Accton Technology E21011 Draft 11n Dual band Wireless Access Point User Manual user guide
Accton Technology Corp Draft 11n Dual band Wireless Access Point user guide
User manual
USER GUIDE SMCE21011 EliteConnectTM SMCE21011 802.11b/g/n AP EliteConnectTM SMCE21011 User Guide 20 Mason Irvine, CA 92618 Phone: (949) 679-8000 April 2009 Pub. # XXXXXXXXXXX E042009-DT-R01 Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice. Copyright © 2009 by SMC Networks, Inc. 20 Mason Irvine, CA 92618 All rights reserved Trademarks: SMC is a registered trademark; and EZ Switch, TigerStack, TigerSwitch, and TigerAccess are trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders. LIMITED WARRANTY Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term. SMC will endeavor to repair or replace any product returned under warranty within 30 days of receipt of the product. The standard limited warranty can be upgraded to a Limited Lifetime* warranty by registering new products within 30 days of purchase from SMC or its Authorized Reseller. Registration can be accomplished via the enclosed product registration card or online via the SMC Web site. Failure to register will not affect the standard limited warranty. The Limited Lifetime warranty covers a product during the Life of that Product, which is defined as the period of time during which the product is an “Active” SMC product. A product is considered to be “Active” while it is listed on the current SMC price list. As new technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its product line with one that incorporates these newer technologies. At that point, the obsolete product is discontinued and is no longer an “Active” SMC product. A list of discontinued products with their respective dates of discontinuance can be found at: http://www.smc.com/index.cfm?action=customer_service_warranty. All products that are replaced become the property of SMC. Replacement products may be either new or reconditioned. Any replaced or repaired product carries either a 30-day limited warranty or the remainder of the initial warranty, whichever is longer. SMC is not responsible for any custom software or firmware, configuration information, or memory data of Customer contained in, stored on, or integrated with any products returned to SMC pursuant to any warranty. Products returned to SMC should have any customer-installed accessory or add-on components, such as expansion modules, removed prior to returning the product for replacement. SMC is not responsible for these items if they are returned with the product. Customers must contact SMC for a Return Material Authorization number prior to returning any product to SMC. Proof of purchase may be required. Any product returned to SMC without a valid Return Material Authorization (RMA) number clearly marked on the outside of the package will be returned to customer at customer’s expense. For warranty claims within North America, please call our toll-free customer support number at (800) 762-4968. Customers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from SMC to customer. WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN QUESTION, AT SMC’S OPTION. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN – 4 – LIEU OF ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD PERSON’S MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD. LIMITATION OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE, LOSS OF BUSINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS. * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. SMC Networks, Inc. 20 Mason Irvine, CA 92618 – 5 – – 6 – COMPLIANCES FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: ◆ Reorient or relocate the receiving antenna ◆ Increase the separation between the equipment and receiver ◆ Connect the equipment into an outlet on a circuit different from that to which the receiver is connected ◆ Consult the dealer or an experienced radio/TV technician for help This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible. This device and its antenna(s) must not be co-located or operation in conjunction with any other antenna or transmitter. This device is going to be operated in 5.15~5.25GHz frequency range, it is restricted in indoor environment only. – 7 – ABOUT THIS GUIDE IMPORTANT NOTE: FCC RADIATION EXPOSURE STATEMENT This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your body. IC STATEMENT : This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Cet appareil numérique de la classe B conforme á la norme NMB-003 du Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p) is not more than that permitted for successful communication. This device has been designed to operate with the antennas listed below, and having a maximum gain of [5] dB. Antennas not included in this list or having a gain greater than [5] dB are strictly prohibited for use with this device. The required antenna impedance is 50 ohms. The device could automatically discontinue transmission in case of absence of information to transmit, or operational failure. Note that this is not intended to prohibit transmission of control or signaling information or the use of repetitive codes where required by the technology. The device for the band 5150-5250 MHz is only for indoor usage to reduce potential for harmful interference to co-channel mobile satellite systems. The maximum antenna gain permitted (for devices in the band 5725-5825 MHz) to comply with the e.i.r.p. limits specified for point-to-point and non point-to-point operation as appropriate, as stated in section A9.2(3). IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC RSS-102 radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your body. – 8 – ABOUT THIS GUIDE AUSTRALIA/NEW ZEALAND AS/NZS 4771 ACN 066 352010 JAPAN VCCI CLASS B TAIWAN NCC 根據交通部低功率管理辦法規定: 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更 頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應 立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通 信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 EC CONFORMANCE DECLARATION Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards: ◆ EN 60950-1 (IEC 60950-1) - Product Safety ◆ EN 301 893 - Technical requirements for 5 GHz radio equipment ◆ EN 300 328 - Technical requirements for 2.4 GHz radio equipment ◆ EN 301 489-1 / EN 301 489-17 - EMC requirements for radio equipment This device is intended for use in the following European Community and EFTA countries: ◆ Austria ◆ Estonia ◆ Hungary ◆ Liechtenstein ◆ Norway ◆ Spain ◆ Belgium ◆ Finland ◆ Iceland ◆ Lithuania ◆ Poland ◆ Sweden ◆ Cyprus ◆ France ◆ Ireland ◆ Luxembourg ◆ Portugal ◆ Switzerland ◆ Czech Republic ◆ Germany ◆ Italy ◆ Malta ◆ Slovakia ◆ United Kingdom ◆ Denmark ◆ Greece ◆ Latvia ◆ Netherlands ◆ Slovenia ◆ Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: – 9 – ABOUT THIS GUIDE ◆ In Italy the end-user must apply for a license from the national spectrum authority to operate this device outdoors. ◆ In Belgium outdoor operation is only permitted using the 2.46 - 2.4835 GHz band: Channel 13. ◆ In France outdoor operation is only permitted using the 2.4 - 2.454 GHz band: Channels 1 - 7. NOTE: The user must use the configuration utility provided with this product to ensure the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below. ◆ This device requires that the user or installer properly enter the current country of operation in the command line interface as described in the user guide, before operating this device. ◆ This device will automatically limit the allowable channels determined by the current country of operation. Incorrectly entering the country of operation may result in illegal operation and may cause harmful interference to other systems. The user is obligated to ensure the device is operating according to the channel limitations, indoor/outdoor restrictions and license requirements for each European Community country as described in this document. ◆ This device employs a radar detection feature required for European Community operation in the 5 GHz band. This feature is automatically enabled when the country of operation is correctly configured for any European Community country. The presence of nearby radar operation may result in temporary interruption of operation of this device. The radar detection feature will automatically restart operation on a channel free of radar. ◆ The 5 GHz Turbo Mode feature is not allowed for operation in any European Community country. The current setting for this feature is found in the 5 GHz 802.11a Radio Settings Window as described in the user guide. ◆ The 5 GHz radio's Auto Channel Select setting described in the user guide must always remain enabled to ensure that automatic 5 GHz channel selection complies with European requirements. The current setting for this feature is found in the 5 GHz 802.11a Radio Settings Window as described in the user guide. ◆ This device is restricted to indoor use when operated in the European Community using the 5.15 - 5.35 GHz band: Channels 36, 40, 44, 48, 52, 56, 60, 64. See table below for allowed 5 GHz channels by country. ◆ This device may be operated indoors or outdoors in all countries of the European Community using the 2.4 GHz band: Channels 1 - 13, except where noted below. – 10 – ABOUT THIS GUIDE ◆ In Italy the end-user must apply for a license from the national spectrum authority to operate this device outdoors. ◆ In Belgium outdoor operation is only permitted using the 2.46 2.4835 GHz band: Channel 13. ◆ In France outdoor operation is only permitted using the 2.4 - 2.454 GHz band: Channels 1 - 7. OPERATION USING 5 GHZ CHANNELS IN THE EUROPEAN COMMUNITY The user/installer must use the provided configuration utility to check the current channel of operation and make necessary configuration changes to ensure operation occurs in conformance with European National spectrum usage laws as described below and elsewhere in this document. Allowed Frequency Bands Allowed Channel Numbers Countries 5.15 - 5.25 GHz* 36, 40, 44, 48 Austria, Belgium 5.15 - 5.35 GHz* 36, 40, 44, 48, 52, 56, 60, 64 France, Switzerland, Liechtenstein 5.15 - 5.35* & 5.470 - 5.725 GHz 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140 Denmark, Finland, Germany, Iceland, Ireland, Italy, Luxembourg, Netherlands, Norway, Portugal, Spain, Sweden, U.K. 5 GHz Operation Not Allowed None Greece * Outdoor operation is not allowed using 5.15-5.35 GHz bands (Channels 36 - 64). DECLARATION OF CONFORMITY IN LANGUAGES OF THE EUROPEAN COMMUNITY Czech Estonian Eesti Käesolevaga kinnitab SMC seadme Radio LAN vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. English Hereby, SMC, declares that this Radio LAN device is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Finnish Valmistaja SMC vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/ 5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Suomi Dutch Nederlands Hierbij verklaart SMC dat het toestel Radio LAN device in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG Bij deze SMC dat deze Radio LAN device voldoet aan de essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC. French Français Par la présente SMC déclare que l'appareil Radio LAN device est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE – 11 – ABOUT THIS GUIDE Swedish Svenska Danish Dansk German Deutsch Härmed intygar SMC att denna Radio LAN device står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. Undertegnede SMC erklærer herved, at følgende udstyr Radio LAN device overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF Hiermit erklärt SMC, dass sich dieser/diese/dieses Radio LAN device in Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi) Hiermit erklärt SMC die Übereinstimmung des Gerätes Radio LAN device mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EG. (Wien) Greek Με την παρουσα SMC δηλωνει οτι radio LAN device συμμορφωνεται προσ τισ ουσιωδεισ απαιτησεισ και τισ λοιπεσ σΧετικεσ διαταξεισ τησ οδηγιασ 1999/5/εκ ελληνικά Hungarian Magyar Italian Italiano Alulírott, SMC nyilatkozom, hogy a Radio LAN megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Con la presente SMC dichiara che questo Radio LAN device è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Latvian Latviski Lithuanian Maltese Malti Spanish Español Por medio de la presente SMC declara que el Radio LAN device cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/ 5/CE Polish Polski Portuguese Português SMC declara que este Radio LAN device está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Slovak Slovensky Slovenian Slovensko SMC izjavlja, da je ta Radio LAN v skladu z bistvenimi zahtevami in ostalimi relevantnimi doloili direktive 1999/5/ES. – 12 – ABOUT THIS GUIDE PURPOSE This guide gives specific information on how to install the 11n wireless access point and its physical and performance related characteristics. It also gives information on how to operate and use the management functions of the access point. AUDIENCE This guide is intended for use by network administrators who are responsible for installing, operating, and maintaining network equipment; consequently, it assumes a basic working knowledge of LANs (Local Area Networks), the Internet Protocol (IP), and Simple Network Management Protocol (SNMP). CONVENTIONS The following conventions are used throughout this guide to show information: NOTE: Emphasizes important information or calls your attention to related features or instructions. CAUTION: Alerts you to a potential hazard that could cause loss of data, or damage the system or equipment. WARNING: Alerts you to a potential hazard that could cause personal injury. RELATED PUBLICATIONS As part of the access point’s software, there is an online web-based help that describes all management related features. REVISION HISTORY This section summarizes the changes in each revision of this guide. MARCH 2009 REVISION This is the first revision of this guide. – 13 – CONTENTS SECTION I LIMITED WARRANTY COMPLIANCES ABOUT THIS GUIDE 13 CONTENTS 14 FIGURES 19 TABLES 21 INDEX OF CLI COMMANDS 23 GETTING STARTED 1 INTRODUCTION 26 27 Key Hardware Features 27 Description of Capabilities 27 Package Contents 28 Hardware Description 29 Antennas 30 External Antenna Connector 30 LED Indicators 32 Console Port 33 Ethernet Port 33 Power Connector 33 Reset Button 34 2 NETWORK TOPOLOGIES 35 Interference Issues 35 Infrastructure Wireless LAN 35 Infrastructure Wireless LAN for Roaming Wireless PCs 36 Infrastructure Wireless Bridge 37 – 14 – CONTENTS 3 INSTALLING THE ACCESS POINT Location Selection 39 Mounting on a Horizontal Surface 40 Mounting on a Wall 41 Connecting and Powering On 42 4 INITIAL CONFIGURATION SECTION II 39 43 Connecting to the Login Page 43 Home Page and Main Menu 44 Common Web Page Buttons 45 Quick Start 46 Step 1 46 Step 2 47 Step 3 49 Main Menu Items 50 WEB CONFIGURATION 51 5 SYSTEM SETTINGS 52 Administration Settings 52 IP Address 54 Radius Settings 55 Primary and Secondary RADIUS Server Setup 56 RADIUS Accounting 58 System Time 58 SNTP Server Settings 59 Time Zone Setting 59 Daylight Saving Settings 60 SpectraLink Voice Priority 60 VLAN Configuration 60 System Logs 62 Quick Start Wizard 64 6 MANAGEMENT SETTINGS 65 Remote Management Settings 65 Access Limitation 67 Simple Network Management Protocol 68 – 15 – CONTENTS SNMP Basic Settings 68 SNMP Trap Settings 70 View Access Control Model 71 SNMPv3 Users 73 SNMPv3 Targets 74 SNMPv3 Notification Filters 74 7 ADVANCED SETTINGS 76 Local Bridge Filter 76 Link Layer Discovery Protocol 77 Access Control Lists 78 Source Address Settings 78 Destination Address Settings 79 Ethernet Type 80 8 WIRELESS SETTINGS 82 Spanning Tree Protocol (STP) 82 Bridge 83 Ethernet Interface 84 Wireless Interface 85 Authentication 85 Local Authentication 85 RADIUS MAC Authentication 87 Interface Mode 88 Radio Settings 89 Virtual Access Points (VAPs) 93 VAP Basic Settings 94 WDS-STA Mode 95 Wireless Security Settings 95 Wired Equivalent Privacy (WEP) 97 QoS 99 9 MAINTENANCE SETTINGS 103 Upgrading Firmware 103 Running Configuration 106 Resetting the Access Point 107 10 STATUS INFORMATION 109 AP Status 109 – 16 – CONTENTS SECTION III AP System Configuration 109 AP Wireless Configuration 111 Station Status 112 System Logs 112 COMMAND LINE INTERFACE 114 11 USING THE COMMAND LINE INTERFACE 116 Console Connection 116 Telnet Connection 117 Entering Commands 118 Keywords and Arguments 118 Minimum Abbreviation 118 Command Completion 118 Getting Help on Commands 118 Showing Commands 118 Negating the Effect of Commands 119 Using Command History 119 Understanding Command Modes 119 Exec Commands 120 Configuration Commands 120 Command Line Processing 121 12 GENERAL COMMANDS 122 13 SYSTEM MANAGEMENT COMMANDS 127 System Management Commands 127 14 SYSTEM LOGGING COMMANDS 143 15 SYSTEM CLOCK COMMANDS 148 16 DHCP RELAY COMMANDS 152 17 SNMP COMMANDS 154 18 FLASH/FILE COMMANDS 167 19 RADIUS CLIENT COMMANDS 170 20 802.1X AUTHENTICATION COMMANDS 175 – 17 – CONTENTS SECTION IV 21 MAC ADDRESS AUTHENTICATION COMMANDS 177 22 FILTERING COMMANDS 181 23 SPANNING TREE COMMANDS 186 24 WDS BRIDGE COMMANDS 193 25 ETHERNET INTERFACE COMMANDS 195 26 WIRELESS INTERFACE COMMANDS 201 27 WIRELESS SECURITY COMMANDS 218 28 LINK LAYER DISCOVERY COMMANDS 228 29 VLAN COMMANDS 232 30 WMM COMMANDS 235 APPENDICES 240 A TROUBLESHOOTING 241 Diagnosing LED Indicators 241 Before Contacting Technical Support 241 B HARDWARE SPECIFICATIONS 244 C CABLES AND PINOUTS 247 Twisted-Pair Cable Assignments 247 10/100BASE-TX Pin Assignments 248 Straight-Through Wiring 248 Crossover Wiring 249 1000BASE-T Pin Assignments 250 Cable Testing for Existing Category 5 Cable 250 Adjusting Existing Category 5 Cabling to Run 1000BASE-T 250 Console Port Pin Assignments 251 GLOSSARY 252 INDEX 256 – 18 – FIGURES Figure 1: Top Panel 29 Figure 2: Rear Panel 29 Figure 3: Ports 30 Figure 4: External Antenna Connector 31 Figure 5: Screw-off External Antenna Connector - Close Up 31 Figure 6: LEDs 32 Figure 7: Infrastructure Wireless LAN 36 Figure 8: Infrastructure Wireless LAN for Roaming Wireless PCs 37 Figure 9: Bridging Mode 38 Figure 10: Attach Feet 40 Figure 11: Wall Mounting 41 Figure 12: Login Page 43 Figure 13: Home Page 44 Figure 14: Set Configuration Changes 45 Figure 15: Help Menu 45 Figure 16: Quick Start - Step 1 46 Figure 17: Quick Start - Step 2 47 Figure 18: Quick Start - Step 3 49 Figure 19: Administration 53 Figure 20: Set DNS Address 54 Figure 21: TCP/IP Settings 54 Figure 22: Invalid DNS 55 Figure 23: RADIUS Settings 57 Figure 24: SNTP Settings 59 Figure 25: SVP Settings 60 Figure 26: Setting the VLAN Identity 62 Figure 27: System Log Settings 63 Figure 28: Remote Management 66 Figure 29: Access Limitation 67 Figure 30: SNMP Basic Settings 69 Figure 31: SNMP Trap Settings 70 – 19 – FIGURES Figure 32: SNMP VACM 71 Figure 33: Configuring SNMPv3 Users 73 Figure 34: SNMPv3 Targets 74 Figure 35: SNMP Notification Filter 75 Figure 36: Local Bridge Filter 76 Figure 37: LLDP Settings 77 Figure 38: Source ACLs 79 Figure 39: Destination ACLs 79 Figure 40: Ethernet Type Filter 81 Figure 41: Spanning Tree Protocol 83 Figure 42: Local Authentication 86 Figure 43: RADIUS Authentication 87 Figure 44: Interface Mode 88 Figure 45: Radio Settings 90 Figure 46: VAP Settings 93 Figure 47: VAP Basic Settings 94 Figure 48: WDS-STA Mode 95 Figure 49: Configuring VAPs - Common Settings 96 Figure 50: WEP Configuration 98 Figure 51: WMM Backoff Wait Times 100 Figure 52: QoS 101 Figure 53: Firmware 104 Figure 54: Running Configuration File 106 Figure 55: Resetting the Access Point 107 Figure 56: AP System Configuration 110 Figure 57: AP Wireless Configuration 111 Figure 58: Station Status 112 Figure 59: System Logs 112 Figure 60: RJ-45 Connector 247 Figure 61: Straight Through Wiring 249 Figure 62: Crossover Wiring 249 Figure 63: DB-9 Connector 251 – 20 – TABLES Table 1: Key Hardware Features 27 Table 2: LED Behavior 32 Table 3: RADIUS Attributes 62 Table 4: Logging Levels 64 Table 5: WMM Access Categories 99 Table 6: Command Modes 120 Table 7: Keystroke Commands 121 Table 8: General Commands 122 Table 9: System Management Commands 127 Table 10: Country Codes 128 Table 11: System Management Commands 143 Table 12: Logging Levels 145 Table 13: System Clock Commands 148 Table 14: DHCP Relay Commands 152 Table 15: SNMP Commands 154 Table 16: Flash/File Commands 167 Table 17: RADIUS Client Commands 170 Table 18: 802.1x Authentication 175 Table 19: MAC Address Authentication 177 Table 20: Filtering Commands 181 Table 21: Spanning Tree Commands 186 Table 22: WDS Bridge Commands 193 Table 23: Ethernet Interface Commands 195 Table 24: Wireless Interface Commands 201 Table 25: Wireless Security Commands 218 Table 26: Link Layer Discovery Commands 228 Table 27: VLAN Commands 232 Table 28: WMM Commands 235 Table 29: AP Parameters 237 Table 30: BSS Parameters 237 Table 31: LED Indicators 241 – 21 – TABLES Table 32: 10/100BASE-TX MDI and MDI-X Port Pinouts 248 Table 33: 1000BASE-T MDI and MDI-X Port Pinouts 250 Table 34: 10/100BASE-TX MDI and MDI-X Port Pinouts 251 – 22 – INDEX OF CLI COMMANDS 802.1x enable 175 802.1x session-timeout 176 address filter default 177 address filter delete 178 address filter entry 178 a-mpdu 203 a-msdu 203 APmgmtIP 135 APmgmtUI 136 assoc-timeout-interval 214 auth 218 auth-timeout-value 214 beacon-interval 210 bridge stp br-conf forwarding-delay 187 bridge stp br-conf hello-time 187 bridge stp br-conf interface 189 bridge stp br-conf max-age 188 bridge stp br-conf priority 188 bridge stp service 186 bridge-link path-cost 198 bridge-link port-priority 199 channel 204 cipher-suite 222 cli-session-timeout 123 closed-system 213 configure 122 copy 168 country 128 description 212 dhcp-relay 153 dhcp-relay enable 152 dns server 196 dtim-period 210 dual-image 167 encryption 220 end 123 exit 123 filter acl-destination-address enable 183 filter acl-destination-address mac-address 183 filter acl-source-address enable 182 filter acl-source-address mac-address 183 filter ap-manage 182 filter ethernet-type enabled 184 filter ethernet-type protocol 184 filter local-bridge 181 interface ethernet 195 – 23 – interface wireless 202 interface-radio-mode 205 ip address 196 ip dhcp 197 ip http port 133 ip http server 133 ip https port 134 ip https server 134 ip ssh-server enable 131 ip ssh-server port 132 ip telnet-server enable 132 key 221 lldp service 228 lldp transmit delay-to-local-change 230 lldp transmit interval 229 lldp transmit re-init-delay 229 lldp-transmit hold-muliplier 229 logging clear 146 logging console 144 logging facility-type 145 logging host 144 logging level 145 logging on 143 mac-authentication server 179 mac-authentication session-timeout 179 make-rf-setting-effective 207 make-security-effective 225 management-vlanid 233 password 131 ping 124 pmksa-lifetime 224 preamble 208 prompt 129 protection-method 209 radius-server accounting timeout-interim 173 radius-server accounting key 173 radius-server accounting port 172 radius-server accounting-address 172 radius-server address 171 radius-server enable 170 radius-server key 171 radius-server port 171 reset 125 rts-threshold 211 short-guard-interval 209 show apmanagement 137 show authentication 176 INDEX OF CLI COMMANDS show bridge br-conf 190 show bridge forward address 192 show bridge port-conf 190 show bridge status 192 show bridge stp 190 show config 138 show dhcp-relay 153 show dual-image 169 show event-log 147 show filters 185 show hardware 142 show history 125 show interface ethernet 200 show interface wireless 215 show line 126 show lldp 230 show logging 146 show radius 174 show snmp target 164 show snmp users 164 show snmp vacm group / show snmp vacm view 165 show sntp 151 show station 217 show system 137 show version 138 show wds wireless 194 shutdown 198 shutdown 214 snmp-server community 154 snmp-server contact 155 snmp-server enable server 156 snmp-server filter 163 snmp-server host 157 snmp-server location 155 snmp-server targets 162 snmp-server trap 157 snmp-server user 161 snmp-server vacm group 160 snmp-server vacm view 159 sntp-server date-time 149 sntp-server daylight-saving 150 sntp-server enable 149 sntp-server ip 148 sntp-server timezone 150 ssid 212 system name 130 transmit-key 222 transmit-power 205 username 130 vap 203 vlan 232 vlan-id 234 wds ap 193 wds sta 193 wmm 235 wmm-acknowledge-policy 236 wmmparam 236 wpa-pre-shared-key 224 – 24 – INDEX OF CLI COMMANDS – 25 – SECTION I GETTING STARTED This section provides an overview of the access point, and introduces some basic concepts about wireless networking. It also describes the basic settings required to access the management interface. This section includes these chapters: ◆ “Introduction” on page 27 ◆ “Network Topologies” on page 35 ◆ “Installing the access point” on page 39 ◆ “Initial Configuration” on page 43 – 26 – 1 INTRODUCTION The EliteConnectTM SMCE21011 is an IEEE 802.11n access point (AP) that meets draft 2.0 standards. It is fully interoperable with older 802.11a/b/g standards, providing a transparent, wireless high speed data communication between the wired LAN and fixed or mobile devices. The unit includes three detachable dual-band 2.4/5 GHz antennas with the option to attach higher specification external antennas that boost network coverage. KEY HARDWARE FEATURES The following table describes the main hardware features of the AP. Table 1: Key Hardware Features Feature Description Antennas Three detachable dual-band 2.4/5 GHz MIMO antennas. LAN Port One 1000BASE-T RJ-45 port that supports a Power over Ethernet (PoE) connection to power the device. Console Port Console connection through an RJ-45 port with included RS-232 serial cable. Reset Button For resetting the unit and restoring factory defaults. LEDs Provides LED indicators for system status, wireless radio status, and LAN port status. Power Power over Ethernet (PoE) support through the RJ-45 Ethernet port, or from an external AC power adapter. Mounting Options Can be mounted on a wall, or on any horizontal surface such as a desktop or shelf. DESCRIPTION OF CAPABILITIES The SMC21011 supports up to eight Virtual Access Point (VAP) interfaces, which allow traffic to be separated for different user groups within the same AP service area. Each VAP can support up to 64 wireless clients, whereby the clients associate with each VAP in the same way as they would with physically separate access points. This means that each VAP can be configured with its own Service Set Identification (SSID), security settings, VLAN assignments, and other parameters, allowing the AP to serve a diverse range of client needs in an area from a single unit. – 27 – CHAPTER 1 | Introduction Package Contents In addition, the access point offers full network management capabilities through an easy to configure web interface, a command line interface for initial configuration and troubleshooting, and support for Simple Network Management tools. The SMCE21011 utilises MIMO technology and Spatial Multiplexing to achieve the highest possible data rate and throughput on the 802.11n frequency. The unit’s PoE RJ-45 port provides a 1 Gbps full-duplex link to a wired LAN. PACKAGE CONTENTS The EliteConnectTM SMCE21011 package includes: ◆ 11n Access Point (SMCE21011) ◆ RJ-45 Category 5 network cable ◆ RJ-45 to RS-232 console cable ◆ AC power adapter ◆ Four rubber feet ◆ User Guide CD Inform your dealer if there are any incorrect, missing or damaged parts. If possible,retain the carton, including the original packing materials. Use them again to repack the product in case there is a need to return it. – 28 – CHAPTER 1 | Introduction Hardware Description HARDWARE DESCRIPTION Figure 1: Top Panel Antennas LED Indicators Figure 2: Rear Panel Reset Button DC Power Port RJ-45 PoE Port – 29 – CHAPTER 1 | Introduction Hardware Description Figure 3: Ports DC Power Port RJ-45 PoE Port RJ-45 Console Port ANTENNAS The access point includes three integrated external MIMO (multiple-input and multiple-output) antennas. MIMO uses multiple antennas for transmitting and receiving radio signals to improve data throughput and link range. Each antenna transmits the outgoing signal as a toroidal sphere (doughnut shaped), with the coverage extending most in a direction perpendicular to the antenna. Therefore, the antennas should be adjusted to an angle that provides the appropriate coverage for the service area. EXTERNAL ANTENNA The access point supports external antennas for improving the coverage of CONNECTOR the 802.11n signal. The antennas supplied with the unit screw off in a clockwise manner and can be replaced with with alternative antennas that extend or shape the coverage area. – 30 – CHAPTER 1 | Introduction Hardware Description Figure 4: External Antenna Connector Figure 5: Screw-off External Antenna Connector - Close Up – 31 – CHAPTER 1 | Introduction Hardware Description LED INDICATORS The access point includes four status LED indicators, as described in the following figure and table. Figure 6: LEDs 802.11 b/g/n Indicator 802.11 a/n Indicator Ethernet Link/Activity Power Table 2: LED Behavior LED Status Description LAN (802.11a/n 5 GHz) Off The 802.11a/n radio is disabled. Blue There is an 802.11n link. Green There is an 802.11a link. Flashing Indicates activity. Off The 802.11b/g/n radio is disabled. Blue There is an 802.11n link. Green There is an 802.11b/g link. Flashing Indicates activity. Off There is no connection on the LAN port. Blue Indicates a 1000 Mbps link. Green Indicates a 100 Mbps link. Orange Indicates a 10 Mbps link. Flashing Indicates activity. WLAN (802.11b/g/n 2.4GHz) DIAG/FAIL – 32 – CHAPTER 1 | Introduction Hardware Description Table 2: LED Behavior (Continued) LED Status Description POWER Off Indicates that there is no power or the power source has been disconnected. Flashing Green Indicates that the system is rebooting or has started a reset. Green Indicates that power is being supplied and the system is functioning normally. Red Indicates that there has been a system malfunction. CONSOLE PORT This port is used to connect a console device to the access point through a serial cable. The console device can be a PC or workstation running a VT100 terminal emulator, or a VT-100 terminal. A crossover RJ-45 to RS-232 cable is supplied with the unit for connecting to the console port. ETHERNET PORT The access point has one 1000BASE-T RJ-45 port that can be attached directly to 10BASE-T/100BASE-TX/1000BASE-TX LAN segments. This port supports automatic MDI/MDI-X operation, so you can use straight-through cables for all network connections to PCs, switches, or hubs. The access point appears as an Ethernet node and performs a bridging function by moving packets from the wired LAN to remote workstations on the wireless infrastructure. NOTE: The RJ-45 port also supports Power over Ethernet (PoE) based on the IEEE 802.3af standard. Refer to the description for the “Power Connector” for information on supplying power to the access point’s network port from a network device, such as a switch or power injector, that provides Power over Ethernet (PoE). POWER CONNECTOR The access point does not have a power switch. It is powered on when connected to the AC power adapter, and the power adapter is connected to a power source. The power adapter automatically adjusts to any voltage between 100~240 volts at 50 or 60 Hz, and supplies 48 volts DC power to the unit. No voltage range settings are required. The access point may also receive Power over Ethernet (PoE) from a switch or other network device that supplies power over the network cable based on the IEEE 802.3af standard. – 33 – CHAPTER 1 | Introduction Hardware Description NOTE: The access point supports both endspan and midspan PoE. If the access point is connected to a PoE source device and also connected to a local power source through the AC power adapter, AC power will be disabled. RESET BUTTON This button is used to reset the access point or restore the factory default configuration. If you hold down the button for less than 5 seconds, the access point will perform a hardware reset. If you hold down the button for 5 seconds or more, any configuration changes you may have made are removed, and the factory default configuration is restored to the access point. – 34 – 2 NETWORK TOPOLOGIES Wireless networks support a standalone configuration as well as an integrated configuration with 10/100/1000 Mbps Ethernet LANs. The SMCE21011 also provides bridging services that can be configured independently on either the 5 GHz or 2.4 GHz radio interfaces. Access points can be deployed to support wireless clients and connect wired LANs in the following configurations: ◆ Infrastructure for wireless LANs ◆ Infrastructure wireless LAN for roaming wireless PCs ◆ Infrastructure wireless bridge to connect wired LANs INTERFERENCE ISSUES The 802.11b, 802.11g and 802.11n frequency band operating at 2.4 GHz can easily encounter interference from other 2.4 GHz devices, such as other 802.11b/g/n wireless devices, cordless phones and microwave ovens. If you experience poor wireless LAN performance, try the following measures: ◆ Limit any possible sources of radio interference within the service area ◆ Increase the distance between neighboring access points ◆ Decrease the signal strength of neighboring access points ◆ Increase the channel separation of neighboring access points (e.g. up to 3 channels of separation for 802.11b, or up to 4 channels for 802.11a, or up to 5 channels for 802.11g) INFRASTRUCTURE WIRELESS LAN The access point also provides access to a wired LAN for wireless workstations. An integrated wired/wireless LAN is called an Infrastructure configuration. A Basic Service Set (BSS) consists of a group of wireless PC users, and an access point that is directly connected to the wired LAN. Each wireless PC in this BSS can talk to any computer in its wireless group via a radio link, or access other computers or network resources in the wired LAN infrastructure via the access point. – 35 – CHAPTER 2 | Network Topologies Infrastructure Wireless LAN for Roaming Wireless PCs The infrastructure configuration extends the accessibility of wireless PCs to the wired LAN. A wireless infrastructure can be used for access to a central database, or for connection between mobile workers, as shown in the following figure. Figure 7: Infrastructure Wireless LAN Wired LAN Extension to Wireless Clients Server Switch Desktop PC Access Point Notebook PC Desktop PC INFRASTRUCTURE WIRELESS LAN FOR ROAMING WIRELESS PCS The Basic Service Set (BSS) defines the communications domain for each access point and its associated wireless clients. The BSS ID is a 48-bit binary number based on the access point’s wireless MAC address, and is set automatically and transparently as clients associate with the access point. The BSS ID is used in frames sent between the access point and its clients to identify traffic in the service area. The BSS ID is only set by the access point, never by its clients. The clients only need to set the Service Set Identifier (SSID) that identifies the service set provided by one or more access points. The SSID can be manually configured by the clients, can be detected in an access point’s beacon, or can be obtained by querying for the identity of the nearest access point. For clients that do not need to roam, set the SSID for the wireless card to that used by the access point to which you want to connect. A wireless infrastructure can also support roaming for mobile workers. More than one access point can be configured to create an Extended Service Set (ESS). By placing the access points so that a continuous – 36 – CHAPTER 2 | Network Topologies Infrastructure Wireless Bridge coverage area is created, wireless users within this ESS can roam freely. All wireless network cards and adapters and wireless access points within a specific ESS must be configured with the same SSID. Figure 8: Infrastructure Wireless LAN for Roaming Wireless PCs Seamless Roaming Between Access Points Server Desktop PC Switch Switch Access Point Notebook PC Notebook PC Access PointDesktop PC INFRASTRUCTURE WIRELESS BRIDGE The IEEE 802.11 standard defines a Wireless Distribution System (WDS) for bridge connections between BSS areas (access points). The access point uses WDS to forward traffic on links between units. The access point supports WDS bridge links that are independently configurable on each VAP. There are two WDS modes; WDS-AP and WDSSTA. Otherwise, VAPs operate in a normal AP mode. ◆ AP Mode: Provides services to clients as a normal access point. ◆ WDS-AP Mode: Operates as an access point in WDS mode, which accepts connections from client stations in WDS mode. ◆ WDS-STA Mode: Operates as a client station in WDS mode, which connects to an access point in WDS mode. The user needs to specify the MAC address of the access point in WDS mode to which it intends to connect. – 37 – CHAPTER 2 | Network Topologies Infrastructure Wireless Bridge Figure 9: Bridging Mode WDS Links Between Access Points Network Core VAP 2 WDS AP Mode VAP 0 WDS AP Mode VAP 1 WDS AP Mode VAP 0 WDS STA Mode VAP 2 WDS STA Mode VAP 0 WDS STA Mode VAP 1 WDS AP Mode VAP 1 WDS AP Mode VAP 0 WDS STA Mode VAP 1 WDS STA Mode – 38 – 3 INSTALLING THE ACCESS POINT This chapter describes how to install the access point. LOCATION SELECTION Choose a proper place for the access point. In general, the best location is at the center of your wireless coverage area, within line of sight of all wireless devices. Try to place the access point in a position that can best cover its service area. For optimum performance, consider these guidelines: ◆ Mount the access point as high as possible above any obstructions in the coverage area. ◆ Avoid mounting next to or near building support columns or other obstructions that may cause reduced signal or null zones in parts of the coverage area. ◆ Mount away from any signal absorbing or reflecting structures (such as those containing metal). The access point can be mounted on any horizontal surface, or a wall. – 39 – CHAPTER 3 | Installing the access point Mounting on a Horizontal Surface MOUNTING ON A HORIZONTAL SURFACE To keep the access point from sliding on the surface, attach the four rubber feet provided in the accessory kit to the marked circles on the bottom of the access point. Figure 10: Attach Feet – 40 – CHAPTER 3 | Installing the access point Mounting on a Wall MOUNTING ON A WALL To mount on a wall follow the instructions below. Figure 11: Wall Mounting Mounting Slots The access point should be mounted only to a wall or wood surface that is at least 1/2-inch plywood or its equivalent. To mount the access point on a wall, always use its wall-mounting bracket. The access point must be mounted with the RJ-45 cable connector oriented upwards to ensure proper operation. 1. Mark the position of the three screw holes on the wall. For concrete or brick walls, you will need to drill holes and insert wall plugs for the screws. 2. Insert the included screws into the holes, leaving about 2-3 mm clearance from the wall. 3. Line up the three mounting points on the AP with the screws in the wall, then slide the AP down onto the screws until it is in a secured position. – 41 – CHAPTER 3 | Installing the access point Connecting and Powering On CONNECTING AND POWERING ON Connect the power adapter to the access point, and the power cord to an AC power outlet. Otherwise, the access point can derive its operating power directly from the RJ-45 port when connected to a device that provides IEEE 802.3af compliant Power over Ethernet (PoE). CAUTION: Use ONLY the power adapter supplied with this access point. Otherwise, the product may be damaged. NOTE: If the access point is connected to both a PoE source device and an AC power source, AC will be disabled. 1. Observe the Self Test – When you power on the access point, verify that the Power indicator stops flashing and remains on, and that the other indicators start functioning as described under “LED Indicators” on page 32. If the PWR LED does not stop flashing, the self test has not completed correctly. Refer to “Troubleshooting” on page 241. 2. Connect the Ethernet Cable – The access point can be connected to a 10/100/1000 Mbps Ethernet through a network device such as a hub or a switch. Connect your network to the RJ-45 port on the back panel with Category 5E or better UTP Ethernet cable. When the access point and the connected device are powered on, the Ethernet Link LED should light indicating a valid network connection. NOTE: The RJ-45 port on the access point supports automatic MDI/MDI-X operation, so you can use straight-through cables for all network connections to PCs, switches, or hubs. 3. Position the Antennas – Each antenna emits a radiation pattern that is toroidal (doughnut shaped), with the coverage extending most in the direction perpendicular to the antenna. Therefore, the antennas should be oriented so that the radio coverage pattern fills the intended horizontal space. Also, the antennas should both be positioned along the same axes, providing the same coverage area. For example, if the access point is mounted on a horizontal surface, all antennas should be positioned pointing vertically up to provide optimum coverage. 4. Connect the Console Port – Connect the RJ-45 console cable (included with access point) to the RS-232 console port for accessing the command-line interface. You can manage the access point using the console port, the web interface, or SNMP management software. – 42 – 4 INITIAL CONFIGURATION The SMCE21011 offers a user-friendly web-based management interface for the configuration of all the unit’s features. Any PC directly attached to the unit can access the management interface using a web browser, such as Internet Explorer (version 6.0 or above). CONNECTING TO THE LOGIN PAGE It is recommended to make initial configuration changes by connecting a PC directly to the SMCE21011’s LAN port. The SMCE21011 has a default IP address of 192.168.1.1 and a subnet mask of 255.255.255.0. You must set your PC IP address to be on the same subnet as the SMCE21011 (that is, the PC and SMCE21011 addresses must both start 192.168.1.x). To access the access point management interface, follow these steps: 1. Use your web browser to connect to the management interface using the default IP address of 192.168.1.1. 2. Log into the interface by entering the default username “accton” and password also “accton,” then click Login. NOTE: It is strongly recommended to change the default user name and password the first time you access the web interface. For information on changing user names and passwords, See “Administration Settings” on page 52. Figure 12: Login Page – 43 – CHAPTER 4 | Initial Configuration Home Page and Main Menu HOME PAGE AND MAIN MENU After logging in to the web interface, the Home page displays. The Home page shows some basic settings for the AP, including Country Code and the management access password. Figure 13: Home Page The web interface Main Menu menu provides access to all the configuration settings available for the access point. The following items are displayed on this page: ◆ System Name – An alias for the access point, enabling the device to be uniquely identified on the network. (Default: 11n_AP; Range: 1-32 characters) ◆ Username – The name of the user. The default name is “admin.” (Length: 3-16 characters, case sensitive) ◆ Old Password – Type your old password. The default password is “smcdamin.” ◆ New Password – The password for management access. (Length: 316 characters, case sensitive) ◆ Confirm New Password – Enter the password again for verification. ◆ Country Code – This command configures the access point’s country code, which identifies the country of operation and sets the authorized radio channels. – 44 – CHAPTER 4 | Initial Configuration Common Web Page Buttons CAUTION: You must set the country code to the country of operation. Setting the country code restricts operation of the access point to the radio channels and transmit power levels permitted for wireless networks in the specified country. COMMON WEB PAGE BUTTONS The list below describes the common buttons found on most web management pages: ◆ Set – Applies the new parameters and saves them to temporary RAM memory. Also displays a screen to inform you when it has taken affect. Clicking ‘OK’ returns to the home page. The running configuration will not be saved upon a reboot unless you use the “Save Config” button. Figure 14: Set Configuration Changes ◆ Cancel – Cancels the newly entered settings and restores the originals. ◆ Help – Displays the help window. Figure 15: Help Menu – 45 – CHAPTER 4 | Initial Configuration Quick Start ◆ Logout – Ends the web management session. ◆ Save Config – Saves the current configuration so that it is retained after a restart. QUICK START The Quick Start menu is designed to help you configure the basic settings required to get the access point up and running. Click ‘System’, followed by ‘Quick Start’. STEP 1 The first page of the Quick Start configures the system identification, access password, and the Country Code. Figure 16: Quick Start - Step 1 The following items are displayed on the first page of the Quick Start wizard: IDENTIFICATION ◆ System Name — The name assigned to the access point. (Default: 11n_AP) – 46 – CHAPTER 4 | Initial Configuration Quick Start CHANGE PASSWORD ◆ Username — The name of the user, non-configurable. (Default: accton) ◆ Old Password — If the unit has been configured with a password already, enter that password, otherwise enter a null string. ◆ New Password — The password for management access. (Length: 3-16 characters, case sensitive) ◆ Confirm New Password — Enter the password again for verification. COUNTRY CODE ◆ Country Code — Configures the access point’s country code from a drop down menu, which identifies the country of operation and sets the authorized radio channels. CAUTION: You must set the country code to the country of operation. Setting the country code restricts operation of the access point to the radio channels and transmit power levels permitted for wireless networks in the specified country. ◆ Cancel — Cancels the newly entered settings and restores the orignals. ◆ Next — Proceeds to the next page. STEP 2 The Step 2 page of the Quick Start configures IP settings and DHCP client status. Figure 17: Quick Start - Step 2 – 47 – CHAPTER 4 | Initial Configuration Quick Start The following items are displayed on this page: DHCP ◆ DHCP Status — Enables/disables DHCP on the access point. (Default: disabled) ◆ IP Address — Specifies an IP address for management of the access point. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.1.1.) ◆ Subnet Mask — Indicates the local subnet mask. Select the desired mask from the drop down menu. (Default: 255.255.255.0) ◆ Default Gateway — The default gateway is the IP address of the router for the access point, which is used if the requested destination address is not on the local subnet. (Default: 192.168.1.254) If you have management stations, DNS, RADIUS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided. ◆ Primary and Secondary DNS Address — The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. (Primary DNS Default Address: 10.10.1.1; Secondary DNS Default Address: 192.168.1.2) ◆ Prev — Returns to the previous screen. ◆ Cancel — Cancels the newly entered settings and restores the orignals. ◆ Next — Proceeds to the final step in the Quick Start wizard. – 48 – CHAPTER 4 | Initial Configuration Quick Start STEP 3 The Step 3 page of the Quick Start configures radio interface settings. Figure 18: Quick Start - Step 3 The following items are displayed on this page: INTERFACE SETTING ◆ WiFi Mode — Selects mode of operation of the radio chip from 802.11n/g compliant or 802.11n/a compliant. (Default: 11n/g) BASIC SETTING ◆ SSID — Sets the service set identifyer for the primary VAP. (Default: vap_a0) SECURITY ◆ Association Mode — Selects the security mode for association of other access points and wireless devices to the access point. (Default: Open System; Range: Open System, WPA, WPA-PSK, WPA2, WPA2-PSK, WPA-WPA2-mixed, or WPA-WPA2-PSK-mixed) ◆ Encryption Mode — If set to Open System the Encryption Method is ‘None’, or WEP Keys may be enabled – 49 – CHAPTER 4 | Initial Configuration Main Menu Items AUTHENTICATION ◆ 802.1x — Enables 802.1x authentication. (Default: Enabled) ◆ 802.1x Reauthentication Refresh Rate — Sets the reauthentication refresh rate for 802.1x authentication. (Default: 3600 seconds; Range: 1-65535 seconds; 0=disabled) ◆ RADIUS — If configuring a RADIUS server refer to the section “RADIUS Client Commands” on page 170. MAIN MENU ITEMS To configure settings, click the relevant Main Menu item. Each Main Menu item is sumarized below with links to the relevant section in this guide where configuration parameters are described in detail: ◆ System — Configures Management IP, WAN, LAN and QoS settings. See “System Settings” on page 52. ◆ Adminstration — Configures HTTP and Telnet settings. See “Management Settings” on page 65 ◆ Advance — Confiures LLDP and Access Control Lists. See “Advanced Settings” on page 76 ◆ Wireless Settings — Configures Wi-Fi access point settings. See “Wireless Settings” on page 82. ◆ SNMP — Configures SNMP settings. See “SNMP Services” on page 92 ◆ Mantentance — Congifures firmware upgrades remote and locally. See “Maintenance Settings” on page 103 ◆ Information — Displays current system settings. See “Status Information” on page 109. – 50 – SECTION II WEB CONFIGURATION This section provides details on configuring the access point using the web browser interface. This section includes these chapters: ◆ “System Settings” on page 52 ◆ “Management Settings” on page 65 ◆ “Advanced Settings” on page 76 ◆ “Wireless Settings” on page 82 ◆ “SNMP Services” on page 92 ◆ “Maintenance Settings” on page 103 ◆ “Status Information” on page 109 – 51 – 5 SYSTEM SETTINGS This chapter describes basic system settings on the access point. It includes the following sections: ◆ “Administration Settings” on page 52 ◆ “IP Address” on page 54 ◆ “Radius Settings” on page 55 ◆ “System Time” on page 58 ◆ “SpectraLink Voice Priority” on page 60 ◆ “VLAN Configuration” on page 60 ◆ “System Logs” on page 62 ◆ “Quick Start Wizard” on page 64 ADMINISTRATION SETTINGS The access point can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Firefox 2.0 or above). Enter the configured IP address of the access point, or use the default address: http://192.168.1.1 To log into the access point, enter the default user name “accton” and the password “accton”, then click “LOGIN”. When the home page displays, click on Advanced Setup. The following page will display. – 52 – CHAPTER 5 | System Settings Administration Settings Figure 19: Administration The following items are displayed on this page: ◆ System Name — An alias for the access point, enabling the device to be uniquely identified on the network. (Default: SMC; Range: 1-32 characters) ◆ Username — The name of the user. The default name is “admin.” (Length: 3-16 characters, case sensitive) ◆ Old Password — Type your old password. ◆ New Password — The password for management access. (Length: 316 characters, case sensitive) ◆ Confirm New Password — Enter the password again for verification. ◆ Country Code — This command configures the access point’s country code, which identifies the country of operation and sets the authorized radio channels. – 53 – CHAPTER 5 | System Settings IP Address IP ADDRESS Configuring the access point with an IP address expands your ability to manage the access point. A number of access point features depend on IP addressing to operate. You can use the web browser interface to access IP addressing only if the access point already has an IP address that is reachable through your network. By default, the access point will be not be automatically configured with IP settings from a Dynamic Host Configuration Protocol (DHCP) server. The default IP address is 192.168.1.1, subnet mask 255.255.255.0 and a default gateway of 192.168.1.254. You will first be prompted to enter the primary and secondary DNS address for the unit before having access to the other IP parameters. Figure 20: Set DNS Address Figure 21: TCP/IP Settings The following items are displayed on this page: – 54 – CHAPTER 5 | System Settings Radius Settings ◆ DHCP Status — Enables/disables DHCP on the access point. ◆ IP Address — Specifies an IP address for management of the access point. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. (Default: 192.168.1.1.) ◆ Subnet Mask — Indicates the local subnet mask. Select the desired mask from the drop down menu. (Default: 255.255.255.0) ◆ Default Gateway — The default gateway is the IP address of the router for the access point, which is used if the requested destination address is not on the local subnet. If you have management stations, DNS, RADIUS, or other network servers located on another subnet, type the IP address of the default gateway router in the text field provided. ◆ Primary and Secondary DNS Address — The IP address of Domain Name Servers on the network. A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses. If you have one or more DNS servers located on the local network, type the IP addresses in the text fields provided. Make sure to type the correct DNS server address or the following message will display. Figure 22: Invalid DNS After you have network access to the access point, you can use the web browser interface to modify the initial IP configuration, if needed. If there is no DHCP server on your network, or DHCP fails, the access point will automatically start up with a default IP address of 192.168.1.1 RADIUS SETTINGS Remote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a central server to control access to RADIUS-aware devices on the network. An authentication server contains a database of user credentials for each user that requires access to the network. – 55 – CHAPTER 5 | System Settings Radius Settings PRIMARY AND A primary RADIUS server must be specified for the access point to SECONDARY RADIUS implement IEEE 802.1X network access control and Wi-Fi Protected Access SERVER SETUP (WPA) wireless security. A secondary RADIUS server may also be specified as a backup should the primary server fail or become inaccessible. In addition, the configured RADIUS server can also act as a RADIUS Accounting server and receive user-session accounting information from the access point. RADIUS Accounting can be used to provide valuable information on user activity in the network. This guide assumes that you have already configured RADIUS server(s) to support the access point. Configuration of RADIUS server software is beyond the scope of this guide, refer to the documentation provided with the RADIUS server software. – 56 – CHAPTER 5 | System Settings Radius Settings Figure 23: RADIUS Settings The following items are displayed on the RADIUS Settings page: ◆ RADIUS Status — Enables/disables the primary RADIUS server. ◆ IP Address — Specifies the IP address or host name of the RADIUS server. ◆ Port (1024-65535) — The UDP port number used by the RADIUS server for authentication messages. (Range: 1024-65535; Default: 1812) ◆ Key — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Maximum length: 255 characters) – 57 – CHAPTER 5 | System Settings System Time RADIUS ACCOUNTING The following items are displayed on the RADIUS Settings page: ◆ Account Status — Enables/disables RADIUS accounting. ◆ IP Address — Specifies the IP address or host name of the RADIUS accounting server. ◆ Port (1024-65535) — The UDP port number used by the RADIUS accounting server for authentication messages. (Range: 1024-65535; Default: 1812) ◆ Key — A shared text string used to encrypt messages between the access point and the RADIUS accounting server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Maximum length: 255 characters) ◆ Interim Update Timeout (60-86400) — The interval between transmitting accounting updates to the RADIUS server. (Range: 6086400; Default: 3600 seconds) SYSTEM TIME Simple Network Time Protocol (SNTP) allows the access point to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the access point enables the system log to record meaningful dates and times for event entries. If the clock is not set, the access point will only record the time from the factory default set at the last bootup. The access point acts as an SNTP client, periodically sending time synchronization requests to specific time servers. You can configure up to two time server IP addresses. The access point will attempt to poll each server in the configured sequence. – 58 – CHAPTER 5 | System Settings System Time Figure 24: SNTP Settings The following items are displayed on this page: SNTP SERVER Configures the access point to operate as an SNTP client. When enabled, at SETTINGS least one time server IP address must be specified. ◆ SNTP Status — Enables/disables SNTP. (Default: enabled) ◆ Primary Server — The IP address of an SNTP or NTP time server that the access point attempts to poll for a time update. ◆ Secondary Server — The IP address of a secondary SNTP or NTP time server. The access point first attempts to update the time from the primary server; if this fails it attempts an update from the secondary server. TIME ZONE SETTING SNTP uses Greenwich Mean Time, or GMT (sometimes referred to as Coordinated Universal Time, or UTC) based on the time at the Earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours your time zone is located before (east) or after (west) GMT. ◆ Time Zone — Select from the scroll down list the locale you are situated most close to, for example for New York, select ‘(GMT-05) Eastern Time (US & Canada)’. – 59 – CHAPTER 5 | System Settings SpectraLink Voice Priority DAYLIGHT SAVING The access point provides a way to automatically adjust the system clock SETTINGS for Daylight Savings Time changes. To use this feature you must define the month and date to begin and to end the change from standard time. During this period the system clock is set back by one hour. ◆ Daylight Saving Status — Enalbes/disables daylight savings time. (Default: disabled) SPECTRALINK VOICE PRIORITY SpectraLink Voice Priority (SVP) is a voice priority mechanism for WLANs. SVP is an open, straightforward QoS approach that has been adopted by most leading vendors of WLAN APs. SVP favors isochronous voice packets over asynchronous data packets when contending for the wireless medium and when transmitting packets onto the wired LAN. Figure 25: SVP Settings The following items are displayed on this page: ◆ SVP Status — Enables/disables SVP on the access point. VLAN CONFIGURATION VLANs (virtual local area networks) are turned off by default when first installing the access point. If turned on they will automatically tag any packets received by the WAN port before sending them on to the relevant VAP (virtual access point). The access point can employ VLAN tagging support to control access to network resources and increase security. VLANs separate traffic passing between the access point, associated clients, and the wired network. There can be a VLAN assigned to each associated client, a default VLAN for each VAP (Virtual Access Point) interface, and a management VLAN for the access point. Note the following points about the access point’s VLAN support: – 60 – CHAPTER 5 | System Settings VLAN Configuration ◆ The management VLAN is for managing the access point through remote management tools, such as the web interface, SSH, SNMP, or Telnet. The access point only accepts management traffic that is tagged with the specified management VLAN ID. ◆ All wireless clients associated to the access point are assigned to a VLAN. If IEEE 802.1X is being used to authenticate wireless clients, specific VLAN IDs can be configured on the RADIUS server to be assigned to each client. If a client is not assigned to a specific VLAN or if 802.1X is not used, the client is assigned to the default VLAN for the VAP interface with which it is associated. The access point only allows traffic tagged with assigned VLAN IDs or default VLAN IDs to access clients associated on each VAP interface. ◆ When VLAN support is enabled on the access point, traffic passed to the wired network is tagged with the appropriate VLAN ID, either an assigned client VLAN ID, default VLAN ID, or the management VLAN ID. Traffic received from the wired network must also be tagged with one of these known VLAN IDs. Received traffic that has an unknown VLAN ID or no VLAN tag is dropped. ◆ When VLAN support is disabled, the access point does not tag traffic passed to the wired network and ignores the VLAN tags on any received frames. NOTE: Before enabling VLAN tagging on the access point, be sure to configure the attached network switch port to support tagged VLAN frames from the access point’s management VLAN ID, default VLAN IDs, and other client VLAN IDs. Otherwise, connectivity to the access point will be lost when you enable the VLAN feature. Using IEEE 802.1X and a central RADIUS server, up to 64 VLAN IDs can be mapped to specific wireless clients, allowing users to remain within the same VLAN as they move around a campus site. This feature can also be used to control access to network resources from clients, thereby improving security. A VLAN ID (1-4094) can be assigned to a client after successful IEEE 802.1X authentication. The client VLAN IDs must be configured on the RADIUS server for each user authorized to access the network. If a client does not have a configured VLAN ID on the RADIUS server, the access point assigns the client to the configured default VLAN ID for the VAP interface. NOTE: When using IEEE 802.1X to dynamically assign VLAN IDs, the access point must have 802.1X authentication enabled and a RADIUS server configured. Wireless clients must also support 802.1X client software. – 61 – CHAPTER 5 | System Settings System Logs Table 3: RADIUS Attributes Number RADIUS Attribute Value 64 Tunnel-Type VLAN (13) 65 Tunnel-Medium-Type 802 81 Tunnel-Private-Group-ID VLANID (1 to 4094 as hexadecimal or string) VLAN IDs on the RADIUS server can be entered as hexadecimal digits or a string The specific configuration of RADIUS server software is beyond the scope of this guide. Refer to the documentation provided with the RADIUS server software. Figure 26: Setting the VLAN Identity The following items are displayed on this page: ◆ VLAN Classification — Enables/disables VLAN packet tagging. (Default: disabled) ◆ Native VLAN ID(1-4094) — If enabled the packets received by the WAN port must be tagged within the native VLAN ID. (Range: 1-4094) SYSTEM LOGS The access point can be configured to send event and error messages to a System Log Server. The system clock can also be synchronized with a time server, so that all the messages sent to the Syslog server are stamped with the correct time and date. – 62 – CHAPTER 5 | System Settings System Logs Figure 27: System Log Settings The following items are displayed on this page: ◆ syslog status — Enables/disables the logging of error messages. (Default: enabled) ◆ Server 1~4 — Enables the sending of log messages to a Syslog server host. Up to four Syslog servers are supported on the access point. (Default: disabled) ◆ IP — The IP address or name of a Syslog server. (Server 1 Default: 10.7.16.98; Server 2 Default: 10.7.13.48; Server 3 Default: 10.7.123.123; Server 4 Default: 10.7.13.77) ◆ UDP Port — The UDP port used by a Syslog server. (Range: 514 or 11024-65535; Server 1~2 Default: 514; Server 3 Default: 6553; Server 4 Default: 5432) ◆ Logging Console — Enables the logging of error messages to the console. (Default: disabled) ◆ Logging Level — Sets the minimum severity level for event logging. (Default: Debug) ■ The system allows you to limit the messages that are logged by specifying a minimum severity level. The following table lists the error message levels from the most severe (Emergency) to least – 63 – CHAPTER 5 | System Settings Quick Start Wizard severe (Debug). The message levels that are logged include the specified minimum level up to the Emergency level. Table 4: Logging Levels Error Level Description Emergency System unusable Alerts Immediate action needed Critical Critical conditions (e.g., memory allocation, or free memory error - resource exhausted) Error Error conditions (e.g., invalid input, default used) Warning Warning conditions (e.g., return false, unexpected return) Notice Normal but significant condition, such as cold start Informational Informational messages only Debug Debugging messages QUICK START WIZARD The Quick Start menu item is described in the preceding chapter, see “Quick Start” on page 46. – 64 – 6 MANAGEMENT SETTINGS This chapter describes management access settings on the access point. It includes the following sections: ◆ “Remote Management Settings” on page 65 ◆ “Access Limitation” on page 67 ◆ “Simple Network Management Protocol” on page 68 REMOTE MANAGEMENT SETTINGS The Web, Telnet, and SNMP management interfaces are enabled and open to all IP addresses by default. To provide more security for management access to the access point, specific interfaces can be disabled and management restricted to a single IP address or a limited range of IP addresses. Once you specify an IP address or range of addresses, access to management interfaces is restricted to the specified addresses. If anyone tries to access a management interface from an unauthorized address, the access point will reject the connection. Telnet is a remote management tool that can be used to configure the access point from anywhere in the network. However, Telnet is not secure from hostile attacks. The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH protocol uses generated public keys to encrypt all data transfers passing between the access point and SSHenabled management station clients and ensures that data traveling over the network arrives unaltered. Clients can then securely use the local user name and password for access authentication. Note that SSH client software needs to be installed on the management station to access the access point for management via the SSH protocol. Both HTTP and HTTPS service can be enabled independently. If you enable HTTPS, you must indicate this in the URL: https://device:port_number] When you start HTTPS, the connection is established in this way: ◆ The client authenticates the server using the server’s digital certificate. ◆ The client and server negotiate a set of security protocols to use for the connection. – 65 – CHAPTER 6 | Management Settings Remote Management Settings ◆ The client and server generate session keys for encrypting and decrypting data. ◆ The client and server establish a secure encrypted connection. ◆ A padlock icon should appear in the status bar for Internet Explorer 5.x. Figure 28: Remote Management The following items are displayed on Admin Interface page: ◆ Telnet Access — Enables/disables management access from Telnet interfaces. (Default: enabled) ◆ Telnet Access Port — Sets the specified Telnet port for communication. (Default: 23) ◆ SSH Server — Enables/disables management access from SSH Servers. (Default: enabled) ◆ SSH Server Port — Sets the specified SSH Server port for communication. (Default: 22) ◆ HTTP Access — Enables/disables management access from any IP address. (Default: enabled) ◆ HTTP Timeout — Specifies the time after which the HTTP connection will be lost with a period of inactivity. (Default: 1800 seconds; Range: 1-1800 seconds; 0=disabled) – 66 – CHAPTER 6 | Management Settings Access Limitation ◆ HTTP Port — Specifies the HTTP port for IP connectivity. (Default: 80; Range 1024-65535) ◆ HTTPS Server — Enables/disables management access from a HTTPS server. (Default: enabled) ◆ HTTPS Port — Specifies the HTTPS port for secure IP connectivity. (Default: 443; Range 1024-65535) ◆ SNMP Access — Enables/disables management access from SNMP interfaces. (Default: enabled) ACCESS LIMITATION The Access Limitation page limits management access to the access point from specified IP addresses or wireless clients. Figure 29: Access Limitation The following items are displayed on the Access Limitation page: IP MANAGEMENT CONTROL ◆ Any IP — Indicates that any IP address is allowed management access. ◆ Single IP — Specifies a single IP address that is allowed management access. ◆ Multiple IP — Specifies an address range as defined by the entered IP address and subnet mask. For example, IP address 192.168.1.6 and subnet mask 255.255.255.0, defines all IP addresses from 192.168.1.1 to 192.168.1.254. – 67 – CHAPTER 6 | Management Settings Simple Network Management Protocol ◆ IP Address — Specifies the IP address. ◆ Subnet Mask — Specifies the subnet mask in the form 255.255.255.x RESTRICT MANAGEMENT ◆ Enable/Disable — Enables/disables management of the device by a wireless client. (Default: disabled) SIMPLE NETWORK MANAGEMENT PROTOCOL Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a network. Equipment commonly managed with SNMP includes switches, routers and host computers. SNMP is typically used to configure these devices for proper operation in a network environment, as well as to monitor them to evaluate performance or detect potential problems. Managed devices supporting SNMP contain software, which runs locally on the device and is referred to as an agent. A defined set of variables, known as managed objects, is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base (MIB) that provides a standard presentation of the information controlled by the agent. SNMP defines both the format of the MIB specifications and the protocol used to access this information over the network. The access point includes an onboard agent that supports SNMP versions 1, 2c, and 3 clients. This agent continuously monitors the status of the access point, as well as the traffic passing to and from wireless clients. A network management station can access this information using SNMP management software that is compliant with MIB II. To implement SNMP management, the access point must first have an IP address and subnet mask, configured either manually or dynamically. Access to the onboard agent using SNMP v1 and v2c is controlled by community strings. To communicate with the access point, the management station must first submit a valid community string for authentication. Access to the access point using SNMP v3 provides additional security features that cover message integrity, authentication, and encryption; as well as controlling notifications that are sent to specified user targets. SNMP BASIC The access point SNMP agent must be enabled to function (for versions 1, SETTINGS 2c, and 3 clients). Management access using SNMP v1 and v2c also requires community strings to be configured for authentication. Trap notifications can be enabled and sent to up to four management stations. – 68 – CHAPTER 6 | Management Settings Simple Network Management Protocol Figure 30: SNMP Basic Settings The following items are displayed on this page: ◆ SNMP — Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). (Default: Disable) ◆ System Location — A text string that describes the system location. (Maximum length: 255 characters) ◆ System Contact — A text string that describes the system contact. (Maximum length: 255 characters) ◆ Read-Only Community — Defines the SNMP community access string that has read-only access. Authorized management stations are only able to retrieve MIB objects. (Maximum length: 23 characters, case sensitive; Default: public) ◆ Read-Write Community — Defines the SNMP community access string that has read/write access. Authorized management stations are able to both retrieve and modify MIB objects. (Maximum length: 23 characters, case sensitive; Default: private) – 69 – CHAPTER 6 | Management Settings Simple Network Management Protocol SNMP TRAP SETTINGS Traps indicating status changes are issued by the AP to specified trap managers. You must specify trap managers so that key events are reported by the AP to your management station (using network management platforms). Figure 31: SNMP Trap Settings The following items are displayed on this page: ◆ Trap Destination — Specifies the recipient of SNMP notifications. Enter the IP address or the host name. (Host Name: 1 to 63 characters, case sensitive) ◆ Community — The community string sent with the notification operation. (Maximum length: 23 characters, case sensitive; Default: public) ◆ Action — Adds a new SNMP trap destination to the list. ◆ Trap Destination List — Lists the configured SNMP trap destinations. ◆ Trap Configuration — Enables or disables trap status. ■ ■ ◆ sysSystemUp: The access point is up and running. sysSystemDown: The access point is about to shutdown and reboot. save Trap Config — Applies the new parameters and saves them to RAM memory. Also prompts a screen to inform you when it has taken – 70 – CHAPTER 6 | Management Settings Simple Network Management Protocol affect. Clicking ‘OK’ returns to the home page. Changes will not be saved upon a reboot unless the running configuration file is saved. VIEW ACCESS To configure SNMPv3 management access to the AP, follow these steps: CONTROL MODEL 1. Specify read and write access views for the AP MIB tree. 2. Configure SNMP user groups with the required security model (that is, SNMP v1, v2c, or v3) and security level (authentication and privacy). 3. Assign SNMP users to groups, along with their specific authentication and privacy passwords. Figure 32: SNMP VACM CREATING VIEWS SNMPv3 views are used to restrict user access to specified portions of the MIB tree. The are no predefined views by default. The following items are displayed on the VACM page. ◆ View Name – The name of the SNMP view. (Range: 1-32 characters) ◆ Type – Indicates if the object identifier of a branch within the MIB tree is included or excluded from the SNMP view. ◆ OID – Allows you to configure the object identifiers of branches within the MIB tree. Wild cards can be used to mask a specific portion of the OID string. – 71 – CHAPTER 6 | Management Settings Simple Network Management Protocol ◆ Mask (option) – A hexadecimal value with each bit masking the corresponding ID in the MIB subtree. A “1” in the mask indicates an exact match and a “0” indicates a “wild card.” For example, a mask value of 0xFFBF provides a bit mask “1111 1111 1011 1111.” If applied to the subtree “1.3.6.1.2.1.2.2.1.1.23,” the zero corresponds to the 10th subtree ID. When there are more subtree IDs than bits in the mask, the mask is padded with ones. ◆ View List – Shows the currently configured object identifiers of branches within the MIB tree that define the SNMP view. CREATING GROUPS An SNMPv3 group sets the access policy for its assigned users, restricting them to specific read, write, and notify views. You can create new groups to map a set of SNMP users to SNMP views. ◆ Group Name – The name of the SNMP group. (Range: 1-32 characters) ◆ Security Level – The security level used for the group: ■ noAuthNoPriv – There is no authentication or encryption used in SNMP communications. ■ AuthNoPriv – SNMP communications use authentication, but the data is not encrypted. ■ AuthPriv – SNMP communications use both authentication and encryption. ◆ Read View – The configured view for read access. (Range: 1-32 characters) ◆ Write View – The configured view for write access. (Range: 1-32 characters) – 72 – CHAPTER 6 | Management Settings Simple Network Management Protocol SNMPV3 USERS The access point allows up to 10 SNMP v3 users to be configured. Each SNMPv3 user is defined by a unique name. Users must be configured with a specific security level and assigned to a group. The SNMPv3 group restricts users to a specific read, write, or notify view. Figure 33: Configuring SNMPv3 Users The following items are displayed on this page: ◆ User Name — The SNMPv3 user name. (32 characters maximum) ◆ Group — The SNMPv3 group name. ◆ Auth Type — The authentication type used for the SNMP user; either MD5 or none. When MD5 is selected, enter a password in the corresponding Passphrase field. ◆ Auth Passphrase — The authentication password or key associated with the authentication and privacy settings. A minimum of eight plain text characters is required. ◆ Priv Type — The data encryption type used for the SNMP user; either DES or none. When DES is selected, enter a key in the corresponding Passphrase field. ◆ Priv Passphrase — The password or key associated with the authentication and privacy settings. A minimum of eight plain text characters is required. ◆ Action — Click the Add button to add a new user to the list. Click the edit button to change details of an existing user. Click the Del button to remove a user from the list. NOTE: Users must be assigned to groups that have the same security levels. For example, a user who has “Auth Type” and “Priv Type” configured to MD5 and DES respectively (that it, uses both authentication and data encryption) must be assigned to the RWPriv group. If this same user were instead assigned to the read-only (RO) group, the user would not be able to access the database. – 73 – CHAPTER 6 | Management Settings Simple Network Management Protocol SNMPV3 TARGETS An SNMP v3 notification Target ID is specified by the SNMP v3 user, IP address, and UDP port. A user-defined filter can also be assigned to specific targets to limit the notifications received to specific MIB objects. (Note that the filter must first be configured. See “SNMPv3 Notification Filters” on page 74.) To configure a new notification receiver target, define the parameters and select a filter, if required. Note that the SNMP v3 user name must first be defined (See “SNMPv3 Users” on page 73.) Figure 34: SNMPv3 Targets The following items are displayed on this page: ◆ Target ID — A user-defined name that identifies a receiver of notifications. The access point supports up to 10 target IDs. (Maximum length: 32 characters) ◆ IP Address — Specifies the IP address of the receiving management station. ◆ UDP Port — The UDP port that is used on the receiving management station for notification messages. ◆ SNMP User — The defined SNMP v3 user that is to receive notification messages. ◆ Notification Filter — The name of a user-defined notification filter that is applied to the target. SNMPV3 SNMP v3 users can be configured to receive notification messages from the NOTIFICATION FILTERS access point. An SNMP Target ID is created that specifies the SNMP v3 user, IP address, and UDP port. A user-defined notification filter can be created so that specific notifications can be prevented from being sent to particular targets. The access point allows up to 10 notification filters to be created. Each filter can be defined by up to 20 MIB subtree ID entries. – 74 – CHAPTER 6 | Management Settings Simple Network Management Protocol Figure 35: SNMP Notification Filter The following items are displayed on this page: ◆ Filter ID — A user-defined name that identifies the filter. (Maximum length: 32 characters) ◆ Subtree — Specifies MIB subtree to be filtered. The MIB subtree must be defined in the form “.1.3.6.1” and always start with a “.”. ◆ Type — Indicates if the filter is to “include” or “exclude” the MIB subtree objects from the filter. Note that MIB objects included in the filter are not sent to the receiving target and objects excluded are sent. By default all traps are sent, so you can first use an “include” filter entry for all trap objects. Then use “exclude” entries for the required trap objects to send to the target. Note that the filter entries are applied in the sequence that they are defined. ◆ Action — Adds the notification filter. – 75 – 7 ADVANCED SETTINGS This chapter describes advanced settings on the access point. It includes the following sections: ◆ “Local Bridge Filter” on page 76 ◆ “Link Layer Discovery Protocol” on page 77 ◆ “Access Control Lists” on page 78 LOCAL BRIDGE FILTER The access point can employ network traffic frame filtering to control access to network resources and increase security. You can prevent communications between wireless clients and prevent access point management from wireless clients. Also, you can block specific Ethernet traffic from being forwarded by the access point. Inter Client STAs Communication Filter – Sets the global mode for wirelessto-wireless communications between clients associated to Virtual AP (VAP) interfaces on the access point. (Default: Prevent Inter and Intra VAP client Communication) Figure 36: Local Bridge Filter The following items are displayed on this page: ◆ Disabled — All clients can communicate with each other through the access point. – 76 – CHAPTER 7 | Advanced Settings Link Layer Discovery Protocol ◆ Prevent Intra VAP client communication — When enabled, clients associated with a specific VAP interface cannot establish wireless communications with each other. Clients can communicate with clients associated to other VAP interfaces. ◆ Prevent Inter and Intra VAP client communication — When enabled, clients cannot establish wireless communications with any other client, either those associated to the same VAP interface or any other VAP interface. LINK LAYER DISCOVERY PROTOCOL This page allows you to configure the Link Layer Discovery Protocol (LLDP). LLDP allows devices in the local broadcast domain to share information about themselves. LLDP-capable devices periodically transmit information in messages called Type Length Value (TLV) fields to neighbor devices. Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings. This information can be used by SNMP applications to simplify troubleshooting, enhance network management, and maintain an accurate network topology. Figure 37: LLDP Settings The following items are displayed on this page: ◆ Disable/Enable — Disables/Enables LLDP on the access point. – 77 – CHAPTER 7 | Advanced Settings Access Control Lists ◆ Message Transmission Hold Time — Configures the time-to-live (TTL) value sent in LLDP advertisements as shown in the formula below. (Range: 2-10; Default: 4) The time-to-live tells the receiving LLDP agent how long to retain all information pertaining to the sending LLDP agent if it does not transmit updates in a timely manner. TTL in seconds is based on the following rule: (Transmission Interval * Hold time) ? 65536. Therefore, the default TTL is 4*30 = 120 seconds. ◆ Message Transmission Interval (seconds) — Configures the periodic transmit interval for LLDP advertisements. (Range: 5-32768 seconds; Default: 30 seconds) This attribute must comply with the following rule: (Transmission Interval * Hold Time) ? 65536, and Transmission Interval >= (4 * Delay Interval) ◆ ReInitial Delay Time (seconds) — Configures the delay before attempting to re-initialize after LLDP ports are disabled or the link goes down. (Range: 1-10 seconds; Default: 2 seconds) When LLDP is re-initialized on a port, all information in the remote systems LLDP MIB associated with this port is deleted. ◆ Transmission Delay Value (seconds) — Configures a delay between the successive transmission of advertisements initiated by a change in local LLDP MIB variables. (Range: 1-8192 seconds; Default: 4 seconds) The transmit delay is used to prevent a series of successive LLDP transmissions during a short period of rapid changes in local LLDP MIB objects, and to increase the probability that multiple, rather than single changes, are reported in each transmission. This attribute must comply with the rule: (4 * Delay Interval) ? Transmission Interval ACCESS CONTROL LISTS Access Control Lists allow you to configure a list of wireless client MAC addresses that are not authorized to access the network. A database of MAC addresses can be configured locally on the access point. SOURCE ADDRESS The ACL Source Address Settings page enables traffic filtering based on the SETTINGS source MAC address in the data frame. – 78 – CHAPTER 7 | Advanced Settings Access Control Lists Figure 38: Source ACLs The following items are displayed on this page: ◆ SA Status — Enables network traffic with specific source MAC addresses to be filtered (dropped) from the access point. ◆ MAC Address — Specifies a source MAC address to filter, in the form xx.xx.xx.xx.xx.xx, or xx-xx-xx-xx-xx-xx. ◆ Action — Selecting “Add” adds a new MAC address to the filter list, selecting delete removes the specified MAC address. ◆ Number — Specifies the number associated with the MAC address. ◆ MAC Address — Displays the configured source MAC address. DESTINATION The ACL Destination Address Settings page enables traffic filtering based ADDRESS SETTINGS on the destination MAC address in the data frame. Figure 39: Destination ACLs – 79 – CHAPTER 7 | Advanced Settings Access Control Lists The following items are displayed on this page: ◆ DA Status — Enables/disables the destination address to be filtered. ◆ MAC Address — Specifies a destination MAC address to filter, in the form xx.xx.xx.xx.xx.xx. ◆ Action — Selecting “Add” adds a new MAC address to the filter list, selecting delete deletes the specified MAC address. ◆ Number — Specifies the number associated with the MAC address, up to a maximum of eight. ◆ MAC Address — Displays the configured destination MAC address. ◆ Set — Applies the new parameters and saves them to RAM memory. Also prompts a screen to inform you when it has taken affect. Clicking ‘OK’ returns to the home page. Changes will not be saved upon a reboot unless the running configuration file is saved. ◆ Cancel — Cancels the newly entered settings and restores the originals. ◆ Help — Prompts the help window to appear. ETHERNET TYPE The Ethernet Type Filter controls checks on the Ethernet type of all incoming and outgoing Ethernet packets against the protocol filtering table. (Default: Disabled) – 80 – CHAPTER 7 | Advanced Settings Access Control Lists Figure 40: Ethernet Type Filter The following items are displayed on this page: ◆ Disabled — Access point does not filter Ethernet protocol types. ◆ Enabled — Access point filters Ethernet protocol types based on the configuration of protocol types in the filter table. If the status of a protocol is set to “ON,” the protocol is filtered from the access point. ◆ Local Management — Describes the Ethernet filter type. ◆ ISO Designator — Describes the ISO Designator identifyer. ◆ Filter Status — Turns the filter on or off. – 81 – 8 WIRELESS SETTINGS This chapter describes wireless settings on the access point. It includes the following sections: ◆ “Spanning Tree Protocol (STP)” on page 82 ◆ “Authentication” on page 85 ◆ “Radio Settings” on page 89 ◆ “Virtual Access Points (VAPs)” on page 93 ◆ “QoS” on page 99 SPANNING TREE PROTOCOL (STP) The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers. This allows the wireless bridge to interact with other bridging devices (that is, an STP-compliant switch, bridge or router) in your network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down. STP uses a distributed algorithm to select a bridging device (STP-compliant switch, bridge or router) that serves as the root of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device. Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device. All ports connected to designated bridging devices are assigned as designated ports. After determining the lowest cost spanning tree, it enables all root ports and designated ports, and disables all other ports. Network packets are therefore only forwarded between root ports and designated ports, eliminating any possible network loops. Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello BPDU after a predefined interval (Maximum Age), the bridge assumes that the link to the root bridge is down. This bridge will then initiate negotiations with other bridges to reconfigure the network to reestablish a valid network topology. – 82 – CHAPTER 8 | Wireless Settings Spanning Tree Protocol (STP) Figure 41: Spanning Tree Protocol BRIDGE Sets STP bridge link parameters. The following items are displayed on the STP page: ◆ Spanning Tree Protcol — Enables/disables STP on the wireless bridge. (Default: Enabled) ◆ Priority — Used in selecting the root device, root port, and designated port. The device with the highest priority becomes the STP root device. However, if all devices have the same priority, the device with the lowest MAC address will then become the root device. (Note that lower – 83 – CHAPTER 8 | Wireless Settings Spanning Tree Protocol (STP) numeric values indicate higher priority.) (Default:32768; Range: 0-65535) ◆ ◆ ◆ Max Age — The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. (Default: 20 seconds; Range: 6-40 seconds) ■ Minimum: The higher of 6 or [2 x (Hello Time + 1)]. ■ Maximum: The lower of 40 or [2 x (Forward Delay - 1)] Hello Time — Interval (in seconds) at which the root device transmits a configuration message. (Default: 2 seconds; Range: 1-10 seconds) ■ Minimum: 1 ■ Maximum: The lower of 10 or [(Max. Message Age / 2) -1] Forwarding Delay — The maximum time (in seconds) this device waits before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state; otherwise, temporary data loops might result. (Default: 15 seconds; Range: 4-30 seconds) ■ Minimum: The higher of 4 or [(Max. Message Age / 2) + 1] ■ Maximum: 30 ETHERNET INTERFACE Sets STP settings for the Ethernet port. ◆ Link Path Cost — This parameter is used by the STP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. (Path cost takes precedence over port priority.) (Default: Ethernet interface: 19; Wireless interface: 40; Range: 1-65535 ◆ Link Port Priority — Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled. (Default: 128; Range: 0-240, in steps of 16) – 84 – CHAPTER 8 | Wireless Settings Authentication WIRELESS INTERFACE Sets STP settings for the radio interface. ◆ Index — Describes the VAP in question. ◆ Link Path Cost — This parameter is used by the STP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. (Path cost takes precedence over port priority.) (Default: Ethernet interface: 19; Wireless interface: 40; Range: 1-65535 ◆ Link Port Priority — Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree. This makes a port with higher priority less likely to be blocked if the Spanning Tree Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port with lowest numeric identifier will be enabled. (Default: 128; Range: 0-240, in steps of 16) AUTHENTICATION Wireless clients can be authenticated for network access by checking their MAC address against the local database configured on the access point, or by using a database configured on a central RADIUS server. Alternatively, authentication can be implemented using the IEEE 802.1X network access control protocol. The access point can also operate in a 802.1X supplicant mode. This enables the access point itself and any bridge-connected units to be authenticated with a RADIUS server using a configured MD5 user name and password. This mechanism can prevent rogue access points from gaining access to the network. You can configure a list of the MAC addresses for wireless clients that are authorized to access the network. This provides a basic level of authentication for wireless clients attempting to gain access to the network. A database of authorized MAC addresses can be stored locally on the access point or remotely on a central RADIUS server. (Default: Local MAC) LOCAL Local MAC Authentication – Configures the local MAC authentication AUTHENTICATION database. The MAC database provides a mechanism to take certain actions based on a wireless client’s MAC address. The MAC list can be configured to allow or deny network access to specific clients. – 85 – CHAPTER 8 | Wireless Settings Authentication Figure 42: Local Authentication The following items are displayed on Authentication page: MAC Authentication — Selects between, disabled, Local MAC authentication and RADIUS authentication. ◆ Local MAC — The MAC address of the associating station is compared against the local database stored on the access point. The Local MAC Authentication section enables the local database to be set up. ◆ System Default — Specifies a default action for all unknown MAC addresses (that is, those not listed in the local MAC database). ◆ ■ Deny: Blocks access for all MAC addresses except those listed in the local database as “Allow.” ■ Allow: Permits access for all MAC addresses except those listed in the local database as “Deny.” MAC Authentication Settings — Enters specified MAC addresses and permissions into the local MAC database. ■ MAC Address: Physical address of a client. Enter six pairs of hexadecimal digits separated by hyphens; for example, 00-90-D112-AB-89. – 86 – CHAPTER 8 | Wireless Settings Authentication ■ ■ Add/Delete: Adds or deletes the specified MAC address and permission setting into or from the local database. Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is removed from the database. ◆ MAC Authentication Table — Displays current entries in the local MAC database. ◆ make MAC authentication take effect — Applies the specified settings. RADIUS MAC Radius MAC: The MAC address of the associating station is sent to a AUTHENTICATION configured RADIUS server for authentication. When using a RADIUS authentication server for MAC address authentication, the server must first be configured in the RADIUS window. Figure 43: RADIUS Authentication The following items are displayed on Authentication page: MAC Authentication — Selects between, disabled, Local MAC authentication and RADIUS authentication. ◆ RADIUS MAC — The MAC address of the associating station is compared against the RADIUS server database. The RADIUS MAC Authentication section enables the RADIUS database to be set up. ◆ Session Timeout — The time period after which a connected client must be re-authenticated. During the re-authentication process of verifying the client’s credentials on the RADIUS server, the client remains connected the network. Only if re-authentication fails is network access blocked. (Default: 0 means disabled; Range: 30-65535 seconds) – 87 – CHAPTER 8 | Wireless Settings Interface Mode ◆ make MAC authentication take effect — Applies the specified settings. INTERFACE MODE The access point can operate in two modes, IEEE 802.11a/n only, or 802.11g/n only. Also note that 802.11g is backward compatible with 802.11b. Also note that 802.11g is backward compatible with 802.11b, operating in the 2.4 GHz band. The 802.11a/n mode operates in the 5 GHz band. Figure 44: Interface Mode The following items are displayed on the Interface Mode Selection page: ◆ Interface0 Mode — Selects the mode of the radio interface: ■ 11ng: All 802.11g and n clients can communicate with the wireless AP/ Router (up to 300 Mbps) using the 2.4 GHz band, but data transmission rates may be slowed to compensate for 802.11g clients. ■ 11na: All 802.11a and n clients can communicate with the wireless AP/ Router (up to 300 Mbps) using the 5 GHz band, but data transmission rates may be slowed to compensate for 802.11a clients. – 88 – CHAPTER 8 | Wireless Settings Radio Settings RADIO SETTINGS The IEEE 802.11n interfaces include configuration options for radio signal characteristics and wireless security features. The access point can operate in two modes, mixed 802.11g/n, or mixed 802.11a/n only. Also note that 802.11g is backward compatible with 802.11b, and 802.11n is backward compatible with both 802.11b/g and 802.11a at slower data transmit rates. Each radio supports eight virtual access point (VAP) interfaces, referred to as VAP0 ~ VAP7. Each VAP functions as a separate access point, and can be configured with its own Service Set Identification (SSID) and security settings. However, most radio signal parameters apply to both VAP interfaces. The configuration options are nearly identical, and are therefore both covered in this section of the manual. Traffic to specific VAPs can be segregated based on user groups or application traffic. Both VAPs can have up to 64 wireless clients, whereby the clients associate with these VAPs the same as they would with a physical access point. Packets from 802.11n clients are referred to as High Throughput (HT) Greenfield packets, in other words packets that can be transmitted at rates of up to 300 Mbps assuming that HT Channel Bandwidth is set to 20/ 40Mhz, see HT Channel Bandwidth next page. 802.11b/g packets are referred to as non-HT packets, being transmitted at lower throughput rates (see Radio Mode). HT mixed format frames contain a preamble compatible with the non-HT receivers. HT Greenfield frames do not contain a non-HT compatible part. Support for HT Greenfield format is optional. An HT station that does not support the reception of an HT Greenfield format frame must be able to detect that an HT Greenfield format frame is an HT transmission (as opposed to a non-HT transmission). In this case the receiver must decode the high throughput signal (HT-SIG) in the packet header and determine if the HT-SIG cyclic redundancy check (CRC) passes. (Default: Mixed) – 89 – CHAPTER 8 | Wireless Settings Radio Settings Figure 45: Radio Settings The following items are displayed on this page: ◆ High Throughput Mode — The access point provides a channel bandwidth of 20 MHz by default giving an 802.11g connection speed of 54 Mbps and a 802.11n connection speed of up to 108 Mbps, and ensures backward compliance for slower 802.11b devices. Setting the HT Channel Bandwidth to 40 MHz (sometimes referred to as Turbo Mode) increases connection speed for 802.11g and 802.11n to 74 Mbps and 300 Mbps respectively. HT40plus indicates that the secondary channel is above the primary channel. HT40minus indicates that the secondary channel is below the primary channel. (Default: HT20; Range:HT20, HT40PLUS, HT40MINUS) NOTE: Some 802.11n wireless clients may be capable of transmission rates of up to 600 Mbps, however the access point will only be able to connect to them at a maximum transmission rate of 300 Mbps. ◆ Radio Channel — The radio channel that the access point uses to communicate with wireless clients. When multiple access points are deployed in the same area, set the channel on neighboring access points at least five channels apart to avoid interference with each other. For example, you can deploy up to three access points in the same area – 90 – CHAPTER 8 | Wireless Settings Radio Settings using channels 1, 6, 11. Note that wireless clients automatically set the channel to the same as that used by the access point to which it is linked. (The supported channels are dependent on the country code setting.) ◆ Auto Channel Select — Selecting Auto Select enables the access point to automatically select an unoccupied radio channel. ◆ Transmit Power — Adjusts the power of the radio signals transmitted from the access point. The higher the transmission power, the farther the transmission range. Power selection is not just a trade off between coverage area and maximum supported clients. You also have to ensure that high-power signals do not interfere with the operation of other radio devices in the service area. (Default: Minimum; Range: min, 12.5%, 25%, 50%, 100%) ◆ Maximum Association Client per VAP — The maximum number of clients that may associate with each VAP is preset top 64. ◆ Radio Mode — Defines the radio mode for the VAP interface. (Default: 11n (g compatible); Range: 11n (b&g compatible), 11n) NOTE: Enabling the access point to communicate with 802.11b/g clients in both 802.11b/g/n Mixed and 802.11n modes also requires that HT Operation be set to HT20. ◆ Protection Method — Selects between Request to Send (RTS) and mixed RTS-CTS (clear to send) packet transmission threshold. ◆ Preamble Length — The radio preamble (sometimes called a header) is a section of data at the head of a packet that contains information that the wireless device and client devices need when sending and receiving packets. You can set the radio preamble to long or short. A short preamble improves throughput performance, whereas a long preamble is required when legacy wireless devices are part of your network. ◆ Beacon Interval (20-1000) — The rate at which beacon signals are transmitted from the access point. The beacon signals allow wireless clients to maintain contact with the access point. They may also carry power-management information. (Range: 20-1000 TUs; Default: 100 TUs) ◆ Data Beacon Rate (DTIM) (1-255) — The rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissions. Known also as the Delivery Traffic Indication Map (DTIM) interval, it indicates how often the MAC layer forwards broadcast/multicast traffic, which is necessary to wake up stations that are using Power Save mode. The default value of 2 indicates that the access point will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every second beacon. Using smaller DTIM intervals delivers – 91 – CHAPTER 8 | Wireless Settings Radio Settings broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames. (Range: 1-255 beacons; Default: 1 beacon) ◆ RTS Threshold (0-2345) — Sets the packet size threshold at which a Request to Send (RTS) signal must be sent to a receiving station prior to the sending station starting communications. The access point sends RTS frames to a receiving station to negotiate the sending of a data frame. After receiving an RTS frame, the station sends a CTS (clear to send) frame to notify the sending station that it can start sending data. If the RTS threshold is set to 0, the access point always sends RTS signals. If set to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled. The access points contending for the medium may not be aware of each other. The RTS/CTS mechanism can solve this “Hidden Node Problem.” (Range: 0-2345 bytes: Default: 2345 bytes) ◆ Short Guard Interval — The 802.11n draft specifies two guard intervals: 400ns (short) and 800ns (long). Support of the 400ns GI is optional for transmit and receive. The purpose of a guard interval is to introduce immunity to propagation delays, echoes, and reflections to which digital data is normally very sensitive. Enabling the Short Guard Interval sets it to 400ns. (Default: Disabled) ◆ Aggregate MAC Protocol Data Unit (A-MPDU) — Enables / disables the sending of this four frame packet header for statistical purposes. (Default: Enabled) ◆ A-MPDU Length Limit (1024-65535) — Defines the A-MPDU length. (Default: 65535 bytes; Range: 1024-65535 bytes) ◆ Aggregate MAC Service Data Unit (A-MSDU) — Enables / disables the sending of this four frame packet header for statistical purposes. (Default: Enabled) ◆ A-MSDU Length Limit (2290-4096) — Defines the A-MSDU length. (Default: 4096 bytes; Range: 2290-4096 bytes) ◆ Set Radio — Sets all entered parameters. ◆ Cancel — Cancels the newly entered settings and restores the originals. – 92 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) VIRTUAL ACCESS POINTS (VAPS) The access point supports up to eight virtual access point (VAP) interfaces numbered 0 to 7. Each VAP functions as a separate access point, and can be configured with its own Service Set Identification (SSID) and security settings. However, most radio signal parameters apply to all eight VAP interfaces. The VAPs function similar to a VLAN, with each VAP mapped to its own VLAN ID. Traffic to specific VAPs can be segregated based on user groups or application traffic. Each VAP can have up to 64 wireless clients, whereby the clients associate with these VAPs the same as they would with a physical access point. NOTE: The radio channel settings for the access point are limited by local regulations, which determine the number of channels that are available. Refer to “General Specifications” on page C-1 for additional information on the maximum number channels available. Figure 46: VAP Settings The following items are displayed on this page: ◆ VAP Number — The number associated with the VAP, 0-7. ◆ SSID — The name of the basic service set provided by a VAP interface. Clients that want to connect to the network through the access point must set their SSID to the same as that of an access point VAP interface. (Default: SMC_A # (0 to 7); Range: 1-32 characters) ◆ Enable — Enables the specified VAP. (Default: Disabled) ◆ Status — Displays the mode of the VAP. The default is set to "AP," for normal access point services. – 93 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) ◆ Edit Setting — CLicking “Edit” opens the dialogue box for configuring the selected VAP. VAP BASIC SETTINGS Sets the basic operating mode and other settings for the VAP. Each VAP can operate in one of three modes; normal AP mode, WDS-AP bridge root mode, or WDS-STA bridge station mode. The default mode is AP for the VAP to support normal access point services. Note that the Basic Settings are the same for both AP and WDS-AP modes. Figure 47: VAP Basic Settings The following items are displayed on this page: ◆ Closed System — When enabled, the VAP does not include its SSID in beacon messages. Nor does it respond to probe requests from clients that do not include a fixed SSID. (Default: Disable) ◆ Mode — Selects the mode in which the VAP will function. ◆ ■ AP Mode: The VAP provides services to clients as a normal access point. ■ WDS-AP Mode: The VAP operates as an access point in WDS mode, which accepts connections from client stations in WDS-STA mode. ■ WDS-STA Mode: The VAP operates as a client station in WDS mode, which connects to an access point VAP in WDS-AP mode. The user needs to specify the MAC address of the access point in WDSAP mode to which it intends to connect. Association Timeout Interval — The idle time interval (when no frames are sent) after which a client is disassociated from the VAP interface. (Range: 5-60 minutes; Default: 30 minutes) – 94 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) ◆ Authentication Timeout Interval — The time within which the client should finish authentication before authentication times out. (Range: 5-60 minutes; Default: 60 minutes) ◆ Default VLAN ID — The VLAN ID assigned to wireless clients associated to the VAP interface that are not assigned to a specific VLAN by RADIUS server configuration. (Default: 1) ◆ DHCP Relay Server — The IP address of the DHCP relay server. ◆ SSID — The service set identifier for the VAP. WDS-STA MODE Describes additional basic VAP settings when functioning in WDS-STA mode. Figure 48: WDS-STA Mode The following items are displayed in the VAP Basic Settings when WDS-AP mode is selected: ◆ WDS-AP (Parent) SSID — The SSID of the VAP on the connecting access point that is set to WDS-AP mode. ◆ WDS-AP (Parent) MAC — The MAC address of the VAP on the connecting access point that is set to WDS-AP mode. WIRELESS SECURITY Describes the wireless security settings for each VAP, including association SETTINGS mode, encryption, and authentication. NOTE: For VAPs set to WDS-AP or WDS-STA mode, the security options are limited to WPA-PSK and WPA2-PSK only. – 95 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) Figure 49: Configuring VAPs - Common Settings The following items are common to all three modes: ◆ Association Mode — Defines the mode with which the access point will associate with other clients. ■ Open System: The VAP is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection. ■ WPA: WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 wireless networks. ■ WPA-PSK: For enterprise deployment, WPA requires a RADIUS authentication server to be configured on the wired network. However, for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre-shared password for network access. The Pre-Shared Key mode uses a common password for user authentication that is manually entered on the access point and all wireless clients. The PSK mode uses the same TKIP packet encryption and key management as WPA in the enterprise, providing a robust and manageable alternative for small networks. ■ WPA2: WPA2 – WPA was introduced as an interim solution for the vulnerability of WEP pending the ratification of the IEEE 802.11i wireless security standard. In effect, the WPA security features are a subset of the 802.11i standard. WPA2 includes the now ratified 802.11i standard, but also offers backward compatibility with WPA. Therefore, WPA2 includes the same 802.1X and PSK modes of operation and support for TKIP encryption. ■ WPA2-PSK: Clients using WPA2 with a Pre-shared Key are accepted for authentication. – 96 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) ■ ■ ◆ WPA-WPA2 Mixed: Clients using WPA or WPA2 are accepted for authentication. WPA-WPA2-PSK-mixed: Clients using WPA or WPA2 with a Preshared Key are accepted for authentication. Encryption Method — Selects an encryption method for the global key used for multicast and broadcast traffic, which is supported by all wireless clients. ■ WEP: WEP is used as the multicast encryption cipher. You should select WEP only when both WPA and WEP clients are supported. ■ TKIP: TKIP is used as the multicast encryption cipher. ■ AES-CCMP: AES-CCMP is used as the multicast encryption cipher. AES-CCMP is the standard encryption cipher required for WPA2. ◆ 802.1X — The access point supports 802.1X authentication only for clients initiating the 802.1X authentication process (i.e., the access point does not initiate 802.1X authentication). For clients initiating 802.1X, only those successfully authenticated are allowed to access the network. For those clients not initiating 802.1X, access to the network is allowed after successful wireless association with the access point. The 802.1X mode allows access for clients not using WPA or WPA2 security. ◆ Pre-Authentication — When using WPA2 over 802.1X, preauthentication can be enabled, which allows clients to roam to a new access point and be quickly associated without performing full 802.1X authentication. (Default: Disabled) ◆ 802.1x Reauthentication Time — The time period after which a connected client must be re-authenticated. During the reauthentication process of verifying the client’s credentials on the RADIUS server, the client remains connected the network. Only if reauthentication fails is network access blocked. (Range: 0-65535 seconds; Default: 0 means disabled) WIRED EQUIVALENT WEP provides a basic level of security, preventing unauthorized access to PRIVACY (WEP) the network, and encrypting data transmitted between wireless clients and the access point. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. WEP is the security protocol initially specified in the IEEE 802.11 standard for wireless communications. Unfortunately, WEP has been found to be seriously flawed and cannot be recommended for a high level of network security. For more robust wireless security, the access point provides Wi-Fi Protected Access (WPA) for improved data encryption and user authentication. – 97 – CHAPTER 8 | Wireless Settings Virtual Access Points (VAPs) Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network. Note that all clients share the same keys, which are used for user authentication and data encryption. Up to four keys can be specified. These four keys are used for all VAP interfaces on the same radio. Figure 50: WEP Configuration The following items are displayed on this page: ◆ Key Type – Select the preferred method of entering WEP encryption keys on the access point and enter up to four keys: ■ Hexadecimal: Enter keys as 10 hexadecimal digits (0-9 and A-F) for 64 bit keys, 26 hexadecimal digits for 128 bit keys, or 32 hexadecimal digits for 152 bit keys (802.11a radio only). This is the default setting. ■ Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphanumeric characters for 152 bit keys (802.11a radio only). ◆ Key Number – Selects the key number to use for encryption for each VAP interface. If the clients have all four keys configured to the same values, you can change the encryption key to any of the eight settings without having to update the client keys. (Default: Key 1) ◆ Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. (Default: None) – 98 – CHAPTER 8 | Wireless Settings QoS NOTE: Key index and type must match that configured on the clients. In a mixed-mode environment with clients using static WEP keys and WPA, select WEP transmit key index 2, 3, or 4. The access point uses transmit key index 1 for the generation of dynamic keys. QOS Wireless networks offer an equal opportunity for all devices to transmit data from any type of application. Although this is acceptable for most applications, multimedia applications (with audio and video) are particularly sensitive to the delay and throughput variations that result from this “equal opportunity” wireless access method. For multimedia applications to run well over a wireless network, a Quality of Service (QoS) mechanism is required to prioritize traffic types and provide an “enhanced opportunity” wireless access method. The access point implements QoS using the Wi-Fi Multimedia (WMM) standard. Using WMM, the access point is able to prioritize traffic and optimize performance when multiple applications compete for wireless network bandwidth at the same time. WMM employs techniques that are a subset of the developing IEEE 802.11e QoS standard and it enables the access point to inter operate with both WMM- enabled clients and other devices that may lack any WMM functionality. Access Categories — WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags (see “WMM Access Categories” on page 99). The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WMM allows the priority levels to be configured to match any network-wide QoS policy. WMM also specifies a protocol that access points can use to communicate the configured traffic priority levels to QoS-enabled wireless clients. Table 5: WMM Access Categories Number RADIUS Attribute Value AC_VO (AC3) Voice Highest priority, minimum delay. Time-sensitive data such as VoIP (Voice over IP) calls. 7, 6 AC_VI (AC2) Video High priority, minimum delay. Time-sensitive data such as streaming video. 5, 4 AC_BE (AC0) Best Effort Normal priority, medium delay and throughput. Data only affected by long delays. Data from applications or devices that lack QoS capabilities. 0, 3 AC_BK (AC1) Background Lowest priority. Data with no delay or throughput requirements, such as bulk data transfers. – 99 – 2, 1 CHAPTER 8 | Wireless Settings QoS WMM Operation — WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. When the access point forwards traffic, WMM adds data packets to four independent transmit queues, one for each AC, depending on the 802.1D priority tag of the packet. Data packets without a priority tag are always added to the Best Effort AC queue. From the four queues, an internal “virtual” collision resolution mechanism first selects data with the highest priority to be granted a transmit opportunity. Then the same collision resolution mechanism is used externally to determine which device has access to the wireless medium. For each AC queue, the collision resolution mechanism is dependent on two timing parameters: ◆ AIFSN (Arbitration Inter-Frame Space Number), a number used to calculate the minimum time between data frames ◆ CW (Contention Window), a number used to calculate a random backoff time After a collision detection, a backoff wait time is calculated. The total wait time is the sum of a minimum wait time (Arbitration Inter-Frame Space, or AIFS) determined from the AIFSN, and a random backoff time calculated from a value selected from zero to the CW. The CW value varies within a configurable range. It starts at CWMin and doubles after every collision up to a maximum value, CWMax. After a successful transmission, the CW value is reset to its CWMin value. Figure 51: WMM Backoff Wait Times Time CWMin High Priority CWMax AIFS Random Backoff Minimum Wait Time Random Wait Time CWMin Low Priority CWMax AIFS Random Backoff Minimum Wait Time Random Wait Time For high-priority traffic, the AIFSN and CW values are smaller. The smaller values equate to less backoff and wait time, and therefore more transmit opportunities. – 100 – CHAPTER 8 | Wireless Settings QoS Figure 52: QoS The following items are displayed on this page: ◆ WMM — Sets the WMM operational mode on the access point. When enabled, the parameters for each AC queue will be employed on the access point and QoS capabilities are advertised to WMM-enabled clients. (Default: Support) ■ ■ ◆ Disable: WMM is disabled. Required: WMM must be supported on any device trying to associated with the access point. Devices that do not support this feature will not be allowed to associate with the access point. WMM Acknowledge Policy — By default, all wireless data transmissions require the sender to wait for an acknowledgement from the receiver. WMM allows the acknowledgement wait time to be turned off for each Access Category (AC) 0-3. Although this increases data throughput, it can also result in a high number of errors when traffic levels are heavy. (Default: Acknowledge) ■ Aknowledge — Applies the WMM policy. ■ No Aknowledge — Ignores the WMM policy. – 101 – CHAPTER 8 | Wireless Settings QoS ◆ WMM BSS Parameters — These parameters apply to the wireless clients. ◆ WMM AP Parameters — These parameters apply to the access point. ■ ■ ◆ logCWMin (Minimum Contention Window): The initial upper limit of the random backoff wait time before wireless medium access can be attempted. The initial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 microseconds. Note that the CWMin value must be equal or less than the CWMax value. logCWMax (Maximum Contention Window): The maximum upper limit of the random backoff wait time before wireless medium access can be attempted. The contention window is doubled after each detected collision up to the CWMax value. Specify the CWMax value in the range 0-15 microseconds. Note that the CWMax value must be greater or equal to the CWMin value. ■ AIFSN (Arbitration Inter-Frame Space): The minimum amount of wait time before the next data transmission attempt. Specify the AIFS value in the range 0-15 microseconds. ■ TXOP Limit (Transmit Opportunity Limit): The maximum time an AC transmit queue has access to the wireless medium. When an AC queue is granted a transmit opportunity, it can transmit data for a time up to the TxOpLimit. This data bursting greatly improves the efficiency for high data-rate traffic. Specify a value in the range 065535 microseconds. ■ Admission Control: The admission control mode for the access category. When enabled, clients are blocked from using the access category. (Default: Disabled) Set WMM — Applies the new parameters and saves them to RAM memory. Also prompts a screen to inform you when it has taken affect. Clicking ‘OK’ returns to the home page. Changes will not be saved upon a reboot unless the running configuration file is saved. – 102 – 9 MAINTENANCE SETTINGS Maintenance settings includes the following sections: ◆ “Upgrading Firmware” on page 103 ◆ “Running Configuration” on page 106 ◆ “Resetting the Access Point” on page 107 UPGRADING FIRMWARE You can upgrade new access point software from a local file on the management workstation, or from an FTP or TFTP server. New software may be provided periodically from your distributor. After upgrading new software, you must reboot the access point to implement the new code. Until a reboot occurs, the access point will continue to run the software it was using before the upgrade started. Also note that new software that is incompatible with the current configuration automatically restores the access point to the factory default settings when first activated after a reboot. – 103 – CHAPTER 9 | Maintenance Settings Upgrading Firmware Figure 53: Firmware The following items are displayed on this page: ◆ Firmware Version — Displays what version of software is being used as a runtime image - “Active”, and what version is a backup image “Backup”. You may specify up to two images. ◆ Next Boot Image — Specifies what version of firmware will be used as a runtime image upon bootup. ◆ Set Next Boot — Applies the runtime image setting. ◆ Local — Downloads an operation code image file from the web management station to the access point using HTTP. Use the Browse button to locate the image file locally on the management station and click Start Upgrade to proceed. ■ New Firmware File: Specifies the name of the code file on the server. The new firmware file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and – 104 – CHAPTER 9 | Maintenance Settings Upgrading Firmware the maximum length for file names is 32 characters for files on the access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”) ◆ Remote — Downloads an operation code image file from a specified remote FTP or TFTP server. After filling in the following fields, click Start Upgrade to proceed. ■ ◆ New Firmware File: Specifies the name of the code file on the server. The new firmware file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 characters or 32 characters for files on the access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”) ■ IP Address: IP address or host name of FTP or TFTP server. ■ Username: The user ID used for login on an FTP server. ■ Password: The password used for login on an FTP server. Start Upgrade — Commences the upgrade process. – 105 – CHAPTER 9 | Maintenance Settings Running Configuration RUNNING CONFIGURATION A copy of a previous running configuration may be uploaded to the access point as a saved file from a remote location, or the current configuration saved and stored for restoration purposes at a later point. A configuration file may be saved or downloaded to/from a specified remote FTP or TFTP server. Figure 54: Running Configuration File The following items are displayed on this page: ◆ File Backup/Restore — Downloads an operation code image file from a specified remote FTP or TFTP server. After filling in the following fields, click Start Export/Import to proceed. ◆ Export/Import — Select Export to upload a file to an FTP/TFTP server. Select Import to download a file from an FTP/TFTP server. ◆ Config file — Specifies the name of the configuration file, which must always be "syscfg." A path on the server can be specified using “/” in the name, providing the path already exists; for example, “myfolder/ syscfg.” Other than to indicate a path, the file name must not contain any slashes (\ or /), the leading letter cannot be a period (.), and the – 106 – CHAPTER 9 | Maintenance Settings Resetting the Access Point maximum length for file names on the FTP/TFTP server is 255 characters. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”) ◆ IP Address — IP address or host name of FTP or TFTP server. ◆ Username — The user ID used for login on an FTP server. ◆ Password — The password used for login on an FTP server. ◆ Start Import/Export — Initiates the selected backup or restore. ◆ Restore Factory Setting — Click the Restore button to reset the configuration settings for the access point to the factory defaults and reboot the system. Note that all user configured information will be lost. You will have to re-enter the default user name (admin) to re-gain management access to this device. ◆ Running Config To Startup Config — Clicking “Save” to save the running configuration to the startup file. RESETTING THE ACCESS POINT The Reset page allows you to reset the access point and save the running configuration before the reboot. Figure 55: Resetting the Access Point The following items are displayed on this page: ◆ Save Runtime config before Reboot — Checking this option saves the current running configuration to the startup file. ◆ Reboot — Click the “Reboot” button to reset the configuration settings for the access point and reboot the system. Note that all unsaved user configured information will be lost. You will have to re-enter the default user name (admin) to re-gain management access to this device. NOTE: If you have upgraded system software, then you must reboot the access point to implement the new operation code. New software that is incompatible with the current configuration automatically restores the access point to default values when first activated after a reboot. – 107 – CHAPTER 9 | Maintenance Settings Resetting the Access Point – 108 – 10 STATUS INFORMATION The Information menu displays information on the current system configuration, the wireless interface, the station status and system logs. Status Information includes the following sections: ◆ “AP Status” on page 109 ◆ “Station Status” on page 112 ◆ “System Logs” on page 112 AP STATUS The AP Status window displays basic system configuration settings, as well as the settings for the wireless interface. AP SYSTEM The AP System Configuration table displays the basic system configuration CONFIGURATION settings – 109 – CHAPTER 10 | Status Information AP Status Figure 56: AP System Configuration The following items are displayed on this page: ◆ Serial Number — The serial number of the physical access point. ◆ System Up Time — Length of time the management agent has been up. ◆ Ethernet MAC Address — The physical layer address for the Ethernet port. ◆ Radio 0 MAC Address — The physical layer address for the VAP 0 interface. ◆ System Name — Name assigned to this system. ◆ System Contact — Administrator responsible for the system. ◆ IP Address — IP address of the management interface for this device. ◆ IP Default Gateway — IP address of the gateway router between this device and management stations that exist on other network segments. ◆ HTTP Server Status — Shows if management access via HTTP is enabled. ◆ HTTP Port — Shows the TCP port used by the HTTP interface. – 110 – CHAPTER 10 | Status Information AP Status ◆ HTTPS Server Status — Shows if management access via HTTPS is enabled. ◆ HTTPS Port — Shows the TCP port used by the HTTPS interface. ◆ Software Version — Shows the software version number. ◆ Bootrom Version — Show the bootrom version number. ◆ Hardware Version — Shows the hardware version number. AP WIRELESS The AP Wireless Configuration displays the VAP interface settings. CONFIGURATION Figure 57: AP Wireless Configuration The following items are displayed on this page: ◆ VAP — Displays the VAP number. ◆ SSID — The service set identifier for the VAP interface. ◆ Association Mode — Shows the basic security mode configured for the VAP. ◆ 802.1X — Shows if IEEE 802.1X access control for wireless clients is enabled. – 111 – CHAPTER 10 | Status Information Station Status STATION STATUS The Station Status window shows the wireless clients currently associated with the access point. Figure 58: Station Status The following items are displayed on this page: ◆ Station Address — The MAC address of the wireless client. ◆ VLAN ID — Displays the VLAN to which the wireless client has been assigned. SYSTEM LOGS The Event Logs window shows the log messages generated by the access point and stored in memory. Figure 59: System Logs The following items are displayed on this page: ◆ Display Event Log — Chooses the logging level to display. ◆ Log Time — The time the log message was generated. ◆ Event Level — The logging level associated with this message. ◆ Event Message — The content of the log message. – 112 – CHAPTER 10 | Status Information System Logs – 113 – SECTION III COMMAND LINE INTERFACE This section provides a detailed description of the Command Line Interface, along with examples for all of the commands. This section includes these chapters: ◆ “Using the Command Line Interface” on page 116 ◆ “General Commands” on page 122 ◆ “System Management Commands” on page 127 ◆ “System Logging Commands” on page 143 ◆ “System Clock Commands” on page 148 ◆ “DHCP Relay Commands” on page 152 ◆ “SNMP Commands” on page 154 ◆ “Flash/File Commands” on page 167 ◆ “RADIUS Client Commands” on page 170 ◆ “802.1X Authentication Commands” on page 175 ◆ “MAC Address Authentication Commands” on page 177 ◆ “Filtering Commands” on page 181 ◆ “WDS Bridge Commands” on page 193 ◆ “Spanning Tree Commands” on page 186 ◆ “Ethernet Interface Commands” on page 195 ◆ “Wireless Interface Commands” on page 201 ◆ “Rogue AP Detection Commands” on page 231 ◆ “Wireless Security Commands” on page 218 – 114 – SECTION | Command Line Interface ◆ “Link Layer Discovery Commands” on page 228 ◆ “IAPP Commands” on page 251 ◆ “VLAN Commands” on page 232 ◆ “WMM Commands” on page 235 – 115 – 11 USING THE COMMAND LINE INTERFACE When accessing the management interface for the over a direct connection to the console port, or via a Telnet connection, the access point can be managed by entering command keywords and parameters at the prompt. Using the access point’s command-line interface (CLI) is very similar to entering commands on a UNIX system. CONSOLE CONNECTION To access the access point through the console port, perform these steps: At the console prompt, enter the user name and password. (The default user name is “admin” and the default password is “smcadmin”) When the user name is entered, the CLI displays the “Enterprise AP#” prompt. Enter the necessary commands to complete your desired tasks. When finished, exit the session with the “exit” command. After connecting to the system through the console port, the login screen displays EXAMPLE (none) login: accton Password: 1 03:47:41 login[2222]: root login on `ttyS0' Accton# NOTE: Command examples shown later in this chapter abbreviate the console prompt to “AP” for simplicity. – 116 – CHAPTER 11 | Using the Command Line Interface Telnet Connection TELNET CONNECTION Telnet operates over the IP transport protocol. In this environment, your management station and any network device you want to manage over the network must have a valid IP address. Valid IP addresses consist of four numbers, 0 to 255, separated by periods. Each address consists of a network portion and host portion. For example, if the access point cannot acquire an IP address from a DHCP server, the default IP address used by the access point, 192.168.1.1, consists of a network portion (192.168.1) and a host portion (1). To access the access point through a Telnet session, you must first set the IP address for the access point, and set the default gateway if you are managing the access point from a different IP subnet. For example: AP#configure AP(config)#interface ethernet AP(if-ethernet)#ip address 10.1.0.1 255.255.255.0 10.1.0.254 AP(if-ethernet)# If your corporate network is connected to another network outside your office or to the Internet, you need to apply for a registered IP address. However, if you are attached to an isolated network, then you can use any IP address that matches the network segment to which you are attached. After you configure the access point with an IP address, you can open a Telnet session by performing these steps. 1. From the remote host, enter the Telnet command and the IP address of the device you want to access. 2. At the prompt, enter the user name and system password. The CLI will display the “Enterprise AP#” prompt to show that you are using executive access mode (i.e., Exec). 3. Enter the necessary commands to complete your desired tasks. 4. When finished, exit the session with the “quit” or “exit” command. After entering the Telnet command, the login screen displays: Username: admin Password: Enterprise AP# NOTE: You can open up to four sessions to the device via Telnet. – 117 – CHAPTER 11 | Using the Command Line Interface Entering Commands ENTERING COMMANDS This section describes how to enter CLI commands. KEYWORDS AND A CLI command is a series of keywords and arguments. Keywords identify ARGUMENTS a command, and arguments specify configuration parameters. For example, in the command “show interfaces ethernet,” show and interfaces are keywords, and ethernet is an argument that specifies the interface type. You can enter commands as follows: ◆ To enter a simple command, enter the command keyword. ◆ To enter commands that require parameters, enter the required parameters after the command keyword. For example, to set a password for the administrator, enter: Enterprise AP(config)#username smith MINIMUM The CLI will accept a minimum number of characters that uniquely identify ABBREVIATION a command. For example, the command “configure” can be entered as con. If an entry is ambiguous, the system will prompt for further input. COMMAND If you terminate input with a Tab key, the CLI will print the remaining COMPLETION characters of a partial keyword up to the point of ambiguity. In the “configure” example, typing con followed by a tab will result in printing the command up to “configure.” GETTING HELP ON You can display a brief description of the help system by entering the help COMMANDS command. You can also display command syntax by following a command with the “?” character to list keywords or parameters. SHOWING COMMANDS If you enter a “?” at the command prompt, the system will display the first level of keywords for the current configuration mode (Exec, Global Configuration, or Interface). You can also display a list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands: AP: show ? APmanagement authentication bridge config event-log dual-image Show Show Show Show Show Show management AP information. Authentication parameters. bridge. current configuration. event log on console. dual images version. – 118 – CHAPTER 11 | Using the Command Line Interface Entering Commands filters interface line lldp logging radius snmp sntp station svp system version wds AP: show Show filters. Show interface information. TTY line information. Show lldp parameters. Show the logging buffers. Show radius server. Show snmp configuration. Show sntp configuration. Show 802.11 station table. Show SVP. Show system information. Show system version. Show WDS service. The command “show interface ?” will display the following information: AP# show interface ? ethernet Show Ethernet interface wireless Show Wireless interface AP# show interface NOTE: Partial keyword lookup does not work with the show command. NEGATING THE EFFECT For many configuration commands you can enter the prefix keyword “no” OF COMMANDS to cancel the effect of a command or reset the configuration to the default value. For example, the logging command will log system messages to a host server. To disable logging, specify the no logging command. This guide describes the negation effect for all applicable commands. USING COMMAND The CLI maintains a history of commands that have been entered. You can HISTORY scroll back through the history of commands by pressing the up arrow key. Any command displayed in the history list can be executed again, or first modified and then executed. Using the show history command displays a longer list of recently executed commands. UNDERSTANDING The command set is divided into Exec and Configuration classes. Exec COMMAND MODES commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain functions. These classes are further divided into different modes. Available commands depend on the selected mode. You can always enter a question mark “?” at the prompt to display a – 119 – CHAPTER 11 | Using the Command Line Interface Entering Commands list of the commands available for the current mode. The command classes and associated modes are displayed in the following table: Table 6: Command Modes Class Mode Exec Privileged Configuration Global Interface-ethernet Interface-wireless Interface-wireless-vap EXEC COMMANDS When you open a new console session on an access point, the system enters Exec command mode. Only a limited number of the commands are available in this mode. You can access all other commands only from the configuration mode. To access Exec mode, open a new console session with the user name “admin.” The command prompt displays as “Enterprise AP#” for Exec mode. Username: admin Password: [system login password] AP# CONFIGURATION Configuration commands are used to modify access point settings. These COMMANDS commands modify the running configuration and are saved in memory. The configuration commands are organized into four different modes: ◆ Global Configuration (GC) - These commands modify the system level configuration, and include commands such as username and password. ◆ Interface-Ethernet Configuration (IC-E) - These commands modify the Ethernet port configuration, and include command such as dns and ip. ◆ Interface-Wireless Configuration (IC-W) - These commands modify the wireless port configuration of global parameters for the radio, and include commands such as channel and transmit-power. ◆ Interface-Wireless Virtual Access Point Configuration (IC-W-VAP) These commands modify the wireless port configuration for each VAP, and include commands such as ssid and authentication. To enter the Global Configuration mode, enter the command configure in Exec mode. The system prompt will change to “Enterprise AP(config)#” which gives you access privilege to all Global Configuration commands. AP#configure AP(config)# – 120 – CHAPTER 11 | Using the Command Line Interface Entering Commands To enter Interface mode, you must enter the “interface ethernet” while in Global Configuration mode. The system prompt will change to “AP(if-ethernet)#,” or “AP(if-wireless)” indicating that you have access privileges to the associated commands. You can use the end command to return to the Exec mode. AP(config)#interface ethernet AP(if-ethernet)# COMMAND LINE Commands are not case sensitive. You can abbreviate commands and PROCESSING parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?” character to display a list of possible matches. You can also use the following editing keystrokes for command-line processing: Table 7: Keystroke Commands Keystroke Function Ctrl-A Shifts cursor to start of command line. Ctrl-B Shifts cursor to the left one character. Ctrl-C Terminates a task and displays the command prompt. Ctrl-E Shifts cursor to end of command line. Ctrl-F Shifts cursor to the right one character. Ctrl-K Deletes from cursor to the end of the command line. Ctrl-L Repeats current command line on a new line. Ctrl-N Enters the next command line in the history buffer. Ctrl-P Shows the last command. Ctrl-R Repeats current command line on a new line. Ctrl-U Deletes the entire line. Ctrl-W Deletes the last word typed. Esc-B Moves the cursor backward one word. Esc-D Deletes from the cursor to the end of the word. Esc-F Moves the cursor forward one word. Delete key or backspace key Erases a mistake when entering a command. – 121 – 12 GENERAL COMMANDS This chapter details general commands that apply to the CLI. Table 8: General Commands Command Function Mode Page configure Activates global configuration mode Exec 122 end Returns to previous configuration mode GC, IC 123 exit Returns to the previous configuration mode, or exits the CLI any 123 cli-session-timeout Enables, disbles or sets a timeout for the CLI or Telnet session. Exec 123 ping Sends ICMP echo request packets to another node on the network Exec 124 reset Restarts the system Exec 125 show history Shows the command history buffer Exec 125 show line Shows the configuration settings for the console port Exec 126 configure This command activates Global Configuration mode. You must enter this mode to modify most of the settings on the access point. You must also enter Global Configuration mode prior to enabling the context modes for Interface Configuration. See “Using the Command Line Interface” on page 1. DEFAULT SETTING None COMMAND MODE Exec EXAMPLE AP#configure AP(config)# RELATED COMMANDS end (123) – 122 – CHAPTER 12 | General Commands end This command returns to the previous configuration mode. DEFAULT SETTING None COMMAND MODE Global Configuration, Interface Configuration EXAMPLE This example shows how to return to the Configuration mode from the Interface Configuration mode: AP(if-ethernet)#end AP(config)# exit This command returns to the Exec mode or exits the configuration program. DEFAULT SETTING None COMMAND MODE Any EXAMPLE This example shows how to return to the Exec mode from the Interface Configuration mode, and then quit the CLI session: AP(if-ethernet)#exit AP#exit CLI session with the Access Point is now closed Username: cli-session-timeout This command enables a timeout on the current and subsequent CLI or Telnet sessions. SYNTAX cli-session-timeout enable - Enables the default timeout. disable - Disables the timeout. value - Sets a value for timeout (Range: 60~3600 seconds) DEFAULT SETTING 120 seconds – 123 – CHAPTER 12 | General Commands COMMAND MODE Exec EXAMPLE The following example disables the CLI/Telnet timeout. AP(config)# cli-session-timeout disable AP(config)# ping This command sends ICMP echo request packets to another node on the network. SYNTAX ping host_name - Alias of the host. ip_address - IP address of the host. DEFAULT SETTING None COMMAND MODE Exec COMMAND USAGE ◆ Use the ping command to see if another site on the network can be reached. ◆ The following are some results of the ping command: ■ Normal response - The normal response occurs in one to ten seconds, depending on network traffic. ■ Destination does not respond - If the host does not respond, a “timeout” appears in ten seconds. ■ Destination unreachable - The gateway for this destination indicates that the destination is unreachable. ■ Network or host unreachable - The gateway found no corresponding entry in the route table. ■ Press to stop pinging. EXAMPLE AP#ping 10.1.0.19 192.168.1.19 is alive AP# – 124 – CHAPTER 12 | General Commands reset This command restarts the system or restores the factory default settings. SYNTAX reset board - Reboots the system. configuration - Resets the configuration settings to the factory defaults, and then reboots the system. DEFAULT SETTING None COMMAND MODE Exec COMMAND USAGE When the system is restarted, it will always run the Power-On Self-Test. EXAMPLE This example shows how to reset the system: AP#reset board Reboot system now? : y show history This command shows the contents of the command history buffer. DEFAULT SETTING None COMMAND MODE Exec COMMAND USAGE The history buffer size is fixed at 10 commands. Use the up or down arrow keys to scroll through the commands in the history buffer. EXAMPLE In this example, the show history command lists the contents of the command history buffer: AP#show history config exit show history AP# – 125 – CHAPTER 12 | General Commands show line This command displays the console port’s configuration settings. COMMAND MODE Exec EXAMPLE The console port settings are fixed at the values shown below. AP#show line Console Line Information ====================================================== databits : 8 parity : none speed : 9600 stop bits : 1 ====================================================== AP# – 126 – 13 SYSTEM MANAGEMENT COMMANDS SYSTEM MANAGEMENT COMMANDS These commands are used to configure the user name, password, system logs, browser management options, clock settings, and a variety of other system information. Table 9: System Management Commands Command Function Mode Page Sets the access point country code Exec 128 prompt Customizes the command line prompt GC 129 system name Specifies the host name for the access point GC 130 username Configures the user name for management access GC 130 password Specifies the password for management access GC 131 ip ssh-server enable Enables the Secure Shell server IC-E 131 ip ssh-server port Sets the Secure Shell port IC-E 132 ip telnet-server enable Enables the Telnet server IC-E 132 APmgmtIP Specifies an IP address or range of addresses allowed access to the management interface GC 135 APmgmtUI Enables or disables SNMP, Telnet or web management access GC 136 show APmanagement Shows the AP management configuration Exec 137 ip http port Specifies the port to be used by the web browser interface GC 133 ip http server Allows the access point to be monitored or configured from a browser GC 133 ip https port Specifies the UDP port number used for a secure GC HTTP connection to the access point’s Web interface 134 ip https server Enables the secure HTTP server on the access point 134 Country Setting country Device Designation Management Access Web Server GC System Status show system Displays system information Exec 137 show version Displays version information for the system Exec 138 – 127 – CHAPTER 13 | System Management Commands System Management Commands Table 9: System Management Commands (Continued) Command Function Mode Page show config Displays detailed configuration information for the system Exec 138 show hardware Displays the access point’s hardware version Exec 142 country This command configures the access point’s country code, which identifies the country of operation and sets the authorized radio channels. SYNTAX country country_code - A two character code that identifies the country of operation. See the following table for a full list of codes. Table 10: Country Codes Country Code Country Code Country Code Country Code Albania AL Dominican Republic DO Kuwait KW Romania RO Algeria DZ Ecuador EC Latvia LV Russia RU Argentina AR Egypt EG Lebanon LB Saudi Arabia SA Armenia AM Estonia EE Liechtenstein LI Singapore SG Australia AU Finland FI Lithuania LT Slovak Republic SK Austria AT France FR Macao MO Spain ES Azerbaijan AZ Georgia GE Macedonia MK Sweden SE Bahrain BH Germany DE Malaysia MY Switzerland CH Belarus BY Greece GR Malta MT Syria SY Belgium BE Guatemala GT Mexico MX Taiwan TW Honduras HN Monaco MC Thailand TH Belize BZ Hong Kong HK Morocco MA Trinidad & Tobago TT Bolivia BO Hungary HU Netherlands NL Tunisia TN Brazil BR Iceland IS New Zealand NZ Turkey TR Brunei Darussalam BN India IN Norway NO Ukraine UA Bulgaria BG Indonesia ID Qatar QA United Arab Emirates AE Canada CA Iran IR Oman OM United Kingdom GB Chile CL Ireland IE Pakistan PK United States US China CN Israel IL Panama PA Uruguay UY Colombia CO Italy IT Peru PE Uzbekistan UZ Costa Rica CR Japan JP Philippines PH Yemen YE – 128 – CHAPTER 13 | System Management Commands System Management Commands Table 10: Country Codes (Continued) Country Code Country Code Country Code Country Code Croatia HR Jordan JO Poland PL Venezuela VE Cyprus CY Kazakhstan KZ Portugal PT Vietnam VN Czech Republic CZ North Korea KP Puerto Rico PR Zimbabwe ZW Denmark DK Korea Republic KR Slovenia SI Elsalvador SV Luxembourg LU South Africa ZA DEFAULT SETTING US - for units sold in the United States 99 (no country set) - for units sold in other countries COMMAND MODE Exec COMMAND USAGE ◆ If you purchased an access point outside of the United States, the country code must be set before radio functions are enabled. ◆ The available Country Code settings can be displayed by using the country ? command. EXAMPLE AP#country tw AP# prompt This command customizes the CLI prompt. Use the no form to restore the default prompt. SYNTAX prompt no prompt string - Any alphanumeric string to use for the CLI prompt. (Maximum length: 32 characters) – 129 – CHAPTER 13 | System Management Commands System Management Commands DEFAULT SETTING Enterprise AP COMMAND MODE Global Configuration EXAMPLE AP(config)#prompt RD2 RD2(config)# system name This command specifies or modifies the system name for this device. Use the no form to restore the default system name. SYNTAX system name no system name name - The name of this host. (Maximum length: 32 characters) DEFAULT SETTING Enterprise AP COMMAND MODE Global Configuration EXAMPLE AP(config)#system name AP AP(config)# username This command configures the user name for management access. SYNTAX username name - The name of the user. (Length: 3-16 characters, case sensitive) – 130 – CHAPTER 13 | System Management Commands System Management Commands DEFAULT SETTING admin COMMAND MODE Global Configuration EXAMPLE AP(config)#username bob AP(config)# password After initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the no form to reset the default password. SYNTAX password no password password - Password for management access. (Length: 3-16 characters, case sensitive) DEFAULT SETTING smcadmin COMMAND MODE Global Configuration EXAMPLE AP(config)#password AP(config)# ip ssh-server enable This command enables the Secure Shell server. Use the no form to disable the server. SYNTAX ip ssh-server enable no ip ssh-server DEFAULT SETTING Interface enabled COMMAND MODE Interface Configuration (Ethernet) COMMAND USAGE ◆ The access point supports Secure Shell version 2.0 only. – 131 – CHAPTER 13 | System Management Commands System Management Commands ◆ After boot up, the SSH server needs about two minutes to generate host encryption keys. The SSH server is disabled while the keys are being generated. The show system command displays the status of the SSH server. EXAMPLE AP(if-ethernet)#ip ssh-server enable AP(if-ethernet)# ip ssh-server port This command sets the Secure Shell server port. Use the no form to disable the server. SYNTAX ip ssh-server port port-number - The UDP port used by the SSH server. (Range: 165535) DEFAULT SETTING 22 COMMAND MODE Interface Configuration (Ethernet) EXAMPLE AP(if-ethernet)#ip ssh-server port 1124 AP(if-ethernet)# ip telnet-server This command enables the Telnet server. Use the no form to disable the enable server. SYNTAX ip telnet-server enable no ip telnet-server DEFAULT SETTING Interface enabled COMMAND MODE Interface Configuration (Ethernet) EXAMPLE AP(if-ethernet)#ip telnet-server enable AP(if-ethernet)# – 132 – CHAPTER 13 | System Management Commands System Management Commands ip http port This command specifies the TCP port number used by the web browser interface. Use the no form to use the default port. SYNTAX ip http port no ip http port port-number - The TCP port to be used by the browser interface. (Range: 1024-65535) DEFAULT SETTING 80 COMMAND MODE Global Configuration EXAMPLE AP(config)#ip http port 769 AP(config) RELATED COMMANDS ip http server (133) ip http server This command allows this device to be monitored or configured from a browser. Use the no form to disable this function. SYNTAX ip http server no ip http server DEFAULT SETTING Enabled COMMAND MODE Global Configuration EXAMPLE AP(config)#ip http server AP(config)# RELATED COMMANDS ip http port (133) – 133 – CHAPTER 13 | System Management Commands System Management Commands ip https port Use this command to specify the UDP port number used for HTTPS/SSL connection to the access point’s Web interface. Use the no form to restore the default port. SYNTAX ip https port no ip https port port_number – The UDP port used for HTTPS/SSL. (Range: 80, 1024-65535) DEFAULT SETTING 443 COMMAND MODE Global Configuration COMMAND USAGE ◆ You cannot configure the HTTP and HTTPS servers to use the same port. ◆ To avoid using common reserved TCP port numbers below 1024, the configurable range is restricted to 443 and between 1024 and 65535. ◆ If you change the HTTPS port number, clients attempting to connect to the HTTPS server must specify the port number in the URL, in this format: https://device:port_number EXAMPLE AP(config)#ip https port 1234 AP(config)# ip https server Use this command to enable the secure hypertext transfer protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the access point’s Web interface. Use the no form to disable this function. SYNTAX ip https server no ip https server DEFAULT SETTING Enabled COMMAND MODE Global Configuration – 134 – CHAPTER 13 | System Management Commands System Management Commands COMMAND USAGE ◆ Both HTTP and HTTPS service can be enabled independently. ◆ If you enable HTTPS, you must indicate this in the URL: https://device:port_number] ◆ When you start HTTPS, the connection is established in this way: ◆ The client authenticates the server using the server’s digital certificate. ◆ The client and server negotiate a set of security protocols to use for the connection. ◆ The client and server generate session keys for encrypting and decrypting data. ◆ The client and server establish a secure encrypted connection. A padlock icon should appear in the status bar for Internet Explorer 5.x. EXAMPLE AP(config)#ip https server AP(config)# APmgmtIP This command specifies the client IP addresses that are allowed management access to the access point through various protocols. NOTE: Secure Web (HTTPS) connections are not affected by the UI Management or IP Management settings. SYNTAX APmgmtIP multiple - Adds IP addresses within a specifiable range to the SNMP, web and Telnet groups. single - Adds an IP address to the SNMP, web and Telnet groups. any - Allows any IP address access through SNMP, web and Telnet groups. IP_address - Adds IP addresses to the SNMP, web and Telnet groups. subnet_mask - Specifies a range of IP addresses allowed management access. DEFAULT SETTING All addresses – 135 – CHAPTER 13 | System Management Commands System Management Commands COMMAND MODE Global Configuration COMMAND USAGE ◆ If anyone tries to access a management interface on the access point from an invalid address, the unit will reject the connection, enter an event message in the system log, and send a trap message to the trap manager. ◆ IP address can be configured for SNMP, web and Telnet access respectively. Each of these groups can include up to five different sets of addresses, either individual addresses or address ranges. ◆ When entering addresses for the same group (i.e., SNMP, web or Telnet), the access point will not accept overlapping address ranges. When entering addresses for different groups, the access point will accept overlapping address ranges. ◆ You cannot delete an individual address from a specified range. You must delete the entire range, and reenter the addresses. ◆ You can delete an address range just by specifying the start address, or by specifying both the start address and end address. EXAMPLE This example restricts management access to the indicated addresses. AP(config)#apmgmtip multiple 192.168.1.50 255.255.255.0 AP(config)# APmgmtUI This command enables and disables management access to the access point through SNMP, Telnet and web interfaces. CAUTION: Secure Web (HTTPS) connections are not affected by the UI Management or IP Management settings. SYNTAX APmgmtUI <[SNMP | Telnet | Web] enable | disable> SNMP - Specifies SNMP management access. Telnet - Specifies Telnet management access. Web - Specifies web based management access. enable/disable - Enables or disables the selected management access method. – 136 – CHAPTER 13 | System Management Commands System Management Commands DEFAULT SETTING All enabled COMMAND MODE Global Configuration EXAMPLE This example restricts management access to the indicated addresses. AP(config)#apmgmtui SNMP enable AP(config)# show This command shows the AP management configuration, including the IP apmanagement addresses of management stations allowed to access the access point, as well as the interface protocols which are open to management access. COMMAND MODE Exec EXAMPLE AP#show apmanagement Management AP Information ================================= AP Management IP Mode: Any IP Telnet UI: Enable WEB UI : Enable SNMP UI : Enable ================================== AP# show system This command displays basic system configuration settings. DEFAULT SETTING None COMMAND MODE Exec EXAMPLE AP#show system System Information ========================================================== Serial Number : A123456789 System Up time : 0 days, 4 hours, 33 minutes, 29 seconds System Name : SMC System Location System Contact – 137 – CHAPTER 13 | System Management Commands System Management Commands System Country Code : US - UNITED STATES MAC Address : 00-30-F1-F0-9A-9C IP Address : 192.168.1.1 Subnet Mask : 255.255.255.0 Default Gateway : 0.0.0.0 VLAN State : DISABLED Management VLAN ID(AP): 1 IAPP State : ENABLED DHCP Client : ENABLED HTTP Server : ENABLED HTTP Server Port : 80 HTTPS Server : ENABLED HTTPS Server Port : 443 Slot Status : Dual band(a/g) Boot Rom Version : v3.0.3 Software Version : v4.3.1.9 SSH Server : ENABLED SSH Server Port : 22 Telnet Server : ENABLED WEB Redirect : DISABLED DHCP Relay : DISABLED Proxy ARP : DISABLED ========================================================== AP# show version This command displays the software version for the system. COMMAND MODE Exec EXAMPLE AP#show version Version Information ========================================= Version: v4.3.2.2 Date : Dec 20 2005, 18:38:12 ========================================= AP# show config This command displays detailed configuration information for the system. COMMAND MODE Exec EXAMPLE AP#show config Authentication Information =========================================================== MAC Authentication Server : DISABLED MAC Auth Session Timeout Value : 0 min 802.1x supplicant : DISABLED – 138 – CHAPTER 13 | System Management Commands System Management Commands 802.1x supplicant user 802.1x supplicant password Address Filtering : EMPTY : EMPTY : ALLOWED System Default : ALLOW addresses not found in filter table. Filter Table ----------------------------------------------------------No Filter Entries. Bootfile Information =================================== Bootfile : ec-img.bin =================================== Protocol Filter Information =========================================================== Local Bridge :DISABLED AP Management :ENABLED Ethernet Type Filter :DISABLED Enabled Protocol Filters ----------------------------------------------------------No protocol filters are enabled =========================================================== Hardware Version Information =========================================== Hardware version R01A =========================================== Ethernet Interface Information ======================================== IP Address : 192.168.0.151 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.0.1 Primary DNS : 210.200.211.225 Secondary DNS : 210.200.211.193 Speed-duplex : 100Base-TX Full Duplex Admin status : Up Operational status : Up ======================================== Wireless Interface 802.11a Information =========================================================== ----------------Identification----------------------------Description : SMC 802.11a Access Point SSID : SMC_A 0 Channel : 0 (AUTO) Status : Disable ----------------802.11 Parameters-------------------------Transmit Power : 100% (5 dBm) Data Rate : 54Mbps Fragmentation Threshold : 2346 bytes RTS Threshold : 2347 bytes Beacon Interval : 100 TUs DTIM Interval : 1 beacon Maximum Association : 64 stations Native VLAN ID : 1 ----------------Security----------------------------------Closed System : DISABLED Multicast cipher : WEP Unicast cipher : TKIP and AES WPA clients : REQUIRED WPA Key Mgmt Mode : PRE SHARED KEY WPA PSK Key Type : ALPHANUMERIC Encryption : DISABLED – 139 – CHAPTER 13 | System Management Commands System Management Commands Default Transmit Key : 1 Static Keys : Key 1: EMPTY Key 2: EMPTY Key 3: EMPTY Key 4: EMPTY Key Length : Key 1: ZERO Key 2: ZERO Key 3: ZERO Key 4: ZERO Authentication Type : OPEN Rogue AP Detection : Disabled Rogue AP Scan Interval : 720 minutes Rogue AP Scan Duration : 350 milliseconds =========================================================== Console Line Information =========================================================== databits : 8 parity : none speed : 9600 stop bits : 1 =========================================================== Logging Information ===================================================== Syslog State : Disabled Logging Console State : Disabled Logging Level : Informational Logging Facility Type : 16 Servers 1: 0.0.0.0 , UDP Port: 514, State: Disabled 2: 0.0.0.0 , UDP Port: 514, State: Disabled 3: 0.0.0.0 , UDP Port: 514, State: Disabled 4: 0.0.0.0 , UDP Port: 514, State: Disabled ====================================================== Radius Server Information ======================================== IP : 0.0.0.0 Port : 1812 Key : ***** Retransmit : 3 Timeout : 5 Radius MAC format : no-delimiter Radius VLAN format : HEX ======================================== Radius Secondary Server Information ======================================== IP : 0.0.0.0 Port : 1812 Key : ***** Retransmit : 3 Timeout : 5 Radius MAC format : no-delimiter Radius VLAN format : HEX ======================================== SNMP Information ============================================== Service State : Disable Community (ro) : ******** Community (rw) : ******** Location Contact : Contact EngineId :80:00:07:e5:80:00:00:29:f6:00:00:00:0c EngineBoots:2 – 140 – CHAPTER 13 | System Management Commands System Management Commands Trap Destinations: 1: 0.0.0.0, Community: *****, State: Disabled 2: 0.0.0.0, Community: *****, State: Disabled 3: 0.0.0.0, Community: *****, State: Disabled 4: 0.0.0.0, Community: *****, State: Disabled dot11InterfaceAGFail Enabled dot11InterfaceBFail Enabled dot11StationAssociation Enabled dot11StationAuthentication Enabled dot11StationReAssociation Enabled dot11StationRequestFail Enabled dot1xAuthFail Enabled dot1xAuthNotInitiated Enabled dot1xAuthSuccess Enabled dot1xMacAddrAuthFail Enabled dot1xMacAddrAuthSuccess Enabled iappContextDataSent Enabled iappStationRoamedFrom Enabled iappStationRoamedTo Enabled localMacAddrAuthFail Enabled localMacAddrAuthSuccess Enabled pppLogonFail Enabled sntpServerFail Enabled configFileVersionChanged Enabled radiusServerChanged Enabled systemDown Enabled systemUp Enabled ============================================= SNTP Information =========================================================== Service State : Disabled SNTP (server 1) IP : 137.92.140.80 SNTP (server 2) IP : 192.43.244.18 Current Time : 00 : 14, Jan 1st, 1970 Time Zone : -5 (BOGOTA, EASTERN, INDIANA) Daylight Saving : Disabled =========================================================== Station Table Information =========================================================== if-wireless A VAP [0] 802.11a Channel : Auto No 802.11a Channel Stations. if-wireless G VAP [0] 802.11g Channel : Auto No 802.11g Channel Stations. System Information ============================================================== Serial Number System Up time : 0 days, 0 hours, 16 minutes, 51 seconds System Name : SMC System Location System Contact : Contact System Country Code : 99 - NO_COUNTRY_SET MAC Address : 00-12-CF-05-B7-84 IP Address : 192.168.0.151 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.0.1 VLAN State : DISABLED Management VLAN ID(AP): 1 IAPP State : ENABLED DHCP Client : ENABLED HTTP Server : ENABLED HTTP Server Port : 80 HTTPS Server : ENABLED – 141 – CHAPTER 13 | System Management Commands System Management Commands HTTPS Server Port : 443 Slot Status : Dual band(a/g) Boot Rom Version : v3.0.7 Software Version : v4.3.2.2 SSH Server : ENABLED SSH Server Port : 22 Telnet Server : ENABLED WEB Redirect : DISABLED DHCP Relay : DISABLED ============================================================== Version Information ========================================= Version: v4.3.2.2 Date : Dec 20 2005, 18:38:12 ========================================= AP# show hardware This command displays the hardware version of the system. COMMAND MODE Exec EXAMPLE AP#show hardware Hardware Version Information =========================================== Hardware version R01 =========================================== AP# – 142 – 14 SYSTEM LOGGING COMMANDS These commands are used to configure system logging on the access point. Table 11: System Management Commands Command Function Mode Page logging on Controls logging of error messages GC 143 logging host Adds a syslog server host IP address that will receive logging messages GC 144 logging console Initiates logging of error messages to the console GC 144 logging level Defines the minimum severity level for event logging GC 145 logging facility-type Sets the facility type for remote logging of syslog messages GC 145 logging clear Clears all log entries in access point memory GC 146 show logging Displays the state of logging Exec 146 show event-log Displays all log entries in access point memory Exec 147 logging on This command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disables the logging process. SYNTAX [no] logging on DEFAULT SETTING Disabled COMMAND MODE Global Configuration COMMAND USAGE The logging process controls error messages saved to memory. You can use the logging level command to control the type of error messages that are stored in memory. EXAMPLE AP(config)#logging on AP(config)# – 143 – CHAPTER 14 | System Logging Commands logging host This command specifies syslog servers host that will receive logging messages. Use the no form to remove syslog server host. SYNTAX logging host <1 | 2 | 3 | 4> [udp_port] no logging host <1 | 2 | 3 | 4> 1 - First syslog server. 2 - Second syslog server. 3 - Third syslog server. 4 - Fourth syslog server. host_name - The name of a syslog server. (Range: 1-20 characters) host_ip_address - The IP address of a syslog server. udp_port - The UDP port used by the syslog server. DEFAULT SETTING None COMMAND MODE Global Configuration EXAMPLE AP(config)#logging host 1 10.1.0.3 AP(config)# logging console This command initiates logging of error messages to the console. Use the no form to disable logging to the console. SYNTAX logging console no logging console DEFAULT SETTING Disabled COMMAND MODE Global Configuration EXAMPLE AP(config)#logging console AP(config)# – 144 – CHAPTER 14 | System Logging Commands logging level This command sets the minimum severity level for event logging. SYNTAX logging level DEFAULT SETTING Informational COMMAND MODE Global Configuration COMMAND USAGE Messages sent include the selected level down to Emergency level. Table 12: Logging Levels Level Argument Description Emergency System unusable Alert Immediate action needed Critical Critical conditions (e.g., memory allocation, or free memory error - resource exhausted) Error Error conditions (e.g., invalid input, default used) Warning Warning conditions (e.g., return false, unexpected return) Notice Normal but significant condition, such as cold start Informational Informational messages only Debug Debugging messages EXAMPLE AP(config)#logging level alert AP(config)# logging facility-type This command sets the facility type for remote logging of syslog messages. SYNTAX logging facility-type type - A number that indicates the facility used by the syslog server to dispatch log messages to an appropriate service. (Range: 16-23) DEFAULT SETTING 16 COMMAND MODE Global Configuration – 145 – CHAPTER 14 | System Logging Commands COMMAND USAGE The command specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the access point. However, it may be used by the syslog server to sort messages or to store messages in the corresponding database. EXAMPLE AP(config)#logging facility 19 AP(config)# logging clear This command clears all log messages stored in the access point’s memory. SYNTAX logging clear COMMAND MODE Global Configuration EXAMPLE AP(config)#logging clear AP(config)# show logging This command displays the logging configuration. SYNTAX show logging COMMAND MODE Exec EXAMPLE AP#show logging Logging Information ============================================ Syslog State : Enabled Logging Console State : Enabled Logging Level : Alert Logging Facility Type : 16 Servers 1: 192.168.1.19, UDP Port: 514, State: Enabled 2: 0.0.0.0, UDP Port: 514, State: Disabled 3: 0.0.0.0, UDP Port: 514, State: Disabled 4: 0.0.0.0, UDP Port: 514, State: Disabled ============================================= AP# – 146 – CHAPTER 14 | System Logging Commands show event-log This command displays log messages stored in the access point’s memory. SYNTAX show event-log COMMAND MODE Exec EXAMPLE AP#show event-log Mar 09 11:57:55 Information: Mar 09 11:57:55 Information: Mar 09 11:57:34 Information: Mar 09 11:57:18 Information: Mar 09 11:56:35 Information: Mar 09 11:55:52 Information: Mar 09 11:55:52 Information: Mar 09 11:55:52 Information: Mar 09 11:55:40 Information: Mar 09 11:55:40 Information: Press next.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res Page Mode : UseNone XMP Toolkit : 3.1-702 Producer : Acrobat Distiller 7.0 (Windows) Creator Tool : FrameMaker 7.0 Modify Date : 2009:04:10 18:46:24+08:00 Create Date : 2009:04:03 08:57:02Z Metadata Date : 2009:04:10 18:46:24+08:00 Format : application/pdf Title : user-guide.book Creator : david Document ID : uuid:af1e2b04-c55f-4e98-86ca-e8fabe5af139 Instance ID : uuid:f1a30cf8-3fb5-4170-b8d0-a71636232786 Page Count : 258 Author : davidEXIF Metadata provided by EXIF.tools