use this command to en able we b-based au thenti cation o f client s. Use th e no form to d isable this fun ction.
6-23 Using th e Command Line Interface APmgmtIP This command specifies the client IP addr esses that are allowed management access to the access poin t throu gh various pr otocols .
6-24 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple This exampl e restricts manag ement access to the indicat ed addresses. APmgmtUI This co mmand enables and di sables manageme nt access to the access point thr ough SNMP , T elnet and web i nterfaces.
6-25 Using th e Command Line Interface show apmanage ment This co mmand shows the AP manag ement configurat ion, includi ng the IP addr esses of management s tations allowed to access the access point, as well as the i nterface protocol s which ar e open to managemen t access.
6-26 C HAPTER 6: C OMMAND L INE I NTERFACE show system This command displays basic system confi g uration settings . Default Settin g None Comm and Mode Exec Exam ple Outdoor 11a Building to Building .
6-27 Using th e Command Line Interface show version This command displays th e s oftwar e version for the system . Comm and Mode Exec Exam ple show config This co mmand displays detailed configurat ion informat ion for the sys tem.
6-28 C HAPTER 6: C OMMAND L INE I NTERFACE Protocol Filter Information =========================================================== Local Bridge :DISABLED AP Management :ENABLED Ethernet Type Filter :D.
6-29 Using th e Command Line Interface ----------------Security----------------------------------- Closed System : DISABLED Multicast cipher : WEP Unicast cipher : TKIP and AES WPA clients : REQUIRED .
6-30 C HAPTER 6: C OMMAND L INE I NTERFACE Radius Secondary Server Information ======================================== IP : 0.0.0.0 Port : 1812 Key : ***** Retransmit : 3 Timeout : 5 Radius MAC forma.
6-31 Using th e Command Line Interface SNTP Information =========================================================== Service State : Disabled SNTP (server 1) IP : 137.
6-32 C HAPTER 6: C OMMAND L INE I NTERFACE show har dware This co mmand displays the har dware v ersion of the s ystem. Comm and Mode Exec Exam ple System Logging Comma nds These command s are used to conf igure system l ogging on the access poi nt.
6-33 Using th e Command Line Interface logging on This co mmand contr ols logging of error messages; i.e., sendi ng debug or err or messages to memor y .
6-34 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g None Comm and Mode Globa l Configura tion Exam ple logging con sole This command init iates log ging of er ror m essages to the conso le. Use t he no form to di sable logg ing to the cons ole.
6-35 Using th e Command Line Interface Comman d Usage Messages sent include the selected level down to Emergency level. Exam ple logging facili ty-type This comm and sets the facili ty type for remote loggi ng of syslog message s.
6-36 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple logging cle ar This command clears all log messages stor ed in the access point’ s memory . Syn tax logging cle ar Comm and Mode Globa l Configura tion Exam ple show loggin g This co mmand displays th e logging config uration.
6-37 Using th e Command Line Interface show e vent-log This command displays log messages stor ed in the access point’ s memory . Syn tax show ev ent -log Comm and Mode Exec Exam ple System Clock Command s These command s ar e used to configur e SNTP and system clock sett ings on the access poi nt.
6-38 C HAPTER 6: C OMMAND L INE I NTERFACE sntp-se rver ip This comman d sets the IP address of the servers to which SNTP time requests ar e issued. Use the this comma nd with n o argum ents to clear all time serve rs from the current list. Syn tax sntp-se rver ip < 1 | 2 > < ip> • 1 - First ti me server.
6-39 Using th e Command Line Interface Default Settin g Enabled Comm and Mode Globa l Configura tion Comman d Usage The time acqu ired fr om time servers is used to recor d accurate dates and times for l og events. W ithout SNTP , the access point onl y records the time starting from th e factor y defau lt set at t he last bootup (i.
6-40 C HAPTER 6: C OMMAND L INE I NTERFACE Relate d Comm ands sntp-server en able (6-38 ) sntp-se rver dayli g ht-s aving This comma nd sets the start a nd end dates f or daylight savings ti me.
6-41 Using th e Command Line Interface Comm and Mode Globa l Configura tion Comman d Usage This comm and sets the lo cal tim e zone relative to the Co ordinated Universa l Time (UTC, formerl y Greenwic h Mean T ime or GMT) , based on the earth ’ s prime me ridian, zer o degr ees longi tude.
6-42 C HAPTER 6: C OMMAND L INE I NTERFACE DHCP Relay Commands Dynamic H ost Configur ation Pr otocol (DHC P) can dynamical ly allocate an IP addr ess and other configurat ion informatio n to network cli ents that br oadcast a r equest.
6-43 Using th e Command Line Interface Exam ple dhcp-rel ay This command configur es the primar y and secondary DHCP server addresses. Syn tax dhcp-rel ay < prima ry | secondary > < ip_address > • primary - The primary DHCP server. • secondary - The secondary DHCP server.
6-44 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Exec Exam ple SNMP Commands Contr ols access t o this access point from manag ement stations using the Simple Network Ma nagement Pr otocol (SNMP), as well as the hosts that will r eceive tr ap messages.
6-45 Using th e Command Line Interface show snmp filter Displays the SNMP v3 notific a tion filters Exe c 6- 58 show snmp filter -assignments D isplays the SNMP v3 notification filter assignments Exe .
6-46 C HAPTER 6: C OMMAND L INE I NTERFACE snmp- server comm unity This comm and de fines the commun ity access string for the S imple N etwor k Manage ment Pr otocol.
6-47 Using th e Command Line Interface Default Settin g None Comm and Mode Globa l Configura tion Exam ple Relate d Comm ands snmp-serve r location (6-47 ) snmp- server locat ion This command sets the system locati on string. Use the no form to remove the loca tion stri ng.
6-48 C HAPTER 6: C OMMAND L INE I NTERFACE snmp-s erver enable server This comman d enables SNMP managemen t access and also enab les this device to send SNMP traps (i.
6-49 Using th e Command Line Interface • host_name - Nam e of th e ho st. (Ra nge: 1 -63 chara cters) • communi ty-string - Passw ord-like commu nity stri ng sent with th e notifi cation operat ion.
6-50 C HAPTER 6: C OMMAND L INE I NTERFACE re-associated with the access point. - dot1 1StationReq uestFail - A clie nt station has f ailed associ ation, re-association, or authenticatio n. - dot1xAu thFa il - A 802.1X cli ent stati on has failed RA DIUS authent ication.
6-51 Using th e Command Line Interface Default Settin g All traps en abled Comm and Mode Globa l Configura tion Comman d Usage This co mmand is used in conj unction with the snmp-ser ver host and snmp-s erver enable se rver commands to enable SNMP notificat ions.
6-52 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple snmp-s erver user This command confi gures the SNMP v3 users that ar e allowed to manage the access point. Use the no form to de lete an SNMP v3 user . Syn tax snmp-s erver user < user -name> user -nam e - A use r -defined string for the SN MP user .
6-53 Using th e Command Line Interface • The comm and prompts f or the following informatio n to configur e an SNMP v3 user: - user-nam e - A user-de fined stri ng for t he SNMP user. ( 32 chara cters maximum) - grou p-na me - The name of the SNMP grou p to which the use r is assigned ( 32 characters ma ximum).
6-54 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax snmp-s erver targets < target- id > < ip-add r > < sec-name > [ version { 3 }] [ udp-p ort { port-numbe r }] [ notificatio n-type { TRAP }] no snmp -server targets < target-id > • target-id - A user -defined name th at iden tifies a receiver o f SNMP notif ications.
6-55 Using th e Command Line Interface Syn tax snmp-s erver filter < filter -id > < includ e | exclude > < subtree > [ mask { mask }] no snmp -server filter < filter -id > [ subtree ] • filter-id - A use r-defin ed nam e that id entifies an SNM P v3 no tificatio n filter .
6-56 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple snmp-s erver filt er -assignme nts This command ass igns SNMP v3 notif ication filte rs to targets.
6-57 Using th e Command Line Interface Syn tax show snmp gr oups Comm and Mode Exec Exam ple show snmp us ers This command displa ys the SNMP v3 users and s ettings . Syn tax show snmp us ers Comm and Mode Exec Exam ple show snmp gr oup-as signmen ts This co mmand displays th e SNMP v3 user gr oup assignmen ts.
6-58 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax show snmp gr oup- assignmen ts Comm and Mode Exec Exam ple show snmp target This command displa ys the SNMP v3 noti fication tar get settings. Syn tax show snmp target Comm and Mode Exec Exam ple show snm p filter This command displa ys the SNMP v3 noti fication fi lter settings.
6-59 Using th e Command Line Interface Comm and Mode Exec Exam ple show s n mp fil ter -assignments This command displa ys the SNMP v3 noti fication fi lter assignmen t s. Syn tax sho w sn mp fi lt er -a ssi gnm e nts Comm and Mode Exec Exam ple Outdoor 11a Building to Building#show snmp filter Filter: trapfilter Type: include Subtree: iso.
6-60 C HAPTER 6: C OMMAND L INE I NTERFACE show s nmp This co mmand displays the SNMP conf iguratio n settings. Comm and Mode Exec Exam ple Outdoor 11a Building to Building #show snmp SNMP Information.
6-61 Using th e Command Line Interface Flash/File Commands These command s are used to mana ge the system code or configu ration files. Ta b l e 17 Flash/File Commands bootfile This command specifies the image used to star t up the system. Syn tax bootfile < filen ame > filename - Na me o f the imag e file .
6-62 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple copy This co mmand copies a boot file , code image, or conf iguratio n file between th e access point ’ s flash memory and a F TP/TF TP server .
6-63 Using th e Command Line Interface Exam ple The fo llow ing exam ple s hows how to up loa d the c onf igurati on se tting s to a fil e on the TF TP server: The fo llow ing exam ple s hows how to do wnlo ad a c onf igurat ion fi le: delete This command deletes a fi le or image.
6-64 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple This example shows how to d elete th e test.cfg configurat ion file from flash memory . Relate d Comm ands bootfil e (6-6 1) dir (6-6 4) dir This command displays a list of files in flash memory .
6-65 Using th e Command Line Interface show bootfil e This command displa ys the name of the curr ent operation co de file that booted the system. Syn tax sho w sn mp fi lt er -a ssi gnm e nts Comm an.
6-66 C HAPTER 6: C OMMAND L INE I NTERFACE radiu s-serv er ad dress This command specifies the primary and secondary RADIUS servers. Syn tax radi us-ser ver [ secondary ] address < host_i p_address | host_n ame > • secondary - Secondary server.
6-67 Using th e Command Line Interface Exam ple radi us-ser ver key This co mmand sets the RADIUS en cryption key . Syn tax radi us-ser ver [ secondary ] key < key_string> • secondary - Secondary server. • key_string - Encryptio n key used to authenticate logo n access for client.
6-68 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g 3 Comm and Mode Globa l Configura tion Exam ple radi us-ser ver timeo ut This comm and sets the in terval bet ween tran smitting a uthentica tion reque sts to the RADIU S server . Syn tax radi us-ser ver [ secondary ] timeout number_ of_seconds • secondary - Secondary server.
6-69 Using th e Command Line Interface Default Settin g 0 (disa bled) Comm and Mode Globa l Configura tion Comman d Usage • When the RADI US Accounti ng serve r UDP por t is speci fied, a RADIUS accounting session i s automa tically sta rted for e ach use r that i s successfully authenticate d to t he access point.
6-70 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax radi us-ser ver radi us-mac- format < mu lti-c olon | multi-dash | no-d elimite r | si n gle-dash > • multi-c olon - Enter MAC addresses in the form xx:xx:xx:xx:xx:xx. • multi- dash - Enter MAC a ddresses in the form xx-xx-xx-xx-xx-xx.
6-71 Using th e Command Line Interface Default Settin g None Comm and Mode Exec Exam ple 802.1X Authentication The access point supports IEEE 802.1X access control for wire l ess clients. This contr ol featur e preven ts unauthori zed access to the network by r equiring an 802.
6-72 C HAPTER 6: C OMMAND L INE I NTERFACE Ta b l e 19 802.1X Authentica tion 802.1x This co mmand configur es 802.1X as optionally s upported or as r equir ed for wireless clients. Use th e no f orm to d isable 8 02.1X s upport. Syn tax 802.1x < supporte d | re qu i re d > no 802.
6-73 Using th e Command Line Interface stati ons initiati ng 802.1X, only those statio ns successfull y authenticat ed are al low ed to acce ss t he ne twor k. For thos e st atio ns no t ini tiati ng 802.1X , access to the net work is allowed after succes sful 802.
6-74 C HAPTER 6: C OMMAND L INE I NTERFACE • When 80 2.1X is requ ired, the access point enforce s 802.1X auth entication for al l 802.11 associat ed stations. If 802.1X auth entication is not initia ted by the s tation, the access poi nt will init iate authen tication .
6-75 Using th e Command Line Interface Exam ple 802.1x session- key-re fresh-r ate This comma nd sets th e interval a t which u nicast sessio n keys are refreshed for associa ted stations us ing dynamic keyi ng. Syn tax 802.1x session-k ey-refresh-rate < rate> rate - The inte rval at which the a ccess point refreshes a session key .
6-76 C HAPTER 6: C OMMAND L INE I NTERFACE Default 0 (D isabled) Comm and Mode Globa l Configura tion Exam ple 802.1x -suppli cant ena ble This co mmand enables the access poi nt to operate as an 80 2.1X supplic ant for authen tication. Use th e no form to di sable 802.
6-77 Using th e Command Line Interface Syn tax 802.1x -suppli cant user < username> <pa ssword> no 802. 1x-suppl icant user • userna me - The access p oint name used for authenticati on to t he networ k. (Range: 1-32 alphanumeri c characters ) • password - The MD5 pass word use d for a ccess poin t authen tication .
6-78 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Exec Exam ple MAC Address Authenticat ion Use these comm ands to define M AC authen tication on the access point. For local MAC auth enticati on, first d efine the defa ult filte ring pol icy using the ad dress filter defaul t command.
6-79 Using th e Command Line Interface address filter default This co mmand sets fi ltering to allow or d eny listed M A C add resses. Syn tax address filte r defa ult < allo wed | denie d > • allo wed - Onl y MAC addresses entered as “ denied” in t he address filter ing table are denied.
6-80 C HAPTER 6: C OMMAND L INE I NTERFACE Default None Comm and Mode Globa l Configura tion Comm and Mode • The a ccess poi nt supp orts up to 1024 M AC a ddres ses. • An entry in t he address table m ay be allowed or denied access de pending on the g lobal se tting co nfigured for the addre ss entry defa ult command.
6-81 Using th e Command Line Interface address filter delete This command deletes a MAC add ress fr om the filter table . Syn tax address fi lter dele te < mac-address> mac-addre ss - P hysi cal ad dress of clie nt. (E nter six pair s of he xadec imal digits sep arated by hyph ens.
6-82 C HAPTER 6: C OMMAND L INE I NTERFACE Default Disabled Comm and Mode Globa l Configura tion Exam ple Relate d Comm ands addr ess filter entr y (6-79) radius- serve r addres s (6-66) 802.
6-83 Using th e Command Line Interface Ta b l e 21 Filtering Commands filter loc al-bridg e This co mmand disables comm unication betw een wireless clients.
6-84 C HAPTER 6: C OMMAND L INE I NTERFACE Default Disabled Comm and Mode Globa l Configura tion Comman d Usage This c omma nd c an di sabl e wireles s-to- wirele ss com muni catio ns be tween clients via the acce ss point. However , it does not af fect communications between wi reless cl ients and the wir ed netw ork.
6-85 Using th e Command Line Interface filter ap -man age This co mmand preven ts wireles s clients fr om accessing t he management in terface on the access poin t.
6-86 C HAPTER 6: C OMMAND L INE I NTERFACE Default Disabled Comm and Mode Globa l Configura tion Exam ple fil ter ethernet-typ e enable This co mmand checks the Et her net type on all inc oming and outg oing Ethernet packets ag ainst the pro tocol filter ing table.
6-87 Using th e Command Line Interface fil ter ethernet-t ype prot ocol This comman d sets a filter for a specific E t hernet type. U se the no form to disable filter ing for a specifi c Ethernet t ype.
6-88 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple WDS Bridge Commands The commands de scribed in this section ar e used to set the operation mode for each access poi nt interface and conf igure WI reless Distribut ion System (WDS) forwarding table settings .
6-89 Using th e Command Line Interface bridge m ode This command select s between Maste r and Slave mo de. Syn tax bridge m ode < master | slave > • master - Operates as a master ena bling up to five slave links. • slave - Oper ates as a s lave with on ly one link to the maste r .
6-90 C HAPTER 6: C OMMAND L INE I NTERFACE When th e access poi nt is op eratin g in th is mod e, traff ic is not forwar ded to the Et herne t port fro m the ra dio in terface. • Up to f our WDS bridge links (MAC addres ses) per ra dio interfa ce can be specified for each un it in the wir eless bridge network.
6-91 Using th e Command Line Interface brid ge-lin k paren t This co mmand configur es the MAC addr ess of th e parent bri dge node. Syn tax brid ge-lin k pare nt < mac-address > mac-ad dress - The wi reless MAC a ddress of the parent bri dge un it.
6-92 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g None Comm and Mode Interface Confi guratio n (W ireless) Comman d Usage • In r oot bridge mode , up to six child bridge l inks can be speci fied using li nk inde x numbers 1 to 6. • In br idge mode, up to fiv e child links can be specified using li nk index numbers 2 to 6.
6-93 Using th e Command Line Interface Default Settin g 300 seco nds Comm and Mode Globa l Configura tion Comman d Usage If the MAC ad dress of an entry i n the addr ess table is not seen on the associated interface for long er tha n the ag ing time, the entry is discarded.
6-94 C HAPTER 6: C OMMAND L INE I NTERFACE show bridge aging- time This co mmand displays the current WDS forwarding table ag ing tim e setti ng..
6-95 Using th e Command Line Interface Comm and Mode Exec Exam ple show bridge filter -entry This comm and di splays current en tries in the WDS forwarding tab le.
6-96 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple Outdoor 11a Building to Building#show bridge filter-entry max entry numbers =512 current entry nums =13 ********************************************.
6-97 Using th e Command Line Interface show brid ge link This co mmand displays WDS brid ge link and spanni ng tree settings fo r speci f ied interfaces. Syn tax show brid ge link < ethernet | wir eless < a | g > [ index ]> • ethe rne t - Specifies the Eth ernet in terface.
6-98 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Exec Exam ple Outdoor 11a Building to Building#show bridge link wireless a Interface Wireless A WDS Information ===============================.
6-99 Using th e Command Line Interface Spanning Tree Command s The commands de scribed in this section ar e used to set the MAC addr ess table aging tim e and span ning tree para meters for both th e Ether net a nd wireless interfaces. Ta b l e 23 Bridge Commands brid ge stp enab le This command enable s the Spanning T r ee Protoco l.
6-100 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax [ no ] bridge s tp en able Default Settin g Enabled Comm and Mode Globa l Configura tion Exam ple This exampl e globally enab les the Spanning T r ee Protoco l.
6-101 Using th e Command Line Interface changes be fore it starts to forwa rd frames. In additio n, each por t needs time to listen for conflicting information t hat would make it r eturn to the disca rding state ; otherwise , temporary data loops might r esul t.
6-102 C HAPTER 6: C OMMAND L INE I NTERFACE Syn tax brid ge stp max- age < seco nds > no bridg e stp m ax-age seconds - Time in seconds. (Range: 6-40 seconds) The m inimu m val ue is th e hi gher of 6 or [2 x (he llo-time + 1)]. The m aximum v alue i s the l ower of 40 or [2 x (forward-time - 1) ].
6-103 Using th e Command Line Interface Default Settin g 32768 Comm and Mode Globa l Configura tion Comman d Usage Bridg e priority is used in sel ecting the r oot devic e, root po rt, and design ated port. T he device with the hi ghest p riority be comes the STP root device .
6-104 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple bridge-link port-prio rity Use this comma nd to co nfigure th e prio rity for the spe cifie d po rt. Syn tax bridge-link port-prio rity < index > < priority> • index - Specifies the bridge link nu mber on the wir eless bridge .
6-105 Using th e Command Line Interface Syn tax show brid ge stp Comm and Mode Exec Exam ple Ethernet Interface Comm ands The com mands described in thi s sectio n con figure conne ction pa rame ters for th e Ether net port and wireless interface .
6-106 C HAPTER 6: C OMMAND L INE I NTERFACE interface ethern et This co mmand enters Ethernet in terface conf iguration mode . Default Settin g None Comm and Mode Globa l Configura tion Exam ple T o s.
6-107 Using th e Command Line Interface Relate d Comm ands show inte rface ethernet (6-110) ip address This command sets the IP address for the access po int.
6-108 C HAPTER 6: C OMMAND L INE I NTERFACE ip dhc p This co mmand enables the access poi nt to obtain an IP addr ess from a DH CP server . Use the no form to restore the defa ult IP address.
6-109 Using th e Command Line Interface speed -dupl ex This co mmand configur es the speed and duplex mode of a given interf ace when autone gotiation is di sabled.
6-110 C HAPTER 6: C OMMAND L INE I NTERFACE Comman d Usage This comman d allows you to disabl e the Ethernet port due t o abnormal behav ior (e.g., excessive col lisions), and r eenable it aft er the prob lem has been r esolved. Y ou may also want to disabl e the Ethernet port for secu rity r easons.
6-111 Using th e Command Line Interface Wireless Interface Com mands The com mands described in thi s sectio n con figure conne ction pa rame ters for th e wireless interfaces.
6-112 C HAPTER 6: C OMMAND L INE I NTERFACE interface wireless This comman d enters wireless interface con figurati on mode. Syn tax interface wi reless < a | g > • a - 80 2.11a ra dio in terface. • g - 80 2.11g ra dio inte rface. Default Settin g None Comm and Mode Globa l Configura tion Exam ple T o specif y the 80 2.
6-113 Using th e Command Line Interface vap This command pro vides access to the V AP (Virt ual Access Point) inte r face confi guration mode. Syn tax vap < vap-id > vap-id - The numbe r that identi fies the V AP in terface.
6-114 C HAPTER 6: C OMMAND L INE I NTERFACE (e.g., settin g the speed to 54 Mb ps limits the eff ective maximum spe ed to 108 Mbps ). Exam ple turbo This co mmand sets the access po int to an enhanced propriet ary modulati on mode (not regulat ed in IEEE 802.
6-115 Using th e Command Line Interface rate. H oweve r, this reduce s the n umber of cha nnel s supp orted (e.g., 5 channel s for the Unit ed States).
6-116 C HAPTER 6: C OMMAND L INE I NTERFACE channel This co mmand configur es the radio ch annel thr ough which the acc ess point communicates with wir e less clients. Syn tax channel < channel | auto > • channel - Manually sets t he radio chan nel used for comm unications w ith wirele ss clients .
6-117 Using th e Command Line Interface transmit-power This command adjust s the power o f the radi o signals transmitte d from t he access point. Syn tax transmit-power < signal-stren gth> signal-strength - Signal strength tran smitted from the access po int.
6-118 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g b+g mode Comm and Mode Inter face Configur ation (Wireles s - 802.11g) Comman d Usage • For Japa n, on ly 13 cha nnels are ava ila ble wh en set to g or b+g modes. When set to b mode, 14 ch annels are avail able.
6-119 Using th e Command Line Interface Exam ple antenna control This command select s the use of two dive rsity antenna s or a single anten na for the radio in terface . Syn tax antenna control < di versity | left | right > • divers ity - The radio uses both ant ennas in a diversity system .
6-120 C HAPTER 6: C OMMAND L INE I NTERFACE antenna id This comma nd spec ifies the antenna typ e conne cted to the access poin t r epresen ted by a four -digit he xadecimal ID num ber , eithe r the integra ted diversity antenn as (the "Defaul t Anten na") or an optio nal external antenna.
6-121 Using th e Command Line Interface Default Settin g Indoor Comm and Mode Interface Confi guratio n (W ireless) Comman d Usage • When an ex ternal antenna is selected, the ant enna contro l must be set to “rig ht.
6-122 C HAPTER 6: C OMMAND L INE I NTERFACE dtim-pe riod This command configu res th e rate at whic h stations in sleep mode must wake up to receive broadcast/multi cast tran smissions. Syn tax dtim-pe riod < in ter val> inter val - Interval b etween the bea con frames that transm it broadcast or multicast traffic.
6-123 Using th e Command Line Interface fragmenta tion-leng th This comm and c onfig ures the mini mum pack et si ze t hat ca n be fragm ented when passing through the access point. Syn tax fragmenta tion-leng th < lengt h> length - Minimum packet size for which fragm entation is allowed.
6-124 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g 2347 Comm and Mode Interface Confi guratio n (W ireless) Comman d Usage • If the threshold is set to 0, the access po int always sends RTS sig nals. If set to 2347, the access point never sen d s RTS signals.
6-125 Using th e Command Line Interface Exam ple super -g This command enables Ather os prop r ietary Su per G performance enhan cements. Use the no fo rm to disable t his functi on. Syn tax [ no ] super - g Default Settin g Disabled Comm and Mode Inter face Configur ation (Wireles s - 802.
6-126 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple ssid This command confi gures the servi ce set identifier (SSID). Syn tax ssid < stri ng > string - The name of a ba sic service set sup ported by the access poin t. (Range: 1 - 32 chara cters) Default Settin g 802.
6-127 Using th e Command Line Interface Comm and Mode Interface Configurat ion (Wireless-V AP) Comman d Usage When close d system is enabled, the access p oint will not includ e its SSID in beacon mes sages. Nor will it r espond to pr obe r equests fr om clients that do not in clude a fixed SSID .
6-128 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g 30 Comm and Mode Interface Configurat ion (Wireless-V AP) Exam ple auth- timeo ut-va lue This co mmand configur es the tim e inte rval within which cli ents must comple te authenticat ion to the V A P interface.
6-129 Using th e Command Line Interface Comm and Mode Interface Configurat ion (Wireless-V AP) Comman d Usage Y ou m ust first enab le V AP interface 0 before you can e nable V AP interfa ces 1, 2, 3, 4, 5, 6, or 7. Exam ple show interface wireless This comman d displays the status for th e wireless interface.
6-130 C HAPTER 6: C OMMAND L INE I NTERFACE Comm and Mode Exec Exam ple Outdoor 11a Building to Building #show interface wireless g 0 Wireless Interface Information ========================================================================= ----------------Identification------------------------------------------- Description : Enterprise 802.
6-131 Using th e Command Line Interface ----------------Security------------------------------------------------- Closed System : Disabled Multicast cipher : WEP Unicast cipher : TKIP and AES WPA clie.
6-132 C HAPTER 6: C OMMAND L INE I NTERFACE WMM AP Parameters AC0(Best Effort) : logCwMin: 4 logCwMax: 6 AIFSN: 3 Admission Control: No TXOP Limit: 0.000 ms AC1(Background) : logCwMin: 4 logCwMax: 10 AIFSN: 7 Admission Control: No TXOP Limit: 0.000 ms AC2(Video) : logCwMin: 3 logCwMax: 4 AIFSN: 1 Admission Control: No TXOP Limit: 3.
6-133 Using th e Command Line Interface show statio n This command shows the wireless clients associa t ed with the access point. Comm and Mode Exec Exam ple Rogue AP Detection Comm ands A “r ogue A.
6-134 C HAPTER 6: C OMMAND L INE I NTERFACE The acc ess point can be c onfigur ed to periodi cally scan al l radio cha nnels and fin d other access points within ra nge. A databa se of nearby acces s points is mainta ined where any r ogue APs can be identif ied.
6-135 Using th e Command Line Interface The r ogue AP dat abase can be viewed us ing the show rogue- ap command. • The access point sends Syslog messages for each detected access point during a ro gue A P sc an. Exam ple rogue-ap au thent icate This comm and forces th e unit to authe nticate a ll access po ints on th e networ k.
6-136 C HAPTER 6: C OMMAND L INE I NTERFACE access point s are allo wed or are r ogues. If you en able authenti cation, you shoul d also config ure a RADI US server for this acc ess point (s ee “RADIUS” on pa ge 8 ). Exam ple rogue-ap durati on This comman d sets the scan duration for de tecting access points.
6-137 Using th e Command Line Interface Syn tax rogue-ap interval <m inute s> minut es - The int erval bet ween consecuti ve scans. (R ange: 30-1008 0 minut es) Default Settin g 720 minu tes Comm and Mode Interface Confi guratio n (W ireless) Comman d Usage This comman d sets the inter val at which scans o ccur .
6-138 C HAPTER 6: C OMMAND L INE I NTERFACE Default Settin g Disabled Comm and Mode Interface Confi guratio n (W ireless) Comman d Usage While the access point scans a channel for rogue APs, wir eless cl ients will not be ab le to connect to the acc ess point.
6-139 Using th e Command Line Interface show rogue-ap This comm and di splays the current rogue AP d atabase . Comm and Mode Exec Exam ple Wireless Security Com mands The comma nds describ ed in this se ction conf igure param eters for wireless secur ity on the 802 .
6-140 C HAPTER 6: C OMMAND L INE I NTERFACE auth This comma nd con figures authentica tion fo r the V AP inte rface. Syn tax auth < open -syst em | shar ed-key | wp a | wpa-psk | wpa2 | wpa2-p sk |.
6-141 Using th e Command Line Interface • To use WEP share d-key authentica tion, set the auth entication type to “shared -key” and define at least one static WEP key with the ke y command.
6-142 C HAPTER 6: C OMMAND L INE I NTERFACE WEP). To pl ace the VAP in to AES only mode , use “requi red” and the n select the “cipher-ccm p” op tion for the cipher-suit e comma nd. Exam ple Relate d Comm ands encrypti on (6-142) key (6- 143) encr ypti on This command enables data encryp tion for wireless communi cations.
6-143 Using th e Command Line Interface Exam ple Relate d Comm ands key (6- 143) key This co mmand sets the keys used fo r WEP encryp tion. Use the no form to dele te a config ured key . Syn tax key < in dex > < size > < type > < val ue > no key i ndex • index - Key index.
6-144 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple Relate d Comm ands key (6- 143) encrypti on (6-142) transmit-k ey (6-14 4) transmit-key This comma nd sets the ind ex of the key to b e used for en crypting dat a frames for broadcast or m ulticast traffic transm itted from the VAP to wireless clients.
6-145 Using th e Command Line Interface • In a mixed-mode e nvironment wit h clients us ing static a nd dynamic keys, select t ransmit key index 2, 3, or 4.
6-146 C HAPTER 6: C OMMAND L INE I NTERFACE and a re-k eying mechanism. Select TKIP i f there ar e clients in the n etwork that are not WPA2 comp liant. • TKIP def ends against attack s on WEP in which t he unencrypted initial ization v ector in encrypte d packets is used to calculate the WEP key.
6-147 Using th e Command Line Interface The MIC ca lculation is perform ed in the access poi nt for each tr ansmitted packet and this can imp act throughpu t and perfor mance. The access poin t suppor ts a choi ce of hard ware or so ftware for M IC ca lcula tion.
6-148 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple Relate d Comm ands auth (6-1 40) pmksa-l ifetime This comm and sets the time for ag ing ou t cached W P A2 P airwise Master Ke y Security Asso ciation (PMKSA) inform ation for fast roamin g. Syn tax pmksa-l ifetime < minutes> minut es - The time for agin g out PM KSA informa tion.
6-149 Using th e Command Line Interface Exam ple pre-authenticatio n This command enable s WP A2 pr e-authenti cation for fast secur e roa ming. Syn tax pr e-authenticati on < enable | dis able > • enab le - Enables pre-auth entication for th e VAP interface.
6-150 C HAPTER 6: C OMMAND L INE I NTERFACE Link Integrity Commands The acce ss point pr ovides a link integr ity featur e that c an be us ed to ensur e that wir eless clients are con nected to reso urces on the wir ed network. The access point does thi s by peri odically se nding Pin g messages to a hos t device in the wir ed Ethernet network.
6-151 Using th e Command Line Interface host d oes not r espond or is u nreachabl e) exceeds the limit set by t he link-inte grity pi ng-fai l-retry command, t he link is determi ned as lost. Exam ple link-inte grity ping-ho st This co mmand configur es the link host name or IP add ress.
6-152 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple link-inte grity pi ng-fai l-retry This co mmand configur es the number of consecutive fai led Ping counts bef ore the link is dete rmined as lost. Syn tax link-inte grity pi ng-fai l-retry < coun ts > counts - The number of fai led Ping count s befor e the l i nk is det ermined as lost.
6-153 Using th e Command Line Interface Syn tax [ no ] link-inte grity et her net -dete ct Default Settin g Disabled Comm and Mode Globa l Configura tion Exam ple show lin k-integri ty This com man d displ ays the curren t link inte grity co nfig urati on.
6-154 C HAPTER 6: C OMMAND L INE I NTERFACE iapp This comm and ena bles the pro tocol sig nalin g required to han d ov er wireles s client s roamin g between dif fer ent 802.11f-co mpliant acces s points. Use the no form to di sable 802.11f signaling.
6-155 Using th e Command Line Interface The VLAN comman ds supported by the access po int are li sted below . Ta b l e 29 VLAN Commands NOTE: When VLANs ar e enabled, the access poin t’ s Ethernet por t drops all received tr affic that d oes no t include a VLAN ta g.
6-156 C HAPTER 6: C OMMAND L INE I NTERFACE vlan This command enable s VLANs for all traf fic. Use the no form to di sable VLAN s. Syn tax [ no ] vlan ena ble Default Disabled Comm and Mode Globa l Co.
6-157 Using th e Command Line Interface Default Settin g 1 Comm and Mode Globa l Configura tion Comman d Usage The managem ent VLAN is for man aging the access point . For example, the access point all ows traffic that is tagged with th e specified VLAN to manage the access po int via re mote management, SS H, SNMP , T elnet, et c.
6-158 C HAPTER 6: C OMMAND L INE I NTERFACE • If the VLAN ID has not been config ured for a clie nt on the RADI US server, then the frames are tag ged with the d efault V LAN ID of th e VAP interface . Exam ple WMM Commands The access poin t implements QoS usi ng the W i-Fi Multimed ia (WMM) standar d.
6-159 Using th e Command Line Interface Default suppo rted Comm and Mode Interface Confi guratio n (W ireless) Exam ple wmm-a cknow ledg e-po licy This comman d allows the acknowl edgement wait time to b e enabled or disa bled for each A ccess Catego ry (AC).
6-160 C HAPTER 6: C OMMAND L INE I NTERFACE Exam ple wmmpar am This co mmand configur es detail ed WMM parameter s that apply to th e access point (AP ) or the wireless clients (BS S).
6-161 Using th e Command Line Interface Default Comm and Mode Interface Confi guratio n (W ireless) Exam ple AP Param eters WMM Par ameters AC0 ( Best Effort) AC1 (Background) AC2 (Video) AC3 (V oice).
6-162 C HAPTER 6: C OMMAND L INE I NTERFACE.
A-1 A T R OUBLESHOOTING Check the following i tems befor e you con tact local T echnical Suppo rt. 1 If wi reless bridge uni ts do not associate with each o ther , check th e following: Check the p ower injector LED fo r each b ridge un it to be su re that power is bein g supplied.
A-2 If a uthentication is being performed throu gh IEEE 80 2.1X, be su re t he wir eless users ha ve installed an d prope rly configur ed 802.1 X client softwar e. If MAC addr ess filterin g is enabled, be sur e the client’ s addr ess is included in the l ocal filter ing database or on the RADIUS serv er database .
A-3 Reset the bridge’ s har dware us ing the consol e interface, w eb in terface, or through a power r e set..
A-4.
B-1 B C ABLES AND P INOUTS T WISTED -P AIR C ABLE A SSIGNMEN TS For 10/100 BASE-TX connect ions, a twisted- pair cable must have two pa irs of wir es. Each wire pair is iden tified by two dif fer ent colors. For exa mple, one wir e might b e green and the other , gr een with whi te stripes.
B-2 10/10 0B ASE-TX P IN A SSIGNMENTS Use uns hielde d twiste d-pair (UT P) or shi elded twisted- pair (ST P) cabl e for RJ-45 connec tions : 100-oh m Categ ory 3 or better cable for 10 Mbps c onnecti ons, or 100-o hm Category 5 or better cable for 10 0 Mbps connectio ns.
B-3 S TRAIGHT -T HR OUGH W IRING Becaus e the 10/10 0 Mbps Input por t on the power injec tor uses an MDI pi n confi guration, you mus t use “straigh t-thr ough” cable for net work connecti ons to hubs or switches that only h ave MDI-X ports.
B-4 C R O SSOVER W IRING Becaus e the 10/10 0 Mbps port on the po wer injector uses an MD I pin confi guration, you must use “cr ossover” cabl e for network conne ctions to PCs, servers or o ther en d node s that onl y have M DI ports.
B-5 8-P IN DIN C ON NECTOR P INOUT The Ethernet cab le from t he power injector co nnects to an 8-pi n DIN connect or on the wir eles s brid ge. This conn ector is descr ibed in the foll owing figur e and table.
B-6 8-P IN DIN TO RJ-45 C ABLE W IRING T o construct an ex tended Ethernet cab le to connect fr om the power inject or’ s RJ-4 5 Output port to t he wireles s bridge’ s 8-pin D IN conn ector , fo llow the wiring diagr am below .
Glossary-1 G LOSSARY 10BASE-T IEEE 802. 3 sp eci f icat i on for 10 M bps Et he rnet over tw o pairs of Cat eg ory 3 or bet ter UT P cable . 100BASE- TX IEEE 802.3u spe cificat ion for 100 Mbps Fast Ether net over two pairs of Categ ory 5 or better UTP cable.
Glossary-2 Broadcast Key Broadca st key s are se nt to station s us ing 802. 1X dy namic key ing. Dyna mic bro ad cas t key rotation is often us ed t o al low th e ac cess po i nt to ge ne rate a ran do m group ke y and per i od ically update all key -mana geme nt capable w i r el es s cl i ents.
Glossary-3 IEEE 802.11 b A wireless s tandard th at supp or ts wirel e ss comm unicat i ons in the 2.4 G Hz ba nd usi ng Di r ect Sequence S pre ad Spectrum (DSS S). The standar d pr ov ides for data rat es of 1, 2, 5.5, and 1 1 Mbps. IEEE 802.11 g A wireless s tandard that supp orts wirele ss c ommun ications in the 2.
Glossary-4 RADIUS A logon auth entica tion proto col that us es software ru nning on a c entral ser ver to co ntrol acce ss to the netw ork . Roaming A wireles s LAN m obile us er mov es aroun d an E SS and maintains a continu ous conn ection to the infrastr u cture network.
Glossary-5 network ser vi ce s. Al l the s erv i ces are del i ve re d usi ng a single rad io cha nne l, enabli ng Virtual AP technolo gy to op tim i ze t he use o f limited WLAN ra dio sp ectrum .
Glossary-6.
Index-7 I NDEX Numbers 802.11g 6-11 2 A AES 5-58 authentication 5-10 cipher suite 6- 141 closed sy stem 6-127 conf igur ing 5-1 0 MAC ad dres s 5-12, 6-79 type 4- 9, 5-50, 6-127 web r edire ct 5-1 4, .
Index-8 H hard ware ve rs ion , di spla yi ng 6-2 7 HTTP , secure server 6-21 HTTPS 6-2 1 I IAPP 6-153 IEEE 80 2.11a 1-2, 5-37, 6-112 configuring inte rface 5-38, 6-1 12 maximum data rate 6- 115 radio chan nel 6-1 16 IEEE 80 2.11b 5-37 IEEE 80 2.11f 6-1 53 IEEE 80 2.
Index-9 configuring 4-6 SSL 6-21 ST A interface setting s 6-103 to ?? path cost 6-1 03 port priority 6-104 startup files, setti ng 6-6 1 station s tatus 5-61, 6-133 status displa y ing devi ce status .
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il 3Com WL-575 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del 3Com WL-575 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso 3Com WL-575 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul 3Com WL-575 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il 3Com WL-575, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del 3Com WL-575.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il 3Com WL-575. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo 3Com WL-575 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.