Cambium Networks XN16 Wireless LAN Array User Manual XN PDF
Xirrus, Inc. Wireless LAN Array XN PDF
Contents
Users Manual pt5of5
Wi-Fi Array Command off Disable a filter list. FORMAT: filter off on Enable a filter list. FORMAT: filter on reset 270 Description Delete all protocol filters and filter lists. FORMAT: filter reset The Command Line Interface Wi-Fi Array group The group command [Xirrus_Wi-Fi_Array(config)# group] is used to create and configure user groups. User groups allow administrators to assign specific network parameters to users through RADIUS privileges rather than having to map users to a specific SSID. Groups provide flexible control over user privileges without the need to create large numbers of SSIDs. For more information, see “Groups” on page 196. Command Description add Create a new user group. FORMAT: group add [group-name] del Delete a user group. FORMAT: group del [group-name] edit Set parameters values for a group. FORMAT: group edit [group-name] reset Reset the group. FORMAT: group reset hostname The hostname command [Xirrus_Wi-Fi_Array(config)# hostname] is used to change the hostname used by the Array. Command hostname Description Change the hostname of the Array. FORMAT: hostname [name] The Command Line Interface 271 Wi-Fi Array https The https command [Xirrus_Wi-Fi_Array(config)# https] is used to enable or disable the Web Management Interface (https), which is enabled by default. It also allows you to establish a timeout for your Web management session. Command disable Disable the https feature. FORMAT: https disable enable Enable the https feature. FORMAT: https enable off Disable the https feature. FORMAT: https off on Enable the https feature. FORMAT: https on timeout 272 Description Define an elapsed period (in seconds) after which the Web Management Interface will time out. FORMAT: https timeout 5000 The Command Line Interface Wi-Fi Array interface The interface command [Xirrus_Wi-Fi_Array(config)# interface] is used to select the interface that you want to configure. To see a listing of the commands that are available for each interface, use the ? command at the selected interface prompt. For example, using the ? command at the Xirrus_Wi-Fi_Array(config-gig1}# prompt displays a listing of all commands for the gig1 interface. Command Description console Select the console interface. The console interface is used for management purposes only. FORMAT: interface console eth0 Select the Fast Ethernet interface. The Fast Ethernet interface is used for management purposes only. FORMAT: interface eth0 Note: To configure a static route for management traffic, next enter: static-route addr [ip-addr] static-route mask [subnet-mask] gig1 Select the Gigabit 1 interface. FORMAT: interface gig1 gig2 Select the Gigabit 2 interface. FORMAT: interface gig2 iap Select an IAP. FORMAT: interface iap The Command Line Interface 273 Wi-Fi Array load The load command [Xirrus_Wi-Fi_Array(config)# load] loads a configuration file. Command Description factory.conf Load the factory settings configuration file. FORMAT: load [factory.conf] lastboot.conf Load the configuration file from the last boot-up. FORMAT: load [lastboot.conf] [myfile].conf If you have saved a configuration, enter its name to load it. FORMAT: load [myfile.conf] saved.conf Load the configuration file with the last saved settings. FORMAT: load [saved.conf] location The location command [Xirrus_Wi-Fi_Array(config)# location] is used to set the location for the Array. 274 Command DescriptionSet the location for the Array. FORMAT: location [newlocation] When you enter the location, simply hit the Enter key to input the new location. The Command Line Interface Wi-Fi Array management The management command [Xirrus_Wi-Fi_Array(config)# management] enters management mode, where you may configure console management parameters. Command Description Enter management mode. FORMAT: management more The more command [Xirrus_Wi-Fi_Array(config)# more] is used to turn terminal pagination ON or OFF. Command Description off Turn OFF terminal pagination. FORMAT: more off on Turn ON terminal pagination. FORMAT: more on The Command Line Interface 275 Wi-Fi Array no The no command [Xirrus_Wi-Fi_Array(config)# no] is used to disable a selected element or set the element to its default value. Command acl Disable the Access Control List. FORMAT: no acl dot11a Disable all 802.11an IAPs (radios). FORMAT: no dot11a dot11bg Disable all 802.11bg IAPs (radios). FORMAT: no dot11bg https Disable https access. FORMAT: no https intrude-detect Disable intrusion detection. FORMAT: no intrude-detect management Disable management on all Ethernet interfaces. FORMAT: no management more ntp 276 Description Disable terminal pagination. FORMAT: no more Disable the NTP server. FORMAT: no ntp The Command Line Interface Wi-Fi Array Command snmp ssh Description Disable SNMP features. FORMAT: no snmp Disable ssh access. FORMAT: no ssh syslog Disable the syslog services. FORMAT: no syslog telnet Disable Telnet access. FORMAT: no telnet ETH-NAME Disable the selected Ethernet interface (eth0, gig1 or gig2). You cannot disable the console interface. with this command. FORMAT: no eth0 (gig1 or gig2) The Command Line Interface 277 Wi-Fi Array quit The quit command [Xirrus_Wi-Fi_Array(config)# quit] is used to exit the Command Line Interface. Command Description Exit the Command Line Interface. FORMAT: quit If you have made any configuration changes and your changes have not been saved, you are prompted to save your changes to Flash. At the prompt, answer Yes to save your changes, or answer No to discard your changes. radius-server The radius-server command [Xirrus_Wi-Fi_Array(config-radius-server)#] is used to configure the external and internal RADIUS server parameters. Command Description external Configure the external RADIUS server. FORMAT: radius-server external To configure the RADIUS accounting server (primary or secondary, and the reporting interval) use: radius-server external accounting internal Configure the external RADIUS server. FORMAT: radius-server internal use 278 Choose the active RADIUS server (either external or internal). FORMAT: use external (or internal) The Command Line Interface Wi-Fi Array reboot The reboot command [Xirrus_Wi-Fi_Array(config)# reboot] is used to reboot the Array. If you have unsaved changes, the command will notify you and give you a chance to cancel the reboot. Command Description Reboot the Array. FORMAT: reboot delay Reboot the Array after a delay of 1 to 60 seconds. FORMAT: reboot delay [n] reset The reset command [Xirrus_Wi-Fi_Array(config)# reset] is used to reset all settings to their default values then reboot the Array. Command Description Reset all configuration parameters to their factory default values. FORMAT: reset The Array is rebooted automatically. preserve-ipsettings Preserve all ethernet and VLAN settings and reset all other configuration parameters to their factory default values. FORMAT: reset preserve-ip-settings The Array is rebooted automatically. The Command Line Interface 279 Wi-Fi Array run-tests The run-tests command [Xirrus_Wi-Fi_Array(run-tests)#] is used to enter runtests mode, which allows you to perform a range of tests on the Array. Command Description Enter run-tests mode. FORMAT: run-tests iperf Execute iperf utility. FORMAT: run-tests iperf kill-beacons Turn off beacons for selected single IAP. FORMAT: run-tests kill-beacons [off | iap-name] kill-proberesponses led Turn off probe responses for selected single IAP. FORMAT: run-tests kill-probe-responses [off | iap-name] LED test. FORMAT: run-tests led [flash | rotate] memtest Execute memory tests. FORMAT: run-tests memtest ping Execute ping utility. FORMAT: run-tests ping [host-name | ip-addr] rlb Run manufacturing radio loopback test. FORMAT: run-tests rlb {optional command line switches] 280 The Command Line Interface Wi-Fi Array Command self-test Description Execute self-test. FORMAT: run-tests self-test {logfile-name (optional)] site-survey Enable or disable site survey mode. FORMAT: run-tests site-survey [on | off | enable | disable] ssh Execute ssh utility. FORMAT: run-tests ssh [hostname | ip-addr] [command-line-switches (optional)] tcpdump Execute tcpdump utility to dump traffic for selected interface or VLAN. FORMAT: run-tests tcpdump telnet Execute telnet utility. FORMAT: run-tests telnet [hostname | ip-addr] [command-line-switches (optional)] traceroute Execute traceroute utility. FORMAT: run-tests traceroute [host-name | ip-addr] The Command Line Interface 281 Wi-Fi Array security The security command [Xirrus_Wi-Fi_Array(config-security)#] is used to establish the security parameters for the Array. Command 282 Description wep Set the WEP encryption parameters. FORMAT: security wep wpa Set the WEP encryption parameters. FORMAT: security wpa The Command Line Interface Wi-Fi Array snmp The snmp command [Xirrus_Wi-Fi_Array(config-snmp)#] is used to enable, disable, or configure SNMP. Command Description community Set the SNMP read-only or read-write community string. FORMAT: snmp community [newcommunity] disable Disable SNMP. FORMAT: snmp disable enable Enable SNMP. FORMAT: snmp enable no Disable the selected feature. FORMAT: snmp no [feature] off Disable SNMP. FORMAT: snmp off on Enable SNMP. FORMAT: snmp on trap-auth trap-host[1-4] Send traps for authentication failures. FORMAT: snmp trap-auth [trap] Set the SNMP trap IP address or host name. Up to four trap hosts may be set, one at a time. FORMAT: snmp trap-host 1.2.3.4 The Command Line Interface 283 Wi-Fi Array Command trap-port[1-4] Description Set the SNMP trap port. FORMAT: snmp trap-port 240 ssh The ssh command [Xirrus_Wi-Fi_Array(config)# ssh] is used to enable or disable the SSH feature. Command disable Disable SSH. FORMAT: ssh disable enable Enable SSH. FORMAT: ssh enable off Disable SSH. FORMAT: ssh off on Enable SSH. FORMAT: ssh on timeout 284 Description Set the SSH inactivity timeout. FORMAT: ssh timeout 300 (in seconds) The Command Line Interface Wi-Fi Array ssid The ssid command [Xirrus_Wi-Fi_Array(config-ssid)#] is used to establish your SSID parameters. Command Description add Add an SSID. FORMAT: ssid add [newssid] del Delete an SSID. FORMAT: ssid del [oldssid] edit Edit an existing SSID. FORMAT: ssid edit [existingssid] reset Delete all SSIDs and restore the default SSID. FORMAT: ssid reset standby The standby command [Xirrus_Wi-Fi_Array(config-ssid)#] sets this Array to function as a standby unit for another Array. Command Description mode Enable or disable standby mode on this Array. FORMAT: standby mode [disable|enable|off|on] target Specify the MAC address of the target Array to be monitored for failure. FORMAT: standby target [AA:BB:CC:DD:EE:FF] The Command Line Interface 285 Wi-Fi Array syslog The syslog command [Xirrus_Wi-Fi_Array(config-syslog)#] is used to enable, disable, or configure the Syslog server. Command console Enable or disable the display of Syslog messages on the console, and set the level to be displayed. All messages at this level and lower (i.e., more severe) will be displayed. FORMAT: syslog console [on/off] level [0-7] disable Disable the Syslog server. FORMAT: syslog disable email Disable the Syslog server. FORMAT: syslog email from [email-from-address] level [0-7] password [email-acct-password] server [email-server-IPaddr] test [test-msg-text] to-list [recipient-email-addresses] user [email-acct-username] enable Enable the Syslog server. FORMAT: syslog enable local-file no 286 Description Set the size and/or severity level (all messages at this level and lower will be logged). FORMAT: syslog local-file size [1-500] level [0-7] Disable the selected feature. FORMAT: syslog no [feature] The Command Line Interface Wi-Fi Array Command Description off Disable the Syslog server. FORMAT: syslog off on Enable the Syslog server. FORMAT: syslog on primary secondary Set the IP address of the primary Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.4] level [0-7] Set the IP address of the secondary (backup) Syslog server and/or the severity level of messages to be logged. FORMAT: syslog primary [1.2.3.4] level [0-7] telnet The telnet command [Xirrus_Wi-Fi_Array(config)# telnet] is used to enable or disable Telnet. Command Description disable Disable Telnet. FORMAT: telnet disable enable Enable Telnet. FORMAT: telnet enable The Command Line Interface 287 Wi-Fi Array Command off Disable Telnet. FORMAT: telnet off on Enable Telnet. FORMAT: telnet on timeout 288 Description Set the Telnet inactivity timeout. FORMAT: telnet timeout 300 (in seconds) The Command Line Interface Wi-Fi Array uptime The uptime command [Xirrus_Wi-Fi_Array(config)# uptime] is used to display the elapsed time since you last rebooted the Array. Command Description Display time since last reboot. FORMAT: uptime vlan The vlan command [Xirrus_Wi-Fi_Array(config-vlan)#] is used to establish your VLAN parameters. Command add default-route delete edit native-vlan Description Add a VLAN. FORMAT: vlan add [newvlan] Assign a VLAN for the default route (for outbound management traffic). FORMAT: vlan default-route [defaultroute] Delete a VLAN. FORMAT: vlan delete [oldvlan] Modify an existing VLAN. FORMAT: vlan edit [existingvlan] Assign a native VLAN (traffic is untagged). FORMAT: vlan native-vlan [nativevlan] The Command Line Interface 289 Wi-Fi Array Command 290 Description no Disable the selected feature. FORMAT: vlan no [feature] reset Delete all existing VLANs. FORMAT: vlan reset The Command Line Interface Wi-Fi Array Sample Configuration Tasks This section provides examples of some of the common configuration tasks used with the Wi-Fi Array, including: “Configuring a Simple Open Global SSID” on page 292. “Configuring a Global SSID using WPA-PEAP” on page 293. “Configuring an SSID-Specific SSID using WPA-PEAP” on page 294. “Enabling Global IAPs” on page 295. “Disabling Global IAPs” on page 296. “Enabling a Specific IAP” on page 297. “Disabling a Specific IAP” on page 298. “Setting Cell Size Auto-Configuration for All IAPs” on page 299 “Setting the Cell Size for All IAPs” on page 300. “Setting the Cell Size for a Specific IAP” on page 301. “Configuring VLANs on an Open SSID” on page 302. “Configuring Self-Monitoring Mode (Loopback Tests)” on page 303. To facilitate the accurate and timely management of revisions to this section, the examples shown here are presented as screen images taken from a Secure Shell (SSH) session (in this case, PuTTY). Depending on the application you are using to access the Command Line Interface, and how your session is set up (for example, font and screen size), the images presented on your screen may be different than the images shown in this section. However, the data displayed will be the same. Some of the screen images shown in this section have been modified for clarity. For example, the image may have been “elongated” to show all data without the need for additional images or scrolling. We recommend that you use the Adobe PDF version of this User’s Guide when reviewing these examples—a hard copy document may be difficult to read. As mentioned previously, the root command prompt is determined by the host name assigned to your Array. The Command Line Interface 291 Wi-Fi Array Configuring a Simple Open Global SSID This example shows you how to configure a simple open global SSID. Figure 142. Configuring a Simple Open Global SSID 292 The Command Line Interface Wi-Fi Array Configuring a Global SSID using WPA-PEAP This example shows you how to configure a global SSID using WPA-PEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 143. Configuring a Global SSID using WPA-PEAP The Command Line Interface 293 Wi-Fi Array Configuring an SSID-Specific SSID using WPA-PEAP This example shows you how to configure an SSID-specific SSID using WPAPEAP encryption in conjunction with the Array’s Internal RADIUS server. Figure 144. Configuring an SSID-Specific SSID using WPA-PEAP 294 The Command Line Interface Wi-Fi Array Enabling Global IAPs This example shows you how to enable all IAPs (radios), regardless of the wireless technology they use. Figure 145. Enabling Global IAPs The Command Line Interface 295 Wi-Fi Array Disabling Global IAPs This example shows you how to disable all IAPs (radios), regardless of the wireless technology they use. Figure 146. Disabling Global IAPs 296 The Command Line Interface Wi-Fi Array Enabling a Specific IAP This example shows you how to enable a specific IAP (radio). In this example, the IAP that is being enabled is a1 (the first IAP in the summary list). Figure 147. Enabling a Specific IAP The Command Line Interface 297 Wi-Fi Array Disabling a Specific IAP This example shows you how to disable a specific IAP (radio). In this example, the IAP that is being disabled is a2 (the second IAP in the summary list). Figure 148. Disabling a Specific IAP 298 The Command Line Interface Wi-Fi Array Setting Cell Size Auto-Configuration for All IAPs This example shows how to set the cell size for all enabled IAPs to be autoconfigured (auto). (See “Fine Tuning Cell Sizes” on page 35.) The auto_cell option may be used with global_settings, global_a_settings, or global_bg_settings. It sets the cell size of the specified IAPs to auto, and it launches an autoconfiguration to adjust the sizes. Be aware that if the intrude-detect feature is enabled on abg2, its cell size is unaffected by this command. Also, any IAPs used in WDS links are unaffected. Auto-configuration may be set to run periodically at intervals specified by auto_cell period (in seconds) if period is non-zero. The percentage of overlap allowed between cells in the cell size computation is specified by auto_cell overlap (0 to 100). This example sets auto-configuration to run every 1200 seconds with an allowed overlap of 5%. It sets the cell size of all IAPs to auto, and runs a cell size auto-configure operation which completes successfully. Figure 149. Setting the Cell Size for All IAPs The Command Line Interface 299 Wi-Fi Array Setting the Cell Size for All IAPs This example shows you how to establish the cell size for all IAPs (radios), regardless of the wireless technology they use. Be aware that if the intrude-detect feature is enabled on abg2 the cell size cannot be set globally—you must first disable the intrude-detect feature on abg2. In this example, the cell size is being set to small for all IAPs. You have the option of setting IAP cell sizes to small, medium, large, or max. See also, “Fine Tuning Cell Sizes” on page 35. Figure 150. Setting the Cell Size for All IAPs 300 The Command Line Interface Wi-Fi Array Setting the Cell Size for a Specific IAP This example shows you how to establish the cell size for a specific IAP (radio). In this example, the cell size for a2 is being set to medium. You have the option of setting IAP cell sizes to small, medium, large, or max (the default is max). See also, “Fine Tuning Cell Sizes” on page 35. Figure 151. Setting the Cell Size for a Specific IAP The Command Line Interface 301 Wi-Fi Array Configuring VLANs on an Open SSID This example shows you how to configure VLANs on an Open SSID. Setting the default route enables the Array to send management traffic, such as syslog messages and SNMP information to a destination behind a router. Figure 152. Configuring VLANs on an Open SSID 302 The Command Line Interface Wi-Fi Array Configuring Self-Monitoring Mode (Loopback Tests) The Array uses the built-in monitor radio (IAP abg2) to monitor other radios in the Array. Tests include sending probes on all channels and checking for a response, and checking whether beacons are received from the other radio. If a problem is detected, corrective actions are taken to recover. Loopback mode operation is described in detail in “Array Monitor and Loopback Testing Capabilities” on page 341. The following actions may be configured: alert-only—the Array will issue an alert in the Syslog. repair-without-reboot—the Array will issue an alert and reset radios at the Physical Layer (Layer 1) and possibly at the MAC layer. The reset should not be noticed by users, and they will not need to reassociate. reboot-allowed—the Array will issue an alert, reset the radios, and schedule the Array to reboot at midnight (per local Array time) if necessary. All stations will need to reassociate to the Array. off—Disable IAP loopback tests (no self-monitoring occurs). Loopback tests are off by default. This is a global IAPs setting—abg2 will monitor all other radios according to the settings above, and it cannot be set up to monitor particular radios. Selfmonitoring mode requires Intrusion Detection to be set to Standard. The following example shows you how to configure a loopback test. The Command Line Interface 303 Wi-Fi Array Figure 153. Configuring a Loopback Test 304 The Command Line Interface Wi-Fi Array Appendices 305 Wi-Fi Array Page is intentionally blank 306 Wi-Fi Array Appendix A: Servicing the Wi-Fi Array This appendix contains procedures for servicing the Xirrus Wi-Fi Array, including the removal and reinstallation of major hardware components. Topics include: “Removing the Access Panel” on page 309. “Reinstalling the Access Panel” on page 312. “Replacing the FLASH Memory Module” on page 314. “Replacing the Main System Memory” on page 316. “Replacing the Integrated Access Point Radio Module” on page 318. “Replacing the Power Supply Module” on page 321. Always turn OFF the Array’s power switch and disconnect the AC power cord before attempting to remove or replace components. Never work on the unit with the power connected. You must be grounded and the work surface must be static-free. Caution! The Array contains a battery which is not to be replaced by the customer. Danger of Explosion exists if the battery is incorrectly replaced. Power switch AC power cord receptacle Figure 154. Disconnecting Power from the Array Most service activities are performed with the Array placed face-down on a flat work surface. To avoid damaging the finished enclosure, we recommend using a protective material between the work surface and the unit (a clean sheet of paper will do the trick). Appendix A: Servicing the Wi-Fi Array 307 Wi-Fi Array See Also Reinstalling the Access Panel Removing the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module 308 Appendix A: Servicing the Wi-Fi Array Wi-Fi Array Removing the Access Panel Use this procedure when you want to remove the system’s access panel. You must remove this panel whenever you need to service the internal components of the Array. 1. Turn OFF the Array’s main power switch (XN16 and XN8 only). 2. Disconnect the AC power cord from the Array. 3. Place the Array face-down on a flat surface. Avoid moving the unit to reduce the risk of damage (scratching) to the finished enclosure. 4. Remove the screws (3 places) that secure the access panel to the main body of the Array. Screw Screw Screw Figure 155. Removing the Access Panel Screws Appendix A: Servicing the Wi-Fi Array 309 Wi-Fi Array 5. Lift up the access panel to reveal the main system board. Lift up the access panel Figure 156. Removing the Access Panel 6. Disconnect the connectors to the power supply and the fan. Fan connector Power supply connector Figure 157. Disconnecting the Power Supply and Fan 7. 310 The access panel can now be safely removed. Appendix A: Servicing the Wi-Fi Array Wi-Fi Array See Also Reinstalling the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 311 Wi-Fi Array Reinstalling the Access Panel Use this procedure when you need to reinstall the access panel after servicing the Array’s internal components. 1. Reconnect the fan and power supply. Fan connector Power supply connector Figure 158. Reconnecting the Fan and Power Supply 2. Reinstall the access panel and secure the panel with the three screws. Screw ! Do not overtighten Screw ! Do not overtighten Screw ! Do not overtighten Figure 159. Reinstalling the Access Panel 3. 312 Reconnect the AC power cord and turn ON the main power switch. Appendix A: Servicing the Wi-Fi Array Wi-Fi Array See Also Removing the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 313 Wi-Fi Array Replacing the FLASH Memory Module Use this procedure when you want to replace the system’s FLASH memory module. 1. Remove the system’s access panel. Refer to “Removing the Access Panel” on page 309. 2. Remove the FLASH memory module, taking care not to “wiggle” the module and risk damaging the connection points. FLASH memory module Figure 160. Removing the FLASH Memory Module 3. 314 The removal procedure is complete. You can now reinstall the FLASH memory module (or install a new module). Appendix A: Servicing the Wi-Fi Array Wi-Fi Array 4. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312). See Also Reinstalling the Access Panel Removing the Access Panel Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 315 Wi-Fi Array Replacing the Main System Memory Use this procedure when you want to replace the main system memory. 1. Remove the access panel (refer to “Removing the Access Panel” on page 309). 2. Remove the DIMM memory module, taking care not to “wiggle” the module and risk damaging the connection points. DIMM memory module Push down on the two locking tabs to release the DIMM memory module Figure 161. Removing the DIMM Memory Module 3. The removal procedure is complete. You can now reinstall the DIMM memory module (or install a new module). Ensure that the DIMM memory module is seated evenly and the locking tabs are in the upright position. The DIMM memory module is keyed to fit in its socket in one direction only. 4. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312). See Also Reinstalling the Access Panel Removing the Access Panel Replacing the FLASH Memory Module 316 Appendix A: Servicing the Wi-Fi Array Wi-Fi Array Replacing the Integrated Access Point Radio Module Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 317 Wi-Fi Array Replacing the Integrated Access Point Radio Module Use this procedure when you want to replace the integrated access point radio module. 1. Remove the access panel (refer to “Removing the Access Panel” on page 309). 2. Remove the locking screws (8 places) that secure the chassis cover to the main body of the Wi-Fi Array. Screws (8 places) Figure 162. Removing the Chassis Cover Screws 3. Lift and remove the chassis cover. Remove the chassis cover Figure 163. Removing the Chassis Cover 318 Appendix A: Servicing the Wi-Fi Array Wi-Fi Array 4. Lift the edge of the integrated access point module. Lift here (do not force) Figure 164. Lifting the Integrated Access Point Module 5. Slide the integrated access point module away from the unit to disconnect it from the main system board. Disconnect the module Figure 165. Disconnect the Integrated Access Point Module 6. The removal procedure is complete. You can now reinstall the integrated access point module (or install a new module). Appendix A: Servicing the Wi-Fi Array 319 Wi-Fi Array 7. Reinstall the chassis cover (see warnings). When reinstalling the chassis cover, take care to align the cover correctly to avoid damaging the antenna modules. Do not force the chassis cover onto the body of the unit. Do not overtighten the locking screws. 8. Reinstall the locking screws (8 places) to secure the chassis cover in place—do not overtighten. 9. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312). See Also Reinstalling the Access Panel Removing the Access Panel Replacing the FLASH Memory Module Replacing the Main System Memory Replacing the Power Supply Module Appendix A: Servicing the Wi-Fi Array 320 Appendix A: Servicing the Wi-Fi Array Wi-Fi Array Replacing the Power Supply Module Use this procedure when you want to replace the power supply module. 1. Remove the access panel (refer to “Removing the Access Panel” on page 309). 2. Because the power supply unit is molded into the access panel, you must install a new access panel assembly (with the power supply attached). Refer to “Reinstalling the Access Panel” on page 312. Access panel (with power supply and fan) Figure 166. Installing a New Access Panel (with Power Supply) See Also Reinstalling the Access Panel Removing the Access Panel Replacing the FLASH Memory Module Replacing the Integrated Access Point Radio Module Replacing the Main System Memory Appendix A: Servicing the Wi-Fi Array Appendix A: Servicing the Wi-Fi Array 321 Wi-Fi Array Use this Space for Your Notes 322 Appendix A: Servicing the Wi-Fi Array Wi-Fi Array Appendix B: Quick Reference Guide This section contains product reference information. Use this section to locate the information you need quickly and efficiently. Topics include: “Factory Default Settings” on page 323. Factory Default Settings The following tables show the Wi-Fi Array’s factory default settings. Host Name Setting Host name Default Value Xirrus-WiFi-Array Network Interfaces Serial Setting Default Value Baud Rate 115200 Word Size 8 bits Stop Bits Parity No parity Time Out 10 seconds Gigabit 1 and Gigabit 2 Setting Enabled Appendix B: Quick Reference Guide Default Value Yes 323 Wi-Fi Array Setting DHCP Bind Default Value Yes Default IP Address 10.0.2.1 Default IP Mask 255.255.255.0 Default Gateway None Auto Negotiate On Duplex Full Speed 1000 Mbps MTU Size 1504 Management Enabled Yes Fast Ethernet Setting Enabled Yes DHCP Bind Yes Default IP Address 324 Default Value 10.0.1.1 Default IP Mask 255.255.255.0 Default Gateway None Auto Negotiate On Duplex Full Speed 100 Mbps MTU Size 1500 Management Enabled Yes Appendix B: Quick Reference Guide Wi-Fi Array Integrated Access Points (IAPs) Setting IAP abg2 Defaults Enabled (Radio State) Default Value Enabled Mode = Monitor Channel = Monitor Cell Size = Manual Antenna = Internal-Omni No Mode XN16 802.11an for a1 to a12 802.11bg for abg1 to abg4 XN8 802.11an for a1 to a4 802.11bg for abg1 to abg4 XN4 802.11bg for abg1 to abg4 Channel Auto Cell Size Max Maximum Transmit Power Antenna Selected 20 Internal Server Settings NTP Setting Default Value Enabled No Primary time.nist.gov Secondary pool.ntp.org Appendix B: Quick Reference Guide 325 Wi-Fi Array Syslog Setting Enabled Default Value Yes Local Syslog Level Maximum Internal Records Primary Server Information 500 None Primary Syslog Level Secondary Server Secondary Syslog Level Information None Information SNMP Setting Enabled Default Value Yes Read-Only Community String xirrus_read_only Read-Write Community String xirrus Trap Host null (no setting) Trap Port 162 Authorization Fail Port On DHCP Setting Enabled 326 Default Value No Maximum Lease Time 300 minutes Default Lease Time 300 minutes Appendix B: Quick Reference Guide Wi-Fi Array Setting Default Value IP Start Range 192.168.1.2 IP End Range 192.168.1.254 NAT Disabled IP Gateway None DNS Domain None DNS Server (1 to 3) None Default SSID Setting Default Value ID xirrus VLAN None Encryption Off Encryption Type QoS None Enabled Yes Broadcast On Security Global Settings - Encryption Setting Enabled WEP Keys Appendix B: Quick Reference Guide Default Value Yes null (all 4 keys) 327 Wi-Fi Array Setting WEP Key Length Default Value null (all 4 keys) Default Key ID WPA Enabled No TKIP Enabled Yes AES Enabled Yes EAP Enabled Yes PSK Enabled No Pass Phrase null Group Rekey Disabled External RADIUS (Global) Setting Enabled Yes Primary Server None Primary Port 1812 Primary Secret Secondary Server Secondary Port Secondary Secret Time Out (before primary server is retired) Accounting Interval 328 Default Value xirrus null (no IP address) 1812 null (no secret) 600 seconds Disabled 300 seconds Appendix B: Quick Reference Guide Wi-Fi Array Setting Default Value Primary Server None Primary Port 1813 Primary Secret xirrus Secondary Server None Secondary Port 1813 Secondary Secret null (no secret) Internal RADIUS Setting Enabled Default Value No The user database is cleared upon reset to the factory defaults. For the Internal RADIUS Server you have a maximum of 1,000 entries. Administrator Account and Password Setting Default Value ID admin Password admin Management Setting SSH SSH timeout Appendix B: Quick Reference Guide Default Value On 300 seconds 329 Wi-Fi Array Setting Telnet Default Value Off Telnet timeout 300 seconds Serial On Serial timeout 300 seconds Management over IAPs http timeout Off 300 seconds Keyboard Shortcuts The following table shows the most common keyboard shortcuts used by the Command Line Interface. Action Cut selected data and place it on the clipboard. Ctrl + X Copy selected data to the clipboard. Ctrl + C Paste data from the clipboard into a document (at the insertion point). Ctrl + V Go to top of screen. Ctrl + Z Copy the active window to the clipboard. Copy the entire desktop image to the clipboard. Abort an action at any time. 330 Shortcut Alt + Print Screen Print Screen Esc Go back to the previous screen. Access the Help screen. Appendix B: Quick Reference Guide Wi-Fi Array See Also An Overview Appendix B: Quick Reference Guide 331 Wi-Fi Array Use this Space for Your Notes 332 Appendix B: Quick Reference Guide Wi-Fi Array Appendix C: Technical Support This appendix provides valuable support information that can help you resolve technical difficulties. Before contacting Xirrus, review all topics below and try to determine if your problem resides with the Wi-Fi Array or your network infrastructure. Topics include: “General Hints and Tips” on page 333 “Frequently Asked Questions” on page 334 “Array Monitor and Loopback Testing Capabilities” on page 341 “Upgrading the Array via CLI” on page 344 “Contact Information” on page 349 “Contact Information” on page 349 General Hints and Tips This section provides some useful tips that will optimize the reliability and performance of your Wi-Fi Arrays. The Wi-Fi Array requires careful handling. For best performance, units should be mounted in a dust-free and temperature-controlled environment. If using multiple Arrays in the same area, maintain a distance of at least 100 feet (30m) between Arrays if there is direct line-of-sight between the units, or at least 50 feet (15 m) if a wall or other barrier exists between the units. Keep the Wi-Fi Array away from electrical devices or appliances that generate RF noise. Because the Array is generally mounted on ceilings, be aware of its position relative to lighting (especially fluorescent lighting). If using AC power, each Wi-Fi Array requires its own dedicated AC power outlet. Do not attempt to “piggy-back” AC power to multiple units. To avoid needing to run separate power cables to one or more Arrays, consider using Power over Gigabit Ethernet. Appendix C: Technical Support 333 Wi-Fi Array If you are deploying multiple units, the Array should be oriented so that the abg2 radio is oriented in the direction of the least required coverage, because when in monitor mode the abg2 radio does not function as an AP servicing stations. The Wi-Fi Array should only be used with Wi-Fi certified client devices. See Also Contact Information Multiple SSIDs Security VLAN Support Frequently Asked Questions This section answers some of the most frequently asked questions, organized by functional area. Multiple SSIDs Q. What Are BSSIDs and SSIDs? A. BSSID (Basic Service Set Identifier) refers to an individual access point radio and its associated clients. The identifier is the MAC address of the access point radio that forms the BSS. A group of BSSs can be formed to allow stations in one BSS to communicate to stations in another BSS by way of a backbone that interconnects each access point. The Extended Service Set (ESS) refers to the group of BSSIDs that are grouped together to form one ESS. The ESSID (often referred to as SSID or “wireless network name”) identifies the Extended Service Set. Clients must associate to a single ESS at any given time. Clients ignore traffic from other Extended Service Sets that do not have the same SSID. Legacy access points typically support one SSID per access point. Xirrus Wi-Fi Arrays support the ability for multiple SSIDs to be defined and used simultaneously. 334 Appendix C: Technical Support Wi-Fi Array Q. What would I use SSIDs for? A. The creation of different wireless network names allows system administrators to separate types of users with different requirements. The following policies can be tied to an SSID: Minimum security required to join this SSID. The wireless Quality of Service (QoS) desired for this SSID. The wired VLAN associated with this SSID. As an example, one SSID named accounting might require the highest level of security, while another SSID named guests might have low security requirements. Another example may define an SSID named voice that supports voice over Wireless LAN phones with the highest possible Quality of Service (QoS) definition. This type of SSID might also forward traffic to specific VLANs on the wired network. Q. How do I set up SSIDs? A. Use the following procedure as a guideline. For more detailed information, go to “SSIDs” on page 184. 1. From the Web Management Interface, go to the SSID Management page. 2. Select Yes to make the SSID visible to all clients on the network. Although the Wi-Fi Array will not broadcast SSIDs that are hidden, clients can still associate to a hidden SSID if they know the SSID name to connect to it. 3. Select the minimum security that will be required by users for this SSID. 4. If desired (optional), select a Quality of Service (QoS) setting for this SSID. The QoS setting you define here will prioritize wireless traffic for this SSID over other SSID wireless traffic. 5. If desired (optional), select a VLAN that you want this traffic to be forwarded to on the wired network. Appendix C: Technical Support 335 Wi-Fi Array 6. If desired (optional), you can select which radios this SSID will not be available on—the default is to make this SSID available on all radios. 7. Click on the Apply button to apply your changes to this session. 8. Click on the Save button to save your changes. 9. If you need to edit any of the SSID settings, you can do so from the SSID Management page. See Also Contact Information General Hints and Tips Security SSIDs SSID Management VLAN Support Security Q. How do I know my management session is secure? A. Follow these guidelines: 336 Administrator passwords Always change the default administrator password (the default is admin), and choose a strong replacement password. When appropriate, issue read only administrator accounts. SSH versus Telnet Be aware that Telnet is not secure over network connections and should be used only with a direct serial port connection. When connecting to the unit’s Command Line Interface over a network connection, you must use a Secure SHell (SSH) utility. The most commonly used freeware providing SSH tools is PuTTY. Configuration auditing Appendix C: Technical Support Wi-Fi Array Do not change approved configuration settings. The optional Xirrus Management System (XMS) offers powerful management features for small or large Wi-Fi Array deployments, and can audit your configuration settings automatically. In addition, using the XMS eliminates the need for an FTP server. Q. Which wireless data encryption method should I use? A. Wireless data encryption prevents eavesdropping on data being transmitted or received over the airwaves. The Wi-Fi Array allows you to establish the following data encryption configuration options: Open This option offers no data encryption and is not recommended, though you might choose this option if clients are required to use a VPN connection through a secure SSH utility, like PuTTy. WEP (Wired Equivalent Privacy) This option provides minimal protection (though much better than using an open network). An early standard for wireless data encryption and supported by all Wi-Fi certified equipment, WEP is vulnerable to hacking and is therefore not recommended for use by Enterprise networks. WPA (Wi-Fi Protected Access) This is a much stronger encryption model than WEP and uses TKIP (Temporal Key Integrity Protocol) with AES (Advanced Encryption Standard) to prevent WEP cracks. TKIP solves security issues with WEP. It also allows you to establish encryption keys on a per-user-basis, with key rotation for added security. In addition, TKIP provides Message Integrity Check (MIC) functionality and prevents active attacks on the wireless network. AES is the strongest encryption standard and is used by government agencies; however, old legacy hardware may not be capable of supporting the AES mode (it probably won’t work on older wireless clients). Because AES is the strongest encryption Appendix C: Technical Support 337 Wi-Fi Array standard currently available, it is highly recommended for Enterprise networks. Any of the above encryption modes can be used (and can be used at the same time). Q. Which user authentication method should I use? A. User authentication ensures that users are who they say they are. For example, the most obvious example of authentication is logging in with a user name and password. The Wi-Fi Array allows you to choose between the following user authentication methods: Pre-Shared Key Users must manually enter a key (pass phrase) on the client side of the wireless network that matches the key stored by the administrator in your Wi-Fi Arrays. RADIUS 802.1x with EAP 802.1x uses a RADIUS server to authenticate large numbers of clients, and can handle different EAP (Extensible Authentication Protocol) authentication methods, including EAP-TLS, EAPTTLS and EAP-PEAP. The RADIUS server can be internal (provided by the Wi-Fi Array) or external. An external RADIUS server offers more functionality and is recommended for large Enterprise deployments. When using this method, user names and passwords must be entered into the RADIUS server for user authentication. MAC Address ACLs (Access Control Lists) MAC address ACLs provide a list of client adapter MAC addresses that are allowed or denied access to the wireless network. Access Control Lists work well when there are a limited number of users—in this case, enter the MAC addresses of each user in the Allow list. In the event of a lost or stolen MAC adapter, enter the affected MAC address in the Deny list. Q. Why do I need to authenticate my Wi-Fi Array units? 338 Appendix C: Technical Support Wi-Fi Array A. When deploying multiple Wi-Fi Arrays, you may need to define which units are part of which wireless network (for example, if you are establishing more than one network). In this case, you need to employ the Xirrus Management System (XMS) which can authenticate your Arrays automatically and ensure that only authorized units are associated with the defined wireless network. Q. What is rogue AP (Access Point) detection? A. The Wi-Fi Array has a dedicated radio (abg/4) which constantly scans the local wireless environment for rogue APs (non-Xirrus devices that are not part of your wireless network), unencrypted transmissions, and other security issues. Administrators can then classify each rogue AP and ensure that these devices do not interrupt or interfere with the network. See Also Contact Information General Hints and Tips Multiple SSIDs VLAN Support VLAN Support Q. What Are VLANs? A. VLANs (Virtual Local Area Networks) are a logical grouping of network devices that share a common network broadcast domain. Members of a particular VLAN can be on any segment of the physical network but logically only members of a particular VLAN can see each other. VLANs are defined and implemented using the wired network switches that are VLAN capable. Packets are tagged for transmission on a particular VLAN according to the IEEE 802.1Q standard, with VLAN switches processing packets according to the tag. Q. What would I use VLANs for? Appendix C: Technical Support 339 Wi-Fi Array A. Logically separating different types of users, systems, applications, or other logical division aids in performance and management of different network devices. Different VLANs can also be assigned with different packet priorities to prioritize packets from one VLAN over packets from another VLAN. VLANs are managed by software settings—instead of physically plugging in and moving network cables and users—which helps to ease network management tasks. Q. What are Wireless VLANs? A. Wireless VLANs allow similar functionality to the wired VLAN definitions and extend the operation of wired VLANs to the wireless side of the network. Wireless VLANs can be mapped to wireless SSIDs so that traffic from wired VLANs can be sent to wireless users of a particular SSID. The reverse is also true, where wireless traffic originating from a particular SSID can be tagged for transmission on a particular wired VLAN. Sixteen SSIDs can be defined on your Wi-Fi Array, allowing a total of sixteen VLANs to be accessed (one per SSID). As an example, to provide guest user access an SSID of guest might be created. This SSID could be mapped to a wired VLAN that segregates unknown users from the rest of the wired network and restricts them to Internet access only. Wireless users could then associate to the wireless network via the guest SSID and obtain access to the Internet through the selected VLAN, but would be able to access other privileged network resources. See Also Contact Information General Hints and Tips Multiple SSIDs Security 340 Appendix C: Technical Support Wi-Fi Array Array Monitor and Loopback Testing Capabilities All models of the Wi-Fi Array have a monitor radio, abg2, that checks that the Array’s radios are functioning correctly, and acts as a dedicated threat sensor to detect and prevent intrusion from rogue access points. Enabling Monitoring on the Array IAP abg2 may be set to monitor the Array or to be a normal IAP radio. In order to enable the functions required for intrusion detection and for monitoring the other Array radios, you must configure abg2 on the IAP Settings window as follows: Check the Enabled checkbox. Set Mode to Monitor. Set Channel to Monitor. The settings above will automatically set the Antenna selection to Internal-Omni., also required for monitoring. See the “IAP Settings” on page 204 for more details. The values above are the factory default settings for the Array. How Monitoring Works When the monitor radio abg2 has been configured as just described, it performs these steps continuously (24/7) to check the other radios on the Array and detect possible intrusions: 1. The monitor radio scans all channels with a 200ms dwell time, hitting all channels about once every 10 seconds. 2. Each time it tunes to a new channel it sends out a probe request in an attempt to smoke out rogues. 3. It then listens for all probe responses and beacons to detect any rogues within earshot. 4. Array radios respond to that probe request with a probe response. Intrusion Detection is enabled or disabled separately from monitoring. See Step 1 in “Advanced RF Settings” on page 221. Note that the Advanced setting is only used with the optional Xirrus Defense Module (XDM) software package. Appendix C: Technical Support 341 Wi-Fi Array Loopback Testing The Array is capable of performing continuous, comprehensive tests on its radios to assure that they are operating properly. Testing is enabled using the Radio Assurance Mode setting on the Advanced RF Settings window (Step 5 in “Advanced RF Settings” on page 221). When this mode is enabled, IAP abg2 performs loopback tests on the Array. Radio Assurance Mode (also called loopback mode) requires Intrusion Detection to be set to Standard (See Step 1 in “Advanced RF Settings” on page 221). When Loopback Mode is enabled: 342 1. The Array keeps track of whether or not it hears beacons and probe responses from the Array’s radios. 2. After 10 minutes (roughly 60 passes on a particular channel by the monitor radio), if it has not heard beacons or probe responses from one of the Array’s radios it issues an alert in the Syslog. If repair is allowed (see “Loopback Mode Options” on page 343), the Array will reset and reprogram that particular radio at the Physical Layer (PHY—Layer 1). This action takes under 100ms and stations are not deauthenticated, thus users should not be impacted. 3. After another 10 minutes (roughly another 60 passes), if the monitor still has not heard beacons or probe responses from the malfunctioning radio it will again issue an alert in the Syslog. If repair is allowed, the Array will reset and reprogram the MAC (the lower sublayer of the Data Link Layer) and then all of the PHYs. This is a global action that affects all radios. This action takes roughly 300ms and stations are not deauthenticated, thus users should not be impacted. 4. After another 10 minutes, if the monitor still has not heard beacons or probe responses from that radio, it will again syslog the issue. If reboot is allowed (see “Loopback Mode Options” on page 343), the Array will schedule a reboot. This reboot will occur at one of the following times, whichever occurs first: • When no stations are associated to the Array • Midnight Appendix C: Technical Support Wi-Fi Array Loopback Mode Options If the monitor detects a problem with an Array radio as described above, it will take action according to the preference that you have specified in the Radio Assurance Mode setting on the Advanced RF Settings window (see Step 5 page 223): Failure alerts only—The Array will issue alerts in the Syslog, but will not initiate repairs or reboots. Failure alerts & repairs, but no reboots—The Array will issue alerts and perform resets of the PHY and MAC as described above. Failure alerts & repairs & reboots if needed—The Array will issue alerts, perform resets of the PHY and MAC, and schedule reboots as described above. Disabled—Disable IAP loopback tests (no self-monitoring occurs). Loopback tests are disabled by default. Appendix C: Technical Support 343 Wi-Fi Array Upgrading the Array via CLI If you are experiencing difficulties communicating with the Array using the Web Management Interface, the Array provides lower-level facilities that may be used to accomplish an upgrade via the CLI and the Xirrus Boot Loader (XBL). 1. Download the latest software update from the Xirrus FTP site using your Enhanced Care FTP username and password. If you do not have an FTP username and password, contact Xirrus Customer Service for assistance (support@xirrus.com). The software update is provided as a zip file. Unzip the contents to a local temp directory. Take note of the extracted file name in case you need it later on—you may also need to copy this file elsewhere on the network depending on your situation. 2. Install a TFTP server software package if you don't have one running. It may be installed on any PC on your network, including your desktop or laptop. The Solar Winds version is freeware and works well. http://support.solarwinds.net/updates/New-customerFree.cfm?ProdId=52 The TFTP install process creates the TFTP-Root directory on your C: drive, which is the default target for sending and receiving files. This may be changed if desired. This directory is where you will place the extracted Xirrus software update file(s). If you install the TFTP server on the same computer to which you extracted the file, you may change the TFTP directory to C:\xirrus if desired. You must make the following change to the default configuration of the Solar Winds TFTP server. In the File/Configure menu, select Security, then select Transmit only and click OK. 344 3. Determine the IP address of the computer hosting the TFTP server. (To display the IP address, open a command prompt and type ipconfig) 4. Connect your Array to the computer running TFTP using a serial cable, and open a terminal program if you haven't already. Attach a network cable to the Array’s GIG1 port, if it is not already part of your network. Appendix C: Technical Support Wi-Fi Array Boot your Array and watch the progress messages. When Press space bar to exit to bootloader: is displayed, press the space bar. The rest of this procedure is performed using the bootloader. The following steps assume that you are running DHCP on your local network. 5. Type dhcp and hit return. This instructs the Array to obtain a DHCP address and use it during this boot in the bootloader environment. 6. Type dir and hit return to see what's currently in the compact flash. 7. Type del and hit return to delete the contents of the compact flash. 8. Type update server xs-3.x-xxxx.bin (the actual Xirrus file name will vary depending on Array model number and software version—use the file name from your software update) and hit return. The software update will be transferred to the Array's memory and will be written to the it’s compact flash card. (See output below.) 9. Type reset and hit return. Your Array will reboot, running your new version of software. Sample Output for the Upgrade Procedure: The user actions are highlighted in the output below, for clarity. Username: admin Password: ***** Xirrus-WiFi-Array# configure Xirrus-WiFi-Array(config)# reboot Are you sure you want to reboot? [yes/no]: yes Array is being rebooted. Xirrus Boot Loader 1.0.0 (Oct 17 2006 - 13:11:42), Build: 2725 Processor | Motorola PowerPC, PVR=80200020 SVR=80300020 Board | Xirrus MPC8540 CPU Board Clocks | CPU : 825 MHz DDR : 330 MHz Local Bus: 41 MHz Appendix C: Technical Support 345 Wi-Fi Array L1 cache | Data: 32 KB Inst: 32 KB Status : Enabled Watchdog | Enabled (5 secs) I2C Bus | 400 KHz DTT | CPU:34C RF0:34C RF1:34C RF2:27C RF3:29C RTC | Wed 2007-Nov-05 6:43:14 GMT System DDR | 256 MB, Unbuffered Non-ECC (2T) L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.0 Environment| 4 KB, Initialized In: serial Out: serial Err: serial Press space bar to exit to bootloader: XBL>dhcp [DHCP ] Device : Mot TSEC1 1000BT Full Duplex [DHCP ] IP Addr : 192.168.39.195 XBL>dir [CFCard] Directory of / Date Time Size File or Directory name ----------- -------- -------- --------------------------2007-Nov-05 6:01:56 29 lastboot 2007-Apr-05 15:47:46 28210390 xs-3.1-0433.bak 2007-Mar-01 16:39:42 storage/ 2007-Apr-05 15:56:38 28210430 xs-3.1-0440.bin 2007-Mar-03 0:56:28 wpr/ 3 file(s), 2 dir(s) 346 Appendix C: Technical Support Wi-Fi Array XBL>del * [CFCard] Delete : 2 file(s) deleted XBL>update server 192.168.39.102 xs-3.0-0425.bin [TFTP ] Device : Mot TSEC1 1000BT Full Duplex [TFTP ] Client : 192.168.39.195 [TFTP ] Server : 192.168.39.102 [TFTP ] File : xs-3.0-0425.bin [TFTP ] Address : 0x1000000 [TFTP ] Loading : ################################################## [TFTP ] Loading : ################################################## [TFTP ] Loading : ###### done [TFTP ] Complete: 12.9 sec, 2.1 MB/sec [TFTP ] Bytes : 27752465 (1a77811 hex) [CFCard] File : xs-3.0-0425.bin [CFCard] Address : 0x1000000 [CFCard] Saving : ############################################### done [CFCard] Complete: 137.4 sec, 197.2 KB/sec [CFCard] Bytes : 27752465 (1a77811 hex) XBL>reset [RESET ] Xirrus Boot Loader 1.0.0 (Oct 17 2006 - 13:11:42), Build: 2725 Processor | Motorola PowerPC, PVR=80200020 SVR=80300020 Board | Xirrus MPC8540 CPU Board Clocks | CPU : 825 MHz DDR : 330 MHz Local Bus: 41 MHz L1 cache | Data: 32 KB Inst: 32 KB Status : Enabled Watchdog | Enabled (5 secs) I2C Bus | 400 KHz DTT | CPU:33C RF0:32C RF1:31C RF2:26C RF3:27C RTC | Wed 2007-Nov-05 6:48:44 GMT System DDR | 256 MB, Unbuffered Non-ECC (2T) Appendix C: Technical Support 347 Wi-Fi Array L2 cache | 256 KB, Enabled FLASH | 4 MB, CRC: OK FPGA | 2 Devices programmed Packet DDR | 256 MB, Unbuffered Non-ECC, Enabled Network | Mot FEC Mot TSEC1 [Primary] Mot TSEC2 IDE Bus 0 | OK CFCard | 122 MB, Model: Hitachi XXM2.3.0 Environment| 4 KB, Initialized In: serial Out: serial Err: serial Press space bar to exit to bootloader: [CFCard] File : xs*.bin [CFCard] Address : 0x1000000 [CFCard] Loading : ############################################### done [CFCard] Complete: 26.9 sec, 1.0 MB/sec [CFCard] Bytes : 27752465 (1a77811 hex) [Boot ] Address : 0x01000000 [Boot ] Image : Verifying checksum .... OK [Boot ] Unzip : Multi-File Image .... OK [Boot ] Initrd : Loading RAMDisk Image [Boot ] Initrd : Verifying checksum .... OK [Boot ] Execute : Transferring control to OS Initializing hardware ........................................ OK Xirrus Wi-Fi Array ArrayOS Version 3.0-425 Copyright (c) 2005-2007 Xirrus, Inc. http://www.xirrus.com Username: 348 Appendix C: Technical Support Wi-Fi Array Contact Information Xirrus, Inc. is located in Westlake Village, California, just 45 minutes northwest of downtown Los Angeles and 45 minutes southeast of Santa Barbara. Xirrus, Inc. 370 North Westlake Blvd, Suite 200 Westlake Village, CA 91362 USA Tel: 1.805.497.0955 Fax: 1.805.449.1180 www.xirrus.com support.xirrus.com Appendix C: Technical Support 349 Wi-Fi Array 350 Appendix C: Technical Support Wi-Fi Array Glossary of Terms 802.11a A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 5 GHz and data rates of up to 54 Mbps. 802.11b A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 11 Mbps. 802.11d A supplement to the Media Access Control (MAC) layer in 802.11 to promote worldwide use of 802.11 WLANs. It allows Access Points to communicate information on the permissible radio channels with acceptable power levels for user devices. Because the 802.11 standards cannot legally operate in some countries, 802.11d adds features and restrictions to allow WLANs to operate within the rules of these countries. 802.11g A supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 54 Mbps. 802.1Q An IEEE standard for MAC layer frame tagging (also known as encapsulation). Frame tagging uniquely assigns a user-defined ID to each frame. It also enables a switch to communicate VLAN membership information across multiple (and multi-vendor) devices by frame tagging. AES (Advanced Encryption Standard) A data encryption scheme that uses three different key sizes (128-bit, 192-bit, and 256-bit). AES was adopted by the U.S. government in 2002 as the encryption standard for protecting sensitive but unclassified electronic data. Glossary of Terms 351 Wi-Fi Array authentication The process that a station, device, or user employs to announce its identify to the network which validates it. IEEE 802.11 specifies two forms of authentication, open system and shared key. bandwidth Specifies the amount of the frequency spectrum that is usable for data transfer. In other words, it identifies the maximum data rate a signal can attain on the medium without encountering significant attenuation (loss of power). beacon interval When a device in a wireless network sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again. The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon. Network administrators can adjust the beacon interval—usually measured in milliseconds (ms) or its equivalent, kilo-microseconds (Kmsec). bit rate The transmission rate of binary symbols ('0' and '1'), equal to the total number of bits transmitted in one second. BSS (Basic Service Set) When a WLAN is operating in infrastructure mode, each access point and its connected devices are called the Basic Service Set. BSSID The unique identifier for an access point in a BSS network. See also, SSID. CDP (Cisco Discovery Protocol) CDP is a layer 2 network protocol which runs on most Cisco equipment and some other network equipment. It is used to share information with other directly connected network devices. Information such as the model, network capabilities, and IP address is shared. Wi-Fi Arrays can both advertise their presence by sending CDP announcements, and gather and display information sent by neighbors. 352 Glossary of Terms Wi-Fi Array cell The basic geographical unit of a cellular communications system. Service coverage of a given area is based on an interlocking network of cells, each with a radio base station (transmitter/receiver) at its center. The size of each cell is determined by the terrain and forecasted number of users. channel A specific portion of the radio spectrum—the channels allotted to one of the wireless networking protocols. For example, 802.11b and 802.11g use 14 channels in the 2.4 GHz band, only 3 of which don't overlap (1, 6, and 11). In the 5 GHz band, 802.11a uses 8 channels for indoor use and 4 for outdoor use, none of which overlap. In the U.S., additional channels are available, to bring the total to 24 channels. CoS (Class of Service) A category based on the type of user, type of application, or some other criteria that QoS systems can use to provide differentiated classes of service. default gateway The gateway in a network that a computer will use to access another network if a gateway is not specified for use. In a network using subnets, a default gateway is the router that forwards traffic to a destination outside of the subnet of the transmitting device. DHCP (Dynamic Host Configuration Protocol) A method for dynamically assigning IP addresses to devices on a network. DHCP issues IP addresses automatically within a specified range to client devices when they are first powered up. DHCP lease The DHCP lease is the amount of time that the DHCP server grants to the DHCP client for permission to use a particular IP address. A typical DHCP server allows its administrator to set the lease time. Glossary of Terms 353 Wi-Fi Array DNS (Domain Name System) A system that maps meaningful domain names with complex numeric IP addresses. DNS is actually a separate network—if one DNS server cannot translate a domain name, it will ask a second or third until a server is found with the correct IP address. domain The main name/Internet address of a user's Internet site as registered with the InterNIC organization, which handles domain registration on the Internet. For example, the “domain” address for Xirrus is: http://www.xirrus.com, broken down as follows: z http:// represents the Hyper Text Teleprocessing Protocol used by all Web pages. www is a reference to the World Wide Web. xirrus refers to the company. com specifies that the domain belongs to a commercial enterprise. DTIM (Delivery Traffic Indication Message) A DTIM is a signal sent as part of a beacon by an access point to a client device in sleep mode, alerting the device to a packet awaiting delivery. EAP (Extensible Authentication Protocol) When you log on to the Internet, you're most likely establishing a PPP connection via a remote access server. The password, key, or other device you use to prove that you are authorized to do so is controlled via PPP’s Link Control Protocol (LCP). However, LCP is somewhat inflexible because it has to specify an authentication device early in the process. EAP allows the system to gather more information from the user before deciding which authenticator to use. It is called extensible because it allows more authenticator types than LCP (for example, passwords and public keys). 354 Glossary of Terms Wi-Fi Array EDCF (Enhanced Distributed Coordinator Function) A QoS extension which uses the same contention-based access mechanism as current devices but adds “offset contention windows” that separate high priority packets from low priority packets (by assigning a larger random backoff window to lower priorities than to higher priorities). The result is “statistical priority,” where high-priority packets usually are transmitted before low-priority packets. encapsulation A way of wrapping protocols such as TCP/IP, AppleTalk, and NetBEUI in Ethernet frames so they can traverse an Ethernet network and be unwrapped when they reach the destination computer. encryption Any procedure used in cryptography to translate data into a form that can be decrypted and read only by its intended receiver. Fast Ethernet A version of standard Ethernet that runs at 100 Mbps rather than 10 Mbps. FCC (Federal Communications Commission) US wireless regulatory authority. The FCC was established by the Communications Act of 1934 and is charged with regulating Interstate and International communications by radio, television, wire, satellite and cable. frame A packet encapsulated to travel on a physical medium, like Ethernet or Wi-Fi. If a packet is like a shipping container, a frame is the boat on which the shipping container is loaded. Gigabit 1 The primary Gigabit Ethernet interface. See also, Gigabit Ethernet. Gigabit 2 The secondary Gigabit Ethernet interface. See also, Gigabit Ethernet. Gigabit Ethernet The newest version of Ethernet, with data transfer rates of 1 Gigabit (1,000 Mbps). Glossary of Terms 355 Wi-Fi Array Group A user group, created to define a set of attributes (such as VLAN, traffic limits, and Web Page Redirect) and privileges (such as fast roaming) that apply to all users that are members of the group. This allows a uniform configuration to be easily applied to multiple user accounts. The attributes that can be configured for user groups are almost identical to those that can be configured for SSIDs. host name The unique name that identifies a computer on a network. On the Internet, the host name is in the form comp.xyz.net. If there is only one Internet site the host name is the same as the domain name. One computer can have more than one host name if it hosts more than one Internet site (for example, home.xyz.net and comp.xyz.net). In this case, comp and home are the host names and xyz.net is the domain name. IPsec A Layer 3 authentication and encryption protocol. Used to secure VPNs. MAC address (Media Access Control Address) A 6-byte hexadecimal address assigned by a manufacturer to a device. Mbps (Megabits per second) A standard measure for data transmission speeds (for example, the rate at which information travels over the Internet). 1 Mbps denotes one million bits per second. MTU (Maximum Transmission Unit) The largest physical packet size—measured in bytes—that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent. Every network has a different MTU, which is set by the network administrator. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds. 356 Glossary of Terms Wi-Fi Array NTP (Network Time Protocol) An Internet standard protocol (built on top of TCP/IP) that ensures the accurate synchronization (to the millisecond) of computer clock times in a network of computers. Running as a continuous background client program on a computer, NTP sends periodic time requests to servers, obtaining server time stamps and using them to adjust the client's clock. packet Data sent over a network is broken down into many small pieces—packets—by the Transmission Control Protocol layer of TCP/IP. Each packet contains the address of its destination as well the data. Packets may be sent on any number of routes to their destination, where they are reassembled into the original data. This system is optimal for connectionless networks, such as the Internet, where there are no fixed connections between two locations. PLCP (Physical Layer Convergence Protocol) Defined by IEEE 802.6, a protocol specified within the Transmission Convergence layer that defines exactly how cells are formatted within a data stream for a particular type of transmission facility. PoGE This refers to the optional Xirrus XP1 Power over Gigabit Ethernet modules that provide DC power to Arrays. Power is supplied over the same Cat 5e or Cat 6 cable that supplies the data connection to your gigabit Ethernet switch, thus eliminating the need to run a power cable. See “Contact Information” on page 349 for a list of Xirrus PoGE modules and the modules that are compatible with each Array. preamble Preamble (sometimes called a header) is a section of data at the head of a packet that contains information that the access point and client devices need when sending and receiving packets. PLCP has two structures, a long and a short preamble. All compliant 802.11b systems have to support the long preamble. The short preamble option is provided in the standard to improve the efficiency of a network's throughput when transmitting special data, such as voice, VoIP (Voice-over IP) and streaming video. Glossary of Terms 357 Wi-Fi Array private key In cryptography, one of a pair of keys (one public and one private) that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The private key is provided only to the requestor and never shared. The requestor uses the private key to decrypt text that has been encrypted with the public key by someone else. PSK (Pre-Shared Key) A TKIP passphrase used to protect your network traffic in WPA. public key In cryptography, one of a pair of keys (one public and one private) that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The public key is made publicly available for encryption and decryption. QoS (Quality of Service) QoS can be used to describe any number of ways in which a network provider prioritizes or guarantees a service's performance. RADIUS (Remote Authentication Dial-In User Service) A client-server security protocol, developed to authenticate, authorize, and account for dial-up users. The RADIUS server stores user profiles, which include passwords and authorization attributes. RSSI (Received Signal Strength Indicator) A measure of the energy observed by an antenna when receiving a signal. SDMA (Spatial Division Multiple Access) A wireless communications mode that optimizes the use of the radio spectrum and minimizes cost by taking advantage of the directional properties of antennas. The antennas are highly directional, allowing duplicate frequencies to be used for multiple zones. SNMP (Simple Network Management Protocol) A standard protocol that regulates network management over the Internet. 358 Glossary of Terms Wi-Fi Array SNTP (Simple Network Time Protocol) A simplified version of NTP. SNTP can be used when the ultimate performance of the full NTP implementation described in RFC 1305 is not needed or justified. SSH (Secure SHell) Developed by SSH Communications Security, Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. SSH protects a network from attacks, such as IP spoofing, IP source routing, and DNS spoofing. Attackers who has managed to take over a network can only force SSH to disconnect—they cannot “play back” the traffic or hijack the connection when encryption is enabled. When using SSH's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted making it almost impossible for an outsider to collect passwords. SSID (Service Set IDentifier) Every wireless network or network subset (such as a BSS) has a unique identifier called an SSID. Every device connected to that part of the network uses the same SSID to identify itself as part of the family—when it wants to gain access to the network or verify the origin of a data packet it is sending over the network. In short, it is the unique name shared among all devices in a WLAN. subnet mask A mask used to determine what subnet an IP address belongs to. An IP address has two components: (1) the network address and (2) the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network. TKIP (Temporal Key Integrity Protocol) Provides improved data encryption by scrambling the keys using a hashing algorithm and, by adding an integritychecking feature, ensures that the encryption keys haven’t been tampered with. transmit power The amount of power used by a radio transceiver to send the signal out. Transmit power is generally measured in milliwatts, which you can convert to dBm. Glossary of Terms 359 Wi-Fi Array User group See Group. VLAN (Virtual LAN) A group of devices that communicate as a single network, even though they are physically located on different LAN segments. Because VLANs are based on logical rather than physical connections, they are extremely flexible. A device that is moved to another location can remain on the same VLAN without any hardware reconfiguration. VLAN tagging (Virtual LAN tagging) Static port-based VLANs were originally the only way to segment a network without using routing, but these port-based VLANs could only be implemented on a single switch (or switches) cabled together. Routing was required to transfer traffic between unconnected switches. As an alternative to routing, some vendors created proprietary schemes for sharing VLAN information across switches. These methods would only operate on that vendor's equipment and were not an acceptable way to implement VLANs. With the adoption of the 802.1Q standard, traffic can be confined to VLANs that exist on multiple switches from different vendors. This interoperability and traffic containment across different switches is the result of a switch's ability to use and recognize 802.1Q tag headers—called VLAN tagging. Switches that implement 802.1Q tagging add this tag header to the frame directly after the destination and source MAC addresses. The tag header indicates: 1. That the packet has a tag. 2. Whether the packet should have priority over other packets. 3. Which VLAN it belongs to, so that the switch can forward or filter it correctly. WDS (Wireless Distribution System) WDS creates wireless backhauls between arrays. These links between arrays may be used rather than having to install data cabling to each array. WEP (Wired Equivalent Privacy) An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers. 360 Glossary of Terms Wi-Fi Array Wi-Fi Alliance A nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance's members is to enhance the user experience through product interoperability. Wi-Fi Array A high capacity Wi-Fi networking device consisting of multiple radios arranged in a circular array. WPA (Wi-Fi Protected Access) A Wi-Fi Alliance standard that contains a subset of the IEEE 802.11i standard, using TKIP as an encryption method and 802.1x for authentication. WPA2 (Wi-Fi Protected Access 2) WPA2 is the follow-on security method to WPA for wireless networks and provides stronger data protection and network access control. It offers Enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Like WPA, WPA2 is designed to secure all versions of 802.11 devices, including 802.11a, 802.11b, 802.11g, and 802.11n, multi-band and multi-mode. Xirrus Management System (XMS) A Xirrus product used for managing large Wi-Fi Array deployments from a centralized Web-based interface. XP1 and XP8—Power over Gigabit Ethernet modules See PoGE. XPS—Xirrus Power System A family of optional Xirrus products that provides power over Gigabit Ethernet. See PoGE. Glossary of Terms 361 Wi-Fi Array Use this Space for Your Notes 362 Glossary of Terms Wi-Fi Array Index Symbols 1, 6, 7, 27, 32, 38, 40, 42, 45, 48, 49, 50, 52, 54, 60, 61, 73, 76, 77, 84, 89, 109, 134, 141, 148, 151, 152, 154, 157, 164, 168, 172, 182, 189, 204, 209, 214, 217, 227, 229, 231, 234, 235, 309, 312, 314, 316, 318, 321, 323, 325, 326, 327, 329, 333, 334, 336, 339 Numerics 4.9 GHz Public Safety Band 226 802.11a 6, 7, 14, 73, 189, 204, 214 802.11a/b/g 14, 30 802.11b 6, 7, 217 802.11b/g 14 802.11e 15 802.11g 6, 7 802.11i 7, 77, 134 802.11p 15 802.11q 15 802.1x 7, 42, 48, 336 abg2 intrusion detection 222 self-monitoring, loopback mode 223 AC power 42, 50, 52, 309, 312 Access Control List 164 access control lists (ACLs) 172 Access Panel 321 access panel reinstalling 312 removing 309 ACLs 164 Index Admin ID 168 administration 164 Administrator Account 329 advanced intrusion detection 222 AES 15, 327 approved setting rogues 109 APs 109, 182 rogues, blocking 222 APs, rogue see rogue APs 221 Array 32, 54, 60, 61, 84, 141 assurance (radio loopback testing) 221 authentication 15 auto-blocking rogue APs 222 auto-configuration 209 channel and cell size 221 backhaul see WDS 46 backup unit see standby mode 221 beam distribution 14 benefits 13 blocking rogue APs 222 blocking rogue APs 221 broadcast fast roaming 212 BSS 334 cdp 262 CDP (Cisco Discovery Protocol) settings 149 cdp CLI command 262 cell sharp cell 221 363 Wi-Fi Array cell size 325 auto-configuration 221 cell size configuration 221 channel auto-configuration 221 configuration 221 list selection 221 public safety 221 channels non-overlapping 15 character restrictions 89 Chassis Cover 318 chassis cover 318 Cisco Discovery Protocol see cdp 262 Cisco Discovery Protocol (CDP) 149 CLI 76, 249 using to upgrade software image 344 CLI commands see commands 262 Command Line Interface 7, 45, 249 configuration commands 260 getting help 250 getting started 250 inputting commands 250 sample configuration tasks 291 SSH 249 top level commands 252 commands acl 260 admin 261 cdp 262 clear 263 configure 253 contact-info 264 date-time 265 dhcp-server 266 dns 267 file 268 364 filter 269 group 271 hostname 271 https 272 interface 273 load 274 location 274 management 275 more 275 no 276 quit 278 radius-server 278 reboot 279, 289 reset 279 run-tests 280 security 282 show 256 snmp 283 ssh 284 ssid 285 standby 285 statistics 259 syslog 286 telnet 287 vlan 289 Community String 326 configuration 133 express setup 134 configuration changes applying 89 connection tracking window 102 Contact Information 349 contact information 349 coverage extended 14 coverage patterns 7 critical messages 86 Index Wi-Fi Array default settings 323 Default Value 327 DHCP 326 deployment 30, 38 ease of 15 DHCP 325 default settings 326 leases window 102 DHCP Server 151 DIMM 316 DIMM module replacing 316 DNS 148 dynamic VLAN overridden by group 199 factory default settings 323 factory defaults 329 DHCP 326 fail-over standby mode 221 failover 40 FAQs 334 Fast Ethernet 323 fast roaming 15, 99, 212 about 203 features 13, 154 feedback 87 filter policy to set QoS 236 filter list 234 filter name 235 filters 233 statistics 130 FLASH 314 FLASH memory replacing 314 frequently asked questions 334 FTP server 29 EAP-MDS 15 EAP-TLS 15 EAP-TTLS 15 encryption 15 encryption method recommended (WPA2 with AES) 166 setting 166 support of multiple methods 166 encryption method (encryption mode) Open, WEP, WPA, WPA2, WPABoth 165 encryption standard AES, TKIP, both 166 setting 166 Enterprise 1 event log see system log 132 event messages 86 express setup 77, 134 external RADIUS server 802.1x 29 Index General Hints 333 getting started express setup 134 glossary of terms 351 Group management 198 group 196 CLI command 271 VLAN overrides dynamic VLAN 199 help button 87 365 Wi-Fi Array HyperTerminal 28 IAP 227 fast roaming 203 IEEE 339 installation 27, 49, 305 installing the MCAP-3616 52 mounting the unit 54 requirements 27 unpacking the unit 50 workflow 49 installation workflow 49 integrated radio module replacing 318 interfaces 134 Web 83 Internet Explorer 28 intrusion detection 109, 222 configuration 221 setting as approved or known 109 IP Address 89, 157, 239 key features 13 Keyboard Shortcuts 330 keyboard shortcuts 330 known setting rogues 109 log, system (event) viewing window 132 logging in 89 loopback see self-monitoring 303 loopback testing, radios 221 MAC 336 MIC 15 monitoring intrusion detection 109 see intrusion detection 222 mounting the unit 54 NAT table - see connection tracking 102 Netscape Navigator 28 network interfaces 140 settings 141 network installation 27, 305 network status connection tracking window 102 routing table window 101 viewing leases 102 Network Time Protocol 152 non-overlapping channels 15 Layer 3 fast roaming 203 leases, DHCP viewing 102 list, access control see access control list 172 list, MAC access see access control list 172 366 Open (encryption method) 165 overview 7 passphrase 77 password 89 PEAP 15, 231 Index Wi-Fi Array performance 13 Ping 239 planning WDS 46 PoGE 10, 29 see Power over Gigabit Ethernet 10 power cord 309 power distribution 10 power outlet 27 Power over Gigabit Ethernet 2, 10, 17, 21, 27, 29, 42, 53 compatibility with Array models 349 Power over Gigabit Ethernet (PoGE) 10 power supply replacing 321 power switch 309 print button 87 product installation 27, 305 product overview 7 product specifications 16, 21 public safety band 226 public safety channels 221 PuTTy 28 QoS 15, 358 filter, policy to set QoS 236 levels defined 190, 199 SSID 185, 190 about setting QoS 335 default QoS 327 user group 199 Quality of Service 15 see QoS 190, 199 quick reference guide 323 quick start express setup 134 Index radio self-test 223 radio assurance (loopback testing) 221 radio assurance (loopback) mode 223 radio distribution 13 RADIUS 164 RADIUS server 29 remote DC power 10 Reset 239 RF intrusion detection 221 spectrum management 221 RF configuration 221 RF management see channel 221 RF resilience 221 RFprotect, see XDM 222 roaming 15, 99, 212 roaming, fast 203 rogue AP blocking 222 rogue APs blocking 221 rogue detection 14 rogues setting as known or approved 109 root command prompt 252 routing table window 101 schedule auto channel configuration 221 Secure Shell 28 security 7, 15 see group 196 self-monitoring 222, 303 options 223 self-test radio loopback mode 223 367 Wi-Fi Array serial port 28 Services 151 servicing 307 servicing the unit 305 setup, express 134 sharp cell 221 setting in WMI 225 SNMP 11, 134 software image upgrading via CLI 344 Software Upgrade 239 specifications 16, 21 spectrum (RF) management 221 SSH 28 SSID about usage 335 QoS 185, 190 about using 335 QoS, about usage 335 standby mode 221 stations rogues 109 statistics 130 statistics per station 131 statistics filters 130 per-station 131 stations 130 WDS 129 status bar 87 submitting comments 87 System Configuration Reset 239 system log viewing window 132 system memory replacing 316 System Reboot 239 System Tools 239 368 technical support contact information 349 frequently asked questions 334 timeout 239 TKIP 15 Tools 239 tunneled fast roaming 212 unknown setting rogues 109 unpacking the unit 50 upgrading software image via CLI 344 user group 196 QoS 199 user interface 83 VLAN dynamic overridden by group 199 group (vs. dynamic VLAN) 199 voice fast roaming 203 VoWLAN 15 wall thickness considerations 30 warning messages 86 WDS 229 about 46 planning 46 statistics 129 Web interface 83 structure and navigation 86 WEP 15, 164, 336 Index Wi-Fi Array WEP (Wired Equivalent Privacy) encryption method 165 workflow 49 WPA 164 WPA (Wi-Fi Protected Access) and WPA2 encryption method 166 WPA2 7 Xirrus Defense Module (XDM) 222 Xirrus Management System 7, 11, 15, 29 Xirrus Power over Gigabit Ethernet 27, 29 Xirrus Power over Gigabit Ethernet (PoGE) 10 Xirrus Roaming Protocol 15, 99, 212 XMS 7, 11, 15, 29 setting IP address of 157 XP1, XP8 see Power over Gigabit Ethernet 10 XPS 27, 29 XRP 15, 99, 212 XRPS 29 XS16 management 91, 133, 239 XS-3900 management 91, 133, 239 Index 369 Wi-Fi Array 370 Index
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.7 Linearized : No Tagged PDF : Yes XMP Toolkit : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39 Modify Date : 2008:06:18 10:54:45-07:00 Create Date : 2008:06:18 10:54:35-07:00 Metadata Date : 2008:06:18 10:54:45-07:00 Creator Tool : FrameMaker 7.1 Format : application/pdf Title : XN_PDF.book Creator : daves Document ID : uuid:a9def016-5885-437c-aa96-d22e984c35e1 Instance ID : uuid:28d0ff9b-4d29-4067-9d2c-dae41dd86eb3 Producer : Acrobat Distiller 8.1.0 (Windows) Page Count : 103 Author : davesEXIF Metadata provided by EXIF.tools