D Link WL6700APA1 802.11n Dual-band Unified Access Point User Manual

D Link Corporation 802.11n Dual-band Unified Access Point

User manual

UNIFIED ACCESS POINTADMINISTRATOR’S GUIDEPRODUCT MODEL: DWL-2600AP, DWL-3600AP, DWL-6600AP, DWL-6610AP, DWL-6700AP, DWL-8600AP, DWL-8610APUNIFIED WIRED & WIRELESS ACCESS SYSTEMRELEASE 6.00April 2015© COPYRIGHT 2015. ALL RIGHTS RESERVED
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 2April 2015 Table of ContentsSection 1 - About This Document ............................................................................................9Document Organization ......................................................................................................................................... 9Additional Documentation ..................................................................................................................................... 9Document Conventions ......................................................................................................................................... 9Online Help, Supported Browsers, and Limitations ............................................................................................. 10Section 2 - Getting Started ...................................................................................................... 11Administrator’s Computer Requirements ............................................................................................................ 11Wireless Client Requirements ............................................................................................................................. 12Dynamic and Static IP Addressing on the AP ...................................................................................................... 13Recovering an IP Address ............................................................................................................................. 13Discovering a Dynamically Assigned IP Address .......................................................................................... 13Installing the UAP ................................................................................................................................................ 13Basic Settings ...................................................................................................................................................... 16Connecting to the AP Web Interface by Using the IPv6 Address .................................................................. 17Using the CLI to View the IP Address.................................................................................................................. 17Conguring the Ethernet Settings ....................................................................................................................... 18Using the CLI to Congure Ethernet Settings ............................................................................................... 18Conguring IEEE 802.1X Authentication ............................................................................................................. 19Using the CLI to Congure 802.1X Authentication Information ..................................................................... 20Verifying the Installation ...................................................................................................................................... 20Conguring Security on the Wireless Access Point ............................................................................................. 21Section 3 - Viewing Access Point Status ...............................................................................22Viewing Interface Status ...................................................................................................................................... 22Wired Settings (Internal Interface) ................................................................................................................ 22Wireless Settings .......................................................................................................................................... 22Viewing Events .................................................................................................................................................... 23Conguring Persistent Logging Options ........................................................................................................ 23Conguring the Log Relay Host for Kernel Messages .................................................................................. 24Enabling or Disabling the Log Relay Host on the Events Page .................................................................... 24Viewing Transmit and Receive Statistics ............................................................................................................. 25Viewing Associated Wireless Client Information ................................................................................................. 26Viewing TSPEC Client Associations .................................................................................................................... 26Link Integrity Monitoring ................................................................................................................................ 28Viewing Rogue AP Detection............................................................................................................................... 28Saving and Importing the Known AP List ...................................................................................................... 30Viewing Managed AP DHCP Information ............................................................................................................ 31Viewing TSPEC Status and Statistics Information .............................................................................................. 31Viewing TSPEC AP Statistics Information ........................................................................................................... 32Viewing Radio Statistics Information ................................................................................................................... 33Viewing Email Alert Operational Status ............................................................................................................... 34Section 4 - Managing the Access Point .................................................................................35Ethernet Settings ................................................................................................................................................. 35Wireless Settings ................................................................................................................................................. 37Using the 802.11h Wireless Mode ................................................................................................................. 39Enabling AeroScout™ Engine Support ......................................................................................................... 39Modifying Radio Settings ..................................................................................................................................... 40Conguring Radio and VAP Scheduler................................................................................................................ 44Scheduler Association Settings ........................................................................................................................... 46Virtual Access Point Settings ............................................................................................................................... 47None (Plain-text) ........................................................................................................................................... 50Static WEP .................................................................................................................................................... 50IEEE 802.1X .................................................................................................................................................. 51WPA Personal ............................................................................................................................................... 53WPA Enterprise ............................................................................................................................................. 54Conguring the Wireless Distribution System (WDS) ......................................................................................... 56WEP on WDS Links ...................................................................................................................................... 57WPA/PSK on WDS Links .............................................................................................................................. 58
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 3April 2015 Controlling Access by MAC Authentication ......................................................................................................... 58Conguring a MAC Filter and Station List on the AP..................................................................................... 59Conguring MAC Authentication on the RADIUS Server .............................................................................. 59Conguring Load Balancing ................................................................................................................................ 60Managed Access Point Overview ........................................................................................................................ 60Transitioning Between Modes ....................................................................................................................... 61Conguring Managed Access Point Settings ................................................................................................ 61Conguring 802.1X Authentication ...................................................................................................................... 62Creating a Management Access Control List (ACL) ............................................................................................ 63Section 5 - Conguring Access Point Services ....................................................................65Web Server Settings ........................................................................................................................................... 65Conguring SNMP on the Access Point .............................................................................................................. 66Setting the SSH Status ........................................................................................................................................ 68Setting the Telnet Status ..................................................................................................................................... 69Conguring Quality of Service ............................................................................................................................. 69Conguring Email Alert ........................................................................................................................................ 72Enabling the Time Settings (NTP) ....................................................................................................................... 73Section 6 - Conguring SNMPv3 ............................................................................................75Conguring SNMPv3 Views ................................................................................................................................ 75Conguring SNMPv3 Groups .............................................................................................................................. 76Conguring SNMPv3 Users ................................................................................................................................ 77Conguring SNMPv3 Targets .............................................................................................................................. 78Section 7 - Maintaining the Access Point ..............................................................................79Saving the Current Conguration to a Backup File ............................................................................................. 79Restoring the Conguration from a Previously Saved File .................................................................................. 80Performing AP Maintenance ................................................................................................................................ 81Resetting the Factory Default Conguration ................................................................................................. 81Rebooting the Access Point .......................................................................................................................... 81Upgrading the Firmware ...................................................................................................................................... 81Packet Capture Conguration and Settings ........................................................................................................ 83Packet Capture Status .................................................................................................................................. 83Packet Capture Parameter Conguration ..................................................................................................... 84Packet File Capture ....................................................................................................................................... 84Remote Packet Capture ................................................................................................................................ 85Packet Capture File Download ...................................................................................................................... 87Section 8 - Conguring Client Quality of Service (QoS) ......................................................88Conguring VAP QoS Parameters ...................................................................................................................... 88Managing Client QoS ACLs ................................................................................................................................. 89IPv4 and IPv6 ACLs ...................................................................................................................................... 89MAC ACLs ..................................................................................................................................................... 90ACL Conguration Process ........................................................................................................................... 90Creating a DiffServ Class Map ............................................................................................................................ 95Dening DiffServ ........................................................................................................................................... 96Creating a DiffServ Policy Map ......................................................................................................................... 100Client QoS Status .............................................................................................................................................. 101Conguring RADIUS-Assigned Client QoS Parameters ................................................................................... 102Section 9 - Clustering Multiple APs .....................................................................................104Managing Cluster Access Points in the Cluster ................................................................................................. 104Clustering APs ............................................................................................................................................. 104Viewing and Conguring Cluster Members ................................................................................................. 104Removing an Access Point from the Cluster ............................................................................................... 106Adding an Access Point to a Cluster ........................................................................................................... 106Navigating to Conguration Information for a Specic AP........................................................................... 106Navigating to an AP by Using its IP Address in a URL ................................................................................ 106Managing Cluster Sessions ............................................................................................................................... 106Sorting Session Information ........................................................................................................................ 107Conguring and Viewing Channel Management Settings ................................................................................. 108Stopping/Starting Automatic Channel Assignment ...................................................................................... 108Viewing Current Channel Assignments and Setting Locks ......................................................................... 109
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 4April 2015 Viewing the Last Proposed Set of Changes ................................................................................................ 109Conguring Advanced Settings ................................................................................................................... 109Viewing Wireless Neighborhood Information .................................................................................................... 110Viewing Details for a Cluster Member ......................................................................................................... 112Appendix A - Default AP Settings .........................................................................................113Appendix B - Conguration Examples ................................................................................115Conguring a VAP ............................................................................................................................................. 115VAP Conguration from the Web Interface ................................................................................................. 115VAP Conguration from the CLI .................................................................................................................. 116VAP Conguration Using SNMP ................................................................................................................. 116Conguring Radio Settings ................................................................................................................................ 117Radio Conguration from the Web Interface ............................................................................................... 117Radio Conguration from the CLI ................................................................................................................ 117Radio Conguration Using SNMP ............................................................................................................... 118Conguring the Wireless Distribution System ................................................................................................... 118WDS Conguration from the Web Interface ................................................................................................ 118WDS Conguration from the CLI ................................................................................................................. 119WDS Conguration Using SNMP ................................................................................................................ 119Clustering Access Points ................................................................................................................................... 119Clustering APs by Using the Web Interface ................................................................................................ 119Clustering APs by Using the CLI ................................................................................................................. 120Clustering APs by Using SNMP .................................................................................................................. 120Conguring Client QoS  ..................................................................................................................................... 121Conguring QoS by Using the Web Interface ............................................................................................. 121Conguring QoS by Using the CLI .............................................................................................................. 124Appendix C - DWL-6700AP Prole and Conguration Table .............................................127Appendix D - Statements ......................................................................................................129
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 5April 2015 List of FiguresFigure 1 - Administrator UI Online Help ................................................................................................................... 10Figure 2 - Web UI Login Prompt .............................................................................................................................. 14Figure 3 - Provide Basic Settings ............................................................................................................................ 15Figure 4 - Command Line Interface (CLI) Connection ............................................................................................ 18Figure 5 - Viewing Interface Status ......................................................................................................................... 22Figure 6 - Viewing Events ........................................................................................................................................ 23Figure 7 - Viewing Trafc Statistics ......................................................................................................................... 25Figure 8 - Viewing Client Association Information ................................................................................................... 26Figure 9 - Viewing TSPEC Client Associations ....................................................................................................... 27Figure 10 - Viewing Rogue and Known Access Points............................................................................................ 28Figure 11 - Managed AP DHCP Information ............................................................................................................ 31Figure 12 - Viewing TSPEC Status and Statistics ................................................................................................... 31Figure 13 - View TSPEC Status and Statistics ........................................................................................................ 32Figure 14 - View Radio Statistics ............................................................................................................................. 33Figure 15 - Email Alert Operational Status .............................................................................................................. 34Figure 16 - Modify Ethernet (Wired) settings ........................................................................................................... 35Figure 17 - Modify Wireless Settings ....................................................................................................................... 37Figure 18 - Modify Radio Settings ........................................................................................................................... 40Figure 19 - Scheduler Conguration ....................................................................................................................... 45Figure 20 - Scheduler Conguration (Modify Rule) ................................................................................................. 46Figure 21 - Scheduler Association Settings ............................................................................................................. 46Figure 22 - Modify Virtual Access Point Settings ..................................................................................................... 48Figure 23 - Modify Virtual Access Point Settings (Static WEP) ............................................................................... 50Figure 24 - Modify Virtual Access Point Settings (IEEE802.1X) .............................................................................. 52Figure 25 - Modify Virtual Access Point Settings (WPA Personal) .......................................................................... 53Figure 26 - Modify Virtual Access Point Settings (WPA Enterprise) ........................................................................ 54Figure 27 - Congure WDS Bridges ........................................................................................................................ 57Figure 28 - Congure MAC Authentication .............................................................................................................. 59Figure 29 - Modify Load Balancing Settings ............................................................................................................ 60Figure 30 - Congure Managed AP Wireless Switch Parameters ........................................................................... 62Figure 31 - Modify 802.1X Supplicant Authentication Settings ................................................................................ 63Figure 32 - Congure Management Access Control Parameters ............................................................................ 64Figure 33 - Congure Web Server Settings ............................................................................................................. 65Figure 34 - SNMP Conguration ............................................................................................................................. 67Figure 35 - Set SSH Status ..................................................................................................................................... 68Figure 36 - Set Telnet Status ................................................................................................................................... 69Figure 37 - Modify QoS Queue Parameters ............................................................................................................ 70Figure 38 - Email Alerts Conguration ..................................................................................................................... 72Figure 39 - Time Settings (NTP) .............................................................................................................................. 74Figure 40 - SNMPv3 Views Conguration ............................................................................................................... 75Figure 41 - SNMPv3 Groups Conguration ............................................................................................................. 76Figure 42 - SNMPv3 User Conguration ................................................................................................................. 77Figure 43 - SNMPv3 Targets Conguration ............................................................................................................. 78Figure 44 - Manage this Access Point’s Conguration - Save (TFTP) .................................................................... 79Figure 45 - Manage this Access Point’s Conguration - Save (HTTP) .................................................................... 79Figure 46 - Conrmation Prompt ............................................................................................................................. 80Figure 47 - Manage this Access Point’s Conguration - Restore (TFTP) ................................................................ 80Figure 48 - Manage this Access Point’s Conguration - Restore (HTTP) ............................................................... 80Figure 49 - Performing AP Maintenance ................................................................................................................. 81Figure 50 - Manage Firmware (TFTP) ..................................................................................................................... 82Figure 51 - Manage Firmware (HTTP) .................................................................................................................... 82Figure 52 - Packet Capture Conguration & Settings ............................................................................................. 83Figure 53 - Packet Capture Status .......................................................................................................................... 84Figure 54 - Packet Capture Conguration ............................................................................................................... 84Figure 55 - Packet File Capture .............................................................................................................................. 85Figure 56 - Remote Packet Capture ........................................................................................................................ 86Figure 57 - Packet Capture File Download ............................................................................................................. 87Figure 58 - Congure Client QoS VAP Settings ...................................................................................................... 88Figure 59 - Congure Client QoS ACL Settings ...................................................................................................... 90
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 6April 2015 Figure 60 - Congure Client QoS DiffServ Class Map Settings .............................................................................. 96Figure 61 - Congure Client QoS DiffServ Policy Map Settings ............................................................................ 100Figure 62 - QoS Conguration Status For Associated Clients .............................................................................. 101Figure 63 - Manage Access Points In The Cluster (Passive) ................................................................................ 104Figure 64 - Manage Access Points In The Cluster (Active) ................................................................................... 105Figure 65 - Manage Sessions Associated With The Cluster ................................................................................. 107Figure 66 - Automatically Manage Channel Assignments ..................................................................................... 108Figure 67 - View Neighboring Access Points ..........................................................................................................111Figure 68 - Viewing Details For A Cluster Member ................................................................................................ 112Figure 69 - VAP Conguration from the Web Interface ......................................................................................... 115Figure 70 - Radio Conguration from the Web Interface ....................................................................................... 117Figure 71 - WDS Conguration from the Web Interface ........................................................................................ 118Figure 72 - Clustering APs by Using the Web Interface (Passive) ........................................................................ 119Figure 73 - Clustering APs by Using the Web Interface (Active) ........................................................................... 120Figure 74 - Conguring QoS by Using the Web Interface (ACL Name) ................................................................ 121Figure 75 - Conguring QoS by Using the Web Interface (Rule1) ........................................................................ 121Figure 76 - Conguring QoS by Using the Web Interface (Rule2) ........................................................................ 122Figure 77 - Conguring QoS by Using the Web Interface (VAP QoS Parameters) ............................................... 122Figure 78 - Conguring QoS by Using the Web Interface (Class Map Name) ...................................................... 123Figure 79 - Conguring QoS by Using the Web Interface (Rule) .......................................................................... 123Figure 80 - Congure Client QoS DiffServ Policy Map Settings (Policy Map Name) ............................................ 123Figure 81 - Congure Client QoS DiffServ Policy Map Settings (Rule) ................................................................. 124Figure 82 - Congure Client QoS VAP Settings .................................................................................................... 124
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 7April 2015 List of TablesTable 1 - Typographical Conventions ...................................................................................................................... 10Table 2 - Requirements for the Administrator’s Computer ....................................................................................... 12Table 3 - Requirements for Wireless Clients ........................................................................................................... 12Table 4 - Basic Settings Page ................................................................................................................................. 17Table 5 - CLI Commands for Ethernet Setting  ........................................................................................................ 19Table 6 - CLI Commands for the 802.1X Supplicant ............................................................................................... 20Table 7 - Logging Options ....................................................................................................................................... 24Table 8 - Log Relay Host ......................................................................................................................................... 24Table 9 - Transmit/Receive ...................................................................................................................................... 26Table 10 - Associated Clients .................................................................................................................................. 26Table 11 - TSPEC Client Associations ..................................................................................................................... 28Table 12 - Rogue AP Detection ............................................................................................................................... 30Table 13 - TSPEC Status and Statistics .................................................................................................................. 32Table 14 - TSPEC AP Statistics ............................................................................................................................... 33Table 15 - Radio Statistics Information .................................................................................................................... 34Table 16 - Email Alert Status ................................................................................................................................... 34Table 17 - Ethernet Settings .................................................................................................................................... 36Table 18 - Wireless Settings .................................................................................................................................... 39Table 19 - Radio Settings ........................................................................................................................................ 44Table 20 - Scheduler Conguration ......................................................................................................................... 45Table 21 - Scheduler Association Settings .............................................................................................................. 47Table 22 - Virtual Access Point Settings .................................................................................................................. 50Table 23 - Static WEP .............................................................................................................................................. 51Table 24 - IEEE 802.1X ........................................................................................................................................... 53Table 25 - WPA Personal ......................................................................................................................................... 54Table 26 - WPA Enterprise ....................................................................................................................................... 56Table 27 - WDS Settings ......................................................................................................................................... 57Table 28 - WEP on WDS Links ................................................................................................................................ 58Table 29 - WPA/PSK on WDS Links ........................................................................................................................ 58Table 30 - MAC Authentication ................................................................................................................................ 60Table 31 - RADIUS Server Attributes for MAC Authentication ................................................................................. 60Table 32 - Load Balancing ....................................................................................................................................... 61Table 33 - Managed Access Point ........................................................................................................................... 62Table 34 - IEEE 802.1X Supplicant Authentication .................................................................................................. 63Table 35 - Management ACL ................................................................................................................................... 64Table 36 - Web Server Settings ............................................................................................................................... 66Table 37 - SNMP Settings ....................................................................................................................................... 68Table 38 - SSH Settings .......................................................................................................................................... 69Table 39 - Telnet Settings ........................................................................................................................................ 69Table 40 - QoS Settings .......................................................................................................................................... 72Table 41 - Email Alert Conguration ........................................................................................................................ 73Table 42 - NTP Settings ........................................................................................................................................... 74Table 43 - SNMPv3 Views ....................................................................................................................................... 75Table 44 - SNMPv3 Groups ..................................................................................................................................... 77Table 45 - SNMPv3 Users ....................................................................................................................................... 77Table 46 - SNMPv3 Targets ..................................................................................................................................... 78Table 47 - Packet Capture Status ............................................................................................................................ 84Table 48 - Packet Capture Conguration ................................................................................................................ 84Table 49 - Packet File Capture ................................................................................................................................ 85Table 50 - Remote Packet Capture ......................................................................................................................... 87Table 51 - Packet Capture File Download ............................................................................................................... 87Table 52 - VAP QoS Parameters ............................................................................................................................. 89Table 53 - ACL Conguration ................................................................................................................................... 95Table 54 - DiffServ Class Map ................................................................................................................................. 99Table 55 - DiffServ Policy Map .............................................................................................................................. 101Table 56 - Client QoS Status ................................................................................................................................. 102Table 57 - Client QoS RADIUS Attributes .............................................................................................................. 103Table 58 - Access Points in the Cluster ................................................................................................................. 105Table 59 - Cluster Options ..................................................................................................................................... 105
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 8April 2015 Table 60 - Session Management ........................................................................................................................... 107Table 61 - Channel Assignments ........................................................................................................................... 109Table 62 - Last Proposed Changes ....................................................................................................................... 109Table 63 - Advanced Channel Management Settings ........................................................................................... 110Table 64 - Wireless Neighborhood Information ......................................................................................................111Table 65 - Cluster Member Details ........................................................................................................................ 112Table 66 - UAP Default Settings ............................................................................................................................ 114
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 9April 2015Section 1 - About This DocumentSection 1 - About This DocumentThis guide describes setup, conguration, administration and maintenance for the D-Link DWL-x600AP Unied Access Point (UAP) on a wireless network.Document OrganizationThe Unied Access Point Administrator’s Guide contains the following sections:•) “Section 1 - About This Document” on page 9•) “Section 2 - Getting Started” on page 11•) “Section 3 - Viewing Access Point Status” on page 22•) “Section 4 - Managing the Access Point” on page 35•) “Section 5 - Conguring Access Point Services” on page 65•) “Section 6 - Conguring SNMPv3” on page 75•) “Section 7 - Maintaining the Access Point” on page 79•) “Section 8 - Conguring Client Quality of Service (QoS)” on page 88•) “Section 9 - Clustering Multiple APs” on page 104•) “Appendix A - Default AP Settings” on page 113•) “Appendix B - Conguration Examples” on page 115Additional DocumentationThe following documentation provides additional information about Unied Access Point software:•)  The Unied Access Point CLI Command Reference describes the commands available from the command-line interface (CLI) for managing, monitoring, and conguring the switch.•)  The User Manual for the D-Link Unied Wired and Wireless System provides information about setting up and managing the Unied Wireless Switch (UWS), including information about how to use the switch to manage multiple UAPs. •)  Release notes for the D-Link Unied Wired and Wireless System detail the platform-specic functionality of the software packages, including issues and workarounds.Document ConventionsThis section describes the conventions this document uses.Note: A note provides more information about a feature or technology and cross-references to related topics.Caution! A caution provides information about critical aspects of AP conguration, combinations of settings, events, or procedures that can adversely affect network connectivity, security, and so on.The following table describes the typographical conventions used in this guide.Symbol Example DescriptionBold Click Apply to save your settings. Menu titles, page names, and button names.Blue Text See “Document Conventions” on page 9Hyperlink text.Courier Font WLAN-AP# show network Screen text, le names, commands, user-typed command-line entries.Courier Font ItalicsValue Command parameter, which might be a variable or xed value.Square Brackets [ ] [Value] Indicates an optional xed parameter.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 10April 2015Section 1 - About This DocumentSymbol Example DescriptionCurly Braces {} {Choice1 | Choice2} Indicates that you must select a parameter from the list of choices.Vertical Bars | Choice1 | Choice2 Separates the mutually exclusive choices.Braces within square brackets [{}][{Choice1 | Choice2}] Indicate a choice within an optional element.Table 1 - Typographical ConventionsOnline Help, Supported Browsers, and LimitationsOnline help for the UAP Administration Web pages provides information about all elds and features available from the user interface (UI). The information in the online help is a subset of the information available in the Unied Access Point Administrator’s Guide.Online help information corresponds to each page on the UAP Administration UI. For information about the settings on the current page, click the Help link on the upper right side of a page. The following gure shows an example of the online help available from the links on the user interface.Figure 1 - Administrator UI Online Help
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 11April 2015Section 2 - Getting StartedSection 2 - Getting StartedThe D-Link DWL-x600AP unied access point (UAP) provides continuous, high-speed access between wireless devices and Ethernet devices. It is an advanced, standards-based solution for wireless networking in businesses of any size. The UAP enables wireless local area network (WLAN) deployment while providing state-of-the-art wireless networking features.The UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as an individual access point in the network, and you manage it by using the Administrator Web User Interface (UI), command-line interface (CLI), or SNMP. In Managed Mode, the UAP is part of the D-Link Unied Wired and Wireless System, and you manage it by using the D-Link Unied Wireless Switch. If an AP is in Managed Mode, the Administrator Web UI, Telnet, SSH, and SNMP services are disabled.This document describes how to perform the setup, management, and maintenance of the UAP in Standalone Mode. For information about conguring the AP in Managed Mode by using the D-Link Unied Wireless Switch, see the User Manual for the switch.Before you power on a new UAP, review the following sections to check required hardware and software components, client congurations, and compatibility issues. Make sure you have everything you need for a successful launch and test of your new or extended wireless network.The DWL-6600AP and DWL-8600AP are dual-radio access points and support the IEEE 802.11a, 802.11b, 802.11g, and 802.11n modes. The DWL-2600AP and DWL-3600AP are single-radio access points and support the IEEE 802.11b, IEEE 802.11g, and 802.11n (2.4 GHz) modes.This section contains the following topics:•) “Administrator’s Computer Requirements” on page 11•) “Wireless Client Requirements” on page 12•) “Dynamic and Static IP Addressing on the AP” on page 13•) “Installing the UAP” on page 13•) “Basic Settings” on page 16•) “Using the CLI to View the IP Address” on page 17•) “Conguring the Ethernet Settings” on page 18•) “Conguring IEEE 802.1X Authentication” on page 19•) “Verifying the Installation” on page 20•) “Conguring Security on the Wireless Access Point” on page 21To manage the UAP by using the Web interface or by using the CLI through Telnet or SSH, the AP needs an IP address. If you use VLANs or IEEE 802.1X Authentication (port security) on your network, you might need to congure additional settings on the AP before it can connect to the network.Note: The WLAN AP is not designed to function as a gateway to the Internet. To connect your WLAN to other LANs or the Internet, you need a gateway device.Administrator’s Computer RequirementsThe following table describes the minimum requirements for the administrator’s computer for conguration and administration of the UAP through a Web-based user interface (UI).Required Software or Component DescriptionSerial or Ethernet Connection to the Access PointThe computer used to congure the rst access point must be connected to the access point by a serial cable or an Ethernet cable.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 12April 2015Section 2 - Getting StartedRequired Software or Component DescriptionWireless Connection to the Network After initial conguration and launch of the rst access point on your new wireless network, you can make subsequent conguration changes through the Administration Web pages using a wireless connection to the internal network. For wireless connection to the access point, your administration device will need Wi-Fi capability similar to that of any wireless client:•)  Portable or built-in Wi-Fi client adapter that supports one or more of the IEEE 802.11 modes in which you plan to run the access point.•)  Wireless client software congured to associate with the UAP.Web Browser and Operating System Conguration and administration of the UAP is provided through a Web-based user interface hosted on the access point. We recommend using one of the following supported Web browsers to access the access point Administration Web pages:•)  Microsoft® Internet Explorer® version 7.x or 8.x (with up-to-date patch level for either major version)•)  Mozilla® Firefox version 3.5 or later•)  Safari 5 and later versionsThe administration Web browser must have JavaScript™ enabled to support the interactive features of the administration interface.Security Settings Ensure that security is disabled on the wireless client used to initially congure the access point.Table 2 - Requirements for the Administrator’s ComputerWireless Client RequirementsThe UAP provides wireless access to any client with a properly congured Wi-Fi client adapter for the 802.11 mode in which the access point is running. The UAP supports multiple client operating systems. Clients can be laptop or desktop computers, personal digital assistants (PDAs), or any other hand-held, portable or stationary device equipped with a Wi-Fi adapter and supporting drivers.To connect to the access point, wireless clients need the software and hardware described in the following table.Required Component DescriptionWi-Fi Client Adapter Portable or built-in Wi-Fi client adapter that supports one or more of the IEEE 802.11 modes in which you plan to run the access point.Wireless Client Software Client software, such as Microsoft Windows Supplicant, congured to associate with the UAP.Client Security Settings Security should be disabled on the client used to do initial conguration of the access point.If the Security mode on the access point is set to anything other than plain text, wireless clients will need to set a prole to the authentication mode used by the access point and provide a valid username and password, certicate, or similar user identity proof. Security modes are Static WEP, IEEE 802.1X, WPA with RADIUS server, and WPA-PSK.For information about conguring security on the access point, see “Virtual Access Point Settings” on page 47. Table 3 - Requirements for Wireless Clients
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 13April 2015Section 2 - Getting StartedDynamic and Static IP Addressing on the APWhen you power on the access point, the built-in DHCP client searches for a DHCP server on the network in order to obtain an IP Address and other network information. If the AP does not nd a DHCP server on the network, the AP continues to use its default Static IP Address (10.90.90.91) until you re-assign it a new static IP address (and specify a static IP addressing policy) or until the AP successfully receives network information from a DHCP server.To change the connection type and assign a static IP address by using the CLI, see “Conguring the Ethernet Settings” on page 18 or, by using the Web UI, see “Ethernet Settings” on page 35.Caution! If you do not have a DHCP server on your internal network, and do not plan to use one, the rst thing you must do after powering on the access point is change the connection type from DHCP to static IP. You can either assign a new static IP address to the AP or continue using the default address. We recommend assigning a new static IP address so that if you bring up another WLAN AP on the same network, the IP address for each AP will be unique.Recovering an IP AddressIf you experience trouble communicating with the access point, you can recover a static IP address by resetting the AP conguration to the factory defaults (see “Resetting the Factory Default Conguration” on page 81), or you can get a dynamically assigned address by connecting the AP to a network that has a DHCP server.Discovering a Dynamically Assigned IP AddressIf you have access to the DHCP server on your network and know the MAC address of your AP, you can view the new IP address associated with the MAC address of the AP. If you do not have access to the DHCP server that assigned the IP address to the AP or do not know the MAC address of the AP, you might need to use the CLI to nd out what the new IP address is. For information about how to discover a dynamically assigned IP address, see “Using the CLI to View the IP Address” on page 17.Installing the UAPTo access the Administration Web UI, you enter the IP address of the AP into a Web browser. You can use the default IP address of the AP (10.90.90.91) to log on to the AP and assign a static IP address, or you can use a DHCP server on you network to assign network information to the AP. The DHCP client on the AP is enabled by default.To install the UAP, use the following steps:1.)  Connect the AP to an administrative PC by using a LAN connection or a direct-cable connection. •) To use a LAN connection, connect one end of an Ethernet cable to the network port on the access point and the other end to the same hub where your PC is connected, as shown in the following gure.The hub or switch you use must permit broadcast signals from the access point to reach all other devices on the network.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 14April 2015Section 2 - Getting Started•) To use a direct-cable connection, connect one end of an Ethernet straight-through or crossover cable to the network port on the access point and the other end of the cable to the Ethernet port on the PC, as shown in the following gure. You can also use a serial cable to connect the serial port on the AP to a serial port on the administrative computer.For initial conguration with a direct Ethernet connection and no DHCP server, be sure to set your PC to a static IP address in the same subnet as the default IP address on the access point. (The default IP address for the access point is 10.90.90.91.)If you use this method, you will need to recongure the cabling for subsequent startup and deployment of the access point so that the access point is no longer connected directly to the PC but instead is connected to the LAN (either by using a hub or directly).Note: It is possible to detect access points on the network with a wireless connection. However, we strongly advise against using this method. In most environments you may have no way of knowing whether you are actually connecting to the intended AP. Also, many of the initial conguration changes required will cause you to lose connectivity with the AP over a wireless connection.2.)  Connect the power adapter to the power port on the back of the access point, and then plug the other end of the power cord into a power outlet.3.)  Use your Web browser to log on to the UAP Administration Web pages.•) If the AP did not acquire an IP address from a DHCP server on your network, enter 10.90.90.91 in the address eld of your browser, which is the default IP address of the AP.•) If you used a DHCP server on your network to automatically congure network information for the AP, enter the new IP address of the AP into the Web browser.•) If you used a DHCP server and you do not know the new IP address of the AP, use the following procedures to obtain the information:•) Connect a serial cable from the administrative computer to the AP and use a terminal emulation program to access the command-line interface (CLI).•) At the login prompt, enter admin for the user name and admin for the password. At the command prompt, enter get management.•) The command output displays the IP address of the AP. Enter this address in the address eld of your browser. For a more detailed explanation about how to log on to the CLI by using the console port, see “Using the CLI to View the IP Address” on page 24.4.)  When prompted, enter admin for the user name and admin for the password, then click Logon.Figure 2 - Web UI Login PromptWhen you rst log in, the Basic Settings page for UAP administration is displayed, as the following gure shows.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 15April 2015Section 2 - Getting StartedFigure 3 - Provide Basic Settings5.)  Verify the settings on the Basic Settings page.•) Review access point description and provide a new administrator password for the access point if you do not want to use the default password, which is admin.•) Click the Apply button to activate the wireless network with these new settings. Note: The changes you make are not saved or applied until you click Apply. Changing some access point settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change access point settings when WLAN trafc is low. For information about the elds and conguration options on the Basic Settings page, see “Basic Settings” on page 16.6.)  If you do not have a DHCP server on the management network and do not plan to use one, you must change the Connection Type from DHCP to Static IP. You can either assign a new Static IP address to the AP or continue using the default address. We recommend assigning a new Static IP address so that if you bring up another UAP on the same network, the IP address for each AP will be unique. To change the connection type and assign a static IP address, see “Conguring the Ethernet Settings” on page 18 (CLI) or “Ethernet Settings” on page 35 (Web).7.)  If your network uses VLANs, you might need to congure the management VLAN ID or untagged VLAN ID on the UAP in order for it to work with your network. For information about how to congure VLAN information, see “Conguring the Ethernet Settings” on page 18 (CLI) or “Ethernet Settings” on page 35 (Web).8.)  If your network uses IEEE 802.1X port security for network access control, you must congure the 802.1X supplicant information on the AP.For information about how to congure the 802.1X user name and password, see “Conguring IEEE 802.1X Authentication” on page 19.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 16April 2015Section 2 - Getting StartedBasic SettingsFrom the Basic Settings page, you can view various information about the UAP, including IP and MAC address information, and congure the administrator password for the UAP. The following table describes the elds and conguration options on the Basic Settings page.Field DescriptionIP Address Shows the IP address assigned to the AP. This eld is not editable on this page because the IP address is already assigned (either by DHCP, or statically through the Ethernet Settings page).IPv6 Address Shows the IPv6 address assigned to the AP. This eld is not editable on this page because the IP address is already assigned (either by DHCPv6, or statically through the Ethernet Settings page).IPv6 Address Status Shows the operational status of the static IPv6 address assigned to the management interface of the AP. The possible values are Operational and Tentative.IPv6 Autocongured Global AddressesShows each automatically-congured global IPv6 address for the management interface of the AP.IPv6 Link Local AddressShows the IPv6 Link Local address, which is the IPv6 address used by the local physical link. The link local address is not congurable and is assigned by using the IPv6 Neighbor Discovery process.MAC Address Shows the MAC address of the AP. The address shown here is the MAC address associated with the management interface. This is the address by which the AP is known externally to other networks.Firmware Version Shows version information about the rmware currently installed on the AP. As new versions of the WLAN AP rmware become available, you can upgrade the rmware on your APs.Product Identier Identies the AP hardware model.Hardware Version Identies the AP hardware version.Serial Number Shows the AP serial number.Device Name Generic name to identify the type of hardware.Device Description Provides information about the product hardware.Current Password Enter the current administrator password. You must correctly enter the current password before you are able to change it.New Password Enter a new administrator password. The characters you enter are displayed as bullet characters to prevent others from seeing your password as you type.The administrator password must be an alphanumeric string of up to 8 characters. Do not use special characters or spaces.Note: As an immediate rst step in securing your wireless network, we recommend that you change the administrator password from the default.Conrm New PasswordRe-enter the new administrator password to conrm that you typed it as intended.Baud Rate Select a baud rate for the serial port connection. The baud rate on the AP must match the baud rate on the terminal or terminal emulator to connect to the AP command-line interface (CLI) by using a serial (console) connection.The following baud rates are available: •)  9600•)  19200•)  38400•)  57600•)  115200System Name Enter a name for the AP. This name appears only on the Basic Settings page and is a name to identify the AP to the administrator. Use up to 64 alphanumeric characters, for example My AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 17April 2015Section 2 - Getting StartedField DescriptionSystem Contact Enter the name, e-mail address, or phone number of the person to contact regarding issues related to the AP.System Location Enter the physical location of the AP, for example Conference Room A.Table 4 - Basic Settings PageConnecting to the AP Web Interface by Using the IPv6 AddressTo connect to the AP by using the IPv6 global address or IPv6 link local address, you must enter the AP address into your browser in a special format.Note: The following instructions and examples work with Microsoft Internet Explorer 7 (IE7) and might not work with other browsers.To connect to an IPv6 global address, add square brackets around the IPv6 address. For example, if the AP global IPv6 address is 2520::230:abff:fe00:2420, type the following address into the IE7 address eld: http://[2520::230:abff:fe00:2420].To connect to the iPv6 link local address, replace the colons (:) with hyphens (-), add the interface number preceded with an “s,” then add “.ipv6-literal.net.” For example, if the AP link local address is fe80::230:abff:fe00:2420, and the Windows interface is dened as “%6,” type the following address into the IE7 address eld: http://fe80--230-abff-fe00-2420s6.ipv6-literal.net.Using the CLI to View the IP AddressThe DHCP client on the UAP is enabled by default. If you connect the UAP to a network with a DHCP server, the AP automatically acquires an IP address. To manage the UAP by using the Administrator UI, you must enter the IP address of the access point into a Web browser. If a DHCP server on your network assigns an IP address to the UAP, and you do not know the IP address, use the following steps to view the IP address of the UAP:1.)  Using a null-modem cable, connect a VT100/ANSI terminal or a workstation to the console (serial) port.If you attached a PC, Apple, or UNIX workstation, start a terminal-emulation program, such as HyperTerminal or TeraTerm.2.)  Congure the terminal-emulation program to use the following settings:•) Baud rate: 115200 bps•) Data bits: 8•) Parity: none•) Stop bit: 1•) Flow control: none3.)  Press the return key, and a login prompt should appear.The login name is admin. The default password is admin. After a successful login, the screen shows the (Access Point Name)# prompt. 4.)  At the login prompt, enter get management.Information similar to the following prints to the screen.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 18April 2015Section 2 - Getting StartedFigure 4 - Command Line Interface (CLI) ConnectionConguring the Ethernet SettingsThe default Ethernet settings, which include DHCP and VLAN information, might not work for all networks. By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to use a static IP address, you must disable the DHCP client and manually congure the IP address and other network information.The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have a management VLAN congured on your network with a different VLAN ID, you must change the VLAN ID of the management VLAN on the access point. For information about using the Web interface to congure the Ethernet settings, see “Ethernet Settings” on page 35. You can also use the CLI to congure the Ethernet settings, which the following section describes.Using the CLI to Congure Ethernet SettingsUse the commands shown in the following table to view and set values for the Ethernet (wired) interface. For more information about each setting, see the description for the eld in the following table.Action CommandsGet the DNS Name get host idSet the DNS Name set host id <host_name>For example:set host id lab-apGet Current Settings for the Ethernet (Wired) Internal Interfaceget managementSet the management VLAN ID set management vlan-id <1-4094>View untagged VLAN information get untagged-vlanEnable the untagged VLAN set untagged-vlan status upDisable the untagged VLAN set untagged-vlan status downSet the untagged VLAN ID set untagged-vlan vlan-id <1-4094>View the connection type get management dhcp-status
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 19April 2015Section 2 - Getting StartedAction CommandsUse DHCP as the connection type set management dhcp-status upUse a Static IP as the connection type set management dhcp-status downSet the Static IP address set management static-ip <ip_address>For example:set management static-ip 10.10.12.221Set a Subnet Mask set management static-mask <netmask>For example:set management static-mask 255.255.255.0Set the Default Gateway set static-ip-route gateway <ip_address>For example:set static-ip-route gateway 10.10.12.1View the DNS Nameserver mode Dynamic= up Manual=downget host dns-via-dhcpSet DNS Nameservers to Use Static IP Addresses (Dynamic to Manual Mode)set host dns-via-dhcp downset host static-dns-1 <ip_address>set host static-dns-2 <ip_address>For example:set host static-dns-1 192.168.23.45Set DNS Nameservers to Use DHCP IP Addressing (Manual to Dynamic Mode)set host dns-via-dhcp upTable 5 - CLI Commands for Ethernet Setting In the following example, the administrator uses the CLI to set the management VLAN ID to 123 and to disable the untagged VLAN so that all trafc is tagged with a VLAN ID.DLINK-WLAN-AP# set management vlan-id 123DLINK-WLAN-AP# set untagged-vlan status downDLINK-WLAN-AP# get managementProperty                   Value--------------------------------------------vlan-id                    123interface                  brtrunkstatic-ip                  10.90.90.91static-mask                255.0.0.0ip                         10.90.90.91mask                       255.0.0.0mac                        00:05:5E:80:70:00dhcp-status                downipv6-status                upipv6-autocong-status      upstatic-ipv6                ::static-ipv6-prex-length   0DLINK-WLAN-AP# get untagged-vlanProperty  Value---------------vlan-id   1status    downDLINK-WLAN-AP#Conguring IEEE 802.1X AuthenticationOn networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must congure 802.1X authentication information that the AP can supply to the authenticator.If your network uses IEEE 802.1X see “Conguring IEEE 802.1X Authentication” on page 19 for information about how to congure 802.1X by using the Web interface.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 20April 2015Section 2 - Getting StartedUsing the CLI to Congure 802.1X Authentication InformationThe following table shows the commands used to congure the 802.1X supplicant information using the CLI.Action CommandView 802.1X supplicant settings get dot1x-supplicantEnable 802.1X supplicant set dot1x-supplicant status upDisable 802.1X supplicant set dot1x-supplicant status downSet the 802.1X user name set dot1x-supplicant user <name>Set the 802.1X  password set dot1x-supplicant password <password>Table 6 - CLI Commands for the 802.1X SupplicantIn the following example, the administrator enables the 802.1X supplicant and sets the user name to wlanAP and the password to test1234. DLINK-WLAN-AP# set dot1x-supplicant status upDLINK-WLAN-AP# set dot1x-supplicant user wlanAPDLINK-WLAN-AP# set dot1x-supplicant password test1234DLINK-WLAN-AP# get dot1x-supplicantProperty       Value--------------------------status         upuser           wlanAPeap-method     md5debug          offcert-present   nocert-exp-date  Not PresentDLINK-WLAN-AP#Verifying the InstallationMake sure the access point is connected to the LAN and associate some wireless clients with the network. Once you have tested the basics of your wireless network, you can enable more security and ne-tune the AP by modifying advanced conguration features.1.)  Connect the access point to the LAN.•) If you congured the access point and administrator PC by connecting both into a network hub, then your access point is already connected to the LAN. The next step is to test some wireless clients.•) If you congured the access point by using a direct cable connection from your computer to the access point, do the following procedures:•) Disconnect the cable from the computer and the access point.•) Connect an Ethernet cable from the access point to the LAN.•) Connect your computer to the LAN by using an Ethernet cable or a wireless card.2.)  Test LAN connectivity with wireless clients.Test the UAP by trying to detect it and associate with it from some wireless client devices. For information about requirements for these clients, see “Wireless Client Requirements” on page 12.3.)  Secure and congure the access point by using advanced features.Once the wireless network is up and you can connect to the AP with some wireless clients, you can add in layers of security, create multiple virtual access points (VAPs), and congure performance settings.Note: The WLAN AP is not designed for multiple, simultaneous conguration changes. If more than one administrator is logged onto the Administration Web pages and making changes to the conguration, there is no guarantee that all conguration changes specied by multiple users will be applied.By default, no security is in place on the access point, so any wireless client can associate with it and access your LAN. An important next step is to congure security, as described in “Virtual Access Point Settings” on page 47.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 21April 2015Section 2 - Getting StartedConguring Security on the Wireless Access PointYou congure secure wireless client access by conguring security for each virtual access point (VAP) that you enable. You can congure up to 16 VAPs per radio that simulate multiple APs in one physical access point. By default, only one VAP is enabled. For each VAP, you can congure a unique security mode to control wireless client access. Each radio has 16 VAPs, with VAP IDs from 0-15. By default, only VAP 0 on each radio is enabled. VAP0 has the following default settings:•)  VLAN ID: 1•)  Broadcast SSID: Enabled•)  SSID: dlink1•)  Security: None•)  MAC Authentication Type: None•)  Redirect Mode: None All other VAPs are disabled by default. The default SSID for VAPs 1–15 is ”dlinkx” where x is the VAP ID.To prevent unauthorized access to the UAP, we recommend that you select and congure a security option other than None for the default VAP and for each VAP that you enable.For information about how to congure the security settings on each VAP, see “Virtual Access Point Settings” on page 47.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 22April 2015Section 3 - Viewing Access Point StatusSection 3 - Viewing Access Point StatusThis section describes the information you can view from the tabs under the Status heading on the Administration Web UI. This section contains the following subsections:•) “Viewing Interface Status” on page 22•) “Viewing Events” on page 23•) “Viewing Transmit and Receive Statistics” on page 25•) “Viewing Associated Wireless Client Information” on page 26•) “Viewing TSPEC Client Associations” on page 26•) “Viewing Rogue AP Detection” on page 28•) “Viewing Managed AP DHCP Information” on page 31•) “Viewing TSPEC Status and Statistics Information” on page 31•) “Viewing TSPEC AP Statistics Information” on page 32•) “Viewing Radio Statistics Information” on page 33•) “Viewing Email Alert Operational Status” on page 34Note: The web-based UI images show the DWL-8600AP administration pages. Pages for the DWL-2600AP or DWL-3600AP will display information for one radio only.Viewing Interface StatusTo monitor Ethernet LAN (wired) and wireless LAN (WLAN) settings, click the Interfaces tab.Figure 5 - Viewing Interface StatusThis page displays the current settings of the UAP. It displays the Wired Settings and the Wireless Settings.Wired Settings (Internal Interface)The Internal interface includes the Ethernet MAC Address, Management VLAN ID, IP Address (IPv4 and IPv6), Subnet Mask, and DNS information. To change any of these settings, click the Edit link. After you click Edit, you are redirected to the Ethernet Settings page.For information about conguring these settings, see “Conguring the Ethernet Settings” on page 18.Wireless SettingsThe Radio Interface includes the AeroScout™ Engine Communication status, Radio Mode and Channel. The Wireless Settings section also shows the MAC address (read-only) associated with each radio interface. To change the Radio Mode or Channel settings, click the Edit link. After you click Edit, you are redirected to the
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 23April 2015Section 3 - Viewing Access Point StatusModify Wireless Settings page.For information about conguring these settings, see “Wireless Settings” on page 37 and “Modifying Radio Settings” on page 40.Viewing EventsThe Events page shows real-time system events on the AP such as wireless clients associating with the AP and being authenticated.To view system events, click the Events tab.Figure 6 - Viewing EventsFrom the Events page, you can perform the following tasks:•)  View the most recent, high-level events generated by this AP.•)  Enable and congure Persistent logging to write system event logs to non-volatile memory so that the events are not erased when the system reboots.•)  Set a Severity Level to determine what category of log messages are displayed.•)  Set Depth to determine how many log messages are displayed in the Event log.•)  Enable a remote log relay host to capture all system events and errors in a Kernel Log.Note: The AP acquires its date and time information using the network time protocol (NTP). This data is reported in UTC format (also known as Greenwich Mean Time). You need to convert the reported time to your local time. Conguring Persistent Logging OptionsIf the system unexpectedly reboots, log messages can be useful to diagnose the cause. However, log messages are erased when the system reboots unless you enable persistent logging.Caution! Enabling persistent logging can wear out the ash (non-volatile) memory and degrade network performance. You should only enable persistent logging to debug a problem. Make sure you disable persistent logging after you nish debugging the problem.To congure persistent logging on the Events page, set the persistence, severity, and depth options as described in the following table, and then click Apply.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 24April 2015Section 3 - Viewing Access Point StatusField DescriptionPersistence Choose Enabled to save system logs to non-volatile memory so that the logs are not erased when the AP reboots. Choose Disabled to save system logs to volatile memory. Logs in volatile memory are deleted when the system reboots.Severity Specify the severity level of the log messages to write to non-volatile memory. For example, if you specify 2, critical, alert, and emergency logs are written to non-volatile memory. Error messages with a severity level of 3 – 7 are written to volatile memory.•)  0 — emergency•)  1 — alert•)  2 — critical•)  3 — error•)  4 — warning•)  5 — notice•)  6 — info•)  7 — debugDepth You can store up to 128 messages in non-volatile memory. Once the number you congure in this eld is reached, the oldest log event is overwritten by the new log event.Table 7 - Logging OptionsNote: To apply your changes, click Apply. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Conguring the Log Relay Host for Kernel MessagesThe Kernel Log is a comprehensive list of system events (shown in the System Log) and kernel messages such as error conditions, like dropping frames.You cannot view kernel log messages directly from the Administration Web UI for an AP. You must rst set up a remote server running a syslog process and acting as a syslog log relay host on your network. Then, you can congure the UAP to send syslog messages to the remote server.Remote log server collection for AP syslog messages provides the following features:•)  Allows aggregation of syslog messages from multiple APs•)  Stores a longer history of messages than kept on a single AP•)  Triggers scripted management operations and alertsTo use Kernel Log relaying, you must congure a remote server to receive the syslog messages. The procedure to congure a remote log host depends on the type of system you use as the remote host. Note: The syslog process will default to use port 514. We recommend keeping this default port. However; If you choose to recongure the log port, make sure that the port number you assign to syslog is not being used by another process.Enabling or Disabling the Log Relay Host on the Events PageTo enable and congure Log Relaying on the Events page, set the Log Relay options as described in the following table, and then click Apply.Field DescriptionRelay Log Select Enabled to allow the UAP to send log messages to a remote host. Select Disabled to keep all log messages on the local system.Relay Host Specify the IP Address or DNS name of the remote log server.Relay Port Specify the Port number for the syslog process on the Relay Host.The default port is 514.Table 8 - Log Relay Host
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 25April 2015Section 3 - Viewing Access Point StatusNote: To apply your changes, click Apply. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. If you enabled the Log Relay Host, clicking Apply will activate remote logging. The AP will send its kernel messages real-time for display to the remote log server monitor, a specied kernel log le, or other storage, depending on how you congured the Log Relay Host.If you disabled the Log Relay Host, clicking Apply will disable remote logging.Viewing Transmit and Receive StatisticsThe Transmit/Receive page provides some basic information about the current AP and a real-time display of the transmit and receive statistics for the Ethernet interface on the AP and for the VAPs on all supported radio interfaces. All transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these gures indicate transmit and receive totals since the reboot.To view transmit and receive statistics for the AP, click the Transmit/Receive page.Figure 7 - Viewing Trafc StatisticsField DescriptionInterface The name of the Ethernet or VAP interface.Status Shows whether the interface is up or down.MAC Address MAC address for the specied interface. The UAP has a unique MAC address for each interface. Each radio has a different MAC address for each interface on each of its two radios.VLAN ID Virtual LAN (VLAN) ID.You can use VLANs to establish multiple internal and guest networks on the same AP.The VLAN ID is set on the VAP page. (See “Conguring Load Balancing” on page 60)Name (SSID) Wireless network name. Also known as the SSID, this alphanumeric key uniquely identies a wireless local area network.The SSID is set on the VAP page. (See “Conguring Load Balancing” on page 60)Transmit and Receive InformationTotal Packets Indicates total packets sent (in Transmit table) or received (in Received table) by this AP.Total Bytes Indicates total bytes sent (in Transmit table) or received (in Received table) by this AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 26April 2015Section 3 - Viewing Access Point StatusField DescriptionTotal Drop Packets Indicates total number of packets sent (in Transmit table) or received (in Received table) by this AP that were dropped.Total Drop Bytes Indicates total number of bytes sent (in Transmit table) or received (in Received table) by this AP that were dropped.Errors Indicates total errors related to sending and receiving data on this AP.Table 9 - Transmit/ReceiveViewing Associated Wireless Client InformationTo view the client stations associated with a particular access point, click the Client Associations tab.Figure 8 - Viewing Client Association InformationThe associated stations are displayed along with information about packet trafc transmitted and received for each station.The following describes the elds on the Client Associations page.Field DescriptionNetwork Shows which VAP the client is associated with. For example, an entry of wlan0vap2 means the client is associated with Radio 1, VAP 2.An entry of wlan0 means the client is associated with VAP 0 on Radio 1. An entry of wlan1 means the client is associated with VAP 0 on Radio 2.Station Shows the MAC address of the associated wireless client.Status The Authenticated and Associated Status shows the underlying IEEE 802.11 authentication and association status, which is present no matter which type of security the client uses to connect to the AP. This status does not show IEEE 802.1X authentication or association status. Some points to keep in mind with regard to this eld are: •)  If the AP security mode is None or Static WEP, the authentication and association status of clients showing on the Client Associations page will be in line with what is expected; that is, if a client shows as authenticated to the AP, it will be able to transmit and receive data. (This is because Static WEP uses only IEEE 802.11 authentication.) •)  If the AP uses IEEE 802.1X or WPA security, however, it is possible for a client association to show on this page as authenticated (via the IEEE 802.11 security) but actually not be authenticated to the AP via the second layer of security.From Station Shows the number of packets and bytes received from the wireless client and the number of packets and bytes that were dropped after being received.To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and the number of packets and bytes that were dropped upon transmission.Table 10 - Associated ClientsViewing TSPEC Client AssociationsThe TSPEC Client Association Status and Statistics page provides some basic information about the client associations status and a real-time display of the transmit and receive statistics for the TSPEC clients. All transmit and receive statistics shown are totals since the client association started.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 27April 2015Section 3 - Viewing Access Point StatusA TSPEC is a trafc specication that is sent from a QoS-capable wireless client to an AP requesting a certain amount of network access for the trafc stream (TS) it represents. A trafc stream is a collection of data packets identied by the wireless client as belonging to a particular user priority. An example of a voice trafc stream is a Wi-Fi CERTIFIED™ telephone handset that marks its codec-generated data packets as voice priority trafc. An example of a video trafc stream is a video player application on a wireless laptop that prioritizes a video conference feed from a corporate server. To view TSPEC client association statistics, click the TSPEC Client Associations tab.Figure 9 - Viewing TSPEC Client AssociationsThe following table describes the information provided on the TSPEC Client Association Status and Statistics page.Field DescriptionStatusNetwork Radio interface used by the client.Station Client station MAC address.TS Identier TSPEC Trafc Session Identier (range 0-7).Access Category TS Access Category (voice or video).Direction The trafc direction for this TS. Direction can be:•)  uplink•)  downlink•)  bidirectionalUser Priority The User Priority (UP) for this TS. The UP is sent with each packet in the UP portion of the IP header. Typical values are:•)  6 or 7 for voice•)  4 or 5 for videoThe value may differ depending on other priority trafc sessions.Medium Time The time (in 32 microsecond per second units) that the TS trafc occupies the transmission medium.Excess Usage EventsThe number of times the client has exceeded the medium time established for its TSPEC. Minor, infrequent violations are ignored.VAP The Virtual Access Point associated with this TS client.MAC Address The Virtual Access Point MAC address.SSID The service set identier associated with this TS client.StatisticsNetwork Radio interface used by the client.Station Client station MAC address.TS Identier TSPEC Trafc Session Identier (range 0-7).Access Category TS Access Category (voice or video).Direction The trafc direction for this TS. Direction can be:•)  uplink•)  downlink•)  bidirectional
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 28April 2015Section 3 - Viewing Access Point StatusField DescriptionFrom Station Shows the number of packets and bytes received from the wireless client and the number of packets and bytes that were dropped after being received. Also shows the number of packets:•)  in excess of an admitted TSPEC.•)  for which no TSPEC has been established when admission is required by the AP.To Station Shows the number of packets and bytes transmitted from the AP to the wireless client and the number of packets and bytes that were dropped upon transmission. Also shows the number of packets:•)  in excess of an admitted TSPEC.•)  for which no TSPEC has been established when admission is required by the AP.Table 11 - TSPEC Client AssociationsLink Integrity MonitoringThe UAP provides link integrity monitoring to continually verify its connection to each associated client. To do this, the AP sends data packets to clients every few seconds when no other trafc is passing. This allows the AP to detect when a client goes out of range, even during periods when no normal trafc is exchanged. The client connection drops off the list within 300 seconds if these data packets are not acknowledged, even if no disassociation message is received.Viewing Rogue AP DetectionThe status page to view Rogue AP Detection information provides real-time statistics for all APs within range of the AP on which you are viewing the Administration Web pages. When AP detection is enabled, the radio will periodically switch from its operating channel to scan other channels within the same band. Click Refresh to update the screen and display the most current information. The Rogue AP Detection page contains the following two lists:•)  Detected Rogue AP List — Lists all APs within range of the AP that have not been acknowledged as known APs.•)  Known AP List — Lists all APs within range of the AP that have been acknowledged as known APs either by clicking the Grant button associated with an AP in the Detected Rogue AP List or by appearing in an imported AP list. To view information about other access points on the wireless network, click the Rogue AP Detection tab.Figure 10 - Viewing Rogue and Known Access PointsYou must enable the AP detection on a radio in order to collect information about other APs within range. The following table describes the information provided on neighboring access points.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 29April 2015Section 3 - Viewing Access Point StatusField DescriptionAP Detection for RadioTo allow the AP radios to perform neighbor AP detection and collect information about neighbor APs, click Enabled.To disable neighbor AP detection on the radios, click Disabled.If you change the AP detection mode, click Apply to save the new settings.Detected Rogue AP ListAction Click Grant to move the AP from the Detected Rogue AP List to the Known AP List.Note: The Detected Rouge AP and Known AP lists provide information. The DWL-x600AP does not have any control over the APs on the list and cannot apply any security policies to APs detected through the RF scan.MAC Shows the MAC address of the neighboring AP.Radio The Radio eld indicates which radio detected the neighboring AP:•)  wlan0 (Radio One)•)  wlan1 (Radio Two)Beacon Int. Shows the Beacon interval being used by this AP.Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).The Beacon Interval is set on the Radio page.(See “Modifying Radio Settings” on page 40)Type Indicates the type of device:•)  AP indicates the neighboring device is an AP that supports the IEEE 802.11 Wireless Networking Framework in Infrastructure Mode.•)  Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. Ad-hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS).SSID The Service Set Identier (SSID) for the AP.The SSID is an alphanumeric string of up to 32 characters that uniquely identies a wireless local area network. It is also referred to as the Network Name.The SSID is set on the VAP page. (See “Conguring Load Balancing” on page 60)Privacy Indicates whether there is any security on the neighboring device.•)  Off indicates that the Security mode on the neighboring device is set to None (no security).•)  On indicates that the neighboring device has some security in place.•)  Security is congured on the AP from the VAP page.WPA Indicates whether WPA security is on or off for this AP.Band This indicates the IEEE 802.11 mode being used on this AP. (For example, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.)The number shown indicates the mode according to the following map:•)  2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode (or a combination of the modes)•)  5 indicates IEEE 802.11a or 802.11n mode (or both modes)Channel Shows the Channel on which the AP is currently broadcasting.The channel denes the portion of the radio spectrum that the radio uses for transmitting and receiving.The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)Rate Shows the rate (in megabits per second) at which this AP is currently transmitting.The current rate will always be one of the rates shown in Supported Rates.Signal Indicates the strength of the radio signal emitting from this AP. If you hover the mouse pointer over the bars, a number appears and shows the strength in decibels (dB).Beacons Shows the total number of beacons received from this AP since it was rst discovered.Last Beacon Shows the date and time of the last beacon received from this AP.Rates Shows supported and basic (advertised) rate sets for the neighboring AP. Rates are shown in megabits per second (Mbps).All Supported Rates are listed, with Basic Rates shown in bold.Rate sets are congured on the Radio Settings page. (See “Modifying Radio Settings” on page 40)
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 30April 2015Section 3 - Viewing Access Point StatusField DescriptionKnown AP ListAction An AP can appear in the Known AP List if it has been moved from the Detected Rogue AP List by clicking the Grant button or if the MAC address of the AP appears in an AP list that has been imported. To move the AP from the Known AP List to the Detected Rogue AP List, click Delete. Note: The Detected Rouge AP and Known AP lists provide information. The DWL-x600AP does not have any control over the APs on the list and cannot apply any security policies to APs detected through the RF scan.MAC Shows the MAC address of the neighboring AP.Type Indicates the type of device:•)  AP indicates the neighboring device is an AP that supports the IEEE 802.11 Wireless Networking Framework in Infrastructure Mode.•)  Ad hoc indicates a neighboring station running in Ad hoc Mode. Stations set to ad hoc mode communicate with each other directly, without the use of a traditional AP. Ad-hoc mode is an IEEE 802.11 Wireless Networking Framework also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS).SSID The Service Set Identier (SSID) for the AP.The SSID is an alphanumeric string of up to 32 characters that uniquely identies a wireless local area network. It is also referred to as the Network Name.The SSID is set on the VAP page. (See “Conguring Load Balancing” on page 60)Privacy Indicates whether there is any security on the neighboring device.•)  Off indicates that the Security mode on the neighboring device is set to None (no security).•)  On indicates that the neighboring device has some security in place.•)  Security is congured on the AP from the VAP page.Band This indicates the IEEE 802.11 mode being used on this AP. (For example, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.)The number shown indicates the mode according to the following map:•)  2.4 indicates IEEE 802.11b, 802.11g, or 802.11n mode (or a combination of the modes)•)  5 indicates IEEE 802.11a or 802.11n mode (or both modes)Channel Shows the Channel on which the AP is currently broadcasting.The channel denes the portion of the radio spectrum that the radio uses for transmitting and receiving.The channel is set in Radio Settings. (See “Modifying Radio Settings” on page 40)Table 12 - Rogue AP DetectionSaving and Importing the Known AP ListTo save the Known AP list to a le, click Save. The list contains the MAC addresses of all AP that have been added to the Known AP List. By default, the lename is Rogue1.cfg. You can use a text editor or Web browser to open the le and view its contents.Use the Import feature to import a list of Known APs from a saved list. The list might be from another DWL-x600AP or created from a text le. If the MAC address of an AP appears in the Known AP List, it will not be detected as a rogue.To import an AP List from a le, use the following steps:1.)  Choose whether to replace the existing Known AP list or add the entries in the imported le to the Known AP list.•) Select the Replace option to import the list and replace the contents of the Known AP List. •) Select the Merge option to import the list and add the APs in the imported le to the APs currently displayed in the Known AP List.2.)  Click Browse and choose the le to import.•) The le you import must be a plain-text le with a .txt or .cfg extension. Entries in the le are MAC addresses in hexadecimal format with each octet separated by colons, for example 00:11:22:33:44:55. Separate entries with a single space. For the AP to accept the le, it must contain only MAC addresses. 3.)  Click Import. •) Once the import is complete, the screen refreshes and the MAC addresses of the APs in the imported le
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 31April 2015Section 3 - Viewing Access Point Statusappear in the Known AP List.Viewing Managed AP DHCP InformationThe UAP can learn about D-Link Unied Wireless Switches on the network through DHCP responses to its initial DHCP request. The Managed AP DHCP page displays the DNS names or IP addresses of up to four D-Link Unied Wireless Switches that the AP learned about from a DHCP server on your network.Figure 11 - Managed AP DHCP InformationFor information about how to congure a DHCP server to respond to AP DHCP requests with the switch IP address information, see the User Manual for the switch.Viewing TSPEC Status and Statistics InformationThe TSPEC Status and Statistics page provides:•)  Summary information about TSPEC sessions by radio•)  Summary information about TSPEC sessions by VAP•)  Real-time transmit and receive statistics for the TSPEC VAPs on all radio interfaces. All of the transmit and receive statistics shown are totals since the AP was last started. If you reboot the AP, these gures indicate transmit and receive totals since the reboot.To view TSPEC status and statistics, click the TSPEC Status and Statistics tab.Figure 12 - Viewing TSPEC Status and StatisticsThe following table describes the information provided on TSPEC Status and Statistics page.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 32April 2015Section 3 - Viewing Access Point StatusField DescriptionAP and VAP StatusInterface Indicates the name of the Radio or VAP interface.Access Category Indicates Current Access Category associated with this Trafc Stream (voice or video).Status Indicates whether the TSPEC session is enabled (up) or not (down) for the corresponding Access Category.Note: This is a conguration status (does not necessarily represent the current session activity).Active TS Indicates the number of currently active TSPEC Trafc Streams for this radio and Access Category.TS Clients Indicates the number of Trafc Stream clients associated with this radio and Access Category.Medium Time AdmittedTime (in 32 microsecond per second units) allocated for this Access Category over the transmission medium to carry data. This value should be less than or equal to the maximum bandwidth allowed over the medium for this TS.Medium Time UnallocatedTime (in 32 microsecond per second units) of unused bandwidth for this Access Category.Transmit and Receive StatisticsTotal Packets Indicates the total number of TS packets sent (in Transmit table) or received (in Received table) by this Radio for the specied Access Category.Total Bytes Indicates the total number of TS bytes sent (in Transmit table) or received (in Received table) by this Radio for the specied Access Category.Total Voice Packets Indicates the total number of TS voice packets sent (in Transmit table) or received (in Received table) by this AP for this VAP.Total Voice Bytes Indicates the total TS voice bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP.Total Video Packets Indicates the total number of TS video packets sent (in Transmit table) or received (in Received table) by this AP for this VAP.Total Video Bytes Indicates the total TS video bytes sent (in Transmit table) or received (in Received table) by this AP for this VAP.Table 13 - TSPEC Status and StatisticsViewing TSPEC AP Statistics InformationThe View TSPEC AP Statistics page provides information on the voice and video Trafc Streams accepted and rejected by the AP.To view TSPEC AP statistics, click the TSPEC AP Statistics tab.Figure 13 - View TSPEC Status and StatisticsThe following table describes the information provided on TSPEC AP Statistics page.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 33April 2015Section 3 - Viewing Access Point StatusField DescriptionTSPEC Statistics Summary for Voice ACMIndicates the total number of accepted and the total number of rejected voice Trafc Streams.TSPEC Statistics Summary for Video ACMIndicates the total number of accepted and the total number of rejected video Trafc Streams.Table 14 - TSPEC AP StatisticsViewing Radio Statistics InformationThe Radio Statistics page provides detailed information about the packets and bytes transmitted and received on the radio interface of this access point.Figure 14 - View Radio StatisticsThe following table describes details about the Radio Statistics information.Field DescriptionRadio Choose either radio 1 or radio 2 to view statistics for the selected radioWLAN Packets ReceivedTotal packets received by the AP on this radio interface.WLAN Bytes ReceivedTotal bytes received by the AP on this radio interface.WLAN Packets TransmittedTotal packets transmitted by the AP on this radio interface.WLAN Bytes TransmittedTotal bytes transmitted by the AP on this radio interface.WLAN Packets Receive DroppedNumber of packets received by the AP on this radio interface that were dropped.WLAN Bytes Receive DroppedNumber of bytes received by the AP on this radio interface that were dropped.WLAN Packets Transmit DroppedNumber of packets transmitted by the AP on this radio interface that were dropped.WLAN Bytes Transmit DroppedNumber of bytes transmitted by the AP on this radio interface that were dropped.Fragments ReceivedCount of successfully received MPDU frames of type data or management.Fragments TransmittedNumber of transmitted MPDU with an individual address or an MPDU with a multicast address of type Data or Management.Multicast Frames ReceivedCount of MSDU frames received with the multicast bit set in the destination MAC address.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 34April 2015Section 3 - Viewing Access Point StatusField DescriptionMulticast Frames TransmittedCount of successfully transmitted MSDU frames where the multicast bit is set in the destination MAC address.Duplicate Frame CountNumber of times a frame is received and the Sequence Control eld indicates is a duplicate.Failed Transmit CountNumber of times an MSDU is not transmitted successfully due to transmit attempts exceeding either the short retry limit or the long retry limit.Transmit Retry CountNumber of times an MSDU is successfully transmitted after one or more retries.Multiple Retry CountNumber of times an MSDU is successfully transmitted after more than one retry.RTS Success Count Count of CTS frames received in response to an RTS frame.RTS Failure Count Count of CTS frames not received in response to an RTS frame.ACK Failure Count Count of ACK frames not received when expected.FCS Error Count Count of FCS errors detected in a received MPDU frame.Frames Transmitted Count of each successfully transmitted MSDU.WEP Undecryptable CountCount of encrypted frames received and the key conguration of the transmitter indicates that the frame should not have been encrypted or that frame was discarded due to the receiving station not implementing the privacy option.Table 15 - Radio Statistics InformationViewing Email Alert Operational StatusThe Email Alert Operational Status page provides information about the email alerts sent based on the syslog messages generated in the AP. To view the Email Alert Operational Status, click the Status > Email Alert Status tab.To congure the email alerts, see “Conguring Email Alert” on page 72.Figure 15 - Email Alert Operational StatusThe following table describes details about the Email Alert Operational Status.Field DescriptionEmail Alert Status The Email Alert operational status The status is either Up or Down. The default is Down.Number of Email SentThe total number of email sent so far. The range is an unsigned integer of 32 bits. The default is 0.Number of Email FailedThe total number of email failures so far. The range is an unsigned integer of 32 bits. The default is 0.Time Since Last Email SentThe time since the last email was sent. Time format is used. The default is 00 days 00 hours 00 minutes 00 seconds.Table 16 - Email Alert Status
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 35April 2015Section 4 - Managing the Access PointSection 4 - Managing the Access PointThis section describes how to manage the UAP and contains the following subsections:•) “Ethernet Settings” on page 35•) “Wireless Settings” on page 37•) “Modifying Radio Settings” on page 40•) “Conguring Radio and VAP Scheduler” on page 44•) “Scheduler Association Settings” on page 46•) “Virtual Access Point Settings” on page 47•) “Conguring the Wireless Distribution System (WDS)” on page 56•) “Controlling Access by MAC Authentication” on page 58•) “Conguring Load Balancing” on page 60•) “” on page 60•) “Conguring 802.1X Authentication” on page 62•) “Creating a Management Access Control List (ACL)” on page 63The conguration pages for the features in this section are located under the Manage heading on the Administration Web UI.Ethernet SettingsThe default wired interface settings, which include DHCP and VLAN information, might not work for all networks. By default, the DHCP client on the UAP automatically broadcasts requests for network information. If you want to use a static IP address, you must disable the DHCP client and manually congure the IP address and other network information.The management VLAN is VLAN 1 by default. This VLAN is also the default untagged VLAN. If you already have a management VLAN congured on your network with a different VLAN ID, you must change the VLAN ID of the management VLAN on the AP.To congure the LAN settings, click the Ethernet Settings tab.Figure 16 - Modify Ethernet (Wired) settingsThe following table describes the elds to view or congure on the Ethernet Settings page.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 36April 2015Section 4 - Managing the Access PointField DescriptionHostname Enter a hostname for the AP. The hostname appears in the CLI prompt. •)  The hostname has the following requirements:•)  The length must be between 1 – 63 characters.•)  Upper and lower case characters, numbers, and hyphens are accepted. •)  The rst character must be a letter (a – z or A – Z), and the last character cannot be a hyphen.MAC Address Shows the MAC address for the LAN interface for the Ethernet port on this AP. This is a read-only eld that you cannot change.Management VLAN IDThe management VLAN is the VLAN associated with the IP address you use to access the AP. The default management VLAN ID is 1.Provide a number between 1 and 4094 for the management VLAN ID.Untagged VLAN If you disable the untagged VLAN, all trafc is tagged with a VLAN ID.By default all trafc on the UAP uses VLAN 1, which is the default untagged VLAN. This means that all trafc is untagged until you disable the untagged VLAN, change the untagged trafc VLAN ID, or change the VLAN ID for a VAP or client using RADIUS.Untagged VLAN ID Provide a number between 1 and 4094 for the untagged VLAN ID. Trafc on the VLAN that you specify in this eld will not be tagged with a VLAN ID.Connection Type If you select DHCP, the UAP acquires its IP address, subnet mask, DNS, and gateway information from a DHCP server.If you select Static IP, you must enter information in the Static IP Address, Subnet Mask, and Default Gateway elds.Static IP Address Enter the static IP address in the text boxes. This eld is disabled if you use DHCP as the connection type.Subnet Mask Enter the Subnet Mask in the text boxes.Default Gateway Enter the Default Gateway in the text boxes.DNS Nameservers Select the mode for the DNS.In Dynamic mode, the IP addresses for the DNS servers are assigned automatically via DHCP. This option is only available if you specied DHCP for the Connection Type.In Manual mode, you must assign static IP addresses to resolve domain names.IPv6 Admin Mode Enable or disable IPv6 management access to the APIPv6 Auto Cong Admin ModeEnable or disable IPv6 auto address conguration on the AP.When IPv6 Auto Cong Mode is enabled, automatic IPv6 address conguration and gateway conguration is allowed by processing the Router Advertisements received on the LAN port. The AP can have multiple auto congured IPv6 addresses.Static IPv6 Address Enter a static IPv6 address. The AP can have a static IPv6 address even if addresses have already been congured automatically.Static IPv6 Address Prex LengthEnter the static IPv6 prex length, which is an integer in the range of 0 – 128.IPv6 Autocongured Global AddressesIf the AP has been assigned one or more IPv6 addresses automatically, the addresses are listed.IPv6 Link Local AddressShows the IPv6 Link Local address, which is the IPv6 address used by the local physical link. The link local address is not congurable and is assigned by using the IPv6 Neighbor Discovery process.Default IPv6 GatewayEnter the default IPv6 gateway.Table 17 - Ethernet SettingsNote: After you congure the wired settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 37April 2015Section 4 - Managing the Access PointWireless SettingsWireless settings describe aspects of the local area network (LAN) related specically to the radio device in the access point (802.11 Mode and Channel) and to the network interface to the access point (MAC address for access point and Wireless Network name, also known as SSID). To congure the wireless interface, click the Manage > Wireless Settings tab.Figure 17 - Modify Wireless SettingsThe following table describes the elds and conguration options available on the Wireless Settings page.Field DescriptionTSPEC Violation IntervalSpecify the time interval (in seconds) for the AP to report (through the system log and SNMP traps) associated clients that do not adhere to mandatory admission control procedures.Radio Interface Specify whether you want the radio interface on or off.MAC Address Indicates the Media Access Control (MAC) addresses for the interface. Dual-radio APs have a unique MAC address for each radio.A MAC address is a permanent, unique hardware address for any device that represents an interface to the network. The MAC address is assigned by the manufacturer. You cannot change the MAC address. It is provided here for informational purposes as a unique identier for an interface.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 38April 2015Section 4 - Managing the Access PointField DescriptionMode The Mode denes the Physical Layer (PHY) standard the radio uses.Note: The modes available depend on the country code setting and the radio selected.Select one of the following modes for radio 1:•)  IEEE 802.11a is a PHY standard that species operating in the 5 GHz U-NII band using orthogonal frequency division multiplexing (OFDM). It supports data rates ranging from 6 to 54 Mbps. •)  IEEE 802.11a/n operates in the 5 GHz ISM band and includes support for both 802.11a and 802.11n devices. IEEE 802.11n is an extension of the 802.11 standard that includes multiple-input multiple-output (MIMO) technology. IEEE 802.11n supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11 b, 802.11g, and 802.11a.•)  5 GHz IEEE 802.11n is the recommended mode for networks with 802.11n devices that operate in the 5 GHz frequency that do not need to support 802.11a devices. IEEE 802.11n can achieve a higher throughput when it does not need to be compatible with legacy devices (802.11a).Select one of the following modes for radio 2:•)  IEEE 802.11b/g operates in the 2.4 GHz ISM band. IEEE 802.11b is an enhancement of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS) as well as complementary code keying (CCK) to provide the higher data rates. It supports data rates ranging from 1 to 11 Mbps. IEEE 802.11g is a higher speed extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division multiplexing (OFDM). It supports data rates ranging from 1 to 54 Mbps. •)  IEEE 802.11b/g/n operates in the 2.4 GHz ISM band and includes support for 802.11b, 802.11g, and 802.11n devices.•)  2.4 GHz IEEE 802.11n is the recommended mode for networks with 802.11n devices that operate in the 2.4 GHz frequency that do not need to support 802.11b/g devices. IEEE 802.11n can achieve a higher throughput when it does not need to be compatible with legacy devices (802.11b/g).Channel Select the Channel. The range of available channels is determined by the mode of the radio interface and the country code setting. If you select Auto for the channel setting, the AP scans available channels and selects a channel where no trafc is detected.The Channel denes the portion of the radio spectrum the radio uses for transmitting and receiving. Each mode offers a number of channels, depending on how the spectrum is licensed by national and transnational authorities such as the Federal Communications Commission (FCC) or the International Telecommunication Union (ITU-R).When automatic channel assignment is enabled on the Channel Management page for Clustering, the channel policy for the radio is automatically set to static mode, and the Auto option is not available for the Channel eld. This allows the automatic channel feature to set the channels for the radios in the cluster.Station Isolation To enable Station Isolation, select the check box directly beside it.When Station Isolation is disabled, wireless clients can communicate with one another normally by sending trafc through the AP.When Station Isolation is enabled, the AP blocks communication between wireless clients on the same radio and VAP. The AP still allows data trafc between its wireless clients and wired devices on the network, across a WDS link, and with other wireless clients associated with a different VAP, but not among wireless clients associated with the same VAP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 39April 2015Section 4 - Managing the Access PointField DescriptionAeroScout™ Engine Protocol SupportAeroScout Engine support provides location-based services for wireless networks. Specify whether to enable support for the AeroScout protocol. Options are Enabled or Disabled. The default is Disabled. When enabled, Aeroscout devices are recognized and data is sent to an Aeroscout Engine (AE) for analysis. The AE determines the geographical location of 802.11 capable devices, such as STAs, APs, and AeroScout’s line of 802.11 enabled RFID devices, or tags. The AE communicates with APs that support the AE protocol in order to collect information about the RF devices detected by the APs. Using the AE protocol, D-Link supports direct communication between AE and the APs. When operating in managed mode, the AE is congured with the IP address of the managed access points from which it collects information. The Wireless Switch cannot communicate with the AE.For more information about the AeroScout protocol, see “Enabling AeroScout™ Engine Support” on page 39.Note: Only AeroScout tag hardware of types T2 and T3 are explicitly supported. Other tag models are also supported only if their implementation of the AeroScout protocol conforms to the AeroScout Engine - Access Point Interface Specication, version 2.1.Note: AeroScout tags operate only in 802.11 b/g mode. Therefore, network administrators who use the AeroScout tags must congure at least one radio on APs that are expected to detect tags in either 802.11b/g or 802.11b/g/n mode. The radios congured in 2.4 GHz IEEE 802.11 mode or any of the 5GHz modes cannot detect AeroScout tags.Note: The AE protocol allows access points to mark detected APs as rogue devices. The D-Link APs do not support this feature and never report detected APs as rogues.Table 18 - Wireless SettingsNote: After you congure the wireless settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.Using the 802.11h Wireless ModeFor 802.11a radios, if the regulatory domain requires radar detection on the channel, the Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) features of 802.11h are automatically activated.There are a number of key points about the IEEE 802.11h standard:•)  802.11h only works for the 802.11a band. It is not required for 802.11b or 802.11g.•)  If you are operating in an 802.11h enabled domain, the AP attempts to use the channel you assign. If the channel has been blocked by a previous radar detection, or if the AP detects a radar on the channel, then the AP automatically selects a different channel. •)  When 802.11h is enabled, the AP will not be operational in the 5GHz band for at least 60 seconds due to radar scanning.•)  Setting up WDS links may be difcult when 802.11h is operational. This is because the operating channels of the two APs on the WDS link may keep changing depending on channel usage and radar interference. WDS will only work if both the APs operate on the same channel. For more information on WDS, see “Conguring Load Balancing” on page 60.Enabling AeroScout™ Engine SupportThe AeroScout Engine (AE) is a software platform produced by AeroScout Inc. for location-based services. The AE can determine the physical location of 802.11 capable AeroScout devices. The AE communicates with APs that have the AE protocol enabled in order to collect information about the RF devices detected by the APs.The DWS-4000 Series switch supports only direct communication between the AE and the APs. When operating in managed mode, the AE is congured with the IP address of the managed access points from which it collects
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 40April 2015Section 4 - Managing the Access Pointinformation. The DWS-4000 Series switch does not communicate with the AE.AeroScout tags operate only in 802.11b/g mode. Therefore, network administrators who use the AeroScout tags must congure at least one radio on APs that are expected to detect tags in either 802.11b/g or 802.11b/g/n mode. The radios congured in 2.4 GHz IEEE 802.11n mode cannot detect AeroScout tags. Note: The following notes apply to AeroScout product and protocol support:•)  D-Link does not sell AeroScout products. Contact AeroScout for AeroScout hardware, software or deployment information.•)  The AE protocol does not support any authentication or encryption between the AE server and the access point.•)  The AE protocol requires radios to operate in promiscuous mode. This means that the AP receives and processes all packets detected by the radios, as opposed to processing only packets destined to the APs BSSID. This can affect AP throughput.Modifying Radio SettingsRadio settings directly control the behavior of the radio devices in the AP and its interaction with the physical medium; that is, how and what type of electromagnetic waves the AP emits.To specify radio settings, click the Radio tab in the Manage section.Different settings display depending on the mode you select. All settings are described in the table below.Figure 18 - Modify Radio SettingsThe following table describes the elds and conguration options for the Radio Settings page.Field DescriptionRadio Select Radio 1or Radio 2 to specify which radio to congure. The rest of the settings on this page apply to the radio you select in this eld. Be sure to congure settings for both radios.Radio 1 operates in the 5 GHz band (802.11a/n), and Radio 2 operates in the 2.4 GHz band (802.11b/g/n).Status (On/Off) Specify whether you want the radio on or off by clicking On or Off. If you turn off a radio, the AP sends disassociation frames to all the wireless clients it is currently supporting so that the radio can be gracefully shutdown and the clients can start the association process with other available APs.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 41April 2015Section 4 - Managing the Access PointField DescriptionMode The Mode denes the Physical Layer (PHY) standard the radio uses.Note: The modes available depend on the country code setting and the radio selected.Select one of the following modes for radio 1:•)  IEEE 802.11a is a PHY standard that species operating in the 5 GHz U-NII band using orthogonal frequency division multiplexing (OFDM). It supports data rates ranging from 6 to 54 Mbps. •)  IEEE 802.11a/n operates in the 5 GHz ISM band and includes support for both 802.11a and 802.11n devices. IEEE 802.11n is an extension of the 802.11 standard that includes multiple-input multiple-output (MIMO) technology. IEEE 802.11n supports data ranges of up to 248 Mbps and nearly twice the indoor range of 802.11 b, 802.11g, and 802.11a.•)  5 GHz IEEE 802.11n is the recommended mode for networks with 802.11n devices that operate in the 5 GHz frequency that do not need to support 802.11a devices. IEEE 802.11n can achieve a higher throughput when it does not need to be compatible with legacy devices (802.11a).Select one of the following modes for radio 2:•)  IEEE 802.11b/g operates in the 2.4 GHz ISM band. IEEE 802.11b is an enhancement of the initial 802.11 PHY to include 5.5 Mbps and 11 Mbps data rates. It uses direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS) as well as complementary code keying (CCK) to provide the higher data rates. It supports data rates ranging from 1 to 11 Mbps. IEEE 802.11g is a higher speed extension (up to 54 Mbps) to the 802.11b PHY. It uses orthogonal frequency division multiplexing (OFDM). It supports data rates ranging from 1 to 54 Mbps. •)  IEEE 802.11b/g/n operates in the 2.4 GHz ISM band and includes support for 802.11b, 802.11g, and 802.11n devices.•)  2.4 GHz IEEE 802.11n is the recommended mode for networks with 802.11n devices that operate in the 2.4 GHz frequency that do not need to support 802.11b/g devices. IEEE 802.11n can achieve a higher throughput when it does not need to be compatible with legacy devices (802.11b/g).Channel Select the Channel.The range of available channels is determined by the mode of the radio interface and the country code setting. If you select Auto for the channel setting, the AP scans available channels and selects a channel where no trafc is detected.The channel denes the portion of the radio spectrum the radio uses for transmitting and receiving. Each mode offers a number of channels, depending on how the spectrum is licensed by national and transnational authorities such as the Federal Communications Commission (FCC) or the International Telecommunication Union (ITU-R).When automatic channel assignment is enabled on the Channel Management page for Clustering, the channel policy for the radio is automatically set to static mode, and the Auto option is not available for the Channel eld. This allows the automatic channel feature to set the channels for the radios in the cluster.Channel Bandwidth (802.11n modes only)The 802.11n specication allows a 40 MHz wide channel in addition to the legacy 20 MHz channel available with other modes. The 40 MHz channel enables higher data rates but leaves fewer channels available for use by other 2.4 GHz and 5 GHz devices. Set the eld to 20 MHz to restrict the use of the channel bandwidth to a 20 MHz channel.Primary Channel (802.11n modes only)This setting can be changed only when the channel bandwidth is set to 40 MHz. A 40 MHz channel can be considered to consist of two 20 MHz channels that are contiguous in the frequency domain. These two 20 MHz channels are often referred to as the Primary and Secondary channels. The Primary Channel is used for 802.11n clients that support only a 20 MHz channel bandwidth and for legacy clients.Select one of the following options:•)  Lower — Set the Primary Channel as the lower 20 MHz channel in the 40 MHz band.•)  Upper — Set the Primary Channel as the upper 20 MHz channel in the 40 MHz band.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 42April 2015Section 4 - Managing the Access PointField DescriptionShort Guard Interval SupportedThis eld is available only if the selected radio mode includes 802.11n. The guard interval is the dead time, in nanoseconds, between OFDM symbols. The guard interval prevents Inter-Symbol and Inter-Carrier Interference (ISI, ICI). The 802.11n mode allows for a reduction in this guard interval from the a and g denition of 800 nanoseconds to 400 nanoseconds. Reducing the guard interval can yield a 10% improvement in data throughput. Select one of the following options:•)  Yes — The AP transmits data using a 400ns guard Interval when communicating with clients that also support the short guard interval. •)  No — The AP transmits data using an 800ns guard interval.STBC Mode This eld is available only if the selected radio mode includes 802.11n. Space Time Block Coding (STBC) is an 802.11n technique intended to improve the reliability of data transmissions. The data stream is transmitted on multiple antennas so the receiving system has a better chance of detecting at least one of the data streams.Select one of the following options:•)  On — The AP transmits the same data stream on multiple antennas at the same time.•)  Off — The AP does not transmits the same data on multiple antennas.Protection The protection feature contains rules to guarantee that 802.11n transmissions do not cause interference with legacy stations or APs. By default, these protection mechanisms are enabled (Auto). With protection enabled, protection mechanisms will be invoked if legacy devices are within range of the AP. This causes more overhead on every transmission, which will impact performance. However, there is no impact on performance if there are no legacy devices within range of the AP.You can disable (Off) these protection mechanisms; however, when 802.11n protection is off, legacy clients or APs within range can be affected by 802.11n transmissions. The 802.11 protection feature is also available when the mode is 802.11b/g. When protection is enabled in this mode, it protects 802.11b clients and APs from 802.11g transmissions. Note: This setting does not affect the ability of the client to associate with the AP.Beacon Interval Beacon frames are transmitted by an AP at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).Enter a value from 20 to 2000 milliseconds.DTIM Period Specify a DTIM period from 1 to 255 beacons.The Delivery Trafc Information Map (DTIM) message is an element included in some Beacon frames. It indicates which client stations, currently sleeping in low-power mode, have data buffered on the AP awaiting pick-up.The DTIM period you specify indicates how often the clients served by this AP should check for buffered data still on the AP awaiting pickup.The measurement is in beacons. For example, if you set this eld to 1, clients will check for buffered data on the AP at every beacon. If you set this eld to 10, clients will check on every 10th beacon.Fragmentation ThresholdSpecify a number between 256 and 2,346 to set the frame size threshold in bytes. The fragmentation threshold is a way of limiting the size of packets (frames) transmitted over the network. If a packet exceeds the fragmentation threshold you set, the fragmentation function is activated and the packet is sent as multiple 802.11 frames.If the packet being transmitted is equal to or less than the threshold, fragmentation is not used.Setting the threshold to the largest value (2,346 bytes) effectively disables fragmentation. Fragmentation plays no role when Aggregation is enabled.Fragmentation involves more overhead both because of the extra work of dividing up and reassembling of frames it requires, and because it increases message trafc on the network. However, fragmentation can help improve network performance and reliability if properly congured.Sending smaller frames (by using lower fragmentation threshold) might help with some interference problems; for example, with microwave ovens.By default, fragmentation is off. We recommend not using fragmentation unless you suspect radio interference. The additional headers applied to each fragment increase the overhead on the network and can greatly reduce throughput.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 43April 2015Section 4 - Managing the Access PointField DescriptionRTS Threshold Specify a Request to Send (RTS) Threshold value between 0 and 2347.The RTS threshold indicates the number of octets in an MPDU, below which an RTS/CTS handshake is not performed. Changing the RTS threshold can help control trafc ow through the AP, especially one with a lot of clients. If you specify a low threshold value, RTS packets will be sent more frequently. This will consume more bandwidth and reduce the throughput of the packet. On the other hand, sending more RTS packets can help the network recover from interference or collisions which might occur on a busy network, or on a network experiencing electromagnetic interference.Maximum Stations Specify the maximum number of stations allowed to access this AP at any one time.You can enter a value between 0 and 200.Transmit Power Enter a percentage value for the transmit power level for this AP.The default value, which is 100%, can be more cost-efcient than a lower percentage since it gives the AP a maximum broadcast range and reduces the number of APs needed.To increase capacity of the network, place APs closer together and reduce the value of the transmit power. This helps reduce overlap and interference among APs. A lower transmit power setting can also keep your network more secure because weaker wireless signals are less likely to propagate outside of the physical location of your network.Fixed Multicast Rate Select the multicast trafc transmission rate you want the AP to support.Legacy Rate Sets Check the transmission rate sets you want the AP to support and the basic rate sets you want the AP to advertise:•)  Rates are expressed in megabits per second.•)  Supported Rate Sets indicate rates that the AP supports. You can check multiple rates (click a check box to select or de-select a rate). The AP will automatically choose the most efcient rate based on factors like error rates and distance of client stations from the AP.•)  Basic Rate Sets indicate rates that the AP will advertise to the network for the purposes of setting up communication with other APs and client stations on the network. It is generally more efcient to have an AP broadcast a subset of its supported rate sets.MCS (Data Rate) Settings (802.11n modes only)This eld shows the Modulation and Coding Scheme (MCS) index values supported by the radio. Each index can be enabled and disabled independently.Broadcast/Multicast Rate LimitingEnabling multicast and broadcast rate limiting can improve overall network performance by limiting the number of packets transmitted across the network. By default the Multicast/Broadcast Rate Limiting option is disabled. Until you enable Multicast/Broadcast Rate Limiting, the following elds will be disabled:•)  Rate Limit - Enter the rate limit you want to set for multicast and broadcast trafc. The limit should be greater than 1, but less than 50 packets per second. Any trafc that falls below this rate limit will always conform and be transmitted to the appropriate destination. The default and maximum rate limit setting is 50 packets per second.•)  Rate Limit Burst - Setting a rate limit burst determines how much trafc bursts can be before all trafc exceeds the rate limit. This burst limit allows intermittent bursts of trafc on a network above the set rate limit. The default and maximum rate limit burst setting is 75 packets per second.TSPEC Mode Regulates the overall TSPEC mode on the AP. The options are:•)  On — The AP handles TSPEC requests according to the TSPEC settings you congure on the Radio page. Use this setting if the AP handles trafc from QoS-capable devices, such as a Wi-Fi CERTIFIED phone.•)  Off — The AP ignores TSPEC requests from client stations. Use this setting if you do not want to use TSPEC to give QoS-capable devices priority for time-sensitive trafc.TSPEC Voice ACM ModeRegulates mandatory admission control (ACM) for the voice access category. The options are:•)  On — A station is required to send a TSPEC request for bandwidth to the AP before sending or receiving a voice trafc stream. The AP responds with the result of the request, which includes the allotted medium time if the TSPEC was admitted.•)  Off — A station can send and receive voice priority trafc without requiring an admitted TSPEC; the AP ignores voice TSPEC requests from client stations.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 44April 2015Section 4 - Managing the Access PointField DescriptionTSPEC Voice ACM LimitSpecify an upper limit on the amount of trafc the AP attempts to transmit on the wireless medium using a voice AC to gain access.TSPEC Video ACM ModeRegulates mandatory admission control for the video access category. The options are:•)  On — A station is required to send a TSPEC request for bandwidth to the AP before sending or receiving a video trafc stream. The AP responds with the result of the request, which includes the allotted medium time if the TSPEC was admitted. •)  Off — A station can send and receive video priority trafc without requiring an admitted TSPEC; the AP ignores video TSPEC requests from client stations.TSPEC Video ACM LimitSpecify an upper limit on the amount of trafc the AP attempts to transmit on the wireless medium using a video AC to gain access.TSPEC AP Inactivity TimeoutSpecify the amount of time for an AP to detect an downlink TS as idle before deleting it.TSPEC Station Inactivity TimeoutSpecify the amount of time for an AP to detect an uplink TS as idle before deleting it.TSPEC Legacy WMM Queue Map ModeSelect Enable to allow intermixing of legacy trafc on queues operating as ACM.Table 19 - Radio SettingsUse the Radio page to congure both Radio One and Radio Two. The settings on the page apply only to the radio that you choose from the Radio drop-down list. After you congure settings for one of the radios, click Apply and then select and congure the other radio. Be sure to click Apply to apply the second set of conguration settings for the other radio.Conguring Radio and VAP SchedulerThe Radio and VAP scheduler is a standalone DWL-x600AP feature. To congure the Radio and VAP scheduler, select the Scheduler tab in the Manage section. The Radio and VAP Scheduler allows you to congure a rule with a specic time interval for VAPs or radios to be operational, thereby automating the enabling or disabling of the VAPs and Radios.One of the ways you can use this feature is to schedule radios to operate only during the ofce working hours in order to achieve security and reduce power consumption. You can also use the Scheduler to allow access to VAPs for wireless clients only during specic times of day.Each rule species the start time, end time and day (or days) of the week the radio or VAP can be operational. The rules are periodic in nature and are repeated every week. A valid rule must contain all of the following parameters: •)  Days of the Week.•)  Start Time (hour and minutes).•)  End Time (hour and minutes).Only valid rules are added to the prole. Up to 16 rules are grouped together to form a scheduling prole. Any two periodic rules time entries belonging to the same prole must not overlap. The time granularity for the schedules is one minute. The DWL-x600AP supports up to 16 proles.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 45April 2015Section 4 - Managing the Access PointFigure 19 - Scheduler CongurationField DescriptionGlobal Scheduler ModeA global switch to enable or disable the scheduler feature. The default is Disable.Scheduler Operational StatusStatus The operational status of the Scheduler. The range is Up or Down. The default is Down.Reason Provides additional information about the status. The reason can be one or more of the following:•)  IsActive – Operational status is up.•)  CongDown – Operational status is down because global conguration is disabled.•)  TimeNotSet – Operational status is down because the AP time has not been set, either manually or by specifying an NTP server to use.•)  ManagedMode– Operational status is down because the AP is in managed mode.Scheduler Prole The Scheduler prole denes the list of proles names that can be associated to the VAP or Radio conguration. Rules are associated with a named scheduler prole. You can dene up to 16 scheduler prole names. By default, no proles are created.The prole name can be up to 32 alphanumeric characters. Click Add to add the prole name.Rule Conguration Each scheduler prole may have up to 16 periodic rules. The list of parameters for each periodic rule are described below.Select Prole Select the prole name from the menu.Set Schedule The day of the week. Range is: Daily, Weekday (Monday to Friday), Weekend (Saturday and Sunday), Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday. The default is Daily.Start Time The time when the radio or VAP will be operationally enabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00.End Time The time when the radio or VAP will be operationally disabled. The time is in HH:MM 24-hour format. The range is <00-24>:<00-59>. The default is 00:00.Table 20 - Scheduler CongurationTo change an existing rule, select the rule, update the values in the Rule Conguration area, and click Modify Rule.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 46April 2015Section 4 - Managing the Access PointFigure 20 - Scheduler Conguration (Modify Rule)Click Apply to save the new conguration settings.Note: After making any modications, you must click Apply to apply the changes and to save the settings.Scheduler Association SettingsFor a Scheduler prole to take effect, you must associate it with at least one radio or VAP interface. To associate the Scheduler proles, select the Scheduler Association tab in the Manage section. By default, there are no Scheduler proles created, so no prole is associated to any radio or VAP. The Scheduler prole needs to be explicitly associated to a radio or VAP conguration. Only one Scheduler prole can be associated to any radio or VAP conguration; however, a single prole can be associated to multiple radios or VAPs. If the Scheduler prole associated with a VAP or radio is deleted, then the associated prole to the VAP or radio is removed implicitly. If the radio is operationally disabled, then all the VAPs associated to that radio are also operationally disabled irrespective of the VAP conguration.Figure 21 - Scheduler Association Settings
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 47April 2015Section 4 - Managing the Access PointField DescriptionRadio Scheduler Prole Operational Status1 or 2  From the menu, select the Scheduler prole to associate with Radio 1 or Radio 2.Scheduler Prole From the menu, select the Scheduler prole to associate with the Radio.Status The operational status of the Scheduler. The range is Up or Down.VAP Scheduler Prole Operational StatusRadio From the menu, select Radio 1 or Radio 2 to associate the VAP Scheduler Prole.0-15 From the menu, select the Scheduler prole to associate with the respective VAP.Status The operational status of the Scheduler. The range is Up or Down.Table 21 - Scheduler Association SettingsNote: After you associate a Scheduler prole with a Radio interface or a VAP interface, you must click Apply to apply the changes and to save the settings.Virtual Access Point SettingsTo change VAP 0 or to enable and congure additional VAPs, select the VAP tab in the Manage section.VAPs segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of Ethernet VLANs. VAPs simulate multiple APs in one physical AP. Each radio supports up to 16 VAPs.For each VAP, you can customize the security mode to control wireless client access. Each VAP can also have a unique SSID. Multiple SSIDs make a single AP look like two or more APs to other systems on the network. By conguring VAPs, you can maintain better control over broadcast and multicast trafc, which affects network performance. You can congure each VAP to use a different VLAN, or you can congure multiple VAPs to use the same VLAN, whether the VLAN is on the same radio or on a different radio. VAP0, which is always enabled on both radios, is assigned to the default VLAN 1.The AP adds VLAN ID tags to wireless client trafc based on the VLAN ID you congure on the VAP page or by using the RADIUS server assignment. If you use an external RADIUS server, you can congure multiple VLANs on each VAP. The external RADIUS server assigns wireless clients to the VLAN when the clients associate and authenticate.You can congure up to four global IPv4 or IPv6 RADIUS servers. One of the servers always acts as a primary while the others act as backup servers. The network type (IPv4 or IPv6) and accounting mode are common across all congured RADIUS servers. You can congure each VAP to use the global RADIUS server settings, which is the default, or you can congure a per-VAP RADIUS server set. You can also congure separate RADIUS server settings for each VAP. For example, you can congure one VAP to use an IPv6 RADIUS server while other VAPs use the global IPv4 RADIUS server settings you congure.If wireless clients use a security mode that does not communicate with the RADIUS server, or if the RADIUS server does not provide the VLAN information, you can assign a VLAN ID to each VAP. The AP assigns the VLAN to all wireless clients that connect to the AP through that VAP.Note: Before you congure VLANs on the AP, be sure to verify that the switch and DHCP server the AP uses can support IEEE 802.1Q VLAN encapsulation. To set up multiple VAPs, click Manage > VAP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 48April 2015Section 4 - Managing the Access PointFigure 22 - Modify Virtual Access Point SettingsThe following table describes the elds and conguration options on the VAP page.Field DescriptionRADIUS IP Address TypeSpecify the IP version that the RADIUS server uses.You can toggle between the address types to congure IPv4 and IPv6 global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address type you select in this eld.RADIUS IP Address RADIUS IPv6 AddressEnter the IPv4 or IPv6 address for the primary global RADIUS server. By default, each VAP uses the global RADIUS settings that you dene for the AP at the top of the VAP page.When the rst wireless client tries to authenticate with the AP, the AP sends an authentication request to the primary server. If the primary server responds to the authentication request, the AP continues to use this RADIUS server as the primary server, and authentication requests are sent to the address you specify.If the IPv4 RADIUS IP Address Type option is selected in the previous eld, enter the IP address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.RADIUS IP or IPv6 Address 1–3Enter up to three IPv4 or IPv6 addresses to use as the backup RADIUS servers. The eld label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.If authentication fails with the primary server, each congured backup server is tried in sequence. The IPv4 or IPv6 address must be valid in order for the AP to attempt to contact the server.RADIUS Key Enter the RADIUS key in the text box.The RADIUS Key is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must congure the same key on the AP and on your RADIUS server. The text you enter will be displayed as “*” characters to prevent others from seeing the RADIUS key as you type.RADIUS Key 1–3 Enter the RADIUS key associated with the congured backup RADIUS servers. The server at RADIUS IP Address-1 uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2, and so on.Enable RADIUS AccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.Enable RADIUS FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 49April 2015Section 4 - Managing the Access PointField DescriptionRadio Select the radio to congure. VAPs are congured independently on each radio.VAP You can congure up to 16 VAPs for each radio. VAP0 is the physical radio interface, so to disable VAP0, you must disable the radio.Enabled You can enable or disable a congured network.•)  To enable the specied network, select the Enabled option beside the appropriate VA P.•)  To disable the specied network, clear the Enabled option beside the appropriate VAP.If you disable the specied network, you will lose the VLAN ID you entered.VLAN ID When a wireless client connects to the AP by using this VAP, the AP tags all trafc from the wireless client with the VLAN ID you enter in this eld unless you enter the untagged VLAN ID or use a RADIUS server to assign a wireless client to a VLAN. The range for the VLAN ID is 1 – 4094.If you use RADIUS-based authentication for clients, you can optionally add the following attributes to the appropriate le in the RADIUS or AAA server to congure a VLAN for the client:•)  “Tunnel-Type”•)  “Tunnel-Medium-Type”•)  “Tunnel-Private-Group-ID” The RADIUS-assigned VLAN ID overrides the VLAN ID you congure on the VAP page. You congure the untagged and management VLAN IDs on the Ethernet Settings page. For more information, see “Ethernet Settings” on page 35.SSID Enter a name for the wireless network. The SSID is an alphanumeric string of up to 32 characters. You can use the same SSID for multiple VAPs, or you can choose a unique SSID for each VAP.Note: If you are connected as a wireless client to the same AP that you are administering, resetting the SSID will cause you to lose connectivity to the AP. You will need to reconnect to the new SSID after you save this new setting.Broadcast SSID Specify whether to allow the AP to broadcast the Service Set Identier (SSID) in its beacon frames. The Broadcast SSID parameter is enabled by default. When the VAP does not broadcast its SSID, the network name is not displayed in the list of available networks on a client station. Instead, the client must have the exact network name congured in the supplicant before it is able to connect.•)  To enable the SSID broadcast, select the Broadcast SSID check box. •)  To prohibit the SSID broadcast, clear the Broadcast SSID check box.Note: Disabling the broadcast SSID is sufcient to prevent clients from accidentally connecting to your network, but it will not prevent even the simplest of attempts by a hacker to connect or monitor unencrypted trafc. Suppressing the SSID broadcast offers a very minimal level of protection on an otherwise exposed network (such as a guest network) where the priority is making it easy for clients to get a connection and where no sensitive information is available.Security Select one of the following Security modes for this VAP:•)  None•)  Static WEP•)  WPA Personal•)  IEEE 802.1X•)  WPA EnterpriseIf you select a security mode other than None, additional elds appear. These elds are explained below.Note: The Security mode you set here is specically for this VAP.MAC Authentication TypeYou can congure a global list of MAC addresses that are allowed or denied access to the network. The drop-down menu for this feature allows you to select the type of MAC Authentication to use:•)  Disabled: Do not use MAC Authentication.•)  Local: Use the MAC Authentication list that you congure on the MAC Authentication page.•)  RADIUS: Use the MAC Authentication list on the external RADIUS server.For more information about MAC Authentication, see “Controlling Access by MAC Authentication” on page 58.Table 22 - Virtual Access Point Settings
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 50April 2015Section 4 - Managing the Access PointNote: After you congure the VAP settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.None (Plain-text)If you select None as your security mode, no further options are congurable on the AP. This mode means that any data transferred to and from the UAP is not encrypted. This security mode can be useful during initial network conguration or for problem solving, but it is not recommended for regular use on the Internal network because it is not secure.Static WEPWired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and APs on the network are congured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption.Static WEP is not the most secure mode available, but it offers more protection than setting the security mode to None (Plain-text) as it does prevent an outsider from easily snifng out unencrypted wireless trafc. WEP encrypts data moving across the wireless network based on a static key. (The encryption algorithm is a stream cipher called RC4.)Figure 23 - Modify Virtual Access Point Settings (Static WEP)Field  DescriptionTransfer Key Index Select a key index from the drop-down menu. Key indexes 1 through 4 are available. The default is 1.The Transfer Key Index indicates which WEP key the AP will use to encrypt the data it transmits.Key Length Specify the length of the key by clicking one of the radio buttons:•)  64 bits•)  128 bitsKey Type Select the key type by clicking one of the radio buttons:•)  ASCII•)  Hex
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 51April 2015Section 4 - Managing the Access PointField  DescriptionWEP Keys You can specify up to four WEP keys. In each text box, enter a string of characters for each key. The keys you enter depend on the key type selected: •)  ASCII — Includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.•)  Hex — Includes digits 0 to 9 and the letters A to F.Use the same number of characters for each key as specied in the Characters Required eld. These are the RC4 WEP keys shared with the stations using the AP.Each client station must be congured to use one of these same WEP keys in the same slot as specied here on the AP. Characters Required: The number of characters you enter into the WEP Key elds is determined by the Key length and Key type you select. For example, if you use 128-bit ASCII keys, you must enter 26 characters in the WEP key. The number of characters required updates automatically based on how you set Key Length and Key Type.Authentication The authentication algorithm denes the method used to determine whether a client station is allowed to associate with an AP when static WEP is the security mode.Specify the authentication algorithm you want to use by choosing one of the following options:•)  Open System authentication allows any client station to associate with the AP whether that client station has the correct WEP key or not. This algorithm is also used in plaintext, IEEE 802.1X, and WPA modes. When the authentication algorithm is set to Open System, any client can associate with the AP.Note: Just because a client station is allowed to associate does not ensure it can exchange trafc with an AP. A station must have the correct WEP key to be able to successfully access and decrypt data from an AP, and to transmit readable data to the AP.•)  Shared Key authentication requires the client station to have the correct WEP key in order to associate with the AP. When the authentication algorithm is set to Shared Key, a station with an incorrect WEP key will not be able to associate with the AP.•)  Both Open System and Shared Key. When you select both authentication algorithms:•) Client stations congured to use WEP in shared key mode must have a valid WEP key in order to associate with the AP.•) Client stations congured to use WEP as an open system (shared key mode not enabled) will be able to associate with the AP even if they do not have the correct WEP key.Table 23 - Static WEPStatic WEP RulesIf you use Static WEP, the following rules apply:•)  All client stations must have the Wireless LAN (WLAN) security set to WEP, and all clients must have one of the WEP keys specied on the AP in order to de-code AP-to-station data transmissions.•)  The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station transmissions.•)  The same key must occupy the same slot on all nodes (AP and clients). For example if the AP denes abc123 key as WEP key 3, then the client stations must dene that same string as WEP key 3.•)  Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but this is less secure because it means one station can decrypt the data being sent by another.)•)  On some wireless client software, you can congure multiple WEP keys and dene a client station “transfer key index”, and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs cannot decode each other’s transmissions.•)  You cannot mix 64-bit and 128-bit WEP keys between the access point and its client stations.IEEE 802.1XIEEE 802.1X is the standard dening port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically-generated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 52April 2015Section 4 - Managing the Access PointThis mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server capable of EAP, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must support Protected EAP (PEAP) and MSCHAP V2.You can use any of a variety of authentication methods that the IEEE 802.1X mode supports, including certicates, Kerberos, and public key authentication. You must congure the client stations to use the same authentication method the AP uses.Figure 24 - Modify Virtual Access Point Settings (IEEE802.1X)Field DescriptionUse Global RADIUS Server SettingsBy default each VAP uses the global RADIUS settings that you dene for the AP at the top of the VAP page. However, you can congure each VAP to use a different set of RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS server IP address and key in the following elds.RADIUS IP Address TypeSpecify the IP version that the RADIUS server uses.You can toggle between the address types to congure IPv4 and IPv6 global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address type you select in this eld.RADIUS IP AddressRADIUS IPv6 AddressEnter the IPv4 or IPv6 address for the primary RADIUS server for this VAP.If the IPv4 RADIUS IP Address Type option is selected in the previous eld, enter the IP address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.RADIUS IP or IPv6 Address 1–3Enter up to three IPv4 and/or IPv6 addresses to use as the backup RADIUS servers for this VAP. The eld label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.If authentication fails with the primary server, each congured backup server is tried in sequence.RADIUS Key Enter the RADIUS key in the text box.The RADIUS Key is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must congure the same key on the AP and on your RADIUS server. The text you enter will be displayed as “*” characters to prevent others from seeing the RADIUS key as you type.RADIUS Key 1 – 3 Enter the RADIUS key associated with the congured backup RADIUS servers. The server at RADIUS IP Address-1 uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2, and so on.Enable RADIUS AccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 53April 2015Section 4 - Managing the Access PointField DescriptionEnable RADIUS FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable.Active Server Specify which congured RADIUS server to use as the active RADIUS server.Broadcast Key Refresh RateEnter a value to set the interval at which the broadcast (group) key is refreshed for clients associated to this VAP (the default is 300). The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Session Key Refresh RateEnter a value to set the interval at which the AP will refresh session (unicast) keys for each client associated to the VAP. The valid range is 0 – 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 24 - IEEE 802.1XNote: After you congure the security settings, you must click Apply to apply the changes and to save the settings. WPA PersonalWPA Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes AES-CCMP and TKIP mechanisms. The Personal version of WPA employs a pre-shared key (instead of using IEEE 802.1X and EAP as is used in the Enterprise WPA security mode). The PSK is used for an initial check of credentials only.This security mode is backwards-compatible for wireless clients that support the original WPA.Figure 25 - Modify Virtual Access Point Settings (WPA Personal)Field DescriptionWPA Versions Select the types of client stations you want to support:•)  WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA.•)  WPA2. If all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard.•)  WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both of the check boxes. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA conguration allows more interoperability, at the expense of some security.Cipher Suites Select the cipher suite you want to use:•)  TKIP•)  CCMP (AES)•)  TKIP and CCMP (AES)Both TKIP and AES clients can associate with the AP. WPA clients must have one of the following to be able to associate with the AP:•)  A valid TKIP key•)  A valid AES-CCMP keyClients not congured to use a WPA Personal will not be able to associate with the AP.Key The Pre-shared Key is the shared secret key for WPA Personal. Enter a string of at least 8 characters to a maximum of 63 characters. Acceptable characters include upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 54April 2015Section 4 - Managing the Access PointField DescriptionBroadcast Key Refresh RateEnter a value to set the interval at which the broadcast (group) key is refreshed for clients associated to this VAP (the default is 300).The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 25 - WPA PersonalNote: After you congure the security settings, you must click Apply to apply the changes and to save the settings. WPA EnterpriseWPA Enterprise with RADIUS is an implementation of the Wi-Fi Alliance IEEE 802.11i standard, which includes CCMP (AES), and TKIP mechanisms. The Enterprise mode requires the use of a RADIUS server to authenticate users.This security mode is backwards-compatible with wireless clients that support the original WPA.Figure 26 - Modify Virtual Access Point Settings (WPA Enterprise)Field DescriptionWPA Versions Select the types of client stations you want to support:•)  WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA.•)  WPA2. If all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard.•)  WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both WPA and WPA2. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA conguration allows more interoperability, at the expense of some security.Enable pre-authenticationIf for WPA Versions you select only WPA2 or both WPA and WPA2, you can enable pre-authentication for WPA2 clients.Click Enable pre-authentication if you want WPA2 wireless clients to send pre-authentication packet. The pre-authentication information will be relayed from the AP the client is currently using to the target AP. Enabling this feature can help speed up authentication for roaming clients who connect to multiple APs.This option does not apply if you selected WPA for WPA Versions because the original WPA does not support this feature.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 55April 2015Section 4 - Managing the Access PointField DescriptionCipher Suites Select the cipher suite you want to use:•)  TKIP•)  CCMP (AES)•)  TKIP and CCMP (AES)By default both TKIP and CCMP are selected. When both TKIP and CCMP are selected, client stations congured to use WPA with RADIUS must have one of the following:•)  A valid TKIP RADIUS IP address and RADIUS Key•)  A valid CCMP (AES) IP address and RADIUS KeyUse Global RADIUS Server SettingsBy default each VAP uses the global RADIUS settings that you dene for the AP at the top of the VAP page. However, you can congure each VAP to use a different set of RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS server IP address and key in the following elds.RADIUS IP Address TypeSpecify the IP version that the RADIUS server uses.You can toggle between the address types to congure IPv4 and IPv6 global RADIUS address settings, but the AP contacts only the RADIUS server or servers for the address type you select in this eld.RADIUS IP Address RADIUS IPv6 AddressEnter the IPv4 or IPv6 address for the primary RADIUS server for this VAP.If the IPv4 RADIUS IP Address Type option is selected in the previous eld, enter the IP address of the RADIUS server that all VAPs use by default, for example 192.168.10.23. If the IPv6 RADIUS IP Address Type option is selected, enter the IPv6 address of the primary global RADIUS server, for example 2001:0db8:1234::abcd.RADIUS IP or IPv6 Address 1–3Enter up to three IPv4 and/or IPv6 addresses to use as the backup RADIUS servers for this VAP. The eld label is RADIUS IP Address when the IPv4 RADIUS IP Address Type option is selected and RADIUS IPv6 Address when the IPv6 RADIUS IP Address Type option is selected.If authentication fails with the primary server, each congured backup server is tried in sequence.RADIUS Key Enter the RADIUS key in the text box.The RADIUS Key is the shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must congure the same key on the AP and on your RADIUS server. The text you enter will be displayed as “*” characters to prevent others from seeing the RADIUS key as you type.RADIUS Key 1–3 Enter the RADIUS key associated with the congured backup RADIUS servers. The server at RADIUS IP Address-1 uses RADIUS Key-1, RADIUS IP Address-2 uses RADIUS Key-2, and so on.Enable RADIUS AccountingSelect this option to track and measure the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on.If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.Enable RADIUS FailThroughSelect this option to allow the secondary RADIUS server to authenticate wireless clients if the authentication with the primary RADIUS server is unsuccessful, or if the primary RADIUS server is unavailable.Active Server Specify which congured RADIUS server to use as the active RADIUS server.Broadcast Key Refresh RateEnter a value to set the interval at which the broadcast (group) key is refreshed for clients associated to this VAP (the default is 300). The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Session Key Refresh RateEnter a value to set the interval at which the AP will refresh session (unicast) keys for each client associated to the VAP. The valid range is 0–86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.Table 26 - WPA Enterprise
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 56April 2015Section 4 - Managing the Access PointNote: After you congure the security settings, you must click Apply to apply the changes and to save the settings.Conguring the Wireless Distribution System (WDS)The Wireless Distribution System (WDS) allows you to connect multiple UAPs. With WDS, APs communicate with one another without wires in a standardized way. This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks. It can also simplify the network infrastructure by reducing the amount of cabling required. You can congure the AP in point-to-point or point-to-multipoint bridge mode based on the number of links to connect.In the point-to-point mode, the AP accepts client associations and communicates with wireless clients and other repeaters. The AP forwards all trafc meant for the other network over the tunnel that is established between the APs. The bridge does not add to the hop count. It functions as a simple OSI layer 2 network device.In the point-to-multipoint bridge mode, one AP acts as the common link between multiple APs. In this mode, the central AP accepts client associations and communicates with the clients and other repeaters. All other APs associate only with the central AP that forwards the packets to the appropriate wireless bridge for routing purposes.The UAP can also act as a repeater. In this mode, the AP serves as a connection between two APs that might be too far apart to be within cell range. When acting as a repeater, the AP does not have a wired connection to the LAN and repeats signals by using the wireless connection. No special conguration is required for the AP to function as a repeater, and there are no repeater mode settings. Wireless clients can still connect to an AP that is operating as a repeater.Note: When you move an AP from Standalone Mode to Managed Mode, WDS is disabled. In Managed Mode, you congure the AP by using the D-Link Unied Wireless Switch. The Administrator UI, as well as Telnet, SSH, and SNMP access are disabled when the AP is in Managed Mode.To specify the details of trafc exchange from this access point to others, click the WDS tab.Figure 27 - Congure WDS BridgesBefore you congure WDS on the AP, note the following guidelines:•)  When using WDS, be sure to congure WDS settings on both APs participating in the WDS link.•)  You can have only one WDS link between any pair of APs. That is, a remote MAC address may appear only once on the WDS page for a particular AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 57April 2015Section 4 - Managing the Access Point•)  Both APs participating in a WDS link must be on the same Radio channel and using the same IEEE 802.11 mode. (See “Modifying Radio Settings” on page 40 for information on conguring the Radio mode and channel.)•)  When 802.11h is operational, setting up two WDS links can be difcult.To congure WDS on this AP, describe each AP intended to receive handoffs and send information to this AP. For each destination AP, congure the elds listed in the table below.Field DescriptionSpanning Tree ModeSpanning Tree Protocol (STP) prevents switching loops. STP is recommended if you congure WDS links. Select Enabled to use STPSelect Disabled to turn off STP links (not recommended)Radio For each WDS link on a two-radio AP, select Radio One or Radio Two. The rest of the settings for the link apply to the radio selected in this eld. The read-only Local Address will change depending on which Radio you select in this eld.Local Address Indicates the MAC addresses for this AP.For each WDS link on a two-radio AP, the Local Address reects the MAC address for the internal interface on the selected radio (Radio One on wlan0 or Radio Two on wlan1).Remote Address Specify the MAC address of the destination AP; that is, the AP on the other end of the WDS link to which data will be sent or handed-off and from which data will be received.Click the drop-down arrow to the right of the Remote Address eld to see a list of all the available MAC Addresses and their associated SSIDs on the network. Select the appropriate MAC address from the list.Note: The SSID displayed in the drop-down list is simply to help you identify the correct MAC Address for the destination AP. This SSID is a separate SSID to that which you set for the WDS link. The two do not (and should not) be the same value or name.Encryption You can use no encryption, WEP, or WPA (PSK) on the WDS link. If you are unconcerned about security issues on the WDS link you may decide not to set any type of encryption. Alternatively, if you have security concerns you can choose between Static WEP and WPA (PSK). In WPA (PSK) mode, the AP uses WPA2-PSK with CCMP (AES) encryption over the WDS link.Table 27 - WDS SettingsIf you select None as your preferred WDS encryption option, you will not be asked to ll in any more elds on the WDS page. All data transferred between the two APs on the WDS link will be unencrypted.Note: To disable a WDS link, you must remove the value congured in the Remote Address eld.WEP on WDS LinksThe following table describes the additional elds that appear when you select WEP as the encryption type.Field DescriptionEncryption WEPWEP Select this option if you want to set WEP encryption on the WDS link.Key Length If WEP is enabled, specify the length of the WEP key:•)  64 bits•)  128 bitsKey Type If WEP is enabled, specify the WEP key type:•)  ASCII•)  Hex
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 58April 2015Section 4 - Managing the Access PointField DescriptionCharacters RequiredIndicates the number of characters required in the WEP key.The number of characters required updates automatically based on how you set Key Length and Key Type.WEP Key Enter a string of characters. If you selected ASCII, enter any combination of 0 – 9, a – z, and A – Z. If you selected HEX, enter hexadecimal digits (any combination of 0 – 9 and a – f or A – F). These are the RC4 encryption keys shared with the stations using the AP.Table 28 - WEP on WDS LinksWPA/PSK on WDS LinksThe following table describes the aAdditional elds that appear when you select WPA/PSK as the encryption type.Field DescriptionEncryption WPA (PSK)SSID Enter an appropriate name for the new WDS link you have created. This SSID should be different from the other SSIDs used by this AP. However, it is important that the same SSID is also entered at the other end of the WDS link. If this SSID is not the same for both APs on the WDS link, they will not be able to communicate and exchange data.The SSID can be any alphanumeric combination.Key Enter a unique shared key for the WDS bridge. This unique shared key must also be entered for the AP at the other end of the WDS link. If this key is not the same for both APs, they will not be able to communicate and exchange data.The WPA-PSK key is a string of at least 8 characters to a maximum of 63 characters. Acceptable characters include upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Table 29 - WPA/PSK on WDS LinksNote: After you congure the WDS settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Controlling Access by MAC AuthenticationA Media Access Control (MAC) address is a hardware address that uniquely identies each node of a network. All IEEE 802 network devices share a common 48-bit MAC address format, usually displayed as a string of 12 hexadecimal digits separated by colons, for example 00:DC:BA:09:87:65. Each wireless network interface card (NIC) used by a wireless client has a unique MAC address.You can use the Administrator UI on the AP or use an external RADIUS server to control access to the network through the AP based on the MAC address of the wireless client. This feature is called MAC Authentication or MAC Filtering. To control access, you congure a global list of MAC addresses locally on the AP or on an external RADIUS server. Then, you set a lter to specify whether the clients with those MAC addresses are allowed or denied access to the network. When a wireless client attempts to associate with an AP, the AP looks up the MAC address of the client in the local Stations List or on the RADIUS server. If it is found, the global allow or deny setting is applied. If it is not found, the opposite is applied.On the VAP page, the MAC Authentication Type setting controls whether the AP uses the station list congured locally on the MAC Authentication page or the external RADIUS server. The Allow/Block lter setting on the MAC Authentication page determines whether the clients in the station list (local or RADIUS) can access the network through the AP. For more information about setting the MAC authentication type, see “Virtual Access Point Settings” on page 47.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 59April 2015Section 4 - Managing the Access PointConguring a MAC Filter and Station List on the APThe MAC Authentication page allows you to control access to UAP based on MAC addresses. Based on how you set the lter, you can allow only client stations with a listed MAC address or deny access to the stations listed.When you enable MAC Authentication and specify a list of approved MAC addresses, only clients with a listed MAC address can access the network. If you specify MAC addresses to deny, all clients can access the network except for the clients on the deny list.To enable ltering by MAC address, click the MAC Authentication tab.Figure 28 - Congure MAC AuthenticationNote: Global MAC Authentication settings apply to all VAPs on all supported radios.The following table describes the elds and conguration options available on the MAC Authentication page.Field DescriptionFilter To set the MAC Address Filter, select one of the following options:•)  Allow only stations in the list. Any station that is not in the Stations List is denied access to the network through the AP.•)  Block all stations in list. Only the stations that appear in the list are denied access to the network through the AP. All other stations are permitted access.Note: The lter you select is applied to the clients in the station list, regardless of whether that station list is local or on the RADIUS server.Stations List This is the local list of clients that are either permitted or denied access to the network through the AP. To add a MAC Address to the local Stations List, enter its 48-bit MAC address into the lower text boxes, then click Add. To remove a MAC Address from the Stations List, select its 48-bit MAC address, then click Remove.The stations in the list will either be allowed or denied access based on how you set the lter in the previous eld.Note: If the MAC authentication type for the VAP is set to Local, the AP uses the Stations List to permit or deny the clients access to the network. If the MAC authentication type is set to RADIUS, the AP ignores the MAC addresses congured in this list and uses the list that is stored on the RADIUS server. The MAC authentication type is set on the VAP conguration page.Table 30 - MAC AuthenticationNote: After you congure local MAC Authentication settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Conguring MAC Authentication on the RADIUS Server
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 60April 2015Section 4 - Managing the Access PointIf you use RADIUS MAC authentication for MAC-based access control, you must congure a station list on the RADIUS server. The station list contains client MAC address entries, and the format for the list is described in the following table.RADIUS Server Attribute Description ValueUser-Name (1) MAC address of the client station. Valid Ethernet MAC Address.User-Password (2) A xed global password used to lookup a client MAC entry.NOPASSWORDTable 31 - RADIUS Server Attributes for MAC AuthenticationConguring Load BalancingYou can set network utilization thresholds on the UAP to maintain the speed and performance of the wireless network as clients associate and disassociate with the AP. The load balancing settings apply to all supported radios. To congure load balancing and set limits and behavior to be triggered by a specied utilization rate of the access point, click the Load Balancing tab and update the elds shown in the following gure.Figure 29 - Modify Load Balancing SettingsField DescriptionLoad Balancing Enable or disable load balancing:To enable load balancing on this AP, click Enable.To disable load balancing on this AP, click Disable.Utilization for No New AssociationsProvide the percentage of network bandwidth utilization allowed on the radio before the AP stops accepting new client associations. The default is 0, which means that all new associations will be allowed regardless of the utilization rate.Table 32 - Load BalancingNote: After you congure the load balancing settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Managed Access Point OverviewThe UAP can operate in two modes: Standalone Mode or Managed Mode. In Standalone Mode, the UAP acts as an individual AP in the network, and you manage it by using the Administrator Web User Interface (UI), CLI, or SNMP. In Managed Mode, the UAP is part of the D-Link Unied Wired and Wireless System, and you manage it by using the D-Link Unied Wireless Switch. If an AP is in Managed Mode, the Administrator Web UI, Telnet, SSH, and SNMP services are disabled.On the UAP, you can congure the IP addresses of up to four D-Link Unied Wireless Switches that can manage it. In order to manage the AP, the switch and AP must discover each other. There are multiple ways for a switch to discover an AP. Adding the IP address of the switch to the AP while it is in Standalone Mode is one way to enable switch-to-AP discovery.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 61April 2015Section 4 - Managing the Access PointTransitioning Between ModesEvery 30 seconds, the D-Link Unied Wireless Switch sends a keepalive message to all of the access points it manages. Each AP checks for the keepalive messages on the SSL TCP connection. As long as the AP maintains communication with the switch through the keepalive messages, it remains in Managed Mode.If the AP does not receive a message within 45 seconds of the last keepalive message, the AP assumes the switch has failed and terminates its TCP connection to the switch, and the AP enters Standalone Mode.Once the AP transitions to Standalone Mode, it continues to forward trafc without any loss. The AP uses the conguration on the VAPs congured in VLAN Forwarding mode (the standard, non-tunneled mode).While the AP is in Standalone Mode, you can manage it by using the Web interface or the CLI (through Telnet or SSH).For any clients that are connected to the AP through tunneled VAPs, the AP sends disassociate messages and disables the tunneled VAPs.As long as the Managed AP Administrative Mode is set to Enabled, the AP starts discovery procedures. If the AP establishes a connection with a wireless switch, which may or may not be the same switch it was connected to before, the switch sends the AP its conguration and the AP sends the wireless switch information about all currently associated clients.After the conguration from the switch is applied, the AP radio(s) restart. Client trafc is briey interrupted until the radio(s) are up and the clients are re-associated.Conguring Managed Access Point SettingsTo add the IP address of a D-Link Unied Wireless Switch to the AP, click the Managed Access Point tab under the Manage heading and update the elds shown in the table below.Figure 30 - Congure Managed AP Wireless Switch ParametersField DescriptionManaged AP Administrative ModeClick Enabled to allow the AP and switch to discover each other. If the AP successfully authenticates itself with a wireless switch, you will not be able to access the Administrator UI. Click Disabled to prevent the AP from contacting wireless switches.Switch IP Address (1-4)Enter the IP address of up to four wireless switches that can manage the AP. You can enter the IP address in dotted format or as an DNS name.You can view a list of wireless switches on your network that were congured by using a DHCP server.The AP attempts to contact Switch IP Address 1 rst.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 62April 2015Section 4 - Managing the Access PointField DescriptionBase IP Port The starting IP port number used by the wireless feature (in a range of 10 consecutive port numbers). Only the rst number in the range is congurable. The default value is 57775 (through 57784).Note: When the wireless Base IP Port number is changed on the switch, the wireless feature is automatically disabled and re-enabled. The new value is not sent as part of the global switch conguration in the cluster conguration distribution command; every switch in the cluster must be congured independently with the new Wireless IP port number.Note: When the wireless Base IP Port number is changed from its default value on the switch, it must also be changed on the Access Points.Pass Phrase Select the Edit option and enter a passphrase to allow the AP to authenticate itself with the wireless switch. The passphrase must be between 8 and 63 characters. To remove the password, select Edit, delete the existing password, and then click Apply.You must congure the same passphrase on the switch.WDS Managed ModeSpecify whether the AP will act as a Root AP or Satellite AP within the WDS group:•)  Root AP — Acts as a bridge or repeater on the wireless medium and communicates with the switch via the wired link.•)  Satellite AP — Communicates with the switch via a WDS link to the Root AP. This mode enables the Satellite AP to discover and establish WDS link with the Root AP.WDS Managed Ethernet PortSpecify whether the Ethernet port is to be enabled or disabled when the AP becomes part of a WDS group.WDS Group PasswordPassword for WPA2 Personal authentication used to establish the WDS links. Only the Satellite APs need this conguration. The Root APs get the password from the switch when they become managed.Table 33 - Managed Access PointNote: After you congure the settings on the Managed Access Point page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. If the UAP successfully authenticates with a D-Link Unied Wireless Switch, you will loose access to the AP through the Administrator UI.Conguring 802.1X AuthenticationOn networks that use IEEE 802.1X, port-based network access control, a supplicant (client) cannot gain access to the network until the 802.1X authenticator grants access. If your network uses 802.1X, you must congure 802.1X authentication information that the AP can supply to the authenticator.To congure the UAP 802.1X supplicant user name and password by using the Web interface, click the Authentication tab and congure the elds shown in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 63April 2015Section 4 - Managing the Access PointFigure 31 - Modify 802.1X Supplicant Authentication SettingsField Description802.1X Supplicant Click Enabled to enable the Administrative status of the 802.1X Supplicant.Click Disabled to disable the Administrative status of the 802.1X Supplicant.EAP Method Select one of the following EAP methods to use for communication between the AP and the authenticator:•)  MD5•)  PEAP•)  TLSUsername Enter the user name for the AP to use when responding to requests from an 802.1X authenticator. The user name can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #.Password Enter the password for the AP to use when responding to requests from an 802.1X authenticator. The password can be 1 to 64 characters in length. ASCII printable characters are allowed, which includes upper and lower case letters, numbers, and special symbols such as @ and #.Certicate File StatusIndicates whether a certicate le is present and when that certicate expires.Certicate File UploadUpload a certicate le to the AP by using HTTP or TFTP:•)  HTTP — Browse to the location where the certicate le is stored and click Upload. •)  TFTP — Specify the IP address of the TFTP server where the certicate le is located and provide the le name, including the le path, then click Upload.Table 34 - IEEE 802.1X Supplicant AuthenticationNote: After you congure the settings on the Authentication page, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.Creating a Management Access Control List (ACL)You can create an access control list (ACL) that lists up to ve IPv4 hosts and ve IPv6 hosts that are authorized to access the AP management interface. If this feature is disabled, anyone can access the management interface from any network client by supplying the correct AP username and password.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 64April 2015Section 4 - Managing the Access PointTo create an access list, click the Management ACL tab.Figure 32 - Congure Management Access Control ParametersField DescriptionManagement ACL ModeEnable or disable the management ACL feature. At least one IPv4 address should be congured before enabling Management ACL Mode. If enabled, only the IP addresses you specify will have Web, Telnet, SSH, and SNMP access to the management interface.IP Address (1–5) Enter up to ve IPv4 addresses that are allowed management access to the AP. Use dotted-decimal format (for example, 192.168.10.10).IPv6 Address (1–5) Enter up to ve IPv6 addresses that are allowed management access to the AP. Use the standard IPv6 address format (for example 2001:0db8:1234::abcd).Table 35 - Management ACLNote: After you congure the settings, click Apply to apply the changes and to save the settings.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 65April 2015Section 5 - Conguring Access Point ServicesSection 5 - Conguring Access Point ServicesThis section describes how to congure services on the UAP and contains the following subsections:•) “Web Server Settings” on page 65•) “Conguring SNMP on the Access Point” on page 66•) “Setting the SSH Status” on page 68•) “Setting the Telnet Status” on page 69•) “Conguring Quality of Service” on page 69•) “Conguring Email Alert” on page 72•) “Enabling the Time Settings (NTP)” on page 73Web Server SettingsThe AP can be managed through HTTP or secure HTTP (HTTPS) sessions. By default both HTTP and HTTPS access are enabled. Either access type can be disabled separately.To congure Web server settings, click Web Server tab.Figure 33 - Congure Web Server SettingsField DescriptionHTTPS Server StatusEnable or disable access through a Secure HTTP Server (HTTPS).HTTP Server Status Enable or disable access through HTTP. This setting is independent of the HTTPS server status setting.HTTP Port Specify the port number for HTTP trafc (default is 80).Maximum Sessions When a user logs on to the AP web interface, a session is created. This session is maintained until the user logs off or the session inactivity timer expires.Enter the number web sessions, including both HTTP and HTTPs, that can exist at the same time. The range is 1–10 sessions. If the maximum number of sessions is reached, the next user who attempts to log on to the AP web interface receives an error message about the session limit.Session Timeout Enter the maximum amount of time, in minutes, an inactive user remains logged on to the AP web interface. When the congured timeout is reached, the user is automatically logged off the AP. The range is 1–1440 minutes (1440 minutes = 1 day).
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 66April 2015Section 5 - Conguring Access Point ServicesField DescriptionGenerate HTTP SSL CerticateSelect this option to generate a new SSL certicate for the secure Web server. This should be done once the access point has an IP address to ensure that the common name for the certicate matches the IP address of the UAP. Generating a new SSL certicate will restart the secure Web server. The secure connection will not work until the new certicate is accepted on the browser. Click the Update button to generate the new SSL certicate.HTTP SSL Certicate File StatusIndicates whether a certicate le is present and species its expiration date and issuer common name.To Get the Current HTTP SSL CerticateSave a copy of the current HTTP SSL certicate on a local system or TFTP server. •)  HTTP — Click Download and specify where to store the backup copy of the certicate le.•)  TFTP — Provide a le name for the certicate le, including the le path, specify the IP address of the TFTP server where the certicate le copy is to be stored, and then click Download.To upload a HTTP SSL Certicate from a PC or a TFTP ServerUpload a certicate le to the AP by using HTTP or TFTP:•)  HTTP — Browse to the location where the certicate le is stored and click Upload. •)  TFTP — Specify the IP address of the TFTP server where the certicate le is located and provide the le name, including the le path, then click Upload.Table 36 - Web Server SettingsNote: Click Apply to apply the changes and to save the settings. If you disable the protocol you are currently using to access the AP management interface, the current connection will end and you will not be able to access the AP by using that protocol until it is enabled.Conguring SNMP on the Access PointSimple Network Management Protocol (SNMP) denes a standard for recording, storing, and sharing information about network devices. SNMP facilitates network management, troubleshooting, and maintenance. The AP supports SNMP versions 1, 2, and 3. Unless specically noted, all conguration parameters on this page apply to SNMPv1 and SNMPv2c only.Key components of any SNMP-managed network are managed devices, SNMP agents, and a management system. The agents store data about their devices in Management Information Bases (MIBs) and return this data to the SNMP manager when requested. Managed devices can be network nodes such as APs, routers, switches, bridges, hubs, servers, or printers.The UAP can function as an SNMP managed device for seamless integration into network management systems such as HP OpenView. From the SNMP page under the Services heading, you can start or stop control of SNMP agents, congure community passwords, access MIBs, and congure SNMP Trap destinations. From the pages under the SNMPv3 heading, you can manage SNMPv3 users and their security levels and dene access control to the SNMP MIBs. For information about how to congure SNMPv3 views, groups, users, and targets, see “Section 6 - Conguring SNMPv3” on page 75. To congure SNMP, click the SNMP tab under the Services heading and update the elds described in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 67April 2015Section 5 - Conguring Access Point ServicesFigure 34 - SNMP CongurationField DescriptionSNMP Enabled/DisabledYou can specify the SNMP administrative mode on your network. By default SNMP is enabled. To enable SNMP, click Enabled. To disable SNMP, click Disabled. After changing the mode, you must click Apply to save your conguration changes.Note: If SNMP is disabled, all remaining elds on the SNMP page are disabled. This is a global SNMP parameter which applies to SNMPv1, SNMPv2c, and SNMPv3.Read-only community name (for permitted SNMP get operations)Enter a read-only community name. The valid range is 1-256 characters.The community name, as dened in SNMPv2c, acts as a simple authentication mechanism to restrict the machines on the network that can request data to the SNMP agent. The name functions as a password, and the request is assumed to be authentic if the sender knows the password.The community name can be in any alphanumeric format.Port number the SNMP agent will listen toBy default an SNMP agent only listens to requests from port 161. However, you can congure this so the agent listens to requests on another port.Enter the port number on which you want the SNMP agents to listen to requests. The valid range is 1-65535.Note: This is a global SNMP parameter that applies to SNMPv1, SNMPv2c, and SNMPv3.Allow SNMP set requestsYou can choose whether or not to allow SNMP set requests on the AP. Enabling SNMP set requests means that machines on the network can execute conguration changes via the SNMP agent on the AP to the D-Link System MIB. To enable SNMP set requests, click Enabled. To disable SNMP set requests, click Disabled.Read-write community name (for permitted SNMP set operations)If you have enabled SNMP set requests you can set a read-write community name. The valid range is 1-256 characters.Setting a community name is similar to setting a password. Only requests from the machines that identify themselves with this community name will be accepted.The community name can be in any alphanumeric format.Restrict the source of SNMP requests to only the designated hosts or subnetsYou can restrict the source of permitted SNMP requests.To restrict the source of permitted SNMP requests, click Enabled.To permit any source submitting an SNMP request, click Disabled.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 68April 2015Section 5 - Conguring Access Point ServicesField DescriptionHostname, address or subnet of Network Management SystemSpecify the IPv4 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices. The valid range is 1-256 characters.As with community names, this provides a level of security on SNMP settings. The SNMP agent will only accept requests from the hostname or subnet specied here.To specify a subnet, enter one or more subnetwork address ranges in the form address/mask_length where address is an IP address and mask_length is the number of mask bits. Both formats address/mask and address/mask_length are supported. Individual hosts can be provided for this, i.e. IP Address or Hostname. For example, if you enter a range of 192.168.1.0/24 this species a subnetwork with address 192.168.1.0 and a subnet mask of 255.255.255.0. The address range is used to specify the subnet of the designated NMS. Only machines with IP addresses in this range are permitted to execute get and set requests on the managed device. Given the example above, the machines with addresses from 192.168.1.1 through 192.168.1.254 can execute SNMP commands on the device. (The address identied by sufx .0 in a subnetwork range is always reserved for the subnet address, and the address identied by .255 in the range is always reserved for the broadcast address). As another example, if you enter a range of 10.10.1.128/25 machines with IP addresses from 10.10.1.129 through 10.10.1.254 can execute SNMP requests on managed devices. In this example, 10.10.1.128 is the network address and 10.10.1.255 is the broadcast address. 126 addresses would be designated.IPv6 Hostname or IPv6 subnet of Network Management SystemSpecify the IPv6 DNS hostname or subnet of the machines that can execute get and set requests to the managed devices.Community name for trapsEnter the global community string associated with SNMP traps. The valid range is 1-256 characters.Traps sent from the device will provide this string as a community name.The community name can be in any alphanumeric format. Special characters are not permitted.Hostname or IP addressEnter the DNS hostname of the computer to which you want to send SNMP traps. The valid range is 1-256 characters.An example of a DNS hostname is: snmptraps.foo.com. Since SNMP traps are sent randomly from the SNMP agent, it makes sense to specify where exactly the traps should be sent. You can add up to a maximum of three DNS hostnames. Ensure you select the Enabled check box beside the appropriate hostname.Table 37 - SNMP SettingsNote: After you congure the SNMP settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.Setting the SSH StatusSecure Shell (SSH) is a program that provides access to the DWL-x600AP CLI from a remote host. SSH is more secure than Telnet for remote access because it provides strong authentication and secure communications over insecure channels. From the SSH page, you can enable or disable SSH access to the system. Figure 35 - Set SSH Status
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 69April 2015Section 5 - Conguring Access Point ServicesField DescriptionSSH Status Choose to either enable or disable SSH access to the AP CLI:•)  To permit remote access to the AP by using SSH, click Enabled.•)  To prevent remote access to the AP by using SSH, click Disabled.Table 38 - SSH SettingsSetting the Telnet StatusTelnet is a program that provides access to the DWL-x600AP CLI from a remote host. From the Telnet page, you can enable or disable Telnet access to the system. Figure 36 - Set Telnet StatusField DescriptionTelnet Status Choose to either enable or disable Telnet access to the AP CLI:•)  To permit remote access to the AP by using Telnet, click Enabled.•)  To prevent remote access to the AP by using Telnet, click Disabled.Table 39 - Telnet SettingsConguring Quality of ServiceQuality of Service (QoS) provides you with the ability to specify parameters on multiple queues for increased throughput and better performance of differentiated wireless trafc like Voice-over-IP (VoIP), other types of audio, video, and streaming media, as well as traditional IP data over the UAP.Conguring QoS on the UAP consists of setting parameters on existing queues for different types of wireless trafc, and effectively specifying minimum and maximum wait times (through Contention Windows) for transmission. The settings described here apply to data transmission behavior on the AP only, not to that of the client stations.AP Enhanced Distributed Channel Access (EDCA) Parameters affect trafc owing from the AP to the client station.Station Enhanced Distributed Channel Access (EDCA) Parameters affect trafc owing from the client station to the A P.The default values for the AP and station EDCA parameters are those suggested by the Wi-Fi Alliance in the WMM specication. In normal use these values should not need to be changed. Changing these values will affect the QoS provided.Note: On the DWL-6600AP and DWL-8600AP, the QoS settings apply to both radios, but the trafc for each radio is queued independently. To set up queues for QoS, click the QoS tab under the Services heading and congure settings as described in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 70April 2015Section 5 - Conguring Access Point ServicesFigure 37 - Modify QoS Queue ParametersField DescriptionEDCA Template Possible options are: Default, Optimized for Voice, and Custom.AP EDCA ParametersQueue Queues are dened for different types of data transmitted from AP-to-station:•)  Data 0 (Voice) — High priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.•)  Data 1(Video) — High priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.•)  Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue.•)  Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example).AIFS (Inter-Frame Space)The Arbitration Inter-Frame Spacing (AIFS) species a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255.cwMin (Minimum Contention Window)This parameter is input to the algorithm that determines the initial random back off wait time (window) for retry of a transmission. The value specied for Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time is determined.The rst random number generated will be a number between 0 and the number specied here.If the rst random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number dened in the Maximum Contention Window.Valid values for cwMin are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMin must be lower than the value for cwMax.cwMax (Maximum Contention Window)The value specied for the Maximum Contention Window is the upper limit (in milliseconds) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached.Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached.Valid values for cwMax are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. The value for cwMax must be higher than the value for cwMin.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 71April 2015Section 5 - Conguring Access Point ServicesField DescriptionMax. Burst Length The Max. Burst Length is an AP EDCA parameter and only applies to trafc owing from the AP to the client station.This value species (in milliseconds) the maximum burst length allowed for packet bursts on the wireless network. A packet burst is a collection of multiple frames transmitted without header information. The decreased overhead results in higher throughput and better performance.Valid values for maximum burst length are 0.0 through 999.Wi-Fi Multimedia (WMM) SettingsWi-Fi MultiMedia (WMM)Wi-Fi MultiMedia (WMM) is enabled by default. With WMM enabled, QoS prioritization and coordination of wireless medium access is on. With WMM enabled, QoS settings on the UAP control downstream trafc owing from the AP to client station (AP EDCA parameters) and the upstream trafc owing from the station to the AP (station EDCA parameters).Disabling WMM deactivates QoS control of station EDCA parameters on upstream trafc owing from the station to the AP.With WMM disabled, you can still set some parameters on the downstream trafc owing from the AP to the client station (AP EDCA parameters).To disable WMM extensions, click Disabled.To enable WMM extensions, click Enabled.Station EDCA ParametersQueue Queues are dened for different types of data transmitted from station-to-AP:•)  Data 0 (Voice) — Highest priority queue, minimum delay. Time-sensitive data such as VoIP and streaming media are automatically sent to this queue.•)  Data 1(Video) — Highest priority queue, minimum delay. Time-sensitive video data is automatically sent to this queue.•)  Data 2 (Best Effort) — Medium priority queue, medium throughput and delay. Most traditional IP data is sent to this queue.•)  Data 3 (Background) — Lowest priority queue, high throughput. Bulk data that requires maximum throughput and is not time-sensitive is sent to this queue (FTP data, for example).AIFS (Inter-Frame Space)The Arbitration Inter-Frame Spacing (AIFS) species a wait time for data frames. The wait time is measured in slots. Valid values for AIFS are 1 through 255.cwMin (Minimum Contention Window)This parameter is used by the algorithm that determines the initial random back off wait time (window) for retry of a data transmission during a period of contention for Unied Access Point resources. The value specied here in the Minimum Contention Window is the upper limit (in milliseconds) of a range from which the initial random back off wait time will be determined. The rst random number generated will be a number between 0 and the number specied here. If the rst random back off wait time expires before the data frame is sent, a retry counter is incremented and the random back off value (window) is doubled. Doubling will continue until the size of the random back off value reaches the number dened in the Maximum Contention Window.cwMax (Maximum Contention Window)The value specied here in the Maximum Contention Window is the upper limit (in milliseconds) for the doubling of the random back off value. This doubling continues until either the data frame is sent or the Maximum Contention Window size is reached.Once the Maximum Contention Window size is reached, retries will continue until a maximum number of retries allowed is reached.TXOP Limit The TXOP Limit is a station EDCA parameter and only applies to trafc owing from the client station to the AP. The Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when a WME client station has the right to initiate transmissions onto the wireless medium (WM) towards the Unied Access Point. The TXOP Limit maximum value is 65535.Other QoS SettingsNo AcknowledgementSelect On to specify that the AP should not acknowledge frames with QosNoAck as the service class value.APSD Select On to enable Automatic Power Save Delivery (APSD), which is a power management method. APSD is recommended if VoIP phones access the network through the AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 72April 2015Section 5 - Conguring Access Point ServicesNote: After you congure the QoS settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low. Table 40 - QoS SettingsConguring Email AlertThe Email Alert feature allows the AP to automatically send email messages when an event at or above the congured severity level occurs. Use the Email Alert Conguration page to congure mail server settings, to set the severity level that triggers alerts, and to add up to three email addresses where urgent and non-urgent email alerts are sent.Note: Email alert is operationally disabled when the AP transitions to managed mode.Figure 38 - Email Alerts CongurationField DescriptionEmail Alert Global CongurationAdmin Mode Globally enable or disable the Email Alert feature on the AP. By default, email alerts are disabled.From Address Specify the email address that appears in the From eld of alert messages sent from the AP, for example dlinkAP23@foo.com. The address can be a maximum of 255 characters and can contain only printable characters. By default, no address is congured.Log Duration This duration, in minutes, determines how frequently the non-critical messages are sent to the SMTP Server. The range is 30-1440 minutes. The default is 30 minutes.Urgent Message SeverityCongures the severity level for log messages that are considered to be urgent. Messages in this category are sent immediately. The security level you select and all higher levels are urgent:•)  Emergency indicates system is unusable. It is the highest level of severity.•)  Alert indicates action must be taken immediately.•)  Critical indicates critical conditions.•)  Error indicates error conditions.•)  Warning indicates warning conditions.•)  Notice indicates normal but signicant conditions.•)  Info indicates informational messages.•)  Debug indicates debug-level messages.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 73April 2015Section 5 - Conguring Access Point ServicesField DescriptionNon Urgent Severity Congures the severity level for log messages that are considered to be non-urgent. Messages in this category are collected and sent in a digest form at the time interval specied by the Log Duration eld. The security level you select and all levels up to, but not including the lowest Urgent level are considered non-urgent. Messages below the security level you specify are not sent via email. See the Urgent Message eld description for information about the security levels.Email Alert Mail Server CongurationMail Server Address Specify the IP address or hostname of the SMTP server on the network.Mail Server Security Specify whether to use SMTP over SSL (TLSv1) or no security (Open) for authentication with the mail server. The default is Open.Mail Server Port Congures the TCP port number for SMTP. The range is a valid port number from 0 to 65535. The default is 25, which is the standard port for SMTP.Username Specify the username to use when authentication with the mail server is required. The username is a 64-byte character string with all printable characters. The default is admin.Password Specify the password associated with the username congured in the previous eld.Email Alert Message CongurationTo Address 1 Congure the rst email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.To Address 2 Optionally, congure the second email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.To Address 3 Optionally, congure the third email address to which alert messages are sent. The address must be a valid email address. By default, no address is congured.Email Subject Specify the text to be displayed in the subject of the email alert message. The subject can contain up to 255 alphanumeric characters. The default is Log message from AP.Table 41 - Email Alert CongurationNote: After you congure the Email Alert settings, click Apply to apply the changes and to save the settings. To validate the congured email server credentials, click Test Mail. You can send a test email once the email server details are congured.The following text shows an example of an email alert sent from the AP to the network administrator:From: AP-192.168.2.10@mailserver.com Sent: Wednesday, July 08, 2011 11:16 AMTo: administrator@mailserver.comSubject: log message from APTIME              Priority   Process Id            MessageJul 8 03:48:25    info       login[1457]           root login on ‘ttyp0’Jul 8 03:48:26    info       mini_http-ssl[1175]   Max concurrent connections of 20 reachedEnabling the Time Settings (NTP)Use the Time Settings page to specify the Network Time Protocol (NTP) server to use to provide time and date information to the AP or to congure the time and date information manually.NTP is an Internet standard protocol that synchronizes computer clock times on your network. NTP servers transmit Coordinated Universal Time (UTC, also known as Greenwich Mean Time) to their client systems. NTP sends periodic time requests to servers, using the returned time stamp to adjust its clock. The timestamp is used to indicate the date and time of each event in log messages.See http://www.ntp.org for more information about NTP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 74April 2015Section 5 - Conguring Access Point ServicesTo set the system time either manually or by specifying the address of the NTP server for the AP to use, click the Services > Time Settings (NTP) tab and update the elds as described in the table below.Figure 39 - Time Settings (NTP)Field DescriptionSet System Time NTP provides a way for the AP to obtain and maintain its time from a server on the network. Using an NTP server gives your AP the ability to provide the correct time of day in log messages and session information. Choose to use a network time protocol (NTP) server to determine the system time, or set the system time manually:•)  To permit the AP to poll an NTP server, click Using Network Time Protocol (NTP).•)  To prevent the AP from polling an NTP server, click Manually.NTP Server (Use NTP)If NTP is enabled, specify the NTP server to use.You can specify the NTP server by hostname or IP address, although using the IP address is not recommended as these can change more readily.If you specify a hostname, note the following requirements:•)  The length must be between 1 – 63 characters.•)  Upper and lower case characters, numbers, and hyphens are accepted. •)  The rst character must be a letter (a–z or A–Z), and the last character cannot be a hyphen.System Date (Manual conguration)Specify the current month, day, and year.System Time (Manual conguration)Specify the current time in hours and minutes. The system uses a 24-hour clock, so 6:00 PM is congured as 18:00.Time Zone Select your local time zone from the menu. The default is USA (Pacic).Adjust Time for Daylight SavingsSelect to have the system adjust the reported time for Daylight Savings Time (DST). When this eld is selected, elds to congure Daylight Savings Time settings appear.DST Start (24 HR) Congure the date and time to begin Daylight Savings Time for the System Time.DST End (24 HR) Congure the date and time to end Daylight Savings Time for the System Time.DST Offset (minutes)Select the number of minutes to offset DST. The default is 60 minutes.Table 42 - NTP SettingsNote: After you congure the Time settings, you must click Apply to apply the changes and to save the settings. Changing some settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change AP settings when WLAN trafc is low.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 75April 2015Section 6 - Conguring SNMPv3Section 6 - Conguring SNMPv3This section describes how to congure the SNMPv3 settings on the UAP and contains the following subsections:•) “Conguring SNMPv3 Views” on page 75•) “Conguring SNMPv3 Groups” on page 76•) “Conguring SNMPv3 Users” on page 77•) “Conguring SNMPv3 Targets” on page 78Conguring SNMPv3 ViewsA MIB view is a combination of a set of view subtrees or a family of view subtrees where each view subtree is a subtree within the managed object naming tree. You can create MIB views to control the OID range that SNMPv3 users can access.A MIB view called “all” is created by default in the system. This view contains all management objects supported by the system.Note: If you create an excluded view subtree, create a corresponding included entry with the same view name to allow subtrees outside of the excluded subtree to be included. For example, to create a view that excludes the subtree 1.3.6.1.4, create an excluded entry with the OID 1.3.6.1.4. Then, create an included entry with OID .1 with the same view name. Figure 40 - SNMPv3 Views CongurationThe following table describes the elds you can congure on the SNMPv3 Views page.Field DescriptionView Name Enter a name to identify the MIB view. View names can contain up to 32 alphanumeric characters.Type Species whether to include or exclude the view subtree or family of subtrees from the MIB view.OID Enter an OID string for the subtree to include or exclude from the view. For example, the system subtree is specied by the OID string .1.3.6.1.2.1.1.Mask The OID mask is 47 characters in length. The format of the OID mask is xx.xx.xx (.)... or xx:xx:xx.... (:) and is 16 octets in length. Each octet is 2 hexadecimal characters separated by either . (period) or : (colon). Only hex characters are accepted in this eld. For example, OID mask FA.80 is 11111010.10000000.A family mask is used to dene a family of view subtrees. The family mask indicates which sub-identiers of the associated family OID string are signicant to the family’s denition. A family of view subtrees allows control access to one row in a table, in a more efcient manner.SNMPv3 Views This eld shows the MIB views on the UAP. To remove a view, select it and click Remove.Table 43 - SNMPv3 Views
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 76April 2015Section 6 - Conguring SNMPv3Note: After you congure the SNMPv3 Views settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 GroupsSNMPv3 groups allow you to combine users into groups of different authorization and access privileges.By default, the UAP has two groups:•)  RO — A read-only group using authentication and data encryption. Users in this group use an MD5 key/password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be dened. By default, users of this group will have read only access to the default all MIB view, which can be modied by the user. •)  RW — A read/write group using authentication and data encryption. Users in this group use an MD5 key/password for authentication and a DES key/password for encryption. Both the MD5 and DES key/passwords must be dened. By default, users of this group will have read and write access to the default all MIB view, which can be modied by the user.RW and RO groups are dened by default.Note: The UAP supports maximum of eight groups.To dene additional groups, navigate to the SNMPv3 Groups page and congure the settings that the table below describes.Figure 41 - SNMPv3 Groups CongurationField DescriptionName Specify a name to use to identify the group. The default group names are RW and RO. Group names can contain up to 32 alphanumeric characters.Security Level Select one of the following security levels for the group:•)  noAuthentication-noPrivacy — No authentication and no data encryption (no security).•)  Authentication-noPrivacy — Authentication, but no data encryption. With this security level, users send SNMP messages that use an MD5 key/password for authentication, but not a DES key/password for encryption.•)  Authentication-Privacy — Authentication and data encryption. With this security level, users send an MD5 key/password for authentication and a DES key/password for encryption. For groups that require authentication, encryption, or both, you must dene the MD5 and DES key/passwords on the SNMPv3 Users page.Write Views Select the write access to management objects (MIBs) for the group:•)  write-all — The group can create, alter, and delete MIBs.•)  write-none — The group is not allowed to create, alter, or delete MIBS.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 77April 2015Section 6 - Conguring SNMPv3Field DescriptionRead Views Select the read access to management objects (MIBs) for the group:•)  view-all — The group is allowed to view and read all MIBs.•)  view-none — The group cannot view or read MIBs.SNMPv3 Groups This eld shows the default groups and the groups that you have dened on the AP. To remove a group, select the group and click Remove.Table 44 - SNMPv3 GroupsNote: After you congure the SNMPv3 Groups settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 UsersFrom the SNMPv3 Users page, you can dene multiple users, associate the desired security level to each user, and congure security keys.For authentication, only MD5 type is supported, and for encryption only DES type is supported. There are no default SNMPv3 users on the UAP.Figure 42 - SNMPv3 User CongurationThe following table describes the elds to congure SNMPv3 users.Field DescriptionName Enter the user name to identify the SNMPv3 user. User names can contain up to 32 alphanumeric characters.Group Map the user to a group. The default groups are RWAuth, RWPriv, and RO. You can dene additional groups on the SNMPv3 Groups page.Authentication Type Select the type of authentication to use on SNMP requests from the user:•)  MD5 — Require MD5 authentication on SNMPv3 requests from the user.•)  None — SNMPv3 requests from this user require no authentication.Authentication Key If you specify MD5 as the authentication type, enter a password to enable the SNMP agent to authenticate requests sent by the user.The passphrase must be between 8 and 32 characters in length.Encryption Type Select the type of privacy to use on SNMP requests from the user:•)  DES — Use DES encryption on SNMPv3 requests from the user.•)  None — SNMPv3 requests from this user require no privacy.Encryption Key If you specify DES as the privacy type, enter a key to use to encrypt the SNMP requests.The passphrase must be between 8 and 32 characters in length.SNMPv3 Users This eld shows the users that you have dened on the AP. To remove a user, select the user and click Remove.Table 45 - SNMPv3 Users
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 78April 2015Section 6 - Conguring SNMPv3Note: After you congure the SNMPv3 Users settings, you must click Apply to apply the changes and to save the settings.Conguring SNMPv3 TargetsSNMPv3 Targets send “inform” messages to the SNMP manager. Each target is identied by a target name and associated with target IP address, UDP port, and SNMP user name.Figure 43 - SNMPv3 Targets CongurationField DescriptionIPv4/IPv6 Address Enter the IP address of the remote SNMP manager to receive the target.Port Enter the UDP port to use for sending SNMP targets.Users Select the name of the SNMP user to associate with the target. To congure SNMP users, see “Conguring SNMPv3 Users” on page 77.SNMPv3 Targets This eld shows the SNMPv3 Targets on the UAP. To remove a target, select it and click Remove.Table 46 - SNMPv3 TargetsNote: After you congure the SNMPv3 Target settings, you must click Apply to apply the changes and to save the settings.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 79April 2015Section 7 - Maintaining the Access PointSection 7 - Maintaining the Access PointThis section describes how to maintain the UAP.From the UAP Administrator UI, you can perform the following maintenance tasks:•) “Saving the Current Conguration to a Backup File” on page 79•) “Restoring the Conguration from a Previously Saved File” on page 80•) “Rebooting the Access Point” on page 81•) “Performing AP Maintenance” on page 81•) “Resetting the Factory Default Conguration” on page 81•) “Upgrading the Firmware” on page 81•) “Packet Capture Conguration and Settings” on page 83Saving the Current Conguration to a Backup FileThe AP conguration le is in XML format and contains all of the information about the AP settings. You can download the conguration le to a management station to manually edit the content or to save as a back-up copy. You can use HTTP or TFTP to transfer les to and from the UAP. After you download a conguration le to the management station, you can manually edit the le, which is in XML format. Then, you can upload the edited conguration le to apply those conguration settings to the AP.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using TFTP:1.)  Select TFTP for Download Method.Figure 44 - Manage this Access Point’s Conguration - Save (TFTP)2.)  Enter a name (1 to 63 characters) for the backup le in the Conguration File eld, including the .xml le name extension and the path to the directory where you want to save the le.3.)  Enter the Server IP address of the TFTP server.4.)  Click Download to save a copy of the le to the TFTP server.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using HTTP:1.)  Select HTTP for Download Method.Figure 45 - Manage this Access Point’s Conguration - Save (HTTP)2.)  Click the Download button.A dialog box displays verifying the download.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 80April 2015Section 7 - Maintaining the Access PointFigure 46 - Conrmation Prompt3.)  To proceed with the download, select OK.A dialog box opens allowing you to view or save the le.4.)  Select the Save File option and select OK.5.)  Use the le browser to navigate to the directory where you want to save the le, and click OK to save the le.You can keep the default le name (cong.xml) or rename the backup le, but be sure to save the le with an .xml extension.Restoring the Conguration from a Previously Saved FileYou can use HTTP or TFTP to transfer les to and from the UAP. After you download a conguration le to the management station, you can manually edit the le, which is in XML format. Then, you can upload the edited conguration le to apply those conguration settings to the AP.Use the following procedures to restore the conguration on an AP to previously saved settings by using TFTP:1.)  Select TFTP for Upload Method.Figure 47 - Manage this Access Point’s Conguration - Restore (TFTP)2.)  Enter a name (1 to 63 characters) for the backup le in the Filename eld, including the .xml le name extension and the path to the directory that contains the conguration le to upload.3.)  Enter the IP address of the TFTP server in the Server IP eld.4.)  Click the Restore button.The AP reboots. A reboot conrmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted.Use the following steps to save a copy of the current settings on an AP to a backup conguration le by using HTTP:1.)  Select HTTP for Upload Method.Figure 48 - Manage this Access Point’s Conguration - Restore (HTTP)
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 81April 2015Section 7 - Maintaining the Access Point2.)  Use the Browse button to select the le to restore.3.)  Click the Restore button.A File Upload or Choose File dialog box displays.4.)  Navigate to the directory that contains the le, then select the le to upload and click Open.(Only those les created with the Backup function and saved as .xml backup conguration les are valid to use with Restore; for example, ap_cong.xml.)5.)  Click the Restore button.A dialog box opens verifying the restore.6.)  Click OK to proceed.The AP reboots. A reboot conrmation dialog and follow-on rebooting status message displays. Please wait for the reboot process to complete, which might take several minutes. The Administration Web UI is not accessible until the AP has rebooted.Performing AP MaintenanceFrom the Maintenance page, you can reset the AP to its factory default settings or reboot the AP.Figure 49 - Performing AP MaintenanceResetting the Factory Default CongurationIf you are experiencing problems with the UAP and have tried all other troubleshooting measures, click Reset. This restores factory defaults and clears all settings, including settings such as a new password or wireless settings. You can also use the reset button on the back panel to reset the system to the default conguration.Rebooting the Access PointFor maintenance purposes or as a troubleshooting measure, you can reboot the UAP. To reboot the AP, click the Reboot button on the Conguration page.Upgrading the FirmwareAs new versions of the UAP rmware become available, you can upgrade the rmware on your devices to take advantage of new features and enhancements. The AP uses a TFTP client for rmware upgrades. You can also use HTTP to perform rmware upgrades.After you upload new rmware and the system reboots, the newly added rmware becomes the primary image. If the upgrade fails, the original rmware remains as the primary image. Note: When you upgrade the rmware, the access point retains the existing conguration information.Use the following steps to upgrade the rmware on an access point by using TFTP:1.)  Select TFTP for Upload Method.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 82April 2015Section 7 - Maintaining the Access PointFigure 50 - Manage Firmware (TFTP)2.)  Enter a name (1 to 63 characters) for the image le in the Image Filename eld, including the path to the directory that contains the image to upload.For example, to upload the ap_upgrade.tar image located in the /share/builds/ap directory, enter /share/builds/ap/ap_upgrade.tar in the Image Filename eld.The rmware upgrade le supplied must be a tar le. Do not attempt to use bin les or les of other formats for the upgrade; these types of les will not work.3.)  Enter the Server IP address of the TFTP server. 4.)  Click Upgrade.Upon clicking Upgrade for the rmware upgrade, a popup conrmation window is displayed that describes the upgrade process.5.)  Click OK to conrm the upgrade and start the process.Note: The rmware upgrade process begins once you click Upgrade and then OK in the pop-up conrmation window.The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same conguration settings it had before the upgrade.6.)  To verify that the rmware upgrade completed successfully, check the rmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated.Use the following steps to upgrade the rmware on an access point by using HTTP:1.)  Select HTTP for Upload Method.Figure 51 - Manage Firmware (HTTP)2.)  If you know the path to the new rmware image le, enter it in the Image Filename eld. Otherwise, click the Browse button and locate the rmware image le.The rmware upgrade le supplied must be a tar le. Do not attempt to use bin les or les of other formats for the upgrade; these types of les will not work.3.)  Click Upgrade to apply the new rmware image.Upon clicking Upgrade for the rmware upgrade, a popup conrmation window is displayed that describes the upgrade process.4.)  Click OK to conrm the upgrade and start the process.Note: The rmware upgrade process begins once you click Upgrade and then OK in the popup conrmation window.The upgrade process may take several minutes during which time the access point will be unavailable. Do not power down the access point while the upgrade is in process. When the upgrade is complete, the access point restarts. The AP resumes normal operation with the same conguration settings it had before the upgrade.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 83April 2015Section 7 - Maintaining the Access Point5.)  To verify that the rmware upgrade completed successfully, check the rmware version shown on the Upgrade page (or the Basic Settings page). If the upgrade was successful, the updated version name or number is indicated.Packet Capture Conguration and SettingsWireless packet capture operates in two modes:•)  Capture le mode.•)  Remote capture mode.For capture le mode, captured packets are stored in a le on the Access Point. The AP can transfer the le to a TFTP server. The le is formatted in pcap format and can be examined using tools such as Wireshark and OmniPeek.For remote capture mode, the captured packets are redirected in real time to an external PC running the Wireshark® tool.The AP can capture the following types of packets:•)  802.11 packets received and transmitted on radio interfaces. Packets captured on radio interfaces include the 802.11 header.•)  802.3 packets received and transmitted on the Ethernet interface.•)  802.3 packets received and transmitted on the internal logical interfaces such as VAPs and WDS interfaces.From the Packet Capture Conguration and Settings page, you can:•)  View the current packet capture status.•)  Congure packet capture parameters.•)  Congure packet le capture.•)  Congure a remote capture port.•)  Download a packet capture le.Figure 52 - Packet Capture Conguration & SettingsPacket Capture StatusPacket Capture Status allows you to view the status of packet capture on the AP.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 84April 2015Section 7 - Maintaining the Access PointFigure 53 - Packet Capture StatusThe following table describes information the packet capture status elds display.Field DescriptionCurrent Capture StatusShows whether packet capture is running or stopped.Packet Capture TimeShows elapsed capture time.Packet Capture File SizeShows the current capture le size.Table 47 - Packet Capture StatusPacket Capture Parameter CongurationPacket Capture Conguration allows you to congure parameters that affect how packet capture functions on the radio interfaces.Figure 54 - Packet Capture CongurationThe following table describes the elds to congure the packet capture.Field DescriptionCapture Beacons Enable to capture the 802.11 beacons detected or transmitted by the radio.Promiscuous CaptureEnable to place the radio in promiscuous mode when the capture is active. In promiscuous mode the radio receives all trafc on the channel, including trafc that is not destined to this AP. While the radio is operating in promiscuous mode, it continues serving associated clients. Packets not destined to the AP are not forwarded. As soon as the capture is completed, the radio reverts to non-promiscuous mode operation.Client Filter Enable Enable to use the WLAN client lter to capture only frames that are transmitted to, or received from a WLAN client with a specied MAC address.Client Filter MAC AddressSpecify a MAC address for WLAN client ltering.Note: The MAC lter is active only when capture is performed on an 802.11 interface.Table 48 - Packet Capture CongurationNote: Changes to packet capture conguration parameters take affect after packet capture is restarted. Modifying the parameters while the packet capture is running doesn’t affect the current packet capture session. In order to begin using new parameter values, an existing packet capture session must be stopped and re-started.Packet File CaptureIn Packet File Capture mode the AP stores captured packets in the RAM le system.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 85April 2015Section 7 - Maintaining the Access PointUpon activation, the packet capture proceeds until one of the following occurs:•)  The capture time reaches congured duration.•)  The capture le reaches its maximum size.•)  The administrator stops the capture.During the capture, you can monitor the capture status, elapsed capture time, and the current capture le size. This information can be updated, while the capture is in progress, by clicking Refresh.Figure 55 - Packet File CaptureThe following table describes the elds to congure the packet capture status.Field DescriptionCapture Interface Select an AP Capture Interface name from the drop-down menu. AP capture interface names are eligible for packet capture are:•)  brtrunk - Linux bridge interface in the AP•)  eth0 - 802.3 trafc on the Ethernet port.•)  wlan0 - VAP0 trafc on radio 1.•)  wlan1 - VAP0 trafc on radio 2.•)  radio1 - 802.11 trafc on radio 1.•)  radio2 - 802.11 trafc on radio 2.Capture Duration Specify the time duration in seconds for the capture (range 10 to 3600).Max Capture File SizeSpecify the maximum allowed size for the capture le in KB (range 64 to 4096).Table 49 - Packet File CaptureRemote Packet CaptureRemote Packet Capture allows you to specify a remote port as the destination for packet captures. This feature works in conjunction with the Wireshark network analyzer tool for Windows. A packet capture server runs on the AP and sends the captured packets via a TCP connection to the Wireshark tool.A Windows PC running the Wireshark tool allows you to display, log, and analyze captured trafc. When the remote capture mode is in use, the AP doesn’t store any captured data locally in its le system.Your can trace up to ve interfaces on the AP at the same time. However, you must start a separate Wireshark session for each interface. You can congure the IP port number used for connecting Wireshark to the AP. The default port number is 2002. The system uses 5 consecutive port numbers starting with the congured port for the packet capture sessions.If a rewall is installed between the Wireshark PC and the AP, these ports must be allowed to pass through the rewall. The rewall must also be congured to allow the Wireshark PC to initiate TCP connection to the AP. To congure Wireshark to use the AP as the source for captured packets, you must specify the remote interface in the “Capture Options” menu. For example to capture packets on an AP with IP address 192.168.1.10 on radio 1 using the default IP port, specify the following interface: rpcap://192.168.1.10/radio1
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 86April 2015Section 7 - Maintaining the Access PointTo capture packets on the Ethernet interface of the AP and VAP0 on radio 1 using IP port 58000, start two Wireshark sessions and specify the following interfaces:rpcap://192.168.1.10:58000/eth0rpcap://192.168.1.10:58000/wlan0When you are capturing trafc on the radio interface, you can disable beacon capture, but other 802.11 control frames are still sent to Wireshark. You can set up a display lter to show only:•)  Data frames in the trace.•)  Trafc on specic BSSIDs.•)  Trafc between two clients.Some examples of useful display lters are:•)  Exclude beacons and ACK/RTS/CTS frames:!(wlan.fc.type_subtype  ==  8 || wlan.fc.type == 1)•)  Data frames only: wlan.fc.type == 2•)  Trafc on a specic BSSID:wlan.bssid ==  00:02:bc:00:17:d0•)  All trafc to and from a specic client:wlan.addr == 00:00:e8:4e:5f:8eIn remote capture mode, trafc is sent to the PC running Wireshark via one of the network interfaces. Depending on where the Wireshark tool is located the trafc can be sent on an Ethernet interface or one of the radios. In order to avoid a trafc ood caused by tracing the trace packets, the AP automatically installs a capture lter to lter out all packets destined to the Wireshark application. For example if the Wireshark IP port is congured to be 58000 then the following capture lter is automatically installed on the AP: not portrange 58000-58004.Enabling the packet capture feature impacts performance of the AP and can create a security issue (unauthorized clients may be able to connect to the AP and trace user data). The AP performance is negatively impacted even if there is no active Wireshark session with the AP. The performance is negatively impacted to a greater extent when packet capture is in progress. Due to performance and security issues, the packet capture mode is not saved in NVRAM on the AP; if the AP resets, the capture mode is disabled and the you must re-enable it in order to resume capturing trafc. Packet capture parameters (other than mode) are saved in NVRAM.In order to minimize performance impact on the AP while trafc capture is in progress, you should install capture lters to limit which trafc is sent to the Wireshark tool. When capturing 802.11 trafc, large portion of the captured frames tend to be beacons (typically sent every 100ms by all Access Points). Although Wireshark supports a display lter for beacon frames, it does not support a capture lter to prevent the AP from forwarding captured beacon packets to the Wireshark tool. In order to reduce performance impact of capturing the 802.11 beacons, you can disable the capture beacons mode. The remote packet capture facility is a standard feature of the Wireshark tool for Windows. Note: Remote packet capture is not standard on the Linux version of Wireshark; the Linux version doesn’t work with the AP. Wireshark is an open source tool and is available for free; it can be downloaded from http://www.wireshark.org.Figure 56 - Remote Packet CaptureThe following table describes the elds to congure the packet capture status.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 87April 2015Section 7 - Maintaining the Access PointField DescriptionRemote Capture PortSpecify the remote port to use as the destination for packet captures. (range 1 to 65530).Table 50 - Remote Packet CapturePacket Capture File DownloadPacket Capture File Download allows you to download the capture le by TFTP to a congured TFTP server or by HTTP(S) to a PC. The captured packets are stored in le /tmp/apcapture.pcap on the AP. A capture is automatically stopped when the capture le download command is triggered.Because the capture le is located in the RAM le system, it disappears if the AP is reset. Figure 57 - Packet Capture File DownloadThe following table describes the elds to congure the packet capture status.Field DescriptionUse TFTP to download the capture leSelect or clear this option to determine whether to use TFTP or HTTP(S) to download the capture le:•)  To download the le by using TFTP, select this option and complete the additional elds.•)  To download the le by using HTTP or HTTPS, clear this option and click Download to browse to the location where the le is to be saved.TFTP Server FilenameWhen using TFTP to download the le, specify a name for the packet capture le, including the .pcap le name extension and the path to the directory where you want to save the le.Server IP When using TFTP to download the le, specify the IP address of the TFTP server.Table 51 - Packet Capture File Download
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 88April 2015Section 8 - Conguring Client Quality of Service (QoS)Section 8 - Conguring Client Quality of Service (QoS)This section describes how to congure QoS settings that affect trafc from the wireless clients to the AP. By using the UAP Client QoS features, you can limit bandwidth and apply ACLs and DiffServ policies to the wireless interface. If a VAP uses WPA Enterprise security to authenticate clients, you can congure the RADIUS server to provide per-client QoS information.This section describes the following features:•) “Conguring VAP QoS Parameters” on page 88•) “Managing Client QoS ACLs” on page 89•) “Creating a DiffServ Class Map” on page 95•) “Creating a DiffServ Policy Map” on page 100•) “Conguring RADIUS-Assigned Client QoS Parameters” on page 102Conguring VAP QoS ParametersThe client QoS features on the UAP provide additional control over certain QoS aspects of wireless clients that connect to the network, such as the amount of bandwidth an individual client is allowed to send and receive. To control general categories of trafc, such as HTTP trafc or trafc from a specic subnet, you can congure ACLs and assign them to one or more VAPs. In addition to controlling general trafc categories, Client QoS allows you to congure per-client conditioning of various micro-ows through Differentiated Services (DiffServ). DiffServ policies are a useful tool for establishing general micro-ow denition and treatment characteristics that can be applied to each wireless client, both inbound and outbound, when it is authenticated on the network. From the VAP QoS Parameters page, you can enable the Client QoS feature, specify client bandwidth limits, and select the ACLs and DiffServ policies to use as default values for clients associated with the VAP when the client does not have their own attributes dened by a RADIUS server.To congure the Client QoS administrative mode and to congure the QoS settings for a VAP, click the VAP QoS Parameters tab.Figure 58 - Congure Client QoS VAP SettingsField DescriptionClient QoS Global Admin ModeEnable or disable Client QoS operation on the AP. Changing this setting will not affect the WMM settings you congure on the QoS page.Radio For dual-radio APs, select Radio 1 or Radio 2 to specify which radio to congure.VAP Specify the VAP that will have the Client QoS settings that you congure. The QoS settings you congure for the selected VAP will not affect clients that access the network through other VAPs.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 89April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionClient QoS Mode Enable or disable QoS operation on the VAP selected in the VAP menu. QoS must be enabled globally (from the Client QoS Global Admin Mode eld) and on the VAP (QoS Mode eld) for the Client QoS settings to be applied to wireless clients.Bandwidth Limit DownEnter the maximum allowed transmission rate from the AP to the wireless client in bits per second. The valid range is 0 – 429496000 bits/sec.The value you enter must be a multiple of 8000 bits/sec, in other words, the value must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the conguration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction.Bandwidth Limit Up Enter the maximum allowed client transmission rate to the AP in bits per second. The valid range is 0 – 4294967295 bps.The value you enter must be n × 8000 bits/sec, where n = 0, 1, 2, 3... If you attempt to set the limit to a value that is not a multiple of 8000 bits/sec, the conguration will be rejected. A value of 0 means that the bandwidth maximum limit is not enforced in this direction.ACL Type Down Select the type of ACL to apply to trafc in the outbound (down) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules•)  MAC: The ACL examines layer 2 frames for matches to ACL rulesACL Name Down Select the name of the ACL applied to trafc in the outbound (down) direction. After switching the packet or frame to the outbound interface, the ACL’s rules are checked for a match. The packet or frame is transmitted if it is permitted, and discarded if it is denied.ACL Type Up Select the type of ACL to apply to trafc in the inbound (up) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules•)  MAC: The ACL examines layer 2 frames for matches to ACL rulesACL Name Up Select the name of the ACL applied to trafc entering the AP in the inbound (up) direction. When a packet or frame is received by the AP, the ACL’s rules are checked for a match. The packet or frame is processed if it is permitted, and discarded if it is denied.DiffServ Policy DownSelect the name of the DiffServ policy applied to trafc from the AP in the outbound (down) direction.DiffServ Policy Up Select the name of the DiffServ policy applied to trafc sent to the AP in the inbound (up) direction.Table 52 - VAP QoS ParametersManaging Client QoS ACLsACLs are a collection of permit and deny conditions, called rules, that provide security by blocking unauthorized users and allowing authorized users to access specic resources. ACLs can block any unwarranted attempts to reach network resources. The UAP supports up to 50 IPv4, IPv6, and MAC ACLs.IPv4 and IPv6 ACLsIP ACLs classify trafc for Layers 3 and 4.Each ACL is a set of up to 10 rules applied to trafc sent from a wireless client or to be received by a wireless client. Each rule species whether the contents of a given eld should be used to permit or deny access to the network. Rules can be based on various criteria and may apply to one ore more elds within a packet, such as the source or destination IP address, the source or destination L4 port, or the protocol carried in the packet.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 90April 2015Section 8 - Conguring Client Quality of Service (QoS)MAC ACLsMAC ACLs are Layer 2 ACLs. You can congure the rules to inspect elds of a frame such as the source or destination MAC address, the VLAN ID, or the Class of Service 802.1p priority. When a frame enters or exits the AP port (depending on whether the ACL is applied in the up or down direction), the AP inspects the frame and checks the ACL rules against the content of the frame. If any of the rules match the content, a permit or deny action is taken on the frame. ACL Conguration ProcessCongure ACLs and rules on the Client QoS ACL page (steps 1–5), and then apply the rules to a specied VAP on the AP QoS Parameters page (step 6). Use the following general steps to congure ACLs:1.)  Specify a name for the ACL.2.)  Select the type of ACL to add.3.)  Add the ACL.4.)  Add new rules to the ACL.5.)  Congure the match criteria for the rules.6.)  Apply the ACL to one or more VAPs.For an example of how to congure an ACL, see “ACL Conguration Process” on page 90.To congure an ACL, click the Client QoS ACL tab.The elds to congure ACL rules appear only after you have created an ACL. The following image shows the conguration of a new rule for the IPv4 ACL named acl1. The rule prevents HTTP trafc from all clients in the 192.168.20.0 network from being forwarded.Figure 59 - Congure Client QoS ACL SettingsThe following table describes the elds available on the Client QoS ACL page.Field DescriptionACL CongurationACL Name Enter a name to identify the ACL. The name can contain from 1 – 31 alphanumeric characters. Spaces are not allowed.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 91April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionACL Type Select the type of ACL to congure:•)  IPv4•)  IPv6•)  MACIPv4 and IPv6 ACLs control access to network resources based on Layer 3 and Layer 4 criteria. MAC ACLs control access based on Layer 2 criteria.ACL Rule CongurationACL Name - ACL TypeSelect the ACL to congure with the new rule. The list contains all ACLs added in the ACL Conguration section.Rule To congure a new rule to add to the selected ACL, select New Rule. To add an existing rule to an ACL or to modify a rule, select the rule number. When an ACL has multiple rules, the rules are applied to the packet or frame in the order in which you add them to the ACL. There is an implicit deny all rule as the nal rule.Action Species whether the ACL rule permits or denies an action. •)  When you select Permit, the rule allows all trafc that meets the rule criteria to enter or exit the AP (depending on the ACL direction you select). Trafc that does not meet the criteria is dropped.•)  When you select Deny, the rule blocks all trafc that meets the rule criteria from entering or exiting the AP (depending on the ACL direction you select). Trafc that does not meet the criteria is forwarded unless this rule is the nal rule. Because there is an implicit deny all rule at the end of every ACL, trafc that is not explicitly permitted is dropped.Match Every Indicates that the rule, which either has a permit or deny action, will match the frame or packet regardless of its contents. If you select this eld, you cannot congure any additional match criteria. The Match Every option is selected by default for a new rule. You must clear the option to congure other match elds.IPv4 ACLProtocol Select the Protocol eld to use an L3 or L4 protocol match condition based on the value of the IP Protocol eld in IPv4 packets or the Next Header eld of IPv6 packets.Once you select the eld, choose the protocol to match by keyword or enter a protocol ID.Select From ListSelect one of the following protocols from the list: •)  IP•)  ICMP•)  IGMP•)  TCP•)  UDPMatch to ValueTo match a protocol that is not listed by name, enter the protocol ID. The protocol ID is a standard value assigned by the IANA. The range is a number from 0–255.Source IP Address Select this eld to require a packet’s source IP address to match the address listed here. Enter an IP address in the appropriate eld to apply this criteria.Wild Card Mask Species the source IP address wildcard mask.The wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. This eld is required when Source IP Address is checked.A wild card mask is, in essence, the inverse of a subnet mask. For example, To match the criteria to a single host address, use a wildcard mask of 0.0.0.0. To match the criteria to a 24-bit subnet (for example 192.168.10.0/24), use a wild card mask of 0.0.0.255.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 92April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionSource Port Select this eld to include a source port in the match condition for the rule. The source port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the source port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the source port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private PortsDestination IP AddressSelect this eld to require a packet’s destination IP address to match the address listed here. Enter an IP address in the appropriate eld to apply this criteria.Wild Card Mask Species the destination IP address wildcard mask.The wild card masks determines which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all of the bits are important. This eld is required when Source IP Address is checked.A wild card mask is in essence the inverse of a subnet mask. For example, To match the criteria to a single host address, use a wildcard mask of 0.0.0.0. To match the criteria to a 24-bit subnet (for example 192.168.10.0/24), use a wild card mask of 0.0.0.255.Destination Port Select this eld to include a destination port in the match condition for the rule. The destination port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the destination port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the destination port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private PortsIP DSCP To use IP DSCP as a match criteria, select the check box and select a DSCP value keyword or enter a DSCP value to match. You can select only one service type (DSCP, IP Precedence or TOS bits) to use for match criteria.Select from List Select from a list of DSCP types. Match to Value Enter a DSCP Value to match (0 – 63).
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 93April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionIP Precedence Select this option and enter a value to use the packet’s IP Precedence value in the IP header as match criteria. You can select only one service type (DSCP, IP Precedence or TOS bits) to use for match criteria.The IP Precedence range is 0 – 7.IP TOS Bits Select this option and enter a value to use the packet’s Type of Service bits in the IP header as match criteria. You can select only one service type (DSCP, IP Precedence or TOS bits) to use for match criteria.The IP TOS eld in a packet is dened as all eight bits of the Service Type octet in the IP header. The TOS Bits value is a two-digit hexadecimal number from 00 to ff. The high-order three bits represent the IP precedence value. The high-order six bits represent the IP Differentiated Services Code Point (DSCP) value.IP TOS Mask Enter an IP TOS mask value to identify the bit positions in the TOS Bits value that are used for comparison against the IP TOS eld in a packet. The TOS Mask value is a two-digit hexadecimal number from 00 to ff, representing an inverted (i.e. wildcard) mask. The zero-valued bits in the TOS Mask denote the bit positions in the TOS Bits value that are used for comparison against the IP TOS eld of a packet. For example, to check for an IP TOS value having bits 7 and 5 set and bit 1 clear, where bit 7 is most signicant, use a TOS Bits value of a0 and a TOS Mask of 00. This is an optional conguration.IPv6 ACLProtocol Select the Protocol eld to use an L3 or L4 protocol match condition based on the value of the IP Protocol eld in IPv4 packets or the Next Header eld of IPv6 packets.Once you select the eld, choose the protocol to match by keyword or enter a protocol ID.Select From ListSelect one of the following protocols from the list: •)  IP•)  ICMP•)  IPv6•)  ICMPv6•)  IGMP•)  TCP•)  UDPMatch to ValueTo match a protocol that is not listed by name, enter the protocol ID. The protocol ID is a standard value assigned by the IANA. The range is a number from 0–255.Source IPv6 AddressSelect this eld to require a packet’s source IPv6 address to match the address listed here. Enter an IPv6 address in the appropriate eld to apply this criteria.Source IPv6 Prex LengthEnter the prex length of the source IPv6 address.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 94April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionSource Port Select this option to include a source port in the match condition for the rule. The source port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the source port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the source port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private PortsDestination IPv6 AddressSelect this eld to require a packet’s destination IPv6 address to match the address listed here. Enter an IPv6 address in the appropriate eld to apply this criteria.Destination IPv6 Prex LengthEnter the prex length of the destination IPv6 address.Destination Port Select this option to include a destination port in the match condition for the rule. The destination port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the destination port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the destination port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private PortsIPv6 Flow Label Flow label is 20-bit number that is unique to an IPv6 packet. It is used by end stations to signify quality-of-service handling in routers (range 0 to 1048575).IPv6 DSCP To use IPv6 DSCP as a match criteria, select the check box and select a DSCP value keyword or enter a DSCP value to match. You can select only one service type (DSCP, IP Precedence or TOS bits) to use for match criteria.Select from List Select from a list of DSCP types. Match to Value Enter a DSCP Value to match (0 – 63).MAC ACL
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 95April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionEtherType Select the EtherType eld to compare the match criteria against the value in the header of an Ethernet frame. Select an EtherType keyword or enter an EtherType value to specify the match criteria.Select from List SelectSelect one of the following protocol types:•)  appletalk•)  arp•)  ipv4•)  ipv6•)  ipx•)  netbios•)  pppoeMatch to ValueEnter a custom protocol identier to which packets are matched. The value is a four-digit hexadecimal number in the range of 0600 – FFFF.Class of Service Select this eld and enter an 802.1p user priority to compare against an Ethernet frame.The valid range is 0 – 7. This eld is located in the rst/only 802.1Q VLAN tag.Source MAC AddressSelect this eld and enter the source MAC address to compare against an Ethernet frame.Source MAC Mask Select this eld and enter the source MAC address mask specifying which bits in the source MAC to compare against an Ethernet frame.A 0 indicates that the address bit is signicant, and an f indicates that the address bit is to be ignored. A MAC mask of 00:00:00:00:00:00 matches a single MAC address.Destination MAC AddressSelect this eld and enter the destination MAC address to compare against an Ethernet frame.Destination MAC MaskEnter the destination MAC address mask specifying which bits in the destination MAC to compare against an Ethernet frame. A 0 indicates that the address bit is signicant, and an f indicates that the address bit is to be ignored. A MAC mask of 00:00:00:00:00:00 matches a single MAC address.VLAN ID Select this eld and enter the VLAN IDs to compare against an Ethernet frame. This eld is located in the rst/only 802.1Q VLAN tag.Table 53 - ACL CongurationAfter you set the desired rule criteria, click Apply. To delete an ACL, select the Delete ACL option and click Apply. Creating a DiffServ Class MapThe Client QoS feature contains Differentiated Services (DiffServ) support that allows trafc to be classied into streams and given certain QoS treatment in accordance with dened per-hop behaviours.Standard IP-based networks are designed to provide best effort data delivery service. Best effort service implies that the network delivers the data in a timely fashion, although there is no guarantee that it will. During times of congestion, packets may be delayed, sent sporadically, or dropped. For typical Internet applications, such as e-mail and le transfer, a slight degradation in service is acceptable and in many cases unnoticeable. However, on applications with strict timing requirements, such as voice or multimedia, any degradation of service has undesirable effects.By classifying the trafc and creating policies that dene how to handle these trafc classes, you can make sure that time-sensitive trafc is given precedence over other trafc.The UAP supports up to 50 Class Maps.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 96April 2015Section 8 - Conguring Client Quality of Service (QoS)Dening DiffServTo use DiffServ for Client QoS, use the Class Map and Policy Map pages to dene the following categories and their criteria:•)  Class: create classes and dene class criteria •)  Policy: create policies, associate classes with policies, and dene policy statements Once you dene the class and associate it with a policy, apply the policy to a specied VAP on the VAP QoS Parameters page.Packets are classied and processed based on dened criteria. The classication criteria is dened by a class. The processing is dened by a policy’s attributes. Policy attributes may be dened on a per-class instance basis, and it is these attributes that are applied when a match occurs. A policy can contain multiple classes. When the policy is active, the actions taken depend on which class matches the packet.Packet processing begins by testing the class match criteria for a packet. A policy is applied to a packet when a class match within that policy is found. DiffServ is supported for IPv4 and IPv6 packets.Use the Class Map page to add a new Diffserv class name, or to rename or delete an existing class, and dene the criteria to associate with the DiffServ class.To congure a DiffServ Class Map, click the Class Map tab.Note: The Class Map page displays the Match Criteria Conguration elds only if a Class Map has been created. To create a Class Map, enter a name in the Class Map Name eld and click Add Class Map.Figure 60 - Congure Client QoS DiffServ Class Map SettingsField DescriptionClass Map CongurationClass Map Name Enter a Class Map Name to add. The name can range from 1 to 31 alphanumeric characters.Match Layer 3 ProtocolSpecify whether to classify IPv4 or IPv6 packets.Match Criteria Conguration
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 97April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionClass Map Name Select name of the class to congure.Use the elds in the Match Criteria Conguration area to match packets to a class. Select the check box for each eld to be used as a criterion for a class and enter data in the related eld. You can have multiple match criteria in a class.Note: The match criteria elds that are available depend on whether the class map is an IPv4 or IPv6 class map.Match Every Select Match Every to specify that the match condition is true to all the parameters in an L3 packet. All L3 packets will match an Match Every match condition.Protocol Select the Protocol eld to use an L3 or L4 protocol match condition based on the value of the IP Protocol eld in IPv4 packets or the Next Header eld of IPv6 packets.Once you select the eld, choose the protocol to match by keyword or enter a protocol ID.Select From ListSelect one of the following protocols from the list: •)  IP•)  ICMP•)  IPv6•)  ICMPv6•)  IGMP•)  TCP•)  UDPMatch to ValueTo match a protocol that is not listed by name, enter the protocol ID. The protocol ID is a standard value assigned by the IANA. The range is a number from 0 – 255.IPv4 Class MapsSource IP Address Select this eld to require a packet’s source IP address to match the address listed here. Enter an IP address in the appropriate eld to apply this criteria.Source IP Mask Enter the source IP address mask.The mask for DiffServ is a network-style bit mask in IP dotted decimal format indicating which part(s) of the destination IP Address to use for matching against packet content.A DiffServ mask of 255.255.255.255 indicates that all bits are important, and a mask of 0.0.0.0 indicates that no bits are important. The opposite is true with an ACL wild card mask. For example, to match the criteria to a single host address, use a DiffServ mask of 255.255.255.255. To match the criteria to a 24-bit subnet (for example 192.168.10.0/24), use a mask of 255.255.255.0.Destination IP AddressSelect this eld to require a packet’s destination IP address to match the address listed here. Enter an IP address in the appropriate eld to apply this criteria.Destination IP Mask Enter the destination IP address mask.The mask for DiffServ is a network-style bit mask in IP dotted decimal format indicating which part(s) of the destination IP Address to use for matching against packet content.A DiffServ mask of 255.255.255.255 indicates that all bits are important, and a mask of 0.0.0.0 indicates that no bits are important. The opposite is true with an ACL wild card mask. For example, to match the criteria to a single host address, use a DiffServ mask of 255.255.255.255. To match the criteria to a 24-bit subnet (for example 192.168.10.0/24), use a mask of 255.255.255.0.IPv6 Class MapsSource IPv6 AddressSelect this eld to require a packet’s source IPv6 address to match the address listed here. Enter an IPv6 address in the appropriate eld to apply this criteria.Source IPv6 Prex LengthEnter the prex length of the source IPv6 address.Destination IPv6 AddressSelect this eld to require a packet’s destination IPv6 address to match the address listed here. Enter an IPv6 address in the appropriate eld to apply this criteria.Destination IPv6 Prex LengthEnter the prex length of the destination IPv6 address.IPv6 Flow Label Flow label is 20-bit number that is unique to an IPv6 packet. It is used by end stations to signify quality-of-service handling in routers (range 0 to 1048575).
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 98April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionIP DSCP To use IP DSCP as a match criteria, select the check box and select a DSCP value keyword or enter a DSCP.Select from List Select from a list of DSCP types. Match to Value Enter a DSCP Value to match (0 – 63).IPv4 and IPv6 Class MapsSource Port Select this eld to include a source port in the match condition for the rule. The source port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the source port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the source port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private PortsDestination Port Select this eld to include a destination port in the match condition for the rule. The destination port is identied in the datagram header.Once you select the eld, choose the port name or enter the port number.Select From ListSelect the keyword associated with the destination port to match:•)  ftp•)  ftpdata•)  http•)  smtp•)  snmp•)  telnet•)  tftp•)  wwwEach of these keywords translates into its equivalent port number.Match to PortEnter the IANA port number to match to the destination port identied in the datagram header. The port range is 0 – 65535 and includes three different types of ports:•)  0 – 1023: Well Known Ports•)  1024 – 49151: Registered Ports•)  49152 – 65535: Dynamic and/or Private Ports
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 99April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionEtherType Select the EtherType eld to compare the match criteria against the value in the header of an Ethernet frame. Select an EtherType keyword or enter an EtherType value to specify the match criteria.Select from List SelectSelect one of the following protocol types:•)  appletalk•)  arp•)  ipv4•)  ipv6•)  ipx•)  netbios•)  pppoeMatch to ValueEnter a custom protocol identier to which packets are matched. The value is a four-digit hexidecimal number in the range of 0600 – FFFF.Class of Service Select the eld and enter a class of service 802.1p user priority value to be matched for the packets. The valid range is 0 – 7.Source MAC AddressSelect this eld and enter the source MAC address to compare against an Ethernet frame.Source MAC Mask Enter the source MAC address mask specifying which bits in the destination MAC to compare against an Ethernet frame.An f indicates that the address bit is signicant, and a 0 indicates that the address bit is to be ignored. A MAC mask of ff:ff:ff:ff:ff:ff matches a single MAC address.Destination MAC AddressSelect this eld and enter the destination MAC address to compare against an Ethernet frame.Destination MAC MaskEnter the destination MAC address mask specifying which bits in the destination MAC to compare against an Ethernet frame.An f indicates that the address bit is signicant, and a 0 indicates that the address bit is to be ignored. A MAC mask of ff:ff:ff:ff:ff:ff matches a single MAC address.VLAN ID Select the eld and enter a VLAN ID to be matched for packets. The VLAN ID range is 0 – 4095.IPv4 Class MapsService Type You can specify one type of service to use in matching packets to class criteria.IP DSCP To use IP DSCP as a match criteria, select the check box and select a DSCP value keyword or enter a DSCP.Select from List Select from a list of DSCP types. Match to Value Enter a DSCP Value to match (0 – 63).IP Precedence Select this eld to match the packet’s IP Precedence value to the class criteria IP Precedence value. The IP Precedence range is 0 – 7.IP TOS Bits Select this eld and enter a value to use the packet’s Type of Service bits in the IP header as match criteria. The TOS bit value ranges between (00 – FF). The high-order three bits represent the IP precedence value. The high-order six bits represent the IP Differentiated Services Code Point (DSCP) value.IP TOS Mask Enter an IP TOS mask value to perform a boolean AND with the TOS eld in the header of the packet and compared against the TOS entered for this rule. The TOS Mask can be used to compare specic bits (Precedence/Type of Service) from the TOS eld in the IP header of a packet against the TOS value entered for this rule. (00 – FF).Delete Class Map Check to delete the class map selected in the Class Map Name menu. The class map cannot be deleted if it is already attached to a policy.Table 54 - DiffServ Class MapTo delete a Class Map, select the Delete Class Map option and click Apply.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 100April 2015Section 8 - Conguring Client Quality of Service (QoS)Creating a DiffServ Policy MapUse the Policy Map page to create DiffServ policies and to associate a collection of classes with one or more policy statements.The UAP supports up to 50 Policy Maps.Packets are classied and processed based on dened criteria. The classication criteria is dened by a class on the Class Map page. The processing is dened by a policy’s attributes on the Policy Map page. Policy attributes may be dened on a per-class instance basis, and it is these attributes that are applied when a match occurs. A Policy Map can contain up to 10 Class Maps. When the policy is active, the actions taken depend on which class matches the packet.Packet processing begins by testing the class match criteria for a packet. A policy is applied to a packet when a class match within that policy is found.To create a DiffServ policy, click the Policy Map tab.Figure 61 - Congure Client QoS DiffServ Policy Map SettingsField DescriptionPolicy Map Name Enter then name of the policy map to add. The name can contain up to 31 alphanumeric characters.Policy Map Name (Policy Class Denition)Select the policy to associate with a member class.Class Map Name (Policy Class Denition)Select the member class to associate with this policy name.Police Simple Select this option to establish the trafc policing style for the class. The simple form of the policing style uses a single data rate and burst size, resulting in two outcomes: conform and non-conform.Committed RateEnter the committed rate, in Kbps, to which trafc must conform.Committed BurstEnter the committed burst size, in bytes, to which trafc must conform.Send Select Send to specify that all packets for the associated trafc stream are to be forwarded if the class map criteria is met.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 101April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionDrop Select Drop to specify that all packets for the associated trafc stream are to be dropped if the class map criteria is met.Mark Class of ServiceSelect this eld to mark all packets for the associated trafc stream with the specied class of service value in the priority eld of the 802.1p header. If the packet does not already contain this header, one is inserted. The CoS value is an integer from 0 – 7.Mark IP DSCP Select this eld to mark all packets for the associated trafc stream with the IP DSCP value you select from the list or specify. Select from List Select from a list of DSCP types. Match to Value Enter a DSCP Value to match (0 – 63).Mark IP Precedence Select this eld to mark all packets for the associated trafc stream with the specied IP Precedence value. The IP Precedence value is an integer from 0 – 7.Disassociate Class MapSelect this option and click Apply to remove the class selected in the Class Map Name menu from the policy selected in the Policy Map Name menu.Member Classes Lists all DiffServ classes currently dened as members of the selected policy. If no class is associated with the policy, the eld is empty.Delete Policy Map Select this eld to delete the policy map showing in the Policy Map Name menu.Table 55 - DiffServ Policy MapTo delete a Policy Map, select the Delete Policy Map option and click Apply. Client QoS StatusThe Client QoS Status page shows the client QoS settings that are applied to each client currently associated with the AP.To view QoS settings for an associated client, click the Client QoS Status tab.Figure 62 - QoS Conguration Status For Associated ClientsField DescriptionStation The Station menu contains the MAC address of each client currently associated with the AP. To view the QoS settings applied to a client, select its MAC address from the list.Global QoS Mode Shows the current Client QoS Global Admin Mode on the AP.Client QoS Mode Shows whether the QOS mode for the selected client is enabled or disabled. Note: For the Qos Mode to be enabled on a client, it must be globally enabled on the AP and enabled on the VAP the client is associated with. Use the VAP QoS Parameters page to enable the QoS Global Admin mode and the per-VAP QoS Mode.Bandwidth Limit Up Shows the maximum allowed transmission rate from the client to the AP in bits per second (bps). The valid range is 0 – 4294967295 bps.Bandwidth Limit DownShows the maximum allowed transmission rate from the AP to the client in bits per second (bps). The valid range is 0 – 4294967295 bps.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 102April 2015Section 8 - Conguring Client Quality of Service (QoS)Field DescriptionACL Type Up Shows the type of ACL that is applied to trafc in the inbound (client-to-AP) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules.•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules.•)  MAC: The ACL examines layer 2 frames for matches to ACL rules.ACL Name Up Shows the name of the ACL applied to trafc entering the AP in the inbound direction. When a packet or frame is received by the AP, the ACL’s rules are checked for a match. The packet or frame is processed if it is permitted and discarded if it is denied.ACL Type Down Shows the type of ACL to apply to trafc in the outbound (AP-to-client) direction, which can be one of the following: •)  IPv4: The ACL examines IPv4 packets for matches to ACL rules.•)  IPv6: The ACL examines IPv6 packets for matches to ACL rules•)  MAC: The ACL examines layer 2 frames for matches to ACL rulesACL Name Down Shows the name of the ACL applied to trafc in the outbound direction. After switching the packet or frame to the outbound interface, the ACL’s rules are checked for a match. The packet or frame is transmitted if it is permitted and discarded if it is denied.DiffServ Policy Up Shows the name of the DiffServ policy applied to trafc sent to the AP in the inbound (client-to-AP) direction.DiffServ Policy DownShows the name of the DiffServ policy applied to trafc from the AP in the outbound (AP-to-client) direction.Table 56 - Client QoS StatusConguring RADIUS-Assigned Client QoS ParametersIf a VAP is congured to use WPA Enterprise security, you can include client QoS information in the client database on the RADIUS server. When a client successfully authenticates, the RADIUS server can include bandwidth limits and identify the ACLs and DiffServ policies to apply to the specic wireless client. ACLs and DiffServ policies referenced in the RADIUS client database must match the names of the ACLs and DiffServ policies congured on the AP to be successfully applied to the wireless clients.The following table describes the QoS attributes that can be included in the client’s RADIUS server entry. If a wireless client successfully authenticates using WPA Enterprise, each QoS RADIUS attribute that exists for the client is sent to the AP for processing. The attributes are optional and do not need to be present in the client entry. If the attribute is not present, the Client QoS setting on the AP is used.RADIUS AttributeID Description Type/RangeVendor-Specic (26), WISPr-Bandwidth-Max-Down14122,8 Maximum allowed client reception rate from the AP in bits per second. If nonzero, the specied value is rounded down to the nearest 64 Kbps value when used in the AP (64 Kbps minimum). If zero, bandwidth limiting is not enforced for the client in this direction.Type: integer32-bit unsigned integer value (0-4294967295)Vendor-Specic (26), WISPr-Bandwidth-Max-Up14122,7 Maximum allowed client transmission rate to the AP in bits per second. If nonzero, the specied value is rounded down to the nearest 64 Kbps value when used in the AP (64 Kbps minimum). If zero, bandwidth limiting is not enforced for the client in this direction.Type: integer32-bit unsigned integer value (0-4294967295)Vendor-Specic (26), LVL7-Wireless-Client-ACL-Dn6132,120 Access list identier to be applied to 802.1X authenticated wireless client trafc in the outbound (down) direction.If this attribute refers to an ACL that does not exist on the AP, all packets for this client will be dropped until the ACL is dened.Type: string5-36 characters (not null-terminated)The string is of the form “type:name” where: type = ACL type identier: IPV4, IPV6, MAC: = required separator charactername = 1-31 alphanumeric characters, specifying the ACL number (IPV4) or name (IPV6, MAC)
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 103April 2015Section 8 - Conguring Client Quality of Service (QoS)RADIUS AttributeID Description Type/RangeVendor-Specic (26), LVL7-Wireless-Client-ACL-Up6132,121 Access list identier to be applied to 802.1X authenticated wireless client trafc in the inbound (up) direction.If this attribute refers to an ACL that does not exist on the AP, all packets for this client will be dropped until the ACL is dened.Type: string5-36 characters (not null-terminated) The string is of the form “type:name” where: type = ACL type identier: IPV4, IPV6, MAC: = required separator charactername = 1-31 alphanumeric characters, specifying the ACL number (IPV4) or name (IPV6, MAC)Vendor-Specic (26), LVL7-Wireless-Client-Policy-Dn6132,122 Name of DiffServ policy to be applied to 802.1X authenticated wireless client trafc in the outbound (down) direction.If this attribute refers to a policy name that does not exist on the AP, all packets for this client will be dropped until the DiffServ policy is dened.Type: string1-31 characters (not null-terminated)Vendor-Specic (26), LVL7-Wireless-Client-Policy-Up6132,123 Name of DiffServ policy to be applied to 802.1X authenticated wireless client trafc in the inbound (up) direction.If this attribute refers to a policy name that does not exist on the AP, all packets for this client will be dropped until the DiffServ policy is dened.Type: string1-31 characters (not null-terminated)Table 57 - Client QoS RADIUS Attributes
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 104April 2015Section 9 - Clustering Multiple APsSection 9 - Clustering Multiple APsThe UAP supports AP clusters. A cluster provides a single point of administration and lets you view, deploy, congure, and secure the wireless network as a single entity rather than a series of separate wireless devices. Managing Cluster Access Points in the ClusterThe AP cluster is a dynamic, conguration-aware group of APs in the same subnet of a network. Each cluster can have up to 8 members. Only one cluster per wireless network is supported; however, a network subnet can have multiple clusters. Clusters can share various conguration information, such as VAP settings and QoS queue parameters.A cluster can be formed between two APs if the following conditions are met:•)  The APs are identical models.•)  The APs are connected on the same bridged segment.•)  The APs joining the cluster have the same Cluster Name.•)  Clustering mode is enabled on both APs.Note: For two APs to be in the same cluster, they do not need to have the same number of radios; however, the supported capabilities of the radios should be same.Clustering APsOnly identical models may be clustered together. For example, the DWL-2600AP can only form a cluster with other DWL-2600APs.Viewing and Conguring Cluster MembersThe Access Points page allows you to start or stop clustering on an AP, view the cluster members, and congure the location and cluster name for a cluster member. From the Access Points page, you can also click the IP address of each cluster member to navigate to conguration settings and data on an access point in the cluster. To view information about cluster members and to congure the location and cluster of an individual member, click the Access Points tab.The following gure shows the Cluster > Access Points page when clustering is not enabled.Figure 63 - Manage Access Points In The Cluster (Passive)The following gure shows the Cluster > Access Points page when clustering is enabled and two access points are in the cluster.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 105April 2015Section 9 - Clustering Multiple APsFigure 64 - Manage Access Points In The Cluster (Active)If clustering is currently disabled on the AP, the Start Clustering button is visible. If clustering is enabled, the Stop Clustering button is visible. You can edit the clustering option information when clustering is disabled.The following table describes the conguration and status information available on the cluster Access Points page.Field DescriptionStatus If the status eld is visible, then the AP is enabled for clustering. If clustering is not enabled, then the AP is operating in stand-alone mode and none of the information in this table is visible. To disable clustering on the AP, click Stop Clustering.Location Description of where the access point is physically located.MAC Address Media Access Control (MAC) address of the access point.The address shown here is the MAC address for the bridge (br0). This is the address by which the AP is known externally to other networks.IP Address Species the IP address for the access point. Each IP address is a link to the Administration Web pages for that access point. You can use the links to navigate to the Administration Web pages for a specic access point. This is useful for viewing data on a specic access point to make sure a cluster member is picking up cluster conguration changes, to congure advanced settings on a particular access point, or to switch a standalone access point to cluster mode.Table 58 - Access Points in the ClusterThe following table describes the cluster information to congure for an individual member. The clustering options are read-only when clustering is enabled. To congure the clustering options, you must stop clustering.Field DescriptionLocation Enter a description of where the access point is physically located.Cluster Name Enter the name of the cluster for the AP to join.The cluster name is not sent to other APs in the cluster. You must congure the same cluster name on each AP that is a member of the cluster. The cluster name must be unique for each cluster you congure on the network.Clustering IP VersionSpecify the IP version that the APs in the cluster use to communicate with each other.Table 59 - Cluster Options
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 106April 2015Section 9 - Clustering Multiple APsRemoving an Access Point from the ClusterTo remove an access point from the cluster, do the following.1.)  Go to the Administration Web pages for the clustered access point. The Administration Web pages for the standalone access point are displayed.2.)  Click the Cluster > Access Points link in the Administration pages.3.)  Click Stop Clustering.4.)  The change will be reected under Status for that access point; the access point will now show as stand-alone (instead of cluster).Adding an Access Point to a ClusterTo add an access point that is currently in standalone mode back into a cluster, do the following.1.)  Go to the Administration Web pages for the standalone access point.2.)  Click the Cluster > Access Points link in the Administration pages for the stand-alone access point.The Access Points page for a standalone access point indicates that the current mode is standalone.3.)  Type the name or location of the AP in the Location eld to identify the AP within the cluster.4.)  Type the name of the cluster for the AP to join in the Cluster Name eld.5.)  Click Start Clustering.6.)  The access point is now a cluster member. Its Status (Mode) on the Cluster > Access Points page now indicates Cluster instead of Not Clustered.Navigating to Conguration Information for a Specic APIn general, the UAP is designed for central management of clustered access points. For access points in a cluster, all access points in the cluster reect the same conguration. In this case, it does not matter which access point you actually connect to for administration.There may be situations, however, when you want to view or manage information on a particular access point. For example, you might want to check status information such as client associations or events for an access point. In this case, you can navigate to the Administration Web interface for individual access points by clicking the IP address links on the Access Points page.All clustered access points are shown on the Cluster > Access Points page. To navigate to clustered access points, you can simply click on the IP address for a specic cluster member shown in the list.Navigating to an AP by Using its IP Address in a URLYou can also link to the Administration Web pages of a specic access point, by entering the IP address for that access point as a URL directly into a Web browser address bar in the following form:http://IPAddressOfAccessPointwhere IPAddressOfAccessPoint is the address of the particular access point you want to monitor or congure.Managing Cluster SessionsThe Sessions page shows information about client stations associated with access points in the cluster. Each client is identied by its MAC address, along with the AP (location) to which it is currently connected.To view a particular statistic for client sessions, select an item from the Display drop-down list and click Go. You can view information about idle time, data rate, signal strength and so on; all of which are described in detail in the table below.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 107April 2015Section 9 - Clustering Multiple APsA session in this context is the period of time in which a user on a client device (station) with a unique MAC address maintains a connection with the wireless network. The session begins when the client logs on to the network, and the session ends when the client either logs off intentionally or loses the connection for some other reason.Note: A session is not the same as an association, which describes a client connection to a particular access point. A client network connection can shift from one clustered AP to another within the context of the same session. A client station can roam between APs and maintain the session.To manage sessions associated with the cluster, click Cluster > Sessions.Figure 65 - Manage Sessions Associated With The ClusterDetails about the session information shown is described in the following table.Field DescriptionAP Location Indicates the location of the access point.This is derived from the location description specied on the Basic Settings page.User MAC Indicates the MAC address of the wireless client device.A MAC address is a hardware address that uniquely identies each node of a network.Idle Indicates the amount of time this station has remained inactive.A station is considered to be idle when it is not receiving or transmitting data.Rate The speed at which this access point is transferring data to the specied client.The data transmission rate is measured in megabits per second (Mbps).This value should fall within the range of the advertised rate set for the mode in use on the access point. For example, 6 to 54 Mbps for 802.11a.Signal Indicates the strength of the radio frequency (RF) signal the client receives from the access point.The measure used for this is a value known as Received Signal Strength Indication (RSSI), and will be a value between 0 and 100.RSSI is determined by a mechanism implemented on the network interface card (NIC) of the client station.Rx Total Indicates number of total packets received by the client during the current session.Tx Total Indicates number of total packets transmitted to the client during this session.Error Rate Indicates the percentage of time frames are dropped during transmission on this access point.Table 60 - Session ManagementSorting Session InformationTo sort the information shown in the tables by a particular indicator, click the column label by which you want to order things. For example, if you want to see the table rows ordered by signal strength, click the Signal column label. The entries will be sorted by signal strength.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 108April 2015Section 9 - Clustering Multiple APsConguring and Viewing Channel Management SettingsWhen Channel Management is enabled, the UAP automatically assigns radio channels used by clustered access points. The automatic channel assignment reduces mutual interference (or interference with other access points outside of its cluster) and maximizes Wi-Fi bandwidth to help maintain the efciency of communication over the wireless network.You must start channel management to get automatic channel assignments; it is disabled by default on a new AP.At a specied interval, the Channel Manager maps APs to channel use and measures interference levels in the cluster. If signicant channel interference is detected, the Channel Manager automatically re-assigns some or all of the APs to new channels per an efciency algorithm (or automated channel plan). If the Channel Manager determines that a change is necessary, that information is sent to all members of the cluster and a syslog message is generated indicating the sender AP, new and old channel assignments.The Channel Management page shows previous, current, and planned channel assignments for clustered access points. By default, automatic channel assignment is disabled. You can start channel management to optimize channel usage across the cluster on a scheduled interval.To congure and view the channel assignments for the cluster members, click the Channel Management tab.Figure 66 - Automatically Manage Channel AssignmentsFrom this page, you can view channel assignments for all APs in the cluster and stop or start automatic channel management. By using the Advanced settings on the page, you can modify the interference reduction potential that triggers channel re-assignment, change the schedule for automatic updates, and re-congure the channel set used for assignments.Stopping/Starting Automatic Channel AssignmentBy default, automatic channel assignment is disabled (off).Note: Channel Management overrides the default cluster behavior, which is to synchronize radio channels of all APs across a cluster. When Channel Management is enabled, the radio Channel is not synced across the cluster to other APs. •)  Click Start to resume automatic channel assignment.When automatic channel assignment is enabled, the Channel Manager periodically maps radio channels used by clustered access points and, if necessary, re-assigns channels on clustered APs to reduce interference (with cluster members or other APs outside the cluster).•)  Click Stop to stop automatic channel assignment. (No channel usage maps or channel re-assignments will be made. Only manual updates will affect the channel assignment.)
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 109April 2015Section 9 - Clustering Multiple APsViewing Current Channel Assignments and Setting LocksThe Current Channel Assignments section shows a list of all access points in the cluster by IP Address. The display shows the band on which each AP is broadcasting (a/b/g/n), the current channel used by each AP, and an option to lock an AP on its current radio channel so that it cannot be re-assigned to another. The following table provides details about Current Channel Assignments.Field DescriptionIP Address Species the IP Address for the access point.Radio Identies the MAC address of the radio.Band Indicates the band on which the access point is broadcasting.Current Indicates the radio Channel on which this access point is currently broadcasting.Status Shows whether the radio is up (on) or down (off).Locked Click Locked to force the access point to remain on the current channel.When Locked is selected (enabled) for an access point, automated channel management plans will not re-assign the AP to a different channel as a part of the optimization strategy. Instead, APs with locked channels will be factored in as requirements for the plan.If you click Apply, you will see that locked APs show the same channel for the Current Channel and Proposed Channel elds. Locked APs will keep their current channels.Table 61 - Channel AssignmentsViewing the Last Proposed Set of ChangesThe Proposed Channel Assignments shows the last channel plan. The plan lists all access points in the cluster by IP Address, and shows the current and proposed channels for each AP. Locked channels will not be re-assigned and the optimization of channel distribution among APs will take into account the fact that locked APs must remain on their current channels. APs that are not locked may be assigned to different channels than they were previously using, depending on the results of the plan.Field DescriptionIP Address Species the IP Address for the access point.Radio Indicates the radio channel on which this access point is currently broadcasting.Proposed Channel Indicates the radio channel to which this access point would be re-assigned if the Channel Plan is executed.Table 62 - Last Proposed ChangesConguring Advanced SettingsThe advanced settings allow you to customize and schedule the channel plan for the cluster. If you use Channel Management as provided (without updating Advanced Settings), channels are automatically ne-tuned once every hour if interference can be reduced by 25 percent or more. Channels will be re-assigned even if the network is busy. The appropriate channel sets will be used (b/g for APs using IEEE 802.11b/g and a for APs using IEEE 802.11a).The default settings are designed to satisfy most scenarios where you would need to implement channel management.Use Advanced Settings to modify the interference reduction potential that triggers channel re-assignment, change the schedule for automatic updates, and re-congure the channel set used for assignments. If there are no elds showing in the Advanced section, click the toggle button to display the settings that modify timing and details of the channel planning algorithm.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 110April 2015Section 9 - Clustering Multiple APsField DescriptionChange channels if interference is reduced by at leastSpecify the minimum percentage of interference reduction a proposed plan must achieve in order to be applied. The default is 75 percent.Use the drop-down menu to choose percentages ranging from 5 percent to 75 percent.This setting lets you set a gating factor for channel re-assignment so that the network is not continually disrupted for minimal gains in efciency.For example, if channel interference must be reduced by 75 percent and the proposed channel assignments will only reduce interference by 30 percent, then channels will not be re-assigned. However; if you re-set the minimal channel interference benet to 25 percent and click Apply, the proposed channel plan will be implemented and channels re-assigned as needed.Determine if there is better set of channels everyUse the drop-down menu to specify the schedule for automated updates.A range of intervals is provided, from 30 Minutes to 6 MonthsThe default is 1 Hour (channel usage re-assessed and the resulting channel plan applied every hour).Table 63 - Advanced Channel Management SettingsClick Apply under Advanced settings to apply these settings.Advanced settings will take effect when they are applied and inuence how automatic channel management is performed. Viewing Wireless Neighborhood InformationThe Wireless Neighborhood shows up to 20 access points per radio within range of every member of the cluster, shows which access points are within range of which cluster members, and distinguishes between cluster members and non-members.Note: The Wireless Neighborhood page shows up to 20 access points per radio. To see all the access points detected on a given cluster access point, navigate to that cluster member’s web interface and go to the Status > Neighboring Access Points page.For each neighbor access point, the Wireless Neighborhood view shows identifying information (SSID or Network Name, IP Address, MAC address) along with radio statistics (signal strength, channel, beacon interval). You can click on an AP to get additional statistics about the APs in radio range of the currently selected AP. The Wireless Neighborhood view can help you:•)  Detect and locate unexpected (or rogue) access points in a wireless domain so that you can take action to limit associated risks•)  Verify coverage expectations. By assessing which APs are visible at what signal strength from other APs, you can verify that the deployment meets your planning goals.•)  Detect faults. Unexpected changes in the coverage pattern are evident at a glance in the color coded table.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 111April 2015Section 9 - Clustering Multiple APsFigure 67 - View Neighboring Access PointsThe following table describes details about the Wireless Neighborhood information.Field DescriptionDisplay neighboring APsClick one of the following radio buttons to change the view:•)  In cluster — Shows only neighbor APs that are members of the cluster•)  Not in cluster — Shows only neighbor APs that are not cluster members•)  Both — Shows all neighbor APs (cluster members and non-members)Cluster The Cluster list at the top of the table shows IP addresses for all access points in the cluster. (This is the same list of cluster members shown on the Cluster > Access Points tab.)If there is only one AP in the cluster, only a single IP address column will be displayed here; indicating that the AP is clustered with itself.You can click on an IP address to view more details on a particular AP.Neighbors Access points which are neighbors of one or more of the clustered APs are listed in the left column by SSID (Network Name).An access point which is detected as a neighbor of a cluster member can also be a cluster member itself. Neighbors who are also cluster members are always shown at the top of the list with a heavy bar above and include a location indicator.The colored bars to the right of each AP in the Neighbors list shows the signal strength for each of the neighbor APs as detected by the cluster member whose IP address is shown at the top of the column.The color of the bar indicates the signal strength:•)  Dark Blue Bar — A dark blue bar and a high signal strength number (for example 50) indicates good signal strength detected from the Neighbor seen by the AP whose IP address is listed above that column.•)  Lighter Blue Bar — A lighter blue bar and a lower signal strength number (for example 20 or lower) indicates medium or weak signal strength from the Neighbor seen by the AP whose IP address is listed above that column•)  White Bar — A white bar and the number 0 indicates that a neighboring AP that was detected by one of the cluster members cannot be detected by the AP whose IP address if listed above that column.•)  Light Gray Bar — A light gray bar and no signal strength number indicates a Neighbor that is detected by other cluster members but not by the AP whose IP address is listed above that column.•)  Dark Gray Bar — A dark gray bar and no signal strength number indicates this is the AP whose IP address is listed above that column (since it is not applicable to show how well the AP can detect itself).Table 64 - Wireless Neighborhood Information
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 112April 2015Section 9 - Clustering Multiple APsViewing Details for a Cluster MemberTo view details on a cluster member AP, click on the IP address of a cluster member at the top of the page. The following gure shows the Neighbor Details of the AP with an IP address of 10.90.90.91.Figure 68 - Viewing Details For A Cluster MemberThe following table explains the details shown about the selected AP.Field DescriptionSSID The Service Set Identier (SSID) for the access point.The SSID is an alphanumeric string of up to 32 characters that uniquely identies a wireless local area network. It is also referred to as the Network Name.A Guest network and an Internal network running on the same access point must always have two different network names.MAC Address Shows the MAC address of the neighboring access point.A MAC address is a hardware address that uniquely identies each node of a network.Channel Shows the channel on which the access point is currently broadcasting.The Channel denes the portion of the radio spectrum that the radio uses for transmitting and receiving.Rate Shows the rate (in megabits per second) at which this access point is currently transmitting.The current rate will always be one of the rates shown in Supported Rates.Signal Indicates the strength of the radio signal emitting from this access point as measured in decibels (Db).Beacon Interval Shows the Beacon interval being used by this access point.Beacon frames are transmitted by an access point at regular intervals to announce the existence of the wireless network. The default behavior is to send a beacon frame once every 100 milliseconds (or 10 per second).Beacon Age Shows the date and time of the last beacon received from this access point.Table 65 - Cluster Member Details
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 113April 2015Appendix A - Default AP SettingsAppendix A - Default AP SettingsWhen you rst power on a UAP, it has the default settings shown in the following table.Feature DefaultSystem InformationUser Name adminPassword adminEthernet Interface SettingsConnection Type DHCPDHCP EnabledIP Address 10.90.90.91 (if no DHCP server is available)Subnet Mask 255.0.0.0DNS Name NoneManagement VLAN ID 1Untagged VLAN ID 1IPv6 Admin Mode EnabledIPv6 Auto Cong Admin Mode EnabledRadio SettingsRadio (1 and 2) OneRadio 1 IEEE 802.11 Mode 802.11a/nRadio 2 IEEE 802.11 Mode 802.11b/g/n802.11a/n Channel Auto802.11b/g/n Channel AutoRadio 1 Channel Bandwidth 40 MHzRadio 2 Channel Bandwidth 20 MHzPrimary Channel LowerShort Guard Interval Supported YesSTBC Mode OnProtection AutoMaximum Wireless Clients 200Transmit Power 100 percentLegacy Rate Sets Supported (Mbps) IEEE 802.11a: 54, 48, 36, 24, 18, 12, 9, 6 IEEE 802.11b: 11, 5.5, 2, 1IEEE 802.11g: 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1Legacy Rate Sets (Mbps)(Basic/Advertised)IEEE 802.11a: 24, 12, 6IEEE 802.11b: 2, 1IEEE 802.11g: 11, 5.5, 2, 1MCS (Data Rate) Settings (802.11n only)0–15 EnabledBroadcast/Multicast Rate Limiting DisabledFixed Multicast Rate AutoBeacon Interval 100DTIM Period 2Fragmentation Threshold 2346RTS Threshold 2347TSPEC Mode OffTSPEC Voice ACM Mode OffVirtual Access Point SettingsStatus VAP0 is enabled on both radios, all other VAPs disabled
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 114April 2015Appendix A - Default AP SettingsFeature DefaultVLAN ID 1Network Name (SSID) dlink1 through dlink16Broadcast SSID AllowSecurity Mode None (plain text)MAC Authentication Type NoneRADIUS IP Address 10.90.90.1RADIUS Key secretRADIUS Accounting DisabledRedirect Mode NoneOther Default SettingsWDS Settings NoneSTP DisabledMAC Authentication No stations in listLoad Balancing DisabledSNMP EnabledRO SNMP Community Name publicSNMP Agent Port 161SNMP Set Requests EnabledManaged AP Mode EnabledAuthentication (802.1X Supplicant) DisabledManagement ACL DisabledHTTP Access Enabled; disabled in Managed ModeHTTPS Access Enabled; disabled in Managed ModeConsole Port Access EnabledTelnet Access Enabled; disabled in Managed ModeSSH Access Enabled; disabled in Managed ModeWMM EnabledEmail Alert Admin Mode DownTime Manual (Not set)Client QoS Global Admin Mode DisabledPer-VAP Client QoS Mode DisabledClustering StoppedTable 66 - UAP Default Settings
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 115April 2015Appendix B - Conguration ExamplesAppendix B - Conguration ExamplesThis appendix contains examples of how to congure selected features available on the UAP. Each example contains procedures on how to congure the feature by using the Web interface, CLI, and SNMP. This appendix describes how to perform the following procedures:•) “Conguring a VAP” on page 115•) “Conguring Radio Settings” on page 117•) “Conguring the Wireless Distribution System” on page 118•) “Clustering Access Points” on page 119•) “Conguring Client QoS” on page 121For all SNMP examples, the objects you use to AP are in a private MIB. Take DWL-6600AP for example, the path to the tables that contain the objects is iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).dlink(171).dlink-products(10).dwl-6600AP(128).dwl6600AP(1).dwl_6600AP(1).dwlWLANAPNewMibs(26).DWL-8610AP: 1.3.6.1.4.1.171.10.38.29.1.26DWL-6610AP: 1.3.6.1.4.1.171.10.143.1.1.26DWL-8600AP: 1.3.6.1.4.1.171.10.37.29.1.26DWL-6700AP: 1.3.6.1.4.1.171.10.142.1.1.26DWL-6600AP: 1.3.6.1.4.1.171.10.128.1.1.26DWL-3600AP: 1.3.6.1.4.1.171.10.129.1.1.26DWL-2600AP: 1.3.6.1.4.1.171.10.130.1.1.26Conguring a VAPThis example shows how to congure VAP 1 with the following non-default settings:•)  VLAN ID: 2•)  SSID: Marketing•)  Security: WPA Personal using WPA2 with CCMP (AES)VAP Conguration from the Web Interface1.)  Log onto the AP and navigate to the Manage > VAP page.Figure 69 - VAP Conguration from the Web Interface2.)  In the Enabled column for VAP 1, select the check box. 3.)  Enter 2 in the VLAN ID column.4.)  In the SSID column, delete the existing SSID and type Marketing.5.)  Select WPA Personal from the menu in the Security column. Additional elds appear.6.)  Select the WPA2 and CCMP (AES) options, and clear the WPA and TKIP options.7.)  Enter a WPA encryption key in the Key eld. The key can be a mix of alphanumeric and special characters. The key is case sensitive and can be between 8 and 63 characters.•)  Click Apply to update the AP with the new settings.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 116April 2015Appendix B - Conguration ExamplesVAP Conguration from the CLI1.)  Connect to the AP by using Telnet, SSH, or a serial connection.2.)  Enable VAP 1. set vap vap1 status up3.)  Set the VLAN ID to 2.set vap vap1 vlan-id 2Note: The previous command sets the VLAN ID to 2 for VAP 1 on both radios. To set the VLAN ID for VAP 1 on radio one only, use the following command: set vap 1 with radio wlan0 to vlan-id 2.4.)  Set the SSID to Marketing.set interface wlan0vap1 ssid Marketing5.)  Set the Security Mode to WPA Personal.set interface wlan0vap1 security wpa-personal6.)  Allow WPA2 clients, and not WPA clients, to connect to the AP.set bss wlan0bssvap1 wpa-allowed offset bss wlan0bssvap1 wpa2-allowed on7.)  Set the Cipher Suite to CCMP (AES) only.set bss wlan0bssvap1 wpa-cipher-tkip offset bss wlan0bssvap1 wpa-cipher-ccmp on8.)  Set the Pre-shared key.set interface wlan0vap1 wpa-personal-key JuPXkC7GvY$moQiUttp2If the shared secret keys includes spaces, place the key inside quotation marks.9.)  Use the following commands to view and verify the settings. get interface wlan0vap1 detailget vap vap1 detailVAP Conguration Using SNMP1.)  Load the DLINK-WLAN-ACCESS-POINT-X600-MIB module.2.)  From the MIB tree, navigate to the objects in the apVap table.3.)  Walk the apVapDescription object to view the instance ID for VAP 1 (wlan0vap1).VAP 1 on Radio 1 is instance 3.4.)  Use the apVapStatus object to set the status of VAP 1 to up (1).5.)  Use the apVapVlanID object to set the VLAN ID of VAP 1 to 2.6.)  Navigate to the objects in the apIfCong table.7.)  Walk the apIfCongName object to view the instance ID for VAP 1 (wlan0vap1).VAP 1 on Radio 1 is instance 3.8.)  Set the value of instance 3 in the apIfCongSsid object to Marketing.9.)  Set the value of instance 3 in the apIfCongSecurity object to wpa-personal (3).10.)  Set the value of instance3 in the apIfCongWpaPersonalKey object to JuPXkC7GvY$moQiUttp2, which is the WPA pre-shared key.11.)  Navigate to the objects in the apRadioBss > apBssTable table.12.)  Walk the apBssDescr object to view the instance ID for VAP 1.  VAP 1 on Radio 1 is instance 1.13.)  Set the value of instance 1 in the apBssWpaAllowed object to false (2).14.)  Set the value of instance 1 in the apBssWpaCipherTkip object to false (2).15.)  Set the value of instance 1 in the apBssWpaCipherCcmp object to true (1).
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 117April 2015Appendix B - Conguration ExamplesConguring Radio SettingsThis example shows how to congure Radio 12 with the following settings:•)  Mode: IEEE 802.11b/g/n•)  Channel: 6•)  Channel Bandwidth: 40 MHz•)  Maximum Stations: 100•)  Transmit Power: 75%Radio Conguration from the Web Interface1.)  Log onto the AP and navigate to the Manage > Radio page.Figure 70 - Radio Conguration from the Web Interface2.)  Make sure that the Status is On.3.)  From the Mode menu, select IEEE 802.11b/g/n.4.)  From the Channel eld, select 6. 5.)  From the Channel Bandwidth eld, select 40 MHz.6.)  In the Maximum Stations eld, change the value to 100.7.)  In the Transmit Power eld, change the value to 75.8.)  Click Apply to update the AP with the new settings.Radio Conguration from the CLI1.)  Connect to the AP by using Telnet, SSH, or a serial connection.2.)  Turn Radio 12 on if the status is not currently up.set radio wlan01 status on3.)  Set the mode to IEEE 802.11b/g/n.set radio wlan01 mode bg-n4.)  Set the channel to 6. set radio wlan01 channel-policy staticset radio wlan01 static-channel 65.)  Set the channel bandwidth to 40 MHz.set radio wlan01 n-bandwidth 406.)  Allow a maximum of 100 stations to connect to the AP at a time.set bss wlan01bssvap0 max-stations 100
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 118April 2015Appendix B - Conguration Examples7.)  Set the transmit power to 75 percent.set radio wlan01 tx-power 758.)  View information about the radio settings.get radio wlan01 detailRadio Conguration Using SNMP1.)  Load the DLINK-WLAN-ACCESS-POINT-X600-MIB module.2.)  From the MIB tree, navigate to the objects in the apRadio table (apRadioBss > apRadioTable).3.)  Use the apRadioStatus object to set the status of Radio 12 to up (1).4.)  Use the apRadioMode object to set the Radio 12 mode to IEEE 802.11b/g/n, which is bg-n (4).5.)  Use the apRadioChannelPolicy object to set the channel policy to static (1), which disables the automatic channel assignment.6.)  Use the apRadioStaticChannel object to set the channel to 6.7.)  Use the apRadioChannelBandwith object to set the channel bandwidth for Radio 12 to forty-MHz (2).8.)  Use the apRadioTxPower object to set the transmission power on Radio 12 to 75.9.)  Navigate to the objects in the apBssTable.10.)  Use the apBssMaxStations object to set the value of the maximum allowed stations to 100.Conguring the Wireless Distribution SystemThis examples shows how to congure a WDS link between two APs. The local AP is MyAP1 and has a MAC address of 00:1B:E9:16:32:40, and the remote AP is MyAP2 with a MAC address of 00:30:AB:00:00:B0.The WDS link has the following settings, which must be congured on both APs:•)  Encryption: WPA (PSK)•)  SSID: wds-link•)  Key: abcdefghijkWDS Conguration from the Web InterfaceTo create a WDS link between a pair of access points “MyAP1” and “MyAP2” use the following steps:1.)  Log onto MyAP1 and navigate to the Manage > WDS page. Figure 71 - WDS Conguration from the Web InterfaceThe MAC address for MyAP1 (the access point you are currently viewing) is automatically provided in the Local Address eld.2.)  Enter the MAC address for MyAP2 in the Remote Address eld, or click the arrow next to the eld and select the MAC address of MyAP2 from the pop-up list. 3.)  Select WPA (PSK) from the Encryption menu.4.)  Enter wds-link in the SSID eld and abcdefghijk in the Key eld.5.)  Click Apply to apply the WDS settings to the AP.6.)  Log onto MyAP2 and repeat steps 2-5 (but be sure to use the MAC address of MyAP1 in the Remote Address eld.Note: MyAP1 and MyAP2 must be set to the same IEEE 802.11 Mode and be transmitting on the same channel.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 119April 2015Appendix B - Conguration ExamplesWDS Conguration from the CLI1.)  Connect to the MyAP1 by using Telnet, SSH, or a serial connection.2.)  Congure the remote MAC address for MyAP2.set interface wlan0wds0 status up remote-mac 00:30:AB:00:00:B03.)  Set WPA (PSK) as the encryption type for the link.set interface wlan0wds0 wds-security-policy wpa-personal4.)  Set the SSID on the WDS link.set interface wlan0wds0 wds-ssid wds-link5.)  Congure the encryption key.set interface wlan0wds0 wds-wpa-psk-key abcdefghijk6.)  Administratively enable the WDS link.set interface wlan0wds0 status up7.)  Perform the same conguration steps on MyAP2.WDS Conguration Using SNMP1.)  Load the DLINK-WLAN-ACCESS-POINT-X600-MIB module.2.)  From the MIB tree, navigate to the objects in the apIfCong table.3.)  Walk the apIfCongName object to view the instance ID for the rst WDS link (wlan0wds0).The rst WDS link is instance 1.4.)  Set the value of instance 1 in the apIfCongRemoteMac object to 00:30:AB:00:00:B0.In the MG-Soft browser, the format for the MAC address value to set is # 0x00 0x30 0xAB 0x00 0x00 0xB0.5.)  Set the value of instance 1 in the apIfCongWdsSecPolicy object to WPA Personal (3).6.)  Set the value of instance 1 in the apIfCongSsid object to wds-link.7.)  Set the value of instance 1 in the apIfCongWdsWpaPskKey object to abcdefthijk.Some MIB browsers require that the value be entered in HEX values rather than ASCII values.8.)  Perform the same conguration steps on MyAP2.Clustering Access PointsThis example shows how to congure a cluster with two APs and to enable automatic channel reassignment. The location of the local AP is Room 214, and the cluster name is MyCluster.Clustering APs by Using the Web Interface1.)  Log onto the AP and navigate to the Cluster > Access Points page.Figure 72 - Clustering APs by Using the Web Interface (Passive)2.)  If clustering has started, click Stop Clustering so you can change the Clustering Options.3.)  Enter the AP location and the name of the cluster for it to join.4.)  Click Apply.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 120April 2015Appendix B - Conguration Examples5.)  Click Start Clustering to enable the clustering feature. After you refresh the page, other APs that are on the same bridged segment, have radios in the same operating mode, are enabled for clustering, and have the same cluster name appear in the Access Points table.6.)  Go to the Channel Management page to view the channel assignments.Figure 73 - Clustering APs by Using the Web Interface (Active)A table on the page displays the current channel assignments and the proposed channel assignments. The interval setting in the Advanced section determine how often proposed changes are applied.Clustering APs by Using the CLI1.)  Connect to the AP by using Telnet, SSH, or a serial connection.2.)  Stop clustering so you can change the location and cluster name.set cluster clustered 03.)  Set the AP Location.set cluster cluster-name “Room 214”Note: If the cluster name or cluster location has spaces, you must enclose the text in quotation marks when you enter the text in the CLI, as the command example shows. You do not need to use quotation marks when you enter text by using the Web UI.4.)  Set the cluster name.set cluster location MyCluster5.)  Start clustering.set cluster clustered 16.)  View information about the cluster settings on the AP.get cluster detail7.)  Start the automatic channel planner.set channel-planner status up8.)  View the settings for the automatic channel planner.get channel-planner detailClustering APs by Using SNMPCluster conguration by using SNMP is not supported.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 121April 2015Appendix B - Conguration ExamplesConguring Client QoS This example shows how to enable client QoS, congure an ACL and a DiffServ policy on the AP, and to apply the ACL and the Policy to trafc transmitted from clients associated with VAP 2 and received by the AP.The IPv4 ACL is named acl1 and contains two rules. The rst rule allows HTTP trafc from the 192.168.1.0 subnet. The second rule allows all IP trafc from the management station (192.168.1.23). All other trafc is denied due to the implicit deny all rule at the end of the ACL. The ACL is applied to the inbound interface on the AP so that packets are checked when the AP receives trafc from associated clients.The DiffServ policy in this example shows how to establish default DiffServ behavior for clients associating with the VAP that do not obtain a DiffServ policy name through the RADIUS server. Voice trafc (UDP packets) received from clients in the 192.168.1.0 subnet that has the VoIP server as its destination address (192.168.2.200), is marked with the IP DSCP value for expedited forwarding so that it takes priority over other trafc.Conguring QoS by Using the Web InterfaceACL Conguration1.)  Log onto the AP and navigate to the Client QoS > Client QoS ACL page.2.)  Enter acl1in the ACL Name eld, and click Add ACL.Figure 74 - Conguring QoS by Using the Web Interface (ACL Name)The screen refreshes, and additional elds appear.Figure 75 - Conguring QoS by Using the Web Interface (Rule1)3.)  From the Action menu, select Permit.4.)  Clear the Match Every option.5.)  Verify that the Protocol option is selected and IP is selected from the Select From List menu.6.)  Congure the remaining settings:•) Source IP Address: 192.168.1.0
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 122April 2015Appendix B - Conguration Examples•) Wild Card Mask: 0.0.0.255•) Source Port: Select the option•) Select From List (Source Port): www7.)  Click Apply to save the rule.Figure 76 - Conguring QoS by Using the Web Interface (Rule2)8.)  Select New Rule from the Rule menu and create another rule with the following settings:•) Action: Permit•) Match Every: Clear the option•) Protocol: IP•) Address: 192.168.1.23•) Wild Card Mask: 0.0.0.09.)  Click Apply to save the rule.10.)  Navigate to the Client QoS > VAP QoS Parameters page.Figure 77 - Conguring QoS by Using the Web Interface (VAP QoS Parameters)11.)  For the Client QoS Global Admin Mode option, select Enabled.12.)  From the VAP menu, select VAP 2.13.)  Select the Enabled option for Client QoS Mode.14.)  From the ACL Type Up menu, select IPv4.15.)  From the ACL Name Up menu, select acl1in.16.)  Click Apply to update the AP with the QoS settings.DiffServ Conguration
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 123April 2015Appendix B - Conguration Examples1.)  Log onto the AP and navigate to the Client QoS > Class Map page.Figure 78 - Conguring QoS by Using the Web Interface (Class Map Name)2.)  Enter class_voip in the Class Map Name eld and click Add Class Map.The page refreshes and additional elds appear. Figure 79 - Conguring QoS by Using the Web Interface (Rule)3.)  Select the Match Every option to indicate that all match criteria dened for the class must be satised in order for a packet to be considered a match.4.)  Select Protocol, and then select UDP from the Select From List eld to dene UDP as a match criteria. 5.)  Select Source IP Address and enter the following information: •) Address: 192.168.1.0•) Source IP Mask: 255.255.255.06.)  Select the Destination IP Address option and enter the following information for the VoIP server:•) Address: 192.168.2.200•) Destination IP Mask: 255.255.255.2557.)  Click Apply to save the match criteria.8.)  Navigate to the Client QoS > Policy Map page.Figure 80 - Congure Client QoS DiffServ Policy Map Settings (Policy Map Name)9.)  To create a policy, enter pol_voip into the Policy Map Name eld, and then click Add Policy Map.The page refreshes and additional elds appear.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 124April 2015Appendix B - Conguration ExamplesFigure 81 - Congure Client QoS DiffServ Policy Map Settings (Rule)10.)  For the class_voip Class Map, select the Mark IP Dscp option, and then select ef from the Select From List menu. 11.)  Trafc that meets the criteria dened in the class_voip class is marked with a DSCP value of EF (expedited forwarding).12.)  Click Apply to save the policy.13.)  Navigate to the Client QoS > VAP QoS Parameters page.Figure 82 - Congure Client QoS VAP Settings14.)  Select VAP 2 from the VAP menu.15.)  Make sure that the Client QoS Global Admin Mode and the QoS Mode are both enabled.16.)  From the DiffServ Policy Up menu, select pol_voip.17.)  Click Apply to update the AP with the QoS settings.Conguring QoS by Using the CLIACL Conguration1.)  Connect to the AP.2.)  Create an ACL named acl1.add acl acl1 acl-type ipv43.)  Add a rule to acl1 that allows HTTP trafc from the 192.168.1.0 subnet. add rule acl-name acl2 acl-type ipv4 action permit protocol ip src-ip 192.168.1.0 src-ip-mask 0.0.0.255 src-port http
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 125April 2015Appendix B - Conguration Examples4.)  Add another rule to acl1 that allows all trafc from the host with an IP address of 192.168.1.23. add rule acl-name acl2 acl-type ipv4 action permit protocol ip src-ip 192.168.1.23 src-ip-mask 0.0.0.05.)  Enable Client QoS on the AP.set client-qos mode up6.)  Enable Client QoS on VAP2set vap wlan0vap2 qos-mode up7.)  Apply acl1 to VAP2 in the inbound direction (from the client to the AP). set vap wlan0vap2 def-acl-up acl1 DiffServ Conguration1.)  Log onto the AP CLI.2.)  Create a class map named class_voip and congure it to match all UDP packets from the 192.168.1.0 network that have a destination IP address of 192.168.2.200 (the VoIP server). add class-map class_voip every yes protocol udp src-ip 192.168.1.0 src-ip-mask 255.255.255.0 dst-ip 192.168.2.200 dst-ip-mask 255.255.255.255 3.)  Add a policy map named pol_voip.add policy-map pol_voip4.)  Dene the pol_voip policy map by adding the class_voip class map and specifying that packets that match the class_voip criteria will be marked with a DSCP value of EF (expedited forwarding).add policy-attr policy-map-name pol_voip class-map-name class_voip mark-ip-dscp ef5.)  Enable Client QoS on the AP.set client-qos mode up6.)  Enable Client QoS on VAP2set vap wlan0vap2 qos-mode up7.)  Apply pol_voip to VAP2 in the inbound direction (from the client to the AP). set vap wlan0vap2 def-policy-up pol_voip Conguring QoS by Using SNMPACL Conguration1.)  Load the DLINK-WLAN-ACCESS-POINT-X600-MIB module.2.)  From the MIB tree, navigate to the objects in the apQos > apAclTable.3.)  Use the apQosAclStatus object to create a row entry with apQosAclName and apQosAclType as the indexes for apQosAclEntry.The new apQosAclEntry value includes the apQosAclType (1) followed by the number of characters in the name (4), and then the ASCII code for the name. In this example, acl1 is 97.99.108.49. The value to set is 4, which is Create and Go.4.)  Add a rule to acl1 that allows HTTP trafc from the 192.168.1.0 subnet. •) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.14.1.4.97.99.108.49.1 to set the apQosAclRuleStatus of Rule 1 to active (1)In the OID, the 14 (bold) is the sequence identier for the apQosAclRuleStatuss object, 1 is the ACL type, 4.97.99.108.49 is the ACL name (the number of characters followed by the ASCII code), and the nal 1 is the ACL rule number.•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.4.1.4.97.99.108.49.1 to set the apQosAclRuleSrcIpAddress to a value of 192.168.1.0.•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.5.1.4.97.99.108.49.1 to set the apQosAclRuleSrcIpMask to a value of 0.0.0.255.•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.3.1.4.97.99.108.49.1 to set apQosAclRuleProtocol to a value of 80 (HTTP).•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.16.1.4.97.99.108.49.1 to set apQosAclRuleCommit to a value of 1 (true), which saves the rule.5.)  Add another rule to acl1 that allows all trafc from the host with an IP address of 192.168.1.23. •) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.14.1.4.97.99.108.49.2 to set the apQosAclRuleStatus of Rule 2 to active (1)•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.4.1.4.97.99.108.49.2 to set the apQosAclRuleSrcIpAddress to a value of 192.168.1.23.•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.5.1.4.97.99.108.49.2 to set the apQosAclRuleSrcIpMask to a value of 0.0.0.0.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 126April 2015Appendix B - Conguration Examples•) Use 1.3.6.1.4.1.171.10.128.1.1.26.10.3.1.16.1.4.97.99.108.49.2 to set apQosAclRuleCommit to a value of 1 (true), which saves the rule.6.)  Use the apQosGlobalMode object to set the status to up (1), which enables Client QoS on the AP.7.)  Walk the apVapDescription object to view the instance ID for VAP 2 (wlan0vap2).VAP 2 on Radio 1 is instance 5.8.)  Use the apVapQosMode object to set the status of VAP 2 to up (1).9.)  Use the apVapAclUp object to apply acl1 to VAP2 in the inbound direction (from the client to the AP). The ACL name is the text string, and not the ASCII code.DiffServ Conguration1.)  Load the DLINK-WLAN-ACCESS-POINT-X600-MIB module.2.)  From the MIB tree, navigate to the objects in the apQos > apAclTable.3.)  Use the apQosDsClassMapStatus object to set the status of the class map named class_voip to Create and Go (4).The OID to set is 1.3.6.1.4.1.171.10.128.1.1.26.10.4.1.3.10.99.108.97.115.115.95.118.111.105.112, where 10 is the number of characters, and 99.108.97.115.115.95.118.111.105.112 is class_voip in ASCII code.4.)  Congure class_voip to match all UDP packets from the 192.168.1.0 network that have a destination IP address of 192.168.2.200 (the VoIP server). •) Set apQosDsClassMapMatchEvery to true (1).•) Set apQosDsClassMapMatchProtocol to UDP (17).•) Set apQosDsClassMapMatchSrcIpAddress to 192.168.1.0.•) Set apQosDsClassMapMatchSrcIpMask to 255.255.255.0.•) Set apQosDsClassMapMatchDestIpAddress to 192.168.2.200.•) Set apQosDsClassMapMatchDestIpMask to 255.255.255.255•) Set apQosDsClassMapMatchCommit to true (1).5.)  Create a policy map named pol_voip (which is 112.111.108.95.118.111.105.112 in ASCII) by setting the value of the OID 1.3.6.1.4.1.171.10.128.1.1.26.10.5.1.2.8.112.111.108.95.118.111.105.112 to Create and Go (4).6.)  Dene the pol_voip policy map by adding the class_voip class map and specifying that packets that match the class_voip criteria will be marked with a DSCP value of EF (expedited forwarding).•) Set apQosDsPolicyMapAttrStatus.8.112.111.108.95.118.111.105.112.10.99.108.97.115.115.95.118.111.105.112.1 to a value of 4 (Create and Go)•) Set apQosDsPolicyMapAttrMarkIpDscp.8.112.111.108.95.118.111.105.112.10.99.108.97.115.115.95.118.111.105. 112.1 to 46 (which is the equivalent of ef).7.)  Enable Client QoS on the AP.set client-qos mode up8.)  Use the apQosGlobalMode object to set the status to up (1), which enables Client QoS on the AP.9.)  Walk the apVapDescription object to view the instance ID for VAP 2 (wlan0vap2).VAP 2 on Radio 1 is instance 5.10.)  Use the apVapQosMode object to set the status of VAP 2 to up (1).11.)  Use the apVapPolUp object to apply pol_voip to VAP2 in the inbound direction (from the client to the AP). The policy name is the text string, and not the ASCII code.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 127April 2015Appendix C - DWL-6700AP Prole and Conguration TableAppendix C - DWL-6700AP Prole and Conguration TableDWL-6700AP  doesn’t  support  some  features  like,  IEEE  802.1X  Authentication,  CLI  command  (no  console  port supported), TSPEC etc…, details please see the following table. Radio Conguration DWL-6700AP DWL-6600APRadio mode Yes YesRadio conguration state Yes YesRTS threshold Yes YesLoad Balancing NO YesLoad Utilization NO YesMaximum Clients Yes YesRF Scan Other Channels NO YesRF Scan Sentry NO YesMode Yes YesDTIM Period Yes YesBeacon Interval Yes YesAutomatic Channel Yes YesAutomatic Power Yes YesInitial Power Yes YesAPSD mode NO YesRF Scan Interval (secs) Yes YesFrag Threshold (bytes) Yes YesRF Scan Sentry Channels NO Yes Radio Conguration DWL-6700AP DWL-6600APShort Retries NO YesRF Scan Duration (msecs) Yes YesLong Retries NO YesRate Limiting NO YesTransmit Lifetime (msecs) NO YesRate Limit (pkts/sec) NO YesReceive Lifetime (msecs) NO YesRate Limit Burst (pkts/sec) NO YesStation Isolation Yes YesChannel Bandwidth Yes YesPrimary Channel Yes YesProtection Yes YesShort Guard Interval Yes YesSpace Time Block Code NO YesRadio Resource Management NO YesNO ack NO YesMulticast TX rate (Mbps) Yes Yes Network Conguration DWL-6700AP DWL-6600APSSID Yes YesHide SSID Yes YesIgnore Broadcst Yes YesVLAN Yes Yes
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 128April 2015Appendix C - DWL-6700AP Prole and Conguration TableMAC Authentication Yes YesRedirect NO YesRedirect URL NO YesWireless ARP Suppression Mode NO YesL2 Distributed Tunneling Mode NO YesRADIUS Autentication Server Name NO YesRADIUS Autentication Server Status NO N/ARADIUS Accounting Server Name NO YesRADIUS Accounting Server Status NO N/ARADIUS Use Network Conguraiton NO YesRADIUS Accounting NO YesSecurity Yes YesWPA Versions Yes YesWPA Ciphers Yes Yes Network Conguration DWL-6700AP DWL-6600APWPA Key Type Yes YesWPA Key Yes YesBcast Key Refresh Rate (seconds) NO Yes WDS Conguration DWL-6700AP DWL-6600APACK Timer Value (Standalone mode) Yes NO Others DWL-6700AP DWL-6600APTurn Off all LEDs via GUI (Standalone mode) Yes NO
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 129April 2015Appendix D - StatementsAppendix D - StatementsFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:  - Reorient or relocate the receiving antenna.  - Increase the separation between the equipment and receiver.  -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.  - Consult the dealer or an experienced radio/TV technician for help.FCC Caution: Any changes or modications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE:Radiation Exposure Statement:This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Country Code selection feature to be disabled for products marketed to the US/CANADAProfessional installation instructionPlease be advised that due to the unique function supplied by this product, the device is intended for use with our interactive entertainment software and licensed third-party only. The product will be distributed through controlled distribution channel and installed by trained professional and will not be sold directly to the general public through retail store.1. Installation personal      This product is designed for specic application and needs to be installed by a qualied personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting.2. Installation location      The product shall be installed at a location where the radiating antenna can be kept 20cm from nearby person in normal operation condition to meet regulatory RF exposure requirement.3. External antenna      Use only the antennas which have been approved by the applicant. The non-approved antenna(s) may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC/IC limit and is prohibited.4. Installation procedure     Please refer to user’s manual for the detail.5. Warning      Please carefully select the installation position and make sure that the nal output power does not exceed the limit set force in relevant rules. The violation of the rule could lead to serious federal penalty. Industry Canada statementThis device complies with Industry Canada’s licence-exempt RSSs. Operation is subject to the following two conditions: (1) This device may not cause interference; and (2) This device must accept any interference, including interference that may cause undesired operation of the device. Cet appareil est conforme aux CNR exemptes de licence d’Industrie Canada. Son fonctionnement est soumis
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 130April 2015Appendix D - Statementsaux deux conditions suivantes:(1) Ce dispositif ne peut causer d’interférences; et(2) Ce dispositif doit accepter toute interférence, y compris les interférences qui peuvent causer un mauvais fonctionnement de l’appareil.Caution:(i) the maximum antenna gain permitted for devices in the bands 5250-5350 MHz and 5470-5725 MHz shall comply with the e.i.r.p. limit; and(ii) the maximum antenna gain permitted for devices in the band 5725-5825 MHz shall comply with the e.i.r.p. limits specied for point-to-point and non point-to-point operation as appropriate.(iii) Users should also be advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.Avertissement:(i) le gain maximal d’antenne permis pour les dispositifs utilisant les bandes 5 250-5 350 MHz et 5 470-5 725 MHz doit se conformer à la limite de p.i.r.e.;(ii) le gain maximal d’antenne permis (pour les dispositifs utilisant la bande 5 725-5 825 MHz) doit se conformer à la limite de p.i.r.e. spéciée pour l’exploitation point à point et non point à point, selon le cas.(iii) De plus, les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu’ils ont la priorité) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.Radiation Exposure Statement:This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.Déclaration d’exposition aux radiations:Cet équipement est conforme aux limites d’exposition aux rayonnements IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps.Instructions d’installation professionnelleVeuillez noter que l’appareil etant dedie a une fonction unique, il doit etre utilise avec notre logiciel proprietaire de divertissement interactif . Ce produit sera propose par un reseau de distribution controle et installe par des professionels; il ne sera pas propose au grand public par le reseau de la grande distribution.1. Installation      Ce produit est destine a un usage specique et doit etre installe par un personnel qualie maitrisant les radiofrequences et les regles s’y rapportant. L’installation et les reglages ne doivent pas etre modies par l’utilisateur nal.2. Emplacement d’installation     En usage normal, an de respecter les exigences reglementaires concernant l’exposition aux radiofrequences, ce produit doit etre installe de facon a respecter une distance de 20 cm entre l’antenne emettrice et les personnes.3. Antenn externe.     Utiliser uniiquement les antennes approuvees par le fabricant. L’utilisation d’autres antennes peut conduire a un niveau de rayonnement essentiel ou non essentiel depassant les niveaux limites denis par FCC/IC, ce qui est interdit.4. Procedure d’installation    Consulter le manuel d’utilisation.5. Avertissement     Choisir avec soin la position d’installation et s’assurer que la puissance de sortie ne depasse pas les limites en vigueur. La violation de cette regle peut conduire a de serieuses penalites federales.
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 131April 2015Appendix D - StatementsDWL-6700APNCC警語:電磁波曝露量MPE標準值(MPE) 1mW/cm2,送測產品實值為0.178mW/cm2經型式認證合格之低功率射頻電機,非經許可,公司,商號或使用者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。 低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。無線傳輸設備 (UNII) 無線資訊傳輸設備忍受合法通信之干擾且不得干擾合法通信;如造成干擾,應立即停用,俟無干擾之虞,始得繼續使用。 無線資訊傳設備的製造廠商應確保頻率穩定性,如依製造廠商使用手冊上所述正常操作,發射的信號應維持於操作頻帶中。 本器材須經專業工程人員安裝及設定,始得設置使用,且不得直接販售給一般消費者CE Mark Warning:This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.DWL-2600APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. It can also be turned off through a power switch to save energy when it is not needed.Network Standby: 2.68 wattsSwitched Off: 0.19 wattsDWL-3600APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. If it is not needed during certain periods of time, it can be unplugged to save energy.Network Standby: 6.4 wattsConducted power for each antenna (dBm)Mode Saw Filter Source 1 211b, 1TX 24.76 24.9011b, 2TX 26.48 26.5311g, 1TX 29.03 29.3011g, 2TX 29.80 29.98HT20 29.90 29.93HT40 29.58 29.6811a, 1TX 25.52 25.5211a, 2TX 27.12 27.12HT20 26.84 26.84HT40 26.79 26.79
Unied Access Point Administrator’s GuideUnied Access Point Administrator’s GuidePage 132April 2015Appendix D - StatementsDWL-6600APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. If it is not needed during certain periods of time, it can be unplugged to save energy.Network Standby: 7.8 wattsDWL-6610APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. It can also be turned off through a power switch to save energy when it is not needed.Network Standby: 8.73 wattsSwitched Off: 0.35 wattsDWL-6700APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. If it is not needed during certain periods of time, it can be unplugged to save energy.Network Standby: 3.90 wattsDWL-8600APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. If it is not needed during certain periods of time, it can be unplugged to save energy.Network Standby: 8.3 watts DWL-8610APPower UsageThis device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. If it is not needed during certain periods of time, it can be unplugged to save energy.Network Standby: 12.94W watts

Navigation menu