D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 1

D Link Corporation 802.11n Single-band Unified Access Point Part 1

Contents

User Manual Part 1



Page 1
March 2012


Page 2
March 2012
Table of Contents
Section 1 - About This Document ............................................................................................9
Document Organization ......................................................................................................................................... 9
Additional Documentation ..................................................................................................................................... 9
Document Conventions ......................................................................................................................................... 9
Online Help, Supported Browsers, and Limitations ............................................................................................. 10
Section 2 - Getting Started ...................................................................................................... 11
Administrator’s Computer Requirements ............................................................................................................ 11
Wireless Client Requirements ............................................................................................................................. 12
Dynamic and Static IP Addressing on the AP ...................................................................................................... 13
Recovering an IP Address ............................................................................................................................. 13
Discovering a Dynamically Assigned IP Address .......................................................................................... 13
Installing the UAP ................................................................................................................................................ 13
Basic Settings ...................................................................................................................................................... 16
Connecting to the AP Web Interface by Using the IPv6 Address .................................................................. 17
Using the CLI to View the IP Address.................................................................................................................. 17
 ....................................................................................................................... 18
 ............................................................................................... 18
 ............................................................................................................. 19
 ..................................................................... 20
Verifying the Installation ...................................................................................................................................... 20
 ............................................................................................. 21
Section 3 - Viewing Access Point Status ............................................................................... 22
Viewing Interface Status ...................................................................................................................................... 22
Wired Settings (Internal Interface) ................................................................................................................ 22
Wireless Settings .......................................................................................................................................... 22
 .................................................................................................................................................... 23
 ........................................................................................................ 23
 .................................................................................. 24
 .................................................................... 24
Viewing Transmit and Receive Statistics ............................................................................................................. 25
Viewing Associated Wireless Client Information ................................................................................................. 26
 .................................................................................................................... 26
Link Integrity Monitoring ................................................................................................................................ 28
Viewing Rogue AP Detection............................................................................................................................... 28
 ...................................................................................................... 30
Viewing Managed AP DHCP Information ............................................................................................................ 31
 .............................................................................................. 31
 ........................................................................................................... 32
Viewing Radio Statistics Information ................................................................................................................... 33
 ............................................................................................................... 34
Section 4 - Managing the Access Point .................................................................................35
 ................................................................................................................................................. 35
Wireless Settings ................................................................................................................................................. 37
Using the 802.11h Wireless Mode ................................................................................................................. 39
 ......................................................................................................... 39
Modifying Radio Settings ..................................................................................................................................... 40
................................................................................................................ 44
Scheduler Association Settings ........................................................................................................................... 46
Virtual Access Point Settings ............................................................................................................................... 47
None (Plain-text) ........................................................................................................................................... 50
 .................................................................................................................................................... 50
 .................................................................................................................................................. 51
WPA Personal ............................................................................................................................................... 53
 ............................................................................................................................................. 54
 ......................................................................................... 56
 ...................................................................................................................................... 58
 .............................................................................................................................. 58


Page 3
March 2012
Controlling Access by MAC Authentication ......................................................................................................... 59
..................................................................................... 59
 .............................................................................. 60
 ................................................................................................................................ 60
Managed Access Point Overview ........................................................................................................................ 61
Transitioning Between Modes ....................................................................................................................... 61
 ................................................................................................ 62
 ...................................................................................................................... 63
Creating a Management Access Control List (ACL) ............................................................................................ 64
 ....................................................................65
Web Server Settings ........................................................................................................................................... 65
 .............................................................................................................. 66
Setting the SSH Status ........................................................................................................................................ 68
Setting the Telnet Status ..................................................................................................................................... 69
 ............................................................................................................................. 69
 ........................................................................................................................................ 72
 ....................................................................................................................... 73
 ............................................................................................75
 ................................................................................................................................ 75
 .............................................................................................................................. 76
 ................................................................................................................................ 77
 .............................................................................................................................. 78
Section 7 - Maintaining the Access Point ..............................................................................79
 ............................................................................................. 79
 .................................................................................. 80
Performing AP Maintenance ................................................................................................................................ 81
 ................................................................................................. 81
Rebooting the Access Point .......................................................................................................................... 81
 ...................................................................................................................................... 81
 ........................................................................................................ 83
Packet Capture Status .................................................................................................................................. 83
 ..................................................................................................... 84
 ....................................................................................................................................... 84
Remote Packet Capture ................................................................................................................................ 85
 ...................................................................................................................... 87
 ......................................................88
 ...................................................................................................................... 88
 ................................................................................................................................. 89
IPv4 and IPv6 ACLs ...................................................................................................................................... 89
MAC ACLs ..................................................................................................................................................... 90
 ........................................................................................................................... 90
Creating a DiffServ Class Map ............................................................................................................................ 95
 ........................................................................................................................................... 96
Creating a DiffServ Policy Map ......................................................................................................................... 100
 .............................................................................................................................................. 101
 ................................................................................... 102
Section 9 - Clustering Multiple APs .....................................................................................104
Managing Cluster Access Points in the Cluster ................................................................................................. 104
Clustering APs ............................................................................................................................................. 104
 ................................................................................................. 104
Removing an Access Point from the Cluster ............................................................................................... 106
Adding an Access Point to a Cluster ........................................................................................................... 106
........................................................................... 106
Navigating to an AP by Using its IP Address in a URL ................................................................................ 106
Managing Cluster Sessions ............................................................................................................................... 106
Sorting Session Information ........................................................................................................................ 107
 ................................................................................. 108
Stopping/Starting Automatic Channel Assignment ...................................................................................... 108
Viewing Current Channel Assignments and Setting Locks ......................................................................... 109


Page 4
March 2012
Viewing the Last Proposed Set of Changes ................................................................................................ 109
 ................................................................................................................... 109
Viewing Wireless Neighborhood Information .................................................................................................... 110
Viewing Details for a Cluster Member ......................................................................................................... 112
Appendix A - Default AP Settings ......................................................................................... 113
 ................................................................................115
 ............................................................................................................................................. 115
 ................................................................................................. 115
 .................................................................................................................. 115
 ................................................................................................................. 116
 ................................................................................................................................ 116
 ............................................................................................... 117
 ................................................................................................................ 117
 ............................................................................................................... 118
 ................................................................................................... 118
 ................................................................................................ 118
 ................................................................................................................. 119
 ................................................................................................................ 119
Clustering Access Points ................................................................................................................................... 119
Clustering APs by Using the Web Interface ................................................................................................ 119
Clustering APs by Using the CLI ................................................................................................................. 120
Clustering APs by Using SNMP .................................................................................................................. 120
 ..................................................................................................................................... 121
 ............................................................................................. 121
 .............................................................................................................. 124
Appendix C - Statements ......................................................................................................127


Page 5
March 2012
List of Figures
 ................................................................................................................... 10
 .............................................................................................................................. 14
 ............................................................................................................................ 15
 ............................................................................................ 18
 ......................................................................................................................... 22
 ........................................................................................................................................ 23
 ......................................................................................................................... 25
 ................................................................................................... 26
 ....................................................................................................... 27
............................................................................................ 28
 ............................................................................................................ 31
 ................................................................................................... 31
 ........................................................................................................ 32
 ............................................................................................................................. 33
 .............................................................................................................. 34
 ........................................................................................................... 35
 ....................................................................................................................... 37
 ........................................................................................................................... 40
 ....................................................................................................................... 45
 ................................................................................................. 46
 ............................................................................................................. 46
 ..................................................................................................... 48
 ............................................................................... 50
 .............................................................................. 52
 .......................................................................... 53
 ........................................................................ 54
 ........................................................................................................................ 57
 .............................................................................................................. 59
 ............................................................................................................ 60
 ........................................................................... 62
 ................................................................................ 63
 ............................................................................ 64
 ............................................................................................................. 65
 ............................................................................................................................. 67
 ..................................................................................................................................... 68
 ................................................................................................................................... 69
 ............................................................................................................ 70
 ..................................................................................................................... 72
 .............................................................................................................................. 74
 ............................................................................................................... 75
 ............................................................................................................. 76
 ................................................................................................................. 77
 ............................................................................................................. 78
 .................................................................... 79
 .................................................................... 79
 ............................................................................................................................. 80
 ................................................................ 80
 ............................................................... 80
 ................................................................................................................. 81
 ..................................................................................................................... 82
 .................................................................................................................... 82
 ............................................................................................. 83
 .......................................................................................................................... 84
 ............................................................................................................... 84
 .............................................................................................................................. 85
 ........................................................................................................................ 86
 ............................................................................................................. 87
 ...................................................................................................... 88
 ...................................................................................................... 90


Page 6
March 2012
 .............................................................................. 96
 ............................................................................ 100
 .............................................................................. 101
 ................................................................................ 104
 ................................................................................... 105
 ................................................................................. 107
 ..................................................................................... 108
 ..........................................................................................................111
 ................................................................................................ 112
 ......................................................................................... 115
 ....................................................................................... 117
 ........................................................................................ 118
 ........................................................................ 119
 ........................................................................... 120
 ................................................................ 121
 ........................................................................ 121
 ........................................................................ 122
 ............................................... 122
 ...................................................... 123
 .......................................................................... 123
 ............................................ 123
 ................................................................. 124
 .................................................................................................... 124


Page 7
March 2012
List of Tables
Table 1 - Typographical Conventions ...................................................................................................................... 10
Table 2 - Requirements for the Administrator’s Computer ....................................................................................... 12
Table 3 - Requirements for Wireless Clients ........................................................................................................... 12
Table 4 - Basic Settings Page ................................................................................................................................. 17
 ........................................................................................................ 19
 ............................................................................................... 20
Table 7 - Logging Options ....................................................................................................................................... 24
Table 8 - Log Relay Host ......................................................................................................................................... 24
Table 9 - Transmit/Receive ...................................................................................................................................... 26
Table 10 - Associated Clients .................................................................................................................................. 26
 ..................................................................................................................... 28
Table 12 - Rogue AP Detection ............................................................................................................................... 30
 .................................................................................................................. 32
 ............................................................................................................................... 33
Table 15 - Radio Statistics Information .................................................................................................................... 34
 ................................................................................................................................... 34
 .................................................................................................................................... 36
Table 18 - Wireless Settings .................................................................................................................................... 39
Table 19 - Radio Settings ........................................................................................................................................ 44
 ......................................................................................................................... 45
Table 21 - Scheduler Association Settings .............................................................................................................. 47
Table 22 - Virtual Access Point Settings .................................................................................................................. 50
 .............................................................................................................................................. 51
 ........................................................................................................................................... 53
Table 25 - WPA Personal ......................................................................................................................................... 54
 ....................................................................................................................................... 56
Table 27 - WDS Settings ......................................................................................................................................... 57
 ................................................................................................................................ 58
 ........................................................................................................................ 58
Table 30 - MAC Authentication ................................................................................................................................ 60
Table 31 - RADIUS Server Attributes for MAC Authentication ................................................................................. 60
Table 32 - Load Balancing ....................................................................................................................................... 61
Table 33 - Managed Access Point ........................................................................................................................... 62
 .................................................................................................. 63
Table 35 - Management ACL ................................................................................................................................... 64
Table 36 - Web Server Settings ............................................................................................................................... 66
Table 37 - SNMP Settings ....................................................................................................................................... 68
Table 38 - SSH Settings .......................................................................................................................................... 69
Table 39 - Telnet Settings ........................................................................................................................................ 69
 .......................................................................................................................................... 72
 ........................................................................................................................ 73
Table 42 - NTP Settings ........................................................................................................................................... 74
Table 43 - SNMPv3 Views ....................................................................................................................................... 75
 ..................................................................................................................................... 77
Table 45 - SNMPv3 Users ....................................................................................................................................... 77
Table 46 - SNMPv3 Targets ..................................................................................................................................... 78
Table 47 - Packet Capture Status ............................................................................................................................ 84
 ................................................................................................................ 84
 ................................................................................................................................ 85
Table 50 - Remote Packet Capture ......................................................................................................................... 87
 ............................................................................................................... 87
 ............................................................................................................................. 89
 ................................................................................................................................... 95
Table 54 - DiffServ Class Map ................................................................................................................................. 99
Table 55 - DiffServ Policy Map .............................................................................................................................. 101
 ................................................................................................................................. 102
 .............................................................................................................. 103
Table 58 - Access Points in the Cluster ................................................................................................................. 105
Table 59 - Cluster Options ..................................................................................................................................... 105


Page 8
March 2012
Table 60 - Session Management ........................................................................................................................... 107
Table 61 - Channel Assignments ........................................................................................................................... 109
Table 62 - Last Proposed Changes ....................................................................................................................... 109
Table 63 - Advanced Channel Management Settings ........................................................................................... 110
Table 64 - Wireless Neighborhood Information ......................................................................................................111
Table 65 - Cluster Member Details ........................................................................................................................ 112
Table 66 - UAP Default Settings ............................................................................................................................ 114


Page 9
March 2012
Section 1 - About This Document
Section 1 - About This Document

Point (UAP) on a wireless network.
Document Organization
The contains the following sections:
“Section 1 - About This Document” on page 9

“Section 3 - Viewing Access Point Status” on page 22
“Section 4 - Managing the Access Point” on page 35


“Section 7 - Maintaining the Access Point” on page 79

“Section 9 - Clustering Multiple APs” on page 104
“Appendix A - Default AP Settings” on page 113

Additional Documentation

The describes the commands available from the command-line

The 

multiple UAPs.

software packages, including issues and workarounds.

This section describes the conventions this document uses.
A note provides more information about a feature or technology and cross-references to
related topics.
Caution! 
settings, events, or procedures that can adversely affect network connectivity, security, and so on.
The following table describes the typographical conventions used in this guide.
  Description
Bold Click Apply to save your settings. Menu titles, page names, and button names.
Blue Text See “Document Conventions” on
page 9
Hyperlink text.
Courier Font WLAN-AP# show network 
command-line entries.
Courier Font
Italics
Value Command parameter, which might be a variable or

Square Brackets [ ] [Value] 


Page 10
March 2012
Section 1 - About This Document
  Description
Curly Braces {} {Choice1 | Choice2} Indicates that you must select a parameter from the
list of choices.
Vertical Bars | Choice1 | Choice2 Separates the mutually exclusive choices.
Braces within square
brackets [{}]
[{Choice1 | Choice2}] Indicate a choice within an optional element.
Table 1 - 
Online Help, Supported Browsers, and Limitations

the user interface (UI). The information in the online help is a subset of the information available in the 
.
Online help information corresponds to each page on the UAP Administration UI.


Figure 1 - Administrator UI Online Help


Page 11
March 2012

Section 2 - Getting Started


any size. The UAP enables wireless local area network (WLAN) deployment while providing state-of-the-art wireless
networking features.
The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts
as an individual access point in the network, and you manage it by using the Administrator Web User Interface


Administrator Web UI, Telnet, SSH, and SNMP services are disabled.
This document describes how to perform the setup, management, and maintenance of the UAP in Standalone Mode.

for the switch.
Before you power on a new UAP, review the following sections to check required hardware and software components,

test of your new or extended wireless network.



This section contains the following topics:
“Administrator’s Computer Requirements” on page 11
“Wireless Client Requirements” on page 12
“Dynamic and Static IP Addressing on the AP” on page 13
“Installing the UAP” on page 13
“Basic Settings” on page 16
“Using the CLI to View the IP Address” on page 17


“Verifying the Installation” on page 20

To manage the UAP by using the Web interface or by using the CLI through Telnet or SSH, the AP needs an IP

additional settings on the AP before it can connect to the network.
The WLAN AP is not designed to function as a gateway to the Internet. To connect your
WLAN to other LANs or the Internet, you need a gateway device.
Administrators Computer Requirements

administration of the UAP through a Web-based user interface (UI).
Required Software or Component Description

Access Point




Page 12
March 2012

Required Software or Component Description
Wireless Connection to the Network 

through the Administration Web pages using a wireless connection to the
internal network.





Web Browser and Operating System 
based user interface hosted on the access point.
We recommend using one of the following supported Web browsers to
access the access point Administration Web pages:
Microsoft®® version 7.x or 8.x (with up-to-date patch
level for either major version)
Mozilla®
Safari 5 and later versions

support the interactive features of the administration interface.
Security Settings 

Table 2 - Requirements for the Administrator’s Computer
Wireless Client Requirements

in which the access point is running. The UAP supports multiple client operating systems. Clients can be laptop or
desktop computers, personal digital assistants (PDAs), or any other hand-held, portable or stationary device equipped

To connect to the access point, wireless clients need the software and hardware described in the following table.
Required Component Description
 

Wireless Client Software 
associate with the UAP.
Client Security Settings 
the access point.
If the Security mode on the access point is set to anything other than plain

used by the access point and provide a valid username and password,


“Virtual
Access Point Settings” on page 47.
Table 3 - Requirements for Wireless Clients


Page 13
March 2012


When you power on the access point, the built-in DHCP client searches for a DHCP server on the network in order

continues to use its default Static IP Address (10.90.90.91) until you re-assign it a new static IP address (and specify a
static IP addressing policy) or until the AP successfully receives network information from a DHCP server.
To change the connection type and assign a static IP address by using the CLI, see 
Settings” on page 18 or, by using the Web UI, see 35.
Caution! If you do not have a DHCP server on your internal network, and do not plan to use one,

DHCP to static IP. You can either assign a new static IP address to the AP or continue using the
default address. We recommend assigning a new static IP address so that if you bring up another
WLAN AP on the same network, the IP address for each AP will be unique.

If you experience trouble communicating with the access point, you can recover a static IP address by resetting the AP
81), or you can get
a dynamically assigned address by connecting the AP to a network that has a DHCP server.

If you have access to the DHCP server on your network and know the MAC address of your AP, you can view the new
IP address associated with the MAC address of the AP.
If you do not have access to the DHCP server that assigned the IP address to the AP or do not know the MAC address

a dynamically assigned IP address, see “Using the CLI to View the IP Address” on page 17.
Installing the UAP
To access the Administration Web UI, you enter the IP address of the AP into a Web browser. You can use the default
IP address of the AP (10.90.90.91) to log on to the AP and assign a static IP address, or you can use a DHCP server
on you network to assign network information to the AP. The DHCP client on the AP is enabled by default.
To install the UAP, use the following steps:
1.) Connect the AP to an administrative PC by using a LAN connection or a direct-cable connection.


The hub or switch you use must permit broadcast signals from the access point to reach all other devices on
the network.


Page 14
March 2012




administrative computer.

static IP address in the same subnet as the default IP address on the access point. (The default IP address for
the access point is 10.90.90.91.)

access point so that the access point is no longer connected directly to the PC but instead is connected to the
LAN (either by using a hub or directly).
It is possible to detect access points on the network with a wireless connection. However,
we strongly advise against using this method. In most environments you may have no way
of knowing whether you are actually connecting to the intended AP. Also, many of the initial

connection.
2.) Connect the power adapter to the power port on the back of the access point, and then plug the other end of the
power cord into a power outlet.
3.) Use your Web browser to log on to the UAP Administration Web pages.
If the AP did not acquire an IP address from a DHCP server on your network, enter 10.90.90.91 in the address


new IP address of the AP into the Web browser.
If you used a DHCP server and you do not know the new IP address of the AP, use the following procedures to
obtain the information:
Connect a serial cable from the administrative computer to the AP and use a terminal emulation program to
access the command-line interface (CLI).
At the login prompt, enter admin for the user name and admin for the password. At the command prompt,
enter get management.


to View the IP Address” on page 24.
4.) When prompted, enter admin for the user name and admin for the password, then click Logon.
Figure 2 - Web UI Login Prompt
Basic Settings
shows.


Page 15
March 2012

Figure 3 - 
5.) Verify the settings on the Basic Settings page.
Review access point description and provide a new administrator password for the access point if you do not
want to use the default password, which is admin.
Click the  button to activate the wireless network with these new settings.
 The changes you make are not saved or applied until you click Apply. Changing some
access point settings might cause the AP to stop and restart system processes. If this happens,
wireless clients will temporarily lose connectivity. We recommend that you change access point

“Basic Settings” on
page 16.
6.) If you do not have a DHCP server on the management network and do not plan to use one, you must change
the Connection Type from DHCP to Static IP.
You can either assign a new Static IP address to the AP or continue using the default address. We recommend
assigning a new Static IP address so that if you bring up another UAP on the same network, the IP address
for each AP will be unique. To change the connection type and assign a static IP address, see 
18 (CLI) or 35 (Web).
7.) 
the UAP in order for it to work with your network.
18
(CLI) or 35 (Web).
8.) 
supplicant information on the AP.

Authentication” on page 19.


Page 16
March 2012

Basic Settings


Basic Settings page.
Field Description
IP Address 

Settings page).
 

Settings page).
 Shows the operational status of the static IPv6 address assigned to the management
interface of the AP. The possible values are Operational and Tentative.

Global Addresses

the AP.

Address
Shows the IPv6 Link Local address, which is the IPv6 address used by the local physical

Discovery process.
MAC Address Shows the MAC address of the AP. The address shown here is the MAC address
associated with the management interface. This is the address by which the AP is known
externally to other networks.
Firmware Version 

your APs.
 
Hardware Version 
 Shows the AP serial number.
 
 Provides information about the product hardware.
Current Password 
before you are able to change it.
 
characters to prevent others from seeing your password as you type.
The administrator password must be an alphanumeric string of up to 8 characters. Do not
use special characters or spaces.

you change the administrator password from the default.

Password

Baud Rate Select a baud rate for the serial port connection. The baud rate on the AP must match the
baud rate on the terminal or terminal emulator to connect to the AP command-line interface
(CLI) by using a serial (console) connection.
The following baud rates are available:
9600
19200
38400
57600
115200
 
name to identify the AP to the administrator. Use up to 64 alphanumeric characters, for
example My AP.


Page 17
March 2012

Field Description
 
issues related to the AP.
 
Table 4 - Basic Settings Page

To connect to the AP by using the IPv6 global address or IPv6 link local address, you must enter the AP address into
your browser in a special format.

might not work with other browsers.


[2520::230:abff:fe00:2420].
To connect to the iPv6 link local address, replace the colons (:) with hyphens (-), add the interface number preceded


2420s6.ipv6-literal.net.
Using the CLI to View the IP Address
The DHCP client on the UAP is enabled by default. If you connect the UAP to a network with a DHCP server, the
AP automatically acquires an IP address. To manage the UAP by using the Administrator UI, you must enter the IP
address of the access point into a Web browser.
If a DHCP server on your network assigns an IP address to the UAP, and you do not know the IP address, use the
following steps to view the IP address of the UAP:
1.) Using a null-modem cable, connect a VT100/ANSI terminal or a workstation to the console (serial) port.

TeraTerm.
2.) 
Baud rate: 115200 bps
Data bits: 8
Parity: none
Stop bit: 1

3.) Press the return key, and a login prompt should appear.
The login name is admin. The default password is admin. After a successful login, the screen shows the
()# prompt.
4.) At the login prompt, enter get management.
Information similar to the following prints to the screen.


Page 18
March 2012

Figure 4 - 


By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to

information.
The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have

management VLAN on the access point.

35.



Action Commands
 get host id
Set the DNS Name set host id <host_name>

set host id lab-ap

Interface
get management
Set the management VLAN ID set management vlan-id <1-4094>
View untagged VLAN information get untagged-vlan
 set untagged-vlan status up
Disable the untagged VLAN set untagged-vlan status down
Set the untagged VLAN ID set untagged-vlan vlan-id <1-4094>
View the connection type get management dhcp-status


Page 19
March 2012

Action Commands
Use DHCP as the connection type set management dhcp-status up
Use a Static IP as the connection type set management dhcp-status down
Set the Static IP address set management static-ip <ip_address>

set management static-ip 10.10.12.221
Set a Subnet Mask set management static-mask <netmask>

set management static-mask 255.255.255.0
 set static-ip-route gateway <ip_address>

set static-ip-route gateway 10.10.12.1
View the DNS Nameserver mode Dynamic= up
Manual=down
get host dns-via-dhcp
Set DNS Nameservers to Use Static IP Addresses
(Dynamic to Manual Mode)
set host dns-via-dhcp down
set host static-dns-1 <ip_address>
set host static-dns-2 <ip_address>

set host static-dns-1 192.168.23.45
Set DNS Nameservers to Use DHCP IP Addressing
(Manual to Dynamic Mode)
set host dns-via-dhcp up
Table 5 - 
In the following example, the administrator uses the CLI to set the management VLAN ID to 123 and to disable the

DLINK-WLAN-AP# set management vlan-id 123
DLINK-WLAN-AP# set untagged-vlan status down
DLINK-WLAN-AP# get management
Property Value
--------------------------------------------
vlan-id 123
interface brtrunk
static-ip 10.90.90.91
static-mask 255.0.0.0
ip 10.90.90.91
mask 255.0.0.0
mac 00:05:5E:80:70:00
dhcp-status down
ipv6-status up

static-ipv6 ::

DLINK-WLAN-AP# get untagged-vlan
Property Value
---------------
vlan-id 1
status down
DLINK-WLAN-AP#



authentication information that the AP can supply to the authenticator.
19 for information about



Page 20
March 2012



Action Command
 
 
 
 
 
Table 6 - 

password to test1234.




Property Value
--------------------------
status up
user wlanAP
eap-method md5
debug off
cert-present no

DLINK-WLAN-AP#

Make sure the access point is connected to the LAN and associate some wireless clients with the network. Once you


1.) Connect the access point to the LAN.

access point is already connected to the LAN. The next step is to test some wireless clients.

do the following procedures:
Disconnect the cable from the computer and the access point.


2.) Test LAN connectivity with wireless clients.

requirements for these clients, see “Wireless Client Requirements” on page 12.
3.) 
Once the wireless network is up and you can connect to the AP with some wireless clients, you can add in layers


than one administrator is logged onto the Administration Web pages and making changes to the

be applied.
By default, no security is in place on the access point, so any wireless client can associate with it and access
“Virtual Access Point Settings” on page
47.


Page 21
March 2012






following default settings:
VLAN ID: 1

SSID: dlink1
Security: None
MAC Authentication Type: None
Redirect Mode: None
All other VAPs are disabled by default. The default SSID for VAPs 1–15 is ”dlinkx” where x is the VAP ID.

None for the default VAP and for each VAP that you enable.
“Virtual Access Point Settings” on page
47.


Page 22
March 2012
Section 3 - Viewing Access Point Status
Section 3 - Viewing Access Point Status
This section describes the information you can view from the tabs under the Status heading on the Administration
Web UI. This section contains the following subsections:
“Viewing Interface Status” on page 22

“Viewing Transmit and Receive Statistics” on page 25
“Viewing Associated Wireless Client Information” on page 26

“Viewing Rogue AP Detection” on page 28
“Viewing Managed AP DHCP Information” on page 31


“Viewing Radio Statistics Information” on page 33

 The web-based UI images show the DWL-8600AP administration pages. Pages for the
DWL-2600AP or DWL-3600AP will display information for one radio only.
Viewing Interface Status
Interfaces tab.
Figure 5 - Viewing Interface Status
This page displays the current settings of the UAP. It displays the Wired Settings and the Wireless Settings.


Subnet Mask, and DNS information. To change any of these settings, click the link. After you click , you are
redirected to the page.
18.
Wireless Settings

Wireless Settings section also shows the MAC address (read-only) associated with each radio interface.
To change the Radio Mode or Channel settings, click the link. After you click , you are redirected to the


Page 23
March 2012
Section 3 - Viewing Access Point Status
page.
“Wireless Settings” on page 37 and “Modifying Radio Settings”
on page 40.

The page shows real-time system events on the AP such as wireless clients associating with the AP and being
authenticated.
To view system events, click the tab.
Figure 6 - 
page, you can perform the following tasks:
View the most recent, high-level events generated by this AP.
Persistent logging to write system event logs to non-volatile memory so that the events
are not erased when the system reboots.
Set a to determine what category of log messages are displayed.
Set Depth 

 The AP acquires its date and time information using the network time protocol (NTP). This

reported time to your local time.

If the system unexpectedly reboots, log messages can be useful to diagnose the cause. However, log messages are
erased when the system reboots unless you enable persistent logging.
Caution!
network performance. You should only enable persistent logging to debug a problem. Make sure

page, set the persistence, severity, and depth options as described in
the following table, and then click .


Page 24
March 2012
Section 3 - Viewing Access Point Status
Field Description
Persistence Choose to save system logs to non-volatile memory so that the logs are not erased
when the AP reboots. Choose Disabled to save system logs to volatile memory. Logs in
volatile memory are deleted when the system reboots.
 

messages with a severity level of 3 – 7 are written to volatile memory.
0 — emergency
1 — alert
2 — critical
3 — error
4 — warning
5 — notice
6 — info
7 — debug
Depth 

Table 7 - Logging Options
 To apply your changes, click . Changing some settings might cause the AP to stop
and restart system processes. If this happens, wireless clients will temporarily lose connectivity.



error conditions, like dropping frames.


UAP to send syslog messages to the remote server.
Remote log server collection for AP syslog messages provides the following features:
Allows aggregation of syslog messages from multiple APs
Stores a longer history of messages than kept on a single AP
Triggers scripted management operations and alerts


 The syslog process will default to use port 514. We recommend keeping this default port.

syslog is not being used by another process.

page, set the Log Relay options as described in the following
table, and then click .
Field Description
 Select to allow the UAP to send log messages to a remote host. Select Disabled
to keep all log messages on the local system.
 Specify the IP Address or DNS name of the remote log server.
 Specify the Port number for the syslog process on the Relay Host.
The default port is 514.
Table 8 - 


Page 25
March 2012
Section 3 - Viewing Access Point Status
 To apply your changes, click . Changing some settings might cause the AP to stop
and restart system processes. If this happens, wireless clients will temporarily lose connectivity.

If you enabled the Log Relay Host, clicking will activate remote logging. The AP will send its kernel messages


If you disabled the Log Relay Host, clicking will disable remote logging.

The page provides some basic information about the current AP and a real-time display of the


indicate transmit and receive totals since the reboot.
To view transmit and receive statistics for the AP, click the page.
Figure 7 - 
Field Description
Interface 
Status Shows whether the interface is up or down.
MAC Address 

radios.
 Virtual LAN (VLAN) ID.
You can use VLANs to establish multiple internal and guest networks on the same AP.
The VLAN ID is set on the VAP page. (See 60)
 
wireless local area network.
The SSID is set on the VAP page. (See 60)
Transmit and Receive Information
 Indicates total packets sent (in Transmit table) or received (in Received table) by this AP.
 Indicates total bytes sent (in Transmit table) or received (in Received table) by this AP.


Page 26
March 2012
Section 3 - Viewing Access Point Status
Field Description
 Indicates total number of packets sent (in Transmit table) or received (in Received table) by
this AP that were dropped.
 Indicates total number of bytes sent (in Transmit table) or received (in Received table) by
this AP that were dropped.
 Indicates total errors related to sending and receiving data on this AP.
Table 9 - 
Viewing Associated Wireless Client Information
To view the client stations associated with a particular access point, click the Client Associations tab.
Figure 8 - Viewing Client Association Information

station.
Client Associations page.
Field Description
 wlan0vap2 means
the client is associated with Radio 1, VAP 2.
An entry of wlan0 means the client is associated with VAP 0 on Radio 1. An entry of wlan1
means the client is associated with VAP 0 on Radio 2.
Station Shows the MAC address of the associated wireless client.
Status 
and association status, which is present no matter which type of security the client uses to

status.


status of clients showing on the Client Associations page will be in line with what is
expected; that is, if a client shows as authenticated to the AP, it will be able to transmit



actually not be authenticated to the AP via the second layer of security.
From Station Shows the number of packets and bytes received from the wireless client and the number of
packets and bytes that were dropped after being received.
To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and
the number of packets and bytes that were dropped upon transmission.
Table 10 - Associated Clients

The page provides some basic information about the client

receive statistics shown are totals since the client association started.


Page 27
March 2012
Section 3 - Viewing Access Point Status





corporate server.
tab.
Figure 9 - 
The following table describes the information provided on the 
page.
Field Description
Status
 Radio interface used by the client.
Station Client station MAC address.
 
 TS Access Category (voice or video).
Direction 
uplink
downlink
bidirectional
 The User Priority (UP) for this TS. The UP is sent with each packet in the UP portion of the
IP header. Typical values are:
6 or 7 for voice
4 or 5 for video

Medium Time 
medium.



Minor, infrequent violations are ignored.
VAP The Virtual Access Point associated with this TS client.
MAC Address The Virtual Access Point MAC address.
SSID 
Statistics
 Radio interface used by the client.
Station Client station MAC address.
 
 TS Access Category (voice or video).
Direction 
uplink
downlink
bidirectional


Page 28
March 2012
Section 3 - Viewing Access Point Status
Field Description
From Station Shows the number of packets and bytes received from the wireless client and the number
of packets and bytes that were dropped after being received. Also shows the number of
packets:


To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and
the number of packets and bytes that were dropped upon transmission. Also shows the
number of packets:


Table 11 - 

The UAP provides link integrity monitoring to continually verify its connection to each associated client. To do this,


drops off the list within 300 seconds if these data packets are not acknowledged, even if no disassociation message is
received.
Viewing Rogue AP Detection
The status page to view Rogue AP Detection information provides real-time statistics for all APs within range of the
AP on which you are viewing the Administration Web pages. When AP detection is enabled, the radio will periodically
switch from its operating channel to scan other channels within the same band. Click Refresh to update the screen
and display the most current information.
The Rogue AP Detection page contains the following two lists:
Detected Rogue AP List — Lists all APs within range of the AP that have not been acknowledged as known APs.

clicking the Grant button associated with an AP in the Detected Rogue AP List or by appearing in an imported
AP list.
To view information about other access points on the wireless network, click the Rogue AP Detection tab.
Figure 10 - 
You must enable the AP detection on a radio in order to collect information about other APs within range.
The following table describes the information provided on neighboring access points.


Page 29
March 2012
Section 3 - Viewing Access Point Status
Field Description
AP Detection for
Radio
To allow the AP radios to perform neighbor AP detection and collect information about
neighbor APs, click .
To disable neighbor AP detection on the radios, click Disabled.
If you change the AP detection mode, click to save the new settings.
Detected Rogue AP List
Action Click Grant 

does not have any control over the APs on the list and cannot apply any security policies to

MAC Shows the MAC address of the neighboring AP.
Radio 
wlan0 (Radio One)
wlan1 (Radio Two)
Beacon Int. Shows the Beacon interval being used by this AP.
Beacon frames are transmitted by an AP at regular intervals to announce the existence
of the wireless network. The default behavior is to send a beacon frame once every 100
milliseconds (or 10 per second).
The Beacon Interval is set on the Radio page.(See “Modifying Radio Settings” on page
40)
 Indicates the type of device:
AP 

Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad
hoc mode communicate with each other directly, without the use of a traditional AP.

mode or an .
SSID The  for the AP.

local area network. It is also referred to as the .
The SSID is set on the VAP page. (See 60)
 Indicates whether there is any security on the neighboring device.
Off indicates that the Security mode on the neighboring device is set to None (no
security).
On indicates that the neighboring device has some security in place.
VAP page.
WPA Indicates whether WPA security is on or off for this AP.
Band 

The number shown indicates the mode according to the following map:
2.4 
5 
Channel Shows the Channel on which the AP is currently broadcasting.

and receiving.
The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)
Rate Shows the rate (in megabits per second) at which this AP is currently transmitting.
The current rate will always be one of the rates shown in Supported Rates.
Signal Indicates the strength of the radio signal emitting from this AP. If you hover the mouse
pointer over the bars, a number appears and shows the strength in decibels (dB).
Beacons 
Last Beacon Shows the date and time of the last beacon received from this AP.
Rates Shows supported and basic (advertised) rate sets for the neighboring AP. Rates are shown
in megabits per second (Mbps).
All Supported Rates are listed, with Basic Rates shown in bold.
Radio Settings page. (See “Modifying Radio Settings” on
page 40)


Page 30
March 2012
Section 3 - Viewing Access Point Status
Field Description
Known AP List
Action 
List by clicking the Grant button or if the MAC address of the AP appears in an AP list that
has been imported.
Delete.

does not have any control over the APs on the list and cannot apply any security policies to

MAC Shows the MAC address of the neighboring AP.
 Indicates the type of device:
AP 

Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad
hoc mode communicate with each other directly, without the use of a traditional AP.

mode or an .
SSID The for the AP.

local area network. It is also referred to as the .
The SSID is set on the VAP page. (See 60)
 Indicates whether there is any security on the neighboring device.
Off indicates that the Security mode on the neighboring device is set to None (no
security).
On indicates that the neighboring device has some security in place.
VAP page.
Band 

The number shown indicates the mode according to the following map:
2.4 
5 
Channel Shows the Channel on which the AP is currently broadcasting.

and receiving.
The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)
Table 12 - Rogue AP Detection

. The list contains the MAC addresses of all AP that have been added to

and view its contents.



1.) 
Select the Replace 
Select the Merge 

2.) Click Browse 

in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries

3.) Click Import.



Page 31
March 2012
Section 3 - Viewing Access Point Status

Viewing Managed AP DHCP Information

DHCP request. The Managed AP DHCP 
Wireless Switches that the AP learned about from a DHCP server on your network.
Figure 11 - Managed AP DHCP Information

information, see the for the switch.

The page provides:



All of the transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these

tab.
Figure 12 - 



Page 32
March 2012
Section 3 - Viewing Access Point Status
Field Description
AP and VAP Status
Interface Indicates the name of the Radio or VAP interface.
 
Status 
Access Category.

activity).
 
Category.
TS Clients 
Category.
Medium Time
Admitted
Time (in 32 microsecond per second units) allocated for this Access Category over the
transmission medium to carry data. This value should be less than or equal to the maximum
bandwidth allowed over the medium for this TS.
Medium Time
Unallocated
Time (in 32 microsecond per second units) of unused bandwidth for this Access Category.
Transmit and Receive Statistics
 Indicates the total number of TS packets sent (in Transmit table) or received (in Received

 Indicates the total number of TS bytes sent (in Transmit table) or received (in Received

 Indicates the total number of TS voice packets sent (in Transmit table) or received (in
Received table) by this AP for this VAP.
 Indicates the total TS voice bytes sent (in Transmit table) or received (in Received table) by
this AP for this VAP.
 Indicates the total number of TS video packets sent (in Transmit table) or received (in
Received table) by this AP for this VAP.
 Indicates the total TS video bytes sent (in Transmit table) or received (in Received table) by
this AP for this VAP.
Table 13 - 

The 
rejected by the AP.
tab.
Figure 13 - 



Page 33
March 2012
Section 3 - Viewing Access Point Status
Field Description


ACM

Streams.


ACM

Streams.
Table 14 - 
Viewing Radio Statistics Information
The Radio Statistics page provides detailed information about the packets and bytes transmitted and received on the
radio interface of this access point.
Figure 14 - View Radio Statistics
The following table describes details about the Radio Statistics information.
Field Description
Radio Choose either radio 1 or radio 2 to view statistics for the selected radio


Total packets received by the AP on this radio interface.


Total bytes received by the AP on this radio interface.

Transmitted
Total packets transmitted by the AP on this radio interface.

Transmitted
Total bytes transmitted by the AP on this radio interface.


Number of packets received by the AP on this radio interface that were dropped.


Number of bytes received by the AP on this radio interface that were dropped.

Transmit Dropped
Number of packets transmitted by the AP on this radio interface that were dropped.

Transmit Dropped
Number of bytes transmitted by the AP on this radio interface that were dropped.
Fragments

Count of successfully received MPDU frames of type data or management.
Fragments
Transmitted
Number of transmitted MPDU with an individual address or an MPDU with a multicast
address of type Data or Management.
Multicast Frames

Count of MSDU frames received with the multicast bit set in the destination MAC address.


Page 34
March 2012
Section 3 - Viewing Access Point Status
Field Description
Multicast Frames
Transmitted
Count of successfully transmitted MSDU frames where the multicast bit is set in the
destination MAC address.
Duplicate Frame
Count

Failed Transmit
Count
Number of times an MSDU is not transmitted successfully due to transmit attempts
exceeding either the short retry limit or the long retry limit.

Count
Number of times an MSDU is successfully transmitted after one or more retries.

Count
Number of times an MSDU is successfully transmitted after more than one retry.
RTS Success Count Count of CTS frames received in response to an RTS frame.
RTS Failure Count Count of CTS frames not received in response to an RTS frame.
 
 
Frames Transmitted Count of each successfully transmitted MSDU.

Count

that the frame should not have been encrypted or that frame was discarded due to the
receiving station not implementing the privacy option.
Table 15 - Radio Statistics Information


messages generated in the AP.
tab.
72.
Figure 15 - 

Field Description
 Up or Down. The default is Down.

Sent
The total number of email sent so far. The range is an unsigned integer of 32 bits. The
default is 0.

Failed
The total number of email failures so far. The range is an unsigned integer of 32 bits. The
default is 0.
Time Since Last

The time since the last email was sent. Time format is used. The default is 00 days 00 hours
00 minutes 00 seconds.
Table 16 - 


Page 35
March 2012
Section 4 - Managing the Access Point
Section 4 - Managing the Access Point
This section describes how to manage the UAP and contains the following subsections:

“Wireless Settings” on page 37
“Modifying Radio Settings” on page 40

“Scheduler Association Settings” on page 46
“Virtual Access Point Settings” on page 47

“Controlling Access by MAC Authentication” on page 59

“” on page 61

“Creating a Management Access Control List (ACL)” on page 64
Manage heading on the Administration
Web UI.

The default wired interface settings, which include DHCP and VLAN information, might not work for all networks.
By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to

information.
The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have

management VLAN on the AP.
tab.
Figure 16 - 
page.


Page 36
March 2012
Section 4 - Managing the Access Point
Field Description
Hostname 
The hostname has the following requirements:
The length must be between 1 – 63 characters.
Upper and lower case characters, numbers, and hyphens are accepted.

hyphen.
MAC Address 


ID
The management VLAN is the VLAN associated with the IP address you use to access the
AP. The default management VLAN ID is 1.
Provide a number between 1 and 4094 for the management VLAN ID.
 



 

 If you select DHCP, the UAP acquires its IP address, subnet mask, DNS, and gateway
information from a DHCP server.
If you select Static IP, you must enter information in the Static IP Address, Subnet Mask,

Static IP Address 
connection type.
 in the text boxes.
 in the text boxes.
 Select the mode for the DNS.
In mode, the IP addresses for the DNS servers are assigned automatically via

In Manual mode, you must assign static IP addresses to resolve domain names.
 

Admin Mode




 





Global Addresses
If the AP has been assigned one or more IPv6 addresses automatically, the addresses are
listed.

Address
Shows the IPv6 Link Local address, which is the IPv6 address used by the local physical

Discovery process.



Table 17 - 
to apply the changes and
to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that



Page 37
March 2012
Section 4 - Managing the Access Point
Wireless Settings

access point (802.11 Mode and Channel) and to the network interface to the access point (MAC address for access
point and Wireless Network name, also known as SSID).
Manage > Wireless Settings tab.
Figure 17 - 
Wireless Settings page.
Field Description


Specify the time interval (in seconds) for the AP to report (through the system log and SNMP
traps) associated clients that do not adhere to mandatory admission control procedures.
Radio Interface Specify whether you want the radio interface on or off.
MAC Address Indicates the Media Access Control (MAC) addresses for the interface. Dual-radio APs have
a unique MAC address for each radio.
A MAC address is a permanent, unique hardware address for any device that represents
an interface to the network. The MAC address is assigned by the manufacturer. You cannot
change the MAC address. It is provided here for informational purposes as a unique



Page 38
March 2012
Section 4 - Managing the Access Point
Field Description
Mode The Mode 
The modes available depend on the country code setting and the radio selected.
Select one of the following modes for radio 1:


ranging from 6 to 54 Mbps.



supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11
b, 802.11g, and 802.11a.
is the recommended mode for networks with 802.11n devices


compatible with legacy devices (802.11a).
Select one of the following modes for radio 2:

of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct



extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division


802.11g, and 802.11n devices.
is the recommended mode for networks with 802.11n devices


compatible with legacy devices (802.11b/g).
Channel Select the Channel.
The range of available channels is determined by the mode of the radio interface and the
country code setting. If you select Auto for the channel setting, the AP scans available





When automatic channel assignment is enabled on the Channel Management page for
Clustering, the channel policy for the radio is automatically set to static mode, and the Auto

the channels for the radios in the cluster.
Station Isolation To enable Station Isolation, select the check box directly beside it.
When Station Isolation is disabled, wireless clients can communicate with one another

When Station Isolation is enabled, the AP blocks communication between wireless clients

wired devices on the network, across a WDS link, and with other wireless clients associated
with a different VAP, but not among wireless clients associated with the same VAP.


Page 39
March 2012
Section 4 - Managing the Access Point
Field Description

Protocol Support

whether to enable support for the AeroScout protocol.
Options are or Disabled. The default is Disabled. When enabled, Aeroscout

determines the geographical location of 802.11 capable devices, such as STAs, APs, and




the managed access points from which it collects information. The Wireless Switch cannot


Support” on page 39.
 Only AeroScout tag hardware of types T2 and T3 are explicitly supported. Other tag
models are also supported only if their implementation of the AeroScout protocol conforms
to the , version 2.1.
 AeroScout tags operate only in 802.11 b/g mode. Therefore, network administrators




D-Link APs do not support this feature and never report detected APs as rogues.
Table 18 - Wireless Settings
to apply the changes and
to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that

Using the 802.11h Wireless Mode



802.11h only works for the 802.11a band. It is not required for 802.11b or 802.11g.
If you are operating in an 802.11h enabled domain, the AP attempts to use the channel you assign. If the channel
has been blocked by a previous radar detection, or if the AP detects a radar on the channel, then the AP
automatically selects a different channel.

scanning.

two APs on the WDS link may keep changing depending on channel usage and radar interference. WDS will

Balancing” on page 60.








Page 40
March 2012
Section 4 - Managing the Access Point

AeroScout tags operate only in 802.11b/g mode. Therefore, network administrators who use the AeroScout tags must


 The following notes apply to AeroScout product and protocol support:
D-Link does not sell AeroScout products. Contact AeroScout for AeroScout hardware,
software or deployment information.

and the access point.

receives and processes all packets detected by the radios, as opposed to processing only
packets destined to the APs BSSID. This can affect AP throughput.

Radio settings directly control the behavior of the radio devices in the AP and its interaction with the physical medium;
that is, how and what type of electromagnetic waves the AP emits.
To specify radio settings, click the Radio tab in the Manage section.
Different settings display depending on the mode you select. All settings are described in the table below.
Figure 18 - 
Radio Settings page.
Field Description
Radio 


(802.11b/g/n).
 Specify whether you want the radio on or off by clicking On or Off.
If you turn off a radio, the AP sends disassociation frames to all the wireless clients it is
currently supporting so that the radio can be gracefully shutdown and the clients can start
the association process with other available APs.


Page 41
March 2012
Section 4 - Managing the Access Point
Field Description
Mode The Mode 
 The modes available depend on the country code setting and the radio selected.
Select one of the following modes for radio 1:


ranging from 6 to 54 Mbps.



supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11
b, 802.11g, and 802.11a.
is the recommended mode for networks with 802.11n devices


compatible with legacy devices (802.11a).
Select one of the following modes for radio 2:

of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct



extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division


802.11g, and 802.11n devices.
is the recommended mode for networks with 802.11n devices


compatible with legacy devices (802.11b/g).
Channel Select the Channel.
The range of available channels is determined by the mode of the radio interface and the
country code setting. If you select Auto for the channel setting, the AP scans available





When automatic channel assignment is enabled on the Channel Management page for
Clustering, the channel policy for the radio is automatically set to static mode, and the Auto

the channels for the radios in the cluster.
Channel Bandwidth



channel available with other modes. The 40 MHz channel enables higher data rates but

20 MHz to restrict the use of the channel bandwidth to a 20 MHz channel.



This setting can be changed only when the channel bandwidth is set to 40 MHz. A 40 MHz
channel can be considered to consist of two 20 MHz channels that are contiguous in the
frequency domain. These two 20 MHz channels are often referred to as the and
channels. The Primary Channel is used for 802.11n clients that support only a
20 MHz channel bandwidth and for legacy clients.
Select one of the following options:
Lower — Set the Primary Channel as the lower 20 MHz channel in the 40 MHz band.
Upper — Set the Primary Channel as the upper 20 MHz channel in the 40 MHz band.


Page 42
March 2012
Section 4 - Managing the Access Point
Field Description

Supported


interval prevents Inter-Symbol and Inter-Carrier Interference (ISI, ICI). The 802.11n mode


throughput.
Select one of the following options:
Yes — The AP transmits data using a 400ns guard Interval when communicating with
clients that also support the short guard interval.
— The AP transmits data using an 800ns guard interval.
STBC Mode 
Space Time Block Coding (STBC) is an 802.11n technique intended to improve the reliability
of data transmissions. The data stream is transmitted on multiple antennas so the receiving
system has a better chance of detecting at least one of the data streams.
Select one of the following options:
On — The AP transmits the same data stream on multiple antennas at the same time.
Off — The AP does not transmits the same data on multiple antennas.
Protection The protection feature contains rules to guarantee that 802.11n transmissions do not cause
interference with legacy stations or APs. By default, these protection mechanisms are
enabled (Auto). With protection enabled, protection mechanisms will be invoked if legacy
devices are within range of the AP. This causes more overhead on every transmission,
which will impact performance. However, there is no impact on performance if there are no
legacy devices within range of the AP.
You can disable (Off) these protection mechanisms; however, when 802.11n protection is
off, legacy clients or APs within range can be affected by 802.11n transmissions. The 802.11
protection feature is also available when the mode is 802.11b/g. When protection is enabled
in this mode, it protects 802.11b clients and APs from 802.11g transmissions.
 This setting does not affect the ability of the client to associate with the AP.
 Beacon frames are transmitted by an AP at regular intervals to announce the existence
of the wireless network. The default behavior is to send a beacon frame once every 100
milliseconds (or 10 per second).

DTIM Period Specify a DTIM period from 1 to 255 beacons.

Beacon frames. It indicates which client stations, currently sleeping in low-power mode,
have data buffered on the AP awaiting pick-up.
The DTIM period you specify indicates how often the clients served by this AP should check
for buffered data still on the AP awaiting pickup.


every 10th beacon.
Fragmentation
Threshold
Specify a number between 256 and 2,346 to set the frame size threshold in bytes.
The fragmentation threshold is a way of limiting the size of packets (frames) transmitted
over the network. If a packet exceeds the fragmentation threshold you set, the fragmentation
function is activated and the packet is sent as multiple 802.11 frames.
If the packet being transmitted is equal to or less than the threshold, fragmentation is not
used.
Setting the threshold to the largest value () effectively disables fragmentation.



However, fragmentation can help improve network performance and reliability if properly

Sending smaller frames (by using lower fragmentation threshold) might help with some
interference problems; for example, with microwave ovens.
By default, fragmentation is off. We recommend not using fragmentation unless you suspect
radio interference. The additional headers applied to each fragment increase the overhead
on the network and can greatly reduce throughput.


Page 43
March 2012
Section 4 - Managing the Access Point
Field Description
RTS Threshold Specify a Request to Send (RTS) Threshold value between 0 and 2347.
The RTS threshold indicates the number of octets in an MPDU, below which an RTS/CTS
handshake is not performed.

with a lot of clients. If you specify a low threshold value, RTS packets will be sent more
frequently. This will consume more bandwidth and reduce the throughput of the packet.
On the other hand, sending more RTS packets can help the network recover from
interference or collisions which might occur on a busy network, or on a network experiencing
electromagnetic interference.
Maximum Stations Specify the maximum number of stations allowed to access this AP at any one time.
You can enter a value between 0 and 200.
Transmit Power 
The default value, which is 100%
it gives the AP a maximum broadcast range and reduces the number of APs needed.
To increase capacity of the network, place APs closer together and reduce the value of the
transmit power. This helps reduce overlap and interference among APs. A lower transmit
power setting can also keep your network more secure because weaker wireless signals are
less likely to propagate outside of the physical location of your network.
Fixed Multicast Rate 
 Check the transmission rate sets you want the AP to support and the basic rate sets you
want the AP to advertise:
Rates are expressed in megabits per second.
Supported Rate Sets indicate rates that the AP supports. You can check multiple rates
(click a check box to select or de-select a rate). The AP will automatically choose the

the AP.
Basic Rate Sets indicate rates that the AP will advertise to the network for the
purposes of setting up communication with other APs and client stations on the

supported rate sets.




index can be enabled and disabled independently.
Broadcast/Multicast
Rate Limiting

limiting the number of packets transmitted across the network.
By default the Multicast/Broadcast Rate Limiting option is disabled. Until you enable
Multicast/Broadcast Rate Limiting
Rate Limit 

falls below this rate limit will always conform and be transmitted to the appropriate
destination. The default and maximum rate limit setting is 50 packets per second.
Rate Limit Burst 


setting is 75 packets per second.
 
On 
Radio 

Off 


Mode
Regulates mandatory admission control (ACM) for the voice access category. The options
are:
On 


Off 



Page 44
March 2012
Section 4 - Managing the Access Point
Field Description

Limit

medium using a voice AC to gain access.

Mode
Regulates mandatory admission control for the video access category. The options are:
On 


Off 


Limit

medium using a video AC to gain access.

Timeout
Specify the amount of time for an AP to detect an downlink TS as idle before deleting it.


Specify the amount of time for an AP to detect an uplink TS as idle before deleting it.


Mode
Select 
Table 19 - Radio Settings
Use the Radio 
and then

other radio.


select the Scheduler tab in the Manage 

and Radios.

to achieve security and reduce power consumption. You can also use the Scheduler to allow access to VAPs for


rules are periodic in nature and are repeated every week.
A valid rule must contain all of the following parameters:
Days of the Week.
Start Time (hour and minutes).






Page 45
March 2012
Section 4 - Managing the Access Point
Figure 19 - 
Field Description
Global Scheduler
Mode
A global switch to enable or disable the scheduler feature. The default is Disable.
Scheduler Operational Status
Status The operational status of the Scheduler. The range is Up or Down. The default is Down.
Reason Provides additional information about the status. The reason can be one or more of the
following:
– Operational status is up.

– Operational status is down because the AP time has not been set,
either manually or by specifying an NTP server to use.
ManagedMode– Operational status is down because the AP is in managed mode.
 


Add 
name.
 
periodic rule are described below.
 
Set Schedule The day of the week. Range is: , (Saturday
and Sunday), , , , , , , . The
default is .
Start Time The time when the radio or VAP will be operationally enabled. The time is in HH:MM 24-hour
format. The range is <00-24>:<00-59>. The default is 00:00.
 The time when the radio or VAP will be operationally disabled. The time is in HH:MM 24-
hour format. The range is <00-24>:<00-59>. The default is 00:00.
Table 20 - 
To change an existing rule, select the rule, update the values in the area, and click .


Page 46
March 2012
Section 4 - Managing the Access Point
Figure 20 - 
Click 
to apply the changes and to save the
settings.
Scheduler Association Settings

Scheduler Association tab in the Manage section. By default, there are no Scheduler




disabled, then all the VAPs associated to that radio are also operationally disabled irrespective of the VAP

Figure 21 - Scheduler Association Settings


Page 47
March 2012
Section 4 - Managing the Access Point
Field Description

1 or 2 
 
Status The operational status of the Scheduler. The range is Up or Down.

Radio 
0-15 
Status The operational status of the Scheduler. The range is Up or Down.
Table 21 - Scheduler Association Settings

click to apply the changes and to save the settings.
Virtual Access Point Settings
VAP tab in the Manage section.



a unique SSID. Multiple SSIDs make a single AP look like two or more APs to other systems on the network.

performance.

whether the VLAN is on the same radio or on a different radio. VAP0, which is always enabled on both radios, is
assigned to the default VLAN 1.


VAP. The external RADIUS server assigns wireless clients to the VLAN when the clients associate and authenticate.

the others act as backup servers. The network type (IPv4 or IPv6) and accounting mode are common across all




If wireless clients use a security mode that does not communicate with the RADIUS server, or if the RADIUS server
does not provide the VLAN information, you can assign a VLAN ID to each VAP. The AP assigns the VLAN to all
wireless clients that connect to the AP through that VAP.


To set up multiple VAPs, click Manage > VAP.


Page 48
March 2012
Section 4 - Managing the Access Point
Figure 22 - 
VAP page.
Field Description
RADIUS IP Address

Specify the IP version that the RADIUS server uses.
and global RADIUS
address settings, but the AP contacts only the RADIUS server or servers for the address

RADIUS IP Address

Address



authentication request to the primary server. If the primary server responds to the
authentication request, the AP continues to use this RADIUS server as the primary server,
and authentication requests are sent to the address you specify.
If the 
address of the RADIUS server that all VAPs use by default, for example 192.168.10.23.
If the option is selected, enter the IPv6 address of the
primary global RADIUS server, for example 2001:0db8:1234::abcd.

Address 1–3

label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and
RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.

sequence. The IPv4 or IPv6 address must be valid in order for the AP to attempt to contact
the server.
 
The is the shared secret key for the global RADIUS server. You can use up to
63 standard alphanumeric and special characters. The key is case sensitive, and you must

displayed as “*” characters to prevent others from seeing the RADIUS key as you type.
 

and so on.

Accounting
Select this option to track and measure the resources a particular user has consumed
such as system time, amount of data transmitted and received, and so on.
If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all
backup servers.

FailThrough
Select this option to allow the secondary RADIUS server to authenticate wireless clients
if the authentication with the primary RADIUS server is unsuccessful, or if the primary
RADIUS server is unavailable.


Page 49
March 2012
Section 4 - Managing the Access Point
Field Description
Radio 
VAP 
disable VAP0, you must disable the radio.
 
option beside the appropriate
VA P.
option beside the appropriate VAP.

 

ID or use a RADIUS server to assign a wireless client to a VLAN. The range for the VLAN ID
is 1 – 4094.
If you use RADIUS-based authentication for clients, you can optionally add the following

client:
“Tunnel-Type”
“Tunnel-Medium-Type”

VAP page.

more information, see 35.
SSID 
characters. You can use the same SSID for multiple VAPs, or you can choose a unique
SSID for each VAP.
 If you are connected as a wireless client to the same AP that you are administering,
resetting the SSID will cause you to lose connectivity to the AP. You will need to reconnect to
the new SSID after you save this new setting.
Broadcast SSID 
frames. The Broadcast SSID parameter is enabled by default. When the VAP does not
broadcast its SSID, the network name is not displayed in the list of available networks on

supplicant before it is able to connect.
To enable the SSID broadcast, select the Broadcast SSID check box.
To prohibit the SSID broadcast, clear the Broadcast SSID check box.

connecting to your network, but it will not prevent even the simplest of attempts by a hacker

minimal level of protection on an otherwise exposed network (such as a guest network)
where the priority is making it easy for clients to get a connection and where no sensitive
information is available.
 Select one of the following modes for this VAP:


WPA Personal



explained below.

MAC Authentication


the network. The drop-down menu for this feature allows you to select the type of MAC
Authentication to use:
 Do not use MAC Authentication.

page.
 Use the MAC Authentication list on the external RADIUS server.
“Controlling Access by MAC
Authentication” on page 59.


Page 50
March 2012
Section 4 - Managing the Access Point
Field Description
Redirect Mode HTTP redirect feature to redirect wireless clients to a custom Web page.
When redirect mode is enabled, the user will be redirected to the URL you specify after the
wireless client associates with an AP and the user opens a Web browser on the client to
access the Internet.
The custom Web page must be located on an external Web server and might contain
information such as the company logo and network usage policy.
 The wireless client is redirected to the external Web server only once while it is
associated with the AP.
Redirect URL Specify the URL where the Web browser is to be redirected after the wireless client

Table 22 - Virtual Access Point Settings
to apply the changes and to save
the settings. Changing some settings might cause the AP to stop and restart system processes. If
this happens, wireless clients will temporarily lose connectivity. We recommend that you change


If you select 
any data transferred to and from the UAP is not encrypted. This security mode can be useful during initial network

not secure.







cipher called RC4.)
Figure 23 - 
Field Description
 
default is 1.

transmits.
 Specify the length of the key by clicking one of the radio buttons:
64 bits
128 bits


Page 51
March 2012
Section 4 - Managing the Access Point
Field Description
 Select the key type by clicking one of the radio buttons:
ASCII
Hex
 
key. The keys you enter depend on the key type selected:
ASCII — Includes upper and lower case alphabetic letters, the numeric digits, and
special symbols such as @ and #.









Authentication 

Specify the authentication algorithm you want to use by choosing one of the following
options:
authentication allows any client station to associate with the AP whether


Open System, any client can associate with the AP.
Just because a client station is allowed to associate does not ensure it can exchange

and decrypt data from an AP, and to transmit readable data to the AP.

order to associate with the AP. When the authentication algorithm is set to Shared

. When you select both authentication
algorithms:

key in order to associate with the AP.

enabled) will be able to associate with the AP even if they do not have the correct

Table 23 - 




The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station
transmissions.
abc123

Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but
this is less secure because it means one station can decrypt the data being sent by another.)

key index”, and then set the stations to encrypt the data they transmit using different keys. This ensures that
neighboring APs cannot decode each other’s transmissions.






Page 52
March 2012
Section 4 - Managing the Access Point

periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking
(CRC) of each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server




the AP uses.
Figure 24 - 
Field Description
Use Global RADIUS



servers.
To use the global RADIUS server settings, make sure the check box is selected.
To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS

RADIUS IP Address

Specify the IP version that the RADIUS server uses.

address settings, but the AP contacts only the RADIUS server or servers for the address

RADIUS IP Address

Address


address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If
the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary
global RADIUS server, for example 2001:0db8:1234::abcd.

Address 1–3


is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is
selected.

sequence.
 
The is the shared secret key for the global RADIUS server. You can use up to
63 standard alphanumeric and special characters. The key is case sensitive, and you must

displayed as “*” characters to prevent others from seeing the RADIUS key as you type.
 

and so on.


Page 53
March 2012
Section 4 - Managing the Access Point
Field Description

Accounting
Select this option to track and measure the resources a particular user has consumed
such as system time, amount of data transmitted and received, and so on.
If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all
backup servers.

FailThrough
Select this option to allow the secondary RADIUS server to authenticate wireless clients if
the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS
server is unavailable.
 

Refresh Rate

associated to this VAP (the default is 300).
The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not
refreshed.

Refresh Rate

client associated to the VAP.
The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not
refreshed.
Table 24 - 
to apply the changes and to
save the settings.
WPA Personal



This security mode is backwards-compatible for wireless clients that support the original WPA.
Figure 25 - 
Field Description
WPA Versions Select the types of client stations you want to support:
WPA. If all client stations on the network support the original WPA but none support the
newer WPA2, then select WPA.
WPA2. If all client stations on the network support WPA2, we suggest using WPA2

WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others
which support only the original WPA, select both of the check boxes. This lets both
WPA and WPA2 client stations associate and authenticate, but uses the more robust

at the expense of some security.


Page 54
March 2012
Section 4 - Managing the Access Point
Field Description
Cipher Suites Select the cipher suite you want to use:


and 

following to be able to associate with the AP:
A valid 
A valid 

 The 
characters to a maximum of 63 characters. Acceptable characters include upper and lower
case alphabetic letters, the numeric digits, and special symbols such as @ and #.

Refresh Rate

associated to this VAP (the default is 300).
The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not
refreshed.
Table 25 - WPA Personal
to apply the changes and to
save the settings.



This security mode is backwards-compatible with wireless clients that support the original WPA.
Figure 26 - 
Field Description
WPA Versions Select the types of client stations you want to support:
WPA. If all client stations on the network support the original WPA but none support the
newer WPA2, then select WPA.
WPA2. If all client stations on the network support WPA2, we suggest using WPA2

WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others
which support only the original WPA, select both WPA and WPA2. This lets both WPA
and WPA2 client stations associate and authenticate, but uses the more robust WPA2

expense of some security.


Page 55
March 2012
Section 4 - Managing the Access Point
Field Description

authentication
If for WPA Versions you select only WPA2 or both WPA and WPA2, you can enable pre-
authentication for WPA2 clients.
Click if you want WPA2 wireless clients to send pre-
authentication packet. The pre-authentication information will be relayed from the AP

authentication for roaming clients who connect to multiple APs.
This option does not apply if you selected WPA for WPA Versions because the original WPA
does not support this feature.
Cipher Suites Select the cipher suite you want to use:


and 




Use Global RADIUS



servers.
To use the global RADIUS server settings, make sure the check box is selected.
To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS

RADIUS IP Address

Specify the IP version that the RADIUS server uses.
and global RADIUS
address settings, but the AP contacts only the RADIUS server or servers for the address

RADIUS IP Address

Address
 or for the primary RADIUS server for this VAP.
If the 
address of the RADIUS server that all VAPs use by default, for example 192.168.10.23.
If the option is selected, enter the IPv6 address of the
primary global RADIUS server, for example 2001:0db8:1234::abcd.

Address 1–3


is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is
selected.

sequence.
 
The is the shared secret key for the global RADIUS server. You can use up to
63 standard alphanumeric and special characters. The key is case sensitive, and you must

displayed as “*” characters to prevent others from seeing the RADIUS key as you type.
 

and so on.

Accounting
Select this option to track and measure the resources a particular user has consumed
such as system time, amount of data transmitted and received, and so on.
If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all
backup servers.

FailThrough
Select this option to allow the secondary RADIUS server to authenticate wireless clients
if the authentication with the primary RADIUS server is unsuccessful, or if the primary
RADIUS server is unavailable.
 

Refresh Rate

associated to this VAP (the default is 300).
The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not
refreshed.


Page 56
March 2012
Section 4 - Managing the Access Point
Field Description

Refresh Rate

client associated to the VAP.
The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not
refreshed.
Table 26 - 
to apply the changes and to
save the settings.

The Wireless Distribution System (WDS) allows you to connect multiple UAPs. With WDS, APs communicate with one
another without wires in a standardized way. This capability is critical in providing a seamless experience for roaming
clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the

number of links to connect.
In the point-to-point mode, the AP accepts client associations and communicates with wireless clients and other

The bridge does not add to the hop count. It functions as a simple OSI layer 2 network device.
In the point-to-multipoint bridge mode, one AP acts as the common link between multiple APs. In this mode, the
central AP accepts client associations and communicates with the clients and other repeaters. All other APs associate
only with the central AP that forwards the packets to the appropriate wireless bridge for routing purposes.
The UAP can also act as a repeater. In this mode, the AP serves as a connection between two APs that might be
too far apart to be within cell range. When acting as a repeater, the AP does not have a wired connection to the LAN

repeater, and there are no repeater mode settings. Wireless clients can still connect to an AP that is operating as a
repeater.
 When you move an AP from Standalone Mode to Managed Mode, WDS is disabled.

Administrator UI, as well as Telnet, SSH, and SNMP access are disabled when the AP is in
Managed Mode.
WDS tab.


Page 57
March 2012
Section 4 - Managing the Access Point
Figure 27 - 

APs participating in the WDS link.
You can have only one WDS link between any pair of APs. That is, a remote MAC address may appear only
once on the WDS page for a particular AP.

mode. (See “Modifying Radio Settings” on page 40 
channel.)



Field Description
Spanning Tree
Mode
Spanning Tree Protocol (STP) prevents switching loops. STP is recommended if you

Select to use STP
Select Disabled to turn off STP links (not recommended)
Radio 


Local Address Indicates the MAC addresses for this AP.

internal interface on the selected radio (Radio One on wlan0 or Radio Two on wlan1).
Remote Address Specify the MAC address of the destination AP; that is, the AP on the other end of the WDS
link to which data will be sent or handed-off and from which data will be received.
Click the drop-down arrow to the right of the Remote Address 
available MAC Addresses and their associated SSIDs on the network. Select the appropriate
MAC address from the list.
 The SSID displayed in the drop-down list is simply to help you identify the correct
MAC Address for the destination AP. This SSID is a separate SSID to that which you set for
the WDS link. The two do not (and should not) be the same value or name.
 You can use , , or  on the WDS link.
If you are unconcerned about security issues on the WDS link you may decide not to set
any type of encryption. Alternatively, if you have security concerns you can choose between


Table 27 - WDS Settings


Page 58
March 2012
Section 4 - Managing the Access Point
If you select 
WDS page. All data transferred between the two APs on the WDS link will be unencrypted.



Field Description
 
 
 
64 bits
128 bits
 
ASCII
Hex
Characters
Required



 


Table 28 - 


Field Description
 
SSID 
different from the other SSIDs used by this AP. However, it is important that the same SSID
is also entered at the other end of the WDS link. If this SSID is not the same for both APs on
the WDS link, they will not be able to communicate and exchange data.
The SSID can be any alphanumeric combination.
 
entered for the AP at the other end of the WDS link. If this key is not the same for both APs,
they will not be able to communicate and exchange data.

Acceptable characters include upper and lower case alphabetic letters, the numeric digits,
and special symbols such as @ and #.
Table 29 - 
to apply the changes and
to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that



Page 59
March 2012
Section 4 - Managing the Access Point



hexadecimal digits separated by colons, for example 00:DC:BA:09:87:65
used by a wireless client has a unique MAC address.
You can use the Administrator UI on the AP or use an external RADIUS server to control access to the network
through the AP based on the MAC address of the wireless client. This feature is called MAC Authentication or MAC


the network. When a wireless client attempts to associate with an AP, the AP looks up the MAC address of the client
in the local Stations List or on the RADIUS server. If it is found, the global allow or deny setting is applied. If it is not
found, the opposite is applied.
On the VAP 
locally on the MAC Authentication MAC
Authentication page determines whether the clients in the station list (local or RADIUS) can access the network
“Virtual Access Point Settings”
on page 47.

The MAC Authentication page allows you to control access to UAP based on MAC addresses. Based on how you
only client stations with a listed MAC address or access to the stations listed.
When you enable MAC Authentication and specify a list of approved MAC addresses, only clients with a listed MAC
address can access the network. If you specify MAC addresses to deny, all clients can access the network except for
the clients on the deny list.
MAC Authentication tab.
Figure 28 - 




Page 60
March 2012
Section 4 - Managing the Access Point
Field Description
Filter 
. Any station that is not in the Stations List is denied
access to the network through the AP.
. Only the stations that appear in the list are denied access to
the network through the AP. All other stations are permitted access.

that station list is local or on the RADIUS server.
Stations List This is the local list of clients that are either permitted or denied access to the network
through the AP. To add a MAC Address to the local Stations List, enter its 48-bit MAC
address into the lower text boxes, then click Add.
To a MAC Address from the Stations List, select its 48-bit MAC address, then click
.


 If the MAC authentication type for the VAP is set to Local, the AP uses the Stations
List to permit or deny the clients access to the network. If the MAC authentication type is set


page.
Table 30 - MAC Authentication
to apply the
changes and to save the settings. Changing some settings might cause the AP to stop and
restart system processes. If this happens, wireless clients will temporarily lose connectivity. We



RADIUS server. The station list contains client MAC address entries, and the format for the list is described in the
following table.
 Description Value
 MAC address of the client station. 
 
lookup a client MAC entry.
NOPASSWORD
Table 31 - 

You can set network utilization thresholds on the UAP to maintain the speed and performance of the wireless network
as clients associate and disassociate with the AP. The load balancing settings apply to all supported radios.

point, click the Load Balancing 
Figure 29 - 

Navigation menu