D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 2

D Link Corporation 802.11n Single-band Unified Access Point Part 2

Contents

User Manual Part 2

Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 61March 2012Section 4 - Managing the Access PointField DescriptionLoad Balancing Enable or disable load balancing:To enable load balancing on this AP, click Enable.To disable load balancing on this AP, click Disable.Utilization for No New AssociationsProvide the percentage of network bandwidth utilization allowed on the radio before the AP stops accepting new client associations. The default is 0, which means that all new associations will be allowed regardless of the utilization rate.Table 32 - Load BalancingNote: After you congure the load balancing settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Managed Access Point OverviewThe UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as an individual AP in the network, and you manage it by using the Administrator Web User Interface (UI), CLI, or SNMP. In Managed Mode, the UAP is part of the D-Link Unied Wired and Wireless System, and you manage it by using the D-Link Unied Wireless Switch. If an AP is in Managed Mode, the Administrator Web UI, Telnet, SSH, and SNMP services are disabled.On the UAP, you can congure the IP addresses of up to four D-Link Unied Wireless Switches that can manage it. In order to manage the AP, the switch and AP must discover each other. There are multiple ways for a switch to discover an AP. Adding the IP address of the switch to the AP while it is in Standalone Mode is one way to enable switch-to-AP discovery.Transitioning Between ModesEvery 30 seconds, the D-Link Unied Wireless Switch sends a keepalive message to all of the access points it manages. Each AP checks for the keepalive messages on the SSL TCP connection. As long as the AP maintains communication with the switch through the keepalive messages, it remains in Managed Mode.If the AP does not receive a message within 45 seconds of the last keepalive message, the AP assumes the switch has failed and terminates its TCP connection to the switch, and the AP enters Standalone Mode.Once the AP transitions to Standalone Mode, it continues to forward trafc without any loss. The AP uses the conguration on the VAPs congured in VLAN Forwarding mode (the standard, non-tunneled mode).While the AP is in Standalone Mode, you can manage it by using the Web interface or the CLI (through Telnet or SSH).For any clients that are connected to the AP through tunneled VAPs, the AP sends disassociate messages and disables the tunneled VAPs.As long as the Managed AP Administrative Mode is set to Enabled, the AP starts discovery procedures. If the AP establishes a connection with a wireless switch, which may or may not be the same switch it was connected to before, the switch sends the AP its conguration and the AP sends the wireless switch information about all currently associated clients.After the conguration from the switch is applied, the AP radio(s) restart. Client trafc is briey interrupted until the radio(s) are up and the clients are re-associated.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 62March 2012Section 4 - Managing the Access PointConguring Managed Access Point SettingsTo add the IP address of a D-Link Unied Wireless Switch to the AP, click the Managed Access Point tab under the Manage heading and update the elds shown in the table below.Figure 30 - Congure Managed AP Wireless Switch ParametersField DescriptionManaged AP Administrative ModeClick Enabled to allow the AP and switch to discover each other. If the AP successfully authenticates itself with a wireless switch, you will not be able to access the Administrator UI. Click Disabled to prevent the AP from contacting wireless switches.Switch IP Address (1-4)Enter the IP address of up to four wireless switches that can manage the AP. You can enter the IP address in dotted format or as an DNS name.You can view a list of wireless switches on your network that were congured by using a DHCP server.The AP attempts to contact Switch IP Address 1 rst.Base IP Port The starting IP port number used by the wireless feature (in a range of 10 consecutive port numbers). Only the rst number in the range is congurable. The default value is 57775 (through 57784).Note: When the wireless Base IP Port number is changed on the switch, the wireless feature is automatically disabled and re-enabled. The new value is not sent as part of the global switch conguration in the cluster conguration distribution command; every switch in the cluster must be congured independently with the new Wireless IP port number.Note: When the wireless Base IP Port number is changed from its default value on the switch, it must also be changed on the Access Points.Pass Phrase Select the Edit option and enter a passphrase to allow the AP to authenticate itself with the wireless switch. The passphrase must be between 8 and 63 characters. To remove the password, select Edit, delete the existing password, and then click Apply.You must congure the same passphrase on the switch.WDS Managed ModeSpecify whether the AP will act as a Root AP or Satellite AP within the WDS group:•)  Root AP — Acts as a bridge or repeater on the wireless medium and communicates with the switch via the wired link.•)  Satellite AP — Communicates with the switch via a WDS link to the Root AP. This mode enables the Satellite AP to discover and establish WDS link with the Root AP.WDS Managed Ethernet PortSpecify whether the Ethernet port is to be enabled or disabled when the AP becomes part of a WDS group.WDS Group PasswordPassword for WPA2 Personal authentication used to establish the WDS links. Only the Satellite APs need this conguration. The Root APs get the password from the switch when they become managed.Table 33 - Managed Access PointNote: After you congure the settings on the Managed Access Point page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. If the UAP successfully authenticates with a D-Link Unied Wireless Switch, you will loose access to the AP through the Administrator UI.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 63March 2012Section 4 - Managing the Access PointConguring 802.1X AuthenticationOn networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must congure 802.1X authentication information that the AP can supply to the authenticator.To congure the UAP 802.1X supplicant user name and password by using the Web interface, click the Authentication tab and congure the elds shown in the table below.Figure 31 - Modify 802.1X Supplicant Authentication SettingsField Description802.1X Supplicant Click Enabled to enable the Administrative status of the 802.1X Supplicant.Click Disabled to disable the Administrative status of the 802.1X Supplicant.EAP Method Select one of the following EAP methods to use for communication between the AP and the authenticator:•)  MD5•)  PEAP•)  TLSUsername Enter the user name for the AP to use when responding to requests from an 802.1X authenticator. The user name can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Password Enter the password for the AP to use when responding to requests from an 802.1X authenticator. The password can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case letters, numbers, and special symbols such as @ and #.Certicate File StatusIndicates whether a certicate le is present and when that certicate expires.Certicate File UploadUpload a certicate le to the AP by using HTTP or TFTP:•)  HTTP — Browse to the location where the certicate le is stored and click Upload. •)  TFTP — Specify the IP address of the TFTP server where the certicate le is located and provide the le name, including the le path, then click Upload.Table 34 - IEEE 802.1X Supplicant AuthenticationNote: After you congure the settings on the Authentication page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 64March 2012Section 4 - Managing the Access PointCreating a Management Access Control List (ACL)You can create an access control list (ACL) that lists up to ve IPv4 hosts and ve IPv6 hosts that are authorized to access the AP management interface. If this feature is disabled, anyone can access the management interface from any network client by supplying the correct AP username and password.To create an access list, click the Management ACL tab.Figure 32 - Congure Management Access Control ParametersField DescriptionManagement ACL ModeEnable or disable the management ACL feature. At least one IPv4 address should be congured before enabling Management ACL Mode. If enabled, only the IP addresses you specify will have Web, Telnet, SSH, and SNMP access to the management interface.IP Address (1–5) Enter up to ve IPv4 addresses that are allowed management access to the AP. Use dotted-decimal format (for example, 192.168.10.10).IPv6 Address (1–5) Enter up to ve IPv6 addresses that are allowed management access to the AP. Use the standard IPv6 address format (for example 2001:0db8:1234::abcd).Table 35 - Management ACLNote: After you congure the settings, click Apply to apply the changes and to save the settings.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 65March 2012Section 5 - Conguring Access Point ServicesSection 5 - Conguring Access Point ServicesThis section describes how to congure services on the UAP and contains the following subsections:•) “Web Server Settings” on page 65•) “Conguring SNMP on the Access Point” on page 66•) “Setting the SSH Status” on page 68•) “Setting the Telnet Status” on page 69•) “Conguring Quality of Service” on page 69•) “Conguring Email Alert” on page 72•) “Enabling the Time Settings (NTP)” on page 73Web Server SettingsThe AP can be managed through HTTP or secure HTTP (HTTPS) sessions. By default both HTTP and HTTPS access are enabled. Either access type can be disabled separately.To congure Web server settings, click Web Server tab.Figure 33 - Congure Web Server SettingsField DescriptionHTTPS Server StatusEnable or disable access through a Secure HTTP Server (HTTPS).HTTP Server Status Enable or disable access through HTTP. This setting is independent of the HTTPS server status setting.HTTP Port Specify the port number for HTTP trafc (default is 80).Maximum Sessions When a user logs on to the AP web interface, a session is created. This session is maintained until the user logs off or the session inactivity timer expires.Enter the number web sessions, including both HTTP and HTTPs, that can exist at the same time. The range is 1–10 sessions. If the maximum number of sessions is reached, the next user who attempts to log on to the AP web interface receives an error message about the session limit.Session Timeout Enter the maximum amount of time, in minutes, an inactive user remains logged on to the AP web interface. When the congured timeout is reached, the user is automatically logged off the AP. The range is 1–1440 minutes (1440 minutes = 1 day).
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 66March 2012Section 5 - Conguring Access Point ServicesField DescriptionGenerate HTTP SSL CerticateSelect this option to generate a new SSL certicate for the secure Web server. This should be done once the access point has an IP address to ensure that the common name for the certicate matches the IP address of the UAP. Generating a new SSL certicate will restart the secure Web server. The secure connection will not work until the new certicate is accepted on the browser. Click the Update button to generate the new SSL certicate.HTTP SSL Certicate File StatusIndicates whether a certicate le is present and species its expiration date and issuer common name.To Get the Current HTTP SSL CerticateSave a copy of the current HTTP SSL certicate on a local system or TFTP server. •)  HTTP — Click Download and specify where to store the backup copy of the certicate le.•)  TFTP — Provide a le name for the certicate le, including the le path, specify the IP address of the TFTP server where the certicate le copy is to be stored, and then click Download.To upload a HTTP SSL Certicate from a PC or a TFTP ServerUpload a certicate le to the AP by using HTTP or TFTP:•)  HTTP — Browse to the location where the certicate le is stored and click Upload. •)  TFTP — Specify the IP address of the TFTP server where the certicate le is located and provide the le name, including the le path, then click Upload.Table 36 - Web Server SettingsNote: Click Apply to apply the changes and to save the settings. If you disable the protocol you are currently using to access the AP management interface, the current connection will end and you will not be able to access the AP by using that protocol until it is enabled.Conguring SNMP on the Access PointSimple Network Management Protocol (SNMP) denes a standard for recording, storing, and sharing information about network devices. SNMP facilitates network management, troubleshooting, and maintenance. The AP supports SNMP versions 1, 2, and 3. Unless specically noted, all conguration parameters on this page apply to SNMPv1 and SNMPv2c only.Key components of any SNMP-managed network are managed devices, SNMP agents, and a management system. The agents store data about their devices in Management Information Bases (MIBs) and return this data to the SNMP manager when requested. Managed devices can be network nodes such as APs, routers, switches, bridges, hubs, servers, or printers.The UAP can function as an SNMP managed device for seamless integration into network management systems such as HP OpenView. From the SNMP page under the Services heading, you can start or stop control of SNMP agents, congure community passwords, access MIBs, and congure SNMP Trap destinations. From the pages under the SNMPv3 heading, you can manage SNMPv3 users and their security levels and dene access control to the SNMP MIBs. For information about how to congure SNMPv3 views, groups, users, and targets, see “Section 6 - Conguring SNMPv3” on page 75. To congure SNMP, click the SNMP tab under the Services heading and update the elds described in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 67March 2012Section 5 - Conguring Access Point ServicesFigure 34 - SNMP CongurationField DescriptionSNMP Enabled/DisabledYou can specify the SNMP administrative mode on your network. By default SNMP is enabled. To enable SNMP, click Enabled. To disable SNMP, click Disabled. After changing the mode, you must click Apply to save your conguration changes.Note: If SNMP is disabled, all remaining elds on the SNMP page are disabled. This is a global SNMP parameter which applies to SNMPv1, SNMPv2c, and SNMPv3.Read-only community name (for permitted SNMP get operations)Enter a read-only community name. The valid range is 1-256 characters.The community name, as dened in SNMPv2c, acts as a simple authentication mechanism to restrict the machines on the network that can request data to the SNMP agent. The name functions as a password, and the request is assumed to be authentic if the sender knows the password.The community name can be in any alphanumeric format.Port number the SNMP agent will listen toBy default an SNMP agent only listens to requests from port 161. However, you can congure this so the agent listens to requests on another port.Enter the port number on which you want the SNMP agents to listen to requests. The valid range is 1-65535.Note: This is a global SNMP parameter that applies to SNMPv1, SNMPv2c, and SNMPv3.Allow SNMP set requestsYou can choose whether or not to allow SNMP set requests on the AP. Enabling SNMP set requests means that machines on the network can execute conguration changes via the SNMP agent on the AP to the D-Link System MIB. To enable SNMP set requests, click Enabled. To disable SNMP set requests, click Disabled.Read-write community name (for permitted SNMP set operations)If you have enabled SNMP set requests you can set a read-write community name. The valid range is 1-256 characters.Setting a community name is similar to setting a password. Only requests from the machines that identify themselves with this community name will be accepted.The community name can be in any alphanumeric format.Restrict the source of SNMP requests to only the designated hosts or subnetsYou can restrict the source of permitted SNMP requests.To restrict the source of permitted SNMP requests, click Enabled.To permit any source submitting an SNMP request, click Disabled.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 68March 2012Section 5 - Conguring Access Point ServicesField DescriptionHostname, address or subnet of Network Management SystemSpecify the IPv4 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices. The valid range is 1-256 characters.As with community names, this provides a level of security on SNMP settings. The SNMP agent will only accept requests from the hostname or subnet specied here.To specify a subnet, enter one or more subnetwork address ranges in the form address/mask_length where address is an IP address and mask_length is the number of mask bits. Both formats address/mask and address/mask_length are supported. Individual hosts can be provided for this, i.e. IP Address or Hostname. For example, if you enter a range of 192.168.1.0/24 this species a subnetwork with address 192.168.1.0 and a subnet mask of 255.255.255.0. The address range is used to specify the subnet of the designated NMS. Only machines with IP addresses in this range are permitted to execute get and set requests on the managed device. Given the example above, the machines with addresses from 192.168.1.1 through 192.168.1.254 can execute SNMP commands on the device. (The address identied by sufx .0 in a subnetwork range is always reserved for the subnet address, and the address identied by .255 in the range is always reserved for the broadcast address). As another example, if you enter a range of 10.10.1.128/25 machines with IP addresses from 10.10.1.129 through 10.10.1.254 can execute SNMP requests on managed devices. In this example, 10.10.1.128 is the network address and 10.10.1.255 is the broadcast address. 126 addresses would be designated.IPv6 Hostname or IPv6 subnet of Network Management SystemSpecify the IPv6 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices.Community name for trapsEnter the global community string associated with SNMP traps. The valid range is 1-256 characters.Traps sent from the device will provide this string as a community name.The community name can be in any alphanumeric format. Special characters are not permitted.Hostname or IP addressEnter the DNS hostname of the computer to which you want to send SNMP traps. The valid range is 1-256 characters.An example of a DNS hostname is: snmptraps.foo.com. Since SNMP traps are sent randomly from the SNMP agent, it makes sense to specify where exactly the traps should be sent. You can add up to a maximum of three DNS hostnames. Ensure you select the Enabled check box beside the appropriate hostname.Table 37 - SNMP SettingsNote: After you congure the SNMP settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.Setting the SSH StatusSecure Shell (SSH) is a program that provides access to the DWL-x600AP CLI from a remote host. SSH is more secure than Telnet for remote access because it provides strong authentication and secure communications over insecure channels. From the SSH page, you can enable or disable SSH access to the system. Figure 35 - Set SSH Status
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 69March 2012Section 5 - Conguring Access Point ServicesField DescriptionSSH Status Choose to either enable or disable SSH access to the AP CLI:•)  To permit remote access to the AP by using SSH, click Enabled.•)  To prevent remote access to the AP by using SSH, click Disabled.Table 38 - SSH SettingsSetting the Telnet StatusTelnet is a program that provides access to the DWL-x600AP CLI from a remote host. From the Telnet page, you can enable or disable Telnet access to the system. Figure 36 - Set Telnet StatusField DescriptionTelnet Status Choose to either enable or disable Telnet access to the AP CLI:•)  To permit remote access to the AP by using Telnet, click Enabled.•)  To prevent remote access to the AP by using Telnet, click Disabled.Table 39 - Telnet SettingsConguring Quality of ServiceQuality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless trafc like Voice-over-IP (VoIP), other types of audio, video, and streaming media, as well as traditional IP data over the UAP.Conguring QoS on the UAP consists of setting parameters on existing queues for different types of wireless trafc, and effectively specifying minimum and maximum wait times (through Contention Windows) for transmission. The settings described here apply to data transmission behavior on the AP only, not to that of the client stations.AP Enhanced Distributed Channel Access (EDCA) Parameters affect trafc owing from the AP to the client station.Station Enhanced Distributed Channel Access (EDCA) Parameters affect trafc owing from the client station to the A P.The default values for the AP and station EDCA parameters are those suggested by the Wi-Fi Alliance in the WMM specication. In normal use these values should not need to be changed. Changing these values will affect the QoS provided.Note: On the DWL-6600AP and DWL-8600AP, the QoS settings apply to both radios, but the trafc for each radio is queued independently. To set up queues for QoS, click the QoS tab under the Services heading and congure settings as described in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 70March 2012Section 5 - Conguring Access Point ServicesFigure 37 - Modify QoS Queue ParametersField DescriptionEDCA Template Possible options are: Default, Optimized for Voice, and Custom.AP EDCA ParametersQueue Queues are dened for different types of data transmitted from AP-to-station:•)  Data 0 (Voice) — High priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.•)  Data 1(Video) — High priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.•)  Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue.•)  Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example).AIFS (Inter-Frame Space)The Arbitration Inter-Frame Spacing (AIFS) species a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255.cwMin (Minimum Contention Window)This parameter is input to the algorithm that determines the initial random back off wait time (window) for retry of a transmission. The value specied for Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time is determined.The rst random number generated will be a number between 0 and the number specied here.If the rst random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number dened in the Maximum Contention Window.Valid values for cwMin are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMin must be lower than the value for cwMax.cwMax (Maximum Contention Window)The value specied for the Maximum Contention Window is the upper limit (in milliseconds) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached.Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached.Valid values for cwMax are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMax must be higher than the value for cwMin.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 71March 2012Section 5 - Conguring Access Point ServicesField DescriptionMax. Burst Length The Max. Burst Length is an AP EDCA parameter and only applies to trafc owing from the AP to the client station.This value species (in milliseconds) the maximum burst length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information. The decreased overhead results in higher throughput and better performance.Valid values for maximum burst length are 0.0 through 999.Wi-Fi Multimedia (WMM) SettingsWi-Fi MultiMedia (WMM)Wi-Fi MultiMedia (WMM) is enabled by default. With WMM enabled, QoS prioritization and coordination of wireless medium access is on. With WMM enabled, QoS settings on the UAP control downstream trafc owing from the AP to client station (AP EDCA parameters) and the upstream trafc owing from the station to the AP (station EDCA parameters).Disabling WMM deactivates QoS control of station EDCA parameters on upstream trafc owing from the station to the AP.With WMM disabled, you can still set some parameters on the downstream trafc owing from the AP to the client station (AP EDCA parameters).To disable WMM extensions, click Disabled.To enable WMM extensions, click Enabled.Station EDCA ParametersQueue Queues are dened for different types of data transmitted from station-to-AP:•)  Data 0 (Voice) — Highest priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.•)  Data 1(Video) — Highest priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.•)  Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue.•)  Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example).AIFS (Inter-Frame Space)The Arbitration Inter-Frame Spacing (AIFS) species a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255.cwMin (Minimum Contention Window)This parameter is used by the algorithm that determines the initial random back off wait time (window) for retry of a data transmission during a period of contention for Unied Access Point resources. The value specied here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time will be determined. The rst random number generated will be a number between 0 and the number specied here. If the rst random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number dened in the Maximum Contention Window.cwMax (Maximum Contention Window)The value specied here in the Maximum Contention Window is the upper limit (in milliseconds) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached.Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached.TXOP Limit The TXOP Limit is a station EDCA parameter and only applies to trafc owing from the client station to the AP. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the Unied Access Point. The TXOP Limit maximum value is 65535.Other QoS SettingsNo AcknowledgementSelect On to specify that the AP should not acknowledge frames with QosNoAck as the service class value.APSD Select On to enable Automatic Power Save Delivery (APSD), which is a power management method. APSD is recommended if VoIP phones access the network through the AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 72March 2012Section 5 - Conguring Access Point ServicesNote: After you congure the QoS settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Table 40 - QoS SettingsConguring Email AlertThe Email Alert feature allows the AP to automatically send email messages when an event at or above the congured severity level occurs. Use the Email Alert Conguration page to congure mail server settings, to set the severity level that triggers alerts, and to add up to three email addresses where urgent and non-urgent email alerts are sent.Note: Email alert is operationally disabled when the AP transitions to managed mode.Figure 38 - Email Alerts CongurationField DescriptionEmail Alert Global CongurationAdmin Mode Globally enable or disable the Email Alert feature on the AP. By default, email alerts are disabled.From Address Specify the email address that appears in the From eld of alert messages sent from the AP, for example dlinkAP23@foo.com. The address can be a maximum of 255 characters and can contain only printable characters. By default, no address is congured.Log Duration This duration, in minutes, determines how frequently the non-critical messages are sent to the SMTP Server. The range is 30-1440 minutes. The default is 30 minutes.Urgent Message SeverityCongures the severity level for log messages that are considered to be urgent. Messages in this category are sent immediately. The security level you select and all higher levels are urgent:•)  Emergency indicates system is unusable. It is the highest level of severity.•)  Alert indicates action must be taken immediately.•)  Critical indicates critical conditions.•)  Error indicates error conditions.•)  Warning indicates warning conditions.•)  Notice indicates normal but signicant conditions.•)  Info indicates informational messages.•)  Debug indicates debug-level messages.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 73March 2012Section 5 - Conguring Access Point ServicesField DescriptionNon Urgent Severity Congures the severity level for log messages that are considered to be non-urgent. Messages in this category are collected and sent in a digest form at the time interval specied by the Log Duration eld. The security level you select and all levels up to, but not including the lowest Urgent level are considered non-urgent. Messages below the security level you specify are not sent via email. See the Urgent Message eld description for information about the security levels.Email Alert Mail Server CongurationMail Server Address Specify the IP address or hostname of the SMTP server on the network.Mail Server Security Specify whether to use SMTP over SSL (TLSv1) or no security (Open) for authentication with the mail server. The default is Open.Mail Server Port Congures the TCP port number for SMTP. The range is a valid port number from 0 to 65535. The default is 25, which is the standard port for SMTP.Username Specify the username to use when authentication with the mail server is required. The username is a 64-byte character string with all printable characters. The default is admin.Password Specify the password associated with the username congured in the previous eld.Email Alert Message CongurationTo Address 1 Congure the rst email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.To Address 2 Optionally, congure the second email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.To Address 3 Optionally, congure the third email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.Email Subject Specify the text to be displayed in the subject of the email alert message. The subject can contain up to 255 alphanumeric characters. The default is Log message from AP.Table 41 - Email Alert CongurationNote: After you congure the Email Alert settings, click Apply to apply the changes and to save the settings. To validate the congured email server credentials, click Test Mail. You can send a test email once the email server details are congured.The following text shows an example of an email alert sent from the AP to the network administrator:From: AP-192.168.2.10@mailserver.com Sent: Wednesday, July 08, 2011 11:16 AMTo: administrator@mailserver.comSubject: log message from APTIME              Priority   Process Id            MessageJul 8 03:48:25    info       login[1457]           root login on ‘ttyp0’Jul 8 03:48:26    info       mini_http-ssl[1175]   Max concurrent connections of 20 reachedEnabling the Time Settings (NTP)Use the Time Settings page to specify the Network Time Protocol (NTP) server to use to provide time and date information to the AP or to congure the time and date information manually.NTP is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock. The timestamp is used to indicate the date and time of each event in log messages.See http://www.ntp.org for more information about NTP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 74March 2012Section 5 - Conguring Access Point ServicesTo set the system time either manually or by specifying the address of the NTP server for the AP to use, click the Services > Time Settings (NTP) tab and update the elds as described in the table below.Figure 39 - Time Settings (NTP)Field DescriptionSet System Time NTP provides a way for the AP to obtain and maintain its time from a server on the network. Using an NTP server gives your AP the ability to provide the correct time of day in log messages and session information. Choose to use a network time protocol (NTP) server to determine the system time, or set the system time manually:•)  To permit the AP to poll an NTP server, click Using Network Time Protocol (NTP).•)  To prevent the AP from polling an NTP server, click Manually.NTP Server (Use NTP)If NTP is enabled, specify the NTP server to use.You can specify the NTP server by hostname or IP address, although using the IP address is not recommended as these can change more readily.If you specify a hostname, note the following requirements:•)  The length must be between 1 – 63 characters.•)  Upper and lower case characters, numbers, and hyphens are accepted. •)  The rst character must be a letter (a–z or A–Z), and the last character cannot be a hyphen.System Date (Manual conguration)Specify the current month, day, and year.System Time (Manual conguration)Specify the current time in hours and minutes. The system uses a 24-hour clock, so 6:00 PM is congured as 18:00.Time Zone Select your local time zone from the menu. The default is USA (Pacic).Adjust Time for Daylight SavingsSelect to have the system adjust the reported time for Daylight Savings Time (DST). When this eld is selected, elds to congure Daylight Savings Time settings appear.DST Start (24 HR) Congure the date and time to begin Daylight Savings Time for the System Time.DST End (24 HR) Congure the date and time to end Daylight Savings Time for the System Time.DST Offset (minutes)Select the number of minutes to offset DST. The default is 60 minutes.Table 42 - NTP SettingsNote: After you congure the Time settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 75March 2012Section 6 - Conguring SNMPv3Section 6 - Conguring SNMPv3This section describes how to congure the SNMPv3 settings on the UAP and contains the following subsections:•) “Conguring SNMPv3 Views” on page 75•) “Conguring SNMPv3 Groups” on page 76•) “Conguring SNMPv3 Users” on page 77•) “Conguring SNMPv3 Targets” on page 78Conguring SNMPv3 ViewsA MIB view is a combination of a set of view subtrees or a family of view subtrees where each view subtree is a subtree within the managed object naming tree. You can create MIB views to control the OID range that SNMPv3 users can access.A MIB view called “all” is created by default in the system. This view contains all management objects supported by the system.Note: If you create an excluded view subtree, create a corresponding included entry with the same view name to allow subtrees outside of the excluded subtree to be included. For example, to create a view that excludes the subtree 1.3.6.1.4, create an excluded entry with the OID 1.3.6.1.4. Then, create an included entry with OID .1 with the same view name. Figure 40 - SNMPv3 Views CongurationThe following table describes the elds you can congure on the SNMPv3 Views page.Field DescriptionView Name Enter a name to identify the MIB view. View names can contain up to 32 alphanumeric characters.Type Species whether to include or exclude the view subtree or family of subtrees from the MIB view.OID Enter an OID string for the subtree to include or exclude from the view. For example, the system subtree is specied by the OID string .1.3.6.1.2.1.1.Mask The OID mask is 47 characters in length. The format of the OID mask is xx.xx.xx (.)... or xx:xx:xx.... (:) and is 16 octets in length. Each octet is 2 hexadecimal characters separated by either . (period) or : (colon). Only hex characters are accepted in this eld. For example, OID mask FA.80 is 11111010.10000000.A family mask is used to dene a family of view subtrees. The family mask indicates which sub-identiers of the associated family OID string are signicant to the family’s denition. A family of view subtrees allows control access to one row in a table, in a more efcient manner.SNMPv3 Views This eld shows the MIB views on the UAP. To remove a view, select it and click Remove.Table 43 - SNMPv3 Views
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 76March 2012Section 6 - Conguring SNMPv3Note: After you congure the SNMPv3 Views settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 GroupsSNMPv3 groups allow you to combine users into groups of different authorization and access privileges.By default, the UAP has two groups:•)  RO — A read-only group using authentication and data encryption. Users in this group use an MD5 key/password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be dened. By default, users of this group will have read only access to the default all MIB view, which can be modied by the user. •)  RW — A read/write group using authentication and data encryption. Users in this group use an MD5 key/password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be dened. By default, users of this group will have read and write access to the default all MIB view, which can be modied by the user.RW and RO groups are dened by default.Note: The UAP supports maximum of eight groups.To dene additional groups, navigate to the SNMPv3 Groups page and congure the settings that the table below describes.Figure 41 - SNMPv3 Groups CongurationField DescriptionName Specify a name to use to identify the group. The default group names are RW and RO. Group names can contain up to 32 alphanumeric characters.Security Level Select one of the following security levels for the group:•)  noAuthentication-noPrivacy — No authentication and no data encryption (no security).•)  Authentication-noPrivacy — Authentication, but no data encryption. With this security level, users send SNMP messages that use an MD5 key/password for authentication, but not a DES key/password for encryption.•)  Authentication-Privacy — Authentication and data encryption. With this security level, users send an MD5 key/password for authentication and a DES key/password for encryption. For groups that require authentication, encryption, or both, you must dene the MD5 and DES key/passwords on the SNMPv3 Users page.Write Views Select the write access to management objects (MIBs) for the group:•)  write-all — The group can create, alter, and delete MIBs.•)  write-none — The group is not allowed to create, alter, or delete MIBS.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 77March 2012Section 6 - Conguring SNMPv3Field DescriptionRead Views Select the read access to management objects (MIBs) for the group:•)  view-all — The group is allowed to view and read all MIBs.•)  view-none — The group cannot view or read MIBs.SNMPv3 Groups This eld shows the default groups and the groups that you have dened on the AP. To remove a group, select the group and click Remove.Table 44 - SNMPv3 GroupsNote: After you congure the SNMPv3 Groups settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 UsersFrom the SNMPv3 Users page, you can dene multiple users, associate the desired security level to each user, and congure security keys.For authentication, only MD5 type is supported, and for encryption only DES type is supported. There are no default SNMPv3 users on the UAP.Figure 42 - SNMPv3 User CongurationThe following table describes the elds to congure SNMPv3 users.Field DescriptionName Enter the user name to identify the SNMPv3 user. User names can contain up to 32 alphanumeric characters.Group Map the user to a group. The default groups are RWAuth, RWPriv, and RO. You can dene additional groups on the SNMPv3 Groups page.Authentication Type Select the type of authentication to use on SNMP requests from the user:•)  MD5 — Require MD5 authentication on SNMPv3 requests from the user.•)  None — SNMPv3 requests from this user require no authentication.Authentication Key If you specify MD5 as the authentication type, enter a password to enable the SNMP agent to authenticate requests sent by the user.The passphrase must be between 8 and 32 characters in length.Encryption Type Select the type of privacy to use on SNMP requests from the user:•)  DES — Use DES encryption on SNMPv3 requests from the user.•)  None — SNMPv3 requests from this user require no privacy.Encryption Key If you specify DES as the privacy type, enter a key to use to encrypt the SNMP requests.The passphrase must be between 8 and 32 characters in length.SNMPv3 Users This eld shows the users that you have dened on the AP. To remove a user, select the user and click Remove.Table 45 - SNMPv3 Users
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 78March 2012Section 6 - Conguring SNMPv3Note: After you congure the SNMPv3 Users settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 TargetsSNMPv3 Targets send “inform” messages to the SNMP manager. Each target is identied by a target name and associated with target IP address, UDP port, and SNMP user name.Figure 43 - SNMPv3 Targets CongurationField DescriptionIPv4/IPv6 Address Enter the IP address of the remote SNMP manager to receive the target.Port Enter the UDP port to use for sending SNMP targets.Users Select the name of the SNMP user to associate with the target. To congure SNMP users, see “Conguring SNMPv3 Users” on page 77.SNMPv3 Targets This eld shows the SNMPv3 Targets on the UAP. To remove a target, select it and click Remove.Table 46 - SNMPv3 TargetsNote: After you congure the SNMPv3 Target settings, you must click Apply to apply the changes and to save the settings.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 79March 2012Section 7 - Maintaining the Access PointSection 7 - Maintaining the Access PointThis section describes how to maintain the UAP.From the UAP Administrator UI, you can perform the following maintenance tasks:•) “Saving the Current Conguration to a Backup File” on page 79•) “Restoring the Conguration from a Previously Saved File” on page 80•) “Rebooting the Access Point” on page 81•) “Performing AP Maintenance” on page 81•) “Resetting the Factory Default Conguration” on page 81•) “Upgrading the Firmware” on page 81•) “Packet Capture Conguration and Settings” on page 83Saving the Current Conguration to a Backup FileThe AP conguration le is in XML format and contains all of the information about the AP settings. You can download the conguration le to a management station to manually edit the content or to save as a back-up copy. You can use HTTP or TFTP to transfer les to and from the UAP. After you download a conguration le to the management station, you can manually edit the le, which is in XML format. Then, you can upload the edited conguration le to apply those conguration settings to the AP.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using TFTP:1.)  Select TFTP for Download Method.Figure 44 - Manage this Access Point’s Conguration - Save (TFTP)2.)  Enter a name (1 to 63 characters) for the backup le in the Conguration File eld, including the .xml le name extension and the path to the directory where you want to save the le.3.)  Enter the Server IP address of the TFTP server.4.)  Click Download to save a copy of the le to the TFTP server.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using HTTP:1.)  Select HTTP for Download Method.Figure 45 - Manage this Access Point’s Conguration - Save (HTTP)2.)  Click the Download button.A dialog box displays verifying the download.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 80March 2012Section 7 - Maintaining the Access PointFigure 46 - Conrmation Prompt3.)  To proceed with the download, select OK.A dialog box opens allowing you to view or save the le.4.)  Select the Save File option and select OK.5.)  Use the le browser to navigate to the directory where you want to save the le, and click OK to save the le.You can keep the default le name (cong.xml) or rename the backup le, but be sure to save the le with an .xml extension.Restoring the Conguration from a Previously Saved FileYou can use HTTP or TFTP to transfer les to and from the UAP. After you download a conguration le to the management station, you can manually edit the le, which is in XML format. Then, you can upload the edited conguration le to apply those conguration settings to the AP.Use the following procedures to restore the conguration on an AP to previously saved settings by using TFTP:1.)  Select TFTP for Upload Method.Figure 47 - Manage this Access Point’s Conguration - Restore (TFTP)2.)  Enter a name (1 to 63 characters) for the backup le in the Filename eld, including the .xml le name extension and the path to the directory that contains the conguration le to upload.3.)  Enter the IP address of the TFTP server in the Server IP eld.4.)  Click the Restore button.The AP reboots. A reboot conrmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using HTTP:1.)  Select HTTP for Upload Method.Figure 48 - Manage this Access Point’s Conguration - Restore (HTTP)
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 81March 2012Section 7 - Maintaining the Access Point2.)  Use the Browse button to select the le to restore.3.)  Click the Restore button.A File Upload or Choose File dialog box displays.4.)  Navigate to the directory that contains the le, then select the le to upload and click Open.(Only those les created with the Backup function and saved as .xml backup conguration les are valid to use with Restore; for example, ap_cong.xml.)5.)  Click the Restore button.A dialog box opens verifying the restore.6.)  Click OK to proceed.The AP reboots. A reboot conrmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted.Performing AP MaintenanceFrom the Maintenance page, you can reset the AP to its factory default settings or reboot the AP.Figure 49 - Performing AP MaintenanceResetting the Factory Default CongurationIf you are experiencing problems with the UAP and have tried all other troubleshooting measures, click Reset. This restores factory defaults and clears all settings, including settings such as a new password or wireless settings. You can also use the reset button on the back panel to reset the system to the default conguration.Rebooting the Access PointFor maintenance purposes or as a troubleshooting measure, you can reboot the UAP. To reboot the AP, click the Reboot button on the Conguration page.Upgrading the FirmwareAs new versions of the UAP rmware become available, you can upgrade the rmware on your devices to take advantage of new features and enhancements. The AP uses a TFTP client for rmware upgrades. You can also use HTTP to perform rmware upgrades.After you upload new rmware and the system reboots, the newly added rmware becomes the primary image. If the upgrade fails, the original rmware remains as the primary image. Note: When you upgrade the rmware, the access point retains the existing conguration information.Use the following steps to upgrade the rmware on an access point by using TFTP:1.)  Select TFTP for Upload Method.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 82March 2012Section 7 - Maintaining the Access PointFigure 50 - Manage Firmware (TFTP)2.)  Enter a name (1 to 63 characters) for the image le in the Image Filename eld, including the path to the directory that contains the image to upload.For example, to upload the ap_upgrade.tar image located in the /share/builds/ap directory, enter /share/builds/ap/ap_upgrade.tar in the Image Filename eld.The rmware upgrade le supplied must be a tar le. Do not attempt to use bin les or les of other formats for the upgrade; these types of les will not work.3.)  Enter the Server IP address of the TFTP server. 4.)  Click Upgrade.Upon clicking Upgrade for the rmware upgrade, a popup conrmation window is displayed that describes the upgrade process.5.)  Click OK to conrm the upgrade and start the process.Note: The rmware upgrade process begins once you click Upgrade and then OK in the pop-up conrmation window.The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same conguration settings it had before the upgrade.6.)  To verify that the rmware upgrade completed successfully, check the rmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated.Use the following steps to upgrade the rmware on an access point by using HTTP:1.)  Select HTTP for Upload Method.Figure 51 - Manage Firmware (HTTP)2.)  If you know the path to the new rmware image le, enter it in the Image Filename eld. Otherwise, click the Browse button and locate the rmware image le.The rmware upgrade le supplied must be a tar le. Do not attempt to use bin les or les of other formats for the upgrade; these types of les will not work.3.)  Click Upgrade to apply the new rmware image.Upon clicking Upgrade for the rmware upgrade, a popup conrmation window is displayed that describes the upgrade process.4.)  Click OK to conrm the upgrade and start the process.Note: The rmware upgrade process begins once you click Upgrade and then OK in the popup conrmation window.The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same conguration settings it had before the upgrade.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 83March 2012Section 7 - Maintaining the Access Point5.)  To verify that the rmware upgrade completed successfully, check the rmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated.Packet Capture Conguration and SettingsWireless packet capture operates in two modes:•)  Capture le mode.•)  Remote capture mode.For capture le mode, captured packets are stored in a le on the Access Point. The AP can transfer the le to a TFTP server. The le is formatted in pcap format and can be examined using tools such as Wireshark and OmniPeek.For remote capture mode, the captured packets are redirected in real time to an external PC running the Wireshark® tool.The AP can capture the following types of packets:•)  802.11 packets received and transmitted on radio interfaces. Packets captured on radio interfaces include the 802.11 header.•)  802.3 packets received and transmitted on the Ethernet interface.•)  802.3 packets received and transmitted on the internal logical interfaces such as VAPs and WDS interfaces.From the Packet Capture Conguration and Settings page, you can:•)  View the current packet capture status.•)  Congure packet capture parameters.•)  Congure packet le capture.•)  Congure a remote capture port.•)  Download a packet capture le.Figure 52 - Packet Capture Conguration & SettingsPacket Capture StatusPacket Capture Status allows you to view the status of packet capture on the AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 84March 2012Section 7 - Maintaining the Access PointFigure 53 - Packet Capture StatusThe following table describes information the packet capture status elds display.Field DescriptionCurrent Capture StatusShows whether packet capture is running or stopped.Packet Capture TimeShows elapsed capture time.Packet Capture File SizeShows the current capture le size.Table 47 - Packet Capture StatusPacket Capture Parameter CongurationPacket Capture Conguration allows you to congure parameters that affect how packet capture functions on the radio interfaces.Figure 54 - Packet Capture CongurationThe following table describes the elds to congure the packet capture.Field DescriptionCapture Beacons Enable to capture the 802.11 beacons detected or transmitted by the radio.Promiscuous CaptureEnable to place the radio in promiscuous mode when the capture is active. In promiscuous mode the radio receives all trafc on the channel, including trafc that is not destined to this AP. While the radio is operating in promiscuous mode, it continues serving associated clients. Packets not destined to the AP are not forwarded. As soon as the capture is completed, the radio reverts to non-promiscuous mode operation.Client Filter Enable Enable to use the WLAN client lter to capture only frames that are transmitted to, or received from a WLAN client with a specied MAC address.Client Filter MAC AddressSpecify a MAC address for WLAN client ltering.Note: The MAC lter is active only when capture is performed on an 802.11 interface.Table 48 - Packet Capture CongurationNote: Changes to packet capture conguration parameters take affect after packet capture is restarted. Modifying the parameters while the packet capture is running doesn’t affect the current packet capture session. In order to begin using new parameter values, an existing packet capture session must be stopped and re-started.Packet File CaptureIn Packet File Capture mode the AP stores captured packets in the RAM le system.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 85March 2012Section 7 - Maintaining the Access PointUpon activation, the packet capture proceeds until one of the following occurs:•)  The capture time reaches congured duration.•)  The capture le reaches its maximum size.•)  The administrator stops the capture.During the capture, you can monitor the capture status, elapsed capture time, and the current capture le size. This information can be updated, while the capture is in progress, by clicking Refresh.Figure 55 - Packet File CaptureThe following table describes the elds to congure the packet capture status.Field DescriptionCapture Interface Select an AP Capture Interface name from the drop-down menu. AP capture interface names are eligible for packet capture are:•)  brtrunk - Linux bridge interface in the AP•)  eth0 - 802.3 trafc on the Ethernet port.•)  wlan0 - VAP0 trafc on radio 1.•)  wlan1 - VAP0 trafc on radio 2.•)  radio1 - 802.11 trafc on radio 1.•)  radio2 - 802.11 trafc on radio 2.Capture Duration Specify the time duration in seconds for the capture (range 10 to 3600).Max Capture File SizeSpecify the maximum allowed size for the capture le in KB (range 64 to 4096).Table 49 - Packet File CaptureRemote Packet CaptureRemote Packet Capture allows you to specify a remote port as the destination for packet captures. This feature works in conjunction with the Wireshark network analyzer tool for Windows. A packet capture server runs on the AP and sends the captured packets via a TCP connection to the Wireshark tool.A Windows PC running the Wireshark tool allows you to display, log, and analyze captured trafc. When the remote capture mode is in use, the AP doesn’t store any captured data locally in its le system.Your can trace up to ve interfaces on the AP at the same time. However, you must start a separate Wireshark session for each interface. You can congure the IP port number used for connecting Wireshark to the AP. The default port number is 2002. The system uses 5 consecutive port numbers starting with the congured port for the packet capture sessions.If a rewall is installed between the Wireshark PC and the AP, these ports must be allowed to pass through the rewall. The rewall must also be congured to allow the Wireshark PC to initiate TCP connection to the AP. To congure Wireshark to use the AP as the source for captured packets, you must specify the remote interface in the “Capture Options” menu. For example to capture packets on an AP with IP address 192.168.1.10 on radio 1 using the default IP port, specify the following interface: rpcap://192.168.1.10/radio1
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 86March 2012Section 7 - Maintaining the Access PointTo capture packets on the Ethernet interface of the AP and VAP0 on radio 1 using IP port 58000, start two Wireshark sessions and specify the following interfaces:rpcap://192.168.1.10:58000/eth0rpcap://192.168.1.10:58000/wlan0When you are capturing trafc on the radio interface, you can disable beacon capture, but other 802.11 control frames are still sent to Wireshark. You can set up a display lter to show only:•)  Data frames in the trace.•)  Trafc on specic BSSIDs.•)  Trafc between two clients.Some examples of useful display lters are:•)  Exclude beacons and ACK/RTS/CTS frames:!(wlan.fc.type_subtype  ==  8 || wlan.fc.type == 1)•)  Data frames only: wlan.fc.type == 2•)  Trafc on a specic BSSID:wlan.bssid ==  00:02:bc:00:17:d0•)  All trafc to and from a specic client:wlan.addr == 00:00:e8:4e:5f:8eIn remote capture mode, trafc is sent to the PC running Wireshark via one of the network interfaces. Depending on where the Wireshark tool is located the trafc can be sent on an Ethernet interface or one of the radios. In order to avoid a trafc ood caused by tracing the trace packets, the AP automatically installs a capture lter to lter out all packets destined to the Wireshark application. For example if the Wireshark IP port is congured to be 58000 then the following capture lter is automatically installed on the AP: not portrange 58000-58004.Enabling the packet capture feature impacts performance of the AP and can create a security issue (unauthorized clients may be able to connect to the AP and trace user data). The AP performance is negatively impacted even if there is no active Wireshark session with the AP. The performance is negatively impacted to a greater extent when packet capture is in progress. Due to performance and security issues, the packet capture mode is not saved in NVRAM on the AP; if the AP resets, the capture mode is disabled and the you must re-enable it in order to resume capturing trafc. Packet capture parameters (other than mode) are saved in NVRAM.In order to minimize performance impact on the AP while trafc capture is in progress, you should install capture lters to limit which trafc is sent to the Wireshark tool. When capturing 802.11 trafc, large portion of the captured frames tend to be beacons (typically sent every 100ms by all Access Points). Although Wireshark supports a display lter for beacon frames, it does not support a capture lter to prevent the AP from forwarding captured beacon packets to the Wireshark tool. In order to reduce performance impact of capturing the 802.11 beacons, you can disable the capture beacons mode. The remote packet capture facility is a standard feature of the Wireshark tool for Windows. Note: Remote packet capture is not standard on the Linux version of Wireshark; the Linux version doesn’t work with the AP. Wireshark is an open source tool and is available for free; it can be downloaded from http://www.wireshark.org.Figure 56 - Remote Packet CaptureThe following table describes the elds to congure the packet capture status.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 87March 2012Section 7 - Maintaining the Access PointField DescriptionRemote Capture PortSpecify the remote port to use as the destination for packet captures. (range 1 to 65530).Table 50 - Remote Packet CapturePacket Capture File DownloadPacket Capture File Download allows you to download the capture le by TFTP to a congured TFTP server or by HTTP(S) to a PC. The captured packets are stored in le /tmp/apcapture.pcap on the AP. A capture is automatically stopped when the capture le download command is triggered.Because the capture le is located in the RAM le system, it disappears if the AP is reset. Figure 57 - Packet Capture File DownloadThe following table describes the elds to congure the packet capture status.Field DescriptionUse TFTP to download the capture leSelect or clear this option to determine whether to use TFTP or HTTP(S) to download the capture le:•)  To download the le by using TFTP, select this option and complete the additional elds.•)  To download the le by using HTTP or HTTPS, clear this option and click Download to browse to the location where the le is to be saved.TFTP Server FilenameWhen using TFTP to download the le, specify a name for the packet capture le, including the .pcap le name extension and the path to the directory where you want to save the le.Server IP When using TFTP to download the le, specify the IP address of the TFTP server.Table 51 - Packet Capture File Download
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 88March 2012Section 8 - Conguring Client Quality of Service (QoS)Section 8 - Conguring Client Quality of Service (QoS)This section describes how to congure QoS settings that affect trafc from the wireless clients to the AP. By using the UAP Client QoS features, you can limit bandwidth and apply ACLs and DiffServ policies to the wireless interface. If a VAP uses WPA Enterprise security to authenticate clients, you can congure the RADIUS server to provide per-client QoS information.This section describes the following features:•) “Conguring VAP QoS Parameters” on page 88•) “Managing Client QoS ACLs” on page 89•) “Creating a DiffServ Class Map” on page 95•) “Creating a DiffServ Policy Map” on page 100•) “Conguring RADIUS-Assigned Client QoS Parameters” on page 102Conguring VAP QoS ParametersThe client QoS features on the UAP provide additional control over certain QoS aspects of wireless clients that connect to the network, such as the amount of bandwidth an individual client is allowed to send and receive. To control general categories of trafc, such as HTTP trafc or trafc from a specic subnet, you can congure ACLs and assign them to one or more VAPs. In addition to controlling general trafc categories, Client QoS allows you to congure per-client conditioning of various micro-ows through Differentiated Services (DiffServ). DiffServ policies are a useful tool for establishing general micro-ow denition and treatment characteristics that can be applied to each wireless client, both inbound and outbound, when it is authenticated on the network. From the VAP QoS Parameters page, you can enable the Client QoS feature, specify client bandwidth limits, and select the ACLs and DiffServ policies to use as default values for clients associated with the VAP when the client does not have their own attributes dened by a RADIUS server.To congure the Client QoS administrative mode and to congure the QoS settings for a VAP, click the VAP QoS Parameters tab.Figure 58 - Congure Client QoS VAP SettingsField DescriptionClient QoS Global Admin ModeEnable or disable Client QoS operation on the AP. Changing this setting will not affect the WMM settings you congure on the QoS page.Radio For dual-radio APs, select Radio 1 or Radio 2 to specify which radio to congure.VAP Specify the VAP that will have the Client QoS settings that you congure. The QoS settings you congure for the selected VAP will not affect clients that access the network through other VAPs.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 89March 2012Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionClient QoS Mode Enable or disable QoS operation on the VAP selected in the VAP menu. QoS must be enabled globally (from the Client QoS Global Admin Mode eld) and on the VAP (QoS Mode eld) for the Client QoS settings to be applied to wireless clients.Bandwidth Limit DownEnter the maximum allowed transmission rate from the AP to the wireless client in bits per second. The valid range is 0 – 429496000 bits/sec.The value you enter must be a multiple of 8000 bits/sec, in other words, the value must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the conguration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction.Bandwidth Limit Up Enter the maximum allowed client transmission rate to the AP in bits per second. The valid range is 0 – 4294967295 bps.The value you enter must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the conguration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction.ACL Type Down Select the type of ACL to apply to trafc in the outbound (down) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules•)  MAC: The ACL examines layer 2 frames for matches to ACL rulesACL Name Down Select the name of the ACL applied to trafc in the outbound (down) direction. After switching the packet or frame to the outbound interface, the ACL’s rules are checked for a match. The packet or frame is transmitted if it is permitted, and discarded if it is denied.ACL Type Up Select the type of ACL to apply to trafc in the inbound (up) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules•)  MAC: The ACL examines layer 2 frames for matches to ACL rulesACL Name Up Select the name of the ACL applied to trafc entering the AP in the inbound (up) direction. When a packet or frame is received by the AP, the ACL’s rules are checked for a match. The packet or frame is processed if it is permitted, and discarded if it is denied.DiffServ Policy DownSelect the name of the DiffServ policy applied to trafc from the AP in the outbound (down) direction.DiffServ Policy Up Select the name of the DiffServ policy applied to trafc sent to the AP in the inbound (up) direction.Table 52 - VAP QoS ParametersManaging Client QoS ACLsACLs are a collection of permit and deny conditions, called rules, that provide security by blocking unauthorized users and allowing authorized users to access specic resources. ACLs can block any unwarranted attempts to reach network resources. The UAP supports up to 50 IPv4, IPv6, and MAC ACLs.IPv4 and IPv6 ACLsIP ACLs classify trafc for Layers 3 and 4.Each ACL is a set of up to 10 rules applied to trafc sent from a wireless client or to be received by a wireless client. Each rule species whether the contents of a given eld should be used to permit or deny access to the network. Rules can be based on various criteria and may apply to one ore more elds within a packet, such as the source or destination IP address, the source or destination L4 port, or the protocol carried in the packet.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 90March 2012Section 8 - Conguring Client Quality of Service (QoS)MAC ACLsMAC ACLs are Layer 2 ACLs. You can congure the rules to inspect elds of a frame such as the source or destination MAC address, the VLAN ID, or the Class of Service 802.1p priority. When a frame enters or exits the AP port (depending on whether the ACL is applied in the up or down direction), the AP inspects the frame and checks the ACL rules against the content of the frame. If any of the rules match the content, a permit or deny action is taken on the frame. ACL Conguration ProcessCongure ACLs and rules on the Client QoS ACL page (steps 1–5), and then apply the rules to a specied VAP on the AP QoS Parameters page (step 6). Use the following general steps to congure ACLs:1.)  Specify a name for the ACL.2.)  Select the type of ACL to add.3.)  Add the ACL.4.)  Add new rules to the ACL.5.)  Congure the match criteria for the rules.6.)  Apply the ACL to one or more VAPs.For an example of how to congure an ACL, see “ACL Conguration Process” on page 90.To congure an ACL, click the Client QoS ACL tab.The elds to congure ACL rules appear only after you have created an ACL. The following image shows the conguration of a new rule for the IPv4 ACL named acl1. The rule prevents HTTP trafc from all clients in the 192.168.20.0 network from being forwarded.Figure 59 - Congure Client QoS ACL SettingsThe following table describes the elds available on the Client QoS ACL page.Field DescriptionACL CongurationACL Name Enter a name to identify the ACL. The name can contain from 1 – 31 alphanumeric characters. Spaces are not allowed.

Navigation menu