3e Technologies 527A3 Wireless Mesh Access Point/Bridge/Switch User Manual CERTIFICATE OF COMPLIANCE

3e Technologies International, Inc. Wireless Mesh Access Point/Bridge/Switch CERTIFICATE OF COMPLIANCE

User Manual

Download: 3e Technologies 527A3 Wireless Mesh Access Point/Bridge/Switch User Manual CERTIFICATE OF COMPLIANCE
Mirror Download [FCC.gov]3e Technologies 527A3 Wireless Mesh Access Point/Bridge/Switch User Manual CERTIFICATE OF COMPLIANCE
Document ID722923
Application ID1KbA5oYXViIXF8NLr+jplQ==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize307.05kB (3838127 bits)
Date Submitted2006-10-31 00:00:00
Date Available2006-10-31 00:00:00
Creation Date2006-10-25 09:38:17
Producing SoftwareAcrobat Distiller 7.0 (Windows)
Document Lastmod2006-10-31 12:08:43
Document TitleCERTIFICATE OF COMPLIANCE
Document CreatorAcrobat PDFMaker 7.0 for Word
Document Author: Systems Administrator

Rhein Tech Laboratories, Inc.
360 Herndon Parkway
Suite 1400
Herndon, VA 20170
http://www.rheintech.com
Appendix K:
Client:
Model:
Standards:
ID’s:
Report #:
3e Technologies Int’l
3e-527A3
FCC 15.247 & RSS-210
QVT-527A3/6780A-527A3
2006146
User Manual
Please refer to the following pages.
Page 81 of 114
ERRATA SHEET
Changes to 29000152-001 Revision C
Chapter 6, page 99, Paragraph titled “Radio Frequency Interference Requirements”
The text currently reads:
“This device has been tested and found to comply with the limits for a Class A Digital Device,
pursuant to Part 15 of the Federal Communications Commission’s Rules and Regulations.”
The text should read:
“This device has been tested and found to comply with the limits for a Class B Digital Device,
pursuant to Part 15 of the Federal Communications Commission’s Rules and Regulations.”
The following information should be appended to the “Radio Frequency Interference Requirements” section:
“Radiation Exposure Statement
This equipment shall only be installed and operated with the antenna types shown below, with
gains not more than those shown below for each of the antennas, respectively, and installed with a
minimum of 20 cm of separation distance between the antenna and all persons during normal
operation.
Per FCC 1.1310 Table 1B, the maximum permissible RF exposure for an uncontrolled
environment is 1 mW/cm2 for the frequencies used in this device. The worst case power at the
center frequency of the band of operation is used for the calculation below. The power density
at a 20 cm distance is shown for each of the antenna options. As shown, the calculated power
density is well below the FCC’s limit. The actual power density for the EUT calculated as
shown below.
where:
S = power density
P = transmitter conducted power in (mW)
G = antenna numeric gain
d = distance to radiation center (cm)
Frequency
2.4 GHz
5725 - 5825 GHz
29000152-100 Revision C
Antenna
Dual Band Omni
Antenna with N Male
Connector
Rubber Duck Omni
Antenna with N Male
Connector
Antenna
Max Gain
(dBi)
Numeric
Gain
Power
(mW)
Separation
Distance
(cm)
Power
Density
(mW/cm2)
2.1
1.6
355
20
0.113
372
20
0.148
Page 1 of 1
�
Wireless Access Point – 8 Port
User's Guide
Model 3e–527A3
3e Technologies International
700 King Farm Blvd., Suite 600
Rockville, MD 20850
(301) 670-6779 www.3eti.com
29000152-001 B
publ. 1003/06
This page intentionally left blank.
3e Technologies International's
Wireless Access Point – 8 Port
User's Guide
Model 3e–527A3
Copyright © 2006 3e Technologies International, Inc. All rights reserved. No part of this
documentation may be reproduced in any form or by any means or to make any derivative work
(such as translation, transformation, or adaptation) without written permission from 3e Technologies
International.
3e Technologies International reserves the right to revise this documentation and to make changes in
content from time to time without obligation on the part of 3e Technologies International to provide
notification of such revision or change.
3e Technologies International provides this documentation without warranty, term or condition
of any kind, either implied or expressed, including, but not limited to, the implied warranties,
terms, or conditions of merchantability, satisfactory quality, and fitness for a particular purpose.
3e Technologies International may make improvements or changes in the product(s) and/or the
program(s) described in this documentation at any time. Certain features listed may have restricted
availability and/or are subject to change without notice - please confirm material features when
placing orders.
If there is any software or removable media described in this documentation, it is furnished under a
license agreement included with the product as a separate document, in the printed documentation,
or on the removable media in a readable file such as license.txt or the like. If you are unable to locate a
copy of the license, contact 3e Technologies International and a copy will be provided to you.
___________________________________
UNITED STATES GOVERNMENT LEGEND
If you are a United States Government agency, then this documentation and the product described
herein are provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private
expense. Software is delivered as “Commercial Computer Software” as defined in DFARS 252.2277014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with
only such rights as are provided in 3e Technologies International’s standard commercial license for
the software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015
(Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface
any portion of any legend provided on any licensed program or documentation contained in, or
delivered to you in conjunction with, this User Guide.
___________________________________
3e Technologies International and the 3e Technologies International logo are registered trademarks.
Windows is a registered trademark of Microsoft Corporation. Any other company and product name
mentioned herein is a trademark of the respective company with which they are associated.
EXPORT RESTRICTIONS
This product contains components, software, and/or firmware exported from the United States in
accordance with U. S. export administration regulations. Diversion contrary to U.S. law is prohibited.
Table of Contents
SAFETY INFORMATION ............................................................................................ vi
Chapter 1: Introduction...................................................................................................1
Basic Features .............................................................................................................2
Wireless Basics............................................................................................................3
802.11b .......................................................................................................................3
802.11a .......................................................................................................................3
802.11g.......................................................................................................................3
802.11b/g Mixed......................................................................................................3
802.11a Turbo............................................................................................................4
Network Configuration ............................................................................................4
Access Point Configurations..................................................................................5
Possible AP Topologies.........................................................................................5
Bridging ....................................................................................................................6
Default Configuration.............................................................................................6
Data Encryption and Security................................................................................6
SSID ...........................................................................................................................6
AES and 3DES..........................................................................................................7
MAC Address Filtering ..........................................................................................7
DHCP Server ............................................................................................................7
Operator Authentication and Management ........................................................7
Management ...............................................................................................................8
Chapter 2: Hardware installation................................................................................11
Preparation for Use..................................................................................................11
Installation Instructions ..........................................................................................11
Minimum System and Component Requirements ............................................12
Connectors and Cabling .........................................................................................12
Earth Ground Connection ....................................................................................13
The Indicator Lights ..............................................................................................14
Chapter 3: Access Point Configuration ......................................................................15
Introduction ..............................................................................................................15
Preliminary Configuration Steps ...........................................................................15
Initial Setup using the “Local” Port ......................................................................16
Login ..........................................................................................................................17
System Configuration..............................................................................................18
General ....................................................................................................................18
Operating Mode.....................................................................................................19
Submode...............................................................................................................19
Configure Wireless Cards ..................................................................................20
WAN........................................................................................................................21
LAN .........................................................................................................................22
Encrp Port...............................................................................................................23
Static AES Key .....................................................................................................24
Static 3DES Key ...................................................................................................25
Wireless Access Point Configuration ....................................................................26
General ....................................................................................................................26
Security ...................................................................................................................29
Static AES Key .....................................................................................................29
Static 3DES Key ...................................................................................................30
Dynamic Key Exchange .....................................................................................31
FIPS 802.11i ..........................................................................................................32
MAC Address Filtering ........................................................................................33
29000152-001 B
iii
Rogue AP Detection ..............................................................................................34
Advanced................................................................................................................35
Wireless Bridge.........................................................................................................35
Services Settings.......................................................................................................36
DHCP Server ..........................................................................................................36
Subnet Roaming.....................................................................................................37
SNMP Agent...........................................................................................................38
Admin User Management ......................................................................................40
List All Users ..........................................................................................................40
Add New User .......................................................................................................41
User Password Policy ...........................................................................................42
End User Authentication ........................................................................................43
General ....................................................................................................................43
User List ..................................................................................................................44
Add New User .......................................................................................................45
Add Authenticated MAC .....................................................................................46
List Authenticated MAC ......................................................................................46
Monitoring/Reports................................................................................................47
System Status .........................................................................................................47
Bridging Status.......................................................................................................48
Bridge Site Map .....................................................................................................49
Wireless Clients......................................................................................................50
Adjacent AP List ....................................................................................................51
DHCP Client List ...................................................................................................52
System Log .............................................................................................................52
Web Access Log .....................................................................................................53
Network Activity...................................................................................................54
Auditing ....................................................................................................................55
Log ...........................................................................................................................55
Report Query..........................................................................................................56
Configuration .........................................................................................................56
System Administration ...........................................................................................58
Email Notification Configuration .......................................................................58
Configuration-Button............................................................................................59
System Upgrade ....................................................................................................61
Firmware Upgrade..............................................................................................61
Local Configuration Upgrade ...........................................................................62
Remote Configuration Upgrade .......................................................................64
Factory Default ......................................................................................................66
Remote Logging.....................................................................................................67
Reboot .....................................................................................................................67
Utilities ....................................................................................................................68
Chapter 4: Gateway Configuration .............................................................................69
Introduction ..............................................................................................................69
Configuring in Gateway Mode ..............................................................................71
WAN........................................................................................................................72
Main IP Setting ....................................................................................................72
IP Aliasing ............................................................................................................73
LAN .........................................................................................................................74
Security ...................................................................................................................75
Firewall......................................................................................................................75
Content Filtering....................................................................................................75
IP Filtering ..............................................................................................................76
Port Filtering ..........................................................................................................76
iv
29000152-0001 B
Virtual Server .........................................................................................................77
Demilitarized Zone (DMZ) ..................................................................................78
Advanced................................................................................................................79
Chapter 5: Wireless Bridge Configuration ................................................................81
Introduction ..............................................................................................................81
Wireless Bridge — General ..................................................................................82
Auto-forming Wireless Bridging ......................................................................82
Manual Bridging .................................................................................................84
Monitoring ...........................................................................................................85
Wireless Bridge — Radio......................................................................................85
Wireless Bridge — Encryption.............................................................................87
Wireless Bridge — MAC Address FIltering.......................................................88
Setting Up Bridging Type .......................................................................................89
Point-to-Point Bridge Configuration ..................................................................89
Point-to-Point Bridging Setup Guide - Manual Mode...................................90
Point-to-Point Bridging Setup Guide - Auto Mode .......................................90
Point-to-Multipoint Bridge Configuration ........................................................94
Point-to-Multipoint Bridging Setup Guide - Manual Mode.........................95
Point-to-Multipoint Bridging Setup Guide - Auto Mode..............................95
Repeater Bridge Configuration ...........................................................................96
Repeater Bridging Setup Guide - Manual Mode............................................96
Repeater Bridging Setup Guide - Auto Mode.................................................97
Chapter 6: Technical Support.......................................................................................99
Manufacturer’s Statement ......................................................................................99
Radio Frequency Interference Requirements.......................................................99
Glossary ........................................................................................................................G-a
29000152-001 B
SAFETY INFORMATION
Please follow thes guidelines when installing and using the 3e–527A3
product.
! WARNING
Warnings must be followed carefully to avoid
bodily injury.
! CAUTION
Cautions must be observed to avoid damage to
your equipment.
NOTE:
vi
Notes contain important information about this product.
29000152-0001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
Chapter 1: Introduction
This manual covers the installation and operation of the 3e Technologies International’s 3e–527A3 Wireless Access Point. The 3e–527A3 is a
ruggedized access point/gateway/bridge which is intended for use in
industrial and external environments. It accommodates 802.11a/b/g, and
802.11a Turbo WLAN access and uses Power over Ethernet (PoE) access
to the Ethernet WAN to eliminate the need for internal access point power
supply units (AC-DC converters) and 110-220V cabling installations. The
wireless LANs can include mobile devices such as handheld Personal
Data Assistants (PDAs), mobile web pads, and wireless laptops.
FIPS 140-2 mode is always on and encryption is applied for the
WLAN. You can set encryption for Static AES, Static 3DES, Dynamic Key
Exchange, or FIPS 802.11i.
The access point employs state-of-the-art AES or 3DES encryption,
wireless devices must have the 3e-010F, 3e-010F-A-2, or 3e-010F-C-2
Crypto Client software installed. (The 3e-010F Crypto Client software is
sold with the 3e-110 long range PC Card or sold separately for use with
other compatible PC Cards.)
The 3e–527A3 incorporates Power over Ethernet. The PoE interface
on the 3e–527A3 is compatible with commercial vendor “injected power”
hub units.
The 3e–527A3 includes AES/3DES cryptographic modules for wireless encryption and HTTPS/TLS, for secure web communication. The
3e–527A3 has an Ethernet WAN interface for communication to the wired
LAN backbone, Ethernet LAN local port for purposes of initial setup
and configuration, and one wireless AP antenna for communicating on
the 802.11b/g frequencies. An antenna for bridging uses the 802.11a and
802.11a Turbo frequencies. The AP and Bridging frequencies can also be
swapped using a software configurable feature. In other words the AP
can use 802.11a/Turbo A and the Bridge can use 802.11b/g.
29000152-0001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
Basic Features
The 3e–527A3 is housed in a sturdy case which is not meant to be
opened except by an authorized technician for maintenance or repair.
If you wish to reset to factory settings, use the reset function available
through the web-screen management module.
The 3e–527A3 is wall-mountable.
It has the following features:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Ethernet uplink WAN port
Local Ethernet LAN port (for configuration only)
Wireless Access Point with operating range of 2000+ feet
Bridge
Power over Ethernet (PoE)
Above average temperature range for extreme environments
(with TEC option)
AES, 3DES, DKE, or FIPS 802.11i, depending on setup
HTTPS/TLS secure Web
DHCP client
Access Point or Gateway with Bridging also available in either
mode
Bandwidth control
Adjustable Radio Power
MAC address filtering
Publicly Secure Packet Forwarding
Rogue AP Detection
Encrypted Ethernet port
Auto bridging/Mesh Networking
Configuration File transfer
IP aliasing on gateway mode
Operates on Channels 149, 153, 157, 161 and 165
The following cryptographic modules have been implemented in the
3e–527A3 .
•
•
•
•
AES (128/192/256 bit)
3DES (192 bit)
DKE
FIPS 802.11i
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
Wireless Basics
Wireless networking uses electromagnetic radio frequency waves to
transmit and receive data. Communication occurs by establishing radio
links between the wireless access point and devices configured to be part
of the WLAN.
The 3e–527A3 incorporates 802.11a, the 802.11b (WiFi) standard, the
802.11g standard and the most state of the art encryption for a very powerful and secure wireless environment.
802.11b
The IEEE 802.11b standard, developed by the Wireless Ethernet
Compatibility Alliance (WECA) and ratified by IEEE, establishes a stable
standard for compatibility. A user with an 802.11b product can use any
brand of access point with any other brand of client hardware that is built
to the 802.11b standard for basic interconnection. 802.11b devices provide
11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps depending on
signal strength) in the 2.4 GHz band.
For wireless devices to communicate with the 3e–527A3 , they must
meet the following conditions:
•
•
•
The wireless device and wireless access point must have been
configured to recognize each other using the SSID (a unique ID assigned in setup so that the wireless device is seen to be part of the
network by the 3e–527A3 );
Encryption and authentication capabilities and types enabled
must conform; and
If MAC filtering is used, the 3e–527A3 must be configured to
allow the wireless device’s MAC address to associate (communicate) with the 3e–527A3 wireless interface.
802.11a
The IEEE 802.11a standard is an extension to 802.11 that applies to
wireless LANs and provides up to 54 Mbps in the 5GHz band. 802.11a
uses an orthogonal frequency division multiplexing encoding scheme
rather than FHSS or DSSS.
802.11g
Because 802.11g is backwards-compatible with 802.11b, it is a popular
component in LAN construction. 802.11g broadens 802.11b’s data rates
to 54 Mbps within the 2.4 GHz band using OFDM (orthogonal frequency
division multiplexing) technology.
802.11b/g Mixed
802.11b/g combines 802.11b and 802.11g data rates to offer a broader
range.
29000152-0001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
802.11a Turbo
802.11a Turbo technology provides speed and throughput of more
than double standard wireless LAN technologies in networking products
such as PCs, access points, routers and PC cards. It is very helpful to users
who require additional bandwidth (over standard WLAN technologies)
that results in higher throughput necessary for a variety of functions such
as: streaming media (video, DVD, MPEG), VoIP, etc., or for providing
multiple users on a single WLAN with optimal speeds despite network
demand.
108 Mbps is the maximum link speed available and the typical MAXIMUM end-user throughput ranges from approximately 40 Mbps to 60+
Mbps, depending on application demand and network environment.
NOTE: Turbo A’s channel bonding feature can significantly degrade
the performance of neighboring 802.11a channel WLANs that don’t use
Turbo A, because there isn’t enough room in the 5GHz wireless LAN
spectrum for the increased spectrum used by channel bonding. Moreover,
Turbo A doesn’t check to see if 11a standard-compliant devices are in
range before using its non-standard techniques.
The encryption must be applied in the 3e-527C, however, the CPU
power can not encrypt more than 12 Mpbs of data. Therefore, even in
turbo A mode, you will not see more than 12 Mbps of throughput. One
benefit of Turbo A is that it provides better RF range.
Network Configuration
The 3e–527A3 is an access point/gateway with bridging capability:
•
•
Access point/Gateway plus:
Wireless bridging with choice of:
- Point-to-point setup
- Point-to-multipoint setup
- Repeater setup
Bridging actually has more choices, but the above choices are popular
and are discussed later in this user guide (Chapter 4).
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
Access Point Configurations
When a 3e–527A3 is used as an access point, IP addresses for wireless devices are typically assigned by the wired network’s DHCP server.
The wired LAN’s DHCP server assigns addresses dynamically, and the
AP virtually connects wireless users to the wired network. All wireless
devices connected to the AP are configured on the same subnetwork as
the wired network interface and can be accessed by devices on the wired
network.
Possible AP Topologies
1. An access point can be used as a stand-alone AP without any
connection to a wired network. In this configuration, it simply
provides a stand-alone wireless network for a group of wireless
devices.
��
2. The 3e–527A3 can be used as one of a number of APs connected
to an existing Ethernet network to bridge between the wired and
wireless environments. Each AP can operate independently of
the other APs on the LAN. Multiple APs can coexist as separate
individual networks at the same site with a different network ID
(SSID).
����� ���
��
���� ��
29000152-0001 B
���� ��
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
3. The last and most prevalent use is multiple APs connected to a
wired network and operating off that network’s DHCP server to
provide a wider coverage area for wireless devices, enabling the
devices to “roam” freely about the entire site. The APs have to use
the same SSID. This is the topology of choice today.
����� ���
��
Bridging
The 3e–527A3 can also function as a bridge. There are a number of
briding configurations supported, including the following popular configurations:
•
•
•
Point-to-point bridging of 2 Ethernet Links;
Point-to-multipoint bridging of several Ethernet links;
Repeater mode (wireless client to wireless bridge.)
Default Configuration
The 3e–527A3's default configuration is an Access Point/Bridge with
FIPS 140-2 submode enabled.
Data Encryption and Security
The 3e–527A3 Wireless Access Point includes advanced wireless security features. Over the AP band, you have a choice of AES, 3DES, or DKE.
Bridging encryption is established between 3e–527A3’s and includes use
of AES or 3DES encryption (approved by the National Institute of Standards and Technology (NIST) for U.S. Government and DoD agencies).
SSID
The Service Set ID (SSID) is a string used to define a common roaming domain among multiple wireless access points. Different SSIDs on
access points can enable overlapping wireless networks. The SSID can
act as a basic password without which the client cannot connect to the
network. However, this is easily overridden by allowing the wireless AP
to broadcast the SSID, which means any client can discover the AP. SSID
broadcasting can be disabled in the 3e–527A3 setup menus.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
AES and 3DES
The Advanced Encryption Standard (AES) was selected by National
Institute of Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit block cipher
algorithm and encryption technique for protecting computerized information. It has the ability to use even larger 192-bit and 256-bit keys, if
desired.
3DES is also incorporated on the 3e–527A3 . 3DES is modeled on the
older DES standard but encrypts data three times over. Triple-DES uses
more CPU resources than AES because of the triple encryption.
If you intend to use AES or 3DES, you must purchase the 3eTI advanced Crypto Client software (3e-010F, 3e-010F-A-2, or 3e-010F-C-2) for
each client that will be included in the WLAN. We sell the 3e-010F software with the 3e-110 PC Card.
The 3e–527A3 uses AES-CCMP in WPA mode and AES-ECB (or 3DES)
for FIPS 140-2 mode and for bridging.
MAC Address Filtering
The MAC address, short for Media Access Control address, is a hardware address that uniquely identifies each node of a network. In IEEE 802
networks, the Data Link Control (DLC) layer of the OSI Reference Model
is divided into two sub-layers: the Logical Link Control (LLC) layer and the
Media Access Control (MAC) layer. The MAC layer interfaces directly with
the network media. Consequently, each type of network media requires a
unique MAC address.
Authentication is the process of proving a client's identity. The
3e–527A3 access points, if set up to use MAC address filtering, detect
an attempt to connect by a client and compare the client’s MAC address
to those on a predefined MAC address filter list. Only client addresses
found on the list are allowed to associate. MAC addresses are pre-assigned by the manufacturer for each wireless card.
DHCP Server
The DHCP function is accessible only from the local LAN port to be
used for initial configuration.
Operator Authentication and Management
Authentication mechanisms are used to authenticate an operator accessing the device and to verify that the operator is authorized to assume
the requested role and perform services within that role.
Access to the management screens for the 3e–527A3 requires knowledge of the assigned operator ID and Password. The Factory defaults are:
•
•
29000152-0001 B
ID: CryptoOfficer
Password: CryptoFIPS
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
The Crypto Officer initially installs and configures the 3e–527A3 after
which the password MUST be changed from the default password. The
ID and Password are case sensitive.
Management
After initial setup, maintenance of the system and programming of
security functions are performed by personnel trained in the procedure
using the embedded web-based management screens.
The next chapter covers the basic procedure for setting up the hardware.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 1: Introduction
3e-527A3 Navigation Options
Access Point/Bridge Mode
System Configuration
General
Operating Mode
WAN
LAN
Encrp Port
Wireless Access Point
General
Security
• Static AES
• Static 3DES
• Dynamic Key Exchange
• FIPS 802.11i
MAC Address Filtering
Rogue AP Detection
Advanced
Wireless Bridge
General
• Monitoring
Radio
Encryption
MAC Address Filtering (auto mode)
Services Settings
DHCP Server
Subnet Roaming
SNMP Agent
Firewall
Admin User Management
Gateway/Bridge Mode
System Configuration
General
Operating Mode
WAN
LAN
Encrp Port
Wireless Access Point
General
Security
• Static AES
• Static 3DES
• Dynamic Key Exchange
• FIPS 802.11i
MAC Address Filtering
Rogue AP Detection
Advanced
Wireless Bridge
General
• Monitoring
Radio
Encryption
MAC Address Filtering (auto mode)
Services Settings
DHCP Server
Subnet Roaming
SNMP Agent
Firewall
Content Filtering
IP Filtering
Port Filtering
Virtual Server
DMZ
Advanced
Admin User Management
List All Users
• Edit/Delete
Add New User
List All Users
• Edit/Delete
Add New User
User Password Policy
29000152-0001 B
End User Authentication
End User Authentication
General
General
List All Users
List All Users
Add New User
Add New User
Add Authed Mac
Add Authed Mac
List Authed Mac
List Authed Mac
Monitoring Reports
Monitoring Reports
System Status
System Status
Bridging Status
Bridging Status
Bridging Site Map
Bridging Site Map
Wireless Clients
Wireless Clients
Adjacent AP List
Adjacent AP List
DHCP Client List
DHCP Client List
System Log
System Log
Web Access Log
Web Access Log
Network Activities
Auditing
Log
Report Query
Configuration
Network Activities
Auditing
Log
Report Query
Configuration
3e–527A3 Wireless Access Point – 8 Port
10
Chapter 1: Introduction
System Administration
Email Notification Conf
Configuration Button
System Upgrade
• Firmware Upgrade
• Local Configuration Upgrade
• Remote Configuration Upgrade
Factory Default
System Admnistration
Email Notification Conf
Configuration Button
System Upgrade
• Firmware Upgrade
• Local Configuration Upgrade
• Remote Configuration Upgrade
Factory Default
Remote Logging
Remote Logging
Reboot
Reboot
Utilities
Utilities
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 2: Hardware Installation
Chapter 2: Hardware installation
Preparation for Use
The 3e Technologies International's 3e–527A3 Wireless Access Point
requires physical mounting and installation on the site, following a prescribed placement design to ensure optimum operation and roaming.
FCC Regulations require that the 3e–527A3 be professionally installed by an installer certified by the National Association of Radio
and Telecommunications Engineers or equivalent institution.
The 3e–527A3 operates with Power over Ethernet (PoE) which requires the installation of a separate Power injector which “injects” DC
current into the Cat5 cable. The standard version has a temperature range
of -5 degrees C to +65 degrees C.
The 3e–527A3 package includes the following items:
•
•
•
•
•
•
•
The 3e–527A3 Wireless Access Point - 8 Port
Qty 1 — omni-directional antenna (2.2dBi@2.4GHz and
5dBi@5.75GHz)
Qty 1 — omni-directional antenna (3dBi@5.75GHz)
2 meter weather-resistant WAN Ethernet cable (RJ-45 to RJ-45)
3 meter standard LAN Ethernet Cable (RJ-45 to RJ-45)
Documentation as PDF files (on CD-ROM)
Registration and Warranty cards
The following items are options:
•
•
•
•
Power Injector, POE, 50W (model 3e-POE-1, p/n 90000831-001)
Power Cord, POE Injector, European version (p/n 90000832-001)
Power Cord, POE Injector, UK version (p/n 90000833-001)
Weather-resistant LAN Ethernet cables (RJ-45 to RJ-45)
Installation Instructions
The 3e–527A3 is intended to be installed as part of a complete wireless
design solution.
This manual deals only and specifically with a single 3e–527A3 device as a unit. The purpose of this chapter is to describe the device and
its identifiable parts so that the user is sufficiently familiar to interact
with the physical unit. Preliminary setup information provided below
is intended for information and instruction of the wireless LAN system
administration personnel.
29000152-001 B
11
3e–527A3 Wireless Access Point – 8 Port
Chapter 2: Hardware Installaton
It is intended that the user not open the unit. Any maintenance required is limited to the external enclosure surface, cable connections, and
to the management software (as described in chapter three through five)
only. A failed unit should be returned to the manufacturer for maintenance.
Minimum System and Component Requirements
The 3e–527A3 is designed to be attached to the wall at appropriate
locations. To complete the configuration, you should have at least the following components:
•
•
•
•
•
PCs with one of the following operating systems installed: Windows NT 4.0, Windows 2000 or Windows XP;
A compatible 802.11b PC Card or 802.11b device for each computer that you wish to wirelessly connect to your wireless network.
(For wireless cards, and praticularly if you will be using secure
FIPS mode with AES, we recommend that you select the 3e-110
PC Card with 3e-010F Crypto Client software (sold separately) or
install the 3e-010F-A-2 or 3e-010F-C-2 software;
Access to at least one laptop or PC with an Ethernet card and
cable that can be used to complete the initial configuration of the
unit.
A Web browser program (such as Microsoft Internet Explorer 5.5
or later, or Netscape 6.2 or later) installed on the PC or laptop you
will be using to configure the Access Point.
TCP/IP Protocol (usually comes installed on any Windows PC.)
Connectors and Cabling
The following illustration shows the external connectors on the
3e–527A3.
LAN MGMT
Port
Ground
ENCRP Port
Mode Dependent
Gateway=LAN ports
AP=WAN ports
Wan Ethernet Port/
PoE/UPLINK
The PoE/UPLINK port is used to connect the 3e–527A3 to the organization's LAN. The Ethernet cable is run from the 3e–527A3 to the power
injector which is then connected to a power source and the wired LAN.
12
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 2: Hardware Installation
A MGMT Port is designed for use during initial configuration only. This
uses an RJ45 cable to connect the 3e–527A3 to a laptop.
The ENCRP port is a dedicated Ethernet port used for connecting to
the Ethernet port of a DSL modem or any device that requires layer encryption. This port is encrypted and is configureable for AES-128, 192, or
256 and also contains a message integrity check.
Ports X1-3 and Y1-3 are mode-dependent. If the 3e–527A3 is used as
an AP then those ports are WAN ports. If the unit is a gateway, then the
ports are LAN ports.
The following diagram demonstrates the setup.
Connect
802.11b/g
RF Antenna
(Black) for AP
Connect
802.11a RF
Antenna (Grey)
for Bridge
LAN Mgmt
Ethernet
Port
WAN
Ethernet
Port / PoE
110V
Power
Power
Power
Injector
Injector
Ethernet switch/hub
Earth Ground Connection
Attach the earth ground cable to the ring terminal attached to the
3e–527A3's grounding stud. Make sure the ring terminal is against the
unit's metal case. The earth ground ring terminal should be the first connection on the unit's grounding stud.
NOTE: The cable used to connect to a proper earth ground must be
AWG 10 or heavier. This cable should be kept as short as possible.
29000152-001 B
13
3e–527A3 Wireless Access Point – 8 Port
Chapter 2: Hardware Installaton
The Indicator Lights
Po
we
WA
LA
LA
LA
NS
FIP
S/M
OD
The top panel of the 3e–527A3 contains a set of indicator lights (Light
Emitting Diodes or LEDs) that help describe the state of various networking and connection operations.
Detail of LEDs on the face of the 3e–527A3
LED
Description
Power
The Power indicator LED indicates when the device is powered on. If
this light is on, the gateway is on; if it is not on, the gateway is off.
WAN
This light indicates the state of your connection to the organization's
Ethernet LAN network. When on, the WAN light indicates that the
gateway is connected to the network. When the WAN light is off, the
gateway does not have an active connection to the network.
WLAN1
Activity
1. LED Off means the RF power is adminstratively disabled.
2. LED steady on means RF power is enabled but there no traffic.
3. LED blinking is relative to user traffic.
WLAN2
Activity
LED is used to indicate downlink traffic. It blinks when traffic is sent to
(or received from) the downlink.
• Root node: on and blinks with traffic.
• Intermediate node: on and blinks with traffic.
• Leaf node: always off.
WLAN Signal
Strength
The Strength LED indicator indicates the strength of the node assigned
in the Signal Strength MAC field of the Bridge Configuration screen. If
there is no assignment, the strength of the uplink node is shown..
1. LED Off: means no connection on the bridge side, or the signal is
very weak.
2. LED blinks slowly (every 1 second): means there is a connection, and
the signal quality is poor.
3. LED blinks fast: means there is a connection, and the signal quality
is good.
4. LED steady on: means there is a connection, and the signal quality is
excellent.
FIPS/MODE
(WLAN2
Usage)
LED is used to indicate uplink traffic. It blinks when traffic is sent to (or
received from) the uplink.
• Root node: always off
• Intermediate node: on and blinks with traffic.
• Leaf node: on and blinks with traffic.
NOTE: for a standalone bridge, technically it’s root and leaf. But we
define it as root, not leaf. So the WLAN 2 LED will be solid on. FIPS/
MODE LED will be off. When high bandwidth traffic is going through,
the response of the traffic LED indicators may be slow due to the work
load of the internal processor.
14
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Chapter 3: Access Point Configuration
Introduction
The 3e–527A3 comes with the capability to be configured as an access point. As it incorporates two separate 802.11 wireless cards, one for
configuring a local WLAN and one for use in bridging, it can also be
configured for bridging, either with access point or gateway configuration
on the WLAN side. Configuration as a gateway is discussed in Chapter 4
and configuration for bridging is discussed in Chapter 5.
Preliminary Configuration Steps
For preliminary installation the 3e–527A3 network administrator may
need the following information:
•
•
•
•
•
•
•
29000152-001 B
IP address – a list of IP addresses available on the organization's
LAN that are available to be used for assignment to the AP(s)
Subnet Mask for the LAN
Default IP address of the 3e–527A3
DNS IP address
SSID – an ID number/letter string that you want to use in the configuration process to identify all members of the wireless LAN.
The MAC addresses of all the wireless cards that will be used to
access the 3e–527A3 network of access points (if MAC address
filtering is to be enabled)
The appropriate encryption key for Static 3DES or Static AES if
state-of-the art key management will be used.
15
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Initial Setup using the “Local” Port
Plug one end of an RJ-45 Ethernet cable to the LAN port of the 3e–
527A3 (see page 11) and the other end to an Ethernet port on your laptop. This LAN port in the 3e–527A3 connects you to the device’s internal
DHCP server which will dynamically assign an IP address to your laptop
so you can access the device for configuration. In order to connect properly to the 3e–527A3 on the LAN port, the TCP/IP parameters on your
laptop must be set to “obtain IP address automatically.” (If you are unfamiliar with this procedure, use the following instructions for determining
or changing your TCP/IP settings.)
In Windows 98/Me click Start à Settings à Control Panel.
Find and double click the Network icon. In the Network window,
highlight the TCP/IP protocol for your LAN and click the Properties button. Make sure that the radio button for Obtain an IP address
automatically is checked.
In Windows 2000/XP, follow the path Start à Settings à Network and Dialup Connections à Local Area Connection and select
the Properties button. In the Properties window, highlight the TCP/
IP protocol and click properties. Make sure that the radio button for
Obtain an IP address automatically is checked.
Once the DHCP server has recognized your laptop and has assigned a
dynamic IP address, you will need to find that IP address. Again, the procedure is similar for Windows 95/98/Me machines and slightly different
for Windows 2000/XP machines.
In Windows 98/Me, click Start, then Run and type winipcfg in
the run instruction box. Then click OK. You will see the IP address of
your laptop in the resulting window, along with the “default gateway” IP address. Verify that the IP address shown is 192.168.15.x
In Windows 2000/XP, click Start, then Run and type cmd in the
run instruction box. Then click OK. This will bring up a window. In
this window, type ipconfig /all |more. This will list information assigned to your laptop, including the IP address assigned. Verify that
the IP address shown is 192.168.15.x
16
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Login
On your computer, pull up a browser window and put the default URL for the 3e–527A3 Local LAN in the address line. (https://
192.168.15.1)
You will be asked for your User Name and Password. The default
is "CryptoOfficer" with the password "CryptoFIPS" to give full
access for setup configuration. (This password is case-sensitive.)
Please read the terms and conditions and check the checkbox then
click Sign In to continue configuration.
NOTE: The CryptoFIPS password is only good for the first login. You
must change the password after initially logging in. You are automatically
directed to the Admin User Management—List All Users screen where
you must change your password. Click on Edit and enter your new password following the complexity password rule.
You are also asked to change your password every 30-90 days. If you
do not change your password then you will be locked out of the system
after 150 days.
NOTE: If your login session is in-active for more than 10 minutes,
then you will have to re-authenticate your identity. If after three times
you fail to re-authenticate then your account will be locked. The exception
is if you are the last active CryptoOfficer on the system, then your account
will not be locked. The Admin User Management—List All Users screen
displays account status. If an account is locked, it will show a status of
"Locked" and a reason of "bad passwd". Other accounts show status as
"Active" and reason "Normal".
The CryptoOfficer is the only user that can unlock an account once
it has been locked. Go to the Admin User Management—List All Users
screen and click the unlock button at the end of the user entry.
29000152-001 B
17
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
System Configuration
General
You will immediately be directed to the System Configuration —
General screen for the 3e–527A3 access point.
This screen lists the firmware version number for your 3e–527A3 and
allows you to set the Host Name and Domain Name as well as establish
system date and time. (Host and Domain Names are both set at the factory for “default” but can optionally be assigned a unique name for each.)
NOTE: The CryptoOfficer is the only user who can set the date and
time. The system date must be set to a date after 01/01/2005.
You can also enter a description of the physical location of the unit in
the Description field. This is useful when deploying units to remote locations.
You can modify the terms and conditions login banner on the login
screen. The default is "This device is for authorized use only. Any unauthorized use of this product is prohibited."
When you are satisfied with your changes, click Apply.
Go next to the System Configuration — Operating Mode page.
18
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Operating Mode
This screen allows you to set the operating mode to either Wireless
Access Point/Bridge or Gateway/Bridge mode. You only need to visit
this page only if you will be changing from Access Point to Gateway
mode, if you want to change your submode to IPv6, or if you want to
configure the wireless cards.
Note that if you change modes from AP to Gateway, your configuration is not lost. However, if you switch from IPv6 to non IPv6 submode,
all previously entered information will be reset to factory settings.
Submode
If you select the Use IPv6 Mode, the AP will be configured to support
IPv6 addresses on the WAN and LAN ports. In IPv6 mode, the AP can be
managed and pass traffic using IPv6 addresses. Since IPv6 is relatively
new in the industry, some networking functions that cannot support IPv6
are disabled such as DHCP server and WPA-802.1x
When in IPv6 mode, the AP can be accessed from the management
port using IP address 192.168.15.1. This is the default IP address and it
can not be changed. The WAN port can not be accessed using IPv4 addresses.
If Use IPv6 mode is selected as a submode then you will need to enter
a IPv6 address under System Configuration—WAN and LAN screens.
29000152-001 B
19
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Configure Wireless Cards
The factory default for the two wireless cards are:
•
•
802.11b/g for the AP
802.11a/TurboA for the Bridge
If you want to swap the cards and make the 802.11a/TurboA card for
the AP and the 802.11b/g card for the Bridge. Select the appropriate button.
20
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
WAN
Click the entry on the left hand navigation panel for System Configuration — WAN. This directs you to the System Configuration — WAN
screen.
If not using DHCP to get an IP address, input the static IP information
that the access point requires in order to be managed from the wired
LAN. This will be the IP address, Subnet Mask, Default Gateway, and,
where needed, DNS 1 and 2.
Click Apply to accept changes.
29000152-001 B
21
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
LAN
Click the entry on the left hand navigation panel for System Configuration — LAN. This directs you to the System Configuration — LAN
screen.
This sets up the default numbers for the four octets for a possible private LAN function for the access point. It also allows changing the default
numbers for the LAN Subnet Mask. The Local LAN port provides local
access for configuration. It is not advisable to change the private LAN address while doing the initial setup as you are connected to that LAN.
22
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Encrp Port
Click the entry on the left hand navigation panel for System Configuration — Encrp Port. This directs you to the System Configuration
— Encrp Port screen.
You can set the link speed and duplex for the encrp port in the Encrp
Link field. Your options are: Auto, 10M Half Duplex, 10M Full Duplex,
100M Half Duplex, or 100M Full Duplex.
NOTE: For best performance, it is recommended that you set the
same duplex/speed on both ends of the link. For example, set 100M Full
Duplex on both the PC and the 3e-527C Encrp Port. Setting one end to
auto-negotiation and the other end to non-auto-negotiation is strongly
discouraged.
The Encrp port also provides encryption to the data on this port. The
encrypted data is isolated to this port and does not affect the operation
of the remaining seven Ethernet ports. The encryption is configurable as
Static AES-128, 192, or 256 and Static 3DES. It also contains a message
integrity check.
29000152-001 B
23
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Static AES Key
The Advanced Encryption Standard (AES) uses a 128-bit block cipher
algorithm and encryption technique for protecting computerized information. With the ability to use even larger 192-bit and 256-bit keys, if
desired, it offers higher security against brute-force attacks than the older
56-bit DES keys.
The Key Generator button automatically generates a randomized key
of the appropriate length. This key is initially shown in plain text so the
user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
24
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Static 3DES Key
To use 3DES, enter a 192-bit key as 48 hexadecimal digit (0-9, a-f, or
A-F).
The Key Generator button automatically generates a randomized key
of the appropriate length. This key is initially shown in plain text so the
user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
29000152-001 B
25
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Wireless Access Point Configuration
General
Wireless Setup allows your computer’s PC Card to communicate with
the access point. Once you have completed wireless access point configuration, you can complete the rest of the configuration wirelessly unless
you will be employing the FIPS 140-2 secure mode, assuming that you
have installed and configured a wireless PC card on your computer. (If
you have not done so, you will have to do that to establish communications. Follow the manufacturer's instructions to set up the PC Card on
each wireless device that will be part of the WLAN.)
NOTE: The 3e–527A3 is always in FIPS 140-2 secure mode, therefore your configuration will have to be accomplished through the
LAN port due to the secure nature of the access point. There is no
direct access from wireless clients.
The Wireless Access Point — General screen lists the MAC Address
of the AP card. This is not the MAC Address that will be used for the BSSID for bridging setup, however. That is found on the Wireless Bridge
— Radio screen.
If you will be using an SSID for a wireless LAN, enter it here and in
the setup of each wireless client. This nomenclature has to be set on the
access point and each wireless device in order for them to communicate.
26
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Select the wireless mode from the drop-down list. You can choose
from the following options:
•
•
•
802.11b
802.11g
802.11b/g Mixed
You can assign a channel number to the AP (if necessary) and modify
the Tx Pwr Mode.
The Channel Number is a means of assigning frequencies to a series
of access points, when many are used in the same WLAN, to minimize
noise. There are 11 channel numbers that may be assigned. If you assign
channel number 1 to the first in a series, then channel 6, then channel 11,
and then continue with 1, 6, 11, you will have the optimum frequency
spread to decrease “noise.”
If you click on the button Select the optimal channel, a popup screen
will display the choices. It will select the optimal channel for you. You can
also set it up to automatically select the optimal channel at boot up.
CHANNEL NO. OPTIONS
Wireless Mode
802.11b
802.11g
802.11b/g Mixed
29000152-001 B
Channel No.
1 (2.412 GHz)
2 (2.417 GHz)
3 (2.422 GHz)
4 (2.427 GHz)
5 (2.432 GHz)
6 (2.437 GHz)
7 (2.442 GHz)
8 (2.447 GHz)
9 (2.452 GHz)
10 (2.457 GHz)
11 (2.462 GHz)
27
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Tx Pwr Mode and Fixed Pwr Level: The Tx Power Mode defaults to
Auto, giving the largest range of radio transmission available under normal conditions. As an option, the AP's broadcast range can be limited by
setting the Tx Power Mode to Fixed and choosing from 1-8 for Fixed Pwr
Level (1 being the shortest distance.) Finally, if you want to prevent any
radio frequency transmission, set Tx Pwr Mode to Off.
There are a number of advanced options included on this page as
described in the following chart:
ADVANCED OPTIONS
Beacon interval
20-1000
The time interval in milliseconds in which the
802.11 beacon is transmitted by the AP.
RTS Threshold
1-2346
The number of bytes used for the RTS/CTS
handshake boundary. When a packet size is
greater than the RTS threshold, the RTS/CTS
handshaking is performed.
DTIM
1-255
The number of beacon intervals that broadcast
and multicast traffic is buffered for a client in
power save mode.
Basic Rates
Basic Rates for 802.11b
1 and 2 Mbps
1, 2, 5.5 and 11
Mbps
The basic rates used and reported by the
AP. The highest rate specified is the rate that
the AP uses when transmitting broadcast/
multicast and management frames.
Basis Rates for 802.11g
1, 2, 5.5, 11, 6,
12, 24 Mbps
1, 2, 5.5, 11
Mbps
The basic rates used and reported by the
AP. The highest rate specified is the rate that
the AP uses when transmitting broadcast/
multicast and management frames.
Basic Rates for 802.11b/g Mixed
1, 2 Mbps
1, 2, 5.5, 11
Mbps
The basic rates used and reported by the
AP. The highest rate specified is the rate that
the AP uses when transmitting broadcast/
multicast and management frames.
Preamble
Short/Long
Preamble
Specifies whether frames are transmitted with
the Short or Long Preamble
Broadcast SSID
Enabled/
Disabled
When disabled, the AP hides the SSID in
outgoing beacon frames and stations cannot
obtain the SSID through passive scanning.
Also, when it is disabled, the AP doesn’t
send probe responses to probe requests with
unspecified SSIDs.
28
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Security
The Wireless Access Point — Security screen displays a default factory setting of AES encryption, but the encryption key is not set and it
will not communicate to any clients unless the encryption is set by the
CryptoOfficer.
NOTE: One of the encryption options must be selected and applied in
order for the AP to communicate with other APs.
Static AES Key
The Advanced Encryption Standard (AES) was selected by National
Institute of Standards and Technology (NIST) in October 2000 as an upgrade from the previous DES standard. AES uses a 128-bit block cipher
algorithm and encryption technique for protecting computerized information. With the ability to use even larger 192-bit and 256-bit keys, if
desired, it offers higher security against brute-force attack than the old
56-bit DES keys.
The Key Generator button automatically generates a randomized key
of the appropriate length. This key is initially shown in plain text so the
user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
29000152-001 B
29
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Static 3DES Key
To use 3DES, enter a 192-bit key as 48 hexadecimal digit (0-9, a-f, or
A-F).
The Key Generator button automatically generates a randomized key
of the appropriate length. This key is initially shown in plain text so the
user has the opportunity to copy the key. Once the key is applied, the key
is no longer displayed in plain text.
30
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Dynamic Key Exchange
Dynamic key management requires the installation of the 3e-030
Security Server software which resides on a self-contained workstation
connected to the 3e–527A3 over the WAN port. The Security Server software configuration includes: obtaining a root certificate from a Certificate
Authority (CA) like Microsoft; obtaining user certificates based on the CA
which will be used by the clients; and configuring the 3e Technologies
International's Security Server software with the appropriate root certificate. The Security Server software application is discussed in a separate
manual.
If you have installed the Security Server software, Dynamic Key
Management is the preferred security setup. Configure the IP address
and password of the security server and set the key type. Key type will be
either 3DES (192-bit), or AES (128-bit, 192-bit or 256-bit). Thereafter, the
Security Server handles authentication dynamically.
Once you have selected the options you will use, click Apply.
29000152-001 B
31
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
FIPS 802.11i
If you wish to use FIPS 802.11i on the 3e–527A3, enable either Preshared Key Settings or 802.1x Settings.
If you are a SOHO user, selecting pre-shared key means that you
don’t have the expense of installing a Radius Server. Simply input up to
63 character / numeric / hexadecimals in the Passphrase field.
Enable pre-authentication to allow a client to authenticate in advance
with the AP before the client is associated with it. Allowing the AP to
pre-authenticate a client decreases the transition time when a client roams
between APs.
As an alternative, for business applications who have installed Radius Servers, select 802.1x and input the Primary Radius Server and RFC
Backend security settings. Use of Radius Server for key management and
authentication requires that you have installed a separate certification system and each client must have been issued an authentication certificate.
Re-keying time is the frequency in which new encryption keys are
generated and distributed to the client. The more frequent re-keying, the
better the security. For highest security, select the lowest re-keying interval.
Once you have selected the options you will use, click Apply.
If you will be using MAC Address filtering, navigate next to the MAC
Address Filtering screen.
32
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
MAC Address Filtering
The Wireless Access Point — MAC Address Filtering screen is used
to set up MAC address filtering for the 3e–527A3 device. The factory default for MAC Address filtering is Disabled. If you enable MAC Address
filtering, you should also set the toggle for Filter Type.
This works as follows:
•
•
29000152-001 B
If Filtering is enabled and Filter Type is Deny All Except Those
Listed Below, only those devices equipped with the authorized
MAC addresses will be able to communicate with the access
point. In this case, input the MAC addresses of all the PC cards
that will be authorized to access this access point. The MAC address is engraved or written on the PC (PCMCIA) Card.
If Filtering is enabled and Filter Type is Allow All Except Those
Listed Below, those devices with a MAC address which has been
entered in the MAC Address listing will NOT be able to communicate with the access point. In this case, navigate to the report:
Wireless Clients and copy the MAC address of any Wireless Client that you want to exclude from communication with the access
point and input those MAC Addresses to the MAC Address list.
33
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Rogue AP Detection
The Wireless Access Point — Rogue AP Detection screen allows the
network administrator to set up rogue AP detection. Enable rogue AP
detection and enter the MAC Address of each AP in the network that you
want the AP being configured to accept as a trusted AP. (You may add
up to 128 MAC addresses.) Enter an email address for notification of any
rogue or non-trusted APs. (The MAC Address for the 3e–527A3 is located
on the System Configuration — General screen. You can also select the
following filter options.
•
•
•
SSID FIlter: Check the SSID option to only send rogue APs that
match the AP's SSID or wireless bridge's SSID.
Channel Filter: Check the channel filter option to only send rogue
APs that match the AP's channel or the wireless bridge's channel.
If both options are checked, only APs that match both the SSID
and channel are sent.
The Adjacent AP list, under Monitoring/Reports on the navigation
menu, will detail any marauding APs.
34
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Advanced
The Wireless Access Point — Advanced screen allows you to enable
or disable load balancing and publicly secure packet forwarding.
Load balancing is disabled by default. The load balancing feature balances the wireless clients between APs. If two APs with similar settings
are in a conference room, depending on the location of the APs, all wireless clients could potentially associate with the same AP, leaving the other
AP unused. Load balancing attempts to evenly distribute the wireless
clients on both APs.
When publicly secure packet forwarding is enabled, wireless clients
can not talk to other wireless clients directly at Layer 2. However, they
both can have access to others that are not associating to the same AP.
Once you have made any changes, click Apply to save.
Wireless Bridge
The Wireless Bridge screens are described in Chapter 5.
29000152-001 B
35
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Services Settings
DHCP Server
The Service Settings — DHCP Server screen is used for configuring the DHCP server function accessible from the Local LAN port. The
default factory setting for the DHCP server function is enabled. You can
disable the DHCP server function, if you wish, but it is not recommended.
You can also set the range of addresses to be assigned. The Lease period
(after which the dynamic address can be reassigned) can also be varied.
The DHCP server function, accessible only from the LAN port, is used
for initial configuration of the management functions.
36
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Subnet Roaming
The 3e-527A3 supports subnet roaming with 3eTI's subnet roaming coordinator server installed. Subnet roaming occurs when a user roams to an
access point that is connected to a different subnet than its home subnet.
If subnet roaming is supported by the wireless infrastructure, the client
is able to continue its network connectivity without having to change its
IP address. Therefore, to the mobile device, roaming is transparent and it
will continue to function as if it is in its home subnet.
The coordinator is a separate server that keeps track of the client's
home network. The software is available from 3eTI upon request.
29000152-001 B
37
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
SNMP Agent
The Service Settings — SNMP Agent screen allows you to set up
an SNMP Agent. The agent is a software module that collects and stores
management information for use in a network management system. The
3e–527A3's integrated SNMP agent software module translates the device’s management information into a common form for interpretation by
the SNMP Manager, which usually resides on a network administrator’s
computer.
The SNMP Manager function interacts with the SNMP Agent to
execute applications to control and manage object variables (interface
features and devices) in the gateway. Common forms of managed information include number of packets received on an interface, port status,
dropped packets, and so forth. SNMP is a simple request and response
protocol, allowing the manager to interact with the agent to either:
•
•
•
38
Get - Allows the manager to Read information about an object
variable
Set - Allows the manager to Write values for object variables within an agent’s control, or
Trap - Allows the manager to Capture information and send an
alert about some pre-selected event to a specific destination.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
The SNMP configuration consists of several fields, which are explained below:
•
•
•
Community –The Community field for Get (Read Only), Set
(Read & Write), and Trap is simply the SNMP terminology for
“password” for those functions.
Source –The IP address or name where the information is obtained.
Access Control –Defines the level of management interaction permitted.
If using SNMPv3, enter a username (minimum of eight characters),
authentication type with key and data encryption type with a key. In FIPS
mode, only SHA and AES are supported. This configuration information
will also need to be entered in your MIB manager setup.
29000152-001 B
39
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Admin User Management
List All Users
The Admin User Management — List All Users screen lists the
Crypto Officer and administrator accounts configured for the unit. You
can edit or delete users from this screen.
If you click on Edit, the Admin User Management — Edit User
screen appears. On this screen you can edit the user ID, password, role,
and note fields.
40
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Add New User
The Admin User Management — Add New User screen allows you
to add new Administrators and CryptoOfficers, assigning and confirming
the password.
Administrators can view the system but this role has limited access to
change settings. CryptoOfficers can view and change any of the settings
on the system.
The Password complexity check and the Minimal Password length
are established on the Admin User Management — User Password
Policy screen.
29000152-001 B
41
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
User Password Policy
The Admin User Management — User Password Policy screen is
always enabled. The definition of a complex password is a password that
contains characters from all of the following 4 groups and at least 2 of
each group: uppercase letters, lowercase letters, numerals, and symbols
found on the keyboard. The minimum password length is 10 characters
and the maximum length is 30.
The maximum password age is configurable from 30 to 90 days. The
default is 90 days. If you do not change your password after the maximum password age expires, you will not have access to the unit. However, you have until 150 days of the password age to change the password.
You will be prompted to change your password from 90-150 days. After
150 days, the account will be locked and the CryptoOfficer will have to
unlock it for you. The only exception to this rule is if you are the last active CryptoOfficer user.
You can also set the password uniqueness depth. This means a former password can not be reused. The depth is configurable from 3 to 10.
For example, if the password uniqueness depth is set to 3, then the last 3
passwords can not be reused when changing your password.
The default for the account lockout email notification is set to disable.
If enabled, the system will send an email to the email address listed to
inform that person that a user has been locked out of the system. To configure the email notification go to the System Administration — Email
Notification Conf screen.
Click Apply to save your selection.
42
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
End User Authentication
In the 3e-527A3, all end users (wireless and wired), may require an
account in order to have access to the Internet. Each end user is required
to input their user name and password to authenticate with the system.
Once you have authenticated, you will not need to re- authenticate for 24
hours unless your CryptoOfficer requires you to. To authenticate, open
a browser and enter any resolvable URL. The system will redirect you to
the authentication page. Once here, we assume that the client to be authenticated has access to DHCP and DNS servers.
NOTE: During authentication, the 3e-527C may leave a false cookie of
the URL on the client PC. You should delete this cookie. Otherwise, if the
system forces you to re-authenticate, you may be prompted to delete the
cookie.
General
End user authentication needs a private local network to operate.
This private network should never be the same as the LAN or WAN.
By default, the private network IP is 172.16.0.0. It is configurable from
172.16.0.0 to 172.31.0.0.
You can partially enable/disable end user authentication. If the 8-port
switch feature is enabled, then all wired clients connecting to the 8-port
switch need to authenticate. If the encryp port feature is enabled, then
any clients attached to the encryp port need to authenticate. If the wireless client feature is enabled, then all wireless clients need to authenticate.
There is one exception however. If the end user network adapter
MAC address is manually added in the database, the PC with that adapter doesn't need to authenticate. This is usually used for a TRUSTED user
or system server.
29000152-001 B
43
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
User List
The End User Authentication — User List screen lists all end user
information. The CryptoOfficer can edit, delete, and unlock users from
this screen.
If you click on Edit, the End User Authentication — Edit User screen
appears. On this screen you can edit the user ID, password, role, and
note fields.
44
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Add New User
The End User Authentication — Add New User screen allows you to
add new end users, assigning and confirming the password.
Administrators can view the system but this role has limited access to
change settings. CryptoOfficers can view and change any of the settings
on the system.
The password policy is the same as the Admin User Management
— User Password Policy screen.
29000152-001 B
45
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Add Authenticated MAC
Usually the authenticated MAC is valid for 24 hours. You will be requested to re-authenticate after it expires. In case there is a client without
user interaction (for example, a server), you may not want to authenticate
that client every 24 hours. You can manually set the authenticated MAC
in the authenticated list and mark the entry Permanent. Another use case
would be to mark it as Temporarily trusted PC.
NOTE: If you manually add an authenticated MAC, we strongly
recommend that you initiate some network activity to hosts that are not
attached to the same 8-port switch. We also recommend that you not attach servers and other un-trusted PCs on the same 8-port switch on the
3e-527A3.
List Authenticated MAC
This screen provides a list of all of the authenticated MAC addresses.
46
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Monitoring/Reports
This section gives you a variety of lists and status reports. Most of
these are self-explanatory.
System Status
The Monitoring/Report — System Status screen displays the status
of the 3e–527A3 device, the network interface, and the routing table.
There are some pop-up informational menus that give detailed information about CPU, PCI, Interrupts, Process, and Interfaces.
29000152-001 B
47
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Bridging Status
The Monitoring/Report — Bridging Status screen displays the Ethernet Port STP status, Encryp Port STP status, Wireless Port STP status, and
Wireless Bridging information.
48
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Bridge Site Map
The Bridge Site Map shows the spanning tree network topology of
both wired and wireless nodes connected to the network. The root STP
node is always on top and the nodes of the hierarchy are displayed below
it. Wired links are double dotted lines and wireless links are single dotted lines (the channel number of this wireless link is also shown). This
map does not update dynamically. You must press the Update button to
refresh the map.
29000152-001 B
49
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Wireless Clients
The Monitoring/Report — Wireless Clients screen displays the MAC
Address of all wireless clients and their signal strength and transmit rate.
The screen shown here emulates the FIPS 140-2 setup and contains a column for EMCON response. The EMCON feature only works with 3e-010F
Crypto Client in FIPs mode.
If Transmit power is disabled, either by setting TX Pwr Mode to Off
on the management screen or by using the RF Manager (Chapter 7), the
Wireless Clients page will show the results from each associated client
in the EMCON Response column. If the client responds to the "disable"
command, a Yes is displayed. If the column contains a No, this can mean
either:
•
•
•
the client didn't receive the command, or
the client is no longer in the areas, or
the client software doesn't support the RF management feature.
This status information remains active for 5 minutes after the clients
are disabled.
50
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Once the transmit power is re-enabled and clients re-associate to the
AP, EMCON information is maintained for them. If a new client that
wasn't associated previously associates with the AP after the EMCON
mode, its EMCON status appears as "-", which indicates the status record
is not applicable.
Adjacent AP List
The Monitoring/Report — Adjacent AP List screen shows all the APs
on the network. If you select the check box next to any AP shown, the AP
will thereafter be accepted by the 3e–527A3 as a trusted AP.
These APs are detected by the AP's wireless card (2.4 GHz band) and
the wireless bridge's wireless card (5.8GHz band). The list of APs are only
within the band that can be seen from a particular channel. For example,
if the AP is on channel 1, it will display APs on channels 1-3. Adjacent
APs are displayed for five minutes.
29000152-001 B
51
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
DHCP Client List
The Monitoring/Report — DHCP Client List screen displays all
clients currently connected to the 3e–527A3 via DHCP server, including
their hostnames, IP addresses, and MAC Addresses.
The DHCP Client list constantly collects entries. To remove entries
from the list, check mark the Revoke Entry selection and click Remove to
confirm the action.
System Log
The Monitoring/Report — System Log screen displays system facility messages with date and time stamp. These are messages documenting
functions performed internal to the system, based on the system’s functionality. Generally, the Administrator would only use this information if
trained as or working with a field engineer or as information provided to
technical support.
The System log continues to accumulate listings and rotates when it
reaches the defined maximum size. You can never delete this log but you
can export the log to a file on a PC.
52
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Web Access Log
The Web Access Log displays system facility messages for any configuration changes via the web GUI. Along with the old value and new
value, the when/who/what changes are also recorded. For security
reasons, some sensitive data may not be recorded (for example, the encryption key) or may not be completely recorded (for example, the authenticated MAC). For example, this log records when you set encryption
mode, change operating mode, etc., using the web browser. It establishes
a running record regarding what actions were performed and by whom.
The Web access log will continue to accumulate listings and rotate by
half when it reaches the defined maximum size (10 Kbytes). If configured,
an email notification will be sent when the weblog grows to 50% of the
maximum size for the first time. You can also set another alert point of 6090% of the maximum size and an email notification will be sent when this
alert point is reached. You should export the web log to a PC before the
maximum size is reached to the log does not get overwritten. An email
will be sent only once. The exception is if the unit is rebooted, then it will
send an email on each reboot.
NOTE: You need to set up email notification using the System Administration — Email Notification Conf screen before any emails can be sent
from the unit.
29000152-001 B
53
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Network Activity
The Network Activity Log keeps a detailed log of all activities on the
network which can be useful to the network administration staff.
The Network Activities log will continue to accumulate listings and
rotates when the log reaches the defined maximum size. You can never
delete this log but you can export the log to a file on a PC.
54
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Auditing
The 3e-527A3 collects audit data and provides an interface for authorized administrators to review generated audit records. It generates
records for two separate classes of events: authentication/access to the
system, and actions taken directly on the system. All audit records include the date/time of the event, the identity associated with the event
(such as the service, computer or user), the success/failure of the event
and a definition of the event (by code or explanation).
Every start and stop of the audit service is noted in the audit record.
For audit events resulting from actions of identified users, the 3e-527A3
shall be able to associate each auditable event with the identity of the user
that caused the event. The 3e-527A3 shall be able to include or exclude
auditable events from the set of audited events based on object identity,
user identity, subject identity, host identity, and event type.
The TOE (Target of Evaluation) provides tools which can be used to
review the audit records. These tools allow the user to query for records
based on the identity associated with the record, such as the user or computer which is associated with the event.
The Auditing screens contain auditing functions for the system. The
screens and functions are detailed in the following subsections.
Log
The Auditing—Log screen provides a listing of all the audit records.
This log will rotate after it reaches the defined maximum size. You can not
delete this log but you can export the file to a PC.
29000152-001 B
55
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Report Query
The Auditing—Report Query screen allows you to query on report
based on start time, end time, MAC address, or unique record IDs.
Configuration
The Auditing—Configuration screen is used to configure the auditing
settings. You can enable and disable the auditing function on this screen.
You can select which audit event types you wish to log. The following
figure shows the screen and the table lists event types and descriptions.
56
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Event Type
Description
Audit Log Configuration Modified Any modification to the audit log
configuration (enable/disable,
recorded event types, etc) will trigger the creation of an audit record.
Key Transfer Error
Any error detected during the
dynamic key exchange, either to
the station or the authentication
server.
Key Zeroized
The keys are zeroized including:
1. Transitioning from static key to
DKE (and vice versa)
2. Transitioning to bypass mode
Individual log messages appear
from the application and driver
since keys are held in both locations.
STA Failed Authentication
A station's authentication request
is dropped because it doesn't
match the MAC address filter.
STA Associated
A station successfully associates to
the AP.
Encryption Algorithm Changed
The encryption algorithm is
changed, including bypass mode.
Failed FIPS Policy
All HMAC/AES decrypt errors
that can be detected.
MAC Filter Changed
The MAC address filter is changed
including adding/deleting,
enable/disable, and changing filter
type.
Time Changed
Whenever the time is changed via
the GUI or at bootup if the time is
within two minutes of 11/30/1999,
0hr, 0min.
Self Test Activated
The self-test function is run.
29000152-001 B
57
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
System Administration
The System administration screens contain administrative functions.
The screens and functions are detailed in the following section.
Email Notification Configuration
All system notification emails need to be set up using the System
Administration — Email Notification Configuration screen. Your email
server must support SMTP protocol. If you email server does not require
authentication to send email then leave the username/password fields
blank. If your email server does not support SSL (Secure Socket Layer)
then disable SSL on the 3e-527A3. You may also test your email setup using the test feature on this screen.
NOTE: Check your connection to the mail server. Emails sent from the
3e-527A3 may be queued for a short period if the connection fails temporarily, but it will give up if the connection continues to fail.
58
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Configuration-Button
The System Administration—Configuration Button screen is used in
conjunction with the physical Configuration/RESET button which is accessible from the outside of the 3e–527A3 unit. The Configuration/RESET
button is located directly under the number “1” on the front panel. Use a
plastic wire wrap or something similar and slide it in-between the gray
panel and the Ethernet jack (RJ-45 jack) at an angle so that the tip touches
the button hidden under the number “1”. You will know you have located
the Configuration/RESET button when you push and “feel” a click.
NOTE: A metal paper clip is not recommended as it may damage the
reset switch and after time the switch will not be water resistant anymore.
In order to minimize the administration effort of the AP, the external
RESET button has been converted into a configuration button to perform
certain functions. This configuration button is programmed to perform
the following operations.
•
•
•
Send the configuration file to other APs that are connected to
ports 1-6 and the PoE/Uplink port (requires a password)
Note that the configuration file transfer only goes to devices that
are connected to the Ethernet ports. The configuration does not
get transferred to devices connected wirelessly or through the
Encrp port.
Normal Reset (hold button for five seconds then release, see details below)
Factory Default (hold button for 10 seconds then release, see details below)
The System Administration—Configuration Button screen is where
you can enable the configuration button. The configuration button is
disabled by default and doesn't have a password. Once the button is enabled, a password must be entered (not needed for reset or factory default
functions). In order to perform a configuration transfer, you must enter
the password (8 digits between 1-9).
29000152-001 B
59
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
To use the Configuration/RESET button push the button for two
seconds. After two seconds the WLAN2 and WLANSS LEDs are turned
off. These two LEDs can then be used as input indicators.
The procedure to enter the password is:
Example: 11111111
Push the Configuration/RESET button once (input is acknowledged by the signal strength LED) and wait for one second. The WLAN2
LED blinks to acknowledge the first digit was accepted. Repeat eight
times.
To reset the unit:
1.
Push in and hold the Configuration/RESET button for five seconds (input is acknowledged by the WLANSS LED turning on).
2. After five seconds, you can release the button to reset the unit
without factory default.
3. If you continue to hold the button, after 10 seconds the WLANSS
will turn off and the unit will be reset to the factory default.
The signal strength LED and WLAN2 LEDs will go back to normal if
there is no input in 10 seconds.
60
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
System Upgrade
The System Administration — System Upgrade screen gives you the
ability to upload updates to the 3e–527A3 device’s firmware as they become available. When a new upgrade file becomes available, you can do a
firmware upgrade from the Firmware Upgrade window.
There is also a configuration file transfer option which allows the
system configuration file from one AP to be transferred to another AP, in
order to minimize the administration of the APs. Only configuration parameters that can be shared between APs are downloaded in the configuration file. WAN IP address, hostname, and bridge priority are not transferred in the configuration file. Click on the Local Configuration Upgrade
and Remote Configuration Upgrade tabs to perform file transfers.
Only the Crypto Officer role can access this function.
Firmware Upgrade
On the System Administration — System Upgrade screen, the Firmware Upgrade tab is the default view.
Click browse and select the firmware file to be uploaded. Click on the
Upload Firmware button.
29000152-001 B
61
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Local Configuration Upgrade
On the System Administration — System Upgrade screen, click on
the Local Configuration Upgrade tab to upload and download configuration files to access points connected to the network.
To upload a configuration file, select the file using the browse button and enter the passphrase for that file. The passphrase protects the file
from unauthorized users. It prevents unauthorized users from applying
the system configuration file to an unauthorized AP to gain access to the
network. Before downloading the system configuration file to a local computer, the user must enter a passphrase to protect the file. Before the system configuration file can be uploaded onto another AP, the passphrase
must be entered on the remote AP.
The configuration file can be tagged with a 12 character tag to keep
track of the configuration file as it is transferred to other APs.
62
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
The random configuration feature is intended to reduce the effort to
generate new keys for the system and to create a new password for the
CryptoOfficer role that is performing this operation. When the generate
button is pushed, the following parameters are randomized:
•
•
•
•
•
•
•
•
AD SSID
AP encryption key (AES-192)
Bridge SSID
Bridge encryption key (AES-192)
Bridge channel (802.11a, random channel in 5.8GHz band)
DSL encryption key (AES-192)
Configuration button password
CryptoOfficer password
The following parameters are set:
• Bridge mode: auto
• Bridge radio: freq=11a, txpower=auto, broadcasting ssid=disabled
• AP radio: txpower=auto, broadcasting ssid=disabled
All other system parameters are unchanged.
IMPORTANT: The three fields that are listed (CryptoOfficer Password, AP Encryption Key, and Configuration Password Button) should be
recorded since they won't be visible after reboot. Once you record these
values, the file can be installed by clicking on the "Install file" button. The
new file will be installed and the unit will reboot.
29000152-001 B
63
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Remote Configuration Upgrade
On the System Administration — System Upgrade screen, click on
the Remote Configuration Upgrade tab to upload and download configuration files to access points in remote locations which are not configured.
This remote configuration upgrade feature allows you to selectively
transfer a configuration file to other APs. Once the file is transferred, the
remote AP will be rebooted. Once the remote units are rebooted, the site
map can be updated and the File Tag will show the status of the units. If
the tag matches the local tag, the unit was updated successfully.
While files are being transferred press the F5 key to see the status of
the transfer. Pressing F5 will update the status only, not the entire page.
The status will either be "file sent", "upgrading", successful", or "failure".
If you click on the Update Site Map button then the status of the transfer
will be lost.
Two types of files can be transferred, a local file or a randomly generated file. A local file is the current configuration that is running on the AP.
A randomly generated file is the local file with a randomly selected bridging SSID and a randomly selected bridging encryption key (AES-192).
64
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
The random configuration file is used to update the bridging SSID
and bridging encryption on other devices using the existing bridging
link. If the bridging key or the bridging SSID is changed on the normal
configuration screen, then the bridging link to the other devices will be
terminated, and the configuration can not be updated.
To create a randomly generated bridging configuration file, click
Generate. A new configuration is created in a temporary file and an
Install button appears. In order to transfer this file, select the Generated
File radio button, check the desired recipients in the Site Map section, and
click Apply. After the file has been successfully transferred to the recipients (check the status field in the lower section), click Install to apply the
randomly generated configuration file to the AP. Once applied, the unit
will reboot and start using the new configuration file.
The automatic IP address configuration feature can be used to assign
a remote device an IP address. This feature minimizes the effort to configure IP addresses in a wireless network. The IP addresses are assigned
on the private class A IP address range (10.0.0.0). By default, this feature
is enabled, so if you want to assign your own IP addresses you need to
disable this feature.
29000152-001 B
65
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
You have the option to configure the second byte of the IP address to
limit the range in which the IP addresses are distributed. For example, if
your network already uses the 10.0.0.0 network address for other devices,
you can limit the auto configuration to an upper range of 10.128.0.0 and
the IP addresses will start from that number.
The automatic IP address configuration feature uses the last three
bytes of the WAN MAC address for the last three bytes of the IP address.
For example, the WAN MAC address of 00:07:D5:01:02:03 will translate to
an IP address of 10.1.2.3. If the starting range of the automatic IP address
configuration is set to 10.128.0.0 and the WAN MAC address is 00:07:D5:
01:02:03, then the IP address is pushed to the upper range and becomes
10.129.2.3 (basically the second byte adds 128+1). The MAC addresses on
the WAN port are from the 3eTI's address pool of 16 million addresses.
There is a small chance for duplicate MACs. However, if a duplicate IP
address is detected, the bridge site map will show this device with a red
IP address. The distributed default gateway is the first IP address in the
valid range. For example: for 10.128.0.0, the default gateway is 10.128.0.1.
The distributed netmask is 255.0.0.0.
Factory Default
The System Administration — Factory Default screen is used to reset
the AP to its factory settings.
The "Restore" button is a fallback troubleshooting function that should
only be used to reset to original settings.
Only the Crypto Officer role has access to the Restore button.
66
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Remote Logging
The System Administration —Remote Logging screen allows you to
forward the syslog data from each machine to a central remote logging
server. In the 3e–527A3, this function uses the syslogd daemon. If you enable Remote Logging, input a System Log Server IP Address and System
Log Server Port. Click Apply to accept these values.
Reboot
The System Administration — Reboot screen allows you to reboot
the 3e–527A3 without changing any preset functionality. Both Crypto Officer and Administrator functions have access to this function.
29000152-001 B
67
3e–527A3 Wireless Access Point – 8 Port
Chapter 3: Access Point Configuration
Utilities
The System Administration — Utilities screen gives you ready access
to two useful utilities: Ping and Traceroute. Simply enter the IP Address
or hostname you wish to ping or traceroute and click either the Ping or
Traceroute button, as appropriate.
68
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
Chapter 4: Gateway Configuration
Introduction
Chapter 3 covered the default configuration of the 3e–527A3 Wireless
Access Point as an access point, for use as part of a host wired network.
This chapter covers configuration as a gateway.
If additional security for the wireless network is desired (differen–
tiating it from the wired network to which it is connected), set it up in
gateway mode. Gateway mode takes advantage of some built-in “router”
functions, such as the gateway’s ability to do Network Address Translation (NAT), providing private IP addresses for the wireless clients.
The illustration on the following page shows the difference between
AP and Gateway mode.
Caution: If you have previously set up your WLAN using
the 3e–527A3 devices as access points and you decide to change
the configuration to gateway mode, you will need to convert
the MAC addresses on each wireless device that has been set
up so they can be seen by the reconfigured system. This is accomplished by the following procedure, done on each device
that was configured to use the 3e–527A3 when the system was
set up as an access point system. Pull up a System Prompt (“c:\”
prompt, also called an MSDOS prompt) on the wireless device’s
desktop. type: arp -d and hit return. This reconfigures the MAC
address in the wireless device’s PC card so that it is now visible
to the gateway.
29000152-001 B
69
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
A comparison of gateway and access point setup
for the 3e–527A3
������� ����
������ ����� ����
�������� �������
�������� �������
������������
������������
���� ������
���� ������
������������
������������
��
����
���
��
��
��
���
��
��
��
��
������������
����
� �� �� � �
��
���
��
�����
��
�
��
��
��
����
�
��
��
��
�
���� ������
�����������
������������
���� ������
������� ������� ����
������������
�������������
�������������
������������
�������������
�������������
�������������
�������������
�������� ������� �� �������
���� ������������� ��� �����
���� ����� ��� ����� ��
�������� �������� �� ���
������� ������� ������� ���
������� ������� ���� ���� ���
��� ������� �������� �� ���
��������� ���� ������� ���
������� ������� � �������
�������� ��������
70
�������������
����� ������ ����� ����� ����� �����
�� ��� ���� ������� ��� �� ���
�������� ��� ����������� ����
�������� ������� �� ��� �� �������
��� �� �� �������� ��� �������� ���
����� �����������
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
Configuring in Gateway Mode
To configure the 3e–527A3 in gateway mode, complete the following
steps.
1. Login on to the 3e–527A3 (see Chapter 3, page 21).
2. Using the navigation bar to the left, navigate to the System Configuration — Operating Mode screen, select the Gateway Mode
radio button, and click Apply. The 3e–527A3 AP will reboot in
gateway mode.
Note that if you change modes from AP to Gateway, your configuration is not lost.
You can then proceed to change the management screens as necessary
to reconfigure the device as a gateway. Configuration in gateway mode
allows you to set firewall parameters. This is the main difference between
the screens you will see in gateway mode and those covered in access
point setup as discussed in Chapter 3.
The following sections only cover the functions and screens that are
unique to the gateway mode. All of the screens that are common to both
the AP and Gateway modes are covered in Chapter 3.
29000152-001 B
71
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
WAN
In Gateway mode, the System Configuration–WAN screen has two
tabs: Main IP Setting and IP Aliasing.
Main IP Setting
The Main IP Setting screen allows you to set Link Speed and Duplex
of the WAN port. If you select a choice other than Auto (the default),
the 3e–527A3 will use only the selected link speed (10 Mbits/sec or 100
Mbits/sec) and Duplex (Half Duplex transfers or Full Duplex transfers)
that you select in the WAN/LAN Link drop-down menu.
You also set information for how the IP address will be obtained.
The WAN IP address is the Public IP address required to link the private WLAN users to the external enterprise or shipboard network, which
is to be outside the “protected” wireless LAN. Normally, you will be
provided with the IP address, Subnet Mask, Default Gateway and DNS
to assign by the Network Administrator for the Ethernet Network.
There are two ways to configure the WAN IP address:
1. Obtain an IP address Automatically – This configuration allows
the Ethernet network to use the DHCP server on the wired network to dynamically assign the WAN IP address to the DHCP
client in the gateway.
2. Specify an IP address – This configuration allows the user to
manually type in a static IP address, default gateway, and Domain
Name Server (DNS) if these are provided by the Ethernet network
administrator.
72
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
IP Aliasing
You can add up to ten additional IP aliases on the WAN port.
The IP aliasing entries can be used by the virtual server to map a
public IP address to a private IP address. If the virtual server needs to
map multiple public IP addresses to multiple private Ip addresses, the IP
aliasing entries can be used to create additional public IP addresses. These
entries are always static entries and can not use DHCP.
29000152-001 B
73
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
LAN
Click the entry on the left hand navigation panel for System Configuration — LAN. This directs you to the System Configuration — LAN
screen.
This sets up the default numbers for the four octets for a possible private LAN function for the access point. You can also change the default
subnet mask. The Local LAN port provides DHCP server functionality to
automatically assign an IP address to a computer Ethernet port.
74
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
Security
Click the entry on the left hand navigation panel for Wireless Access
Point — Security. This directs you to the Wireless Access Point — Security screen.
The default factory setting for the 3e–527A3 in gateway mode is no
encryption but for security reasons it will not communicate to any clients
unless the encryption is set by the CryptoOfficer. It is recommended that
you set encryption as soon as possible.
Firewall
Content Filtering
Click the entry on the left hand navigation panel for Firewall — Content Filtering. The Content Filtering screen allows the system administrator to identify particular hosts or IPs that will be blocked from access
by the gateway. Simply input the IP address and click Add.
Entries can be added as:
•
•
29000152-001 B
Individual IP addresses (192.168.204.10)
IP address range (192.168.204.0/24)
75
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
IP Filtering
Click the entry on the left hand navigation panel for Firewall — IP
Filtering.
The IP Filtering screen blocks certain IPs on the Private LAN from accessing your Internet connection. It restricts clients to those with a specific
IP Address.
Port Filtering
Click the entry on the left hand navigation panel for Firewall — Port
Filtering. Port filtering permits you to configure the Gateway to block
outbound traffic on specific ports. It can be used to block the wireless
network from using specific protocols on the network.
76
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
Virtual Server
Click the entry on the left hand navigation panel for Firewall — Virtual Server.
In order to protect the Private Network, the built-in NAT firewall
filters out traffic to the private network. Since all clients on the Private
Network are normally not visible to outside users, the virtual server function allows some clients on the Private Network to be accessed by outside
users by configuring the application mapping function offered on this
page. Certain well known applications use specific TCP ports, such as
Telnet (port 23), FTP (port 21), and Web server (port 80). Client computers
on the Private LAN can host these applications, and allow users from the
Internet to access these applications hosted on the virtual servers.
This is done by mapping virtual servers to private IP addresses,
according to the specific TCP port application. As the planning table
below shows, we have identified a Telnet (port 23) virtual server for
private IP 192.168.15.56, a SMTP Mail (port 25) virtual server for private IP 192.168.15.33, and a Web (port 80) virtual server for private IP
192.168.15.64. For example, all Internet requests to the gateway for SMTP
Mail services (port 25) to the WAN IP address will redirected to the Private Network computer specified by the server IP 192.168.15.33.
Service Port
Server IP
23
192.168.15.56
25
192.168.15.33
80
192.168.15.64
29000152-001 B
77
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
It is recommend that IP addresses of virtual server computers hosted
on the Private Network be manually (statically) assigned to coincide with
a static server mapping to that specific IP address. Virtual servers should
not rely on the dynamic IP assignment of the DHCP server function
which could create unmapped IP address assignments.
Protocol – Selection of either UDP, TCP, or Both (TCP and UDP) allows these specified network protocols to pass through during the TCP
port communication with each virtual server IP address.
Demilitarized Zone (DMZ)
Click the entry on the left hand navigation panel for Firewall —
DMZ.
The Demilitarized Zone (DMZ) host allows one computer on the
Private Network to be totally exposed to the wired network or Internet
for unrestricted two-way communication. This configuration is typically
used when a computer is operating a proprietary client software or 2-way
communication such as video-teleconferencing, where multiple TCP port
assignments are required for communication. To assign a PC the DMZ
host status, fill in the Private IP address which is identified as the exposed
host and click the Apply button. However, any Internet user who knows
the WAN IP address of the gateway can connect to the DMZ host since
the firewall feature is disabled for this device, causing a potential security
risk to data residing on that host.
Again, it is recommended that IP addresses of DMZ host computers
on the Private Network be manually (statically) assigned to coincide with
a static DMZ host mapping to that specific IP address. DMZ hosts should
not rely on the dynamic IP assignment of DHCP server function which
could create incorrectly mapped IP address assignments to non-DMZ
hosts.
78
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
Advanced
Click the entry on the left hand navigation panel for Firewall — Advanced.
As advanced firewall functions, you can enable/disable
•
•
•
Block Ping to WAN
Web-based management from WAN port
SNMP management from WAN port
These options allow you more control over your environment.
29000152-001 B
79
3e–527A3 Wireless Access Point – 8 Port
Chapter 4: Gateway Configuration
This page intentionally left blank.
80
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Chapter 5: Wireless Bridge Configuration
Introduction
In the 3e–527A3, wireless bridging uses a second WLAN card to set
up an independent wireless bridge connection. Since wireless bridging
provides a mechanism for APs to collaborate, it is possible to extend the
basic service set (BSS) of a standalone AP and to connect two separate
LANs without installing any cabling.
The wireless bridging function in the 3e–527A3 supports a number of
bridging configurations. Some of the most popular settings are discussed
in this chapter:
•
•
•
Point-to-point bridging of two Ethernet links
Point-to-multipoint bridging of several Ethernet links
Repeater mode
The wireless bridging screens are the same whether you are in access
point or gateway mode.
Bridging is a function that is set up in addition to basic access point or
gateway setup. If you will be using the 3e–527A3 solely as a bridge, some
of the settings you may have selected for access point/gateway use will
not be necessary.
If setting up as a bridge during initial setup, you can either use the
LAN Port directly wired by Ethernet cable to a laptop to set the appropriate settings. The management screens that you may need to modify,
regardless of what type of bridging mode you choose, will be in the Wireless Bridge section of the navigation bar. These include:
•
•
•
•
29000152-001 B
Wireless Bridge — General
Wireless Bridge — Radio
Wireless Bridge — Encryption
Wireless Bridge — MAC Address Filtering (Auto Mode Only)
81
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Wireless Bridge — General
The Wireless Bridge — General screen contains wireless bridging
information including the channel number, Tx rate, Tx power, spanning
tree protocol (802.1d) enable/disable, and remote AP's BSSID. This page
is important in setting up your bridge configuration. Wireless bridging
supports two modes of operation:
•
•
Manual wireless bridging
Auto-forming wireless bridging (AWB) - with a maximum number of allowable bridges (the default is 40)
Auto-forming Wireless Bridging
When the wireless bridge is in auto-forming mode, the wireless
bridge sniffs for beacons from other wireless bridges and identifies APs
that match a policy such as SSID and channel.
Instead of simply adding the APs with the same SSID/channel to the
network, a three-way association handshake is performed in order to
control network access.
To make a unit the root STP node, set the bridge priority lower than
any other node in the network.
82
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
AUTO BRIDGING GENERAL SETTINGS OPTIONS
Bridging Mode
Auto Bridging
auto bridging selected
SSID
numbers or letters
Can be any set of letters and numbers
assigned by the network administrator. This nomenclature has to be
set on the wireless bridge and each
wireless device in order for them to
communicate.
Max Auto
Bridges
1-40
Maximum number of auto bridges
allowed.
Bridge Priority
1-40
Determines the root STP node. The
lowest bridge priority in the network
will become the STP root.
Signal Strength
Threshold
27%
Prevents the node under the threshold from associating and joining the
network.
21%
15%
9%
None
Broadcast SSID
Diable/Enable
When disabled, the AP hides the SSID
in outgoing beacon frames and stations cannot obtain the SSID through
passive scanning.
Also, when it is disabled, the bridge
doesn’t send probe responses to probe
requests with unspecified SSIDs.
Signal Strength
MAC
29000152-001 B
The signal strength of this wireless
bridge will be indicated on the Signal
Strength LED located on the front of
the case.
83
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Manual Bridging
When the wireless bridge is in manual bridging mode, you can manually select a signal strength LED MAC and enable or disable spanning
tree protocol. You can also delete remote AP's MAC addresses.
MANUAL BRIDGING GENERAL SETTINGS OPTIONS
Bridging
Mode
Manual Bridging
manual bridging selected
Signal
Strength LED
MAC
Not Assigned
Allows you to set the number of one of
the Remote APs which will be listed at
the bottom of the screen once the system
is operational This wireless bridge becomes the guiding port that is displayed
in the WLANNSS LED on the front of
the 3e–527A3 as a signal.
Spanning Tree Enable/Disable
Protocol (STP)
84
Enable STP is there is any possiblity that
a bridging loop could occur. If you are
certain that there is no possibility that
a bridging loop will occur, then disalbe
STP. The bridge will be more efficient
(faster) without it. If you are not sure,
the safest solution is to enable STP.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Monitoring
In the upper right-hand corner of the Wireless Bridge — General
screen there is a button called Monitoring. f you click on this button,
a pop-up window will appear (WDS Information). If you select Enable refresh, you can set the bridge refresh interval from 5 seconds to 30
minutes. Refreshing the screen allows you to see the effect of aiming the
antenna to improve signal strength.
Wireless Bridge — Radio
The Wireless Bridge — Radio screen contains wireless bridging
information including the channel number, Tx rate, Tx power, spanning
tree protocol (802.1d) enable/disable, and remote AP's BSSID. This page
is important in setting up your bridge configuration.
29000152-001 B
85
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Radio Settings
Wireless Mode
802.11a
802.11a Turbo
Tx Rate
Sets the wireless mode for the wireless bridge.
802.11a
AUTO,
6, 9, 12, 18, 24, 36, 48, 54
Mbps
When set to AUTO, the card attempts to select the
optimal rate for the channel. If a fixed rate is used,
the card will only transmit at that rate.
AUTO
The card attempts to select the optimal rate for the
channel.
802.11a Turbo
Channel No.
802.11a
149 (5.745 GHz)
153 (5.765 GHz)
157 (5.785 GHz)
161 (5.805 GHz)
165 (5.825 GHz)
Sets the channel frequency for the wireless bridge.
802.11a Turbo
152 (5.76 GHz) Turbo Mode Sets the channel frequency for the wireless bridge.
160 (5.80 GHz) Turbo Mode
Tx Pwr Mode
OFF
FIXED,
AUTO
The Tx Pwr Mode defaults to AUTO, giving the
largest range of radio transmission available under
ambient conditions.
The wireless bridge's broadcast range can be
limited by setting the Tx Pwr Mode to Fixed and
choosing from 1-5 for Fixed Pwr Level.
If you want to prevent any radio frequency transmission from the wireless bridge, set the Tx Pwr
Mode to OFF. This will not turn off RF transmissions from any associated wireless devices, but
they will not be able to communicate with the wireless bridge when the Tx Pwr Mode is off.
Fixed Pwr Level
1, 2, 3, 4, 5
Select a range when Rx Pwr Mode is set to FIXED.
Level 1 is the shortest distance (Level 1=7dBm) and
Level 5 is the longest (Level 5=15dBm)
Propagation
Distance
< 5 Miles
5-10 Miles
11-15 Miles
16-20 Miles
21-25 Miles
26-30 Miles
> 30 Miles
Set the distance based on the distance between this
bridge and furthest bridge that is connected to it.
RTS Threshold
Range 1-2346
The number of bytes used for the RTS/CTS handshake boundary. When a packet size is greater
than the RTS threshold, the RTS/CTS handshaking
is performed.
BSSID
Enter hexadecimal numbers
Add the MAC address of the remote bridge. The
remote bridge's MAC address will appear at the
bottom of the screen.
Note
86
You can enter a note that defines the location of the
remote bridge.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Wireless Bridge — Encryption
The Wireless Bridge — Encryption screen is used to configure static
encryption keys for the wireless bridge. This is an important page to set
up to ensure that your bridge is working correctly. The encryption key
that you use on this screen must be the same for any bridge connected
to your bridging network in order for communication to occur. On this
screen you can select Static 3DES ( 192-bit) or Static AES (128-bit, 192-bit,
or 256-bit).
29000152-001 B
87
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Wireless Bridge — MAC Address FIltering
The Wireless Bridge — MAC Address Filtering screen functions just
like the AP MAC Address Filter (see page 36) but it is only used in auto
bridging mode and only controls access to the wireless bridge network.
The following sections describe the setup for three types of bridging
configuration: point-to-point, point-to-multipoint, or, lastly, repeater.
88
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Setting Up Bridging Type
Point-to-Point Bridge Configuration
A point-to-point link is a direct connection between two, and only
two, locations or nodes. Because the bridge function uses a separate
WLAN card for bridging, you can also set up WLANs on the separate AP
WLAN card.
�������
�������
������ �
��������
�������
������ �
��������
For the two bridges that are to be linked to communicate properly,
they must be set up with compatible commands in the setup screens.
For instance, the bridges must have the same channel number. Because there is a separate WLAN card for bridging, there can be a separate
WLAN on the AP WLAN card with no loss efficiency, as long as you set
the channel numbers so there's no conflict or noise with the channel assigned to the bridge. Spanning Tree Protocol may be set to Enable, if there
is any possibility of a bridging loop, or to Disable (which is more efficient)
if there's no possibility of a bridging loop. Each bridge must contain
the other's BSSID. (The BSSID of each is equivalent to the MAC address
contained on the Wireless Bridge — Radio setup page. Enter only hexadecimal numbers, no colons. Data entry is not case sensitive.) Finally, the
wireless bridging encryption must be set to the appropriate type and key
length and must be identical on each bridge.
The following charts show sample settings for manual bridging and
auto bridging modes.
29000152-001 B
89
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Point-to-Point Bridging Setup Guide - Manual Mode
Direction
Bridge 1
Bridge 2
Wireless Bridge — General (Manual Bridging Mode)
Bridging Mode
manual briding selected
Signal Strength LED MAC
Not Assigned (select from Not Assigned (select from
drop-down list)
drop-down list)
Spanning Tree Protocol (STP)
Enable (or Disable if no
bridging loop possible)
Enable (or Disable if no
bridging loop possible)
Wirelss Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Must be the same as
Bridge 2
Must be the same as Bridge
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
BSSID
Add Bridge 2 MAC
Add Bridge 1 MAC
Select appropriate key
type/length and value.
Must be the same key as
Bridge 2.
Select appropriate key
type/length and value.
Must be the same key as
Bridge 1.
manual bridging selected
Wireless Bridge — Radio
Wireless Bridge — Encryption
Bridging encryption options
Point-to-Point Bridging Setup Guide - Auto Mode
Direction
Bridge 1
Bridge 2
Wireless Bridge — Genral (Auto Bridging Mode)
Bridging Mode
Auto bridging selected
Auto bridging selected
SSID
Must be the same as
Bridge 2
Must be the same as Bridge
Max Auto Bridges
40 (range 1-40)
40 (range 1-40)
Bridge Priority
40 (range 1-40)
40 (range 1-40)
Signal Strength Threshold
9%
9%
BroadcastSSID
Disable
Disable
Signal Strength MAC
Enter from list at the bottom of the screen
Enter from list at the bottom of the screen
Wirelss Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Must be the same as
Bridge 2
Must be the same as Bridge
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
Wireless Bridge — Radio
Wireless Bridge — Encryption
Bridging encryption options
90
Select appropriate key
Select appropriate key
type/length and value.
type/length and value.
Must be same as Bridge 2. Must be same as Bridge 1.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
The following sequence walks you through the setup of bridge 1.
Bridge 2 would duplicate this procedure, with the BSSID of bridge 2 being the MAC address of bridge 1 and vice versa.
Navigate to the Wireless Bridge — Radio screen.
In the first section you will see the MAC Address of the bridging card.
This is used as the BSSID on other 3e–527A3s that will be communicatingwith this one.
Select the Wireless Mode to be used for bridging. Set the Tx Rate to
a fixed transmit rate or select AUTO if you want the card to attempt to
select the optimal rate for the channel If the Tx rate is set to a fixed rate,
then the card will only transmit at that rate.
Next select the Channel Number. The Channel Number must be set
to the same frequency in order for each bridge to communicate. TX Pwr
Mode can be left on Auto unless the power needs to be regulated.
Select the Propagation Distance which is based on the distance between a bridge and the furthest bridge that is connected to it.
Set the RTS Threshold which is the number of bytes used for the
RTS/CTS handshake boundary. When a packet size is greater than the
RTS threshold, the RTS/CTS handshaking is performed.
Click Apply to accept your changes but stay on this screen.
Add the BSSID of the remote bridge. The BSSID corresponds to that
bridge’s MAC address. In entering the BSSID, enter only hexadecimal
numbers, no colons. Data entry is not case sensitive. You may also enter
a note that defines the location of the remote bridge. Then click Add to
accept. The remote bridge’s BSSID will now appear at the bottom of the
Wireless Bridge — General screen.
29000152-001 B
91
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Next go to the Wireless Bridge — General screen. Select either
manual or auto bridging. If you choose Manual Bridging then you will
have to set Spanning Tree Protocol to Enable unless you are sure that
there is no chance of a loop. You can also assign a Signal Strength LED
MAC. Signal strength LED MAC allows you to set the number of one of
the Remote APs which will be listed at the bottom of the screen once the
system is operational as the guiding port that you wish to have display in
the WLANSS LED on the front of the 3e–527A3 as a signal. If you don’t
assign one, the LED will show the upper link signal strength (if there is
one). From this screen you can also choose to delete a remote AP's MAC
address.
Click Apply to accept your changes.
If you choose Auto Bridging mode, then you will need to enter the
follwoing information:
Enter the SSID. This can be any set of letters and numbers assigned
by the network administrator. This nomenclature has to be set on the
wireless bridge and each wireless device in order for them to communicate.
Enter a number from 1 to 40 for the Max Auto Bridges. Next enter the
Bridge Priority (range from 1-40). This determines the root STP node. The
lowest bridge priority in the network will become the STP root.
Select the Signal Strength Threshold.
Either enable or disable the Broadcast SSID. When disabled, the
bridge hides the SSID in outgoing beacon frames and stations cannot
obtain the SSID through passive scanning. Also, when it is disabled, the
bridge doesn’t send probe responses to probe requests with unspecified
SSIDs.
Finally enter the Signal Strength MAC. The signal strength of this
92
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
wireless bridge will be indicated on the Signal Strength LED located on
the front of the case.
Next, navigate to the Wireless Bridge — Encryption screen. Select
the appropriate key type and length and the key value. The encryption
key value and type for Bridge 1 must be the same as for Bridge 2. For
wireless bridging, only AES and 3DES are available for encryption.
You must complete the configuration of your Bridge 1 by following
the general instructions in Chapter 3 of this guide to establish any other
required configuration options such as General, WAN and LAN settings.
Configure the second of your two point-to-point bridges following the
instructions given for Bridge 1 above.
29000152-001 B
93
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Point-to-Multipoint Bridge Configuration
A point-to-multipoint configuration allows you to set up three or
more 3e–527A3 access points in bridging mode and accomplish bridging
between 3 or more locations wirelessly.
For the three bridges that are to be linked to communicate properly,
they have to be set up with compatible commands in their setup screens.
For instance, all bridges must have the same channel number. Spanning Tree Protocol will usually be set to Enable. If configured as in the
diagram following, Bridge 1 must contain all of the others' BSSIDs, while
Bridge 2 ~ n must only contain Bridge 1's BSSID. (The BSSID of each is
equivalent to the MAC address found on the Wireless Bridge — Radio
page. Enter only hexadecimal numbers. Data entry is not case sensitive.)
Finally, the wireless bridging encryption of each must be set to the appropriate type and key length and must be the same on all.
Because the 3e–527A3 has two separate WLAN cards, one for the AP
and one for the Bridge, each bridge can have a WLAN on the 802.11a protocol with no loss of efficiency in bridging if you wish.
The following diagram pictures a point-to-multipoint setup, which
might be of use where a company's network spans several buildings
within a campus-like setting.
�������
�������
������ �
��������
�������
������ �
�������
������ �
��������
��������
�������
������ �
��������
Follow the steps of the procedure outlined in the point-to-point bridge
section. The chart following describes the basic attributes.
94
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Point-to-Multipoint Bridging Setup Guide - Manual Mode
Direction
Bridge 1
Bridge 2 ~ n
Wirelss Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Same as Bridge 2~n
Same as Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
BSSID
Add Bridge 2~n MAC
Add Bridge 1 MAC
Wireless Bridge — Radio
Wireless Bridge — General (Manual Bridging Mode)
Bridging Mode
manual bridging selected
Signal Strength LED MAC
Not Assigned (select from Not Assigned (select from
drop-down list)
drop-down list)
Spanning Tree Protocol
Enable (or Disable if no
bridging loop possible)
Enable (or Disable if no
bridging loop possible)
Select appropriate key
type/length and value.
Must be the same key as
Bridge 2~n.
Select appropriate key
type/length and value.
Must be the same key as
Bridge 1.
manual bridging selected
Wireless Bridge — Encryption
Bridging encryption options
Point-to-Multipoint Bridging Setup Guide - Auto Mode
Direction
Bridge 1
Bridge 2 ~ n
Wirelss Mode
802.11a
802.11a
Tx Rate
AUTO
AUTO
Channel No.
Same as Bridge 2~n
Same as Bridge 1
Tx Power Mode
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
BSSID
Add Bridge 2~n MAC
Add Bridge 1 MAC
Wireless Bridge — Radio
Wireless Bridge — General (Auto Bridging Mode)
Bridging Mode
Auto bridging selected
Auto bridging selected
SSID
Must be the same as
Bridge 2~n
Must be the same as Bridge 2
Max Auto Bridges
40 (range 1-40)
40 (range 1-40)
Bridge Priority
40 (range 1-40)
40 (range 1-40)
Signal Strength Threshold
9%
9%
Signal Strength MAC
Enter from list at the bottom of the screen
Enter from list at the bottom
of the screen
Wireless Bridge — Encryption
Bridging encryption options
29000152-001 B
Select appropriate key
Select appropriate key type/
type/length and value.
length and value. Must be
Must be same as Bridge 2. same as Bridge 1.
95
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
The above recommended setup requires only Bridge 1 to be set in
point-to-multipoint mode. It is possible to set all bridges in point-tomultipoint mode, in which case , each bridge would have to contain the
BSSID for each of the other bridges and Spanning Tree Protocol must be
Enabled. Complete any other setup screens following general instructions
in Chapter 3.
Repeater Bridge Configuration
A repeater setup can be used to extend the wireless signal from one
bridge connected to an Ethernet LAN wirelessly so that another bridge
can control a wireless LAN at a distance.
���
������
�������
�������
�������
���
���
������ �
������ �
������
�������
������ �
�������
������
��������
��������
Repeater Bridging Setup Guide - Manual Mode
Direction
Bridge 1
Bridge 2
Bridge 3
Wireless Bridge — Radio
Wireless Mode
802.11a
802.11a
802.11a
Tx Rate
AUTO
AUTO
AUTO
Channel No.
Same as Bridge 2
Same as Bridge 1
Same as Bridge 1
Tx Power Mode
Auto
Auto
Auto
Propagation Distance < 5 Miles
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
2346
BSSID
Add Bridge 2's MAC
Add Bridge 1's and
Bridge 3's MAC
Add Bridge 2's MAC
Wireless Bridge — General (Manual BridgingMode)
Bridging Mode
manual
manual
manual
Signal Strength LED
MAC
Not Assigned (select
from drop-down list)
Not Assigned (select
from drop-down list)
Not Assigned (select
from drop-down list)
Spanning Tree Protocol
Enable (or Disable
if no bridging loop
possible)
Enable (or Disable
if no bridging loop
possible)
Enable (or Disable if no
bridging loop possible)
Select appropriate
key type/length
and enter key value.
Must be the same as
that on the other two
Bridges.
Select appropriate key
type/length and enter
key value. Must be the
same as that on the
other two Bridges.
Wireless Bridge — Encyption
Wireless Configuration – Bridging
Encryption
96
Select appropriate
key type/length
and enter key value.
Must be the same as
that on the other two
Bridges.
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
Repeater Bridging Setup Guide - Auto Mode
Direction
Bridge 1
Bridge 2
Bridge 3
Wireless Bridge — Radio
Wireless Mode
802.11a
802.11a
802.11a
Tx Rate
AUTO
AUTO
AUTO
Channel
Same as Bridge 2
Same as Bridge 1
Same as Bridge 1
Tx Power Mode
Auto
Auto
Auto
Propagation Distance
< 5 Miles
< 5 Miles
< 5 Miles
RTS Threshold
2346
2346
2346
BSSID
Add Bridge 2's
MAC
Add Bridge 1's and
Bridge 3's MAC
Add Bridge 2's
MAC
Wireless Bridge — General (Auto Bridging Mode)
Bridging Mode
auto
SSID
Must be the same as Must be the same as Must be the same
Bridge 2
Bridge 1
as Bridge 1
Max Auto Bridges
40 (range 1-40)
40 (range 1-40)
40 (range 1-40)
Bridge Priority
40 (1-40)
40 (1-40)
40 (1-40)
Signal Strength
Threshold
9%
9%
9%
Signal Strength
MAC
Enter from list at
the bottom of the
screen
Enter from list at the Enter from list at
bottom of the screen the bottom of the
screen
auto
auto
Wireless Bridge — Encyption
Wireless Configuration – Bridging
Encryption
Select appropriate
key type/length
and enter key
value. Must be the
same as that on the
other 2 Bridges.
Select appropriate
key type/length
and enter key value.
Must be the same as
that on the other 2
Bridges.
Select appropriate
key type/length
and enter key
value. Must be the
same as that on the
other 2 Bridges.
With this configuration, each bridge can control a wireless LAN. All
wireless clients must have the same SSID as the bridges on the AP card
channel. All clients can roam between the three bridges.
All other setup screens should be completed following the guidelines
in Chapter 3.
29000152-001 B
97
3e–527A3 Wireless Access Point – 8 Port
Chapter 5: Wireless Bridge Configuration
This page intentionally left blank.
98
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Chapter 6: Technical Support
Chapter 6: Technical Support
Manufacturer’s Statement
The 3e–527A3 is provided with warranty. It is not desired or expected
that the user open the device. If malfunction is experienced and all external causes are eliminated, the user should return the unit to the manufacturer and replace it with a functioning unit.
If you are experiencing trouble with this unit, the point of contact is:
support@3eti.com
1-800-449-3384 (Monday - Friday, 8am to 5pm EST)
or visit our website at
www.3eti.com
Radio Frequency Interference Requirements
This device has been tested and found to comply with the limits for a
Class A digital device, pursuant to Part 15 of the Federal Communications
Commission’s Rules and Regulations. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference in which case the
user will be required to correct the interference at his own expense.
Installation should be accomplished using the authorized cables
and/or connectors provided with the device or available from the
manufacturer/distributor for use with this device. Changes or modifications not expressly approved by the manufacturer or party responsible for
this FCC compliance could void the user’s authority to operate the equipment.
29000152-001 B
99
3e–527A3 Wireless Access Point – 8 Port
Chapter 6: Technical Support
This page intentionally left blank.
100
29000152-001 B
3e–527A3 Wireless Access Point – 8 Port
Glossary
Glossary
3DES
Also referred to as Triple DES, a mode of the DES encryption algorithm that encrypts data
three times.
802.11
802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and a base station
or between two wireless clients. The IEEE accepted the specification in 1997.
802.11b (also referred to as 802.11 High Rate or WiFi)
802.11b is an extension to 802.11 that applies to wireless LANs and provides 11 Mbps
transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses only
DSSS. 802.11b was a 1999 ratification to the original 802.11 standard, allowing wireless
functionality comparable to Ethernet.
Access Point
An access point is a gateway set up to allow a group of LAN users access to another group
or a main group. The access point doesn’t use the DHCP server function and therefore accepts IP address assignment from the controlling network.
AES
Short for Advanced Encryption Standard, a symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S
government adopted the algorithm as its encryption technique in October 2000, replacing
the DES encryption it used. AES works at multiple network layers simultaneously.
Bridge
A device that connects two local-area networks (LANs), or two segments of the same LAN
that use the same protocol, such as Ethernet or Token-Ring.
DHCP
Short for Dynamic Host Configuration Protocol, DHCP is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have
a different IP address every time it connects to the network. In some systems, the device’s
IP address can even change while it is still connected. DHCP also supports a mix of
static and dynamic IP addresses. Dynamic addressing simplifies network administration
because the software keeps track of IP addresses rather than requiring an administrator to
manage the task. This means that a new computer can be added to a network without the
hassle of manually assigning it a unique IP address. Many ISPs use dynamic IP addressing
for dial-up users.
NMS (Network Management Station)
Includes such management software as HP Openview and IBM Netview.
PC Card
A computer device packaged in a small card about the size of a credit card and conforming to the PCMCIA standard.
PDA (Personal Digital Assistant)
29000152-001 B
G-a
3e–527A3 Wireless Access Point – 8 Port
Glossary
A handheld device.
SNMP
Simple Network Management Protocol
SSID
A Network ID unique to a network. Only clients and access points that share the same
SSID are able to communicate with each other. This string is case-sensitive. Wireless LANs
offer several security options, but increasing the security also means increasing the time
spent managing the system. Encryption is the key. The biggest threat is from intruders
coming into the LAN. You set a seven-digit alphanumeric security code, called an SSID, in
each wireless device and they thereafter operate as a group.
TKIP
Temporal Key Integrity Protocol. TKIP is a protocol used in WPA. It scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the
keys haven’t been tampered with.
VPN (Virtual Private Network)
A VPN uses encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
WLAN (Wireless Local Area Network)
A type of local-area network that uses high-frequency radio waves rather than wires to
communicate between nodes.
WPA
WPA stands for WiFi Protected Access. It’s an interim standard developed by the WiFi
Alliance pending full ratification of the 802.11i standard, to protect the wired band and
improve upon the old WEP encryption standard.
G-b
29000152-001 B

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
XMP Toolkit                     : 3.1-701
Modify Date                     : 2006:10:31 12:08:43-07:00
Create Date                     : 2006:10:25 09:38:17-07:00
Metadata Date                   : 2006:10:31 12:08:43-07:00
Creator Tool                    : Acrobat PDFMaker 7.0 for Word
Format                          : application/pdf
Title                           : CERTIFICATE OF COMPLIANCE
Creator                         : Systems Administrator
Document ID                     : uuid:fec3ee18-4bf2-4f4c-9487-bb5d0d5a2f96
Instance ID                     : uuid:d370c711-f2d3-499d-833e-190196d8b9f3
Producer                        : Acrobat Distiller 7.0 (Windows)
Has XFA                         : No
Page Count                      : 112
Author                          : Systems Administrator
EXIF Metadata provided by EXIF.tools
FCC ID Filing: QVT-527A3

Navigation menu