Cambium Networks XN8 Wireless LAN Array User Manual XN PDF

Xirrus, Inc. Wireless LAN Array XN PDF

Users Manual 5of5

Wi-Fi Array270 The Command Line Interfaceoff Disable a filter list.FORMAT:filter offon Enable a filter list.FORMAT:filter on reset Delete all protocol filters and filter lists.FORMAT:filter resetCommand Description
Wi-Fi ArrayThe Command Line Interface 271group The group command [Xirrus_Wi-Fi_Array(config)# group] is used to create and configure user groups. User groups allow administrators to assign specific network parameters to users through RADIUS privileges rather than having to map users to a specific SSID. Groups provide flexible control over user privileges without the need to create large numbers of SSIDs. For more information, see “Groups” on page 196. hostname The  hostname command [Xirrus_Wi-Fi_Array(config)# hostname] is used to change the hostname used by the Array.Command Descriptionadd Create a new user group. FORMAT:group add [group-name]del Delete a user group.FORMAT:group del [group-name]edit Set parameters values for a group. FORMAT:group edit [group-name]reset Reset the group.FORMAT:group resetCommand Descriptionhostname Change the hostname of the Array.FORMAT:hostname [name]
Wi-Fi Array272 The Command Line Interfacehttps The  https command [Xirrus_Wi-Fi_Array(config)# https] is used to enable or disable the Web Management Interface (https), which is enabled by default. It also allows you to establish a timeout for your Web management session.Command Descriptiondisable Disable the https feature.FORMAT:https disableenable Enable the https feature.FORMAT:https enableoff Disable the https feature.FORMAT:https offon Enable the https feature.FORMAT:https ontimeout Define an elapsed period (in seconds) after which the Web Management Interface will time out.FORMAT:https timeout 5000
Wi-Fi ArrayThe Command Line Interface 273interface The interface command [Xirrus_Wi-Fi_Array(config)# interface] is used to select the interface that you want to configure. To see a listing of the commands that are available for each interface, use the ? command at the selected interface prompt. For example, using the ? command at the Xirrus_Wi-Fi_Array(config-gig1}#prompt displays a listing of all commands for the gig1 interface.Command Descriptionconsole Select the console interface. The console interface is used for management purposes only.FORMAT:interface consoleeth0 Select the Fast Ethernet interface. The Fast Ethernet interface is used for management purposes only.FORMAT:interface eth0Note: To configure a static route for management traffic, next enter:static-route addr [ip-addr]static-route mask [subnet-mask]gig1 Select the Gigabit 1 interface.FORMAT:interface gig1gig2 Select the Gigabit 2 interface.FORMAT:interface gig2iap Select an IAP.FORMAT:interface iap
Wi-Fi Array274 The Command Line Interfaceload The  load command [Xirrus_Wi-Fi_Array(config)# load] loads a configuration file.location The location command [Xirrus_Wi-Fi_Array(config)# location] is used to set the location for the Array.Command Descriptionfactory.conf Load the factory settings configuration file. FORMAT:load [factory.conf]lastboot.conf Load the configuration file from the last boot-up. FORMAT:load [lastboot.conf][myfile].conf If you have saved a configuration, enter its name to load it. FORMAT:load [myfile.conf]saved.conf Load the configuration file with the last saved settings. FORMAT:load [saved.conf]Command Description<cr> Set the location for the Array.FORMAT:location [newlocation]When you enter the location, simply hit the Enter key <cr> to input the new location.
Wi-Fi ArrayThe Command Line Interface 275management The management command [Xirrus_Wi-Fi_Array(config)# management] enters management mode, where you may configure console management parameters.more The more command [Xirrus_Wi-Fi_Array(config)# more] is used to turn terminal pagination ON or OFF.Command Description<cr> Enter management mode.FORMAT:management <cr>Command Descriptionoff Turn OFF terminal pagination.FORMAT:more offon Turn ON terminal pagination.FORMAT:more on
Wi-Fi Array276 The Command Line Interfaceno The no command [Xirrus_Wi-Fi_Array(config)# no] is used to disable a selected element or set the element to its default value.Command Descriptionacl Disable the Access Control List.FORMAT:no acldot11a Disable all 802.11an IAPs (radios).FORMAT:no dot11adot11bg Disable all 802.11bg IAPs (radios).FORMAT:no dot11bghttps Disable https access.FORMAT:no httpsintrude-detect Disable intrusion detection.FORMAT:no intrude-detectmanagement Disable management on all Ethernet interfaces.FORMAT:no managementmore Disable terminal pagination.FORMAT:no morentp Disable the NTP server.FORMAT:no ntp
Wi-Fi ArrayThe Command Line Interface 277snmp Disable SNMP features.FORMAT:no snmpssh Disable ssh access.FORMAT:no sshsyslog Disable the syslog services.FORMAT:no syslogtelnet Disable Telnet access.FORMAT:no telnetETH-NAME Disable the selected Ethernet interface (eth0, gig1 or gig2). You cannot disable the console interface. with this command.FORMAT:no eth0 (gig1 or gig2)Command Description
Wi-Fi Array278 The Command Line Interfacequit The  quit command [Xirrus_Wi-Fi_Array(config)# quit] is used to exit the Command Line Interface.radius-server The  radius-server command [Xirrus_Wi-Fi_Array(config-radius-server)#] is used to configure the external and internal RADIUS server parameters.Command Description<cr> Exit the Command Line Interface.FORMAT:quitIf you have made any configuration changes and your changes have not been saved, you are prompted to save your changes to Flash.At the prompt, answer Yes to save your changes, or answer No to discard your changes.Command Descriptionexternal Configure the external RADIUS server.FORMAT:radius-server externalTo configure the RADIUS accounting server (primary or secondary, and the reporting interval) use:radius-server external accountinginternal Configure the external RADIUS server.FORMAT:radius-server internaluse Choose the active RADIUS server (either external or internal).FORMAT:use external (or internal)
Wi-Fi ArrayThe Command Line Interface 279reboot The reboot command [Xirrus_Wi-Fi_Array(config)# reboot] is used to reboot the Array. If you have unsaved changes, the command will notify you and give you a chance to cancel the reboot. reset The  reset command [Xirrus_Wi-Fi_Array(config)# reset] is used to reset all settings to their default values then reboot the Array.Command Description<cr> Reboot the Array.FORMAT:rebootdelay Reboot the Array after a delay of 1 to 60 seconds.FORMAT:reboot delay [n]Command Description<cr> Reset all configuration parameters to their factory default values.FORMAT:resetThe Array is rebooted automatically.preserve-ip-settingsPreserve all ethernet and VLAN settings and reset all other configuration parameters to their factory default values.FORMAT:reset preserve-ip-settingsThe Array is rebooted automatically.
Wi-Fi Array280 The Command Line Interfacerun-tests The  run-tests command [Xirrus_Wi-Fi_Array(run-tests)#] is used to enter run-tests mode, which allows you to perform a range of tests on the Array.Command Description<cr> Enter run-tests mode.FORMAT:run-tests iperf  Execute iperf utility.FORMAT:run-tests iperfkill-beacons Turn off beacons for selected single IAP.FORMAT:run-tests kill-beacons [off | iap-name] kill-probe-responses Turn off probe responses for selected single IAP.FORMAT:run-tests kill-probe-responses [off | iap-name] led  LED test.FORMAT:run-tests led [flash | rotate] memtest  Execute memory tests.FORMAT:run-tests memtestping  Execute ping utility.FORMAT:run-tests ping [host-name | ip-addr] rlb  Run manufacturing radio loopback test.FORMAT:run-tests rlb {optional command line switches]
Wi-Fi ArrayThe Command Line Interface 281self-test  Execute self-test.FORMAT:run-tests self-test {logfile-name (optional)]site-survey  Enable or disable site survey mode.FORMAT:run-tests site-survey [on | off | enable | disable] ssh  Execute ssh utility.FORMAT:run-tests ssh [hostname | ip-addr]      [command-line-switches (optional)] tcpdump  Execute tcpdump utility to dump traffic for selected interface or VLAN. FORMAT:run-tests tcpdumptelnet  Execute telnet utility.FORMAT:run-tests telnet [hostname | ip-addr]      [command-line-switches (optional)] traceroute  Execute traceroute utility.FORMAT:run-tests traceroute [host-name | ip-addr]Command Description
Wi-Fi Array282 The Command Line Interfacesecurity The  security command [Xirrus_Wi-Fi_Array(config-security)#] is used to establish the security parameters for the Array.Command Descriptionwep Set the WEP encryption parameters.FORMAT:security wepwpa Set the WEP encryption parameters.FORMAT:security wpa
Wi-Fi ArrayThe Command Line Interface 283snmp The  snmp command [Xirrus_Wi-Fi_Array(config-snmp)#] is used to enable, disable, or configure SNMP.Command Descriptioncommunity Set the SNMP read-only or read-write community string.FORMAT:snmp community [newcommunity]disable Disable SNMP.FORMAT:snmp disableenable Enable SNMP.FORMAT:snmp enableno Disable the selected feature.FORMAT:snmp no [feature]off Disable SNMP.FORMAT:snmp offon Enable SNMP.FORMAT:snmp ontrap-auth Send traps for authentication failures.FORMAT:snmp trap-auth [trap]trap-host[1-4] Set the SNMP trap IP address or host name. Up to four trap hosts may be set, one at a time.FORMAT:snmp trap-host 1.2.3.4
Wi-Fi Array284 The Command Line Interfacessh The ssh command [Xirrus_Wi-Fi_Array(config)# ssh] is used to enable or disable the SSH feature.trap-port[1-4] Set the SNMP trap port.FORMAT:snmp trap-port 240Command Descriptiondisable Disable SSH.FORMAT:ssh disableenable Enable SSH.FORMAT:ssh enableoff Disable SSH.FORMAT:ssh offon Enable SSH.FORMAT:ssh ontimeout Set the SSH inactivity timeout.FORMAT:ssh timeout 300 (in seconds)Command Description
Wi-Fi ArrayThe Command Line Interface 285ssid The ssid command [Xirrus_Wi-Fi_Array(config-ssid)#] is used to establish your SSID parameters.standby The  standby command [Xirrus_Wi-Fi_Array(config-ssid)#] sets this Array to function as a standby unit for another Array.Command Descriptionadd Add an SSID.FORMAT:ssid add [newssid]del Delete an SSID.FORMAT:ssid del [oldssid]edit Edit an existing SSID.FORMAT:ssid edit [existingssid]reset Delete all SSIDs and restore the default SSID.FORMAT:ssid resetCommand Descriptionmode Enable or disable standby mode on this Array.FORMAT:standby mode [disable|enable|off|on]target Specify the MAC address of the target Array to be monitored for failure.FORMAT:standby target [AA:BB:CC:DD:EE:FF]
Wi-Fi Array286 The Command Line Interfacesyslog The  syslog command [Xirrus_Wi-Fi_Array(config-syslog)#] is used to enable, disable, or configure the Syslog server.Command Descriptionconsole Enable or disable the display of Syslog messages on the console, and set the level to be displayed. All messages at this level and lower (i.e., more severe) will be displayed.FORMAT:syslog console [on/off] level [0-7]disable Disable the Syslog server.FORMAT:syslog disableemail Disable the Syslog server.FORMAT:syslog email from [email-from-address]     level [0-7]    password [email-acct-password]    server [email-server-IPaddr]     test [test-msg-text]    to-list [recipient-email-addresses]    user [email-acct-username]enable Enable the Syslog server.FORMAT:syslog enablelocal-file Set the size and/or severity level (all messages at this level and lower will be logged).FORMAT:syslog local-file size [1-500] level [0-7]no Disable the selected feature.FORMAT:syslog no [feature]
Wi-Fi ArrayThe Command Line Interface 287telnet The telnet command [Xirrus_Wi-Fi_Array(config)# telnet] is used to enable or disable Telnet.off Disable the Syslog server.FORMAT:syslog offon Enable the Syslog server.FORMAT:syslog onprimary Set the IP address of the primary Syslog server and/or the severity level of messages to be logged.FORMAT:syslog primary [1.2.3.4] level [0-7]secondary Set the IP address of the secondary (backup) Syslog server and/or the severity level of messages to be logged.FORMAT:syslog primary [1.2.3.4] level [0-7]Command Descriptiondisable Disable Telnet.FORMAT:telnet disableenable Enable Telnet.FORMAT:telnet enableCommand Description
Wi-Fi Array288 The Command Line Interfaceoff Disable Telnet.FORMAT:telnet offon Enable Telnet.FORMAT:telnet ontimeout Set the Telnet inactivity timeout.FORMAT:telnet timeout 300 (in seconds)Command Description
Wi-Fi ArrayThe Command Line Interface 289uptime The uptime command [Xirrus_Wi-Fi_Array(config)# uptime] is used to display the elapsed time since you last rebooted the Array. vlan The vlan command [Xirrus_Wi-Fi_Array(config-vlan)#] is used to establish your VLAN parameters.Command Description<cr> Display time since last reboot.FORMAT:uptimeCommand Descriptionadd Add a VLAN.FORMAT:vlan add [newvlan]default-route Assign a VLAN for the default route (for outbound management traffic).FORMAT:vlan default-route [defaultroute]delete Delete a VLAN.FORMAT:vlan delete [oldvlan]edit Modify an existing VLAN.FORMAT:vlan edit [existingvlan]native-vlan Assign a native VLAN (traffic is untagged).FORMAT:vlan native-vlan [nativevlan]
Wi-Fi Array290 The Command Line Interfaceno Disable the selected feature.FORMAT:vlan no [feature]reset Delete all existing VLANs.FORMAT:vlan resetCommand Description
Wi-Fi ArrayThe Command Line Interface 291Sample Configuration TasksThis section provides examples of some of the common configuration tasks used with the Wi-Fi Array, including:z“Configuring a Simple Open Global SSID” on page 292.z“Configuring a Global SSID using WPA-PEAP” on page 293.z“Configuring an SSID-Specific SSID using WPA-PEAP” on page 294.z“Enabling Global IAPs” on page 295.z“Disabling Global IAPs” on page 296.z“Enabling a Specific IAP” on page 297.z“Disabling a Specific IAP” on page 298.z“Setting Cell Size Auto-Configuration for All IAPs” on page 299z“Setting the Cell Size for All IAPs” on page 300.z“Setting the Cell Size for a Specific IAP” on page 301.z“Configuring VLANs on an Open SSID” on page 302.z“Configuring Self-Monitoring Mode (Loopback Tests)” on page 303.To facilitate the accurate and timely management of revisions to this section, the examples shown here are presented as screen images taken from a Secure Shell (SSH) session (in this case, PuTTY). Depending on the application you are using to access the Command Line Interface, and how your session is set up (for example, font and screen size), the images presented on your screen may be different than the images shown in this section. However, the data displayed will be the same.Some of the screen images shown in this section have been modified for clarity. For example, the image may have been “elongated” to show all data without the need for additional images or scrolling. We recommend that you use the Adobe PDF version of this User’s Guide when reviewing these examples—a hard copy document may be difficult to read.As mentioned previously, the root command prompt is determined by the host name assigned to your Array.
Wi-Fi Array292 The Command Line InterfaceConfiguring a Simple Open Global SSIDThis example shows you how to configure a simple open global SSID.Figure 142. Configuring a Simple Open Global SSID
Wi-Fi ArrayThe Command Line Interface 293Configuring a Global SSID using WPA-PEAPThis example shows you how to configure a global SSID using WPA-PEAP encryption in conjunction with the Array’s Internal RADIUS server.Figure 143. Configuring a Global SSID using WPA-PEAP
Wi-Fi Array294 The Command Line InterfaceConfiguring an SSID-Specific SSID using WPA-PEAPThis example shows you how to configure an SSID-specific SSID using WPA-PEAP encryption in conjunction with the Array’s Internal RADIUS server.Figure 144. Configuring an SSID-Specific SSID using WPA-PEAP
Wi-Fi ArrayThe Command Line Interface 295Enabling Global IAPsThis example shows you how to enable all IAPs (radios), regardless of the wireless technology they use.Figure 145. Enabling Global IAPs
Wi-Fi Array296 The Command Line InterfaceDisabling Global IAPsThis example shows you how to disable all IAPs (radios), regardless of the wireless technology they use.Figure 146. Disabling Global IAPs
Wi-Fi ArrayThe Command Line Interface 297Enabling a Specific IAPThis example shows you how to enable a specific IAP (radio). In this example, the IAP that is being enabled is a1 (the first IAP in the summary list).Figure 147. Enabling a Specific IAP
Wi-Fi Array298 The Command Line InterfaceDisabling a Specific IAPThis example shows you how to disable a specific IAP (radio). In this example, the IAP that is being disabled is a2 (the second IAP in the summary list).Figure 148. Disabling a Specific IAP
Wi-Fi ArrayThe Command Line Interface 299Setting Cell Size Auto-Configuration for All IAPsThis example shows how to set the cell size for all enabled IAPs to be auto-configured (auto). (See “Fine Tuning Cell Sizes” on page 35.) The auto_cell option may be used with global_settings, global_a_settings, or global_bg_settings. It sets the cell size of the specified IAPs to auto, and it launches an auto-configuration to adjust the sizes. Be aware that if the intrude-detect feature is enabled on abg2, its cell size is unaffected by this command. Also, any IAPs used in WDS links are unaffected. Auto-configuration may be set to run periodically at intervals specified by auto_cell period (in seconds) if period is non-zero. The percentage of overlap allowed between cells in the cell size computation is specified by auto_cell overlap (0 to 100). This example sets auto-configuration to run every 1200 seconds with an allowed overlap of 5%. It sets the cell size of all IAPs to auto, and runs a cell size auto-configure operation which completes successfully. Figure 149. Setting the Cell Size for All IAPs
Wi-Fi Array300 The Command Line InterfaceSetting the Cell Size for All IAPsThis example shows you how to establish the cell size for all IAPs (radios), regardless of the wireless technology they use. Be aware that if the intrude-detect feature is enabled on abg2 the cell size cannot be set globally—you must first disable the intrude-detect feature on abg2.In this example, the cell size is being set to small for all IAPs. You have the option of setting IAP cell sizes to small, medium, large, or max. See also, “Fine Tuning Cell Sizes” on page 35.Figure 150. Setting the Cell Size for All IAPs
Wi-Fi ArrayThe Command Line Interface 301Setting the Cell Size for a Specific IAPThis example shows you how to establish the cell size for a specific IAP (radio). In this example, the cell size for a2 is being set to medium. You have the option of setting IAP cell sizes to small, medium, large, or max (the default is max). See also, “Fine Tuning Cell Sizes” on page 35.Figure 151. Setting the Cell Size for a Specific IAP
Wi-Fi Array302 The Command Line InterfaceConfiguring VLANs on an Open SSIDThis example shows you how to configure VLANs on an Open SSID.Figure 152. Configuring VLANs on an Open SSID#Setting the default route enables the Array to send management traffic, such as syslog messages and SNMP information to a destination behind a router.
Wi-Fi ArrayThe Command Line Interface 303Configuring Self-Monitoring Mode (Loopback Tests)The Array uses the built-in monitor radio (IAP abg2) to monitor other radios in the Array. Tests include sending probes on all channels and checking for a response, and checking whether beacons are received from the other radio. If a problem is detected, corrective actions are taken to recover. Loopback mode operation is described in detail in “Array Monitor and Loopback Testing Capabilities” on page 341. The following actions may be configured: zalert-only—the Array will issue an alert in the Syslog. zrepair-without-reboot—the Array will issue an alert and reset radios at the Physical Layer (Layer 1) and possibly at the MAC layer. The reset should not be noticed by users, and they will not need to reassociate. zreboot-allowed—the Array will issue an alert, reset the radios, and schedule the Array to reboot at midnight (per local Array time) if necessary. All stations will need to reassociate to the Array. zoff—Disable IAP loopback tests (no self-monitoring occurs). Loopback tests are off by default.This is a global IAPs setting—abg2 will monitor all other radios according to the settings above, and it cannot be set up to monitor particular radios. Self-monitoring mode requires Intrusion Detection to be set to Standard.The following example shows you how to configure a loopback test.
Wi-Fi Array304 The Command Line InterfaceFigure 153. Configuring a Loopback Test
Wi-Fi Array305Appendices
Wi-Fi Array306Page is intentionally blank
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 307Appendix A: Servicing the Wi-Fi ArrayThis appendix contains procedures for servicing the Xirrus Wi-Fi Array, including the removal and reinstallation of major hardware components. Topics include:z“Removing the Access Panel” on page 309.z“Reinstalling the Access Panel” on page 312.z“Replacing the FLASH Memory Module” on page 314.z“Replacing the Main System Memory” on page 316.z“Replacing the Integrated Access Point Radio Module” on page 318.z“Replacing the Power Supply Module” on page 321.!!!Always turn OFF the Array’s power switch and disconnect the AC power cord before attempting to remove or replace components. Never work on the unit with the power connected.You must be grounded and the work surface must be static-free.Caution! The Array contains a battery which is not to be replaced by the customer. Danger of Explosion exists if the battery is incorrectly replaced. Figure 154. Disconnecting Power from the Array#Most service activities are performed with the Array placed face-down on a flat work surface. To avoid damaging the finished enclosure, we recommend using a protective material between the work surface and the unit (a clean sheet of paper will do the trick).Power switchAC power cord receptacle
Wi-Fi Array308 Appendix A: Servicing the Wi-Fi ArraySee AlsoReinstalling the Access PanelRemoving the Access PanelReplacing the FLASH Memory ModuleReplacing the Integrated Access Point Radio ModuleReplacing the Main System MemoryReplacing the Power Supply Module
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 309Removing the Access PanelUse this procedure when you want to remove the system’s access panel. You must remove this panel whenever you need to service the internal components of the Array.1. Turn OFF the Array’s main power switch (XN16 and XN8 only). 2. Disconnect the AC power cord from the Array.3. Place the Array face-down on a flat surface. Avoid moving the unit to reduce the risk of damage (scratching) to the finished enclosure.4. Remove the screws (3 places) that secure the access panel to the main body of the Array.Figure 155. Removing the Access Panel ScrewsScrewScrewScrew
Wi-Fi Array310 Appendix A: Servicing the Wi-Fi Array5. Lift up the access panel to reveal the main system board.Figure 156. Removing the Access Panel6. Disconnect the connectors to the power supply and the fan.Figure 157. Disconnecting the Power Supply and Fan7. The access panel can now be safely removed.Lift up the access panelPower supply connectorFan connector
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 311See AlsoReinstalling the Access PanelReplacing the FLASH Memory ModuleReplacing the Integrated Access Point Radio ModuleReplacing the Main System MemoryReplacing the Power Supply ModuleAppendix A: Servicing the Wi-Fi Array
Wi-Fi Array312 Appendix A: Servicing the Wi-Fi ArrayReinstalling the Access PanelUse this procedure when you need to reinstall the access panel after servicing the Array’s internal components.1. Reconnect the fan and power supply.Figure 158. Reconnecting the Fan and Power Supply2. Reinstall the access panel and secure the panel with the three screws.Figure 159. Reinstalling the Access Panel3. Reconnect the AC power cord and turn ON the main power switch.Power supply connectorFan connectorScrew!Do not overtightenScrew!Do not overtightenScrew!Do not overtighten
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 313See AlsoRemoving the Access PanelReplacing the FLASH Memory ModuleReplacing the Integrated Access Point Radio ModuleReplacing the Main System MemoryReplacing the Power Supply ModuleAppendix A: Servicing the Wi-Fi Array
Wi-Fi Array314 Appendix A: Servicing the Wi-Fi ArrayReplacing the FLASH Memory ModuleUse this procedure when you want to replace the system’s FLASH memory module.1. Remove the system’s access panel. Refer to “Removing the Access Panel” on page 309.2. Remove the FLASH memory module, taking care not to “wiggle” the module and risk damaging the connection points.Figure 160. Removing the FLASH Memory Module3. The removal procedure is complete. You can now reinstall the FLASH memory module (or install a new module).FLASH memory module
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 3154. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312).See AlsoReinstalling the Access PanelRemoving the Access PanelReplacing the Integrated Access Point Radio ModuleReplacing the Main System MemoryReplacing the Power Supply ModuleAppendix A: Servicing the Wi-Fi Array
Wi-Fi Array316 Appendix A: Servicing the Wi-Fi ArrayReplacing the Main System MemoryUse this procedure when you want to replace the main system memory.1. Remove the access panel (refer to “Removing the Access Panel” on page 309).2. Remove the DIMM memory module, taking care not to “wiggle” the module and risk damaging the connection points.Figure 161. Removing the DIMM Memory Module3. The removal procedure is complete. You can now reinstall the DIMM memory module (or install a new module). Ensure that the DIMM memory module is seated evenly and the locking tabs are in the upright position. The DIMM memory module is keyed to fit in its socket in one direction only.4. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312).See AlsoReinstalling the Access PanelRemoving the Access PanelReplacing the FLASH Memory ModuleDIMM memory modulePush down on the two locking tabs to release the DIMM memory module
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 317Replacing the Integrated Access Point Radio ModuleReplacing the Power Supply ModuleAppendix A: Servicing the Wi-Fi Array
Wi-Fi Array318 Appendix A: Servicing the Wi-Fi ArrayReplacing the Integrated Access Point Radio ModuleUse this procedure when you want to replace the integrated access point radio module.1. Remove the access panel (refer to “Removing the Access Panel” on page 309).2. Remove the locking screws (8 places) that secure the chassis cover to the main body of the Wi-Fi Array.Figure 162. Removing the Chassis Cover Screws3. Lift and remove the chassis cover.Figure 163. Removing the Chassis CoverScrews (8 places)Remove the chassis cover
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 3194. Lift the edge of the integrated access point module.Figure 164. Lifting the Integrated Access Point Module5. Slide the integrated access point module away from the unit to disconnect it from the main system board.Figure 165. Disconnect the Integrated Access Point Module6. The removal procedure is complete. You can now reinstall the integrated access point module (or install a new module).Lift here (do not force)Disconnect the module
Wi-Fi Array320 Appendix A: Servicing the Wi-Fi Array7. Reinstall the chassis cover (see warnings).8. Reinstall the locking screws (8 places) to secure the chassis cover in place—do not overtighten.9. Reinstall the access panel (refer to “Reinstalling the Access Panel” on page 312).See AlsoReinstalling the Access PanelRemoving the Access PanelReplacing the FLASH Memory ModuleReplacing the Main System MemoryReplacing the Power Supply ModuleAppendix A: Servicing the Wi-Fi Array!!When reinstalling the chassis cover, take care to align the cover correctly to avoid damaging the antenna modules. Do not force the chassis cover onto the body of the unit.Do not overtighten the locking screws.
Wi-Fi ArrayAppendix A: Servicing the Wi-Fi Array 321Replacing the Power Supply ModuleUse this procedure when you want to replace the power supply module.1. Remove the access panel (refer to “Removing the Access Panel” on page 309).2. Because the power supply unit is molded into the access panel, you must install a new access panel assembly (with the power supply attached). Refer to “Reinstalling the Access Panel” on page 312.Figure 166. Installing a New Access Panel (with Power Supply)See AlsoReinstalling the Access PanelRemoving the Access PanelReplacing the FLASH Memory ModuleReplacing the Integrated Access Point Radio ModuleReplacing the Main System MemoryAppendix A: Servicing the Wi-Fi ArrayAccess panel (with power supply and fan)
Wi-Fi Array322 Appendix A: Servicing the Wi-Fi ArrayUse this Space for Your Notes
Wi-Fi ArrayAppendix B: Quick Reference Guide 323Appendix B: Quick Reference GuideThis section contains product reference information. Use this section to locate the information you need quickly and efficiently. Topics include:z“Factory Default Settings” on page 323.Factory Default SettingsThe following tables show the Wi-Fi Array’s factory default settings.Host NameNetwork InterfacesSerialGigabit 1 and Gigabit 2Setting Default ValueHost name Xirrus-WiFi-ArraySetting Default ValueBaud Rate 115200Word Size 8 bitsStop Bits 1Parity No parityTime Out 10 secondsSetting Default ValueEnabled Yes
Wi-Fi Array324 Appendix B: Quick Reference GuideFast EthernetDHCP Bind YesDefault IP Address 10.0.2.1Default IP Mask 255.255.255.0Default Gateway NoneAuto Negotiate OnDuplex FullSpeed 1000 MbpsMTU Size 1504Management Enabled YesSetting Default ValueEnabled YesDHCP Bind YesDefault IP Address 10.0.1.1Default IP Mask 255.255.255.0Default Gateway NoneAuto Negotiate OnDuplex FullSpeed 100 MbpsMTU Size 1500Management Enabled YesSetting Default Value
Wi-Fi ArrayAppendix B: Quick Reference Guide 325Integrated Access Points (IAPs)Server SettingsNTPSetting Default ValueIAP abg2 Defaults EnabledMode = MonitorChannel = MonitorCell Size = ManualAntenna = Internal-OmniEnabled (Radio State) NoModezXN16zXN8zXN4802.11an for a1 to a12802.11bg for abg1 to abg4802.11an for a1 to a4802.11bg for abg1 to abg4802.11bg for abg1 to abg4Channel AutoCell Size MaxMaximum Transmit Power 20Antenna Selected InternalSetting Default ValueEnabled NoPrimary time.nist.govSecondary pool.ntp.org
Wi-Fi Array326 Appendix B: Quick Reference GuideSyslogSNMPDHCPSetting Default ValueEnabled YesLocal Syslog Level InformationMaximum Internal Records 500Primary Server NonePrimary Syslog Level InformationSecondary Server NoneSecondary Syslog Level InformationSetting Default ValueEnabled YesRead-Only Community String xirrus_read_onlyRead-Write Community String xirrusTrap Host null (no setting)Trap Port 162Authorization Fail Port OnSetting Default ValueEnabled NoMaximum Lease Time 300 minutesDefault Lease Time 300 minutes
Wi-Fi ArrayAppendix B: Quick Reference Guide 327Default SSIDSecurity   Global Settings - Encryption   IP Start Range 192.168.1.2IP End Range 192.168.1.254NAT DisabledIP Gateway NoneDNS Domain  NoneDNS Server (1 to 3) NoneSetting Default ValueID xirrusVLAN NoneEncryption OffEncryption Type NoneQoS 2Enabled YesBroadcast OnSetting Default ValueEnabled YesWEP Keys null (all 4 keys)Setting Default Value
Wi-Fi Array328 Appendix B: Quick Reference GuideExternal RADIUS (Global) WEP Key Length null (all 4 keys)Default Key ID 1WPA Enabled NoTKIP Enabled YesAES Enabled YesEAP Enabled YesPSK Enabled NoPass Phrase nullGroup Rekey DisabledSetting Default ValueEnabled YesPrimary Server NonePrimary Port 1812Primary Secret xirrusSecondary Server null (no IP address)Secondary Port 1812Secondary Secret null (no secret)Time Out (before primary server is retired) 600 secondsAccounting DisabledInterval 300 secondsSetting Default Value
Wi-Fi ArrayAppendix B: Quick Reference Guide 329Internal RADIUSAdministrator Account and PasswordManagementPrimary Server NonePrimary Port 1813Primary Secret xirrusSecondary Server NoneSecondary Port 1813Secondary Secret null (no secret)Setting Default ValueEnabled NoThe user database is cleared upon reset to the factory defaults. For the Internal RADIUS Server you have a maximum of 1,000 entries.Setting Default ValueID adminPassword adminSetting Default ValueSSH OnSSH timeout 300 secondsSetting Default Value
Wi-Fi Array330 Appendix B: Quick Reference GuideKeyboard ShortcutsThe following table shows the most common keyboard shortcuts used by the Command Line Interface.Telnet OffTelnet timeout 300 secondsSerial OnSerial timeout 300 secondsManagement over IAPs Offhttp timeout 300 secondsAction ShortcutCut selected data and place it on the clipboard. Ctrl + XCopy selected data to the clipboard. Ctrl + CPaste data from the clipboard into a document (at the insertion point). Ctrl + VGo to top of screen. Ctrl + ZCopy the active window to the clipboard. Alt + Print ScreenCopy the entire desktop image to the clipboard. Print ScreenAbort an action at any time.  EscGo back to the previous screen. bAccess the Help screen. ?Setting Default Value
Wi-Fi ArrayAppendix B: Quick Reference Guide 331See AlsoAn Overview
Wi-Fi Array332 Appendix B: Quick Reference GuideUse this Space for Your Notes
Wi-Fi ArrayAppendix C: Technical Support 333Appendix C: Technical SupportThis appendix provides valuable support information that can help you resolve technical difficulties. Before contacting Xirrus, review all topics below and try to determine if your problem resides with the Wi-Fi Array or your network infrastructure. Topics include:z“General Hints and Tips” on page 333z“Frequently Asked Questions” on page 334z“Array Monitor and Loopback Testing Capabilities” on page 341z“Upgrading the Array via CLI” on page 344z“Contact Information” on page 349z“Contact Information” on page 349General Hints and TipsThis section provides some useful tips that will optimize the reliability and performance of your Wi-Fi Arrays.zThe Wi-Fi Array requires careful handling. For best performance, units should be mounted in a dust-free and temperature-controlled environment.zIf using multiple Arrays in the same area, maintain a distance of at least 100 feet (30m) between Arrays if there is direct line-of-sight between the units, or at least 50 feet (15 m) if a wall or other barrier exists between the units.zKeep the Wi-Fi Array away from electrical devices or appliances that generate RF noise. Because the Array is generally mounted on ceilings, be aware of its position relative to lighting (especially fluorescent lighting).zIf using AC power, each Wi-Fi Array requires its own dedicated AC power outlet. Do not attempt to “piggy-back” AC power to multiple units. To avoid needing to run separate power cables to one or more Arrays, consider using Power over Gigabit Ethernet.
Wi-Fi Array334 Appendix C: Technical SupportzIf you are deploying multiple units, the Array should be oriented so that the abg2 radio is oriented in the direction of the least required coverage, because when in monitor mode the abg2 radio does not function as an AP servicing stations.zThe Wi-Fi Array should only be used with Wi-Fi certified client devices.See AlsoContact InformationMultiple SSIDsSecurityVLAN SupportFrequently Asked QuestionsThis section answers some of the most frequently asked questions, organized by functional area.Multiple SSIDsQ. What Are BSSIDs and SSIDs?A. BSSID (Basic Service Set Identifier) refers to an individual access point radio and its associated clients. The identifier is the MAC address of the access point radio that forms the BSS.A group of BSSs can be formed to allow stations in one BSS to communicate to stations in another BSS by way of a backbone that interconnects each access point.The Extended Service Set (ESS) refers to the group of BSSIDs that are grouped together to form one ESS. The ESSID (often referred to as SSID or “wireless network name”) identifies the Extended Service Set. Clients must associate to a single ESS at any given time. Clients ignore traffic from other Extended Service Sets that do not have the same SSID.Legacy access points typically support one SSID per access point. Xirrus Wi-Fi Arrays support the ability for multiple SSIDs to be defined and used simultaneously.
Wi-Fi ArrayAppendix C: Technical Support 335Q. What would I use SSIDs for?A. The creation of different wireless network names allows system administrators to separate types of users with different requirements. The following policies can be tied to an SSID:zMinimum security required to join this SSID.zThe wireless Quality of Service (QoS) desired for this SSID.zThe wired VLAN associated with this SSID.As an example, one SSID named accounting might require the highest level of security, while another SSID named guests might have low security requirements.Another example may define an SSID named voice that supports voice over Wireless LAN phones with the highest possible Quality of Service (QoS) definition. This type of SSID might also forward traffic to specific VLANs on the wired network.Q. How do I set up SSIDs?A. Use the following procedure as a guideline. For more detailed information, go to “SSIDs” on page 184.1. From the Web Management Interface, go to the SSID Management page.2. Select Yes to make the SSID visible to all clients on the network. Although the Wi-Fi Array will not broadcast SSIDs that are hidden, clients can still associate to a hidden SSID if they know the SSID name to connect to it.3. Select the minimum security that will be required by users for this SSID.4. If desired (optional), select a Quality of Service (QoS) setting for this SSID. The QoS setting you define here will prioritize wireless traffic for this SSID over other SSID wireless traffic.5. If desired (optional), select a VLAN that you want this traffic to be forwarded to on the wired network.
Wi-Fi Array336 Appendix C: Technical Support6. If desired (optional), you can select which radios this SSID will not be available on—the default is to make this SSID available on all radios.7. Click on the Apply button to apply your changes to this session.8. Click on the Save button to save your changes.9. If you need to edit any of the SSID settings, you can do so from the SSID Management page.See AlsoContact InformationGeneral Hints and TipsSecuritySSIDsSSID ManagementVLAN SupportSecurityQ. How do I know my management session is secure?A. Follow these guidelines:zAdministrator passwordsAlways change the default administrator password (the default is  admin), and choose a strong replacement password. When appropriate, issue read only administrator accounts.zSSH versus TelnetBe aware that Telnet is not secure over network connections and should be used only with a direct serial port connection. When connecting to the unit’s Command Line Interface over a network connection, you must use a Secure SHell (SSH) utility. The most commonly used freeware providing SSH tools is PuTTY.zConfiguration auditing
Wi-Fi ArrayAppendix C: Technical Support 337Do not change approved configuration settings. The optional Xirrus Management System (XMS) offers powerful management features for small or large Wi-Fi Array deployments, and can audit your configuration settings automatically. In addition, using the XMS eliminates the need for an FTP server.Q. Which wireless data encryption method should I use?A. Wireless data encryption prevents eavesdropping on data being transmitted or received over the airwaves. The Wi-Fi Array allows you to establish the following data encryption configuration options:zOpenThis option offers no data encryption and is not recommended, though you might choose this option if clients are required to use a VPN connection through a secure SSH utility, like PuTTy.zWEP (Wired Equivalent Privacy)This option provides minimal protection (though much better than using an open network). An early standard for wireless data encryption and supported by all Wi-Fi certified equipment, WEP is vulnerable to hacking and is therefore not recommended for use by Enterprise networks.zWPA (Wi-Fi Protected Access)This is a much stronger encryption model than WEP and uses TKIP (Temporal Key Integrity Protocol) with AES (Advanced Encryption Standard) to prevent WEP cracks.TKIP solves security issues with WEP. It also allows you to establish encryption keys on a per-user-basis, with key rotation for added security. In addition, TKIP provides Message Integrity Check (MIC) functionality and prevents active attacks on the wireless network.AES is the strongest encryption standard and is used by government agencies; however, old legacy hardware may not be capable of supporting the AES mode (it probably won’t work on older wireless clients). Because AES is the strongest encryption
Wi-Fi Array338 Appendix C: Technical Supportstandard currently available, it is highly recommended for Enterprise networks.Any of the above encryption modes can be used (and can be used at the same time).Q. Which user authentication method should I use?A. User authentication ensures that users are who they say they are. For example, the most obvious example of authentication is logging in with a user name and password. The Wi-Fi Array allows you to choose between the following user authentication methods:zPre-Shared KeyUsers must manually enter a key (pass phrase) on the client side of the wireless network that matches the key stored by the administrator in your Wi-Fi Arrays.zRADIUS 802.1x with EAP802.1x uses a RADIUS server to authenticate large numbers of clients, and can handle different EAP (Extensible Authentication Protocol) authentication methods, including EAP-TLS, EAP-TTLS and EAP-PEAP. The RADIUS server can be internal (provided by the Wi-Fi Array) or external. An external RADIUS server offers more functionality and is recommended for large Enterprise deployments.When using this method, user names and passwords must be entered into the RADIUS server for user authentication.zMAC Address ACLs (Access Control Lists)MAC address ACLs provide a list of client adapter MAC addresses that are allowed or denied access to the wireless network. Access Control Lists work well when there are a limited number of users—in this case, enter the MAC addresses of each user in the Allow list. In the event of a lost or stolen MAC adapter, enter the affected MAC address in the Deny list.Q. Why do I need to authenticate my Wi-Fi Array units?
Wi-Fi ArrayAppendix C: Technical Support 339A. When deploying multiple Wi-Fi Arrays, you may need to define which units are part of which wireless network (for example, if you are establishing more than one network). In this case, you need to employ the Xirrus Management System (XMS) which can authenticate your Arrays automatically and ensure that only authorized units are associated with the defined wireless network.Q. What is rogue AP (Access Point) detection?A. The Wi-Fi Array has a dedicated radio (abg/4) which constantly scans the local wireless environment for rogue APs (non-Xirrus devices that are not part of your wireless network), unencrypted transmissions, and other security issues. Administrators can then classify each rogue AP and ensure that these devices do not interrupt or interfere with the network.See AlsoContact InformationGeneral Hints and TipsMultiple SSIDsVLAN SupportVLAN SupportQ. What Are VLANs?A. VLANs (Virtual Local Area Networks) are a logical grouping of network devices that share a common network broadcast domain. Members of a particular VLAN can be on any segment of the physical network but logically only members of a particular VLAN can see each other.VLANs are defined and implemented using the wired network switches that are VLAN capable. Packets are tagged for transmission on a particular VLAN according to the IEEE 802.1Q standard, with VLAN switches processing packets according to the tag.Q. What would I use VLANs for?
Wi-Fi Array340 Appendix C: Technical SupportA. Logically separating different types of users, systems, applications, or other logical division aids in performance and management of different network devices. Different VLANs can also be assigned with different packet priorities to prioritize packets from one VLAN over packets from another VLAN.VLANs are managed by software settings—instead of physically plugging in and moving network cables and users—which helps to ease network management tasks.Q. What are Wireless VLANs?A. Wireless VLANs allow similar functionality to the wired VLAN definitions and extend the operation of wired VLANs to the wireless side of the network.Wireless VLANs can be mapped to wireless SSIDs so that traffic from wired VLANs can be sent to wireless users of a particular SSID. The reverse is also true, where wireless traffic originating from a particular SSID can be tagged for transmission on a particular wired VLAN.Sixteen SSIDs can be defined on your Wi-Fi Array, allowing a total of sixteen VLANs to be accessed (one per SSID).As an example, to provide guest user access an SSID of guest might be created. This SSID could be mapped to a wired VLAN that segregates unknown users from the rest of the wired network and restricts them to Internet access only. Wireless users could then associate to the wireless network via the guest SSID and obtain access to the Internet through the selected VLAN, but would be able to access other privileged network resources.See AlsoContact InformationGeneral Hints and TipsMultiple SSIDsSecurity
Wi-Fi ArrayAppendix C: Technical Support 341Array Monitor and Loopback Testing CapabilitiesAll models of the Wi-Fi Array have a monitor radio, abg2, that checks that the Array’s radios are functioning correctly, and acts as a dedicated threat sensor to detect and prevent intrusion from rogue access points. Enabling Monitoring on the ArrayIAP abg2 may be set to monitor the Array or to be a normal IAP radio. In order to enable the functions required for intrusion detection and for monitoring the other Array radios, you must configure abg2 on the IAP Settings window as follows:zCheck the Enabled checkbox.zSet Mode to Monitor.zSet Channel to Monitor.The settings above will automatically set the Antenna selection to Internal-Omni., also required for monitoring. See the “IAP Settings” on page 204for more details. The values above are the factory default settings for the Array. How Monitoring WorksWhen the monitor radio abg2 has been configured as just described, it performs these steps continuously (24/7) to check the other radios on the Array and detect possible intrusions:1. The monitor radio scans all channels with a 200ms dwell time, hitting all channels about once every 10 seconds.2. Each time it tunes to a new channel it sends out a probe request in an attempt to smoke out rogues.3. It then listens for all probe responses and beacons to detect any rogues within earshot.4. Array radios respond to that probe request with a probe response.Intrusion Detection is enabled or disabled separately from monitoring. See Step 1in “Advanced RF Settings” on page 221. Note that the Advanced setting is only used with the optional Xirrus Defense Module (XDM) software package.
Wi-Fi Array342 Appendix C: Technical SupportLoopback TestingThe Array is capable of performing continuous, comprehensive tests on its radios to assure that they are operating properly. Testing is enabled using the Radio Assurance Mode setting on the Advanced RF Settings window (Step 5 in “Advanced RF Settings” on page 221). When this mode is enabled, IAP abg2 performs loopback tests on the Array. Radio Assurance Mode (also called loopback mode) requires Intrusion Detection to be set to Standard (See Step 1 in “Advanced RF Settings” on page 221). When Loopback Mode is enabled:1. The Array keeps track of whether or not it hears beacons and probe responses from the Array’s radios. 2. After 10 minutes (roughly 60 passes on a particular channel by the monitor radio), if it has not heard beacons or probe responses from one of the Array’s radios it issues an alert in the Syslog. If repair is allowed (see “Loopback Mode Options” on page 343), the Array will reset and reprogram that particular radio at the Physical Layer (PHY—Layer 1). This action takes under 100ms and stations are not deauthenticated, thus users should not be impacted.3. After another 10 minutes (roughly another 60 passes), if the monitor still has not heard beacons or probe responses from the malfunctioning radio it will again issue an alert in the Syslog. If repair is allowed, the Array will reset and reprogram the MAC (the lower sublayer of the Data Link Layer) and then all of the PHYs. This is a global action that affects all radios. This action takes roughly 300ms and stations are not deauthenticated, thus users should not be impacted.4. After another 10 minutes, if the monitor still has not heard beacons or probe responses from that radio, it will again syslog the issue. If reboot is allowed (see “Loopback Mode Options” on page 343), the Array will schedule a reboot. This reboot will occur at one of the following times, whichever occurs first:•When no stations are associated to the Array•Midnight
Wi-Fi ArrayAppendix C: Technical Support 343Loopback Mode OptionsIf the monitor detects a problem with an Array radio as described above, it will take action according to the preference that you have specified in the Radio Assurance Mode setting on the Advanced RF Settings window (see Step 5page 223):zFailure alerts only—The Array will issue alerts in the Syslog, but will not initiate repairs or reboots.zFailure alerts & repairs, but no reboots—The Array will issue alerts and perform resets of the PHY and MAC as described above. zFailure alerts & repairs & reboots if needed—The Array will issue alerts, perform resets of the PHY and MAC, and schedule reboots as described above. zDisabled—Disable IAP loopback tests (no self-monitoring occurs). Loopback tests are disabled by default.
Wi-Fi Array344 Appendix C: Technical SupportUpgrading the Array via CLIIf you are experiencing difficulties communicating with the Array using the Web Management Interface, the Array provides lower-level facilities that may be used to accomplish an upgrade via the CLI and the Xirrus Boot Loader (XBL).1. Download the latest software update from the Xirrus FTP site using your Enhanced Care FTP username and password. If you do not have an FTP username and password, contact Xirrus Customer Service for assistance (support@xirrus.com). The software update is provided as a zip file. Unzip the contents to a local temp directory. Take note of the extracted file name in case you need it later on—you may also need to copy this file elsewhere on the network depending on your situation.2. Install a TFTP server software package if you don't have one running. It may be installed on any PC on your network, including your desktop or laptop. The Solar Winds version is freeware and works well. http://support.solarwinds.net/updates/New-customerFree.cfm?ProdId=52The TFTP install process creates the TFTP-Root directory on your C: drive, which is the default target for sending and receiving files. This may be changed if desired. This directory is where you will place the extracted Xirrus software update file(s). If you install the TFTP server on the same computer to which you extracted the file, you may change the TFTP directory to C:\xirrus if desired. You must make the following change to the default configuration of the Solar Winds TFTP server. In the File/Configure menu, select Security, then select Tra nsmi t o nly and click OK.3. Determine the IP address of the computer hosting the TFTP server. (To display the IP address, open a command prompt and type ipconfig)4. Connect your Array to the computer running TFTP using a serial cable, and open a terminal program if you haven't already. Attach a network cable to the Array’s GIG1 port, if it is not already part of your network.
Wi-Fi ArrayAppendix C: Technical Support 345Boot your Array and watch the progress messages. When Press space bar to exit to bootloader: is displayed, press the space bar. The rest of this procedure is performed using the bootloader. The following steps assume that you are running DHCP on your local network. 5. Type  dhcp and hit return. This instructs the Array to obtain a DHCP address and use it during this boot in the bootloader environment. 6. Type dir and hit return to see what's currently in the compact flash. 7. Type del and hit return to delete the contents of the compact flash. 8. Type  update server <TFTP-server-ip-addr> xs-3.x-xxxx.bin (the actual Xirrus file name will vary depending on Array model number and software version—use the file name from your software update) and hit return. The software update will be transferred to the Array's memory and will be written to the it’s compact flash card. (See output below.)9. Type  reset and hit return. Your Array will reboot, running your new version of software. Sample Output for the Upgrade Procedure:The user actions are highlighted in the output below, for clarity.Username: adminPassword: *****Xirrus-WiFi-Array# configureXirrus-WiFi-Array(config)# rebootAre you sure you want to reboot? [yes/no]: yesArray is being rebooted.Xirrus Boot Loader 1.0.0 (Oct 17 2006 - 13:11:42), Build: 2725Processor  | Motorola PowerPC, PVR=80200020 SVR=80300020Board      | Xirrus MPC8540 CPU BoardClocks     | CPU : 825 MHz   DDR : 330 MHz   Local Bus: 41 MHz
Wi-Fi Array346 Appendix C: Technical SupportL1 cache   | Data:  32 KB    Inst:  32 KB    Status   : EnabledWatchdog   | Enabled (5 secs)I2C Bus    | 400 KHzDTT        | CPU:34C  RF0:34C  RF1:34C  RF2:27C  RF3:29CRTC        | Wed 2007-Nov-05  6:43:14 GMTSystem DDR | 256 MB, Unbuffered Non-ECC (2T)L2 cache   | 256 KB, EnabledFLASH      |   4 MB, CRC: OKFPGA       |   2 Devices programmedPacket DDR | 256 MB, Unbuffered Non-ECC, EnabledNetwork    | Mot FEC    Mot TSEC1 [Primary]  Mot TSEC2IDE Bus 0  | OKCFCard     | 122 MB, Model: Hitachi XXM2.3.0Environment|   4 KB, InitializedIn:    serialOut:   serialErr:   serialPress space bar to exit to bootloader: XBL>dhcp[DHCP  ] Device  : Mot TSEC1 1000BT Full Duplex[DHCP  ] IP Addr : 192.168.39.195XBL>dir[CFCard] Directory of /    Date      Time      Size     File or Directory name----------- --------  --------   ---------------------------2007-Nov-05  6:01:56        29   lastboot2007-Apr-05 15:47:46  28210390   xs-3.1-0433.bak2007-Mar-01 16:39:42             storage/2007-Apr-05 15:56:38  28210430   xs-3.1-0440.bin2007-Mar-03  0:56:28             wpr/3 file(s), 2 dir(s)
Wi-Fi ArrayAppendix C: Technical Support 347XBL>del * [CFCard] Delete  : 2 file(s) deletedXBL>update server 192.168.39.102 xs-3.0-0425.bin[TFTP  ] Device  : Mot TSEC1 1000BT Full Duplex[TFTP  ] Client  : 192.168.39.195[TFTP  ] Server  : 192.168.39.102[TFTP  ] File    : xs-3.0-0425.bin[TFTP  ] Address : 0x1000000[TFTP  ] Loading : ##################################################[TFTP  ] Loading : ##################################################[TFTP  ] Loading : ###### done[TFTP  ] Complete: 12.9 sec, 2.1 MB/sec[TFTP  ] Bytes   : 27752465 (1a77811 hex)[CFCard] File    : xs-3.0-0425.bin[CFCard] Address : 0x1000000[CFCard] Saving  : ############################################### done[CFCard] Complete: 137.4 sec, 197.2 KB/sec[CFCard] Bytes   : 27752465 (1a77811 hex)XBL>reset[RESET ]Xirrus Boot Loader 1.0.0 (Oct 17 2006 - 13:11:42), Build: 2725Processor  | Motorola PowerPC, PVR=80200020 SVR=80300020Board      | Xirrus MPC8540 CPU BoardClocks     | CPU : 825 MHz   DDR : 330 MHz   Local Bus: 41 MHzL1 cache   | Data:  32 KB    Inst:  32 KB    Status   : EnabledWatchdog   | Enabled (5 secs)I2C Bus    | 400 KHzDTT        | CPU:33C  RF0:32C  RF1:31C  RF2:26C  RF3:27CRTC        | Wed 2007-Nov-05  6:48:44 GMTSystem DDR | 256 MB, Unbuffered Non-ECC (2T)
Wi-Fi Array348 Appendix C: Technical SupportL2 cache   | 256 KB, EnabledFLASH      |   4 MB, CRC: OKFPGA       |   2 Devices programmedPacket DDR | 256 MB, Unbuffered Non-ECC, EnabledNetwork    | Mot FEC    Mot TSEC1 [Primary]  Mot TSEC2IDE Bus 0  | OKCFCard     | 122 MB, Model: Hitachi XXM2.3.0Environment|   4 KB, InitializedIn:    serialOut:   serialErr:   serialPress space bar to exit to bootloader: [CFCard] File    : xs*.bin[CFCard] Address : 0x1000000[CFCard] Loading : ############################################### done[CFCard] Complete: 26.9 sec, 1.0 MB/sec[CFCard] Bytes   : 27752465 (1a77811 hex)[Boot  ] Address : 0x01000000[Boot  ] Image   : Verifying checksum .... OK[Boot  ] Unzip   : Multi-File Image   .... OK[Boot  ] Initrd  : Loading RAMDisk Image[Boot  ] Initrd  : Verifying checksum .... OK[Boot  ] Execute : Transferring control to OSInitializing hardware ........................................ OKXirrus Wi-Fi ArrayArrayOS Version 3.0-425Copyright (c) 2005-2007 Xirrus, Inc.http://www.xirrus.comUsername:
Wi-Fi ArrayAppendix C: Technical Support 349Contact InformationXirrus, Inc. is located in Westlake Village, California, just 45 minutes northwest of downtown Los Angeles and 45 minutes southeast of Santa Barbara.Xirrus, Inc.370 North Westlake Blvd, Suite 200Westlake Village, CA 91362USATel: 1.805.497.0955Fax: 1.805.449.1180www.xirrus.comsupport.xirrus.com
Wi-Fi Array350 Appendix C: Technical Support
Wi-Fi ArrayGlossary of Terms 351Glossary of Terms802.11aA supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 5 GHz and data rates of up to 54 Mbps.802.11bA supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 11 Mbps.802.11dA supplement to the Media Access Control (MAC) layer in 802.11 to promote worldwide use of 802.11 WLANs. It allows Access Points to communicate information on the permissible radio channels with acceptable power levels for user devices. Because the 802.11 standards cannot legally operate in some countries, 802.11d adds features and restrictions to allow WLANs to operate within the rules of these countries.802.11gA supplement to the IEEE 802.11 WLAN specification that describes radio transmissions at a frequency of 2.4 GHz and data rates of up to 54 Mbps.802.1QAn IEEE standard for MAC layer frame tagging (also known as encapsulation). Frame tagging uniquely assigns a user-defined ID to each frame. It also enables a switch to communicate VLAN membership information across multiple (and multi-vendor) devices by frame tagging.AES(Advanced Encryption Standard) A data encryption scheme that uses three different key sizes (128-bit, 192-bit, and 256-bit). AES was adopted by the U.S. government in 2002 as the encryption standard for protecting sensitive but unclassified electronic data.
Wi-Fi Array352 Glossary of TermsauthenticationThe process that a station, device, or user employs to announce its identify to the network which validates it. IEEE 802.11 specifies two forms of authentication, open system and shared key.bandwidthSpecifies the amount of the frequency spectrum that is usable for data transfer. In other words, it identifies the maximum data rate a signal can attain on the medium without encountering significant attenuation (loss of power).beacon intervalWhen a device in a wireless network sends a beacon, it includes with it a beacon interval, which specifies the period of time before it will send the beacon again. The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon. Network administrators can adjust the beacon interval—usually measured in milliseconds (ms) or its equivalent, kilo-microseconds (Kmsec).bit rateThe transmission rate of binary symbols ('0' and '1'), equal to the total number of bits transmitted in one second.BSS(Basic Service Set) When a WLAN is operating in infrastructure mode, each access point and its connected devices are called the Basic Service Set.BSSIDThe unique identifier for an access point in a BSS network. See also, SSID.CDP(Cisco Discovery Protocol) CDP is a layer 2 network protocol which runs on most Cisco equipment and some other network equipment. It is used to share information with other directly connected network devices. Information such as the model, network capabilities, and IP address is shared. Wi-Fi Arrays can both advertise their presence by sending CDP announcements, and gather and display information sent by neighbors.
Wi-Fi ArrayGlossary of Terms 353cellThe basic geographical unit of a cellular communications system. Service coverage of a given area is based on an interlocking network of cells, each with a radio base station (transmitter/receiver) at its center. The size of each cell is determined by the terrain and forecasted number of users.channelA specific portion of the radio spectrum—the channels allotted to one of the wireless networking protocols. For example, 802.11b and 802.11g use 14 channels in the 2.4 GHz band, only 3 of which don't overlap (1, 6, and 11). In the 5 GHz band, 802.11a uses 8 channels for indoor use and 4 for outdoor use, none of which overlap. In the U.S., additional channels are available, to bring the total to 24 channels. CoS(Class of Service) A category based on the type of user, type of application, or some other criteria that QoS systems can use to provide differentiated classes of service.default gatewayThe gateway in a network that a computer will use to access another network if a gateway is not specified for use. In a network using subnets, a default gateway is the router that forwards traffic to a destination outside of the subnet of the transmitting device.DHCP(Dynamic Host Configuration Protocol) A method for dynamically assigning IP addresses to devices on a network. DHCP issues IP addresses automatically within a specified range to client devices when they are first powered up.DHCP leaseThe DHCP lease is the amount of time that the DHCP server grants to the DHCP client for permission to use a particular IP address. A typical DHCP server allows its administrator to set the lease time.
Wi-Fi Array354 Glossary of TermsDNS(Domain Name System) A system that maps meaningful domain names with complex numeric IP addresses. DNS is actually a separate network—if one DNS server cannot translate a domain name, it will ask a second or third until a server is found with the correct IP address.domainThe main name/Internet address of a user's Internet site as registered with the InterNIC organization, which handles domain registration on the Internet. For example, the “domain” address for Xirrus is: http://www.xirrus.com, broken down as follows:zhttp:// represents the Hyper Text Teleprocessing Protocol used by all Web pages.zwww is a reference to the World Wide Web.zxirrus refers to the company.zcom specifies that the domain belongs to a commercial enterprise.DTIM(Delivery Traffic Indication Message) A DTIM is a signal sent as part of a beacon by an access point to a client device in sleep mode, alerting the device to a packet awaiting delivery.EAP(Extensible Authentication Protocol) When you log on to the Internet, you're most likely establishing a PPP connection via a remote access server. The password, key, or other device you use to prove that you are authorized to do so is controlled via PPP’s Link Control Protocol (LCP). However, LCP is somewhat inflexible because it has to specify an authentication device early in the process. EAP allows the system to gather more information from the user before deciding which authenticator to use. It is called extensible because it allows more authenticator types than LCP (for example, passwords and public keys).
Wi-Fi ArrayGlossary of Terms 355EDCF(Enhanced Distributed Coordinator Function) A QoS extension which uses the same contention-based access mechanism as current devices but adds “offset contention windows” that separate high priority packets from low priority packets (by assigning a larger random backoff window to lower priorities than to higher priorities). The result is “statistical priority,” where high-priority packets usually are transmitted before low-priority packets.encapsulationA way of wrapping protocols such as TCP/IP, AppleTalk, and NetBEUI in Ethernet frames so they can traverse an Ethernet network and be unwrapped when they reach the destination computer.encryptionAny procedure used in cryptography to translate data into a form that can be decrypted and read only by its intended receiver.Fast EthernetA version of standard Ethernet that runs at 100 Mbps rather than 10 Mbps.FCC(Federal Communications Commission) US wireless regulatory authority. The FCC was established by the Communications Act of 1934 and is charged with regulating Interstate and International communications by radio, television, wire, satellite and cable.frameA packet encapsulated to travel on a physical medium, like Ethernet or Wi-Fi. If a packet is like a shipping container, a frame is the boat on which the shipping container is loaded. Gigabit 1The primary Gigabit Ethernet interface. See also, Gigabit Ethernet.Gigabit 2The secondary Gigabit Ethernet interface. See also, Gigabit Ethernet.Gigabit EthernetThe newest version of Ethernet, with data transfer rates of 1 Gigabit (1,000 Mbps).
Wi-Fi Array356 Glossary of TermsGroupA user group, created to define a set of attributes (such as VLAN, traffic limits, and Web Page Redirect) and privileges (such as fast roaming) that apply to all users that are members of the group. This allows a uniform configuration to be easily applied to multiple user accounts. The attributes that can be configured for user groups are almost identical to those that can be configured for SSIDs. host nameThe unique name that identifies a computer on a network. On the Internet, the host name is in the form comp.xyz.net. If there is only one Internet site the host name is the same as the domain name. One computer can have more than one host name if it hosts more than one Internet site (for example, home.xyz.netand comp.xyz.net). In this case, comp and home are the host names and xyz.net is the domain name.IPsecA Layer 3 authentication and encryption protocol. Used to secure VPNs.MAC address(Media Access Control Address) A 6-byte hexadecimal address assigned by a manufacturer to a device.Mbps(Megabits per second) A standard measure for data transmission speeds (for example, the rate at which information travels over the Internet). 1 Mbps denotes one million bits per second.MTU(Maximum Transmission Unit) The largest physical packet size—measured in bytes—that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent. Every network has a different MTU, which is set by the network administrator. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds.
Wi-Fi ArrayGlossary of Terms 357NTP(Network Time Protocol) An Internet standard protocol (built on top of TCP/IP) that ensures the accurate synchronization (to the millisecond) of computer clock times in a network of computers. Running as a continuous background client program on a computer, NTP sends periodic time requests to servers, obtaining server time stamps and using them to adjust the client's clock.packetData sent over a network is broken down into many small pieces—packets—by the Transmission Control Protocol layer of TCP/IP. Each packet contains the address of its destination as well the data. Packets may be sent on any number of routes to their destination, where they are reassembled into the original data. This system is optimal for connectionless networks, such as the Internet, where there are no fixed connections between two locations.PLCP(Physical Layer Convergence Protocol) Defined by IEEE 802.6, a protocol specified within the Transmission Convergence layer that defines exactly how cells are formatted within a data stream for a particular type of transmission facility.PoGE This refers to the optional Xirrus XP1 Power over Gigabit Ethernet modules that provide DC power to Arrays. Power is supplied over the same Cat 5e or Cat 6 cable that supplies the data connection to your gigabit Ethernet switch, thus eliminating the need to run a power cable. See “Contact Information” on page 349for a list of Xirrus PoGE modules and the modules that are compatible with each Array. preamblePreamble (sometimes called a header) is a section of data at the head of a packetthat contains information that the access point and client devices need when sending and receiving packets. PLCP has two structures, a long and a short preamble. All compliant 802.11b systems have to support the long preamble. The short preamble option is provided in the standard to improve the efficiency of a network's throughput when transmitting special data, such as voice, VoIP (Voice-over IP) and streaming video.
Wi-Fi Array358 Glossary of Termsprivate keyIn cryptography, one of a pair of keys (one public and one private) that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The private key is provided only to the requestor and never shared. The requestor uses the private key to decrypt text that has been encrypted with the public key by someone else.PSK(Pre-Shared Key) A TKIP passphrase used to protect your network traffic in WPA.public keyIn cryptography, one of a pair of keys (one public and one private) that are created with the same algorithm for encrypting and decrypting messages and digital signatures. The public key is made publicly available for encryption and decryption.QoS(Quality of Service) QoS can be used to describe any number of ways in which a network provider prioritizes or guarantees a service's performance.RADIUS(Remote Authentication Dial-In User Service) A client-server security protocol, developed to authenticate, authorize, and account for dial-up users. The RADIUS server stores user profiles, which include passwords and authorization attributes.RSSI(Received Signal Strength Indicator) A measure of the energy observed by an antenna when receiving a signal.SDMA(Spatial Division Multiple Access) A wireless communications mode that optimizes the use of the radio spectrum and minimizes cost by taking advantage of the directional properties of antennas. The antennas are highly directional, allowing duplicate frequencies to be used for multiple zones.SNMP(Simple Network Management Protocol) A standard protocol that regulates network management over the Internet.
Wi-Fi ArrayGlossary of Terms 359SNTP(Simple Network Time Protocol) A simplified version of NTP. SNTP can be used when the ultimate performance of the full NTP implementation described in RFC 1305 is not needed or justified.SSH(Secure SHell) Developed by SSH Communications Security, Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. SSH protects a network from attacks, such as IP spoofing, IP source routing, and DNS spoofing. Attackers who has managed to take over a network can only force SSH to disconnect—they cannot “play back” the traffic or hijack the connection when encryption is enabled. When using SSH's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted making it almost impossible for an outsider to collect passwords.SSID(Service Set IDentifier) Every wireless network or network subset (such as a BSS) has a unique identifier called an SSID. Every device connected to that part of the network uses the same SSID to identify itself as part of the family—when it wants to gain access to the network or verify the origin of a data packet it is sending over the network. In short, it is the unique name shared among all devices in a WLAN.subnet maskA mask used to determine what subnet an IP address belongs to. An IP address has two components: (1) the network address and (2) the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.TKIP(Temporal Key Integrity Protocol) Provides improved data encryption by scrambling the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the encryption keys haven’t been tampered with.transmit powerThe amount of power used by a radio transceiver to send the signal out. Transmit power is generally measured in milliwatts, which you can convert to dBm.
Wi-Fi Array360 Glossary of TermsUser groupSee Group. VLAN(Virtual LAN) A group of devices that communicate as a single network, even though they are physically located on different LAN segments. Because VLANs are based on logical rather than physical connections, they are extremely flexible. A device that is moved to another location can remain on the same VLAN without any hardware reconfiguration.VLAN tagging(Virtual LAN tagging) Static port-based VLANs were originally the only way to segment a network without using routing, but these port-based VLANs could only be implemented on a single switch (or switches) cabled together. Routing was required to transfer traffic between unconnected switches. As an alternative to routing, some vendors created proprietary schemes for sharing VLAN information across switches. These methods would only operate on that vendor's equipment and were not an acceptable way to implement VLANs. With the adoption of the 802.1Q standard, traffic can be confined to VLANs that exist on multiple switches from different vendors. This interoperability and traffic containment across different switches is the result of a switch's ability to use and recognize 802.1Q tag headers—called VLAN tagging. Switches that implement 802.1Q tagging add this tag header to the frame directly after the destination and source MAC addresses. The tag header indicates:1. That the packet has a tag.2. Whether the packet should have priority over other packets.3. Which VLAN it belongs to, so that the switch can forward or filter it correctly.WDS (Wireless Distribution System)WDS creates wireless backhauls between arrays. These links between arrays may be used rather than having to install data cabling to each array. WEP(Wired Equivalent Privacy) An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alter frame bits to avoid disclosure to eavesdroppers.
Wi-Fi ArrayGlossary of Terms 361Wi-Fi AllianceA nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance's members is to enhance the user experience through product interoperability.Wi-Fi ArrayA high capacity Wi-Fi networking device consisting of multiple radios arranged in a circular array.WPA(Wi-Fi Protected Access) A Wi-Fi Alliance standard that contains a subset of the IEEE 802.11i standard, using TKIP as an encryption method and 802.1x for authentication.WPA2 (Wi-Fi Protected Access 2) WPA2 is the follow-on security method to WPA for wireless networks and provides stronger data protection and network access control. It offers Enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Like WPA, WPA2 is designed to secure all versions of 802.11 devices, including 802.11a, 802.11b, 802.11g, and 802.11n, multi-band and multi-mode.Xirrus Management System (XMS)A Xirrus product used for managing large Wi-Fi Array deployments from a centralized Web-based interface.XP1 and XP8—Power over Gigabit Ethernet modulesSee PoGE.XPS—Xirrus Power System A family of optional Xirrus products that provides power over Gigabit Ethernet.See PoGE.
Wi-Fi Array362 Glossary of TermsUse this Space for Your Notes
Wi - Fi  A r r ayIndex 363IndexSymbols 1, 6, 7, 27, 32, 38, 40, 42, 45, 48, 49, 50, 52, 54, 60, 61, 73, 76, 77, 84, 89, 109, 134, 141, 148, 151, 152, 154, 157, 164, 168, 172, 182, 189, 204, 209, 214, 217, 227, 229, 231, 234, 235, 309, 312, 314, 316, 318, 321, 323, 325, 326, 327, 329, 333, 334, 336, 339Numerics4.9 GHz Public Safety Band 226802.11a 6, 7, 14, 73, 189, 204, 214802.11a/b/g 14, 30802.11b 6, 7, 217802.11b/g 14802.11e 15802.11g 6, 7802.11i 7, 77, 134802.11p 15802.11q 15802.1x 7, 42, 48, 336Aabg2intrusion detection 222self-monitoring, loopback mode223AC power 42, 50, 52, 309, 312Access Control List 164access control lists (ACLs) 172Access Panel 321access panelreinstalling 312removing 309ACLs 164Admin ID 168administration 164Administrator Account 329advanced intrusion detection 222AES 15, 327approvedsetting rogues 109APs 109, 182rogues, blocking 222APs, roguesee rogue APs 221Array 32, 54, 60, 61, 84, 141assurance (radio loopback testing) 221authentication 15auto-blockingrogue APs 222auto-configuration 209channel and cell size 221Bbackhaulsee WDS 46backup unitsee standby mode 221beam distribution 14benefits 13blockingrogue APs 222blocking rogue APs 221broadcastfast roaming 212BSS 334Ccdp 262CDP (Cisco Discovery Protocol)settings 149cdp CLI command 262cellsharp cell 221
Wi-Fi Array364 Indexcell size 325auto-configuration 221cell size configuration 221channelauto-configuration 221configuration 221list selection 221public safety 221channelsnon-overlapping 15character restrictions 89Chassis Cover 318chassis cover 318Cisco Discovery Protocolsee cdp 262Cisco Discovery Protocol (CDP) 149CLI 76, 249using to upgrade software image344CLI commandssee commands 262Command Line Interface 7, 45, 249configuration commands 260getting help 250getting started 250inputting commands 250sample configuration tasks 291SSH 249top level commands 252commandsacl 260admin 261cdp 262clear 263configure 253contact-info 264date-time 265dhcp-server 266dns 267file 268filter 269group 271hostname 271https 272interface 273load 274location 274management 275more 275no 276quit 278radius-server 278reboot 279, 289reset 279run-tests 280security 282show 256snmp 283ssh 284ssid 285standby 285statistics 259syslog 286telnet 287vlan 289Community String 326configuration 133express setup 134configuration changesapplying 89connectiontracking window 102Contact Information 349contact information 349coverageextended 14coverage patterns 7critical messages 86
Wi-Fi ArrayIndex 365Ddefault settings 323Default Value 327DHCP 326deployment 30, 38ease of 15DHCP 325default settings 326leases window 102DHCP Server 151DIMM 316DIMM modulereplacing 316DNS 148dynamic VLANoverridden by group 199EEAP-MDS 15EAP-TLS 15EAP-TTLS 15encryption 15encryption methodrecommended (WPA2 with AES)166setting 166support of multiple methods 166encryption method (encryption mode)Open, WEP, WPA, WPA2, WPA-Both 165encryption standardAES, TKIP, both 166setting 166Enterprise 1event logsee system log 132event messages 86express setup 77, 134external RADIUS server 802.1x 29Ffactory default settings 323factory defaults 329DHCP 326fail-overstandby mode 221failover 40FAQs 334Fast Ethernet 323fast roaming 15, 99, 212about 203features 13, 154feedback 87filterpolicy to set QoS 236filter list 234filter name 235filters 233statistics 130FLASH 314FLASH memoryreplacing 314frequently asked questions 334FTP server 29GGeneral Hints 333getting startedexpress setup 134glossary of terms 351Groupmanagement 198group 196CLI command 271VLAN overrides dynamic VLAN199Hhelp button 87
Wi-Fi Array366 IndexHyperTerminal 28IIAP 227fast roaming 203IEEE 339installation 27, 49, 305installing the MCAP-3616 52mounting the unit 54requirements 27unpacking the unit 50workflow 49installation workflow 49integrated radio modulereplacing 318interfaces 134Web 83Internet Explorer 28intrusion detection 109, 222configuration 221setting as approved or known 109IP Address 89, 157, 239Kkey features 13Keyboard Shortcuts 330keyboard shortcuts 330knownsetting rogues 109LLayer 3fast roaming 203leases, DHCPviewing 102list, access controlsee access control list 172list, MAC accesssee access control list 172log, system (event)viewing window 132logging in 89loopbacksee self-monitoring 303loopback testing, radios 221MMAC 336MIC 15monitoringintrusion detection 109see intrusion detection 222mounting the unit 54NNATtable - see connection tracking 102Netscape Navigator 28networkinterfaces 140settings 141network installation 27, 305network statusconnectiontracking window 102routing table window 101viewing leases 102Network Time Protocol 152non-overlapping channels 15OOpen (encryption method) 165overview 7Ppassphrase 77password 89PEAP 15, 231
Wi-Fi ArrayIndex 367performance 13Ping 239planningWDS 46PoGE 10, 29see Power over Gigabit Ethernet 10power cord 309power distribution 10power outlet 27Power over Gigabit Ethernet 2, 10, 17, 21, 27, 29, 42, 53compatibility with Array models349Power over Gigabit Ethernet (PoGE) 10power supplyreplacing 321power switch 309print button 87product installation 27, 305product overview 7product specifications 16, 21public safety band 226public safety channels 221PuTTy 28QQoS 15, 358filter, policy to set QoS 236levels defined 190, 199SSID 185, 190about setting QoS 335default QoS 327user group 199Quality of Service 15see QoS 190, 199quick reference guide 323quick startexpress setup 134Rradioself-test 223radio assurance (loopback testing) 221radio assurance (loopback) mode 223radio distribution 13RADIUS 164RADIUS server 29remote DC power 10Reset 239RFintrusion detection 221spectrum management 221RF configuration 221RF managementsee channel 221RF resilience 221RFprotect, see XDM 222roaming 15, 99, 212roaming, fast 203rogue APblocking 222rogue APsblocking 221rogue detection 14roguessetting as known or approved 109root command prompt 252routing table window 101Sscheduleauto channel configuration 221Secure Shell 28security 7, 15see group 196self-monitoring 222, 303options 223self-testradio loopback mode 223
Wi-Fi Array368 Indexserial port 28Services 151servicing 307servicing the unit 305setup, express 134sharp cell 221setting in WMI 225SNMP 11, 134software imageupgrading via CLI 344Software Upgrade 239specifications 16, 21spectrum (RF) management 221SSH 28SSIDabout usage 335QoS 185, 190about using 335QoS, about usage 335standby mode 221stationsrogues 109statistics 130statistics per station 131statisticsfilters 130per-station 131stations 130WDS 129status bar 87submitting comments 87System Configuration Reset 239system logviewing window 132system memoryreplacing 316System Reboot 239System Tools 239Ttechnical supportcontact information 349frequently asked questions 334timeout 239TKIP 15Tools 239tunneledfast roaming 212Uunknownsetting rogues 109unpacking the unit 50upgrading software imagevia CLI 344user group 196QoS 199user interface 83VVLANdynamicoverridden by group 199group (vs. dynamic VLAN) 199voicefast roaming 203VoWLAN 15Wwall thickness considerations 30warning messages 86WDS 229about 46planning 46statistics 129Web interface 83structure and navigation 86WEP 15, 164, 336
Wi-Fi ArrayIndex 369WEP (Wired Equivalent Privacy)encryption method 165workflow 49WPA 164WPA (Wi-Fi Protected Access) and WPA2encryption method 166WPA2 7XXirrus Defense Module (XDM) 222Xirrus Management System 7, 11, 15, 29Xirrus Power over Gigabit Ethernet 27, 29Xirrus Power over Gigabit Ethernet (PoGE) 10Xirrus Roaming Protocol 15, 99, 212XMS 7, 11, 15, 29setting IP address of 157XP1, XP8see Power over Gigabit Ethernet 10XPS 27, 29XRP 15, 99, 212XRPS 29XS16management 91, 133, 239XS-3900management 91, 133, 239
Wi-Fi Array370 Index

Navigation menu