D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 1

D Link Corporation 802.11n Single-band Unified Access Point Part 1

Contents

User Manual Part 1

Page 1March 2012
Page 2March 2012 Table of ContentsSection 1 - About This Document ............................................................................................9Document Organization ......................................................................................................................................... 9Additional Documentation ..................................................................................................................................... 9Document Conventions ......................................................................................................................................... 9Online Help, Supported Browsers, and Limitations ............................................................................................. 10Section 2 - Getting Started ...................................................................................................... 11Administrator’s Computer Requirements ............................................................................................................ 11Wireless Client Requirements ............................................................................................................................. 12Dynamic and Static IP Addressing on the AP ...................................................................................................... 13Recovering an IP Address ............................................................................................................................. 13Discovering a Dynamically Assigned IP Address .......................................................................................... 13Installing the UAP ................................................................................................................................................ 13Basic Settings ...................................................................................................................................................... 16Connecting to the AP Web Interface by Using the IPv6 Address .................................................................. 17Using the CLI to View the IP Address.................................................................................................................. 17 ....................................................................................................................... 18 ............................................................................................... 18 ............................................................................................................. 19 ..................................................................... 20Verifying the Installation ...................................................................................................................................... 20 ............................................................................................. 21Section 3 - Viewing Access Point Status ............................................................................... 22Viewing Interface Status ...................................................................................................................................... 22Wired Settings (Internal Interface) ................................................................................................................ 22Wireless Settings .......................................................................................................................................... 22 .................................................................................................................................................... 23 ........................................................................................................ 23 .................................................................................. 24 .................................................................... 24Viewing Transmit and Receive Statistics ............................................................................................................. 25Viewing Associated Wireless Client Information ................................................................................................. 26 .................................................................................................................... 26Link Integrity Monitoring ................................................................................................................................ 28Viewing Rogue AP Detection............................................................................................................................... 28 ...................................................................................................... 30Viewing Managed AP DHCP Information ............................................................................................................ 31 .............................................................................................. 31 ........................................................................................................... 32Viewing Radio Statistics Information ................................................................................................................... 33 ............................................................................................................... 34Section 4 - Managing the Access Point .................................................................................35 ................................................................................................................................................. 35Wireless Settings ................................................................................................................................................. 37Using the 802.11h Wireless Mode ................................................................................................................. 39 ......................................................................................................... 39Modifying Radio Settings ..................................................................................................................................... 40................................................................................................................ 44Scheduler Association Settings ........................................................................................................................... 46Virtual Access Point Settings ............................................................................................................................... 47None (Plain-text) ........................................................................................................................................... 50 .................................................................................................................................................... 50 .................................................................................................................................................. 51WPA Personal ............................................................................................................................................... 53 ............................................................................................................................................. 54 ......................................................................................... 56 ...................................................................................................................................... 58 .............................................................................................................................. 58
Page 3March 2012 Controlling Access by MAC Authentication ......................................................................................................... 59..................................................................................... 59 .............................................................................. 60 ................................................................................................................................ 60Managed Access Point Overview ........................................................................................................................ 61Transitioning Between Modes ....................................................................................................................... 61 ................................................................................................ 62 ...................................................................................................................... 63Creating a Management Access Control List (ACL) ............................................................................................ 64 ....................................................................65Web Server Settings ........................................................................................................................................... 65 .............................................................................................................. 66Setting the SSH Status ........................................................................................................................................ 68Setting the Telnet Status ..................................................................................................................................... 69 ............................................................................................................................. 69 ........................................................................................................................................ 72 ....................................................................................................................... 73 ............................................................................................75 ................................................................................................................................ 75 .............................................................................................................................. 76 ................................................................................................................................ 77 .............................................................................................................................. 78Section 7 - Maintaining the Access Point ..............................................................................79 ............................................................................................. 79 .................................................................................. 80Performing AP Maintenance ................................................................................................................................ 81 ................................................................................................. 81Rebooting the Access Point .......................................................................................................................... 81 ...................................................................................................................................... 81 ........................................................................................................ 83Packet Capture Status .................................................................................................................................. 83 ..................................................................................................... 84 ....................................................................................................................................... 84Remote Packet Capture ................................................................................................................................ 85 ...................................................................................................................... 87 ......................................................88 ...................................................................................................................... 88 ................................................................................................................................. 89IPv4 and IPv6 ACLs ...................................................................................................................................... 89MAC ACLs ..................................................................................................................................................... 90 ........................................................................................................................... 90Creating a DiffServ Class Map ............................................................................................................................ 95 ........................................................................................................................................... 96Creating a DiffServ Policy Map ......................................................................................................................... 100 .............................................................................................................................................. 101 ................................................................................... 102Section 9 - Clustering Multiple APs .....................................................................................104Managing Cluster Access Points in the Cluster ................................................................................................. 104Clustering APs ............................................................................................................................................. 104 ................................................................................................. 104Removing an Access Point from the Cluster ............................................................................................... 106Adding an Access Point to a Cluster ........................................................................................................... 106........................................................................... 106Navigating to an AP by Using its IP Address in a URL ................................................................................ 106Managing Cluster Sessions ............................................................................................................................... 106Sorting Session Information ........................................................................................................................ 107 ................................................................................. 108Stopping/Starting Automatic Channel Assignment ...................................................................................... 108Viewing Current Channel Assignments and Setting Locks ......................................................................... 109
Page 4March 2012 Viewing the Last Proposed Set of Changes ................................................................................................ 109 ................................................................................................................... 109Viewing Wireless Neighborhood Information .................................................................................................... 110Viewing Details for a Cluster Member ......................................................................................................... 112Appendix A - Default AP Settings ......................................................................................... 113 ................................................................................115 ............................................................................................................................................. 115 ................................................................................................. 115 .................................................................................................................. 115 ................................................................................................................. 116 ................................................................................................................................ 116 ............................................................................................... 117 ................................................................................................................ 117 ............................................................................................................... 118 ................................................................................................... 118 ................................................................................................ 118 ................................................................................................................. 119 ................................................................................................................ 119Clustering Access Points ................................................................................................................................... 119Clustering APs by Using the Web Interface ................................................................................................ 119Clustering APs by Using the CLI ................................................................................................................. 120Clustering APs by Using SNMP .................................................................................................................. 120 ..................................................................................................................................... 121 ............................................................................................. 121 .............................................................................................................. 124Appendix C - Statements ......................................................................................................127
Page 5March 2012 List of Figures ................................................................................................................... 10 .............................................................................................................................. 14 ............................................................................................................................ 15 ............................................................................................ 18 ......................................................................................................................... 22 ........................................................................................................................................ 23 ......................................................................................................................... 25 ................................................................................................... 26 ....................................................................................................... 27............................................................................................ 28 ............................................................................................................ 31 ................................................................................................... 31 ........................................................................................................ 32 ............................................................................................................................. 33 .............................................................................................................. 34 ........................................................................................................... 35 ....................................................................................................................... 37 ........................................................................................................................... 40 ....................................................................................................................... 45 ................................................................................................. 46 ............................................................................................................. 46 ..................................................................................................... 48 ............................................................................... 50 .............................................................................. 52 .......................................................................... 53 ........................................................................ 54 ........................................................................................................................ 57 .............................................................................................................. 59 ............................................................................................................ 60 ........................................................................... 62 ................................................................................ 63 ............................................................................ 64 ............................................................................................................. 65 ............................................................................................................................. 67 ..................................................................................................................................... 68 ................................................................................................................................... 69 ............................................................................................................ 70 ..................................................................................................................... 72 .............................................................................................................................. 74 ............................................................................................................... 75 ............................................................................................................. 76 ................................................................................................................. 77 ............................................................................................................. 78 .................................................................... 79 .................................................................... 79 ............................................................................................................................. 80 ................................................................ 80 ............................................................... 80 ................................................................................................................. 81 ..................................................................................................................... 82 .................................................................................................................... 82 ............................................................................................. 83 .......................................................................................................................... 84 ............................................................................................................... 84 .............................................................................................................................. 85 ........................................................................................................................ 86 ............................................................................................................. 87 ...................................................................................................... 88 ...................................................................................................... 90
Page 6March 2012  .............................................................................. 96 ............................................................................ 100 .............................................................................. 101 ................................................................................ 104 ................................................................................... 105 ................................................................................. 107 ..................................................................................... 108 ..........................................................................................................111 ................................................................................................ 112 ......................................................................................... 115 ....................................................................................... 117 ........................................................................................ 118 ........................................................................ 119 ........................................................................... 120 ................................................................ 121 ........................................................................ 121 ........................................................................ 122 ............................................... 122 ...................................................... 123 .......................................................................... 123 ............................................ 123 ................................................................. 124 .................................................................................................... 124
Page 7March 2012 List of TablesTable 1 - Typographical Conventions ...................................................................................................................... 10Table 2 - Requirements for the Administrator’s Computer ....................................................................................... 12Table 3 - Requirements for Wireless Clients ........................................................................................................... 12Table 4 - Basic Settings Page ................................................................................................................................. 17 ........................................................................................................ 19 ............................................................................................... 20Table 7 - Logging Options ....................................................................................................................................... 24Table 8 - Log Relay Host ......................................................................................................................................... 24Table 9 - Transmit/Receive ...................................................................................................................................... 26Table 10 - Associated Clients .................................................................................................................................. 26 ..................................................................................................................... 28Table 12 - Rogue AP Detection ............................................................................................................................... 30 .................................................................................................................. 32 ............................................................................................................................... 33Table 15 - Radio Statistics Information .................................................................................................................... 34 ................................................................................................................................... 34 .................................................................................................................................... 36Table 18 - Wireless Settings .................................................................................................................................... 39Table 19 - Radio Settings ........................................................................................................................................ 44 ......................................................................................................................... 45Table 21 - Scheduler Association Settings .............................................................................................................. 47Table 22 - Virtual Access Point Settings .................................................................................................................. 50 .............................................................................................................................................. 51 ........................................................................................................................................... 53Table 25 - WPA Personal ......................................................................................................................................... 54 ....................................................................................................................................... 56Table 27 - WDS Settings ......................................................................................................................................... 57 ................................................................................................................................ 58 ........................................................................................................................ 58Table 30 - MAC Authentication ................................................................................................................................ 60Table 31 - RADIUS Server Attributes for MAC Authentication ................................................................................. 60Table 32 - Load Balancing ....................................................................................................................................... 61Table 33 - Managed Access Point ........................................................................................................................... 62 .................................................................................................. 63Table 35 - Management ACL ................................................................................................................................... 64Table 36 - Web Server Settings ............................................................................................................................... 66Table 37 - SNMP Settings ....................................................................................................................................... 68Table 38 - SSH Settings .......................................................................................................................................... 69Table 39 - Telnet Settings ........................................................................................................................................ 69 .......................................................................................................................................... 72 ........................................................................................................................ 73Table 42 - NTP Settings ........................................................................................................................................... 74Table 43 - SNMPv3 Views ....................................................................................................................................... 75 ..................................................................................................................................... 77Table 45 - SNMPv3 Users ....................................................................................................................................... 77Table 46 - SNMPv3 Targets ..................................................................................................................................... 78Table 47 - Packet Capture Status ............................................................................................................................ 84 ................................................................................................................ 84 ................................................................................................................................ 85Table 50 - Remote Packet Capture ......................................................................................................................... 87 ............................................................................................................... 87 ............................................................................................................................. 89 ................................................................................................................................... 95Table 54 - DiffServ Class Map ................................................................................................................................. 99Table 55 - DiffServ Policy Map .............................................................................................................................. 101 ................................................................................................................................. 102 .............................................................................................................. 103Table 58 - Access Points in the Cluster ................................................................................................................. 105Table 59 - Cluster Options ..................................................................................................................................... 105
Page 8March 2012 Table 60 - Session Management ........................................................................................................................... 107Table 61 - Channel Assignments ........................................................................................................................... 109Table 62 - Last Proposed Changes ....................................................................................................................... 109Table 63 - Advanced Channel Management Settings ........................................................................................... 110Table 64 - Wireless Neighborhood Information ......................................................................................................111Table 65 - Cluster Member Details ........................................................................................................................ 112Table 66 - UAP Default Settings ............................................................................................................................ 114
Page 9March 2012Section 1 - About This DocumentSection 1 - About This DocumentPoint (UAP) on a wireless network.Document OrganizationThe contains the following sections:“Section 1 - About This Document” on page 9“Section 3 - Viewing Access Point Status” on page 22“Section 4 - Managing the Access Point” on page 35“Section 7 - Maintaining the Access Point” on page 79“Section 9 - Clustering Multiple APs” on page 104“Appendix A - Default AP Settings” on page 113Additional DocumentationThe describes the commands available from the command-line The multiple UAPs. software packages, including issues and workarounds.This section describes the conventions this document uses.A note provides more information about a feature or technology and cross-references to related topics.Caution! settings, events, or procedures that can adversely affect network connectivity, security, and so on.The following table describes the typographical conventions used in this guide.  DescriptionBold Click Apply to save your settings. Menu titles, page names, and button names.Blue Text See “Document Conventions” on page 9Hyperlink text.Courier Font WLAN-AP# show network command-line entries.Courier Font ItalicsValue Command parameter, which might be a variable or Square Brackets [ ] [Value] 
Page 10March 2012Section 1 - About This Document  DescriptionCurly Braces {} {Choice1 | Choice2} Indicates that you must select a parameter from the list of choices.Vertical Bars | Choice1 | Choice2 Separates the mutually exclusive choices.Braces within square brackets [{}][{Choice1 | Choice2}] Indicate a choice within an optional element.Table 1 - Online Help, Supported Browsers, and Limitationsthe user interface (UI). The information in the online help is a subset of the information available in the .Online help information corresponds to each page on the UAP Administration UI. Figure 1 - Administrator UI Online Help
Page 11March 2012Section 2 - Getting Startedany size. The UAP enables wireless local area network (WLAN) deployment while providing state-of-the-art wireless networking features.The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as an individual access point in the network, and you manage it by using the Administrator Web User Interface Administrator Web UI, Telnet, SSH, and SNMP services are disabled.This document describes how to perform the setup, management, and maintenance of the UAP in Standalone Mode. for the switch.Before you power on a new UAP, review the following sections to check required hardware and software components, test of your new or extended wireless network.This section contains the following topics:“Administrator’s Computer Requirements” on page 11“Wireless Client Requirements” on page 12“Dynamic and Static IP Addressing on the AP” on page 13“Installing the UAP” on page 13“Basic Settings” on page 16“Using the CLI to View the IP Address” on page 17“Verifying the Installation” on page 20To manage the UAP by using the Web interface or by using the CLI through Telnet or SSH, the AP needs an IP additional settings on the AP before it can connect to the network.The WLAN AP is not designed to function as a gateway to the Internet. To connect your WLAN to other LANs or the Internet, you need a gateway device.Administrator’s Computer Requirementsadministration of the UAP through a Web-based user interface (UI).Required Software or Component DescriptionAccess Point
Page 12March 2012Required Software or Component DescriptionWireless Connection to the Network through the Administration Web pages using a wireless connection to the internal network. Web Browser and Operating System based user interface hosted on the access point. We recommend using one of the following supported Web browsers to access the access point Administration Web pages:Microsoft®® version 7.x or 8.x (with up-to-date patch level for either major version)Mozilla®Safari 5 and later versionssupport the interactive features of the administration interface.Security Settings Table 2 - Requirements for the Administrator’s ComputerWireless Client Requirementsin which the access point is running. The UAP supports multiple client operating systems. Clients can be laptop or desktop computers, personal digital assistants (PDAs), or any other hand-held, portable or stationary device equipped To connect to the access point, wireless clients need the software and hardware described in the following table.Required Component Description Wireless Client Software associate with the UAP.Client Security Settings the access point.If the Security mode on the access point is set to anything other than plain used by the access point and provide a valid username and password, “Virtual Access Point Settings” on page 47. Table 3 - Requirements for Wireless Clients
Page 13March 2012When you power on the access point, the built-in DHCP client searches for a DHCP server on the network in order continues to use its default Static IP Address (10.90.90.91) until you re-assign it a new static IP address (and specify a static IP addressing policy) or until the AP successfully receives network information from a DHCP server.To change the connection type and assign a static IP address by using the CLI, see Settings” on page 18 or, by using the Web UI, see 35.Caution! If you do not have a DHCP server on your internal network, and do not plan to use one, DHCP to static IP. You can either assign a new static IP address to the AP or continue using the default address. We recommend assigning a new static IP address so that if you bring up another WLAN AP on the same network, the IP address for each AP will be unique.If you experience trouble communicating with the access point, you can recover a static IP address by resetting the AP 81), or you can get a dynamically assigned address by connecting the AP to a network that has a DHCP server.If you have access to the DHCP server on your network and know the MAC address of your AP, you can view the new IP address associated with the MAC address of the AP. If you do not have access to the DHCP server that assigned the IP address to the AP or do not know the MAC address a dynamically assigned IP address, see “Using the CLI to View the IP Address” on page 17.Installing the UAPTo access the Administration Web UI, you enter the IP address of the AP into a Web browser. You can use the default IP address of the AP (10.90.90.91) to log on to the AP and assign a static IP address, or you can use a DHCP server on you network to assign network information to the AP. The DHCP client on the AP is enabled by default.To install the UAP, use the following steps:1.)  Connect the AP to an administrative PC by using a LAN connection or a direct-cable connection. The hub or switch you use must permit broadcast signals from the access point to reach all other devices on the network.
Page 14March 2012administrative computer.static IP address in the same subnet as the default IP address on the access point. (The default IP address for the access point is 10.90.90.91.)access point so that the access point is no longer connected directly to the PC but instead is connected to the LAN (either by using a hub or directly).It is possible to detect access points on the network with a wireless connection. However, we strongly advise against using this method. In most environments you may have no way of knowing whether you are actually connecting to the intended AP. Also, many of the initial connection.2.)  Connect the power adapter to the power port on the back of the access point, and then plug the other end of the power cord into a power outlet.3.)  Use your Web browser to log on to the UAP Administration Web pages.If the AP did not acquire an IP address from a DHCP server on your network, enter 10.90.90.91 in the address new IP address of the AP into the Web browser.If you used a DHCP server and you do not know the new IP address of the AP, use the following procedures to obtain the information:Connect a serial cable from the administrative computer to the AP and use a terminal emulation program to access the command-line interface (CLI).At the login prompt, enter admin for the user name and admin for the password. At the command prompt, enter get management.to View the IP Address” on page 24.4.)  When prompted, enter admin for the user name and admin for the password, then click Logon.Figure 2 - Web UI Login PromptBasic Settingsshows.
Page 15March 2012Figure 3 - 5.)  Verify the settings on the Basic Settings page.Review access point description and provide a new administrator password for the access point if you do not want to use the default password, which is admin.Click the  button to activate the wireless network with these new settings.  The changes you make are not saved or applied until you click Apply. Changing some access point settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change access point “Basic Settings” on page 16.6.)  If you do not have a DHCP server on the management network and do not plan to use one, you must change the Connection Type from DHCP to Static IP. You can either assign a new Static IP address to the AP or continue using the default address. We recommend assigning a new Static IP address so that if you bring up another UAP on the same network, the IP address for each AP will be unique. To change the connection type and assign a static IP address, see 18 (CLI) or 35 (Web).7.)  the UAP in order for it to work with your network. 18 (CLI) or 35 (Web).8.)  supplicant information on the AP.Authentication” on page 19.
Page 16March 2012Basic SettingsBasic Settings page.Field DescriptionIP Address Settings page). Settings page). Shows the operational status of the static IPv6 address assigned to the management interface of the AP. The possible values are Operational and Tentative.Global Addressesthe AP.AddressShows the IPv6 Link Local address, which is the IPv6 address used by the local physical Discovery process.MAC Address Shows the MAC address of the AP. The address shown here is the MAC address associated with the management interface. This is the address by which the AP is known externally to other networks.Firmware Version your APs. Hardware Version  Shows the AP serial number.  Provides information about the product hardware.Current Password before you are able to change it. characters to prevent others from seeing your password as you type.The administrator password must be an alphanumeric string of up to 8 characters. Do not use special characters or spaces.you change the administrator password from the default.PasswordBaud Rate Select a baud rate for the serial port connection. The baud rate on the AP must match the baud rate on the terminal or terminal emulator to connect to the AP command-line interface (CLI) by using a serial (console) connection.The following baud rates are available: 9600192003840057600115200 name to identify the AP to the administrator. Use up to 64 alphanumeric characters, for example My AP.
Page 17March 2012Field Description issues related to the AP. Table 4 - Basic Settings PageTo connect to the AP by using the IPv6 global address or IPv6 link local address, you must enter the AP address into your browser in a special format.might not work with other browsers.[2520::230:abff:fe00:2420].To connect to the iPv6 link local address, replace the colons (:) with hyphens (-), add the interface number preceded 2420s6.ipv6-literal.net.Using the CLI to View the IP AddressThe DHCP client on the UAP is enabled by default. If you connect the UAP to a network with a DHCP server, the AP automatically acquires an IP address. To manage the UAP by using the Administrator UI, you must enter the IP address of the access point into a Web browser. If a DHCP server on your network assigns an IP address to the UAP, and you do not know the IP address, use the following steps to view the IP address of the UAP:1.)  Using a null-modem cable, connect a VT100/ANSI terminal or a workstation to the console (serial) port.TeraTerm.2.)  Baud rate: 115200 bpsData bits: 8Parity: noneStop bit: 13.)  Press the return key, and a login prompt should appear.The login name is admin. The default password is admin. After a successful login, the screen shows the ()# prompt. 4.)  At the login prompt, enter get management.Information similar to the following prints to the screen.
Page 18March 2012Figure 4 - By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to information.The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have management VLAN on the access point. 35.Action Commands get host idSet the DNS Name set host id <host_name>set host id lab-apInterfaceget managementSet the management VLAN ID set management vlan-id <1-4094>View untagged VLAN information get untagged-vlan set untagged-vlan status upDisable the untagged VLAN set untagged-vlan status downSet the untagged VLAN ID set untagged-vlan vlan-id <1-4094>View the connection type get management dhcp-status
Page 19March 2012Action CommandsUse DHCP as the connection type set management dhcp-status upUse a Static IP as the connection type set management dhcp-status downSet the Static IP address set management static-ip <ip_address>set management static-ip 10.10.12.221Set a Subnet Mask set management static-mask <netmask>set management static-mask 255.255.255.0 set static-ip-route gateway <ip_address>set static-ip-route gateway 10.10.12.1View the DNS Nameserver mode Dynamic= up Manual=downget host dns-via-dhcpSet DNS Nameservers to Use Static IP Addresses (Dynamic to Manual Mode)set host dns-via-dhcp downset host static-dns-1 <ip_address>set host static-dns-2 <ip_address>set host static-dns-1 192.168.23.45Set DNS Nameservers to Use DHCP IP Addressing (Manual to Dynamic Mode)set host dns-via-dhcp upTable 5 - In the following example, the administrator uses the CLI to set the management VLAN ID to 123 and to disable the DLINK-WLAN-AP# set management vlan-id 123DLINK-WLAN-AP# set untagged-vlan status downDLINK-WLAN-AP# get managementProperty                   Value--------------------------------------------vlan-id                    123interface                  brtrunkstatic-ip                  10.90.90.91static-mask                255.0.0.0ip                         10.90.90.91mask                       255.0.0.0mac                        00:05:5E:80:70:00dhcp-status                downipv6-status                upstatic-ipv6                ::DLINK-WLAN-AP# get untagged-vlanProperty  Value---------------vlan-id   1status    downDLINK-WLAN-AP#authentication information that the AP can supply to the authenticator.19 for information about 
Page 20March 2012Action Command     Table 6 - password to test1234. Property       Value--------------------------status         upuser           wlanAPeap-method     md5debug          offcert-present   noDLINK-WLAN-AP#Make sure the access point is connected to the LAN and associate some wireless clients with the network. Once you 1.)  Connect the access point to the LAN.access point is already connected to the LAN. The next step is to test some wireless clients.do the following procedures:Disconnect the cable from the computer and the access point.2.)  Test LAN connectivity with wireless clients.requirements for these clients, see “Wireless Client Requirements” on page 12.3.)  Once the wireless network is up and you can connect to the AP with some wireless clients, you can add in layers than one administrator is logged onto the Administration Web pages and making changes to the be applied.By default, no security is in place on the access point, so any wireless client can associate with it and access “Virtual Access Point Settings” on page 47.
Page 21March 2012following default settings:VLAN ID: 1SSID: dlink1Security: NoneMAC Authentication Type: NoneRedirect Mode: None All other VAPs are disabled by default. The default SSID for VAPs 1–15 is ”dlinkx” where x is the VAP ID.None for the default VAP and for each VAP that you enable.“Virtual Access Point Settings” on page 47.
Page 22March 2012Section 3 - Viewing Access Point StatusSection 3 - Viewing Access Point StatusThis section describes the information you can view from the tabs under the Status heading on the Administration Web UI. This section contains the following subsections:“Viewing Interface Status” on page 22“Viewing Transmit and Receive Statistics” on page 25“Viewing Associated Wireless Client Information” on page 26“Viewing Rogue AP Detection” on page 28“Viewing Managed AP DHCP Information” on page 31“Viewing Radio Statistics Information” on page 33 The web-based UI images show the DWL-8600AP administration pages. Pages for the DWL-2600AP or DWL-3600AP will display information for one radio only.Viewing Interface StatusInterfaces tab.Figure 5 - Viewing Interface StatusThis page displays the current settings of the UAP. It displays the Wired Settings and the Wireless Settings.Subnet Mask, and DNS information. To change any of these settings, click the link. After you click , you are redirected to the page.18.Wireless SettingsWireless Settings section also shows the MAC address (read-only) associated with each radio interface. To change the Radio Mode or Channel settings, click the link. After you click , you are redirected to the
Page 23March 2012Section 3 - Viewing Access Point Statuspage.“Wireless Settings” on page 37 and “Modifying Radio Settings” on page 40.The page shows real-time system events on the AP such as wireless clients associating with the AP and being authenticated.To view system events, click the tab.Figure 6 - page, you can perform the following tasks:View the most recent, high-level events generated by this AP.Persistent logging to write system event logs to non-volatile memory so that the events are not erased when the system reboots.Set a to determine what category of log messages are displayed.Set Depth  The AP acquires its date and time information using the network time protocol (NTP). This reported time to your local time. If the system unexpectedly reboots, log messages can be useful to diagnose the cause. However, log messages are erased when the system reboots unless you enable persistent logging.Caution!network performance. You should only enable persistent logging to debug a problem. Make sure page, set the persistence, severity, and depth options as described in the following table, and then click .
Page 24March 2012Section 3 - Viewing Access Point StatusField DescriptionPersistence Choose to save system logs to non-volatile memory so that the logs are not erased when the AP reboots. Choose Disabled to save system logs to volatile memory. Logs in volatile memory are deleted when the system reboots. messages with a severity level of 3 – 7 are written to volatile memory.0 — emergency1 — alert2 — critical3 — error4 — warning5 — notice6 — info7 — debugDepth Table 7 - Logging Options To apply your changes, click . Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. error conditions, like dropping frames.UAP to send syslog messages to the remote server.Remote log server collection for AP syslog messages provides the following features:Allows aggregation of syslog messages from multiple APsStores a longer history of messages than kept on a single APTriggers scripted management operations and alerts The syslog process will default to use port 514. We recommend keeping this default port. syslog is not being used by another process.page, set the Log Relay options as described in the following table, and then click .Field Description Select to allow the UAP to send log messages to a remote host. Select Disabled to keep all log messages on the local system. Specify the IP Address or DNS name of the remote log server. Specify the Port number for the syslog process on the Relay Host.The default port is 514.Table 8 - 
Page 25March 2012Section 3 - Viewing Access Point Status To apply your changes, click . Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. If you enabled the Log Relay Host, clicking will activate remote logging. The AP will send its kernel messages If you disabled the Log Relay Host, clicking will disable remote logging.The page provides some basic information about the current AP and a real-time display of the indicate transmit and receive totals since the reboot.To view transmit and receive statistics for the AP, click the page.Figure 7 - Field DescriptionInterface Status Shows whether the interface is up or down.MAC Address radios. Virtual LAN (VLAN) ID.You can use VLANs to establish multiple internal and guest networks on the same AP.The VLAN ID is set on the VAP page. (See 60) wireless local area network.The SSID is set on the VAP page. (See 60)Transmit and Receive Information Indicates total packets sent (in Transmit table) or received (in Received table) by this AP. Indicates total bytes sent (in Transmit table) or received (in Received table) by this AP.
Page 26March 2012Section 3 - Viewing Access Point StatusField Description Indicates total number of packets sent (in Transmit table) or received (in Received table) by this AP that were dropped. Indicates total number of bytes sent (in Transmit table) or received (in Received table) by this AP that were dropped. Indicates total errors related to sending and receiving data on this AP.Table 9 - Viewing Associated Wireless Client InformationTo view the client stations associated with a particular access point, click the Client Associations tab.Figure 8 - Viewing Client Association Informationstation.Client Associations page.Field Description wlan0vap2 means the client is associated with Radio 1, VAP 2.An entry of wlan0 means the client is associated with VAP 0 on Radio 1. An entry of wlan1 means the client is associated with VAP 0 on Radio 2.Station Shows the MAC address of the associated wireless client.Status and association status, which is present no matter which type of security the client uses to status. status of clients showing on the Client Associations page will be in line with what is expected; that is, if a client shows as authenticated to the AP, it will be able to transmit actually not be authenticated to the AP via the second layer of security.From Station Shows the number of packets and bytes received from the wireless client and the number of packets and bytes that were dropped after being received.To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and the number of packets and bytes that were dropped upon transmission.Table 10 - Associated ClientsThe page provides some basic information about the client receive statistics shown are totals since the client association started.
Page 27March 2012Section 3 - Viewing Access Point Statuscorporate server. tab.Figure 9 - The following table describes the information provided on the page.Field DescriptionStatus Radio interface used by the client.Station Client station MAC address.  TS Access Category (voice or video).Direction uplinkdownlinkbidirectional The User Priority (UP) for this TS. The UP is sent with each packet in the UP portion of the IP header. Typical values are:6 or 7 for voice4 or 5 for videoMedium Time medium.Minor, infrequent violations are ignored.VAP The Virtual Access Point associated with this TS client.MAC Address The Virtual Access Point MAC address.SSID Statistics Radio interface used by the client.Station Client station MAC address.  TS Access Category (voice or video).Direction uplinkdownlinkbidirectional
Page 28March 2012Section 3 - Viewing Access Point StatusField DescriptionFrom Station Shows the number of packets and bytes received from the wireless client and the number of packets and bytes that were dropped after being received. Also shows the number of packets:To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and the number of packets and bytes that were dropped upon transmission. Also shows the number of packets:Table 11 - The UAP provides link integrity monitoring to continually verify its connection to each associated client. To do this, drops off the list within 300 seconds if these data packets are not acknowledged, even if no disassociation message is received.Viewing Rogue AP DetectionThe status page to view Rogue AP Detection information provides real-time statistics for all APs within range of the AP on which you are viewing the Administration Web pages. When AP detection is enabled, the radio will periodically switch from its operating channel to scan other channels within the same band. Click Refresh to update the screen and display the most current information. The Rogue AP Detection page contains the following two lists:Detected Rogue AP List — Lists all APs within range of the AP that have not been acknowledged as known APs.clicking the Grant button associated with an AP in the Detected Rogue AP List or by appearing in an imported AP list. To view information about other access points on the wireless network, click the Rogue AP Detection tab.Figure 10 - You must enable the AP detection on a radio in order to collect information about other APs within range. The following table describes the information provided on neighboring access points.
Page 29March 2012Section 3 - Viewing Access Point StatusField DescriptionAP Detection for RadioTo allow the AP radios to perform neighbor AP detection and collect information about neighbor APs, click .To disable neighbor AP detection on the radios, click Disabled.If you change the AP detection mode, click to save the new settings.Detected Rogue AP ListAction Click Grant does not have any control over the APs on the list and cannot apply any security policies to MAC Shows the MAC address of the neighboring AP.Radio wlan0 (Radio One)wlan1 (Radio Two)Beacon Int. Shows the Beacon interval being used by this AP.Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).The Beacon Interval is set on the Radio page.(See “Modifying Radio Settings” on page 40) Indicates the type of device:AP Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. mode or an .SSID The  for the AP.local area network. It is also referred to as the .The SSID is set on the VAP page. (See 60) Indicates whether there is any security on the neighboring device.Off indicates that the Security mode on the neighboring device is set to None (no security).On indicates that the neighboring device has some security in place.VAP page.WPA Indicates whether WPA security is on or off for this AP.Band The number shown indicates the mode according to the following map:2.4 5 Channel Shows the Channel on which the AP is currently broadcasting.and receiving.The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)Rate Shows the rate (in megabits per second) at which this AP is currently transmitting.The current rate will always be one of the rates shown in Supported Rates.Signal Indicates the strength of the radio signal emitting from this AP. If you hover the mouse pointer over the bars, a number appears and shows the strength in decibels (dB).Beacons Last Beacon Shows the date and time of the last beacon received from this AP.Rates Shows supported and basic (advertised) rate sets for the neighboring AP. Rates are shown in megabits per second (Mbps).All Supported Rates are listed, with Basic Rates shown in bold.Radio Settings page. (See “Modifying Radio Settings” on page 40)
Page 30March 2012Section 3 - Viewing Access Point StatusField DescriptionKnown AP ListAction List by clicking the Grant button or if the MAC address of the AP appears in an AP list that has been imported. Delete. does not have any control over the APs on the list and cannot apply any security policies to MAC Shows the MAC address of the neighboring AP. Indicates the type of device:AP Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. mode or an .SSID The for the AP.local area network. It is also referred to as the .The SSID is set on the VAP page. (See 60) Indicates whether there is any security on the neighboring device.Off indicates that the Security mode on the neighboring device is set to None (no security).On indicates that the neighboring device has some security in place.VAP page.Band The number shown indicates the mode according to the following map:2.4 5 Channel Shows the Channel on which the AP is currently broadcasting.and receiving.The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)Table 12 - Rogue AP Detection. The list contains the MAC addresses of all AP that have been added to and view its contents.1.)  Select the Replace Select the Merge 2.)  Click Browse in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries 3.)  Click Import. 
Page 31March 2012Section 3 - Viewing Access Point StatusViewing Managed AP DHCP InformationDHCP request. The Managed AP DHCP Wireless Switches that the AP learned about from a DHCP server on your network.Figure 11 - Managed AP DHCP Informationinformation, see the for the switch.The page provides:All of the transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these tab.Figure 12 - 
Page 32March 2012Section 3 - Viewing Access Point StatusField DescriptionAP and VAP StatusInterface Indicates the name of the Radio or VAP interface. Status Access Category.activity). Category.TS Clients Category.Medium Time AdmittedTime (in 32 microsecond per second units) allocated for this Access Category over the transmission medium to carry data. This value should be less than or equal to the maximum bandwidth allowed over the medium for this TS.Medium Time UnallocatedTime (in 32 microsecond per second units) of unused bandwidth for this Access Category.Transmit and Receive Statistics Indicates the total number of TS packets sent (in Transmit table) or received (in Received  Indicates the total number of TS bytes sent (in Transmit table) or received (in Received  Indicates the total number of TS voice packets sent (in Transmit table) or received (in Received table) by this AP for this VAP. Indicates the total TS voice bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP. Indicates the total number of TS video packets sent (in Transmit table) or received (in Received table) by this AP for this VAP. Indicates the total TS video bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP.Table 13 - The rejected by the AP.tab.Figure 13 - 
Page 33March 2012Section 3 - Viewing Access Point StatusField DescriptionACMStreams.ACMStreams.Table 14 - Viewing Radio Statistics InformationThe Radio Statistics page provides detailed information about the packets and bytes transmitted and received on the radio interface of this access point.Figure 14 - View Radio StatisticsThe following table describes details about the Radio Statistics information.Field DescriptionRadio Choose either radio 1 or radio 2 to view statistics for the selected radioTotal packets received by the AP on this radio interface.Total bytes received by the AP on this radio interface.TransmittedTotal packets transmitted by the AP on this radio interface.TransmittedTotal bytes transmitted by the AP on this radio interface.Number of packets received by the AP on this radio interface that were dropped.Number of bytes received by the AP on this radio interface that were dropped.Transmit DroppedNumber of packets transmitted by the AP on this radio interface that were dropped.Transmit DroppedNumber of bytes transmitted by the AP on this radio interface that were dropped.Fragments Count of successfully received MPDU frames of type data or management.Fragments TransmittedNumber of transmitted MPDU with an individual address or an MPDU with a multicast address of type Data or Management.Multicast Frames Count of MSDU frames received with the multicast bit set in the destination MAC address.
Page 34March 2012Section 3 - Viewing Access Point StatusField DescriptionMulticast Frames TransmittedCount of successfully transmitted MSDU frames where the multicast bit is set in the destination MAC address.Duplicate Frame CountFailed Transmit CountNumber of times an MSDU is not transmitted successfully due to transmit attempts exceeding either the short retry limit or the long retry limit.CountNumber of times an MSDU is successfully transmitted after one or more retries.CountNumber of times an MSDU is successfully transmitted after more than one retry.RTS Success Count Count of CTS frames received in response to an RTS frame.RTS Failure Count Count of CTS frames not received in response to an RTS frame.  Frames Transmitted Count of each successfully transmitted MSDU.Countthat the frame should not have been encrypted or that frame was discarded due to the receiving station not implementing the privacy option.Table 15 - Radio Statistics Informationmessages generated in the AP. tab.72.Figure 15 - Field Description Up or Down. The default is Down.SentThe total number of email sent so far. The range is an unsigned integer of 32 bits. The default is 0.FailedThe total number of email failures so far. The range is an unsigned integer of 32 bits. The default is 0.Time Since Last The time since the last email was sent. Time format is used. The default is 00 days 00 hours 00 minutes 00 seconds.Table 16 - 
Page 35March 2012Section 4 - Managing the Access PointSection 4 - Managing the Access PointThis section describes how to manage the UAP and contains the following subsections:“Wireless Settings” on page 37“Modifying Radio Settings” on page 40“Scheduler Association Settings” on page 46“Virtual Access Point Settings” on page 47“Controlling Access by MAC Authentication” on page 59“” on page 61“Creating a Management Access Control List (ACL)” on page 64Manage heading on the Administration Web UI.The default wired interface settings, which include DHCP and VLAN information, might not work for all networks. By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to information.The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have management VLAN on the AP.tab.Figure 16 - page.
Page 36March 2012Section 4 - Managing the Access PointField DescriptionHostname The hostname has the following requirements:The length must be between 1 – 63 characters.Upper and lower case characters, numbers, and hyphens are accepted. hyphen.MAC Address IDThe management VLAN is the VLAN associated with the IP address you use to access the AP. The default management VLAN ID is 1.Provide a number between 1 and 4094 for the management VLAN ID.   If you select DHCP, the UAP acquires its IP address, subnet mask, DNS, and gateway information from a DHCP server.If you select Static IP, you must enter information in the Static IP Address, Subnet Mask, Static IP Address connection type. in the text boxes. in the text boxes. Select the mode for the DNS.In mode, the IP addresses for the DNS servers are assigned automatically via In Manual mode, you must assign static IP addresses to resolve domain names. Admin Mode Global AddressesIf the AP has been assigned one or more IPv6 addresses automatically, the addresses are listed.AddressShows the IPv6 Link Local address, which is the IPv6 address used by the local physical Discovery process.Table 17 - to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that 
Page 37March 2012Section 4 - Managing the Access PointWireless Settingsaccess point (802.11 Mode and Channel) and to the network interface to the access point (MAC address for access point and Wireless Network name, also known as SSID). Manage > Wireless Settings tab.Figure 17 - Wireless Settings page.Field DescriptionSpecify the time interval (in seconds) for the AP to report (through the system log and SNMP traps) associated clients that do not adhere to mandatory admission control procedures.Radio Interface Specify whether you want the radio interface on or off.MAC Address Indicates the Media Access Control (MAC) addresses for the interface. Dual-radio APs have a unique MAC address for each radio.A MAC address is a permanent, unique hardware address for any device that represents an interface to the network. The MAC address is assigned by the manufacturer. You cannot change the MAC address. It is provided here for informational purposes as a unique 
Page 38March 2012Section 4 - Managing the Access PointField DescriptionMode The Mode The modes available depend on the country code setting and the radio selected.Select one of the following modes for radio 1:ranging from 6 to 54 Mbps. supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11 b, 802.11g, and 802.11a.is the recommended mode for networks with 802.11n devices compatible with legacy devices (802.11a).Select one of the following modes for radio 2:of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division 802.11g, and 802.11n devices.is the recommended mode for networks with 802.11n devices compatible with legacy devices (802.11b/g).Channel Select the Channel. The range of available channels is determined by the mode of the radio interface and the country code setting. If you select Auto for the channel setting, the AP scans available When automatic channel assignment is enabled on the Channel Management page for Clustering, the channel policy for the radio is automatically set to static mode, and the Auto the channels for the radios in the cluster.Station Isolation To enable Station Isolation, select the check box directly beside it.When Station Isolation is disabled, wireless clients can communicate with one another When Station Isolation is enabled, the AP blocks communication between wireless clients wired devices on the network, across a WDS link, and with other wireless clients associated with a different VAP, but not among wireless clients associated with the same VAP.
Page 39March 2012Section 4 - Managing the Access PointField DescriptionProtocol Supportwhether to enable support for the AeroScout protocol. Options are or Disabled. The default is Disabled. When enabled, Aeroscout determines the geographical location of 802.11 capable devices, such as STAs, APs, and the managed access points from which it collects information. The Wireless Switch cannot Support” on page 39. Only AeroScout tag hardware of types T2 and T3 are explicitly supported. Other tag models are also supported only if their implementation of the AeroScout protocol conforms to the , version 2.1. AeroScout tags operate only in 802.11 b/g mode. Therefore, network administrators D-Link APs do not support this feature and never report detected APs as rogues.Table 18 - Wireless Settingsto apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that Using the 802.11h Wireless Mode802.11h only works for the 802.11a band. It is not required for 802.11b or 802.11g.If you are operating in an 802.11h enabled domain, the AP attempts to use the channel you assign. If the channel has been blocked by a previous radar detection, or if the AP detects a radar on the channel, then the AP automatically selects a different channel. scanning.two APs on the WDS link may keep changing depending on channel usage and radar interference. WDS will Balancing” on page 60.
Page 40March 2012Section 4 - Managing the Access PointAeroScout tags operate only in 802.11b/g mode. Therefore, network administrators who use the AeroScout tags must  The following notes apply to AeroScout product and protocol support:D-Link does not sell AeroScout products. Contact AeroScout for AeroScout hardware, software or deployment information.and the access point.receives and processes all packets detected by the radios, as opposed to processing only packets destined to the APs BSSID. This can affect AP throughput.Radio settings directly control the behavior of the radio devices in the AP and its interaction with the physical medium; that is, how and what type of electromagnetic waves the AP emits.To specify radio settings, click the Radio tab in the Manage section.Different settings display depending on the mode you select. All settings are described in the table below.Figure 18 - Radio Settings page.Field DescriptionRadio (802.11b/g/n). Specify whether you want the radio on or off by clicking On or Off. If you turn off a radio, the AP sends disassociation frames to all the wireless clients it is currently supporting so that the radio can be gracefully shutdown and the clients can start the association process with other available APs.
Page 41March 2012Section 4 - Managing the Access PointField DescriptionMode The Mode  The modes available depend on the country code setting and the radio selected.Select one of the following modes for radio 1:ranging from 6 to 54 Mbps. supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11 b, 802.11g, and 802.11a.is the recommended mode for networks with 802.11n devices compatible with legacy devices (802.11a).Select one of the following modes for radio 2:of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division 802.11g, and 802.11n devices.is the recommended mode for networks with 802.11n devices compatible with legacy devices (802.11b/g).Channel Select the Channel.The range of available channels is determined by the mode of the radio interface and the country code setting. If you select Auto for the channel setting, the AP scans available When automatic channel assignment is enabled on the Channel Management page for Clustering, the channel policy for the radio is automatically set to static mode, and the Auto the channels for the radios in the cluster.Channel Bandwidth channel available with other modes. The 40 MHz channel enables higher data rates but 20 MHz to restrict the use of the channel bandwidth to a 20 MHz channel.This setting can be changed only when the channel bandwidth is set to 40 MHz. A 40 MHz channel can be considered to consist of two 20 MHz channels that are contiguous in the frequency domain. These two 20 MHz channels are often referred to as the and channels. The Primary Channel is used for 802.11n clients that support only a 20 MHz channel bandwidth and for legacy clients.Select one of the following options:Lower — Set the Primary Channel as the lower 20 MHz channel in the 40 MHz band.Upper — Set the Primary Channel as the upper 20 MHz channel in the 40 MHz band.
Page 42March 2012Section 4 - Managing the Access PointField DescriptionSupportedinterval prevents Inter-Symbol and Inter-Carrier Interference (ISI, ICI). The 802.11n mode throughput. Select one of the following options:Yes — The AP transmits data using a 400ns guard Interval when communicating with clients that also support the short guard interval. — The AP transmits data using an 800ns guard interval.STBC Mode Space Time Block Coding (STBC) is an 802.11n technique intended to improve the reliability of data transmissions. The data stream is transmitted on multiple antennas so the receiving system has a better chance of detecting at least one of the data streams.Select one of the following options:On — The AP transmits the same data stream on multiple antennas at the same time.Off — The AP does not transmits the same data on multiple antennas.Protection The protection feature contains rules to guarantee that 802.11n transmissions do not cause interference with legacy stations or APs. By default, these protection mechanisms are enabled (Auto). With protection enabled, protection mechanisms will be invoked if legacy devices are within range of the AP. This causes more overhead on every transmission, which will impact performance. However, there is no impact on performance if there are no legacy devices within range of the AP.You can disable (Off) these protection mechanisms; however, when 802.11n protection is off, legacy clients or APs within range can be affected by 802.11n transmissions. The 802.11 protection feature is also available when the mode is 802.11b/g. When protection is enabled in this mode, it protects 802.11b clients and APs from 802.11g transmissions.  This setting does not affect the ability of the client to associate with the AP. Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).DTIM Period Specify a DTIM period from 1 to 255 beacons.Beacon frames. It indicates which client stations, currently sleeping in low-power mode, have data buffered on the AP awaiting pick-up.The DTIM period you specify indicates how often the clients served by this AP should check for buffered data still on the AP awaiting pickup.every 10th beacon.Fragmentation ThresholdSpecify a number between 256 and 2,346 to set the frame size threshold in bytes. The fragmentation threshold is a way of limiting the size of packets (frames) transmitted over the network. If a packet exceeds the fragmentation threshold you set, the fragmentation function is activated and the packet is sent as multiple 802.11 frames.If the packet being transmitted is equal to or less than the threshold, fragmentation is not used.Setting the threshold to the largest value () effectively disables fragmentation. However, fragmentation can help improve network performance and reliability if properly Sending smaller frames (by using lower fragmentation threshold) might help with some interference problems; for example, with microwave ovens.By default, fragmentation is off. We recommend not using fragmentation unless you suspect radio interference. The additional headers applied to each fragment increase the overhead on the network and can greatly reduce throughput.
Page 43March 2012Section 4 - Managing the Access PointField DescriptionRTS Threshold Specify a Request to Send (RTS) Threshold value between 0 and 2347.The RTS threshold indicates the number of octets in an MPDU, below which an RTS/CTS handshake is not performed. with a lot of clients. If you specify a low threshold value, RTS packets will be sent more frequently. This will consume more bandwidth and reduce the throughput of the packet. On the other hand, sending more RTS packets can help the network recover from interference or collisions which might occur on a busy network, or on a network experiencing electromagnetic interference.Maximum Stations Specify the maximum number of stations allowed to access this AP at any one time.You can enter a value between 0 and 200.Transmit Power The default value, which is 100%it gives the AP a maximum broadcast range and reduces the number of APs needed.To increase capacity of the network, place APs closer together and reduce the value of the transmit power. This helps reduce overlap and interference among APs. A lower transmit power setting can also keep your network more secure because weaker wireless signals are less likely to propagate outside of the physical location of your network.Fixed Multicast Rate  Check the transmission rate sets you want the AP to support and the basic rate sets you want the AP to advertise:Rates are expressed in megabits per second.Supported Rate Sets indicate rates that the AP supports. You can check multiple rates (click a check box to select or de-select a rate). The AP will automatically choose the the AP.Basic Rate Sets indicate rates that the AP will advertise to the network for the purposes of setting up communication with other APs and client stations on the supported rate sets.index can be enabled and disabled independently.Broadcast/Multicast Rate Limitinglimiting the number of packets transmitted across the network. By default the Multicast/Broadcast Rate Limiting option is disabled. Until you enable Multicast/Broadcast Rate LimitingRate Limit falls below this rate limit will always conform and be transmitted to the appropriate destination. The default and maximum rate limit setting is 50 packets per second.Rate Limit Burst setting is 75 packets per second. On Radio Off ModeRegulates mandatory admission control (ACM) for the voice access category. The options are:On Off 
Page 44March 2012Section 4 - Managing the Access PointField DescriptionLimitmedium using a voice AC to gain access.ModeRegulates mandatory admission control for the video access category. The options are:On Off Limitmedium using a video AC to gain access.TimeoutSpecify the amount of time for an AP to detect an downlink TS as idle before deleting it.Specify the amount of time for an AP to detect an uplink TS as idle before deleting it.ModeSelect Table 19 - Radio SettingsUse the Radio and then other radio.select the Scheduler tab in the Manage and Radios.to achieve security and reduce power consumption. You can also use the Scheduler to allow access to VAPs for rules are periodic in nature and are repeated every week. A valid rule must contain all of the following parameters: Days of the Week.Start Time (hour and minutes).
Page 45March 2012Section 4 - Managing the Access PointFigure 19 - Field DescriptionGlobal Scheduler ModeA global switch to enable or disable the scheduler feature. The default is Disable.Scheduler Operational StatusStatus The operational status of the Scheduler. The range is Up or Down. The default is Down.Reason Provides additional information about the status. The reason can be one or more of the following:– Operational status is up.– Operational status is down because the AP time has not been set, either manually or by specifying an NTP server to use.ManagedMode– Operational status is down because the AP is in managed mode. Add name. periodic rule are described below. Set Schedule The day of the week. Range is: , (Saturday and Sunday), , , , , , , . The default is .Start Time The time when the radio or VAP will be operationally enabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00. The time when the radio or VAP will be operationally disabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00.Table 20 - To change an existing rule, select the rule, update the values in the area, and click .
Page 46March 2012Section 4 - Managing the Access PointFigure 20 - Click to apply the changes and to save the settings.Scheduler Association SettingsScheduler Association tab in the Manage section. By default, there are no Scheduler disabled, then all the VAPs associated to that radio are also operationally disabled irrespective of the VAP Figure 21 - Scheduler Association Settings
Page 47March 2012Section 4 - Managing the Access PointField Description1 or 2   Status The operational status of the Scheduler. The range is Up or Down.Radio 0-15 Status The operational status of the Scheduler. The range is Up or Down.Table 21 - Scheduler Association Settingsclick to apply the changes and to save the settings.Virtual Access Point SettingsVAP tab in the Manage section.a unique SSID. Multiple SSIDs make a single AP look like two or more APs to other systems on the network. performance. whether the VLAN is on the same radio or on a different radio. VAP0, which is always enabled on both radios, is assigned to the default VLAN 1.VAP. The external RADIUS server assigns wireless clients to the VLAN when the clients associate and authenticate.the others act as backup servers. The network type (IPv4 or IPv6) and accounting mode are common across all If wireless clients use a security mode that does not communicate with the RADIUS server, or if the RADIUS server does not provide the VLAN information, you can assign a VLAN ID to each VAP. The AP assigns the VLAN to all wireless clients that connect to the AP through that VAP.To set up multiple VAPs, click Manage > VAP.
Page 48March 2012Section 4 - Managing the Access PointFigure 22 - VAP page.Field DescriptionRADIUS IP Address Specify the IP version that the RADIUS server uses.and global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address RADIUS IP Address Addressauthentication request to the primary server. If the primary server responds to the authentication request, the AP continues to use this RADIUS server as the primary server, and authentication requests are sent to the address you specify.If the address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.Address 1–3label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.sequence. The IPv4 or IPv6 address must be valid in order for the AP to attempt to contact the server. The is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must displayed as “*” characters to prevent others from seeing the RADIUS key as you type. and so on.AccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable.
Page 49March 2012Section 4 - Managing the Access PointField DescriptionRadio VAP disable VAP0, you must disable the radio. option beside the appropriate VA P.option beside the appropriate VAP. ID or use a RADIUS server to assign a wireless client to a VLAN. The range for the VLAN ID is 1 – 4094.If you use RADIUS-based authentication for clients, you can optionally add the following client:“Tunnel-Type”“Tunnel-Medium-Type”VAP page. more information, see 35.SSID characters. You can use the same SSID for multiple VAPs, or you can choose a unique SSID for each VAP. If you are connected as a wireless client to the same AP that you are administering, resetting the SSID will cause you to lose connectivity to the AP. You will need to reconnect to the new SSID after you save this new setting.Broadcast SSID frames. The Broadcast SSID parameter is enabled by default. When the VAP does not broadcast its SSID, the network name is not displayed in the list of available networks on supplicant before it is able to connect.To enable the SSID broadcast, select the Broadcast SSID check box. To prohibit the SSID broadcast, clear the Broadcast SSID check box.connecting to your network, but it will not prevent even the simplest of attempts by a hacker minimal level of protection on an otherwise exposed network (such as a guest network) where the priority is making it easy for clients to get a connection and where no sensitive information is available. Select one of the following modes for this VAP:WPA Personalexplained below.MAC Authentication the network. The drop-down menu for this feature allows you to select the type of MAC Authentication to use: Do not use MAC Authentication.page. Use the MAC Authentication list on the external RADIUS server.“Controlling Access by MAC Authentication” on page 59.
Page 50March 2012Section 4 - Managing the Access PointField DescriptionRedirect Mode HTTP redirect feature to redirect wireless clients to a custom Web page. When redirect mode is enabled, the user will be redirected to the URL you specify after the wireless client associates with an AP and the user opens a Web browser on the client to access the Internet.The custom Web page must be located on an external Web server and might contain information such as the company logo and network usage policy.  The wireless client is redirected to the external Web server only once while it is associated with the AP.Redirect URL Specify the URL where the Web browser is to be redirected after the wireless client Table 22 - Virtual Access Point Settingsto apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change If you select any data transferred to and from the UAP is not encrypted. This security mode can be useful during initial network not secure.cipher called RC4.)Figure 23 - Field  Description default is 1.transmits. Specify the length of the key by clicking one of the radio buttons:64 bits128 bits
Page 51March 2012Section 4 - Managing the Access PointField  Description Select the key type by clicking one of the radio buttons:ASCIIHex key. The keys you enter depend on the key type selected: ASCII — Includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Authentication Specify the authentication algorithm you want to use by choosing one of the following options:authentication allows any client station to associate with the AP whether Open System, any client can associate with the AP.Just because a client station is allowed to associate does not ensure it can exchange and decrypt data from an AP, and to transmit readable data to the AP.order to associate with the AP. When the authentication algorithm is set to Shared . When you select both authentication algorithms:key in order to associate with the AP.enabled) will be able to associate with the AP even if they do not have the correct Table 23 - The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station transmissions.abc123 Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but this is less secure because it means one station can decrypt the data being sent by another.)key index”, and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs cannot decode each other’s transmissions.
Page 52March 2012Section 4 - Managing the Access Pointperiodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame.This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server the AP uses.Figure 24 - Field DescriptionUse Global RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS RADIUS IP Address Specify the IP version that the RADIUS server uses.address settings, but the AP contacts only the RADIUS server or servers for the address RADIUS IP AddressAddressaddress of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.Address 1–3is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.sequence. The is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must displayed as “*” characters to prevent others from seeing the RADIUS key as you type. and so on.
Page 53March 2012Section 4 - Managing the Access PointField DescriptionAccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable. Refresh Rateassociated to this VAP (the default is 300). The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Refresh Rateclient associated to the VAP. The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 24 - to apply the changes and to save the settings. WPA PersonalThis security mode is backwards-compatible for wireless clients that support the original WPA.Figure 25 - Field DescriptionWPA Versions Select the types of client stations you want to support:WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA.WPA2. If all client stations on the network support WPA2, we suggest using WPA2 WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both of the check boxes. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust at the expense of some security.
Page 54March 2012Section 4 - Managing the Access PointField DescriptionCipher Suites Select the cipher suite you want to use:and following to be able to associate with the AP:A valid A valid  The characters to a maximum of 63 characters. Acceptable characters include upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Refresh Rateassociated to this VAP (the default is 300).The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 25 - WPA Personalto apply the changes and to save the settings. This security mode is backwards-compatible with wireless clients that support the original WPA.Figure 26 - Field DescriptionWPA Versions Select the types of client stations you want to support:WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA.WPA2. If all client stations on the network support WPA2, we suggest using WPA2 WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both WPA and WPA2. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 expense of some security.
Page 55March 2012Section 4 - Managing the Access PointField DescriptionauthenticationIf for WPA Versions you select only WPA2 or both WPA and WPA2, you can enable pre-authentication for WPA2 clients.Click if you want WPA2 wireless clients to send pre-authentication packet. The pre-authentication information will be relayed from the AP authentication for roaming clients who connect to multiple APs.This option does not apply if you selected WPA for WPA Versions because the original WPA does not support this feature.Cipher Suites Select the cipher suite you want to use:and Use Global RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS RADIUS IP Address Specify the IP version that the RADIUS server uses.and global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address RADIUS IP Address Address or for the primary RADIUS server for this VAP.If the address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.Address 1–3is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.sequence. The is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must displayed as “*” characters to prevent others from seeing the RADIUS key as you type. and so on.AccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable. Refresh Rateassociated to this VAP (the default is 300). The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.
Page 56March 2012Section 4 - Managing the Access PointField DescriptionRefresh Rateclient associated to the VAP. The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 26 - to apply the changes and to save the settings.The Wireless Distribution System (WDS) allows you to connect multiple UAPs. With WDS, APs communicate with one another without wires in a standardized way. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the number of links to connect.In the point-to-point mode, the AP accepts client associations and communicates with wireless clients and other The bridge does not add to the hop count. It functions as a simple OSI layer 2 network device.In the point-to-multipoint bridge mode, one AP acts as the common link between multiple APs. In this mode, the central AP accepts client associations and communicates with the clients and other repeaters. All other APs associate only with the central AP that forwards the packets to the appropriate wireless bridge for routing purposes.The UAP can also act as a repeater. In this mode, the AP serves as a connection between two APs that might be too far apart to be within cell range. When acting as a repeater, the AP does not have a wired connection to the LAN repeater, and there are no repeater mode settings. Wireless clients can still connect to an AP that is operating as a repeater. When you move an AP from Standalone Mode to Managed Mode, WDS is disabled. Administrator UI, as well as Telnet, SSH, and SNMP access are disabled when the AP is in Managed Mode.WDS tab.
Page 57March 2012Section 4 - Managing the Access PointFigure 27 - APs participating in the WDS link.You can have only one WDS link between any pair of APs. That is, a remote MAC address may appear only once on the WDS page for a particular AP.mode. (See “Modifying Radio Settings” on page 40 channel.)Field DescriptionSpanning Tree ModeSpanning Tree Protocol (STP) prevents switching loops. STP is recommended if you Select to use STPSelect Disabled to turn off STP links (not recommended)Radio Local Address Indicates the MAC addresses for this AP.internal interface on the selected radio (Radio One on wlan0 or Radio Two on wlan1).Remote Address Specify the MAC address of the destination AP; that is, the AP on the other end of the WDS link to which data will be sent or handed-off and from which data will be received.Click the drop-down arrow to the right of the Remote Address available MAC Addresses and their associated SSIDs on the network. Select the appropriate MAC address from the list. The SSID displayed in the drop-down list is simply to help you identify the correct MAC Address for the destination AP. This SSID is a separate SSID to that which you set for the WDS link. The two do not (and should not) be the same value or name. You can use , , or  on the WDS link. If you are unconcerned about security issues on the WDS link you may decide not to set any type of encryption. Alternatively, if you have security concerns you can choose between Table 27 - WDS Settings
Page 58March 2012Section 4 - Managing the Access PointIf you select WDS page. All data transferred between the two APs on the WDS link will be unencrypted.Field Description   64 bits128 bits ASCIIHexCharacters Required Table 28 - Field Description SSID different from the other SSIDs used by this AP. However, it is important that the same SSID is also entered at the other end of the WDS link. If this SSID is not the same for both APs on the WDS link, they will not be able to communicate and exchange data.The SSID can be any alphanumeric combination. entered for the AP at the other end of the WDS link. If this key is not the same for both APs, they will not be able to communicate and exchange data.Acceptable characters include upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Table 29 - to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that 
Page 59March 2012Section 4 - Managing the Access Pointhexadecimal digits separated by colons, for example 00:DC:BA:09:87:65used by a wireless client has a unique MAC address.You can use the Administrator UI on the AP or use an external RADIUS server to control access to the network through the AP based on the MAC address of the wireless client. This feature is called MAC Authentication or MAC the network. When a wireless client attempts to associate with an AP, the AP looks up the MAC address of the client in the local Stations List or on the RADIUS server. If it is found, the global allow or deny setting is applied. If it is not found, the opposite is applied.On the VAP locally on the MAC Authentication MAC Authentication page determines whether the clients in the station list (local or RADIUS) can access the network “Virtual Access Point Settings” on page 47.The MAC Authentication page allows you to control access to UAP based on MAC addresses. Based on how you only client stations with a listed MAC address or access to the stations listed.When you enable MAC Authentication and specify a list of approved MAC addresses, only clients with a listed MAC address can access the network. If you specify MAC addresses to deny, all clients can access the network except for the clients on the deny list.MAC Authentication tab.Figure 28 - 
Page 60March 2012Section 4 - Managing the Access PointField DescriptionFilter . Any station that is not in the Stations List is denied access to the network through the AP.. Only the stations that appear in the list are denied access to the network through the AP. All other stations are permitted access.that station list is local or on the RADIUS server.Stations List This is the local list of clients that are either permitted or denied access to the network through the AP. To add a MAC Address to the local Stations List, enter its 48-bit MAC address into the lower text boxes, then click Add. To a MAC Address from the Stations List, select its 48-bit MAC address, then click . If the MAC authentication type for the VAP is set to Local, the AP uses the Stations List to permit or deny the clients access to the network. If the MAC authentication type is set page.Table 30 - MAC Authenticationto apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We RADIUS server. The station list contains client MAC address entries, and the format for the list is described in the following table. Description Value MAC address of the client station.  lookup a client MAC entry.NOPASSWORDTable 31 - You can set network utilization thresholds on the UAP to maintain the speed and performance of the wireless network as clients associate and disassociate with the AP. The load balancing settings apply to all supported radios. point, click the Load Balancing Figure 29 - 

Navigation menu