Extreme Networks AP3917E Wireless 802.11 a/ac+b/g/n Access Point User Manual ExtremeWireless V10 41 06 User Guide
Extreme Networks, Inc. Wireless 802.11 a/ac+b/g/n Access Point ExtremeWireless V10 41 06 User Guide
Contents
- 1. User Manual-AP3917e
- 2. User Manual-AP7662
- 3. User Manual-AP3917e R1
- 4. User Manual-AP7662 R1
- 5. WiNG 5.9.1 System Reference Guide Part 1
- 6. WiNG 5.9.1 System Reference Guide Part 2
- 7. WiNG 5.9.1 System Reference Guide Part 3
- 8. WiNG 5.9.1 System Reference Guide Part 4
- 9. WiNG 5.9.1 CLI Reference Guide Part 1
- 10. WiNG 5.9.1 CLI Reference Guide Part 2
- 11. Extreme Wireless V10.41.06 User Guide Part 1
- 12. AP3917 User Manual
- 13. AP7662 User Manual
Extreme Wireless V10.41.06 User Guide Part 1
™ ft ra ExtremeWireless V10.41.06 User Guide 9035198-03-REV01 Published April 2018 Copyright © 2018 Extreme Networks, Inc. All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and other information contained in this document and its website without prior notice. The reader should in all cases consult representatives of Extreme Networks to determine whether any such changes have been made. The hardware, firmware, software or any specifications described or referred to in this document are subject to change without notice. Trademarks ft ra Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names (including any product names) mentioned in this document are the property of their respective owners and may be trademarks or registered trademarks of their respective companies/owners. For additional information on Extreme Networks trademarks, please see: www.extremenetworks.com/company/legal/trademarks Software Licensing Some software files have been licensed under certain open source or third-party licenses. Enduser license agreements and open source declarations can be found at: www.extremenetworks.com/support/policies/software-licensing Support For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408 (toll-free in U.S. and Canada) or +1-408-579-2826. For the support phone number in other countries, visit: http://www.extremenetworks.com/support/contact/ For product documentation online, visit: https://www.extremenetworks.com/documentation/ Table of Contents Preface......................................................................................................................................... 7 Text Conventions................................................................................................................................................................... 7 Safety Information................................................................................................................................................................ 7 Sicherheitshinweise..............................................................................................................................................................8 Consignes De Sécurité....................................................................................................................................................... 9 Providing Feedback to Us...............................................................................................................................................10 Getting Help............................................................................................................................................................................ 11 Extreme Networks Documentation............................................................................................................................. 11 Chapter 1: About This Guide................................................................................................... 12 Who Should Use This Guide...........................................................................................................................................12 How to Use This Guide......................................................................................................................................................12 Chapter 2: Overview of the ExtremeWireless Solution...................................................... 14 ft ra Introduction............................................................................................................................................................................14 Conventional Wireless LANs.......................................................................................................................................... 15 Elements of the ExtremeWireless Solution.............................................................................................................15 ExtremeWireless and Your Network.......................................................................................................................... 19 ExtremeWireless Appliance Product Family.........................................................................................................29 Chapter 3: Configuring the ExtremeWireless Appliance....................................................31 System Configuration Overview...................................................................................................................................31 Logging on to the ExtremeWireless Appliance...................................................................................................33 Wireless Assistant Home Screen................................................................................................................................ 34 Working with the Basic Installation Wizard.......................................................................................................... 39 Configuring the ExtremeWireless Appliance for the First Time................................................................. 45 Using a Third-party Location-based Solution...................................................................................................... 95 Additional Ongoing Operations of the System................................................................................................... 99 Chapter 4: Configuring the ExtremeWireless APs.............................................................101 Wireless AP Overview..................................................................................................................................................... 101 Discovery and Registration..........................................................................................................................................120 Viewing a List of All APs................................................................................................................................................125 Wireless AP Default Configuration...........................................................................................................................134 Configuring Wireless AP Properties........................................................................................................................ 156 Outdoor Access Point Installation............................................................................................................................ 167 Assigning Wireless AP Radios to a VNS............................................................................................................... 168 Configuring Wireless AP Radio Properties...........................................................................................................174 Configuring IoT Applications...................................................................................................................................... 189 Setting Up the Wireless AP Using Static Configuration................................................................................ 199 Setting Up 802.1x Authentication for a Wireless AP......................................................................................203 Configuring Co-Located APs in Load Balance Groups.................................................................................. 213 Configuring an AP Cluster...........................................................................................................................................220 Configuring an AP as a Guardian.............................................................................................................................. 221 Configuring a Captive Portal on an AP................................................................................................................. 222 AP3916ic Integrated Camera Deployment.......................................................................................................... 226 Performing AP Software Maintenance.................................................................................................................. 235 Understanding the ExtremeWireless LED Status............................................................................................ 242 ExtremeWireless™ V10.41.06 User Guide Table of Contents Chapter 5: Configuring Topologies.....................................................................................262 Topology Overview......................................................................................................................................................... 262 Configuring the Admin Port....................................................................................................................................... 263 Configuring a Basic Data Port Topology..............................................................................................................266 Creating a Topology Group........................................................................................................................................ 270 Edit or Delete a Topology Group...............................................................................................................................271 Enabling Management Traffic.................................................................................................................................... 272 Layer 3 Configuration.................................................................................................................................................... 272 Exception Filtering.......................................................................................................................................................... 278 Multicast Filtering..............................................................................................................................................................281 Chapter 6: Configuring Roles.............................................................................................. 284 Roles Overview................................................................................................................................................................. 284 Configuring Default VLAN and Class of Service for a Role........................................................................284 Policy Rules.........................................................................................................................................................................288 Chapter 7: Configuring WLAN Services..............................................................................318 ft ra WLAN Services Overview.............................................................................................................................................318 Third-party AP WLAN Service Type....................................................................................................................... 319 Configuring a Basic WLAN Service......................................................................................................................... 319 Configuring Privacy.........................................................................................................................................................327 Configuring Accounting and Authentication.....................................................................................................334 Configuring QoS Modes............................................................................................................................................... 370 Configuring Hotspots.................................................................................................................................................... 376 Chapter 8: Configuring a VNS............................................................................................. 390 Configuring a VNS.......................................................................................................................................................... 390 VNS Global Settings....................................................................................................................................................... 392 Methods for Configuring a VNS............................................................................................................................... 423 Manually Creating a VNS............................................................................................................................................. 423 Creating a VNS Using the Wizard........................................................................................................................... 426 Enabling and Disabling a VNS...................................................................................................................................485 Renaming a VNS..............................................................................................................................................................486 Deleting a VNS................................................................................................................................................................. 486 Chapter 9: Configuring Classes of Service........................................................................ 487 Classes of Service Overview...................................................................................................................................... 487 Configuring Classes of Service................................................................................................................................. 487 CoS Rule Classification.................................................................................................................................................490 Priority and ToS/DSCP Marking................................................................................................................................ 491 Rate Limiting......................................................................................................................................................................492 Chapter 10: Configuring Sites............................................................................................. 494 VNS Sites Overview....................................................................................................................................................... 494 Configuring Sites............................................................................................................................................................. 494 Recommended Deployment Guidelines...............................................................................................................495 Radius Configuration..................................................................................................................................................... 499 Selecting AP Assignments......................................................................................................................................... 500 Selecting WLAN Assignments...................................................................................................................................501 Chapter 11: Working with a Mesh Network........................................................................ 502 About Mesh........................................................................................................................................................................ 502 ExtremeWireless™ V10.41.06 User Guide Table of Contents Simple Mesh Configuration.........................................................................................................................................502 Wireless Repeater Configuration.............................................................................................................................503 Wireless Bridge Configuration..................................................................................................................................504 Examples of Deployment............................................................................................................................................ 505 Mesh WLAN Services.................................................................................................................................................... 505 Key Features of Mesh.................................................................................................................................................... 509 Deploying the Mesh System......................................................................................................................................... 511 Changing the Pre-shared Key in a Mesh WLAN Service............................................................................... 517 Chapter 12: Working with a Wireless Distribution System...............................................518 ft ra About WDS..........................................................................................................................................................................518 Simple WDS Configuration.......................................................................................................................................... 518 Wireless Repeater Configuration.............................................................................................................................. 519 Wireless Bridge Configuration.................................................................................................................................. 520 Examples of Deployment.............................................................................................................................................. 521 WDS WLAN Services...................................................................................................................................................... 521 Key Features of WDS.....................................................................................................................................................525 Deploying the WDS System....................................................................................................................................... 528 Changing the Pre-shared Key in a WDS WLAN Service.............................................................................. 536 Chapter 13: Availability and Session Availability.............................................................. 537 Availability........................................................................................................................................................................... 537 Session Availability..........................................................................................................................................................545 Viewing SLP Activity......................................................................................................................................................553 Chapter 14: Configuring Mobility........................................................................................ 555 Mobility Overview............................................................................................................................................................ 555 Mobility Domain Topologies....................................................................................................................................... 556 Configuring a Mobility Domain................................................................................................................................. 558 Chapter 15: Working with Third-party APs.........................................................................561 Defining Authentication by Captive Portal for the Third-party AP WLAN Service......................... 561 Defining the Third-party APs List............................................................................................................................. 561 Defining Policy Rules for the Third-party APs....................................................................................................561 Chapter 16: Working with ExtremeWireless Radar.......................................................... 563 Radar Overview................................................................................................................................................................ 563 Radar Components.........................................................................................................................................................564 Radar License Requirements..................................................................................................................................... 565 Enabling the Analysis Engine.....................................................................................................................................565 Radar Scan Profiles.........................................................................................................................................................566 AirDefense Profile............................................................................................................................................................567 Viewing Existing Radar Profiles................................................................................................................................. 571 Adding a New Radar Profile....................................................................................................................................... 573 Configuring an In-Service Scan Profile..................................................................................................................574 Configuring a Guardian Scan Profile...................................................................................................................... 577 Assigning an AP to a Profile........................................................................................................................................ 581 Viewing the List of Assigned APs.............................................................................................................................581 Maintaining the Radar List of APs........................................................................................................................... 582 Working with Radar Reports..................................................................................................................................... 593 Chapter 17: Working with Location Engine....................................................................... 605 Location Engine Overview..........................................................................................................................................605 ExtremeWireless™ V10.41.06 User Guide Table of Contents Location Engine on the Controller..........................................................................................................................607 Deploying APs for Location Aware Services..................................................................................................... 608 Configuring the Location Engine............................................................................................................................ 609 ExtremeLocation Support............................................................................................................................................ 619 Chapter 18: Working with Reports and Statistics..............................................................621 Application Visibility and Device ID.........................................................................................................................621 Viewing AP Reports and Statistics..........................................................................................................................627 Available Client Reports............................................................................................................................................... 642 Viewing Role Filter Statistics..................................................................................................................................... 646 Viewing Topology Reports......................................................................................................................................... 648 Viewing Mobility Reports............................................................................................................................................ 650 Viewing Controller Status Information..................................................................................................................654 Viewing Routing Protocol Reports..........................................................................................................................657 Viewing RADIUS Reports............................................................................................................................................660 Call Detail Records (CDRs)......................................................................................................................................... 663 Chapter 19: Performing System Administration................................................................669 ft ra Performing Wireless AP Client Management.................................................................................................... 669 Defining Wireless Assistant Administrators and Login Groups................................................................ 673 Chapter 20: Logs, Traces, Audits and DHCP Messages................................................... 676 ExtremeWireless Appliance Messages..................................................................................................................676 Working with Logs..........................................................................................................................................................676 Viewing Wireless AP Traces....................................................................................................................................... 684 Viewing Audit Messages..............................................................................................................................................684 Viewing the DHCP Messages.....................................................................................................................................685 Viewing the NTP Messages........................................................................................................................................ 686 Viewing Software Upgrade Messages...................................................................................................................687 Viewing Configuration Restore/Import Messages.......................................................................................... 689 Chapter 21: Working with GuestPortal Administration................................................... 690 About GuestPortals........................................................................................................................................................690 Adding New Guest Accounts....................................................................................................................................690 Enabling or Disabling Guest Accounts................................................................................................................. 693 Editing Guest Accounts................................................................................................................................................693 Removing Guest Accounts......................................................................................................................................... 694 Importing and Exporting a Guest File...................................................................................................................695 Viewing and Printing a GuestPortal Account Ticket......................................................................................698 Working with the Guest Portal Ticket Page.......................................................................................................700 Configuring Guest Password Patterns................................................................................................................... 701 Configuring Web Session Timeouts....................................................................................................................... 704 Appendix A: Regulatory Information................................................................................. 705 ExtremeWireless APs 37XX , 38XX, and 39XX................................................................................................. 705 Appendix B: Default GuestPortal Ticket Page.................................................................. 706 Example Ticket Page..................................................................................................................................................... 706 Glossary.........................................................................................................................................709 ExtremeWireless™ V10.41.06 User Guide Preface This section discusses the conventions used in this guide, ways to provide feedback, additional help, and other Extreme Networks publications. Text Conventions The following tables list text conventions that are used throughout this guide. Table 1: Notice Icons Icon Notice Type Alerts you to... General Notice Helpful tips and notices for using the product. Note Important features or instructions. ft ra New! Caution Risk of personal injury, system damage, or loss of data. Warning Risk of severe personal injury. New Content Displayed next to new content. This is searchable text within the PDF. Table 2: Text Conventions Convention Description Screen displays This typeface indicates command syntax, or represents information as it appears on the screen. The words enter and type When you see the word “enter” in this guide, you must type something, and then press the Return or Enter key. Do not press the Return or Enter key when an instruction simply says “type.” [Key] names Key names are written with brackets, such as [Return] or [Esc]. If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example: Press [Ctrl]+[Alt]+[Del] Words in italicized type Italics emphasize a point or denote new terms at the place where they are defined in the text. Italics are also used when referring to publication titles. Safety Information Dangers • • Replace the power cable immediately if it shows any sign of damage. Replace any damaged safety equipment (covers, labels and protective cables) immediately. ExtremeWireless™ V10.41.06 User Guide Preface • • Use only original accessories or components approved for the system. Failure to observe these instructions may damage the equipment or even violate safety and EMC regulations. Only authorized Extreme Networks service personnel are permitted to service the system. Warnings • • • • This device must not be connected to a LAN segment with outdoor wiring. Ensure that all cables are run correctly to avoid strain. Replace the power supply adapter immediately if it shows any sign of damage. Disconnect all power before working near power supplies unless otherwise instructed by a maintenance procedure. • Exercise caution when servicing hot swappable components: power supplies or fans. Rotating fans can cause serious personal injury. This unit may have more than one power supply cord. To avoid electrical shock, disconnect all power supply cords before servicing. In the case of unit failure of one of the power supply modules, the module can be replaced without interruption of power to the ExtremeWireless Appliance. However, this procedure must be carried out with caution. Wear gloves to avoid contact with the module, which will be extremely hot. • ft ra • • • There is a risk of explosion if a lithium battery is not correctly replaced. The lithium battery must be replaced only by an identical battery or one recommended by the manufacturer. Always dispose of lithium batteries properly. Do not attempt to lift objects that you think are too heavy for you. Cautions • • • • Check the nominal voltage set for the equipment (operating instructions and type plate). High voltages capable of causing shock are used in this equipment. Exercise caution when measuring high voltages and when servicing cards, panels, and boards while the system is powered on. Only use tools and equipment that are in perfect condition. Do not use equipment with visible damage. To protect electrostatic sensitive devices (ESD), wear a wristband before carrying out any work on hardware. Lay cables so as to prevent any risk of them being damaged or causing accidents, such as tripping. Sicherheitshinweise Gefahrenhinweise • • Sollte das Netzkabel Anzeichen von Beschädigungen aufweisen, tauschen Sie es sofort aus. • Tauschen Sie beschädigte Sicherheitsausrüstungen (Abdeckungen, Typenschilder und Schutzkabel) sofort aus. Verwenden Sie ausschließlich Originalzubehör oder systemspezifisch zugelassene Komponenten. Die Nichtbeachtung dieser Hinweise kann zur Beschädigung der Ausrüstung oder zur Verletzung von Sicherheits- und EMV-Vorschriften führen. • Das System darf nur von autorisiertem Extreme Networks-Servicepersonal gewartet werden. ExtremeWireless™ V10.41.06 User Guide Preface Warnhinweise • • • • • • • Dieses Gerät darf nicht über Außenverdrahtung an ein LAN-Segment angeschlossen werden. Stellen Sie sicher, dass alle Kabel korrekt geführt werden, um Zugbelastung zu vermeiden. Sollte das Netzteil Anzeichen von Beschädigung aufweisen, tauschen Sie es sofort aus. Trennen Sie alle Stromverbindungen, bevor Sie Arbeiten im Bereich der Stromversorgung vornehmen, sofern dies nicht für eine Wartungsprozedur anders verlangt wird. Gehen Sie vorsichtig vor, wenn Sie an Hotswap-fähigen Wireless Controller-Komponenten (Stromversorgungen oder Lüftern) Servicearbeiten durchführen. Rotierende Lüfter können ernsthafte Verletzungen verursachen. Dieses Gerät ist möglicherweise über mehr als ein Netzkabel angeschlossen. Um die Gefahr eines elektrischen Schlages zu vermeiden, sollten Sie vor Durchführung von Servicearbeiten alle Netzkabel trennen. Falls eines der Stromversorgungsmodule ausfällt, kann es ausgetauscht werden, ohne die Stromversorgung zum Wireless Controller zu unterbrechen. Bei dieser Prozedur ist jedoch mit Vorsicht vorzugehen. Das Modul kann extrem heiß sein. Tragen Sie Handschuhe, um Verbrennungen zu vermeiden. ft ra Bei unsachgemäßem Austausch der Lithium-Batterie besteht Explosionsgefahr. Die Lithium-Batterie darf nur durch identische oder vom Händler empfohlene Typen ersetzt werden. Achten Sie bei Lithium-Batterien auf die ordnungsgemäße Entsorgung. • • Versuchen Sie niemals, ohne Hilfe schwere Gegenstände zu heben. Vorsichtshinweise • Überprüfen Sie die für die Ausrüstung festgelegte Nennspannung (Bedienungsanleitung und Typenschild). Diese Ausrüstung arbeitet mit Hochspannung, die mit der Gefahr eines elektrischen Schlages verbunden ist. Gehen Sie mit großer Vorsicht vor, wenn Sie bei eingeschaltetem System Hochspannungen messen oder Karten, Schalttafeln und Baugruppen warten. • Verwenden Sie nur Werkzeuge und Ausrüstung in einwandfreiem Zustand. Verwenden Sie keine Ausrüstung mit sichtbaren Beschädigungen. Tragen Sie bei Arbeiten an Hardwarekomponenten ein Armband, um elektrostatisch gefährdete Bauelemente (EGB) vor Beschädigungen zu schützen. • • Verlegen Sie Leitungen so, dass sie keine Unfallquelle (Stolpergefahr) bilden und nicht beschädigt werden. Consignes De Sécurité Dangers • • Si le cordon de raccordement au secteur est endommagé, remplacez-le immédiatement. • Remplacez sans délai les équipements de sécurité endommagés (caches, étiquettes et conducteurs de protection). Utilisez uniquement les accessoires d'origine ou les modules agréés spécifiques au système. Dans le cas contraire, vous risquez d'endommager l'installation ou d'enfreindre les consignes en matière de sécurité et de compatibilité électromagnétique. • Seul le personnel de service Extreme Networks est autorisé à maintenir/réparer le système. ExtremeWireless™ V10.41.06 User Guide Preface Avertissements • • • • Cet appareil ne doit pas être connecté à un segment de LAN à l'aide d'un câblage extérieur. • Prenez toutes les précautions nécessaires lors de l'entretien/réparations des modules du Wireless Controller pouvant être branchés à chaud : alimentations électriques ou ventilateurs.Les ventilateurs rotatifs peuvent provoquer des blessures graves. Cette unité peut avoir plusieurs cordons d'alimentation.Pour éviter tout choc électrique, débranchez tous les cordons d'alimentation avant de procéder à la maintenance.En cas de panne d'un des modules d'alimentation, le module défectueux peut être changé sans éteindre le Wireless Controller. Toutefois, ce remplacement doit être effectué avec précautions. Portez des gants pour éviter de toucher le module qui peut être très chaud. • • Vérifiez que tous les câbles fonctionnent correctement pour éviter une contrainte excessive. Si l'adaptateur d'alimentation présente des dommages, remplacez-le immédiatement. Coupez toujours l'alimentation avant de travailler sur les alimentations électriques, sauf si la procédure de maintenance mentionne le contraire. Le remplacement non conforme de la batterie au lithium peut provoquer une explosion. Remplacez la batterie au lithium par un modèle identique ou par un modèle recommandé par le revendeur. ft ra • • Sa mise au rebut doit être conforme aux prescriptions en vigueur. N'essayez jamais de soulever des objets qui risquent d'être trop lourds pour vous. Précautions • Contrôlez la tension nominale paramétrée sur l'installation (voir le mode d'emploi et la plaque signalétique). Des tensions élevées pouvant entraîner des chocs électriques sont utilisées dans cet équipement. Lorsque le système est sous tension, prenez toutes les précautions nécessaires lors de la mesure des hautes tensions et de l'entretien/réparation des cartes, des panneaux, des plaques. • N'utilisez que des appareils et des outils en parfait état. Ne mettez jamais en service des appareils présentant des dommages visibles. Pour protéger les dispositifs sensibles à l'électricité statique, portez un bracelet antistatique lors du travail sur le matériel. • • Acheminez les câbles de manière à ce qu'ils ne puissent pas être endommagés et qu'ils ne constituent pas une source de danger (par exemple, en provoquant la chute de personnes). Providing Feedback to Us We are always striving to improve our documentation and help you work better, so we want to hear from you! We welcome all feedback but especially want to know about: • Content errors or confusing or conflicting information. • • Ideas for improvements to our documentation so you can find the information you need faster. Broken links or usability issues. If you would like to provide feedback to the Extreme Networks Information Development team about this document, please contact us using our short online feedback form. You can also email us directly at internalinfodev@extremenetworks.com. ExtremeWireless™ V10.41.06 User Guide 10 Preface Getting Help If you require assistance, contact Extreme Networks using one of the following methods: • GTAC (Global Technical Assistance Center) for Immediate Support • Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support phone number in your country, visit: www.extremenetworks.com/support/contact • Email: support@extremenetworks.com. To expedite your message, enter the product name or model number in the subject line. • • Extreme Portal — Search the GTAC knowledge base, manage support cases and service contracts, download software, and obtain product licensing, training, and certifications. The Hub — A forum for Extreme customers to connect with one another, answer questions, and share ideas and feedback. This community is monitored by Extreme Networks employees, but is not intended to replace specific guidance from GTAC. Before contacting Extreme Networks for technical support, have the following information ready: • ft ra Your Extreme Networks service contract number and/or serial numbers for all involved Extreme Networks products • • • A description of the failure A description of any action(s) already taken to resolve the problem • • Network load at the time of trouble (if known) The device history (for example, if you have returned the device before, or if this is a recurring problem) Any related RMA (Return Material Authorization) numbers • A description of your network environment (such as layout, cable type, other relevant environmental information) Extreme Networks Documentation To find Extreme Networks product guides, visit our documentation pages at: Current Product Documentation www.extremenetworks.com/documentation/ Archived Documentation (for earlier versions and legacy products) www.extremenetworks.com/support/documentation-archives/ Release Notes www.extremenetworks.com/support/release-notes Open Source Declarations Some software files have been licensed under certain open source licenses. More information is available at: www.extremenetworks.com/support/policies/software-licensing. ExtremeWireless™ V10.41.06 User Guide 11 1 About This Guide Who Should Use This Guide How to Use This Guide This guide describes how to install, configure, and manage the Extreme Networks ExtremeWireless software. This guide is also available as an online help system. To access the online help, click Help in the ExtremeWireless Assistant top menu bar. Who Should Use This Guide This guide is a reference for system administrators who install and manage the ExtremeWireless system. ft ra Any administrator performing tasks described in this guide must have an account with administrative privileges. How to Use This Guide To locate information about various subjects in this guide, refer to the following table. For... Refer to... An overview of the product, its features and functionality. Overview of the ExtremeWireless Solution on page 14 Information about how to perform the installation, first time setup Configuring the ExtremeWireless Appliance on and configuration of the controller, as well as configuring the data page 31 ports and defining routing. Information on how to install the ExtremeWireless AP, how it discovers and registers with the controller, and how to view and modify radio configuration. Configuring the ExtremeWireless APs on page 101 An overview of topologies and provides detailed information about how to configure them. Configuring Topologies on page 262 An overview of roles and provides detailed information about how to configure them. Configuring Roles on page 284 An overview of WLAN (Wireless Local Area Network) services and provides detailed information about how to configure them. Configuring WLAN Services on page 318 An overview of Virtual Network Services (VNS), provides detailed Configuring a VNS on page 390 instructions in how to configure a VNS, either using the Wizards or by manually creating the component parts of a VNS. Information about configuring CoS (Class of Service) which are a configuration entity containing QoS Marking (802.1p and ToS/ DSCP), Inbound/Outbound Rate Limiting and Transmit Queue Assignments. ExtremeWireless™ V10.41.06 User Guide Configuring Classes of Service on page 487 12 About This Guide For... Refer to... Information about configuring Sites which is a mechanism for grouping APs and refers to specific Roles, Classes of Service (CoS) and RADIUS servers that are grouped to form a single configuration. Configuring Sites on page 494 An overview of Mesh networks and provides detailed information Working with a Mesh Network on page 502 about how to create a Mesh network. An overview of a Wireless Distribution System (WDS) network configuration and provides detailed information about how to create a Mesh network. Working with a Wireless Distribution System on page 518 Information on how to set up the features that maintain service availability in the event of a controller failover. Availability and Session Availability on page 537 Information on how to set up the mobility domain that provides Configuring Mobility on page 555 mobility for a wireless device user when the user roams from one ExtremeWireless AP to another in the mobility domain. Working with Third-party APs on page 561 Information on the security tool that scans for, detects, provides countermeasures, and reports on rogue APs. Working with ExtremeWireless Radar on page 563 Information on the various reports and displays available in the system. Working with Reports and Statistics on page 621 Information on system administration activities, such as performing ExtremeWireless AP client management, defining management users, configuring the network time, and configuring Web session timeouts. Performing System Administration on page 669 Information on how to view and interpret the logs, traces, audits and DHCP (Dynamic Host Configuration Protocol) messages. Logs, Traces, Audits and DHCP Messages on page 676 Information on how to configure GuestPortal accounts. Working with GuestPortal Administration on page 690 A list of terms and definitions for the ExtremeWireless Appliance and the ExtremeWireless AP as well as standard industry terms used in this guide. Glossary terms are displayed as links in the text. Hover over a glossary term to display the definition, or click the link to go to the Glossary. Regulatory information for the ExtremeWireless Appliances and the ExtremeWireless APs. Regulatory Information on page 705 The default GuestPortal ticket page source code. Default GuestPortal Ticket Page on page 706 ft ra Information on how to use the ExtremeWireless AP features with third-party wireless access points. ExtremeWireless™ V10.41.06 User Guide 13 2 Overview of the ExtremeWireless Solution Introduction Conventional Wireless LANs Elements of the ExtremeWireless Solution ExtremeWireless and Your Network ExtremeWireless Appliance Product Family Introduction ft ra The next generation of wireless networking devices provides a truly scalable WLAN (Wireless Local Area Network) solution. ExtremeWireless Access Points (APs, wireless APs) are fit access points controlled through a sophisticated network device, the controller. This solution provides the security and manageability required by enterprises and service providers for huge industrial wireless networks. The ExtremeWireless system is a highly scalable Wireless Local Area Network (WLAN) solution. Based on a third generation WLAN topology, the ExtremeWireless system makes wireless practical for service providers as well as medium and large-scale enterprises. The ExtremeWireless controller provides a secure, highly scalable, cost-effective solution based on the IEEE 802.11 standard. The system is intended for enterprise networks operating on multiple floors in more than one building, and is ideal for public environments, such as airports and convention centers that require multiple access points. This chapter provides an overview of the fundamental principles of the ExtremeWireless System. The ExtremeWireless Appliance The ExtremeWireless Appliance is a network device designed to integrate with an existing wired Local Area Network (LAN). The rack-mountable controller provides centralized management, network access, and routing to wireless devices that use Wireless APs to access the network. It can also be configured to handle data traffic from third-party access points. The controller provides the following functionality: • • • • • • Controls and configures Wireless APs, providing centralized management. Authenticates wireless devices that contact a Wireless AP. Assigns each wireless device to a VNS when it connects. Routes traffic from wireless devices, using VNS, to the wired network. Applies filtering roles to the wireless device session. Provides session logging and accounting capability. ExtremeWireless™ V10.41.06 User Guide 14 Overview of the ExtremeWireless Solution Conventional Wireless LANs Wireless communication between multiple computers requires that each computer be equipped with a receiver/transmitter—a WLAN Network Interface Card (NIC)—capable of exchanging digital information over a common radio frequency. This is called an ad hoc network configuration. An ad hoc network configuration allows wireless devices to communicate together. This setup is defined as an independent basic service set (IBSS). An alternative to the ad hoc configuration is the use of an access point. This may be a dedicated hardware bridge or a computer running special software. Computers and other wireless devices communicate with each other through this access point. The 802.11 standard defines access point communications as devices that allow wireless devices to communicate with a distribution system. This setup is defined as a basic service set (BSS) or infrastructure network. To allow the wireless devices to communicate with computers on a wired network, the access points must be connected to the wired network providing access to the networked computers. This topology is called bridging. With bridging, security and management scalability is often a concern. ft ra Figure 1: Standard Wireless Network Solution Example The wireless devices and the wired networks communicate with each other using standard networking protocols and addressing schemes. Most commonly, Internet Protocol (IP) addressing is used. Elements of the ExtremeWireless Solution The ExtremeWireless solution consists of two devices: ExtremeWireless™ V10.41.06 User Guide 15 Overview of the ExtremeWireless Solution • • ExtremeWireless Appliance ExtremeWireless AP This architecture allows a single controller to control many APs, making the administration and management of large networks much easier. There can be several controllers in the network, each with a set of registered APs. The controllers can also act as backups to each other, providing stable network availability. In addition to the controllers and APs, the solution requires three other components, all of which are standard for enterprise and service provider networks: • • RADIUS Server (Remote Access Dial-In User Service) or other authentication server DHCP (Dynamic Host Configuration Protocol) Server (Dynamic Host Configuration Protocol). If you do not have a DHCP Server on your network, you can enable the local DHCP Server on the controller. The local DHCP Server is useful as a general purpose DHCP Server for small subnets. For more information, see Setting Up the Data Ports on page 51. • SLP (Service Location Protocol) ft ra Figure 2: ExtremeWireless Appliance Solution As illustrated in ExtremeWireless Appliance Solution, the ExtremeWireless Appliance appears to the existing network as if it were an access point, but in fact one controller controls many APs. The controller has built-in capabilities to recognize and manage the APs. The controller: ExtremeWireless™ V10.41.06 User Guide 16 Overview of the ExtremeWireless Solution • • • • • Activates the APs Enables APs to receive wireless traffic from wireless devices Processes the data traffic from the APs Forwards or routes the processed data traffic out to the network Authenticates requests and applies access roles Simplifying the APs makes them cost-effective, easy to manage, and easy to deploy. Putting control on an intelligent centralized controller enables: • • • • Centralized configuration, management, reporting, and maintenance High security Flexibility to suit enterprise Scalable and resilient deployments with a few controllers controlling hundreds of APs The ExtremeWireless system: • Scales up to Enterprise capacity — ExtremeWireless Appliances are scalable: C5215 — Up to 1000 APs, 2000 APs in Controller availability mode C5210 — Up to 1000 APs, 2000 APs in Controller availability mode C5110 — Up to 525 APs, 1050 APs in Controller availability mode ft ra • • • • • • • • • • • • C4110 — Up to 250 APs, 500 APs in Controller availability mode C25 — Up to 50 APs, 100 APs in Controller availability mode C35 — Up to 125 APs, 250 APs in Controller availability mode V2110 (Small Profile) — Up to 50 APs, 100 APs in Controller availability mode V2110 (Medium Profile) — Up to 250 APs, 500 APs in Controller availability mode V2110 (Large Profile) — Up to 525 APs, 1050 APs in Controller availability mode In turn, each wireless AP can handle a mixture of secure and non-secure clients. AP per radio support is up to 200 clients, of which 127 are clients with security. With additional controllers, the number of wireless devices the solution can support can reach into the thousands. Integrates with existing network — A controller can be added to an existing enterprise network as a new network device, greatly enhancing its capability without interfering with existing functionality. Integration of the controllers and APs does not require any re-configuration of the existing infrastructure (for example, VLAN (Virtual LAN)s). Integrates with the Extreme Networks Extreme Management Center Suite of products. For more information, see Extreme Networks Extreme Management Center Integration on page 18. Plug-in applications include: • • • • • • • Automated Security Manager Inventory Manager NAC Manager Role Control Console Policy Manager Offers centralized management and control — An administrator accesses the controller in its centralized location to monitor and administer the entire wireless network. From the controller the administrator can recognize, configure, and manage the APs and distribute new software releases. Provides easy deployment of APs — The initial configuration of the APs on the centralized controller can be done with an automatic “discovery” technique. ExtremeWireless™ V10.41.06 User Guide 17 Overview of the ExtremeWireless Solution • • • • • • • • Provides security via user authentication — Uses existing authentication (AAA) servers to authenticate and authorize users. Provides security via filters and privileges — Uses virtual networking techniques to create separate virtual networks with defined authentication and billing services, access roles, and privileges. Supports seamless mobility and roaming — Supports seamless roaming of a wireless device from one wireless AP to another on the same controller or on a different controller. Integrates third-party access points — Uses a combination of network routing and authentication techniques. Prevents rogue devices — Unauthorized access points are detected and identified as either harmless or dangerous rogue APs. Provides accounting services — Logs wireless user sessions, user group activity, and other activity reporting, enabling the generation of consolidated billing records. Offers troubleshooting capability — Logs system and session activity and provides reports to aid in troubleshooting analysis. Offers dynamic RF management — Automatically selects channels and adjusts Radio Frequency (RF) signal propagation and power levels without user intervention. ft ra Extreme Networks Extreme Management Center Integration The ExtremeWireless solution now integrates with the Extreme Management Center suite of products, a collection of tools to help you manage networks. Its client/server architecture lets you manage your network from a single workstation or, for networks of greater complexity, from one or more client workstations. It is designed to facilitate specific network management tasks while sharing data and providing common controls and a consistent user interface. The Extreme Management Center is a family of products comprising the Extreme Management Center Console and a suite of plug-in applications, including: • Automated Security Manager — Automated Security Manager is a unique threat response solution that translates security intelligence into security enforcement. It provides sophisticated identification and management of threats and vulnerabilities. For information on how the ExtremeWireless solution integrates with the Automated Security Manager application, see the Maintenance Guide. • Inventory Manager — Inventory Manager is a tool for efficiently documenting and updating the details of the ever-changing network. For information on how the ExtremeWireless solution integrates with the Automated Security Manager application, see the Maintenance Guide . • NAC Manager — NAC Manager is a leading-edge NAC solution to ensure only the right users have access to the right information from the right place at the right time. The Extreme Networks NAC solution performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation. For information on how the ExtremeWireless solution integrates with the Extreme Networks NAC solution, see NAC Integration with the Wireless WLAN on page 24. • Policy Manager — Policy Manager recognizes the ExtremeWireless suite as role capable devices that accept partial configuration from Policy Manager. Currently this integration is partial in the sense that Extreme Management Center is unable to create WLAN services directly; The WLAN services need to be directly provisioned on the controller and are represented to Policy Manager as logical ports. The ExtremeWireless Appliance allows Policy Manager to: ExtremeWireless™ V10.41.06 User Guide 18 Overview of the ExtremeWireless Solution • Attach Topologies (assign VLAN to port) to the ExtremeWireless Appliance physical ports (Console). • Attach role to the logical ports (WLAN Service/SSID), • Assign a Default Role/Role to a WLAN Service, thus creating the VNS. • Perform authentication operations which can then reference defined roles for station-specific role enforcement. This can be seen as a three-step process: Deploy the controller and perform local configuration • The ExtremeWireless Appliance ships with a default SSID, attached by default to all AP radios, when enabled. • Use the basic installation wizard to complete the ExtremeWireless Appliance configuration. 2 Use Policy Manager to: • Push the VLAN list to the ExtremeWireless Appliance (Topologies) • Attach VLANs to ExtremeWireless Appliance physical ports (Console - Complete Topology definition) ft ra • • • Push RADIUS server configuration to the ExtremeWireless Appliance Push role definitions to the ExtremeWireless Appliance Attach the default role to create a VNS 3 Fine tune controller settings. For example, configuring filtering at APs and ExtremeWireless Appliance for a bridged at controller or routed topologies and associated VNSs. Note Complete information about integration with Policy Manager is outside the scope of this document. ExtremeWireless and Your Network This section is a summary of the components of the ExtremeWireless solution on your enterprise network. The following are described in detail in this guide, unless otherwise stated: • ExtremeWireless Appliance — A rack-mountable network device or virtual appliance that provides centralized control over all access points and manages the network assignment of wireless device clients associating through access points. • • Wireless AP — A wireless LAN fit access point that communicates with a controller. RADIUS Server (Remote Access Dial-In User Service) (RFC2865), or other authentication server — An authentication server that assigns and manages ID and Password protection throughout the network. Used for authentication of the wireless users in either 802.1x or Captive Portal security modes. The RADIUS Server system can be set up for certain standard attributes, such as filter ID, and for the Vendor Specific Attributes (VSAs). In addition, RADIUS Disconnect (RFC3576) which permits dynamic adjustment of user role (user disconnect) is supported. • DHCP Server (Dynamic Host Configuration Protocol) (RFC2131) — A server that assigns dynamically IP addresses, gateways, and subnet masks. IP address assignment for clients can be done by the DHCP server internal to the controller, or by existing servers using DHCP relay. It is also used by the APs to discover the location of the controller during the initial registration process using Options 43, 60, and Option 78. Options 43 and 60 specify the vendor class identifier (VCI) and vendor specific ExtremeWireless™ V10.41.06 User Guide 19 Overview of the ExtremeWireless Solution • information. Option 78 specifies the location of one or more SLP Directory Agents. For SLP, DHCP should have Option 78 enabled. Service Location Protocol (SLP) (SLP RFC2608) — Client applications are User Agents and services that are advertised by a Service Agent. In larger installations, a Directory Agent collects information from Service Agents and creates a central repository. The Extreme Networks solution relies on registering “Extreme Networks” as an SLP Service Agent. • Domain Name Server (DNS) — A server used as an alternate mechanism (if present on the enterprise network) for the automatic discovery process. Controller, Access Points and Convergence Software relies on the DNS for Layer 3 deployments and for static configuration of the APs. The controller can be registered in DNS, to provide DNS assisted AP discovery. In addition, DNS can also be used for resolving RADIUS server hostnames. • Web Authentication Server — A server that can be used for external Captive Portal and external authentication. The controller has an internal Captive portal presentation page, which allows web authentication (web redirection) to take place without the need for an external Captive Portal server. RADIUS Accounting Server (Remote Access Dial-In User Service) (RFC2866) — A server that is required if RADIUS Accounting is enabled. • SNMP (Simple Network Management Protocol) — A Manager Server that is required if forwarding SNMP messages is enabled. Network Infrastructure — The Ethernet switches and routers must be configured to allow routing between the various services noted above. Routing must also be enabled between multiple controllers for the following features to operate successfully: ft ra • • • Availability • Mobility • ExtremeWireless Radar for detection of rogue access points Some features also require the definition of static routes. • • • • Web Browser — A browser provides access to the controller Management user interface to configure the ExtremeWireless system. SSH Enabled Device — A device that supports Secure Shell (SSH) is used for remote (IP) shell access to the system. Zone Integrity — The Zone integrity server enhances network security by ensuring clients accessing your network are compliant with your security roles before gaining access. Zone Integrity Release 5 is supported. (Optional) Online Signup Server — For use with Hotspot Networks. Network Traffic Flow Figure 3 illustrates a simple configuration with a single controller and two APs, each supporting a wireless device. A RADIUS server on the network provides authentication, and a DHCP server is used by the APs to discover the location of the controller during the initial registration process. Network interconnectivity is provided by the infrastructure routing and switching devices. ExtremeWireless™ V10.41.06 User Guide 20 Overview of the ExtremeWireless Solution ft ra Figure 3: Traffic Flow Diagram Each wireless device sends IP packets in the 802.11 standard to the AP. The AP uses a UDP (User Datagram Protocol) based tunnelling protocol. In tunneled mode of operation, it encapsulates the packets and forwards them to the controller. The controller decapsulates the packets and routes these to destinations on the network. In a typical configuration, access points can be configured to locally bridge traffic (to a configured VLAN) directly at their network point of attachment. The controller functions like a standard L3 router or L2 switch. It is configured to route the network traffic associated with wireless connected users. The controller can also be configured to simply forward traffic to a default or static route if dynamic routing is not preferred or available. Network Security The Extreme Networks ExtremeWireless system provides features and functionality to control network access. These are based on standard wireless network security practices. Current wireless network security methods provide protection. These methods include: • • • • Shared Key authentication that relies on Wired Equivalent Privacy (WEP) keys Open System that relies on Service Set Identifiers (SSIDs) 802.1x that is compliant with Wi-Fi Protected Access (WPA) Captive Portal based on Secure Sockets Layer (SSL) protocol The Extreme Networks ExtremeWireless system provides the centralized mechanism by which the corresponding security parameters are configured for a group of users. • Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks defined in the 802.11b standard ExtremeWireless™ V10.41.06 User Guide 21 Overview of the ExtremeWireless Solution • • Wi-Fi Protected Access version 1 (WPA1™) with Temporal Key Integrity Protocol (TKIP) Wi-Fi Protected Access version 2 (WPA2™) with Advanced Encryption Standard (AES) and Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP) Authentication The controller relies on a RADIUS server, or authentication server, on the enterprise network to provide the authentication information (whether the user is to be allowed or denied access to the network). A RADIUS client is implemented to interact with infrastructure RADIUS servers. The controller provides authentication using: • • Captive Portal — a browser-based mechanism that forces users to a Web page RADIUS (using IEEE 802.1x) ft ra The 802.1x mechanism is a standard for authentication developed within the 802.11 standard. This mechanism is implemented at the wireless port, blocking all data traffic between the wireless device and the network until authentication is complete. Authentication by 802.1x standard uses Extensible Authentication Protocol (EAP) for the message exchange between the controller and the RADIUS server. When 802.1x is used for authentication, the controller provides the capability to dynamically assign perwireless-device WEP keys (called per session WEP keys in 802.11). In the case of WPA, the controller is not involved in key assignment. Instead, the controller is involved in the information exchange between RADIUS server and the user’s wireless device to negotiate the appropriate set of keys. With WPA2 the material exchange produces a Pairwise Master Key which is used by the AP and the user to derive their temporal keys. (The keys change over time.) The Extreme Networks ExtremeWireless solution provide a RADIUS redundancy feature that enables you to define a failover RADIUS server in the event that the active RADIUS server becomes unresponsive. Privacy Privacy is a mechanism that protects data over wireless and wired networks, usually by encryption techniques. Extreme Networks ExtremeWireless supports the Wired Equivalent Privacy (WEP) standard common to conventional access points. It also provides Wi-Fi Protected Access version 1 (WPA v.1) encryption, based on Pairwise Master Key (PMK) and Temporal Key Integrity Protocol (TKIP). The most secure encryption mechanism is WPA version 2, using Advanced Encryption Standard (AES). Virtual Network Services Virtual Network Services (VNS) provide a versatile method of mapping wireless networks to the topology of an existing wired network. In releases prior to V7.0, a VNS was a collection of operational entities. Starting with Release V7.0, a VNS becomes the binding of reusable components: ExtremeWireless™ V10.41.06 User Guide 22 Overview of the ExtremeWireless Solution • • WLAN Service components that define the radio attributes, privacy and authentication settings, and QoS attributes of the VNS Role components that define the topology (typically a VLAN), policy rules, and Class of Service applied to the traffic of a station. Figure 4 illustrates the transition of the concept of a VNS to a binding of reusable components. ft ra Figure 4: VNS as a Binding of Reusable Components WLAN Service components and Role components can be configured separately and associated with a VNS when the VNS is created or modified. Alternatively, they can be configured during the process of creating a VNS. Additionally, Roles can be created using the Extreme Networks Extreme Management Center Policy Manager or Extreme Management Center Wireless Manager and pushed to the ExtremeWireless Appliance. Role assignment ensures that the correct topology and traffic behavior are applied to a user regardless of WLAN service used or VNS assignment. When VNS components are set up on the controller, among other things, a range of IP addresses is set aside for the controller’s DHCP server to assign to wireless devices. If the OSPF (Open Shortest Path First) routing protocol is enabled, the controller advertises the routed topologies as reachable segments to the wired network infrastructure. The controller routes traffic between the wireless devices and the wired network. The controller also supports VLAN-bridged assignment for VNSs. This allows the controller to directly bridge the set of wireless devices associated with a WLAN service directly to a specified core VLAN. ExtremeWireless™ V10.41.06 User Guide 23 Overview of the ExtremeWireless Solution Each controller model can support a definable number and an active number of VNSs. See Table 3. Table 3: VNS and WLAN Service Capacity Max Number of Defined Max Number of Defined VNS WLAN Services Max Number of Active WLAN Services C5110 256 256 128 C4110 128 128 64 C25 32 32 16 V2110 Small 32 32 16 V2110 Medium V2110-HyperV 128 128 64 V2110 Large 256 256 128 C5215 256 256 128 C5210 256 256 128 C35 32 16 32 ft ra Controller Model The AP radios can be assigned to each of the configured WLAN services and, therefore, VNSs in a system. Each AP can be the subject of 16 service assignments—eight assignments per radio—which corresponds to the number of SSIDs it can support. Once a radio has all eight slots assigned, it is no longer eligible for further assignment. The AP3912 has three additional client ports that can be assigned to a single WLAN Service. For more information, see Assigning WLAN Services to Client Ports on page 170. NAC Integration with the Wireless WLAN The Extreme Networks Wireless WLAN supports integration with a NAC (Network Admission Control) Gateway. The NAC Gateway can provide your network with authentication, registration, assessment, remediation, and access control for mobile users. NAC Gateway integration with Wireless WLAN supports SSID VNSs when used in conjunction with MAC-based external captive portal authentication. Figure 5 depicts the topology and workflow relationship between Wireless WLAN that is configured for external captive portal and a NAC Gateway. With this configuration, the NAC Gateway acts like a RADIUS proxy server. An alternative is to configure the NAC Gateway to perform MAC-based authentication itself, using its own database of MAC addresses and permissions. For more information, see Creating a NAC VNS Using the VNS Wizard on page 426. ExtremeWireless™ V10.41.06 User Guide 24 Overview of the ExtremeWireless Solution ft ra Figure 5: WLAN and NAC Integration with External Captive Portal Authentication 1 The client laptop connects to the AP. The AP determines that authentication is required, and sends an association request to the appliance. 2 The appliance forwards to the NAC Gateway an access-request message for the client laptop, which is identified by its MAC address. The NAC Gateway forwards the access-request to the RADIUS server. The NAC Gateway acts like a RADIUS proxy server. 3 The RADIUS server evaluates the access-request and sends an AccessAccept message back to the NAC. Note RADIUS servers with captive portal and EAP authentication can be tested for connectivity using the radtest command. For more information, see the ExtremeWireless CLI Guide. The NAC receives the access-accept packet. Using its local database, the NAC determines the correct role to apply to this client laptop and updates the access-accept packet with the role assignment. The updated AccessAccept message is forwarded to the appliance and AP. 4 The appliance and the AP apply role against the client laptop accordingly. The appliance assigns a set of filters to the client laptop’s session and the AP allows the client laptop access to the network. 5 The client laptop interacts with a DHCP server to obtain an IP address. 6 Eventually the client laptop uses its web browser to access a website. • The appliance determines that the target website is blocked and that the client laptop still requires authentication. ExtremeWireless™ V10.41.06 User Guide 25 Overview of the ExtremeWireless Solution • • The appliance sends an HTTP redirect to the client laptop’s browser. The redirect sends the browser to the web server on the NAC Gateway. The NAC displays an appropriate web page in the client laptop’s browser. The contents of the page depend on the current role assignment (enterprise, remediation, assessing, quarantine, or unregistered) for the MAC address. 7 When the NAC determines that the client laptop is ready for a different role assignment, it sends a ‘disconnect message’ (RFC 3576) to the appliance. When the appliance receives the ‘disconnect message’ sent by the NAC, the appliance terminates the session for the client laptop. The appliance forwards the command to terminate the client laptop’s session to the AP, which disconnects the client laptop. VNS Components The distinct constituent high-level configurable umbrella elements of a VNS are: Topology Role ft ra • • • • Classes of Service WLAN Service Topology Topologies represent the networks with which the controller and its APs interact. The main configurable attributes of a topology are: • • • • Name - a string of alphanumeric characters designated by the administrator. VLAN ID - the VLAN identifier as specified in the IEEE 802.1Q definition. VLAN tagging options. Port of presence for the topology on the controller. (This attribute is not required for Routed and Bridged at AP topologies.) • Interface. This attribute is the IP (L3) address assigned to the controller on the network described by the topology. (Optional.) • Type. This attribute describes how traffic is forwarded on the topology. Options are: • “Physical” - the topology is the native topology of a data plane and it represents the actual Ethernet ports • “Management” - the native topology of the controller management port • “Routed” - the controller is the routing gateway for the routed topology. • “Bridged at Controller” - the user traffic is bridged (in the L2 sense) between wireless clients and the core network infrastructure. • “Bridged at AP” - the user traffic is bridged locally at the AP without being redirected to the controller • • Exception Filters. Specifies which traffic has access to the controller from the wireless clients or the infrastructure network. Certificates. ExtremeWireless™ V10.41.06 User Guide 26 Overview of the ExtremeWireless Solution • • Multicast filters. Defines the multicast groups that are allowed on a specific topology segment. For information about Topology groups, see Creating a Topology Group on page 270. Role A Role is a collection of attributes and rules that determine actions taken user traffic accesses the wired network through the WLAN service (associated to the WLAN Service's SSID). Depending upon its type, a VNS can have between one and three Authorization Roles associated with it: ft ra Default non-authorized role — This is a mandatory role that covers all traffic from stations that have not authenticated. At the administrator's discretion the default non-authorized role can be applied to the traffic of authenticated stations as well. 2 Default authorized role — This is a mandatory role that applies to the traffic of authenticated stations for which no other role was explicitly specified. It can be the same as the default non-authorized role. 3 Third-party AP role — This role applies to the list of MAC addresses corresponding to the wired interfaces of third party APs specifically defined by the administrator to be providing the RF access as an AP WLAN Service. This role is only relevant when applied to third party AP WLAN Services. Classes of Service In general, CoS (Class of Service) refers to a set of attributes that define the importance of a frame while it is forwarded through the network relative to other packets, and to the maximum throughput per time unit that a station or port assigned to a specific role is permitted. The CoS defines actions to be taken when rate limits are exceeded. All incoming packets may follow these steps to determine a CoS: • • • Classification - identifies the first matching rule that defines a CoS. Marking - modifies the L2 802.1p and/or L3 ToS based on CoS definition. Rate limiting (drop) is set. The system limit for the number of CoS profiles on a controller is identical to the number of roles. For example, the maximum number of CoS profiles on a C4110 is 512. WLAN Services A WLAN Service represents all the RF, authentication and QoS attributes of a wireless access service offered by the controller and its APs. A WLAN Service can be one of the following types: • Standard — A conventional service. Only APs running ExtremeWireless software can be part of this WLAN Service. This type of service can be used as a Bridged at Controller, Bridged at AP, or Routed Topology. This type of service provides access for mobile stations. Roles can be associated with this type of WLAN service to create a VNS. Hotspot can be enabled for standard WLAN services. • Third Party AP — A Wireless Service offered by third party APs. This type of service provides access for mobile stations. Roles can be assigned to this type of WLAN service to create a VNS. • Dynamic Mesh and WDS (Static Mesh)— This is to configure a group of APs organized into a hierarchy for purposes of providing a Wireless Distribution Service. This type of service is in essence ExtremeWireless™ V10.41.06 User Guide 27 Overview of the ExtremeWireless Solution • a wireless trunking service rather than a service that provides access for stations. As such, this service cannot have roles attached to it. Remote — A service that resides on the edge (foreign) controller. Pairing a remote service with a remoteable service on the designated home controller allows you to provision centralized WLAN Services in the mobility domain. This is known as centralized mobility. The components of a WLAN Service map to the corresponding components of a VNS in previous releases. The administrator makes an explicit choice of the type of authentication to use on the WLAN Service. If the choice of authentication option conflicts with any other authentication or privacy choices, the WLAN Service cannot be enabled. Routing Routing can be used on the controller to support the VNS definitions. Through the user interface you can configure routing on the controller to use one of the following routing techniques: • ft ra Static routes — Use static routes to set the default route of a controller so that legitimate wireless device traffic can be forwarded to the default gateway. OSPF (version 2) (RFC2328) — Use OSPF to allow the controller to participate in dynamic route selection. OSPF is a protocol designed for medium and large IP networks with the ability to segment routes into different areas by routing information summarization and propagation. Static Route definition and OSPF dynamic learning can be combined, and the precedence of a static route definition over dynamic rules can be configured by selecting or clearing the Override dynamic routes option check box. • • Next-hop routing — Use next-hop routing to specify a unique gateway to which traffic on a VNS is forwarded. Defining a next-hop for a VNS forces all the traffic in the VNS to be forwarded to the indicated network device, bypassing any routing definitions of the controller's route table. Mobility and Roaming In typical simple configurations, APs are set up as bridges that bridge wireless traffic to the local subnet. In bridging configurations, the user obtains an IP address from the same subnet as the AP, assuming no VLAN trunking functionality. If the user roams between APs on the same subnet, it is able to keep using the same IP address. However, if the user roams to another AP outside of that subnet, its IP address is no longer valid. The user's client device must recognize that the IP address it has is no longer valid and re-negotiate a new one on the new subnet. This mechanism does not mandate any action on the user. The recovery procedure is entirely client device dependent. Some clients automatically attempt to obtain a new address on roam (which affects roaming latency), while others will hold on to their IP address. This loss of IP address continuity seriously affects the client's experience in the network, because in some cases it can take minutes for a new address to be negotiated. The Extreme Networks ExtremeWireless solution centralizes the user's network point of presence, therefore abstracting and decoupling the user's IP address assignment from that of the APs location subnet. That means that the user is able to roam across any AP without losing its own IP address, regardless of the subnet on which the serving APs are deployed. In addition, a controller can learn about other controllers on the network and then exchange client session information. This enables a wireless device user to roam seamlessly between different APs on different controllers. ExtremeWireless™ V10.41.06 User Guide 28 Overview of the ExtremeWireless Solution Network Availability The Extreme Networks ExtremeWireless solution provides availability against AP outages, controller outages, and even network outages. The controller in a VLAN bridged topology can potentially allow the user to retain the IP address in a failover scenario, if the VNS/VLAN is common to both controllers. For example, availability is provided by defining a paired controller configuration by which each peer can act as the backup controller for the other's APs. APs in one controller are allowed to fail over and register with the alternate controller. If the primary controller fails, all of its associated APs can automatically switch over to another controller that has been defined as the secondary or backup controller. If an AP reboots, the primary controller is restored if it is active. However, active APs will continue to be connected to the backup controller until the administrator releases them back to the primary home controller. Quality of Service (QoS) ft ra Extreme Networks ExtremeWireless solution provides advanced Quality of Service (QoS) management to provide better network traffic flow. Such techniques include: • WMM (Wi-Fi Multimedia) — WMM is enabled per WLAN service. The controller provides centralized management of the AP features. For devices with WMM enabled, the standard provides multimedia enhancements for audio, video, and voice applications. WMM shortens the time between transmitting packets for higher priority traffic. WMM is part of the 802.11e standard for QoS. In the context of the ExtremeWireless Solution, the ToS/DSCP field is used for classification and proper class of service mapping, output queue selection, and priority tagging. • IP ToS (Type of Service) or DSCP (Diffserv Codepoint) — The ToS/DSCP field in the IP header of a frame indicates the priority and class of service for each frame. Adaptive QoS ensures correct priority handling of client payload packets tunneled between the controller and AP by copying the IP ToS/DSCP setting from client packet to the header of the encapsulating tunnel packet. • Rate Control — Rate Control for user traffic can also be considered as an aspect of QoS. As part of Role definition, the user can specify (default) role that includes Ingress and Egress rate control. Ingress rate control applies to traffic generated by wireless clients and Egress rate control applies to traffic targeting specific wireless clients. The bit-rates can be configured as part of globally available profiles which can be used by any particular configuration. A global default is also defined. Quality of Service (QoS) management is also provided by: • • • Assigning high priority to a WLAN service Adaptive QoS (automatic and all time feature) Support for legacy devices that use SpectraLink Voice Protocol (SVP) for prioritizing voice traffic (configurable) ExtremeWireless Appliance Product Family The ExtremeWireless Appliance is available in the following product families: ExtremeWireless™ V10.41.06 User Guide 29 Overview of the ExtremeWireless Solution Table 4: ExtremeWireless Product Families ExtremeWireless Appliance Model Number Specifications C5110 • • • • • • • • • • • • • Three data ports supporting up to 525 APs 2 fiber optic SR (10Gbps) 1 Ethernet port GigE One management port (Ethernet) GigE One console port (DB9 serial) Four USB ports — two on each front and back panel (only one port active at a time) Redundant dual power supply unit • Four data ports supporting up to 1000 APs 2 SFP+ (10Gbps) 2 Ethernet port GigE One management port (Ethernet) GigE One console port (RJ-45 serial) Five USB ports — two on front and three on back panel (only one port active at a time) Redundant dual power supply unit C4110 • • • • • Four GigE ports supporting up to 250 APs One management port (Ethernet) GigE One console port (DB9 serial) Four USB ports (only one active at a time) Redundant dual power supply unit C25 • • • • Two GigE ports supporting up to 50 APs One management port GigE One console port (DB9 serial) Two USB ports V2110 • • • Two GigE ports or 10G fiber ports supporting up to 525 APs One management port GigE USB ports (only one active at a time) C35 • • • • Four GigE ports supporting up to 125 APs One management port GigE One console port Two USB ports C5210/C5215 ft ra ExtremeWireless™ V10.41.06 User Guide 30 3 Configuring the ExtremeWireless Appliance System Configuration Overview Logging on to the ExtremeWireless Appliance Wireless Assistant Home Screen Working with the Basic Installation Wizard Configuring the ExtremeWireless Appliance for the First Time Using a Third-party Location-based Solution Additional Ongoing Operations of the System ft ra System Configuration Overview The following section provides a high-level overview of the steps involved in the initial configuration of ExtremeWireless: Before you begin the configuration process, research the type of WLAN (Wireless Local Area Network) deployment that is required. For example, topology and VLAN (Virtual LAN) IDs, SSIDs, security requirements, and filter roles. 2 Prepare the network servers. Ensure that the external servers, such as DHCP (Dynamic Host Configuration Protocol) and RADIUS servers (if applicable) are available and appropriately configured. 3 Install the controller. For more information, see the documentation for your controller. 4 Perform the first time setup of the controller on the physical network, which includes configuring the IP addresses of the interfaces on the controller. a Create a new physical topology and provide the IP address to be the relevant subnet point of attachment to the existing network. b To manage the controller through the interface configured above, select the Mgmt check box on the Interfaces tab. c Configure the data port interfaces to be on separate VLANs, matching the VLANs configured in step 3 above. Ensure also that the tagged vs. untagged state is consistent with the switch port configuration. d Configure the time zone. Because changing the time zone requires restarting the controller, it is recommended that you configure the time zone during the initial installation and configuration of ExtremeWireless™ V10.41.06 User Guide 31 Configuring the ExtremeWireless Appliance the controller to avoid network interruptions. For more information, see Configuring Network Time on page 89. e Apply an activation key file. If an activation key is not applied, the controller functions with some features enabled in demonstration mode. Not all features are enabled in demonstration mode. For example, mobility is not enabled and cannot be used. Caution Whenever the licensed region changes on the ExtremeWireless Appliance, all APs are changed to Auto Channel Select to prevent possible infractions to local RF regulatory requirements. If this occurs, all manually configured radio channel settings will be lost.Installing the new license key before upgrading will prevent the ExtremeWireless Appliance from changing the licensed region, and in addition, manually configured channel settings will be maintained. For more information, see the ExtremeWireless Maintenance Guide. 5 Configure the controller for remote access: ft ra a Set up an administration station (laptop) on subnet 192.168.10.0/24. By default, the controller's Management interface is configured with the static IP address 192.168.10.1. b Configure the controller’s management interface. c Configure the data interfaces. d Set up the controller on the network by configuring the physical data ports. e Configure the routing table. f Configure static routes or OSPF (Open Shortest Path First) parameters, if appropriate to the network. For more information, see Configuring the ExtremeWireless Appliance for the First Time on page 45. 6 Configure the traffic topologies your network must support. Topologies represent the controller’s points of network attachment, and therefore VLANs and port assignments need to be coordinated with the corresponding network switch ports. For more information, see Configuring a Basic Data Port Topology on page 266. 7 Configure roles. Roles are typically bound to topologies. Role application assigns user traffic to the corresponding network point. • • Roles define user access rights (filtering or ACL (Access Control List)) Polices reference user's rate control profile. For more information, see Configuring Roles on page 284. 8 Configure WLAN services. • Define SSID and privacy settings for the wireless link. • • Select the set of APs/Radios on which the service is present. Configure the method of credential authentication for wireless users (None, Internal CP, External CP, GuestPortal, 802.1x[EAP]) For more information, see Configuring WLAN Services on page 318. 9 Create the VNSs. A VNS binds a WLAN Service to a Role that will be used for default assignment upon a user’s network attachment. ExtremeWireless™ V10.41.06 User Guide 32 Configuring the ExtremeWireless Appliance You can create topologies, roles, and WLAN services first, before configuring a VNS, or you can select one of the wizards (such as the VNS wizard), or you can simply select to create new VNS. The VNS page then allows for in-place creation and definition of any dependency it may require, such as: • • • • • Creating a new WLAN Service Creating a new role Creating a new class of service (within a role) Creating a new topology (within a role) Creating new rate controls, and other Class of Service parameters The default shipping configuration does not ship any pre-configured WLAN Services, VNSs, or Roles. 10 Install, register, and assign APs to the VNS. Confirm the latest firmware version is loaded. For more information, see Performing AP Software Maintenance on page 235. • • Deploy APs to their corresponding network locations. If applicable, configure a default AP template for common radio assignment, whereby APs automatically receive complete configuration. For typical deployments where all APs are to have the same configuration, this feature will expedite deployment, as an AP will automatically receive full configuration (including VNS-related assignments) upon initial registration with the controller. If applicable, modify the properties or settings of the APs. For more information, see Configuring the ExtremeWireless APs on page 101. • • Connect the APs to the controller. Once the APs are powered on, they automatically begin the Discovery process of the controller, based on factors that include: ft ra • • Their Registration mode (on the AP Registration screen) • The enterprise network services that will support the discovery process Logging on to the ExtremeWireless Appliance Start your Web browser (Internet Explorer version 11 or later, FireFox, or Chrome). See the Release Notes for the supported web browsers. ExtremeWireless™ V10.41.06 User Guide 33 Configuring the ExtremeWireless Appliance 2 In the browser address bar, type the following, using the IP address of your controller: https://192.168.10.1:5825 This launches the Wireless Assistant. The login screen displays. ft ra 3 Type your user name and password and click Login . The Wireless Assistant Home screen displays. Note The default User Name is "admin". The default Password is "abc123". Wireless Assistant Home Screen The Wireless Assistant Home screen provides real-time status information on the current state of the wireless network. Information is grouped under multiple functional areas, and the Wireless Assistant Home Screen provides a graphical representation of information related to the active APs (such as the number of wired packets, stations, and total APs). Navigate the Wireless Assistant using the top menu bar tabs. Figure 6: Wireless Assistant Top Menu Bar The bottom status bar displays the type and description of the current wireless controller, user and admin login status, flash status, software version and the number of admin users currently logged into the controller. ExtremeWireless™ V10.41.06 User Guide 34 Configuring the ExtremeWireless Appliance ra Figure 7: Wireless Assistant Home Screen Table 5 describes the panes on the Wireless Assistant Home Screen. ft ExtremeWireless™ V10.41.06 User Guide 35 Configuring the ExtremeWireless Appliance Table 5: Wireless Assistant Home Screen Description Network Status Includes real-time totals for the following components. Click the number displayed to display additional information, such as name, serial number, and IP address. • Local APs - total number of active or inactive local configured APs. • Foreign APs - total number of active or inactive foreign configured APs. Availability pair must be configured to display additional information. • Pending APs - total APs pending verification. • Load Groups - total active load groups. Click to display the Active Wireless Load Groups report. • Local Stations - total number of active mobile stations. Click to display the All Active Client report. • Local & Foreign - total number of active and foreign stations. Click to display the All Active Client report. • VNS - total defined VNSs (enabled and disabled). Click to display the total number of enabled and disabled VNS assignments, respectively, configured on the system. • Availability - status of the controller availability. Click to display controller settings (Stand-alone, Paired, Fast Failover FFO). • Mobility Tunnels - status of the mobility tunnel. Click to display controller settings. ft ra Home Screen Heading Admin Sessions Displays information on the total number of recent administrative activities including: • Read/Write sessions - total number of currently active GUI and CLI (either SSH or serial console ones) Read/Write sessions. • Read-only sessions - total number of currently active GUI and CLI (either SSH or serial console ones) Read only sessions. • Guest Access sessions - total number of currently active GuestPortal Manager sessions that can only be achieved through the GUI. • Auth Type - lists the presently configured login mode. Click each heading to access the Wireless Controller > Login Management screen. For more information, see Configuring the Login Authentication Mode on page 75. Stations by Protocol Displays a graphical representation of the total number of active stations grouped by protocol. Click the Stations by Protocol heading to access the All Active Clients Report. For more information, see Viewing Statistics for APs on page 627. APs by Channel Displays a graphical representation of the total number of active stations and the number of APs. Click the APs by Channel heading to access the Active Wireless AP Report. For more information, see Viewing Statistics for APs on page 627. Stations by AP Displays a graphical representation of the total number of active APs grouped by channel. Click the Status by AP heading to access the Active Clients by Wireless APs Report. For more information, see Viewing Statistics for APs on page 627. ExtremeWireless™ V10.41.06 User Guide 36 Configuring the ExtremeWireless Appliance Table 5: Wireless Assistant Home Screen (continued) Description Applications by WLAN If Application Visibility is enabled on the WLAN Configuration screen, a pie chart displaying the top five applications on that WLAN displays. If Application Visibility is not enabled, click Enable Application Visibility to display the Apps, operating systems, and devices used by clients. The Application Visibility option displays the following information for clients associated with a selected WLAN: • IPv4 and IPv6 Addresses • Host Name • Operating System • Device Type • Top 5 Application Groups by Throughput (2-minute interval) • Top 5 current Application Groups by Bytes, from session start. • Throughput chart for an application group. • Average TCP Round Trip Time. • Average DNS Round Trip Time. ft ra Home Screen Heading For more information, see Enabling Application Visibility with Device Identification on page 626 and Device Identification on page 625. ExtremeWireless™ V10.41.06 User Guide 37 Configuring the ExtremeWireless Appliance Table 5: Wireless Assistant Home Screen (continued) Home Screen Heading Description Licensing Displays licensing information including: • License mode: License Manager can operate in Lone or Paired mode. Lone (standalone) - Only local APs are counted against locally installed capacity keys. ALL Radar In-Service and Guardian APs are counted against locally installed Radar keys. This is the default license mode. License Manager switches to Paired mode on the following conditions: Availability is enabled while License Manager is running and it receives a license request or Availability is enabled before the License Manger starts up and the database has counters for the peers capacity and Radar keys. ft ra Paired - Both local and foreign APs are counted against sum of locally installed capacity keys and capacity keys, pooled from the peer controller. ALL Radar In-Service and Guardian APs are counted against sum or locally installed Radar keys, installed on the peer controller. License Manager switches to Lone (standalone) mode if Availability is disabled or if the peer IP address is changed. • • • • • • • • Unused AP Licenses: total number of unassigned AP licenses (for more information, see Applying Product License Keys on page 47). Local AP Licenses: total number of AP licenses local to the primary controller. Foreign AP Licenses: total number of AP licenses local to the secondary (backup) controller. Local Radar Licenses: total number of Radar licenses local to the primary controller. Foreign Radar Licenses: total number of Radar licenses local to the secondary (backup) controller. Unused Radar Licenses: total number of unassigned licenses for Radar (for more information, see Radar License Requirements on page 565). Days Remaining: number of days remaining on this license key. Regulatory Domain: Domain information for this license period. Click the Licensing heading to access the Wireless Controller > Software Maintenance screen. For more information, see Installing the License Keys on page 49. Health Displays network health statistics including: • Local AP Uptime (min) • APs with > 30 clients • APs in low power mode This feature is for AP39xx only. This option displays when there is one or more AP39xx in low power mode. Click to display details of the AP. • Failed VNS RADIUS Txs Click each heading to access the Active Wireless APs Report. For more information, see Viewing Statistics for APs on page 627. ExtremeWireless™ V10.41.06 User Guide 38 Configuring the ExtremeWireless Appliance Table 5: Wireless Assistant Home Screen (continued) Home Screen Heading Description Radar Displays totals for the following security related statistics: • AP Remote Access - click to access the APs > AP Registration page • Unsecured WLANs - click to access the WLAN Security Report • Uncategorized APs - click to access the list of Uncategorized APs • Active Threats - click to access the Active Threats Report • Active Countermeasures - click to access the Active Countermeasures Report • APs denied by license - click to access the list of APs denied by license constraints. For more information, see Wireless AP Registration on page 123, and Working with Radar Reports on page 593. Events ft ra Displays major events that impact network performance and efficiency. Each event listed includes a timestamp of the event, the type or classification of the event, which component is impacted by the event, and a log message providing specific information for the event. Click the Events heading to access the Log > Logs & Traces page. For more information, see Working with Reports and Statistics on page 621. Working with the Basic Installation Wizard The Extreme Networks ExtremeWireless system provides a basic installation wizard that can help administrators configure the minimum controller settings that are necessary to deploy a functioning ExtremeWireless system solution on a network. Use the Basic Installation Wizard to quickly configure the controller for deployment, and later to revise the controller configuration as needed. The Basic Installation Wizard launches when you log on to the controller for the first time and when the system has been reset to the factory default settings. You can also launch the wizard from the left pane of the controller Configuration screen anytime. To configure the controller using the Basic Installation Wizard: Log on to the controller. For more information, see Logging on to the ExtremeWireless Appliance on page 33. 2 From the top menu, click Controller. The Wireless Controller Configuration screen displays. ExtremeWireless™ V10.41.06 User Guide 39 Configuring the ExtremeWireless Appliance 3 In the left pane, click Administration > Installation Wizard. The Basic Installation Wizard screen displays. af 4 In the Time Settings section, configure the controller timezone: • • Continent or Ocean — Select the continent for the time zone. Time Zone Region — Select the appropriate time zone region for the selected continent. 5 To configure the controller’s time, do one of the following: To manually set the controller time, click Set time. The Year, Month, Day, HR, and Min. fields display, where you can use the drop-down lists to specify the time values. • To use the controller as the NTP time server, select the Run local NTP Server option. In the Server field, enter the IP address or Domain Name for the NTP server. • To use NTP to set the controller time, select the Use NTP option, and then type the IP address of an NTP time server that is accessible on the enterprise network. • The Network Time Protocol is a protocol for synchronizing the clocks of computer systems over packet-switched data networks. 6 In the Server field, enter the IP address or Domain Name for the NTP server. Note The Server Address field supports both IPv4 and IPv6 addresses. ExtremeWireless™ V10.41.06 User Guide 40 Configuring the ExtremeWireless Appliance 7 In the Topology Configuration section, the physical interface of the controller data port, the IP Address and Netmask values for the data port, and the VLAN ID display as read-only values. For information on how to obtain a temporary IP address from the network, click How to obtain a temporary IP address. 8 Click Next. The Management screen displays Basic Installation Wizard - Management Screen The Management screen displays: In the AP Password section, enter a password for the AP. Click Unmask to display the password characters as you type. Access Points are shipped with default passwords. You must create a new SSH Access Password here. Note Passwords can include the following characters: A-Z a-z 0-9 ~!@#$%^&*()_+|-=\{}[];<>?,. Password cannot include the following characters: / ` ' " : or a space. ExtremeWireless™ V10.41.06 User Guide 41 Configuring the ExtremeWireless Appliance 2 In the Management Port section, confirm the port configuration values that were defined when the controller was physically deployed on the network. If applicable, edit these values: • • • • • • Static IP Address — Displays the IPv4 address for the controller’s management port. Revise this as appropriate for the enterprise network. Netmask — Displays the appropriate subnet mask for the IP address to separate the network portion from the host portion of the address. Gateway — Displays the default gateway of the network. Static IPv6 Address — Displays the IPv6 address for the controller’s management port. Revise this as appropriate for the enterprise network. Prefix Length — Length of the IPv6 prefix. Maximum is 64 bits. Gateway — Displays the default gateway of the network. 3 In the SNMP section, click V2c or V3 in the Mode drop-down list to enable SNMP (Simple Network Management Protocol), if applicable. If you selected V2c, the Community options display: Read Community — Type the password that is used for read-only SNMP communication. Write Community — Type the password that is used for write SNMP communication. Trap Destination — Type the IP address of the server used as the network manager that will receive SNMP messages. ft ra • • • Note The Trap Destination Address field supports both IPv4 and IPv6 addresses. • • If you selected V3, the Syslog Server options display: Enable — Click to enable Syslog Server. IP Address — Enter the IP address for the Syslog Server. 4 In the OSPF section, select the Enable check box to enable OSPF, if applicable. Use OSPF to allow the controller to participate in dynamic route selection. OSPF is a protocol designed for medium and large IP networks with the ability to segment routes into different areas by routing information summarization and propagation. Do the following: • Area ID — Type the desired area. Area 0.0.0.0 is the main area in OSPF. 5 In the Syslog Server section, select the Enable check box to enable the syslog protocol for the controller, if applicable. Syslog is a protocol used for the transmission of event notification messages across networks. In the IP Address field, type the IP address of the syslog server. Note The Syslog Server IP Address field supports both IPv4 and IPv6 addresses. 6 Click Next. The Services screen displays. ExtremeWireless™ V10.41.06 User Guide 42 Configuring the ExtremeWireless Appliance Basic Installation Wizard - Services Screen af In the RADIUS section, select the Enable check box to enable RADIUS login authentication, if applicable. Do the following: • • • RADIUS login authentication uses a RADIUS server to authenticate user login attempts. RADIUS is a client/server authentication and authorization access protocol used by a network access server (NAS) to authenticate users attempting to connect to a network device. Server Alias — Type a name that you want to assign to the RADIUS server. You can type a name or IP address of the server. IP Address — Type the RADIUS server's hostname or IP address. Shared Secret — Type the password that will be used to validate the connection between the controller and the RADIUS server. ExtremeWireless™ V10.41.06 User Guide 43 Configuring the ExtremeWireless Appliance 2 In the Mobility section, select the Enable check box to enable the controller mobility feature, if applicable. Mobility allows a wireless device user to roam seamlessly between different APs on the same or different controllers. A dialog informs you that NTP is required for the mobility feature and prompts you to confirm you want to enable mobility. Note If the ExtremeWireless Appliance is configured as a mobility agent, it will act as an NTP client and use the mobility manager as the NTP server. If the appliance is configured as a mobility manager, its local NTP will be enabled for the mobility domain. 3 Click OK to continue, and then do the following: • • Role — Select the role for the controller, Manager or Agent. One controller on the network is designated as the mobility manager and all other controllers are designated as mobility agents. Port — Click the interface on the controller to be used for communication between mobility manager and mobility agent. Ensure that the selected interface is routable on the network. For more information, see Configuring Mobility on page 555. ft ra • Manager IP — Type the IP address of the mobility manager port if the controller is configured as the mobility agent. 4 In the Default VNS section, select the Enable check box to enable a default VNS for the controller. Note Refer to Virtual Network Services on page 22 for more information about the default VNS. The default VNS parameters display. 5 Click Finish. The Success screen displays. Basic Installation Wizard - Success Screen ExtremeWireless™ V10.41.06 User Guide 44 Configuring the ExtremeWireless Appliance We recommend that you change the factory default administrator password. af 2 To change the administrator password: a Type a new administrator password in the New Password. b Confirm the new password in the Confirm Password field. c Click Save. Your new password is saved. 3 Click OK, and then click Close. Note The ExtremeWireless Appliance reboots after you click Save if the time zone is changed during the Basic Install Wizard. If the IP address of the management port is changed during the configuration with the Basic Install Wizard, the ExtremeWireless Assistant session is terminated and you will need to log back in with the new IP address. The Wireless Assistant home screen displays. Configuring the ExtremeWireless Appliance for the First Time After the ExtremeWireless Appliance is deployed, perform the following configuration tasks: ExtremeWireless™ V10.41.06 User Guide 45 Configuring the ExtremeWireless Appliance • • • • • • • • • • • • Changing the Administrator Password on page 46 Applying Product License Keys on page 47 Setting Up the Data Ports on page 51 Setting Up Internal VLAN ID and Multicast Support on page 58 Setting Up Static Routes on page 59 Setting Up OSPF Routing on page 61 Configuring Filtering at the Interface Level on page 65 Protecting Controller Interfaces and the Internal Captive Portal Page on page 69 Configuring the Login Authentication Mode on page 75 Configuring SNMP on page 85 Configuring Network Time on page 89 Configuring DNS Servers for Resolving Host Names of NTP and RADIUS Servers on page 94 The basic installation wizard automatically configures aspects of the controller deployment. You can modify that configuration according to your network specifications. ft ra Changing the Administrator Password Extreme Networks recommends that you change your default administrator password once your system is deployed. The ExtremeWireless Appliance default password is abc123. When the controller is installed and you elect to change the default password, the new password must be a minimum of eight characters. The minimum eight character password length is not applied to existing passwords. For example, if a six character password is already being used and an upgrade of the software is performed, the software does not require the password to be changed to a minimum of eight characters. However, once the upgrade is completed and a new account is created, or the password of an existing account is changed, the new password length minimum will be enforced. To Change the Administrator Password: From the top menu, click Controller. In the left pane, click Login Management. In the Full Administrator table, click the administrator user name. In the Password field, type the new administrator password. In the Confirm Password field, type the new administrator password again. Click Change Password. Note The ExtremeWireless Controller provides you with local login authentication mode, the RADIUS-based login authentication mode, and combinations of the two authentication modes. The local login authentication is enabled by default. For more information, see Configuring the Login Authentication Mode on page 75. ExtremeWireless™ V10.41.06 User Guide 46 Configuring the ExtremeWireless Appliance Applying Product License Keys The controller’s license system works on simple software-based key strings. A key string consists of a series of numbers and/or letters. Using these key strings, you can license the software, and enhance the capacity of the controller to manage additional APs. The key strings can be classified into the following variants: • Activation Key — Activates the software. This key is further classified into sub-variants: • Temporary Activation Key — Activates the software for a trial period of 90 days. • Permanent Activation Key — Activates the software for an infinite period. • Cloud provider license. • Subscription license. Note You must obtain a specific activation key to run release v10.01 or later. Once installed, the number of available Radar licenses increments by 2. • ft ra Option Key — Activates the optional feature: • Capacity Enhancement Key Format — For AP: Enhances the capacity of the controller to manage additional APs. You may have to add multiple capacity enhancement keys to reach the ExtremeWireless's limit. Depending on the appliance model, a capacity enhancement key adds the following APs: C5110 — Adds 25 wireless APs C5210 — Adds 25 or 100 wireless APs C5215 — Adds 25 or 100 wireless APs C4110 — Adds 25 wireless APs C25 — Adds 1 or 16 wireless APs C35 — Adds 1 or 16 wireless APs V2110 — Adds 1 or 16 wireless APs Note If you connect additional wireless APs to an ExtremeWireless controller that has a permanent activation key without installing a capacity enhancement key, a grace period of seven days will start. You must install the correct key during the grace period. If you do not install the key, the controller will start generating event logs every 15 minutes, indicating that the key is required. In addition, you will not be able to edit the Virtual Network Services (VNS) parameters. • Capacity Enhancement Key Format — For Radar: Enhances the capacity of the controller to manage Radar licenses for multiple APs. Radar capacity licenses are only required for In-Service Scan Profiles (for more information, see Radar License Requirements on page 565). The capacity enhancement key includes a capacity increment which determines the number of APs supported as follows: License format: RADCAP(where is the capacity increment): RADCAP001 — Adds 1 wireless AP RADCAP016 — Adds 16 wireless APs ExtremeWireless™ V10.41.06 User Guide 47 Configuring the ExtremeWireless Appliance RADCAP025 — Adds 25 wireless APs RADCAP100 — Adds 100 wireless APs Note Any AP assigned to an In-Service scan profile counts as 1 against the licensed Radar capacity. The controller can be in the following licensing modes: • Unlicensed — When the controller is not licensed, it operates in ‘demo mode.’ In ‘demo mode,’ the controller allows you to operate as many APs as you want, subject to the maximum limit of the platform type. In demo mode, you can use only the b/g radio, with channels 6, 11, and auto. 11n support and Mobility are disabled in demo mode. • Licensed with a temporary activation key — A temporary activation key comes with a regulatory domain. With the temporary activation key, you can select a country from the domain and operate the APs on any channel permitted by the country. A temporary activation key allows you to use all software features. You can operate as many APs as you want, subject to the maximum limit of the platform type. ft ra A temporary activation key is valid for 90 days. Once the 90 days are up, the temporary key expires. You must get a permanent activation key and install it on the controller. If you do not install a permanent activation key, the controller will start generating event logs every 15 minutes, indicating that an appropriate license is required for the current software version. In addition, you will not be able to edit the Virtual Network Services (VNS) parameters. • Cloud Provider — A Cloud Provider license is valid for a period of 5 years. License pooling is not supported because the values are set at the platform limits. Cloud Provider licenses enable local APs with the system limit of the platform, while the radar licenses are set at twice the system limits. e.g. for V2110 medium, local AP licenses available are 250 and Local radar licenses available are 500. • Subscription — A subscription license can be generated for a period between 1 to 255 days. License pooling is not supported because the values are set at the platform limits. A Subscription license enables local APs with the system limit of the platform, while the radar licenses are set at twice the system limits. e.g. for V2110 medium, local AP licenses available are 250 and Local radar licenses available are 500. • Licensed with permanent activation key — A permanent activation key is valid for an infinite period. In addition, unlike the temporary activation key, the permanent activation key allows you to operate a stipulated number of the APs, depending upon the platform type. If you want to connect additional APs, you have to install a capacity enhancement key. You may even have to install multiple capacity enhancement keys to reach the controller’s limit. The Table 6 lists the platform type and the corresponding number of the APs allowed by the permanent activation key. Table 6: Platform Type / Wireless APs Allowed by Permanent Activation Key Platform Wireless APs permitted by permanent activation key Platform’s optimum limit Number of capacity enhancement keys to reach the optimum limit C25 16 50 4 to 34 (depending on the enhancement license type used) C35 50 125 15 to 75 (depending on the enhancement license type used) ExtremeWireless™ V10.41.06 User Guide 48 Configuring the ExtremeWireless Appliance Table 6: Platform Type / Wireless APs Allowed by Permanent Activation Key (continued) Wireless APs permitted by permanent activation key Platform’s optimum limit Number of capacity enhancement keys to reach the optimum limit C4110 50 250 C5110 150 525 15 C5210 100 1000 9 to 36 (depending on the enhancement license type used) C5215 100 1000 9 to 36 (depending on the enhancement license type used) V2110 (Small) 50 17 to 42 (depending on the enhancement license type used) V2110 (Medium) 250 12 to 242 (depending on the enhancement license type used) V2110 (Large) 525 37 to 517 (depending on the enhancement license type used) ft ra Platform If the controller detects multiple license violations, such as capacity enhancement, a grace period counter starts from the moment the first violation occurred. The controller generates event logs for every violation. To leave the grace period, clear all outstanding license violations. The controller can be in an unlicensed state for an infinite period. However, if you install a temporary activation key, the unlicensed state is terminated. After the validity of a temporary activation key and the related grace period expire, the controller generates event logs every 15 minutes, indicating that an appropriate license is required for the current software version. In addition, you will not be able to edit the Virtual Network Services (VNS) parameters. License Pooling If the controller is paired with an availability partner, you can redistribute licenses when a Capacity Enhancement Key (AP or Radar) is installed. Both controllers must be running at least v9.01 and both members must have a permanent license key. Separate pools will be introduced for each type of license, and licenses installed on either member of an availability pair are shared across the pair automatically. License pooling is supported in fast failover and legacy availability setups. The limit of distribution is set by the license key; therefore if a controller has two keys of 25 APs each, then you will be allowed to transfer 25 or 50 APs to the former peer controller (for more information, see Availability on page 537). License pooling is not supported for Cloud Provider and Subscription license types since the values are already set at the platform system limits. Installing the License Keys This section describes how to install the license key on the controller. It does not explain how to generate the license key. For information on how to generate the license key, see the ExtremeWireless License Certificate, which is sent to you via traditional mail. For more information on licensing, see Licensing Considerations on page 108. ExtremeWireless™ V10.41.06 User Guide 49 Configuring the ExtremeWireless Appliance You have to type the license keys on the Wireless Assistant GUI. To install the license keys: 1 From the top menu, click Controller. 2 In the left pane, click Administration > Software Maintenance. 3 Click the EWC Product Keys tab. The bottom pane displays the license summary. Figure 8: Product Keys Tab 4 If you are installing a temporary or permanent activation license key, type the key in the Activation Key field, and then click the Apply Activation Key button. 5 If you are installing a capacity enhancement, type the key in the Option Key field, and then click the Apply Option Key button. ExtremeWireless™ V10.41.06 User Guide 50 Configuring the ExtremeWireless Appliance 6 To view installed keys, click View Installed Keys. The Installed Licensed Keys dialog displays. ra Figure 9: Installed License Keys Setting Up the Data Ports ft A new controller is shipped from the factory with all its data ports set up. Support of management traffic is disabled on all data ports. By default, data interface states are enabled. A disabled interface does not allow data to flow (receive/transmit). Physical ports are represented by the L2 (Ethernet) Ports. The L2 port can be accessed from L2 Ports tabs under ExtremeWireless Controller Configuration. The L2 Ports cannot be removed from the system but their operational status can be changed. Refer to Viewing and Changing the L2 Ports Information on page 52. Link Aggregation ports are represented by the L2 (peer-to-peer) LAG (Link Aggregation Group) Ports. The L2 port and Topology information can be accessed from L2 Ports and Topology tabs under ExtremeWireless Controller Configuration. The LAG L2 Ports cannot be removed from the system but their operational status can be changed. Refer to Viewing and Changing the L2 Ports Information on page 52. Note You can redefine a data port to function as a Third-Party AP Port. Refer to Viewing and Changing the Physical Topologies on page 54 for more information. ExtremeWireless™ V10.41.06 User Guide 51 Configuring the ExtremeWireless Appliance Viewing and Changing the L2 Ports Information To view and change the l2 port information: 1 From the top menu, click Controller. 2 In the left pane, click Network > L2 Ports. The L2 Ports tab is displayed. ft ra 3 The L2 Ports tab presents the Physical (that is, Ethernet) and LAG (peer to peer) data ports that exist on the controller. These ports cannot be deleted and new ones cannot be created. LAG ports are statically configured by adding/removing physical ports from the LAG. Physical port belong to at most one LAG at one time. L2 port attached to a LAG port does not have any properties and could not be attached to any topology. The L2 ports attached to LAG ports can be enabled or disabled. Optional, if changes occur to the port physical parameters (speed, half or full duplex), a warning will be displayed to indicate that the L2 port does not meet LAG conditions. Considerations for attaching/detaching regular L2 ports to LAG ports: • • • • Regular L2 port should not have any bridged and physical topologies associated with the port. Regular L2 port should not be disabled. • After detaching the L2 port, it could be attached to any bridged or physical topology or points via a routing table to the port any Routed topology. Jumbo Frames support is a feature that allows the configuration of physical Maximum Transmission Unit (MTU) sizes larger than the standard 1500 bytes on the AP and controller. When Jumbo Frames is enabled, the maximum MTU is 1800 bytes. • L2 ports can be detached from LAG ports regardless of any topologies attached to the LAG port. If the L2 port is the last remaining in LAG, a warning will be issued. If last port of the LAG has been detached, the LAG should be in operational DOWN state. ExtremeWireless™ V10.41.06 User Guide 52 Configuring the ExtremeWireless Appliance 4 Assigning any bridged or physical topology without specifying an L2 port is not supported. However, you can move any bridged and physical topology to either a physical or LAG L2 port. Physical: • • • • • • • C5110 — Three data ports, displayed as esa0, esa1, and esa2. C5210 — Four data ports, displayed as esa0, esa1, esa2, and esa3. C5215 — Four data ports, displayed as esa0, esa1, esa2, and esa3. C4110 — Four data ports, displayed as Port1, Port2, Port3, and Port4. C25 — Two data ports, displayed as esa0 and esa1. C35 — Four data ports, displayed as esa0, esa1, esa2, and esa3. V2110 — Two data ports, displayed as esa0 and esa1. Link Aggregation: • • • • • • C5110 — One data port, displayed as lag1 C5210 — Two data ports, displayed as lag1 and lag2. C5215 — Two data ports, displayed as lag1 and lag2. ft ra C4110 — Two data ports, displayed as lag1 and lag2. C35 — Two data ports, displayed as lag1 and lag2. C25 — One data port, displayed as lag1. 5 An “Admin” port is created by default. This represents a physical port, separate from the other data ports, being used for management connectivity. For more information, see Configuring the Admin Port on page 263. Parameters displayed for the L2 Ports are: • Operational status, represented graphically with a green checkmark (UP) or red X (DOWN). This is the only configurable parameter. • • • • • Port name, as described above. MAC address, as per Ethernet standard. Untagged VLAN, displays the associated untagged VLAN ID. This ID is unique among topologies. Tagged VLAN, displays the associated tagged VLAN ID. Attached Physical L2 Ports (Link Aggregation L2 Ports only) select the physical L2 ports associated with the link aggregation L2 Ports. Note Refer to Viewing and Changing the Physical Topologies on page 54 for more information about L2 port topologies. 6 If desired, change the operational status by clicking the Enable check box. You can change the operational state for each port. By default, data interface states are enabled. If they are not enabled, you can enable them individually. A disabled interface does not allow data to flow (receive/transmit). 7 If support of MTU sizes above 1500 bytes is required, click Enable Jumbo Frames support. This will extend the MTU size to 1800 bytes on the data link layer. Enabling Jumbo Frames support requires that port speed to be 1Gbps or higher on the controller and the APs which support Jumbo Frames. Jumbo Frames are not supported on 10 or 100 Mbps speeds. ExtremeWireless™ V10.41.06 User Guide 53 Configuring the ExtremeWireless Appliance Viewing and Changing the Physical Topologies To view and change the L2 Port topologies: 1 From the top menu, click Controller. 2 In the left pane, click Network > Topologies. An associated topology entry is created by default for each L2 Port with the same name. The Topologies tab is displayed. ft ExtremeWireless™ V10.41.06 User Guide 54 Configuring the ExtremeWireless Appliance 3 To make changes, select a specific topology. The Edit Topology dialog appears. ft ra For the data ports predefined in the system, Name and Mode are not configurable. 4 Optionally, configure one of the physical topologies for Third Party AP connectivity by clicking the 3rd Party AP Topology check box. You must configure a topology to which you will be connecting third-party APs by checking this box. Only one topology can be configured for third-party APs. Third-party APs must be deployed within a segregated network for which the controller becomes the single point of access (i.e., routing gateway). When you define a third-party AP topology, the interface segregates the third-party AP from the remaining network. 5 To configure an interface for VLAN assignment, configure the VLAN Settings in the Layer 2 box. When you configure a controller port to be a member of a VLAN, you must ensure that the VLAN configuration (VLAN ID, tagged or untagged attribute, and Port ID) is matched with the correct configuration on the network switch. 6 To replicate topology settings, click Synchronize in the Status field. 7 If the desired IP configuration is different from the one displayed, change the Interface IP and Mask accordingly in the Layer 3 box. For this type of data interface, the Layer 3 check box is selected automatically. This allows for IP Interface and subnet configuration together with other networking services. ExtremeWireless™ V10.41.06 User Guide 55 Configuring the ExtremeWireless Appliance 8 The MTU value specifies the Maximum Transmission Unit or maximum packet size for this topology. The fixed value is 1500 bytes for physical topologies. If you are using OSPF, be sure that the MTU of all the interfaces in the OSPF link match. Note If the routed connection to an AP traverses a link that imposes a lower MTU than the default 1500 bytes, the controller and AP participate in automatic MTU discovery and adjust their settings accordingly. At the controller, MTU adjustments are tracked on a per AP basis. If the ExtremeWireless software cannot discover the MTU size, it enforces the static MTU size. 9 To enable AP registration through this interface, select the AP Registration check box. Wireless APs use this port for discovery and registration. Other controllers can use this port to enable inter-controller device mobility if this port is configured to use SLP or the controller is running as a manager and SLP is the discovery protocol used by the agents. 10 To enable management traffic, select the Management Traffic check box. Enabling management provides access to SNMP (v1/v2c, v3), SSH, and HTTPs management interfaces. ft ra Note This option does not override the built-in protection filters on the port. The built-in protection filters for the port, which are restrictive in the types of packets that are allowed to reach the management plane, are extended with a set of definitions that allow for access to system management services through that interface (SSH, SNMP, HTTPS:5825). 11 To enable the local DHCP Server on the controller, in the DHCPfield, select Local Server. Then, click on the Configure button to open the DHCP configuration pop-up window. Note The local DHCP Server is useful as a general-purpose DHCP Server for small subnets. ExtremeWireless™ V10.41.06 User Guide 56 Configuring the ExtremeWireless Appliance a In the Domain Name field, type the name of the domain that you want the APs to use for DNS Server’s discovery. b In the Lease (seconds) default field, type the time period for which the IP address will be allocated to the APs (or any other device requesting it). c In the Lease (seconds) max field, type the maximum time period in seconds for which the IP address will be allocated to the APs. d In the DNS Servers field, type the DNS Server’s IP address if you have a DNS Server. e In the WINS field, type the WINS Server’s IP address if you have a WINS Server. Note You can type multiple entries in the DNS Servers and WINS fields. Each entry must be separate by a comma. These two fields are not mandatory to enable the local DHCP feature. In the Gateway field, type the IP address of the default gateway. ft ra Note Since the controller is not allowed to be the gateway for the segment, including APs, you cannot use the Interface IP address as the gateway address for physical and Bridged at Controller topology. For Routed topology, the controller IP address must be the gateway. g Configure the address range from which the local DHCP Server will allocate IP addresses to the APs. • • In the Address Range: from field, type the starting IP address of the IP address range. In the Address Range: to field, type the ending IP address of the IP address range. h Click the Exclusion(s) button to exclude IP addresses from allocation by the DHCP Server. The DHCP Address Exclusion window opens. The controller automatically adds the IP addresses of the Interfaces (Ports), and the default gateway to the exclusion list. You cannot remove these IP addresses from the exclusion list. ExtremeWireless™ V10.41.06 User Guide 57 Configuring the ExtremeWireless Appliance ft ra • • Select Range. In the From field, type the starting IP address of the IP address range that you want to exclude from the DHCP allocation. In the To field, type the ending IP address of the IP address range that you want to exclude from the DHCP allocation. • To exclude a single address, select the Single Address radio button and type the IP address in the adjacent field. • In the Comment field, type any relevant comment. For example, you can type the reason for which a certain IP address is excluded from the DHCP allocation. Click Add. The excluded IP addresses are displayed in the IP Address(es) to exclude from DHCP Address Range field. • • • To delete a IP Address from the exclusion list, select it in the IP Address(es) to exclude from DHCP Range field, and then click Delete. To save your changes, click OK. Note The Broadcast (B’cast) Address field is view only. This field is computed from the mask and the IP addresses. Setting Up Internal VLAN ID and Multicast Support You can configure the Internal VLAN ID, and enable multicast support. The internal VLAN used only internally and is not visible on the external traffic. The physical topology used for multicast is represented by a physical topology to/from which the multicast traffic is forwarded in conjunction with ExtremeWireless™ V10.41.06 User Guide 58 Configuring the ExtremeWireless Appliance the virtual routed topologies (and VNSs) configured on the controller. Please note that no multicast routing is available at this time. To configure the Internal VLAN ID and enable multicast support: 1 From the top menu, click Controller. 2 In the left pane, click Network > Topologies. The Topologies tab is displayed. ft 3 In the Internal VLAN ID field, type the internal VLAN ID. 4 From the Multicast Support drop-down list, select the desired physical topology. 5 To save your changes, click Save. Setting Up Static Routes When setting up a controller routing protocol, you must define a default route to your enterprise network, either with a static route or by using the OSPF protocol. A default route enables the controller to forward packets to destinations that do not match a more specific route definition. To Set a Static Route on the controller: ExtremeWireless™ V10.41.06 User Guide 59 Configuring the ExtremeWireless Appliance From the top menu, click Controller. The Wireless Controller Configuration screen displays. 2 In the left pane, click Network > Routing Protocols. The Static Routes tab is displayed. ra 3 To add a new route, click New, and in the Edit route dialog, enter the following information: • In the Destination Address field, type the IP address of the destination controller. To define a default static route for any unknown address not in the routing table, type 0.0.0.0. In the Subnet Mask field, type the appropriate subnet mask to separate the network portion from the host portion of the IP address (typically 255.255.255.0). To define the default static route for any unknown address, type 0.0.0.0. • In the Gateway field, type the IP address of the adjacent router port or gateway on the same subnet as the controller to which to forward these packets. This is the IP address of the next hop between the controller and the packet’s ultimate destination. • Select the Override dynamic routes check box to give priority over the OSPF learned routes, including the default route, which the controller uses for routing. This option is enabled by default. To remove this priority for static routes, so that routing is controlled dynamically at all times, clear the Override dynamic routes check box. • ft • Note If you enable dynamic routing (OSPF), the dynamic routes will normally have priority for outgoing routing. For internal routing on the controller, the static routes normally have priority. ExtremeWireless™ V10.41.06 User Guide 60 Configuring the ExtremeWireless Appliance 4 To save your changes, click Save. Viewing the Forwarding Table You can view the defined routes, whether static or OSPF, and their current status in the forwarding table. To view the forwarding table on the controller: From the Routing Protocols Static Routes tab, click View Forwarding Table. The Forwarding Table is displayed. 2 Alternatively, from the top menu, click Reports. The Available AP Reports screen displays. 3 In the left pane, click Routing Protocols, then click Forwarding Table. The Forwarding Table is displayed. ft ra This report displays all defined routes, whether static or OSPF, and their current status. 4 To update the display, click Refresh. Setting Up OSPF Routing Open Shortest Path First (OSPF) is a robust link-state routing protocol. OSPF forms adjacencies with neighbors and shares information via the Designated Router (DR) and Backup DR using link state advertisements. Areas in OSPF are used to limit LSAs and summarize routes. Everyone connects to area zero, the backbone. Related Links Enabling OSPF Routing on page 62 Setting OSPF Routing Settings on page 62 ExtremeWireless™ V10.41.06 User Guide 61 Configuring the ExtremeWireless Appliance Confirming OSPF Ports on page 65 Enabling OSPF Routing To enable OSPF (OSPF RFC2328) routing, you must: Specify at least one topology on which OSPF is enabled on the Port Settings option of the OSPF tab. This is the interface on which you can establish OSPF adjacency. 2 Enable OSPF globally on the controller. 3 Define the global OSPF parameters. 4 Ensure that the OSPF parameters defined here for the controller are consistent with the adjacent routers in the OSPF area. This consistency includes the following: • • ft ra If the peer router has different timer settings, the protocol timer settings in the controller must be changed to match to achieve OSPF adjacency. The MTU of the ports on either end of an OSPF link must match. The MTU for ports on the controller is fixed at 1500. This matches the default MTU in standard routers. The maximum MTU can be increased to 1800 bytes by enabling Jumbo Frames support (for more information, see Setting Up the Data Ports on page 51). It is important to ensure that the MTU of the ports on either end of an OSPF link match. If there is a mismatch in the MTU, then the OSPF adjacency between the controller and the neighboring router might not get established. Related Links Setting Up OSPF Routing on page 61 Setting OSPF Routing Settings on page 62 Confirming OSPF Ports on page 65 Setting OSPF Routing Settings To set OSPF routing global settings on the controller: 1 From the top menu, click Controller. 2 In the left pane, click Network > Routing Protocols. The Static Routes tab is displayed by default. ExtremeWireless™ V10.41.06 User Guide 62 Configuring the ExtremeWireless Appliance 3 Click the OSPF tab. ra 4 From the OSPF Status drop-down list, click On to enable OSPF. In the Router ID field, type the IP address of the controller. This ID must be unique across the OSPF area. If left blank, the OSPF daemon automatically picks a router ID from one of the controller’s interface IP addresses. 5 In the Area ID field, type the area. 0.0.0.0 is the main area in OSPF. 6 In the Area Type drop-down list, click one of the following: • • ft • Default — The default acts as the backbone area (also known as area zero). It forms the core of an OSPF network. All other areas are connected to it, and inter-area routing happens via a router connected to the backbone area. Stub — The stub area does not receive external routes. External routes are defined as routes which were distributed in OSPF via another routing protocol. Therefore, stub areas typically rely on a default route to send traffic routes outside the present domain. Not-so-stubby — The not-so-stubby area is a type of stub area that can import autonomous system (AS) external routes and send them to the default/backbone area, but cannot receive AS external routes from the backbone or other areas. 7 To save your changes, click Save. ExtremeWireless™ V10.41.06 User Guide 63 Configuring the ExtremeWireless Appliance 8 To add a new OSPF interface, click New or select a port to configure by clicking on the desired port in the Port Settings table. The Edit Port dialog displays. ft ra 9 In the Link Cost field, type the OSPF standard value for your network for this port. This is the cost of sending a data packet on the interface. The lower the cost, the more likely the interface is to be used to forward data traffic. Note If more than one port is enabled for OSPF, it is important to prevent the controller from serving as a router for other network traffic (other than the traffic from wireless device users on routed topologies controlled by the controller). For more information, see Policy Rules on page 288. 10 In the Authentication drop-down list, click the authentication type for OSPF on your network: None or Password. The default setting is None. 11 If Password is selected as the authentication type, in the Password field, type the password. If None is selected as the Authentication type, leave this field empty. This password must match on either end of the OSPF connection. 12 Type the following: • Hello-Interval — Specifies the time in seconds (displays OSPF default).The default setting is 10 seconds. • Dead-Interval — Specifies the time in seconds (displays OSPF default). The default setting is 40 seconds. Retransmit-Interval — Specifies the time in seconds (displays OSPF default). The default setting is 5 seconds. • • Transmit Delay— Specifies the time in seconds (displays OSPF default). The default setting is 1 second. 13 To save your changes, click Save. Related Links Setting Up OSPF Routing on page 61 Enabling OSPF Routing on page 62 Confirming OSPF Ports on page 65 ExtremeWireless™ V10.41.06 User Guide 64 Configuring the ExtremeWireless Appliance Confirming OSPF Ports To confirm that the ports are set up for OSPF, and that advertised routes from the upstream router are recognized: Click View Forwarding Table. The Forwarding Table is displayed. The following additional reports display OSPF information when the protocol is in operation: • OSPF Neighbor — Displays the current neighbors for OSPF (routers that have interfaces to a common network) • OSPF Linkstate — Displays the Link State Advertisements (LSAs) received by the currently running OSPF process. The LSAs describe the local state of a router or network, including the state of the router’s interfaces and adjacencies. 2 To update the display, click Refresh. Related Links Setting Up OSPF Routing on page 61 Enabling OSPF Routing on page 62 ft ra Setting OSPF Routing Settings on page 62 Configuring Filtering at the Interface Level The ExtremeWireless solution has a number of built-in filters that protect the system from unauthorized traffic. These filters are specific only to the controller. These filters are applied at the network interface level and are automatically invoked. By default, these filters provide stringent-level rules to allow only access to the system's externally visible services. In addition to these built-in filters, the administrator can define specific exception filters at the interface-level to customize network access. These filters depend on Topology Modes and the configuration of an L3 interface for the topology. For Bridged at Controller topologies, exception filters are defined only if L3 (IP) interfaces are specified. For Physical, Routed, and 3rd Party AP topologies, exception filtering is always configured since they all have an L3 interface presence. Built-in Interface-based Exception Filters On the controller, various interface-based exception filters are built in and invoked automatically. These filters protect the controller from unauthorized access to system management functions and services via the interfaces. Access to system management functions is granted if the administrator selects the allow management traffic option in a specific topology. Allow management traffic is possible on the topologies that have L3 IP interface definitions. For example, if management traffic is allowed on a physical topology (esa0), only users connected through ESA0 will be able to get access to the system. Users connecting on any other topology, such as Routed or Bridged Locally at Controller, will no longer be able to target ESA0 to gain management access to the system. To allow access for users connected on such a topology, the given topology configuration itself must have allow management traffic enabled and users will only be able to target the topology interface specifically. On the controller’s L3 interfaces (associated with either physical, Routed, or Bridged Locally at Controller topologies), the built-in exception filter prohibits invoking SSH, HTTPS, or SNMP. However, such traffic is allowed, by default, on the management port. ExtremeWireless™ V10.41.06 User Guide 65 Configuring the ExtremeWireless Appliance If management traffic is explicitly enabled for any interface, access is implicitly extended to that interface through any of the other interfaces (VNS). Only traffic specifically allowed by the interface’s exception filter is allowed to reach the controller itself. All other traffic is dropped. Exception filters are dynamically configured and regenerated whenever the system's interface topology changes (for example, a change of IP address for any interface). Enabling management traffic on an interface adds additional rules to the exception filter, which opens up the well-known IP(TCP/UDP) ports, corresponding to the HTTPS, SSH, and SNMP applications. The interface-based built-in exception policy rules, in the case of traffic from wireless users, are applicable to traffic targeted directly for the topology L3 interface. For example, a filter specified by a Role may be generic enough to allow traffic access to the controller's management (for example, Allow All [*.*.*.*]). Exception policy rules are evaluated after the user's assigned filter role, as such, it is possible that the role allows the access to management functions that the exception filter denies. These packets are dropped. To enable SSH, HTTPS, or SNMP access through a physical data interface: 1 From the top menu, click Controller. 2 In the left pane, click Network > Topologies. The Topologies tab is displayed. 3 On the Topologies tab, click the appropriate data port topology. The Edit Topology window displays. ExtremeWireless™ V10.41.06 User Guide 66 Configuring the ExtremeWireless Appliance 4 Select the Management Traffic check box if the topology has specified an L3 IP interface presence. 5 To save your changes, click Save. Working with Administrator-defined Interface-based Exception Filters You can add specific policy rules at the interface level in addition to the built-in rules. Such rules give you the capability of restricting access to a port, for specific reasons, such as a Denial of Service (DoS) attack. The policy rules are set up in the same manner as policy rules defined for a Role — specify an IP address, select a protocol if applicable, and then either allow or deny traffic to that address. For more information, see Policy Rules on page 288. The rules defined for port exception filters are prepended to the normal set of restrictive exception filters and have precedence over the system's normal protection enforcement (that is, they are evaluated first). ft ra Warning If defined improperly, user exception rules may seriously compromise the system’s normal security enforcement rules. They may also disrupt the system's normal operation and even prevent system functionality altogether. It is advised to only augment the exception-filtering mechanism if absolutely necessary. To define interface exception filters: 1 From the top menu, click Controller. 2 In the left pane, click Network > Topologies. The Topologies screen displays. 3 Select a topology to be configured. The Edit Topology window is displayed. ExtremeWireless™ V10.41.06 User Guide 67 Configuring the ExtremeWireless Appliance 4 If the topology has an L3 interface defined, an Exception Filters tab is available. Select this tab. The Exception Filter rules are displayed. af ExtremeWireless™ V10.41.06 User Guide 68 Configuring the ExtremeWireless Appliance 5 Add rules by either: • Click Add Predefined , select a filter from the drop down list, and click Add. ft ra • Click Add, configure the following parameters, then click OK: In the IP / subnet:port field, type the destination IP address. You can also specify an IP range, a port designation, or a port range on that IP address. 10 In the Protocol drop-down list, click the protocol you want to specify for the filter. This list may include UDP, TCP, GRE, IPsec-ESP, IPsec-AH, ICMP (Internet Control Message Protocol). The default is N/A. The new filter is displayed in the upper section of the screen. Click the new filter entry. To allow traffic, select the Allow check box. To adjust the order of the policy rules, click Up or Down to position the rule. The policy rules are executed in the order defined here. To save your changes, click Save. Protecting Controller Interfaces and the Internal Captive Portal Page By default, the controller is shipped with a self-signed certificate used to perform the following tasks: • • Protect all interfaces that provide administrative access to the controller Protect the internal Captive Portal page This certificate is associated with topologies that have a configured L3 (IP) interface. If you continue to use the default certificate to secure the controller and internal Captive Portal page, your web browser will likely produce security warnings regarding the security risks of trusting self- ExtremeWireless™ V10.41.06 User Guide 69 Configuring the ExtremeWireless Appliance signed certificates. To avoid the certificate-related web browser security warnings, you can install customized certificates on the controller. Note To avoid the certificate-related web browser security warnings when accessing the controller, you must also import the customized certificates into your web browser application. Before Installing a Certificate Before you create and install a certificate: Select a certificate format to install. The controller supports several types of certificates, as shown in Table 7. Table 7: Supported Certificate and CA Formats Description PKCS#12 The PKCS#12 certificate (.pfx) file contains both a certificate and the corresponding private key. The controller will accept the PKCS#12 file as long as the format of the private key and certificate are valid. ft ra Certificate Format PEM/DER The PEM/DER certificate (.crt) file requires a separate PEM/DER private key (.key) file. The controller uses OpenSSL PKCS12 command to convert the .crt and .key files into a single .pfx PKCS#12 certificate file. The controller will accept the PEM/DER file as long as the format of the private key and certificate are valid. PEM-formatted CA public certificate file If you choose to install this optional certificate, you must do so when specifying the PCKCS#12 or PEM/DER certificates. Note When generating the PKCS#12 certificate file or PEM/DER certificate and key files, you must ensure that the interface identified in the certificate corresponds to the controller’s interface for which the certificate is being installed. 2 Understand how the controller monitors the expiration date of installed certificates. The controller generates an entry in the events information log as the certificate expiry date approaches, based on the following schedule: 15, 8, 4, 2, and 1 day prior to expiration. The log messages cease when the certificate expires. For more information, refer to the Extreme Networks ExtremeWireless Maintenance Guide. 3 Understand how the controller manages certificates during upgrades and migrations. Installed certificates will be backed up and restored with the controller configuration data. Installed certificates will also be migrated during an upgrade and during a migration. Installing a Certificate for a Controller Interface To install a certificate for a Controller Data Interface: From the top menu, click Controller. 2 In the left pane, click Network > Topologies. The Topologies tab is displayed. ExtremeWireless™ V10.41.06 User Guide 70 Configuring the ExtremeWireless Appliance 3 Click the Certificates tab. Topologies with an L3 interface will be listed. 4 In the Interface Certificates table, click to select the topology for which you want to install a certificate. The Configuration for Topologies section displays. Note There are separate certificates if IPv4 and IPv6 is configured for Admin topology. The Configuration for Topologies section and the Generate Signing Request button become available. Use the field and button descriptions in Table 8 to create and install certificates. Note The certificate Common Name (CN) must match the interface IP or DNS addresses (Admin only). Table 8: Topologies Page: Certificates Tab Fields and Buttons Field/Button Description Interface Certificates Topology Topology name Expiry Date Date when the certificate expires ExtremeWireless™ V10.41.06 User Guide 71 Configuring the ExtremeWireless Appliance Table 8: Topologies Page: Certificates Tab Fields and Buttons (continued) Field/Button Description CA Cert. Identifies whether or not a CA certificate has been installed on the topology. Name (CN) The IP address of DNS address associated with the topology that the certificate applies to. Note: The Name field supports both IPv4 or IPv6 addresses. Org Unit (OU) Name of the organization’s unit. Organization Name of the organization Configuration for Topology Replace/Install selected Topology’s certificate To replace/install the existing port’s certificate and key using this option, do the following: ft ra From the click the Generate Signing Request button to create the certificate and key. 2 Download the CSR when prompted. 3 Use a 3rd party certificate service to sign the CSR and create a certificate and a Certificate Authority (CA) file. 4 Save the certificate on your computer. 5 Return to the Certificates tab on the ExtremeWireless UI. 6 Select the topology for which you created the certificate and select Replace/Install selected Topologies certificate. 7 Click Browse next to the Signed certificate to install field. 8 Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the Certificate file to install field. 9 (Optional) Click Browse next to the Optional:Enter PEMencoded CA public certificates file field. The Choose file dialog is displayed. 10 (Optional) Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the Optional:Enter PEM-encoded CA public certificates file field. Note: If you choose to install a CA public certificate, you must install it when you install the PEM/DER certificate and key. ExtremeWireless™ V10.41.06 User Guide 72 Configuring the ExtremeWireless Appliance Table 8: Topologies Page: Certificates Tab Fields and Buttons (continued) Field/Button Description Replace/Install selected Topology’s certificate and key from a single file To replace the existing port’s certificate and key using this option, do the following: ft ra Click Browse next to the PKCS #12 file to install field. The Choose file dialog is displayed. Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the PKCS #12 file to install field. In the Private key password box, type the password for the key file. The key file is password protected. (Optional) Click Browse next to the Optional:Enter PEMencoded CA public certificates file field. The Choose file dialog is displayed. (Optional) Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the Optional:Enter PEM-encoded CA public certificates file field. Note: If you choose to install a CA public certificate, you must install it when you install the PEM/DER certificate and key. Replace/Install selected Topology’s certificate and key from separate files To replace the existing port’s certificate and key using this option, do the following: Click Browse next to the PKCS #12 file to install field. The Choose file dialog is displayed. Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the PKCS #12 file to install field. Click Browse next to the Private key file to install field. The Choose file dialog is displayed. Navigate to the key file you want to install for this port, and then click Open. The key file name is displayed in the Private key file to install field. In the Private key password box, type the password for the key file. The key file is password protected. (Optional) Click Browse next to the Optional:Enter PEMencoded CA public certificates file field. The Choose file dialog is displayed. (Optional) Navigate to the certificate file you want to install for this port, and then click Open. The certificate file name is displayed in the Optional:Enter PEM-encoded CA public certificates file field. Note: If you choose to install a CA public certificate, you must install it when you install the PEM/DER certificate and key. Reset selected Topology to the factory default certificate and key Remove custom certificate that user installed. No change No change. ExtremeWireless™ V10.41.06 User Guide 73 Configuring the ExtremeWireless Appliance Table 8: Topologies Page: Certificates Tab Fields and Buttons (continued) Field/Button Description Generate Signing Request To generate a CSR for the controller, click Generate Signing Request. The Generate Certificate Signing Request window displays (Figure 10). Save Click to save the changes to this Topology. Note To avoid the certificate-related web browser security warnings when accessing the Wireless Assistant, you must also import the customized certificates into your web browser application. ft ra Figure 10: Generate Certificate Signing Request Window Table 9: Generate Certificate Signing Request Page - Fields and Buttons Field/Button Description Country name The two-letter ISO abbreviation of the name of the country State or Province name The name of the State/Province Locality name (city) The name of the city. Organization name The name of the organization Organizational Unit name The name of the unit within the organization. Common Name Set the common name to be one of the following: the IP address of the interface that the CSR applies to. a DNS address associated with the IP address of the interface that the CSR applies to. ExtremeWireless™ V10.41.06 User Guide 74 Configuring the ExtremeWireless Appliance Table 9: Generate Certificate Signing Request Page - Fields and Buttons (continued) Field/Button Description Email address The email address of the organization Generate Signing Request Click to generate a signing request. A certificate request file is generated (.csr file extension). The name of the file is the IP address of the topology you created the CSR for. The File Download dialog is displayed. Configuring the Login Authentication Mode You can configure the following login authentication modes to authenticate administrator login attempts: • ft ra Local authentication — The controller uses locally configured login credentials and passwords. See Configuring the Local Login Authentication Mode and Adding New Users on page 75. RADIUS authentication — The controller uses login credentials and passwords configured on a RADIUS server. See Configuring the RADIUS Login Authentication Mode on page 78. • • Local authentication first, then RADIUS authentication — The controller first uses locally configured login credentials and passwords. If this login fails, the controller attempts to validate login credentials and passwords configured on a RADIUS server. See Configuring the Local, RADIUS Login Authentication Mode on page 82. • RADIUS authentication first, then local authentication — The controller first uses login credentials and passwords configured on a RADIUS server. If this login fails, the controller attempts to validate login credentials and passwords configured locally. See Configuring the RADIUS, Local Login Authentication Mode on page 84. Note The ExtremeWireless Appliance enables you to recover the controller via the Rescue mode if you have lost its login password. For more information, see the ExtremeWireless Maintenance Guide. Configuring the Local Login Authentication Mode and Adding New Users Local login authentication mode is enabled by default. If the login authentication was previously set to another authentication mode, you can change it to the local authentication. You can also add new users and assign them to a login group — as full administrators, read-only administrators, or as a GuestPortal managers. For more information, see Defining Wireless Assistant Administrators and Login Groups on page 673. To configure the local login authentication mode: From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 75 Configuring the ExtremeWireless Appliance 2 In the left pane, click Administration > Login Management. The Login Management screen displays. af 3 In the Authentication mode section, click Configure. The Login Authentication Mode Configuration window is displayed. ExtremeWireless™ V10.41.06 User Guide 76 Configuring the ExtremeWireless Appliance 4 Select the Local check box. If the RADIUS check box is selected, deselect it. 5 Click OK. 6 In the Add User section, select one of the following from the Group drop-down list: • • • Full Administrator — Grants the administrator’s access rights to the administrator. Read-only Administrator — Grants read-only access right to the administrator. GuestPortal Manager — Grants the user GuestPortal manager rights. 7 In the User ID box, type the user’s ID. 8 In the Password box, type the user’s password. Note UNICODE characters are not supported in passwords for local and remote RADIUS/ TACACS+ authentication. All passwords must be 8 to 24 characters long. ft ra 9 In the Confirm Password box, re-type the password. 10 To add the user, click Add User. The new user is added. 11 Click Save. The Administrator Password Confirmation window is displayed. 12 Select the appropriate option. • Yes — Change authentication mode to local. Use the administrator password currently defined on the controller. • Yes, but I want to change administrator’s password first — Change authentication mode to local and change the administrator password currently defined on the controller. • No — Do not change the authentication mode to local. 13 Click Submit. 14 If you chose Yes, but I want to change administrator’s password first, you are prompted to change the administrator’s password. ExtremeWireless™ V10.41.06 User Guide 77 Configuring the ExtremeWireless Appliance Configuring the RADIUS Login Authentication Mode The local login authentication mode is enabled by default. You can change the local login authentication mode to RADIUS-based authentication. Note Before you change the default local login authentication to RADIUS-based authentication, you must configure the RADIUS Server on the Global Settings screen. For more information, see VNS Global Settings on page 392. RADIUS is a client/server authentication and authorization access protocol used by a network access server (NAS) to authenticate users attempting to connect to a network device. The NAS functions as a client, passing user information to one or more RADIUS servers. The NAS permits or denies network access to a user based on the response it receives from one or more RADIUS servers. RADIUS uses User Datagram Protocol (UDP) for sending the packets between the RADIUS client and server. ft ra You can configure a RADIUS key on the client and server. If you configure a key on the client, it must be the same as the one configured on the RADIUS servers. The RADIUS clients and servers use the key to encrypt all RADIUS packets transmitted. If you do not configure a RADIUS key, packets are not encrypted. The key itself is never transmitted over the network. Note Before you configure the system to use RADIUS-based login authentication, you must configure the Service-Type RADIUS attribute on the RADIUS server. EWC uses the standard RADIUS attribute Service-Type to put the user into the appropriate groups: • • • Administrator Service-Type = 6 Read-Only Service-Type = 7 GuestPortal Manager Service-Type = 8 To configure the RADIUS login authentication mode: 1 From the top menu, click Controller. 2 In the left pane, click Administration > Login Management. The Login Management screen displays. ExtremeWireless™ V10.41.06 User Guide 78 Configuring the ExtremeWireless Appliance 3 Click the RADIUS Authentication tab. af 4 In the Authentication mode section, click Configure. The Login Authentication Mode Configuration window is displayed. ExtremeWireless™ V10.41.06 User Guide 79 Configuring the ExtremeWireless Appliance 5 Deselect Local and select the RADIUS check box. ft ra 6 Click OK. 7 From the drop-down list, located next to the Use button, select the RADIUS Server that you want to use for the RADIUS login authentication, and then click Use. The RADIUS Server’s name is displayed in the Configured Servers box, and in the Auth section, and the following default values of the RADIUS Server are displayed. Note The RADIUS Servers displayed in the list located against the Use button are defined on Global Settings screen. For more information, see VNS Global Settings on page 392. The following values can be edited: • • • • NAS IP address — The IP address of Network Access Server (NAS). NAS Identifier — The Network Access Server (NAS) identifier. The NAS identifier is a RADIUS attribute that identifies the server responsible for passing information to designated RADIUS servers, and then acting on the response returned. Auth Type — The authentication protocol type (PAP, CHAP, MS-CHAP, or MS-CHAP2). Set as Primary Server — Specifies the primary RADIUS server when there are multiple RADIUS servers. 8 To add additional RADIUS servers, repeat step 7. Note You can add up to three RADIUS servers to the list of login authentication servers. When you add two or more RADIUS servers to the list, you must designate one of them as the Primary server. The controller first attempts to connect to the Primary server. If the Primary Server is not available, it tries to connect to the second and third server according to their order in the Configured Servers box. You can change the order of RADIUS servers in the Configured Servers box by clicking on the Up and Down buttons. ExtremeWireless™ V10.41.06 User Guide 80 Configuring the ExtremeWireless Appliance 9 Click Test to test connectivity to the RADIUS server. Note You can also test the connectivity to the RADIUS server after you save the configuration. If you do not test the RADIUS server connectivity, and you have made an error in configuring the RADIUS-based login authentication mode, you will be locked out of the controller when you switch the login mode to the RADIUS login authentication mode. If you are locked out, access Rescue mode via the console port to reset the authentication method to local. The following window is displayed. ft ra 10 In the User ID and the Password fields, type the user’s ID and the password, which were configured on the RADIUS Server, and then click Test. The RADIUS connectivity result is displayed. Note To learn how to configure the User ID and the Password on the RADIUS server, refer to your RADIUS server’s user guide. If the test is not successful, the following message will be displayed: ExtremeWireless™ V10.41.06 User Guide 81 Configuring the ExtremeWireless Appliance 11 If the RADIUS connectivity test displays “Successful” result, click Save on the RADIUS Authentication screen to save your configuration. ft ra The following window is displayed: 12 If you tested the RADIUS server connectivity earlier in this procedure, click No. If you click Yes, you will be asked to enter the RADIUS server user ID and password. 13 To change the authentication mode to RADIUS authentication, click OK. You will be logged out of the controller immediately. You must use the RADIUS login user name and password to log on the controller. To cancel the authentication mode changes, click Cancel. Configuring the Local, RADIUS Login Authentication Mode To configure the Local, RADIUS login authentication mode: From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 82 Configuring the ExtremeWireless Appliance 2 In the left pane, click Administration > Login Management. The Login Management screen displays. af 3 In the Authentication mode section, click Configure. 4 Select the Local and RADIUS check box. ExtremeWireless™ V10.41.06 User Guide 83 Configuring the ExtremeWireless Appliance 5 If necessary, select Local and use the Move Up button to move Local to the top of the list. 6 Click OK. 7 On the Login Management screen, click Save. For information on setting local login authentication settings, see Configuring the Local Login Authentication Mode and Adding New Users on page 75. For information on setting RADIUS login authentication settings, see Configuring the RADIUS Login Authentication Mode on page 78. Configuring the RADIUS, Local Login Authentication Mode To configure the RADIUS, Local login authentication mode: From the top menu, click Controller. 2 In the left pane, click Administration > Login Management. The Login Management screen displays. 3 In the Authentication mode section, click Configure. The Login Authentication Mode Configuration window is displayed. 4 Select the Local and RADIUS check box. ExtremeWireless™ V10.41.06 User Guide 84 Configuring the ExtremeWireless Appliance 5 If necessary, select the RADIUS field and use the Move Up button to move RADIUS to the top of the list. ft ra 6 Click OK. 7 On the Login Management screen, click Save. For information on setting RADIUS login authentication settings, see Configuring the RADIUS Login Authentication Mode on page 78. For information on setting local login authentication settings, see Configuring the Local Login Authentication Mode and Adding New Users on page 75. Configuring SNMP The controller supports the SNMP for retrieving statistics and configuration information. If you enable SNMP on the controller, you can choose either SNMPv3 or SNMPv1/v2 mode. If you configure the controller to use SNMPv3, then any request other than SNMPv3 request is rejected. The same is true if you configure the controller to use SNMPv1/v2. To configure SNMP: From the top menu, click Controller. The Wireless Controller Configuration screen displays. ExtremeWireless™ V10.41.06 User Guide 85 Configuring the ExtremeWireless Appliance 2 In the left pane, click Network > SNMP. The SNMP screen displays. ra 3 In the SNMP Common Settings section, configure the following: • • • • • • Mode — Select SNMPv1/v2c or SNMPv3 to enable SNMP. Contact Name — The name of the SNMP administrator. • • Configuring SNMPv1/v2c-specific Parameters on page 87 Configuring SNMPv3-specific Parameters on page 87 ExtremeWireless™ V10.41.06 User Guide ft Location — The physical location of the controller running the SNMP agent. SNMP Port — The destination port for the SNMP traps. Possible ports are 0–65555. Forward Traps — The lowest severity level of SNMP trap that you want to forward. Publish AP as interface of controller — Enable or disable SNMP publishing of the access point as an interface to the controller. 4 Select the tab for the SNMP version you are configuring. For more information, see: 86 Configuring the ExtremeWireless Appliance Configuring SNMPv1/v2c-specific Parameters Configure the following parameters on the SNMPv1/v2c tab: • • • Read Community Name — The password that is used for read-only SNMP communication. Read/Write Community Name — The password that is used for write SNMP communication. • Manager B — The IP address of the server used as the secondary network manager that will receive SNMP messages. Manager A — The IP address of the server used as the primary network manager that will receive SNMP messages. Note Manager A and Manager B address fields support both IPv4 or IPv6 addresses. 2 Click Save. Configuring SNMPv3-specific Parameters Configure the parameters following on the SNMPv3 tab: ft ra • • Context String — A description of the SNMP context. Engine ID — The SNMPv3 engine ID for the controller running the SNMP agent. The engine ID must be from 5 to 32 characters long. • RFC3411 Compliant — The engine ID will be formatted as defined by SnmpEngineID textual convention (that is, the engine ID will be prepended with SNMP agents' private enterprise number assigned by IANA as a formatted HEX text string). 2 Click Add User Account. The Add SNMPv3 User Account window displays. 3 Configure the following parameters: • • • • • User — Enter the name of the user account. Security Level — Select the security level for this user account. Choices are: authPriv, authNoPriv, noAuthnoPriv. Auth Protocol — If you have selected a security level of authPriv or authNoPriv, select the authentication protocol. Choices are: MD5 (Message-Digest algorithm 5), SHA, None. Auth Password — If you have selected a security level of authPriv or authNoPriv, enter an authentication password. Privacy Protocol — If you have selected the security level of authPriv, select the privacy protocol. Choices are: DES, None • • Privacy Password — If you have selected the security level of authPriv, enter a privacy password. Engine ID — If desired, enter an engine ID. The ID can be between 5 and 32 bytes long, with no spaces, control characters, or tabs. • Destination IP — If desired, enter the IP address of a trap destination. Note The Destination IP address field supports both IPv4 or IPv6 addresses. 4 Click OK. The Add SNMPv3 User Account window closes. 5 Repeat steps 2 through 4 to add additional users. ExtremeWireless™ V10.41.06 User Guide 87 Configuring the ExtremeWireless Appliance 6 In the Trap 1 and Trap 2 sections, configure the following parameters: • Destination IP — The IP address of the machine monitoring SNMPv3 traps Note The Destination IP address field supports both IPv4 or IPv6 addresses. • User Name — The SNMPv3 user to configure for use with SNMPv3 traps 7 Click Save. Editing an SNMPv3 User To edit an SNMPv3 user: 1 From the top menu, click Controller. 2 In the left pane, click SNMP. The SNMP screen displays. 3 Click the SNMPv3 tab. 4 Select an SNMP user. ft ra 5 Click Edit Selected User. The Edit SNMPv3 User Account window displays. 6 Edit the user configuration as desired. 7 Click OK. The Edit SNMPv3 User Account window closes. 8 Click Save. Deleting an SNMPv3 User To delete an SNMPv3 user: From the top menu, click Controller. In the left pane, click SNMP. The SNMP screen displays. Click the SNMPv3 tab. Select an SNMP user. 5 Click Delete Selected User. You are prompted to confirm that you want to delete the selected user. 6 Click OK. SNMP Trap Types The SNMP agent generates traps to notify the administrator of events such as configuration changes, component failures, and disconnection of Access Points. Administrators can configure the Agent and the Controller, defining the level of trap to receive. The following trap types are supported by ExtremeWireless Controllers: • • • Interfaces MIB (IF-MIB) linkDown (.1.3.6.1.6.3.1.1.5.3) Interfaces MIB (IF-MIB) linkUp (.1.3.6.1.6.3.1.1.5.4) HIPATH-WIRELESS-HWC-MIB apTunnelAlarm (.1.3.6.1.4.1.4329.15.3.19.4) • Sent by the controller when it detects that it has lost the connection to an AP. The trap identifies • the AP that the controller can no longer contact. HIPATH-WIRELESS-HWC-MIB hiPathWirelessLogAlarm (.1.3.6.1.4.1.4329.15.3.9.6) ExtremeWireless™ V10.41.06 User Guide 88 Configuring the ExtremeWireless Appliance • A generic trap that contains specific information relevant to the event. The information is carried in the trap, and the information varies from event to event. • The trap contains the trap severity, the component on the controller that raised the event, and the text string associated with the event, as it appears in the controller GUI. • A trap containing one event that also is displayed in the controller’s Event / Log report page. The trap is sent when the event is raised and recorded on the controller. • This trap accounts for the vast majority of traps messages sent by the controller at most sites. Configuring Network Time You should synchronize the clocks of the controller and the APs to ensure that the logs and reports reflect accurate time stamps. For more information, see Working with Reports and Statistics on page 621. ft ra The normal operation of the controller will not be affected if you do not synchronize the clock. The clock synchronization is necessary to ensure that the logs display accurate time stamps. In addition, clock synchronization of network elements is a prerequisite for the following configuration: • • Mobility Manager Session Availability Network Time Synchronization Network time is synchronized in one of two ways: • • Using the system’s time — The system’s time is the controller’s time. Using Network Time Protocol (NTP) — The Network Time Protocol is a protocol for synchronizing the clocks of computer systems over packet-switched data networks. The controller automatically adjusts for any time change due to Daylight Savings time. Configuring the Network Time Using the System’s Time From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 89 Configuring the ExtremeWireless Appliance 2 In the left pane, click Network > Network Time. The Network Time screen displays. ft ra 3 From the Continent or Ocean drop-down list, click the appropriate large-scale geographic grouping for the time zone. 4 From the Time Zone Region drop-down list, click the appropriate time zone region for the selected country. 5 Click Apply Time Zone. 6 In the System Time field, type the system time. 7 Click Set Clock. The WLAN network time is synchronized in accordance with the controller’s time. Configuring the Network Time Using an NTP Server From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 90 Configuring the ExtremeWireless Appliance 2 In the left pane, click Network > Network Time. The Network Time screen displays. af 3 From the Continent or Ocean drop-down list, click the appropriate large-scale geographic grouping for the time zone. 4 From the Time Zone Region drop-down list, click the appropriate time zone region for the selected country. 5 Click Apply Time Zone. 6 In the System Time box, type the system time. 7 Select the Use NTP check box. Note If you want to use the controller as the NTP Server, select the Run local NTP Server check box, and click Apply. 8 In the Time Server 1 text box, type the IP address or FQDN (Full Qualified Domain Name) of an NTP time server that is accessible on the enterprise network. Note The Time Server fields supports both IPv4 and IPv6 addresses. 9 Repeat for Time Server2 and Time Server3 text boxes. If the system is not able to connect to the Time Server 1, it will attempt to connect to the additional servers that have been specified in Time Server 2 and Time Server 3 text boxes. ExtremeWireless™ V10.41.06 User Guide 91 Configuring the ExtremeWireless Appliance 10 Click Apply. The WLAN network time is synchronized in accordance with the specified time server. Configuring Secure Connections The controllers communicate amongst themselves using a secure protocol. Among other things, this protocol is used to share between controllers the data required for high availability. They also use this protocol to communicate with NMS Wireless Manager. The protocol requires the use of a shared secret for mutual authentication of the end points. By default the controllers and NMS Wireless Manager use a well known factory default shared secret. This makes it easy to get up and running but is not as secure as some sites require. The controllers and NMS Wireless Manager allow the administrator to change the shared secret used by the secure protocol. In fact the controllers and Wireless Manager can use a different shared secret for each individual end point to which they connect with the protocol. To configure the shared secret for a connection on the controller: ft ra From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 92 Configuring the ExtremeWireless Appliance 2 In the left pane, click Network > Secure Connections. The Secure Connections screen displays. ft 3 Select Enable Weak Ciphers to enable weak ciphers for the remote connections. Disabling weak ciphers prevents users from accessing various web pages on the controller using less secure methods. 4 Enter the Server IP address of the other end of the secure protocol tunnel and the shared secret to use. 5 Click Add/Update. 6 Click Save. Note Configure the same shared secret onto the devices at each end of the connection. Otherwise, the two controllers or controller and NMS Wireless Manager will not be able to communicate. ExtremeWireless™ V10.41.06 User Guide 93 Configuring the ExtremeWireless Appliance Configuring DNS Servers for Resolving Host Names of NTP and RADIUS Servers Because the Global Settings screen allows you to set up NTP and RADIUS servers by defining their host names, you have to configure your DNS servers to resolve the host names of NTP and RADIUS servers to the corresponding IP addresses. Go to VNS > Global Settings. Note For more information on RADIUS server configuration, see Defining RADIUS Servers and MAC Address Format on page 394. You can configure up to three DNS servers to resolve NTP and RADIUS server host names to their corresponding IP addresses. The controller sends the host name query to the first DNS server in the stack of three configured DNS servers. The DNS server resolves the queried domain name to an IP address and sends the result back to the controller. ft ra If for some reason, the first DNS server in the stack of configured DNS servers is not reachable, the controller sends the host name query to the second DNS server in the stack. If the second DNS server is also not reachable, the query is sent to the third DNS server in the stack. To configure DNS servers for resolving host names of NTP and RADIUS servers: From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 94 Configuring the ExtremeWireless Appliance 2 In the left pane, click Administration > Host Attributes. The Host Attributes screen displays. af 3 In the DNS box, type the DNS server’s IP address in the Server Address field and then click Add Server. The new server is displayed in the DNS servers’ list. Note You can configure up to three DNS servers. The Server Address field supports both IPv4 and IPv6 addresses. 5 To save your changes, click Save. 4 Int the Default Gateway IP box, enter the IP address of the Default Gateway. Using a Third-party Location-based Solution ExtremeWireless supports the following location-based solutions: • • • AeroScout Ekahau Centrak On the controller, configure the AeroScout/Ekahau/Centrak server IP address and enable the locationbased service. When using AeroScout or Ekahau, the location-based server is aware of the controller IP address. And if using AeroScout, the controller notifies the AeroScout server of the operational APs. ExtremeWireless™ V10.41.06 User Guide 95 Configuring the ExtremeWireless Appliance Enable the location-based service on the APs that you want to participate. Note Participating APs must use the 2.4 GHz band and the radio that receives location-based service tags must have at least one WLAN service associated with it. Once you have enabled the location-based service on the controller and the participating APs, at least one of the participating APs will receive reports from a location-based service Wi-Fi RFID tag in the 2.4 GHz band. The tag reports are collected by the AP and forwarded to the location-based server by encapsulating the tag reports in a WASSP tunnel and routing them as IP packets through the controller. When using Ekahau or Centrak, the controller does not converse directly with the location-based service server. Note Tag reports are marked with UP=CS5, and DSCP = 0xA0. On the wireless controller, tag reports are marked with UP=CS5 to the core (if 802.1p exists). ft ra An AP’s tag report collection status is reported in the AP Inventory report. For more information, see Viewing Routing Protocol Reports on page 657. If availability is enabled, tag report transmission pauses on failed over APs until they are configured and notified by the location-based server. With an availability pair, it is good practice to configure both controllers with the same location-based service. When location-based service support is disabled on the controller, the controller does not communicate with the location-based server and the APs do not perform any location-based functionality. Ensure that your location-based service tags are configured to transmit on all non-overlapping channels (1, 6 and 11) and also on channels above 11 for countries where channels above 11 are allowed. For information about proper deployment of the location-based solution, refer to the third-party documentation (AeroScout/Ekahau/Centrak). Related Links Configuring Location-Based Services on page 96 AP Multi-Edit Properties on page 111 AP Properties Tab - Advanced Settings on page 164 Configuring Location-Based Services To configure a controller for use with an AeroScout/Ekahau/Centrak solution: From the top menu, click Controller. ExtremeWireless™ V10.41.06 User Guide 96 Configuring the ExtremeWireless Appliance 2 In the left pane, click Services > Location-based Service. 3 Select the desired location-based service for the controller. ft ra • • Enter the IP address of the location based service server. Centrak and Ekahau configuration offer a default port number and multicast address, but you can modify the default values if necessary. 4 Click Save. Now assign APs to participate in the location-based service. ExtremeWireless™ V10.41.06 User Guide 97 Configuring the ExtremeWireless Appliance 5 From the top menu, click AP. In the left pane, click APs. Note You can enable location-based service on APs using the Location-based service field on the AP Multi-edit screen and the Advanced window of the AP Default Settings screen. The following procedure shows you how to enable location-based services on one AP at a time. 6 Click on an AP row. The AP Status dashboard displays. 7 Click Configure to display the Configuration dialog. ExtremeWireless™ V10.41.06 User Guide 98 Configuring the ExtremeWireless Appliance 8 Click Advanced. The Advanced dialog displays. af 9 Select Enable location-based service and close the dialog. 10 Enable Location-based services on each additional AP that you want to participate. 11 Click Save. Related Links Using a Third-party Location-based Solution on page 95 AP Multi-Edit Properties on page 111 AP Properties Tab - Advanced Settings on page 164 Additional Ongoing Operations of the System Ongoing operations of the Extreme Networks ExtremeWireless system can include the following: • • • • Controller System Maintenance Client Disassociate Logs and Traces Reports and Displays ExtremeWireless™ V10.41.06 User Guide 99 Configuring the ExtremeWireless Appliance For more information, see Performing System Administration on page 669 or the Extreme Networks ExtremeWireless Maintenance Guide. ft ra ExtremeWireless™ V10.41.06 User Guide 100 4 Configuring the ExtremeWireless APs ft ra Wireless AP Overview Discovery and Registration Viewing a List of All APs Wireless AP Default Configuration Configuring Wireless AP Properties Outdoor Access Point Installation Assigning Wireless AP Radios to a VNS Configuring Wireless AP Radio Properties Configuring IoT Applications Setting Up the Wireless AP Using Static Configuration Setting Up 802.1x Authentication for a Wireless AP Configuring Co-Located APs in Load Balance Groups Configuring an AP Cluster Configuring an AP as a Guardian Configuring a Captive Portal on an AP AP3916ic Integrated Camera Deployment Performing AP Software Maintenance Understanding the ExtremeWireless LED Status Wireless AP Overview Extreme Networks ExtremeWireless APs use the 802.11 wireless standards (802.11a/b/g/n/ac) for network communications, and bridge network traffic to an Ethernet LAN. In addition to the Wireless APs that run proprietary software and communicate with a controller only, Extreme Networks offers a Cloud-enabled APs. The 3805i and the AP39xx series are radar capable, Cloud-enabled APs that interoperate fully with ExtremeCloud and other ExtremeWireless products. A wireless AP physically connects to a LAN infrastructure and establishes an IP connection to a controller, which manages the AP configuration through the Wireless Assistant. The controller also provides centralized management (verification and upgrade) of the AP firmware image. A UDP-based protocol enables communication between an AP and a controller. The UDP-based protocol encapsulates IP traffic from the AP and directs it to the controller. The controller decapsulates the packets and routes them to the appropriate destinations, while managing sessions and applying roles. ExtremeWireless™ V10.41.06 User Guide 101 Configuring the ExtremeWireless APs AP Model Firmware Support Refer to the ExtremeWireless Hardware Firmware Support Matrix to easily determine the currently supported firmware version and the minimum firmware version for each ExtremeWireless access point. Wireless Protocol Standards (802.11) Most current wireless networks and end-user devices use the IEEE 802.11n wireless protocol standard. The 802.11n APs are backward-compatible with existing 802.11a/b/g networks and devices. The AP38xx and AP39xx series APs support the 802.11ac wireless protocol. • The AP3705i delivers data rates up to 300 Mbps per radio; the AP37xx series APs except for the AP3705i deliver data rates up to 450 Mbps per radio. • • The AP38xx series APs deliver data rates up to 1.3 Gbps on Radio 1 (the 5 GHz radio) and 450 Mbps on Radio 2 (the 2.4 GHz radio) The AP39xx series supports an internal antenna array and active/active E/N data ports that deliver data rates up to 1.7 Gbps on Radio 1 and 600 Mbps on Radio 2. ft ra To configure an 802.11n/ac AP to achieve this high link rate, see Achieving High Throughput with 11n and 11ac Wireless APs on page 187. Antennas Some wireless AP models have built-in, internal antennas; some support external antennas. APs with internal antennas are certified as a complete unit. External antennas are individually certified for maximum transmitting power and determination of available channels in each country in which the AP is deployed. The latest AP3915i/e and AP3917i/e models offer both Wi-Fi antennas and IoT antennas that are used to receive iBeacon signals from IoT devices. For a list of the external antennas that can be used with each AP model and how to install them, refer to the Installation Guide for each AP and to the ExtremeWireless External Antenna Site Preparation and Installation Guide. Wireless APs with external antenna ports must be configured to associate the external antenna connected to each antenna port. For more information, see Configuring Wireless AP Properties on page 156. AP Types (Features) AP model types are differentiated by their feature design, particularly: • Indoor/Outdoor — APs are built for either indoor or outdoor service. • Indoor APs are built for use in enclosed, protected areas (like inside buildings) where they are not exposed to harsh weather or temperature extremes. Indoor APs have optional mounting brackets for mounting the AP on walls or drop ceilings. • Outdoor APs are built weather-hardened, with watertight fittings for cables and antennas, splash guards, and a greater resistance to temperature extremes (both cold and heat). Outdoor APs can ExtremeWireless™ V10.41.06 User Guide 102 Configuring the ExtremeWireless APs • extend your Wireless LAN to outdoor locations without Ethernet cabling. Mounting brackets are available to enable quick and easy mounting of the Outdoor APs to walls, rails, and poles. Controller-based — Controller-based APs are intended to be controlled centrally by an ExtremeWireless Appliance. All AP and service configuration, bridging, and networking is done on the controller, with the AP acting as the remote access point relaying communications between the network (the controller) and end-user devices. • Cloud-enabled — Cloud-enabled APs are intended to be controlled by ExtremeCloud™ an easy to use and scalable cloud-based management platform that supports and transforms with your business. Combined with enterprise-grade wired and wireless cloud-managed devices, ExtremeCloud delivers a scalable and highly available pay-as-you go subscription solution. • IoT ready, smoke detector models — ExtremeWireless offers APs that are equipped with IoT antennas for receiving iBeacon signals from IoT devices. The controller collects and filters data based on configuration parameters, and forwards the data to an Application Server for reporting. The AP3915i/e and AP3917i/e are equipped with IoT antennas. Additionally, the indoor model (AP3915i/e) is equipped with a smoke detector. ft ra The AP3912 and AP3916 models are equipped with BLE radios that send iBeacon signals to IoT devices. • • • AP 3916ic (Integrated Camera) — 2x2 11ac AP with an integral security camera (2MP camera with resolution up to 1080p) that lets you extend your Wireless LAN and provide simultaneous wireless service, BLE or 802.15.4 coverage and security in public spaces, such as classrooms and offices. This fully featured access point can be mounted on the ceiling or wall. The integral ONVIF compatible security camera is connected to an internal wired Ethernet port. The AP3916ic provides flow based data handling for the wireless and wired connections. Enabled for ExtremeCloud™ support. AP 3912 Wall Plate — 2x2 11ac AP that is installed replacing other existing Ethernet wall plates with one or two ports. One Ethernet port on the wall plate must be connected to the LAN1 uplink connection on the AP (black). This link provides AF or AT POE to the AP and uplink data connectivity to the network. The other Ethernet port on the wall plate can be connected to the passthrough port on the AP (blue), allowing connection options for wired devices like IP phones. The AP3912 is intended to take advantage existing wired Ethernet outlets and a switch port. The AP3912 is installed over an existing wall plate, and it is connected to the existing cable / switch port. The AP offers an integrated BTLE/802.15.4 radio for connectivity to Internet of Things (IoT) sensors and devices. Enabled for ExtremeCloud™ support. Threat Detection and Prevention Capability —As the potential for wireless security threats grows, APs must evolve to detect and counter hostile intrusion and attacks. The AP37xx, AP38xx, AP39xx and W78xC series of access points are designed to support Radar channel monitoring and are configurable for protection against detected attacks. The Radar and Mitigator functions are described in greater detail in Threat Detection and Prevention Features on page 105. Configuration of these functions on controllers is described in Working with ExtremeWireless Radar on page 563. Other differentiating features in an AP product series are the number of internal or external antennas (see Antennas on page 102) or the number of radios the AP has (see Radios on page 103). Radios All wireless APs are equipped with at least two radios — Radio 1 and Radio 2: ExtremeWireless™ V10.41.06 User Guide 103 Configuring the ExtremeWireless APs • • Radio 1 supports a 5 GHz radio band Radio 2 supports a 2.4 GHz radio band Note The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. The AP39xx supports up to 1.7 Gbps on the 5 GHz radio and 600 Mbps on the 2.4 GHz radio using four spatial streams. The 38xx and AP37xx series radios (except AP3705i) support up to 450Mbps using three spatial streams. The radios are enabled or disabled through the Wireless Assistant. For more information, see Modifying 11n and 11ac Wireless AP Radio Properties on page 178. The Unlicensed National Information Infrastructure (U-NII) bands all lie within the 5 GHz band, designed for short-range, high-speed, wireless networking communication. ft ra 802.11n APs support the full range of frequencies available in the 5 GHz band: • • • • 5150 to 5250 MHz - U-NII Low band 5250 to 5350 MHz - U-NII Middle Band 5470 to 5700 MHz - U-NII Worldwide 5725 to 5825 MHz - U-NII High Band Note 802.11n-compliant wireless APs can achieve link rates of up to 300 Mbps. You can configure the controller for this higher level link rate. For more information, see Achieving High Throughput with 11n and 11ac Wireless APs on page 187. AP3916ic (Integrated Camera) The AP3916ic is an 11ac Wave 2 AP with an integral security camera that lets you extend your Wireless LAN and provide simultaneous wireless service, BLE or 802.15.4 coverage and security in public spaces, such as classrooms and offices. The AP3916 can be mounted on the ceiling, wall or in a junction/gang box. The integral ONVIF compatible security camera is connected to an internal wired Ethernet port, and the AP provides policy enforcement control for the wireless and wired connections. The AP3916ic has the following specifications: • • • • • Integrated 2MP camera with resolution up to 1080p, with manual view adjustment. Radios: Two concurrent Wi-Fi radios (2.4 GHz and 5 GHz) and one additional radio that can operate as Bluetooth or 802.15.4. Antennas: Four internal single band Wi-Fi antennas and one internal antenna for Bluetooth (BLE) or 802.15.4. LEDs: Six 802.3af compliant for full functionality. Optional AC adapter. ExtremeWireless™ V10.41.06 User Guide 104 Configuring the ExtremeWireless APs • • • • • Supports the 802.11ac and 802.11n wireless standards, with full backward compatibility with legacy 802.11abg. 10/100/1000 Mbps operation. Adjustable mounting bracket (included) for drop-ceiling T-bar rail. Optional mounts can be purchased separately for junction/gang box, indoor wall and solid ceiling installation. Enabled for ExtremeCloud™ support. ExtremeWireless support for the AP3916ic: • Camera is powered by the AP3916i PoE power supply: • Camera port (CAM) can be assigned through policy to B@AP or B@AC virtual network service topologies. Default and specific assignment is supported. You can use policy definition and assignment to provide network segmentation for network access and camera (CAM) functions. • The AP3916ic's camera function is identified as "EXTR2MP-CAM" device type. Filter the appliance client list to obtain a list of cameras under the appliance management. • The controller provides factory reset and restart functions for the camera. ft ra Related Links AP3916ic Integrated Camera Deployment on page 226 Upgrading the Camera Image Manually on page 237 AP3916ic-Camera Web User Interface on page 227 Threat Detection and Prevention Features ExtremeWireless Appliances and the wireless APs they manage, provide Wireless Intrusion Detection Services (WIDS) and Wireless Intrusion Prevention Services (WIPS) to detect, report, and protect against potential wireless network attacks and threats such as rogue APs, AP spoofing, honeypot APs, password cracking, man-in-the-middle, denial of service (DoS), and others. The latest generation of controllers and the APs (AP39xx, AP38xx, AP37xx and W78xC series) implement the Radar feature and its major functions: • • • • • Scanning channels for threat identification Analyzing and detecting a wide range of wireless security threats Taking active countermeasures (if configured to do so) against identified threats Validating WLAN (Wireless Local Area Network) Service configuration to protect against security weakness Generating threat event reports and forwarding them to Extreme Management Center™ All APs can simultaneously perform channel bridging and scan (monitor) the channels they are bridging. These APs can also be configured (on their controller) to perform countermeasures against detected threats. Radar threat detection scanning of channels on the APs is configured on In-Service Scan Profiles. You can configure APs to operate as full time Radar agents by adding them to a Guardian Scan Profile. When operating in this mode, they are referred to as "Guardians." Once assigned to the Guardian Scan Profile, the APs stop forwarding traffic on both radios and devote all of their resources to threat detection and countermeasures. Any AP added to a Guardian Scan Profile is done so in its entirety. Therefore, it is not possible to dedicate one radio to scanning, and the other to forwarding. Guardian AP ExtremeWireless™ V10.41.06 User Guide 105 Configuring the ExtremeWireless APs can scan on multiple channels, which you can configure from the Scan Profile Detection Settings user interface. The AP cannot scan or transmit on channels that are prohibited by the regulations of the countries in which it is deployed. Related Links Guardian Scan Profile Detection Settings on page 578 Working with ExtremeWireless Radar on page 563 802.11n- and 802.11ac-Compliant Access Point Features All 802.11n-compatible APs have the following features: MIMO ft ra Wireless APs use MIMO (multiple input, multiple output) — a technology that uses advanced signal processing with multiple antennas to improve throughput. MIMO takes advantage of multipath propagation to decrease packet retries to improve the fidelity of the wireless network. MIMO increases throughput by using multiple streams. MIMO radios send out one, two or three radio signals through each antenna. Each signal is called a spatial stream. The antennas on the AP are deliberately spaced so that each spatial stream follows a slightly different path to the client device. Two spatial streams get multiplied into several streams as they bounce off obstructions in the vicinity. This phenomenon is called multipath. As the streams are bounced from different surfaces, they follow different paths to the client device. The client device also has multiple antennas. Each of the antennas independently decodes the arriving signal. Then the decoded signal from each antenna combines with the decoded signals from the other antennas. A software algorithm uses this redundancy to extract one or two spatial streams and enhances the signal to noise ratio of the streams. The client device also sends out one or two spatial streams through its multiple antennas. These spatial streams get multiplied into several steams as they bounce off the obstructions in the vicinity en route to the AP. MIMO receivers receive these multiple streams with three antennas. Each of the three antennas independently decodes the arriving signal. Then the decoded signal of each antennas is combined with the decoded signals from the other antennas. The receiving AP's MIMO receiver also uses redundancy to extract one or two spatial streams and enhances the streams' signal to noise ratio. ExtremeWireless™ V10.41.06 User Guide 106 Configuring the ExtremeWireless APs Operating with multiple antennas, an AP with MIMO is capable of picking up even the weakest signals from the client devices. Figure 11: MIMO in Wireless APs ft The AP39xx models offer Multi-User MIMO that enables Wave2 APs to communicate with multiple Wave2 clients concurrently, in the downstream direction. Up to 3 MU-MIMO conversations concurrently. Channel Bonding In addition to MIMO technology, the 802.11n-compliant APs have additional radio features that increase the effective throughput of the wireless LAN. Second-generation wireless APs use radio channels that are 20 MHz wide. The channels must be spaced at 20 MHz to avoid interference. The radios of 802.11ncompliant wireless APs can use two channels at the same time to create a 40-MHz-wide channel. The 802.11ac radio of the AP38xx and AP39xx series can use four channels at the same time to create an 80MHz-wide channel. By using multiple 20-MHz channels in this manner, the wireless AP achieves more than double the throughput. The 40-MHz and 80-MHz channels in 802.11n and 802.11ac are adjacent 20- ExtremeWireless™ V10.41.06 User Guide 107 Configuring the ExtremeWireless APs MHz channels, bonded together. This technique of using multiple channels at the same time is called channel bonding. Shortened Guard Interval The purpose of the guard interval is to introduce immunity to propagation delays, echoes and reflections of symbols in orthogonal frequency division multiplexing (OFDM) — a method by which information is transmitted via a radio signal in APs. In OFDM, the beginning of each symbol is preceded by a guard interval. As long as the echoes fall within this interval, they do not affect the safe decoding of the actual data, as data is interpreted only outside the guard interval. Longer guard periods reduce the channel efficiency. 802.11n-compliant APs provide reduced guard periods, thereby increasing the throughput. MAC Enhancements 802.11n-compliant APs also have an improved MAC layer protocol that reduces overhead (in the MAC layer protocol) and contention losses, resulting in increased throughput. ft ra Wireless AP International Licensing A wireless AP must be configured to operate on the appropriate radio band in accordance with the regulations of the country in which it is being used. For more information, see Regulatory Information on page 705. To configure the appropriate radio band according to the country of operation, use the controller. For more information, see Configuring Wireless AP Properties on page 156. Related Links Licensing Considerations on page 108 Licensing Considerations With ExtremeWireless v10.01 and later each controller is licensed in a specific domain. The domain licenses include: • • • • FCC ROW MNT EGY The user interface reflects the domain of the controller. The following are use cases for each domain: • A wireless appliance with an FCC license can manage access points deployed in the United States, Puerto Rico, or Colombia. • A wireless appliance with a ROW license can manage access points deployed in any country except the United States, Puerto Rico, Egypt, or Colombia. ExtremeWireless™ V10.41.06 User Guide 108 Configuring the ExtremeWireless APs • A wireless appliance with a EGY license will continue to require ROW hardware, but the license will restrict country selection to Egypt only. A wireless controller with a EGY license can manage access points deployed in Egypt. Note If upgrading from v10.21 with an EGY license, call customer support for assistance. • • A wireless appliance with a MNT license can manage only domain-locked access points, which are the AP39xx-FCC, AP39xx-ROW, and the AP3805i-FCC, AP3805i-ROW only. The FCC models must be deployed in the United States, Puerto Rico, or Colombia. The ROW must be deployed in any country except the United States, Puerto Rico, or Colombia. Note The AP37xx and AP38xx will NOT be able to connect to a controller licensed in the MNT domain. ft ra First-time Configuration Guidelines Wireless AP Default IP Address Wireless APs are shipped from the factory with a default IP address — 192.168.1.20. The default IP address simplifies the first-time IP address configuration process for APs. If an AP fails in its discovery process, it returns to its default IP address. This AP behavior ensures that only one AP at a time can use the default IP address on a subnet. For more information, see Discovery and Registration on page 120. Wireless APs can acquire their IP addresses by one of two methods: • DHCP assignment — When an AP is powered on, it attempts to reach the DHCP (Dynamic Host Configuration Protocol) server on the network to acquire an IP address. If successful, the DHCP server assigns an IP address to the AP. • If the DHCP assignment is not successful in the first 60 seconds, the AP returns to its default IP address. • After 30 seconds in the default IP address mode, it attempts again to acquire an IP address from the DHCP server. • The process repeats until the DHCP assignment is successful, or until an administrator assigns the AP an IP address, using static configuration. DHCP assignment is the default method for AP configuration. DHCP assignment is part of the discovery process. For more information, see Discovery and Registration on page 120. • Static configuration —Use the static configuration option to assign a static IP address to a wireless AP. For more information, see the following section. You can establish an SSH session with an AP during the time window of 30 seconds when the AP returns to its default IP address mode. If a static IP address is assigned during this period, reboot the AP for the configuration to take effect. For more information, see Assigning a Static IP Address to a Wireless AP on page 110. ExtremeWireless™ V10.41.06 User Guide 109 Configuring the ExtremeWireless APs Assigning a Static IP Address to a Wireless AP Depending upon the network condition, you can assign a static IP address to a wireless AP using the Wireless Assistant (Controller’s GUI). Refer to Setting Up the Wireless AP Using Static Configuration on page 199 for more information. Configuring Wireless APs for the First Time Before configuring an AP for the first time, confirm that the following tasks have already been performed: • The ExtremeWireless Appliance has been installed and connected to the network. For more information, see Configuring the ExtremeWireless Appliance on page 31. • The ExtremeWireless Appliance has been configured. For more information, see Configuring the ExtremeWireless Appliance on page 31. The wireless APs have been installed. • For installation information, refer to the respective AP Installation Guide. ft ra Once the APs are installed, continue with the AP initial configuration: Define parameters for the discovery process. For more information, see Wireless AP Registration on page 123. 2 Connect the AP to a power source to initiate the discovery and registration process. For installation information, refer to the respective AP Installation Guide. General Configuration Methods This section describes the methods you can use to modify the properties of APs in your network. Modifying the Properties of Wireless APs Based on a Default AP Configuration To reset the AP to the default configuration, select AP Properties > Reset To Defaults. To configure a wireless AP with the system default AP settings: 1 From the top menu, click AP and select the AP to modify. 2 Click Reset to Defaults and click OK to confirm your changes. Caution If you reset an AP to defaults, its Search List is deleted, regardless of the settings in Common Configuration. Modifying the Default Setting of Wireless APs Using the Copy to Defaults Feature The Copy to Defaults feature allows the properties of an already configured AP to become the system’s default AP settings. To modify the system default AP settings based on an already configured AP: From the main menu, click AP and select the AP whose properties you want to use as the default. You can modify the properties here if necessary. ExtremeWireless™ V10.41.06 User Guide 110 Configuring the ExtremeWireless APs 2 Click Copy to Defaults and click OK to confirm your changes. AP Multi-Edit Properties When you use the Multi-edit function, only options that are explicitly modified are changed by the update. The APs shown in the Wireless APs list are supported by various versions of software. Only attributes that are common between software versions are available for multi-edit. Setting an attribute that does not apply to an AP does not cause an abort of the multi-edit operation. Table 10: Multi-Edit AP Properties Field Description AP Properties Location ft ra Define the location of the AP. When a client roams to an AP with a different location, Area Notification is triggered. The Area Notification feature is designed to track client locations within pre-defined areas using either the Location Engine (for more information, see Configuring the Location Engine on page 609) or the AP Location field. When the clients change areas, a notification is sent. Location functionality on the AP is useful when access to Extreme Management Center OneView is not available. Zone Zone allows the RADIUS client to send the AP Zone name as the BSSID instead of the radio MAC address. This feature can be enabled regardless of whether the Site is using centrally located or local RADIUS servers. Zone name is limited to 32 bytes. Each AP can have its own Zone label although it is often useful to assign the same Zone to multiple APs. It can be easier to base authorization decisions on the zone label rather than on the BSSID. Poll Timeout Type the timeout value, in seconds. The AP uses this value to trigger re-establishing the link with the Controller if the AP does not get an answer to its polling. The default value is 10 seconds. Note: If you are configuring session availability, the Poll Timeout value should be 1.5 to 2 times of Detect link failure value on AP Properties screen. For more information, see Session Availability on page 545. ExtremeWireless™ V10.41.06 User Guide 111 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Description Secure Tunnel This feature, when enabled, provides encryption, authentication, and key management between the AP and/or controllers. Select the desired Secure Tunnel mode from the drop-down list: • Disabled — Secure Tunnel is turned off and no traffic is encrypted. All SFTP/SSH/TFTP traffic works normally. • Encrypt control traffic between AP & Controller — An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/ TFTP/WASSP control traffic is encrypted. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. • Encrypt control and data traffic between AP & Controller — This mode only benefits routed/bridged@Controller Topologies. An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/TFTP/WASSP control and data traffic is encrypted. The AP skips the registration and authentication phases, and when selected, the Secure Tunnel Lifetime feature can be configured. ft ra Note: This option is not available for AP3805 models. • Debug mode — An IPSEC tunnel is established from the AP to the controller, no traffic is encrypted, and all SFTP/SSH/TFTP traffic works normally. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. Note: Changing a Secure Tunnel mode will automatically disconnect and reconnect the AP. Secure Tunnel Lifetime (hours) Enter an interval (in hours) at which time the keys of the IPSEC tunnel are renegotiated. Note: Changing the Secure Tunnel Lifetime setting will not cause any AP disruption. Remote Access Determines if the AP can be accessed remotely. Location-based Service Enable or disable third-party location based services on this AP. ExtremeWireless supports the following third-party services: • AeroScout • Ekahau • Centrak Maintain client session in event of poll failure Determines if the AP remains active when a link loss with the controller occurs. Select this option when using a bridged at AP VNS. This option is enabled by default. Restart service in the absence of controller Determines if the AP’s radios continue providing service when the AP’s connection to the controller is lost. Select this option when using a bridged at AP VNS. When this option is enabled, the AP starts a bridged at AP VNS in the absence of a controller. ExtremeWireless™ V10.41.06 User Guide 112 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Description Use broadcast for disassociation Determines if the AP uses broadcast disassociation when disconnecting all clients, instead of disassociating each client one by one. This setting affects the behavior of the AP when the AP is preparing to reboot or preparing to enter one of the special modes (DRM initial channel selection). and when a BSSID is deactivated or removed on the AP. This option is disabled by default. LLDP Determines if the AP broadcasts LLDP (Link Layer Discovery Protocol) information. This option is disabled by default. If SNMP (Simple Network Management Protocol) is enabled on the controller and you enable LLDP, the LLDP Confirmation dialog is displayed. Select one of the following: • Proceed (not recommended) — Select this option to enable LLDP and keep SNMP running. • Disable SNMP publishing, and proceed — Select this option to enable LLDP and disable SNMP. • For more information on enabling SNMP, see the ExtremeWireless Maintenance Guide. ft ra Field Multicast prioritized as voice Ensures that multicast data has the highest priority in the wireless network. Prioritizes multicast data to the level of voice data. This setting must be enabled when deploying healthcare patient monitoring devices. IP Multicast Assembly Determines if IP Multicast Assembly runs on the wireless AP. If enabled, IP Multicast Assembly joins together fragmented multicast data packets that are too large to fit the MTU size of the tunnel header. This feature is disabled by default. Balanced Channel List Power Simplify power settings so settings function across all channels in the channel plan. LED Select the desired LED pattern from the drop-down list. Options include: Off, WDS Signal Strength, Identify, and Normal. Country Indicates the country of operation. The antenna you select determines the available channel list and the maximum transmitting power for the country in which the AP is deployed. Antennas The Professional Install option is only available for AP models with external antennas. The fields and corresponding antenna value options that appear on the Professional Install dialog depend on the selected AP and the antenna models that are available. Select an antenna for each available port. By default, the two antennas must be identical. However, you have the option to select No Antenna for the second antenna port. The AP3915e and AP3917e access point models offer an external IoT antenna. Select the antenna model from the drop-down field. Choose the desired attenuation for each radio from the dropdown list. Selectable range is from 0 to 30 dBI. Radio Settings Admin Mode ExtremeWireless™ V10.41.06 User Guide Determines if the radio mode. Select On to enable the radio. Select Off to disable the radio. 113 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Description Radio Mode Select the radio mode based on the type of AP. Available radio settings are dependent on the selected radio mode. Channel Width Determines the channel width for the radio. Valid values are: 20 MHz — Allows 802.11n clients to use the primary channel (20 MHz) and non-802.11n clients, beacons, and multicasts to use the 802.11b/g radio protocols. • 40 MHz — Allows 802.11n clients that support the 40 MHz frequency to use 40 MHz, 20 MHz, or the 802.11b/g radio protocols. 802.11n clients that do not support the 40 MHz frequency can use 20 MHz or the 802.11b/g radio protocols and non-802.11n clients, beacons, and multicasts use the 802.11b/g radio protocols. • 80 MHz — Allows 802.11ac clients to use the 80 MHz frequency. Applies to AP38xx and AP39xx Radio 1 only. • Auto — Automatically switches between 20 MHz, 40 MHz, and 80 MHz channel widths, depending on how busy the extension channels are. • ft ra DTIM Type the desired DTIM (Delivery Traffic Indication Message) period — the number of beacon intervals between two DTIM beacons. To ensure the best client power savings, use a large number. Use a small number to minimize broadcast and multicast delay. The default value is 5. Beacon Period Defines the time, in milliseconds, between beacon transmissions. The default value is 100 milliseconds. RTS/CTS (Bytes) (Request to Send/Clear to Send) handshake. Determines the maximum packet size, in bytes, that triggers a RTS/CTS handshake. The default value is 2346 (the maximum 802.11 frame size) which means all packets are sent without RTS/CTS. If the transmitted packet size is greater than the threshold value, the RTS/CTS handshake occurs. Otherwise, the data frame is sent immediately. Reduce this value only if necessary. Note: In order for RTS/CTS to take affect, the RTS threshold must be less than or equal to the Frag threshold. Frag Threshold (Bytes) Determines the maximum packet size, in bytes, that triggers packet fragmentation. The default value is 2346. At 2346, all packets are sent unfragmented. Any value above the frag threshold triggers packet fragmentation by the AP prior to transmission. RF Domain Defines a group of APs that cooperate in managing RF channels and transmission power levels. The maximum string length is 16 characters. Channel Select Auto to use Automatic Channel Selection. For more information, see Dynamic Radio Management (DRM) on page 174. Auto Tx Power Control Determines if the AP automatically adapts transmission power signals according to the coverage provided by the AP. After a period of time, the system stabilizes itself based on the RF coverage of your wireless APs. When enabled, Min Tx Power and Auto Tx Power Ctrl Adjust parameters can be edited, and the ATPC algorithm adjusts the AP power between the Max Tx and Min Tx settings. When disabled, the radio uses the Max Tx Power value or the largest value in the compliance table,whichever is smaller. ExtremeWireless™ V10.41.06 User Guide 114 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Description Max Tx Power Determines the maximum power level used by the radio in dBm. The values are governed by compliance requirements based on the country, radio, and antenna selected, and vary by AP. Changing this value below the current Min Tx Power value will lower the Min Tx Power to a level lower than the selected Max TX Power. If Auto Tx Power Ctrl (ATPC) is disabled, the radio uses the selected value or the largest value in the compliance table as the power level, whichever is smaller. Min Tx Power Determines the minimum power level for the radio. Use the lowest supported value in order to not limit the potential Tx power level range that can be used. If ATPC is enabled, select the Min Tx power level that is equal or lower than the Max Tx power level. The Min Tx Power setting cannot be set higher than the Max Tx Power setting. Auto Tx Ctrl Adjust Determines if the AP automatically adapts transmission power signals according to the coverage provided by the AP. After a period of time, the system stabilizes itself based on the RF coverage of your wireless APs. When enabled, Min Tx Power and Auto Tx Power Ctrl Adjust parameters can be edited, and the ATPC algorithm adjusts the AP power between the Max Tx and Min Tx settings. When disabled, the radio uses the Max Tx Power value or the largest value in the compliance table,whichever is smaller. ft ra Field ExtremeWireless™ V10.41.06 User Guide 115 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Description Channel Plan If ACS is enabled you can define a channel plan for the AP. Defining a channel plan allows you to control which channels are available for use during an ACS scan. For example, you may want to avoid using specific channels because of low power, regulatory domain, or radar interference. • For 5 GHz Radio nodes, click one of the following: • All channels — ACS scans all channels for an operating channel and, when ACS is triggered, the optimal channel is selected from all available channels. • All Non-DFS Channels — ACS scans all non-DFS channels for an operating channel. With ACS, the AP selects the best nonDFS channel. • Custom — To configure individual channels from which the ACS selects an operating channel, click Configure. The Custom Channel Plan dialog displays. By default, all channels participate in the channel plan. Click the individual channels you want to include in the channel plan. To select contiguous channels, use the Shift key. To select multiple, non-contiguous channels in the list, use the CTRL key. Click OK to save the configuration. • All channels including weather radar — ACS selects the best channel from the available channels list. Selected channel may be DFS, weather-radar DFS or non-DFS. Weather-radar channels are approved for selected AP models in selected countries. Consult the compliance information for the selected AP. The weather channel includes 5600-5650MHz sub-bands and requires a listening period before the AP can provide wireless service. During the listening period, the Current Channel field for DFS channels displays the value DFS Timeout, and the weather channel fields display DFS Timeout . In Europe, the listening period can be up to 10 minutes. In the U.S., this period is 1 minute. • For 2.4 GHz Radio nodes, click one of the following: • 3 Channel Plan — ACS scans the following channels: 1, 6, and 11 in North America, and 1, 7, and 13 in the rest of the world. • 4 Channel Plan — ACS scans the following channels: 1, 4, 7, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Auto — ACS scans the default channel plan channels: 1, 6, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Custom — If you want to configure individual channels from which the ACS selects an operating channel, click Configure. The Add Channels dialog is displayed. Click the individual channels you want to add to the channel plan while pressing the CTRL key, and then click OK. ft ra Field ExtremeWireless™ V10.41.06 User Guide 116 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Description Dynamic Channel Selection Determines behavior when traffic or noise levels exceed the configured DCS thresholds. Valid values are: • Monitor Mode — An alarm is triggered and an information log is generated. • Active Mode — An alarm is triggered, an information log is generated, the AP stops operating on the current channel,and ACS automatically selects an alternate channel for the AP to operate on. DCS Noise Threshold Defines the noise interference limit, measured in dBm. If the noise interface exceeds this threshold, ACS scans for a new operating channel for the AP. DCS Channel Occupancy Threshold Defines the channel utilization level, measured as a percentage. If the threshold is exceeded, ACS scans for a new operating channel for the AP. ft ra DCS Update Period (Minutes) Defines a period of time, in minutes, where the average values for DCS Noise and Channel Occupancy are measured. If the average value for either setting exceeds the defined threshold for that setting, then the AP triggers Automatic Channel Scan (ACS). Dynamic Channel Selection (DCS) events Indicates items that can affect DCS (Dynamic Channel Selection). Enable one or more events if they are part of the wireless network: • Bluetooth • Microwave • Cordless Phone • Constant Wave • Video Bridge Interference Wait Time Length of the delay (in seconds) before logging an alarm. Default setting is 10 seconds. Preamble Select a preamble type for 11b-specific (CCK) rates: Short, or Long. Click Short if you are sure that there is no 11b APs or client in the vicinity of this AP. Click Long if compatibility with 11b clients is required. Protection Mode When data collides on a given channel, CTS (clear to send) protection determines which device transmits at a given time. • Auto. The default and recommended setting. • None. Select if 11b APs and clients are not expected. • Always. Select if you expect many 11b-only clients. Protection Rate A CTS (Clear to Send) packet is always sent out at the MBR (Minimum Basic Rate) configured for the radio. Protection is used when the sending rate (to the client) is greater than the configured protection rate. For example,if the protection rate is 11Mbps it means that 802.11 protection is used. ExtremeWireless™ V10.41.06 User Guide 117 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Protection Type Description Select a protection type: CTS (Clear to Send) Only. RTS (Request to Send) and CTS. Recommended when a 40 MHz or 80 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. • • Defines the minimum data rate that must be supported by all stations in a BSS (Base Station Subsystem): • Select 1, 2, 5.5, or 11 Mbps for 11b and 11b+11g modes. • Select 6, 12, or 24 Mbps for 11g-only mode. • Select 6, 12, or 24 Mbps for 11a mode. Probe Suppression Used to remedy "sticky clients", that is clients that do not probe on other channels and remain associated to an AP when a better AP is available. Configure per radio (Enable/Disable and Threshold). Applies to AP37xx, AP38xx, and AP39xx series APs. Probe Suppression accomplishes the following: • RSS threshold (Adjustable “Cell Size”) • Reduces the number of Probe Responses. • Prevents clients with RSS below the threshold from associating. ft ra Min Basic Rate Force Disassociate Field is available when Probe Suppression is enabled. This setting does the following: • Disassociates “Sticky Clients” • Occurs 5dBm below the suppression threshold. • Prevents clients from re-associating to the AP. • Encourages/Forces roaming to a better AP. Configure per radio (Enable/Disable). RSS Threshold (dBm) 90 (Range of -50 to -100). Field is available when Probe Suppression is enabled. Max % of non-unicast traffic per Beacon period Defines the maximum percentage of time that the AP transmits nonunicast packets (broadcast and multicast traffic) for each configured Beacon Period. For each non-unicast packet transmitted, the system calculates the airtime used by each packet and drops all packets that exceed the configured maximum percentage. Restrict non-unicast traffic, to limit the impact of broadcasts and multicasts on overall system performance. Optimized Multicast for power save Enables several performance enhancements applicable to clients in power save mode. One of these enhancements converts multicast to unicast for power save clients when the ratio of active to power save clients is sufficiently large. Adaptable rate for Multicast Determines if the AP tracks the lowest unicast transmission speed of any station currently associated to the AP. Multicast frames are then forwarded at that speed or at the Minimum Basic Rate, whichever is higher. ExtremeWireless™ V10.41.06 User Guide 118 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Description Multicast to Unicast delivery Determines if multicast packets are replaced by one unicast packet per destination station. Each unicast packet is transmitted at the highest speed the destination station will accept. Note: It is possible that some client devices will not handle frames properly when the L2 MAC is unicast and the L3 IP address is multicast in which case the "Multicast to Unicast Delivery" option should be disabled. Note: The AP converts a multicast frame to unicast frames only when it determines that it is more efficient to do so. With the exception of “Optimized Multicast for power save” these options can be enabled at any time without service disruption. 11n Radio Settings Guard Interval ft ra Ensures that individual transmissions do not interfere with one another. It is the space between the symbols being transmitted. Selecting Short increases throughput, but can increase interference. Selecting Long can increase overhead due to additional idle time. The wireless 802.11n AP provides a shorter guard interval, which increases channel throughput. Long guard periods reduce channel efficiency. Protection Mode When data collides on a given channel, CTS (clear to send) protection determines which device transmits at a given time. • Auto. The default and recommended setting. • None. Select if 11b APs and clients are not expected. • Always. Select if you expect many 11b-only clients. Protection Type Select a protection type: • CTS (Clear to Send) Only. • RTS (Request to Send) and CTS. Recommended when a 40 MHz or 80 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. Extension Channel Busy Threshold CTS Only or RTS CTS, when a 40 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. Aggregate MSDUs Determines MAC Service Data Unit (MSDU) aggregation. Enable to increase the maximum frame transmission size. Aggregate MPDUs Determines MAC Protocol Data Unit (MPDU) aggregation. Enable to increase the maximum frame transmission size, providing a significant improvement in throughput. Aggregate MPDU Max Length Defines the maximum length of the MAC Protocol Data Unit (MPDU) aggregation. Valid values range from 1024-65535 bytes. For the 802.11ac radio (Radio 1 of the AP38xx), the range is 1024-1048575. Agg. MPDU Max # of Sub-frames Determines the maximum number of sub frames in the aggregate MAC Protocol Data Unit (MPDU). Valid value range is 2-64. The default value and recommended value is 64. Setting this value to 64 results in less overhead and higher throughput. ExtremeWireless™ V10.41.06 User Guide 119 Configuring the ExtremeWireless APs Table 10: Multi-Edit AP Properties (continued) Field Description ADDBA Support Block acknowledgement. Provides acknowledgement of a group of frames instead of a single frame. ADDBA Support must be enabled if Aggregate MPDU is enable. LDPC Increases the reliability of the transmission resulting in a 2dB increased performance compared to traditional 11n coding. STBC Space Time Block Coding. A simple open loop transmit diversity scheme. When enabled, STBC configuration is 2x1 (two spatial streams combined into one spatial stream). TXBF overrides STBC if both are enabled for single stream rates. TXBF Tx Beam Forming is a technique of re-aligning the transmitter multipath spatial streams phases in order to get better signal-to-noise ratio on the receiver side. For the AP37xx and AP38xx models, valid values are Enabled or Disabled. For the 39xx APs, this setting is only available on Radio1. The valid values are: MU_MIMO and Disabled. ft ra Static Configuration EWC Search List Defines the list of IP addresses that the AP is configured to try to connect to in the event that the current connection to the controller is lost. Tunnel MTU Maximum transmission unit. Determines the largest packet size than can be transmitted by an IP interface without the packet needing to be broken down into smaller units. WLAN Assignments WLAN Assignment Option Determines action on the WLAN assignment list associated with one or more APs. Valid values are Clear WLAN List or Reconfigure WLAN List. Discovery and Registration When a wireless AP is powered on, it automatically begins a discovery process to determine its own IP address and the IP address of the controller. When the discovery process is successful, the AP registers with the controller. For more information, see Figure 12. Warning Only use power supplies that are recommended by Extreme Networks. ExtremeWireless™ V10.41.06 User Guide 120 Configuring the ExtremeWireless APs ft Figure 12: Wireless AP Discovery Process Wireless AP Discovery Wireless APs discover the IP address of a controller using a sequence of mechanisms that allow for the possible services available on the enterprise network. The discovery process is successful when the AP successfully locates a controller to which it can register. ExtremeWireless™ V10.41.06 User Guide 121 Configuring the ExtremeWireless APs Ensure that the appropriate services on your enterprise network are prepared to support the discovery process. The following steps are used to find a known controller: Use the predefined static IP addresses for the controllers on the network (if configured). You can specify a list of static IP addresses of the controllers on your network. On the Static Configuration tab, add the addresses to the Wireless Controller Search List. Caution Wireless APs configured with a static Wireless Controller Search List can connect only to controllers in the list. Improperly configured APs cannot connect to a non-existent controller address, and therefore cannot receive a corrected configuration. 2 Use the IP address of the controller to which the AP last connected successfully. Once an AP has successfully registered with a controller, it recalls that controller's IP address, and uses that address on subsequent reboots. The AP bypasses discovery and goes straight to registration. ft ra If a known controller cannot be located, the following discovery process steps should be followed: 3 Use DHCP Option 60 to query the DHCP server for available controllers. The DHCP server responds to the AP with Option 43, which lists the available controllers. For the DHCP server to respond to an Option 60 request from an AP, configure the DHCP server with the vendor class identifier (VCI) for each AP. Also, configure the DHCP server with the IP addresses of the controllers. For more information, refer to the Getting Started Guide. 4 Use a Domain Name Server (DNS) lookup for the host name Controller.domain-name. The AP tries the DNS server if it is configured in parallel with SLP unicast and SLP multicast. If you use this method for discovery, place an A record in the DNS server for Controller. . The is optional, but if used, ensure it is listed with the DHCP server. 5 Use a multicast SLP request to find SLP SAs The AP sends a multicast SLP request, looking for any SLP Service Agents providing the Extreme Networks service. The AP tries SLP multicast in parallel with other discovery methods. 6 Use DHCP Option 78 to locate a Service Location Protocol (SLP) Directory Agent (DA), followed by a unicast SLP request to the Directory Agent. To use the DHCP and unicast SLP discovery method, ensure that the DHCP server on your network supports Option 78 (DHCP for SLP RFC2610). The APs use this method to discover the controller. This solution takes advantage of two services that are present on most networks: • • DHCP — The standard is a means of providing IP addresses dynamically to devices on a network. SLP — A means of allowing client applications to discover network services without knowing their location beforehand. Devices advertise their services using a Service Agent (SA). In larger installations, a Directory Agent (DA) collects information from SAs and creates a central repository (SLP RFC2608). ExtremeWireless™ V10.41.06 User Guide 122 Configuring the ExtremeWireless APs The controller contains an SLP SA that, when started, queries the DHCP server for Option 78 and if found, registers itself with the DA as service type Extreme Networks. The controller contains a DA (SLPD). The AP queries DHCP servers for Option 78 to locate any DAs. The SLP User Agent for the AP then queries the DAs for a list of Extreme Networks SAs. Option 78 must be set for the subnets connected to the ports of the controller and the subnets connected to the APs. These subnets must contain an identical list of DA IP addresses. Wireless AP Registration To define the discovery process parameters: 1 From the top menu, click AP. 2 In the left pane, click Global > Registration. ft ra The following screen appears: 3 Configure the following parameters: Security Mode • • The Allow all Wireless APs to connect option is selected by default. For more information, see Security Mode on page 124. Allow only approved Wireless APs to connect Discovery Timers . The discovery timer parameters dictate the number of retry attempts and the time delay between each attempt. • Number of retries ExtremeWireless™ V10.41.06 User Guide 123 Configuring the ExtremeWireless APs • Delay between retries The number of retries is limited to 255 for the discovery. The default number of retries is 3, and the default delay between retries is 3 seconds. SSH Access Set up a Secure Shell password. Click Unmask to display the password as you type. • • Password Confirm Password Secure Cluster Cluster Shared Secret. A common, default cluster ID. • • ft ra Click Unmask to display the shared secret value. Check Use Cluster Encryption . If you disable cluster encryption, the AP cannot participate in the cluster. 4 Click View SLP Registration to confirm SLP Registration. A screen appears displaying the results of the diagnostic slpdump tool. 5 From the Wireless AP Registration screen, click Save to save your changes. Once the discovery parameters are defined, you can connect the AP to a power source. For instructions on connecting and powering an AP, refer to the Installation Guide for the specific AP. Security Mode Security mode defines how the controller behaves when registering new, unknown devices. During the registration process, the controller’s approval of the AP’s serial number depends on the security mode that has been set: • Allow all APs to connect • If the controller does not recognize the registering serial number, a new registration record is automatically created for the AP (if within MDL license limit). The AP receives a default configuration. The default configuration can be the default template assignment. • If the controller recognizes the serial number, it indicates that the registering device is preregistered with the controller. The controller uses the existing registration record to authenticate the AP and the existing configuration record to configure the AP. • Allow only approved APs to connect (this is also known as secure mode) • If controller does not recognize the AP, the AP's registration record is created in pending state (if within MDL limits). The administrator is required to manually approve a pending AP for it to provide active service. The pending AP receives minimum configuration only, which allows it to maintain an active link with the controller for future state change. The AP's radios are not configured or enabled. Pending APs are not eligible for configuration operations (VNS Assignment, default template, Radio parameters) until approved. • If the controller recognizes the serial number, the controller uses the existing registration record to authenticate the AP. Following successful authentication, the AP is configured according to its stored configuration record. ExtremeWireless™ V10.41.06 User Guide 124 Configuring the ExtremeWireless APs During the initial setup of the network, Extreme Networks recommends that you select the Allow all Wireless APs to connect option. This option is the most efficient way to get a large number of APs registered with the controller. Once the initial setup is complete,Extreme Networks recommends that you reset the security mode to the Allow only approved Wireless APs to connect option. This option ensures that no unapproved APs are allowed to connect. For more information, see Configuring Wireless AP Properties on page 156. Registration After Discovery Any of the discovery steps 2 through 6 can inform the AP of a list of multiple IP addresses to which the AP may attempt to connect. Once the AP has discovered these addresses, it sends out connection requests to each of them. These requests are sent simultaneously. The AP attempts to register only with the first which responds to its request. When the AP obtains the IP address of the controller, it connects and registers, sending its serial number identifier to the controller, and receiving from the controller a port IP address and binding key. ft ra Once the AP is registered with a controller, configure the AP. After the AP is registered and configured, you can assign it to one or more Virtual Network Services (VNS) to handle wireless traffic. The AP is registered with Secure mode and Un-secure mode. For new APs, that option is set in AP Default Settings dialog. Viewing a List of All APs To view a list of all APs: ExtremeWireless™ V10.41.06 User Guide 125 Configuring the ExtremeWireless APs From the top menu, click AP. af Search for any part of the AP string, any column of the AP list. Results: • APs that match the search criteria appear. Select one or more APs and apply actions to selected APs. • At the top of the screen, enter search criteria and click APs that match the search criteria are displayed in the list. To take action on one or more APs, select the check box for the AP and select an action from the Actions button. For more information, see AP Actions on page 128. To view AP properties, click the AP row (not the check box). AP details are displayed. Click Configure to display AP properties. For more information, see AP Properties Tab Configuration on page 159. To add a new AP to the list, click New > Create. For more information, see New Button -- Adding and Registering a Wireless AP on page 131. To add a new AP as a clone of an existing AP, click New > Clone. For more information, see Creating a Clone AP on page 133. ExtremeWireless™ V10.41.06 User Guide 126 Configuring the ExtremeWireless APs Related Links AP Search Facility on page 127 Understanding AP Status on page 127 AP Actions on page 128 Radio Actions on page 130 New Button -- Adding and Registering a Wireless AP on page 131 Deleting an AP on page 134 AP Properties Tab Configuration on page 159 AP Search Facility Search for any part of the AP string, any column of the AP list. Results: APs that match the search criteria appear. Select one or more APs and apply actions to selected APs. ft ra • • To search, do the following: 1 Go to AP > APs. At the top of the screen, enter search criteria and click APs that match the search criteria are displayed in the list. Related Links AP Actions on page 128 Radio Actions on page 130 New Button -- Adding and Registering a Wireless AP on page 131 Deleting an AP on page 134 Understanding AP Status on page 127 Understanding AP Status The full AP list can be filtered to display just Foreign APs or just Local APs. When displaying a list of all APs, the value in the Status column is limited to Foreign or Local. In the left pane, click the Foreign or Local link to filter the list respectively. When the list is filtered, the value in the Status column changes. Possible statuses for Local APs include: • • • Pending. (You cannot view AP properties for Pending APs.) Active In-Active Possible statuses for Foreign APs include: • • Active In-Active ExtremeWireless™ V10.41.06 User Guide 127 Configuring the ExtremeWireless APs For information about changing an AP's status, see AP Actions on page 128. AP Actions Take the following actions from the AP Actions button. ft ra Figure 13: AP Actions button Table 11: AP Actions Field Description Image Upgrade Select from the list of AP version images and apply to selected APs. If more than one AP is selected, the upgrade image must be common between the selected APs. If not, message displays indicating no common image. To upgrade without interrupting service, click Upgrade without interrupting service. If you click this option while the upgrade scheduler is running, the schedule is interrupted, and the current upgrade cycle calculates a new schedule that includes APs that weren't upgraded. Download appropriate image or select different APs. For information on downloading an upgrade image, see Downloading a new Wireless AP Software Image on page 240. Multi Edit Opens Multi Edit dialog for selected APs. Configuration changes are applied to selected APs only. For more information, see AP Multi-Edit Properties on page 111. Manage Certificates Opens Certificates screen for selected APs. Configuration changes are applied to selected APs only. For more information, see Managing Certificates on page 211 Approve Approve — A Wireless AP's status changes from Pending to Approve if the AP Registration screen was configured to register only approved APs. Release Release foreign APs after recovery from a failover. Releasing an AP corresponds to the Availability function. For more information, see Availability and Session Availability on page 537. Pending Change Status to Pending — AP is removed from the Active list, and is forced into discovery. ExtremeWireless™ V10.41.06 User Guide 128 Configuring the ExtremeWireless APs Table 11: AP Actions (continued) Description Reboot Restart selected APs without using SSH to access it. On-demand Background Scan To verify channel assignments and review channel details without having to run a full ACS, run an on-demand background scan. For more information, see Running a Background Scan on page 638. Set Country Select from a list of countries and apply the command to the selected APs. You are prompted to confirm your selection. Apply WLAN The Apply WLAN dialog appears. Select the radio for each configured WLAN Service for the selected AP. List can contain 128 WLAN Services. You are prompted to confirm your selection. For AP3912 only, you can select the client port for each service.For the AP3916 only, you can select CAM on each service. Reboot Camera For AP3916 only. Restarts the camera on the AP. Reset Camera For AP3916 only. Resets the camera to factory default settings. After the camera is reset, a DHCP server is required to reassign IP addresses to the camera. ft ra Field Multi Edit - IoT Configure more than one AP for IoT support. Related Links IoT Multi-Edit Configuration on page 129 IoT Thread Gateway on page 196 Modifying the Status of a Wireless AP on page 156 Assigning WLAN Services to Client Ports on page 170 Applying WLAN Service Select the radio for each configured WLAN Service for the selected AP. List can contain 128 WLAN Services. You are prompted to confirm your selection. For AP3912 only, you can select the client port for each service. Related Links Assigning WLAN Services to Client Ports on page 170 IoT Multi-Edit Configuration Configure more than one AP at a time for IoT support. Select the check box next to more than one AP that supports the IoT. The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. ExtremeWireless™ V10.41.06 User Guide 129 Configuring the ExtremeWireless APs 2 Click Actions > Multi Edit - IoT. Figure 14: Multi-Edit - IoT Action ft ra 3 Select Enable from the IoT Admin field. 4 Select a value from the Application field. Valid values are iBeacon, iBeacon Scan, Eddystone-url Beacon, Eddystone-url Scan, or Thread Gateway. Resulting parameters depend on the application you select here. Related Links Configuring AP as an iBeacon on page 190 Configuring iBeacon Scan on page 192 Configuring AP as an Eddystone-url Beacon on page 194 Configuring Eddystone-url Scan on page 195 Advanced Thread Gateway Properties on page 198 Radio Actions Take the following actions from the Radio Actions button for the appropriate radio. Figure 15: Radio 1 Actions ExtremeWireless™ V10.41.06 User Guide 130 Configuring the ExtremeWireless APs Figure 16: Radio 2 Actions button Table 12: Radio Actions Description Set Tx Power Apply this command to selected APs. All selected APs must be the same model and licensed for the same country. Configure the setting from the resulting dialog. First, configure the selected APs to the same radio mode and same channel width before setting Tx Power here. When selected AP’s are configured for the same width/mode, the Set Tx Power dialog displays the width/mode and you are able to set the Tx power and channel. For more information, see Configuration Parameters for Radio Properties on page 180. ft ra Field Auto Channel Select Apply this command to selected APs. For more information about ACS, see Dynamic Radio Management (DRM) on page 174. Set Radio Mode Apply this command to selected APs. All selected APs must be the same model and licensed for the same country. Configure the setting from the resulting dialog. For more information, see Configuration Parameters for Radio Properties on page 180. Set Channel Width Apply this command to selected APs. All selected APs must be the same model and licensed for the same country. Configure the setting from the resulting dialog. For more information, see Configuration Parameters for Radio Properties on page 180. Related Links Configuration Parameters for Radio Properties on page 180 Dynamic Radio Management (DRM) on page 174 New Button -- Adding and Registering a Wireless AP You can manually add and register a wireless AP to the controller, but the AP must still go through the automatic discovery and registration process to locate the controller. The AP may skip the discovery process if it has a static list, or has previously connected and registered with the controller. When you manually add and register an AP, the system applies the default settings to the AP. After the system registers the AP, you can go in and edit its configuration settings (see Configuring Wireless AP Properties on page 156). To add and register an AP manually: From the top menu, click AP. ExtremeWireless™ V10.41.06 User Guide 131 Configuring the ExtremeWireless APs Regardless of the tab that you click on, the New button displays at the bottom of the page. 2 Click New and select Create or Clone. Create Displays the Add Wireless AP dialog. For field descriptions, see Table 13 on page 133. Clone Displays the Clone AP dialog. See Creating a Clone AP on page 133. The Add Wireless AP screen displays. ra ft ExtremeWireless™ V10.41.06 User Guide 132 Configuring the ExtremeWireless APs Table 13: Add Wireless AP Description Serial # Type the unique identifier of the AP. Hardware Type Select the hardware model of this AP from the drop-down menu. With ExtremeWireless v10.01 each controller is licensed in a specific domain. There are three types of domain licenses: FCC, ROW, EGY, and MNT. The ExtremeWireless user interface reflects the domain of the controller. The following are use cases for each domain: • A wireless controller with an FCC license can manage AP37xx, AP38xx, and AP39xx-FCC. These access points can be deployed in the United States, Puerto Rico, or Colombia. • A wireless controller with a ROW license can manage AP37xx, AP38xx, and AP39xx-ROW. These access points can be deployed in any country except the United States, Puerto Rico, Egypt, or Colombia. • A wireless controller with a MNT license can manage only domainlocked access points, which are the AP39xx-FCC and the AP39xxROW only. The AP39xx-FCC must be deployed in the United States, Puerto Rico, or Colombia. The AP39xx-ROW must be deployed in any country except the United States, Puerto Rico, Egypt, or Colombia. ft ra Field Note: The AP37xx and AP38xx cannot connect to a controller licensed in the MNT domain. • A wireless controller with a EGY license can manage AP37xx, AP38xx, and AP39xx-EGY. Name Type a unique name for the AP that identifies the access point. The default value is the AP’s serial number. Description Enter a description of this AP. Add Wireless AP Click to add the AP with default settings. You can later modify these settings. When an AP is added manually, it is added to the controller database only and does not get assigned. Close Click to close this window. Related Links Configuring Wireless AP Properties on page 156 Creating a Clone AP on page 133 Creating a Clone AP Create a new AP with the same type and configuration as the selected AP. Only one AP can be selected for the Clone action. 1 Select an AP from the AP list and click New > Clone. 2 Enter the Serial # and Name of the new clone AP. 3 Click Apply. Related Links ExtremeWireless™ V10.41.06 User Guide 133 Configuring the ExtremeWireless APs Viewing a List of All APs on page 125 New Button -- Adding and Registering a Wireless AP on page 131 Deleting an AP To delete an AP from the controller AP list: 1 Go to AP > APs. 2 Select the APs to delete. 3 Click Delete. Wireless AP Default Configuration Default wireless AP configuration acts as a configuration template that can be automatically assigned to new registering APs. The default AP configuration allows you to specify common sets of radio configuration parameters and VNS assignments for APs. ft ra Configuring the Default Wireless AP Settings Wireless APs are added with default settings. You can modify the system’s AP default settings, and then use these default settings to configure newly added APs. In addition, you can base the AP default settings on an existing AP configuration or you can make pre-configured APs inherit the properties of the default AP configuration when they register with the system. Each AP model has its own tab: • • • • • • Common Configuration — Configure common configuration, such as WLAN assignments and static configuration options for all APs. See Configuring Common Configuration Default AP Settings on page 135. AP37xx W78xC— Configure the default settings for the Radar series APs. See Configuring AP37xx, W78xC Default AP Settings on page 146. AP37xx Dual Band — Configure the default settings for the Radar series APs. See Configuring AP37xx Dual Band Default Settings on page 145 AP38xx— Configure the default settings for the ExtremeWireless Radar series APs. See Configuring AP38xx Default AP Settings on page 143. AP3801— Configure the default settings for the ExtremeWireless Radar series APs. See Configuring AP3801 Default AP Settings on page 143. AP3805— Configure the default settings for the ExtremeWireless Radar series APs. See Configuring AP3805 Default AP Settings on page 144. • AP3912 — Configure the default settings for the ExtremeWireless wall plate AP. See Configuring AP3912 Default AP Settings on page 139. • AP3915 — Configure the default settings for the ExtremeWireless AP3915, BLE Radio enabled AP. See Configuring AP3915 Default AP Settings on page 138. AP3916ic — Configure the default settings for the ExtremeWireless Integrated Camera AP. See Configuring AP3916 Default AP Settings on page 137. • • AP3917 — Configure the default settings for the ExtremeWireless AP3917, BLE Radio enabled AP. See Configuring AP3917 Default AP Settings on page 136. ExtremeWireless™ V10.41.06 User Guide 134 Configuring the ExtremeWireless APs • • AP3935 — Configure the default settings for the ExtremeWireless indoor series AP. See Configuring AP3935 Default AP Settings on page 140. AP3965 — Configure the default settings for the ExtremeWireless outdoor series AP. See Configuring AP3965 Default AP Settings on page 142. Configuring Common Configuration Default AP Settings To configure common configuration default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. The Common Configuration tab is displayed. ft ra Note Ports 1, 2, and 3, are available on the AP3912. Port 1 is the port that corresponds to the Camera (CAM) function of the AP3916ic. 3 In the Static Configuration section, you can specify an EWC search list or use the search list provided from the AP. Do one of the following: Check Learn EWC Search List from AP to accept the AP's search list, or clear the check box to specify a common search list for all APs. For more information about creating an EWC Search List, see Table 22 on page 201. ExtremeWireless™ V10.41.06 User Guide 135 Configuring the ExtremeWireless APs 4 In the WLAN Assignments section, you can associate a WLAN assignment to a radio. • • If the controller is in an availability pair, you can apply default WLAN assignments to foreign APs, by selecting the Apply default WLAN assignments to foreign APs check box. For more information, see Availability on page 537. To associate a WLAN Service in the list to a radio and or a client port, select the check box matching the radio and or port for the selected WLAN. • One WLAN can be assigned per port. The assignment enables the port. • Wireless and wired users associated to the same WLAN service receive identical service. They are affected by the same policies and filters. Note Airtime % is available for AP38xx and AP39xx access point models that are assigned WLANS configured with Reserved Airtime. 5 Click Save Settings. ft ra Related Links Configuring Airtime Fairness: Reservation Mode on page 406 Configuring AP3917 Default AP Settings To configure AP3917 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 136 Configuring the ExtremeWireless APs 3 Click the AP3917 FCC tab. ra Figure 17: AP3917 Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings ft For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. Configuring AP3916 Default AP Settings To configure AP3916 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 137 Configuring the ExtremeWireless APs 3 Click the AP3916 ROW tab. af Figure 18: AP3916 Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. Configuring AP3915 Default AP Settings To configure AP3915 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 138 Configuring the ExtremeWireless APs 3 Click the AP3915 FCC tab. ra Figure 19: AP3915 Default Settings 4 Configure the following Default AP Settings as required: AP Properties Radio Settings Advanced Settings ft • • • For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. Configuring AP3912 Default AP Settings To configure AP3912 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 139 Configuring the ExtremeWireless APs 3 Click the AP3912 FCC tab. ft Figure 20: AP3912 Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. Configuring AP3935 Default AP Settings ExtremeWireless 10.01 associates the license key to a specific Wireless Controller, and each license key applies to a specific regulatory domain (FCC or ROW). The FCC domain operates in the United States, ExtremeWireless™ V10.41.06 User Guide 140 Configuring the ExtremeWireless APs Colombia and Puerto Rico. The ROW domain operates outside these countries. The AP3935 can be licensed to operate within an FCC or ROW regulatory domain. To configure AP3935 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. 3 Click the AP3935 FCC tab. ft Figure 21: AP3935 FCC Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings For detailed information, see AP Default Settings on page 148. 5 To save your changes, click Save Settings. ExtremeWireless™ V10.41.06 User Guide 141 Configuring the ExtremeWireless APs Configuring AP3965 Default AP Settings ExtremeWireless 10.01 associates the license key to a specific Wireless Controller, and each license key applies to a specific regulatory domain (FCC or ROW). The FCC domain operates in the United States, Colombia and Puerto Rico. The ROW domain operates outside these countries. The AP3965 can be licensed to operate within an FCC or ROW regulatory domain. To configure AP3965 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. 3 Click the AP3965 FCC tab. Figure 22: AP3965 FCC Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings For detailed information, see AP Default Settings on page 148. ExtremeWireless™ V10.41.06 User Guide 142 Configuring the ExtremeWireless APs 5 To save your changes, click Save Settings. Configuring AP38xx Default AP Settings To configure AP38xx default AP settings: From the top menu, click AP. 2 In the left pane, click Global > Default Settings. 3 Click the AP38xx tab. ft Figure 23: AP38xx Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings For detailed information, see AP Default Settings on page 148. 5 To save your changes, click Save Settings. Configuring AP3801 Default AP Settings To configure AP3801 default AP settings: From the top menu, click AP. ExtremeWireless™ V10.41.06 User Guide 143 Configuring the ExtremeWireless APs 2 In the left pane, click Global > Default Settings. 3 Click the AP3801 tab. ra Figure 24: AP3801 Default Settings 4 Configure the following Default AP Settings as required: AP Properties Radio Settings Advanced Settings ft • • • For detailed information, see AP Default Settings on page 148. 5 To save your changes, click Save Settings. Configuring AP3805 Default AP Settings To configure AP3805 default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 144 Configuring the ExtremeWireless APs 3 Click the AP3805 ROW tab. ra Figure 25: AP3805 Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings ft For detailed information, see AP Default Settings on page 148. 5 To save your changes, click Save Settings. Configuring AP37xx Dual Band Default Settings This AP37xx profile supports two concurrent Wi-Fi radios (2.4 GHz and 5 GHz). To configure AP37xx default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 145 Configuring the ExtremeWireless APs 3 Click the AP37xx tab. ra Figure 26: AP37xx Default Settings 4 Configure the following Default AP Settings as required: • • • AP Properties Radio Settings Advanced Settings ft For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. Configuring AP37xx, W78xC Default AP Settings To configure AP37xx, W78xC default AP settings: 1 From the top menu, click AP. 2 In the left pane, click Global > Default Settings. ExtremeWireless™ V10.41.06 User Guide 146 Configuring the ExtremeWireless APs 3 Click the AP37xx W78xC tab. ra Figure 27: AP37xx W78xC Default Settings 4 Configure the following Default AP Settings as required: AP Properties Radio Settings Advanced Settings ft • • • For detailed information, see AP Default Settings on page 148. 5 Click Save Settings. ExtremeWireless™ V10.41.06 User Guide 147 Configuring the ExtremeWireless APs AP Default Settings Table 14: AP Default Settings Field Description AP Properties Determines if the AP broadcasts LLDP information. This option is disabled by default. If SNMP is enabled on the controller and you enable LLDP, the LLDP Confirmation dialog is displayed. Select one of the following: • Proceed (not recommended) — Enables LLDP and keeps SNMP (Simple Network Management Protocol) running. • Disable SNMP publishing, and proceed — Enables LLDP and disables SNMP. • For more information on using SNMP, see the Extreme Networks ExtremeWireless Maintenance Guide Announcement Interval Determines how often the AP advertises its information by sending a new LLDP (Link Layer Discovery Protocol) packet when LLDP is enabled. This value is measured in seconds. If there are no changes to the AP configuration that impact the LLDP information, the AP sends a new LLDP packet according to this schedule. ft ra LLDP Note: Announcement Interval is not applicable on all AP models. Announcement Delay Determines the length of time that delays the new packet delivery. The announcement delay helps minimize LLDP (Link Layer Discovery Protocol) packet traffic when LLDP is enabled. This value is measured in seconds. If a change to the AP configuration occurs which impacts the LLDP information, the AP sends an updated LLDP packet. Note: Announcement Delay is not applicable on all AP models. Time to Live Determines the lifespan of the LLDP (Link Layer Discovery Protocol) packet. The Time to Live value is calculated as four times the Announcement Interval value. It cannot be directly edited. Note: Time to Live is not applicable on all AP models. Country Select the country of operation. Radio Settings (Radio 1 and Radio 2) Admin mode Select On to enable this radio; Select Off to disable this radio. Radio mode Click the radio mode based on the type of AP. For more information on the available Radio modes, see Configuring Wireless AP Radio Properties on page 174. The available radio settings are dependent on the radio mode you select. ExtremeWireless™ V10.41.06 User Guide 148 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Description Channel Width Click the channel width for the radio: • 20 MHz — Click to allow 802.11n clients to use the primary channel (20 MHz) and non-802.11n clients, beacons, and multicasts to use the 802.11b/g radio protocols. • 40 MHz — Click to allow 802.11n clients that support the 40 MHz frequency to use 40 MHz, 20 MHz, or the 802.11b/g radio protocols. 802.11n clients that do not support the 40 MHz frequency can use 20 MHz or the 802.11b/g radio protocols and non-802.11n clients, beacons, and multicasts use the 802.11b/g radio protocols. • 80 MHz — Click to allow 802.11ac clients to use the 80MHz frequency. Applies to AP38xx and AP39xx Radio 1 only. • Auto — Click to automatically switch between 20 MHz, 40 MHz, and 80 MHz channel widths, depending on how busy the extension channels are. RF Domain Uniquely defines a group of APs that cooperate in managing RF channels and transmission power levels. The maximum length of the string is 16 characters. ft ra Field Auto Tx Power Ctrl (ATPC) Determines if the AP will automatically adapt transmission power signals. Click to either enable or disable ATPC from the Auto Tx Power Ctrl drop-down list. ATPC automatically adapts transmission power signals according to the coverage provided by the AP. After a period of time, the system stabilizes itself based on the RF coverage of your Wireless APs. Note: When enabled, Min Tx Power and Auto Tx Power Ctrl Adjust parameters can be edited, and the ATPC algorithm will adjust the AP power between Max Tx power and Min Tx Power. When disabled, the Max Tx Power selected value or the largest value in the compliance table will be the power level used by the radio, whichever is smaller. Max Tx Power Click the appropriate Tx power level from the Max TX Power dropdown list. The values in the Max TX Power drop-down are in dBm and will vary by AP. The values are governed by compliance requirements based on the country, radio, and antenna selected. Changing this value below the current Min Tx Power value will change the Min Tx Power to a level lower than the selected Max TX Power. Note: If Auto Tx Power Ctrl (ATPC) is disabled, the selected value or the largest value in the compliance table will be the power level used by the radio, whichever is smaller. Min Tx Power If ATPC is enabled, select the minimum Tx power level that is equal or lower than the maximum Tx power level. We recommend that you use the lowest supported value if you do not want to limit the potential Tx power level range that can be used. Note: The Min Tx Power setting cannot be set higher than the Max Tx Power setting. ExtremeWireless™ V10.41.06 User Guide 149 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Description Auto Tx Power Ctrl Adjust The Auto Tx Power Ctrl Adj parameter is a correction parameter that allows you to manually adjust (up or down) the Tx Power calculated by the ATPC algorithm. If ATPC is enabled, click the Tx power level that can be used to adjust the ATPC power levels that the system has assigned. Extreme Networks recommends that use 0 dB during your initial configuration. If you have an RF plan that recommends Tx power levels for each AP, compare the actual Tx power levels your system has assigned against the recommended values your RF plan has provided. Use the Auto Tx Power Ctrl Adjust value to achieve the recommended values. Valid range is from -(Max Tx Power - Min Tx Power) dB to (Max Tx Power - Min Tx Power) dB. ft ra ExtremeWireless™ V10.41.06 User Guide 150 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Description Channel Plan If ACS is enabled you can define a channel plan for the AP. Defining a channel plan allows you to control which channels are available for use during an ACS scan. For example, you may want to avoid using specific channels because of low power, regulatory domain, or radar interference. • For 5 GHz Radio nodes, click one of the following: • All channels — ACS scans all channels for an operating channel and, when ACS is triggered, the optimal channel is selected from all available channels. • All Non-DFS Channels — ACS scans all non-DFS channels for an operating channel. With ACS, the AP selects the best nonDFS channel. • Custom — To configure individual channels from which the ACS selects an operating channel, click Configure. The Custom Channel Plan dialog displays. By default, all channels participate in the channel plan. Click the individual channels you want to include in the channel plan. To select contiguous channels, use the Shift key. To select multiple, non-contiguous channels in the list, use the CTRL key. Click OK to save the configuration. • All channels including weather radar — ACS selects the best channel from the available channels list. Selected channel may be DFS, weather-radar DFS or non-DFS. Weather-radar channels are approved for selected AP models in selected countries. Consult the compliance information for the selected AP. The weather channel includes 5600-5650MHz sub-bands and requires a listening period before the AP can provide wireless service. During the listening period, the Current Channel field for DFS channels displays the value DFS Timeout, and the weather channel fields display DFS Timeout . In Europe, the listening period can be up to 10 minutes. In the U.S., this period is 1 minute. • For 2.4 GHz Radio nodes, click one of the following: • 3 Channel Plan — ACS scans the following channels: 1, 6, and 11 in North America, and 1, 7, and 13 in the rest of the world. • 4 Channel Plan — ACS scans the following channels: 1, 4, 7, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Auto — ACS scans the default channel plan channels: 1, 6, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Custom — If you want to configure individual channels from which the ACS selects an operating channel, click Configure. The Add Channels dialog is displayed. Click the individual channels you want to add to the channel plan while pressing the CTRL key, and then click OK. ft ra Field ExtremeWireless™ V10.41.06 User Guide 151 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Description Antenna Selection Antenna Selection — Click the antenna, or antenna combination, you want to configure on this radio. When you configure 11n Wireless APs to use specific antennas, the transmission power is recalculated; the Current Tx Power Level value for the radio is automatically adjusted to reflect the recent antenna configuration. It takes approximately 30 seconds for the change to the Current Tx Power Level value to be reflected in the ExtremeWireless Assistant. Also, the radio is reset causing client connections on this radio to be lost. Note: Antenna Selection is not applicable on all AP models. Advanced dialog – AP Properties Poll Timeout Type the timeout value, in seconds. The AP uses this value to trigger re-establishing the link with the controller if the AP does not get an answer to its polling. The default value is 10 seconds. ft ra Note: If you are configuring session availability, the Poll Timeout value should be 1.5 to 2 times of Detect link failure value on AP Properties screen. For more information, see Session Availability on page 545. Secure Tunnel This feature, when enabled, provides encryption, authentication, and key management between the AP and/or controllers. Select the desired Secure Tunnel mode from the drop-down list: • Disabled — Secure Tunnel is turned off and no traffic is encrypted. All SFTP/SSH/TFTP traffic works normally. • Encrypt control traffic between AP & Controller — An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/ TFTP/WASSP control traffic is encrypted. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. • Encrypt control and data traffic between AP & Controller — This mode only benefits routed/bridged@Controller Topologies. An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/TFTP/WASSP control and data traffic is encrypted. The AP skips the registration and authentication phases, and when selected, the Secure Tunnel Lifetime feature can be configured. Note: This option is not available for AP3805 models. • Debug mode — An IPSEC tunnel is established from the AP to the controller, no traffic is encrypted, and all SFTP/SSH/TFTP traffic works normally. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. Note: Changing a Secure Tunnel mode will automatically disconnect and reconnect the AP. ExtremeWireless™ V10.41.06 User Guide 152 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Description Secure Tunnel Lifetime Enter an interval (in hours) at which time the keys of the IPSEC tunnel are renegotiated. Note: Changing the Secure Tunnel Lifetime setting will not cause any AP disruption. Click to Enable or Disable SSH to the AP. Location-based Service Click to Enable or Disable location-based service on this AP. Locationbased service allows you to use this AP with an AeroScout or Ekahau solution. Maintain client sessions in event of poll failure Click to Enable or Disable (using a bridged at AP VNS) the AP remains active if a link loss with the controller occurs. This option is disabled by default. Restart service in the absence of controller Click to Enable or Disable (if using a bridged at AP VNS) to ensure the AP continues providing service if the AP’s connection to the controller is lost. If this option is enabled, it allows the AP to start a bridged at AP VNS even in the absence of a controller. Use broadcast for disassociation Click to Enable or Disable if you want the AP to use broadcast disassociation when disconnecting all clients, instead of disassociating each client one by one. This affects the behavior of the AP under the following conditions: • If the AP is preparing to reboot or to enter one of the special modes (DRM initial channel selection). • If a BSSID is deactivated or removed on the AP. ft ra Remote Access This option is disabled by default. IP Multicast Assembly Click to Enable or Disable multicast frames assembling for groups of APs using AP Multi-editing settings (for more information, see AP Multi-Edit Properties on page 111 ). Balanced Channel List Power: This simplifies power settings such that they will function across all channels in the channel plan. LED Select the desired LED pattern from the drop-down list. Options include: Off, WDS Signal Strength, Identify, and Normal. Radio Settings DTIM Type the desired DTIM (Delivery Traffic Indication Message) period — the number of beacon intervals between two DTIM beacons. To ensure the best client power savings, use a large number. Use a small number to minimize broadcast and multicast delay. The default value is 5. Beacon Period Defines the time, in milliseconds, between beacon transmissions. The default value is 100 milliseconds. RST/CTS Type the packet size threshold, in bytes, above which the packet will be preceded by an RTS/CTS (Request to Send/Clear to Send) handshake. The default value is 2346, which means all packets are sent without RTS/CTS. Reduce this value only if necessary. Frag. Threshold Type the fragment size threshold, in bytes, above which the packets will be fragmented by the AP prior to transmission. The default value is 2346, which means all packets are sent un-fragmented. ExtremeWireless™ V10.41.06 User Guide 153 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Dynamic Channel Selection Description Click one of the following: Monitor Mode — If traffic or noise levels exceed the configured DCS thresholds, an alarm is triggered and an information log is generated. • Active Mode — If traffic or noise levels exceed the configured DCS thresholds, an alarm is triggered and an information log is generated. In addition, the AP ceases operating on the current channel and ACS automatically selects an alternate channel for the AP to operate on. • Type the noise interference level, measured in dBm, after which ACS scans for a new operating channel for the AP if the threshold is exceeded. DCS Channel Occupancy Threshold Type the channel utilization level, measured as a percentage, after which ACS scans for a new operating channel for the AP if the threshold is exceeded. ft ra DCS Noise Threshold DCS Update Period Type the time, measured in minutes that determines the period during which the AP averages the DCS Noise Threshold and DCS Channel Occupancy Threshold measurements. If either one of these thresholds is exceeded, then the AP triggers ACS. DCS Interference Event (appears if Dynamic Channel Selection is enabled) Enable or disable the following DCS Events: • Bluetooth • Microwave • Cordless Phone • Constant Wave • Video Bridge Interference Wait Time Length of the delay (in seconds) before logging an alarm. Default setting is 10 seconds. Preamble Click a preamble type for 11b-specific (CCK) rates: Short, or Long. Click Short if you are sure that there is no 11b APs or client in the vicinity of this AP. Click Long if compatibility with 11b clients is required. Protection Rate Click a protection rate: 1, 2, 5.5, or 11 Mbps. The default and recommended setting is 11. Only reduce the rate if there are many 11b clients in the environment or if the deployment has areas with poor coverage. For example, rates lower than 11 Mbps are required to ensure coverage. Protection Mode Click a protection mode: None, Auto, or Always. The default and recommended setting is Auto. Click None if 11b APs and clients are not expected. Click Always if you expect many 11b-only clients. Protection Type Click a protection type, CTS Only or RTS CTS, when a 40 MHz or 80 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. ExtremeWireless™ V10.41.06 User Guide 154 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Description Max % of non-unicast traffic per Beacon period Enter the maximum percentage of time that the AP transmits nonunicast packets (broadcast and multicast traffic) for each configured Beacon Period. For each non-unicast packet transmitted, the system calculates the airtime used by each packet and drops all packets that exceed the configured maximum percentage. By restricting nonunicast traffic, you limit the impact of broadcasts and multicasts on overall system performance. Optimized Multicast for power save Click to optimize for power save. Adaptable rate for Multicast Click to enable adaptable rate capabilities. Multicast to Unicast delivery Click to set the Multicast to Unicast delivery method from the dropdown list. Enhanced Rate Control Min. Basic Rate ft ra For each radio, click the minimum data rate that must be supported by all stations in a BSS: • Click 1, 2, 5.5, or 11 Mbps for 11b and 11b+11g modes. • Click 6, 12, or 24 Mbps for 11g-only mode. • Click 6, 12, or 24 Mbps for 11a mode. 11n Settings Protection Mode Click a protection mode: None, Auto, or Always. The default and recommended setting is Auto. Click None if 11b APs and clients are not expected. Click Always if you expect many 11b-only clients. Protection Type Click a protection type, CTS Only or RTS CTS, when a 40 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. Extension Channel Busy Threshold Type the extension channel threshold percentage, which if exceeded, disables transmissions on the extension channel (40 MHz). Aggregate MSDUs Click an aggregate MSDU mode: Enabled or Disabled. Aggregate MSDU increases the maximum frame transmission size. Aggregate MPDUs Click an aggregate MPDU mode: Enabled or Disabled. Aggregate MPDU provides a significant improvement in throughput. Aggregate MPDU Max Length Type the maximum length of the aggregate MPDU. The value range is 1024-65535 bytes. Agg. MPDU Max # of Sub-frames Type the maximum number of sub-frames of the aggregate MPDU. The value range is 2-64. ADDBA Support Click an ADDBA support mode: Enabled or Disabled. ADDBA, or block acknowledgement, provides acknowledgement of a group of frames instead of a single frame. ADDBA Support must be enabled if Aggregate MPDU is enable. LDPC Click an LDPC mode: Enabled or Disabled. LDPC increases the reliability of the transmission resulting in a 2dB increased performance compared to traditional 11n coding. ExtremeWireless™ V10.41.06 User Guide 155 Configuring the ExtremeWireless APs Table 14: AP Default Settings (continued) Field Description STBC Click an STBC mode: Enabled or Disabled. STBC is a simple open loop transmit diversity scheme. When enabled, STBC configuration is 2x1 (two spatial streams combine into one spatial stream). TXBF will override STBC if both are enabled for single stream rates. TxBF Tx Beam Forming is a technique of re-aligning the transmitter multipath spatial streams phases in order to get better signal-to-noise ratio on the receiver side. Click a TXBF mode: For the AP37xx and AP38xx models, valid values are Enabled or Disabled. For the 39xx APs, this setting is only available on Radio1 and valid values are MUMIMO and Disabled. Configuring Wireless AP Properties ft ra Wireless APs are added with default settings, which you can adjust and configure according to your network requirements. In addition, you can modify the properties and the settings for each radio on the AP. You can also locate and select APs in specific registration states to modify their settings. For example, this feature is useful when approving pending APs when there are a large number of other APs that are already registered. On the Access Approval screen, click Pending to select all pending APs, then click Approve to approve all selected APs. Configuring AP settings can include the following processes: • • • Modifying the Status of a Wireless AP on page 156 AP Properties Tab Configuration on page 159 Setting Up the Wireless AP Using Static Configuration on page 199 When configuring APs, you can choose to configure individual APs or simultaneously configure a group of APs. For more information, see AP Multi-Edit Properties on page 111 . Modifying the Status of a Wireless AP If during the discovery process, the controller security mode was Allow only approved Wireless APs to connect, then the status of the AP is Pending. Modify the security mode to Allow all Wireless APs to connect. Related Links Security Mode on page 124 AP Rehoming on page 156 AP Actions on page 128 AP Rehoming You can balance your AP deployment by switching an AP from local to foreign (and from foreign to local). The AP will continue providing service without interruption while the APs are redeployed. If the availability link is down, the conversion will be completed when the link is established. ExtremeWireless™ V10.41.06 User Guide 156 Configuring the ExtremeWireless APs The rehomed AP will establish an active tunnel to the new controller and radio configuration is preserved once conversion is complete. • • • WLAN assignments are not affected by rehoming. WDS and Mesh APs cannot be converted from local to foreign. A rehomed AP will be removed from load balance groups. AP Dashboard ExtremeWireless offers a dashboard of statistical information for each AP in the network. The following information is displayed for each AP: • • Software version running on the AP Country AP Role ft ra • • • • • • • • • • IP address. Supports both IPv4 and IPv6 addresses. IoT MAC. Mac address for the Internet of Things enablement. Displays for AP3912 and AP3916 when IoT is enabled. Model Number Number of 802.3 clients (AP3912) Camera IP (AP3916) Number of radios Channel number if applicable Channel Mode Power level The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. AP properties for these access points display the IoT MAC address and channel and the TX Power Level for the BLE radio when the IoT is enabled. Figure 28: AP3916 Dashboard with IoT Enabled The dashboard displays a graphical representation over the last hour for the following: • • • • Client count. Associated clients per radio Devices by Type classification Noise floor for both bands Channel utilization for both bands ExtremeWireless™ V10.41.06 User Guide 157 Configuring the ExtremeWireless APs Clients ft Figure 29: AP Dashboard Displays the number of clients on each radio in 10-minute intervals. Use this information to gain visibility over time into AP utilization per radio. Details for the AP3912 and AP3916 show the number of 802.3 clients. These are clients that utilize the wired client ports that are available on these AP models. Devices by Type Offers visibility into the type of devices connected to your network by percentage. Use this information to understand the BYOD usage on your network. Noise (dBm) ExtremeWireless™ V10.41.06 User Guide 158 Configuring the ExtremeWireless APs Tracks the noise level for each AP radio in 10-minute intervals. Use this information to understand channel performance over time. Channel Utilization (%) Tracks the percentage of traffic on each radio. Use this information to understand channel usage over time, in 10-minute intervals. Click Configure to display configuration options for the AP. For more information, see AP Properties Tab Configuration on page 159. Related Links AP Properties Tab Configuration on page 159 Channel Inspector Report on page 637 AP Properties Tab Configuration ft ra Use the AP Properties tab to view and configure basic AP properties. Some of the AP properties can be viewed and configured via the Advanced dialog. 1 From the top menu, click AP. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. For more information, see AP Dashboard on page 157. ExtremeWireless™ V10.41.06 User Guide 159 Configuring the ExtremeWireless APs 3 Click Configure. The AP Properties tab displays. ft Related Links AP Dashboard on page 157 AP Properties Tab - Basic Settings on page 161 AP Properties Tab - Advanced Settings on page 164 Professional Install Settings on page 166 Assigning Wireless AP Radios to a VNS on page 168 Configuration Parameters for Radio Properties on page 180 Configuring IoT Applications on page 189 Setting Up the Wireless AP Using Static Configuration on page 199 Setting Up 802.1x Authentication for a Wireless AP on page 203 ExtremeWireless™ V10.41.06 User Guide 160 Configuring the ExtremeWireless APs AP Properties Tab - Basic Settings Description Serial # Read-only. Displays a unique identifier (serial number) that is assigned during the manufacturing process. Host Name Read-only. This value, which is based on AP Name, cannot be directly edited. This value depicts the AP Host-Name value. If the AP Name value does begin with a number, for example when it is the AP serial number, the AP model is prepended to the value. This value is used for tracking purposes on the DHCP server. Name The default value of the AP Name is the serial number, but it can be modified to any desired AP Name. Supported characters include: alphanumeric, blank space, hyphen, underscore, and period. Up to 255 characters. Location Define the location of the AP. When a client roams to an AP with a different location, Area Notification is triggered. The Area Notification feature is designed to track client locations within pre-defined areas using either the Location Engine (for more information, see Configuring the Location Engine on page 609) or the AP Location field. When the clients change areas, a notification is sent. Location functionality on the AP is useful when access to Extreme Management Center OneView is not available. ft ra Field Zone Zone is a label that can be sent to a RADIUS server in place of an AP BSSID in the called-station-id attribute. It can be easier to base authorization decisions on the zone label rather than on the BSSID. Each AP can have its own Zone label although it is often useful to assign the same Zone to multiple APs. Description Type comments for the AP. Topology Read only. The Topology name with which the AP is registered. AP Environment Select — Indoor or Outdoor. This property is available for outdoor APs only, indicating where the AP is deployed. The Outdoor APs can be deployed in both indoor and outdoor environments. AP placement should depend on the country of operation that is selected and the country regulatory domain requirements for radio emissions. For more information, see Outdoor Access Point Installation on page 167. ExtremeWireless™ V10.41.06 User Guide 161 Configuring the ExtremeWireless APs Field Description Hardware Type Select the hardware model of this AP from the drop-down menu. With ExtremeWireless v10.01 each controller is licensed in a specific domain. There are three types of domain licenses: FCC, ROW, EGY, and MNT. The ExtremeWireless user interface reflects the domain of the controller. The following are use cases for each domain: • A wireless controller with an FCC license can manage AP37xx, AP38xx, and AP39xx-FCC. These access points can be deployed in the United States, Puerto Rico, or Colombia. • A wireless controller with a ROW license can manage AP37xx, AP38xx, and AP39xx-ROW. These access points can be deployed in any country except the United States, Puerto Rico, Egypt, or Colombia. • A wireless controller with a MNT license can manage only domainlocked access points, which are the AP39xx-FCC and the AP39xxROW only. The AP39xx-FCC must be deployed in the United States, Puerto Rico, or Colombia. The AP39xx-ROW must be deployed in any country except the United States, Puerto Rico, Egypt, or Colombia. ft ra Note: The AP37xx and AP38xx cannot connect to a controller licensed in the MNT domain. • A wireless controller with a EGY license can manage AP37xx, AP38xx, and AP39xx-EGY. Application Version Displays the ExtremeWireless release version. Status Approved — Indicates that the AP has received its binding key from the controller after the discovery process. If no status is shown, that indicates that the AP has not yet successfully been approved for access with the secure controller. You can modify the status of an AP on the Access Approval screen. For more information, see Modifying the Status of a Wireless AP on page 156. Active Clients Displays the number of wireless devices currently associated with the AP. ExtremeWireless™ V10.41.06 User Guide 162 Configuring the ExtremeWireless APs Field Description Role Displays the role for the AP. Note: You can only view these options here. You cannot change them. Options include: • Traffic Forwarding — Normal Operation. Applies to all APs. • Guardian — Once the AP is configured as a Guardian, the AP stops forwarding traffic and dedicates both radios to threat detection and countermeasures. For more information, see Configuring an AP as a Guardian on page 221. The AP can be configured in one of three sub-modes: • Out-of-Service with its radios off • Providing full bridging functionality without RADAR • Providing full bridging functionality and In-Service RADAR. ft ra • For more information, see Configuring a Guardian Scan Profile on page 577. AirDefense Sensor — AP39xx integration with the AirDefense Services Platform (ADSP). Alternative to the Guardian AP configuration. For more information, see Configuring an AirDefense Profile on page 568. Country Click the country of operation. Note: The antenna you select determines the available channel list and the maximum transmitting power for the country in which the AP is deployed. Related Links AP Properties Tab - Advanced Settings on page 164 ExtremeWireless™ V10.41.06 User Guide 163 Configuring the ExtremeWireless APs AP Properties Tab - Advanced Settings Field Description Poll Timeout Type the timeout value, in seconds. The AP uses this value to trigger reestablishing the link with the Controller if the AP does not get an answer to its polling. The default value is 10 seconds. Note: If you are configuring session availability, the Poll Timeout value should be 1.5 to 2 times of Detect link failure value on AP Properties screen. For more information, see Session Availability on page 545. Secure Tunnel ft ra This feature, when enabled, provides encryption, authentication, and key management between the AP and/or controllers. Select the desired Secure Tunnel mode from the drop-down list: • Disabled — Secure Tunnel is turned off and no traffic is encrypted. All SFTP/SSH/TFTP traffic works normally. • Encrypt control traffic between AP & Controller — An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/TFTP/ WASSP control traffic is encrypted. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. • Encrypt control and data traffic between AP & Controller — This mode only benefits routed/bridged@Controller Topologies. An IPSEC tunnel is established from the AP to the controller and all SFTP/SSH/TFTP/ WASSP control and data traffic is encrypted. The AP skips the registration and authentication phases, and when selected, the Secure Tunnel Lifetime feature can be configured. Note: This option is not available for AP3805 models. • Debug mode — An IPSEC tunnel is established from the AP to the controller, no traffic is encrypted, and all SFTP/SSH/TFTP traffic works normally. The AP skips the registration and authentication phases and when selected, the Secure Tunnel Lifetime feature can be configured. Note: Changing a Secure Tunnel mode will automatically disconnect and reconnect the AP. Secure Tunnel Lifetime Available when Secure Tunnel is enabled. Enter an interval (in hours) at which time the keys of the IPSEC tunnel are renegotiated. Note: Changing the Secure Tunnel Lifetime setting will not cause any AP disruption. Enable SSH Access Click to enable or disable SSH for access to the AP. Enable location-based-service Enable or disable the AeroScout, Ekahau, or Centrak location-based service for the AP. Maintain client session in event of poll failure Select this option (if using a bridged at AP VNS) if the AP should remain active if a link loss with the controller occurs. This option is enabled by default. Restart service in the absence of controller Select this option (if using a bridged at AP VNS) to ensure the AP’s radios continue providing service if the AP’s connection to the controller is lost. If this option is enabled, it allows the AP to start a bridged at AP VNS even in the absence of a controller. ExtremeWireless™ V10.41.06 User Guide 164 Configuring the ExtremeWireless APs Field Description Use broadcast for disassociation Select this option if you want the AP to use broadcast disassociation when disconnecting all clients, instead of disassociating each client one by one. This affects the behavior of the AP under the following conditions: • If the AP is preparing to reboot or to enter one of the special modes (DRM initial channel selection). If • a BSSID is deactivated or removed on the AP. This option is disabled by default. Enable LLDP ft ra Click to enable or disable the AP from broadcasting LLDP information. This option is disabled by default. If SNMP is enabled on the controller and you enable LLDP, the LLDP Confirmation dialog is displayed. Select one of the following: • Proceed (not recommended) — Select this option to enable LLDP and keep SNMP running, and then click OK. • Disable SNMP publishing, and proceed — Select this option to enable LLDP and disable SNMP, and then click OK. For more information on enabling SNMP, see the ExtremeWireless • Maintenance Guide. Announcement Interval If LLDP is enabled, type how often the AP advertises its information by sending a new LLDP packet. This value is measured in seconds. If there are no changes to the AP configuration that impact the LLDP information, the AP sends a new LLDP packet according to this schedule. Note: The Time to Live value cannot be directly edited. The Time to Live value is calculated as four times the Announcement Interval value. Announcement Delay If LLDP is enabled, type the announcement delay. This value is measured in seconds. If a change to the AP configuration occurs which impacts the LLDP information, the AP sends an updated LLDP packet. The announcement delay is the length of time that delays the new packet delivery. The announcement delay helps minimize LLDP packet traffic. IP Multicast Assembly Click to Enable or Disable IP Multicast Assembly on this Wireless AP. If Enabled, the IP Multicast Assembly feature assembles multicast data packets that were too large to fit the MTU size of the tunnel and were fragmented in order to fit the tunnel header. This feature is disabled by default. Active OBSS channel width adjustment When enabled, this setting avoids channel overlap by shrinking channels, when ACS detects an overlapping BSS. Before a radio provides service, it performs an overlapping BSS coexistence scan to ensure that the radio's channel will not overlap with a nearby operating AP's secondary channels. This behavior is in accordance with the 802.11 standard and provides data to the Channel Inspector Report. If the channel width is set to 40 or 80 MHz and an overlap is detected, ACS shrinks the channel to 20 or 40MHz to avoid the overlap. When this setting is disabled, the radio starts the service in spite of the overlap. By default, this option is enabled for newly deployed APs and is disabled for existing AP deployments, ensuring backward compatibility with previous ExtremeWireless releases. Balanced Channel List Power This simplifies power settings such that they will function across all channels in the channel plan. ExtremeWireless™ V10.41.06 User Guide 165 Configuring the ExtremeWireless APs Field Description Low Power Mode Override Check this box to have AP ALWAYS operate in 4x4 mode regardless of what was negotiated with the Switch PoE. When this option is cleared, the AP operates in 2x2 or 4x4 depending on what was negotiated with the Switch PoE using the 2-event classification. • AP sends Power Status element with "Power Mode" set to 0 when "Low Power Mode Override" is enabled. • AP sends Critical Log "entering Low Power mode" only if negotiated .af with Switch PoE and "Low Power Mode Override" is disabled. Otherwise, Critical Log is not sent. • Controller "Network Health" shows only APs that have "Power Mode" bit in the Power Status set to 1. The default configuration for the 39xx AP is disabled. Select the desired LED pattern from the drop-down list. Options include: Off, WDS Signal Strength, Identify, and Normal. Real Capture Click Start to start real capture server on the AP. Default capture server timeout is set to 300 seconds and the maximum configurable timeout is 1 hour. While the capture session is active, the AP interface operates in promiscuous mode. From the Wireshark GUI, set the capture interface to the IP address of the selected AP, and select null authentication. Once Wireshark connects to the AP, the AP's interfaces are listed as available to capture traffic. eth0 is the wired interface, wlan0 is the 5Ghz interface, and wlan1 is the 2.4Ghz interface. You can capture bidirectional traffic on eth0, wifi0, and wifi1. The capture on wifi0 and wifi1 does not include internally generated hardware packets by the capturing AP. The capturing AP does not report its own Beacons, Retransmission, Ack and 11n Block Ack. If this information is needed, perform Real Capture from a second AP that is close by. Make sure both APs are on the same wireless channel. Broadcast an SSID to activate the radios, but do not broadcast the SSID of the AP you are troubleshooting. You do not want the clients to connect to the second capturing AP. Capture statistics are found on the Active Wireless APs report (see Viewing Statistics for APs on page 627). ft ra LED Related Links AP Properties Tab - Basic Settings on page 161 Professional Install Settings The Professional Install option is only available for AP models with external antennas. The fields and corresponding antenna value options that appear on the Professional Install dialog depend on the selected AP and the antenna models that are available. Select an antenna for each available port. By default, the two antennas must be identical. However, you have the option to select No Antenna for the second antenna port. The AP3915e and AP3917e access point models offer an external IoT antenna. Select the antenna model from the drop-down field. Choose the desired attenuation for each radio from the drop-down list. Selectable range is from 0 to 30 dBI. ExtremeWireless™ V10.41.06 User Guide 166 Configuring the ExtremeWireless APs Figure 30: Professional Install dialog AP3917 ft ra Outdoor Access Point Installation The FCC regulations for the indoor and outdoor installation are different. The professional installer must configure the access point transmitters accordingly. Products that are specifically intended to be placed outdoors are configured at the factory for compliant outdoor operation. Professional installers should review the following to assess the legality of outdoor deployments: • • • When a transmitter is placed indoors but the antenna is placed outdoors, the FCC interprets this as an outdoor installation. When a transmitter is placed indoors and the antenna is oriented to intentionally radiate outdoors, the FCC interprets this as an outdoor installation. When the transmitter is placed on a loading dock or inside a covered stadium with a retractable cover, the FCC views this as an outdoor installation. Antenna Gain Antenna gain is the ratio of an antenna's radiation intensity in a given direction to the intensity produced by a no-loss, isotropic antenna radiating equally in all directions. An antenna's gain along the horizon and at an elevation of 30 degree may vary. The elevation gain is defined as the maximum antenna gain at 30 to 150 degrees above the horizon. If elevation gain is configured, the transmit (TX) power calculations maximize the allowable TX power for an elevation below 30 degree. Access Points must conform to U.S. Federal Communications Commission's (FCC) limitations. FCC has now stipulated a 21dBm Effective Isotropic Radiated Power (EIRP) limit for power directed 30 degrees above the horizon. For Extreme Networks -supplied antennas, compatible with 5.0 GHz on the access point, refer to the Antenna Guide for Elevation Gain information. If using a third-party antenna, you must obtain the antenna-elevation gain information from the antenna manufacturer. The elevation gain should be configured if the access point: • Is deployed outdoors, and ExtremeWireless™ V10.41.06 User Guide 167 Configuring the ExtremeWireless APs • • Is used with a dipole antenna (Panel antennas and polarized antennas are for point to point only and are excluded from this requirement.) and Is transmitting in the 5.15 - 5.25 GHz Unlicensed National Information Infrastructure-1 (UNII-1) band. Professional installers must complete the following steps to ensure compliance with the FCC rule: Note ExtremeWireless determines the antenna peak gain and elevation gain based on the user configured settings. 1 Configure the antenna type from the Professional Install dialog. 2 Configure the antenna placement from the AP Environment field on the AP Properties tab. 3 Configure the Country field on the AP Properties tab. The firmware uses this information with hardcoded maximum limits (that are determined during testing) to limit the EIRP below 21dBm for outdoor use in UNII-1 band. For information on specific antennas, refer to the ExtremeWireless External Antenna with Wave 2. ft ra Related Links AP Properties Tab - Basic Settings on page 161 Professional Install Settings on page 166 Outdoor Access Point Installation on page 167 Assigning Wireless AP Radios to a VNS The following describe methods of assigning AP radios to a VNS: • VNS configuration — When a VNS is configured, you can assign AP radios to the VNS through its associated WLAN Service. For more information, see Configuring WLAN Services on page 318. Note To configure foreign AP radios to a VNS, use the VNS configuration method. Foreign APs are listed and available only for VNS assignment from the WLAN Services tab. For more information, see Configuring a VNS on page 390. • AP Multi-edit — When you configure multiple APs simultaneously, use the AP Multi-edit feature. For more information, see AP Multi-Edit Properties on page 111 . • Wireless AP configuration — When you configure an individual AP, assign its radios to a specific WLAN Service. To assign wireless AP radios when configuring an AP: 1 From the top menu, click AP. 2 Click the appropriate AP in the list (not the check box). The AP Details dialog is displayed. 3 Click Configure. The AP Properties tab is displayed. ExtremeWireless™ V10.41.06 User Guide 168 Configuring the ExtremeWireless APs 4 Click the WLAN Assignment tab. ft Note Airtime % is available for AP38xx and AP39xx access point models that are assigned WLANS configured with Reserved Airtime. 5 In the Radio 1 and Radio 2 columns, select the radio check box that you want to assign for each WLAN Service. 6 To save your changes, click Apply. Related Links Assigning WLAN Services to Client Ports on page 170 AP Properties Tab Configuration on page 159 Configuration Parameters for Radio Properties on page 180 Setting Up 802.1x Authentication for a Wireless AP on page 203 ExtremeWireless™ V10.41.06 User Guide 169 Configuring the ExtremeWireless APs AP Multi-Edit Properties on page 111 Configuring Airtime Fairness: Reservation Mode on page 406 NEW! Assigning WLAN Services to Client Ports When configuring client ports on access point models AP391x that offer client ports, you can assign one or more client ports to a single WLAN service. Client ports offer 802.1x authentication and policy support. Note Network access for the AP3916ic camera function is controlled through policy definition, assigned as a the CAM port. The camera port on the AP3916 is treated as a wired client port. 1 From the top menu, click AP. 2 Select a specific AP. ft ra Port options depend on the AP model you select: • • • • AP3912 supports wired client ports 1-3. AP3916ic supports the wired CAM port for a camera. AP3917i/e supports 1 client port. Additionally, all the AP391x models, including AP3915i/e, support IoT Thread Gateway using the AP as a border gateway router. The AP Properties dialog appears. 3 Click Configure. 4 Select the WLAN Assignment tab. 5 Select one or more client ports for each WLAN Service. All Port Assignments: • • One WLAN can be assigned per port. The assignment enables the port. Wireless and wired users associated to the same WLAN service receive identical service. They are affected by the same policies and filters. The wired ports for the AP391x default to auto-negotiation for speed and mode. To configure fixed speed and mode values (for instance, 100Mbps and Full Duplex), select the Static Configuration tab and select the speed and mode settings for the Ethernet port and each client port. Configure the values that the client hardware supports. ExtremeWireless™ V10.41.06 User Guide 170 Configuring the ExtremeWireless APs ft Figure 31: Port Configuration for AP3912 Wired Ports CAM Port Assignments: • The topology associated with the role that is assigned to the CAM port (either through WLAN assignment or through device MBA authentication) must be configured to allow ONVIF camera discovery and video streaming. Configure the default topology to explicitly allow multicast bridging of WS-Discovery group (239.255.255.0). • When the camera port is unassigned, it is disabled, and the camera is disconnected from the network and turned off. • One policy definition for wired and wireless users. Users on wired ports can receive the same default policy. However, the camera function (CAM) can be assigned a specific device policy to separate user service and video surveillance networks. • The camera function can be assigned to B@AP and B@AC topologies and Mac Based Authentication for dynamic policies. ExtremeWireless™ V10.41.06 User Guide 171 Configuring the ExtremeWireless APs • • • Configure MAC authentication (MBA) for network attached devices or collect device metrics through RADIUS accounting from the Auth&Acct tab. WLAN SSID, Privacy, and QoS settings are not relevant for the camera functionality. Captive Portal and 802.1x are not supported on the CAM port. Note Bind the WLAN Service to the VNS to activate service. af Figure 32: WLAN Services Port Assignment ExtremeWireless™ V10.41.06 User Guide 172 Configuring the ExtremeWireless APs ft ra Figure 33: Assigning Ports to WLAN Service on the AP3912 Figure 34: Assigning the Camera Port to WLAN Service on the AP3916ic ExtremeWireless™ V10.41.06 User Guide 173 Configuring the ExtremeWireless APs ft ra Figure 35: Assigning the IoT Port to WLAN Service on the AP3915 Related Links Configuring IoT Applications on page 189 Setting Up the Wireless AP Using Static Configuration on page 199 Configuring Common Configuration Default AP Settings on page 135 Configuring Wireless AP Radio Properties Wireless AP radio properties can vary depending on the model of the AP being configured. For specific information on modifying a wireless 802.11n AP, see Modifying 11n and 11ac Wireless AP Radio Properties on page 178. Dynamic Radio Management (DRM) Use the Dynamic Radio Management (DRM) controller function to establish the optimum radio configuration for your APs. Consider the following deployment methodologies: • • Plan the wireless RF deployment using various site survey methodologies including the ExtremeCloud RF planner. Configure each AP’s channel width and channel according to the RF plan. Use the DRM automatic tool to configure the deployed AP’s channel width and channel according to the channel plan. • Use DRM Auto Channel Selection (ACS) to automatically assign the APs to appropriate channels and channel width. • Use Auto Tx Power Control (ATPC) to set transmit power and let the AP dynamically adapt transmit power. • Use Dynamic Channel Selection (DCS) to monitor channel occupancy around the APs and optionally allow the AP to dynamically adapt the channel. ExtremeWireless™ V10.41.06 User Guide 174 Configuring the ExtremeWireless APs The controller’s DRM functionality: • • Adjusts transmit power levels to balance coverage between APs assigned to the same RF domain and operating on the same channel. Triggers ACS for all selected APs in the deployment, simultaneously. The APs determine the deployment density and the optimal channel width for the selected group. Density deployment is based on the following factors: • The number of channels configured in the channel list • The number of APs that have to be set up • The number of detected APs that do not belong to the deployment. Each AP is set to the best available channel. The channel inspector displays the RF environment seen by each AP. Use the Channel Inspector Report to understand why an AP selects a channel and, if necessary, to make manual adjustments. AP39xx and AP38xx perform overlapping BSS (OBSS) scan every time the radio is restarted. This scan results are used as follows: ft ra • Channel inspector is always updated with the latest RF environment seen by the AP. • If the channel width is set to 40MHz or 80MHz and the AP property Active OBSS channel width adjustment is enabled, the AP shrinks its channel to avoid overlapping with other APs detected in the area. (An OBSS overlap occurs when a primary channel and a secondary channel overlap.) After the interfering AP is shut down and the AP’s radio is reset, the channel width returns to 40MHz or 80MHz. Note When setting a fixed channel width to 40 MHz or 80 MHz, the Active OBSS channel width adjustment setting must be disabled. This setting is disabled by default for existing APs in order to maintain existing behavior and the existing channel plan. For APs that are newly added to the network, this setting is enabled by default. • AP39xx and AP38xx return to original channel after a RADAR event in order to restore original channel plan. When a RADAR event is detected, the channel is marked and the AP selects a new channel from the allowed channel list. After 30 minutes, if there are no clients associated with the AP, the AP returns to the original channel. If there are associated clients, the AP tries to return to the original channel every five minutes until there are no clients associated with the radio. The DRM feature consists of three functions: Auto Channel Selection (ACS) ACS provides an easy way to optimize channel arrangement based on the current situation in the field. An optimal solution is provided only if ACS is triggered on all APs in a deployment, or all APs placed in a distinct area like a floor. ACS forces the channel width selection of the involved APs to Auto width. The ACS algorithm selects the optimal channel width for all the selected APs and places each AP on the best channel available in its area. Use the Channel Inspector Report to visualize why the AP was placed on the selected channel. Triggering ACS on a single AP or on a subset of APs can be useful but it is not an optimal solution. The ACS algorithm places the selected APs as best it can considering the channels occupied by other ExtremeWireless™ V10.41.06 User Guide 175 Configuring the ExtremeWireless APs operating APs. ACS relies on the RF channel information observed at the time it is triggered. Once an AP has selected a channel, it remains operating on that channel until you change the channel or trigger ACS again. ACS can be triggered by one of the following events: • • A new AP registers with the controller and the AP Default Settings channel is Auto. A user selects Auto from the Request New Channel drop-down list on the Wireless AP’s radio configuration tabs. • • • A user selects Auto from the Channel drop-down list on the AP Multi-edit screen. If Dynamic Channel Selection (DCS) is enabled in active mode and a DCS threshold is exceeded. A Wireless AP detects radar on its current operating channel and it employs ACS to select a new radar free channel. The AP returns to the original channel under the following condition: • A 30-minute Non-Occupancy timer expired per the DFS standard. • The AP does not disrupt service to any clients. • • You can initiate ACS from the Channel Inspector Report. ft ra ACS is triggered for Site deployments or Cloud deployments by sending the ACS command to one of the member APs, which will distribute the ACS command to all other member APs. Each Site is considered an RF domain. • Channel Plan — The ACS algorithm selects channels from the configured channel plan. You can define the channel plan for each AP or accept the default plan. It is recommended that all APs in a deployment have identical channel plans. Defining a channel plan allows you to limit the available channels for use during an ACS scan. For example, you may want to avoid using specific channels because of allowed power limits on that channel or regulatory domain, or avoid DFS channel RADAR interference. • Multi-Edit — The best way to trigger ACS between multiple APs is to use the AP Multi Edit option. First, select Radio 1 or Radio 2 actions, and then select Auto Channel Select. APs that configure ACS together, must all be part of the same RF domain. Therefore, set the RF Domain before ACS is started. ACS between multiple APs must start at the same time. Dynamic Channel Selection (DCS) DCS allows a Wireless AP to monitor RF channel conditions and noise levels on the channel on which the AP is currently operating. DCS can operate in the following modes: • Monitor — When DCS is enabled in monitor mode the AP monitors channel occupancy and traffic or noise levels on the channel on which the AP is currently operating. The DCS monitor alarm and generated stats can be used to evaluate the RF environment of your deployed APs. • Active — When DCS is enabled in active mode and channel occupancy traffic or noise levels exceed the configured DCS thresholds, ACS is triggered to move the AP from a busy / noisy channel to the best available channel. Also, an alarm is triggered and an information log is generated. Note If DCS is enabled, DCS statistics can be viewed in the Wireless Statistics by Wireless APs display. For more information, see Working with Reports and Statistics on page 621. Related Links AP Properties Tab - Advanced Settings on page 164 Use Cases for Dynamic Radio Management on page 178 Configuration Parameters for Radio Properties on page 180 ExtremeWireless™ V10.41.06 User Guide 176 Configuring the ExtremeWireless APs AP Multi-Edit Properties on page 111 Radio Advanced Properties on page 184 Channel Inspector Report on page 637 ATPC The purpose of ATPC is to automatically adjust the coverage cell around an AP. During initial deployment, the Tx Power of each AP is adjusted to provide coverage without overlapping the coverage cell of a neighboring AP. To maintain optimal performance, it is important to maintain a small cell sizes to encourage WLAN clients to roam to the closest AP and operate at high data rates. This practice frees the channel as fast as possible and reduces congestion. Setting the AP transmit power too high can cause interference and potentially exceed useful bounds. Setting the AP transmit power too low may introduce coverage gaps in the installation. ft ra ATPC operates over a group of APs configured to participate in the same RF domain. Configure the RF Domain parameter as a unique string across all the APs that provide service coverage, ensuring that cell shaping is not influenced by non-participating APs. ATPC operates by periodically broadcasting custom probe requests that allow the other APs in range to determinate the “RF Distance / Path Loss” to the sending AP. Every 10 seconds, each AP evaluates the Path Loss to its neighbors. If Path Loss is less then 70dB, the AP reduces its Tx Power. If the Path Loss is more than 70dB, the AP boosts its Tx Power. When all APs are operating, the cells size of each AP is adjusted to cover the surrounding area. If one AP fails, the APs around it increase their Tx Power, increasing the cell size, and compensating for the loss of the failed AP. If an RF obstructing object is moved between the APs, the APs increase Tx Power in order to maintain coverage. The ATPC feature is configured for each radio. When you check Auto Tx Power Ctrl (ATPC) check box, you are enabling the radio to participate in the AP group that collaborates to automatically adjust the cell size. When ATPC is enabled, the following parameters are available for configuration: • • • Max Tx Power Min Tx Power Auto Tx Power Ctrl Adj The Max and Min Tx Power parameters set the power range used by the ATPC. The Auto Tx Power Ctrl Adj parameter allows you to manually adjust the Tx Power calculated by the ATPC algorithm (either up or down). The Current Tx Power Level field on the AP / Radio page displays the actual AP Tx Power. ATPC preserving Power Setting — In some cases operators may use ATPC to initially set up the power setting of the APs over a service area, but then want to “freeze” this setting during normal operation of the network. When the Auto Tx Power Ctrl (ATPC)check box is cleared you have two choices: • • Maintain the ATPC-acquired Tx Power value after turning ATPC off. Set the Tx Power to the Max Tx Power value. The ATPC feature allows you to use ATPC to achieve a Tx Power level required for the installation, and then statically maintain this value if ATPC is turned off. Related Links ExtremeWireless™ V10.41.06 User Guide 177 Configuring the ExtremeWireless APs Configuration Parameters for Radio Properties on page 180 Use Cases for Dynamic Radio Management The following scenarios outline use cases for Dynamic Radio Management (DRM). • Using ACS with a set of APs When you trigger ACS for a set of APs, the channel width is automatically set to Auto and ACS determines the deployment density and the desired channel width to minimize co-channel interference. A channel plan is created with non-overlapping cells, and each AP performs an overlapping BSS (OBSS) scan to avoid channel overlap. • Manually Selecting Channels and Channel Width ft ra When you select a fixed channel and channel width, the AP radio is set to the requested channel and width. The AP performs an overlapping BSS (OBSS) scan and sends the results to the Channel Inspector. If the setting Active OBSS channel width adjustment is not enabled, the radio uses the manually selected channel and width, and the detected overlap is not remedied automatically. If Active OBSS channel width adjustment is enabled, the detected overlap is corrected by shrinking the channel width before the radio is enabled. The channel width can recover after a subsequent radio reset if the OBSS scan does not detect another channel overlap. Modifying 11n and 11ac Wireless AP Radio Properties The ExtremeWireless 37xx/W78xC series are 802.11n-compliant access points. AP38xx and AP39xx series are 11n and 11ac-compliant. This section describes how to configure/modify properties of an 11n or 11ac AP. Channel Bonding Channel bonding improves the effective throughput of the wireless LAN. In contrast to legacy APs which use radio channel spacings that are only 20 MHz wide, 11n wireless APs can use two channels at the same time to create a 40 MHz wide channel. 11ac wireless APs can use four channels at the same time to create an 80 MHz wide channel. The 40 MHz channel width is achieved by bonding the primary channel (20 MHz) with an extension channel. Channel bonding is predefined on both Radio 1 and Radio 2. Channel bonding is enabled by selecting the Channel Width on the Radio tabs. When selecting Channel Width, the following options are available: • • 20 MHz — Channel bonding is not enabled: • 802.11n clients use the primary channel (20 MHz) • Non-802.11n clients, as well as beacons and multicasts, use the 802.11a/b/g radio protocols. 40 MHz — Channel bonding is enabled: • 802.11n clients that support the 40 MHz channel width can use 40 MHz, 20 MHz, or the 802.11a/b/g radio protocols. ExtremeWireless™ V10.41.06 User Guide 178 Configuring the ExtremeWireless APs • 802.11n clients that do not support the 40 MHz channel width can use 20 MHz or the 802.11a/b/g • radio protocols. • Non-802.11n clients, beacons, and multicasts use the 802.11a/b/g radio protocols. 80 MHz — Channel bonding is enabled: • 802.11ac clients that support the 80 MHz channel width can use 80 MHz, 40 MHz, 20 MHz, or the 802.11a/b/g radio protocols. • 802.11n clients that do not support the 80 MHz channel width can use 20 MHz, 40 MHz, or the 802.11a/b/g radio protocols. • Non-802.11n clients, beacons, and multicasts use the 802.11a/b/g radio protocols. • Auto — Channel bonding is automatically enabled or disabled, switching between 20 MHz, 40 MHz, and 80 MHz, depending on how busy the extension channel(s) are. If the extension channel is busy above a prescribed threshold percentage, which is defined in the 40 MHz Channel Busy Threshold box, channel bonding is disabled. Channel Selection — Primary and Extension ft ra The primary channel of the wireless 802.11n AP is selected from the Request New Channel drop-down list. If auto is selected, the ACS feature selects the primary channel. The channels in the Request New Channel drop-down list show which extension channel(s) are being used for bonding. Guard Interval The guard intervals ensure that individual transmissions do not interfere with one another. The wireless 802.11n AP provides a shorter guard interval that increases the channel throughput. You can select the guard interval to improve the channel efficiency. The guard interval is selected from the Guard Interval drop-down list. Longer guard periods reduce the channel efficiency. Aggregate MSDU and MPDU The wireless 802.11n AP provides aggregate Mac Service Data Unit (MSDU) and aggregate Mac Protocol Data Unit (MPDU) functions, which combine multiple frames together into one larger frame for a single delivery. This aggregation reduces the overhead of the transmission and results in increased throughput. The aggregate methods are enabled and defined selected from the Aggregate MSDUs and Aggregate MPDUs drop-down lists. Antenna Selection Wireless APs have differing numbers of antennas, internal or external, depending on the AP model. Wireless APs by default transmit on all antennas. Depending on your deployment requirements, you can configure the AP to transmit on specific antennas. You can configure the wireless 802.11ac AP to transmit on specific antennas for both radios, including all the available modes: • • Radio 1 — a/n/ac, ac-strict modes Radio 2 — b/g, g/n, b/g/n, n-strict modes When you configure the AP to use specific antennas, the following occurs: • Transmission power is recalculated — The Current Tx Power Level value for the radio is automatically adjusted to reflect the recent antenna configuration. It takes approximately 30 seconds for the change to the Current Tx Power Level value to be reflected in the Wireless Assistant. ExtremeWireless™ V10.41.06 User Guide 179 Configuring the ExtremeWireless APs • Radio is reset — The radio is reset causing client connections on this radio to be lost. To modify wireless AP radio properties: 1 From the top menu, click AP. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. 4 Click the Radio tab you want to modify. Configuration Parameters for Radio Properties Table 15: Radio Properties Field Description Base Settings BSS Info ft ra BSS Info is read-only. After WLAN Service configuration, the Basic Service Set (BSS) section displays the MAC address on the AP for each WLAN Service and the SSIDs of the WLAN Services to which this radio has been assigned. Admin Mode Radio Mode - Radio 1 Select On to enable the radio; select Off to disable the radio. Note: Depending on the radio modes you select, some of the radio settings may not be available for configuration. The AP hardware version dictates the available radio modes. Click one of the following radio options for Radio 1: • a — Click to enable the 802.11a mode of Radio 1 without 802.11n capability. • a/n — Click to enable the 802.11a mode of Radio 1 with 802.11n capability. • a/n/ac — Click to enable the 802.11ac mode of Radio 1 with 802.11ac capability. • ac-strict — Click to enable the 802.11ac mode of Radio 1 with 802.ac strict capability. • n-strict — Click to enable the 802.11a mode of Radio 1 with 802.11n strict capability. ExtremeWireless™ V10.41.06 User Guide 180 Configuring the ExtremeWireless APs Table 15: Radio Properties (continued) Field Radio Mode - Radio 2 Description Note: Depending on the radio modes you select, some of the radio settings may not be available for configuration. ft ra Click one of the following radio options for Radio 2: • b — Click to enable the 802.11b-only mode of Radio 2. If selected, the AP uses only 11b (CCK) rates with all associated clients. • — Click to enable the 802.11g-only mode of Radio 2. • b/g — Click to enable both the 802.11g mode and the 802.11b mode of Radio 2. If selected, the AP uses 11b (CCK) and 11g-specific (OFDM) rates with all of the associated clients and will not transmit or receive 11n rates. • g/n — Click to enable both the 802.11g mode and the 802.11nb mode of Radio 2. If selected, the AP uses 11n and 11g-specific (OFDM) rates with all of the associated clients. The AP will not transmit or receive 11b rates. • b/g/n — Click to enable b/g/n modes of Radio 2. If selected, the AP uses all available 11b, 11g, and 11n rates. • n-strict — Click to enable the 802.11n-strict mode of Radio 2. If selected, the AP can be configured to use 11n-strict rates with all of the associated clients. With n-strict mode enabled, the AP does not transmit or receive 11b or 11g rates. Basic Radio Settings RF Domain Type a string that uniquely identifies a group of APs that cooperate in managing RF channels and transmission power levels. The maximum length of the string is 16 characters. The RF Domain is used to identify a group of APs. The RF Domain feature is part of the Auto Tx Power Control (ATPC) feature (for more information, see Configuring Wireless AP Radio Properties on page 174). Current Channel Read-only. The actual channel the ACS has assigned to the AP radio. The Current Channel value and the Last Requested Channel value may be different because the ACS automatically assigns the best available channel to the AP, ensuring that a AP’s radio is always operating on the best available channel. Last Requested Channel Read-only. The last wireless channel that you had selected to communicate with the wireless devices. Request New Channel Click the wireless channel you want the wireless AP to use to communicate with wireless devices. Weather channels (116, 120, 124, 128) are supported for European compliance. See Channel Plan. Click Auto to request the ACS to search for a new channel for the AP, using a channel selection algorithm. This forces the AP to go through the auto-channel selection process again. Note: ACS in the 2.4 GHz radio band with 40 MHz channels is not recommended due to severe co-channel interference. Depending on the regulatory domain (based on country), some channels may be restricted. The default value is based on North America. For more information, refer to the appropriate AP Installation Guide. ExtremeWireless™ V10.41.06 User Guide 181 Configuring the ExtremeWireless APs Table 15: Radio Properties (continued) Field Description Auto Tx Power Ctrl (ATPC) Click to either enable or disable ATPC from the Auto Tx Power Ctrl drop-down list. ATPC automatically adapts transmission power signals according to the coverage provided by the AP. After a period of time, the system stabilizes itself based on the RF coverage of your Wireless APs. Note: When enabled, Min Tx Power and Auto Tx Power Ctrl Adjust parameters can be edited, and the ATPC algorithm will adjust the AP power between Max Tx power and Min Tx Power. When disabled, the Max Tx Power selected value or the largest value in the compliance table will be the power level used by the radio, whichever is smaller. The actual Tx power level used by the AP radio. Max Tx Power Displays dynamic power level based on channel selected. Select the Max TX Power from the drop-down list. The values in the Max TX Power drop-down are in dBm and will vary by AP. The values are governed by compliance requirements based on the country, radio, and antenna selected. Changing this value below the current Min Tx Power value will change the Min Tx Power to a level lower than the selected Max TX Power. ft ra Current Tx Power Level Note: If Auto Tx Power Ctrl (ATPC) is disabled, the selected value or the largest value in the compliance table will be the power level used by the radio, whichever is smaller. Min Tx Power If ATPC is enabled, select the minimum Tx power level that is equal or lower than the maximum Tx power level. Extreme Networks recommends that you use 0 dBm if you do not want to limit the potential Tx power level range that can be used. Note: The Min Tx Power setting cannot be set higher than the Max Tx Power setting. Auto Tx Power Ctrl Adjust ExtremeWireless™ V10.41.06 User Guide The Auto Tx Power Ctrl Adj parameter is a correction parameter that allows you to manually adjust (up or down) the Tx Power calculated by the ATPC algorithm. If ATPC is enabled, click the Tx power level that can be used to adjust the ATPC power levels that the system has assigned. It is recommended that you use 0 dBm during the initial configuration. If you have an RF plan that recommends Tx power levels for each AP, compare the actual Tx power levels your system has assigned against the recommended values your RF plan has provided. Use the Auto Tx Power Ctrl Adjust value to achieve the recommended values. Valid range is from - (Max Tx Power - Min Tx Power) dB to (Max Tx Power - Min Tx Power) dB. 182 Configuring the ExtremeWireless APs Table 15: Radio Properties (continued) Description Channel Plan - Radio 1 If ACS is enabled you can define a channel plan for the AP. Defining a channel plan allows you to control which channels are available for use during an ACS scan. For example, you may want to avoid using specific channels because of low power, regulatory domain, or radar interference. • For 5 GHz Radio nodes, click one of the following: • All channels — ACS scans all channels for an operating channel and, when ACS is triggered, the optimal channel is selected from all available channels. • All Non-DFS Channels — ACS scans all non-DFS channels for an operating channel. With ACS, the AP selects the best nonDFS channel. • Custom — To configure individual channels from which the ACS selects an operating channel, click Configure. The Custom Channel Plan dialog displays. By default, all channels participate in the channel plan. Click the individual channels you want to include in the channel plan. To select contiguous channels, use the Shift key. To select multiple, non-contiguous channels in the list, use the CTRL key. Click OK to save the configuration. • All channels including weather radar — ACS selects the best channel from the available channels list. Selected channel may be DFS, weather-radar DFS or non-DFS. Weather-radar channels are approved for selected AP models in selected countries. Consult the compliance information for the selected AP. The weather channel includes 5600-5650MHz sub-bands and requires a listening period before the AP can provide wireless service. During the listening period, the Current Channel field for DFS channels displays the value DFS Timeout, and the weather channel fields display DFS Timeout . In Europe, the listening period can be up to 10 minutes. In the U.S., this period is 1 minute. • For 2.4 GHz Radio nodes, click one of the following: • 3 Channel Plan — ACS scans the following channels: 1, 6, and 11 in North America, and 1, 7, and 13 in the rest of the world. • 4 Channel Plan — ACS scans the following channels: 1, 4, 7, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Auto — ACS scans the default channel plan channels: 1, 6, and 11 in North America, and 1, 5, 9, and 13 in the rest of the world. • Custom — If you want to configure individual channels from which the ACS selects an operating channel, click Configure. The Add Channels dialog is displayed. Click the individual channels you want to add to the channel plan while pressing the CTRL key, and then click OK. ft ra Field ExtremeWireless™ V10.41.06 User Guide 183 Configuring the ExtremeWireless APs Table 15: Radio Properties (continued) Description Channel Plan - Radio 2 If ACS is enabled, you can define a channel plan for the AP. Defining a channel plan allows you to limit which channels are available for use during an ACS scan. For example, you may want to avoid using specific channels because of low power, regulatory domain, or radar interference. Click one of the following: • 3 Channel Plan — ACS scans the following channels: 1, 6, and 11 in North America, and 1, 7, and 13 in most other parts of the world. • 4 Channel Plan — ACS scans the following channels: 1, 4, 7, and 11 in North America, and 1, 5, 9, and 13 in most other parts of the world. • Auto — ACS scans the default channel plan channels: 1, 6, and 11 in North America, and 1, 5, 9, and 13 in most other parts of the world. • Custom — If you want to configure individual channels from which the ACS selects an operating channel, click Configure. The Add Channels dialog is displayed. Click the individual channels you want to add to the channel plan while pressing the CTRL key, and then click OK. ft ra Field View Click to open a new dialog that displays the selected Channel Plan for the antenna. Related Links Radio Advanced Properties on page 184 Radio Actions on page 130 AP Properties Tab Configuration on page 159 Assigning Wireless AP Radios to a VNS on page 168 Setting Up the Wireless AP Using Static Configuration on page 199 Setting Up 802.1x Authentication for a Wireless AP on page 203 Radio Advanced Properties Table 16: Advanced Radio Properties Field Description Advanced Dialog - Base Settings DTIM period Type the desired DTIM (Delivery Traffic Indication Message) period — the number of beacon intervals between two DTIM beacons. To ensure the best client power savings, use a large number. Use a small number to minimize broadcast and multicast delay. The default value is 5. Beacon Period Defines the time, in milliseconds, between beacon transmissions. The default value is 100 milliseconds. RTS/CTS Threshold Type the packet size threshold, in bytes, above which the packet is preceded by an RTS/CTS (Request to Send/Clear to Send) handshake. The default value is 2346, which means all packets are sent without RTS/CTS. Reduce this value only if necessary. ExtremeWireless™ V10.41.06 User Guide 184 Configuring the ExtremeWireless APs Table 16: Advanced Radio Properties (continued) Field Description Frag. Threshold Type the fragment size threshold, in bytes, above which the packets are fragmented by the AP prior to transmission. The default value is 2346, which means all packets are sent unfragmented. Reduce this value only if necessary. Maximum Distance Enter a value from 100 to 15,000 meters that identifies the maximum link distance between APs that participate in a WDS. This value ensures that the acknowledgement of communication between APs does not exceed the timeout value predefined by the 802.11 standard. The default value is 100 meters. If the link distance between APs is greater than 100 meters, configure the maximum distance up to 15,000 meters so that the software increases the timeout value proportionally with the distance between APs. Do not change the default setting for the radio that provides service to 802.11 clients only. Advanced Dialog - Basic Radio Settings ft ra Dynamic Channel Selection To enable Dynamic Channel Selection, click one of the following: Monitor Mode — If enabled, a selection of DCS Interference Events appears in a separate dialog. If traffic or noise levels exceed the configured DCS thresholds, an alarm is triggered and an information log is generated. Active Mode — If enabled, a selection of DCS Interference Events • appears in a separate dialog. If traffic or noise levels exceed the configured DCS thresholds, an alarm is triggered and an information log is generated. In addition, the AP ceases operating on the current channel and ACS is employed to automatically select an alternate channel for the AP to operate on. • Probe Suppression Click to Enable Probe Suppression. Forced Disassociate — Click to enable. RSS Threshold — 90 (Range of -50 to -100). • • Applies to AP37xx, AP38xx, and AP39xx series APs. Min. Basic Rate Click the minimum data rate that must be supported by all stations in a BSS: 6, 12, or 24 Mbps and MCS0-MCS7 for n Radio (MCS0, 1 to MCS7,1 for a/n/c radio). If necessary, the Max Basic Rate choices adjust automatically to be higher or equal to the Min Basic Rate. Advanced Dialog - Multicast Settings Max % of non-unicast traffic per Beacon period Enter the maximum percentage of time that the AP transmits nonunicast packets (broadcast and multicast traffic) for each configured Beacon Period. For each non-unicast packet transmitted, the system calculates the airtime used by each packet and drops all packets that exceed the configured maximum percentage. By restricting nonunicast traffic, you limit the impact of broadcasts and multicasts on overall system performance. Optimized for power save Click to optimize for power save. Adaptable rate Click to enable adaptable rate capabilities. Multicast to Unicast delivery Click to set the Multicast to Unicast delivery method from the dropdown list. ExtremeWireless™ V10.41.06 User Guide 185 Configuring the ExtremeWireless APs Table 16: Advanced Radio Properties (continued) Field Description Advanced Dialog - 11n Settings Guard Interval Intended to eliminate interference between symbols during transmission. It is the space between the symbols being transmitted. Valid values are Long or Short. Enabling Short Guard Interval increases throughput, but can increase interference. Enabling Long Guard Interval can increase overhead due to additional idle time. Protection Mode Click a protection mode: None, Auto, or Always. The default and recommended setting is Auto. Click None if 11b APs and clients are not expected. Click Always if you expect many 11b-only clients. Extension Channel Busy Threshold Click a protection type, CTS Only or RTS CTS, when a 40 MHz channel is used. This protects high throughput transmissions on extension channels from interference from non-11n APs and clients. Aggregate MSDUs Click an aggregate MSDU mode: Enabled or Disabled. Aggregate MSDU increases the maximum frame transmission size. ft ra Aggregate MPDUs Click an aggregate MPDU mode: Enabled or Disabled. Aggregate MPDU provides a significant improvement in throughput. Aggregate MPDU Max Length Type the maximum length of the aggregate MPDU. The value range is 1024-65535 bytes. For the 802.11ac radio (Radio 1 of the AP38xx), the range is 1024-1048575. Agg. MPDU Max # of Sub-frames Type the maximum number of sub-frames of the aggregate MPDU. The value range is 2-64. ADDBA Support Click an ADDBA support mode: Enabled or Disabled. ADDBA, or block acknowledgement, provides acknowledgement of a group of frames instead of a single frame. ADDBA Support must be enabled if Aggregate APDU is enable. LDPC Click an LDPC mode: Enabled or Disabled. LDPC increases the reliability of the transmission resulting in a 2dB increased performance compared to traditional 11n coding. STBC Click an STBC mode: Enabled or Disabled. STBC is a simple open loop transmit diversity scheme. When enabled, STBC configuration is 2x1 (two spatial streams combine into one spatial stream). TXBF overrides STBC if both are enabled for single stream rates. TXBF Tx Beam Forming is a technique of re-aligning the transmitter multipath spatial streams phases in order to get better signal-to-noise ratio on the receiver side. Click a TXBF mode: For the AP37xx and AP38xx models, valid values are Enabled or Disabled. For the 39xx APs, this setting is only available on Radio1 and valid values are MUMIMO and Disabled. Advanced Dialog - 11b Settings Preamble Click a preamble type for 11b-specific (CCK) rates: Short or Long. Click Short if you are sure that there is no pre-11b AP or a client in the vicinity of this wireless AP. Click Long if compatibility with pre-11b clients is required. Advanced Dialog - 11g Settings ExtremeWireless™ V10.41.06 User Guide 186 Configuring the ExtremeWireless APs Table 16: Advanced Radio Properties (continued) Description Protection Mode Click a protection mode: None, Auto, or Always. The default and recommended setting is Auto. Click None if 11b APs and clients are not expected. Click Always if you expect many 11b-only clients. Protection Rate Click a protection rate: 1, 2, 5.5, or 11 Mbps. The default and recommended setting is 11. Only reduce the rate if there are many 11b clients in the environment or if the deployment has areas with poor coverage. For example, rates lower than 11 Mbps are required to ensure coverage. Protection Type Click a protection type: CTS Only or RTS CTS. The default and recommended setting is CTS Only. Click RTS CTS only if an 11b AP that operates on the same channel is detected in the neighborhood, or if there are many 11b-only clients in the environment. The overall throughput is reduced when Protection Mode is enabled, due to the additional overhead caused by the RTS/ CTS. The overhead is minimized by setting Protection Type to CTS Only and Protection Rate to 11 Mbps. The overhead causes the overall throughput to be sometimes lower than if just 11b mode is used. If there are many 11b clients, it is recommended that you disable 11g support (11g clients are backward compatible with 11b APs). An alternate approach, although potentially a more expensive method, is to dedicate all APs on a channel for 11b (for example, disable 11g on these APs) and disable 11b on all other APs. The difficulty with this method is that the number of APs must be increased to ensure coverage separately for 11b and 11g clients. ft ra Field Achieving High Throughput with 11n and 11ac Wireless APs To achieve high throughput with the wireless APs, configure your system as described in this section. Note Some client devices choose a 2.4 GHz radio even when a 5 GHz high-speed radio network is available. You may need to force those client devices to use only 5 GHz if you have configured high throughput only on the 5 GHz radio. To achieve high throughput with a wireless AP: 1 From the top menu, click AP. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. ExtremeWireless™ V10.41.06 User Guide 187 Configuring the ExtremeWireless APs 4 For Radio 2 configure the following: • • • • In the Radio Mode drop-down list, click b/g/n. In the Channel Width drop-down list, click 40 MHz. Under Advanced Settings, in the Guard Interval drop-down list, click Short. In the 11g Settings section, click None in the Protection Mode drop-down list. Note Do not disable 802.11g protection mode if you have 802.11b or 802.11g client devices using this AP. Instead, configure only Radio 1 for high throughput unless it is acceptable to achieve less than maximum 802.11n throughput on Radio 2. • If only 802.11n devices are present, disable 11n protection and 40 MHz protection: • Protection Mode — Click None. • Protection Type — Click CTS only or RTS CTS. ft ra Note Do not disable 802.11n protection mode if you have 802.11b or 802.11g client devices using this AP. Instead, configure only Radio 1 for high throughput unless it is acceptable to achieve less than maximum 802.11n throughput on Radio 2. • • • • • Aggregate MSDUs — Click Enabled. Aggregate MPDUs — Click Enabled. Aggregate MPDUs Max Length — Click 65535 (for the 802.11ac AP models). • • In the Admin Mode drop-down list, click the On option. In the Radio Mode drop-down list, click the a/n option for the AP3825, and click a/n/ac for the AP3865 and the 39xx series APs). In the Channel Width drop-down list, click 40 MHz (for the AP3825 and for the AP3865 and 39xx series, click 80 MHz). Agg. MPDUs Max # of Sub-frames — Type 64. ADDBA Support — Click Enabled. 5 Click the Radio 1 tab, and then do the following: • • • In the Guard Interval drop-down list, click Short. If only 802.11n devices are present, disable 11n protection and 40 MHz protection: • Protection Mode — Click None. • Protection Type — Click CTS only or RTS CTS. • • • • • Aggregate MSDUs — Click Enabled. Aggregate MPDU — Click Enabled. Aggregate MPDU Max Length — Click Enabled. Agg. MPDU Max # of Sub-frames — Type 64. ADDBA Support — Click Enabled. 6 From the top menu, click VNS. 7 In the left pane select WLAN Services and select the WLAN service to configure. ExtremeWireless™ V10.41.06 User Guide 188 Configuring the ExtremeWireless APs 8 Click the Privacy tab. Some client devices do not use 802.11n mode if they are using WEP or TKIP for security. Do one of the following: • • Select None. Select WPA-PSK, and then clear the WPA v.1 option: • Select WPA v.2. • In the Encryption drop-down list, click AES only. Note To achieve the strongest encryption protection for your VNS, it is recommended that you use WPA v.2. 9 Click the QoS tab. From the QoS tab, you can select WMM and Flexible Client Access (FCA) to get better throughput. Note For FCA, go to VNS > Global > Wireless QoS and set the Fairness Policy to 100% Airtime. ft ra 10 In the Wireless QoS section, select the WMM option. Some 802.11n client devices remain at legacy rates. NEW! Configuring IoT Applications Configure IoT support from the IoT tab access point models AP391x ExtremeWireless supports Real Time Location Systems (RTLS) on APs that offer integrated BLE/ 802.15.4 radios for connectivity to Internet of Things (IoT) sensors and devices. The AP must be BLE enabled. ExtremeWireless supports the following applications. Each supported AP can be configured for one application at a time. • • iBeacon — AP is an Apple iBeacon. AP sends beacons in Apple iBeacon format. iBeacon Scan — AP scans for Apple iBeacons, filtering beacons based on configuration parameters and reports findings to an Application Server. • Eddystone-url Beacon — AP sends a compressed URL in a beacon for automatic presentation of a website. Eddystone-url is supported by both iOS and Android 4.4 operating systems. Eddystone-url Scan — AP scans for Eddystone-url beacons, filtering beacons based on configuration parameters and reports findings to an Application Server. • • Thread Gateway — AP is a gateway router to the Thread Network. Thread is a mesh networking protocol based on IEEE 802.15.4 for IoT devices. Related Links IoT iBeacon on page 190 IoT iBeacon Scan on page 191 Eddystone-url Beacon on page 193 Eddystone-url Scan on page 195 IoT Thread Gateway on page 196 ExtremeWireless™ V10.41.06 User Guide 189 Configuring the ExtremeWireless APs IoT iBeacon iBeacon is Apple's technology standard that allows mobile apps to identify a beacon position in the physical world. It delivers content based on the identified location. Extreme Wireless access point models AP391x support iBeacon. Related Links Configuring AP as an iBeacon on page 190 IoT iBeacon Scan on page 191 Configuring IoT Applications on page 189 IoT Multi-Edit Configuration on page 129 Configuring AP as an iBeacon ra With the iBeacon application, configure a supported AP as an iBeacon in an IoT network. The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. To configure iBeacon support from the IoT tab: From the top menu, click AP. The AP screen displays. Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. Click Configure. The AP Properties tab displays. Click the IoT tab, and select IoT Admin. From the Application field, select iBeacon. Figure 36: IoT Admin Tab iBeacon Application 6 Configure the following parameters: ExtremeWireless™ V10.41.06 User Guide 190 Configuring the ExtremeWireless APs Table 17: IoT iBeacon Application Settings Field Description Application Determines application type. Select iBeacon Advertise Interval The advertising interval for the beacon application. Valid values are: Min (100ms) and Max (10240ms). The default value is Min (100ms). UUID Identifier used to differentiate a large group of related beacons. A company can have a network of beacons with the same UUID. Major Identifies a subset of beacons within the larger set. This value could represent a venue specific attribute, such as a specific store or wing in a building. Valid values are 0 to 65635. Minor Identifies an individual beacon. Used to more precisely pinpoint beacon location. This value complements the UUID and Major values to provide more granular identification of a specific location, such as a particular shelf, door-way, or item. Valid values are 0 to 65635. ft ra Related Links IoT iBeacon on page 190 Configuring IoT Applications on page 189 IoT Multi-Edit Configuration on page 129 IoT iBeacon Scan With iBeacon Scan, an AP scans for beacons, filtering data based on configuration parameters and reports findings to an Application Server. ExtremeWireless forwards an iBeacon report as a JSON message to the customer's Application Server. The iBeacon report includes the following data: • • • • • AP serial number The MAC address of the iBeacon tag The RSSI The signal strength of the iBeacon tag The UUID of the iBeacon tag including Major and Minor values. The following filters can be applied at the AP to specify the message stream: • • UUID. The Global Unique Identifier. iBeacon messages with corresponding UUID are sent to the Application Server. All other UUID values are omitted. Minimum Received Signal Strength Indicator (RSSI). Transfers messages that meet the configured RSSI threshold. Messages received with an RSSI below the configured threshold are omitted. Refer to the Integration Guide for details on the format of the iBeacon RTLS message. The customer's Application Server handles the business logic and presentation of the IoT report. The Application Server: • • • Calculates the distance between the BLE tag and the AP, based on the signal strength for the tag/ radio channel Maps AP Serial Number to a physical location Tracks BLE tags. ExtremeWireless™ V10.41.06 User Guide 191 Configuring the ExtremeWireless APs From ExtremeWireless, configure iBeacon Scan parameters under AP configuration. Related Links Configuring iBeacon Scan on page 192 IoT Multi-Edit Configuration on page 129 Configuring IoT Applications on page 189 Configuring iBeacon Scan The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. To configure iBeacon Scan support from the IoT tab: From the top menu, click AP. The AP screen displays. Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. Click Configure. The AP Properties tab displays. Click the IoT tab, and select IoT Admin. From the Application field, select iBeacon Scan. Figure 37: iBeacon Scan Application 6 Configure the following parameters: ExtremeWireless™ V10.41.06 User Guide 192 Configuring the ExtremeWireless APs Table 18: iBeacon Scan Settings Description Application Determines application type. Select iBeacon Scan Destination IP Address IP address of the customer Application Server that receives the beacon report. Destination Port Destination Port on the customer Application Server that presents the beacon report. Scan Interval Determines how long to wait between scans. Valid values are: Min (100ms) and Max (10240ms). The default value is Min (100ms). Scan Window Determines how long to scan per channel. Valid values are Min (100ms) and Max (10240ms).Value must be less than Scan Interval value. Default value is 100ms. UUID Identifier used to differentiate a large group of related beacons. A company can have a network of beacons with the same UUID. Used for filtering data. ExtremeWireless forwards data with matching UUID to the Application Server and filters out all other UUID data. If UUID configured value is all zeros, no filtering occurs. ft ra Field Min RSSI This is the signal strength required to include the packet in the BLE report. Valid values: -10 to -100. Default value is -100. Data from beacons with an RSSI that is less than the Min RSSI configured value is filtered out. Related Links IoT iBeacon Scan on page 191 IoT Multi-Edit Configuration on page 129 NEW! Eddystone-url Beacon Eddystone-url is a Google technology standard that supports the physical web by providing a beacondelivered URL that offers content based on the identified location. Eddystone-url is supported by both iOS and Android 4.4 operating systems. An AP sends a beacon that includes a compressed URL. A mobile device app accepts the beacon, and the mobile user can access the URL that is provided in the beacon. This technology automatically presents websites to mobile users at the AP location. Possible use cases include: • • • Registration at a medical facility or school. Online payment at a parking garage. Detailed information about a museum exhibit. The beacon format is defined by a Google specification. Both the URL and the Advertising Interval are configurable parameters on the AP. Related Links Configuring AP as an Eddystone-url Beacon on page 194 ExtremeWireless™ V10.41.06 User Guide 193 Configuring the ExtremeWireless APs Configuring AP as an Eddystone-url Beacon Configure an AP with integrated BLE radio as an Eddystone-url Beacon in an IoT network. The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. To configure Eddystone-url Beacon support from the IoT tab: From the top menu, click AP. The AP screen displays. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. 4 Click the IoT tab, and select IoT Admin. 5 From the Application field, select Eddystone-url Beacon. ft ra Figure 38: IoT Admin Tab Eddystone-url Beacon Application 6 Configure the following parameters: Table 19: IoT Eddystone-url Beacon Application Settings Field Description Application Determines application type. Select Eddystone-url Beacon URL The URL that is included with the Eddystone-url beacon. The URL is limited to 17 characters. The 17 characters does not include the protocol, but it does include the domain name. A secure protocol (HTTPS address) is required. The URL is compressed, effectively allowing more than a 17-character input. See https://github.com/ google/eddystone/tree/master/eddystone-url for the Eddystone-url compression rules to more accurately judge the length of your URL. If necessary, also find third-party URL Shortening Services available on the internet. Advertise Interval The advertising interval for the beacon application. Valid values are: Min (100ms) and Max (10240ms). The default value is Min (100ms). Related Links Eddystone-url Beacon on page 193 Configuring IoT Applications on page 189 IoT Multi-Edit Configuration on page 129 ExtremeWireless™ V10.41.06 User Guide 194 Configuring the ExtremeWireless APs NEW! Eddystone-url Scan BLE-enabled APs capture beacons and send them to a configured Application Server. Upon reception, the server application triggers possible actions such as updating statistics related to beacon location or communicating with a mobile device application. An AP scans for beacons, filtering data based on configuration parameters and reports findings to an Application Server. ExtremeWireless forwards the report as a JSON message to the customer's Application Server. The report includes the following data: • • • • • AP Serial Number The MAC address of the beacon tag Decoded URL Device transmission power The signal strength of the iBeacon tag ft ra The following filters can be applied at the AP to specify the message stream: • Minimum Received Signal Strength Indicator (RSSI). Transfers messages that meet the configured RSSI threshold. Messages received with an RSSI below the configured threshold are omitted. Note Only scanned frames with Eddystone-url format are supported. The UUID must be 0xFEAA. Refer to the Integration Guide for details on the format of the beacon RTLS message. The customer's Application Server handles the business logic and presentation of the IoT report. The Application Server: • • • Calculates the distance between the BLE tag and the AP, based on the signal strength for the tag/ radio channel Maps AP Serial Number to a physical location Tracks BLE tags. From ExtremeWireless, configure Eddystone-url Scan parameters under AP configuration. Configuring Eddystone-url Scan The following APs offer integrated BLE/802.15.4 radios: AP3912i , AP3915i/e, AP3916ic, AP3917i/e/k. To configure Eddystone-url Scan support from the IoT tab: From the top menu, click AP. The AP screen displays. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. 4 Click the IoT tab, and select IoT Admin. ExtremeWireless™ V10.41.06 User Guide 195 Configuring the ExtremeWireless APs 5 From the Application field, select Eddystone-url Scan. ft ra Figure 39: Eddystone-url Scan Application 6 Configure the following parameters: Table 20: Eddystone-url Scan Settings Field Description Application Determines application type. Select Eddystone URL Scan Destination IP Address IP address of the customer Application Server that receives the beacon report. Destination Port Destination Port on the customer Application Server that presents the beacon report. Scan Interval Determines how long to wait between scans. Valid values are: Min (100ms) and Max (10240ms). The default value is Min (100ms). Scan Window Determines how long to scan per channel. Valid values are Min (100ms) and Max (10240ms).Value must be less than Scan Interval value. Default value is 100ms. Min RSSI This is the signal strength required to include the packet in the BLE report. Valid values: -10 to -100. Default value is -100. Data from beacons with an RSSI that is less than the Min RSSI configured value is filtered out. Related Links Eddystone-url Scan on page 195 IoT Multi-Edit Configuration on page 129 Configuring IoT Applications on page 189 IoT Thread Gateway The ExtremeWireless Thread Network solution makes use of a single infrastructure to combine a wireless network with an IoT sensor network, while integrating with an enterprise backbone network. ExtremeWireless™ V10.41.06 User Guide 196 Configuring the ExtremeWireless APs Each AP391x, with integrated BLE/802.15.4 radios, creates a separate Thread Network identified with a separate PAN ID. Sensors scan, find the AP Thread Network, and build a Mesh network with that AP serving as the border gateway router. The AP routes network traffic between its own Thread Network interface and the IoT interface. To configure a Thread Network, do the following: • Configure a VNS: • Create a new VNS. • Enable IPv6 multicast • Assign a VLAN. Note The VLAN must have a Router with DHCPv6-PD — Thread Network supports IPv6 addressing only. If the DHCPv6 server provides global address, all sensors in the network receive the global address, and therefore, can be managed from the Cloud IPv6 network. Configure IoT Thread Gateway on an AP391x. Configure a WLANS with an IoT port enabled. Configure a whitelist that defines the allowed sensor nodes and joiner sensors for the Thread Network. ft ra • • • Note If the whitelist is not configured, all sensors with password THREAD are accepted into the network. Related Links Configuring an AP as a Thread Gateway on page 197 Advanced Thread Gateway Properties on page 198 Managing an IoT Whitelist on page 671 IoT Multi-Edit Configuration on page 129 Configuring an AP as a Thread Gateway To configure the Thread Network on each supported AP, take the following steps: From the top menu, click AP. The AP screen displays. 2 Click the AP row (not the check box) for an AP model that offers a BLE/802.15.4 radio. The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. 4 Click the IoT tab, and select IoT Admin. ExtremeWireless™ V10.41.06 User Guide 197 Configuring the ExtremeWireless APs 5 From the Application field, select Thread Gateway and click Advanced. ft ra Figure 40: IoT Admin Tab Thread Gateway Application The Advanced Thread Gateway parameters dialog displays. Related Links Advanced Thread Gateway Properties on page 198 IoT Thread Gateway on page 196 Advanced Thread Gateway Properties Configure the following parameters on the selected AP. The AP serves as a border gateway router for its own Thread Network. ExtremeWireless™ V10.41.06 User Guide 198 Configuring the ExtremeWireless APs Figure 41: IoT Thread Gateway Properties ft ra Note The configured Thread Gateway displays on the Active Clients report, indicating that the gateway is up and running. Table 21: Thread Gateway Properties Field Description Application Determines application type. Select Thread Gateway Name Thread Network name. Default value is the AP serial number. Each AP creates a separate Thread Network identified with separate Short PAN ID and Extended PAN ID. Channel The IEEE Standard: 802.15.4 AP channel number. Short PAN ID A 16-bit, MAC-layer addressing field used in RF data transmissions between devices in a Thread Network. The default value is derived from the AP serial number. The Short PAN ID identifies the APs Thread Network. Extended PAN ID A 64-bit, MAC-layer addressing field used in RF data transmissions between devices in a Thread Network. The default value is derived from the AP serial number. This value must be unique. It is used for a more specific network identification. Master Key Indicates the Network Master Key used to encrypt communication between nodes in a Thread Network. Related Links Configuring an AP as a Thread Gateway on page 197 IoT Thread Gateway on page 196 Setting Up the Wireless AP Using Static Configuration Static configuration settings allow you to set up branch office support. These settings can be employed whenever required, and are not dependent on branch topology. In the branch office model, while the controller is at a central office, APs are installed in remote sites. The APs must be able to interact in both ExtremeWireless™ V10.41.06 User Guide 199 Configuring the ExtremeWireless APs the local site network and the central office network. When this is the case, a static configuration is recommended. For initial configuration of a wireless AP to use a static IP address assignment: • Allow the AP to first obtain an IP address using DHCP. By default, APs are configured to use the DHCP IP address configuration method. • • Allow the AP to connect to the controller using the DHCP assigned IP address. • After the AP has successfully registered to the controller, use the Static Configuration tab to configure a static IP address for the AP, and then save the configuration. Once the static IP address has been configured on the AP, the AP can then be moved to its target location, if applicable. Note If a wireless AP with a statically configured IP address (without a statically configured Wireless Controller Search List) cannot register with the controller within the specified number of retries, the wireless AP uses SLP, DNS, and SLP multicast as a backup mechanism. ft ra To set up a wireless AP using static configuration: From the top menu, click AP. The AP screen displays. Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. Click Configure. The AP Properties tab displays. Click the Static Configuration tab. Configure the following parameters: a Select a VLAN (Virtual LAN) setting for the AP. Caution Caution should be exercised when using this feature. For more information, see Configuring VLAN Tags for Wireless APs on page 203. If the Wireless AP VLAN is not configured properly (wrong tag), connecting to the AP may not be possible. To recover from this situation, you need to reset the AP to its factory default settings. For more information, see the Extreme Networks ExtremeWireless Maintenance Guide . ExtremeWireless™ V10.41.06 User Guide 200 Configuring the ExtremeWireless APs b Select a method of IP address assignment for the AP. ft ra Note Client Port configuration is available for the AP3912. For more information, see Assigning WLAN Services to Client Ports on page 170. Table 22: Static Configuration Properties Field/Button Description VLAN Settings Tagged Select if you want to assign this AP to a specific VLAN and type the value in the box. Untagged Select if you want this AP to be untagged. This option is selected by default. VLAN ID Enter a VLAN ID. Valid values are 2 to 4094 IP Address Assignment ExtremeWireless™ V10.41.06 User Guide 201 Configuring the ExtremeWireless APs Table 22: Static Configuration Properties (continued) Field/Button Description Use DHCP Select to enable Dynamic Host Configuration Protocol (DHCP). This option is enabled by default. Static Values Select to specify the IP address of the AP. IP Address Type the IP address of the AP. Netmask Type the appropriate subnet mask to separate the network portion from the host portion of the address. Gateway Type the default gateway of the network. Ethernet Port Ethernet Speed If the AP has an Ethernet port, select values in the Ethernet Speed and Ethernet Mode drop down lists. Ethernet Mode If the AP has an Ethernet port, select values in the Ethernet Speed and Ethernet Mode drop down lists. ft ra Tunnel MTU Enter a static MTU value, from 600 to 1500, in the Tunnel MTU box. The maximum MTU can be increased to 1800 bytes by enabling Jumbo Frames support (for more information, see Setting Up the Data Ports on page 51). If the wireless software cannot discover the MTU size, it enforces the static MTU size. Set the MTU size to allow the source to reduce the packet size and avoid the need to fragment data packets in the tunnel. LACP Applies to the AP38xx and AP39xx only. Click to Enable Link Aggregation Control Protocol. This feature allows higher throughput by combining the two Ethernet ports. This feature is disabled by default. Wireless Controller Search List Up Select a controller and click the Up button to modify the order of the controllers. When an AP searches for a controller to register with, it begins with the first controller in the list. Down Select a controller and click the Up button to modify the order of the controllers. When an AP searches for a controller to register with, it begins with the first controller in the list. Delete Click to remove the controller from the list so that it can no longer control the AP. Add In the Add box, type the IP address of the controller that will control this AP then click the Add button to add the IP address is added to the list. Repeat this process to add the IP addresses of up to three controllers. This feature allows the AP to bypass the discovery process. If the Wireless Controller Search List box is not populated, the AP uses SLP unicast/multicast, DNS, or DHCP vendor option 43 to discover a controller. For the initial AP deployment, it is necessary to use one of the described options in Discovery and Registration on page 120. Additional Buttons Copy to Defaults To make this AP’s configuration be the system’s default AP settings, click Copy to Defaults. A pop-up dialog asking you to confirm the configuration change is displayed.To confirm resetting the system’s default AP settings, click OK. ExtremeWireless™ V10.41.06 User Guide 202 Configuring the ExtremeWireless APs Table 22: Static Configuration Properties (continued) Field/Button Description Reset to Defaults If you have an AP that is already configured with its own settings, but would like the AP to be reset to use the system’s default AP settings, use the Reset to Defaults feature Apply Click to save your changes. Related Links AP Properties Tab Configuration on page 159 Assigning Wireless AP Radios to a VNS on page 168 Configuration Parameters for Radio Properties on page 180 Setting Up 802.1x Authentication for a Wireless AP on page 203 Configuring VLAN Tags for Wireless APs ft ra Caution Exercise caution while configuring a VLAN ID tag. If a VLAN tag is not configured properly, the connectivity between the controller and the AP will be lost. To configure Wireless APs with a VLAN tag: Connect the AP in the central office to the controller port (or to a network point) that does not require VLAN tagging. From the top menu, click AP. Click the Static Configuration tab. In the VLAN Settings section, select Tagged - VLAN ID. In the Tagged - VLAN ID text box, type the VLAN ID on which the AP operates. To save your changes, click Save. The AP reboots and loses connection with the controller. Log out from the controller. Disconnect the AP from the central office network and move it to the target location. Power up the AP. The AP connects to the controller. If the AP does not connect to the controller, the AP was not configured properly. To recover from this situation, reset the AP to its factory default settings, and reconfigure the static IP address. Setting Up 802.1x Authentication for a Wireless AP 802.1x is an authentication standard for wired and wireless LANs. The 802.1x standard can be used to authenticate access points to the LAN to which they are connected. 802.1x support provides security for network deployments where access points are placed in public spaces. ExtremeWireless™ V10.41.06 User Guide 203 Configuring the ExtremeWireless APs To successfully set up 802.1x authentication of a Wireless AP, the AP must be configured for 802.1x authentication before the AP is connected to a 802.1x enabled switch port. Caution If the switch port to which the AP is connected is not 802.1x enabled, the 802.1x authentication does not take effect. 802.1x authentication credentials can be updated at any time, whether or not the AP is connected with an active session. If the AP is connected, the new credentials are sent immediately. If the AP is not connected, the new credentials are delivered the next time the AP connects to the controller. There are two main aspects to the 802.1x feature: • • Credential management — The controller and the AP are responsible for the requesting, creating, deleting, or invalidating the credentials used in the authentication process. Authentication — The AP is responsible for the actual execution of the EAP-TLS or PEAP protocol. ft ra 802.1x authentication can be configured on a per-AP basis. For example, 802.1x authentication can be applied to specific APs individually or with a multi-edit function. The 802.1x authentication supports two authentication methods: • PEAP (Protected Extensible Authentication Protocol) • Is the recommended 802.1x authentication method • Requires minimal configuration effort and provides equal authentication protection to EAP-TLS • Uses user ID and passwords for authentication of access points • EAP-TLS • Requires more configuration effort • Requires the use of a third-party Certificate Authentication application • Uses certificates for authentication of access points • The controller can operate in either proxy mode or pass through mode. Proxy mode — The controller generates the public and private key pair used in the certificate. Pass through mode — The certificate and private key are created by the third-party Certificate Authentication application. Note Although a wireless AP can support using both PEAP and EAP-TLS credentials simultaneously, it is not recommended to do so. Instead, it is recommended that you use only one type of authentication and that you install the credentials for only that type of authentication on the wireless AP. Related Links AP Properties Tab Configuration on page 159 Assigning Wireless AP Radios to a VNS on page 168 Configuration Parameters for Radio Properties on page 180 Setting Up the Wireless AP Using Static Configuration on page 199 Setting Up 802.1x Authentication for Wireless APs Using Managing Certificates on page 209 ExtremeWireless™ V10.41.06 User Guide 204 Configuring the ExtremeWireless APs Configuring 802.1x EAP-TLS Authentication EAP-TLS authentication uses certificates for authentication. A third-party Certificate Authentication application is required to configure EAP-TLS authentication. Certificates can be overwritten with new ones at any time. With EAP-TLS authentication, the controller can operate in the following modes: • • Proxy Mode on page 205 Pass Through Mode on page 207 Note When a wireless AP that is configured with 802.1x EAP-TLS authentication is connected to a controller, the AP begins submitting logs to the controller thirty days before the certificate expires to provide administrators with a warning of the impending expiry date. Proxy Mode ft ra In proxy mode, the controller generates the public and private key pair used in the certificate. You can specify the criteria used to create the Certificate Request. The Certificate Request that is generated by the controller is then used by the third-party Certificate Authentication application to create the certificate used for authentication of the Wireless AP. To successfully configure 802.1x authentication of a Wireless AP, the AP must first be configured for 802.1x authentication before the AP is deployed on a 802.1x enabled switch port. To Configure 802.1x EAP-TLS Authentication in Proxy Mode: 1 From the top menu, click AP. 2 In the AP list, click the wireless AP (not the check box) for which you want to configure 802.1x EAPTLS authentication. 3 Click the 802.1x tab. 4 Click Generate Certificate Signing Request. The Generate Certificate Signing Request window is displayed. ExtremeWireless™ V10.41.06 User Guide 205 Configuring the ExtremeWireless APs ra 5 Type the criteria to be used to create the certificate request. All fields are required: • Country name — The two-letter ISO abbreviation of the name of the country • State or Province name — The name of the State/Province Locality name (city) — The name of the city Organization name — The name of the organization Organizational Unit name — The name of the unit within the organization Common name — Click the value you want to assign as the common name of the wireless AP. (See Table 23 on page 212 for credential parameters and values.) • ft • • • • Email address — The email address of the organization 6 Click Generate Certificate Signing Request. A certificate request file is generated (.csr file extension). The name of the file is the AP serial number. The File Download dialog is displayed. 7 Click Save. The Save as window is displayed. 8 Navigate to the location on your computer that you want to save the generated certificate request file, and then click Save. 9 In the third-party Certificate Authentication application, use the content of the generated certificate request file to generate the certificate file (.cer file extension). 10 On the 802.1x tab, click Browse. The Choose file dialog is displayed. ExtremeWireless™ V10.41.06 User Guide 206 Configuring the ExtremeWireless APs 11 Navigate to the location of the certificate file, and click Open. The name of the certificate file is displayed in the X509 DER / PKCS#12 file box. 12 To save your changes, click Save. The 802.1x EAP-TLS (certificate and private key) authentication in proxy mode is assigned to the AP. The wireless AP can now be deployed to a 802.1x enabled switch port. Pass Through Mode In pass through mode, the certificate and private key are created by the third-party Certificate Authentication application. To successfully configure 802.1x authentication of a wireless AP, the AP must first be configured for 802.1x authentication before the AP is deployed on a 802.1x enabled switch port. Before you configure 802.1x using EAP-TLS authentication in pass through mode, create a certificate using the third-party Certificate Authentication application and save the certificate file in PKCS #12 file format (.pfx file extension) on your system. ft ra To Configure 802.1x EAP-TLS Authentication in Pass Through Mode: 1 From the top menu, click AP. 2 Click the appropriate wireless AP in the list (not the check box). The AP dashboard displays. 3 Click Configure. The AP Properties tab displays. 4 Click the 802.1x tab. 5 Click Browse. The Choose file window is displayed. 6 Navigate to the location of the certificate file (.pfx) and click Open. The name of the certificate file is displayed in the X509 DER / PKCS#12 file box. 7 In the Password box, type the password that was used to protect the private key. Note The password that was used to protect the private key must be a maximum of 31 characters long. 8 To save your changes, click Save. The 802.1x EAP-TLS authentication in pass through mode is assigned to the wireless AP. The AP can now be deployed to a 802.1x enabled switch port. Viewing 802.1x Credentials When 802.1x authentication is configured on a wireless AP, the light bulb icon on the 802.1x tab for the configured AP is lit to indicate which 802.1x authentication method is used. A wireless AP can be configured to use both EAP-TLS and PEAP authentication methods. For example, when both EAP-TLS ExtremeWireless™ V10.41.06 User Guide 207 Configuring the ExtremeWireless APs and PEAP authentication methods are configured for the AP, both light bulb icons on the 802.1x tab are lit. Note You can view only the 802.1x credentials of wireless APs that have an active session with the controller. If you attempt to view the credentials of a wireless AP that does not have an active session, the AP Credentials window displays the following message: Unable to query wireless AP: not connected. To view current 802.1x credentials: 1 From the top menu, click AP. 2 In the AP list, click the wireless AP (not the check box) for which you want to view its current 802.1x credentials. 3 Select the 802.1x tab. 4 In the Current Credentials section, click Get Certificate details. The Wireless AP Credentials window is displayed. ft ra ExtremeWireless™ V10.41.06 User Guide 208 Configuring the ExtremeWireless APs Deleting 802.1x Credentials Caution Exercise caution when deleting 802.1x credentials. For example, deleting 802.1x credentials may prevent the AP from being authenticated or cause it to lose its connection with the controller. To delete current 802.1x credentials: 1 From the top menu, click AP. 2 In the AP list, click the wireless AP (not the check box) for which you want to view its current 802.1x credentials. 3 Select the 802.1x tab. 4 Do the following: • • To delete EAP-TLS credentials, click Delete EAP-TLS credentials. To delete PEAP credentials, click Delete PEAP credentials. ft ra The credentials are deleted and the AP settings are updated. Note If you attempt to delete the 802.1x credentials of a wireless AP that currently does not have an active session with the controller, the credentials are deleted only after the AP connects with the controller. Setting Up 802.1x Authentication for Wireless APs Using Managing Certificates In addition to configuring APs individually, you can also configure 802.1x authentication for multiple APs simultaneously by using the AP 802.1x Multi-edit feature. When you use the AP 802.1x Multi-edit feature, you can choose to: • • Assign EAP-TLS authentication based on generated certificates to multiple APs by uploading a .pfx, .cer, or .zip file. Assign PEAP credentials to multiple APs based on a user name and password that you define To configure 802.1x EAP-TLS Authentication in Proxy Mode using Multi-edit: ExtremeWireless™ V10.41.06 User Guide 209 Configuring the ExtremeWireless APs From the top menu, click AP. The AP screen displays. ft 2 In the APs list, select one or more APs to configure. To search for a specific AP, enter the AP in the search bar and click 3 Click Actions > Manage Certificates 4 In the Certificate Signing Request section, type the following: • Country name — The two-letter ISO abbreviation of the name of the country • • • • • • State or Province name — The name of the State/Province Locality name (city) — The name of the city Organization name — The name of the organization Organizational Unit name — The name of the unit within the organization Common name — Click the value you want to assign as the common name of the wireless AP (see Table 23 on page 212 for credential parameters and values). Email address — The email address of the organization • Key Size — If the email address key size is different from the default value shown, you can change it by selecting a new value from the drop down menu. ExtremeWireless™ V10.41.06 User Guide 210 Configuring the ExtremeWireless APs 5 Click Generate Certificates. The AP 802.1x Multi-edit progress dialog is displayed, which provides the status of the configuration process. Once complete, the File Download dialog is displayed. 6 Click Save. The Save as window is displayed. 7 Navigate to the location on your computer that you want to save the generated certificate_requests.tar file, and then click Save. The certificate_requests.tar file contains a certificate request (.csr) file for each AP. 8 Do one of the following: • For each certificate request, generate a certificate using the third-party Certificate Authentication application. This method produces a certificate for each wireless AP. Once complete, zip all the certificates files (.cer) into one .zip file. • ft ra Use one of the certificate requests and generate one certificate using the Certificate Authentication application. This method produces one certificate that can be applied to all APs. 9 In the Bulk Certificate Upload section, click Browse. The Choose file window is displayed. 10 Navigate to the location of the file (.zip or .cer), and then click Open. The name of the file is displayed in the PFX, CER or ZIP Archive box. 11 Click Upload and Set certificates. Once complete, the Settings updated message is displayed in the footer of the Wireless Assistant. The 802.1x EAP-TLS authentication configuration is assigned to the APs. The APs can now be deployed to 802.1x enabled switch ports. Configuring 802.1x EAP-TLS Authentication in Pass Through Mode Using Multi-edit When you configure 802.1x EAP-TLS authentication in pass through mode using Multi-edit, do one of the following: • Generate a certificate for each AP using the third-party Certificate Authentication application. When generating the certificates: • Use the Common name value (either Name, Serial, or MAC) of the AP to name each generated certificate. • Use a common password for each generated certificate. • All .pfx files created by the third-party Certificate Authentication application must be zipped into • one file. Generate one certificate, using the third-party Certificate Authentication application, to be applied to all APs. When generating the certificate, use the Common name value (either Name, Serial, or MAC) of the wireless AP to name the generated certificate. The 802.1x PEAP authentication configuration is assigned to the APs. The APs can now be deployed to 802.1x enabled switch ports. Managing Certificates To configure certificates, take the following steps: ExtremeWireless™ V10.41.06 User Guide 211 Configuring the ExtremeWireless APs Certificate Signing Request • • • • • • • Country name — The two-letter ISO abbreviation of the name of the country State or Province name — The name of the State/Province Locality name (city) — The name of the city Organization name — The name of the organization Organizational Unit name — The name of the unit within the organization Common name — Click the value you want to assign as the common name of the wireless AP (see Table 23 on page 212 for credential parameters and values). Email address — The email address of the organization • Key Size — If the email address key size is different from the default value shown, you can change it by selecting a new value from the drop down menu. 2 Click Generate Certificates. The AP 802.1x Multi-edit progress window is displayed, which provides the status of the configuration process. Once complete, the File Download dialog is displayed. 3 Click Save. The Save as window is displayed. ft ra 4 Navigate to the location on your computer that you want to save the generated certificate_requests.tar file, and then click Save. The certificate_requests.tar file contains a certificate request (.csr) file for each AP. 5 Do one of the following: • For each certificate request, generate a certificate using the third-party Certificate Authentication application. This method produces a certificate for each wireless AP. Once complete, zip all the certificates files (.cer) into one .zip file. • Use one of the certificate requests and generate one certificate using the Certificate Authentication application. This method produces one certificate that can be applied to all APs. Bulk Certificate Upload 6 Click Browse. The Choose file window is displayed. 7 Navigate to the location of the file (.zip or .cer), and then click Open. The name of the file is displayed in the PFX, CER or ZIP Archive box. 8 Click Upload and Set certificates. Once complete, the Settings updated message is displayed in the footer of the Wireless Assistant. The 802.1x EAP-TLS authentication configuration is assigned to the APs. The APs can now be deployed to 802.1x enabled switch ports. PEAP Authentication PEAP authentication uses user ID and passwords for authentication. To successfully configure 802.1x authentication of a wireless AP, the AP must first be configured for 802.1x authentication before the AP is deployed on an 802.1x enabled switch port. 9 In the Username drop-down list, click the value you want to assign as the user name credential: 10 In the Password drop-down list, click the value you want to assign as the password credential. Table 23: Credential Parameters Parameter Value Name The name of the wireless AP, which is assigned on the AP Properties tab. The AP name can be edited. Serial The serial number of the AP. This setting cannot be edited. ExtremeWireless™ V10.41.06 User Guide 212 Configuring the ExtremeWireless APs Table 23: Credential Parameters (continued) Parameter Value MAC The MAC address of the AP. The setting cannot be edited. Other Click to specify a custom value. A text box is displayed. In the text box, type the value you want to assign as the user name credential. 11 To save your changes, click Save. The 802.1x PEAP authentication configuration is assigned to the AP. The AP can now be deployed to an 802.1x enabled switch port. Related Links Setting Up 802.1x Authentication for Wireless APs Using Managing Certificates on page 209 Configuring Co-Located APs in Load Balance Groups ft ra You can configure APs that are co-located in an open area, such as a classroom, a conference hall, or an entrance lobby, to act as a load balance group. Load balancing distributes clients across the co-located APs that are members of the load balance group. The co-located APs should provide the same SSID, have Line-of-Sight (LoS) between each other, and be deployed on multiple channels with overlapping coverage. Assign an AP's radio to the load balance group for the client distribution to occur. Load balancing occurs only among the assigned AP radios of the load balance group. Each radio can be assigned only to one load balance group. Multiple radios on the same AP do not have to be in the same load balance group. The radios that you assign to the load balance group must be on APs that are controlled by the same controller. The load balance group uses one or more WLAN services for all APs assigned to the load balance group. You can configure two types of load balance groups: • Client Balancing load group – performs load balancing based on the number of clients across all APs in the group and only for the WLANs assigned to the load group. This is different from load control in the Radio Preference group— load control APs make decisions in isolation from each other. • Radio Preference load group – performs band preference steering and load control. Band preference steering is a mechanism to move 11a-capable clients to the 11a radio on the AP, relieving congestion on the 11g radio. No balancing is done between the 11a and 11g radios. Load control is disabled by default. A radio load group executes band preference steering and/or load control across the radios on each AP in the group. Each AP balances in isolation from the other APs, but all APs in the load group have the same configuration related to the band preference and load control. Client balancing on the controller is AP-centric and requires no input from the client. The AP radios in the client balance group share information with secure (AES) messaging using multicast on the wired network. All APs in a client balance group must be in the same SIAPP cluster to ensure that each AP can reach all other APs in the client balance group over the wired subnet. If the APs in a client balance group are not in the same SIAPP cluster, client balancing happens independently within the subgroups defined by SIAPP clusters. The benefits of configuring your co-located APs that are controlled by the same controller as a client balance group are the following: ExtremeWireless™ V10.41.06 User Guide 213 Configuring the ExtremeWireless APs • • • • Resource sharing of the balanced AP Efficient use of the deployed 2.4 and 5 GHz channels Reduce client interference by distributing clients on different channels Scalable 802.11 deployment: if more clients need to be served in the area, additional APs can be deployed on a new channel You can assign a maximum of 32 APs to a client balance group. Table 24 lists the maximum number of load balance groups for each controller. Table 24: Maximum Number of Load Balance Groups ExtremeWireless Appliance Number of load balance groups C4110 32 C5110 64 C5210 64 C5215 64 ft ra C25 C35 V2110 64 V2110 (MS Hyper-V platform) 32 Currently, all APs support load balance groups. To create a load balance group, see Creating a Load Balance Group on page 214. Creating a Load Balance Group To create a load balance group: 1 From the top menu, click AP. 2 In the left pane, click Load Groups. 3 Click New. The Add Load Group window displays. 4 Enter a unique name for a load group ID, and select a Type from the drop-down menu and then click Add. The options are: • Client Balancing — load balancing based on the number of clients across all APs in the load balance group and only for the WLANs assigned to the group. • Radio Preference —band preference steering and load control on this load group. If you are adding a Client Balancing load balancing group, the Radio Assignment tab becomes available. ExtremeWireless™ V10.41.06 User Guide 214 Configuring the ExtremeWireless APs ra If you are adding a Radio Preference load balancing group, the Radio Preference tab becomes available. ft ExtremeWireless™ V10.41.06 User Guide 215 Configuring the ExtremeWireless APs ft ra The radios for both types of load groups can be assigned to a WLAN, on the WLAN Assignment tab. ExtremeWireless™ V10.41.06 User Guide 216 Configuring the ExtremeWireless APs ra You can filter the display of AP Groups. In the left pane, Expand Client Balancing to see only Client Balancing groups. Expand Radio Preference to see only Radio Preference groups. Note For more information about the fields on these screens, see Configuration Parameters for AP Load Groups on page 217. ft Configuration Parameters for AP Load Groups Table 25: AP Load Groups Field/Button Description Load Group ID Enter a unique name for the load group. You can create load groups with the same name on different controller; however, the groups are treated as separate groups according to the home controller where the group was originally created. Type The type of load group is displayed. Options include: • Client Balancing - select to perform load balancing based on the number of clients across all APs in the load balance group and only for the WLAN Services assigned to the group. • Radio Preference - select to perform band preference steering and enforce load control settings on this load group. ExtremeWireless™ V10.41.06 User Guide 217 Configuring the ExtremeWireless APs Table 25: AP Load Groups (continued) Field/Button Description New Click to create a new load group. The Add Load Group window. Delete Click to delete this load group. Save Click to save your changes. Radio Assignment tab - Available for load groups assigned the Client Balancing type. Select AP Radios From the drop-down menu, select the AP radios that you want to assign to the load group. Options include: • All radios • Radio 1 • Radio 2 • Clear all radios ft ra You can assign a radio to only one load balance group. A radio that is assigned to another load balance group has an asterisk next to it. If you select a radio that has been assigned to another load balance group, the radio is reassigned to the new load balance group. Note: You can assign each radio of an AP to different load balance groups. Radio Preference tab - Available for load groups assigned the Radio Preference type Band Preference Select the Enable check box to enable band preference for this load group. You can apply band preference to a VNS assigned in the load group. Enabling band preference enables you to move an 11a-capable client to an 11a radio to relieve congestion on an 11g radio. A client is considered 11a capable if the AP receives requests on an 11a VNS that already belongs to a load group with band preference enabled. After you configure band preference, if a client tries to re-associate with an 11g radio, it is rejected if the AP determines that the client is 11a capable. Load Control Select the following parameters for each radio assigned to this load group: • Enable: Select this check box to enable Radio Load Control (RLC) for individual radios (Radio1 and Radio2) associated with this Load Group. • Max. # of Clients: Enter the maximum number of clients for Radio 1 and Radio 2. The default limit is 60. The valid range is: 5 to 60. • Strict Limit: Select this check box to enable a strict limit on the number of clients allowed on a specific radio, based on the max # of clients allowed. Limits can be enforced separately for radio1 and radio 2. AP Assignment Select the APs on which you want to enforce the Band Preference and Load Control settings. ExtremeWireless™ V10.41.06 User Guide 218 Configuring the ExtremeWireless APs Table 25: AP Load Groups (continued) Field/Button Description WLAN Assignment tab WLAN Name Click the check box of the one or more WLAN services that you want to assign to all member radios of the load balance group. You can select up to the radio limit of eight VNSs. When you assign a radio to a load group, WLAN service assignment can be done only from the WLAN Assignment tab on the Wireless AP Load Groups screen. On all other WLAN Assignment tabs associated with the member AP radios, the radio check box associated with the member AP radios is grayed out. When you remove a radio from a load group, the load group’s WLAN service remains assigned to the radio, but you can now assign a different WLAN service to the radio. How Availability Mode Affects Load Balancing ft ra All radios assigned to a load group must belong to APs that are all controlled by the same controller. Availability mode can be configured only from the home controller on which the load group was created. Load balancing continues to operate if member APs fail over to the foreign controller as long as the WLAN service assignment remains the same. To ensure that load balancing works properly in availability mode, enable synchronization of the system configuration and the WLAN services used by the load group when you configure availability mode. If you do not enable synchronization, the radios on any AP that fails over may be removed from their assigned load groups. For more about availability mode, see Configuring Availability Using the Availability Wizard on page 539. If you have not configured synchronization, in a failover situation you are able to change the load balance group’s WLAN service assignment from the VNS Configuration screens and the Wireless AP WLAN Assignment screens on the foreign controller. If you have configured synchronization, you cannot change the WLAN assignments from the foreign controller. If you have not configured synchronization, you must configure the foreign controller to ensure that all AP radios in the load balance group have the same WLAN services assigned before the AP fails over, as originally configured for the load group. If the WLAN services assigned do not match when an AP fails over, the affected AP radios are removed from the load group. If you change the WLAN services to match after the AP fails over, the AP radios still are not allowed to be in the load group. Reconnect the AP to the home controller to have the radios become part of the load group again. Load Balance Group Statistics You can view load balance group statistics through the Active Wireless Load Groups report. For more information, see Viewing Load Balance Group Statistics on page 631. ExtremeWireless™ V10.41.06 User Guide 219 Configuring the ExtremeWireless APs Configuring an AP Cluster APs operating in both fit mode and standalone mode operate in a cluster setup. A cluster is a group of APs configured to communicate with each other. Mobile users (MU) can seamlessly roam between the APs participating in the cluster. Wireless APs extend basic cluster functions with the following enhancements: • • Client balancing across AP in the Load Group Client session synchronization between APs in the Site APs operating on the same subnet with multicast and IGMP (Internet Group Management Protocol) snooping enabled can be formed into a cluster. You assign each AP a common, default cluster ID (shared secret). An AP cluster can exist at any point in your network. Each cluster member periodically (every 30 seconds) sends a secure SIAPP (Siemens Inter-AP Protocol) multicast message to update other cluster members. The SIAPP message includes: The AP name The AP Ethernet MAC address The AP IP address ft ra • • • • • • The client count The base BSSIDs for both radios Client session information in a case when APs are members of a Site Each AP caches locally-stored information about the other cluster members and maintains its own view of the cluster including the client session information in the Site. To change an AP cluster’s configuration: From the top menu, click AP. ExtremeWireless™ V10.41.06 User Guide 220 Configuring the ExtremeWireless APs 2 In the left pane, click Global Settings > AP Registration. ft ra 3 In the Secure Cluster section, enter a cluster shared secret. 4 Enable cluster encryption by clicking on the User Cluster Encryption check box. APs on which user cluster encryption is disabled cannot participate in the cluster. 5 Enable or disable support for inter-AP roaming by clicking on the Inter AP Roam check box. 6 Click Save. Configuring an AP as a Guardian Wireless access points that are configured as Guardians do not bridge traffic and instead devote all of the AP’s resources to threat detection and countermeasures. When an AP is Approved as a Guardian: • • • The AP becomes a full time RADAR agent. The AP is added to a Guardian scan profile. The AP no longer provides services (WLAN service, load group, site) that were provided prior to the change. Note Once an AP is assigned to a Guardian Scan Profile it will stop forwarding traffic on both radios. To configure an AP as a Guardian Scan Profile: From the top menu, click WIPS. 2 In the left pane, expand Radar Profiles. ExtremeWireless™ V10.41.06 User Guide 221 Configuring the ExtremeWireless APs 3 In the left pane, expand Guardian Scan and select an AP from the list or click New. 4 In the Add Scan Profile dialog, select Guardian from the Profile drop-down. ft ra 5 Click Add. For more information, see Configuring a Guardian Scan Profile on page 577. Configuring a Captive Portal on an AP ExtremeWireless offers a scalable captive portal solution on the AP that can be managed locally or through a Cloud solution. The distributed solution is available on ExtremeWireless AP38xx series and AP39xx series APs. Firewall Friendly External Captive Portal (FFECP) on the AP for B@AP topologies is an extension to Firewall Friendly Captive Portal on the controller for tunneled (B@AC and routed) topologies. You can configure the FFECP with full authentication using a URI and signature, or you can configure a RADIUS server, authenticating with a user name and password. To configure an External Captive Portal on an AP, the following is required: • • The WLAN Service topology must be VLAN B@AP. You must configure specific policy rules that defines which traffic is allowed, which traffic is denied, and if using Rule-based Redirection, which traffic is redirected. • The Captive Portal must be configured as External Firewall Friendly. Note ExtremeWireless supports a non-topology specific implementation. Extreme will register subdomain “apcp.ezcloudx.com” and populate public/Extreme DNS server with DNS mapping of 1.1.1.1 for FQDN “apcp.ezcloudx.com”. ExtremeWireless™ V10.41.06 User Guide 222 Configuring the ExtremeWireless APs In Figure 42, the default Access Control on the VLAN is Deny. Rules are created to allow the ECP URL, allow DNS and DHCP traffic, and to allow all outgoing MU traffic, and to redirect specific traffic. ft ra Figure 42: Example: Policy Rules for non-authenticated role Related Links Configuring Firewall Friendly External Captive Portal on an AP on page 223 Controlling Network Access on the AP on page 226 Configuring Firewall Friendly External Captive Portal on page 353 Assigning RADIUS Servers for Authentication on page 340 Configuring Firewall Friendly External Captive Portal on an AP To configure a Firewall Friendly External Captive Portal (FFECP) on the AP, take the following steps: ExtremeWireless™ V10.41.06 User Guide 223 Configuring the ExtremeWireless APs If configuring Rule-based Redirection, verify that Rule-based Redirection is enabled. Go to VNS > Global > Filtering Mode and select Enable Rule-Based Redirection. Rule-Based Redirection is enabled by default for new installations of ExtremeWireless v10.11 and later. When upgrading from an earlier version of ExtremeWireless, this option is cleared by default. You must enable Rule-Based Redirection from the Filtering Mode screen. Note The option to disable Rule-based Redirection is available for backward capability only. Rule-based Redirection relies on policy rules that are defined for HTTP(S) redirection. Non-Rulebased Redirection automatically redirects an un-authenticated client to ECP when a deny action occurs on HTTP(S) traffic. Note You cannot configure Captive Portal Redirection using IPv6 classifiers. While you can http to IPv6 websites, you cannot apply Captive Portal redirection to http [s] over IPv6 . ft ra 2 Create a basic topology where the topology mode is Bridge Traffic Locally at AP. The topology can be tagged or untagged. For more information, see Configuring a Basic Topology on page 267 in the User Guide. If using RADIUS authentication, FF-ECP on the AP can work with both local and central RADIUS authentication. 3 Create a role and define specific policy rules. The role must be configured with the following parameters: From the VLAN & Class of Service tab, select a default Access Control value for the role. Select from one of the following: • • • • • None - No role defined No change - Default setting Allow - Packets contained to role's default action's VLAN/topology. Deny - Any packet not matching a rule in the Role is dropped. Containment VLAN - Any packet not matching a rule is sent to defined VLAN. For B@AP traffic, only the FF ECP is supported as an external captive portal. ExtremeWireless™ V10.41.06 User Guide 224 Configuring the ExtremeWireless APs On the Policy Rules tab, enable AP Filtering. Configure specific policy filters. • Allow DHCP and DNS traffic. • • • Mobile user access to FF-ECP. Allow traffic towards mobile user. HTTP(S) redirection. ft ra Note ExtremeWireless supports a non-topology specific implementation. Extreme will register sub-domain “apcp.ezcloudx.com” and populate public/Extreme DNS server with DNS mapping of 1.1.1.1 for FQDN “apcp.ezcloudx.com”. For more information, see Configuring Rule-Based Redirection on page 291 in the User Guide. 4 Configure a WLAN Service with the following parameter settings: • • • • • • Default Topology = Bridged at AP, tagged or untagged. Select an AP. Configure Privacy settings. Configure the Captive Portal to be External Firewall Friendly. (Optional) Configure RADIUS servers for RADIUS authentication. For more information, see Assigning RADIUS Servers for Authentication on page 340 in the User Guide. Configure the following parameters on the ECP: • The Identity and Shared Secret fields are required and must match the values used when you configured the captive portal. • When configuring the Allow policy for the ECP, the IP/subnet value specified on the Filter Rule Definition dialog must match the Redirection URL value specified on the FFECP Configure dialog. • Select the Vendor Specific Attributes (VSAs) for authentication. For more information, see Vendor Specific Attributes on page 344 in the User Guide. • Select an option for Send Successful Login To. For FFECP local radius authentication: • The AP must be in Site mode. • Local RADIUS authentication is configured on at least one RADIUS server. • The Signature option is unchecked. 5 Configure a VNS with the authenticated and non-authenticated policies. Related Links Configuring a Basic Topology on page 267 Configuring Rule-Based Redirection on page 291 ExtremeWireless™ V10.41.06 User Guide 225 Configuring the ExtremeWireless APs Understanding the Filter Rule Definition Dialog on page 302 Configuring a Basic WLAN Service on page 319 Configuring WLAN Service Privacy on page 330 Configuring Firewall Friendly External Captive Portal on page 353 Assigning RADIUS Servers for Authentication on page 340 Controlling Network Access on the AP When Rule-based Redirection is disabled, denied HTTP(S) traffic from an non-authenticated client is automatically redirected to the External Captive Portal by the AP. To control network access after authentication, configure roles that have an Access Control of deny and specify that role under Virtual Networks > General. To configure default roles that deny network access after authentication: ft ra 1 Go to Virtual Networks and select a VNS or click New. 2 Specify the default roles for Authenticated network traffic. In the Authenticated field under Default Roles, select a role or create a new role that has policy rules defined to deny access. For more information, see Understanding the Filter Rule Definition Dialog on page 302 AP3916ic Integrated Camera Deployment The AP3916ic features an integrated video camera, offering a single device for wireless access and security purposes. Video management is provided by the customer's Video Management System (VMS) integrated per ONVIF Profile S 2.4 compliance. The camera deployment process is as follows: The AP3916ic is connected to the network and the controller discovers the camera IP address. Per ONVIF specification, video management systems query network through WS-Discovery multicast (239.255.255.250). Allow multicast when configuring the default camera topology. • • • • Client IP = IP address of camera module Device Type = Extreme Networks 2 MP Camera (EXTR2MP-CAM) AP = AP camera module is ‘associated’ with Radio/Port = CAM Packet/Byte counters = Indicate Camera Activity 2 Associate a WLAN B@AP or B@AC topology to the camera port. 3 The camera requests a DHCP address. 4 The EWC Active Clients Report lists the IP address of the camera. You can export the client IP address list to an XML file. ExtremeWireless™ V10.41.06 User Guide 226 Configuring the ExtremeWireless APs (Optional) The camera IP address can be detected by third-party tools, such as ONVIF Device Manager. Note ExtremeWireless manages the AP and camera firmware revision. After initial connection, the AP/camera may undergo a firmware upgrade. The upgrade process runs before the device becomes fully active on the network. 5 Based on the reported IP address of the camera, the user associates the camera to the video surveillance system. For information about camera configuration settings, see Accessing the Camera Web User Interface on page 227. ft ra Related Links AP3916ic (Integrated Camera) on page 104 Assigning WLAN Services to Client Ports on page 170 Upgrading the Camera Image Manually on page 237 Multicast Filtering on page 281 AP3916ic-Camera Web User Interface on page 227 Camera Direct Stream Subscription If your video management system does not support ONVIF/IP camera discovery, subscribe directly using Real Time Streaming Protocol (RTSP). With direct stream, video is streamed through RTSP – H. 264 or Motion JPEG (MJPEG): • • Stream 1: • Max Resolution: 1920x1080 (1080p) • RTSP URL: rtsp:// :554/live/ch00_0 Stream 2: • Max Resolution: 640x360 • RTSP URL: rtsp:// :554/live/ch01_0 AP3916ic-Camera Web User Interface The AP3916ic is an 11ac Wave 2 AP with an integral security camera that lets you extend your Wireless LAN and provide simultaneous wireless service, BLE or 802.15.4 coverage and security in public spaces, such as classrooms and offices. Extreme Networks offers a web-based user interface to customize and configure the camera. Related Links Accessing the Camera Web User Interface on page 227 Camera UI Basic Functions on page 228 Accessing the Camera Web User Interface Take the following steps to access the AP3916ic Web User Interface: ExtremeWireless™ V10.41.06 User Guide 227 Configuring the ExtremeWireless APs Using your browser, navigate to the IP address of the camera. Find the camera IP address on the AP dashboard of the AP3916ic. Go to the AP list and click on an AP3916ic. 2 Enter the camera IP address into your browser. The web UI displays. ra Figure 43: AP3916ic Web UI 3 Login with default credentials admin/admin The credentials are case sensitive. Later, you can customize these credentials. See User Management on page 235. Note After the initial login, set a password in accordance with your IT policy regulations. Using default credentials is a security vulnerability for your network. ft Related Links AP3916ic (Integrated Camera) on page 104 Camera UI Basic Functions on page 228 AP3916ic Integrated Camera Deployment on page 226 Camera Direct Stream Subscription on page 227 Camera UI Basic Functions Configure the AP3916ic camera using the web user interface. The AP3916ic web user interface is divided into the following tabs: • • System on page 229 Network on page 231 ExtremeWireless™ V10.41.06 User Guide 228 Configuring the ExtremeWireless APs • • Media on page 232 User Management on page 235 Related Links Accessing the Camera Web User Interface on page 227 AP3916ic (Integrated Camera) on page 104 Camera Direct Stream Subscription on page 227 System System settings for the AP3916ic camera: • Status — Displays status information about the system, network, and video streams. ft ra Figure 44: Sample System and Network Status ExtremeWireless™ V10.41.06 User Guide 229 Configuring the ExtremeWireless APs ft ra Figure 45: Sample Video Status • Time — Date/Time settings for the camera. Figure 46: Sample Manual Time settings ExtremeWireless™ V10.41.06 User Guide 230 Configuring the ExtremeWireless APs Figure 47: Sample NTP Server Settings • ft ra Firmware — Browse to the camera image (.dlf file) and apply the image. Camera firmware is distributed and managed from the controlling ExtremeWireless appliance. If GTAC Support determines that a specific firmware version is required on your device, the on-board firmware upload functionality can be used to install the image. GTAC will provide the necessary firmware (.dfl) file. • Backup — Save camera settings to a backup file or restore settings from an existing backup file. Figure 48: Sample Backup /Restore Settings • Reset to Default/Reboot • Reset Camera Defaults — Rest camera to factory default settings. Backup current settings before resetting to factory default settings. • Reboot Camera — Restarts the camera. The current camera settings are retained after a camera restart. Network Network settings for the AP3916ic camera. ExtremeWireless™ V10.41.06 User Guide 231 Configuring the ExtremeWireless APs • IP Configuration — Configure network settings for the camera port. Note Dynamic IP (DHCP) is the default network Mode. ft ra Figure 49: Sample IP Configuration Settings • Universal Plug and Play (UPnP) Figure 50: Sample Discovery Settings: UPnP Media Configure settings for: video, camera, advanced settings, privacy mask, and audio. • Video ExtremeWireless™ V10.41.06 User Guide 232 Configuring the ExtremeWireless APs ra Figure 51: Sample Video Configuration Settings • Camera ft The video feed assumes a ceiling mount default orientation. When installing the AP in any other orientation, adjust the video feed accordingly. For example,when the AP is installed as a deskmount, the video Mirror/Flip setting should be Flip. ExtremeWireless™ V10.41.06 User Guide 233 Configuring the ExtremeWireless APs ft ra Figure 52: Sample Camera Settings • Advanced Figure 53: Sample Camera Advanced Settings • Audio ExtremeWireless™ V10.41.06 User Guide 234 Configuring the ExtremeWireless APs Figure 54: Sample Camera Audio Settings ft ra User Management Add and delete user accounts, change user settings, and change user password. • User List Figure 55: User Management Settings Note You cannot delete the Administrator account. Performing AP Software Maintenance When a new version of AP software becomes available, you can install it from the controller. You can configure each AP to upload the new software version either immediately, or the next time the AP connects to the controller. You can also set up a maintenance cycle for specific APs using the options ExtremeWireless™ V10.41.06 User Guide 235 Configuring the ExtremeWireless APs available on the AP Maintenance Cycle tab. Part of the AP boot sequence seeks and installs its software from the controller. Warning Never disconnect an AP from its power supply during a firmware upgrade. Disconnecting an AP from its power supply during a firmware upgrade may cause firmware corruption rendering the AP unusable. You can modify most of the radio properties on an AP without requiring a reboot of the AP. During upgrade, the AP keeps a backup copy of its software image. When a software upgrade is sent to the AP, the upgrade becomes the AP's current image and the previous image becomes the backup. In the event of failure of the current image, the AP runs the backup image. Maintaining the List of Current AP Software Images To maintain the list of current wireless AP software images: 1 From the top menu, click AP. 2 In the left pane, click Global > Maintenance. The following screen appears: Figure 56: AP Software Maintenance 3 In the AP Images for Platform drop-down list, click the appropriate platform. 4 To select an image to be the default image for a software upgrade, click it in the list, and then click Set as default. ExtremeWireless™ V10.41.06 User Guide 236 Configuring the ExtremeWireless APs 5 In the Upgrade Behavior section, select one of the following: • Upgrade when AP connects using settings from Controlled Upgrade — The Controlled Upgrade tab is displayed when you click Save. Controlled upgrade allows you to individually select and control the state of an AP image upgrade: which APs to upgrade, when to upgrade, how to upgrade, and to which image the upgrade or downgrade should be done. Administrators decide on the levels of software releases that the equipment should be running. • Always upgrade AP to default image (overrides Controlled Upgrade settings) — Selected by default. Allows for the selection of a default revision level (firmware image) for all APs in the domain. As the AP registers with the controller, the firmware version is verified. If it does not match the same value as defined for the default-image, the AP is automatically requested to upgrade to the default-image. 6 To save your changes, click Save. Related Links Upgrading the Camera Image Manually on page 237 ft ra Upgrading the Camera Image Manually The AP3916ic is an 11ac Wave 2 AP with an integral security camera that lets you extend your Wireless LAN and provide simultaneous wireless service, BLE or 802.15.4 coverage and security in public spaces, such as classrooms and offices. The camera image (.dlf file) is distributed within the controller builds. The AP manages the camera image — camera images are automatically upgraded with the AP image upgrade when a new camera image is available. You have the option to upgrade the camera image manually if necessary. To upgrade the AP3916ic camera image manually: 1 From the top menu, click AP. 2 In the left pane, click Global > Maintenance. 3 From the AP Software Maintenance tab, under Download AP Images: a Provide the necessary information to download the camera image file. b Select AP3916-Camera as the Platform. c Click Download. 4 Under Upgrade Behavior, select Upgrade when AP connects using settings from Controlled Upgrade. ExtremeWireless™ V10.41.06 User Guide 237 Configuring the ExtremeWireless APs 5 Click Save. The Controlled Upgrade tab displays. ft ra Figure 57: Manually Upgrading Camera Image 6 Select the Controlled Upgrade tab. Figure 58: Controlled Upgrade Tab 7 Select AP Platform: AP3916-camera. 8 Select the camera image file. 9 Click Camera Image Upgrade. Scheduling a Maintenance Cycle for Specific APs To schedule a maintenance cycle for specific APs: ExtremeWireless™ V10.41.06 User Guide 238 Configuring the ExtremeWireless APs Go to AP. 2 In the left pane, click Global Settings > Maintenance. 3 Click the AP Maintenance Cycle tab. The following screen appears: af 4 Click the Start At box to display the Choose Time dialog. 5 Adjust the sliders for both Hour and Minute to set the time for the AP maintenance cycle, then click Done. 6 In the Duration drop-down, select the desired duration time (in hours). 7 Under Recurrence, select the desired frequency. 8 Under Platforms, select the AP(s) that are included in the maintenance cycle. 9 Click Save. Deleting a Wireless AP Software Image To delete a wireless AP software image: From the top menu, click AP. The AP screen displays. 2 In the left pane, click Global > Maintenance. 3 In the AP Images for Platform drop-down list, click the appropriate platform. 4 In the AP Images list, click the image you want to delete. ExtremeWireless™ V10.41.06 User Guide 239 Configuring the ExtremeWireless APs 5 Click Delete. The image is deleted. Downloading a new Wireless AP Software Image To download a new wireless AP software image: 1 From the top menu, click AP. 2 In the left pane, click Global Settings, then AP Maintenance. The AP Software Maintenance tab is displayed. 3 In the Download AP Images list, type the following: • • • • • • • FTP Server — The IP of the FTP server to retrieve the image file from. User ID — The user ID for the controller to use when it attempts to log in to the FTP server. Password — The corresponding password for the user ID. Confirm — The corresponding password for the user ID to confirm it was typed correctly. Directory — The directory on the server in which the image file to be retrieved is stored. ft ra Filename — The name of the image file to retrieve. Platform — The AP hardware type to which the image applies. The are several types of AP and they require different images. 4 Click Download. The new software image is downloaded. Defining Parameters for a Controlled Software Upgrade To define parameters for a wireless AP controlled software upgrade: 1 From the top menu, click AP. 2 In the left pane, click Global > Maintenance. 3 Under upgrade behavior, select Upgrade when AP connects using settings from Controlled Upgrade. The Controlled Upgrade tab displays. ExtremeWireless™ V10.41.06 User Guide 240 Configuring the ExtremeWireless APs 4 Click the Controlled Upgrade tab. af Note The Controlled Upgrade tab is displayed only when the Upgrade Behavior is set to Upgrade when AP connects using settings from Controlled Upgrade on the AP Software Maintenance tab. 5 In the Select AP Platform drop-down list, click the type of AP you want to upgrade. 6 In the Select an image to use drop-down list, click the software image you want to use for the upgrade. 7 In the list of registered Wireless APs, select the check box for each AP to be upgraded with the selected software image. 8 Click Apply AP image version. The selected software image is displayed in the Upgrade To column of the list. 9 To save the software upgrade strategy to be run later, click Save for later. ExtremeWireless™ V10.41.06 User Guide 241 Configuring the ExtremeWireless APs 10 To run the software upgrade immediately, click Upgrade Now. The selected AP reboots, and the new software version is loaded. Note The Always upgrade AP to default image check box on the AP Software Maintenance tab overrides the Controlled Upgrade settings. 11 To upgrade without interrupting service, click Upgrade without interrupting service. If you click this option while the upgrade scheduler is running, the schedule is interrupted, and the current upgrade cycle calculates a new schedule that includes APs that weren't upgraded. Understanding the ExtremeWireless LED Status When you power on and boot an AP, you can follow its progress through the registration process by observing the LED sequence as described in the following sections: 39xx Series Wireless APs 38xx Series Wireless APs on page 251 37xx Series Wireless APs on page 255 ft ra • • • After you power on and boot the AP for the first time, you can configure LED behavior as described in Configuring Wireless AP LED Behavior on page 259. 39xx Series Wireless APs The following AP39xx model access points are supported by ExtremeWireless: • AP3917i/e • • • • • AP3916i/e AP3915i/e AP3912i/e AP3935i/e AP3965i/e ExtremeWireless™ V10.41.06 User Guide 242
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No XMP Toolkit : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03 Modify Date : 2018:04:26 17:57:13-07:00 Create Date : 2018:04:26 17:57-07:00 Metadata Date : 2018:04:26 17:57:13-07:00 Creator Tool : AH XSL Formatter V6.3 MR2 for Linux64 : 6.3.3.24511 (2016/05/17 13:57JST) Format : application/pdf Title : ExtremeWireless V10.41.06 User Guide Creator : Extreme Networks, Inc. Document ID : uuid:a9513390-4b12-452a-9ddb-4f0b06aa30cc Instance ID : uuid:89f75631-ac09-4163-8912-75cff81b3b85 Producer : Acrobat Distiller 18.0 (Windows) Page Count : 242 Author : Extreme Networks, Inc.EXIF Metadata provided by EXIF.tools