D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 2
D Link Corporation 802.11n Single-band Unified Access Point Part 2
D Link >
Contents
- 1. User Manual Part 1
- 2. User Manual Part 2
- 3. User Manual Part 3
User Manual Part 2
Unified Access Point Administrator’s Guide Section 4 - Managing the Access Point Field Description Load Balancing Enable or disable load balancing: To enable load balancing on this AP, click Enable. To disable load balancing on this AP, click Disable. Utilization for No New Associations Provide the percentage of network bandwidth utilization allowed on the radio before the AP stops accepting new client associations. The default is 0, which means that all new associations will be allowed regardless of the utilization rate. Table 32 - Load Balancing Note: After you configure the load balancing settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. Managed Access Point Overview The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as an individual AP in the network, and you manage it by using the Administrator Web User Interface (UI), CLI, or SNMP. In Managed Mode, the UAP is part of the D-Link Unified Wired and Wireless System, and you manage it by using the D-Link Unified Wireless Switch. If an AP is in Managed Mode, the Administrator Web UI, Telnet, SSH, and SNMP services are disabled. On the UAP, you can configure the IP addresses of up to four D-Link Unified Wireless Switches that can manage it. In order to manage the AP, the switch and AP must discover each other. There are multiple ways for a switch to discover an AP. Adding the IP address of the switch to the AP while it is in Standalone Mode is one way to enable switch-to-AP discovery. Transitioning Between Modes Every 30 seconds, the D-Link Unified Wireless Switch sends a keepalive message to all of the access points it manages. Each AP checks for the keepalive messages on the SSL TCP connection. As long as the AP maintains communication with the switch through the keepalive messages, it remains in Managed Mode. If the AP does not receive a message within 45 seconds of the last keepalive message, the AP assumes the switch has failed and terminates its TCP connection to the switch, and the AP enters Standalone Mode. Once the AP transitions to Standalone Mode, it continues to forward traffic without any loss. The AP uses the configuration on the VAPs configured in VLAN Forwarding mode (the standard, non-tunneled mode). While the AP is in Standalone Mode, you can manage it by using the Web interface or the CLI (through Telnet or SSH). For any clients that are connected to the AP through tunneled VAPs, the AP sends disassociate messages and disables the tunneled VAPs. As long as the Managed AP Administrative Mode is set to Enabled, the AP starts discovery procedures. If the AP establishes a connection with a wireless switch, which may or may not be the same switch it was connected to before, the switch sends the AP its configuration and the AP sends the wireless switch information about all currently associated clients. After the configuration from the switch is applied, the AP radio(s) restart. Client traffic is briefly interrupted until the radio(s) are up and the clients are re-associated. March 2012 Unified Access Point Administrator’s Guide Page 61 Unified Access Point Administrator’s Guide Section 4 - Managing the Access Point Configuring Managed Access Point Settings To add the IP address of a D-Link Unified Wireless Switch to the AP, click the Managed Access Point tab under the Manage heading and update the fields shown in the table below. Figure 30 - Configure Managed AP Wireless Switch Parameters Field Description Managed AP Administrative Mode Click Enabled to allow the AP and switch to discover each other. If the AP successfully authenticates itself with a wireless switch, you will not be able to access the Administrator UI. Click Disabled to prevent the AP from contacting wireless switches. Switch IP Address (1-4) Enter the IP address of up to four wireless switches that can manage the AP. You can enter the IP address in dotted format or as an DNS name. You can view a list of wireless switches on your network that were configured by using a DHCP server. The AP attempts to contact Switch IP Address 1 first. Base IP Port The starting IP port number used by the wireless feature (in a range of 10 consecutive port numbers). Only the first number in the range is configurable. The default value is 57775 (through 57784). Note: When the wireless Base IP Port number is changed on the switch, the wireless feature is automatically disabled and re-enabled. The new value is not sent as part of the global switch configuration in the cluster configuration distribution command; every switch in the cluster must be configured independently with the new Wireless IP port number. Note: When the wireless Base IP Port number is changed from its default value on the switch, it must also be changed on the Access Points. Pass Phrase Select the Edit option and enter a passphrase to allow the AP to authenticate itself with the wireless switch. The passphrase must be between 8 and 63 characters. To remove the password, select Edit, delete the existing password, and then click Apply. You must configure the same passphrase on the switch. WDS Managed Mode Specify whether the AP will act as a Root AP or Satellite AP within the WDS group: •) Root AP — Acts as a bridge or repeater on the wireless medium and communicates with the switch via the wired link. •) Satellite AP — Communicates with the switch via a WDS link to the Root AP. This mode enables the Satellite AP to discover and establish WDS link with the Root AP. WDS Managed Ethernet Port Specify whether the Ethernet port is to be enabled or disabled when the AP becomes part of a WDS group. WDS Group Password Password for WPA2 Personal authentication used to establish the WDS links. Only the Satellite APs need this configuration. The Root APs get the password from the switch when they become managed. Table 33 - Managed Access Point Note: After you configure the settings on the Managed Access Point page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. If the UAP successfully authenticates with a D-Link Unified Wireless Switch, you will loose access to the AP through the Administrator UI. March 2012 Unified Access Point Administrator’s Guide Page 62 Unified Access Point Administrator’s Guide Section 4 - Managing the Access Point Configuring 802.1X Authentication On networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must configure 802.1X authentication information that the AP can supply to the authenticator. To configure the UAP 802.1X supplicant user name and password by using the Web interface, click the Authentication tab and configure the fields shown in the table below. Figure 31 - Modify 802.1X Supplicant Authentication Settings Field Description 802.1X Supplicant Click Enabled to enable the Administrative status of the 802.1X Supplicant. Click Disabled to disable the Administrative status of the 802.1X Supplicant. EAP Method Select one of the following EAP methods to use for communication between the AP and the authenticator: •) MD5 •) PEAP •) TLS Username Enter the user name for the AP to use when responding to requests from an 802.1X authenticator. The user name can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #. Password Enter the password for the AP to use when responding to requests from an 802.1X authenticator. The password can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case letters, numbers, and special symbols such as @ and #. Certificate File Status Indicates whether a certificate file is present and when that certificate expires. Certificate File Upload Upload a certificate file to the AP by using HTTP or TFTP: •) HTTP — Browse to the location where the certificate file is stored and click Upload. •) TFTP — Specify the IP address of the TFTP server where the certificate file is located and provide the file name, including the file path, then click Upload. Table 34 - IEEE 802.1X Supplicant Authentication Note: After you configure the settings on the Authentication page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. March 2012 Unified Access Point Administrator’s Guide Page 63 Unified Access Point Administrator’s Guide Section 4 - Managing the Access Point Creating a Management Access Control List (ACL) You can create an access control list (ACL) that lists up to five IPv4 hosts and five IPv6 hosts that are authorized to access the AP management interface. If this feature is disabled, anyone can access the management interface from any network client by supplying the correct AP username and password. To create an access list, click the Management ACL tab. Figure 32 - Configure Management Access Control Parameters Field Description Management ACL Mode Enable or disable the management ACL feature. At least one IPv4 address should be configured before enabling Management ACL Mode. If enabled, only the IP addresses you specify will have Web, Telnet, SSH, and SNMP access to the management interface. IP Address (1–5) Enter up to five IPv4 addresses that are allowed management access to the AP. Use dotted-decimal format (for example, 192.168.10.10). IPv6 Address (1–5) Enter up to five IPv6 addresses that are allowed management access to the AP. Use the standard IPv6 address format (for example 2001:0db8:1234::abcd). Table 35 - Management ACL Note: After you configure the settings, click Apply to apply the changes and to save the settings. March 2012 Unified Access Point Administrator’s Guide Page 64 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Section 5 - Configuring Access Point Services This section describes how to configure services on the UAP and contains the following subsections: •) “Web Server Settings” on page 65 •) “Configuring SNMP on the Access Point” on page 66 •) “Setting the SSH Status” on page 68 •) “Setting the Telnet Status” on page 69 •) “Configuring Quality of Service” on page 69 •) “Configuring Email Alert” on page 72 •) “Enabling the Time Settings (NTP)” on page 73 Web Server Settings The AP can be managed through HTTP or secure HTTP (HTTPS) sessions. By default both HTTP and HTTPS access are enabled. Either access type can be disabled separately. To configure Web server settings, click Web Server tab. Figure 33 - Configure Web Server Settings Field Description HTTPS Server Status Enable or disable access through a Secure HTTP Server (HTTPS). HTTP Server Status Enable or disable access through HTTP. This setting is independent of the HTTPS server status setting. HTTP Port Specify the port number for HTTP traffic (default is 80). Maximum Sessions When a user logs on to the AP web interface, a session is created. This session is maintained until the user logs off or the session inactivity timer expires. Enter the number web sessions, including both HTTP and HTTPs, that can exist at the same time. The range is 1–10 sessions. If the maximum number of sessions is reached, the next user who attempts to log on to the AP web interface receives an error message about the session limit. Session Timeout Enter the maximum amount of time, in minutes, an inactive user remains logged on to the AP web interface. When the configured timeout is reached, the user is automatically logged off the AP. The range is 1–1440 minutes (1440 minutes = 1 day). March 2012 Unified Access Point Administrator’s Guide Page 65 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Field Description Generate HTTP SSL Certificate Select this option to generate a new SSL certificate for the secure Web server. This should be done once the access point has an IP address to ensure that the common name for the certificate matches the IP address of the UAP. Generating a new SSL certificate will restart the secure Web server. The secure connection will not work until the new certificate is accepted on the browser. Click the Update button to generate the new SSL certificate. HTTP SSL Certificate File Status Indicates whether a certificate file is present and specifies its expiration date and issuer common name. To Get the Current HTTP SSL Certificate Save a copy of the current HTTP SSL certificate on a local system or TFTP server. •) HTTP — Click Download and specify where to store the backup copy of the certificate file. •) TFTP — Provide a file name for the certificate file, including the file path, specify the IP address of the TFTP server where the certificate file copy is to be stored, and then click Download. To upload a HTTP Upload a certificate file to the AP by using HTTP or TFTP: SSL Certificate •) HTTP — Browse to the location where the certificate file is stored and click Upload. from a PC or a TFTP •) TFTP — Specify the IP address of the TFTP server where the certificate file is located and provide the file name, including the file path, then click Upload. Server Table 36 - Web Server Settings Note: Click Apply to apply the changes and to save the settings. If you disable the protocol you are currently using to access the AP management interface, the current connection will end and you will not be able to access the AP by using that protocol until it is enabled. Configuring SNMP on the Access Point Simple Network Management Protocol (SNMP) defines a standard for recording, storing, and sharing information about network devices. SNMP facilitates network management, troubleshooting, and maintenance. The AP supports SNMP versions 1, 2, and 3. Unless specifically noted, all configuration parameters on this page apply to SNMPv1 and SNMPv2c only. Key components of any SNMP-managed network are managed devices, SNMP agents, and a management system. The agents store data about their devices in Management Information Bases (MIBs) and return this data to the SNMP manager when requested. Managed devices can be network nodes such as APs, routers, switches, bridges, hubs, servers, or printers. The UAP can function as an SNMP managed device for seamless integration into network management systems such as HP OpenView. From the SNMP page under the Services heading, you can start or stop control of SNMP agents, configure community passwords, access MIBs, and configure SNMP Trap destinations. From the pages under the SNMPv3 heading, you can manage SNMPv3 users and their security levels and define access control to the SNMP MIBs. For information about how to configure SNMPv3 views, groups, users, and targets, see “Section 6 - Configuring SNMPv3” on page 75. To configure SNMP, click the SNMP tab under the Services heading and update the fields described in the table below. March 2012 Unified Access Point Administrator’s Guide Page 66 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Figure 34 - SNMP Configuration Field Description SNMP Enabled/ Disabled You can specify the SNMP administrative mode on your network. By default SNMP is enabled. To enable SNMP, click Enabled. To disable SNMP, click Disabled. After changing the mode, you must click Apply to save your configuration changes. Note: If SNMP is disabled, all remaining fields on the SNMP page are disabled. This is a global SNMP parameter which applies to SNMPv1, SNMPv2c, and SNMPv3. Read-only community name (for permitted SNMP get operations) Enter a read-only community name. The valid range is 1-256 characters. The community name, as defined in SNMPv2c, acts as a simple authentication mechanism to restrict the machines on the network that can request data to the SNMP agent. The name functions as a password, and the request is assumed to be authentic if the sender knows the password. The community name can be in any alphanumeric format. Port number the SNMP agent will listen to By default an SNMP agent only listens to requests from port 161. However, you can configure this so the agent listens to requests on another port. Enter the port number on which you want the SNMP agents to listen to requests. The valid range is 1-65535. Note: This is a global SNMP parameter that applies to SNMPv1, SNMPv2c, and SNMPv3. Allow SNMP set requests You can choose whether or not to allow SNMP set requests on the AP. Enabling SNMP set requests means that machines on the network can execute configuration changes via the SNMP agent on the AP to the D-Link System MIB. To enable SNMP set requests, click Enabled. To disable SNMP set requests, click Disabled. Read-write community name (for permitted SNMP set operations) If you have enabled SNMP set requests you can set a read-write community name. The valid range is 1-256 characters. Setting a community name is similar to setting a password. Only requests from the machines that identify themselves with this community name will be accepted. The community name can be in any alphanumeric format. Restrict the source You can restrict the source of permitted SNMP requests. of SNMP requests to To restrict the source of permitted SNMP requests, click Enabled. only the designated To permit any source submitting an SNMP request, click Disabled. hosts or subnets March 2012 Unified Access Point Administrator’s Guide Page 67 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Field Description Hostname, address or subnet of Network Management System Specify the IPv4 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices. The valid range is 1-256 characters. As with community names, this provides a level of security on SNMP settings. The SNMP agent will only accept requests from the hostname or subnet specified here. To specify a subnet, enter one or more subnetwork address ranges in the form address/ mask_length where address is an IP address and mask_length is the number of mask bits. Both formats address/mask and address/mask_length are supported. Individual hosts can be provided for this, i.e. IP Address or Hostname. For example, if you enter a range of 192.168.1.0/24 this specifies a subnetwork with address 192.168.1.0 and a subnet mask of 255.255.255.0. The address range is used to specify the subnet of the designated NMS. Only machines with IP addresses in this range are permitted to execute get and set requests on the managed device. Given the example above, the machines with addresses from 192.168.1.1 through 192.168.1.254 can execute SNMP commands on the device. (The address identified by suffix .0 in a subnetwork range is always reserved for the subnet address, and the address identified by .255 in the range is always reserved for the broadcast address). As another example, if you enter a range of 10.10.1.128/25 machines with IP addresses from 10.10.1.129 through 10.10.1.254 can execute SNMP requests on managed devices. In this example, 10.10.1.128 is the network address and 10.10.1.255 is the broadcast address. 126 addresses would be designated. IPv6 Hostname or IPv6 subnet of Network Management System Specify the IPv6 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices. Community name for traps Enter the global community string associated with SNMP traps. The valid range is 1-256 characters. Traps sent from the device will provide this string as a community name. The community name can be in any alphanumeric format. Special characters are not permitted. Hostname or IP address Enter the DNS hostname of the computer to which you want to send SNMP traps. The valid range is 1-256 characters. An example of a DNS hostname is: snmptraps.foo.com. Since SNMP traps are sent randomly from the SNMP agent, it makes sense to specify where exactly the traps should be sent. You can add up to a maximum of three DNS hostnames. Ensure you select the Enabled check box beside the appropriate hostname. Table 37 - SNMP Settings Note: After you configure the SNMP settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. Setting the SSH Status Secure Shell (SSH) is a program that provides access to the DWL-x600AP CLI from a remote host. SSH is more secure than Telnet for remote access because it provides strong authentication and secure communications over insecure channels. From the SSH page, you can enable or disable SSH access to the system. Figure 35 - Set SSH Status March 2012 Unified Access Point Administrator’s Guide Page 68 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Field Description SSH Status Choose to either enable or disable SSH access to the AP CLI: •) To permit remote access to the AP by using SSH, click Enabled. •) To prevent remote access to the AP by using SSH, click Disabled. Table 38 - SSH Settings Setting the Telnet Status Telnet is a program that provides access to the DWL-x600AP CLI from a remote host. From the Telnet page, you can enable or disable Telnet access to the system. Figure 36 - Set Telnet Status Field Description Telnet Status Choose to either enable or disable Telnet access to the AP CLI: •) To permit remote access to the AP by using Telnet, click Enabled. •) To prevent remote access to the AP by using Telnet, click Disabled. Table 39 - Telnet Settings Configuring Quality of Service Quality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless traffic like Voice-over-IP (VoIP), other types of audio, video, and streaming media, as well as traditional IP data over the UAP. Configuring QoS on the UAP consists of setting parameters on existing queues for different types of wireless traffic, and effectively specifying minimum and maximum wait times (through Contention Windows) for transmission. The settings described here apply to data transmission behavior on the AP only, not to that of the client stations. AP Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the AP to the client station. Station Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the client station to the AP. The default values for the AP and station EDCA parameters are those suggested by the Wi-Fi Alliance in the WMM specification. In normal use these values should not need to be changed. Changing these values will affect the QoS provided. Note: On the DWL-6600AP and DWL-8600AP, the QoS settings apply to both radios, but the traffic for each radio is queued independently. To set up queues for QoS, click the QoS tab under the Services heading and configure settings as described in the table below. March 2012 Unified Access Point Administrator’s Guide Page 69 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Figure 37 - Modify QoS Queue Parameters Field Description EDCA Template Possible options are: Default, Optimized for Voice, and Custom. AP EDCA Parameters Queue Queues are defined for different types of data transmitted from AP-to-station: •) Data 0 (Voice) — High priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue. •) Data 1(Video) — High priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue. •) Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue. •) Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AIFS (Inter-Frame Space) The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255. cwMin (Minimum This parameter is input to the algorithm that determines the initial random back off wait time Contention Window) (window) for retry of a transmission. The value specified for Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time is determined. The first random number generated will be a number between 0 and the number specified here. If the first random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number defined in the Maximum Contention Window. Valid values for cwMin are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMin must be lower than the value for cwMax. cwMax (Maximum The value specified for the Maximum Contention Window is the upper limit (in milliseconds) Contention Window) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached. Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached. Valid values for cwMax are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMax must be higher than the value for cwMin. March 2012 Unified Access Point Administrator’s Guide Page 70 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Field Description Max. Burst Length The Max. Burst Length is an AP EDCA parameter and only applies to traffic flowing from the AP to the client station. This value specifies (in milliseconds) the maximum burst length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information. The decreased overhead results in higher throughput and better performance. Valid values for maximum burst length are 0.0 through 999. Wi-Fi Multimedia (WMM) Settings Wi-Fi MultiMedia (WMM) Wi-Fi MultiMedia (WMM) is enabled by default. With WMM enabled, QoS prioritization and coordination of wireless medium access is on. With WMM enabled, QoS settings on the UAP control downstream traffic flowing from the AP to client station (AP EDCA parameters) and the upstream traffic flowing from the station to the AP (station EDCA parameters). Disabling WMM deactivates QoS control of station EDCA parameters on upstream traffic flowing from the station to the AP. With WMM disabled, you can still set some parameters on the downstream traffic flowing from the AP to the client station (AP EDCA parameters). To disable WMM extensions, click Disabled. To enable WMM extensions, click Enabled. Station EDCA Parameters Queue Queues are defined for different types of data transmitted from station-to-AP: •) Data 0 (Voice) — Highest priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue. •) Data 1(Video) — Highest priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue. •) Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue. •) Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example). AIFS (Inter-Frame Space) The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255. cwMin (Minimum This parameter is used by the algorithm that determines the initial random back off wait Contention Window) time (window) for retry of a data transmission during a period of contention for Unified Access Point resources. The value specified here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time will be determined. The first random number generated will be a number between 0 and the number specified here. If the first random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number defined in the Maximum Contention Window. cwMax (Maximum The value specified here in the Maximum Contention Window is the upper limit (in Contention Window) milliseconds) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached. Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached. TXOP Limit The TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the client station to the AP. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the Unified Access Point. The TXOP Limit maximum value is 65535. Other QoS Settings No Acknowledgement Select On to specify that the AP should not acknowledge frames with QosNoAck as the service class value. APSD Select On to enable Automatic Power Save Delivery (APSD), which is a power management method. APSD is recommended if VoIP phones access the network through the AP. March 2012 Unified Access Point Administrator’s Guide Page 71 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services Note: After you configure the QoS settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. Table 40 - QoS Settings Configuring Email Alert The Email Alert feature allows the AP to automatically send email messages when an event at or above the configured severity level occurs. Use the Email Alert Configuration page to configure mail server settings, to set the severity level that triggers alerts, and to add up to three email addresses where urgent and non-urgent email alerts are sent. Note: Email alert is operationally disabled when the AP transitions to managed mode. Figure 38 - Email Alerts Configuration Field Description Email Alert Global Configuration Admin Mode Globally enable or disable the Email Alert feature on the AP. By default, email alerts are disabled. From Address Specify the email address that appears in the From field of alert messages sent from the AP, for example dlinkAP23@foo.com. The address can be a maximum of 255 characters and can contain only printable characters. By default, no address is configured. Log Duration This duration, in minutes, determines how frequently the non-critical messages are sent to the SMTP Server. The range is 30-1440 minutes. The default is 30 minutes. Urgent Message Severity Configures the severity level for log messages that are considered to be urgent. Messages in this category are sent immediately. The security level you select and all higher levels are urgent: •) Emergency indicates system is unusable. It is the highest level of severity. •) Alert indicates action must be taken immediately. •) Critical indicates critical conditions. •) Error indicates error conditions. •) Warning indicates warning conditions. •) Notice indicates normal but significant conditions. •) Info indicates informational messages. •) Debug indicates debug-level messages. March 2012 Unified Access Point Administrator’s Guide Page 72 Unified Access Point Administrator’s Guide Field Section 5 - Configuring Access Point Services Description Non Urgent Severity Configures the severity level for log messages that are considered to be non-urgent. Messages in this category are collected and sent in a digest form at the time interval specified by the Log Duration field. The security level you select and all levels up to, but not including the lowest Urgent level are considered non-urgent. Messages below the security level you specify are not sent via email. See the Urgent Message field description for information about the security levels. Email Alert Mail Server Configuration Mail Server Address Specify the IP address or hostname of the SMTP server on the network. Mail Server Security Specify whether to use SMTP over SSL (TLSv1) or no security (Open) for authentication with the mail server. The default is Open. Mail Server Port Configures the TCP port number for SMTP. The range is a valid port number from 0 to 65535. The default is 25, which is the standard port for SMTP. Username Specify the username to use when authentication with the mail server is required. The username is a 64-byte character string with all printable characters. The default is admin. Password Specify the password associated with the username configured in the previous field. Email Alert Message Configuration To Address 1 Configure the first email address to which alert messages are sent. The address must be a valid email address. By default, no address is configured. To Address 2 Optionally, configure the second email address to which alert messages are sent. The address must be a valid email address. By default, no address is configured. To Address 3 Optionally, configure the third email address to which alert messages are sent. The address must be a valid email address. By default, no address is configured. Email Subject Specify the text to be displayed in the subject of the email alert message. The subject can contain up to 255 alphanumeric characters. The default is Log message from AP. Table 41 - Email Alert Configuration Note: After you configure the Email Alert settings, click Apply to apply the changes and to save the settings. To validate the configured email server credentials, click Test Mail. You can send a test email once the email server details are configured. The following text shows an example of an email alert sent from the AP to the network administrator: From: AP-192.168.2.10@mailserver.com Sent: Wednesday, July 08, 2011 11:16 AM To: administrator@mailserver.com Subject: log message from AP TIME Jul 8 03:48:25 Jul 8 03:48:26 Priority info info Process Id login[1457] mini_http-ssl[1175] Message root login on ‘ttyp0’ Max concurrent connections of 20 reached Enabling the Time Settings (NTP) Use the Time Settings page to specify the Network Time Protocol (NTP) server to use to provide time and date information to the AP or to configure the time and date information manually. NTP is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock. The timestamp is used to indicate the date and time of each event in log messages. See http://www.ntp.org for more information about NTP. March 2012 Unified Access Point Administrator’s Guide Page 73 Unified Access Point Administrator’s Guide Section 5 - Configuring Access Point Services To set the system time either manually or by specifying the address of the NTP server for the AP to use, click the Services > Time Settings (NTP) tab and update the fields as described in the table below. Figure 39 - Time Settings (NTP) Field Description Set System Time NTP provides a way for the AP to obtain and maintain its time from a server on the network. Using an NTP server gives your AP the ability to provide the correct time of day in log messages and session information. Choose to use a network time protocol (NTP) server to determine the system time, or set the system time manually: •) To permit the AP to poll an NTP server, click Using Network Time Protocol (NTP). •) To prevent the AP from polling an NTP server, click Manually. NTP Server (Use NTP) If NTP is enabled, specify the NTP server to use. You can specify the NTP server by hostname or IP address, although using the IP address is not recommended as these can change more readily. If you specify a hostname, note the following requirements: •) The length must be between 1 – 63 characters. •) Upper and lower case characters, numbers, and hyphens are accepted. •) The first character must be a letter (a–z or A–Z), and the last character cannot be a hyphen. System Date (Manual configuration) Specify the current month, day, and year. System Time (Manual configuration) Specify the current time in hours and minutes. The system uses a 24-hour clock, so 6:00 PM is configured as 18:00. Time Zone Select your local time zone from the menu. The default is USA (Pacific). Adjust Time for Daylight Savings Select to have the system adjust the reported time for Daylight Savings Time (DST). When this field is selected, fields to configure Daylight Savings Time settings appear. DST Start (24 HR) Configure the date and time to begin Daylight Savings Time for the System Time. DST End (24 HR) Configure the date and time to end Daylight Savings Time for the System Time. DST Offset (minutes) Select the number of minutes to offset DST. The default is 60 minutes. Table 42 - NTP Settings Note: After you configure the Time settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN traffic is low. March 2012 Unified Access Point Administrator’s Guide Page 74 Unified Access Point Administrator’s Guide Section 6 - Configuring SNMPv3 Section 6 - Configuring SNMPv3 This section describes how to configure the SNMPv3 settings on the UAP and contains the following subsections: •) “Configuring SNMPv3 Views” on page 75 •) “Configuring SNMPv3 Groups” on page 76 •) “Configuring SNMPv3 Users” on page 77 •) “Configuring SNMPv3 Targets” on page 78 Configuring SNMPv3 Views A MIB view is a combination of a set of view subtrees or a family of view subtrees where each view subtree is a subtree within the managed object naming tree. You can create MIB views to control the OID range that SNMPv3 users can access. A MIB view called “all” is created by default in the system. This view contains all management objects supported by the system. Note: If you create an excluded view subtree, create a corresponding included entry with the same view name to allow subtrees outside of the excluded subtree to be included. For example, to create a view that excludes the subtree 1.3.6.1.4, create an excluded entry with the OID 1.3.6.1.4. Then, create an included entry with OID .1 with the same view name. Figure 40 - SNMPv3 Views Configuration The following table describes the fields you can configure on the SNMPv3 Views page. Field Description View Name Enter a name to identify the MIB view. View names can contain up to 32 alphanumeric characters. Type Specifies whether to include or exclude the view subtree or family of subtrees from the MIB view. OID Enter an OID string for the subtree to include or exclude from the view. For example, the system subtree is specified by the OID string .1.3.6.1.2.1.1. Mask The OID mask is 47 characters in length. The format of the OID mask is xx.xx.xx (.)... or xx:xx:xx.... (:) and is 16 octets in length. Each octet is 2 hexadecimal characters separated by either . (period) or : (colon). Only hex characters are accepted in this field. For example, OID mask FA.80 is 11111010.10000000. A family mask is used to define a family of view subtrees. The family mask indicates which sub-identifiers of the associated family OID string are significant to the family’s definition. A family of view subtrees allows control access to one row in a table, in a more efficient manner. SNMPv3 Views This field shows the MIB views on the UAP. To remove a view, select it and click Remove. Table 43 - SNMPv3 Views March 2012 Unified Access Point Administrator’s Guide Page 75 Unified Access Point Administrator’s Guide Section 6 - Configuring SNMPv3 Note: After you configure the SNMPv3 Views settings, you must click Apply to apply the changes and to save the settings. Configuring SNMPv3 Groups SNMPv3 groups allow you to combine users into groups of different authorization and access privileges. By default, the UAP has two groups: •) RO — A read-only group using authentication and data encryption. Users in this group use an MD5 key/ password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be defined. By default, users of this group will have read only access to the default all MIB view, which can be modified by the user. •) RW — A read/write group using authentication and data encryption. Users in this group use an MD5 key/ password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be defined. By default, users of this group will have read and write access to the default all MIB view, which can be modified by the user. RW and RO groups are defined by default. Note: The UAP supports maximum of eight groups. To define additional groups, navigate to the SNMPv3 Groups page and configure the settings that the table below describes. Figure 41 - SNMPv3 Groups Configuration Field Description Name Specify a name to use to identify the group. The default group names are RW and RO. Group names can contain up to 32 alphanumeric characters. Security Level Select one of the following security levels for the group: •) noAuthentication-noPrivacy — No authentication and no data encryption (no security). •) Authentication-noPrivacy — Authentication, but no data encryption. With this security level, users send SNMP messages that use an MD5 key/password for authentication, but not a DES key/password for encryption. •) Authentication-Privacy — Authentication and data encryption. With this security level, users send an MD5 key/password for authentication and a DES key/password for encryption. For groups that require authentication, encryption, or both, you must define the MD5 and DES key/passwords on the SNMPv3 Users page. Write Views Select the write access to management objects (MIBs) for the group: •) write-all — The group can create, alter, and delete MIBs. •) write-none — The group is not allowed to create, alter, or delete MIBS. March 2012 Unified Access Point Administrator’s Guide Page 76 Unified Access Point Administrator’s Guide Section 6 - Configuring SNMPv3 Field Description Read Views Select the read access to management objects (MIBs) for the group: •) view-all — The group is allowed to view and read all MIBs. •) view-none — The group cannot view or read MIBs. SNMPv3 Groups This field shows the default groups and the groups that you have defined on the AP. To remove a group, select the group and click Remove. Table 44 - SNMPv3 Groups Note: After you configure the SNMPv3 Groups settings, you must click Apply to apply the changes and to save the settings. Configuring SNMPv3 Users From the SNMPv3 Users page, you can define multiple users, associate the desired security level to each user, and configure security keys. For authentication, only MD5 type is supported, and for encryption only DES type is supported. There are no default SNMPv3 users on the UAP. Figure 42 - SNMPv3 User Configuration The following table describes the fields to configure SNMPv3 users. Field Description Name Enter the user name to identify the SNMPv3 user. User names can contain up to 32 alphanumeric characters. Group Map the user to a group. The default groups are RWAuth, RWPriv, and RO. You can define additional groups on the SNMPv3 Groups page. Authentication Type Select the type of authentication to use on SNMP requests from the user: •) MD5 — Require MD5 authentication on SNMPv3 requests from the user. •) None — SNMPv3 requests from this user require no authentication. Authentication Key If you specify MD5 as the authentication type, enter a password to enable the SNMP agent to authenticate requests sent by the user. The passphrase must be between 8 and 32 characters in length. Encryption Type Select the type of privacy to use on SNMP requests from the user: •) DES — Use DES encryption on SNMPv3 requests from the user. •) None — SNMPv3 requests from this user require no privacy. Encryption Key If you specify DES as the privacy type, enter a key to use to encrypt the SNMP requests. The passphrase must be between 8 and 32 characters in length. SNMPv3 Users This field shows the users that you have defined on the AP. To remove a user, select the user and click Remove. Table 45 - SNMPv3 Users March 2012 Unified Access Point Administrator’s Guide Page 77 Unified Access Point Administrator’s Guide Section 6 - Configuring SNMPv3 Note: After you configure the SNMPv3 Users settings, you must click Apply to apply the changes and to save the settings. Configuring SNMPv3 Targets SNMPv3 Targets send “inform” messages to the SNMP manager. Each target is identified by a target name and associated with target IP address, UDP port, and SNMP user name. Figure 43 - SNMPv3 Targets Configuration Field Description IPv4/IPv6 Address Enter the IP address of the remote SNMP manager to receive the target. Port Enter the UDP port to use for sending SNMP targets. Users Select the name of the SNMP user to associate with the target. To configure SNMP users, see “Configuring SNMPv3 Users” on page 77. SNMPv3 Targets This field shows the SNMPv3 Targets on the UAP. To remove a target, select it and click Remove. Table 46 - SNMPv3 Targets Note: After you configure the SNMPv3 Target settings, you must click Apply to apply the changes and to save the settings. March 2012 Unified Access Point Administrator’s Guide Page 78 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Section 7 - Maintaining the Access Point This section describes how to maintain the UAP. From the UAP Administrator UI, you can perform the following maintenance tasks: •) “Saving the Current Configuration to a Backup File” on page 79 •) “Restoring the Configuration from a Previously Saved File” on page 80 •) “Rebooting the Access Point” on page 81 •) “Performing AP Maintenance” on page 81 •) “Resetting the Factory Default Configuration” on page 81 •) “Upgrading the Firmware” on page 81 •) “Packet Capture Configuration and Settings” on page 83 Saving the Current Configuration to a Backup File The AP configuration file is in XML format and contains all of the information about the AP settings. You can download the configuration file to a management station to manually edit the content or to save as a back-up copy. You can use HTTP or TFTP to transfer files to and from the UAP. After you download a configuration file to the management station, you can manually edit the file, which is in XML format. Then, you can upload the edited configuration file to apply those configuration settings to the AP. Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using TFTP: 1.) Select TFTP for Download Method. Figure 44 - Manage this Access Point’s Configuration - Save (TFTP) 2.) Enter a name (1 to 63 characters) for the backup file in the Configuration File field, including the .xml file name extension and the path to the directory where you want to save the file. 3.) Enter the Server IP address of the TFTP server. 4.) Click Download to save a copy of the file to the TFTP server. Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using HTTP: 1.) Select HTTP for Download Method. Figure 45 - Manage this Access Point’s Configuration - Save (HTTP) 2.) Click the Download button. A dialog box displays verifying the download. March 2012 Unified Access Point Administrator’s Guide Page 79 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Figure 46 - Confirmation Prompt 3.) To proceed with the download, select OK. A dialog box opens allowing you to view or save the file. 4.) Select the Save File option and select OK. 5.) Use the file browser to navigate to the directory where you want to save the file, and click OK to save the file. You can keep the default file name (config.xml) or rename the backup file, but be sure to save the file with an .xml extension. Restoring the Configuration from a Previously Saved File You can use HTTP or TFTP to transfer files to and from the UAP. After you download a configuration file to the management station, you can manually edit the file, which is in XML format. Then, you can upload the edited configuration file to apply those configuration settings to the AP. Use the following procedures to restore the configuration on an AP to previously saved settings by using TFTP: 1.) Select TFTP for Upload Method. Figure 47 - Manage this Access Point’s Configuration - Restore (TFTP) 2.) Enter a name (1 to 63 characters) for the backup file in the Filename field, including the .xml file name extension and the path to the directory that contains the configuration file to upload. 3.) Enter the IP address of the TFTP server in the Server IP field. 4.) Click the Restore button. The AP reboots. A reboot confirmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted. Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using HTTP: 1.) Select HTTP for Upload Method. Figure 48 - Manage this Access Point’s Configuration - Restore (HTTP) March 2012 Unified Access Point Administrator’s Guide Page 80 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point 2.) Use the Browse button to select the file to restore. 3.) Click the Restore button. A File Upload or Choose File dialog box displays. 4.) Navigate to the directory that contains the file, then select the file to upload and click Open. (Only those files created with the Backup function and saved as .xml backup configuration files are valid to use with Restore; for example, ap_config.xml.) 5.) Click the Restore button. A dialog box opens verifying the restore. 6.) Click OK to proceed. The AP reboots. A reboot confirmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted. Performing AP Maintenance From the Maintenance page, you can reset the AP to its factory default settings or reboot the AP. Figure 49 - Performing AP Maintenance Resetting the Factory Default Configuration If you are experiencing problems with the UAP and have tried all other troubleshooting measures, click Reset. This restores factory defaults and clears all settings, including settings such as a new password or wireless settings. You can also use the reset button on the back panel to reset the system to the default configuration. Rebooting the Access Point For maintenance purposes or as a troubleshooting measure, you can reboot the UAP. To reboot the AP, click the Reboot button on the Configuration page. Upgrading the Firmware As new versions of the UAP firmware become available, you can upgrade the firmware on your devices to take advantage of new features and enhancements. The AP uses a TFTP client for firmware upgrades. You can also use HTTP to perform firmware upgrades. After you upload new firmware and the system reboots, the newly added firmware becomes the primary image. If the upgrade fails, the original firmware remains as the primary image. Note: When you upgrade the firmware, the access point retains the existing configuration information. Use the following steps to upgrade the firmware on an access point by using TFTP: 1.) Select TFTP for Upload Method. March 2012 Unified Access Point Administrator’s Guide Page 81 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Figure 50 - Manage Firmware (TFTP) 2.) Enter a name (1 to 63 characters) for the image file in the Image Filename field, including the path to the directory that contains the image to upload. For example, to upload the ap_upgrade.tar image located in the /share/builds/ap directory, enter / share/builds/ap/ap_upgrade.tar in the Image Filename field. The firmware upgrade file supplied must be a tar file. Do not attempt to use bin files or files of other formats for the upgrade; these types of files will not work. 3.) Enter the Server IP address of the TFTP server. 4.) Click Upgrade. Upon clicking Upgrade for the firmware upgrade, a popup confirmation window is displayed that describes the upgrade process. 5.) Click OK to confirm the upgrade and start the process. Note: The firmware upgrade process begins once you click Upgrade and then OK in the pop-up confirmation window. The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same configuration settings it had before the upgrade. 6.) To verify that the firmware upgrade completed successfully, check the firmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated. Use the following steps to upgrade the firmware on an access point by using HTTP: 1.) Select HTTP for Upload Method. Figure 51 - Manage Firmware (HTTP) 2.) If you know the path to the new firmware image file, enter it in the Image Filename field. Otherwise, click the Browse button and locate the firmware image file. The firmware upgrade file supplied must be a tar file. Do not attempt to use bin files or files of other formats for the upgrade; these types of files will not work. 3.) Click Upgrade to apply the new firmware image. Upon clicking Upgrade for the firmware upgrade, a popup confirmation window is displayed that describes the upgrade process. 4.) Click OK to confirm the upgrade and start the process. Note: The firmware upgrade process begins once you click Upgrade and then OK in the popup confirmation window. The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same configuration settings it had before the upgrade. March 2012 Unified Access Point Administrator’s Guide Page 82 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point 5.) To verify that the firmware upgrade completed successfully, check the firmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated. Packet Capture Configuration and Settings Wireless packet capture operates in two modes: •) Capture file mode. •) Remote capture mode. For capture file mode, captured packets are stored in a file on the Access Point. The AP can transfer the file to a TFTP server. The file is formatted in pcap format and can be examined using tools such as Wireshark and OmniPeek. For remote capture mode, the captured packets are redirected in real time to an external PC running the Wireshark® tool. The AP can capture the following types of packets: •) 802.11 packets received and transmitted on radio interfaces. Packets captured on radio interfaces include the 802.11 header. •) 802.3 packets received and transmitted on the Ethernet interface. •) 802.3 packets received and transmitted on the internal logical interfaces such as VAPs and WDS interfaces. From the Packet Capture Configuration and Settings page, you can: •) View the current packet capture status. •) Configure packet capture parameters. •) Configure packet file capture. •) Configure a remote capture port. •) Download a packet capture file. Figure 52 - Packet Capture Configuration & Settings Packet Capture Status Packet Capture Status allows you to view the status of packet capture on the AP. March 2012 Unified Access Point Administrator’s Guide Page 83 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Figure 53 - Packet Capture Status The following table describes information the packet capture status fields display. Field Description Current Capture Status Shows whether packet capture is running or stopped. Packet Capture Time Shows elapsed capture time. Packet Capture File Size Shows the current capture file size. Table 47 - Packet Capture Status Packet Capture Parameter Configuration Packet Capture Configuration allows you to configure parameters that affect how packet capture functions on the radio interfaces. Figure 54 - Packet Capture Configuration The following table describes the fields to configure the packet capture. Field Description Capture Beacons Enable to capture the 802.11 beacons detected or transmitted by the radio. Promiscuous Capture Enable to place the radio in promiscuous mode when the capture is active. In promiscuous mode the radio receives all traffic on the channel, including traffic that is not destined to this AP. While the radio is operating in promiscuous mode, it continues serving associated clients. Packets not destined to the AP are not forwarded. As soon as the capture is completed, the radio reverts to non-promiscuous mode operation. Client Filter Enable Enable to use the WLAN client filter to capture only frames that are transmitted to, or received from a WLAN client with a specified MAC address. Client Filter MAC Address Specify a MAC address for WLAN client filtering. Note: The MAC filter is active only when capture is performed on an 802.11 interface. Table 48 - Packet Capture Configuration Note: Changes to packet capture configuration parameters take affect after packet capture is restarted. Modifying the parameters while the packet capture is running doesn’t affect the current packet capture session. In order to begin using new parameter values, an existing packet capture session must be stopped and re-started. Packet File Capture In Packet File Capture mode the AP stores captured packets in the RAM file system. March 2012 Unified Access Point Administrator’s Guide Page 84 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Upon activation, the packet capture proceeds until one of the following occurs: •) The capture time reaches configured duration. •) The capture file reaches its maximum size. •) The administrator stops the capture. During the capture, you can monitor the capture status, elapsed capture time, and the current capture file size. This information can be updated, while the capture is in progress, by clicking Refresh. Figure 55 - Packet File Capture The following table describes the fields to configure the packet capture status. Field Description Capture Interface Select an AP Capture Interface name from the drop-down menu. AP capture interface names are eligible for packet capture are: •) brtrunk - Linux bridge interface in the AP •) eth0 - 802.3 traffic on the Ethernet port. •) wlan0 - VAP0 traffic on radio 1. •) wlan1 - VAP0 traffic on radio 2. •) radio1 - 802.11 traffic on radio 1. •) radio2 - 802.11 traffic on radio 2. Capture Duration Specify the time duration in seconds for the capture (range 10 to 3600). Max Capture File Size Specify the maximum allowed size for the capture file in KB (range 64 to 4096). Table 49 - Packet File Capture Remote Packet Capture Remote Packet Capture allows you to specify a remote port as the destination for packet captures. This feature works in conjunction with the Wireshark network analyzer tool for Windows. A packet capture server runs on the AP and sends the captured packets via a TCP connection to the Wireshark tool. A Windows PC running the Wireshark tool allows you to display, log, and analyze captured traffic. When the remote capture mode is in use, the AP doesn’t store any captured data locally in its file system. Your can trace up to five interfaces on the AP at the same time. However, you must start a separate Wireshark session for each interface. You can configure the IP port number used for connecting Wireshark to the AP. The default port number is 2002. The system uses 5 consecutive port numbers starting with the configured port for the packet capture sessions. If a firewall is installed between the Wireshark PC and the AP, these ports must be allowed to pass through the firewall. The firewall must also be configured to allow the Wireshark PC to initiate TCP connection to the AP. To configure Wireshark to use the AP as the source for captured packets, you must specify the remote interface in the “Capture Options” menu. For example to capture packets on an AP with IP address 192.168.1.10 on radio 1 using the default IP port, specify the following interface: rpcap://192.168.1.10/radio1 March 2012 Unified Access Point Administrator’s Guide Page 85 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point To capture packets on the Ethernet interface of the AP and VAP0 on radio 1 using IP port 58000, start two Wireshark sessions and specify the following interfaces: rpcap://192.168.1.10:58000/eth0 rpcap://192.168.1.10:58000/wlan0 When you are capturing traffic on the radio interface, you can disable beacon capture, but other 802.11 control frames are still sent to Wireshark. You can set up a display filter to show only: •) Data frames in the trace. •) Traffic on specific BSSIDs. •) Traffic between two clients. Some examples of useful display filters are: •) Exclude beacons and ACK/RTS/CTS frames: !(wlan.fc.type_subtype == 8 || wlan.fc.type == 1) •) Data frames only: wlan.fc.type == 2 •) Traffic on a specific BSSID: wlan.bssid == 00:02:bc:00:17:d0 •) All traffic to and from a specific client: wlan.addr == 00:00:e8:4e:5f:8e In remote capture mode, traffic is sent to the PC running Wireshark via one of the network interfaces. Depending on where the Wireshark tool is located the traffic can be sent on an Ethernet interface or one of the radios. In order to avoid a traffic flood caused by tracing the trace packets, the AP automatically installs a capture filter to filter out all packets destined to the Wireshark application. For example if the Wireshark IP port is configured to be 58000 then the following capture filter is automatically installed on the AP: not portrange 58000-58004. Enabling the packet capture feature impacts performance of the AP and can create a security issue (unauthorized clients may be able to connect to the AP and trace user data). The AP performance is negatively impacted even if there is no active Wireshark session with the AP. The performance is negatively impacted to a greater extent when packet capture is in progress. Due to performance and security issues, the packet capture mode is not saved in NVRAM on the AP; if the AP resets, the capture mode is disabled and the you must re-enable it in order to resume capturing traffic. Packet capture parameters (other than mode) are saved in NVRAM. In order to minimize performance impact on the AP while traffic capture is in progress, you should install capture filters to limit which traffic is sent to the Wireshark tool. When capturing 802.11 traffic, large portion of the captured frames tend to be beacons (typically sent every 100ms by all Access Points). Although Wireshark supports a display filter for beacon frames, it does not support a capture filter to prevent the AP from forwarding captured beacon packets to the Wireshark tool. In order to reduce performance impact of capturing the 802.11 beacons, you can disable the capture beacons mode. The remote packet capture facility is a standard feature of the Wireshark tool for Windows. Note: Remote packet capture is not standard on the Linux version of Wireshark; the Linux version doesn’t work with the AP. Wireshark is an open source tool and is available for free; it can be downloaded from http://www.wireshark.org. Figure 56 - Remote Packet Capture The following table describes the fields to configure the packet capture status. March 2012 Unified Access Point Administrator’s Guide Page 86 Unified Access Point Administrator’s Guide Section 7 - Maintaining the Access Point Field Description Remote Capture Port Specify the remote port to use as the destination for packet captures. (range 1 to 65530). Table 50 - Remote Packet Capture Packet Capture File Download Packet Capture File Download allows you to download the capture file by TFTP to a configured TFTP server or by HTTP(S) to a PC. The captured packets are stored in file /tmp/apcapture.pcap on the AP. A capture is automatically stopped when the capture file download command is triggered. Because the capture file is located in the RAM file system, it disappears if the AP is reset. Figure 57 - Packet Capture File Download The following table describes the fields to configure the packet capture status. Field Description Use TFTP to download the capture file Select or clear this option to determine whether to use TFTP or HTTP(S) to download the capture file: •) To download the file by using TFTP, select this option and complete the additional fields. •) To download the file by using HTTP or HTTPS, clear this option and click Download to browse to the location where the file is to be saved. TFTP Server Filename When using TFTP to download the file, specify a name for the packet capture file, including the .pcap file name extension and the path to the directory where you want to save the file. Server IP When using TFTP to download the file, specify the IP address of the TFTP server. Table 51 - Packet Capture File Download March 2012 Unified Access Point Administrator’s Guide Page 87 Unified Access Point Administrator’s Guide Section 8 - Configuring Client Quality of Service (QoS) Section 8 - Configuring Client Quality of Service (QoS) This section describes how to configure QoS settings that affect traffic from the wireless clients to the AP. By using the UAP Client QoS features, you can limit bandwidth and apply ACLs and DiffServ policies to the wireless interface. If a VAP uses WPA Enterprise security to authenticate clients, you can configure the RADIUS server to provide per-client QoS information. This section describes the following features: •) “Configuring VAP QoS Parameters” on page 88 •) “Managing Client QoS ACLs” on page 89 •) “Creating a DiffServ Class Map” on page 95 •) “Creating a DiffServ Policy Map” on page 100 •) “Configuring RADIUS-Assigned Client QoS Parameters” on page 102 Configuring VAP QoS Parameters The client QoS features on the UAP provide additional control over certain QoS aspects of wireless clients that connect to the network, such as the amount of bandwidth an individual client is allowed to send and receive. To control general categories of traffic, such as HTTP traffic or traffic from a specific subnet, you can configure ACLs and assign them to one or more VAPs. In addition to controlling general traffic categories, Client QoS allows you to configure per-client conditioning of various micro-flows through Differentiated Services (DiffServ). DiffServ policies are a useful tool for establishing general microflow definition and treatment characteristics that can be applied to each wireless client, both inbound and outbound, when it is authenticated on the network. From the VAP QoS Parameters page, you can enable the Client QoS feature, specify client bandwidth limits, and select the ACLs and DiffServ policies to use as default values for clients associated with the VAP when the client does not have their own attributes defined by a RADIUS server. To configure the Client QoS administrative mode and to configure the QoS settings for a VAP, click the VAP QoS Parameters tab. Figure 58 - Configure Client QoS VAP Settings Field Description Client QoS Global Admin Mode Enable or disable Client QoS operation on the AP. Changing this setting will not affect the WMM settings you configure on the QoS page. Radio For dual-radio APs, select Radio 1 or Radio 2 to specify which radio to configure. VAP Specify the VAP that will have the Client QoS settings that you configure. The QoS settings you configure for the selected VAP will not affect clients that access the network through other VAPs. March 2012 Unified Access Point Administrator’s Guide Page 88 Unified Access Point Administrator’s Guide Section 8 - Configuring Client Quality of Service (QoS) Field Description Client QoS Mode Enable or disable QoS operation on the VAP selected in the VAP menu. QoS must be enabled globally (from the Client QoS Global Admin Mode field) and on the VAP (QoS Mode field) for the Client QoS settings to be applied to wireless clients. Bandwidth Limit Down Enter the maximum allowed transmission rate from the AP to the wireless client in bits per second. The valid range is 0 – 429496000 bits/sec. The value you enter must be a multiple of 8000 bits/sec, in other words, the value must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the configuration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction. Bandwidth Limit Up Enter the maximum allowed client transmission rate to the AP in bits per second. The valid range is 0 – 4294967295 bps. The value you enter must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the configuration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction. ACL Type Down Select the type of ACL to apply to traffic in the outbound (down) direction, which can be one of the following: •) IPv4: The ACL examines IPv4 packets for matches to ACL rules •) IPv6: The ACL examines IPv6 packets for matches to ACL rules •) MAC: The ACL examines layer 2 frames for matches to ACL rules ACL Name Down Select the name of the ACL applied to traffic in the outbound (down) direction. After switching the packet or frame to the outbound interface, the ACL’s rules are checked for a match. The packet or frame is transmitted if it is permitted, and discarded if it is denied. ACL Type Up Select the type of ACL to apply to traffic in the inbound (up) direction, which can be one of the following: •) IPv4: The ACL examines IPv4 packets for matches to ACL rules •) IPv6: The ACL examines IPv6 packets for matches to ACL rules •) MAC: The ACL examines layer 2 frames for matches to ACL rules ACL Name Up Select the name of the ACL applied to traffic entering the AP in the inbound (up) direction. When a packet or frame is received by the AP, the ACL’s rules are checked for a match. The packet or frame is processed if it is permitted, and discarded if it is denied. DiffServ Policy Down Select the name of the DiffServ policy applied to traffic from the AP in the outbound (down) direction. DiffServ Policy Up Select the name of the DiffServ policy applied to traffic sent to the AP in the inbound (up) direction. Table 52 - VAP QoS Parameters Managing Client QoS ACLs ACLs are a collection of permit and deny conditions, called rules, that provide security by blocking unauthorized users and allowing authorized users to access specific resources. ACLs can block any unwarranted attempts to reach network resources. The UAP supports up to 50 IPv4, IPv6, and MAC ACLs. IPv4 and IPv6 ACLs IP ACLs classify traffic for Layers 3 and 4. Each ACL is a set of up to 10 rules applied to traffic sent from a wireless client or to be received by a wireless client. Each rule specifies whether the contents of a given field should be used to permit or deny access to the network. Rules can be based on various criteria and may apply to one ore more fields within a packet, such as the source or destination IP address, the source or destination L4 port, or the protocol carried in the packet. March 2012 Unified Access Point Administrator’s Guide Page 89 Unified Access Point Administrator’s Guide Section 8 - Configuring Client Quality of Service (QoS) MAC ACLs MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect fields of a frame such as the source or destination MAC address, the VLAN ID, or the Class of Service 802.1p priority. When a frame enters or exits the AP port (depending on whether the ACL is applied in the up or down direction), the AP inspects the frame and checks the ACL rules against the content of the frame. If any of the rules match the content, a permit or deny action is taken on the frame. ACL Configuration Process Configure ACLs and rules on the Client QoS ACL page (steps 1–5), and then apply the rules to a specified VAP on the AP QoS Parameters page (step 6). Use the following general steps to configure ACLs: 1.) Specify a name for the ACL. 2.) Select the type of ACL to add. 3.) Add the ACL. 4.) Add new rules to the ACL. 5.) Configure the match criteria for the rules. 6.) Apply the ACL to one or more VAPs. For an example of how to configure an ACL, see “ACL Configuration Process” on page 90. To configure an ACL, click the Client QoS ACL tab. The fields to configure ACL rules appear only after you have created an ACL. The following image shows the configuration of a new rule for the IPv4 ACL named acl1. The rule prevents HTTP traffic from all clients in the 192.168.20.0 network from being forwarded. Figure 59 - Configure Client QoS ACL Settings The following table describes the fields available on the Client QoS ACL page. Field Description ACL Configuration ACL Name March 2012 Enter a name to identify the ACL. The name can contain from 1 – 31 alphanumeric characters. Spaces are not allowed. Unified Access Point Administrator’s Guide Page 90
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.7 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Print, Extract XMP Toolkit : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39 Modify Date : 2012:07:11 13:53:56+08:00 Create Date : 2012:07:11 13:52:47+08:00 Metadata Date : 2012:07:11 13:53:56+08:00 Creator Tool : Adobe InDesign CS5.5 (7.5.2) Format : application/pdf Document ID : uuid:4d59dd96-b6e5-4aec-bc97-77434474dd9a Instance ID : uuid:f7f1bb7b-ceb9-42e9-963b-56202e24eaad Producer : Adobe PDF Library 9.9 Has XFA : No Page Count : 30 Creator : Adobe InDesign CS5.5 (7.5.2)EXIF Metadata provided by EXIF.tools