D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 2

D Link Corporation 802.11n Single-band Unified Access Point Part 2

Contents

User Manual Part 2

Download: D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 2
Mirror Download [FCC.gov]D Link WL2600APA1 802.11n Single-band Unified Access Point User Manual Part 2
Document ID1742599
Application IDqcjR8B28UXO9MD8uASJ9WQ==
Document DescriptionUser Manual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize232.19kB (2902405 bits)
Date Submitted2012-07-12 00:00:00
Date Available2012-07-12 00:00:00
Creation Date2012-07-11 13:52:47
Producing SoftwareAdobe PDF Library 9.9
Document Lastmod2012-07-11 13:53:56
Document TitleUser Manual Part 2
Document CreatorAdobe InDesign CS5.5 (7.5.2)

Unified Access Point Administrator’s Guide
Section 4 - Managing the Access Point
Field
Description
Load Balancing
Enable or disable load balancing:
To enable load balancing on this AP, click Enable.
To disable load balancing on this AP, click Disable.
Utilization for No
New Associations
Provide the percentage of network bandwidth utilization allowed on the radio before the AP
stops accepting new client associations.
The default is 0, which means that all new associations will be allowed regardless of the
utilization rate.
Table 32 - Load Balancing
Note: After you configure the load balancing settings, you must click Apply to apply the changes
and to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that
you change AP settings when WLAN traffic is low.
Managed Access Point Overview
The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as
an individual AP in the network, and you manage it by using the Administrator Web User Interface (UI), CLI, or SNMP.
In Managed Mode, the UAP is part of the D-Link Unified Wired and Wireless System, and you manage it by using
the D-Link Unified Wireless Switch. If an AP is in Managed Mode, the Administrator Web UI, Telnet, SSH, and SNMP
services are disabled.
On the UAP, you can configure the IP addresses of up to four D-Link Unified Wireless Switches that can manage it. In
order to manage the AP, the switch and AP must discover each other. There are multiple ways for a switch to discover
an AP. Adding the IP address of the switch to the AP while it is in Standalone Mode is one way to enable switch-to-AP
discovery.
Transitioning Between Modes
Every 30 seconds, the D-Link Unified Wireless Switch sends a keepalive message to all of the access points it
manages. Each AP checks for the keepalive messages on the SSL TCP connection. As long as the AP maintains
communication with the switch through the keepalive messages, it remains in Managed Mode.
If the AP does not receive a message within 45 seconds of the last keepalive message, the AP assumes the switch
has failed and terminates its TCP connection to the switch, and the AP enters Standalone Mode.
Once the AP transitions to Standalone Mode, it continues to forward traffic without any loss. The AP uses the
configuration on the VAPs configured in VLAN Forwarding mode (the standard, non-tunneled mode).
While the AP is in Standalone Mode, you can manage it by using the Web interface or the CLI (through Telnet or
SSH).
For any clients that are connected to the AP through tunneled VAPs, the AP sends disassociate messages and
disables the tunneled VAPs.
As long as the Managed AP Administrative Mode is set to Enabled, the AP starts discovery procedures. If the AP
establishes a connection with a wireless switch, which may or may not be the same switch it was connected to
before, the switch sends the AP its configuration and the AP sends the wireless switch information about all currently
associated clients.
After the configuration from the switch is applied, the AP radio(s) restart. Client traffic is briefly interrupted until the
radio(s) are up and the clients are re-associated.
March 2012
Unified Access Point Administrator’s Guide
Page 61
Unified Access Point Administrator’s Guide
Section 4 - Managing the Access Point
Configuring Managed Access Point Settings
To add the IP address of a D-Link Unified Wireless Switch to the AP, click the Managed Access Point tab under the
Manage heading and update the fields shown in the table below.
Figure 30 - Configure Managed AP Wireless Switch Parameters
Field
Description
Managed AP
Administrative
Mode
Click Enabled to allow the AP and switch to discover each other. If the AP successfully
authenticates itself with a wireless switch, you will not be able to access the Administrator
UI.
Click Disabled to prevent the AP from contacting wireless switches.
Switch IP Address
(1-4)
Enter the IP address of up to four wireless switches that can manage the AP. You can
enter the IP address in dotted format or as an DNS name.
You can view a list of wireless switches on your network that were configured by using a
DHCP server.
The AP attempts to contact Switch IP Address 1 first.
Base IP Port
The starting IP port number used by the wireless feature (in a range of 10 consecutive port
numbers). Only the first number in the range is configurable. The default value is 57775
(through 57784).
Note: When the wireless Base IP Port number is changed on the switch, the wireless
feature is automatically disabled and re-enabled. The new value is not sent as part of the
global switch configuration in the cluster configuration distribution command; every switch in
the cluster must be configured independently with the new Wireless IP port number.
Note: When the wireless Base IP Port number is changed from its default value on the
switch, it must also be changed on the Access Points.
Pass Phrase
Select the Edit option and enter a passphrase to allow the AP to authenticate itself with the
wireless switch. The passphrase must be between 8 and 63 characters.
To remove the password, select Edit, delete the existing password, and then click Apply.
You must configure the same passphrase on the switch.
WDS Managed
Mode
Specify whether the AP will act as a Root AP or Satellite AP within the WDS group:
•) Root AP — Acts as a bridge or repeater on the wireless medium and communicates
with the switch via the wired link.
•) Satellite AP — Communicates with the switch via a WDS link to the Root AP. This
mode enables the Satellite AP to discover and establish WDS link with the Root AP.
WDS Managed
Ethernet Port
Specify whether the Ethernet port is to be enabled or disabled when the AP becomes part
of a WDS group.
WDS Group
Password
Password for WPA2 Personal authentication used to establish the WDS links. Only the
Satellite APs need this configuration. The Root APs get the password from the switch when
they become managed.
Table 33 - Managed Access Point
Note: After you configure the settings on the Managed Access Point page, you must click Apply
to apply the changes and to save the settings. Changing some settings might cause the AP to stop
and restart system processes. If this happens, wireless clients will temporarily lose connectivity.
We recommend that you change AP settings when WLAN traffic is low.
If the UAP successfully authenticates with a D-Link Unified Wireless Switch, you will loose access to the AP through
the Administrator UI.
March 2012
Unified Access Point Administrator’s Guide
Page 62
Unified Access Point Administrator’s Guide
Section 4 - Managing the Access Point
Configuring 802.1X Authentication
On networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to
the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must configure 802.1X
authentication information that the AP can supply to the authenticator.
To configure the UAP 802.1X supplicant user name and password by using the Web interface, click the
Authentication tab and configure the fields shown in the table below.
Figure 31 - Modify 802.1X Supplicant Authentication Settings
Field
Description
802.1X Supplicant
Click Enabled to enable the Administrative status of the 802.1X Supplicant.
Click Disabled to disable the Administrative status of the 802.1X Supplicant.
EAP Method
Select one of the following EAP methods to use for communication between the AP and the
authenticator:
•) MD5
•) PEAP
•) TLS
Username
Enter the user name for the AP to use when responding to requests from an 802.1X
authenticator.
The user name can be 1 to 64 characters in length. ASCII printable characters are allowed,
which includes upper and lower case alphabetic letters, the numeric digits, and special
symbols such as @ and #.
Password
Enter the password for the AP to use when responding to requests from an 802.1X
authenticator.
The password can be 1 to 64 characters in length. ASCII printable characters are allowed,
which includes upper and lower case letters, numbers, and special symbols such as @ and
#.
Certificate File
Status
Indicates whether a certificate file is present and when that certificate expires.
Certificate File
Upload
Upload a certificate file to the AP by using HTTP or TFTP:
•) HTTP — Browse to the location where the certificate file is stored and click Upload.
•) TFTP — Specify the IP address of the TFTP server where the certificate file is located
and provide the file name, including the file path, then click Upload.
Table 34 - IEEE 802.1X Supplicant Authentication
Note: After you configure the settings on the Authentication page, you must click Apply to apply
the changes and to save the settings. Changing some settings might cause the AP to stop and
restart system processes. If this happens, wireless clients will temporarily lose connectivity. We
recommend that you change AP settings when WLAN traffic is low.
March 2012
Unified Access Point Administrator’s Guide
Page 63
Unified Access Point Administrator’s Guide
Section 4 - Managing the Access Point
Creating a Management Access Control List (ACL)
You can create an access control list (ACL) that lists up to five IPv4 hosts and five IPv6 hosts that are authorized to
access the AP management interface. If this feature is disabled, anyone can access the management interface from
any network client by supplying the correct AP username and password.
To create an access list, click the Management ACL tab.
Figure 32 - Configure Management Access Control Parameters
Field
Description
Management ACL
Mode
Enable or disable the management ACL feature. At least one IPv4 address should be
configured before enabling Management ACL Mode. If enabled, only the IP addresses you
specify will have Web, Telnet, SSH, and SNMP access to the management interface.
IP Address (1–5)
Enter up to five IPv4 addresses that are allowed management access to the AP. Use
dotted-decimal format (for example, 192.168.10.10).
IPv6 Address (1–5)
Enter up to five IPv6 addresses that are allowed management access to the AP. Use the
standard IPv6 address format (for example 2001:0db8:1234::abcd).
Table 35 - Management ACL
Note: After you configure the settings, click Apply to apply the changes and to save the settings.
March 2012
Unified Access Point Administrator’s Guide
Page 64
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Section 5 - Configuring Access Point Services
This section describes how to configure services on the UAP and contains the following subsections:
•) “Web Server Settings” on page 65
•) “Configuring SNMP on the Access Point” on page 66
•) “Setting the SSH Status” on page 68
•) “Setting the Telnet Status” on page 69
•) “Configuring Quality of Service” on page 69
•) “Configuring Email Alert” on page 72
•) “Enabling the Time Settings (NTP)” on page 73
Web Server Settings
The AP can be managed through HTTP or secure HTTP (HTTPS) sessions. By default both HTTP and HTTPS access
are enabled. Either access type can be disabled separately.
To configure Web server settings, click Web Server tab.
Figure 33 - Configure Web Server Settings
Field
Description
HTTPS Server
Status
Enable or disable access through a Secure HTTP Server (HTTPS).
HTTP Server Status
Enable or disable access through HTTP. This setting is independent of the HTTPS server
status setting.
HTTP Port
Specify the port number for HTTP traffic (default is 80).
Maximum Sessions
When a user logs on to the AP web interface, a session is created. This session is
maintained until the user logs off or the session inactivity timer expires.
Enter the number web sessions, including both HTTP and HTTPs, that can exist at the same
time. The range is 1–10 sessions. If the maximum number of sessions is reached, the next
user who attempts to log on to the AP web interface receives an error message about the
session limit.
Session Timeout
Enter the maximum amount of time, in minutes, an inactive user remains logged on to the
AP web interface. When the configured timeout is reached, the user is automatically logged
off the AP. The range is 1–1440 minutes (1440 minutes = 1 day).
March 2012
Unified Access Point Administrator’s Guide
Page 65
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Field
Description
Generate HTTP SSL
Certificate
Select this option to generate a new SSL certificate for the secure Web server. This should
be done once the access point has an IP address to ensure that the common name for the
certificate matches the IP address of the UAP. Generating a new SSL certificate will restart
the secure Web server. The secure connection will not work until the new certificate is
accepted on the browser. Click the Update button to generate the new SSL certificate.
HTTP SSL
Certificate File
Status
Indicates whether a certificate file is present and specifies its expiration date and issuer
common name.
To Get the
Current HTTP SSL
Certificate
Save a copy of the current HTTP SSL certificate on a local system or TFTP server.
•) HTTP — Click Download and specify where to store the backup copy of the certificate
file.
•) TFTP — Provide a file name for the certificate file, including the file path, specify the
IP address of the TFTP server where the certificate file copy is to be stored, and then
click Download.
To upload a HTTP
Upload a certificate file to the AP by using HTTP or TFTP:
SSL Certificate
•) HTTP — Browse to the location where the certificate file is stored and click Upload.
from a PC or a TFTP
•) TFTP — Specify the IP address of the TFTP server where the certificate file is located
and provide the file name, including the file path, then click Upload.
Server
Table 36 - Web Server Settings
Note: Click Apply to apply the changes and to save the settings. If you disable the protocol you
are currently using to access the AP management interface, the current connection will end and
you will not be able to access the AP by using that protocol until it is enabled.
Configuring SNMP on the Access Point
Simple Network Management Protocol (SNMP) defines a standard for recording, storing, and sharing information
about network devices. SNMP facilitates network management, troubleshooting, and maintenance. The AP supports
SNMP versions 1, 2, and 3. Unless specifically noted, all configuration parameters on this page apply to SNMPv1 and
SNMPv2c only.
Key components of any SNMP-managed network are managed devices, SNMP agents, and a management system.
The agents store data about their devices in Management Information Bases (MIBs) and return this data to the SNMP
manager when requested. Managed devices can be network nodes such as APs, routers, switches, bridges, hubs,
servers, or printers.
The UAP can function as an SNMP managed device for seamless integration into network management systems such
as HP OpenView.
From the SNMP page under the Services heading, you can start or stop control of SNMP agents, configure community
passwords, access MIBs, and configure SNMP Trap destinations.
From the pages under the SNMPv3 heading, you can manage SNMPv3 users and their security levels and define
access control to the SNMP MIBs. For information about how to configure SNMPv3 views, groups, users, and targets,
see “Section 6 - Configuring SNMPv3” on page 75.
To configure SNMP, click the SNMP tab under the Services heading and update the fields described in the table
below.
March 2012
Unified Access Point Administrator’s Guide
Page 66
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Figure 34 - SNMP Configuration
Field
Description
SNMP Enabled/
Disabled
You can specify the SNMP administrative mode on your network. By default SNMP is
enabled. To enable SNMP, click Enabled. To disable SNMP, click Disabled. After changing
the mode, you must click Apply to save your configuration changes.
Note: If SNMP is disabled, all remaining fields on the SNMP page are disabled. This is a
global SNMP parameter which applies to SNMPv1, SNMPv2c, and SNMPv3.
Read-only
community name
(for permitted SNMP
get operations)
Enter a read-only community name. The valid range is 1-256 characters.
The community name, as defined in SNMPv2c, acts as a simple authentication mechanism
to restrict the machines on the network that can request data to the SNMP agent. The name
functions as a password, and the request is assumed to be authentic if the sender knows
the password.
The community name can be in any alphanumeric format.
Port number the
SNMP agent will
listen to
By default an SNMP agent only listens to requests from port 161. However, you can
configure this so the agent listens to requests on another port.
Enter the port number on which you want the SNMP agents to listen to requests. The valid
range is 1-65535.
Note: This is a global SNMP parameter that applies to SNMPv1, SNMPv2c, and SNMPv3.
Allow SNMP set
requests
You can choose whether or not to allow SNMP set requests on the AP. Enabling SNMP
set requests means that machines on the network can execute configuration changes via
the SNMP agent on the AP to the D-Link System MIB. To enable SNMP set requests, click
Enabled. To disable SNMP set requests, click Disabled.
Read-write
community name
(for permitted SNMP
set operations)
If you have enabled SNMP set requests you can set a read-write community name. The
valid range is 1-256 characters.
Setting a community name is similar to setting a password. Only requests from the
machines that identify themselves with this community name will be accepted.
The community name can be in any alphanumeric format.
Restrict the source You can restrict the source of permitted SNMP requests.
of SNMP requests to To restrict the source of permitted SNMP requests, click Enabled.
only the designated To permit any source submitting an SNMP request, click Disabled.
hosts or subnets
March 2012
Unified Access Point Administrator’s Guide
Page 67
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Field
Description
Hostname,
address or subnet
of Network
Management
System
Specify the IPv4 DNS hostname or subnet of the machines that can execute get and set
requests to the managed devices. The valid range is 1-256 characters.
As with community names, this provides a level of security on SNMP settings. The SNMP
agent will only accept requests from the hostname or subnet specified here.
To specify a subnet, enter one or more subnetwork address ranges in the form address/
mask_length where address is an IP address and mask_length is the number of mask bits.
Both formats address/mask and address/mask_length are supported. Individual hosts
can be provided for this, i.e. IP Address or Hostname. For example, if you enter a range of
192.168.1.0/24 this specifies a subnetwork with address 192.168.1.0 and a subnet mask of
255.255.255.0.
The address range is used to specify the subnet of the designated NMS. Only machines
with IP addresses in this range are permitted to execute get and set requests on the
managed device. Given the example above, the machines with addresses from 192.168.1.1
through 192.168.1.254 can execute SNMP commands on the device. (The address
identified by suffix .0 in a subnetwork range is always reserved for the subnet address, and
the address identified by .255 in the range is always reserved for the broadcast address).
As another example, if you enter a range of 10.10.1.128/25 machines with IP addresses
from 10.10.1.129 through 10.10.1.254 can execute SNMP requests on managed devices. In
this example, 10.10.1.128 is the network address and 10.10.1.255 is the broadcast address.
126 addresses would be designated.
IPv6 Hostname
or IPv6 subnet
of Network
Management
System
Specify the IPv6 DNS hostname or subnet of the machines that can execute get and set
requests to the managed devices.
Community name
for traps
Enter the global community string associated with SNMP traps. The valid range is 1-256
characters.
Traps sent from the device will provide this string as a community name.
The community name can be in any alphanumeric format. Special characters are not
permitted.
Hostname or IP
address
Enter the DNS hostname of the computer to which you want to send SNMP traps. The valid
range is 1-256 characters.
An example of a DNS hostname is: snmptraps.foo.com. Since SNMP traps are sent
randomly from the SNMP agent, it makes sense to specify where exactly the traps should
be sent. You can add up to a maximum of three DNS hostnames. Ensure you select the
Enabled check box beside the appropriate hostname.
Table 37 - SNMP Settings
Note: After you configure the SNMP settings, you must click Apply to apply the changes and
to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that
you change AP settings when WLAN traffic is low.
Setting the SSH Status
Secure Shell (SSH) is a program that provides access to the DWL-x600AP CLI from a remote host. SSH is more
secure than Telnet for remote access because it provides strong authentication and secure communications over
insecure channels. From the SSH page, you can enable or disable SSH access to the system.
Figure 35 - Set SSH Status
March 2012
Unified Access Point Administrator’s Guide
Page 68
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Field
Description
SSH Status
Choose to either enable or disable SSH access to the AP CLI:
•) To permit remote access to the AP by using SSH, click Enabled.
•) To prevent remote access to the AP by using SSH, click Disabled.
Table 38 - SSH Settings
Setting the Telnet Status
Telnet is a program that provides access to the DWL-x600AP CLI from a remote host. From the Telnet page, you can
enable or disable Telnet access to the system.
Figure 36 - Set Telnet Status
Field
Description
Telnet Status
Choose to either enable or disable Telnet access to the AP CLI:
•) To permit remote access to the AP by using Telnet, click Enabled.
•) To prevent remote access to the AP by using Telnet, click Disabled.
Table 39 - Telnet Settings
Configuring Quality of Service
Quality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased
throughput and better performance of differentiated wireless traffic like Voice-over-IP (VoIP), other types of audio,
video, and streaming media, as well as traditional IP data over the UAP.
Configuring QoS on the UAP consists of setting parameters on existing queues for different types of wireless traffic,
and effectively specifying minimum and maximum wait times (through Contention Windows) for transmission. The
settings described here apply to data transmission behavior on the AP only, not to that of the client stations.
AP Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the AP to the client station.
Station Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the client station to the
AP.
The default values for the AP and station EDCA parameters are those suggested by the Wi-Fi Alliance in the WMM
specification. In normal use these values should not need to be changed. Changing these values will affect the QoS
provided.
Note: On the DWL-6600AP and DWL-8600AP, the QoS settings apply to both radios, but the traffic
for each radio is queued independently.
To set up queues for QoS, click the QoS tab under the Services heading and configure settings as described in the
table below.
March 2012
Unified Access Point Administrator’s Guide
Page 69
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Figure 37 - Modify QoS Queue Parameters
Field
Description
EDCA Template
Possible options are: Default, Optimized for Voice, and Custom.
AP EDCA Parameters
Queue
Queues are defined for different types of data transmitted from AP-to-station:
•) Data 0 (Voice) — High priority queue, minimum delay. Time-sensitive data such as
VoIP and streaming media are automatically sent to this queue.
•) Data 1(Video) — High priority queue, minimum delay. Time-sensitive video data is
automatically sent to this queue.
•) Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most
traditional IP data is sent to this queue.
•) Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that
requires maximum throughput and is not time-sensitive is sent to this queue (FTP
data, for example).
AIFS (Inter-Frame
Space)
The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time for data frames. The wait
time is measured in slots. Valid values for AIFS are 1 through 255.
cwMin (Minimum
This parameter is input to the algorithm that determines the initial random back off wait time
Contention Window) (window) for retry of a transmission.
The value specified for Minimum Contention Window is the upper limit (in milliseconds) of a
range from which the initial random back off wait time is determined.
The first random number generated will be a number between 0 and the number specified
here.
If the first random back off wait time expires before the data frame is sent, a retry counter
is incremented and the random back off value (window) is doubled. Doubling will continue
until the size of the random back off value reaches the number defined in the Maximum
Contention Window.
Valid values for cwMin are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMin
must be lower than the value for cwMax.
cwMax (Maximum
The value specified for the Maximum Contention Window is the upper limit (in milliseconds)
Contention Window) for the doubling of the random back off value. This doubling continues until either the data
frame is sent or the Maximum Contention Window size is reached.
Once the Maximum Contention Window size is reached, retries will continue until a
maximum number of retries allowed is reached.
Valid values for cwMax are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMax
must be higher than the value for cwMin.
March 2012
Unified Access Point Administrator’s Guide
Page 70
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Field
Description
Max. Burst Length
The Max. Burst Length is an AP EDCA parameter and only applies to traffic flowing from
the AP to the client station.
This value specifies (in milliseconds) the maximum burst length allowed for packet bursts
on the wireless network. A packet burst is a collection of multiple frames transmitted without
header information. The decreased overhead results in higher throughput and better
performance.
Valid values for maximum burst length are 0.0 through 999.
Wi-Fi Multimedia (WMM) Settings
Wi-Fi MultiMedia
(WMM)
Wi-Fi MultiMedia (WMM) is enabled by default. With WMM enabled, QoS prioritization and
coordination of wireless medium access is on. With WMM enabled, QoS settings on the
UAP control downstream traffic flowing from the AP to client station (AP EDCA parameters)
and the upstream traffic flowing from the station to the AP (station EDCA parameters).
Disabling WMM deactivates QoS control of station EDCA parameters on upstream traffic
flowing from the station to the AP.
With WMM disabled, you can still set some parameters on the downstream traffic flowing
from the AP to the client station (AP EDCA parameters).
To disable WMM extensions, click Disabled.
To enable WMM extensions, click Enabled.
Station EDCA Parameters
Queue
Queues are defined for different types of data transmitted from station-to-AP:
•) Data 0 (Voice) — Highest priority queue, minimum delay. Time-sensitive data such as
VoIP and streaming media are automatically sent to this queue.
•) Data 1(Video) — Highest priority queue, minimum delay. Time-sensitive video data is
automatically sent to this queue.
•) Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most
traditional IP data is sent to this queue.
•) Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that
requires maximum throughput and is not time-sensitive is sent to this queue (FTP
data, for example).
AIFS (Inter-Frame
Space)
The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time for data frames. The wait
time is measured in slots. Valid values for AIFS are 1 through 255.
cwMin (Minimum
This parameter is used by the algorithm that determines the initial random back off wait
Contention Window) time (window) for retry of a data transmission during a period of contention for Unified
Access Point resources. The value specified here in the Minimum Contention Window is
the upper limit (in milliseconds) of a range from which the initial random back off wait time
will be determined. The first random number generated will be a number between 0 and the
number specified here. If the first random back off wait time expires before the data frame
is sent, a retry counter is incremented and the random back off value (window) is doubled.
Doubling will continue until the size of the random back off value reaches the number
defined in the Maximum Contention Window.
cwMax (Maximum
The value specified here in the Maximum Contention Window is the upper limit (in
Contention Window) milliseconds) for the doubling of the random back off value. This doubling continues until
either the data frame is sent or the Maximum Contention Window size is reached.
Once the Maximum Contention Window size is reached, retries will continue until a
maximum number of retries allowed is reached.
TXOP Limit
The TXOP Limit is a station EDCA parameter and only applies to traffic flowing from the
client station to the AP. The Transmission Opportunity (TXOP) is an interval of time, in
milliseconds, when a WME client station has the right to initiate transmissions onto the
wireless medium (WM) towards the Unified Access Point. The TXOP Limit maximum value is
65535.
Other QoS Settings
No
Acknowledgement
Select On to specify that the AP should not acknowledge frames with QosNoAck as the
service class value.
APSD
Select On to enable Automatic Power Save Delivery (APSD), which is a power management
method. APSD is recommended if VoIP phones access the network through the AP.
March 2012
Unified Access Point Administrator’s Guide
Page 71
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
Note: After you configure the QoS settings, you must click Apply to apply the changes and to save
the settings. Changing some settings might cause the AP to stop and restart system processes. If
this happens, wireless clients will temporarily lose connectivity. We recommend that you change
AP settings when WLAN traffic is low.
Table 40 - QoS Settings
Configuring Email Alert
The Email Alert feature allows the AP to automatically send email messages when an event at or above the configured
severity level occurs. Use the Email Alert Configuration page to configure mail server settings, to set the severity level
that triggers alerts, and to add up to three email addresses where urgent and non-urgent email alerts are sent.
Note: Email alert is operationally disabled when the AP transitions to managed mode.
Figure 38 - Email Alerts Configuration
Field
Description
Email Alert Global Configuration
Admin Mode
Globally enable or disable the Email Alert feature on the AP. By default, email alerts are
disabled.
From Address
Specify the email address that appears in the From field of alert messages sent from the AP,
for example dlinkAP23@foo.com. The address can be a maximum of 255 characters and
can contain only printable characters. By default, no address is configured.
Log Duration
This duration, in minutes, determines how frequently the non-critical messages are sent to
the SMTP Server. The range is 30-1440 minutes. The default is 30 minutes.
Urgent Message
Severity
Configures the severity level for log messages that are considered to be urgent. Messages
in this category are sent immediately. The security level you select and all higher levels are
urgent:
•) Emergency indicates system is unusable. It is the highest level of severity.
•) Alert indicates action must be taken immediately.
•) Critical indicates critical conditions.
•) Error indicates error conditions.
•) Warning indicates warning conditions.
•) Notice indicates normal but significant conditions.
•) Info indicates informational messages.
•) Debug indicates debug-level messages.
March 2012
Unified Access Point Administrator’s Guide
Page 72
Unified Access Point Administrator’s Guide
Field
Section 5 - Configuring Access Point Services
Description
Non Urgent Severity Configures the severity level for log messages that are considered to be non-urgent.
Messages in this category are collected and sent in a digest form at the time interval
specified by the Log Duration field. The security level you select and all levels up to, but not
including the lowest Urgent level are considered non-urgent. Messages below the security
level you specify are not sent via email.
See the Urgent Message field description for information about the security levels.
Email Alert Mail Server Configuration
Mail Server Address Specify the IP address or hostname of the SMTP server on the network.
Mail Server Security Specify whether to use SMTP over SSL (TLSv1) or no security (Open) for authentication
with the mail server. The default is Open.
Mail Server Port
Configures the TCP port number for SMTP. The range is a valid port number from 0 to
65535. The default is 25, which is the standard port for SMTP.
Username
Specify the username to use when authentication with the mail server is required. The
username is a 64-byte character string with all printable characters. The default is admin.
Password
Specify the password associated with the username configured in the previous field.
Email Alert Message Configuration
To Address 1
Configure the first email address to which alert messages are sent. The address must be a
valid email address. By default, no address is configured.
To Address 2
Optionally, configure the second email address to which alert messages are sent. The
address must be a valid email address. By default, no address is configured.
To Address 3
Optionally, configure the third email address to which alert messages are sent. The address
must be a valid email address. By default, no address is configured.
Email Subject
Specify the text to be displayed in the subject of the email alert message. The subject can
contain up to 255 alphanumeric characters. The default is Log message from AP.
Table 41 - Email Alert Configuration
Note: After you configure the Email Alert settings, click Apply to apply the changes and to save
the settings.
To validate the configured email server credentials, click Test Mail. You can send a test email once the email server
details are configured.
The following text shows an example of an email alert sent from the AP to the network administrator:
From: AP-192.168.2.10@mailserver.com
Sent: Wednesday, July 08, 2011 11:16 AM
To: administrator@mailserver.com
Subject: log message from AP
TIME
Jul 8 03:48:25
Jul 8 03:48:26
Priority
info
info
Process Id
login[1457]
mini_http-ssl[1175]
Message
root login on ‘ttyp0’
Max concurrent connections of 20 reached
Enabling the Time Settings (NTP)
Use the Time Settings page to specify the Network Time Protocol (NTP) server to use to provide time and date
information to the AP or to configure the time and date information manually.
NTP is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit
Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic
time requests to servers, using the returned time stamp to adjust its clock. The timestamp is used to indicate the date
and time of each event in log messages.
See http://www.ntp.org for more information about NTP.
March 2012
Unified Access Point Administrator’s Guide
Page 73
Unified Access Point Administrator’s Guide
Section 5 - Configuring Access Point Services
To set the system time either manually or by specifying the address of the NTP server for the AP to use, click the
Services > Time Settings (NTP) tab and update the fields as described in the table below.
Figure 39 - Time Settings (NTP)
Field
Description
Set System Time
NTP provides a way for the AP to obtain and maintain its time from a server on the network.
Using an NTP server gives your AP the ability to provide the correct time of day in log
messages and session information.
Choose to use a network time protocol (NTP) server to determine the system time, or set the
system time manually:
•) To permit the AP to poll an NTP server, click Using Network Time Protocol (NTP).
•) To prevent the AP from polling an NTP server, click Manually.
NTP Server (Use
NTP)
If NTP is enabled, specify the NTP server to use.
You can specify the NTP server by hostname or IP address, although using the IP address
is not recommended as these can change more readily.
If you specify a hostname, note the following requirements:
•) The length must be between 1 – 63 characters.
•) Upper and lower case characters, numbers, and hyphens are accepted.
•) The first character must be a letter (a–z or A–Z), and the last character cannot be a
hyphen.
System Date
(Manual
configuration)
Specify the current month, day, and year.
System Time
(Manual
configuration)
Specify the current time in hours and minutes. The system uses a 24-hour clock, so 6:00 PM
is configured as 18:00.
Time Zone
Select your local time zone from the menu. The default is USA (Pacific).
Adjust Time for
Daylight Savings
Select to have the system adjust the reported time for Daylight Savings Time (DST). When
this field is selected, fields to configure Daylight Savings Time settings appear.
DST Start (24 HR)
Configure the date and time to begin Daylight Savings Time for the System Time.
DST End (24 HR)
Configure the date and time to end Daylight Savings Time for the System Time.
DST Offset
(minutes)
Select the number of minutes to offset DST. The default is 60 minutes.
Table 42 - NTP Settings
Note: After you configure the Time settings, you must click Apply to apply the changes and
to save the settings. Changing some settings might cause the AP to stop and restart system
processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that
you change AP settings when WLAN traffic is low.
March 2012
Unified Access Point Administrator’s Guide
Page 74
Unified Access Point Administrator’s Guide
Section 6 - Configuring SNMPv3
Section 6 - Configuring SNMPv3
This section describes how to configure the SNMPv3 settings on the UAP and contains the following subsections:
•) “Configuring SNMPv3 Views” on page 75
•) “Configuring SNMPv3 Groups” on page 76
•) “Configuring SNMPv3 Users” on page 77
•) “Configuring SNMPv3 Targets” on page 78
Configuring SNMPv3 Views
A MIB view is a combination of a set of view subtrees or a family of view subtrees where each view subtree is a
subtree within the managed object naming tree. You can create MIB views to control the OID range that SNMPv3
users can access.
A MIB view called “all” is created by default in the system. This view contains all management objects supported by
the system.
Note: If you create an excluded view subtree, create a corresponding included entry with the
same view name to allow subtrees outside of the excluded subtree to be included. For example, to
create a view that excludes the subtree 1.3.6.1.4, create an excluded entry with the OID 1.3.6.1.4.
Then, create an included entry with OID .1 with the same view name.
Figure 40 - SNMPv3 Views Configuration
The following table describes the fields you can configure on the SNMPv3 Views page.
Field
Description
View Name
Enter a name to identify the MIB view.
View names can contain up to 32 alphanumeric characters.
Type
Specifies whether to include or exclude the view subtree or family of subtrees from the MIB
view.
OID
Enter an OID string for the subtree to include or exclude from the view.
For example, the system subtree is specified by the OID string .1.3.6.1.2.1.1.
Mask
The OID mask is 47 characters in length. The format of the OID mask is xx.xx.xx (.)... or
xx:xx:xx.... (:) and is 16 octets in length. Each octet is 2 hexadecimal characters separated
by either . (period) or : (colon). Only hex characters are accepted in this field. For example,
OID mask FA.80 is 11111010.10000000.
A family mask is used to define a family of view subtrees. The family mask indicates which
sub-identifiers of the associated family OID string are significant to the family’s definition.
A family of view subtrees allows control access to one row in a table, in a more efficient
manner.
SNMPv3 Views
This field shows the MIB views on the UAP. To remove a view, select it and click Remove.
Table 43 - SNMPv3 Views
March 2012
Unified Access Point Administrator’s Guide
Page 75
Unified Access Point Administrator’s Guide
Section 6 - Configuring SNMPv3
Note: After you configure the SNMPv3 Views settings, you must click Apply to apply the changes
and to save the settings.
Configuring SNMPv3 Groups
SNMPv3 groups allow you to combine users into groups of different authorization and access privileges.
By default, the UAP has two groups:
•) RO — A read-only group using authentication and data encryption. Users in this group use an MD5 key/
password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords
must be defined. By default, users of this group will have read only access to the default all MIB view, which can
be modified by the user.
•) RW — A read/write group using authentication and data encryption. Users in this group use an MD5 key/
password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords
must be defined. By default, users of this group will have read and write access to the default all MIB view,
which can be modified by the user.
RW and RO groups are defined by default.
Note: The UAP supports maximum of eight groups.
To define additional groups, navigate to the SNMPv3 Groups page and configure the settings that the table below
describes.
Figure 41 - SNMPv3 Groups Configuration
Field
Description
Name
Specify a name to use to identify the group. The default group names are RW and RO.
Group names can contain up to 32 alphanumeric characters.
Security Level
Select one of the following security levels for the group:
•) noAuthentication-noPrivacy — No authentication and no data encryption (no
security).
•) Authentication-noPrivacy — Authentication, but no data encryption. With this security
level, users send SNMP messages that use an MD5 key/password for authentication,
but not a DES key/password for encryption.
•) Authentication-Privacy — Authentication and data encryption. With this security level,
users send an MD5 key/password for authentication and a DES key/password for
encryption.
For groups that require authentication, encryption, or both, you must define the MD5 and
DES key/passwords on the SNMPv3 Users page.
Write Views
Select the write access to management objects (MIBs) for the group:
•) write-all — The group can create, alter, and delete MIBs.
•) write-none — The group is not allowed to create, alter, or delete MIBS.
March 2012
Unified Access Point Administrator’s Guide
Page 76
Unified Access Point Administrator’s Guide
Section 6 - Configuring SNMPv3
Field
Description
Read Views
Select the read access to management objects (MIBs) for the group:
•) view-all — The group is allowed to view and read all MIBs.
•) view-none — The group cannot view or read MIBs.
SNMPv3 Groups
This field shows the default groups and the groups that you have defined on the AP. To
remove a group, select the group and click Remove.
Table 44 - SNMPv3 Groups
Note: After you configure the SNMPv3 Groups settings, you must click Apply to apply the changes
and to save the settings.
Configuring SNMPv3 Users
From the SNMPv3 Users page, you can define multiple users, associate the desired security level to each user, and
configure security keys.
For authentication, only MD5 type is supported, and for encryption only DES type is supported. There are no default
SNMPv3 users on the UAP.
Figure 42 - SNMPv3 User Configuration
The following table describes the fields to configure SNMPv3 users.
Field
Description
Name
Enter the user name to identify the SNMPv3 user.
User names can contain up to 32 alphanumeric characters.
Group
Map the user to a group. The default groups are RWAuth, RWPriv, and RO. You can define
additional groups on the SNMPv3 Groups page.
Authentication Type Select the type of authentication to use on SNMP requests from the user:
•) MD5 — Require MD5 authentication on SNMPv3 requests from the user.
•) None — SNMPv3 requests from this user require no authentication.
Authentication Key
If you specify MD5 as the authentication type, enter a password to enable the SNMP agent
to authenticate requests sent by the user.
The passphrase must be between 8 and 32 characters in length.
Encryption Type
Select the type of privacy to use on SNMP requests from the user:
•) DES — Use DES encryption on SNMPv3 requests from the user.
•) None — SNMPv3 requests from this user require no privacy.
Encryption Key
If you specify DES as the privacy type, enter a key to use to encrypt the SNMP requests.
The passphrase must be between 8 and 32 characters in length.
SNMPv3 Users
This field shows the users that you have defined on the AP. To remove a user, select the
user and click Remove.
Table 45 - SNMPv3 Users
March 2012
Unified Access Point Administrator’s Guide
Page 77
Unified Access Point Administrator’s Guide
Section 6 - Configuring SNMPv3
Note: After you configure the SNMPv3 Users settings, you must click Apply to apply the changes
and to save the settings.
Configuring SNMPv3 Targets
SNMPv3 Targets send “inform” messages to the SNMP manager. Each target is identified by a target name and
associated with target IP address, UDP port, and SNMP user name.
Figure 43 - SNMPv3 Targets Configuration
Field
Description
IPv4/IPv6 Address
Enter the IP address of the remote SNMP manager to receive the target.
Port
Enter the UDP port to use for sending SNMP targets.
Users
Select the name of the SNMP user to associate with the target. To configure SNMP users,
see “Configuring SNMPv3 Users” on page 77.
SNMPv3 Targets
This field shows the SNMPv3 Targets on the UAP. To remove a target, select it and click
Remove.
Table 46 - SNMPv3 Targets
Note: After you configure the SNMPv3 Target settings, you must click Apply to apply the changes
and to save the settings.
March 2012
Unified Access Point Administrator’s Guide
Page 78
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Section 7 - Maintaining the Access Point
This section describes how to maintain the UAP.
From the UAP Administrator UI, you can perform the following maintenance tasks:
•) “Saving the Current Configuration to a Backup File” on page 79
•) “Restoring the Configuration from a Previously Saved File” on page 80
•) “Rebooting the Access Point” on page 81
•) “Performing AP Maintenance” on page 81
•) “Resetting the Factory Default Configuration” on page 81
•) “Upgrading the Firmware” on page 81
•) “Packet Capture Configuration and Settings” on page 83
Saving the Current Configuration to a Backup File
The AP configuration file is in XML format and contains all of the information about the AP settings. You can download
the configuration file to a management station to manually edit the content or to save as a back-up copy.
You can use HTTP or TFTP to transfer files to and from the UAP. After you download a configuration file to the
management station, you can manually edit the file, which is in XML format. Then, you can upload the edited
configuration file to apply those configuration settings to the AP.
Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using TFTP:
1.) Select TFTP for Download Method.
Figure 44 - Manage this Access Point’s Configuration - Save (TFTP)
2.) Enter a name (1 to 63 characters) for the backup file in the Configuration File field, including the .xml file name
extension and the path to the directory where you want to save the file.
3.) Enter the Server IP address of the TFTP server.
4.) Click Download to save a copy of the file to the TFTP server.
Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using HTTP:
1.) Select HTTP for Download Method.
Figure 45 - Manage this Access Point’s Configuration - Save (HTTP)
2.) Click the Download button.
A dialog box displays verifying the download.
March 2012
Unified Access Point Administrator’s Guide
Page 79
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Figure 46 - Confirmation Prompt
3.) To proceed with the download, select OK.
A dialog box opens allowing you to view or save the file.
4.) Select the Save File option and select OK.
5.) Use the file browser to navigate to the directory where you want to save the file, and click OK to save the file.
You can keep the default file name (config.xml) or rename the backup file, but be sure to save the file with an
.xml extension.
Restoring the Configuration from a Previously Saved File
You can use HTTP or TFTP to transfer files to and from the UAP. After you download a configuration file to the
management station, you can manually edit the file, which is in XML format. Then, you can upload the edited
configuration file to apply those configuration settings to the AP.
Use the following procedures to restore the configuration on an AP to previously saved settings by using TFTP:
1.) Select TFTP for Upload Method.
Figure 47 - Manage this Access Point’s Configuration - Restore (TFTP)
2.) Enter a name (1 to 63 characters) for the backup file in the Filename field, including the .xml file name extension
and the path to the directory that contains the configuration file to upload.
3.) Enter the IP address of the TFTP server in the Server IP field.
4.) Click the Restore button.
The AP reboots. A reboot confirmation dialog and follow-on rebooting status message displays. Please wait for
the reboot process to complete, which might take several minutes.
The Administration Web UI is not accessible until the AP has rebooted.
Use the following steps to save a copy of the current settings on an AP to a backup configuration file by using HTTP:
1.) Select HTTP for Upload Method.
Figure 48 - Manage this Access Point’s Configuration - Restore (HTTP)
March 2012
Unified Access Point Administrator’s Guide
Page 80
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
2.) Use the Browse button to select the file to restore.
3.) Click the Restore button.
A File Upload or Choose File dialog box displays.
4.) Navigate to the directory that contains the file, then select the file to upload and click Open.
(Only those files created with the Backup function and saved as .xml backup configuration files are valid to use
with Restore; for example, ap_config.xml.)
5.) Click the Restore button.
A dialog box opens verifying the restore.
6.) Click OK to proceed.
The AP reboots. A reboot confirmation dialog and follow-on rebooting status message displays. Please wait for
the reboot process to complete, which might take several minutes.
The Administration Web UI is not accessible until the AP has rebooted.
Performing AP Maintenance
From the Maintenance page, you can reset the AP to its factory default settings or reboot the AP.
Figure 49 - Performing AP Maintenance
Resetting the Factory Default Configuration
If you are experiencing problems with the UAP and have tried all other troubleshooting measures, click Reset. This
restores factory defaults and clears all settings, including settings such as a new password or wireless settings. You
can also use the reset button on the back panel to reset the system to the default configuration.
Rebooting the Access Point
For maintenance purposes or as a troubleshooting measure, you can reboot the UAP. To reboot the AP, click the
Reboot button on the Configuration page.
Upgrading the Firmware
As new versions of the UAP firmware become available, you can upgrade the firmware on your devices to take
advantage of new features and enhancements. The AP uses a TFTP client for firmware upgrades. You can also use
HTTP to perform firmware upgrades.
After you upload new firmware and the system reboots, the newly added firmware becomes the primary image. If the
upgrade fails, the original firmware remains as the primary image.
Note: When you upgrade the firmware, the access point retains the existing configuration
information.
Use the following steps to upgrade the firmware on an access point by using TFTP:
1.) Select TFTP for Upload Method.
March 2012
Unified Access Point Administrator’s Guide
Page 81
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Figure 50 - Manage Firmware (TFTP)
2.) Enter a name (1 to 63 characters) for the image file in the Image Filename field, including the path to the
directory that contains the image to upload.
For example, to upload the ap_upgrade.tar image located in the /share/builds/ap directory, enter /
share/builds/ap/ap_upgrade.tar in the Image Filename field.
The firmware upgrade file supplied must be a tar file. Do not attempt to use bin files or files of other formats for
the upgrade; these types of files will not work.
3.) Enter the Server IP address of the TFTP server.
4.) Click Upgrade.
Upon clicking Upgrade for the firmware upgrade, a popup confirmation window is displayed that describes the
upgrade process.
5.) Click OK to confirm the upgrade and start the process.
Note: The firmware upgrade process begins once you click Upgrade and then OK in the pop-up
confirmation window.
The upgrade process may take several minutes during which time the access point will be unavailable. Do not
power down the access point while the upgrade is in process. When the upgrade is complete, the access point
restarts. The AP resumes normal operation with the same configuration settings it had before the upgrade.
6.) To verify that the firmware upgrade completed successfully, check the firmware version shown on the Upgrade
page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is
indicated.
Use the following steps to upgrade the firmware on an access point by using HTTP:
1.) Select HTTP for Upload Method.
Figure 51 - Manage Firmware (HTTP)
2.) If you know the path to the new firmware image file, enter it in the Image Filename field. Otherwise, click the
Browse button and locate the firmware image file.
The firmware upgrade file supplied must be a tar file. Do not attempt to use bin files or files of other formats for
the upgrade; these types of files will not work.
3.) Click Upgrade to apply the new firmware image.
Upon clicking Upgrade for the firmware upgrade, a popup confirmation window is displayed that describes the
upgrade process.
4.) Click OK to confirm the upgrade and start the process.
Note: The firmware upgrade process begins once you click Upgrade and then OK in the popup
confirmation window.
The upgrade process may take several minutes during which time the access point will be unavailable. Do not
power down the access point while the upgrade is in process. When the upgrade is complete, the access point
restarts. The AP resumes normal operation with the same configuration settings it had before the upgrade.
March 2012
Unified Access Point Administrator’s Guide
Page 82
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
5.) To verify that the firmware upgrade completed successfully, check the firmware version shown on the Upgrade
page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is
indicated.
Packet Capture Configuration and Settings
Wireless packet capture operates in two modes:
•) Capture file mode.
•) Remote capture mode.
For capture file mode, captured packets are stored in a file on the Access Point. The AP can transfer the file to a TFTP
server. The file is formatted in pcap format and can be examined using tools such as Wireshark and OmniPeek.
For remote capture mode, the captured packets are redirected in real time to an external PC running the Wireshark®
tool.
The AP can capture the following types of packets:
•) 802.11 packets received and transmitted on radio interfaces. Packets captured on radio interfaces include the
802.11 header.
•) 802.3 packets received and transmitted on the Ethernet interface.
•) 802.3 packets received and transmitted on the internal logical interfaces such as VAPs and WDS interfaces.
From the Packet Capture Configuration and Settings page, you can:
•) View the current packet capture status.
•) Configure packet capture parameters.
•) Configure packet file capture.
•) Configure a remote capture port.
•) Download a packet capture file.
Figure 52 - Packet Capture Configuration & Settings
Packet Capture Status
Packet Capture Status allows you to view the status of packet capture on the AP.
March 2012
Unified Access Point Administrator’s Guide
Page 83
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Figure 53 - Packet Capture Status
The following table describes information the packet capture status fields display.
Field
Description
Current Capture
Status
Shows whether packet capture is running or stopped.
Packet Capture
Time
Shows elapsed capture time.
Packet Capture File
Size
Shows the current capture file size.
Table 47 - Packet Capture Status
Packet Capture Parameter Configuration
Packet Capture Configuration allows you to configure parameters that affect how packet capture functions on the radio
interfaces.
Figure 54 - Packet Capture Configuration
The following table describes the fields to configure the packet capture.
Field
Description
Capture Beacons
Enable to capture the 802.11 beacons detected or transmitted by the radio.
Promiscuous
Capture
Enable to place the radio in promiscuous mode when the capture is active.
In promiscuous mode the radio receives all traffic on the channel, including traffic that is not
destined to this AP. While the radio is operating in promiscuous mode, it continues serving
associated clients. Packets not destined to the AP are not forwarded.
As soon as the capture is completed, the radio reverts to non-promiscuous mode operation.
Client Filter Enable
Enable to use the WLAN client filter to capture only frames that are transmitted to, or
received from a WLAN client with a specified MAC address.
Client Filter MAC
Address
Specify a MAC address for WLAN client filtering.
Note: The MAC filter is active only when capture is performed on an 802.11 interface.
Table 48 - Packet Capture Configuration
Note: Changes to packet capture configuration parameters take affect after packet capture is
restarted. Modifying the parameters while the packet capture is running doesn’t affect the current
packet capture session. In order to begin using new parameter values, an existing packet capture
session must be stopped and re-started.
Packet File Capture
In Packet File Capture mode the AP stores captured packets in the RAM file system.
March 2012
Unified Access Point Administrator’s Guide
Page 84
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Upon activation, the packet capture proceeds until one of the following occurs:
•) The capture time reaches configured duration.
•) The capture file reaches its maximum size.
•) The administrator stops the capture.
During the capture, you can monitor the capture status, elapsed capture time, and the current capture file size. This
information can be updated, while the capture is in progress, by clicking Refresh.
Figure 55 - Packet File Capture
The following table describes the fields to configure the packet capture status.
Field
Description
Capture Interface
Select an AP Capture Interface name from the drop-down menu. AP capture interface
names are eligible for packet capture are:
•) brtrunk - Linux bridge interface in the AP
•) eth0 - 802.3 traffic on the Ethernet port.
•) wlan0 - VAP0 traffic on radio 1.
•) wlan1 - VAP0 traffic on radio 2.
•) radio1 - 802.11 traffic on radio 1.
•) radio2 - 802.11 traffic on radio 2.
Capture Duration
Specify the time duration in seconds for the capture (range 10 to 3600).
Max Capture File
Size
Specify the maximum allowed size for the capture file in KB (range 64 to 4096).
Table 49 - Packet File Capture
Remote Packet Capture
Remote Packet Capture allows you to specify a remote port as the destination for packet captures. This feature works
in conjunction with the Wireshark network analyzer tool for Windows. A packet capture server runs on the AP and
sends the captured packets via a TCP connection to the Wireshark tool.
A Windows PC running the Wireshark tool allows you to display, log, and analyze captured traffic.
When the remote capture mode is in use, the AP doesn’t store any captured data locally in its file system.
Your can trace up to five interfaces on the AP at the same time. However, you must start a separate Wireshark session
for each interface. You can configure the IP port number used for connecting Wireshark to the AP. The default port
number is 2002. The system uses 5 consecutive port numbers starting with the configured port for the packet capture
sessions.
If a firewall is installed between the Wireshark PC and the AP, these ports must be allowed to pass through the
firewall. The firewall must also be configured to allow the Wireshark PC to initiate TCP connection to the AP.
To configure Wireshark to use the AP as the source for captured packets, you must specify the remote interface in the
“Capture Options” menu. For example to capture packets on an AP with IP address 192.168.1.10 on radio 1 using the
default IP port, specify the following interface:
rpcap://192.168.1.10/radio1
March 2012
Unified Access Point Administrator’s Guide
Page 85
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
To capture packets on the Ethernet interface of the AP and VAP0 on radio 1 using IP port 58000, start two Wireshark
sessions and specify the following interfaces:
rpcap://192.168.1.10:58000/eth0
rpcap://192.168.1.10:58000/wlan0
When you are capturing traffic on the radio interface, you can disable beacon capture, but other 802.11 control frames
are still sent to Wireshark. You can set up a display filter to show only:
•) Data frames in the trace.
•) Traffic on specific BSSIDs.
•) Traffic between two clients.
Some examples of useful display filters are:
•) Exclude beacons and ACK/RTS/CTS frames:
!(wlan.fc.type_subtype == 8 || wlan.fc.type == 1)
•) Data frames only:
wlan.fc.type == 2
•) Traffic on a specific BSSID:
wlan.bssid == 00:02:bc:00:17:d0
•) All traffic to and from a specific client:
wlan.addr == 00:00:e8:4e:5f:8e
In remote capture mode, traffic is sent to the PC running Wireshark via one of the network interfaces. Depending on
where the Wireshark tool is located the traffic can be sent on an Ethernet interface or one of the radios. In order to
avoid a traffic flood caused by tracing the trace packets, the AP automatically installs a capture filter to filter out all
packets destined to the Wireshark application. For example if the Wireshark IP port is configured to be 58000 then the
following capture filter is automatically installed on the AP:
not portrange 58000-58004.
Enabling the packet capture feature impacts performance of the AP and can create a security issue (unauthorized
clients may be able to connect to the AP and trace user data). The AP performance is negatively impacted even if
there is no active Wireshark session with the AP. The performance is negatively impacted to a greater extent when
packet capture is in progress.
Due to performance and security issues, the packet capture mode is not saved in NVRAM on the AP; if the AP resets,
the capture mode is disabled and the you must re-enable it in order to resume capturing traffic. Packet capture
parameters (other than mode) are saved in NVRAM.
In order to minimize performance impact on the AP while traffic capture is in progress, you should install capture filters
to limit which traffic is sent to the Wireshark tool. When capturing 802.11 traffic, large portion of the captured frames
tend to be beacons (typically sent every 100ms by all Access Points). Although Wireshark supports a display filter for
beacon frames, it does not support a capture filter to prevent the AP from forwarding captured beacon packets to the
Wireshark tool. In order to reduce performance impact of capturing the 802.11 beacons, you can disable the capture
beacons mode.
The remote packet capture facility is a standard feature of the Wireshark tool for Windows.
Note: Remote packet capture is not standard on the Linux version of Wireshark; the Linux version
doesn’t work with the AP.
Wireshark is an open source tool and is available for free; it can be downloaded from http://www.wireshark.org.
Figure 56 - Remote Packet Capture
The following table describes the fields to configure the packet capture status.
March 2012
Unified Access Point Administrator’s Guide
Page 86
Unified Access Point Administrator’s Guide
Section 7 - Maintaining the Access Point
Field
Description
Remote Capture
Port
Specify the remote port to use as the destination for packet captures. (range 1 to 65530).
Table 50 - Remote Packet Capture
Packet Capture File Download
Packet Capture File Download allows you to download the capture file by TFTP to a configured TFTP server or by
HTTP(S) to a PC. The captured packets are stored in file /tmp/apcapture.pcap on the AP. A capture is automatically
stopped when the capture file download command is triggered.
Because the capture file is located in the RAM file system, it disappears if the AP is reset.
Figure 57 - Packet Capture File Download
The following table describes the fields to configure the packet capture status.
Field
Description
Use TFTP to
download the
capture file
Select or clear this option to determine whether to use TFTP or HTTP(S) to download the
capture file:
•) To download the file by using TFTP, select this option and complete the additional
fields.
•) To download the file by using HTTP or HTTPS, clear this option and click Download to
browse to the location where the file is to be saved.
TFTP Server
Filename
When using TFTP to download the file, specify a name for the packet capture file, including
the .pcap file name extension and the path to the directory where you want to save the file.
Server IP
When using TFTP to download the file, specify the IP address of the TFTP server.
Table 51 - Packet Capture File Download
March 2012
Unified Access Point Administrator’s Guide
Page 87
Unified Access Point Administrator’s Guide
Section 8 - Configuring Client Quality of Service (QoS)
Section 8 - Configuring Client Quality of Service (QoS)
This section describes how to configure QoS settings that affect traffic from the wireless clients to the AP. By using the
UAP Client QoS features, you can limit bandwidth and apply ACLs and DiffServ policies to the wireless interface. If a
VAP uses WPA Enterprise security to authenticate clients, you can configure the RADIUS server to provide per-client
QoS information.
This section describes the following features:
•) “Configuring VAP QoS Parameters” on page 88
•) “Managing Client QoS ACLs” on page 89
•) “Creating a DiffServ Class Map” on page 95
•) “Creating a DiffServ Policy Map” on page 100
•) “Configuring RADIUS-Assigned Client QoS Parameters” on page 102
Configuring VAP QoS Parameters
The client QoS features on the UAP provide additional control over certain QoS aspects of wireless clients that
connect to the network, such as the amount of bandwidth an individual client is allowed to send and receive. To control
general categories of traffic, such as HTTP traffic or traffic from a specific subnet, you can configure ACLs and assign
them to one or more VAPs.
In addition to controlling general traffic categories, Client QoS allows you to configure per-client conditioning of various
micro-flows through Differentiated Services (DiffServ). DiffServ policies are a useful tool for establishing general microflow definition and treatment characteristics that can be applied to each wireless client, both inbound and outbound,
when it is authenticated on the network.
From the VAP QoS Parameters page, you can enable the Client QoS feature, specify client bandwidth limits, and
select the ACLs and DiffServ policies to use as default values for clients associated with the VAP when the client does
not have their own attributes defined by a RADIUS server.
To configure the Client QoS administrative mode and to configure the QoS settings for a VAP, click the VAP QoS
Parameters tab.
Figure 58 - Configure Client QoS VAP Settings
Field
Description
Client QoS Global
Admin Mode
Enable or disable Client QoS operation on the AP.
Changing this setting will not affect the WMM settings you configure on the QoS page.
Radio
For dual-radio APs, select Radio 1 or Radio 2 to specify which radio to configure.
VAP
Specify the VAP that will have the Client QoS settings that you configure.
The QoS settings you configure for the selected VAP will not affect clients that access the
network through other VAPs.
March 2012
Unified Access Point Administrator’s Guide
Page 88
Unified Access Point Administrator’s Guide
Section 8 - Configuring Client Quality of Service (QoS)
Field
Description
Client QoS Mode
Enable or disable QoS operation on the VAP selected in the VAP menu.
QoS must be enabled globally (from the Client QoS Global Admin Mode field) and on the
VAP (QoS Mode field) for the Client QoS settings to be applied to wireless clients.
Bandwidth Limit
Down
Enter the maximum allowed transmission rate from the AP to the wireless client in bits per
second. The valid range is 0 – 429496000 bits/sec.
The value you enter must be a multiple of 8000 bits/sec, in other words, the value must be
n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not
a multiple of 8000 bits/sec, the configuration will be rejected. A value of 0 means that the
bandwidth maximum limit is not enforced in this direction.
Bandwidth Limit Up
Enter the maximum allowed client transmission rate to the AP in bits per second. The valid
range is 0 – 4294967295 bps.
The value you enter must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set
the limit to a value that is not a multiple of 8000 bits/sec, the configuration will be rejected. A
value of 0 means that the bandwidth maximum limit is not enforced in this direction.
ACL Type Down
Select the type of ACL to apply to traffic in the outbound (down) direction, which can be one
of the following:
•) IPv4: The ACL examines IPv4 packets for matches to ACL rules
•) IPv6: The ACL examines IPv6 packets for matches to ACL rules
•) MAC: The ACL examines layer 2 frames for matches to ACL rules
ACL Name Down
Select the name of the ACL applied to traffic in the outbound (down) direction.
After switching the packet or frame to the outbound interface, the ACL’s rules are checked
for a match. The packet or frame is transmitted if it is permitted, and discarded if it is denied.
ACL Type Up
Select the type of ACL to apply to traffic in the inbound (up) direction, which can be one of
the following:
•) IPv4: The ACL examines IPv4 packets for matches to ACL rules
•) IPv6: The ACL examines IPv6 packets for matches to ACL rules
•) MAC: The ACL examines layer 2 frames for matches to ACL rules
ACL Name Up
Select the name of the ACL applied to traffic entering the AP in the inbound (up) direction.
When a packet or frame is received by the AP, the ACL’s rules are checked for a match. The
packet or frame is processed if it is permitted, and discarded if it is denied.
DiffServ Policy
Down
Select the name of the DiffServ policy applied to traffic from the AP in the outbound (down)
direction.
DiffServ Policy Up
Select the name of the DiffServ policy applied to traffic sent to the AP in the inbound (up)
direction.
Table 52 - VAP QoS Parameters
Managing Client QoS ACLs
ACLs are a collection of permit and deny conditions, called rules, that provide security by blocking unauthorized
users and allowing authorized users to access specific resources. ACLs can block any unwarranted attempts to reach
network resources.
The UAP supports up to 50 IPv4, IPv6, and MAC ACLs.
IPv4 and IPv6 ACLs
IP ACLs classify traffic for Layers 3 and 4.
Each ACL is a set of up to 10 rules applied to traffic sent from a wireless client or to be received by a wireless client.
Each rule specifies whether the contents of a given field should be used to permit or deny access to the network.
Rules can be based on various criteria and may apply to one ore more fields within a packet, such as the source or
destination IP address, the source or destination L4 port, or the protocol carried in the packet.
March 2012
Unified Access Point Administrator’s Guide
Page 89
Unified Access Point Administrator’s Guide
Section 8 - Configuring Client Quality of Service (QoS)
MAC ACLs
MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect fields of a frame such as the source or
destination MAC address, the VLAN ID, or the Class of Service 802.1p priority. When a frame enters or exits the AP
port (depending on whether the ACL is applied in the up or down direction), the AP inspects the frame and checks the
ACL rules against the content of the frame. If any of the rules match the content, a permit or deny action is taken on
the frame.
ACL Configuration Process
Configure ACLs and rules on the Client QoS ACL page (steps 1–5), and then apply the rules to a specified VAP on
the AP QoS Parameters page (step 6).
Use the following general steps to configure ACLs:
1.) Specify a name for the ACL.
2.) Select the type of ACL to add.
3.) Add the ACL.
4.) Add new rules to the ACL.
5.) Configure the match criteria for the rules.
6.) Apply the ACL to one or more VAPs.
For an example of how to configure an ACL, see “ACL Configuration Process” on page 90.
To configure an ACL, click the Client QoS ACL tab.
The fields to configure ACL rules appear only after you have created an ACL. The following image shows the
configuration of a new rule for the IPv4 ACL named acl1. The rule prevents HTTP traffic from all clients in the
192.168.20.0 network from being forwarded.
Figure 59 - Configure Client QoS ACL Settings
The following table describes the fields available on the Client QoS ACL page.
Field
Description
ACL Configuration
ACL Name
March 2012
Enter a name to identify the ACL. The name can contain from 1 – 31 alphanumeric
characters. Spaces are not allowed.
Unified Access Point Administrator’s Guide
Page 90

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.7
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract
XMP Toolkit                     : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39
Modify Date                     : 2012:07:11 13:53:56+08:00
Create Date                     : 2012:07:11 13:52:47+08:00
Metadata Date                   : 2012:07:11 13:53:56+08:00
Creator Tool                    : Adobe InDesign CS5.5 (7.5.2)
Format                          : application/pdf
Document ID                     : uuid:4d59dd96-b6e5-4aec-bc97-77434474dd9a
Instance ID                     : uuid:f7f1bb7b-ceb9-42e9-963b-56202e24eaad
Producer                        : Adobe PDF Library 9.9
Has XFA                         : No
Page Count                      : 30
Creator                         : Adobe InDesign CS5.5 (7.5.2)
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2WL2600APA1

Navigation menu