D Link WL6600APA1 Unified Concurrent Dual-band Access Point User Manual

D Link Corporation Unified Concurrent Dual-band Access Point

Contents

User Manual

©Copyright 2011. All rights reserved.Unified Access Point Administrator's GuideProduct Model:  DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page2UnifiedAccessPointAdministrator’sGuide
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page3UnifiedAccessPointAdministrator’sGuideTableofContentsSection1:AboutThisDocument ..................................................................................... 12DocumentOrganization ............................................................................................................................... 12AdditionalDocumentation...........................................................................................................................12DocumentConventions................................................................................................................................13OnlineHelp,SupportedBrowsers,andLimitations ....................................................................................14Section2:GettingStarted ............................................................................................... 15Administrator’sComputerRequirements ...................................................................................................16WirelessClientRequirements......................................................................................................................17DynamicandStaticIPAddressingontheAP...............................................................................................17RecoveringanIPAddress.......................................................................................................................18DiscoveringaDynamicallyAssignedIPAddress ....................................................................................18InstallingtheUAP.........................................................................................................................................19BasicSettings................................................................................................................................................22ConnectingtotheAPWebInterfacebyUsingtheIPv6Address...........................................................24UsingtheCLItoViewtheIPAddress...........................................................................................................24ConfiguringtheEthernetSettings................................................................................................................25UsingtheCLItoConfigureEthernetSettings.........................................................................................26ConfiguringIEEE802.1XAuthentication......................................................................................................27UsingtheCLItoConfigure802.1XAuthenticationInformation ............................................................27VerifyingtheInstallation..............................................................................................................................28ConfiguringSecurityontheWirelessAccessPoint .....................................................................................29Section3:ViewingAccessPointStatus ............................................................................ 30ViewingInterfaceStatus ..............................................................................................................................31WiredSettings(InternalInterface) ........................................................................................................31WirelessSettings....................................................................................................................................31ViewingEvents .............................................................................................................................................32ConfiguringPersistentLoggingOptions.................................................................................................32ConfiguringtheLogRelayHostforKernelMessages ............................................................................34EnablingorDisablingtheLogRelayHostontheEventsPage ...............................................................34ViewingTransmitandReceiveStatistics .....................................................................................................36ViewingAssociatedWirelessClientInformation ........................................................................................38ViewingTSPECClientAssociations ..............................................................................................................39LinkIntegrityMonitoring .......................................................................................................................41ViewingRogueAPDetection .......................................................................................................................41
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page4UnifiedAccessPointAdministrator’sGuideSavingandImportingtheKnownAPList ...............................................................................................44ViewingManagedAPDHCPInformation.....................................................................................................45ViewingTSPECStatusandStatisticsInformation........................................................................................45ViewingTSPECAPStatisticsInformation.....................................................................................................47ViewingRadioStatisticsInformation ..........................................................................................................48ViewingEmailAlertOperationalStatus ......................................................................................................50Section4:ManagingtheAccessPoint.............................................................................. 51EthernetSettings ..........................................................................................................................................51WirelessSettings ..........................................................................................................................................54Usingthe802.11hWirelessMode.........................................................................................................57EnablingAeroScout™EngineSupport ...................................................................................................57ModifyingRadioSettings .............................................................................................................................58ConfiguringRadioandVAPScheduler .........................................................................................................65SchedulerAssociationSettings ....................................................................................................................68VirtualAccessPointSettings........................................................................................................................70None(Plain‐text)....................................................................................................................................74StaticWEP..............................................................................................................................................74StaticWEPRules .............................................................................................................................76IEEE802.1X ............................................................................................................................................76WPAPersonal ........................................................................................................................................78WPAEnterprise......................................................................................................................................79ConfiguringtheWirelessDistributionSystem(WDS) .................................................................................81WEPonWDSLinks .................................................................................................................................84WPA/PSKonWDSLinks .........................................................................................................................84ControllingAccessbyMACAuthentication .................................................................................................85ConfiguringaMACFilterandStationListontheAP..............................................................................85ConfiguringMACAuthenticationontheRADIUSServer .......................................................................87ConfiguringLoadBalancing..........................................................................................................................88ManagedAccessPointOverview.................................................................................................................89TransitioningBetweenModes...............................................................................................................89ConfiguringManagedAccessPointSettings..........................................................................................90Configuring802.1XAuthentication..............................................................................................................92CreatingaManagementAccessControlList ...............................................................................................94Section5:ConfiguringAccessPointServices.................................................................... 95ConfiguringSNMPontheAccessPoint .......................................................................................................95WebServerSettings .....................................................................................................................................99
D‐Link UnifiedAccessPointAdministrator’sGuide November2011 Page5UnifiedAccessPointAdministrator’sGuideSettingtheSSHStatus ................................................................................................................................101SettingtheTelnetStatus ............................................................................................................................101ConfiguringQualityofService....................................................................................................................102ConfiguringEmailAlert ..............................................................................................................................106EnablingtheTimeSettings(NTP)...............................................................................................................109Section6:ConfiguringSNMPv3 ..................................................................................... 111ConfiguringSNMPv3Views........................................................................................................................111ConfiguringSNMPv3Groups......................................................................................................................113ConfiguringSNMPv3Users ........................................................................................................................115ConfiguringSNMPv3Targets .....................................................................................................................116Section7:MaintainingtheAccessPoint ........................................................................ 117SavingtheCurrentConfigurationtoaBackupFile....................................................................................117RestoringtheConfigurationfromaPreviouslySavedFile........................................................................118PerformingAPMaintenance......................................................................................................................120ResettingtheFactoryDefaultConfiguration .......................................................................................120RebootingtheAccessPoint .................................................................................................................120UpgradingtheFirmware ............................................................................................................................120PacketCaptureConfigurationandSettings...............................................................................................122PacketCaptureStatus..........................................................................................................................124PacketCaptureParameterConfiguration............................................................................................124PacketFileCapture ..............................................................................................................................125RemotePacketCapture .......................................................................................................................125PacketCaptureFileDownload.............................................................................................................127Section8:ConfiguringClientQualityofService ............................................................. 128ConfiguringVAPQoSParameters ..............................................................................................................128ManagingClientQoSACLs .........................................................................................................................131IPv4andIPv6ACLs ...............................................................................................................................131MACACLs.............................................................................................................................................131ACLConfigurationProcess ...................................................................................................................131CreatingaDiffServClassMap ....................................................................................................................138DefiningDiffServ ..................................................................................................................................138CreatingaDiffServPolicyMap...................................................................................................................144ClientQoSStatus ........................................................................................................................................146ConfiguringRADIUS‐AssignedClientQoSParameters..............................................................................147Section9:ClusteringMultipleAPs ................................................................................. 149ManagingAccessPointsintheCluster ......................................................................................................149
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page6UnifiedAccessPointAdministrator’sGuideClusteringSingleandDualRadioAPs ..................................................................................................149ViewingandConfiguringClusterMembers .........................................................................................149RemovinganAccessPointfromtheCluster ........................................................................................151AddinganAccessPointtoaCluster.....................................................................................................152NavigatingtoConfigurationInformationforaSpecificAP..................................................................152NavigatingtoanAPbyUsingitsIPAddressinaURL...........................................................................152ManagingClusterSessions.........................................................................................................................153SortingSessionInformation.................................................................................................................154ConfiguringandViewingChannelManagementSettings.........................................................................154Stopping/StartingAutomaticChannelAssignment .............................................................................155ViewingCurrentChannelAssignmentsandSettingLocks ...................................................................156ViewingtheLastProposedSetofChanges..........................................................................................156ConfiguringAdvancedSettings ............................................................................................................157ViewingWirelessNeighborhoodInformation...........................................................................................158ViewingDetailsforaClusterMember .................................................................................................160AppendixA:DefaultAPSettings.................................................................................... 161AppendixB:ConfigurationExamples............................................................................. 164ConfiguringaVAP.......................................................................................................................................164VAPConfigurationfromtheWebInterface.........................................................................................164VAPConfigurationfromtheCLI...........................................................................................................165VAPConfigurationUsingSNMP ...........................................................................................................166ConfiguringRadioSettings .........................................................................................................................166RadioConfigurationfromtheWebInterface ......................................................................................166RadioConfigurationfromtheCLI ........................................................................................................168RadioConfigurationUsingSNMP ........................................................................................................168ConfiguringtheWirelessDistributionSystem...........................................................................................169WDSConfigurationfromtheWebInterface .......................................................................................169WDSConfigurationfromtheCLI..........................................................................................................170WDSConfigurationUsingSNMP..........................................................................................................171ClusteringAccessPoints.............................................................................................................................172ClusteringAPsbyUsingtheWebInterface .........................................................................................172ClusteringAPsbyUsingtheCLI............................................................................................................173ClusteringAPsbyUsingSNMP.............................................................................................................174ConfiguringClientQoS ............................................................................................................................... 174ConfiguringQoSbyUsingtheWebInterface ......................................................................................174ACLConfiguration.........................................................................................................................174
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page7UnifiedAccessPointAdministrator’sGuideDiffServConfiguration .................................................................................................................. 176ConfiguringQoSbyUsingtheCLI ........................................................................................................179ACLConfiguration.........................................................................................................................179DiffServConfiguration .................................................................................................................. 179ACLConfiguration.........................................................................................................................180DiffServConfiguration .................................................................................................................. 182
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page8UnifiedAccessPointAdministrator’sGuideListofFiguresFigure1:AdministratorUIOnlineHelp ............................................................................................................14Figure2:ViewingInterfaceStatus....................................................................................................................31Figure3:ViewingEvents ..................................................................................................................................32Figure4:PersistentLoggingOptions................................................................................................................33Figure5:LogRelayHost ...................................................................................................................................34Figure6:ViewingTrafficStatistics....................................................................................................................36Figure7:ViewingClientAssociationInformation ............................................................................................38Figure8:ViewingTSPECClientAssociations ....................................................................................................39Figure9:ViewingRogueandKnownAccessPoints .........................................................................................41Figure10:ViewingTSPECStatusandStatistics ................................................................................................45Figure11:RadioStatistics ................................................................................................................................48Figure12:EmailAlertOperationalStatus ........................................................................................................50Figure13:EthernetSettings.............................................................................................................................52Figure14:WirelessInterfaceConfiguration.....................................................................................................54Figure15:ConfiguringRadioSettings ..............................................................................................................58Figure16:ConfiguringRadioSettings(Continued) ..........................................................................................59Figure17:SchedulerConfiguration.................................................................................................................. 65Figure18:ModifyRuleConfiguration ..............................................................................................................67Figure19:SchedulerAssociation .....................................................................................................................68Figure20:SettingUpVirtualAccessPoints......................................................................................................71Figure21:ConfiguringWDSSettings................................................................................................................82Figure22:ConfiguringMACAuthentication ....................................................................................................86Figure23:ConfiguringLoadBalancing .............................................................................................................88Figure24:ConfiguringManagedAccessPointSettings ...................................................................................90Figure25:IEEE802.1XAuthentication.............................................................................................................92Figure26:ManagementACL ............................................................................................................................ 94Figure27:ModifyingSNMPSettings................................................................................................................96Figure28:ConfiguringWebServerSettings.....................................................................................................99Figure29:SSHStatus......................................................................................................................................101Figure30:TelnetStatus..................................................................................................................................101Figure31:ConfiguringQoSSettings...............................................................................................................103Figure32:ConfiguringEmailAlert..................................................................................................................106Figure33:SettingtheSystemTime................................................................................................................109Figure34:SNMPv3Views...............................................................................................................................111Figure35:SNMPv3Groups ............................................................................................................................113
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page9UnifiedAccessPointAdministrator’sGuideFigure36:SNMPv3Users ...............................................................................................................................115Figure37:SNMPv3Target..............................................................................................................................116Figure38:Maintenance .................................................................................................................................120Figure39:PacketCaptureConfiguration .......................................................................................................123Figure40:VAPQoSParameters ..................................................................................................................... 129Figure41:ClientQoSACL...............................................................................................................................132Figure42:ClientQoSDiffServClassMap .......................................................................................................139Figure43:ClientQoSDiffServPolicyMap......................................................................................................144Figure44:ClientQoSStatus ...........................................................................................................................146Figure45:ClusterInformationandMemberConfiguration ..........................................................................150Figure46:ClusterInformationandMemberConfiguration ..........................................................................150Figure47:SessionManagement ....................................................................................................................153Figure48:ChannelManagement ...................................................................................................................155Figure49:WirelessNeighborhood.................................................................................................................158Figure50:DetailsforaClusterMemberAP...................................................................................................160
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page10UnifiedAccessPointAdministrator’sGuideListofTablesTable1:TypographicalConventions ................................................................................................................13Table2:RequirementsfortheAdministrator’sComputer ..............................................................................16Table3:RequirementsforWirelessClients .....................................................................................................17Table4:BasicSettingsPage .............................................................................................................................22Table5:CLICommandsforEthernetSetting ...................................................................................................26Table6:CLICommandsforthe802.1XSupplicant ..........................................................................................27Table7:LoggingOptions ..................................................................................................................................33Table8:LogRelayHost ....................................................................................................................................34Table9:Transmit/Receive................................................................................................................................37Table10:AssociatedClients.............................................................................................................................38Table11:TSPECClientAssociations .................................................................................................................39Table12:RogueAPDetection..........................................................................................................................42Table13:TSPECStatusandStatistics ...............................................................................................................46Table14:TSPECAPStatistics............................................................................................................................47Table15:RadioStatisticsInformation .............................................................................................................48Table16:EmailAlertStatus .............................................................................................................................50Table17:EthernetSettingsPage .....................................................................................................................52Table18:WirelessSettings ..............................................................................................................................55Table19:RadioSettings ...................................................................................................................................60Table20:SchedulerConfiguration ...................................................................................................................66Table21:SchedulerAssociationSettings.........................................................................................................69Table22:VirtualAccessPointSettings ............................................................................................................71Table23:StaticWEP.........................................................................................................................................74Table24:IEEE802.1X .......................................................................................................................................76Table25:WPAPersonal ...................................................................................................................................78Table26:WPAEnterprise.................................................................................................................................79Table27:WDSSettings ....................................................................................................................................83Table28:WEPonWDSLinks............................................................................................................................84Table29:WPA/PSKonWDSLinks ....................................................................................................................84Table30:MACAuthentication .........................................................................................................................86Table31:RADIUSServerAttributesforMACAuthentication ..........................................................................87Table32:LoadBalancing..................................................................................................................................88Table33:ManagedAccessPoint......................................................................................................................90Table34:IEEE802.1XSupplicantAuthentication ............................................................................................92Table35:ManagementACL .............................................................................................................................94
D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page11UnifiedAccessPointAdministrator’sGuideTable36:SNMPSettings ..................................................................................................................................96Table37:WebServerSettings .........................................................................................................................99Table38:SSHSettings ....................................................................................................................................101Table39:TelnetSettings ................................................................................................................................101Table40:QoSSettings....................................................................................................................................103Table41:EmailAlertConfiguration ...............................................................................................................106Table42:NTPSettings....................................................................................................................................110Table43:SNMPv3Views ................................................................................................................................112Table44:SNMPv3Groups..............................................................................................................................114Table45:SNMPv3Users................................................................................................................................115Table46:SNMPv3Targets .............................................................................................................................116Table47:PacketCaptureStatus.....................................................................................................................124Table48:PacketCaptureConfiguration ........................................................................................................124Table49:PacketFileCapture .........................................................................................................................125Table50:RemotePacketCapture..................................................................................................................127Table51:PacketCaptureFileDownload........................................................................................................127Table52:VAPQoSParameters ......................................................................................................................129Table53:ACLConfiguration ...........................................................................................................................132Table54:DiffServClassMap ..........................................................................................................................139Table55:DiffServPolicyMap.........................................................................................................................145Table56:ClientQoSStatus ............................................................................................................................146Table57:ClientQoSRADIUSAttributes.........................................................................................................147Table58:AccessPointsintheCluster ............................................................................................................151Table59:ClusteringOptions ..........................................................................................................................151Table60:SessionManagement ..................................................................................................................... 153Table61:ChannelAssignments......................................................................................................................156Table62:LastProposedChanges...................................................................................................................156Table63:AdvancedChannelManagementSettings......................................................................................157Table64:WirelessNeighborhoodInformation..............................................................................................159Table65:ClusterMemberDetails..................................................................................................................160Table66:UAPDefaultSettings....................................................................................................................... 161
AboutThisDocumentD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page12UnifiedAccessPointAdministrator’sGuideSection1:AboutThisDocumentThisguidedescribessetup,configuration,administrationandmaintenancefortheD‐LinkDWL‐x600APUnifiedAccessPoint(UAP)onawirelessnetwork.ThethreeUAPmodelsintheDWL‐x600APfamilyincludetheDWL‐3600AP,DWL‐6600AP,andDWL‐8600AP.DocumentOrganizationTheUnifiedAccessPointAdministrator’sGuidecontainsthefollowingsections:•Section1:“AboutThisDocument,”onpage12•Section2:“GettingStarted,”onpage15•Section3:“ViewingAccessPointStatus,”onpage30•Section4:“ManagingtheAccessPoint,”onpage51•Section5:“ConfiguringAccessPointServices,”onpage95•Section6:“ConfiguringSNMPv3,”onpage111•Section7:“MaintainingtheAccessPoint,”onpage117•Section8:“ConfiguringClientQualityofService,”onpage128•Section9:“ClusteringMultipleAPs,”onpage149•AppendixA:“DefaultAPSettings,”onpage161•AppendixB:“ConfigurationExamples,”onpage164AdditionalDocumentationThefollowingdocumentationprovidesadditionalinformationaboutUnifiedAccessPointsoftware:•TheUnifiedAccessPointCLICommandReferencedescribesthecommandsavailablefromthecommand‐lineinterface(CLI)formanaging,monitoring,andconfiguringtheswitch.•TheUserManualfortheD‐LinkUnifiedWiredandWirelessSystemprovidesinformationaboutsettingupandmanagingtheUnifiedWirelessSwitch(UWS),includinginformationabouthowtousetheswitchtomanagemultipleUAPs.•ReleasenotesfortheD‐LinkUnifiedWiredandWirelessSystemdetailtheplatform‐specificfunctionalityofthesoftwarepackages,includingissuesandworkarounds.
DocumentConventionsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page13UnifiedAccessPointAdministrator’sGuideDocumentConventionsThissectiondescribestheconventionsthisdocumentuses.Thefollowingtabledescribesthetypographicalconventionsusedinthisguide.Note:Anoteprovidesmoreinformationaboutafeatureortechnologyandcross‐referencestorelatedtopics.Caution!AcautionprovidesinformationaboutcriticalaspectsofAPconfiguration,combinationsofsettings,events,orproceduresthatcanadverselyaffectnetworkconnectivity,security,andsoon.Table1:TypographicalConventionsSymbol Example DescriptionBold ClickApplytosaveyoursettings.Menutitles,pagenames,andbuttonnamesBlueText See“DocumentConventions”onpage13.Hyperlinkedtext.courierfont WLAN‐AP#shownetwork Screentext,filenames,commands,user‐typedcommand‐lineentriescourierfontitalics value Commandparameter,whichmightbeavariableorfixedvalue.[]Squarebrackets [value] Indicatesanoptionalfixedparameter.{}curlybraces {choice1|choice2} Indicatesthatyoumustselectaparameterfromthelistofchoices.|Verticalbars choice1|choice2 Separatesthemutuallyexclusivechoices.[{}]Braceswithinsquarebrackets[{choice1|choice2}] Indicateachoicewithinanoptionalelement.
OnlineHelp,SupportedBrowsers,andLimitationsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page14UnifiedAccessPointAdministrator’sGuideOnlineHelp,SupportedBrowsers,andLimitationsOnlinehelpfortheUAPAdministrationWebpagesprovidesinformationaboutallfieldsandfeaturesavailablefromtheuserinterface(UI).TheinformationintheonlinehelpisasubsetoftheinformationavailableintheUnifiedAccessPointAdministrator’sGuide.OnlinehelpinformationcorrespondstoeachpageontheUAPAdministrationUI.Forinformationaboutthesettingsonthecurrentpage,clicktheHelplinkontheupperrightsideofapage.Thefollowingfigureshowsanexampleoftheonlinehelpavailablefromthelinksontheuserinterface.Figure1:AdministratorUIOnlineHelp
GettingStartedD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page15UnifiedAccessPointAdministrator’sGuideSection2:GettingStartedTheD‐LinkDWL‐x600APunifiedaccesspoint(UAP)providescontinuous,high‐speedaccessbetweenwirelessdevicesandEthernetdevices.Itisanadvanced,standards‐basedsolutionforwirelessnetworkinginbusinessesofanysize.TheUAPenableswirelesslocalareanetwork(WLAN)deploymentwhileprovidingstate‐of‐the‐artwirelessnetworkingfeatures.TheUAPcanoperateintwomodes:StandaloneModeorManagedMode.InStandaloneMode,theUAPactsasanindividualaccesspointinthenetwork,andyoumanageitbyusingtheAdministratorWebUserInterface(UI),command‐lineinterface(CLI),orSNMP.InManagedMode,theUAPispartoftheD‐LinkUnifiedWiredandWirelessSystem,andyoumanageitbyusingtheD‐LinkUnifiedWirelessSwitch.IfanAPisinManagedMode,theAdministratorWebUI,Telnet,SSH,andSNMPservicesaredisabled.Thisdocumentdescribeshowtoperformthesetup,management,andmaintenanceoftheUAPinStandaloneMode.ForinformationaboutconfiguringtheAPinManagedModebyusingtheD‐LinkUnifiedWirelessSwitch,seetheUserManualfortheswitch.BeforeyoupoweronanewUAP,reviewthefollowingsectionstocheckrequiredhardwareandsoftwarecomponents,clientconfigurations,andcompatibilityissues.Makesureyouhaveeverythingyouneedforasuccessfullaunchandtestofyourneworextendedwirelessnetwork.TheDWL‐6600APandDWL‐8600AParedual‐radioaccesspointsandsupporttheIEEE802.11a,802.11b,802.11g,and802.11nmodes.TheDWL‐3600APisasingle‐radioaccesspointandsupportstheIEEE802.11b,IEEE802.11g,and802.11n(2.4GHz)modes.Thissectioncontainsthefollowingtopics:•“Administrator ’sComputerRequirements”•“WirelessClientRequirements”•“DynamicandStaticIPAddressingontheAP”•“InstallingtheUAP”•“BasicSettings”•“UsingtheCLItoViewtheIPAddress”•“ConfiguringtheEthernetSettings”•“ConfiguringIEEE802.1XAuthentication”•“VerifyingtheInstallation”•“ConfiguringSecurityontheWirelessAccessPoint”TomanagetheUAPbyusingtheWebinterfaceorbyusingtheCLIthroughTelnetorSSH,theAPneedsanIPaddress.IfyouuseVLANsorIEEE802.1XAuthentication(portsecurity)onyournetwork,youmightneedtoconfigureadditionalsettingsontheAPbeforeitcanconnecttothenetwork.Note:TheWLANAPisnotdesignedtofunctionasagatewaytotheInternet.ToconnectyourWLANtootherLANsortheInternet,youneedagatewaydevice.
Administrator’sComputerRequirementsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page16UnifiedAccessPointAdministrator’sGuideAdministrator’sComputerRequirementsThefollowingtabledescribestheminimumrequirementsfortheadministrator’scomputerforconfigurationandadministrationoftheUAPthroughaWeb‐baseduserinterface(UI).Table2:RequirementsfortheAdministrator’sComputerRequiredSoftwareorComponent DescriptionSerialorEthernetConnectiontotheAccessPointThecomputerusedtoconfigurethefirstaccesspointmustbeconnectedtotheaccesspointbyaserialcableoranEthernetcable.WirelessConnectiontotheNetwork Afterinitialconfigurationandlaunchofthefirstaccesspointonyournewwirelessnetwork,youcanmakesubsequentconfigurationchangesthroughtheAdministrationWebpagesusingawirelessconnectiontotheinternalnetwork.Forwirelessconnectiontotheaccesspoint,youradministrationdevicewillneedWi‐Ficapabilitysimilartothatofanywirelessclient:Portableorbuilt‐inWi‐FiclientadapterthatsupportsoneormoreoftheIEEE802.11modesinwhichyouplantoruntheaccesspoint.WirelessclientsoftwareconfiguredtoassociatewiththeUAP.WebBrowserandOperatingSystem ConfigurationandadministrationoftheUAPisprovidedthroughaWeb‐baseduserinterfacehostedontheaccesspoint.WerecommendusingoneofthefollowingsupportedWebbrowserstoaccesstheaccesspointAdministrationWebpages:• Microsoft®InternetExplorer®version7.xor8.x(withup‐to‐datepatchlevelforeithermajorversion)• Mozilla®Firefoxversion3.5orlater•Safari5andlaterversionsTheadministrationWebbrowsermusthaveJavaScript™enabledtosupporttheinteractivefeaturesoftheadministrationinterface.SecuritySettings Ensurethatsecurityisdisabledonthewirelessclientusedtoinitiallyconfiguretheaccesspoint.
WirelessClientRequirementsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page17UnifiedAccessPointAdministrator’sGuideWirelessClientRequirementsTheUAPprovideswirelessaccesstoanyclientwithaproperlyconfiguredWi‐Ficlientadapterforthe802.11modeinwhichtheaccesspointisrunning.TheUAPsupportsmultipleclientoperatingsystems.Clientscanbelaptopordesktopcomputers,personaldigitalassistants(PDAs),oranyotherhand‐held,portableorstationarydeviceequippedwithaWi‐Fiadapterandsupportingdrivers.Toconnecttotheaccesspoint,wirelessclientsneedthesoftwareandhardwaredescribedinthefollowingtable.DynamicandStaticIPAddressingontheAPWhenyoupowerontheaccesspoint,thebuilt‐inDHCPclientsearchesforaDHCPserveronthenetworkinordertoobtainanIPAddressandothernetworkinformation.IftheAPdoesnotfindaDHCPserveronthenetwork,theAPcontinuestouseitsdefaultStaticIPAddress(10.90.90.91)untilyoure‐assignitanewstaticIPaddress(andspecifyastaticIPaddressingpolicy)oruntiltheAPsuccessfullyreceivesnetworkinformationfromaDHCPserver.TochangetheconnectiontypeandassignastaticIPaddressbyusingtheCLI,see“ConfiguringtheEthernetSettings”onpage25or,byusingtheWebUI,see“EthernetSettings”onpage51.Table3:RequirementsforWirelessClientsRequiredComponent DescriptionWi‐FiClientAdapter Portableorbuilt‐inWi‐FiclientadapterthatsupportsoneormoreoftheIEEE802.11modesinwhichyouplantoruntheaccesspoint.WirelessClientSoftware Clientsoftware,suchasMicrosoftWindowsSupplicant,configuredtoassociatewiththeUAP.ClientSecuritySettings Securityshouldbedisabledontheclientusedtodoinitialconfigurationoftheaccesspoint.IftheSecuritymodeontheaccesspointissettoanythingotherthanplaintext,wirelessclientswillneedtosetaprofiletotheauthenticationmodeusedbytheaccesspointandprovideavalidusernameandpassword,certificate,orsimilaruseridentityproof.SecuritymodesareStaticWEP,IEEE802.1X,WPAwithRADIUSserver,andWPA‐PSK.Forinformationaboutconfiguringsecurityontheaccesspoint,see“VirtualAccessPointSettings”onpage70.Caution!IfyoudonothaveaDHCPserveronyourinternalnetwork,anddonotplantouseone,thefirstthingyoumustdoafterpoweringontheaccesspointischangetheconnectiontypefromDHCPtostaticIP.YoucaneitherassignanewstaticIPaddresstotheAPorcontinueusingthedefaultaddress.WerecommendassigninganewstaticIPaddresssothatifyoubringupanotherWLANAPonthesamenetwork,theIPaddressforeachAPwillbeunique.
DynamicandStaticIPAddressingontheAPD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page18UnifiedAccessPointAdministrator’sGuideRecoveringanIPAddressIfyouexperiencetroublecommunicatingwiththeaccesspoint,youcanrecoverastaticIPaddressbyresettingtheAPconfigurationtothefactorydefaults(see“ResettingtheFactoryDefaultConfiguration”onpage120),oryoucangetadynamicallyassignedaddressbyconnectingtheAPtoanetworkthathasaDHCPserver.DiscoveringaDynamicallyAssignedIPAddressIfyouhaveaccesstotheDHCPserveronyournetworkandknowtheMACaddressofyourAP,youcanviewthenewIPaddressassociatedwiththeMACaddressoftheAP.IfyoudonothaveaccesstotheDHCPserverthatassignedtheIPaddresstotheAPordonotknowtheMACaddressoftheAP,youmightneedtousetheCLItofindoutwhatthenewIPaddressis.ForinformationabouthowtodiscoveradynamicallyassignedIPaddress,see“UsingtheCLItoViewtheIPAddress”onpage24.
InstallingtheUAPD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page19UnifiedAccessPointAdministrator’sGuideInstallingtheUAPToaccesstheAdministrationWebUI,youentertheIPaddressoftheAPintoaWebbrowser.YoucanusethedefaultIPaddressoftheAP(10.90.90.91)tologontotheAPandassignastaticIPaddress,oryoucanuseaDHCPserveronyounetworktoassignnetworkinformationtotheAP.TheDHCPclientontheAPisenabledbydefault.ToinstalltheUAP,usethefollowingsteps:1. ConnecttheAPtoanadministrativePCbyusingaLANconnectionoradirect‐cableconnection.•TouseaLANconnection,connectoneendofanEthernetcabletothenetworkportontheaccesspointandtheotherendtothesamehubwhereyourPCisconnected,asshowninthefollowingfigure.Thehuborswitchyouusemustpermitbroadcastsignalsfromtheaccesspointtoreachallotherdevicesonthenetwork.•Touseadirect‐cableconnection,connectoneendofanEthernetstraight‐throughorcrossovercabletothenetworkportontheaccesspointandtheotherendofthecabletotheEthernetportonthePC,asshowninthefollowingfigure.YoucanalsouseaserialcabletoconnecttheserialportontheAPtoaserialportontheadministrativecomputer.ForinitialconfigurationwithadirectEthernetconnectionandnoDHCPserver,besuretosetyourPCtoastaticIPaddressinthesamesubnetasthedefaultIPaddressontheaccesspoint.(ThedefaultIPaddressfortheaccesspointis10.90.90.91.)Ifyouusethismethod,youwillneedtoreconfigurethecablingforsubsequentstartupanddeploymentoftheaccesspointsothattheaccesspointisnolongerconnecteddirectlytothePCbutinsteadisconnectedtotheLAN(eitherbyusingahubordirectly).
InstallingtheUAPD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page20UnifiedAccessPointAdministrator’sGuide2. Connectthepoweradaptertothepowerportonthebackoftheaccesspoint,andthenplugtheotherendofthepowercordintoapoweroutlet.3. UseyourWebbrowsertologontotheUAPAdministrationWebpages.–IftheAPdidnotacquireanIPaddressfromaDHCPserveronyournetwork,enter10.90.90.91intheaddressfieldofyourbrowser,whichisthedefaultIPaddressoftheAP.–IfyouusedaDHCPserveronyournetworktoautomaticallyconfigurenetworkinformationfortheAP,enterthenewIPaddressoftheAPintotheWebbrowser.–IfyouusedaDHCPserverandyoudonotknowthenewIPaddressoftheAP,usethefollowingprocedurestoobtaintheinformation:a. ConnectaserialcablefromtheadministrativecomputertotheAPanduseaterminalemulationprogramtoaccessthecommand‐lineinterface(CLI).b. Attheloginprompt,enteradminfortheusernameandadminforthepassword.Atthecommandprompt,entergetmanagement.–ThecommandoutputdisplaystheIPaddressoftheAP.Enterthisaddressintheaddressfieldofyourbrowser.ForamoredetailedexplanationabouthowtologontotheCLIbyusingtheconsoleport,see“UsingtheCLItoViewtheIPAddress”onpage24.4. Whenprompted,enteradminfortheusernameandadminforthepassword,thenclickOK.Note:Itispossibletodetectaccesspointsonthenetworkwithawirelessconnection.However,westronglyadviseagainstusingthismethod.InmostenvironmentsyoumayhavenowayofknowingwhetheryouareactuallyconnectingtotheintendedAP.Also,manyoftheinitialconfigurationchangesrequiredwillcauseyoutoloseconnectivitywiththeAPoverawirelessconnection.
InstallingtheUAPD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page21UnifiedAccessPointAdministrator’sGuideWhenyoufirstlogin,theBasicSettingspageforUAPadministrationisdisplayed,asthefollowingfigureshows.5. VerifythesettingsontheBasicSettingspage.• Reviewaccesspointdescriptionandprovideanewadministratorpasswordfortheaccesspointifyoudonotwanttousethedefaultpassword,whichisadmin.•ClicktheApplybuttontoactivatethewirelessnetworkwiththesenewsettings.
BasicSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page22UnifiedAccessPointAdministrator’sGuideForinformationaboutthefieldsandconfigurationoptionsontheBasicSettingspage,see“BasicSettings”onpage22.6. IfyoudonothaveaDHCPserveronthemanagementnetworkanddonotplantouseone,youmustchangetheConnectionTypefromDHCPtoStaticIP.YoucaneitherassignanewStaticIPaddresstotheAPorcontinueusingthedefaultaddress.WerecommendassigninganewStaticIPaddresssothatifyoubringupanotherUAPonthesamenetwork,theIPaddressforeachAPwillbeunique.TochangetheconnectiontypeandassignastaticIPaddress,see“ConfiguringtheEthernetSettings”onpage25(CLI)or“EthernetSettings”onpage51(Web).7. IfyournetworkusesVLANs,youmightneedtoconfigurethemanagementVLANIDoruntaggedVLANIDontheUAPinorderforittoworkwithyournetwork.ForinformationabouthowtoconfigureVLANinformation,see“ConfiguringtheEthernetSettings”onpage25(CLI)or“EthernetSettings”onpage51(Web).8. IfyournetworkusesIEEE802.1Xportsecurityfornetworkaccesscontrol,youmustconfigurethe802.1XsupplicantinformationontheAP.Forinformationabouthowtoconfigurethe802.1Xusernameandpassword,see“ConfiguringIEEE802.1XAuthentication”onpage27.BasicSettingsFromtheBasicSettingspage,youcanviewvariousinformationabouttheUAP,includingIPandMACaddressinformation,andconfiguretheadministratorpasswordfortheUAP.Table4describesthefieldsandconfigurationoptionsontheBasicSettingspage.Note:ThechangesyoumakearenotsavedorapplieduntilyouclickApply.ChangingsomeaccesspointsettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeaccesspointsettingswhenWLANtrafficislow.Table4:BasicSettingsPageFieldDescriptionIPAddress ShowstheIPaddressassignedtotheAP.ThisfieldisnoteditableonthispagebecausetheIPaddressisalreadyassigned(eitherbyDHCP,orstaticallythroughtheEthernetSettingspage).IPv6Address ShowstheIPv6addressassignedtotheAP.ThisfieldisnoteditableonthispagebecausetheIPaddressisalreadyassigned(eitherbyDHCPv6,orstaticallythroughtheEthernetSettingspage).IPv6LinkLocalAddressShowstheIPv6LinkLocaladdress,whichistheIPv6addressusedbythelocalphysicallink.ThelinklocaladdressisnotconfigurableandisassignedbyusingtheIPv6NeighborDiscoveryprocess.MACAddress ShowstheMACaddressoftheAP.TheaddressshownhereistheMACaddressassociatedwiththemanagementinterface.ThisistheaddressbywhichtheAPisknownexternallytoothernetworks.
BasicSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page23UnifiedAccessPointAdministrator’sGuideFirmwareVersion ShowsversioninformationaboutthefirmwarecurrentlyinstalledontheAP.AsnewversionsoftheWLANAPfirmwarebecomeavailable,youcanupgradethefirmwareonyourAPs.ProductIdentifier IdentifiestheAPhardwaremodel.HardwareVersion IdentifiestheAPhardwareversion.SerialNumber ShowstheAPserialnumber.DeviceName Genericnametoidentifythetypeofhardware.DeviceDescription Providesinformationabouttheproducthardware.CurrentPassword Enterthecurrentadministratorpassword.Youmustcorrectlyenterthecurrentpasswordbeforeyouareabletochangeit.NewPassword Enteranewadministratorpassword.Thecharactersyouenteraredisplayedasbulletcharacterstopreventothersfromseeingyourpasswordasyoutype.Theadministratorpasswordmustbeanalphanumericstringofupto8characters.Donotusespecialcharactersorspaces.Note:Asanimmediatefirststepinsecuringyourwirelessnetwork,werecommendthatyouchangetheadministratorpasswordfromthedefault.ConfirmNewPasswordRe‐enterthenewadministratorpasswordtoconfirmthatyoutypeditasintended.BaudRate Selectabaudratefortheserialportconnection.ThebaudrateontheAPmustmatchthebaudrateontheterminalorterminalemulatortoconnecttotheAPcommand‐lineinterface(CLI)byusingaserial(console)connection.Thefollowingbaudratesareavailable:• 9600•19200• 38400•57600• 115200SystemName EnteranamefortheAP.ThisnameappearsonlyontheBasicSettingspageandisanametoidentifytheAPtotheadministrator.Useupto64alphanumericcharacters,forexampleMyAP.SystemContact Enterthename,e‐mailaddress,orphonenumberofthepersontocontactregardingissuesrelatedtotheAP.SystemLocation EnterthephysicallocationoftheAP,forexampleConferenceRoomA.Table4:BasicSettingsPage(Cont.)FieldDescription
UsingtheCLItoViewtheIPAddressD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page24UnifiedAccessPointAdministrator’sGuideConnectingtotheAPWebInterfacebyUsingtheIPv6AddressToconnecttotheAPbyusingtheIPv6globaladdressorIPv6linklocaladdress,youmustentertheAPaddressintoyourbrowserinaspecialformat.ToconnecttoanIPv6globaladdress,addsquarebracketsaroundtheIPv6address.Forexample,iftheAPglobalIPv6addressis2520::230:abff:fe00:2420,typethefollowingaddressintotheIE7addressfield:http://[2520::230:abff:fe00:2420].ToconnecttotheiPv6linklocaladdress,replacethecolons(:)withhyphens(‐),addtheinterfacenumberprecededwithan"s,"thenadd".ipv6‐literal.net."Forexample,iftheAPlinklocaladdressisfe80::230:abff:fe00:2420,andtheWindowsinterfaceisdefinedas"%6,"typethefollowingaddressintotheIE7addressfield:http://fe80‐‐230‐abff‐fe00‐2420s6.ipv6‐literal.net.UsingtheCLItoViewtheIPAddressTheDHCPclientontheUAPisenabledbydefault.IfyouconnecttheUAPtoanetworkwithaDHCPserver,theAPautomaticallyacquiresanIPaddress.TomanagetheUAPbyusingtheAdministratorUI,youmustentertheIPaddressoftheaccesspointintoaWebbrowser.IfaDHCPserveronyournetworkassignsanIPaddresstotheUAP,andyoudonotknowtheIPaddress,usethefollowingstepstoviewtheIPaddressoftheUAP:1. Usinganull‐modemcable,connectaVT100/ANSIterminaloraworkstationtotheconsole(serial)port.IfyouattachedaPC,Apple,orUNIXworkstation,startaterminal‐emulationprogram,suchasHyperTerminalorTeraTerm.2. Configuretheterminal‐emulationprogramtousethefollowingsettings:•Baudrate:115200bps•Databits:8•Parity:none•Stopbit:1• Flowcontrol:none3. Pressthereturnkey,andaloginpromptshouldappear.Theloginnameisadmin.Thedefaultpasswordisadmin.Afterasuccessfullogin,thescreenshowsthe(AccessPointName)#prompt.Note:ThefollowinginstructionsandexamplesworkwithMicrosoftInternetExplorer7(IE7)andmightnotworkwithotherbrowsers.
ConfiguringtheEthernetSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page25UnifiedAccessPointAdministrator’sGuide4. Attheloginprompt,entergetmanagement.Informationsimilartothefollowingprintstothescreen.ConfiguringtheEthernetSettingsThedefaultEthernetsettings,whichincludeDHCPandVLANinformation,mightnotworkforallnetworks.Bydefault,theDHCPclientontheUAPautomaticallybroadcastsrequestsfornetworkinformation.IfyouwanttouseastaticIPaddress,youmustdisabletheDHCPclientandmanuallyconfiguretheIPaddressandothernetworkinformation.ThemanagementVLANisVLAN1bydefault.ThisVLANisalsothedefaultuntaggedVLAN.IfyoualreadyhaveamanagementVLANconfiguredonyournetworkwithadifferentVLANID,youmustchangetheVLANIDofthemanagementVLANontheaccesspoint.ForinformationaboutusingtheWebinterfacetoconfiguretheEthernetsettings,see“EthernetSettings”onpage51.YoucanalsousetheCLItoconfiguretheEthernetsettings,whichthefollowingsectiondescribes.
ConfiguringtheEthernetSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page26UnifiedAccessPointAdministrator’sGuideUsingtheCLItoConfigureEthernetSettingsUsethecommandsshowninthefollowingtabletoviewandsetvaluesfortheEthernet(wired)interface.Formoreinformationabouteachsetting,seethedescriptionforthefieldinTable17onpage52.Inthefollowingexample,theadministratorusestheCLItosetthemanagementVLANIDto123andtodisabletheuntaggedVLANsothatalltrafficistaggedwithaVLANID.D‐Link‐WLAN‐AP#setmanagementvlan‐id123D‐Link‐WLAN‐AP#setuntagged‐vlanstatusdownTable5:CLICommandsforEthernetSettingAction CommandGettheDNSName gethostidSettheDNSName sethostid<host_name>Forexample:sethostidvicky‐apGetCurrentSettingsfortheEthernet(Wired)InternalInterfacegetmanagementSetthemanagementVLANID setmanagementvlan‐id<1‐4094>ViewuntaggedVLANinformation getuntagged‐vlanEnabletheuntaggedVLAN setuntagged‐vlanstatusupDisabletheuntaggedVLAN setuntagged‐vlanstatusdownSettheuntaggedVLANID setuntagged‐vlanvlan‐id<1‐4094>Viewtheconnectiontype getmanagementdhcp‐statusUseDHCPastheconnectiontype setmanagementdhcp‐statusupUseaStaticIPastheconnectiontype setmanagementdhcp‐statusdownSettheStaticIPaddress setmanagementstatic‐ip<ip_address>Forexample:setmanagementstatic‐ip10.10.12.221SetaSubnetMask setmanagementstatic‐mask<netmask>Forexample:setmanagementstatic‐mask255.255.255.0SettheDefaultGateway setstatic‐ip‐routegateway<ip_address>Forexample:setstatic‐ip‐routegateway10.10.12.1ViewtheDNSNameservermodeDynamic=up Manual=downgethostdns‐via‐dhcpSetDNSNameserverstoUseStaticIPAddresses(DynamictoManualMode)sethostdns‐via‐dhcpdown sethoststatic‐dns‐1<ip_address> sethoststatic‐dns‐2<ip_address>Forexample:sethoststatic‐dns‐1192.168.23.45SetDNSNameserverstoUseDHCPIPAddressing(ManualtoDynamicMode)sethostdns‐via‐dhcpup
ConfiguringIEEE802.1XAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page27UnifiedAccessPointAdministrator’sGuideD‐Link‐WLAN‐AP#getmanagementPropertyValue‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐vlan‐id123interfacebrtrunkstatic‐ip10.90.90.91static‐mask255.0.0.0ip10.90.90.91mask255.0.0.0mac5C:D9:98:2F:52:40dhcp‐statusupipv6‐statusupipv6‐autoconfig‐statusupstatic‐ipv6::static‐ipv6‐prefix‐length0D‐Link‐WLAN‐AP#getuntagged‐vlanPropertyValue‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐vlan‐id1statusdownD‐Link‐WLAN‐AP#ConfiguringIEEE802.1XAuthenticationOnnetworksthatuseIEEE802.1X,port‐basednetworkaccesscontrol,asupplicant(client)cannotgainaccesstothenetworkuntilthe802.1Xauthenticatorgrantsaccess.Ifyournetworkuses802.1X,youmustconfigure802.1XauthenticationinformationthattheAPcansupplytotheauthenticator.IfyournetworkusesIEEE802.1Xsee“Configuring802.1XAuthentication”onpage92forinformationabouthowtoconfigure802.1XbyusingtheWebinterface.UsingtheCLItoConfigure802.1XAuthenticationInformationThefollowingtableshowsthecommandsusedtoconfigurethe802.1XsupplicantinformationusingtheCLI.Table6:CLICommandsforthe802.1XSupplicantAction CommandView802.1Xsupplicantsettings getdot1x‐supplicantEnable802.1Xsupplicant setdot1x‐supplicantstatusupDisable802.1Xsupplicant setdot1x‐supplicantstatusdownSetthe802.1Xusername setdot1x‐supplicantuser<name>Setthe802.1spassword setdot1x‐supplicantpassword<password>
VerifyingtheInstallationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page28UnifiedAccessPointAdministrator’sGuideInthefollowingexample,theadministratorenablesthe802.1XsupplicantandsetstheusernametowlanAPandthepasswordtotest1234.D‐Link‐WLAN‐AP#setdot1x‐supplicantstatusupD‐Link‐WLAN‐AP#setdot1x‐supplicantuserwlanAPD‐Link‐WLAN‐AP#setdot1x‐supplicantpasswordtest1234D‐Link‐WLAN‐AP#getdot1x‐supplicantPropertyValue‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐statusupuserwlanAPVerifyingtheInstallationMakesuretheaccesspointisconnectedtotheLANandassociatesomewirelessclientswiththenetwork.Onceyouhavetestedthebasicsofyourwirelessnetwork,youcanenablemoresecurityandfine‐tunetheAPbymodifyingadvancedconfigurationfeatures.1. ConnecttheaccesspointtotheLAN.•IfyouconfiguredtheaccesspointandadministratorPCbyconnectingbothintoanetworkhub,thenyouraccesspointisalreadyconnectedtotheLAN.Thenextstepistotestsomewirelessclients.•Ifyouconfiguredtheaccesspointbyusingadirectcableconnectionfromyourcomputertotheaccesspoint,dothefollowingprocedures:a. Disconnectthecablefromthecomputerandtheaccesspoint.b. ConnectanEthernetcablefromtheaccesspointtotheLAN.c. ConnectyourcomputertotheLANbyusinganEthernetcableorawirelesscard.2. TestLANconnectivitywithwirelessclients.TesttheUAPbytryingtodetectitandassociatewithitfromsomewirelessclientdevices.Forinformationaboutrequirementsfortheseclients,see“WirelessClientRequirements”onpage17.3. Secureandconfiguretheaccesspointbyusingadvancedfeatures.OncethewirelessnetworkisupandyoucanconnecttotheAPwithsomewirelessclients,youcanaddinlayersofsecurity,createmultiplevirtualaccesspoints(VAPs),andconfigureperformancesettings.Bydefault,nosecurityisinplaceontheaccesspoint,soanywirelessclientcanassociatewithitandaccessyourLAN.Animportantnextstepistoconfiguresecurity,asdescribedin“VirtualAccessPointSettings”onpage70.Note:TheWLANAPisnotdesignedformultiple,simultaneousconfigurationchanges.IfmorethanoneadministratorisloggedontotheAdministrationWebpagesandmakingchangestotheconfiguration,thereisnoguaranteethatallconfigurationchangesspecifiedbymultipleuserswillbeapplied.
ConfiguringSecurityontheWirelessAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page29UnifiedAccessPointAdministrator’sGuideConfiguringSecurityontheWirelessAccessPointYouconfiguresecurewirelessclientaccessbyconfiguringsecurityforeachvirtualaccesspoint(VAP)thatyouenable.Youcanconfigureupto16VAPsperradiothatsimulatemultipleAPsinonephysicalaccesspoint.Bydefault,onlyoneVAPisenabled.ForeachVAP,youcanconfigureauniquesecuritymodetocontrolwirelessclientaccess.Eachradiohas16VAPs,withVAPIDsfrom0‐15.Bydefault,onlyVAP0oneachradioisenabled.VAP0hasthefollowingdefaultsettings:•VLANID:1•BroadcastSSID:Enabled• SSID:dlink1•Security:None•MACAuthenticationType:None• RedirectMode:NoneAllotherVAPsaredisabledbydefault.ThedefaultSSIDforVAPs1–15is"dlinkx"wherexistheVAPID.TopreventunauthorizedaccesstotheUAP,werecommendthatyouselectandconfigureasecurityoptionotherthanNoneforthedefaultVAPandforeachVAPthatyouenable.ForinformationabouthowtoconfigurethesecuritysettingsoneachVAP,see“VirtualAccessPointSettings”onpage70.
ViewingAccessPointStatusD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page30UnifiedAccessPointAdministrator’sGuideSection3:ViewingAccessPointStatusThissectiondescribestheinformationyoucanviewfromthetabsundertheStatusheadingontheAdministrationWebUI.Thissectioncontainsthefollowingsubsections:•“ViewingInterfaceStatus”•“ViewingEvents”•“ViewingTransmitandReceiveStatistics”•“ViewingAssociatedWirelessClientInformation”•“ViewingTSPECClientAssociations”•“ViewingRogueAPDetection”•“ViewingManagedAPDHCPInformation”•“ViewingTSPECStatusandStatisticsInformation”•“ViewingTSPECAPStatisticsInformation”•“ViewingRadioStatisticsInformation”•“ViewingEmailAlertOperationalStatus”Note:Theweb‐basedUIimagesinthissectionshowtheDWL‐8600APadministrationpages.PagesfortheDWL‐3600APwilldisplayinformationforoneradioonly.
ViewingInterfaceStatusD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page31UnifiedAccessPointAdministrator’sGuideViewingInterfaceStatusTomonitorEthernetLAN(wired)andwirelessLAN(WLAN)settings,clicktheInterfacestab.Figure2:ViewingInterfaceStatusThispagedisplaysthecurrentsettingsoftheUAP.ItdisplaystheWiredSettingsandtheWirelessSettings.WiredSettings(InternalInterface)TheInternalinterfaceincludestheEthernetMACAddress,ManagementVLANID,IPAddress(IPv4andIPv6),SubnetMask,andDNSinformation.Tochangeanyofthesesettings,clicktheEditlink.AfteryouclickEdit,youareredirectedtotheEthernetSettingspage.Forinformationaboutconfiguringthesesettings,see“ConfiguringtheEthernetSettings”onpage25.WirelessSettingsTheRadioInterfaceincludestheAeroScout™EngineCommunicationstatus,RadioModeandChannel.TheWirelessSettingssectionalsoshowstheMACaddress(read‐only)associatedwitheachradiointerface.TochangetheRadioModeorChannelsettings,clicktheEditlink.AfteryouclickEdit,youareredirectedtotheModifyWirelessSettingspage.Forinformationaboutconfiguringthesesettings,see“WirelessSettings”onpage54and“ModifyingRadioSettings”onpage58.
ViewingEventsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page32UnifiedAccessPointAdministrator’sGuideViewingEventsTheEventspageshowsreal‐timesystemeventsontheAPsuchaswirelessclientsassociatingwiththeAPandbeingauthenticated.Toviewsystemevents,clicktheEventstab.Figure3:ViewingEventsFromtheEventspage,youcanperformthefollowingtasks:• Viewthemostrecent,high‐leveleventsgeneratedbythisAP.• Enableandconfigurepersistentloggingtowritesystemeventlogstonon‐volatilememorysothattheeventsarenoterasedwhenthesystemreboots.•SetaSeverityLeveltodeterminewhatcategoryoflogmessagesaredisplayed.•SetDepthtodeterminehowmanylogmessagesaredisplayedintheEventlog.• EnablearemotelogrelayhosttocaptureallsystemeventsanderrorsinaKernelLog.ConfiguringPersistentLoggingOptionsIfthesystemunexpectedlyreboots,logmessagescanbeusefultodiagnosethecause.However,logmessagesareerasedwhenthesystemrebootsunlessyouenablepersistentlogging.Note:TheAPacquiresitsdateandtimeinformationusingthenetworktimeprotocol(NTP).ThisdataisreportedinUTCformat(alsoknownasGreenwichMeanTime).Youneedtoconvertthereportedtimetoyourlocaltime.Forinformationonsettingthenetworktimeprotocol,see“”onpage106.
ViewingEventsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page33UnifiedAccessPointAdministrator’sGuideToconfigurepersistentloggingontheEventspage,setthepersistence,severity,anddepthoptionsasdescribedinTable7,andthenclickApply.Figure4:PersistentLoggingOptionsCaution!Enablingpersistentloggingcanwearouttheflash(non‐volatile)memoryanddegradenetworkperformance.Youshouldonlyenablepersistentloggingtodebugaproblem.Makesureyoudisablepersistentloggingafteryoufinishdebuggingtheproblem.Table7:LoggingOptionsField DescriptionPersistence ChooseEnabledtosavesystemlogstonon‐volatilememorysothatthelogsarenoterasedwhentheAPreboots.ChooseDisabledtosavesystemlogstovolatilememory.Logsinvolatilememoryaredeletedwhenthesystemreboots.Severity Specifytheseveritylevelofthelogmessagestowritetonon‐volatilememory.Forexample,ifyouspecify2,critical,alert,andemergencylogsarewrittentonon‐volatilememory.Errormessageswithaseveritylevelof3–7arewrittentovolatilememory.•0—emergency•1—alert•2—critical•3—error•4—warning•5—notice•6—info•7—debugDepth Youcanstoreupto128messagesinnon‐volatilememory.Oncethenumberyouconfigureinthisfieldisreached,theoldestlogeventisoverwrittenbythenewlogevent.Note:Toapplyyourchanges,clickApply.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ViewingEventsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page34UnifiedAccessPointAdministrator’sGuideConfiguringtheLogRelayHostforKernelMessagesTheKernelLogisacomprehensivelistofsystemevents(shownintheSystemLog)andkernelmessagessuchaserrorconditions,likedroppingframes.YoucannotviewkernellogmessagesdirectlyfromtheAdministrationWebUIforanAP.Youmustfirstsetuparemoteserverrunningasyslogprocessandactingasasysloglogrelayhostonyournetwork.Then,youcanconfiguretheUAPtosendsyslogmessagestotheremoteserver.RemotelogservercollectionforAPsyslogmessagesprovidesthefollowingfeatures:• AllowsaggregationofsyslogmessagesfrommultipleAPs•StoresalongerhistoryofmessagesthankeptonasingleAP•TriggersscriptedmanagementoperationsandalertsTouseKernelLogrelaying,youmustconfigurearemoteservertoreceivethesyslogmessages.Theproceduretoconfigurearemoteloghostdependsonthetypeofsystemyouuseastheremotehost.EnablingorDisablingtheLogRelayHostontheEventsPageToenableandconfigureLogRelayingontheEventspage,settheLogRelayoptionsasdescribedinthefollowingtable,andthenclickApply.Figure5:LogRelayHostNote:Thesyslogprocesswilldefaulttouseport514.Werecommendkeepingthisdefaultport.However;Ifyouchoosetoreconfigurethelogport,makesurethattheportnumberyouassigntosyslogisnotbeingusedbyanotherprocess.Table8:LogRelayHostField DescriptionRelayLog SelectEnabledtoallowtheUAPtosendlogmessagestoaremotehost.SelectDisabledtokeepalllogmessagesonthelocalsystem.RelayHost SpecifytheIPAddressorDNSnameoftheremotelogserver.RelayPort SpecifythePortnumberforthesyslogprocessontheRelayHost.Thedefaultportis514.
ViewingEventsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page35UnifiedAccessPointAdministrator’sGuideIfyouenabledtheLogRelayHost,clickingApplywillactivateremotelogging.TheAPwillsenditskernelmessagesreal‐timefordisplaytotheremotelogservermonitor,aspecifiedkernellogfile,orotherstorage,dependingonhowyouconfiguredtheLogRelayHost.IfyoudisabledtheLogRelayHost,clickingApplywilldisableremotelogging.Note:Toapplyyourchanges,clickApply.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ViewingTransmitandReceiveStatisticsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page36UnifiedAccessPointAdministrator’sGuideViewingTransmitandReceiveStatisticsTheTransmit/ReceivepageprovidessomebasicinformationaboutthecurrentAPandareal‐timedisplayofthetransmitandreceivestatisticsfortheEthernetinterfaceontheAPandfortheVAPsonallsupportedradiointerfaces.AlltransmitandreceivestatisticsshownaretotalssincetheAPwaslaststarted.IfyoureboottheAP,thesefiguresindicatetransmitandreceivetotalssincethereboot.ToviewtransmitandreceivestatisticsfortheAP,clicktheTransmit/Receivepage.Figure6:ViewingTrafficStatistics
ViewingTransmitandReceiveStatisticsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page37UnifiedAccessPointAdministrator’sGuideTable9:Transmit/ReceiveField DescriptionInterface ThenameoftheEthernetorVAPinterface.Status Showswhethertheinterfaceisupordown.MACAddress MACaddressforthespecifiedinterface.TheUAPhasauniqueMACaddressforeachinterface.EachradiohasadifferentMACaddressforeachinterfaceoneachofitstworadios(DWL‐6600APandDWL‐8600AP).VLANID VirtualLAN(VLAN)ID.YoucanuseVLANstoestablishmultipleinternalandguestnetworksonthesameAP.TheVLANIDissetontheVAPpage.(See“ConfiguringLoadBalancing”onpage88.)Name(SSID) Wirelessnetworkname.AlsoknownastheSSID,thisalphanumerickeyuniquelyidentifiesawirelesslocalareanetwork.TheSSIDissetontheVAPpage.(See“ConfiguringLoadBalancing”onpage88.)Transmit and Receive InformationTotalPackets Indicatestotalpacketssent(inTransmittable)orreceived(inReceivedtable)bythisAP.TotalBytes Indicatestotalbytessent(inTransmittable)orreceived(inReceivedtable)bythisAP.TotalDropPackets Indicatestotalnumberofpacketssent(inTransmittable)orreceived(inReceivedtable)bythisAPthatweredropped.TotalDropBytes Indicatestotalnumberofbytessent(inTransmittable)orreceived(inReceivedtable)bythisAPthatweredropped.Errors IndicatestotalerrorsrelatedtosendingandreceivingdataonthisAP.
ViewingAssociatedWirelessClientInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page38UnifiedAccessPointAdministrator’sGuideViewingAssociatedWirelessClientInformationToviewtheclientstationsassociatedwithaparticularaccesspoint,clicktheClientAssociationstab.Figure7:ViewingClientAssociationInformationTheassociatedstationsaredisplayedalongwithinformationaboutpackettraffictransmittedandreceivedforeachstation.Table10describesthefieldsontheClientAssociationspage.Table10:AssociatedClientsField DescriptionNetwork ShowswhichVAPtheclientisassociatedwith.Forexample,anentryofwlan0vap2meanstheclientisassociatedwithRadio1,VAP2.Anentryofwlan0meanstheclientisassociatedwithVAP0onRadio1.Anentryofwlan1meanstheclientisassociatedwithVAP0onRadio2.Station ShowstheMACaddressoftheassociatedwirelessclient.Status TheAuthenticatedandAssociatedStatusshowstheunderlyingIEEE802.11authenticationandassociationstatus,whichispresentnomatterwhichtypeofsecuritytheclientusestoconnecttotheAP.ThisstatusdoesnotshowIEEE802.1Xauthenticationorassociationstatus.Somepointstokeepinmindwithregardtothisfieldare:•IftheAPsecuritymodeisNoneorStaticWEP,theauthenticationandassociationstatusofclientsshowingontheClientAssociationspagewillbeinlinewithwhatisexpected;thatis,ifaclientshowsasauthenticatedtotheAP,itwillbeabletotransmitandreceivedata.(ThisisbecauseStaticWEPusesonlyIEEE802.11authentication.)•IftheAPusesIEEE802.1XorWPAsecurity,however,itispossibleforaclientassociationtoshowonthispageasauthenticated(viatheIEEE802.11security)butactuallynotbeauthenticatedtotheAPviathesecondlayerofsecurity.FromStation Showsthenumberofpacketsandbytesreceivedfromthewirelessclientandthenumberofpacketsandbytesthatweredroppedafterbeingreceived.ToStation ShowsthenumberofpacketsandbytestransmittedfromtheAPtothewirelessclientandthenumberofpacketsandbytesthatweredroppedupontransmission.
ViewingTSPECClientAssociationsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page39UnifiedAccessPointAdministrator’sGuideViewingTSPECClientAssociationsTheTSPECClientAssociationStatusandStatisticspageprovidessomebasicinformationabouttheclientassociationsstatusandareal‐timedisplayofthetransmitandreceivestatisticsfortheTSPECclients.Alltransmitandreceivestatisticsshownaretotalssincetheclientassociationstarted.ATSPECisatrafficspecificationthatissentfromaQoS‐capablewirelessclienttoanAPrequestingacertainamountofnetworkaccessforthetrafficstream(TS)itrepresents.Atrafficstreamisacollectionofdatapacketsidentifiedbythewirelessclientasbelongingtoaparticularuserpriority.AnexampleofavoicetrafficstreamisaWi‐FiCERTIFIED™telephonehandsetthatmarksitscodec‐generateddatapacketsasvoiceprioritytraffic.Anexampleofavideotrafficstreamisavideoplayerapplicationonawirelesslaptopthatprioritizesavideoconferencefeedfromacorporateserver.ToviewTSPECclientassociationstatistics,clicktheTSPECClientAssociationstab.Figure8:ViewingTSPECClientAssociationsTable11describestheinformationprovidedontheTSPECClientAssociationStatusandStatisticspage.Table11:TSPECClientAssociationsField DescriptionStatusNetwork Radiointerfaceusedbytheclient.Station ClientstationMACaddress.TSIdentifier TSPECTrafficSessionIdentifier(range0‐7).AccessCategory TSAccessCategory(voiceorvideo).Direction ThetrafficdirectionforthisTS.Directioncanbe:• uplink• downlink• bidirectional
ViewingTSPECClientAssociationsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page40UnifiedAccessPointAdministrator’sGuideUserPriority TheUserPriority(UP)forthisTS.TheUPissentwitheachpacketintheUPportionoftheIPheader.Typicalvaluesare:•6or7forvoice•4or5forvideoThevaluemaydifferdependingonotherprioritytrafficsessions.MediumTime Thetime(in32microsecondpersecondunits)thattheTStrafficoccupiesthetransmissionmedium.ExcessUsageEvents ThenumberoftimestheclienthasexceededthemediumtimeestablishedforitsTSPEC.Minor,infrequentviolationsareignored.VAP TheVirtualAccessPointassociatedwiththisTSclient.MACAddress TheVirtualAccessPointMACaddress.SSID TheservicesetidentifierassociatedwiththisTSclient.StatisticsNetwork Radiointerfaceusedbytheclient.Station ClientstationMACaddress.TSIdentifier TSPECTrafficSessionIdentifier(range0‐7).TSType TherewillonlybeanentryintherowforaclientassociationthathasanactiveTS.Iftherearenoactivetrafficstreams,thereisnoentryforthestation.AccessCategory TSAccessCategory(voiceorvideo).Direction ThetrafficdirectionforthisTS.Directioncanbe:• uplink• downlink• bidirectionalDirection ThetrafficdirectionforthisTS.Directioncanbe:• uplink• downlink• bidirectionalFromStation Showsthenumberofpacketsandbytesreceivedfromthewirelessclientandthenumberofpacketsandbytesthatweredroppedafterbeingreceived.Alsoshowsthenumberofpackets:•inexcessofanadmittedTSPEC.•forwhichnoTSPEChasbeenestablishedwhenadmissionisrequiredbytheAP.ToStation ShowsthenumberofpacketsandbytestransmittedfromtheAPtothewirelessclientandthenumberofpacketsandbytesthatweredroppedupontransmission.Alsoshowsthenumberofpackets:•inexcessofanadmittedTSPEC.•forwhichnoTSPEChasbeenestablishedwhenadmissionisrequiredbytheAP.Table11:TSPECClientAssociations(Cont.)Field Description
ViewingRogueAPDetectionD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page41UnifiedAccessPointAdministrator’sGuideLinkIntegrityMonitoringTheUAPprovideslinkintegritymonitoringtocontinuallyverifyitsconnectiontoeachassociatedclient.Todothis,theAPsendsdatapacketstoclientseveryfewsecondswhennoothertrafficispassing.ThisallowstheAPtodetectwhenaclientgoesoutofrange,evenduringperiodswhennonormaltrafficisexchanged.Theclientconnectiondropsoffthelistwithin300secondsifthesedatapacketsarenotacknowledged,evenifnodisassociationmessageisreceived.ViewingRogueAPDetectionThestatuspagetoviewRogueAPDetectioninformationprovidesreal‐timestatisticsforallAPswithinrangeoftheAPonwhichyouareviewingtheAdministrationWebpages.WhenAPdetectionisenabled,theradiowillperiodicallyswitchfromitsoperatingchanneltoscanotherchannelswithinthesameband.ClickRefreshtoupdatethescreenanddisplaythemostcurrentinformation.TheRogueAPDetectionpagecontainsthefollowingtwolists:• DetectedRogueAPList—ListsallAPswithinrangeoftheAPthathavenotbeenacknowledgedasknownAPs.•KnownAPList—ListsallAPswithinrangeoftheAPthathavebeenacknowledgedasknownAPseitherbyclickingtheGrantbuttonassociatedwithanAPintheDetectedRogueAPListorbyappearinginanimportedAPlist.Toviewinformationaboutotheraccesspointsonthewirelessnetwork,clicktheRogueAPDetectiontab.Figure9:ViewingRogueandKnownAccessPoints
ViewingRogueAPDetectionD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page42UnifiedAccessPointAdministrator’sGuideYoumustenabletheAPdetectiononaradioinordertocollectinformationaboutotherAPswithinrange.Table12describestheinformationprovidedonneighboringaccesspoints.Table12:RogueAPDetectionField DescriptionAPDetectionforRadioToallowtheAPradiostoperformneighborAPdetectionandcollectinformationaboutneighborAPs,clickEnabled.TodisableneighborAPdetectionontheradios,clickDisabled.IfyouchangetheAPdetectionmode,clickApplytosavethenewsettings.DetectedRogueAPListAction ClickGranttomovetheAPfromtheDetectedRogueAPListtotheKnownAPList.Note:TheDetectedRougeAPandKnownAPlistsprovideinformation.TheDWL‐x600APdoesnothaveanycontrolovertheAPsonthelistandcannotapplyanysecuritypoliciestoAPsdetectedthroughtheRFscan.MAC ShowstheMACaddressoftheneighboringAP.Radio TheRadiofieldindicateswhichradiodetectedtheneighboringAP:•wlan0(RadioOne)•wlan1(RadioTwo)BeaconInt. ShowstheBeaconintervalbeingusedbythisAP.BeaconframesaretransmittedbyanAPatregularintervalstoannouncetheexistenceofthewirelessnetwork.Thedefaultbehavioristosendabeaconframeonceevery100milliseconds(or10persecond).TheBeaconIntervalissetontheRadiopage.(See“ModifyingRadioSettings”onpage58.)Type Indicatesthetypeofdevice:•APindicatestheneighboringdeviceisanAPthatsupportstheIEEE802.11WirelessNetworkingFrameworkinInfrastructureMode.•AdhocindicatesaneighboringstationrunninginAdhocMode.Stationssettoadhocmodecommunicatewitheachotherdirectly,withouttheuseofatraditionalAP.Ad‐hocmodeisanIEEE802.11WirelessNetworkingFrameworkalsoreferredtoaspeer‐to‐peermodeoranIndependentBasicServiceSet(IBSS).SSID TheServiceSetIdentifier(SSID)fortheAP.TheSSIDisanalphanumericstringofupto32charactersthatuniquelyidentifiesawirelesslocalareanetwork.ItisalsoreferredtoastheNetworkName.TheSSIDissetontheVAPpage.(See“ConfiguringLoadBalancing”onpage88.)Privacy Indicateswhetherthereisanysecurityontheneighboringdevice.•OffindicatesthattheSecuritymodeontheneighboringdeviceissettoNone(nosecurity).•Onindicatesthattheneighboringdevicehassomesecurityinplace.SecurityisconfiguredontheAPfromtheVAPpage.WPA IndicateswhetherWPAsecurityisonoroffforthisAP.
ViewingRogueAPDetectionD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page43UnifiedAccessPointAdministrator’sGuideBand ThisindicatestheIEEE802.11modebeingusedonthisAP.(Forexample,IEEE802.11a,IEEE802.11b,IEEE802.11g.)Thenumbershownindicatesthemodeaccordingtothefollowingmap:•2.4indicatesIEEE802.11b,802.11g,or802.11nmode(oracombinationofthemodes)•5indicatesIEEE802.11aor802.11nmode(orbothmodes)Channel ShowstheChannelonwhichtheAPiscurrentlybroadcasting.Thechanneldefinestheportionoftheradiospectrumthattheradiousesfortransmittingandreceiving.ThechannelissetinRadioSettings.(See“ModifyingRadioSettings”onpage58.)Rate Showstherate(inmegabitspersecond)atwhichthisAPiscurrentlytransmitting.ThecurrentratewillalwaysbeoneoftheratesshowninSupportedRates.Signal IndicatesthestrengthoftheradiosignalemittingfromthisAP.Ifyouhoverthemousepointeroverthebars,anumberappearsandshowsthestrengthindecibels(dB).Beacons ShowsthetotalnumberofbeaconsreceivedfromthisAPsinceitwasfirstdiscovered.LastBeacon ShowsthedateandtimeofthelastbeaconreceivedfromthisAP.Rates Showssupportedandbasic(advertised)ratesetsfortheneighboringAP.Ratesareshowninmegabitspersecond(Mbps).AllSupportedRatesarelisted,withBasicRatesshowninbold.RatesetsareconfiguredontheRadioSettingspage.(See“ModifyingRadioSettings”onpage58.)KnownAPListAction AnAPcanappearintheKnownAPListifithasbeenmovedfromtheDetectedRogueAPListbyclickingtheGrantbuttonoriftheMACaddressoftheAPappearsinanAPlistthathasbeenimported.TomovetheAPfromtheKnownAPListtotheDetectedRogueAPList,clickDelete.Note:TheDetectedRougeAPandKnownAPlistsprovideinformation.TheDWL‐x600APdoesnothaveanycontrolovertheAPsonthelistandcannotapplyanysecuritypoliciestoAPsdetectedthroughtheRFscan.MAC ShowstheMACaddressoftheneighboringAP.Radio TheRadiofieldindicateswhichradiodetectedtheneighboringAP:•wlan0(RadioOne)•wlan1(RadioTwo)Type Indicatesthetypeofdevice:•APindicatestheneighboringdeviceisanAPthatsupportstheIEEE802.11WirelessNetworkingFrameworkinInfrastructureMode.•AdhocindicatesaneighboringstationrunninginAdhocMode.Stationssettoadhocmodecommunicatewitheachotherdirectly,withouttheuseofatraditionalAP.Ad‐hocmodeisanIEEE802.11WirelessNetworkingFrameworkalsoreferredtoaspeer‐to‐peermodeoranIndependentBasicServiceSet(IBSS).SSID TheServiceSetIdentifier(SSID)fortheAP.TheSSIDisanalphanumericstringofupto32charactersthatuniquelyidentifiesawirelesslocalareanetwork.ItisalsoreferredtoastheNetworkName.TheSSIDissetontheVAPpage.(See“ConfiguringLoadBalancing”onpage88.)Table12:RogueAPDetection(Cont.)Field Description
ViewingRogueAPDetectionD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page44UnifiedAccessPointAdministrator’sGuideSavingandImportingtheKnownAPListTosavetheKnownAPlisttoafile,clickSave.ThelistcontainstheMACaddressesofallAPthathavebeenaddedtotheKnownAPList.Bydefault,thefilenameisRogue1.cfg.YoucanuseatexteditororWebbrowsertoopenthefileandviewitscontents.UsetheImportfeaturetoimportalistofKnownAPsfromasavedlist.ThelistmightbefromanotherDWL‐x600APorcreatedfromatextfile.IftheMACaddressofanAPappearsintheKnownAPList,itwillnotbedetectedasarogue.ToimportanAPListfromafile,usethefollowingsteps:1. ChoosewhethertoreplacetheexistingKnownAPlistoraddtheentriesintheimportedfiletotheKnownAPlist.• SelecttheReplaceoptiontoimportthelistandreplacethecontentsoftheKnownAPList.• SelecttheMergeoptiontoimportthelistandaddtheAPsintheimportedfiletotheAPscurrentlydisplayedintheKnownAPList.2. ClickBrowseandchoosethefiletoimport.Thefileyouimportmustbeaplain‐textfilewitha.txtor.cfgextension.EntriesinthefileareMACaddressesinhexidecimalformatwitheachoctetseparatedbycolons,forexample00:11:22:33:44:55.Separateentrieswithasinglespace.FortheAPtoacceptthefile,itmustcontainonlyMACaddresses.3. ClickImport.Oncetheimportiscomplete,thescreenrefreshesandtheMACaddressesoftheAPsintheimportedfileappearintheKnownAPList.Privacy Indicateswhetherthereisanysecurityontheneighboringdevice.•OffindicatesthattheSecuritymodeontheneighboringdeviceissettoNone(nosecurity).•Onindicatesthattheneighboringdevicehassomesecurityinplace.SecurityisconfiguredontheAPfromtheVAPpage.Band ThisindicatestheIEEE802.11modebeingusedonthisAP.(Forexample,IEEE802.11a,IEEE802.11b,IEEE802.11g.)Thenumbershownindicatesthemodeaccordingtothefollowingmap:•2.4indicatesIEEE802.11b,802.11g,or802.11nmode(oracombinationofthemodes)•5indicatesIEEE802.11aor802.11nmode(orbothmodes)Channel ShowstheChannelonwhichtheAPiscurrentlybroadcasting.Thechanneldefinestheportionoftheradiospectrumthattheradiousesfortransmittingandreceiving.ThechannelissetinRadioSettings.(See“ModifyingRadioSettings”onpage58.)Table12:RogueAPDetection(Cont.)Field Description
ViewingManagedAPDHCPInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page45UnifiedAccessPointAdministrator’sGuideViewingManagedAPDHCPInformationTheUAPcanlearnaboutD‐LinkUnifiedWirelessSwitchesonthenetworkthroughDHCPresponsestoitsinitialDHCPrequest.TheManagedAPDHCPpagedisplaystheDNSnamesorIPaddressesofuptofourD‐LinkUnifiedWirelessSwitchesthattheAPlearnedaboutfromaDHCPserveronyournetwork.ForinformationabouthowtoconfigureaDHCPservertorespondtoAPDHCPrequestswiththeswitchIPaddressinformation,seetheUserManualfortheswitch.ViewingTSPECStatusandStatisticsInformationTheTSPECStatusandStatisticspageprovides:•SummaryinformationaboutTSPECsessionsbyradio•SummaryinformationaboutTSPECsessionsbyVAP•Real‐timetransmitandreceivestatisticsfortheTSPECVAPsonallradiointerfaces.AllofthetransmitandreceivestatisticsshownaretotalssincetheAPwaslaststarted.IfyoureboottheAP,thesefiguresindicatetransmitandreceivetotalssincethereboot.ToviewTSPECstatusandstatistics,clicktheTSPECStatusandStatisticstab.Figure10:ViewingTSPECStatusandStatistics
ViewingTSPECStatusandStatisticsInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page46UnifiedAccessPointAdministrator’sGuideTable13describestheinformationprovidedonTSPECStatusandStatisticspage.Table13:TSPECStatusandStatisticsField DescriptionAPandVAPStatusInterface IndicatesthenameoftheRadioorVAPinterface.AccessCategory IndicatesCurrentAccessCategoryassociatedwiththisTrafficStream(voiceorvideo).Status IndicateswhethertheTSPECsessionisenabled(up)ornot(down)forthecorrespondingAccessCategory.Note:Thisisaconfigurationstatus(doesnotnecessarilyrepresentthecurrentsessionactivity).ActiveTS IndicatesthenumberofcurrentlyactiveTSPECTrafficStreamsforthisradioandAccessCategory.TSClients IndicatesthenumberofTrafficStreamclientsassociatedwiththisradioandAccessCategory.MediumTimeAdmittedTime(in32microsecondpersecondunits)allocatedforthisAccessCategoryoverthetransmissionmediumtocarrydata.ThisvalueshouldbelessthanorequaltothemaximumbandwidthallowedoverthemediumforthisTS.MediumTimeUnallocatedTime(in32microsecondpersecondunits)ofunusedbandwidthforthisAccessCategory.TransmitandReceiveStatisticsTotalPackets IndicatesthetotalnumberofTSpacketssent(inTransmittable)orreceived(inReceivedtable)bythisRadioforthespecifiedAccessCategory.TotalBytes IndicatesthetotalnumberofTSbytessent(inTransmittable)orreceived(inReceivedtable)bythisRadioforthespecifiedAccessCategory.TotalVoicePackets IndicatesthetotalnumberofTSvoicepacketssent(inTransmittable)orreceived(inReceivedtable)bythisAPforthisVAP.TotalVoiceBytes IndicatesthetotalTSvoicebytessent(inTransmittable)orreceived(inReceivedtable)bythisAPforthisVAP.TotalVideoPackets IndicatesthetotalnumberofTSvideopacketssent(inTransmittable)orreceived(inReceivedtable)bythisAPforthisVAP.TotalVideoBytes IndicatesthetotalTSvideobytessent(inTransmittable)orreceived(inReceivedtable)bythisAPforthisVAP.
ViewingTSPECAPStatisticsInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page47UnifiedAccessPointAdministrator’sGuideViewingTSPECAPStatisticsInformationTheViewTSPECAPStatisticspageprovidesinformationonthevoiceandvideoTrafficStreamsacceptedandrejectedbytheAP.ToviewTSPECAPstatistics,clicktheTSPECAPStatisticstab.Table14describestheinformationprovidedonTSPECAPStatisticspage.Table14:TSPECAPStatisticsField DescriptionTSPECStatisticsSummaryforVoiceACMIndicatesthetotalnumberofacceptedandthetotalnumberofrejectedvoiceTrafficStreams.TSPECStatisticsSummaryforVideoACMIndicatesthetotalnumberofacceptedandthetotalnumberofrejectedvideoTrafficStreams.
ViewingRadioStatisticsInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page48UnifiedAccessPointAdministrator’sGuideViewingRadioStatisticsInformationTheRadioStatisticspageprovidesdetailedinformationaboutthepacketsandbytestransmittedandreceivedontheradiointerfaceofthisaccesspoint.Figure11:RadioStatisticsThefollowingtabledescribesdetailsabouttheRadioStatisticsinformation.Table15:RadioStatisticsInformationField DescriptionRadio Chooseeitherradio1orradio2toviewstatisticsfortheselectedradio(DWL‐8600APandDWL‐6600APonly).WLANPacketsReceived TotalpacketsreceivedbytheAPonthisradiointerface.WLANBytesReceived TotalbytesreceivedbytheAPonthisradiointerface.WLANPacketsTransmittedTotalpacketstransmittedbytheAPonthisradiointerface.WLANBytesTransmitted TotalbytestransmittedbytheAPonthisradiointerface.WLANPacketsReceiveDroppedNumberofpacketsreceivedbytheAPonthisradiointerfacethatweredropped.WLANBytesReceiveDroppedNumberofbytesreceivedbytheAPonthisradiointerfacethatweredropped.WLANPacketsTransmitDroppedNumberofpacketstransmittedbytheAPonthisradiointerfacethatweredropped.WLANBytesTransmitDroppedNumberofbytestransmittedbytheAPonthisradiointerfacethatweredropped.
ViewingRadioStatisticsInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page49UnifiedAccessPointAdministrator’sGuideFragmentsReceived CountofsuccessfullyreceivedMPDUframesoftypedataormanagement.FragmentsTransmitted NumberoftransmittedMPDUwithanindividualaddressoranMPDUwithamulticastaddressoftypeDataorManagement.MulticastFramesReceivedCountofMSDUframesreceivedwiththemulticastbitsetinthedestinationMACaddress.MulticastFramesTransmittedCountofsuccessfullytransmittedMSDUframeswherethemulticastbitissetinthedestinationMACaddress.DuplicateFrameCount NumberoftimesaframeisreceivedandtheSequenceControlfieldindicatesisaduplicate.FailedTransmitCount NumberoftimesanMSDUisnottransmittedsuccessfullyduetotransmitattemptsexceedingeithertheshortretrylimitorthelongretrylimit.TransmitRetryCount NumberoftimesanMSDUissuccessfullytransmittedafteroneormoreretries.MultipleRetryCount NumberoftimesanMSDUissuccessfullytransmittedaftermorethanoneretry.RTSSuccessCount CountofCTSframesreceivedinresponsetoanRTSframe.RTSFailureCount CountofCTSframesnotreceivedinresponsetoanRTSframe.ACKFailureCount CountofACKframesnotreceivedwhenexpected.FCSErrorCount CountofFCSerrorsdetectedinareceivedMPDUframe.FramesTransmitted CountofeachsuccessfullytransmittedMSDU.WEPUndecryptableCountCountofencryptedframesreceivedandthekeyconfigurationofthetransmitterindicatesthattheframeshouldnothavebeenencryptedorthatframewasdiscardedduetothereceivingstationnotimplementingtheprivacyoption.Table15:RadioStatisticsInformation(Cont.)Field Description
ViewingEmailAlertOperationalStatusD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page50UnifiedAccessPointAdministrator’sGuideViewingEmailAlertOperationalStatusTheEmailAlertOperationalStatuspageprovidesinformationabouttheemailalertssentbasedonthesyslogmessagesgeneratedintheAP.ToviewtheEmailAlertOperationalStatus,clicktheStatus>EmailAlertStatustab.Toconfiguretheemailalerts,see“ConfiguringEmailAlert”onpage106Figure12:EmailAlertOperationalStatusThefollowingtabledescribesdetailsabouttheEmailAlertOperationalStatus.Table16:EmailAlertStatusField DescriptionEmailAlertStatus TheEmailAlertoperationalstatusThestatusiseitherUporDown.ThedefaultisDown.NumberofEmailSent Thetotalnumberofemailsentsofar.Therangeisanunsignedintegerof32bits.Thedefaultis0.NumberofEmailFailed Thetotalnumberofemailfailuressofar.Therangeisanunsignedintegerof32bits.Thedefaultis0.TimeSinceLastEmailSentThetimesincethelastemailwassent.Timeformatisused.Thedefaultis00days00hours00mins00secs.
ManagingtheAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page51UnifiedAccessPointAdministrator’sGuideSection4:ManagingtheAccessPointThissectiondescribeshowtomanagetheUAPandcontainsthefollowingsubsections:•“EthernetSettings”•“WirelessSettings”•“ModifyingRadioSettings”•“ConfiguringRadioandVAPScheduler”•“SchedulerAssociationSettings”•“VirtualAccessPointSettings”•“ConfiguringtheWirelessDistributionSystem(WDS)”•“ControllingAccessbyMACAuthentication”•“ConfiguringLoadBalancing”•“ManagedAccessPointOverview”•“Configuring802.1XAuthentication”•“CreatingaManagementAccessControlList”TheconfigurationpagesforthefeaturesinthissectionarelocatedundertheManageheadingontheAdministrationWebUI.EthernetSettingsThedefaultwiredinterfacesettings,whichincludeDHCPandVLANinformation,mightnotworkforallnetworks.Bydefault,theDHCPclientontheUAPautomaticallybroadcastsrequestsfornetworkinformation.IfyouwanttouseastaticIPaddress,youmustdisabletheDHCPclientandmanuallyconfiguretheIPaddressandothernetworkinformation.ThemanagementVLANisVLAN1bydefault.ThisVLANisalsothedefaultuntaggedVLAN.IfyoualreadyhaveamanagementVLANconfiguredonyournetworkwithadifferentVLANID,youmustchangetheVLANIDofthemanagementVLANontheAP.ToconfiguretheLANsettings,clicktheEthernetSettingstab.Note:Theweb‐basedUIimagesinthissectionshowtheDWL‐8600APadministrationpages.PagesfortheDWL‐3600APdisplayinformationforoneradioonly.
EthernetSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page52UnifiedAccessPointAdministrator’sGuideFigure13:EthernetSettingsThefollowingtabledescribesthefieldstovieworconfigureontheEthernetSettingspage.Table17:EthernetSettingsPageFieldDescriptionHostname EnterahostnamefortheAP.ThehostnameappearsintheCLIprompt.Thehostnamehasthefollowingrequirements:•Thelengthmustbebetween1–63characters.• Upperandlowercasecharacters,numbers,andhyphensareaccepted.•Thefirstcharactermustbealetter(a–zorA–Z),andthelastcharactercannotbeahyphen.MACAddress ShowstheMACaddressfortheLANinterfacefortheEthernetportonthisAP.Thisisaread‐onlyfieldthatyoucannotchange.ManagementVLANIDThemanagementVLANistheVLANassociatedwiththeIPaddressyouusetoaccesstheAP.ThedefaultmanagementVLANIDis1.Provideanumberbetween1and4094forthemanagementVLANID.UntaggedVLAN IfyoudisabletheuntaggedVLAN,alltrafficistaggedwithaVLANID.BydefaultalltrafficontheUAPusesVLAN1,whichisthedefaultuntaggedVLAN.ThismeansthatalltrafficisuntaggeduntilyoudisabletheuntaggedVLAN,changetheuntaggedtrafficVLANID,orchangetheVLANIDforaVAPorclientusingRADIUS.UntaggedVLANID Provideanumberbetween1and4094fortheuntaggedVLANID.TrafficontheVLANthatyouspecifyinthisfieldwillnotbetaggedwithaVLANID.ConnectionType IfyouselectDHCP,theUAPacquiresitsIPaddress,subnetmask,DNS,andgatewayinformationfromaDHCPserver.IfyouselectStaticIP,youmustenterinformationintheStaticIPAddress,SubnetMask,andDefaultGatewayfields.
EthernetSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page53UnifiedAccessPointAdministrator’sGuideStaticIPAddress EnterthestaticIPaddressinthetextboxes.ThisfieldisdisabledifyouuseDHCPastheconnectiontype.SubnetMask EntertheSubnetMaskinthetextboxes.DefaultGateway EntertheDefaultGatewayinthetextboxes.DNSNameservers SelectthemodefortheDNS.InDynamicmode,theIPaddressesfortheDNSserversareassignedautomaticallyviaDHCP.ThisoptionisonlyavailableifyouspecifiedDHCPfortheConnectionType.InManualmode,youmustassignstaticIPaddressestoresolvedomainnames.IPv6AdminMode EnableordisableIPv6managementaccesstotheAPIPv6AutoConfigAdminModeEnableordisableIPv6autoaddressconfigurationontheAP.WhenIPv6AutoConfigModeisenabled,automaticIPv6addressconfigurationandgatewayconfigurationisallowedbyprocessingtheRouterAdvertisementsreceivedontheLANport.TheAPcanhavemultipleautoconfiguredIPv6addresses.StaticIPv6Address EnterastaticIPv6address.TheAPcanhaveastaticIPv6addressevenifaddresseshavealreadybeenconfiguredautomatically.StaticIPv6AddressPrefixLengthEnterthestaticIPv6prefixlength,whichisanintegerintherangeof0–128.IPv6AutoconfiguredGlobalAddressesIftheAPhasbeenassignedoneormoreIPv6addressesautomatically,theaddressesarelisted.IPv6LinkLocalAddressShowstheIPv6LinkLocaladdress,whichistheIPv6addressusedbythelocalphysicallink.ThelinklocaladdressisnotconfigurableandisassignedbyusingtheIPv6NeighborDiscoveryprocess.DefaultIPv6GatewayEnterthedefaultIPv6gateway.Note:Afteryouconfigurethewiredsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table17:EthernetSettingsPage(Cont.)FieldDescription
WirelessSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page54UnifiedAccessPointAdministrator’sGuideWirelessSettingsWirelesssettingsdescribeaspectsofthelocalareanetwork(LAN)relatedspecificallytotheradiodeviceintheaccesspoint(802.11ModeandChannel)andtothenetworkinterfacetotheaccesspoint(MACaddressforaccesspointandWirelessNetworkname,alsoknownasSSID).Toconfigurethewirelessinterface,clicktheManage>WirelessSettingstab.Figure14:WirelessInterfaceConfiguration
WirelessSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page55UnifiedAccessPointAdministrator’sGuideTable18describesthefieldsandconfigurationoptionsavailableontheWirelessSettingspage.Table18:WirelessSettingsField DescriptionTSPECViolationIntervalSpecifythetimeinterval(inseconds)fortheAPtoreport(throughthesystemlogandSNMPtraps)associatedclientsthatdonotadheretomandatoryadmissioncontrolprocedures.RadioInterface Specifywhetheryouwanttheradiointerfaceonoroff.MACAddress IndicatestheMediaAccessControl(MAC)addressesfortheinterface.Dual‐radioAPshaveauniqueMACaddressforeachradio.AMACaddressisapermanent,uniquehardwareaddressforanydevicethatrepresentsaninterfacetothenetwork.TheMACaddressisassignedbythemanufacturer.YoucannotchangetheMACaddress.Itisprovidedhereforinformationalpurposesasauniqueidentifierforaninterface.Mode TheModedefinesthePhysicalLayer(PHY)standardtheradiouses.Note:Themodesavailabledependonthecountrycodesettingandtheradioselected.Selectoneofthefollowingmodesforradio1(DWL‐6600APandDWL‐8600APonly):•IEEE802.11aisaPHYstandardthatspecifiesoperatinginthe5GHzU‐NIIbandusingorthogonalfrequencydivisionmultiplexing(OFDM).Itsupportsdataratesrangingfrom6to54Mbps.•IEEE802.11a/noperatesinthe5GHzISMbandandincludessupportforboth802.11aand802.11ndevices.IEEE802.11nisanextensionofthe802.11standardthatincludesmultiple‐inputmultiple‐output(MIMO)technology.IEEE802.11nsupportsdatarangesofupto248Mbpsandnearlytwicetheindoorrangeof802.11b,802.11g,and802.11a.•5GHzIEEE802.11nistherecommendedmodefornetworkswith802.11ndevicesthatoperateinthe5GHzfrequencythatdonotneedtosupport802.11adevices.IEEE802.11ncanachieveahigherthroughputwhenitdoesnotneedtobecompatiblewithlegacydevices(802.11a).Selectoneofthefollowingmodesforradio2:•IEEE802.11b/goperatesinthe2.4GHzISMband.IEEE802.11bisanenhancementoftheinitial802.11PHYtoinclude5.5Mbpsand11Mbpsdatarates.Itusesdirectsequencespreadspectrum(DSSS)orfrequencyhoppingspreadspectrum(FHSS)aswellascomplementarycodekeying(CCK)toprovidethehigherdatarates.Itsupportsdataratesrangingfrom1to11Mbps.IEEE802.11gisahigherspeedextension(upto54Mbps)tothe802.11bPHY.Itusesorthogonalfrequencydivisionmultiplexing(OFDM).Itsupportsdataratesrangingfrom1to54Mbps.•IEEE802.11b/g/noperatesinthe2.4GHzISMbandandincludessupportfor802.11b,802.11g,and802.11ndevices.•2.4GHzIEEE802.11nistherecommendedmodefornetworkswith802.11ndevicesthatoperateinthe2.4GHzfrequencythatdonotneedtosupport802.11b/gdevices.IEEE802.11ncanachieveahigherthroughputwhenitdoesnotneedtobecompatiblewithlegacydevices(802.11b/g).
WirelessSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page56UnifiedAccessPointAdministrator’sGuideChannel SelecttheChannel.Therangeofavailablechannelsisdeterminedbythemodeoftheradiointerfaceandthecountrycodesetting.IfyouselectAutoforthechannelsetting,theAPscansavailablechannelsandselectsachannelwherenotrafficisdetected.TheChanneldefinestheportionoftheradiospectrumtheradiousesfortransmittingandreceiving.Eachmodeoffersanumberofchannels,dependingonhowthespectrumislicensedbynationalandtransnationalauthoritiessuchastheFederalCommunicationsCommission(FCC)ortheInternationalTelecommunicationUnion(ITU‐R).WhenautomaticchannelassignmentisenabledontheChannelManagementpageforClustering,thechannelpolicyfortheradioisautomaticallysettostaticmode,andtheAutooptionisnotavailablefortheChannelfield.Thisallowstheautomaticchannelfeaturetosetthechannelsfortheradiosinthecluster.StationIsolation ToenableStationIsolation,selectthecheckboxdirectlybesideit.WhenStationIsolationisdisabled,wirelessclientscancommunicatewithoneanothernormallybysendingtrafficthroughtheAP.WhenStationIsolationisenabled,theAPblockscommunicationbetweenwirelessclientsonthesameradioandVAP.TheAPstillallowsdatatrafficbetweenitswirelessclientsandwireddevicesonthenetwork,acrossaWDSlink,andwithotherwirelessclientsassociatedwithadifferentVAP,butnotamongwirelessclientsassociatedwiththesameVAP.Note:Ondual‐radioAPs,StationIsolationdoesnotblockcommunicationbetweenRadio1andRadio2,eveniftheVAPconfigurationoneachradioisthesame.AeroScout™EngineProtocolSupportAeroScoutEnginesupportprovideslocation‐basedservicesforwirelessnetworks.SpecifywhethertoenablesupportfortheAeroScoutprotocol.OptionsareEnabledorDisabled.ThedefaultisDisabled.Whenenabled,AeroscoutdevicesarerecognizedanddataissenttoanAeroscoutEngine(AE)foranalysis.TheAEdeterminesthegeographicallocationof802.11‐capabledevices,suchasSTAs,APs,andAeroScout’slineof802.11‐enabledRFIDdevices,ortags.TheAEcommunicateswithAPsthatsupporttheAEprotocolinordertocollectinformationabouttheRFdevicesdetectedbytheAPs.UsingtheAEprotocol,D‐LinksupportsdirectcommunicationbetweenAEandtheAPs.Whenoperatinginmanagedmode,theAEisconfiguredwiththeIPaddressofthemanagedaccesspointsfromwhichitcollectsinformation.TheWirelessSwitchcannotcommunicatewiththeAE.FormoreinformationabouttheAeroScoutprotocol,see“EnablingAeroScout™EngineSupport”onpage57.Note:OnlyAeroScouttaghardwareoftypesT2andT3areexplicitlysupported.OthertagmodelsarealsosupportedonlyiftheirimplementationoftheAeroScoutprotocolconformstotheAeroScoutEngine‐AccessPointInterfaceSpecification,version2.1.Note:AeroScouttagsoperateonlyin802.11b/gmode.Therefore,networkadministratorswhousetheAeroScouttagsmustconfigureatleastoneradioonAPsthatareexpectedtodetecttagsineither802.11b/gor802.11b/g/nmode.Theradiosconfiguredin2.4GHzIEEE802.11modeoranyofthe5GHZmodescannotdetectAeroScouttags.Note:TheAEprotocolallowsaccesspointstomarkdetectedAPsasroguedevices.TheD‐LinkAPsdonotsupportthisfeatureandneverreportdetectedAPsasrogues.Table18:WirelessSettings(Cont.)Field Description
WirelessSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page57UnifiedAccessPointAdministrator’sGuideUsingthe802.11hWirelessModeFor802.11aradios,iftheregulatorydomainrequiresradardetectiononthechannel,theDynamicFrequencySelection(DFS)andTransmitPowerControl(TPC)featuresof802.11hareautomaticallyactivated.ThereareanumberofkeypointsabouttheIEEE802.11hstandard:•802.11honlyworksforthe802.11aband.Itisnotrequiredfor802.11bor802.11g.•Ifyouareoperatinginan802.11henableddomain,theAPattemptstousethechannelyouassign.Ifthechannelhasbeenblockedbyapreviousradardetection,oriftheAPdetectsaradaronthechannel,thentheAPautomaticallyselectsadifferentchannel.•When802.11hisenabled,theAPwillnotbeoperationalinthe5GHzbandforatleast60secondsduetoradarscanning.•SettingupWDSlinksmaybedifficultwhen802.11hisoperational.ThisisbecausetheoperatingchannelsofthetwoAPsontheWDSlinkmaykeepchangingdependingonchannelusageandradarinterference.WDSwillonlyworkifboththeAPsoperateonthesamechannel.FormoreinformationonWDS,see“ConfiguringLoadBalancing”onpage88.EnablingAeroScout™EngineSupportTheAeroScoutEngine(AE)isasoftwareplatformproducedbyAeroScoutInc.forlocation‐basedservices.TheAEcandeterminethephysicallocationof802.11‐capableAeroScoutdevices.TheAEcommunicateswithAPsthathavetheAEprotocolenabledinordertocollectinformationabouttheRFdevicesdetectedbytheAPs.TheDWS‐4000SeriesswitchsupportsonlydirectcommunicationbetweentheAEandtheAPs.Whenoperatinginmanagedmode,theAEisconfiguredwiththeIPaddressofthemanagedaccesspointsfromwhichitcollectsinformation.TheDWS‐4000SeriesswitchdoesnotcommunicatewiththeAE.AeroScouttagsoperateonlyin802.11b/gmode.Therefore,networkadministratorswhousetheAeroScouttagsmustconfigureatleastoneradioonAPsthatareexpectedtodetecttagsineither802.11b/gor 802.11b/g/nmode.Theradiosconfiguredin2.4GHzIEEE802.11nmodeoranyofthe5GHzmodescannotdetectAeroScouttags.Note:Afteryouconfigurethewirelesssettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page58UnifiedAccessPointAdministrator’sGuideModifyingRadioSettingsRadiosettingsdirectlycontrolthebehavioroftheradiodevicesintheAPanditsinteractionwiththephysicalmedium;thatis,howandwhattypeofelectromagneticwavestheAPemits.Tospecifyradiosettings,clicktheRadiotabintheManagesection.Differentsettingsdisplaydependingonthemodeyouselect.AllsettingsaredescribedinTable19onpage60.Figure15:ConfiguringRadioSettingsNote:ThefollowingnotesapplytoAeroScoutproductandprotocolsupport:•D‐LinkdoesnotsellAeroScoutproducts.ContactAeroScoutforAeroScouthardware,softwareordeploymentinformation.•TheAEprotocoldoesnotsupportanyauthenticationorencryptionbetweentheAEserverandtheaccesspoint.•TheAEprotocolrequiresradiostooperateinpromiscuousmode.ThismeansthattheAPreceivesandprocessesallpacketsdetectedbytheradios,asopposedtoprocessingonlypacketsdestinedtotheAPsBSSID.ThiscanaffectAPthroughput.
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page59UnifiedAccessPointAdministrator’sGuideFigure16:ConfiguringRadioSettings(Continued)
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page60UnifiedAccessPointAdministrator’sGuideTable19describesthefieldsandconfigurationoptionsfortheRadioSettingspage.Note:TheDWL‐3600APsupportsonlyoneradio,anditoperatesinthe2.4GHzband(802.11b/g/n).SomefieldsinthefollowingtablearenotavailablefortheDWL‐3600AP.Table19:RadioSettingsField DescriptionRadio SelectRadio1orRadio2tospecifywhichradiotoconfigure.Therestofthesettingsonthispageapplytotheradioyouselectinthisfield.Besuretoconfiguresettingsforbothradios.Radio1operatesinthe5GHzband(802.11a/n),andRadio2operatesinthe2.4GHzband(802.11b/g/n).Status(On/Off) SpecifywhetheryouwanttheradioonoroffbyclickingOnorOff.Ifyouturnoffaradio,theAPsendsdisassociationframestoallthewirelessclientsitiscurrentlysupportingsothattheradiocanbegracefullyshutdownandtheclientscanstarttheassociationprocesswithotheravailableAPs.Mode TheModedefinesthePhysicalLayer(PHY)standardtheradiouses.Note:Themodesavailabledependontheradioselected.Selectoneofthefollowingmodesforradio1(DWL‐6600APandDWL‐8600APonly):•IEEE802.11aisaPHYstandardthatspecifiesoperatinginthe5GHzU‐NIIbandusingorthogonalfrequencydivisionmultiplexing(OFDM).Itsupportsdataratesrangingfrom6to54Mbps.•IEEE802.11a/noperatesinthe5GHzISMbandandincludessupportforboth802.11aand802.11ndevices.IEEE802.11nisanextensionofthe802.11standardthatincludesmultiple‐inputmultiple‐output(MIMO)technology.IEEE802.11nsupportsdatarangesofupto248Mbpsandnearlytwicetheindoorrangeof802.11b,802.11g,and802.11a.•5GHzIEEE802.11nistherecommendedmodefornetworkswith802.11ndevicesthatoperateinthe5GHzfrequencythatdonotneedtosupport802.11adevices.IEEE802.11ncanachieveahigherthroughputwhenitdoesnotneedtobecompatiblewithlegacydevices(802.11a).Selectoneofthefollowingmodesforradio2:•IEEE802.11b/goperatesinthe2.4GHzISMband.IEEE802.11bisanenhancementoftheinitial802.11PHYtoinclude5.5Mbpsand11Mbpsdatarates.Itusesdirectsequencespreadspectrum(DSSS)orfrequencyhoppingspreadspectrum(FHSS)aswellascomplementarycodekeying(CCK)toprovidethehigherdatarates.Itsupportsdataratesrangingfrom1to11Mbps.IEEE802.11gisahigherspeedextension(upto54Mbps)tothe802.11bPHY.Itusesorthogonalfrequencydivisionmultiplexing(OFDM).Itsupportsdataratesrangingfrom1to54Mbps.•IEEE802.11b/g/noperatesinthe2.4GHzISMbandandincludessupportfor802.11b,802.11g,and802.11ndevices.•2.4GHzIEEE802.11nistherecommendedmodefornetworkswith802.11ndevicesthatoperateinthe2.4GHzfrequencythatdonotneedtosupport802.11b/gdevices.IEEE802.11ncanachieveahigherthroughputwhenitdoesnotneedtobecompatiblewithlegacydevices(802.11b/g).
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page61UnifiedAccessPointAdministrator’sGuideChannel SelecttheChannel.Therangeofavailablechannelsisdeterminedbythemodeoftheradiointerfaceandthecountrycodesetting.IfyouselectAutoforthechannelsetting,theAPscansavailablechannelsandselectsachannelwherenotrafficisdetected.Thechanneldefinestheportionoftheradiospectrumtheradiousesfortransmittingandreceiving.Eachmodeoffersanumberofchannels,dependingonhowthespectrumislicensedbynationalandtransnationalauthoritiessuchastheFederalCommunicationsCommission(FCC)ortheInternationalTelecommunicationUnion(ITU‐R).WhenautomaticchannelassignmentisenabledontheChannelManagementpageforClustering,thechannelpolicyfortheradioisautomaticallysettostaticmode,andtheAutooptionisnotavailablefortheChannelfield.Thisallowstheautomaticchannelfeaturetosetthechannelsfortheradiosinthecluster.ChannelBandwidth(802.11nmodesonly)The802.11nspecificationallowsa40‐MHz‐widechannelinadditiontothelegacy20‐MHzchannelavailablewithothermodes.The40‐MHzchannelenableshigherdataratesbutleavesfewerchannelsavailableforusebyother2.4GHzand5GHzdevices.Setthefieldto20‐MHztorestricttheuseofthechannelbandwidthtoa20‐MHzchannel.PrimaryChannel(802.11nmodesonly)Thissettingcanbechangedonlywhenthechannelbandwidthissetto40MHz.A40‐MHzchannelcanbeconsideredtoconsistoftwo20‐MHzchannelsthatarecontiguousinthefrequencydomain.Thesetwo20‐MHzchannelsareoftenreferredtoasthePrimaryandSecondarychannels.ThePrimaryChannelisusedfor802.11nclientsthatsupportonlya20‐MHzchannelbandwidthandforlegacyclients.Selectoneofthefollowingoptions:• Upper—SetthePrimaryChannelastheupper20‐MHzchannelinthe40‐MHzband.•Lower—SetthePrimaryChannelasthelower20‐MHzchannelinthe40‐MHzband.ShortGuardIntervalSupportedThisfieldisavailableonlyiftheselectedradiomodeincludes802.11n.Theguardintervalisthedeadtime,innanoseconds,betweenOFDMsymbols.TheguardintervalpreventsInter‐SymbolandInter‐CarrierInterference(ISI,ICI).The802.11nmodeallowsforareductioninthisguardintervalfromtheaandgdefinitionof800nanosecondsto400nanoseconds.Reducingtheguardintervalcanyielda10%improvementindatathroughput.Selectoneofthefollowingoptions:•Yes—TheAPtransmitsdatausinga400nsguardIntervalwhencommunicatingwithclientsthatalsosupporttheshortguardinterval.•No—TheAPtransmitsdatausingan800nsguardinterval.STBCMode Thisfieldisavailableonlyiftheselectedradiomodeincludes802.11n.SpaceTimeBlockCoding(STBC)isan802.11ntechniqueintendedtoimprovethereliabilityofdatatransmissions.Thedatastreamistransmittedonmultipleantennassothereceivingsystemhasabetterchanceofdetectingatleastoneofthedatastreams.Selectoneofthefollowingoptions:•On—TheAPtransmitsthesamedatastreamonmultipleantennasatthesametime.•Off—TheAPdoesnottransmitsthesamedataonmultipleantennas.Table19:RadioSettings(Cont.)Field Description
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page62UnifiedAccessPointAdministrator’sGuideProtectionTheprotectionfeaturecontainsrulestoguaranteethat802.11ntransmissionsdonotcauseinterferencewithlegacystationsorAPs.Bydefault,theseprotectionmechanismsareenabled(Auto).Withprotectionenabled,protectionmechanismswillbeinvokediflegacydevicesarewithinrangeoftheAP.Thiscausesmoreoverheadoneverytransmission,whichwillimpactperformance.However,thereisnoimpactonperformanceiftherearenolegacydeviceswithinrangeoftheAP.Youcandisable(Off)theseprotectionmechanisms;however,when802.11nprotectionisoff,legacyclientsorAPswithinrangecanbeaffectedby802.11ntransmissions.The802.11protectionfeatureisalsoavailablewhenthemodeis802.11b/g.Whenprotectionisenabledinthismode,itprotects802.11bclientsandAPsfrom802.11gtransmissions.Note:ThissettingdoesnotaffecttheabilityoftheclienttoassociatewiththeAP.BeaconInterval BeaconframesaretransmittedbyanAPatregularintervalstoannouncetheexistenceofthewirelessnetwork.Thedefaultbehavioristosendabeaconframeonceevery100milliseconds(or10persecond).Enteravaluefrom20to2000milliseconds.DTIMPeriod SpecifyaDTIMperiodfrom1to255beacons.TheDeliveryTrafficInformationMap(DTIM)messageisanelementincludedinsomeBeaconframes.Itindicateswhichclientstations,currentlysleepinginlow‐powermode,havedatabufferedontheAPawaitingpick‐up.TheDTIMperiodyouspecifyindicateshowoftentheclientsservedbythisAPshouldcheckforbuffereddatastillontheAPawaitingpickup.Themeasurementisinbeacons.Forexample,ifyousetthisfieldto1,clientswillcheckforbuffereddataontheAPateverybeacon.Ifyousetthisfieldto10,clientswillcheckonevery10thbeacon.Fragmentation ThresholdSpecifyanumberbetween256and2,346tosettheframesizethresholdinbytes.Thefragmentationthresholdisawayoflimitingthesizeofpackets(frames)transmittedoverthenetwork.Ifapacketexceedsthefragmentationthresholdyouset,thefragmentationfunctionisactivatedandthepacketissentasmultiple802.11frames.Ifthepacketbeingtransmittedisequaltoorlessthanthethreshold,fragmentationisnotused.Settingthethresholdtothelargestvalue(2,346bytes)effectivelydisablesfragmentation.FragmentationplaysnorolewhenAggregationisenabled.Fragmentationinvolvesmoreoverheadbothbecauseoftheextraworkofdividingupandreassemblingofframesitrequires,andbecauseitincreasesmessagetrafficonthenetwork.However,fragmentationcanhelpimprovenetworkperformanceandreliabilityifproperlyconfigured.Sendingsmallerframes(byusinglowerfragmentationthreshold)mighthelpwithsomeinterferenceproblems;forexample,withmicrowaveovens.Bydefault,fragmentationisoff.Werecommendnotusingfragmentationunlessyoususpectradiointerference.Theadditionalheadersappliedtoeachfragmentincreasetheoverheadonthenetworkandcangreatlyreducethroughput.Table19:RadioSettings(Cont.)Field Description
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page63UnifiedAccessPointAdministrator’sGuideRTSThreshold SpecifyaRequesttoSend(RTS)Thresholdvaluebetween0and2347.TheRTSthresholdindicatesthenumberofoctetsinanMPDU,belowwhichanRTS/CTShandshakeisnotperformed.ChangingtheRTSthresholdcanhelpcontroltrafficflowthroughtheAP,especiallyonewithalotofclients.Ifyouspecifyalowthresholdvalue,RTSpacketswillbesentmorefrequently.Thiswillconsumemorebandwidthandreducethethroughputofthepacket.Ontheotherhand,sendingmoreRTSpacketscanhelpthenetworkrecoverfrominterferenceorcollisionswhichmightoccuronabusynetwork,oronanetworkexperiencingelectromagneticinterference.MaximumStations SpecifythemaximumnumberofstationsallowedtoaccessthisAPatanyonetime.Youcanenteravaluebetween0and200.TransmitPower EnterapercentagevalueforthetransmitpowerlevelforthisAP.Thedefaultvalue,whichis100%,canbemorecost‐efficientthanalowerpercentagesinceitgivestheAPamaximumbroadcastrangeandreducesthenumberofAPsneeded.Toincreasecapacityofthenetwork,placeAPsclosertogetherandreducethevalueofthetransmitpower.ThishelpsreduceoverlapandinterferenceamongAPs.Alowertransmitpowersettingcanalsokeepyournetworkmoresecurebecauseweakerwirelesssignalsarelesslikelytopropagateoutsideofthephysicallocationofyournetwork.FixedMulticastRateSelectthemulticasttraffictransmissionrateyouwanttheAPtosupport.LegacyRateSets CheckthetransmissionratesetsyouwanttheAPtosupportandthebasicratesetsyouwanttheAPtoadvertise:•Ratesareexpressedinmegabitspersecond.•SupportedRateSetsindicateratesthattheAPsupports.Youcancheckmultiplerates(clickacheckboxtoselectorde‐selectarate).TheAPwillautomaticallychoosethemostefficientratebasedonfactorslikeerrorratesanddistanceofclientstationsfromtheAP.•BasicRateSetsindicateratesthattheAPwilladvertisetothenetworkforthepurposesofsettingupcommunicationwithotherAPsandclientstationsonthenetwork.ItisgenerallymoreefficienttohaveanAPbroadcastasubsetofitssupportedratesets.MCS(DataRate)Settings(802.11nmodesonly)ThisfieldshowstheModulationandCodingScheme(MCS)indexvaluessupportedbytheradio.Eachindexcanbeenabledanddisabledindependently.Broadcast/MulticastRateLimitingEnablingmulticastandbroadcastratelimitingcanimproveoverallnetworkperformancebylimitingthenumberofpacketstransmittedacrossthenetwork.BydefaulttheMulticast/BroadcastRateLimitingoptionisdisabled.UntilyouenableMulticast/BroadcastRateLimiting,thefollowingfieldswillbedisabled.Broadcast/MulticastRateLimitEntertheratelimityouwanttosetformulticastandbroadcasttraffic.Thelimitshouldbegreaterthan1,butlessthan50packetspersecond.Anytrafficthatfallsbelowthisratelimitwillalwaysconformandbetransmittedtotheappropriatedestination.Thedefaultandmaximumratelimitsettingis50packetspersecond.Broadcast/MulticastRateLimitBurstSettingaratelimitburstdetermineshowmuchtrafficburstscanbebeforealltrafficexceedstheratelimit.Thisburstlimitallowsintermittentburstsoftrafficonanetworkabovethesetratelimit.Thedefaultandmaximumratelimitburstsettingis75packetspersecond.Table19:RadioSettings(Cont.)Field Description
ModifyingRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page64UnifiedAccessPointAdministrator’sGuideUsetheRadiopagetoconfigurebothRadioOneandRadioTwo.ThesettingsonthepageapplyonlytotheradiothatyouchoosefromtheRadiodrop‐downlist.Afteryouconfiguresettingsforoneoftheradios,clickApplyandthenselectandconfiguretheotherradio.BesuretoclickApplytoapplythesecondsetofconfigurationsettingsfortheotherradio.TSPECMode RegulatestheoverallTSPECmodeontheAP.Theoptionsare:•On—TheAPhandlesTSPECrequestsaccordingtotheTSPECsettingsyouconfigureontheRadiopage.UsethissettingiftheAPhandlestrafficfromQoS‐capabledevices,suchasaWi‐FiCERTIFIEDphone.•Off—TheAPignoresTSPECrequestsfromclientstations.UsethissettingifyoudonotwanttouseTSPECtogiveQoS‐capabledevicespriorityfortime‐sensitivetraffic.TSPECVoiceACMModeRegulatesmandatoryadmissioncontrol(ACM)forthevoiceaccesscategory.Theoptionsare:•On—AstationisrequiredtosendaTSPECrequestforbandwidthtotheAPbeforesendingorreceivingavoicetrafficstream.TheAPrespondswiththeresultoftherequest,whichincludestheallottedmediumtimeiftheTSPECwasadmitted.•Off—AstationcansendandreceivevoiceprioritytrafficwithoutrequiringanadmittedTSPEC;theAPignoresvoiceTSPECrequestsfromclientstations.TSPECVoiceACMLimitSpecifyanupperlimitontheamountoftraffictheAPattemptstotransmitonthewirelessmediumusingavoiceACtogainaccess.TSPECVideoACMModeRegulatesmandatoryadmissioncontrolforthevideoaccesscategory.Theoptionsare:•On—AstationisrequiredtosendaTSPECrequestforbandwidthtotheAPbeforesendingorreceivingavideotrafficstream.TheAPrespondswiththeresultoftherequest,whichincludestheallottedmediumtimeiftheTSPECwasadmitted.•Off—AstationcansendandreceivevideoprioritytrafficwithoutrequiringanadmittedTSPEC;theAPignoresvideoTSPECrequestsfromclientstations.TSPECVideoACMLimitSpecifyanupperlimitontheamountoftraffictheAPattemptstotransmitonthewirelessmediumusingavideoACtogainaccess.TSPECAPInactivityTimeoutSpecifytheamountoftimeforanAPtodetectandownlinkTSasidlebeforedeletingit.TSPECStationInactivityTimeoutSpecifytheamountoftimeforanAPtodetectanuplinkTSasidlebeforedeletingit.TSPECLegacyWMMQueueMapModeSelectEnabletoallowintermixingoflegacytrafficonqueuesoperatingasACM.Table19:RadioSettings(Cont.)Field Description
ConfiguringRadioandVAPSchedulerD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page65UnifiedAccessPointAdministrator’sGuideConfiguringRadioandVAPSchedulerTheRadioandVAPschedulerisastandaloneDWL‐x600APfeature.ToconfiguretheRadioandVAPscheduler,selecttheSchedulertabintheManagesection.TheRadioandVAPSchedulerallowsyoutoconfigurearulewithaspecifictimeintervalforVAPsorradiostobeoperational,therebyautomatingtheenablingordisablingoftheVAPsandRadios.Oneofthewaysyoucanusethisfeatureistoscheduleradiostooperateonlyduringtheofficeworkinghoursinordertoachievesecurityandreducepowerconsumption.YoucanalsousetheSchedulertoallowaccesstoVAPsforwirelessclientsonlyduringspecifictimesofday.Eachrulespecifiesthestarttime,endtimeandday(ordays)oftheweektheradioorVAPcanbeoperational.Therulesareperiodicinnatureandarerepeatedeveryweek.Avalidrulemustcontainallofthefollowingparameters:•DaysoftheWeek•StartTime(hourandminutes)•EndTime(hourandminutes)Onlyvalidrulesareaddedtotheprofile.Upto16rulesaregroupedtogethertoformaschedulingprofile.Anytwoperiodicrulestimeentriesbelongingtothesameprofilemustnotoverlap.Thetimegranularityfortheschedulesisoneminute.TheDWL‐x600APsupportsupto16profiles.Figure17:SchedulerConfiguration
ConfiguringRadioandVAPSchedulerD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page66UnifiedAccessPointAdministrator’sGuideTable20:SchedulerConfigurationField DescriptionGlobalSchedulerMode Aglobalswitchtoenableordisabletheschedulerfeature.ThedefaultisDisable.SchedulerOperationalStatusStatus TheoperationalstatusoftheScheduler.TherangeisUporDown.ThedefaultisDown.Reason Providesadditionalinformationaboutthestatus.Thereasoncanbeoneormoreofthefollowing:• IsActive–Operationalstatusisup.• ConfigDown–Operationalstatusisdownbecauseglobalconfigurationisdisabled.• TimeNotSet–OperationalstatusisdownbecausetheAPtimehasnotbeenset,eithermanuallyorbyspecifyinganNTPservertouse.•ManagedMode–OperationalstatusisdownbecausetheAPisinmanagedmode.SchedulerProfile TheSchedulerprofiledefinesthelistofprofilesnamesthatcanbeassociatedtotheVAPorRadioconfiguration.Rulesareassociatedwithanamedschedulerprofile.Youcandefineupto16schedulerprofilenames.Bydefault,noprofilesarecreated.Theprofilenamecanbeupto32alphanumericcharacters.ClickAddtoaddtheprofilename.Rule Configuration Eachschedulerprofilemayhaveupto16periodicrules.Thelistofparametersforeachperiodicrulearedescribedbelow.SelectProfile Selecttheprofilenamefromthemenu.SetSchedule Thedayoftheweek.Rangeis:Daily,Weekday(MondaytoFriday),Weekend(SaturdayandSunday),Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday.ThedefaultisDaily.StartTime ThetimewhentheradioorVAPwillbeoperationallyenabled.ThetimeisinHH:MM24‐hourformat.Therangeis<00‐24>:<00‐59>.Thedefaultis00:00.EndTime ThetimewhentheradioorVAPwillbeoperationallydisabled.ThetimeisinHH:MM24‐hourformat.Therangeis<00‐24>:<00‐59>.Thedefaultis00:00.
ConfiguringRadioandVAPSchedulerD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page67UnifiedAccessPointAdministrator’sGuideTochangeanexistingrule,selecttherule,updatethevaluesintheRuleConfigurationarea,andclickModifyRule.Figure18:ModifyRuleConfigurationClickApplytosavethenewconfigurationsettings.Note:Aftermakinganymodifications,youmustclickApplytoapplythechangesandtosavethesettings.
SchedulerAssociationSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page68UnifiedAccessPointAdministrator’sGuideSchedulerAssociationSettingsForaSchedulerprofiletotakeeffect,youmustassociateitwithatleastoneradioorVAPinterface.ToassociatetheSchedulerprofiles,selecttheSchedulerAssociationtabintheManagesection.Bydefault,therearenoSchedulerprofilescreated,sonoprofileisassociatedtoanyradioorVAP.TheSchedulerprofileneedstobeexplicitlyassociatedtoaradioorVAPconfiguration.OnlyoneSchedulerprofilecanbeassociatedtoanyradioorVAPconfiguration;however,asingleprofilecanbeassociatedtomultipleradiosorVAPs.IftheSchedulerprofileassociatedwithaVAPorradioisdeleted,thentheassociatedprofiletotheVAPorradioisremovedimplicitly.Iftheradioisoperationallydisabled,thenalltheVAPsassociatedtothatradioarealsooperationallydisabledirrespectiveoftheVAPconfiguration.Figure19:SchedulerAssociation
SchedulerAssociationSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page69UnifiedAccessPointAdministrator’sGuideTable21:SchedulerAssociationSettingsField DescriptionRadioSchedulerProfileOperationalStatus1or2Fromthemenu,selecttheSchedulerprofiletoassociatewithRadio1orRadio2.Note:TheDWL‐3600APsupportsonlyoneradio.Status TheoperationalstatusoftheScheduler.TherangeisUporDown.VAPSchedulerProfileOperationalStatusRadio Fromthemenu,selectRadio1orRadio2toassociatetheVAPSchedulerProfile.Note:ThisfieldisnotavailableontheDWL‐3600AP.0‐15 Fromthemenu,selecttheSchedulerprofiletoassociatewiththerespectiveVAP.Status TheoperationalstatusoftheScheduler.TherangeisUporDown.Note:AfteryouassociateaSchedulerprofilewithaRadiointerfaceoraVAPinterface,youmustclickApplytoapplythechangesandtosavethesettings.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page70UnifiedAccessPointAdministrator’sGuideVirtualAccessPointSettingsTochangeVAP0ortoenableandconfigureadditionalVAPs,selecttheVAPtabintheManagesection.VAPssegmentthewirelessLANintomultiplebroadcastdomainsthatarethewirelessequivalentofEthernetVLANs.VAPssimulatemultipleAPsinonephysicalAP.Eachradiosupportsupto16VAPs.ForeachVAP,youcancustomizethesecuritymodetocontrolwirelessclientaccess.EachVAPcanalsohaveauniqueSSID.MultipleSSIDsmakeasingleAPlookliketwoormoreAPstoothersystemsonthenetwork.ByconfiguringVAPs,youcanmaintainbettercontroloverbroadcastandmulticasttraffic,whichaffectsnetworkperformance.YoucanconfigureeachVAPtouseadifferentVLAN,oryoucanconfiguremultipleVAPstousethesameVLAN,whethertheVLANisonthesameradiooronadifferentradio.VAP0,whichisalwaysenabledonbothradios,isassignedtothedefaultVLAN1.TheAPaddsVLANIDtagstowirelessclienttrafficbasedontheVLANIDyouconfigureontheVAPpageorbyusingtheRADIUSserverassignment.IfyouuseanexternalRADIUSserver,youcanconfiguremultipleVLANsoneachVAP.TheexternalRADIUSserverassignswirelessclientstotheVLANwhentheclientsassociateandauthenticate.YoucanconfigureuptofourglobalIPv4orIPv6RADIUSservers.Oneoftheserversalwaysactsasaprimarywhiletheothersactasbackupservers.Thenetworktype(IPv4orIPv6)andaccountingmodearecommonacrossallconfiguredRADIUSservers.YoucanconfigureeachVAPtousetheglobalRADIUSserversettings,whichisthedefault,oryoucanconfigureaper‐VAPRADIUSserverset.YoucanalsoconfigureseparateRADIUSserversettingsforeachVAP.Forexample,youcanconfigureoneVAPtouseanIPv6RADIUSserverwhileotherVAPsusetheglobalIPv4RADIUSserversettingsyouconfigure.IfwirelessclientsuseasecuritymodethatdoesnotcommunicatewiththeRAIDUSserver,oriftheRADIUSserverdoesnotprovidetheVLANinformation,youcanassignaVLANIDtoeachVAP.TheAPassignstheVLANtoallwirelessclientsthatconnecttotheAPthroughthatVAP.TosetupmultipleVAPs,clickManage>VAP.Note:BeforeyouconfigureVLANsontheAP,besuretoverifythattheswitchandDHCPservertheAPusescansupportIEEE802.1QVLANencapsulation.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page71UnifiedAccessPointAdministrator’sGuideFigure20:SettingUpVirtualAccessPointsTable22describesthefieldsandconfigurationoptionsontheVAPpage.Table22:VirtualAccessPointSettingsField DescriptionRADIUSIPAddressTypeSpecifytheIPversionthattheRADIUSserveruses.YoucantogglebetweentheaddresstypestoconfigureIPv4andIPv6globalRADIUSaddresssettings,buttheAPcontactsonlytheRADIUSserverorserversfortheaddresstypeyouselectinthisfield.RADIUSIPAddressRADIUSIPv6AddressEntertheIPv4orIPv6addressfortheprimaryglobalRADIUSserver.Bydefault,eachVAPusestheglobalRADIUSsettingsthatyoudefinefortheAPatthetopoftheVAPpage.WhenthefirstwirelessclienttriestoauthenticatewiththeAP,theAPsendsanauthenticationrequesttotheprimaryserver.Iftheprimaryserverrespondstotheauthenticationrequest,theAPcontinuestousethisRADIUSserverastheprimaryserver,andauthenticationrequestsaresenttotheaddressyouspecify.IftheIPv4RADIUSIPAddressTypeoptionisselectedinthepreviousfield,entertheIPaddressoftheRADIUSserverthatallVAPsusebydefault,forexample192.168.10.23.IftheIPv6RADIUSIPAddressTypeoptionisselected,entertheIPv6addressoftheprimaryglobalRADIUSserver,forexample2001:0db8:1234::abcd.RADIUSIPorIPv6Address1–3EnteruptothreeIPv4orIPv6addressestouseasthebackupRADIUSservers.ThefieldlabelisRADIUSIPAddresswhentheIPv4RADIUSIPAddressTypeoptionisselectedandRADIUSIPv6AddresswhentheIPv6RADIUSIPAddressTypeoptionisselected.Ifauthenticationfailswiththeprimaryserver,eachconfiguredbackupserveristriedinsequence.TheIPv4orIPv6addressmustbevalidinorderfortheAPtoattempttocontacttheserver.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page72UnifiedAccessPointAdministrator’sGuideRADIUSKey EntertheRADIUSkeyinthetextbox.TheRADIUSKeyisthesharedsecretkeyfortheglobalRADIUSserver.Youcanuseupto63standardalphanumericandspecialcharacters.Thekeyiscasesensitive,andyoumustconfigurethesamekeyontheAPandonyourRADIUSserver.Thetextyouenterwillbedisplayedas“*”characterstopreventothersfromseeingtheRADIUSkeyasyoutype.RADIUSKey1–3EntertheRADIUSkeyassociatedwiththeconfiguredbackupRADIUSservers.TheserveratRADIUSIPAddress‐1usesRADIUSKey‐1,RADIUSIPAddress‐2usesRADIUSKey‐2,andsoon.EnableRADIUSAccountingSelectthisoptiontotrackandmeasuretheresourcesaparticularuserhasconsumedsuchassystemtime,amountofdatatransmittedandreceived,andsoon.IfyouenableRADIUSaccounting,itisenabledfortheprimaryRADIUSserverandallbackupservers.EnableRADIUSFailThroughSelectthisoptiontoallowthesecondaryRADIUSservertoauthenticatewirelessclientsiftheauthenticationwiththeprimaryRADIUSserverisunsuccessful,oriftheprimaryRADIUSserverisunavailable.Radio Selecttheradiotoconfigure.VAPsareconfiguredindependentlyoneachradio.Note:TheDWL‐3600APsupportsonlyoneradio.VAP Youcanconfigureupto16VAPsforeachradio.VAP0isthephysicalradiointerface,sotodisableVAP0,youmustdisabletheradio.Enabled Youcanenableordisableaconfigurednetwork.•Toenablethespecifiednetwork,selecttheEnabledoptionbesidetheappropriateVAP.•Todisablethespecifiednetwork,cleartheEnabledoptionbesidetheappropriateVAP.Ifyoudisablethespecifiednetwork,youwilllosetheVLANIDyouentered.VLANID WhenawirelessclientconnectstotheAPbyusingthisVAP,theAPtagsalltrafficfromthewirelessclientwiththeVLANIDyouenterinthisfieldunlessyouentertheuntaggedVLANIDoruseaRADIUSservertoassignawirelessclienttoaVLAN.TherangefortheVLANIDis1–4094.IfyouuseRADIUS‐basedauthenticationforclients,youcanoptionallyaddthefollowingattributestotheappropriatefileintheRADIUSorAAAservertoconfigureaVLANfortheclient:• “Tunnel‐Type”• “Tunnel‐Medium‐Type”• “Tunnel‐Private‐Group‐ID”TheRADIUS‐assignedVLANIDoverridestheVLANIDyouconfigureontheVAPpage.YouconfiguretheuntaggedandmanagementVLANIDsontheEthernetSettingspage.Formoreinformation,see“EthernetSettings”onpage51.SSID Enteranameforthewirelessnetwork.TheSSIDisanalphanumericstringofupto32characters.YoucanusethesameSSIDformultipleVAPs,oryoucanchooseauniqueSSIDforeachVAP.Note:IfyouareconnectedasawirelessclienttothesameAPthatyouareadministering,resettingtheSSIDwillcauseyoutoloseconnectivitytotheAP.YouwillneedtoreconnecttothenewSSIDafteryousavethisnewsetting.Table22:VirtualAccessPointSettings(Cont.)Field Description
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page73UnifiedAccessPointAdministrator’sGuideBroadcastSSID SpecifywhethertoallowtheAPtobroadcasttheServiceSetIdentifier(SSID)initsbeaconframes.TheBroadcastSSIDparameterisenabledbydefault.WhentheVAPdoesnotbroadcastitsSSID,thenetworknameisnotdisplayedinthelistofavailablenetworksonaclientstation.Instead,theclientmusthavetheexactnetworknameconfiguredinthesupplicantbeforeitisabletoconnect.•ToenabletheSSIDbroadcast,selecttheBroadcastSSIDcheckbox.•ToprohibittheSSIDbroadcast,cleartheBroadcastSSIDcheckbox.Note:DisablingthebroadcastSSIDissufficienttopreventclientsfromaccidentallyconnectingtoyournetwork,butitwillnotpreventeventhesimplestofattemptsbyahackertoconnectormonitorunencryptedtraffic.SuppressingtheSSIDbroadcastoffersaveryminimallevelofprotectiononanotherwiseexposednetwork(suchasaguestnetwork)wherethepriorityismakingiteasyforclientstogetaconnectionandwherenosensitiveinformationisavailable.Security SelectoneofthefollowingSecuritymodesforthisVAP:•None•StaticWEP•WPAPersonal• IEEE802.1X•WPAEnterpriseIfyouselectasecuritymodeotherthanNone,additionalfieldsappear.Thesefieldsareexplainedbelow.Note:TheSecuritymodeyousethereisspecificallyforthisVAP.MACAuthenticationTypeYoucanconfigureagloballistofMACaddressesthatareallowedordeniedaccesstothenetwork.Thedrop‐downmenuforthisfeatureallowsyoutoselectthetypeofMACAuthenticationtouse:• Disabled:DonotuseMACAuthentication.•Local:UsetheMACAuthenticationlistthatyouconfigureontheMACAuthenticationpage.•RADIUS:UsetheMACAuthenticationlistontheexternalRADIUSserver.FormoreinformationaboutMACAuthentication,see“ControllingAccessbyMACAuthentication”onpage85.RedirectMode EnabletheHTTPredirectfeaturetoredirectwirelessclientstoacustomWebpage.Whenredirectmodeisenabled,theuserwillberedirectedtotheURLyouspecifyafterthewirelessclientassociateswithanAPandtheuseropensaWebbrowserontheclienttoaccesstheInternet.ThecustomWebpagemustbelocatedonanexternalWebserverandmightcontaininformationsuchasthecompanylogoandnetworkusagepolicy.Note:ThewirelessclientisredirectedtotheexternalWebserveronlyoncewhileitisassociatedwiththeAP.RedirectURL SpecifytheURLwheretheWebbrowseristoberedirectedafterthewirelessclientassociateswiththeAPandsendsHTTPtraffic.Table22:VirtualAccessPointSettings(Cont.)Field Description
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page74UnifiedAccessPointAdministrator’sGuideNone(Plain‐text)IfyouselectNoneasyoursecuritymode,nofurtheroptionsareconfigurableontheAP.ThismodemeansthatanydatatransferredtoandfromtheUAPisnotencrypted.Thissecuritymodecanbeusefulduringinitialnetworkconfigurationorforproblemsolving,butitisnotrecommendedforregularuseontheInternalnetworkbecauseitisnotsecure.StaticWEPWiredEquivalentPrivacy(WEP)isadataencryptionprotocolfor802.11wirelessnetworks.AllwirelessstationsandAPsonthenetworkareconfiguredwithastatic64‐bit(40‐bitsecretkey+24‐bitinitializationvector(IV))or128‐bit(104‐bitsecretkey+24‐bitIV)SharedKeyfordataencryption.StaticWEPisnotthemostsecuremodeavailable,butitoffersmoreprotectionthansettingthesecuritymodetoNone(Plain‐text)asitdoespreventanoutsiderfromeasilysniffingoutunencryptedwirelesstraffic.WEPencryptsdatamovingacrossthewirelessnetworkbasedonastatickey.(TheencryptionalgorithmisastreamciphercalledRC4.)Note:AfteryouconfiguretheVAPsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table23:StaticWEPField DescriptionTransferKeyIndex Selectakeyindexfromthedrop‐downmenu.Keyindexes1through4areavailable.Thedefaultis1.TheTransferKeyIndexindicateswhichWEPkeytheAPwillusetoencryptthedataittransmits.KeyLength Specifythelengthofthekeybyclickingoneoftheradiobuttons:•64bits• 128bitsKeyType Selectthekeytypebyclickingoneoftheradiobuttons:•ASCII•Hex
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page75UnifiedAccessPointAdministrator’sGuideWEPKeys YoucanspecifyuptofourWEPkeys.Ineachtextbox,enterastringofcharactersforeachkey.Thekeysyouenterdependonthekeytypeselected:•ASCII—Includesupperandlowercasealphabeticletters,thenumericdigits,andspecialsymbolssuchas@and#.•Hex—Includesdigits0to9andthelettersAtoF.UsethesamenumberofcharactersforeachkeyasspecifiedintheCharactersRequiredfield.ThesearetheRC4WEPkeyssharedwiththestationsusingtheAP.EachclientstationmustbeconfiguredtouseoneofthesesameWEPkeysinthesameslotasspecifiedhereontheAP.CharactersRequired:ThenumberofcharactersyouenterintotheWEPKeyfieldsisdeterminedbytheKeylengthandKeytypeyouselect.Forexample,ifyouuse128‐bitASCIIkeys,youmustenter26charactersintheWEPkey.ThenumberofcharactersrequiredupdatesautomaticallybasedonhowyousetKeyLengthandKeyType.AuthenticationTheauthenticationalgorithmdefinesthemethodusedtodeterminewhetheraclientstationisallowedtoassociatewithanAPwhenstaticWEPisthesecuritymode.Specifytheauthenticationalgorithmyouwanttousebychoosingoneofthefollowingoptions:•OpenSystemauthenticationallowsanyclientstationtoassociatewiththeAPwhetherthatclientstationhasthecorrectWEPkeyornot.Thisalgorithmisalsousedinplaintext,IEEE802.1X,andWPAmodes.WhentheauthenticationalgorithmissettoOpenSystem,anyclientcanassociatewiththeAP.Note:JustbecauseaclientstationisallowedtoassociatedoesnotensureitcanexchangetrafficwithanAP.AstationmusthavethecorrectWEPkeytobeabletosuccessfullyaccessanddecryptdatafromanAP,andtotransmitreadabledatatotheAP.•SharedKeyauthenticationrequirestheclientstationtohavethecorrectWEPkeyinordertoassociatewiththeAP.WhentheauthenticationalgorithmissettoSharedKey,astationwithanincorrectWEPkeywillnotbeabletoassociatewiththeAP.•BothOpenSystemandSharedKey.Whenyouselectbothauthenticationalgorithms:– ClientstationsconfiguredtouseWEPinsharedkeymodemusthaveavalidWEPkeyinordertoassociatewiththeAP.– ClientstationsconfiguredtouseWEPasanopensystem(sharedkeymodenotenabled)willbeabletoassociatewiththeAPeveniftheydonothavethecorrectWEPkey.Table23:StaticWEP(Cont.)Field Description
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page76UnifiedAccessPointAdministrator’sGuideStaticWEPRulesIfyouuseStaticWEP,thefollowingrulesapply:•AllclientstationsmusthavetheWirelessLAN(WLAN)securitysettoWEP,andallclientsmusthaveoneoftheWEPkeysspecifiedontheAPinordertode‐codeAP‐to‐stationdatatransmissions.•TheAPmusthaveallkeysusedbyclientsforstation‐to‐APtransmitsothatitcande‐codethestationtransmissions.•Thesamekeymustoccupythesameslotonallnodes(APandclients).ForexampleiftheAPdefinesabc123keyasWEPkey3,thentheclientstationsmustdefinethatsamestringasWEPkey3.•Clientstationscanusedifferentkeystotransmitdatatotheaccesspoint.(Ortheycanallusethesamekey,butthisislesssecurebecauseitmeansonestationcandecryptthedatabeingsentbyanother.)•Onsomewirelessclientsoftware,youcanconfiguremultipleWEPkeysanddefineaclientstation“transferkeyindex”,andthensetthestationstoencryptthedatatheytransmitusingdifferentkeys.ThisensuresthatneighboringAPscannotdecodeeachother’stransmissions.•Youcannotmix64‐bitand128‐bitWEPkeysbetweentheaccesspointanditsclientstations.IEEE802.1XIEEE802.1Xisthestandarddefiningport‐basedauthenticationandinfrastructurefordoingkeymanagement.ExtensibleAuthenticationProtocol(EAP)messagessentoveranIEEE802.11wirelessnetworkusingaprotocolcalledEAPEncapsulationOverLANs(EAPOL).IEEE802.1Xprovidesdynamically‐generatedkeysthatareperiodicallyrefreshed.AnRC4streamcipherisusedtoencrypttheframebodyandcyclicredundancychecking(CRC)ofeach802.11frame.ThismoderequirestheuseofanexternalRADIUSservertoauthenticateusers.TheAPrequiresaRADIUSservercapableofEAP,suchastheMicrosoftInternetAuthenticationServer.ToworkwithWindowsclients,theauthenticationservermustsupportProtectedEAP(PEAP)andMSCHAPV2.YoucanuseanyofavarietyofauthenticationmethodsthattheIEEE802.1Xmodesupports,includingcertificates,Kerberos,andpublickeyauthentication.YoumustconfiguretheclientstationstousethesameauthenticationmethodtheAPuses.Table24:IEEE802.1XField DescriptionUseGlobalRADIUSServerSettingsBydefaulteachVAPusestheglobalRADIUSsettingsthatyoudefinefortheAPatthetopoftheVAPpage.However,youcanconfigureeachVAPtouseadifferentsetofRADIUSservers.TousetheglobalRADIUSserversettings,makesurethecheckboxisselected.TouseaseparateRADIUSserverfortheVAP,clearthecheckboxandentertheRADIUSserverIPaddressandkeyinthefollowingfields.RADIUSIPAddressTypeSpecifytheIPversionthattheRADIUSserveruses.YoucantogglebetweentheaddresstypestoconfigureIPv4andIPv6globalRADIUSaddresssettings,buttheAPcontactsonlytheRADIUSserverorserversfortheaddresstypeyouselectinthisfield.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page77UnifiedAccessPointAdministrator’sGuideRADIUSIPAddressRADIUSIPv6AddressEntertheIPv4orIPv6addressfortheprimaryRADIUSserverforthisVAP.IftheIPv4RADIUSIPAddressTypeoptionisselectedinthepreviousfield,entertheIPaddressoftheRADIUSserverthatallVAPsusebydefault,forexample192.168.10.23.IftheIPv6RADIUSIPAddressTypeoptionisselected,entertheIPv6addressoftheprimaryglobalRADIUSserver,forexample2001:0db8:1234::abcd.RADIUSIPorIPv6Address1–3EnteruptothreeIPv4and/orIPv6addressestouseasthebackupRADIUSserversforthisVAP.ThefieldlabelisRADIUSIPAddresswhentheIPv4RADIUSIPAddressTypeoptionisselectedandRADIUSIPv6AddresswhentheIPv6RADIUSIPAddressTypeoptionisselected.Ifauthenticationfailswiththeprimaryserver,eachconfiguredbackupserveristriedinsequence.RADIUSKey EntertheRADIUSkeyinthetextbox.TheRADIUSKeyisthesharedsecretkeyfortheglobalRADIUSserver.Youcanuseupto63standardalphanumericandspecialcharacters.Thekeyiscasesensitive,andyoumustconfigurethesamekeyontheAPandonyourRADIUSserver.Thetextyouenterwillbedisplayedas“*”characterstopreventothersfromseeingtheRADIUSkeyasyoutype.RADIUSKey1–3EntertheRADIUSkeyassociatedwiththeconfiguredbackupRADIUSservers.TheserveratRADIUSIPAddress‐1usesRADIUSKey‐1,RADIUSIPAddress‐2usesRADIUSKey‐2,andsoon.EnableRADIUSAccountingSelectthisoptiontotrackandmeasuretheresourcesaparticularuserhasconsumedsuchassystemtime,amountofdatatransmittedandreceived,andsoon.IfyouenableRADIUSaccounting,itisenabledfortheprimaryRADIUSserverandallbackupservers.EnableRADIUSFailThroughSelectthisoptiontoallowthesecondaryRADIUSservertoauthenticatewirelessclientsiftheauthenticationwiththeprimaryRADIUSserverisunsuccessful,oriftheprimaryRADIUSserverisunavailable.ActiveServer SpecifywhichconfiguredRADIUSservertouseastheactiveRADIUSserver.BroadcastKeyRefreshRateEnteravaluetosettheintervalatwhichthebroadcast(group)keyisrefreshedforclientsassociatedtothisVAP(thedefaultis300).Thevalidrangeis0–86400seconds.Avalueof0indicatesthatthebroadcastkeyisnotrefreshed.SessionKeyRefreshRateEnteravaluetosettheintervalatwhichtheAPwillrefreshsession(unicast)keysforeachclientassociatedtotheVAP.Thevalidrangeis0–86400seconds.Avalueof0indicatesthatthebroadcastkeyisnotrefreshed.Note:Afteryouconfigurethesecuritysettings,youmustclickApplytoapplythechangesandtosavethesettings.Table24:IEEE802.1X(Cont.)Field Description
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page78UnifiedAccessPointAdministrator’sGuideWPAPersonalWPAPersonalisaWi‐FiAllianceIEEE802.11istandard,whichincludesAES‐CCMPandTKIPmechanisms.ThePersonalversionofWPAemploysapre‐sharedkey(insteadofusingIEEE802.1XandEAPasisusedintheEnterpriseWPAsecuritymode).ThePSKisusedforaninitialcheckofcredentialsonly.Thissecuritymodeisbackwards‐compatibleforwirelessclientsthatsupporttheoriginalWPA.Table25:WPAPersonalField DescriptionWPAVersions Selectthetypesofclientstationsyouwanttosupport:WPA.IfallclientstationsonthenetworksupporttheoriginalWPAbutnonesupportthenewerWPA2,thenselectWPA.WPA2.IfallclientstationsonthenetworksupportWPA2,wesuggestusingWPA2whichprovidesthebestsecuritypertheIEEE802.11istandard.WPAandWPA2.Ifyouhaveamixofclients,someofwhichsupportWPA2andotherswhichsupportonlytheoriginalWPA,selectbothofthecheckboxes.ThisletsbothWPAandWPA2clientstationsassociateandauthenticate,butusesthemorerobustWPA2forclientswhosupportit.ThisWPAconfigurationallowsmoreinteroperability,attheexpenseofsomesecurity.CipherSuites Selecttheciphersuiteyouwanttouse:•TKIP• CCMP(AES)•TKIPandCCMP(AES)BothTKIPandAESclientscanassociatewiththeAP.WPAclientsmusthaveoneofthefollowingtobeabletoassociatewiththeAP:•AvalidTKIPkey•AvalidAES‐CCMPkeyClientsnotconfiguredtouseaWPAPersonalwillnotbeabletoassociatewiththeAP.Key ThePre‐sharedKeyisthesharedsecretkeyforWPAPersonal.Enterastringofatleast8characterstoamaximumof63characters.Acceptablecharactersincludeupperandlowercasealphabeticletters,thenumericdigits,andspecialsymbolssuchas@and#.BroadcastKeyRefreshRateEnteravaluetosettheintervalatwhichthebroadcast(group)keyisrefreshedforclientsassociatedtothisVAP(thedefaultis300).Thevalidrangeis0–86400seconds.Avalueof0indicatesthatthebroadcastkeyisnotrefreshed.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page79UnifiedAccessPointAdministrator’sGuideWPAEnterpriseWPAEnterprisewithRADIUSisanimplementationoftheWi‐FiAllianceIEEE802.11istandard,whichincludesCCMP(AES),andTKIPmechanisms.TheEnterprisemoderequirestheuseofaRADIUSservertoauthenticateusers.Thissecuritymodeisbackwards‐compatiblewithwirelessclientsthatsupporttheoriginalWPA.Table26:WPAEnterpriseField DescriptionWPAVersions Selectthetypesofclientstationsyouwanttosupport:•WPA.IfallclientstationsonthenetworksupporttheoriginalWPAbutnonesupportthenewerWPA2,thenselectWPA.•WPA2.IfallclientstationsonthenetworksupportWPA2,wesuggestusingWPA2whichprovidesthebestsecuritypertheIEEE802.11istandard.•WPAandWPA2.Ifyouhaveamixofclients,someofwhichsupportWPA2andotherswhichsupportonlytheoriginalWPA,selectbothWPAandWPA2.ThisletsbothWPAandWPA2clientstationsassociateandauthenticate,butusesthemorerobustWPA2forclientswhosupportit.ThisWPAconfigurationallowsmoreinteroperability,attheexpenseofsomesecurity.Enable pre‐authenticationIfforWPAVersionsyouselectonlyWPA2orbothWPAandWPA2,youcanenablepre‐authenticationforWPA2clients.ClickEnablepre‐authenticationifyouwantWPA2wirelessclientstosendpre‐authenticationpacket.Thepre‐authenticationinformationwillberelayedfromtheAPtheclientiscurrentlyusingtothetargetAP.EnablingthisfeaturecanhelpspeedupauthenticationforroamingclientswhoconnecttomultipleAPs.ThisoptiondoesnotapplyifyouselectedWPAforWPAVersionsbecausetheoriginalWPAdoesnotsupportthisfeature.CipherSuites Selecttheciphersuiteyouwanttouse:•TKIP• CCMP(AES)•TKIPandCCMP(AES)BydefaultbothTKIPandCCMPareselected.WhenbothTKIPandCCMPareselected,clientstationsconfiguredtouseWPAwithRADIUSmusthaveoneofthefollowing:•AvalidTKIPRADIUSIPaddressandRADIUSKey•AvalidCCMP(AES)IPaddressandRADIUSKeyUseGlobalRADIUSServerSettingsBydefaulteachVAPusestheglobalRADIUSsettingsthatyoudefinefortheAPatthetopoftheVAPpage.However,youcanconfigureeachVAPtouseadifferentsetofRADIUSservers.TousetheglobalRADIUSserversettings,makesurethecheckboxisselected.TouseaseparateRADIUSserverfortheVAP,clearthecheckboxandentertheRADIUSserverIPaddressandkeyinthefollowingfields.RADIUSIPAddressTypeSpecifytheIPversionthattheRADIUSserveruses.YoucantogglebetweentheaddresstypestoconfigureIPv4andIPv6globalRADIUSaddresssettings,buttheAPcontactsonlytheRADIUSserverorserversfortheaddresstypeyouselectinthisfield.
VirtualAccessPointSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page80UnifiedAccessPointAdministrator’sGuideRADIUSIPAddressRADIUSIPv6AddressEntertheIPv4orIPv6addressfortheprimaryRADIUSserverforthisVAP.IftheIPv4RADIUSIPAddressTypeoptionisselectedinthepreviousfield,entertheIPaddressoftheRADIUSserverthatallVAPsusebydefault,forexample192.168.10.23.IftheIPv6RADIUSIPAddressTypeoptionisselected,entertheIPv6addressoftheprimaryglobalRADIUSserver,forexample2001:0db8:1234::abcd.RADIUSIPorIPv6Address1–3EnteruptothreeIPv4and/orIPv6addressestouseasthebackupRADIUSserversforthisVAP.ThefieldlabelisRADIUSIPAddresswhentheIPv4RADIUSIPAddressTypeoptionisselectedandRADIUSIPv6AddresswhentheIPv6RADIUSIPAddressTypeoptionisselected.Ifauthenticationfailswiththeprimaryserver,eachconfiguredbackupserveristriedinsequence.RADIUSKey EntertheRADIUSkeyinthetextbox.TheRADIUSKeyisthesharedsecretkeyfortheglobalRADIUSserver.Youcanuseupto63standardalphanumericandspecialcharacters.Thekeyiscasesensitive,andyoumustconfigurethesamekeyontheAPandonyourRADIUSserver.Thetextyouenterwillbedisplayedas"*"characterstopreventothersfromseeingtheRADIUSkeyasyoutype.RADIUSKey1–3EntertheRADIUSkeyassociatedwiththeconfiguredbackupRADIUSservers.TheserveratRADIUSIPAddress‐1usesRADIUSKey‐1,RADIUSIPAddress‐2usesRADIUSKey‐2,andsoon.EnableRADIUSAccountingSelectthisoptiontotrackandmeasuretheresourcesaparticularuserhasconsumedsuchassystemtime,amountofdatatransmittedandreceived,andsoon.IfyouenableRADIUSaccounting,itisenabledfortheprimaryRADIUSserverandallbackupservers.EnableRADIUSFailThroughSelectthisoptiontoallowthesecondaryRADIUSservertoauthenticatewirelessclientsiftheauthenticationwiththeprimaryRADIUSserverisunsuccessful,oriftheprimaryRADIUSserverisunavailable.ActiveServer SpecifywhichconfiguredRADIUSservertouseastheactiveRADIUSserver.BroadcastKeyRefreshRateEnteravaluetosettheintervalatwhichthebroadcast(group)keyisrefreshedforclientsassociatedtothisVAP(thedefaultis300).Thevalidrangeis0–86400seconds.Avalueof0indicatesthatthebroadcastkeyisnotrefreshed.SessionKeyRefreshRateEnteravaluetosettheintervalatwhichtheAPwillrefreshsession(unicast)keysforeachclientassociatedtotheVAP.Thevalidrangeis0–86400seconds.Avalueof0indicatesthatthebroadcastkeyisnotrefreshed.Table26:WPAEnterprise(Cont.)Field Description
ConfiguringtheWirelessDistributionSystem(WDS)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page81UnifiedAccessPointAdministrator’sGuideConfiguringtheWirelessDistributionSystem(WDS)TheWirelessDistributionSystem(WDS)allowsyoutoconnectmultipleUAPs.WithWDS,APscommunicatewithoneanotherwithoutwiresinastandardizedway.Thiscapabilityiscriticalinprovidingaseamlessexperienceforroamingclientsandformanagingmultiplewirelessnetworks.Itcanalsosimplifythenetworkinfrastructurebyreducingtheamountofcablingrequired.YoucanconfiguretheAPinpoint‐to‐pointorpoint‐to‐multipointbridgemodebasedonthenumberoflinkstoconnect.Inthepoint‐to‐pointmode,theAPacceptsclientassociationsandcommunicateswithwirelessclientsandotherrepeaters.TheAPforwardsalltrafficmeantfortheothernetworkoverthetunnelthatisestablishedbetweentheAPs.Thebridgedoesnotaddtothehopcount.ItfunctionsasasimpleOSIlayer2networkdevice.Inthepoint‐to‐multipointbridgemode,oneAPactsasthecommonlinkbetweenmultipleAPs.Inthismode,thecentralAPacceptsclientassociationsandcommunicateswiththeclientsandotherrepeaters.AllotherAPsassociateonlywiththecentralAPthatforwardsthepacketstotheappropriatewirelessbridgeforroutingpurposes.TheUAPcanalsoactasarepeater.Inthismode,theAPservesasaconnectionbetweentwoAPsthatmightbetoofaraparttobewithincellrange.Whenactingasarepeater,theAPdoesnothaveawiredconnectiontotheLANandrepeatssignalsbyusingthewirelessconnection.NospecialconfigurationisrequiredfortheAPtofunctionasarepeater,andtherearenorepeatermodesettings.WirelessclientscanstillconnecttoanAPthatisoperatingasarepeater.Tospecifythedetailsoftrafficexchangefromthisaccesspointtoothers,clicktheWDStab.Note:WhenyoumoveanAPfromStandaloneModetoManagedMode,WDSisdisabled.InManagedMode,youconfiguretheAPbyusingtheD‐LinkUnifiedWirelessSwitch.TheAdministratorUI,aswellasTelnet,SSH,andSNMPaccessaredisabledwhentheAPisinManagedMode.
ConfiguringtheWirelessDistributionSystem(WDS)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page82UnifiedAccessPointAdministrator’sGuideFigure21:ConfiguringWDSSettingsBeforeyouconfigureWDSontheAP,notethefollowingguidelines:•WhenusingWDS,besuretoconfigureWDSsettingsonbothAPsparticipatingintheWDSlink.•YoucanhaveonlyoneWDSlinkbetweenanypairofAPs.Thatis,aremoteMACaddressmayappearonlyonceontheWDSpageforaparticularAP.•BothAPsparticipatinginaWDSlinkmustbeonthesameRadiochannelandusingthesameIEEE802.11mode.(See“ModifyingRadioSettings”onpage58forinformationonconfiguringtheRadiomodeandchannel.)•When802.11hisoperational,settinguptwoWDSlinkscanbedifficult.See“Usingthe802.11hWirelessMode”onpage57.•IfyouuseWPAencryptionontheWDSlinkoverradio1,VAP0ofradio1mustuseWPAPersonalorWPAEnterpriseasthesecuritymode.IfyouuseWPAonaWDSlinkoverradio2,VAP0ofradio2mustuseWPAPersonalorWPAEnterpriseasthesecuritymode.
ConfiguringtheWirelessDistributionSystem(WDS)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page83UnifiedAccessPointAdministrator’sGuideToconfigureWDSonthisAP,describeeachAPintendedtoreceivehand‐offsandsendinformationtothisAP.ForeachdestinationAP,configurethefieldslistedinTable21.IfyouselectNoneasyourpreferredWDSencryptionoption,youwillnotbeaskedtofillinanymorefieldsontheWDSpage.AlldatatransferredbetweenthetwoAPsontheWDSlinkwillbeunencrypted.Table27:WDSSettingsField DescriptionSpanningTreeModeSpanningTreeProtocol(STP)preventsswitchingloops.STPisrecommendedifyouconfigureWDSlinks.SelectEnabledtouseSTPSelectDisabledtoturnoffSTPlinks(notrecommended)Radio ForeachWDSlinkonatwo‐radioAP,selectRadioOneorRadioTwo.Therestofthesettingsforthelinkapplytotheradioselectedinthisfield.Theread‐onlyLocalAddresswillchangedependingonwhichRadioyouselectinthisfield.Note:ThisfieldisnotavailableontheDWL‐3600AP.LocalAddress IndicatestheMACaddressesforthisAP.ForeachWDSlinkonatwo‐radioAP,theLocalAddressreflectstheMACaddressfortheinternalinterfaceontheselectedradio(RadioOneonwlan0orRadioTwoonwlan1).RemoteAddress SpecifytheMACaddressofthedestinationAP;thatis,theAPontheotherendoftheWDSlinktowhichdatawillbesentorhanded‐offandfromwhichdatawillbereceived.Clickthedrop‐downarrowtotherightoftheRemoteAddressfieldtoseealistofalltheavailableMACAddressesandtheirassociatedSSIDsonthenetwork.SelecttheappropriateMACaddressfromthelist.NOTE:TheSSIDdisplayedinthedrop‐downlistissimplytohelpyouidentifythecorrectMACAddressforthedestinationAP.ThisSSIDisaseparateSSIDtothatwhichyousetfortheWDSlink.Thetwodonot(andshouldnot)bethesamevalueorname.Encryption Youcanusenoencryption,WEP,orWPA(PSK)ontheWDSlink.IfyouareunconcernedaboutsecurityissuesontheWDSlinkyoumaydecidenottosetanytypeofencryption.Alternatively,ifyouhavesecurityconcernsyoucanchoosebetweenStaticWEPandWPA(PSK).InWPA(PSK)mode,theAPusesWPA2‐PSKwithCCMP(AES)encryptionovertheWDSlink.NOTE:InordertoconfigureWPA‐PSKonanyWDSlink,VAP0oftheselectedradiomustbeconfiguredforWPA‐PSKorWPA‐Enterprise.Note:TodisableaWDSlink,youmustremovethevalueconfiguredintheRemoteAddressfield.
ConfiguringtheWirelessDistributionSystem(WDS)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page84UnifiedAccessPointAdministrator’sGuideWEPonWDSLinksTable28describestheadditionalfieldsthatappearwhenyouselectWEPastheencryptiontype.WPA/PSKonWDSLinksTable29describestheadditionalfieldsthatappearwhenyouselectWPA/PSKastheencryptiontype.Table28:WEPonWDSLinksField DescriptionEncryption WEPWEP SelectthisoptionifyouwanttosetWEPencryptionontheWDSlink.KeyLength IfWEPisenabled,specifythelengthoftheWEPkey:•64bits• 128bitsKeyType IfWEPisenabled,specifytheWEPkeytype:•ASCII•HexCharactersRequiredIndicatesthenumberofcharactersrequiredintheWEPkey.ThenumberofcharactersrequiredupdatesautomaticallybasedonhowyousetKeyLengthandKeyType.WEPKey Enterastringofcharacters.IfyouselectedASCII,enteranycombinationof0–9,a–z,andA–Z.IfyouselectedHEX,enterhexadecimaldigits(anycombinationof0–9anda–forA–F).ThesearetheRC4encryptionkeyssharedwiththestationsusingtheAP.Note:ToconfigureWPA‐PSKonanyWDSlink,VAP0oftheselectedradiomustbeconfiguredforWPA‐PSKorWPA‐Enterprise.Table29:WPA/PSKonWDSLinksField DescriptionEncryption WPA(PSK)SSID EnteranappropriatenameforthenewWDSlinkyouhavecreated.ThisSSIDshouldbedifferentfromtheotherSSIDsusedbythisAP.However,itisimportantthatthesameSSIDisalsoenteredattheotherendoftheWDSlink.IfthisSSIDisnotthesameforbothAPsontheWDSlink,theywillnotbeabletocommunicateandexchangedata.TheSSIDcanbeanyalphanumericcombination.Key EnterauniquesharedkeyfortheWDSbridge.ThisuniquesharedkeymustalsobeenteredfortheAPattheotherendoftheWDSlink.IfthiskeyisnotthesameforbothAPs,theywillnotbeabletocommunicateandexchangedata.TheWPA‐PSKkeyisastringofatleast8characterstoamaximumof63characters.Acceptablecharactersincludeupperandlowercasealphabeticletters,thenumericdigits,andspecialsymbolssuchas@and#.
ControllingAccessbyMACAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page85UnifiedAccessPointAdministrator’sGuideControllingAccessbyMACAuthenticationAMediaAccessControl(MAC)addressisahardwareaddressthatuniquelyidentifieseachnodeofanetwork.AllIEEE802networkdevicesshareacommon48‐bitMACaddressformat,usuallydisplayedasastringof12hexadecimaldigitsseparatedbycolons,forexample00:DC:BA:09:87:65.Eachwirelessnetworkinterfacecard(NIC)usedbyawirelessclienthasauniqueMACaddress.YoucanusetheAdministratorUIontheAPoruseanexternalRADIUSservertocontrolaccesstothenetworkthroughtheAPbasedontheMACaddressofthewirelessclient.ThisfeatureiscalledMACAuthenticationorMACFiltering.Tocontrolaccess,youconfigureagloballistofMACaddresseslocallyontheAPoronanexternalRADIUSserver.Then,yousetafiltertospecifywhethertheclientswiththoseMACaddressesareallowedordeniedaccesstothenetwork.WhenawirelessclientattemptstoassociatewithanAP,theAPlooksuptheMACaddressoftheclientinthelocalStationsListorontheRADIUSserver.Ifitisfound,theglobalallowordenysettingisapplied.Ifitisnotfound,theoppositeisapplied.OntheVAPpage,theMACAuthenticationTypesettingcontrolswhethertheAPusesthestationlistconfiguredlocallyontheMACAuthenticationpageortheexternalRADIUSserver.TheAllow/BlockfiltersettingontheMACAuthenticationpagedetermineswhethertheclientsinthestationlist(localorRADIUS)canaccessthenetworkthroughtheAP.FormoreinformationaboutsettingtheMACauthenticationtype,see“VirtualAccessPointSettings”onpage70.ConfiguringaMACFilterandStationListontheAPTheMACAuthenticationpageallowsyoutocontrolaccesstoUAPbasedonMACaddresses.Basedonhowyousetthefilter,youcanallowonlyclientstationswithalistedMACaddressordenyaccesstothestationslisted.WhenyouenableMACAuthenticationandspecifyalistofapprovedMACaddresses,onlyclientswithalistedMACaddresscanaccessthenetwork.IfyouspecifyMACaddressestodeny,allclientscanaccessthenetworkexceptfortheclientsonthedenylist.ToenablefilteringbyMACaddress,clicktheMACAuthenticationtab.Note:AfteryouconfiguretheWDSsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ControllingAccessbyMACAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page86UnifiedAccessPointAdministrator’sGuideFigure22:ConfiguringMACAuthenticationTable30describesthefieldsandconfigurationoptionsavailableontheMACAuthenticationpageNote:GlobalMACAuthenticationsettingsapplytoallVAPsonallsupportedradios.Table30:MACAuthenticationField DescriptionFilter TosettheMACAddressFilter,selectoneofthefollowingoptions:•Allowonlystationsinthelist.AnystationthatisnotintheStationsListisdeniedaccesstothenetworkthroughtheAP.•Blockallstationsinlist.OnlythestationsthatappearinthelistaredeniedaccesstothenetworkthroughtheAP.Allotherstationsarepermittedaccess.Note:Thefilteryouselectisappliedtotheclientsinthestationlist,regardlessofwhetherthatstationlistislocalorontheRADIUSserver.StationsList ThisisthelocallistofclientsthatareeitherpermittedordeniedaccesstothenetworkthroughtheAP.ToaddaMACAddresstothelocalStationsList,enterits48‐bitMACaddressintothelowertextboxes,thenclickAdd.ToremoveaMACAddressfromtheStationsList,selectits48‐bitMACaddress,thenclickRemove.Thestationsinthelistwilleitherbeallowedordeniedaccessbasedonhowyousetthefilterinthepreviousfield.Note:IftheMACauthenticationtypefortheVAPissettoLocal,theAPusestheStationsListtopermitordenytheclientsaccesstothenetwork.IftheMACauthenticationtypeissettoRADIUS,theAPignorestheMACaddressesconfiguredinthislistandusesthelistthatisstoredontheRADIUSserver.TheMACauthenticationtypeissetontheVAPconfigurationpage.
ControllingAccessbyMACAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page87UnifiedAccessPointAdministrator’sGuideConfiguringMACAuthenticationontheRADIUSServerIfyouuseRADIUSMACauthenticationforMAC‐basedaccesscontrol,youmustconfigureastationlistontheRADIUSserver.ThestationlistcontainsclientMACaddressentries,andtheformatforthelistisdescribedinthefollowingtable.Note:AfteryouconfigurelocalMACAuthenticationsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table31:RADIUSServerAttributesforMACAuthenticationRADIUSServerAttribute Description ValueUser‐Name(1) MACaddressoftheclientstation. ValidEthernetMACAddress.User‐Password(2) AfixedglobalpasswordusedtolookupaclientMACentry.NOPASSWORD
ConfiguringLoadBalancingD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page88UnifiedAccessPointAdministrator’sGuideConfiguringLoadBalancingYoucansetnetworkutilizationthresholdsontheUAPtomaintainthespeedandperformanceofthewirelessnetworkasclientsassociateanddisassociatewiththeAP.Theloadbalancingsettingsapplytoallsupportedradios.Toconfigureloadbalancingandsetlimitsandbehaviortobetriggeredbyaspecifiedutilizationrateoftheaccesspoint,clicktheLoadBalancingtabandupdatethefieldsshowninthefollowingfigure.Figure23:ConfiguringLoadBalancingTable32:LoadBalancingField DescriptionLoadBalancing Enableordisableloadbalancing:ToenableloadbalancingonthisAP,clickEnable.TodisableloadbalancingonthisAP,clickDisable.UtilizationforNoNewAssociationsProvidethepercentageofnetworkbandwidthutilizationallowedontheradiobeforetheAPstopsacceptingnewclientassociations.Thedefaultis0,whichmeansthatallnewassociationswillbeallowedregardlessoftheutilizationrate.Note:Afteryouconfiguretheloadbalancingsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ManagedAccessPointOverviewD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page89UnifiedAccessPointAdministrator’sGuideManagedAccessPointOverviewTheUAPcanoperateintwomodes:StandaloneModeorManagedMode.InStandaloneMode,theUAPactsasanindividualAPinthenetwork,andyoumanageitbyusingtheAdministratorWebUserInterface(UI),CLI,orSNMP.InManagedMode,theUAPispartoftheD‐LinkUnifiedWiredandWirelessSystem,andyoumanageitbyusingtheD‐LinkUnifiedWirelessSwitch.IfanAPisinManagedMode,theAdministratorWebUI,Telnet,SSH,andSNMPservicesaredisabled.OntheUAP,youcanconfiguretheIPaddressesofuptofourD‐LinkUnifiedWirelessSwitchesthatcanmanageit.InordertomanagetheAP,theswitchandAPmustdiscovereachother.TherearemultiplewaysforaswitchtodiscoveranAP.AddingtheIPaddressoftheswitchtotheAPwhileitisinStandaloneModeisonewaytoenableswitch‐to‐APdiscovery.TransitioningBetweenModesEvery30seconds,theD‐LinkUnifiedWirelessSwitchsendsakeepalivemessagetoalloftheaccesspointsitmanages.EachAPchecksforthekeepalivemessagesontheSSLTCPconnection.AslongastheAPmaintainscommunicationwiththeswitchthroughthekeepalivemessages,itremainsinManagedMode.IftheAPdoesnotreceiveamessagewithin45secondsofthelastkeepalivemessage,theAPassumestheswitchhasfailedandterminatesitsTCPconnectiontotheswitch,andtheAPentersStandaloneMode.OncetheAPtransitionstoStandaloneMode,itcontinuestoforwardtrafficwithoutanyloss.TheAPusestheconfigurationontheVAPsconfiguredinVLANForwardingmode(thestandard,non‐tunneledmode).WhiletheAPisinStandaloneMode,youcanmanageitbyusingtheWebinterfaceortheCLI(throughTelnetorSSH).ForanyclientsthatareconnectedtotheAPthroughtunneledVAPs,theAPsendsdisassociatemessagesanddisablesthetunneledVAPs.AslongastheManagedAPAdministrativeModeissettoEnabled,asFigure24onpage90shows,theAPstartsdiscoveryprocedures.IftheAPestablishesaconnectionwithawirelessswitch,whichmayormaynotbethesameswitchitwasconnectedtobefore,theswitchsendstheAPitsconfigurationandtheAPsendsthewirelessswitchinformationaboutallcurrentlyassociatedclients.Aftertheconfigurationfromtheswitchisapplied,theAPradio(s)restart.Clienttrafficisbrieflyinterrupteduntiltheradio(s)areupandtheclientsarere‐associated.
ManagedAccessPointOverviewD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page90UnifiedAccessPointAdministrator’sGuideConfiguringManagedAccessPointSettingsToaddtheIPaddressofaD‐LinkUnifiedWirelessSwitchtotheAP,clicktheManagedAccessPointtabundertheManageheadingandupdatethefieldsshowninTable33.Figure24:ConfiguringManagedAccessPointSettingsTable33:ManagedAccessPointField DescriptionManagedAPAdministrativeModeClickEnabledtoallowtheAPandswitchtodiscovereachother.IftheAPsuccessfullyauthenticatesitselfwithawirelessswitch,youwillnotbeabletoaccesstheAdministratorUI.ClickDisabledtopreventtheAPfromcontactingwirelessswitches.SwitchIPaddress EntertheIPaddressofuptofourwirelessswitchesthatcanmanagetheAP.YoucanentertheIPaddressindottedformatorasanDNSname.YoucanviewalistofwirelessswitchesonyournetworkthatwereconfiguredbyusingaDHCPserver.TheAPattemptstocontactSwitchIPAddress1first.BaseIPPort ThestartingIPportnumberusedbythewirelessfeature(inarangeof10consecutiveportnumbers).Onlythefirstnumberintherangeisconfigurable.Thedefaultvalueis57775(through57784).Note:WhenthewirelessBaseIPPortnumberischangedontheswitch,thewirelessfeatureisautomaticallydisabledandre‐enabled.Thenewvalueisnotsentaspartoftheglobalswitchconfigurationintheclusterconfigurationdistributioncommand;everyswitchintheclustermustbeconfiguredindependentlywiththenewWirelessIPportnumber.Note:WhentheWirelessBaseIPPortnumberischangedfromitsdefaultvalueontheswitch,itmustalsobechangedontheAccessPoints.PassPhrase SelecttheEditoptionandenterapassphrasetoallowtheAPtoauthenticateitselfwiththewirelessswitch.Thepassphrasemustbebetween8and63characters.Toremovethepassword,selectEdit,deletetheexistingpassword,andthenclickApply.Youmustconfigurethesamepassphraseontheswitch.
ManagedAccessPointOverviewD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page91UnifiedAccessPointAdministrator’sGuideIftheUAPsuccessfullyauthenticateswithaD‐LinkUnifiedWirelessSwitch,youwilllooseaccesstotheAPthroughtheAdministratorUI.WDSManagedMode SpecifywhethertheAPwillactasaRootAPorSatelliteAPwithintheWDSgroup:•RootAP—Actsasabridgeorrepeateronthewirelessmediumandcommunicateswiththeswitchviathewiredlink.• SatelliteAP—CommunicateswiththeswitchviaaWDSlinktotheRootAP.ThismodeenablestheSatelliteAPtodiscoverandestablishWDSlinkwiththeRootAP.WDSManagedEthernetPortSpecifywhethertheEthernetportistobeenabledordisabledwhentheAPbecomespartofaWDSgroup.WDSGroupPassword PasswordforWPA2PersonalauthenticationusedtoestablishtheWDSlinks.OnlytheSatelliteAPsneedthisconfiguration.TheRootAPsgetthepasswordfromtheswitchwhentheybecomemanaged.Note:AfteryouconfigurethesettingsontheManagedAccessPointpage,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table33:ManagedAccessPointField Description
Configuring802.1XAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page92UnifiedAccessPointAdministrator’sGuideConfiguring802.1XAuthenticationOnnetworksthatuseIEEE802.1X,port‐basednetworkaccesscontrol,asupplicant(client)cannotgainaccesstothenetworkuntilthe802.1Xauthenticatorgrantsaccess.Ifyournetworkuses802.1X,youmustconfigure802.1XauthenticationinformationthattheAPcansupplytotheauthenticator.ToconfiguretheUAP802.1XsupplicantusernameandpasswordbyusingtheWebinterface,clicktheAuthenticationtabandconfigurethefieldsshowninTable34.Figure25:IEEE802.1XAuthenticationTable34:IEEE802.1XSupplicantAuthenticationFieldDescription802.1XSupplicant ClickEnabledtoenabletheAdministrativestatusofthe802.1XSupplicant.ClickDisabledtodisabletheAdministrativestatusofthe802.1XSupplicant.EAPMethod SelectoneofthefollowingEAPmethodstouseforcommunicationbetweentheAPandtheauthenticator:•MD5•PEAP•TLS
Configuring802.1XAuthenticationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page93UnifiedAccessPointAdministrator’sGuideUsername EntertheusernamefortheAPtousewhenrespondingtorequestsfroman802.1Xauthenticator.Theusernamecanbe1to64charactersinlength.ASCIIprintablecharactersareallowed,whichincludesupperandlowercasealphabeticletters,thenumericdigits,andspecialsymbolssuchas@and#.Password EnterthepasswordfortheAPtousewhenrespondingtorequestsfroman802.1Xauthenticator.Thepasswordcanbe1to64charactersinlength.ASCIIprintablecharactersareallowed,whichincludesupperandlowercaseletters,numbers,andspecialsymbolssuchas@and#.CertificateFileStatusIndicateswhetheracertificatefileispresentandwhenthatcertificateexpires.CertificateFileUploadUploadacertificatefiletotheAPbyusingHTTPorTFTP:•HTTP—BrowsetothelocationwherethecertificatefileisstoredandclickUpload.•TFTP—SpecifytheIPaddressoftheTFTPserverwherethecertificatefileislocatedandprovidethefilename,includingthefilepath,thenclickUpload.Note:AfteryouconfigurethesettingsontheAuthenticationpage,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table34:IEEE802.1XSupplicantAuthentication(Cont.)FieldDescription
CreatingaManagementAccessControlListD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page94UnifiedAccessPointAdministrator’sGuideCreatingaManagementAccessControlListYoucancreateanaccesscontrollist(ACL)thatlistsuptofiveIPv4hostsandfiveIPv6hoststhatareauthorizedtoaccesstheAPmanagementinterface.Ifthisfeatureisdisabled,anyonecanaccessthemanagementinterfacefromanynetworkclientbysupplyingthecorrectAPusernameandpassword.Tocreateanaccesslist,clicktheManagementACLtab.Figure26:ManagementACLTable35:ManagementACLField DescriptionManagementACLMode EnableordisablethemanagementACLfeature.AtleastoneIPv4orIPv6addressshouldbeconfiguredbeforeenablingManagementACLMode.Ifenabled,onlytheIPaddressesyouspecifywillhaveWeb,Telnet,SSH,andSNMPaccesstothemanagementinterface.IPAddress(1–5) EnteruptofiveIPv4addressesthatareallowedmanagementaccesstotheAP.Usedotted‐decimalformat(forexample,192.168.10.10).IPv6Address(1–5) EnteruptofiveIPv6addressesthatareallowedmanagementaccesstotheAP.UsethestandardIPv6addressformat(forexample2001:0db8:1234::abcd).Note:Afteryouconfigurethesettings,clickApplytoapplythechangesandtosavethesettings.
ConfiguringAccessPointServicesD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page95UnifiedAccessPointAdministrator’sGuideSection5:ConfiguringAccessPointServicesThissectiondescribeshowtoconfigureservicesontheUAPandcontainsthefollowingsubsections:•“ConfiguringSNMPontheAccessPoint”•“WebServerSettings”•“SettingtheSSHStatus”•“SettingtheTelnetStatus”•“ConfiguringQualityofService”•“ConfiguringEmailAlert”•“EnablingtheTimeSettings(NTP)”ConfiguringSNMPontheAccessPointSimpleNetworkManagementProtocol(SNMP)definesastandardforrecording,storing,andsharinginformationaboutnetworkdevices.SNMPfacilitatesnetworkmanagement,troubleshooting,andmaintenance.TheAPsupportsSNMPversions1,2,and3.Unlessspecificallynoted,allconfigurationparametersonthispageapplytoSNMPv1andSNMPv2conly.KeycomponentsofanySNMP‐managednetworkaremanageddevices,SNMPagents,andamanagementsystem.TheagentsstoredataabouttheirdevicesinManagementInformationBases(MIBs)andreturnthisdatatotheSNMPmanagerwhenrequested.ManageddevicescanbenetworknodessuchasAPs,routers,switches,bridges,hubs,servers,orprinters.TheUAPcanfunctionasanSNMPmanageddeviceforseamlessintegrationintonetworkmanagementsystemssuchasHPOpenView.FromtheSNMPpageundertheServicesheading,youcanstartorstopcontrolofSNMPagents,configurecommunitypasswords,accessMIBs,andconfigureSNMPTrapdestinations.FromthepagesundertheSNMPv3heading,youcanmanageSNMPv3usersandtheirsecuritylevelsanddefineaccesscontroltotheSNMPMIBs.ForinformationabouthowtoconfigureSNMPv3views,groups,users,andtargets,see“ConfiguringSNMPv3”onpage111.ToconfigureSNMP,clicktheSNMPtabundertheServicesheadingandupdatethefieldsdescribedinTable36onpage96
ConfiguringSNMPontheAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page96UnifiedAccessPointAdministrator’sGuideFigure27:ModifyingSNMPSettingsTable36:SNMPSettingsField DescriptionSNMP Enabled/DisabledYoucanspecifytheSNMPadministrativemodeonyournetwork.BydefaultSNMPisenabled.ToenableSNMP,clickEnabled.TodisableSNMP,clickDisabled. Afterchangingthemode,youmustclickApplytosaveyourconfigurationchanges.Note: IfSNMPisdisabled,allremainingfieldsontheSNMPpagearedisabled.ThisisaglobalSNMPparameterwhichappliestoSNMPv1,SNMPv2c,andSNMPv3.Read‐only communityname (forpermittedSNMPgetoperations)Enteraread‐onlycommunityname.Thevalidrangeis1‐256characters.Thecommunityname,asdefinedinSNMPv2c,actsasasimpleauthenticationmechanismtorestrictthemachinesonthenetworkthatcanrequestdatatotheSNMPagent.Thenamefunctionsasapassword,andtherequestisassumedtobeauthenticifthesenderknowsthepassword.Thecommunitynamecanbeinanyalphanumericformat.
ConfiguringSNMPontheAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page97UnifiedAccessPointAdministrator’sGuidePortnumbertheSNMPagentwill listentoBydefaultanSNMPagentonlylistenstorequestsfromport161.However,youcanconfigurethissotheagentlistenstorequestsonanotherport.EntertheportnumberonwhichyouwanttheSNMPagentstolistentorequests.Thevalidrangeis1‐65535.Note:ThisisaglobalSNMPparameterthatappliestoSNMPv1,SNMPv2c,andSNMPv3.AllowSNMPsetrequests YoucanchoosewhetherornottoallowSNMPsetrequestsontheAP.EnablingSNMPsetrequestsmeansthatmachinesonthenetworkcanexecuteconfigurationchangesviatheSNMPagentontheAPtotheD‐LinkSystemMIB.ToenableSNMPsetrequests,clickEnabled.TodisableSNMPsetrequests,clickDisabled.Read‐writecommunityname(forpermittedSNMPsetoperations)IfyouhaveenabledSNMPsetrequestsyoucansetaread‐writecommunityname.Thevalidrangeis1‐256characters.Settingacommunitynameissimilartosettingapassword.Onlyrequestsfromthemachinesthatidentifythemselveswiththiscommunitynamewillbeaccepted.Thecommunitynamecanbeinanyalphanumericformat.RestrictthesourceofSNMPrequeststoonlythedesignatedhostsorsubnetsYoucanrestrictthesourceofpermittedSNMPrequests.TorestrictthesourceofpermittedSNMPrequests,clickEnabled.TopermitanysourcesubmittinganSNMPrequest,clickDisabled.Hostname,addressorsubnetofNetworkManagementSystemSpecifytheIPv4DNShostnameorsubnetofthemachinesthatcanexecutegetandsetrequeststothemanageddevices.Thevalidrangeis1‐256characters.Aswithcommunitynames,thisprovidesalevelofsecurityonSNMPsettings.TheSNMPagentwillonlyacceptrequestsfromthehostnameorsubnetspecifiedhere.Tospecifyasubnet,enteroneormoresubnetworkaddressrangesintheformaddress/mask_lengthwhereaddressisanIPaddressandmask_lengthisthenumberofmaskbits.Bothformatsaddress/maskandaddress/mask_lengtharesupported.Individualhostscanbeprovidedforthis,i.e.I.PAddressorHostname.Forexample,ifyouenterarangeof192.168.1.0/24thisspecifiesasubnetworkwithaddress192.168.1.0andasubnetmaskof255.255.255.0.TheaddressrangeisusedtospecifythesubnetofthedesignatedNMS.OnlymachineswithIPaddressesinthisrangearepermittedtoexecutegetandsetrequestsonthemanageddevice.Giventheexampleabove,themachineswithaddressesfrom192.168.1.1through192.168.1.254canexecuteSNMPcommandsonthedevice.(Theaddressidentifiedbysuffix.0inasubnetworkrangeisalwaysreservedforthesubnetaddress,andtheaddressidentifiedby.255intherangeisalwaysreservedforthebroadcastaddress).Asanotherexample,ifyouenterarangeof10.10.1.128/25machineswithIPaddressesfrom10.10.1.129through10.10.1.254 canexecuteSNMPrequestsonmanageddevices.Inthisexample,10.10.1.128isthenetworkaddressand10.10.1.255isthebroadcastaddress.126addresseswouldbedesignated.IPv6HostnameorIPv6subnetofNetworkManagementSystemSpecifytheIPv6DNShostnameorsubnetofthemachinesthatcanexecutegetandsetrequeststothemanageddevices.Table36:SNMPSettings(Cont.)Field Description
ConfiguringSNMPontheAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page98UnifiedAccessPointAdministrator’sGuideCommunitynamefortrapsEntertheglobalcommunitystringassociatedwithSNMPtraps.Thevalidrangeis1‐256characters.Trapssentfromthedevicewillprovidethisstringasacommunityname.Thecommunitynamecanbeinanyalphanumericformat.Specialcharactersarenotpermitted.HostnameorIPaddress EntertheDNShostnameofthecomputertowhichyouwanttosendSNMPtraps.Thevalidrangeis1‐256characters.AnexampleofaDNShostnameis:snmptraps.foo.com. SinceSNMPtrapsaresentrandomlyfromtheSNMPagent,itmakessensetospecifywhereexactlythetrapsshouldbesent.YoucanadduptoamaximumofthreeDNShostnames.EnsureyouselecttheEnabledcheckboxbesidetheappropriatehostname.Note:AfteryouconfiguretheSNMPsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table36:SNMPSettings(Cont.)Field Description
WebServerSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page99UnifiedAccessPointAdministrator’sGuideWebServerSettingsTheAPcanbemanagedthroughHTTPorsecureHTTP(HTTPS)sessions.BydefaultbothHTTPandHTTPSaccessareenabled.Eitheraccesstypecanbedisabledseparately.ToconfigureWebserversettings,clickWebServertab.Figure28:ConfiguringWebServerSettingsTable37:WebServerSettingsField DescriptionHTTPSServerStatus EnableordisableaccessthroughaSecureHTTPServer(HTTPS).HTTPServerStatus EnableordisableaccessthroughHTTP.ThissettingisindependentoftheHTTPSserverstatussetting.HTTPPort SpecifytheportnumberforHTTPtraffic(defaultis80).
WebServerSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page100UnifiedAccessPointAdministrator’sGuideMaximumSessions WhenauserlogsontotheAPwebinterface,asessioniscreated.Thissessionismaintaineduntiltheuserlogsofforthesessioninactivitytimerexpires.Enterthenumberwebsessions,includingbothHTTPandHTTPs,thatcanexistatthesametime.Therangeis1–10sessions.Ifthemaximumnumberofsessionsisreached,thenextuserwhoattemptstologontotheAPwebinterfacereceivesanerrormessageaboutthesessionlimit.SessionTimeout Enterthemaximumamountoftime,inminutes,aninactiveuserremainsloggedontotheAPwebinterface.Whentheconfiguredtimeoutisreached,theuserisautomaticallyloggedofftheAP.Therangeis1–1440minutes(1440minutes=1day).GenerateSSLCertificateSelectthisoptiontogenerateanewSSLcertificateforthesecureWebserver.ThisshouldbedoneoncetheaccesspointhasanIPaddresstoensurethatthecommonnameforthecertificatematchestheIPaddressoftheUAP.GeneratinganewSSLcertificatewillrestartthesecureWebserver.Thesecureconnectionwillnotworkuntilthenewcertificateisacceptedonthebrowser.HTTPSSLCertificateFileStatusIndicateswhetheracertificatefileispresentandspecifiesitsexpirationdateandissuercommonname.ToGettheCurrentHTTPSSLCertificateSaveacopyofthecurrentHTTPSSLcertificateonalocalsystemorTFTPserver.•HTTP—ClickDownloadandspecifywheretostorethebackupcopyofthecertificatefile.•TFTP—Provideafilenameforthecertificatefile,includingthefilepath,specifytheIPaddressoftheTFTPserverwherethecertificatefilecopyistobestored,andthenclickDownload.TouploadaHTTPSSLCertificatefromaPCoraTFTPServerUploadacertificatefiletotheAPbyusingHTTPorTFTP:•HTTP—BrowsetothelocationwherethecertificatefileisstoredandclickUpload.•TFTP—SpecifytheIPaddressoftheTFTPserverwherethecertificatefileislocatedandprovidethefilename,includingthefilepath,thenclickUpload.Note:ClickApplytoapplythechangesandtosavethesettings.IfyoudisabletheprotocolyouarecurrentlyusingtoaccesstheAPmanagementinterface,thecurrentconnectionwillendandyouwillnotbeabletoaccesstheAPbyusingthatprotocoluntilitisenabled.Table37:WebServerSettings(Cont.)Field Description
SettingtheSSHStatusD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page101UnifiedAccessPointAdministrator’sGuideSettingtheSSHStatusSecureShell(SSH)isaprogramthatprovidesaccesstotheDWL‐x600APCLIfromaremotehost.SSHismoresecurethanTelnetforremoteaccessbecauseitprovidesstrongauthenticationandsecurecommunicationsoverinsecurechannels.FromtheSSHpage,youcanenableordisableSSHaccesstothesystem.Figure29:SSHStatusSettingtheTelnetStatusTelnetisaprogramthatprovidesaccesstotheDWL‐x600APCLIfromaremotehost.FromtheTelnetpage,youcanenableordisableTelnetaccesstothesystem.Figure30:TelnetStatusTable38:SSHSettingsField DescriptionSSHStatus ChoosetoeitherenableordisableSSHaccesstotheAPCLI:•TopermitremoteaccesstotheAPbyusingSSH,clickEnabled.•TopreventremoteaccesstotheAPbyusingSSH,clickDisabled.Table39:TelnetSettingsField DescriptionTelnetStatus ChoosetoeitherenableordisableTelnet accesstotheAPCLI:•TopermitremoteaccesstotheAPbyusingTelnet,clickEnabled.•TopreventremoteaccesstotheAPbyusingTelnet,clickDisabled.
ConfiguringQualityofServiceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page102UnifiedAccessPointAdministrator’sGuideConfiguringQualityofServiceQualityofService(QoS)providesyouwiththeabilitytospecifyparametersonmultiplequeuesforincreasedthroughputandbetterperformanceofdifferentiatedwirelesstrafficlikeVoice‐over‐IP(VoIP),othertypesofaudio,video,andstreamingmedia,aswellastraditionalIPdataovertheUAP.ConfiguringQoSontheUAPconsistsofsettingparametersonexistingqueuesfordifferenttypesofwirelesstraffic,andeffectivelyspecifyingminimumandmaximumwaittimes(throughContentionWindows)fortransmission.ThesettingsdescribedhereapplytodatatransmissionbehaviorontheAPonly,nottothatoftheclientstations.APEnhancedDistributedChannelAccess(EDCA)ParametersaffecttrafficflowingfromtheAPtotheclientstation.StationEnhancedDistributedChannelAccess(EDCA)ParametersaffecttrafficflowingfromtheclientstationtotheAP.ThedefaultvaluesfortheAPandstationEDCAparametersarethosesuggestedbytheWi‐FiAllianceintheWMMspecification.Innormalusethesevaluesshouldnotneedtobechanged.ChangingthesevalueswillaffecttheQoSprovided.TosetupqueuesforQoS,clicktheQoStabundertheServicesheadingandconfiguresettingsasdescribedinTable40onpage103.Note:OntheDWL‐6600APandDWL‐8600AP,theQoSsettingsapplytobothradios,butthetrafficforeachradioisqueuedindependently.
ConfiguringQualityofServiceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page103UnifiedAccessPointAdministrator’sGuideFigure31:ConfiguringQoSSettingsTable40:QoSSettingsField DescriptionEDCATemplate Possibleoptionsare:Custom,Default,OptimizedforVoice.AP EDCA ParametersQueue QueuesaredefinedfordifferenttypesofdatatransmittedfromAP‐to‐station:•Data0(Voice)—Highpriorityqueue,minimumdelay.Time‐sensitivedatasuchasVoIPandstreamingmediaareautomaticallysenttothisqueue.•Data1(Video)—Highpriorityqueue,minimumdelay.Time‐sensitivevideodataisautomaticallysenttothisqueue.•Data2(besteffort)—Mediumpriorityqueue,mediumthroughputanddelay.MosttraditionalIPdataissenttothisqueue.•Data3(Background)—Lowestpriorityqueue,highthroughput.Bulkdatathatrequiresmaximumthroughputandisnottime‐sensitiveissenttothisqueue(FTPdata,forexample).AIFS (Inter‐FrameSpace)TheArbitrationInter‐FrameSpacing(AIFS)specifiesawaittimefordataframes.Thewaittimeismeasuredinslots.ValidvaluesforAIFSare1through255.
ConfiguringQualityofServiceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page104UnifiedAccessPointAdministrator’sGuidecwMin (MinimumContentionWindow)Thisparameterisinputtothealgorithmthatdeterminestheinitialrandombackoffwaittime(window)forretryofatransmission.ThevaluespecifiedforMinimumContentionWindowistheupperlimit(inmilliseconds)ofarangefromwhichtheinitialrandombackoffwaittimeisdetermined.Thefirstrandomnumbergeneratedwillbeanumberbetween0andthenumberspecifiedhere.Ifthefirstrandombackoffwaittimeexpiresbeforethedataframeissent,aretrycounterisincrementedandtherandombackoffvalue(window)isdoubled.DoublingwillcontinueuntilthesizeoftherandombackoffvaluereachesthenumberdefinedintheMaximumContentionWindow.ValidvaluesforcwMinare1,3,7,15,31,63,127,255,511,or1024.ThevalueforcwMinmustbelowerthanthevalueforcwMax.cwMax (MaximumContentionWindow)ThevaluespecifiedfortheMaximumContentionWindowistheupperlimit(inmilliseconds)forthedoublingoftherandombackoffvalue.ThisdoublingcontinuesuntileitherthedataframeissentortheMaximumContentionWindowsizeisreached.OncetheMaximumContentionWindowsizeisreached,retrieswillcontinueuntilamaximumnumberofretriesallowedisreached.ValidvaluesforcwMaxare1,3,7,15,31,63,127,255,511,or1024.ThevalueforcwMaxmustbehigherthanthevalueforcwMin.Max.BurstLength TheMax.BurstLengthisanAPEDCAparameterandonlyappliestotrafficflowingfromtheAPtotheclientstation.Thisvaluespecifies(inmilliseconds)themaximumburstlengthallowedforpacketburstsonthewirelessnetwork.Apacketburstisacollectionofmultipleframestransmittedwithoutheaderinformation.Thedecreasedoverheadresultsinhigherthroughputandbetterperformance.Validvaluesformaximumburstlengthare0.0through999.Wi-Fi Multimedia SettingsWi‐FiMultiMedia Wi‐FiMultiMedia(WMM)isenabledbydefault.WithWMMenabled,QoSprioritizationandcoordinationofwirelessmediumaccessison.WithWMMenabled,QoSsettingsontheUAPcontroldownstreamtrafficflowingfromtheAPtoclientstation(APEDCAparameters)andtheupstreamtrafficflowingfromthestationtotheAP(stationEDCAparameters).DisablingWMMdeactivatesQoScontrolofstationEDCAparametersonupstreamtrafficflowingfromthestationtotheAP.WithWMMdisabled,youcanstillsetsomeparametersonthedownstreamtrafficflowingfromtheAPtotheclientstation(APEDCAparameters).TodisableWMMextensions,clickDisabled.ToenableWMMextensions,clickEnabled.Table40:QoSSettings(Cont.)Field Description
ConfiguringQualityofServiceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page105UnifiedAccessPointAdministrator’sGuideStation EDCA ParametersQueue Queuesaredefinedfordifferenttypesofdatatransmittedfromstation‐to‐AP:•Data0(Voice)—Highestpriorityqueue,minimumdelay.Time‐sensitivedatasuchasVoIPandstreamingmediaareautomaticallysenttothisqueue.•Data1(Video)—Highestpriorityqueue,minimumdelay.Time‐sensitivevideodataisautomaticallysenttothisqueue.•Data2(besteffort)—Mediumpriorityqueue,mediumthroughputanddelay.MosttraditionalIPdataissenttothisqueue.•Data3(Background)—Lowestpriorityqueue,highthroughput.Bulkdatathatrequiresmaximumthroughputandisnottime‐sensitiveissenttothisqueue(FTPdata,forexample).AIFS (Inter‐FrameSpace)TheArbitrationInter‐FrameSpacing(AIFS)specifiesawaittimefordataframes.Thewaittimeismeasuredinslots.ValidvaluesforAIFSare1through255.cwMin (MinimumContentionWindow)Thisparameterisusedbythealgorithmthatdeterminestheinitialrandombackoffwaittime(window)forretryofadatatransmissionduringaperiodofcontentionforUnifiedAccessPointresources.ThevaluespecifiedhereintheMinimumContentionWindowistheupperlimit(inmilliseconds)ofarangefromwhichtheinitialrandombackoffwaittimewillbedetermined.Thefirstrandomnumbergeneratedwillbeanumberbetween0andthenumberspecifiedhere.Ifthefirstrandombackoffwaittimeexpiresbeforethedataframeissent,aretrycounterisincrementedandtherandombackoffvalue(window)isdoubled.DoublingwillcontinueuntilthesizeoftherandombackoffvaluereachesthenumberdefinedintheMaximumContentionWindow.cwMax (MaximumContentionWindow)ThevaluespecifiedhereintheMaximumContentionWindowistheupperlimit(inmilliseconds)forthedoublingoftherandombackoffvalue.ThisdoublingcontinuesuntileitherthedataframeissentortheMaximumContentionWindowsizeisreached.OncetheMaximumContentionWindowsizeisreached,retrieswillcontinueuntilamaximumnumberofretriesallowedisreached.TXOPLimit TheTXOPLimitisastationEDCAparameterandonlyappliestotrafficflowingfromtheclientstationtotheAP.TheTransmissionOpportunity(TXOP)isanintervaloftime,inmilliseconds,whenaWMEclientstationhastherighttoinitiatetransmissionsontothewirelessmedium(WM)towardstheUnifiedAccessPoint.TheTXOPLimitmaximumvalueis65535.Other QoS SettingsNoAcknowledgement SelectOntospecifythattheAPshouldnotacknowledgeframeswithQosNoAckastheserviceclassvalue.APSD SelectOntoenableAutomaticPowerSaveDelivery(APSD),whichisapowermanagementmethod.APSDisrecommendedifVoIPphonesaccessthenetworkthroughtheAP.Note:AfteryouconfiguretheQoSsettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.Table40:QoSSettings(Cont.)Field Description
ConfiguringEmailAlertD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page106UnifiedAccessPointAdministrator’sGuideConfiguringEmailAlertTheEmailAlertfeatureallowstheAPtoautomaticallysendemailmessageswhenaneventatorabovetheconfiguredseverityleveloccurs.UsetheEmailAlertConfigurationpagetoconfiguremailserversettings,tosettheseveritylevelthattriggersalerts,andtoadduptothreeemailaddresseswhereurgentandnon‐urgentemailalertsaresent.Figure32:ConfiguringEmailAlertNote:EmailalertisoperationallydisabledwhentheAPtransitionstomanagedmode.Table41:EmailAlertConfigurationField DescriptionEmailAlertGlobalConfigurationAdminMode GloballyenableordisabletheEmailAlertfeatureontheAP.Bydefault,emailalertsaredisabled.FromAddress SpecifytheemailaddressthatappearsintheFromfieldofalertmessagessentfromtheAP,forexampledlinkAP23@foo.com.Theaddresscanbeamaximumof255charactersandcancontainonlyprintablecharacters.Bydefault,noaddressisconfigured.LogDuration Thisduration,inminutes,determineshowfrequentlythenoncriticalmessagesaresenttotheSMTPServer.Therangeis30‐1440minutes.Thedefaultis30minutes.
ConfiguringEmailAlertD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page107UnifiedAccessPointAdministrator’sGuideUrgentMessageSeverityConfigurestheseveritylevelforlogmessagesthatareconsideredtobeurgent.Messagesinthiscategoryaresentimmediately.Thesecuritylevelyouselectandallhigherlevelsareurgent:•Emergencyindicatessystemisunusable.Itisthehighestlevelofseverity.•Alertindicatesactionmustbetakenimmediately.•Criticalindicatescriticalconditions.•Errorindicateserrorconditions.•Warningindicateswarningconditions.• Noticeindicatesnormalbutsignificantconditions.• Informationalindicatesinformationalmessages.• Debugindicatesdebug‐levelmessages.NonUrgentSeverity Configurestheseveritylevelforlogmessagesthatareconsideredtobenonurgent.MessagesinthiscategoryarecollectedandsentinadigestformatthetimeintervalspecifiedbytheLogDurationfield.Thesecuritylevelyouselectandalllevelsupto,butnotincludingthelowestUrgentlevelareconsiderednonurgent.Messagesbelowthesecuritylevelyouspecifyarenotsentviaemail.SeetheUrgentMessagefielddescriptionforinformationaboutthesecuritylevels.EmailAlertMailServerConfigurationMailServerAddress SpecifytheIPaddressorhostnameoftheSMTPserveronthenetwork.MailServerSecurity SpecifywhethertouseSMTPoverSSL(TLSv1)ornosecurity(Open)forauthenticationwiththemailserver.ThedefaultisOpen.MailServerPort ConfigurestheTCPportnumberforSMTP.Therangeisavalidportnumberfrom0to65535.Thedefaultis25,whichisthestandardportforSMTP.Username Specifytheusernametousewhenauthenticationwiththemailserverisrequired.Theusernameisa64‐bytecharacterstringwithallprintablecharacters.Thedefaultisadmin.Password Specifythepasswordassociatedwiththeusernameconfiguredinthepreviousfield.EmailAlertMessageConfigurationToAddress1Configurethefirstemailaddresstowhichalertmessagesaresent.Theaddressmustbeavalidemailaddress.Bydefault,noaddressisconfigured.ToAddress2Optionally,configurethesecondemailaddresstowhichalertmessagesaresent.Theaddressmustbeavalidemailaddress.Bydefault,noaddressisconfigured.ToAddress3Optionally,configurethethirdemailaddresstowhichalertmessagesaresent.Theaddressmustbeavalidemailaddress.Bydefault,noaddressisconfigured.EmailSubject Specifythetexttobedisplayedinthesubjectoftheemailalertmessage.Thesubjectcancontainupto255alphanumericcharacters.ThedefaultisLogmessagefromAP.Note:AfteryouconfiguretheEmailAlertsettings,clickApplytoapplythechangesandtosavethesettings.Table41:EmailAlertConfiguration(Cont.)Field Description
ConfiguringEmailAlertD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page108UnifiedAccessPointAdministrator’sGuideTovalidatetheconfiguredemailservercredentials,clickTestMail.Youcansendatestemailoncetheemailserverdetailsareconfigured.ThefollowingtextshowsanexampleofanemailalertsentfromtheAPtothenetworkadministrator:From:AP‐192.168.2.10@mailserver.comSent:Wednesday,July08,201111:16AMTo:administrator@mailserver.comSubject:logmessagefromAPTIMEPriorityProcessIdMessageJul803:48:25infologin[1457]rootloginon‘ttyp0’Jul803:48:26infomini_http‐ssl[1175]Maxconcurrentconnectionsof20reached
EnablingtheTimeSettings(NTP)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page109UnifiedAccessPointAdministrator’sGuideEnablingtheTimeSettings(NTP)UsetheTimeSettingspagetospecifytheNetworkTimeProtocol(NTP)servertousetoprovidetimeanddateinformationtotheAPortoconfigurethetimeanddateinformationmanually.NTPisanInternetstandardprotocolthatsynchronizescomputerclocktimesonyournetwork.NTPserverstransmitCoordinatedUniversalTime(UTC,alsoknownasGreenwichMeanTime)totheirclientsystems.NTPsendsperiodictimerequeststoservers,usingthereturnedtimestamptoadjustitsclock.Thetimestampisusedtoindicatethedateandtimeofeacheventinlogmessages.Seehttp://www.ntp.orgformoreinformationaboutNTP.TosetthesystemtimeeithermanuallyorbyspecifyingtheaddressoftheNTPserverfortheAPtouse,clicktheServices>TimeSettings(NTP)tabandupdatethefieldsasdescribedinTable42onpage110.Figure33:SettingtheSystemTime
EnablingtheTimeSettings(NTP)D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page110UnifiedAccessPointAdministrator’sGuideTable42:NTPSettingsField DescriptionSetSystemTime NTPprovidesawayfortheAPtoobtainandmaintainitstimefromaserveronthenetwork.UsinganNTPservergivesyourAPtheabilitytoprovidethecorrecttimeofdayinlogmessagesandsessioninformation.Choosetouseanetworktimeprotocol(NTP)servertodeterminethesystemtime,orsetthesystemtimemanually:•TopermittheAPtopollanNTPserver,clickUsingNetworkTimeProtocol(NTP).•TopreventtheAPfrompollinganNTPserver,clickManually.NTPServer(UseNTP) IfNTPisenabled,specifytheNTPservertouse.YoucanspecifytheNTPserverbyhostnameorIPaddress,althoughusingtheIPaddressisnotrecommendedasthesecanchangemorereadily.Ifyouspecifyahostname,notethefollowingrequirements:•Thelengthmustbebetween1–63characters.• Upperandlowercasecharacters,numbers,andhyphensareaccepted.•Thefirstcharactermustbealetter(a–zorA–Z),andthelastcharactercannotbeahyphen.SystemDate(Manualconfiguration)Specifythecurrentmonth,day,andyear.SystemTime(Manualconfiguration)Specifythecurrenttimeinhoursandminutes.Thesystemusesa24‐hourclock,so6:00PMisconfiguredas18:00.TimeZone Selectyourlocaltimezonefromthemenu.ThedefaultisUSA(Pacific).AdjustTimeforDaylightSavingsSelecttohavethesystemadjustthereportedtimeforDaylightSavingsTime(DST).Whenthisfieldisselected,fieldstoconfigureDaylightSavingsTimesettingsappear.DSTStart(24HR) ConfigurethedateandtimetobeginDaylightSavingsTimefortheSystemTime.DSTEnd(24HR) ConfigurethedateandtimetoendDaylightSavingsTimefortheSystemTime.DSTOffset(minutes) SelectthenumberofminutestooffsetDST.Thedefaultis60minutes.Note:AfteryouconfiguretheTimesettings,youmustclickApplytoapplythechangesandtosavethesettings.ChangingsomesettingsmightcausetheAPtostopandrestartsystemprocesses.Ifthishappens,wirelessclientswilltemporarilyloseconnectivity.WerecommendthatyouchangeAPsettingswhenWLANtrafficislow.
ConfiguringSNMPv3D-Link UnifiedAccessPointAdministrator’sGuide November2011 Page111UnifiedAccessPointAdministrator’sGuideSection6:ConfiguringSNMPv3ThissectiondescribeshowtoconfiguretheSNMPv3settingsontheUAPandcontainsthefollowingsubsections:•ConfiguringSNMPv3Views•ConfiguringSNMPv3Groups•ConfiguringSNMPv3Users•ConfiguringSNMPv3TargetsConfiguringSNMPv3ViewsAMIBviewiscombinationofasetofviewsubtreesorafamilyofviewsubtreeswhereeachviewsubtreeisasubtreewithinthemanagedobjectnamingtree.YoucancreateMIBviewstocontroltheOIDrangethatSNMPv3userscanaccess.AMIBviewcalled"all"iscreatedbydefaultinthesystem.Thisviewcontainsallmanagementobjectssupportedbythesystem.Figure34:SNMPv3ViewsNote:Ifyoucreateanexcludedviewsubtree,createacorrespondingincludedentrywiththesameviewnametoallowsubtreesoutsideoftheexcludedsubtreetobeincluded.Forexample,tocreateaviewthatexcludesthesubtree1.3.6.1.4,createanexcludedentrywiththeOID1.3.6.1.4.Then,createanincludedentrywithOID.1withthesameviewname.
ConfiguringSNMPv3ViewsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page112UnifiedAccessPointAdministrator’sGuideTable43describesthefieldsyoucanconfigureontheSNMPv3Viewspage.Table43:SNMPv3ViewsField DescriptionViewName EnteranametoidentifytheMIBview.Viewnamescancontainupto32alphanumericcharacters.Type SpecifieswhethertoincludeorexcludetheviewsubtreeorfamilyofsubtreesfromtheMIBview.OID EnteranOIDstringforthesubtreetoincludeorexcludefromtheview.Forexample,thesystemsubtreeisspecifiedbytheOIDstring.1.3.6.1.2.1.1.Mask TheOIDmaskis47charactersinlength.TheformatoftheOIDmaskisxx.xx.xx(.)...orxx:xx:xx....(:)andis16octetsinlength.Eachoctetis2hexadecimalcharactersseparatedbyeither.(period)or:(colon).Onlyhexcharactersareacceptedinthisfield.Forexample,OIDmaskFA.80is11111010.10000000.Afamilymaskisusedtodefineafamilyofviewsubtrees.Thefamilymaskindicateswhichsub‐identifiersoftheassociatedfamilyOIDstringaresignificanttothefamily'sdefinition.Afamilyofviewsubtreesallowscontrolaccesstoonerowinatable,inamoreefficientmanner.SNMPv3Views ThisfieldshowstheMIBviewsontheUAP.Toremoveaview,selectitandclickRemove.Note:AfteryouconfiguretheSNMPv3Viewssettings,youmustclickApplytoapplythechangesandtosavethesettings.
ConfiguringSNMPv3GroupsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page113UnifiedAccessPointAdministrator’sGuideConfiguringSNMPv3GroupsSNMPv3groupsallowyoutocombineusersintogroupsofdifferentauthorizationandaccessprivileges.Bydefault,theUAPhastwogroups:•RO—Aread‐onlygroupusingauthenticationanddataencryption.UsersinthisgroupuseanMD5key/passwordforauthenticationandaDESkey/passwordforencryption.BoththeMD5andDESkey/passwordsmustbedefined.Bydefault,usersofthisgroupwillhavereadonlyaccesstothedefaultallMIBview,whichcanbemodifiedbytheuser.•RW—Aread/writegroupusingauthenticationanddataencryption.UsersinthisgroupuseanMD5key/passwordforauthenticationandaDESkey/passwordforencryption.BoththeMD5andDESkey/passwordsmustbedefined.Bydefault,usersofthisgroupwillhavereadandwriteaccesstothedefaultallMIBview,whichcanbemodifiedbytheuser.RWandROgroupsaredefinedbydefault.Todefineadditionalgroups,navigatetotheSNMPv3GroupspageandconfigurethesettingsthatTable44onpage114describes.Figure35:SNMPv3GroupsNote:TheUAPsupportsmaximumofeightgroups.
ConfiguringSNMPv3GroupsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page114UnifiedAccessPointAdministrator’sGuideTable44:SNMPv3GroupsField DescriptionName Specifyanametousetoidentifythegroup.ThedefaultgroupnamesareRWandRO.Groupnamescancontainupto32alphanumericcharacters.SecurityLevel Selectoneofthefollowingsecuritylevelsforthegroup:•noAuthentication‐noPrivacy—Noauthenticationandnodataencryption(nosecurity).•Authentication‐noPrivacy—Authentication,butnodataencryption.Withthissecuritylevel,userssendSNMPmessagesthatuseanMD5key/passwordforauthentication,butnotaDESkey/passwordforencryption.•Authentication‐Privacy—Authenticationanddataencryption.Withthissecuritylevel,userssendanMD5key/passwordforauthenticationandaDESkey/passwordforencryption.Forgroupsthatrequireauthentication,encryption,orboth,youmustdefinetheMD5andDESkey/passwordsontheSNMPv3Userspage.WriteViews Selectthewriteaccesstomanagementobjects(MIBs)forthegroup:•write‐all—Thegroupcancreate,alter,anddeleteMIBs.•write‐none—Thegroupisnotallowedtocreate,alter,ordeleteMIBS.ReadViews Selectthereadaccesstomanagementobjects(MIBs)forthegroup:•view‐all—ThegroupisallowedtoviewandreadallMIBs.•view‐none—ThegroupcannotvieworreadMIBs.SNMPv3Groups ThisfieldshowsthedefaultgroupsandthegroupsthatyouhavedefinedontheAP.Toremoveagroup,selectthegroupandclickRemove.Note:AfteryouconfiguretheSNMPv3Groupssettings,youmustclickApplytoapplythechangesandtosavethesettings.
ConfiguringSNMPv3UsersD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page115UnifiedAccessPointAdministrator’sGuideConfiguringSNMPv3UsersFromtheSNMPv3Userspage,youcandefinemultipleusers,associatethedesiredsecurityleveltoeachuser,andconfiguresecuritykeys.Forauthentication,onlyMD5typeissupported,andforencryptiononlyDEStypeissupported.TherearenodefaultSNMPv3usersontheUAP.Figure36:SNMPv3UsersTable45describesthefieldstoconfigureSNMPv3users.Table45:SNMPv3UsersField DescriptionName EntertheusernametoidentifytheSNMPv3user.Usernamescancontainupto32alphanumericcharacters.Group Maptheusertoagroup.ThedefaultgroupsareRWAuth,RWPriv,andRO.YoucandefineadditionalgroupsontheSNMPv3Groupspage.AuthenticationType SelectthetypeofauthenticationtouseonSNMPrequestsfromtheuser:•MD5—RequireMD5authenticationonSNMPv3requestsfromtheuser.•None—SNMPv3requestsfromthisuserrequirenoauthentication.AuthenticationKey IfyouspecifyMD5astheauthenticationtype,enterapasswordtoenabletheSNMPagenttoauthenticaterequestssentbytheuser.Thepassphrasemustbebetween8and32charactersinlength.EncryptionType SelectthetypeofprivacytouseonSNMPrequestsfromtheuser:•DES—UseDESencryptiononSNMPv3requestsfromtheuser.•None—SNMPv3requestsfromthisuserrequirenoprivacy.
ConfiguringSNMPv3TargetsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page116UnifiedAccessPointAdministrator’sGuideConfiguringSNMPv3TargetsSNMPv3Targetssend"inform"messagestotheSNMPmanager.EachtargetisidentifiedbyatargetnameandassociatedwithtargetIPaddress,UDPport,andSNMPusername.Figure37:SNMPv3TargetEncryptionKey IfyouspecifyDESastheprivacytype,enterakeytousetoencrypttheSNMPrequests.Thepassphrasemustbebetween8and32charactersinlength.SNMPv3Users ThisfieldshowstheusersthatyouhavedefinedontheAP.Toremoveauser,selecttheuserandclickRemove.Note:AfteryouconfiguretheSNMPv3Userssettings,youmustclickApplytoapplythechangesandtosavethesettings.Table46:SNMPv3TargetsField DescriptionIPAddress EntertheIPaddressoftheremoteSNMPmanagertoreceivethetarget.Port EntertheUDPporttouseforsendingSNMPtargets.Users EnterthenameoftheSNMPusertoassociatewiththetarget.ToconfigureSNMPusers,see“ConfiguringSNMPv3Users”onpage115.SNMPv3Targets ThisfieldshowstheSNMPv3TargetsontheUAP.Toremoveatarget,selectitandclickRemove.Note:AfteryouconfiguretheSNMPv3Targetsettings,youmustclickApplytoapplythechangesandtosavethesettings.Table45:SNMPv3Users(Cont.)Field Description
MaintainingtheAccessPointD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page117UnifiedAccessPointAdministrator’sGuideSection7:MaintainingtheAccessPointThissectiondescribeshowtomaintaintheUAP.FromtheUAPAdministratorUI,youcanperformthefollowingmaintenancetasks:•“SavingtheCurrentConfigurationtoaBackupFile”•“RestoringtheConfigurationfromaPreviouslySavedFile”•“PerformingAPMaintenance”–“ResettingtheFactoryDefaultConfiguration”–“RebootingtheAccessPoint”•“UpgradingtheFirmware”•“PacketCaptureConfigurationandSettings”SavingtheCurrentConfigurationtoaBackupFileTheAPconfigurationfileisinXMLformatandcontainsalloftheinformationabouttheAPsettings.Youcandownloadtheconfigurationfiletoamanagementstationtomanuallyeditthecontentortosaveasaback‐upcopy.YoucanuseHTTPorTFTPtotransferfilestoandfromtheUAP.Afteryoudownloadaconfigurationfiletothemanagementstation,youcanmanuallyeditthefile,whichisinXMLformat.Then,youcanuploadtheeditedconfigurationfiletoapplythoseconfigurationsettingstotheAP.UsethefollowingstepstosaveacopyofthecurrentsettingsonanAPtoabackupconfigurationfilebyusingTFTP:1. SelectTFTPforDownloadMethod.2. Enteraname(1to63characters)forthebackupfileintheFilenamefield,includingthe.xmlfilenameextensionandthepathtothedirectorywhereyouwanttosavethefile.3. EntertheIPaddressoftheTFTPserver..4. ClickDownloadtosaveacopyofthefiletotheTFTPserver.
RestoringtheConfigurationfromaPreviouslySavedFileD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page118UnifiedAccessPointAdministrator’sGuideUsethefollowingstepstosaveacopyofthecurrentsettingsonanAPtoabackupconfigurationfilebyusingHTTP:1. SelectHTTPforDownloadMethod.2. ClicktheDownloadbutton.Adialogboxdisplaysverifyingthedownload.3. Toproceedwiththedownload,selectOK.Adialogboxopensallowingyoutovieworsavethefile.4. SelecttheSaveFileoptionandselectOK.5. Usethefilebrowsertonavigatetothedirectorywhereyouwanttosavethefile,andclickOKtosavethefile.Youcankeepthedefaultfilename(config.xml)orrenamethebackupfile,butbesuretosavethefilewithan.xmlextension.RestoringtheConfigurationfromaPreviouslySavedFileYoucanuseHTTPorTFTPtotransferfilestoandfromtheUAP.Afteryoudownloadaconfigurationfiletothemanagementstation,youcanmanuallyeditthefile,whichisinXMLformat.Then,youcanuploadtheeditedconfigurationfiletoapplythoseconfigurationsettingstotheAP.UsethefollowingprocedurestorestoretheconfigurationonanAPtopreviouslysavedsettingsbyusingTFTP:1. SelectTFTPforUploadMethod.2. Enteraname(1to63characters)forthebackupfileintheFilenamefield,includingthe.xmlfilenameextensionandthepathtothedirectorythatcontainstheconfigurationfiletoupload.3. EntertheIPaddressoftheTFTPserverintheServerIPfield.4. ClicktheRestorebutton.TheAPreboots.Arebootconfirmationdialogandfollow‐onrebootingstatusmessagedisplays.Pleasewaitfortherebootprocesstocomplete,whichmighttakeseveralminutes.TheAdministrationWebUIisnotaccessibleuntiltheAPhasrebooted.
RestoringtheConfigurationfromaPreviouslySavedFileD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page119UnifiedAccessPointAdministrator’sGuideUsethefollowingstepstosaveacopyofthecurrentsettingsonanAPtoabackupconfigurationfilebyusingHTTP:1. SelectHTTPforUploadMethod.2. UsertheBrowsebuttontoselectthefiletorestore.3. ClicktheRestorebutton.AFileUploadorChooseFiledialogboxdisplays.4. Navigatetothedirectorythatcontainsthefile,thenselectthefiletouploadandclickOpen.(OnlythosefilescreatedwiththeBackupfunctionandsavedas.xmlbackupconfigurationfilesarevalidtousewithRestore;forexample,ap_config.xml.)5. ClicktheRestorebutton.Adialogboxopensverifyingtherestore.6. ClickOKtoproceed.TheAPreboots.Arebootconfirmationdialogandfollow‐onrebootingstatusmessagedisplays.Pleasewaitfortherebootprocesstocomplete,whichmighttakeseveralminutes.TheAdministrationWebUIisnotaccessibleuntiltheAPhasrebooted.
PerformingAPMaintenanceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page120UnifiedAccessPointAdministrator’sGuidePerformingAPMaintenanceFromtheMaintenancepage,youcanresettheAPtoitsfactorydefaultsettingsorreboottheAP.Figure38:MaintenanceResettingtheFactoryDefaultConfigurationIfyouareexperiencingproblemswiththeUAPandhavetriedallothertroubleshootingmeasures,clickReset.Thisrestoresfactorydefaultsandclearsallsettings,includingsettingssuchasanewpasswordorwirelesssettings.Youcanalsousetheresetbuttononthebackpaneltoresetthesystemtothedefaultconfiguration.RebootingtheAccessPointFormaintenancepurposesorasatroubleshootingmeasure,youcanreboottheUAP.ToreboottheAP,clicktheRebootbuttonontheConfigurationpage.UpgradingtheFirmwareAsnewversionsoftheUAPfirmwarebecomeavailable,youcanupgradethefirmwareonyourdevicestotakeadvantageofnewfeaturesandenhancements.TheAPusesaTFTPclientforfirmwareupgrades.YoucanalsouseHTTPtoperformfirmwareupgrades.Afteryouuploadnewfirmwareandthesystemreboots,thenewlyaddedfirmwarebecomestheprimaryimage.Iftheupgradefails,theoriginalfirmwareremainsastheprimaryimage.UsethefollowingstepstoupgradethefirmwareonanaccesspointbyusingTFTP:1. SelectTFTPforUploadMethod.2. Enteraname(1to63characters)fortheimagefileintheImageFilenamefield,includingthepathtothedirectorythatcontainstheimagetoupload.Note:Whenyouupgradethefirmware,theaccesspointretainstheexistingconfigurationinformation.
UpgradingtheFirmwareD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page121UnifiedAccessPointAdministrator’sGuideForexample,touploadtheap_upgrade.tarimagelocatedinthe/share/builds/apdirectory,enter/share/builds/ap/ap_upgrade.tarintheImageFilenamefield.Thefirmwareupgradefilesuppliedmustbeatarfile.Donotattempttousebinfilesorfilesofotherformatsfortheupgrade;thesetypesoffileswillnotwork.3. EntertheIPaddressoftheTFTPserver.4. ClickUpgrade.UponclickingUpgradeforthefirmwareupgrade,apopupconfirmationwindowisdisplayedthatdescribestheupgradeprocess.5. ClickOKtoconfirmtheupgradeandstarttheprocess.Theupgradeprocessmaytakeseveralminutesduringwhichtimetheaccesspointwillbeunavailable.Donotpowerdowntheaccesspointwhiletheupgradeisinprocess.Whentheupgradeiscomplete,theaccesspointrestarts.TheAPresumesnormaloperationwiththesameconfigurationsettingsithadbeforetheupgrade.6. Toverifythatthefirmwareupgradecompletedsuccessfully,checkthefirmwareversionshownontheUpgradepage(ortheBasicSettingspage).Iftheupgradewassuccessful,theupdatedversionnameornumberisindicated.UsethefollowingstepstoupgradethefirmwareonanaccesspointbyusingHTTP:1. SelectHTTPforUploadMethod.2. Ifyouknowthepathtothenewfirmwareimagefile,enteritintheImageFilenamefield.Otherwise,clicktheBrowsebuttonandlocatethefirmwareimagefile.Thefirmwareupgradefilesuppliedmustbeatarfile.Donotattempttousebinfilesorfilesofotherformatsfortheupgrade;thesetypesoffileswillnotwork.3. ClickUpgradetoapplythenewfirmwareimage.UponclickingUpgradeforthefirmwareupgrade,apopupconfirmationwindowisdisplayedthatdescribestheupgradeprocess.4. ClickOKtoconfirmtheupgradeandstarttheprocess.Note:ThefirmwareupgradeprocessbeginsonceyouclickUpgradeandthenOKinthepopupconfirmationwindow.
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page122UnifiedAccessPointAdministrator’sGuideTheupgradeprocessmaytakeseveralminutesduringwhichtimetheaccesspointwillbeunavailable.Donotpowerdowntheaccesspointwhiletheupgradeisinprocess.Whentheupgradeiscomplete,theaccesspointrestarts.TheAPresumesnormaloperationwiththesameconfigurationsettingsithadbeforetheupgrade.5. Toverifythatthefirmwareupgradecompletedsuccessfully,checkthefirmwareversionshownontheUpgradepage(ortheBasicSettingspage).Iftheupgradewassuccessful,theupdatedversionnameornumberisindicated.PacketCaptureConfigurationandSettingsWirelesspacketcaptureoperatesintwomodes:•Capturefilemode•RemotecapturemodeForcapturefilemode,capturedpacketsarestoredinafileontheAccessPoint.TheAPcantransferthefiletoaTFTPserver.ThefileisformattedinpcapformatandcanbeexaminedusingtoolssuchasWiresharkandOmniPeek.Forremotecapturemode,thecapturedpacketsareredirectedinrealtimetoanexternalPCrunningtheWireshark®tool.TheAPcancapturethefollowingtypesofpackets:•802.11packetsreceivedandtransmittedonradiointerfaces.Packetscapturedonradiointerfacesincludethe802.11header.•802.3packetsreceivedandtransmittedontheEthernetinterface.•802.3packetsreceivedandtransmittedontheinternallogicalinterfacessuchasVAPsandWDSinterfaces.FromthePacketCaptureConfigurationandSettingspage,youcan:• Viewthecurrentpacketcapturestatus.• Configurepacketcaptureparameters.• Configurepacketfilecapture.• Configurearemotecaptureport.•Downloadapacketcapturefile.Note:ThefirmwareupgradeprocessbeginsonceyouclickUpgradeandthenOKinthepopupconfirmationwindow.
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page123UnifiedAccessPointAdministrator’sGuideFigure39:PacketCaptureConfiguration
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page124UnifiedAccessPointAdministrator’sGuidePacketCaptureStatusPacketCaptureStatusallowsyoutoviewthestatusofpacketcaptureontheAP.Table47describesinformationthepacketcapturestatusfieldsdisplay.PacketCaptureParameterConfigurationPacketCaptureConfigurationallowsyoutoconfigureparametersthataffecthowpacketcapturefunctionsontheradiointerfaces.Table48describesthefieldstoconfigurethepacketcapture.Table47:PacketCaptureStatusField DescriptionCurrentCaptureStatus Showswhetherpacketcaptureisrunningorstopped.PacketCaptureTime Showselapsedcapturetime.PacketCaptureFileSize Showsthecurrentcapturefilesize.Table48:PacketCaptureConfigurationField DescriptionCaptureBeacons Enabletocapturethe802.11beaconsdetectedortransmittedbytheradio.PromiscuousCapture Enabletoplacetheradioinpromiscuousmodewhenthecaptureisactive.Inpromiscuousmodetheradioreceivesalltrafficonthechannel,includingtrafficthatisnotdestinedtothisAP.Whiletheradioisoperatinginpromiscuousmode,itcontinuesservingassociatedclients.PacketsnotdestinedtotheAParenotforwarded.Assoonasthecaptureiscompleted,theradiorevertstonon‐promiscuousmodeoperation.ClientFilterEnable EnabletousetheWLANclientfiltertocaptureonlyframesthataretransmittedto,orreceivedfromaWLANclientwithaspecifiedMACaddress.ClientFilterMACAddress SpecifyaMACaddressforWLANclientfiltering.Note:TheMACfilterisactiveonlywhencaptureisperformedonan802.11interface.Note:Changestopacketcaptureconfigurationparameterstakeaffectafterpacketcaptureisrestarted.Modifyingtheparameterswhilethepacketcaptureisrunningdoesn'taffectthecurrentpacketcapturesession.Inordertobeginusingnewparametervalues,anexistingpacketcapturesessionmustbestoppedandre‐started.
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page125UnifiedAccessPointAdministrator’sGuidePacketFileCaptureInPacketFileCapturemodetheAPstorescapturedpacketsintheRAMfilesystem.Uponactivation,thepacketcaptureproceedsuntiloneofthefollowingoccurs:•Thecapturetimereachesconfiguredduration•Thecapturefilereachesitsmaximumsize•TheadministratorstopsthecaptureDuringthecapture,youcanmonitorthecapturestatus,elapsedcapturetime,andthecurrentcapturefilesize.Thisinformationcanbeupdated,whilethecaptureisinprogress,byclickingRefresh.Table49describesthefieldstoconfigurethepacketcapturestatus.RemotePacketCaptureRemotePacketCaptureallowsyoutospecifyaremoteportasthedestinationforpacketcaptures.ThisfeatureworksinconjunctionwiththeWiresharknetworkanalyzertoolforWindows.ApacketcaptureserverrunsontheAPandsendsthecapturedpacketsviaaTCPconnectiontotheWiresharktool.AWindowsPCrunningtheWiresharktoolallowsyoutodisplay,log,andanalyzecapturedtraffic.Whentheremotecapturemodeisinuse,theAPdoesn'tstoreanycaptureddatalocallyinitsfilesystem.YourcantraceuptofiveinterfacesontheAPatthesametime.However,youmuststartaseparateWiresharksessionforeachinterface.YoucanconfiguretheIPportnumberusedforconnectingWiresharktotheAP.Thedefaultportnumberis2002.Thesystemuses5consecutiveportnumbersstartingwiththeconfiguredportforthepacketcapturesessions.IfafirewallisinstalledbetweentheWiresharkPCandtheAP,theseportsmustbeallowedtopassthroughthefirewall.ThefirewallmustalsobeconfiguredtoallowtheWiresharkPCtoinitiateTCPconnectiontotheAP.Table49:PacketFileCaptureField DescriptionCaptureInterface SelectanAPCaptureInterfacenamefromthedrop‐downmenu.APcaptureinterfacenamesareeligibleforpacketcaptureare:• brtrunk‐LinuxbridgeinterfaceintheAP•eth0‐802.3trafficontheEthernetport.•wlan0‐VAP0trafficonradio1.•wlan1‐VAP0trafficonradio2.•radio1‐802.11trafficonradio1.•radio2‐802.11trafficonradio2.Note:TheDWL‐3600APhasonlyoneradio.TheavailableoptionsontheDWL‐3600APdonotincludewlan0orradio1.CaptureDuration Specifythetimedurationinsecondsforthecapture(range10to3600).MaxCaptureFileSize SpecifythemaximumallowedsizeforthecapturefileinKB(range64to4096).
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page126UnifiedAccessPointAdministrator’sGuideToconfigureWiresharktousetheAPasthesourceforcapturedpackets,youmustspecifytheremoteinterfaceinthe"CaptureOptions"menu.ForexampletocapturepacketsonanAPwithIPaddress192.168.1.10onradio1usingthedefaultIPport,specifythefollowinginterface:rpcap://192.168.1.10/radio1TocapturepacketsontheEthernetinterfaceoftheAPandVAP0onradio1usingIPport58000,starttwoWiresharksessionsandspecifythefollowinginterfaces:rpcap://192.168.1.10:58000/eth0rpcap://192.168.1.10:58000/wlan0Whenyouarecapturingtrafficontheradiointerface,youcandisablebeaconcapture,butother802.11controlframesarestillsenttoWireshark.Youcansetupadisplayfiltertoshowonly:•Dataframesinthetrace•TrafficonspecificBSSIDs•TrafficbetweentwoclientsSomeexamplesofusefuldisplayfiltersare:• ExcludebeaconsandACK/RTS/CTSframes:!(wlan.fc.type_subtype==8||wlan.fc.type==1)•Dataframesonly:wlan.fc.type==2•TrafficonaspecificBSSID:wlan.bssid==00:02:bc:00:17:d0•Alltraffictoandfromaspecificclient:wlan.addr==00:00:e8:4e:5f:8eInremotecapturemode,trafficissenttothePCrunningWiresharkviaoneofthenetworkinterfaces.DependingonwheretheWiresharktoolislocatedthetrafficcanbesentonanEthernetinterfaceoroneoftheradios.Inordertoavoidatrafficfloodcausedbytracingthetracepackets,theAPautomaticallyinstallsacapturefiltertofilteroutallpacketsdestinedtotheWiresharkapplication.ForexampleiftheWiresharkIPportisconfiguredtobe58000thenthefollowingcapturefilterisautomaticallyinstalledontheAP:notportrange58000‐58004.EnablingthepacketcapturefeatureimpactsperformanceoftheAPandcancreateasecurityissue(unauthorizedclientsmaybeabletoconnecttotheAPandtraceuserdata).TheAPperformanceisnegativelyimpactedevenifthereisnoactiveWiresharksessionwiththeAP.Theperformanceisnegativelyimpactedtoagreaterextentwhenpacketcaptureisinprogress.Duetoperformanceandsecurityissues,thepacketcapturemodeisnotsavedinNVRAMontheAP;iftheAPresets,thecapturemodeisdisabledandtheyoumustre‐enableitinordertoresumecapturingtraffic.Packetcaptureparameters(otherthanmode)aresavedinNVRAM.
PacketCaptureConfigurationandSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page127UnifiedAccessPointAdministrator’sGuideInordertominimizeperformanceimpactontheAPwhiletrafficcaptureisinprogress,youshouldinstallcapturefilterstolimitwhichtrafficissenttotheWiresharktool.Whencapturing802.11traffic,largeportionofthecapturedframestendtobebeacons(typicallysentevery100msbyallAccessPoints).AlthoughWiresharksupportsadisplayfilterforbeaconframes,itdoesnotsupportacapturefiltertopreventtheAPfromforwardingcapturedbeaconpacketstotheWiresharktool.Inordertoreduceperformanceimpactofcapturingthe802.11beacons,youcandisablethecapturebeaconsmode.TheremotepacketcapturefacilityisastandardfeatureoftheWiresharktoolforWindows.Wiresharkisanopensourcetoolandisavailableforfree;itcanbedownloadedfromhttp://www.wireshark.org.Table50describesthefieldstoconfigurethepacketcapturestatus.PacketCaptureFileDownloadPacketCaptureFileDownloadallowsyoutodownloadthecapturefilebyTFTPtoaconfiguredTFTPserverorbyHTTP(S)toaPC.Thecapturedpacketsarestoredinfile/tmp/apcapture.pcapontheAP.Acaptureisautomaticallystoppedwhenthecapturefiledownloadcommandistriggered.BecausethecapturefileislocatedintheRAMfilesystem,itdisappearsiftheAPisreset.Table51describesthefieldstoconfigurethepacketcapturestatus.Note:RemotepacketcaptureisnotstandardontheLinuxversionofWireshark;theLinuxversiondoesn'tworkwiththeAP.Table50:RemotePacketCaptureField DescriptionRemoteCapturePort Specifytheremoteporttouseasthedestinationforpacketcaptures.(range1to65530).Table51:PacketCaptureFileDownloadField DescriptionUseTFTPtodownloadthecapturefileSelectorclearthisoptiontodeterminewhethertouseTFTPorHTTP(S)todownloadthecapturefile:•TodownloadthefilebyusingTFTP,selectthisoptionandcompletetheadditionalfields.•TodownloadthefilebyusingHTTPorHTTPS,clearthisoptionandclickDownloadtobrowsetothelocationwherethefileistobesaved.TFTPServerFilename WhenusingTFTPtodownloadthefile,specifyanameforthepacketcapturefile,includingthe.pcapfilenameextensionandthepathtothedirectorywhereyouwanttosavethefile.ServerIP WhenusingTFTPtodownloadthefile,specifytheIPaddressoftheTFTPserver.
ConfiguringClientQualityofServiceD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page128UnifiedAccessPointAdministrator’sGuideSection8:ConfiguringClientQualityofServiceThissectiondescribeshowtoconfigureQoSsettingsthataffecttrafficfromthewirelessclientstotheAP.ByusingtheUAPClientQoSfeatures,youcanlimitbandwidthandapplyACLsandDiffServpoliciestothewirelessinterface.IfaVAPusesWPAEnterprisesecuritytoauthenticateclients,youcanconfiguretheRADIUSservertoprovideper‐clientQoSinformation.Thissectiondescribesthefollowingfeatures:•“ConfiguringVAPQoSParameters”•“ManagingClientQoSACLs”•“CreatingaDiffServClassMap”•“CreatingaDiffServPolicyMap”•“ConfiguringRADIUS‐AssignedClientQoSParameters”ConfiguringVAPQoSParametersTheclientQoSfeaturesontheUAPprovideadditionalcontrolovercertainQoSaspectsofwirelessclientsthatconnecttothenetwork,suchastheamountofbandwidthanindividualclientisallowedtosendandreceive.Tocontrolgeneralcategoriesoftraffic,suchasHTTPtrafficortrafficfromaspecificsubnet,youcanconfigureACLsandassignthemtooneormoreVAPs.Inadditiontocontrollinggeneraltrafficcategories,ClientQoSallowsyoutoconfigureper‐clientconditioningofvariousmicro‐flowsthroughDifferentiatedServices(DiffServ).DiffServpoliciesareausefultoolforestablishinggeneralmicro‐flowdefinitionandtreatmentcharacteristicsthatcanbeappliedtoeachwirelessclient,bothinboundandoutbound,whenitisauthenticatedonthenetwork.FromtheVAPQoSParameterspage,youcanenabletheClientQoSfeature,specifyclientbandwidthlimits,andselecttheACLsandDiffServpoliciestouseasdefaultvaluesforclientsassociatedwiththeVAPwhentheclientdoesnothavetheirownattributesdefinedbyaRADIUSserver.ToconfiguretheClientQoSadministrativemodeandtoconfiguretheQoSsettingsforaVAP,clicktheVAPQoSParameterstab.Note:Theweb‐basedUIimagesinthissectionshowtheDWL‐8600APadministrationpages.PagesfortheDWL‐3600APwillnotdisplayinformationforRadio2becauseithasonlyoneradio.
ConfiguringVAPQoSParametersD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page129UnifiedAccessPointAdministrator’sGuideFigure40:VAPQoSParametersTable52:VAPQoSParametersField DescriptionClientQoSGlobalAdminModeEnableordisableClientQoSoperationontheAP.ChangingthissettingwillnotaffecttheWMMsettingsyouconfigureontheQoSpage.Radio Fordual‐radioAPs,selectRadio1orRadio2tospecifywhichradiotoconfigure.VAP SpecifytheVAPthatwillhavetheClientQoSsettingsthatyouconfigure.TheQoSsettingsyouconfigurefortheselectedVAPwillnotaffectclientsthataccessthenetworkthroughotherVAPs.ClientQoSMode EnableordisableQoSoperationontheVAPselectedintheVAPmenu.QoSmustbeenabledglobally(fromtheClientQoSGlobalAdminModefield)andontheVAP(QoSModefield)fortheClientQoSsettingstobeappliedtowirelessclients.BandwidthLimitDown EnterthemaximumallowedtransmissionratefromtheAPtothewirelessclientinbitspersecond.Thevalidrangeis0–429496000bits/sec.Thevalueyouentermustbeamultipleof8000bits/sec,inotherwords,thevaluemustben×8000bits/sec,wheren=0,1,2,3...Ifyouattempttosetthelimittoavaluethatisnotamultipleof8000bits/sec,theconfigurationwillberejected.Avalueof0meansthatthebandwidthmaximumlimitisnotenforcedinthisdirection.
ConfiguringVAPQoSParametersD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page130UnifiedAccessPointAdministrator’sGuideBandwidthLimitUp EnterthemaximumallowedclienttransmissionratetotheAPinbitspersecond.Thevalidrangeis0–4294967295bps.Thevalueyouentermustben×8000bits/sec,wheren=0,1,2,3...Ifyouattempttosetthelimittoavaluethatisnotamultipleof8000bits/sec,theconfigurationwillberejected.Avalueof0meansthatthebandwidthmaximumlimitisnotenforcedinthisdirection.ACLTypeDown SelectthetypeofACLtoapplytotrafficintheoutbound(down)direction,whichcanbeoneofthefollowing:•IPv4:TheACLexaminesIPv4packetsformatchestoACLrules•IPv6:TheACLexaminesIPv6packetsformatchestoACLrules•MAC:TheACLexamineslayer2framesformatchestoACLrulesACLNameDown SelectthenameoftheACLappliedtotrafficintheoutbound(down)direction.Afterswitchingthepacketorframetotheoutboundinterface,theACL'srulesarecheckedforamatch.Thepacketorframeistransmittedifitispermitted,anddiscardedifitisdenied.ACLTypeUp SelectthetypeofACLtoapplytotrafficintheinbound(up)direction,whichcanbeoneofthefollowing:•IPv4:TheACLexaminesIPv4packetsformatchestoACLrules•IPv6:TheACLexaminesIPv6packetsformatchestoACLrules•MAC:TheACLexamineslayer2framesformatchestoACLrulesACLNameUp SelectthenameoftheACLappliedtotrafficenteringtheAPintheinbound(up)direction.WhenapacketorframeisreceivedbytheAP,theACL'srulesarecheckedforamatch.Thepacketorframeisprocessedifitispermitted,anddiscardedifitisdenied.DiffServPolicyDown SelectthenameoftheDiffServpolicyappliedtotrafficfromtheAPintheoutbound(down)direction.DiffServPolicyUp SelectthenameoftheDiffServpolicyappliedtotrafficsenttotheAPintheinbound(up)direction.Table52:VAPQoSParametersField Description
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page131UnifiedAccessPointAdministrator’sGuideManagingClientQoSACLsACLsareacollectionofpermitanddenyconditions,calledrules,thatprovidesecuritybyblockingunauthorizedusersandallowingauthorizeduserstoaccessspecificresources.ACLscanblockanyunwarrantedattemptstoreachnetworkresources.TheUAPsupportsupto50IPv4,IPv6,andMACACLs.IPv4andIPv6ACLsIPACLsclassifytrafficforLayers3and4.EachACLisasetofupto10rulesappliedtotrafficsentfromawirelessclientortobereceivedbyawirelessclient.Eachrulespecifieswhetherthecontentsofagivenfieldshouldbeusedtopermitordenyaccesstothenetwork.Rulescanbebasedonvariouscriteriaandmayapplytooneoremorefieldswithinapacket,suchasthesourceordestinationIPaddress,thesourceordestinationL4port,ortheprotocolcarriedinthepacket.MACACLsMACACLsareLayer2ACLs.YoucanconfiguretherulestoinspectfieldsofaframesuchasthesourceordestinationMACaddress,theVLANID,ortheClassofService802.1ppriority.WhenaframeentersorexitstheAPport(dependingonwhethertheACLisappliedintheupordowndirection),theAPinspectstheframeandcheckstheACLrulesagainstthecontentoftheframe.Ifanyoftherulesmatchthecontent,apermitordenyactionistakenontheframe.ACLConfigurationProcessConfigureACLsandrulesontheClientQoSACLpage(steps1–5),andthenapplytherulestoaspecifiedVAPontheAPQoSParameterspage(step6).UsethefollowinggeneralstepstoconfigureACLs:1. SpecifyanamefortheACL.2. SelectthetypeofACLtoadd.3. AddtheACL4. AddnewrulestotheACL.5. Configurethematchcriteriafortherules.6. ApplytheACLtooneormoreVAPs.ForanexampleofhowtoconfigureanACL,see“ACLConfiguration”onpage174ToconfigureanACL,clicktheClientQoSACLtab.
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page132UnifiedAccessPointAdministrator’sGuideThefieldstoconfigureACLrulesappearonlyafteryouhavecreatedanACL.ThefollowingimageshowstheconfigurationofanewrulefortheIPv4ACLnamedacl1.TherulepreventsHTTPtrafficfromallclientsinthe192.168.20.0networkfrombeingforwarded.Figure41:ClientQoSACLThefollowingtabledescribesthefieldsavailableontheClientQoSACLpage.Table53:ACLConfigurationField DescriptionACLConfigurationACLName EnteranametoidentifytheACL.Thenamecancontainfrom1–31alphanumericcharacters.Spacesarenotallowed.ACLType SelectthetypeofACLtoconfigure:•IPv4•IPv6•MACIPv4andIPv6ACLscontrolaccesstonetworkresourcesbasedonLayer3andLayer4criteria.MACACLscontrolaccessbasedonLayer2criteria.
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page133UnifiedAccessPointAdministrator’sGuideACLRuleConfigurationACLName‐ACLType SelecttheACLtoconfigurewiththenewrule.ThelistcontainsallACLsaddedintheACLConfigurationsection.Rule ToconfigureanewruletoaddtotheselectedACL,selectNewRule.ToaddanexistingruletoanACLortomodifyarule,selecttherulenumber.WhenanACLhasmultiplerules,therulesareappliedtothepacketorframeintheorderinwhichyouaddthemtotheACL.Thereisanimplicitdenyallruleasthefinalrule.Action SpecifieswhethertheACLrulepermitsordeniesanaction.•WhenyouselectPermit,theruleallowsalltrafficthatmeetstherulecriteriatoenterorexittheAP(dependingontheACLdirectionyouselect).Trafficthatdoesnotmeetthecriteriaisdropped.•WhenyouselectDeny,theruleblocksalltrafficthatmeetstherulecriteriafromenteringorexitingtheAP(dependingontheACLdirectionyouselect).Trafficthatdoesnotmeetthecriteriaisforwardedunlessthisruleisthefinalrule.BecausethereisanimplicitdenyallruleattheendofeveryACL,trafficthatisnotexplicitlypermittedisdropped.MatchEvery Indicatesthattherule,whicheitherhasapermitordenyaction,willmatchtheframeorpacketregardlessofitscontents.Ifyouselectthisfield,youcannotconfigureanyadditionalmatchcriteria.TheMatchEveryoptionisselectedbydefaultforanewrule.Youmustcleartheoptiontoconfigureothermatchfields.IPv4ACLProtocol SelecttheProtocolfieldtouseanL3orL4protocolmatchconditionbasedonthevalueoftheIPProtocolfieldinIPv4packetsortheNextHeaderfieldofIPv6packets.Onceyouselectthefield,choosetheprotocoltomatchbykeywordorenteraprotocolID.SelectFromListSelectoneofthefollowingprotocolsfromthelist:•IP•ICMP•IGMP•TCP•UDPMatchtoValueTomatchaprotocolthatisnotlistedbyname,entertheprotocolID.TheprotocolIDisastandardvalueassignedbytheIANA.Therangeisanumberfrom0–255.SourceIPAddress Selectthisfieldtorequireapacket'ssourceIPaddresstomatchtheaddresslistedhere.EnteranIPaddressintheappropriatefieldtoapplythiscriteria.Table53:ACLConfiguration(Cont.)Field Description
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page134UnifiedAccessPointAdministrator’sGuideWildCardMask SpecifiesthesourceIPaddresswildcardmask.Thewildcardmasksdetermineswhichbitsareusedandwhichbitsareignored.Awildcardmaskof255.255.255.255indicatesthatnobitisimportant.Awildcardof0.0.0.0indicatesthatallofthebitsareimportant.ThisfieldisrequiredwhenSourceIPAddressischecked.Awildcardmaskis,inessence,theinverseofasubnetmask.Forexample,Tomatchthecriteriatoasinglehostaddress,useawildcardmaskof0.0.0.0.Tomatchthecriteriatoa24‐bitsubnet(forexample192.168.10.0/24),useawildcardmaskof0.0.0.255.SourcePort Selectthisfieldtoincludeasourceportinthematchconditionfortherule.Thesourceportisidentifiedinthedatagramheader.Onceyouselectthefield,choosetheportnameorentertheportnumber.SelectFromListSelectthekeywordassociatedwiththesourceporttomatch:•ftp• ftpdata•http•smtp•snmp•telnet•tftp•wwwEachofthesekeywordstranslatesintoitsequivalentportnumber.MatchtoPortEntertheIANAportnumbertomatchtothesourceportidentifiedinthedatagramheader.Theportrangeis0–65535andincludesthreedifferenttypesofports:•0–1023:WellKnownPorts• 1024–49151:RegisteredPorts• 49152–65535:Dynamicand/orPrivatePortsDestinationIPAddress Selectthisfieldtorequireapacket'sdestinationIPaddresstomatchtheaddresslistedhere.EnteranIPaddressintheappropriatefieldtoapplythiscriteria.WildCardMask SpecifiesthedestinationIPaddresswildcardmask.Thewildcardmasksdetermineswhichbitsareusedandwhichbitsareignored.Awildcardmaskof255.255.255.255indicatesthatnobitisimportant.Awildcardof0.0.0.0indicatesthatallofthebitsareimportant.ThisfieldisrequiredwhenSourceIPAddressischecked.Awildcardmaskisinessencetheinverseofasubnetmask.Forexample,Tomatchthecriteriatoasinglehostaddress,useawildcardmaskof0.0.0.0.Tomatchthecriteriatoa24‐bitsubnet(forexample192.168.10.0/24),useawildcardmaskof0.0.0.255.Table53:ACLConfiguration(Cont.)Field Description
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page135UnifiedAccessPointAdministrator’sGuideDestinationPort Selectthisfieldtoincludeadestinationportinthematchconditionfortherule.Thedestinationportisidentifiedinthedatagramheader.Onceyouselectthefield,choosetheportnameorentertheportnumber.SelectFromListSelectthekeywordassociatedwiththedestinationporttomatch:•ftp• ftpdata•http•smtp•snmp•telnet•tftp•wwwEachofthesekeywordstranslatesintoitsequivalentportnumber.MatchtoPortEntertheIANAportnumbertomatchtothedestinationportidentifiedinthedatagramheader.Theportrangeis0–65535andincludesthreedifferenttypesofports:•0–1023:WellKnownPorts• 1024–49151:RegisteredPorts• 49152–65535:Dynamicand/orPrivatePortsIPDSCP TouseIPDSCPasamatchcriteria,selectthecheckboxandselectaDSCPvaluekeywordorenteraDSCPvaluetomatch.Youcanselectonlyoneservicetype(DSCP,IPPrecedenceorTOSbits)touseformatchcriteria.SelectfromListSelectfromalistofDSCPtypes.MatchtoValueEnteraDSCPValuetomatch(0–63).IPPrecedence Selectthisoptionandenteravaluetousethepacket'sIPPrecedencevalueintheIPheaderasmatchcriteria.Youcanselectonlyoneservicetype(DSCP,IPPrecedenceorTOSbits)touseformatchcriteria.TheIPPrecedencerangeis0–7.IPTOSBits Selectthisoptionandenteravaluetousethepacket'sTypeofServicebitsintheIPheaderasmatchcriteria.Youcanselectonlyoneservicetype(DSCP,IPPrecedenceorTOSbits)touseformatchcriteria.TheIPTOSfieldinapacketisdefinedasalleightbitsoftheServiceTypeoctetintheIPheader.TheTOSBitsvalueisatwo‐digithexadecimalnumberfrom00toff.Thehigh‐orderthreebitsrepresenttheIPprecedencevalue.Thehigh‐ordersixbitsrepresenttheIPDifferentiatedServicesCodePoint(DSCP)value.Table53:ACLConfiguration(Cont.)Field Description
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page136UnifiedAccessPointAdministrator’sGuideIPTOSMask EnteranIPTOSmaskvaluetoidentifythebitpositionsintheTOSBitsvaluethatareusedforcomparisonagainsttheIPTOSfieldinapacket.TheTOSMaskvalueisatwo‐digithexadecimalnumberfrom00toff,representinganinverted(i.e.wildcard)mask.Thezero‐valuedbitsintheTOSMaskdenotethebitpositionsintheTOSBitsvaluethatareusedforcomparisonagainsttheIPTOSfieldofapacket.Forexample,tocheckforanIPTOSvaluehavingbits7and5setandbit1clear,wherebit7ismostsignificant,useaTOSBitsvalueofa0andaTOSMaskof00.Thisisanoptionalconfiguration.IPv6ACLProtocol SelecttheProtocolfieldtouseanL3orL4protocolmatchconditionbasedonthevalueoftheIPProtocolfieldinIPv4packetsortheNextHeaderfieldofIPv6packets.Onceyouselectthefield,choosetheprotocoltomatchbykeywordorprotocolID.SourceIPv6Address Selectthisfieldtorequireapacket'ssourceIPv6addresstomatchtheaddresslistedhere.EnteranIPv6addressintheappropriatefieldtoapplythiscriteria.SourceIPv6PrefixLength EntertheprefixlengthofthesourceIPv6address.SourcePort Selectthisoptiontoincludeasourceportinthematchconditionfortherule.Thesourceportisidentifiedinthedatagramheader.Onceyouselecttheoption,choosetheportnameorentertheportnumber.DestinationIPv6Address Selectthisfieldtorequireapacket'sdestinationIPv6addresstomatchtheaddresslistedhere.EnteranIPv6addressintheappropriatefieldtoapplythiscriteria.DestinationIPv6PrefixLengthEntertheprefixlengthofthedestinationIPv6address.DestinationPort Selectthisoptiontoincludeadestinationportinthematchconditionfortherule.Thedestinationportisidentifiedinthedatagramheader.Onceyouselecttheoption,choosetheportnameorentertheportnumber.IPv6FlowLabel Flowlabelis20‐bitnumberthatisuniquetoanIPv6packet.Itisusedbyendstationstosignifyquality‐of‐servicehandlinginrouters(range0to1048575).IPv6DSCP TouseIPv6DSCPasamatchcriteria,selectthecheckboxandselectaDSCPvaluekeywordorenteraDSCPvaluetomatch.Youcanselectonlyoneservicetype(DSCP,IPPrecedenceorTOSbits)touseformatchcriteria.SelectfromListSelectfromalistofDSCPtypes.MatchtoValueEnteraDSCPValuetomatch(0–63).Table53:ACLConfiguration(Cont.)Field Description
ManagingClientQoSACLsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page137UnifiedAccessPointAdministrator’sGuideAfteryousetthedesiredrulecriteria,clickApply.TodeleteanACL,selecttheDeleteACLoptionandclickApply.MACACLEtherType SelecttheEtherTypefieldtocomparethematchcriteriaagainstthevalueintheheaderofanEthernetframe.SelectanEtherTypekeywordorenteranEtherTypevaluetospecifythematchcriteria.SelectfromListSelectSelectoneofthefollowingprotocoltypes:• appletalk•arp•ipv4•ipv6•ipx•netbios• pppoeMatchtoValueEnteracustomprotocolidentifiertowhichpacketsarematched.Thevalueisafour‐digithexidecimalnumberintherangeof0600–FFFF.ClassofService Selectthisfieldandenteran802.1puserprioritytocompareagainstanEthernetframe.Thevalidrangeis0–7.Thisfieldislocatedinthefirst/only802.1QVLANtag.SourceMACAddress SelectthisfieldandenterthesourceMACaddresstocompareagainstanEthernetframe.SourceMACMask SelectthisfieldandenterthesourceMACaddressmaskspecifyingwhichbitsinthesourceMACtocompareagainstanEthernetframe.A0indicatesthattheaddressbitissignificant,andanfindicatesthattheaddressbitistobeignored.AMACmaskof00:00:00:00:00:00matchesasingleMACaddress.DestinationMACAddressSelectthisfieldandenterthedestinationMACaddresstocompareagainstanEthernetframe.DestinationMACMask EnterthedestinationMACaddressmaskspecifyingwhichbitsinthedestinationMACtocompareagainstanEthernetframe.A0indicatesthattheaddressbitissignificant,andanfindicatesthattheaddressbitistobeignored.AMACmaskof00:00:00:00:00:00matchesasingleMACaddress.VLANID SelectthisfieldandentertheVLANIDstocompareagainstanEthernetframe.Thisfieldislocatedinthefirst/only802.1QVLANtag.Table53:ACLConfiguration(Cont.)Field Description
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page138UnifiedAccessPointAdministrator’sGuideCreatingaDiffServClassMapTheClientQoSfeaturecontainsDifferentiatedServices(DiffServ)supportthatallowstraffictobeclassifiedintostreamsandgivencertainQoStreatmentinaccordancewithdefinedper‐hopbehaviors.StandardIP‐basednetworksaredesignedtoprovidebesteffortdatadeliveryservice.Besteffortserviceimpliesthatthenetworkdeliversthedatainatimelyfashion,althoughthereisnoguaranteethatitwill.Duringtimesofcongestion,packetsmaybedelayed,sentsporadically,ordropped.FortypicalInternetapplications,suchase‐mailandfiletransfer,aslightdegradationinserviceisacceptableandinmanycasesunnoticeable.However,onapplicationswithstricttimingrequirements,suchasvoiceormultimedia,anydegradationofservicehasundesirableeffects.Byclassifyingthetrafficandcreatingpoliciesthatdefinehowtohandlethesetrafficclasses,youcanmakesurethattime‐sensitivetrafficisgivenprecedenceoverothertraffic.TheUAPsupportsupto50ClassMaps.DefiningDiffServTouseDiffServforClientQoS,usetheClassMapandPolicyMappagestodefinethefollowingcategoriesandtheircriteria:•Class:createclassesanddefineclasscriteria•Policy:createpolicies,associateclasseswithpolicies,anddefinepolicystatementsOnceyoudefinetheclassandassociateitwithapolicy,applythepolicytoaspecifiedVAPontheVAPQoSParameterspage.Packetsareclassifiedandprocessedbasedondefinedcriteria.Theclassificationcriteriaisdefinedbyaclass.Theprocessingisdefinedbyapolicy'sattributes.Policyattributesmaybedefinedonaper‐classinstancebasis,anditistheseattributesthatareappliedwhenamatchoccurs.Apolicycancontainmultipleclasses.Whenthepolicyisactive,theactionstakendependonwhichclassmatchesthepacket.Packetprocessingbeginsbytestingtheclassmatchcriteriaforapacket.Apolicyisappliedtoapacketwhenaclassmatchwithinthatpolicyisfound.DiffServissupportedforIPv4andIPv6packets.UsetheClassMappagetoaddanewDiffservclassname,ortorenameordeleteanexistingclass,anddefinethecriteriatoassociatewiththeDiffServclass.ToconfigureaDiffServClassMap,clicktheClassMaptab.Note:TheClassMappagedisplaystheMatchCriteriaConfigurationfieldsonlyifaClassMaphasbeencreated.TocreateaClassMap,enteranameintheClassMapNamefieldandclickAddClassMap.
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page139UnifiedAccessPointAdministrator’sGuideFigure42:ClientQoSDiffServClassMapTable54:DiffServClassMapField DescriptionClassMapConfigurationClassMapName EnteraClassMapNametoadd.Thenamecanrangefrom1to31alphanumericcharacters.MatchLayer3Protocol SpecifywhethertoclassifyIPv4orIPv6packets.MatchCriteriaConfigurationClassMapName Selectnameoftheclasstoconfigure.UsethefieldsintheMatchCriteriaConfigurationareatomatchpacketstoaclass.Selectthecheckboxforeachfieldtobeusedasacriterionforaclassandenterdataintherelatedfield.Youcanhavemultiplematchcriteriainaclass.Note:ThematchcriteriafieldsthatareavailabledependonwhethertheclassmapisanIPv4orIPv6classmap.
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page140UnifiedAccessPointAdministrator’sGuideMatchEvery SelectMatchEverytospecifythatthematchconditionistruetoalltheparametersinanL3packet.AllL3packetswillmatchanMatchEverymatchcondition.Protocol SelecttheProtocolfieldtouseanL3orL4protocolmatchconditionbasedonthevalueoftheIPProtocolfieldinIPv4packetsortheNextHeaderfieldofIPv6packets.Onceyouselectthefield,choosetheprotocoltomatchbykeywordorenteraprotocolID.SelectFromListSelectoneofthefollowingprotocolsfromthelist:•IP•ICMP•IPv6•ICMPv6•IGMP•TCP•UDPMatchtoValueTomatchaprotocolthatisnotlistedbyname,entertheprotocolID.TheprotocolIDisastandardvalueassignedbytheIANA.Therangeisanumberfrom0–255.IPv4ClassMapsSourceIPAddress Selectthisfieldtorequireapacket'ssourceIPaddresstomatchtheaddresslistedhere.EnteranIPaddressintheappropriatefieldtoapplythiscriteria.SourceIPMask EnterthesourceIPaddressmask.ThemaskforDiffServisanetwork‐stylebitmaskinIPdotteddecimalformatindicatingwhichpart(s)ofthedestinationIPAddresstouseformatchingagainstpacketcontent.ADiffServmaskof255.255.255.255indicatesthatallbitsareimportant,andamaskof0.0.0.0indicatesthatnobitsareimportant.TheoppositeistruewithanACLwildcardmask.Forexample,tomatchthecriteriatoasinglehostaddress,useaDiffServmaskof255.255.255.255.Tomatchthecriteriatoa24‐bitsubnet(forexample192.168.10.0/24),useamaskof255.255.255.0.DestinationIPAddress Selectthisfieldtorequireapacket'sdestinationIPaddresstomatchtheaddresslistedhere.EnteranIPaddressintheappropriatefieldtoapplythiscriteria.DestinationIPMask EnterthedestinationIPaddressmask.ThemaskforDiffServisanetwork‐stylebitmaskinIPdotteddecimalformatindicatingwhichpart(s)ofthedestinationIPAddresstouseformatchingagainstpacketcontent.ADiffServmaskof255.255.255.255indicatesthatallbitsareimportant,andamaskof0.0.0.0indicatesthatnobitsareimportant.TheoppositeistruewithanACLwildcardmask.Forexample,tomatchthecriteriatoasinglehostaddress,useaDiffServmaskof255.255.255.255.Tomatchthecriteriatoa24‐bitsubnet(forexample192.168.10.0/24),useamaskof255.255.255.0.Table54:DiffServClassMap(Cont.)Field Description
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page141UnifiedAccessPointAdministrator’sGuideIPv6ClassMapsSourceIPv6Address Selectthisfieldtorequireapacket'ssourceIPv6addresstomatchtheaddresslistedhere.EnteranIPv6addressintheappropriatefieldtoapplythiscriteria.SourceIPv6PrefixLength EntertheprefixlengthofthesourceIPv6address.DestinationIPv6Address Selectthisfieldtorequireapacket'sdestinationIPv6addresstomatchtheaddresslistedhere.EnteranIPv6addressintheappropriatefieldtoapplythiscriteria.DestinationIPv6PrefixLengthEntertheprefixlengthofthedestinationIPv6address.IPv6FlowLabelFlowlabelis20‐bitnumberthatisuniquetoanIPv6packet.Itisusedbyendstationstosignifyquality‐of‐servicehandlinginrouters(range0to1048575).IPDSCP TouseIPDSCPasamatchcriteria,selectthecheckboxandselectaDSCPvaluekeywordorenteraDSCP.SelectfromListSelectfromalistofDSCPtypes.MatchtoValueEnteraDSCPValuetomatch(0–63).IPv4andIPv6ClassMapsSourcePort Selectthisfieldtoincludeasourceportinthematchconditionfortherule.Thesourceportisidentifiedinthedatagramheader.Onceyouselectthefield,choosetheportnameorentertheportnumber.SelectFromListSelectthekeywordassociatedwiththesourceporttomatch:•ftp• ftpdata•http•smtp•snmp•telnet•tftp•wwwEachofthesekeywordstranslatesintoitsequivalentportnumber.MatchtoPortEntertheIANAportnumbertomatchtothesourceportidentifiedinthedatagramheader.Theportrangeis0–65535andincludesthreedifferenttypesofports:•0–1023:WellKnownPorts•1024–49151:RegisteredPorts•49152–65535:Dynamicand/orPrivatePortsTable54:DiffServClassMap(Cont.)Field Description
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page142UnifiedAccessPointAdministrator’sGuideDestinationPort Selectthisfieldtoincludeadestinationportinthematchconditionfortherule.Thedestinationportisidentifiedinthedatagramheader.Onceyouselectthefield,choosetheportnameorentertheportnumber.SelectFromListSelectthekeywordassociatedwiththedestinationporttomatch:•ftp• ftpdata•http•smtp•snmp•telnet•tftp•wwwEachofthesekeywordstranslatesintoitsequivalentportnumber.MatchtoPortEntertheIANAportnumbertomatchtothedestinationportidentifiedinthedatagramheader.Theportrangeis0–65535andincludesthreedifferenttypesofports:•0–1023:WellKnownPorts•1024–49151:RegisteredPorts•49152–65535:Dynamicand/orPrivatePortsEtherTypeSelecttheEtherTypefieldtocomparethematchcriteriaagainstthevalueintheheaderofanEthernetframe.SelectanEtherTypekeywordorenteranEtherTypevaluetospecifythematchcriteria.SelectfromListSelectSelectoneofthefollowingprotocoltypes:• appletalk•arp•ipv4•ipv6•ipx•netbios• pppoeMatchtoValueEnteracustomprotocolidentifiertowhichpacketsarematched.Thevalueisafour‐digithexidecimalnumberintherangeof0600–FFFF.ClassofService Selectthefieldandenteraclassofservice802.1puserpriorityvaluetobematchedforthepackets.Thevalidrangeis0–7.SourceMACAddress SelectthisfieldandenterthesourceMACaddresstocompareagainstanEthernetframe.Table54:DiffServClassMap(Cont.)Field Description
CreatingaDiffServClassMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page143UnifiedAccessPointAdministrator’sGuideTodeleteaClassMap,selecttheDeleteClassMapoptionandclickApply.SourceMACMask EnterthesourceMACaddressmaskspecifyingwhichbitsinthedestinationMACtocompareagainstanEthernetframe.Anfindicatesthattheaddressbitissignificant,anda0indicatesthattheaddressbitistobeignored.AMACmaskofff:ff:ff:ff:ff:ffmatchesasingleMACaddress.DestinationMACAddress SelectthisfieldandenterthedestinationMACaddresstocompareagainstanEthernetframe.DestinationMACMask EnterthedestinationMACaddressmaskspecifyingwhichbitsinthedestinationMACtocompareagainstanEthernetframe.Anfindicatesthattheaddressbitissignificant,anda0indicatesthattheaddressbitistobeignored.AMACmaskofff:ff:ff:ff:ff:ffmatchesasingleMACaddress.VLANID SelectthefieldandenteraVLANIDtobematchedforpackets.TheVLANIDrangeis0–4095.IPv4ClassMapsServiceType Youcanspecifyonetypeofservicetouseinmatchingpacketstoclasscriteria.IPDSCP TouseIPDSCPasamatchcriteria,selectthecheckboxandselectaDSCPvaluekeywordorenteraDSCP.SelectfromListSelectfromalistofDSCPtypes.MatchtoValueEnteraDSCPValuetomatch(0–63).IPPrecedence Selectthisfieldtomatchthepacket'sIPPrecedencevaluetotheclasscriteriaIPPrecedencevalue.TheIPPrecedencerangeis0–7.IPTOSBits Selectthisfieldandenteravaluetousethepacket'sTypeofServicebitsintheIPheaderasmatchcriteria.TheTOSbitvaluerangesbetween(00–FF).Thehigh‐orderthreebitsrepresenttheIPprecedencevalue.Thehigh‐ordersixbitsrepresenttheIPDifferentiatedServicesCodePoint(DSCP)value.IPTOSMask EnteranIPTOSmaskvaluetoperformabooleanANDwiththeTOSfieldintheheaderofthepacketandcomparedagainsttheTOSenteredforthisrule.TheTOSMaskcanbeusedtocomparespecificbits(Precedence/TypeofService)fromtheTOSfieldintheIPheaderofapacketagainsttheTOSvalueenteredforthisrule.(00–FF).DeleteClassMap ChecktodeletetheclassmapselectedintheClassMapNamemenu.Theclassmapcannotbedeletedifitisalreadyattachedtoapolicy.Table54:DiffServClassMap(Cont.)Field Description
CreatingaDiffServPolicyMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page144UnifiedAccessPointAdministrator’sGuideCreatingaDiffServPolicyMapUsethePolicyMappagetocreateDiffServpoliciesandtoassociateacollectionofclasseswithoneormorepolicystatements.TheUAPsupportsupto50PolicyMaps.Packetsareclassifiedandprocessedbasedondefinedcriteria.TheclassificationcriteriaisdefinedbyaclassontheClassMappage.Theprocessingisdefinedbyapolicy'sattributesonthePolicyMappage.Policyattributesmaybedefinedonaper‐classinstancebasis,anditistheseattributesthatareappliedwhenamatchoccurs.APolicyMapcancontainupto10ClassMaps.Whenthepolicyisactive,theactionstakendependonwhichclassmatchesthepacket.Packetprocessingbeginsbytestingtheclassmatchcriteriaforapacket.Apolicyisappliedtoapacketwhenaclassmatchwithinthatpolicyisfound.TocreateaDiffServpolicy,clickthePolicyMaptab.Figure43:ClientQoSDiffServPolicyMap
CreatingaDiffServPolicyMapD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page145UnifiedAccessPointAdministrator’sGuideTodeleteaPolicyMap,selecttheDeletePolicyMapoptionandclickApply.Table55:DiffServPolicyMapField DescriptionPolicyMapName Enterthennameofthepolicymaptoadd.Thenamecancontainupto31alphanumericcharacters.PolicyMapName(PolicyClassDefinition)Selectthepolicytoassociatewithamemberclass.ClassMapName(PolicyClassDefinition)Selectthememberclasstoassociatewiththispolicyname.PoliceSimple Selectthisoptiontoestablishthetrafficpolicingstylefortheclass.Thesimpleformofthepolicingstyleusesasingledatarateandburstsize,resultingintwooutcomes:conformandnonconform.CommittedRateEnterthecommittedrate,inKbps,towhichtrafficmustconform.CommittedBurstEnterthecommittedburstsize,inbytes,towhichtrafficmustconform.Send SelectSendtospecifythatallpacketsfortheassociatedtrafficstreamaretobeforwardediftheclassmapcriteriaismet.Drop SelectDroptospecifythatallpacketsfortheassociatedtrafficstreamaretobedroppediftheclassmapcriteriaismet.MarkClassofService Selectthisfieldtomarkallpacketsfortheassociatedtrafficstreamwiththespecifiedclassofservicevalueinthepriorityfieldofthe802.1pheader.Ifthepacketdoesnotalreadycontainthisheader,oneisinserted.TheCoSvalueisanintegerfrom0–7.MarkIPDSCP SelectthisfieldtomarkallpacketsfortheassociatedtrafficstreamwiththeIPDSCPvalueyouselectfromthelistorspecify.SelectfromListSelectfromalistofDSCPtypes.MatchtoValueEnteraDSCPValuetomatch(0–63).MarkIPPrecedence SelectthisfieldtomarkallpacketsfortheassociatedtrafficstreamwiththespecifiedIPPrecedencevalue.TheIPPrecedencevalueisanintegerfrom0–7.DisassociateClassMap SelectthisoptionandclickApplytoremovetheclassselectedintheClassMapNamemenufromthepolicyselectedinthePolicyMapNamemenu.MemberClasses ListsallDiffServclassescurrentlydefinedasmembersoftheselectedpolicy.Ifnoclassisassociatedwiththepolicy,thefieldisempty.DeletePolicyMap SelectthisfieldtodeletethepolicymapshowinginthePolicyMapNamemenu.
ClientQoSStatusD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page146UnifiedAccessPointAdministrator’sGuideClientQoSStatusTheClientQoSStatuspageshowstheclientQoSsettingsthatareappliedtoeachclientcurrentlyassociatedwiththeAP.ToviewQoSsettingsforanassociatedclient,clicktheClientQoSStatustab.Figure44:ClientQoSStatusTable56:ClientQoSStatusField DescriptionStation TheStationmenucontainstheMACaddressofeachclientcurrentlyassociatedwiththeAP.ToviewtheQoSsettingsappliedtoaclient,selectitsMACaddressfromthelist.GlobalQoSMode ShowsthecurrentClientQoSGlobalAdminModeontheAP.ClientQoSMode ShowswhethertheQOSmodefortheselectedclientisenabledordisabled.Note:FortheQosModetobeenabledonaclient,itmustbegloballyenabledontheAPandenabledontheVAPtheclientisassociatedwith.UsetheVAPQoSParameterspagetoenabletheQoSGlobalAdminmodeandtheper‐VAPQoSMode.BandwidthLimitUp ShowsthemaximumallowedtransmissionratefromtheclienttotheAPinbitspersecond(bps).Thevalidrangeis0–4294967295bps.BandwidthLimitDown ShowsthemaximumallowedtransmissionratefromtheAPtotheclientinbitspersecond(bps).Thevalidrangeis0–4294967295bps.ACLTypeUp ShowsthetypeofACLthatisappliedtotrafficintheinbound(client‐to‐AP)direction,whichcanbeoneofthefollowing:•IPv4:TheACLexaminesIPv4packetsformatchestoACLrules.•IPv6:TheACLexaminesIPv6packetsformatchestoACLrules.•MAC:TheACLexamineslayer2framesformatchestoACLrules.
ConfiguringRADIUS‐AssignedClientQoSParametersD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page147UnifiedAccessPointAdministrator’sGuideConfiguringRADIUS‐AssignedClientQoSParametersIfaVAPisconfiguredtouseWPAEnterprisesecurity,youcanincludeclientQoSinformationintheclientdatabaseontheRADIUSserver.Whenaclientsuccessfullyauthenticates,theRADIUSservercanincludebandwidthlimitsandidentifytheACLsandDiffServpoliciestoapplytothespecificwirelessclient.ACLsandDiffServpoliciesreferencedintheRADIUSclientdatabasemustmatchthenamesoftheACLsandDiffServpoliciesconfiguredontheAPtobesuccessfullyappliedtothewirelessclients.Table57describestheQoSattributesthatcanbeincludedintheclient'sRADIUSserverentry.IfawirelessclientsuccessfullyauthenticatesusingWPAEnterprise,eachQoSRADIUSattributethatexistsfortheclientissenttotheAPforprocessing.Theattributesareoptionalanddonotneedtobepresentinthecliententry.Iftheattributeisnotpresent,theClientQoSsettingontheAPisused.ACLNameUp ShowsthenameoftheACLappliedtotrafficenteringtheAPintheinbounddirection.WhenapacketorframeisreceivedbytheAP,theACL'srulesarecheckedforamatch.Thepacketorframeisprocessedifitispermittedanddiscardedifitisdenied.ACLTypeDown ShowsthetypeofACLtoapplytotrafficintheoutbound(AP‐to‐client)direction,whichcanbeoneofthefollowing:•IPv4:TheACLexaminesIPv4packetsformatchestoACLrules.•IPv6:TheACLexaminesIPv6packetsformatchestoACLrules•MAC:TheACLexamineslayer2framesformatchestoACLrulesACLNameDown ShowsthenameoftheACLappliedtotrafficintheoutbounddirection.Afterswitchingthepacketorframetotheoutboundinterface,theACL'srulesarecheckedforamatch.Thepacketorframeistransmittedifitispermittedanddiscardedifitisdenied.DiffServPolicyUp ShowsthenameoftheDiffServpolicyappliedtotrafficsenttotheAPintheinbound(client‐to‐AP)direction.DiffServPolicyDown ShowsthenameoftheDiffServpolicyappliedtotrafficfromtheAPintheoutbound(AP‐to‐client)direction.Table57:ClientQoSRADIUSAttributesRADIUSAttribute ID Description Type/RangeVendor‐Specific(26),WISPr‐Bandwidth‐Max‐Down14122,8 MaximumallowedclientreceptionratefromtheAPinbitspersecond.Ifnonzero,thespecifiedvalueisroundeddowntothenearest64KbpsvaluewhenusedintheAP(64Kbpsminimum).Ifzero,bandwidthlimitingisnotenforcedfortheclientinthisdirection.Type:integer32‐bitunsignedintegervalue(0‐4294967295)Table56:ClientQoSStatus(Cont.)Field Description
ConfiguringRADIUS‐AssignedClientQoSParametersD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page148UnifiedAccessPointAdministrator’sGuideVendor‐Specific(26),WISPr‐Bandwidth‐Max‐Up14122,7 MaximumallowedclienttransmissionratetotheAPinbitspersecond.Ifnonzero,thespecifiedvalueisroundeddowntothenearest64KbpsvaluewhenusedintheAP(64Kbpsminimum).Ifzero,bandwidthlimitingisnotenforcedfortheclientinthisdirection.Type:integer32‐bitunsignedintegervalue(0‐4294967295)Vendor‐Specific(26),LVL7‐Wireless‐Client‐ACL‐Dn6132,120 Accesslistidentifiertobeappliedto802.1Xauthenticatedwirelessclienttrafficintheoutbound(down)direction.IfthisattributereferstoanACLthatdoesnotexistontheAP,allpacketsforthisclientwillbedroppeduntiltheACLisdefined.Type:string5‐36characters(notnull‐terminated)Thestringisoftheform“type:name”where:type=ACLtypeidentifier:IPV4,IPV6,MAC:=requiredseparatorcharactername=1‐31alphanumericcharacters,specifyingtheACLnumber(IPV4)orname(IPV6,MAC)Vendor‐Specific(26),LVL7‐Wireless‐Client‐ACL‐Up6132,121 Accesslistidentifiertobeappliedto802.1Xauthenticatedwirelessclienttrafficintheinbound(up)direction.IfthisattributereferstoanACLthatdoesnotexistontheAP,allpacketsforthisclientwillbedroppeduntiltheACLisdefined.Type:string5‐36characters(notnull‐terminated)Thestringisoftheform“type:name”where:type=ACLtypeidentifier:IPV4,IPV6,MAC:=requiredseparatorcharactername=1‐31alphanumericcharacters,specifyingtheACLnumber(IPV4)orname(IPV6,MAC)Vendor‐Specific(26),LVL7‐Wireless‐Client‐Policy‐Dn6132,122 NameofDiffServpolicytobeappliedto802.1Xauthenticatedwirelessclienttrafficintheoutbound(down)direction.IfthisattributereferstoapolicynamethatdoesnotexistontheAP,allpacketsforthisclientwillbedroppeduntiltheDiffServpolicyisdefined.Type:string1‐31characters(notnull‐terminated)Vendor‐Specific(26),LVL7‐Wireless‐Client‐Policy‐Up6132,123 NameofDiffServpolicytobeappliedto802.1Xauthenticatedwirelessclienttrafficintheinbound(up)direction.IfthisattributereferstoapolicynamethatdoesnotexistontheAP,allpacketsforthisclientwillbedroppeduntiltheDiffServpolicyisdefined.Type:string1‐31characters(notnull‐terminated)Table57:ClientQoSRADIUSAttributes(Cont.)RADIUSAttribute ID Description Type/Range
ClusteringMultipleAPsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page149UnifiedAccessPointAdministrator’sGuideSection9:ClusteringMultipleAPsTheUAPsupportsAPclusters.Aclusterprovidesasinglepointofadministrationandletsyouview,deploy,configure,andsecurethewirelessnetworkasasingleentityratherthanaseriesofseparatewirelessdevices.ManagingAccessPointsintheClusterTheAPclusterisadynamic,configuration‐awaregroupofAPsinthesamesubnetofanetwork.Eachclustercanhaveupto16members.Onlyoneclusterperwirelessnetworkissupported;however,anetworksubnetcanhavemultipleclusters.Clusterscansharevariousconfigurationinformation,suchasVAPsettingsandQoSqueueparameters.AclustercanbeformedbetweentwoAPsifthefollowingconditionsaremet:•TheAPsusethesameradiomode(forexample,radio1uses802.11g)•TheAPsareconnectedonthesamebridgedsegment.•TheAPsjoiningtheclusterhavethesameClusterName.• ClusteringmodeisenabledonbothAPs.ClusteringSingleandDualRadioAPsClusteringofsingle‐anddual‐radiosisnotsupported.AclustercancontainamixifDWL‐6600APandDWL‐8600APaccesspoints,butthisclustershouldnotcontainanyDWL‐3600APs.ViewingandConfiguringClusterMembersTheAccessPointspageallowsyoutostartorstopclusteringonanAP,viewtheclustermembers,andconfigurethelocationandclusternameforaclustermember.FromtheAccessPointspage,youcanalsoclicktheIPaddressofeachclustermembertonavigatetoconfigurationsettingsanddataonanaccesspointinthecluster.Toviewinformationaboutclustermembersandtoconfigurethelocationandclusterofanindividualmember,clicktheAccessPointstab.Note:FortwoAPstobeinthesamecluster,theydonotneedtohavethesamenumberofradios;however,thesupportedcapabilitiesoftheradiosshouldbesame.Note:Theweb‐basedUIimagesinthissectionshowtheDWL‐8600APadministrationpages.PagesfortheDWL‐3600APwillnotdisplayinformationforRadio2becauseithasonlyoneradio.
ManagingAccessPointsintheClusterD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page150UnifiedAccessPointAdministrator’sGuideThefollowingfigureshowstheCluster>AccessPointspagewhenclusteringisnotenabled.Figure45:ClusterInformationandMemberConfigurationThefollowingfigureshowstheCluster>AccessPointspagewhenclusteringisenabledandtwoaccesspointsareinthecluster.Figure46:ClusterInformationandMemberConfigurationIfclusteringiscurrentlydisabledontheAP,theStartClusteringbuttonisvisible.Ifclusteringisenabled,theStopClusteringbuttonisvisible.Youcanedittheclusteringoptioninformationwhenclusteringisdisabled.
ManagingAccessPointsintheClusterD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page151UnifiedAccessPointAdministrator’sGuideThefollowingtabledescribestheconfigurationandstatusinformationavailableontheclusterAccessPointspage.Thefollowingtabledescribestheclusterinformationtoconfigureforanindividualmember.Theclusteringoptionsareread‐onlywhenclusteringisenabled.Toconfiguretheclusteringoptions,youmuststopclustering.RemovinganAccessPointfromtheClusterToremoveanaccesspointfromthecluster,dothefollowing.1. GototheAdministrationWebpagesfortheclusteredaccesspoint.TheAdministrationWebpagesforthestandaloneaccesspointaredisplayed.2. ClicktheCluster>AccessPointslinkintheAdministrationpages.3. ClickStopClustering.ThechangewillbereflectedunderStatusforthataccesspoint;theaccesspointwillnowshowasstand‐alone(insteadofcluster).Table58:AccessPointsintheClusterField DescriptionStatus Ifthestatusfieldisvisible,thentheAPisenabledforclustering.Ifclusteringisnotenabled,thentheAPisoperatinginstand‐alonemodeandnoneoftheinformationinthistableisvisible.TodisableclusteringontheAP,clickStopClustering.Location Descriptionofwheretheaccesspointisphysicallylocated.MACAddress MediaAccessControl(MAC)addressoftheaccesspoint.TheaddressshownhereistheMACaddressforthebridge(br0).ThisistheaddressbywhichtheAPisknownexternallytoothernetworks.IPAddress SpecifiestheIPaddressfortheaccesspoint.EachIPaddressisalinktotheAdministrationWebpagesforthataccesspoint.YoucanusethelinkstonavigatetotheAdministrationWebpagesforaspecificaccesspoint.Thisisusefulforviewingdataonaspecificaccesspointtomakesureaclustermemberispickingupclusterconfigurationchanges,toconfigureadvancedsettingsonaparticularaccesspoint,ortoswitchastandaloneaccesspointtoclustermode.Table59:ClusteringOptionsField DescriptionLocation Enteradescriptionofwheretheaccesspointisphysicallylocated.ClusterName EnterthenameoftheclusterfortheAPtojoin.TheclusternameisnotsenttootherAPsinthecluster.YoumustconfigurethesameclusternameoneachAPthatisamemberofthecluster.Theclusternamemustbeuniqueforeachclusteryouconfigureonthenetwork.ClusteringIPVersion SpecifytheIPversionthattheAPsintheclusterusetocommunicatewitheachother.
ManagingAccessPointsintheClusterD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page152UnifiedAccessPointAdministrator’sGuideAddinganAccessPointtoaClusterToaddanaccesspointthatiscurrentlyinstandalonemodebackintoacluster,dothefollowing.1. GototheAdministrationWebpagesforthestandaloneaccesspoint.2. ClicktheCluster>AccessPointslinkintheAdministrationpagesforthestand‐aloneaccesspoint.TheAccessPoints pageforastandaloneaccesspointindicatesthatthecurrentmodeisstandalone.3. TypethenameorlocationoftheAPintheLocationfieldtoidentifytheAPwithinthecluster.4. TypethenameoftheclusterfortheAPtojoinintheClusterNamefield.5. ClickStartClustering.Theaccesspointisnowaclustermember.ItsStatus(Mode)ontheCluster>AccessPointspagenowindicatesClusterinsteadofNotClustered.NavigatingtoConfigurationInformationforaSpecificAPIngeneral,theUAPisdesignedforcentralmanagementofclusteredaccesspoints.Foraccesspointsinacluster,allaccesspointsintheclusterreflectthesameconfiguration.Inthiscase,itdoesnotmatterwhichaccesspointyouactuallyconnecttoforadministration.Theremaybesituations,however,whenyouwanttoviewormanageinformationonaparticularaccesspoint.Forexample,youmightwanttocheckstatusinformationsuchasclientassociationsoreventsforanaccesspoint.Inthiscase,youcannavigatetotheAdministrationWebinterfaceforindividualaccesspointsbyclickingtheIPaddresslinksontheAccessPointspage.AllclusteredaccesspointsareshownontheCluster>AccessPointspage.Tonavigatetoclusteredaccesspoints,youcansimplyclickontheIPaddressforaspecificclustermembershowninthelist.NavigatingtoanAPbyUsingitsIPAddressinaURLYoucanalsolinktotheAdministrationWebpagesofaspecificaccesspoint,byenteringtheIPaddressforthataccesspointasaURLdirectlyintoaWebbrowseraddressbarinthefollowingform:http://IPAddressOfAccessPointwhereIPAddressOfAccessPointistheaddressoftheparticularaccesspointyouwanttomonitororconfigure.
ManagingClusterSessionsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page153UnifiedAccessPointAdministrator’sGuideManagingClusterSessionsTheSessionspageshowsinformationaboutclientstationsassociatedwithaccesspointsinthecluster.EachclientisidentifiedbyitsMACaddress,alongwiththeAP(location)towhichitiscurrentlyconnected.Toviewaparticularstatisticforclientsessions,selectanitemfromtheDisplaydrop‐downlistandclickGo.Youcanviewinformationaboutidletime,datarate,signalstrengthandsoon;allofwhicharedescribedindetailinthetablebelow.Asessioninthiscontextistheperiodoftimeinwhichauseronaclientdevice(station)withauniqueMACaddressmaintainsaconnectionwiththewirelessnetwork.Thesessionbeginswhentheclientlogsontothenetwork,andthesessionendswhentheclienteitherlogsoffintentionallyorlosestheconnectionforsomeotherreason.Tomanagesessionsassociatedwiththecluster,clickCluster>Sessions.Figure47:SessionManagementDetailsaboutthesessioninformationshownisdescribedinthefollowingtable.Note:Asessionisnotthesameasanassociation,whichdescribesaclientconnectiontoaparticularaccesspoint.AclientnetworkconnectioncanshiftfromoneclusteredAPtoanotherwithinthecontextofthesamesession.AclientstationcanroambetweenAPsandmaintainthesession.Table60:SessionManagementField DescriptionAPLocation Indicatesthelocationoftheaccesspoint.ThisisderivedfromthelocationdescriptionspecifiedontheBasicSettingspage.UserMAC IndicatestheMACaddressofthewirelessclientdevice.AMACaddressisahardwareaddressthatuniquelyidentifieseachnodeofanetwork.Idle Indicatestheamountoftimethisstationhasremainedinactive.Astationisconsideredtobeidlewhenitisnotreceivingortransmittingdata.
ConfiguringandViewingChannelManagementSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page154UnifiedAccessPointAdministrator’sGuideSortingSessionInformationTosorttheinformationshowninthetablesbyaparticularindicator,clickthecolumnlabelbywhichyouwanttoorderthings.Forexample,ifyouwanttoseethetablerowsorderedbysignalstrength,clicktheSignalcolumnlabel.Theentrieswillbesortedbysignalstrength.ConfiguringandViewingChannelManagementSettingsWhenChannelManagementisenabled,theUAPautomaticallyassignsradiochannelsusedbyclusteredaccesspoints.Theautomaticchannelassignmentreducesmutualinterference(orinterferencewithotheraccesspointsoutsideofitscluster)andmaximizesWi‐Fibandwidthtohelpmaintaintheefficiencyofcommunicationoverthewirelessnetwork.Youmuststartchannelmanagementtogetautomaticchannelassignments;itisdisabledbydefaultonanewAP.Ataspecifiedinterval,theChannelManagermapsAPstochanneluseandmeasuresinterferencelevelsinthecluster.Ifsignificantchannelinterferenceisdetected,theChannelManagerautomaticallyre‐assignssomeoralloftheAPstonewchannelsperanefficiencyalgorithm(orautomatedchannelplan).IftheChannelManagerdeterminesthatachangeisnecessary,thatinformationissenttoallmembersoftheclusterandasyslogmessageisgeneratedindicatingthesenderAP,newandoldchannelassignments.TheChannelManagementpageshowsprevious,current,andplannedchannelassignmentsforclusteredaccesspoints.Bydefault,automaticchannelassignmentisdisabled.Youcanstartchannelmanagementtooptimizechannelusageacrosstheclusteronascheduledinterval.Toconfigureandviewthechannelassignmentsfortheclustermembers,clicktheChannelManagementtab.Rate Thespeedatwhichthisaccesspointistransferringdatatothespecifiedclient.Thedatatransmissionrateismeasuredinmegabitspersecond(Mbps).Thisvalueshouldfallwithintherangeoftheadvertisedratesetforthemodeinuseontheaccesspoint.Forexample,6to54Mbpsfor802.11a.Signal Indicatesthestrengthoftheradiofrequency(RF)signaltheclientreceivesfromtheaccesspoint.ThemeasureusedforthisisavalueknownasReceivedSignalStrengthIndication(RSSI),andwillbeavaluebetween0and100.RSSIisdeterminedbyamechanismimplementedonthenetworkinterfacecard(NIC)oftheclientstation.RxTotal Indicatesnumberoftotalpacketsreceivedbytheclientduringthecurrentsession.TxTotal Indicatesnumberoftotalpacketstransmittedtotheclientduringthissession.ErrorRate Indicatesthepercentageoftimeframesaredroppedduringtransmissiononthisaccesspoint.Table60:SessionManagementField Description
ConfiguringandViewingChannelManagementSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page155UnifiedAccessPointAdministrator’sGuideFigure48:ChannelManagementFromthispage,youcanviewchannelassignmentsforallAPsintheclusterandstoporstartautomaticchannelmanagement.ByusingtheAdvancedsettingsonthepage,youcanmodifytheinterferencereductionpotentialthattriggerschannelre‐assignment,changethescheduleforautomaticupdates,andre‐configurethechannelsetusedforassignments.Stopping/StartingAutomaticChannelAssignmentBydefault,automaticchannelassignmentisdisabled(off).•ClickStarttoresumeautomaticchannelassignment.Whenautomaticchannelassignmentisenabled,theChannelManagerperiodicallymapsradiochannelsusedbyclusteredaccesspointsand,ifnecessary,re‐assignschannelsonclusteredAPstoreduceinterference(withclustermembersorotherAPsoutsidethecluster).•ClickStoptostopautomaticchannelassignment.(Nochannelusagemapsorchannelre‐assignmentswillbemade.Onlymanualupdateswillaffectthechannelassignment.)Note:ChannelManagementoverridesthedefaultclusterbehavior,whichistosynchronizeradiochannelsofallAPsacrossacluster.WhenChannelManagementisenabled,theradioChannelisnotsyncedacrosstheclustertootherAPs.
ConfiguringandViewingChannelManagementSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page156UnifiedAccessPointAdministrator’sGuideViewingCurrentChannelAssignmentsandSettingLocksTheCurrentChannelAssignmentssectionshowsalistofallaccesspointsintheclusterbyIPAddress.ThedisplayshowsthebandonwhicheachAPisbroadcasting(a/b/g/n),thecurrentchannelusedbyeachAP,andanoptiontolockanAPonitscurrentradiochannelsothatitcannotbere‐assignedtoanother.ThefollowingtableprovidesdetailsaboutCurrentChannelAssignments.ViewingtheLastProposedSetofChangesTheProposedChannelAssignmentsshowsthelastchannelplan.TheplanlistsallaccesspointsintheclusterbyIPAddress,andshowsthecurrentandproposedchannelsforeachAP.Lockedchannelswillnotbere‐assignedandtheoptimizationofchanneldistributionamongAPswilltakeintoaccountthefactthatlockedAPsmustremainontheircurrentchannels.APsthatarenotlockedmaybeassignedtodifferentchannelsthantheywerepreviouslyusing,dependingontheresultsoftheplan.Table61:ChannelAssignmentsField DescriptionIPAddress SpecifiestheIPAddressfortheaccesspoint.Radio IdentifiestheMACaddressoftheradio.Band Indicatesthebandonwhichtheaccesspointisbroadcasting.Current IndicatestheradioChannelonwhichthisaccesspointiscurrentlybroadcasting.Status Showswhethertheradioisup(on)ordown(off).Locked ClickLockedtoforcetheaccesspointtoremainonthecurrentchannel.WhenLockedisselected(enabled)foranaccesspoint,automatedchannelmanagementplanswillnotre‐assigntheAPtoadifferentchannelasapartoftheoptimizationstrategy.Instead,APswithlockedchannelswillbefactoredinasrequirementsfortheplan.IfyouclickApply,youwillseethatlockedAPsshowthesamechannelfortheCurrentChannelandProposedChannelfields.LockedAPswillkeeptheircurrentchannels.Table62:LastProposedChangesField DescriptionIPAddress SpecifiestheIPAddressfortheaccesspoint.Radio Indicatestheradiochannelonwhichthisaccesspointiscurrentlybroadcasting.ProposedChannel Indicatestheradiochanneltowhichthisaccesspointwouldbere‐assignediftheChannelPlanisexecuted.
ConfiguringandViewingChannelManagementSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page157UnifiedAccessPointAdministrator’sGuideConfiguringAdvancedSettingsTheadvancedsettingsallowyoutocustomizeandschedulethechannelplanforthecluster.IfyouuseChannelManagementasprovided(withoutupdatingAdvancedSettings),channelsareautomaticallyfine‐tunedonceeveryhourifinterferencecanbereducedby25percentormore.Channelswillbere‐assignedevenifthenetworkisbusy.Theappropriatechannelsetswillbeused(b/gforAPsusingIEEE802.11b/gandaforAPsusingIEEE802.11a).Thedefaultsettingsaredesignedtosatisfymostscenarioswhereyouwouldneedtoimplementchannelmanagement.UseAdvancedSettingstomodifytheinterferencereductionpotentialthattriggerschannelre‐assignment,changethescheduleforautomaticupdates,andre‐configurethechannelsetusedforassignments.IftherearenofieldsshowingintheAdvancedsection,clickthetogglebuttontodisplaythesettingsthatmodifytiminganddetailsofthechannelplanningalgorithm.ClickApplyunderAdvancedsettingstoapplythesesettings.Advancedsettingswilltakeeffectwhentheyareappliedandinfluencehowautomaticchannelmanagementisperformed.Table63:AdvancedChannelManagementSettingsField DescriptionChangechannelsifinterferenceisreducedbyatleastSpecifytheminimumpercentageofinterferencereductionaproposedplanmustachieveinordertobeapplied.Thedefaultis75percent.Usethedrop‐downmenutochoosepercentagesrangingfrom5percentto75percent.Thissettingletsyousetagatingfactorforchannelre‐assignmentsothatthenetworkisnotcontinuallydisruptedforminimalgainsinefficiency.Forexample,ifchannelinterferencemustbereducedby75percentandtheproposedchannelassignmentswillonlyreduceinterferenceby30percent,thenchannelswillnotbere‐assigned.However;ifyoure‐settheminimalchannelinterferencebenefitto25percentandclickApply,theproposedchannelplanwillbeimplementedandchannelsre‐assignedasneeded.DetermineifthereisbettersetofchannelseveryUsethedrop‐downmenutospecifythescheduleforautomatedupdates.Arangeofintervalsisprovided,from30Minutesto6MonthsThedefaultis1Hour(channelusagere‐assessedandtheresultingchannelplanappliedeveryhour).
ViewingWirelessNeighborhoodInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page158UnifiedAccessPointAdministrator’sGuideViewingWirelessNeighborhoodInformationTheWirelessNeighborhoodshowsupto20accesspointsperradiowithinrangeofeverymemberofthecluster,showswhichaccesspointsarewithinrangeofwhichclustermembers,anddistinguishesbetweenclustermembersandnon‐members.Foreachneighboraccesspoint,theWirelessNeighborhoodviewshowsidentifyinginformation(SSIDorNetworkName,IPAddress,MACaddress)alongwithradiostatistics(signalstrength,channel,beaconinterval).YoucanclickonanAPtogetadditionalstatisticsabouttheAPsinradiorangeofthecurrentlyselectedAP.TheWirelessNeighborhoodviewcanhelpyou:• Detectandlocateunexpected(orrogue)accesspointsinawirelessdomainsothatyoucantakeactiontolimitassociatedrisks• Verifycoverageexpectations.ByassessingwhichAPsarevisibleatwhatsignalstrengthfromotherAPs,youcanverifythatthedeploymentmeetsyourplanninggoals.• Detectfaults.Unexpectedchangesinthecoveragepatternareevidentataglanceinthecolorcodedtable.Figure49:WirelessNeighborhoodNote:TheWirelessNeighborhoodpageshowsupto20accesspointsperradio.Toseealltheaccesspointsdetectedonagivenclusteraccesspoint,navigatetothatclustermember'swebinterfaceandgototheStatus>NeighboringAccessPointspage.
ViewingWirelessNeighborhoodInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page159UnifiedAccessPointAdministrator’sGuideThefollowingtabledescribesdetailsabouttheWirelessNeighborhoodinformation.Table64:WirelessNeighborhoodInformationField DescriptionDisplayneighboringAPs Clickoneofthefollowingradiobuttonstochangetheview:•Incluster—ShowsonlyneighborAPsthataremembersofthecluster•Notincluster—ShowsonlyneighborAPsthatarenotclustermembers•Both—ShowsallneighborAPs(clustermembersandnon‐members)Cluster TheClusterlistatthetopofthetableshowsIPaddressesforallaccesspointsinthecluster.(ThisisthesamelistofclustermembersshownontheCluster>AccessPointstab.)IfthereisonlyoneAPinthecluster,onlyasingleIPaddresscolumnwillbedisplayedhere;indicatingthattheAPisclusteredwithitself.YoucanclickonanIPaddresstoviewmoredetailsonaparticularAP.Neighbors AccesspointswhichareneighborsofoneormoreoftheclusteredAPsarelistedintheleftcolumnbySSID(NetworkName).Anaccesspointwhichisdetectedasaneighborofaclustermembercanalsobeaclustermemberitself.Neighborswhoarealsoclustermembersarealwaysshownatthetopofthelistwithaheavybaraboveandincludealocationindicator.ThecoloredbarstotherightofeachAPintheNeighborslistshowsthesignalstrengthforeachoftheneighborAPsasdetectedbytheclustermemberwhoseIPaddressisshownatthetopofthecolumn.Thecolorofthebarindicatesthesignalstrength:•DarkBlueBar—Adarkbluebarandahighsignalstrengthnumber(forexample50)indicatesgoodsignalstrengthdetectedfromtheNeighborseenbytheAPwhoseIPaddressislistedabovethatcolumn.•LighterBlueBar—Alighterbluebarandalowersignalstrengthnumber(forexample20orlower)indicatesmediumorweaksignalstrengthfromtheNeighborseenbytheAPwhoseIPaddressislistedabovethatcolumn•WhiteBar—Awhitebarandthenumber0indicatesthataneighboringAPthatwasdetectedbyoneoftheclustermemberscannotbedetectedbytheAPwhoseIPaddressiflistedabovethatcolumn.•LightGrayBar—AlightgraybarandnosignalstrengthnumberindicatesaNeighborthatisdetectedbyotherclustermembersbutnotbytheAPwhoseIPaddressislistedabovethatcolumn.•DarkGrayBar—AdarkgraybarandnosignalstrengthnumberindicatesthisistheAPwhoseIPaddressislistedabovethatcolumn(sinceitisnotapplicabletoshowhowwelltheAPcandetectitself).
ViewingWirelessNeighborhoodInformationD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page160UnifiedAccessPointAdministrator’sGuideViewingDetailsforaClusterMemberToviewdetailsonaclustermemberAP,clickontheIPaddressofaclustermemberatthetopofthepage.ThefollowingfigureshowstheNeighborDetailsforRadio1oftheAPwithanIPaddressof10.27.65.66.Figure50:DetailsforaClusterMemberAPThefollowingtableexplainsthedetailsshownabouttheselectedAP.Table65:ClusterMemberDetailsField DescriptionSSID TheServiceSetIdentifier(SSID)fortheaccesspoint.TheSSIDisanalphanumericstringofupto32charactersthatuniquelyidentifiesawirelesslocalareanetwork.ItisalsoreferredtoastheNetworkName.AGuestnetworkandanInternalnetworkrunningonthesameaccesspointmustalwayshavetwodifferentnetworknames.MACAddress ShowstheMACaddressoftheneighboringaccesspoint.AMACaddressisahardwareaddressthatuniquelyidentifieseachnodeofanetwork.Channel Showsthechannelonwhichtheaccesspointiscurrentlybroadcasting.TheChanneldefinestheportionoftheradiospectrumthattheradiousesfortransmittingandreceiving.Rate Showstherate(inmegabitspersecond)atwhichthisaccesspointiscurrentlytransmitting.ThecurrentratewillalwaysbeoneoftheratesshowninSupportedRates.Signal Indicatesthestrengthoftheradiosignalemittingfromthisaccesspointasmeasuredindecibels(Db).BeaconInterval ShowstheBeaconintervalbeingusedbythisaccesspoint.Beaconframesaretransmittedbyanaccesspointatregularintervalstoannouncetheexistenceofthewirelessnetwork.Thedefaultbehavioristosendabeaconframeonceevery100milliseconds(or10persecond).BeaconAge Showsthedateandtimeofthelastbeaconreceivedfromthisaccesspoint.
DefaultAPSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page161UnifiedAccessPointAdministrator’sGuideAppendixA:DefaultAPSettingsWhenyoufirstpoweronaUAP,ithasthedefaultsettingsshowninthefollowingtable.Note:TheDWL‐3600APsupportsoneradio,anditiscapableofoperatingintheIEEE802.11b,802.11g,and802.11n(2.4GHz)modes.Radio1(802.11a/n)settingsdonotapplytotheDWL‐3600AP.Table66:UAPDefaultSettingsFeature DefaultSystemInformationUserName adminPassword adminEthernetInterfaceSettingsConnectionType DHCPDHCP EnabledIPAddress 10.90.90.91(ifnoDHCPserverisavailable)SubnetMask 255.0.0.0DNSName NoneManagementVLANID 1UntaggedVLANID 1IPv6AdminMode EnabledIPv6AutoConfigAdminMode EnabledRadioSettingsRadio(1and2) OnRadio1IEEE802.11Mode 802.11a/nRadio2IEEE802.11Mode 802.11b/g/n802.11a/nChannel Auto802.11b/g/nChannel AutoRadio1ChannelBandwidth 40MHzRadio2ChannelBandwidth 20MHzPrimaryChannel LowerShortGuardIntervalSupported YesSTBCMode OnProtection AutoMaximumWirelessClients 200TransmitPower 100percent
DefaultAPSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page162UnifiedAccessPointAdministrator’sGuideLegacyRateSetsSupported(Mbps) IEEE802.11a:54,48,36,24,18,12,9,6IEEE802.11b:11,5.5,2,1IEEE802.11g:54,48,36,24,18,12,11,9,6,5.5,2,1LegacyRateSets(Mbps) (Basic/Advertised)IEEE802.11a:24,12,6IEEE802.11b:2,1IEEE802.11g:11,5.5,2,1MCS(DataRate)Settings (802.11nonly)0–15EnabledBroadcast/MulticastRateLimiting DisabledFixedMulticastRate AutoBeaconInterval 100DTIMPeriod 2FragmentationThreshold 2346RTSThreshold 2347TSPECMode OffTSPECVoiceACMMode OffVirtualAccessPointSettingsStatus VAP0isenabledonbothradios,allotherVAPsdisabledVLANID 1NetworkName(SSID) dlink1throughdlink16BroadcastSSID AllowSecurityMode None(plaintext)MACAuthenticationType NoneRADIUSIPAddress 10.90.90.1RADIUSKey secretRADIUSAccounting DisabledRedirectMode NoneOtherDefaultSettingsWDSSettings NoneSTP DisabledMACAuthentication NostationsinlistLoadBalancing DisabledSNMP EnabledROSNMPCommunityName publicSNMPAgentPort 161SNMPSetRequests EnabledManagedAPMode EnabledTable66:UAPDefaultSettings(Cont.)Feature Default
DefaultAPSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page163UnifiedAccessPointAdministrator’sGuideAuthentication(802.1XSupplicant) DisabledManagementACL DisabledHTTPAccess Enabled;disabledinManagedModeHTTPSAccess Enabled;disabledinManagedModeConsolePortAccess EnabledTelnetAccess Enabled;disabledinManagedModeSSHAccess Enabled;disabledinManagedModeWMM EnabledEmailAlertAdminMode DownTime Manual(Notset)ClientQoSGlobalAdminMode DisabledPer‐VAPClientQoSMode DisabledClustering StoppedTable66:UAPDefaultSettings(Cont.)Feature Default
ConfigurationExamplesD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page164UnifiedAccessPointAdministrator’sGuideAppendixB:ConfigurationExamplesThisappendixcontainsexamplesofhowtoconfigureselectedfeaturesavailableontheUAP.EachexamplecontainsproceduresonhowtoconfigurethefeaturebyusingtheWebinterface,CLI,andSNMP.Thisappendixdescribeshowtoperformthefollowingprocedures:•“ConfiguringaVAP”•“ConfiguringRadioSettings”•“ConfiguringtheWirelessDistributionSystem”•“ClusteringAccessPoints”•“ConfiguringClientQoS”ForallSNMPexamples,theobjectsyouusetoAPareinaprivateMIB.Thepathtothetablesthatcontaintheobjectsisiso(1).org(3).dod(6).internet(1).private(4).enterprises(1).dlink(171).dlink‐products(10).dwl‐ap(37).dwlWLANAP(26).ConfiguringaVAPThisexampleshowshowtoconfigureVAP1withthefollowingnon‐defaultsettings:•VLANID:2• SSID:Marketing•Security:WPAPersonalusingWPA2withCCMP(AES)VAPConfigurationfromtheWebInterface1. LogontotheAPandnavigatetotheManage>VAPpage.2. IntheEnabledcolumnforVAP1,selectthecheckbox.3. Enter2intheVLANIDcolumn.4. IntheSSIDcolumn,deletetheexistingSSIDandtypeMarketing.5. SelectWPAPersonalfromthemenuintheSecuritycolumn.Additionalfieldsappear.6. SelecttheWPA2andCCMP(AES)options,andcleartheWPAandTKIPoptions.
ConfiguringaVAPD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page165UnifiedAccessPointAdministrator’sGuide7. EnteraWPAencryptionkeyintheKeyfield.Thekeycanbeamixofalphanumericandspecialcharacters.Thekeyiscasesensitiveandcanbebetween8and63characters.8. ClickApplytoupdatetheAPwiththenewsettings.VAPConfigurationfromtheCLI1. ConnecttotheAPbyusingTelnet,SSHoraserialconnection.2. EnableVAP1.setvapvap1statusup3. SettheVLANIDto2.setvapvap1vlan‐id24. SettheSSIDtoMarketing.setinterfacewlan0vap1ssidMarketing5. SettheSecurityModetoWPAPersonal.setinterfacewlan0vap1securitywpa‐personal6. AllowWPA2clients,andnotWPAclients,toconnecttotheAP.setbsswlan0bssvap1wpa‐allowedoffsetbsswlan0bssvap1wpa2‐allowedon7. SettheCipherSuitetoCCMP(AES)only.setbsswlan0bssvap1wpa‐cipher‐tkipoffsetbsswlan0bssvap1wpa‐cipher‐ccmpon8. SetthePre‐sharedkey.setinterfacewlan0vap1wpa‐personal‐keyJuPXkC7GvY$moQiUttp2Ifthesharedsecretkeysincludesspaces,placethekeyinsidequotationmarks.9. Usethefollowingcommandstoviewandverifythesettings.getinterfacewlan0vap1detailgetvapvap1detailNote:ThepreviouscommandsetstheVLANIDto2forVAP1onbothradios.TosettheVLANIDforVAP1onradiooneonly,usethefollowingcommand:set vap 1 with radio wlan0 to vlan-id 2.
ConfiguringRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page166UnifiedAccessPointAdministrator’sGuideVAPConfigurationUsingSNMP1. LoadtheDLINK‐WLAN‐ACCESS‐POINT‐MIBmodule.2. FromtheMIBtree,navigatetotheobjectsintheapVaptable.3. WalktheapVapDescriptionobjecttoviewtheinstanceIDforVAP1(wlan0vap1).VAP1onRadio1isinstance3.4. UsetheapVapStatusobjecttosetthestatusofVAP1toup(1).5. UsetheapVapVlanIDobjecttosettheVLANIDofVAP1to2.6. NavigatetotheobjectsintheapIfConfigtable.7. WalktheapIfConfigNameobjecttoviewtheinstanceIDforVAP1(wlan0vap1).VAP1onRadio1isinstance3.8. Setthevalueofinstance3intheapIfConfigSsidobjecttoMarketing.9. Setthevalueofinstance3intheapIfConfigSecurityobjecttowpa‐personal(3).10. Setthevalueofinstance3intheapIfConfigWpaPersonalKeyobjecttoJuPXkC7GvY$moQiUttp2,whichistheWPApre‐sharedkey.11. NavigatetotheobjectsintheapRadioBss>apBssTabletable.12. WalktheapBssDescrobjecttoviewtheinstanceIDforVAP1.VAP1onRadio1isinstance1.13. Setthevalueofinstance1intheapBssWpaAllowedobjecttofalse(2).14. Setthevalueofinstance1intheapBssWpaCipherTkipobjecttofalse(2).15. Setthevalueofinstance1intheapBssWpaCipherCcmpobjecttotrue(1).ConfiguringRadioSettingsThisexampleshowshowtoconfigureRadio2withthefollowingsettings:•Mode:IEEE802.11b/g/n•Channel:6•ChannelBandwidth:40MHz•MaximumStations:100•TransmitPower:75%RadioConfigurationfromtheWebInterface1. LogontotheAPandnavigatetotheManage>Radiopage.2. Makesurethenumber2appearsintheRadiofieldandthatthestatusisOn.3. FromtheModemenu,selectIEEE802.11b/g/n.4. FromtheChannelfield,select6.
ConfiguringRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page167UnifiedAccessPointAdministrator’sGuide5. FromtheChannelBandwidthfield,select40MHz.6. IntheMaximumStationsfield,changethevalueto100.7. IntheTransmitPowerfield,changethevalueto75.ThefollowingimageshowstheRadiopagewiththesettingsspecifiedinthisexample.8. ClickApplytoupdatetheAPwiththenewsettings.
ConfiguringRadioSettingsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page168UnifiedAccessPointAdministrator’sGuideRadioConfigurationfromtheCLI1. ConnecttotheAPbyusingTelnet,SSH,oraserialconnection.2. TurnRadio2onifthestatusisnotcurrentlyup.setradiowlan1statuson3. SetthemodetoIEEE802.11b/g/n.setradiowlan1modebg‐n4. Setthechannelto6.setradiowlan1channel‐policystaticsetradiowlan1static‐channel65. Setthechannelbandwidthto40MHz.setradiowlan1n‐bandwidth406. Allowamaximumof100stationstoconnecttotheAPatatime.setbsswlan1bssvap0max‐stations1007. Setthetransmitpowerto75percent.setradiowlan1tx‐power758. Viewinformationabouttheradiosettings.getradiowlan1detailRadioConfigurationUsingSNMP1. LoadtheDLINK‐WLAN‐ACCESS‐POINT‐MIBmodule.2. FromtheMIBtree,navigatetotheobjectsintheapRadiotable(apRadioBss>apRadioTable).3. UsetheapRadioStatusobjecttosetthestatusofRadio2toup(1).4. UsetheapRadioModeobjecttosettheRadio2modetoIEEE802.11b/g/n,whichisbg‐n(4).5. UsetheapRadioChannelPolicyobjecttosetthechannelpolicytostatic(1),whichdisablestheautomaticchannelassignment.6. UsetheapRadioStaticChannelobjecttosetthechannelto6.7. UsetheapRadioChannelBandwithobjecttosetthechannelbandwidthforRadio2toforty‐MHz(2).8. UsetheapRadioTxPowerobjecttosetthetransmissionpoweronRadio2to75.9. NavigatetotheobjectsintheapBssTable.10. UsetheapBssMaxStationsobjecttosetthevalueofthemaximumallowedstationsto100.
ConfiguringtheWirelessDistributionSystemD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page169UnifiedAccessPointAdministrator’sGuideConfiguringtheWirelessDistributionSystemThisexamplesshowshowtoconfigureaWDSlinkbetweentwoAPs.ThelocalAPisMyAP1andhasaMACaddressof00:1B:E9:16:32:40,andtheremoteAPisMyAP2withaMACaddressof00:30:AB:00:00:B0.TheWDSlinkhasthefollowingsettings,whichmustbeconfiguredonbothAPs:• Encryption:WPA(PSK)• SSID:wds‐link•Key:abcdefghijkWDSConfigurationfromtheWebInterfaceTocreateaWDSlinkbetweenapairofaccesspoints“MyAP1”and“MyAP2”usethefollowingsteps:1. LogontoMyAP1andnavigatetotheManage>WDSpage.TheMACaddressforMyAP1(theaccesspointyouarecurrentlyviewing)isautomaticallyprovidedintheLocalAddressfield.2. EntertheMACaddressforMyAP2intheRemoteAddressfield,orclickthearrownexttothefieldandselecttheMACaddressofMyAP2fromthepop‐uplist.3. SelectWPA(PSK)fromtheEncryptionmenu.Note:TheWPA(PSK)optionisavailableonlyifVAP0onRadio1usesWPA(PSK)asthesecuritymethod.IfVAP0isnotsettoWPAPersonalorWPAEnterprise,youmustchooseeitherNone(Plain‐text)orWEPforWDSlinkencryption.
ConfiguringtheWirelessDistributionSystemD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page170UnifiedAccessPointAdministrator’sGuide4. Enterwds‐linkintheSSIDfieldandabcdefghijkintheKeyfield.5. ClickApplytoapplytheWDSsettingstotheAP.6. LogontoMyAP2andrepeatsteps2‐5(butbesuretousetheMACaddressofMyAP1intheRemoteAddressfield.WDSConfigurationfromtheCLI1. ConnecttotheMyAP1byusingTelnet,SSH,oraserialconnection.2. ConfiguretheremoteMACaddressforMyAP2.setinterfacewlan0wds0statusupremote‐mac00:30:AB:00:00:B03. SetWPA(PSK)astheencryptiontypeforthelink.setinterfacewlan0wds0wds‐security‐policywpa‐personal4. SettheSSIDontheWDSlink.setinterfacewlan0wds0wds‐ssidwds‐link5. Configuretheencryptionkey.setinterfacewlan0wds0wds‐wpa‐psk‐keyabcdefghijk6. AdministrativelyenabletheWDSlink.setinterfacewlan0wds0statusup7. PerformthesameconfigurationstepsonMyAP2.Note:MyAP1andMyAP2mustbesettothesameIEEE802.11Modeandbetransmittingonthesamechannel.
ConfiguringtheWirelessDistributionSystemD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page171UnifiedAccessPointAdministrator’sGuideWDSConfigurationUsingSNMP1. LoadtheFASTPATH‐WLAN‐ACCESS‐POINT‐MIBmodule.2. FromtheMIBtree,navigatetotheobjectsintheapIfConfigtable.3. WalktheapIfConfigNameobjecttoviewtheinstanceIDforthefirstWDSlink(wlan0wds0).ThefirstWDSlinkisinstance1.4. Setthevalueofinstance1intheapIfConfigRemoteMacobjectto00:30:AB:00:00:B0.IntheMG‐Softbrowser,theformatfortheMACaddressvaluetosetis#0x000x300xAB0x000x000xB0.5. Setthevalueofinstance1intheapIfConfigWdsSecPolicyobjecttoWPAPersonal(3).6. Setthevalueofinstance1intheapIfConfigSsidobjecttowds‐link.7. Setthevalueofinstance1intheapIfConfigWdsWpaPskKeyobjecttoabcdefthijk.SomeMIBbrowsersrequirethatthevaluebeenteredinHEXvaluesratherthanASCIIvalues.8. PerformthesameconfigurationstepsonMyAP2.
ClusteringAccessPointsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page172UnifiedAccessPointAdministrator’sGuideClusteringAccessPointsThisexampleshowshowtoconfigureaclusterwithtwoAPsandtoenableautomaticchannelre‐assigment.ThelocationofthelocalAPisRoom214,andtheclusternameisMyCluster.ClusteringAPsbyUsingtheWebInterface1. LogontotheAPandnavigatetotheCluster>AccessPointspage.2. Ifclusteringhasstarted,clickStopClusteringsoyoucanchangetheClusteringOptions.3. EntertheAPlocationandthenameoftheclusterforittojoin.4. ClickApply.5. ClickStartClusteringtoenabletheclusteringfeature.Afteryourefreshthepage,otherAPsthatareonthesamebridgedsegment,haveradiosinthesameoperatingmode,areenabledforclustering,andhavethesameclusternameappearintheAccessPointstable.
ClusteringAccessPointsD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page173UnifiedAccessPointAdministrator’sGuide6. GototheChannelManagementpagetoviewthechannelassignments.Atableonthepagedisplaysthecurrentchannelassignmentsandtheproposedchannelassignments.TheintervalsettingintheAdvancedsectiondeterminehowoftenproposedchangesareapplied.ClusteringAPsbyUsingtheCLI1. ConnecttotheAPbyusingTelnet,SSH,oraserialconnection.2. Stopclusteringsoyoucanchangethelocationandclustername.setclusterclustered03. SettheAPLocation.setclustercluster‐name“Room214"4. Settheclustername.setclusterlocationMyCluster5. Startclustering.setclusterclustered16. ViewinformationabouttheclustersettingsontheAP.getclusterdetail7. Starttheautomaticchannelplanner.setchannel‐plannerstatusup8. Viewthesettingsfortheautomaticchannelplanner.getchannel‐plannerdetailNote:Iftheclusternameorclusterlocationhasspaces,youmustenclosethetextinquotationmarkswhenyouenterthetextintheCLI,asthecommandexampleshows.YoudonotneedtousequotationmarkswhenyouentertextbyusingtheWebUI.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page174UnifiedAccessPointAdministrator’sGuideClusteringAPsbyUsingSNMPClusterconfigurationbyusingSNMPisnotsupported.ConfiguringClientQoSThisexampleshowshowtoenableclientQoS,configureanACLandaDiffServpolicyontheAP,andtoapplytheACLandthePolicytotraffictransmittedfromclientsassociatedwithVAP2andreceivedbytheAP.TheIPv4ACLisnamedacl1andcontainstworules.ThefirstruleallowsHTTPtrafficfromthe192.168.1.0subnet.ThesecondruleallowsallIPtrafficfromthemanagementstation(192.168.1.23).AllothertrafficisdeniedduetotheimplicitdenyallruleattheendoftheACL.TheACLisappliedtotheinboundinterfaceontheAPsothatpacketsarecheckedwhentheAPreceivestrafficfromassociatedclients.TheDiffServpolicyinthisexampleshowshowtoestablishdefaultDiffServbehaviorforclientsassociatingwiththeVAPthatdonotobtainaDiffServpolicynamethroughtheRADIUSserver.Voicetraffic(UDPpackets)receivedfromclientsinthe192.168.1.0subnetthathastheVoIPserverasitsdestinationaddress(192.168.2.200),ismarkedwiththeIPDSCPvalueforexpeditedforwardingsothatittakespriorityoverothertraffic.ConfiguringQoSbyUsingtheWebInterfaceACLConfiguration1. LogontotheAPandnavigatetotheClientQoS>ClientQoSACLpage.2. Enteracl1intheACLNamefield,andclickAddACL.Thescreenrefreshes,andadditionalfieldsappear.3. FromtheActionmenu,selectPermit.4. CleartheMatchEveryoption.5. VerifythattheProtocoloptionisselectedandIPisselectedfromtheSelectFromListmenu.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page175UnifiedAccessPointAdministrator’sGuide6. Configuretheremainingsettings:•SourceIPAddress:192.168.1.0•WildCardMask:0.0.0.255•SourcePort:Selecttheoption• SelectFromList(SourcePort):www7. ClickApplytosavetherule.8. SelectNewRulefromtheRulemenuandcreateanotherrulewiththefollowingsettings:•Action:Permit•MatchEvery:Cleartheoption•Protocol:IP• Address:192.168.1.23•WildCardMask:0.0.0.09. ClickApplytosavetherule.10. NavigatetotheClientQoS>VAPQoSParameterspage.11. FortheClientQoSGlobalAdminModeoption,selectEnabled.12. FromtheVAPmenu,selectVAP2.13. SelecttheEnabledoptionforClientQoSMode.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page176UnifiedAccessPointAdministrator’sGuide14. FromtheACLTypeUpmenu,selectIPv4.15. FromtheACLNameUpmenu,selectacl1.16. ClickApplytoupdatetheAPwiththeQoSsettings.DiffServConfiguration1. LogontotheAPandnavigatetotheClientQoS>ClassMappage.2. Enterclass_voipintheClassMapNamefieldandclickAddClassMap.Thepagerefreshesandadditionalfieldsappear.3. SelecttheMatchEveryoptiontoindicatethatallmatchcriteriadefinedfortheclassmustbesatisfiedinorderforapackettobeconsideredamatch.4. SelectProtocol,andthenselectUDPfromtheSelectFromListfieldtodefineUDPasamatchcriteria.5. SelectSourceIPAddressandenterthefollowinginformation:• Address:192.168.1.0•SourceIPMask:255.255.255.06. SelecttheDestinationIPAddressoptionandenterthefollowinginformationfortheVoIPserver:• Address:192.168.2.200
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page177UnifiedAccessPointAdministrator’sGuide•DestinationIPMask:255.255.255.2557. ClickApplytosavethematchcriteria.8. NavigatetotheClientQoS>PolicyMappage.9. Tocreateapolicy,enterpol_voipintothePolicyMapNamefield,andthenclickAddPolicyMap.Thepagerefreshesandadditionalfieldsappear.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page178UnifiedAccessPointAdministrator’sGuide10. Fortheclass_voipclassmap,selecttheIPDSCPoption,andthenselecteffromtheSelectFromListmenu.11. Trafficthatmeetsthecriteriadefinedintheclass_voipclassismarkedwithaDSCPvalueofEF(expeditedforwarding).12. ClickApplytosavethepolicy.13. NavigatetotheClientQoS>VAPQoSParameterspage.14. SelectVAP2fromtheVAPmenu.15. MakesurethattheClientQoSGlobalAdminModeandtheQoSModearebothenabled.16. FromtheDiffServPolicyUpmenu,selectpol_voip.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page179UnifiedAccessPointAdministrator’sGuide17. ClickApplytoupdatetheAPwiththeQoSsettings.ConfiguringQoSbyUsingtheCLIACLConfiguration1. ConnecttotheAP.2. CreateanACLnamedacl1.addaclacl1acl‐typeipv43. Addaruletoacl1thatallowsHTTPtrafficfromthe192.168.1.0subnet.addruleacl‐nameacl2acl‐typeipv4actionpermitprotocolipsrc‐ip192.168.1.0src‐ip‐mask0.0.0.255src‐porthttp4. Addanotherruletoacl1thatallowsalltrafficfromthehostwithanIPaddressof192.168.1.23.addruleacl‐nameacl2acl‐typeipv4actionpermitprotocolipsrc‐ip192.168.1.23src‐ip‐mask0.0.0.05. EnableClientQoSontheAP.setclient‐qosmodeup6. EnableClientQoSonVAP2setvapwlan0vap2qos‐modeup7. Applyacl1toVAP2intheinbounddirection(fromtheclienttotheAP).setvapwlan0vap2def‐acl‐upacl1DiffServConfiguration1. LogontotheAPCLI.2. Createaclassmapnamedclass_voipandconfigureittomatchallUDPpacketsfromthe192.168.1.0networkthathaveadestinationIPaddressof192.168.2.200(theVoIPserver).
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page180UnifiedAccessPointAdministrator’sGuideaddclass‐mapclass_voipeveryyesprotocoludpsrc‐ip192.168.1.0src‐ip‐mask255.255.255.0dst‐ip192.168.2.200dst‐ip‐mask255.255.255.2553. Addapolicymapnamedpol_voip.addpolicy‐mappol_voip4. Definethepol_voippolicymapbyaddingtheclass_voipclassmapandspecifyingthatpacketsthatmatchtheclass_voipcriteriawillbemarkedwithaDSCPvalueofEF(expeditedforwarding).addpolicy‐attrpolicy‐map‐namepol_voipclass‐map‐nameclass_voipmark‐ip‐dscpef5. EnableClientQoSontheAP.setclient‐qosmodeup6. EnableClientQoSonVAP2setvapwlan0vap2qos‐modeup7. Applypol_voiptoVAP2intheinbounddirection(fromtheclienttotheAP).setvapwlan0vap2def‐policy‐uppol_voipConfiguringQoSbyUsingSNMPACLConfiguration1. LoadtheDLINK‐WLAN‐ACCESS‐POINT‐MIBmodule.2. FromtheMIBtree,navigatetotheobjectsintheapQos>apAclTable.3. UsetheapQosAclStatusobjecttocreatearowentrywithapQosAclNameandapQosAclTypeastheindexesforapQosAclEntry.ThenewapQosAclEntryvalueincludestheapQosAclType(1)followedbythenumberofcharactersinthename(4),andthentheASCIIcodeforthename.Inthisexample,acl1is97.99.108.49.Thevaluetosetis4,whichisCreateandGo.4. Addaruletoacl1thatallowsHTTPtrafficfromthe192.168.1.0subnet.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.14.1.4.97.99.108.49.1tosettheapQosAclRuleStatusofRule1toactive(1)IntheOID,the14(bold)isthesequenceidentifierfortheapQosAclRuleStatussobject,1istheACLtype,4.97.99.108.49istheACLname(thenumberofcharactersfollowedbytheASCIIcode),andthefinal1
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page181UnifiedAccessPointAdministrator’sGuideistheACLrulenumber.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.4.1.4.97.99.108.49.1tosettheapQosAclRuleSrcIpAddresstoavalueof192.168.1.0.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.5.1.4.97.99.108.49.1tosettheapQosAclRuleSrcIpMasktoavalueof0.0.0.255.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.6.1.4.97.99.108.49.1tosetapQosAclRuleSrcProtocoltoavalueof80(HTTP).•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.16.1.4.97.99.108.49.1tosetapQosAclRuleCommittoavalueof1(true),whichsavestherule.5. Addanotherruletoacl1thatallowsalltrafficfromthehostwithanIPaddressof192.168.1.23.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.14.1.4.97.99.108.49.2tosettheapQosAclRuleStatusofRule2toactive(1)•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.4.1.4.97.99.108.49.2tosettheapQosAclRuleSrcIpAddresstoavalueof192.168.1.23.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.5.1.4.97.99.108.49.2tosettheapQosAclRuleSrcIpMasktoavalueof0.0.0.0.•Use1.3.6.1.4.1.6132.1.1.28.10.3.1.16.1.4.97.99.108.49.2tosetapQosAclRuleCommittoavalueof1(true),whichsavestherule.6. UsetheapQosGlobalModeobjecttosetthestatustoup(1),whichenablesClientQoSontheAP.7. WalktheapVapDescriptionobjecttoviewtheinstanceIDforVAP2(wlan0vap2).VAP2onRadio1isinstance5.8. UsetheapVapQosModeobjecttosetthestatusofVAP2toup(1).9. UsetheapVapAclUpobjecttoapplyacl1toVAP2intheinbounddirection(fromtheclienttotheAP).TheACLnameisthetextstring,andnottheASCIIcode.
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page182UnifiedAccessPointAdministrator’sGuideDiffServConfiguration1. LoadtheDLINK‐WLAN‐ACCESS‐POINT‐MIBmodule.2. FromtheMIBtree,navigatetotheobjectsintheapQos>apAclTable.3. UsetheapQosDsClassMapStatusobjecttosetthestatusoftheclassmapnamedclass_voiptoCreateandGo(4).TheOIDtosetis1.3.6.1.4.1.6132.1.1.28.10.4.1.2.10.99.108.97.115.115.95.118.111.105.112,where10isthenumberofcharacters,and99.108.97.115.115.95.118.111.105.112isclass_voipinASCIIcode.4. Configureclass_voiptomatchallUDPpacketsfromthe192.168.1.0networkthathaveadestinationIPaddressof192.168.2.200(theVoIPserver).•SetapQosDsClassMapMatchEverytotrue(1).•SetapQosDsClassMapMatchProtocoltoUDP(17).•SetapQosDsClassMapMatchSrcIpAddressto192.168.1.0.•SetapQosDsClassMapMatchSrcIpMaskto255.255.255.0.•SetapQosDsClassMapMatchDestIpAddressto192.168.2.200.•SetapQosDsClassMapMatchDestIpMaskto255.255.255.255•SetapQosDsClassMapMatchCommittotrue(1).5. Createapolicymapnamedpol_voip(whichis112.111.108.95.118.111.105.112inASCII)bysettingthevalueoftheOID1.3.6.1.4.1.6132.1.1.28.10.5.1.2.8.112.111.108.95.118.111.105.112toCreateandGo(4).6. Definethepol_voippolicymapbyaddingtheclass_voipclassmapandspecifyingthatpacketsthatmatchtheclass_voipcriteriawillbemarkedwithaDSCPvalueofEF(expeditedforwarding).•SetapQosDsPolicyMapAttrStatus.8.112.111.108.95.118.111.105.112.10.99.108.97.115.115.95.118.111.105.112.1toavalueof4(CreateandGo)•SetapQosDsPolicyMapAttrMarkIpDscp.8.112.111.108.95.118.111.105.112.10.99.108.97.115.115.95.118.111.105.112.1to46(whichistheequivalentofef).
ConfiguringClientQoSD-Link UnifiedAccessPointAdministrator’sGuide November2011 Page183UnifiedAccessPointAdministrator’sGuide7. EnableClientQoSontheAP.setclient‐qosmodeup8. UsetheapQosGlobalModeobjecttosetthestatustoup(1),whichenablesClientQoSontheAP.9. WalktheapVapDescriptionobjecttoviewtheinstanceIDforVAP2(wlan0vap2).VAP2onRadio1isinstance5.10. UsetheapVapQosModeobjecttosetthestatusofVAP2toup(1).11. UsetheapVapPolUpobjecttoapplypol_voiptoVAP2intheinbounddirection(fromtheclienttotheAP).Thepolicynameisthetextstring,andnottheASCIIcode.
Professional installation instruction Please be advised that due to the unique function supplied by this product, the device is intended for use with our interactive entertainment software and licensed third-party only. The product will be distributed through controlled distribution channel and installed by trained professional and will not be sold directly to the general public through retail store.  1. Installation personal   This product is designed for specific application and needs to be installed by a qualified personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting.  2. Installation location  The product shall be installed at a location where the radiating antenna can be kept 20 cm from nearby person in normal operation condition to meet regulatory RF exposure requirement.  3. External antenna  Use only the antennas which have been approved by D-Link Corporation. The non-approved antenna(s) may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC/IC limit and is prohibited.  4. Installation procedure  Please refer to user’s manual for the detail.  5. Warning  Please carefully select the installation position and make sure that the final output power does not exceed the limit set force in relevant rules. The violation of the rule could lead to serious federal penalty.
Instructions d'installation professionnelle Veuillez noter que l'appareil etant dedie a une fonction unique, il doit etre utilise avec notre logiciel proprietaire de divertissement interactif . Ce produit sera propose par un reseau de distribution controle et installe par des professionels; il ne sera pas propose au grand public par le reseau de la grande distribution.  1. Installation   Ce produit est destine a un usage specifique et doit etre installe par un personnel qualifie maitrisant les radiofrequences et les regles s'y rapportant. L'installation et les reglages ne doivent pas etre modifies par l'utilisateur final.  2. Emplacement d'installation En usage normal, afin de respecter les exigences reglementaires concernant l'exposition aux radiofrequences, ce produit doit etre installe de facon a respecter une distance de 20 cm entre l'antenne emettrice et les personnes.  3. Antenn externe. Utiliser uniiquement les antennes approuvees par le fabricant. L'utilisation d'autres antennes peut conduire a un niveau de rayonnement essentiel ou non essentiel depassant les niveaux limites definis par FCC/IC, ce qui est interdit.  4. Procedure d'installation Consulter le manuel d'utilisation.  5. Avertissement Choisir avec soin la position d'installation et s'assurer que la puissance de sortie ne depasse pas les limites en vigueur. La violation de cette regle peut conduire a de serieuses penalites federales.
Federal Communication Commission Interference Statement  This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.   If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  For operation within 5.15 ~ 5.25GHz frequency range, it is restricted to indoor environment.    IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user.
Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement indésirable.   Caution : (i) the device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; (ii) high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices. Avertissement: (i) les dispositifs fonctionnant dans la bande 5 150-5 250 MHz sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux; (ii) De plus, les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL. Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. This device has been designed to operate with an antenna having a maximum gain of 5 dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and
maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. This radio transmitter (IC: 4216A-WL6600APA1 / Model: DWL-6600APA1) has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. Ce dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximal de 5 dBi. Une antenne à gain plus élevé est strictement interdite par les règlements d'Industrie Canada. L'impédance d'antenne requise est de 50 ohms. Conformément  à la réglementation d'Industrie Canada, le présent  émetteur radio peutfonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pourl'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage radioélectriqueà  l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que lapuissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire àl'établissement d'une communication satisfaisante. Le présent émetteur radio (IC: 4216A-WL6600APA1 / Model: DWL-6600APA1) a été approuvé par Industrie Canada pour fonctionner avec les types d'antenne énumérés ci-dessous et ayant un gain admissible maximal et l'impédance requise pour chaque type d'antenne. Les types d'antenne non inclus dans cette liste, ou dont le gain est supérieur au gain maximal indiqué, sont strictement interdits pour l'exploitation de l'émetteur. Approved antenna(s) list (for instance) Type Gain  Dipole 5dBi
NCC Statement 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大功率或變更原設計之特性及功能  低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾  在 5.25-5.35 秭赫(GHz)頻帶內操作之無線資訊傳輸設備,限於室內使用。  此器材須經專業安裝。

Navigation menu