General Dynamics Mission Systems ES520P Dual radio access point/bridge User Manual CLIguide5 4 5

General Dynamics C4 Systems Dual radio access point/bridge CLIguide5 4 5

User Manual

Fortress Mesh PointSoftware CLI Guidewww.gdc4s.com© 2015 General Dynamics C4 Systems, Inc.
Fortress ES-Series CLI Guidei009-00036–00v5.4.5Fortress Mesh Point Version 5.4.5 Software CLI GuideCopyright © 2015 General Dynamics C4 Systems, Inc. All rights reserved.This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, without written permission of General Dynamics C4 Systems, 77 “A” Street, Needham, MA 02494, except as specified in the Product Warranty and License Terms.GENERAL DYNAMICS C4 SYSTEMS MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. GENERAL DYNAMICS C4 SYSTEMS SHALL NOT BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE OR USE OF THIS MATERIAL. THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE.General Dynamics Broadband and General Dynamics C4 Systems | Fortress Technologies are trademarks of General Dynamics. Fortress Technologies and AirFortress logos and AirFortress are registered trademarks. Multi-Factor Authentication, Unified Security Model, Wireless Link Layer Security and Three Factor Authentication (TFA) are trademarks of General Dynamics C4 Systems, Inc. The technology behind Wireless Link Layer Security™ enjoys U.S. and international patent protection under patent number 5,757,924.Portions of this software are covered by the GNU General Public License (GPL) Copyright © 1989, 1991 Free Software Foundation, Inc,. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. To receive a complete machine-readable copy of the corresponding source code on CD, send $10 (to cover the costs of production and mailing) to: General Dynamics C4 Systems, 77 “A” Street, Needham, MA 02494. Please be sure to include a copy of your General Dynamics C4 Systems invoice and a valid “ship to” address.This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape’s SSL.THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.            Copyright (c) 2010, Atheros Communications Inc. Atheros and the Atheros logo are trademarks of Atheros Communications, Inc.THIS SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR (Atheros Communications, Inc) DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Fortress ES-Series CLI GuideiiThis product uses Dynamic Host Control Protocol, Copyright © 2004–2010 by Internet Software Consortium, Inc. Copyright © 1995–2003 by Internet Software Consortium. All rights reserved.This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)Copyright © 1998-2011 The OpenSSL Project. All rights reserved. THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product uses Net-SNMP. Copyright 1989, 1991, 1992 by Carnegie Mellon University. Derivative Work - 1996, 1998-2000. Copyright 1996, 1998-2000 The Regents of the University of California. All rights reserved. Copyright (c) 2001-2003, Networks Associates Technology, Inc. All rights reserved. Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd. All rights reserved. Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Copyright (c) 2003-2008, Sparta, Inc. All rights reserved. Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved. Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss@fabasoft.com. Author: Bernhard Penz bernhard.penz@fabasoft.com.THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.Microsoft and Windows are registered trademarks of the Microsoft Corporation.Firefox is a trademark of the Mozilla Foundation.SSH is a trademark of SSH Communication Security.All other trademarks mentioned in this document are the property of their respective owners.End User License Agreement (EULA) and Limited SoftwareWarranty – Fortress Products
Fortress ES-Series CLI GuideiiiIMPORTANT; PLEASE READ THIS END USER LICENSE AGREEMENT CAREFULLY. DOWNLOADING, INSTALLING OR USING GENERAL DYNAMICS C4 SYSTEMS’ SOFTWARE CONSTITUTES ACCEPTANCE OF THIS AGREEMENT.GENERAL DYNAMICS C4 SYSTEMS, INC., WILL LICENSE ITS SOFTWARE TO YOU THE CUSTOMER (END USER) ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF  THE  TERMS CONTAINED IN  THIS  END USER LICENSE AGREEMENT. THE ACT OF DOWNLOADING, INSTALLING, OR USING FORTRESS SOFTWARE, BINDS YOU AND THE BUSINESS THAT YOU REPRESENT (COLLECTIVELY, “CUSTOMER”) TO THE AGREEMENT.LicenseGeneral Dynamics C4 Systems, Inc. (“Fortress”) grants to Customer (“Licensee”) a non-exclusive and non-transferable right to use the Fortress Software Product (“Software”) described in the Fortress Product Description for which Customer has paid any required license fees and subject to the use rights and limitations in this EULA. Unless otherwise agreed to in writing, use of the Software is limited to the number of authorized users for which Licensee has purchased the right to the use of the software. Software is authorized for installation on any Fortress approved device. “Software” includes computer program(s) and any documentation (whether contained in user manuals, technical manuals, training materials, specifications, etc.) that is included with the software (including CD-ROM, or on-line). Software is authorized for installation on a single use computing device such as Fortress hardware platform, computer, laptop, PDA or any other computing device. Software is not licensed for installation or embedded use on any other system(s) controlling access to a secondary network of devices or securing access for any separate computing devices. Software contains proprietary technology of Fortress. No ownership in or title to the Software is transferred. Software is protected by copyright laws and international treaties. Customer may be required to input a software license key to initialize the software installation process.Customer may make backup or archival copies of Software and use Software on a backup processor temporarily in the event of a processor malfunction. Any full or partial copy of Software must include all copyright and other proprietary notices which appear on or in the Software. Control functions may be installed and enabled. Customer may not modify control utilities. Customer may not disclose or make available Software to any other party or permit others to use it except Customer’s employees and agents who use it on Customer’s behalf and who have agreed to these license terms. Customer agrees not to reverse engineer, decompile, or disassemble the Software. Customer shall maintain adequate records matching the use of Software to license grants and shall make the records available to Fortress or the third party developer or owner of the Software on reasonable notice.  Unless the Customer is a branch of the United States Government, Fortress may terminate any license granted hereunder if Customer breaches any license term. Upon termination of the Agreement, Customer shall destroy or return to Fortress all copies of Software.General LimitationsThis is a License for the use of Fortress Software Product and documentation; it is not a transfer of title. Fortress retains ownership of all copies of the Software and Documentation. Customer  acknowledges  that Fortress trade secrets are contained within the Software and Documentation. Except as otherwise expressly provided under the Agreement, Customer shall have no right and Customer specifically agrees not to:i. Transfer, assign or sublicense its license rights to any other person or entity and Customer acknowledges that  any attempt to transfer, assign or sublicense shall “void” the license;ii. Make modifications to or adapt the Software or create a derivative work based on the Software, or permit third parties to do the same;iii. Reverse engineer, decompile, or disassemble the Software to a human-readable form, except to the extent otherwise expressly permitted under applicable law notwithstanding this restriction; and
Fortress ES-Series CLI Guideiviv. Div. sclose, provide, or otherwise make available trade secrets contained within the Software and Documentation in any form to any third party without the prior written consent of Fortress. Customer shall implement reasonable security measures to protect such trade secrets.Software, Upgrades and Additional CopiesFor purposes of the Agreement, “Software” shall include computer programs, including firmware, as provided to Customer by Fortress and any (a) bug fixes, (b) maintenance releases, (c) minor and major upgrades as deemed to be included under this EULA by Fortress or backup copies of any of the foregoing.NOTWITHSTANDING ANY OTHER PROVISION OF THE AGREEMENT:i. CUSTOMER HAS NO LICENSE OR RIGHT TO MAKE OR USE ANY ADDITIONAL COPIES OR UPGRADES UNLESS CUSTOMER, AT THE TIME OF MAKING OR ACQUIRING SUCH COPY OR UPGRADE, ALREADY HOLDS A VALID LICENSE TO THE ORIGINAL SOFTWARE AND HAS PAID THE APPLICABLE FEE FOR THE UPGRADE OR ADDITIONAL COPIES;ii. USE OF UPGRADES IS LIMITED TO FORTRESS EQUIPMENT FOR WHICH CUSTOMER IS THE ORIGINAL END USER CUSTOMER OR LESSEE OR OTHERWISE HOLDS A VALID LICENSE TO USE THE SOFTWARE WHICH IS BEING UPGRADED; ANDiii. THE MAKING AND USE OF ADDITIONAL COPIES IS LIMITED TO NECESSARY BACKUP PURPOSES ONLY.Proprietary NoticesAll copyright and other proprietary notices on all copies of the Software shall be maintained and reproduced by the Customer in the same manner that such copyright and other proprietary notices are included on the Software. Customer shall not make any copies or duplicates of any Software without the prior written permission of Fortress; except as expressly authorized in the Agreement.Term and TerminationThis EULA shall remain in effect until terminated through one of the following circumstances:i. At any time by Customer’s destruction of  all copies of the Software and any Documentation.ii. By Fortress due to Customer non-compliance with any provision of the Agreement (not applicable to U.S. Government Customers).iii. Aiv. ny United States Government Customer non-compliance and/or breach of the terms of this Agreement shall be handled in accordance with the provisions of the Contracts Disputes Act of 1978, as amended.Upon termination by either the Customer or Fortress, the Customer shall destroy or return to Fortress all copies of Software and Documentation in its possession or control. All limitations of liability, disclaimers, restrictions of warranty, and all confidentiality obligations of Customer shall survive termination of this Agreement. Also, the provisions set-forth in the sections titled “U.S. Government Customers” and “General Terms Applicable to the Limited Warranty Statement and End User License Agreement” shall survive termination of the Agreement.Customer RecordsFor Commercial Customers: Fortress and its independent accountants reserve the right to conduct an audit of Customer records to verify compliance with this agreement. Customer grants to Fortress and its independent accountants access to its books, records and accounts during Customer’s normal business hours in support of such an audit. Customer shall pay to Fortress the appropriate license fees, plus the reasonable cost of conducting the audit should an audit disclose non- compliance with this Agreement.
Fortress ES-Series CLI GuidevFor U.S. Government Customers: United States Government Customers agree to review usage monitor logs, software logs and other relevant Customer records to verify Customer’s compliance with this Agreement and to promptly inform Fortress of any violation of their obligations hereunder and to promptly enter into discussions with Fortress and any relevant prime contractor to discuss the payment of reasonable costs and reasonable attorneys’ fees within the Contracts Disputes Act of 1978, as amended.Export RestrictionsCustomer acknowledges that the laws and regulations of the United States restrict the export and re -export of certain commodities and technical data of United States origin, including the Product, Software and the Documentation, in any medium. Customer will not knowingly, without prior authorization if required, export or re-export the Product, Software or the Documentation in any medium without the appropriate United States and foreign government licenses. The transfer or export of the software outside the U.S. may require a license from the Bureau of Industry and Security. For questions call BIS at 202-482-4811.U.S. Government CustomersThe Software and associated documentation were developed at private expense and are delivered and licensed as “commercial computer software” as defined in DFARS 252.227-7013, DFARS 252.227-7014, or DFARS 252.227-7015 as a “commercial item” as defined in FAR 2.101(a), or as “Restricted computer software” as defined in FAR 52.227 -19.  All other technical data, including manuals or instructional materials, are provided with “Limited Rights” as defined in DFAR 252.227-7013 (a) (15), or FAR 52.227-14 (a) and in Alternative II (JUN 1987) of that clause, as applicable.General Terms Applicable to the Limited Warranty and End User License AgreementLimited WarrantyThe warranties provided by Fortress in this Statement of Limited Warranty apply only to Fortress Products purchased from Fortress for internal use on Customer’s computer network. “Product” means a Fortress software product, upgrades, or firmware, or any combination thereof. The term “Product” also includes Fortress software programs, whether pre-loaded with the Fortress hardware Product, installed subsequently or otherwise. Nothing in this Statement of Warranty affects any statutory rights of consumers that cannot be waived or limited by contract.Customer is responsible for determining the suitability of the Products in Customer’s network environment.  Unless otherwise agreed, Customer is responsible for the Product’s installation, set-up, configuration, and for password and digital signature management.Fortress warrants the Products will conform to the published specifications and will be free  of  defects  in  materials  and workmanship. Customer must notify Fortress within the specified warranty period of any claim of such defect. The warranty period for software is one (1) year commencing from the ship date to Customer. The date of shipment is established per the shipping document (packing list) for the Product that is shipped from Fortress location.Customer shall provide Fortress with access to the Product to enable Fortress to diagnose and correct any errors or defects.  If the Product is found defective by Fortress, Fortress’ sole obligation under this warranty is to remedy such defect at Fortress’ option through repair, upgrade or replacement of product. Services and support provided to diagnose a reported issue with a Fortress Product, which is then determined not to be the root cause of the issue, may, at Fortress’ option be billed at the standard time and material rates.Warranty ExclusionsThe warranty does not cover Fortress Hardware Product or any other equipment upon which the Software is authorized by Fortress or its suppliers or licensors, which (a) has been damaged through abuse or negligence or by accident, (b) has been altered except by an authorized Fortress representative, (c) has been subjected to abnormal physical or electrical stress (i.e., lightning strike) or abnormal environmental conditions (i.e., beyond the published specifications), (d) has been lost or damaged in transit, or (e) has not been
Fortress ES-Series CLI Guideviinstalled, operated, repaired or maintained in accordance with instructions provided by Fortress.The warranty is voided by removing any tamper evidence security sticker or marking except as performed by a Fortress authorized service technician.Fortress does not warrant uninterrupted or error-free operation of any Products or third party software, including public domain software which may have been incorporated into the Fortress Product.Fortress will bear no responsibility with respect to any defect or deficiency resulting from accidents, misuse, neglect, modifications, or deficiencies in power or operating environment.Unless specified otherwise, Fortress does not warrant or support non-Fortress products. If any service or support is rendered such support is provided WITHOUT WARRANTIES OF ANY KIND.Governing LawFor Commercial Customers: This Agreement shall be governed by and construed in accordance with the laws of the State of New York without reference to its conflict of laws rules.For U.S. Government Customers: This Agreement shall be governed by and construed in accordance with United  States Federal statutory and common law. The United States Federal Courts shall have exclusive jurisdiction over any claim arising under this Agreement.Disclaimer of LiabilitiesTHE FOREGOING WARRANTIES ARE THE EXCLUSIVE WARRANTIES AND REPLACE ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. FORTRESS SHALL HAVE NO LIABILITY FOR CONSEQUENTIAL, EXEMPLARY, OR INCIDENTAL DAMAGES EVEN IF IT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE STATED LIMITED WARRANTY IS IN LIEU OF ALL LIABILITIES OR OBLIGATIONS OF FORTRESS FOR DAMAGES ARISING OUT OF OR IN CONNECTION WITH THE DELIVERY, USE, OR PERFORMANCE OF THE PRODUCTS (HARDWARE AND SOFTWARE). THESE WARRANTIES GIVE SPECIFIC LEGAL RIGHTS AND CUSTOMER MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM JURISDICTION TO JURISDICTION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF EXPRESS OR IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION  OR LIMITATION  MAY NOT APPLY TO YOU. IN THAT EVENT, SUCH WARRANTIES  ARE LIMITED IN DURATION TO THE WARRANTY PERIOD.  NO WARRANTIES APPLY AFTER THAT PERIOD.IndemnificationFortress will defend any action brought against Customer based on a claim that any Fortress Product infringes any U.S. patents or copyrights excluding third party software, provided that Fortress is immediately notified in writing and Fortress has the right to control the defense of all such claims, lawsuits, and other proceedings. If, as a result of any claim of infringement against any U.S. patent or copyright, Fortress is enjoined from using the Product, or if Fortress believes the Product is likely to become the subject of a claim of infringement, Fortress at its option and expense may procure the right for Customer to continue to use the Product, or replace or modify the Product so as to make it non-infringing. If neither of these two options is reasonably practicable, Fortress may discontinue the license granted herein on one month’s written notice and refund to Licensee the unamortized portion of the license fees hereunder. The depreciation shall be an equal amount per year over the life of the Product as established by Fortress. The foregoing states the entire liability of Fortress and the sole and exclusive remedy of the Customer with respect to infringement of third party intellectual property.
Fortress ES-Series CLI GuideviiLimitation of LiabilityCircumstances may arise where, because of a default on Fortress’ part or other liability, Customer is entitled to recover damages from Fortress. In each such instance, regardless of the basis on which you are entitled to claim damages from Fortress (including breach, negligence, misrepresentation, or other contract or tort claim), Fortress is liable for no more than damages for bodily injury (including death) and damage to real property and tangible personal property, and the amount of any other actual direct damages, up to either U.S. $25,000 (or equivalent in local currency) or the charges (if recurring, 12 months’ charges apply) for the Product that is the subject of the claim, whichever is less. The foregoing is the maximum amount for which Fortress is responsible.UNDER NO CIRCUMSTANCES IS FORTRESS LIABLE FOR ANY OF THE FOLLOWING:1) THIRD-PARTY CLAIMS AGAINST YOU FOR DAMAGES,2) LOSS OF, OR DAMAGE TO, YOUR RECORDS OR DATA, OR3) SPECIAL, INCIDENTAL, OR INDIRECT DAMAGES OR FOR ANY ECONOMIC CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), EVEN IF FORTRESS OR ITS SOLUTION PROVIDER IS INFORMED OF THEIR POSSIBILITY. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO CUSTOMER.Telephone SupportDuring the warranty period, Fortress will provide a reasonable amount of telephone consultation to  the  Customer. This support shall include assistance in connection with the installation and routine operation of the Product, but does not include network troubleshooting, security consultation, design and other services outside of the scope of routine Product operation. Warranty services for the Products shall be available during Fortress’ normal U.S. (EST) business days and hours.Extended Warranty ServiceIf the Customer purchases an extended warranty service agreement with Fortress, service will be provided in accordance to said agreement’s terms and conditions.Access and ServiceCustomer must provide Fortress or Solution Provider with access to the Product to enable Fortress to provide the service. Access may include access via the Internet, on-site access or Customer shall be responsible for returning the Product to Fortress. Fortress will notify the Customer to obtain authorization to perform any repairs.If, during the warranty period, as established by the date of shipment, the Customer finds any significant defect in materials and workmanship under normal use and operating conditions, the Customer shall notify Fortress Customer Service in accordance with the Fortress Service Policies in effect at that time.DISCLAIMER OF WARRANTYTHE WARRANTIES HEREIN ARE SOLE AND EXCLUSIVE, AND NO OTHER WARRANTY, WHETHER WRITTEN OR ORAL, IS EXPRESSED OR IMPLIED. TO THE EXTENT PERMITTED BY LAW, FORTRESS SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT.EULA Addendum for Products Containing 4.4 GHz Radio(s)This product contains one or more radios which operate in the 4.4 GHz - 4.9 GHzrange.The 4.4 GHz - 4.9 GHz frequency range is regulated by the United States National Telecommunications and Information Administration (NTIA) and allocated exclusively for government use.By accepting this agreement, user acknowledges that proper authorization to operate in this frequency has been obtained and user accepts full responsibility for any unauthorized
Fortress ES-Series CLI Guideviiiuse. User agrees to indemnify and hold harmless General Dynamics C4 Systems, Inc. from any fines, costs or expenses resulting from or associated with unauthorized use of this frequency range.This EULA Addendum does not apply to Fortress products that do not contain 4.4 GHz radios.
Fortress ES-Series CLI Guide: Table of ContentsixTable of Contents1Introduction 1This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Network Security Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2Fortress Security Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2Fortress Hardware Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2ES-Series Model Numbers  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3Fortress Mesh Point Management  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4Fortress Software and Hardware Clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Network Deployment Options  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52Mesh Point CLI and Administrative Access 7Mesh Point CLI  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7Accessing the Mesh Point CLI via the Serial Console Port . . . . . . . . . . . . . . 8Accessing the Mesh Point CLI Remotely. . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Logging On and Off the Mesh Point CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Accessing Mesh Point CLI Help  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10Command Syntax  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11Administrative Accounts and Access. . . . . . . . . . . . . . . . . . . . . . . . 12Global Administrator Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  13Password Complexity and Expiration  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Login, Session and Lockout Behaviors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Authentication Method and Failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Administrator Logon Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18Individual Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  19Adding Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Updating and Deleting Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Changing Administrative Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  21Administrative IP Address Access Control List . . . . . . . . . . . . . . . . . . . . . .  22SNMP Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  23
Fortress ES-Series CLI Guide: Table of Contentsx3Networking and Radio Configuration 27Network Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Network Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28Bridging Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  29FastPath Mesh Bridging  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Multicast Snooping  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32Configuring Neighbor Cost Overrides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Fine-tuning FastPath Mesh Network Performance . . . . . . . . . . . . . . . . . . .  33Selecting the FastPath Mesh Multicast Transmit Mode. . . . . . . . . . . . . . . . . . . . . . . . . 34Setting the FastPath Mesh Packet Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Setting the FastPath Mesh Transmit Control Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Setting Multicast Video Clamping Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Setting Mesh Routing Reactivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Setting Mesh Packet Time To Live  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Viewing Current Mesh Performance Parameters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37Frame Processor Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37STP Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  37Global Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38Country Code and Regulatory Authorities . . . . . . . . . . . . . . . . . . . . . . . . . .  39Environment Setting  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  40Unit of Distance Measure  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  41Radio Frequency Kill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  41Channel Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  42Individual Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Radio Band, Short Preamble, Guard Interval  . . . . . . . . . . . . . . . . . . . . . . .  46Channel Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  48Distance, Beacon Interval, Noise Immunity. . . . . . . . . . . . . . . . . . . . . . . . .  52Network Type, Antenna Gain, Tx Power . . . . . . . . . . . . . . . . . . . . . . . . . . .  53MIMO. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  53STBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  54Channel Lock and Other Channel Selection Features  . . . . . . . . . . . . . . . . 55DFS, TDWR, and Channel Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  56Dynamic Frequency Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Licensed TDWR Channels  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Channel Exclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Radio BSS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  58BSS Radio, BSS Name and SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58WDS Bridging or AP Infrastructure Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60BSS State, SSID Advertising and Drop Probe Requests  . . . . . . . . . . . . . . . . . . . . . . . 60BSS STA Idle Timeout and 802.11g-Only Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60BSS Unicast Transmission Rate Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61BSS WMM QoS Setting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63BSS Fragmentation and RTS Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63BSS DTIM Beacon Countdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64BSS VLANs Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Fortress ES-Series CLI Guide: Table of ContentsxiBSS Fortress Security Zone  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65FastPath Mesh BSS Cost Offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65BSS Multicast Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66Bridging MTU and Beacon Encryption  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66BSS Description  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66BSS Wi-Fi Security Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Antenna Tracking / Rate Monitoring  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  69ES210 Mesh Point STA Settings and Operation . . . . . . . . . . . . . . . . . . . . .  70STA Radio, Name, SSID and SSID Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71STA State  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72STA Unicast Transmission Rate Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72STA Background Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73STA WMM QoS Setting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73STA Fragmentation and RTS Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74STA Multicast Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74STA Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74STA Wi-Fi Security Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74Editing or Deleting a STA Interface Connection  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76Establishing a STA Interface Connection  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76ES210 Station Access Control Lists  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78Local Area Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 78Hostname and IPv4 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  79IPv6 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  80DNS Client Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  81Time and Location Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . 82System Date and Time  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  82Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  83NTP Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  83GPS and Location Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 86DHCP and DNS Services  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Enabling DHCP Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  87Enabling DNS Servers and Adding External DNS Servers . . . . . . . . . . . . .  89Enabling Multicast DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  90Ethernet Interfaces  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90Quality of Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94VLANs Implementation  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Global VLAN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100Network Interface VLAN Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102VLANs and FastPath Mesh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102ES210 Mesh Point Serial Port Settings . . . . . . . . . . . . . . . . . . . . . .103Configuring the Serial Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104Resetting the Serial Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Mesh Viewer Protocol Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .105
Fortress ES-Series CLI Guide: Table of Contentsxii4Network Security, Authentication and Auditing 109Fortress Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109Operating Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109FIPS Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111MSP Encryption Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113Encrypted Data Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114MSP Key Establishment  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114MSP Re-Key Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Key Beacon Interval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Fortress Legacy Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Encrypted Zone Cleartext Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Encrypted Zone Management Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Encrypted Interface Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116Authorized Cleartext Device Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . .117Authorized Wireless Client Management Settings. . . . . . . . . . . . . . . . . . . . 117Turning Mesh Point GUI Access Off and On . . . . . . . . . . . . . . . . . . . . . . . . 117SSH Access to the Mesh Point CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Disabling and Enabling SSH Access to the Mesh Point CLI . . . . . . . . . . . . . . . . . . . . .119Configuring Public Key Authentication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119Blackout Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Allow Cached Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Fortress Access ID  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121Generating CSRs and Key Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Managing Local Certificates  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Importing and Deleting Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123Assigning Stored Certificates to Mesh Point Functions . . . . . . . . . . . . . . . . . . . . . . . . .124Managing the Certificate Revocation List  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126Access Control Entries  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127Internet Protocol Security  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129Global IPsec Settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Interface Security Policy Database Entries . . . . . . . . . . . . . . . . . . . . . . . . . 132Dynamic Endpoints for IPsec. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134Dynamic Endpoints for FastPath Mesh Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135Dynamic Endpoints for VPN Client Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135IPsec Pre-Shared Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138IPsec Access Control Lists  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139L2TP/IPsec Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Authentication and Timeouts  . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142Authentication Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Internal Authentication Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Basic Internal Authentication Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146Certificate Authority Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146
Fortress ES-Series CLI Guide: Table of ContentsxiiiGlobal User and Device Authentication Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146Local 802.1X Authentication Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147OCSP Authentication Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148OCSP Cache Settings and Management  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150Internal Authentication Server Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . .152User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153Client Device Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154Session Idle Timeouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156ACLs and Cleartext Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157MAC Address Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Destination MAC Address Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158IP Address Packet Filter  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159Packet Filtering on Ingress and Egress. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163ICMPv6 Neighbor Discovery Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163Fortress Controller Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Cleartext Device Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1653rd-Party AP Management  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165Trusted Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166Remote Audit Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168Enabling Audit Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168Globally Filtering Audited Administrative Activity. . . . . . . . . . . . . . . . . . . . . 168Auditing and Filtering Administrative Activity by MAC Address . . . . . . . . . . 170Filtering Audited Learned-Device Activity  . . . . . . . . . . . . . . . . . . . . . . . . . . 172Wireless Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1735System Options, Maintenance and Licensing 175Resetting Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175Rebooting the Mesh Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176Booting Selectable Software Images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176Upgrading Mesh Point Software  . . . . . . . . . . . . . . . . . . . . . . . . . . .177Initiating FIPS Retests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179Restoring Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179Features Licensing  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179Pinging a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182Tracing a Packet Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182Tracing the FastPath Mesh Path . . . . . . . . . . . . . . . . . . . . . . . . . . .182Copying Running Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . .183Diagnostic Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Fortress ES-Series CLI Guide: Table of Contentsxiv6System and Network Monitoring 185Viewing System Information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185Viewing the Mesh Point Device ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Viewing System Uptime. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Monitoring Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186Viewing AP Associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Viewing Bridging Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Viewing Client Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188Viewing Host Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Viewing Guest Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Monitoring Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190IPsec SAs Monitoring  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191IPsec ISAKMP Security Associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192FastPath Mesh Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193FastPath Mesh Bridging Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193Viewing the System Log  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195Support Package Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196Appendix ASupported Services  A-1Index IGlossary XIII
Fortress ES-Series CLI Guide: Introduction1Chapter 1Introduction1.1 This DocumentWARNING: Cancause physicalinjury or death and/orseverely damage yourequipment.This user guide covers configuring, managing and monitoring any current-model Fortress Mesh Point through the command-line interface (CLI). Fortress Mesh Point user guidance is intended for professional system and network administrators and assumes that its users have a level of technical expertise consistent with these roles.CAUTION: Cancorrupt your net-work, your data or anintended result.Side notes throughout this document are intended to alert you to particular kinds of information, as visually indicated by their icons. Examples appear to the right of this section, in descending order of urgency.1.1.1 Related DocumentsNOTE: May assistyou in executingthe task, e.g. a conve-nient software feature ornotice of something tokeep in mind.   Fortress software user guidance, including this guide, covers all current Fortress hardware platforms. In addition to this guide, Fortress Mesh Point software guides include:Fortress Mesh Point Software GUI GuideFortress Mesh Point Software Auto-Config GuideThe Fortress Mesh Point Software GUI Guide presents the most detailed descriptions of supported network topologies.Each Fortress hardware device is covered in a platform-specific hardware guide, currently including:ES2440 High-Capacity Infrastructure Mesh Point Hardware GuideES820 Vehicle Mesh Point Hardware GuideES520 Deployable Mesh Point Hardware GuideES210 Tactical Mesh Point Hardware GuideThe Fortress Secure Client is covered in a separate Fortress Secure Client user guide.
Fortress ES-Series CLI Guide: Introduction21.2 Network Security OverviewNetwork security measures take a variety of forms; key components include:Confidentiality or privacy implementations prevent information from being derived from intercepted traffic.Integrity checking guards against deliberate or accidental changes to data transmitted on the network.Access control restricts network access to authenticated users and devices and defines resource availability and user permissions within the network.1.3 Fortress Security SystemsFortress applies a combination of established and unique methodologies to network security. Fortress’s Mobile Security Protocol (MSP) provides device authentication and strong encryption at the Media Access Control (MAC) sublayer, within the Data Link Layer (Layer 2) of the Open System Interconnection (OSI) networking model. This allows a transmission’s entire contents, including IP addresses, to be encrypted.NOTE: Newreleases may stillbe in FIPS 140-2 Level 2-validation process. Con-tact your Fortress repre-sentative for the currentFIPS certification statusof Fortress products.Fortress security systems also employ and support standards- and protocols-based network security measures, including RADIUS (Remote Authentication Dial in User Service), WPA (Wi-Fi Protected Access) and WPA2, IPsec (Internet Protocol Security), with or without L2TP, and NSA (National Security Agency) Suite B cryptography.Fortress security systems can be configured to operate in full compliance with Federal Information Processing Standards (FIPS) 140-2 Security Level 2.1.3.1 Fortress Hardware DevicesFortress hardware platform devices are encompassed in the ES-series, referred to collectively as Mesh Points. These devices were formerly known as Secure Wireless Bridges and have been called simply Bridges, as well as Controllers or Controller devices and Gateways and Secure Gateways. The term  Mesh Point is used consistently throughout user guidance to refer to ES-series Fortress hardware devices, except when quoting GUI wording that departs from that convention.Fortress Mesh Points provide network security by authenticating access to the bridged network and bridging encrypted wireless transmissions to the wired Local Area Network (and/or wired communication within the LAN) and by
Fortress ES-Series CLI Guide: Introduction3authenticating and encrypting Wireless Distribution System (WDS) links.Table 1.1 shows the various hardware configurations and capabilities of current Fortress hardware devices. Fortress Mesh Points are variously equipped for network connectivity. When one or more radio is present, the Mesh Point can both provide and protect wireless connections. Fortress devices without radios act as overlay security appliances for wireless networks. All Fortress devices are equipped for wired Ethernet with varying numbers of ports.The ES210 is additionally equipped with a GPS (Global Positioning System) receiver and associated antenna port. 1.3.1.1 ES-Series Model NumbersFortress ES-series model numbers provide information about the product platform and the number and type of radio(s) it contains. Figure 1.1 breaks down the model number for an ES820-35 Vehicle Mesh Point. You can find the full model number for any ES-series Mesh Point with the show device command:# show deviceModel: ES820-35Version: 5.4.5.2041SerialNumber: 109510038Radio 1: 802.11abgn 400mWRadio 2: 802.11an 631mWTable 1.1 Radios and Ethernet Ports in Fortress Hardware DevicesFortress model # of radios radio label standard equipment 4.4GHz option GPS Rx # Eth ports Eth port HW label Eth port SW label takes PoE serves PoE default encryptionES24404Radio 1 802.11a/g/n noyes3Ethernet 1/WAN/PoE Ethernet1 yes no encryptedRadio 2–Radio 4 802.11a/n yes2Radio 1 802.11a/g/n noEthernet2 &Ethernet 3Ethernet2 &Ethernet3 no no clearRadio 2 802.11a/n yes0n/aES820 2 Radio 1 802.11a/g/n no no 2 Enet1/P1 Ethernet1 no no encryptedRadio 2 802.11a/n yes Enet2/P2 Ethernet2 no no clearES520 2 Radio 1 802.11a/g no no 9 WAN wan1 yes no encryptedRadio 2 802.11a yes LAN 1–8 lan1–lan8 no yes clearES210 1 Radio 1 802.11a/g/n yes yes 2 Ethernet (WAN) Ethernet1 no no encryptedEthernet Ethernet2 no no clear
Fortress ES-Series CLI Guide: Introduction4DeviceIP: 192.168.4.9Gui: OnSsh: OnSnmp(V3): OffFirmware version: 1.14.52Time till reboot: not set Figure 1.1 ES-Series Product Model Number ExplicationCAUTION: Use of4.4 GHz radios inthe U.S. without govern-ment approval is strictlyforbidden. The Platform identifier for Fortress's first generation ES-series Mesh Points is three digits, as shown in Figure 1.1. The number “2” prefixed to the ES2440’s platform number identifies the High-Capacity Infrastructure Mesh Point as a next generation ES-series Fortress platform. The second-to-last digit in the platform number represents the maximum number of radios the platform chassis can accommodate.The number of non-zero digits after the hyphen corresponds to the actual number of radios installed in the Mesh Point. The value of each digit indicates the frequency band(s) that radio supports, as shown in Table 1.2.Only the ES2440 supports an option for Multiple-Input Multiple-Output ()-capable 4.4 GHz radios, indicated by the “m” appended to these two model numbers: ES2440-34m, ES2440-3444m (All standard equipment ES2440 radios [802.11a/g/n and 802.11a/n] support).A zero following the hyphen in an ES-series model number indicates a Mesh Point with no radios installed.1.3.1.2 Fortress Mesh Point ManagementFortress Mesh Points can be administered through either of two native software management tools. They support SNMP (Simple Network Management Protocol) transactions, and each model chassis provides a small subset of basic user controls and visual indicators.Table 1.2 Radio Installed and Supported FrequenciesNumber Radio Installed Supported Frequencies3 802.11a/g or 802.11a/g/n 2.4 GHz or 5 GHz4 802.11 4.4 GHz 4.4 GHz5 802.11a or 802.11a/n 5 GHz
Fortress ES-Series CLI Guide: Introduction5Mesh Point GUIThe graphical user interface for Fortress Mesh Points is a browser-based management tool that provides administration and monitoring functions in a menu- and dialog-driven format. It is accessed over the network via the Mesh Point’s IP address. The Mesh Point GUI supports Microsoft® Internet Explorer and Mozilla Firefox™. Using the Mesh Point GUI is covered in Fortress Mesh Point Software GUI Guide.Mesh Point CLIThe command-line interface for Fortress Mesh Points provides administration and monitoring functions via a command line. It is accessed over the network via a secure shell (SSH) connection to the Mesh Point’s management interface or through a terminal connected directly to the Mesh Point’s serial Console port. Using the Mesh Point CLI is covered in this guide. SNMPFortress Mesh Points support monitoring through version 3 of the Simple Network Management Protocol (SNMP) Internet standard for network management. The Fortress Management Information Base (MIB) is included on the Mesh Point CD and can be downloaded from the Fortress web site: www.gdc4s.com/fortresssupport.Chassis Indicators and ControlsFortress Mesh Points are variously equipped with LED indicators and chassis controls. These are covered in each Mesh Point’s respective Hardware Guide.1.3.2 Fortress Software and Hardware ClientsFortress ES-series Mesh Points support standards-based secure wireless client connections, including support for software and hardware clients developed by Fortress. 1.4 Network Deployment OptionsFortress's FastPath Mesh link management function supports optimal path selection and independent IPv6 mesh addressing and DNS (Domain Name System) distribution. FastPath Mesh networks provide higher efficiency and greater mobility than networks using STP link management. Although FastPath Mesh and STP networks serve the same essential functions, the details of deploying them are not identical. Each type of network is more fully covered in the Fortress Mesh Point Software GUI Guide.
Fortress ES-Series CLI Guide: Introduction6
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access7Chapter 2Mesh Point CLI and Administrative Access2.1 Mesh Point CLINOTE: FortressMesh Point fea-tures and functions aredescribed in greaterdetail in the SoftwareGUI Guide.The Fortress Mesh Point’s command-line interface provides a complete set of commands for managing the Fortress Mesh Point and the network it secures, through a direct connection to the Mesh Point’s serial console port or remotely, through the Mesh Point’s encrypted or clear zone, using Secure Shell (SSH).Up and down (↑↓) arrow keys scroll through the command history for a given CLI session, and the left and right (←→) arrow keys navigate the current command line. If your terminal keyboard is not equipped with arrow keys, you can use these keyboard equivalents:NOTE:  These keysmay function dif-ferently based on set-tings in your terminalemulation software.  The Tab key auto-completes partial commands sufficient to uniquely identify the command.Mesh Point CLI commands return [OK] when settings are successfully changed and an [Error] message, including a brief description of the error, when commands fail.The clear command clears the CLI display.Lengthy CLI output can be scrolled one screen a time, in most cases, by appending more to the command and then paging through the output with Enter↵ or the space bar. Strike Ctrl-c to truncate scrolled output or to quit an interactive command without making changes.arrow/numeric keypad keyboard equivalentup arrow (↑) Ctrl-udown arrow (↓)Ctrl-dleft arrow (←)Ctrl-lright arrow (→)Ctrl-rHome Ctrl-aEnd Ctrl-e
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access82.1.1 Accessing the Mesh Point CLI via the Serial Console Port NOTE: An RJ-45-to-DB9 adapter(included) is required toconnect the serial Con-sole port to a DB9 termi-nal connection.1Using a null modem cable, connect the Fortress Mesh Point’s Console port to a serial port on a computer.2Start your serial application and, if it is not already at these settings, configure it to use:bits per second: 9600data bits: 8parity: nonestop bits: 1hardware flow control: none2.1.2 Accessing the Mesh Point CLI Remotely NOTE: The MeshPoint does notsupport SSH1.When SSH (Secure Shell) is enabled, you can access the Mesh Point CLI through an SSH2 network connection to the Mesh Point by pointing your terminal emulation application to the Mesh Point’s IP address.SSH is enabled on the Fortress Mesh Point by default. Section 4.1.13 covers disabling and enabling SSH.The Mesh Point provides users with the option to further secure their remote administration path by allowing the SSH session to be routed through an IPsec tunnel. First, the user needs to configure the IPsec environment. This process is described in Section 4.4. After this is complete, the user connects to the Mesh Point using SSH as described in this section. 2.1.3 Logging On and Off the Mesh Point CLI NOTE: Defaultpasswords mustbe changed when theaccount is first used.To log on to the Mesh Point CLI, enter a valid user name and password at the Login and Password prompts.Login: adminPassword:<password>ES-00148c081080-FIPS#The first time an administrator logs on, Fortress's license agreement displays, and you must scroll through and accept its terms to continue. If an administrative logon banner has been configured (Section 2.2.2), you must accept its terms to continue.Three administrative accounts are preconfigured on the Mesh Point, one at each of three possible privilege levels, or defined roles: administrator, maintenance and logviewer. Except for the administrator-level account, which uses admin as the Username and default password, the same strings (maintenance and logviewer) serve as the respective account’s Username and default password. Up to ten usable accounts (including preconfigured accounts) are supported (refer to Section 2.2).
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access9If the administrative account you are logging on to requires the password to be changed, you must do so before you can proceed and then log on again with the new password to gain access through the account.As shown, if the first password entry fails the complexity check, the Mesh Point CLI automatically displays the password requirements in effect on the Mesh Point. Administrative password rules are global and configurable (refer to Section 2.2.1).Login: logviewerPassword:<password>Please enter a new password:<newpassword>Please confirm the new password:<newpassword>The new password does not meet complexity requirementsHistory Depth:                       0Minimum Capital Letters:             0Minimum Lower Case Letters:          0Minimum Numbers:                     1Minimum Punctuation Marks:           0Minimum Differences:                 0Minimum Length:                      12Expires:                             NExpiration:                          60Expiration warning:                  10Force reset to conforming password:  YDisplay previous login:              disableInactivity Timeout:                  10Use Dictionary:                      disableAllow Consecutive Characters:        enableMaxAttempts:                         3LockoutPermanent:                    NLockoutDuration:                     0AccountAuthMethod:                   localAccount:                 enablePlease enter a new password:<newpassword2>Please confirm the new password:<newpassword2>ES-00148c081080-FIPS>If the account you try to log on to has an active administrative session in progress, the Mesh Point queries your intent:ES-00148c081080 Login: adminPassword:Warning! This account already has an active session. Would you like to end the other session or cancel this login? [ endsession | cancel ] endsessionThe command prompt reflects whether the role of the account you are logged on to grants view-only privileges (maintenance and logviewer) or full administrator-level privileges. Accounts with view-only roles use the angle-bracket prompt: >. The hash prompt: # indicates that you are logged on to an administrator-level account.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access10To log off the Mesh Point CLI, use exit or its synonyms:> exit> quit> qThe Mesh Point CLI will time out and exit after a specified period of inactivity (10 minutes, by default), and you must log back in to regain access. This behavior is configurable (refer to Section 2.2.1).2.1.4 Accessing Mesh Point CLI HelpUse the help command (or its synonym, ?) without arguments to obtain a list of valid commands.You can obtain a usage example—and list the command’s valid options with their valid arguments—by entering a basic command without options:> showDescription: Displays system information, configurationUsage: show [args]. Possible args:  account                 Displays account status and security setting  ace                     Displays access control entries  admin                   Displays Admin Users  ap                      Displays Access Points  association             Displays current associations  audit                   Displays audit configuration  auth                    Displays authentication servers  banner                  Displays Welcome banner  blackout                Displays blackout mode status  blocked                 Displays list of blocked MAC addresses  bootimage               Displays boot images  bridgelinks             Displays current WDS bridge links  bridging                Displays bridging mode information  bss                     Displays Basic Service Sets  cachedauth              Displays whether re-authentication is enforced  certificate             Displays X.509 certificates  certificate-revocation  Displays Certificate Revocation Configuration--More-- Help output is displayed one page at a time: --More-- signals that you can scroll additional help output, one screen at a time, by striking any key. You can exit the --More-- scrolling function with Ctrl-C.Help output reflects the administrative privileges of the account currently logged onto by displaying help for only those commands available to the current administrator. So, for instance, if you enter the set command without arguments when logged on to a maintenance-level or logviewer-level account, the Mesh Point CLI returns a command not found message:> set[Error] command not found
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access11Obtain a usage example of command options for interactive commands—and list the option’s valid switches and arguments with a brief explanation of each—by entering help (or its synonym, ?) after the command option: # set network ?Description: Sets network configurationUsage: set network [-enable <y|n>][-h hostname][-ip IP][-nm netmask][-gw defaultGW]-enable y|n: to enable IPv4-h hostname: name (will be shown in prompt)-ip IP: a valid IPv4 address for the interface-nm netmask: mask of network prefix (e.g., 255.255.255.0)-gw defaultGW: IPv4 address of default gateway. To remove: -gw 0.0.0.0For help with non-interactive command options, you can enter the command-option combination without arguments:# set accessidDescription: Sets Access ID from a HEX stringUsage: set accessid default|random|<HexString> [-confirm default|random|<HexString>]  default       Sets to factory default value  random        Sets to an auto-generated pseudorandom value  <HexString>   Sets to a Hex string 16|32 chars (exclude optional colons). Ex: 00:11:22:AA:BB:CC:DD:EE2.1.5 Command SyntaxIn this document, command-line text supplied by the Mesh Point CLI is set in plain (non-bold, non-italic) type. All user input is indicated by bold typeface. The template for the Mesh Point CLI command syntax is shown below:# command option <parameter> -switch req_arg1|req_arg2|req_arg3 -switch opt_arg1|opt_arg2in which you can also note the terminology and punctuation used here to describe command strings and parse input elements:Command refers to the basic operation to be performed (ex., set, show, etc.).Option refers to the configuration element upon which the command will operate (ex., clock, ap, clients, etc.)Parameter refers to a user-supplied variable, (ex., <name>, <IPaddr> (IP address), etc.). Arguments (_arg, above) are additional command inputs. Some arguments are required by the command (req_arg). Others are optional (opt_arg). Multiple arguments must be separated by commas and entered without spaces.Switch refers to the identifier, preceded by a dash (hyphen), for the argument to follow (ex., -ip, -n, etc.) Switches allow permissible arguments to be entered in any combination and order.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access12Angle brackets: indicate variable, user-supplied inputs (parameters and variable arguments), which are also italicized (ex., <sharedkey>, <port1,port2,...>).The absence of angle brackets and italics indicates literal (or fixed) user-supplied input (ex., y|n).Pipes are placed between mutually exclusive arguments (ex., y|n).An ellipse indicates than the argument can include more entries of the same kind (ex., <port1,port2,...>).A hyphen indicates an allowable range; ranges are expressed inclusively (ex., 1–4094)Many of the commands that change Mesh Point configuration settings can be run interactively: when you enter a command with one of its options, the parameters that can be configured through the command display as user-navigable or consecutively presented fields. Refer to the examples given in the instructions below.2.2 Administrative Accounts and Access NOTE: The precon-figured  adminaccount corresponds tothe Crypto Officer role asdefined by FederalInformation ProcessingStandards (FIPS) 140-2Security Level 2.Up to ten usable administrative accounts can be present in the Mesh Point’s local administrator database, used to authenticate administrators with locally configured administrative accounts.View a summary of the local administrator authentication database with show admin:# show adminAdministration Accounts------------- --------Total admin users    3Total administrators 1Total maintainers    1Total log viewers    1By default, three accounts are preconfigured on the Mesh Point, one at each of the three possible privilege levels:administrator accounts have full privileges.NOTE: Providedthe password isnot locked (Section2.2.3), administratorswith  maintenance orlogviewer accountscan change their ownpasswords (Section2.2.4).maintenance accounts have full view-only privileges and can reset connections, reboot the Mesh Point, create support packages, and execute ping and traceroute.logviewer accounts have limited view-only privileges exclusive to the system log, excluding logged configuration information.Only one Administrator-level account can be active on the Mesh Point at one time. Their limited permissions allow multiple Maintenance-level and Log Viewer-level accounts to be active on the Mesh Point at the same time. Only one active
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access13session per administrative account is supported, regardless of Role.You can update administrator accounts, add new accounts and delete any account except for the three preconfigured accounts and (if different) the only remaining account with a Role of administrator (refer to Section 2.2.3).You can reconfigure the Role of any administrative account, including the preconfigured accounts.If you downgrade the role of the Administrator-level account you are currently logged on through, you will be able to finish the session with full permissions. The role change takes effect when you next log on to the account.At least one enabled Administrator-level account must be present on the Mesh Point at all times. You will not be allowed to reconfigure the Role of an Administrator-level account if it is the only such account on the Mesh Point.2.2.1 Global Administrator Settings Password requirements and logon and lockout behaviors are applied globally to locally configured administrative accounts, as are the means by which administrators are authenticated.View the current global administrative settings with show account:# show accountSecurity Settings-----------------History Depth:                       0Minimum Capital Letters:             0Minimum Lower Case Letters:          0Minimum Numbers:                     0Minimum Punctuation Marks:           0Minimum Differences:                 0Minimum Length:                      4Expires:                             NExpiration:                          60Expiration warning:                  10Force reset to conforming password:  NDisplay previous login:              disableUI Session Idle Timeout:             10UI Failed Attempt Time Holddown:     5Use Dictionary:                      disableAllow Consecutive Characters:        enableMaxAttempts:                         3LockoutPermanent:                    NLockoutDuration:                     0AccountAuthMethod:                   localAccountAuthFailback:                 enable
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access14Failures:---------Password changes rejected for history:    0Password changes rejected for complexity: 0Password changes rejected for uniqueness: 02.2.1.1 Password Complexity and ExpirationHistory Depth specifies how many new passwords must be created for administrator accounts before previously used passwords can be reused. Minimums can be set for the numbers of upper- and lowercase letters, numerals, symbols, and differences from the last password that passwords must contain, along with the minimum total number of characters (Minimum Length) required.By default, password expiration is disabled for locally authenticated administrative accounts (Expires: N). When it is enabled (Expires: Y), you can set the password expiration period and configure the Mesh Point to warn administrators (at logon) for a specified number of days in advance of expiration. The password expiration period (Expiration) can be set from 1 to 365 days (the default is 60). The Expiration warning can be set from 0 (zero), which disables the warning, to 365 days (the default is 10). In addition, you can direct the Mesh Point to expire non-conforming passwords as soon as requirements change (Force reset to conforming password: Y, the default) or allow them to persist until the next scheduled expiration (or indefinitely, when scheduled expiration [Expires] is disabled).Unbroken alphabetic strings within administrator passwords can also be checked against a list of known words and checked for numerically or alphabetically consecutive characters (in ascending or descending order) and repeated consecutive characters. Use Dictionary and Allow Consecutive Characters are disabled by default.2.2.1.2 Login, Session and Lockout BehaviorsYou can configure the Mesh Point to display details of the last log on to the account to locally authenticating administrators when they log on: NOTE: The idletimeout setting forlocal administratoraccounts is indepen-dent of timeout settingsfor network users andconnecting devices con-figured on the internalauthentication server(Section 4.5.2).Login: adminPassword:Last logged in at Wed Jul 16 00:54:03 2008Last logged in from address 10.1.1.1Last logged in from console interfaceThe Display previous login feature is disabled by default.By default, administrative accounts time out after ten minutes of inactivity. You can turn the feature off by specifying 0 (zero) for UI Session Idle Timeout, or reconfigure the setting, in minutes, up to 60. UI Failed Attempt Time Holddown
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access15indicates the amount of time to wait before allowing a login after any failed login attempt. NOTE: The lock-out feature appliesexclusively to remotelogon attempts. Admin-istrative access via aphysical connection tothe Console port (Section2.1.1) is never locked.Locally authenticating administrators are permitted a maximum of three failed logon attempts by default, but since permanent lockout and lockout duration are both disabled by default, administrators who exceed the maximum are not locked out. Maximum failed logon attempts (MaxAttempts) can be set from 1 to 9. A non-zero lockout duration (LockoutDuration) will keep the administrator locked out for the specified number of minutes (1 to 60). Alternatively, enabling “permanent” lockout (LockoutPermanent), will keep the account locked until an administrator logged on to an administrator-level account has unlocked it:# unlock admin -name <adminUsername>NOTE: A networkfailure will cause aMesh Point, configuredfor radius administra-tive authentication andwith AccountAuth-Failback enabled,to fail back to the localdatabase of administra-tive accounts, even whenthe server being used isthe internal user authen-tication server.2.2.1.3 Authentication Method and FailbackBy default, the Mesh Point authenticates administrators through the local administrator database (AccountAuthMethod: local)—a designated service running on the Mesh Point itself and separate from the authentication service that the internal RADIUS server can be configured to provide. Alternatively, you can configure the Mesh Point to authenticate administrators through a standard RADIUS server (AccountAuthMethod: radius): either a third-party RADIUS or a Fortress RADIUS server running on a remote Mesh Point or on the current Mesh Point. The services available to authenticate administrators when their authentication method is radius are those configured for the Mesh Point, using the add auth and/or set localauth commands (as described in Sections 4.5.1 and 4.5.2, respectively). An account for the administrator to be authenticated must be present on any RADIUS server(s) used to perform the service (as described, for Fortress RADIUS servers, in Section 4.5.3).NOTE: Authentica-tion failback hasno effect when theadministrator authenti-cation setting is local(the default).When administrator authentication is set to radius, Fortress strongly advises you to leave (or restore) the Mesh Point’s default authentication failback setting of enabled (AccountAuthFailback: enable). This permits the local administrator database to be used to authenticate administrators when no configured external RADIUS server is unavailable. If administrator authentication is set to radius when authentication failback is disabled, and the external service becomes unavailable, all administrators will be locked out of the Mesh Point until the RADIUS server connection has been restored. Authentication failback is enabled by default.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access16To use the internal Fortress RADIUS Server to authenticate administrators:You must execute the commands below in the order given.1Enable the internal authentication server to provide local authentication:# set localauthEnableLocalAuth[N] (Y|N to enable|disable local authentication server): yPort[1812] (Port number to communicate):SharedKey (Authentication key): authkeyPriority (Local server priority [0..999]):RetryInterval (Time in seconds for retrying [1..600]):EnableDevAuth[N] (Y|N to enable|disable Device authentication):EnableUserAuth[N] (Y|N to enable|disable User Authentication):DefaultDeviceState[pending] (pending|allow|deny):DefaultMaxRetries[3] (Maximum attempts at reaching server before failover 1-30, default is 3):DefaultIdleTimeout[30] (User idle timeout in minutes 1-720, default is 30):DefaultSessionTimeout (Authentication timeout in minutes, 1-200, default is 30):EnableAdminAuth[N] (Y|N to enable|disable administrator authentication): yEnable8021xAuth[N] (Y|N to enable|disable 802.1x authentication):EnableEAP-MD5 (Y|N to enable|disable support for EAP-MD5 protocol):EnableEAP-TLS (Y|N to enable|disable support for EAP-TLS protocol):EnableCRLCheck[N] (Y|N to enable|disable CRL check):EnableOcsp[N] (Y|N to enable|disable OCSP):OcspUrl[""] (URL of OCSP responder):EnableOcspNonce[Y] (Y|N to enable|disable OCSP nonce):CaCertUrl[""] (URL of CA certificate or chain):LdapSB[""] (Search base for CA certificate or chain (LDAP only)):TLSCipherSuite (all|legacy|suite-b to set supported cipher suite for EAP-TLS):For help with other set localauth command options, refer to Section 4.5.2.2Verify that authentication failback is at the default setting of enable, and if it is disabled, enable it:# set account -authMethod radius -accountAuthFailback enableFor help with other set account command options, refer to the rest of this section.3Add an account for each administrator you want to be able to authenticate through the internal authentication server:# add userauth -name <admin> -passwd <userpw> -passwordConfirm <userpw>-adminauth administrator|maintenance|logviewerThe password must conform to the password requirements currently in effect. -name must match that of the administrative account for which you are configuring the internal RADIUS account. -adminauth must correctly identify that account’s administrative role.For help with other add userauth command options, refer to Section 4.5.3.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access17To use a remote Fortress RADIUS Serverto authenticate administrators:To use a RADIUS server running on another Mesh Point on the network to authenticate administrators for the current Mesh Point, you must configure an entry for the remote server on the current Mesh Point (with the add auth command). Only administrators with accounts flagged with an -adminauth option on the remote Mesh Point’s internal RADIUS server will be able to authenticate through this service.To use a third-party RADIUS Serverto authenticate administrators:To use a third-party RADIUS server for administrator authentication, it must be configured to use Fortress’s Vendor-Specific Attributes for Fortress-Administrative-Role and Fortress-Password-Expired, provided in the dictionary.fortress configuration file included on the Mesh Point software CD and available for download at www.gdc4s.com. Consult your RADIUS server documentation for information on configuring the service. An entry for the remote server must also be configured on the current Mesh Point (with add auth).Configure all global administrative logon, password and authentication settings for the Mesh Point with the set account command, as follows:# set accountHistory Depth[0] (0-10, default is 0, maximum number of account changes to track):Minimum Capital Letters[0] (0-5, minimum number of capitals in a password):Minimum Lower Case Letters[0] (0-5, minimum number of lower case letters in a password):Minimum Numbers[0] (0-5, minimum number of digits in a password):Minimum Punctuation Marks[0] (0-5, minimum number of punctuation marks in a password):Minimum Differences[0] (0-5, minimum number of character differences in a new password):Minimum Length[15] (8-32, minimum length of a new password):Expires[N] (Y|N, passwords expire after specified duration):Expiration[60] (1-365, number of days before passwords expire):Expiration warning[10] (0-365, number of days before warning that a new password is needed):Force reset to conforming password[Y] (Y|N, force non conforming passwords to expire):Display previous login[disable] (enable|disable, display information on the last session for this user):UI Session Idle Timeout[0] ([0|60] default is 10, UI Session Idle Timeout in minutes):UI Failed Attempt Time Holddown[5] ([0|60] default is 5, time to wait in seconds before a login will be allowed):Use Dictionary[disable] (enable|disable, use the password dictionary):Allow Consecutive Characters[enable] (enable|disable, allow consecutive characters in a new password):MaxAttempts[3] (1-9, maximum number of failed attempts):LockoutPermanent[N] (Y|N, lock this account permanently):LockoutDuration[0] (0-60, lockout time in minutes if not locked permanently):AccountAuthMethod[local] (local|radius, authentication method to use):AccountAuthFailback[enable] (enable|disable, enables or disables authentication failback):
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access18NOTE: Except for -uiInactivityTimeout changes, whichtake effect immediately,changes to globaladministrator settingsare applied at the nextadministrator logon.The Mesh Point CLI displays the configurable fields for set account one at a time. Enter a new value for the field—or leave the field blank and the setting unchanged—and strike Enter↵, to display the next field.Alternatively, you can execute set account non-interactively with valid switches and arguments in any order and combination:# set account -historyDepth 0-10 -minCapitalLetters 0-5 -minLowerCaseLetters 0-5 -minNumbers 0-5 -minPunctuation 0-5 -minDifference 0-5 -minPasswordLength 8-32 -passwordExpires Y|N -passwordExpiration 1-365 -passwordExpirationWarning 0-365  -forceNonConfExpire Y|N -showLastLogin enable|disable -uiInactivityTimeout 0|1-60 -failedAttemptTimeout 0|1-60 -usedictionary enable|disable -allowconsecutivecharacters enable|disable -maxtry 1-9 -lockoutperm Y|N -lockouttime 0-60 -authMethod local|radius -accountAuthFailback enable|disableNOTE: The pass-word complexityrequirements estab-lished with setaccount apply equallyto administrative andlocal user account pass-words (Section 4.5.3).The Mesh Point CLI returns [OK] when settings are successfully changed.You must be logged on to an administrator-level account to change administrative settings (refer to Section 2.2).2.2.2 Administrator Logon Banner You can configure a logon banner of up to 2000 characters for display when administrators log on to the Mesh Point.View the currently configured WelcomeMessage with show banner:> show bannerIf no logon banner is configured, show banner returns no text. No welcome message is configured by default. Enter a single-line message for display on administrator logon screens with set banner. # set banner -welcome <“banner string”> You can configure a longer banner that spans multiple lines using the command set banner -multi. # set banner -multiEnter multiline text (maximum 2000 chars) and press Ctrl-C to exitWhen a banner is configured, administrators must accept its terms in order to log on.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access192.2.3 Individual Administrator Accounts View details of all accounts currently in the Mesh Point’s local administrator authentication database with show admin:NOTE: Defaultpasswords for pre-configured accounts arethe same as their usernames (admin,  main-tenance,  logviewer)and must be changedthe first time theaccount is used.The default configuration, as shown above, includes three locally authenticated administrative accounts, one at each administrative level, as summarized at the beginning of this section (2.2).You can configure up to seven additional accounts to the local administrator database.You can filter show admin output by account type:# show admin -administrators|-maintenance|-logviewersYou can also use show admin to view the same details for a single account:# show admin -name <username>Administration Accounts-------------- --------Total admin users    3Total administrators 1Total maintainers    1Total log viewers    1Username:              adminFull Name:             adminDescription:Role:                  AdministratorState:                 enableLogged In:             YLogged In Since:       Mon Aug  2 22:51:18 2010 UTCCreate Time:           Thu Jul 22 15:15:34 2010 UTCLast Modified:         Thu Jul 22 15:15:34 2010 UTCLast IP:               0.0.0.0Last Logout:           Mon Aug  2 22:45:39 2010 UTCLogin Count:           18Inactivity Logoffs:    13Total PW Fails:        9Number of Kickoffs:    1Consecutive PW Fails:  1Locked:                YPassword Locked:       NPasswordForceChange:   NGUI:                   YConsole:               YSSH:                   Y# show admin -allAdministration Accounts-------------- --------Total admin users    3Total administrators 1Total maintainers    1Total log viewers    1User Name   Full Name   Description Role         State    Logged In Logged In Since          Login Count Inactivity Logoffs Total PW Fails Number of Kickoffs Consecutive PW Fails Locked SSH Audit----------  ----------- ----------- -----------  -------  --------- ------------------------ ----------- ------------------ -------------- ------------------ -------------------- ------ --- --------logviewer   logviewer               logviewer     enable  N         N/A                      0           0                  0              0                  0                    N      Y   requiredmaintenance maintenance             maintenance   enable  N         N/A                      0           0                  0              0                  0                    N      Y   requiredadmin       admin                   administrator enable  Y         Fri Feb  8 11:15:47 2015 3           0                  1              1                  0                    N      Y   required
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access20Audit:                 required2.2.3.1 Adding Administrator AccountsAdd new accounts to the local administrator database with add admin:# add adminUsername (User name): <adminName>State[enable] ([enable|disable] User state): enable|disableFull Name[""] (Account full name): "<full name>"Description[""] (Account description): "<description of account>"Role[Maintenance] ([logviewer|maintenance|administrator]): administrator|maintenance|logviewerPassword Locked[N] ([y|n] Prevent user from changing password):NOTE: You canexit the interac-tive  add admin com-mand without makingchanges with Ctrl-C.PasswordForceChange[N] ([y|n] force user to change password):Password (Password for this user): <adminPassword>Password Confirm (Password for this user): <adminPassword>GUI[enable] ([y|n] Allow user GUI access):Console[enable] ([y|n] Allow user console access):SSH[enable] ([y|n] Allow user CLI access):Audit[required] ([required| prohibited | automatic ] Audit setting):[OK]NOTE: Administra-tor Usernames arecase-sensitive and caninclude spaces and anyof the symbols in theset:~!@#$%^&*()_-+={}[]|\:;<>,.?/ (excludes doubleand single quotationmarks).You must create a unique Username of 1 to 32 characters for the account and configure the State, Role and Password. A disabled account will persist in the database, but cannot be used to log on to the Mesh Point. Account roles are described at the beginning of this section (Section 2.2). Password requirements for local administrative accounts are global and configurable (refer to Section 2.2.1).The Full Name and Description fields are optional, and the double quotation marks are required only when fields contain spaces or special characters (as enumerated in the NOTE to the right).You can enter new values for the remaining fields—or leave a field blank and the setting unchanged by striking Enter↵, to display the next field. These determine whether the account password is locked and cannot be changed (Password Locked: Y) or must be changed the first time the account is used (PasswordForceChange: Y). Both options are disabled by default, and if you enable PasswordForceChange, it will reset to N (disabled) after the account holder has successfully changed the password during initial logon.By default, administrative accounts are created with permission to access the management interface by any means: network access to the Mesh Point GUI (gui) or CLI (cli) and terminal access to the Mesh Point CLI through the front-panel Console port (console). You can selectively disable access to any interface for a given account.Finally, remote audit logging of activity on the account can be configured. By default, audit logging is required, which includes all activity on the account in the audit log. A setting of prohibited excludes all account activity from the audit log. An
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access21Audit setting of automatic causes the account to conform to the global audit logging settings (refer to Section 4.7).Alternatively, you can execute add admin non-interactively with valid switches and arguments in any order and combination:# add admin -name <username> -state enable|disable -fullname <“Full Username”>-desc <“description of account”> -role administrator|maintenance|logviewer -passwordlock Y|N -passwordforcechange Y|N -password <password> -passwordconfirm <password> -gui enable|disable -console enable|disable -ssh enable|disable -audit required|prohibited|automaticThe Mesh Point CLI returns [OK] when settings are successfully changed.NOTE: Changes tothe account youare currently loggedonto will take effect thenext time you log on.2.2.3.2 Updating and Deleting Administrator AccountsOnce an administrative account has been established, you cannot change the user name associated with it. Use the -name switch with the update command to reconfigure the account of the administrator you specify. The same switches and arguments used with add admin (above) can be used to edit other account settings:# update admin -name <username> -state enable|disable -fullname <“Full Username”>-desc <“description of account”> -role administrator|maintenance|logviewer -passwordlock Y|N -passwordforcechange Y|N -oldpassword <oldpassword> -password <password> -passwordconfirm <password> -gui enable|disable -console enable|disable -ssh enable|disable -audit required|prohibited|automatic -endsessionThe -endsession switch, which takes no arguments, can be used only with update admin. It forces a current session of the named administrative account to terminate immediately.NOTE: If a manu-ally added accountis the only account cur-rently configured with arole of administra-tor, del admin -allwill not delete it.You can delete a specified administrator account (except for the three preconfigured accounts and (if different) the only remaining account with a role of administrator). You can also delete all manually added administrative accounts with the del command:# del admin -name <username>|-allYou must be logged on to an administrator-level account to create, update and delete administrative accounts (refer to Section 2.2).2.2.4 Changing Administrative Passwords You can change any password from an administrator-level account, including your own:# update admin -name <Username> -oldpassword <oldPassword> -password <newPassword> -passwordconfirm <newPassword>Provided the password is not locked (refer to Section 2.2.3), administrators with maintenance- or logviewer-level accounts can change their own passwords using the same command options.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access22Password requirement for locally authenticating administrative accounts are global and configurable (refer to Section 2.2.1).If the you are changing the password for the account you are currently logged on through, you will be returned to the Login prompt: re-enter the account username and enter the new password to re-access the Mesh Point CLI.2.2.5 Administrative IP Address Access Control ListNOTE: Pass-through traffic isunaffected by enablingthe administrative IPaddress ACL.If the administrative IP address ACL is enabled, it must include the IP addresses of any device with which the Mesh Point will exchange administrative-level traffic. If the relevant IP addresses are not present on the administrative IP address ACL when the list is enabled, Mesh Point functions that depend on administrative access will not be able to perform the necessary operation. Mesh Point functions that require administrative IP address access include:NOTE: To controlpass-through traf-fic, the user can config-ure packet filtering,described in Section4.6.3.Mesh Point administration - remote log-on to the management interfaceIGMP - incoming multicast (Internet Group Management Protocol) trafficNTP - incoming Network Time Protocol server packetsDHCP - incoming Dynamic Host Configuration Protocol unicast requestsDNS - incoming Domain Name System queries CAUTION: If, whileremotely con-nected, you enableadministrative IP-address access controlwithout first addingyour IP address, yoursession will be termi-nated and the addressblocked until it is addedto the list of permittedaddresses or the func-tion is disabled.IPsec - incoming IKE (Internet Key Exchange) packets from IPsec peersL2TP - incoming Layer 2 Tunneling Protocol trafficRADIUS - incoming traffic from locally authenticating administrators, users, devices, and 802.1X supplicantsOCSP - incoming Online Certificate Status Protocol traffic CRL -  incoming Certificate Revocation List trafficICMP and ICMPv6 - incoming Internet Control Message Protocol packets for IPv4 (ping and traceroute) and IPv6 (neighbor discovery messages, etc.)By default, administrative IP address access control is disabled: administrators can log on remotely from any network IP address, and administrative-level traffic is freely permitted.# show ipacl IP Acl enabled: No IP Address                 Description -------------------------  ----------------------------------------- 192.168.1.47               admin                                      You can configure the Mesh Point to restrict administrative access to a limited set of allowed IP addresses by adding one
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access23or more permitted IP addresses (with optional descriptions) to the IP address access control list and enabling the function:# add ipacl -ip <IPaddress> -desc <Description>[OK]# set ipacl -enable y [OK]You can add additional IP addresses to the permitted list at any time.You can delete a specified IP address or all IP addresses on the list:# del ipacl -ip <IPaddress>|allYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).2.2.6 SNMP Settings  NOTE: SNMPauthentication isalways directed to thelocal authenticationserver. This is thebehavior even ifRADIUS authenticationis enabled.The Fortress Mesh Point can be configured for monitoring through Simple Network Management Protocol (SNMP) version 3. Fortress Management Information Bases (MIBs) for the Mesh Point are included on the Mesh Point CD-ROM and can be downloaded from www.gdc4s.com/fortresssupport.When SNMP v3 support is enabled, the SNMP v3 user (FSGSnmpAdmin) access to the Mesh Point is authenticated via the SHA-1 message hash algorithm as defined in IETF RFC1 2574, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), using the specified authentication passphrase. SNMP v3 privacy is secured via the Advanced Encryption Standard with a 128-bit key (AES-128), using the specified privacy passphrase.SNMP v3 is disabled on the Mesh Point by default.View the current SNMP configuration with show snmp:> show snmp[SNMP Configuration]EnableV3SNMP:   YContact:        <contact>Description:    <description>Location:       <location>EnableTrap:     YEngineID:       <engineID>[SNMP Trap][SNMP Statistics]Total Packets In:    0Total Packets Out:   0----------1. Internet Engineering Task Force Request for Comments
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access24Audit Status:        requiredSNMP is disabled on the Mesh Point by default.To configure SNMP:Configure the Mesh Point’s SNMP settings interactively with set snmp:# set snmpEnableV3SNMP[N] (Y|N to enable|disable Version 3 SNMP): yContact[""] (Name of contact person): <admin@domain.com>Description["Fortress Security Controller"] (System description):Location[""] (Name of location): <locationID>EnableTrap[Y] (Y|N to enable|disable trap):PrivacyPassphrase (Privacy passphrase string): <PrivPassphrase>PrivacyPassphraseConfirm (Confirm privacy passphrase string): <PrivPassphrase>AuthPassphrase (Authentication passphrase string): <AuthPassphrase>AuthPassphraseConfirm (Confirm authentication passphrase string): <AuthPassphrase>ConfiguredEngineID[""] (5 to 32 character SNMP EngineID for this device):NOTE: The SNMPv3 username isFSGSnmpAdmin andcannot be changed.In addition to enabling or disabling SNMP v3, you can enter a contact E-mail address to serve as the SNMP Contact, provide a new Description of the Mesh Point (Fortress Controller, by default) and identify the Location of the Mesh Point. You can optionally enable/disable SNMP traps. If you enable SNMP v3, you must also enter and confirm SNMP v3 authentication and privacy passphrases of 15–32 alphanumeric characters (without spaces).Alternatively, you can use the set snmp command with valid switches and arguments to configure SNMP on the Mesh Point:# set snmp -enable y|n -c <contact> -d <description> -l <location> -trap y|n -authpass <AuthenticationPassphrase> -authpassconfirm <AuthenticationPassphrase>-privpass <PrivacyPassphrase> -privpassconfirm <PrivacyPassphrase> -engineid <IDstring> -defengineidSNMP traps are disabled (n), by default, and no traps will be sent until trap destinations are added to the Mesh Point’s SNMP configuration (below). With -engineid, you can specify a 5–32 character string to serve as an SNMP engine ID to uniquely identify the SNMPv3 agent on the Mesh Point. Use -defengineid by itself to clear a configured SNMP engine ID by restoring the default ID (unique per Mesh Point).To configure SNMP traps When SNMP traps are configured, the SNMP daemon running on the Mesh Point detects certain system events and sends notice of their occurrence to a server running an SNMP management application, the network management system (NMS), or trap destination.
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access25Use the add and del (delete) commands to configure SNMP traps, as follows:NOTE: Fortress’sMIB is availablefor download from: www.gdc4s.com.# add snmptrap -ip <nmsIPaddr> -c “comment for display”configures Fortress Mesh Point SNMP traps to be sent to the SNMP management application on the server at the specified network address and, optionally, appends a comment to be displayed with the trap.SNMP traps are collected and forwarded only when SNMP is enabled (refer to Section 2.2.6).To edit an SNMP trap entry, use the update snmptrap command:# update snmptrap -ip <IPaddress> -c <newComment># del snmptrap -ip <IPaddress>|-allconfigures the Fortress Mesh Point to stop sending SNMP traps to the computer at the specified network address or to all configured SNMP trap addresses.You must be logged on to an administrator-level account to configure SNMP on the Mesh Point (refer to Section 2.2).
Fortress ES-Series CLI Guide: Mesh Point CLI and Administrative Access26
Fortress ES-Series CLI Guide: Networking and Radio Configuration27Chapter 3Networking and Radio ConfigurationCAUTION: AllMesh Points in amesh network must runthe same software ver-sion.3.1 Network InterfacesMultiple Mesh Points can be connected through their wired and/or wireless interfaces to form fixed or mobile tactical mesh networks and to bridge or extend the reach and availability of conventional hierarchical networks.NOTE: IncomingIGMP (InternetGroup ManagementProtocol) and MulticastListener Discovery(MLD) multicast trafficrequires administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includethe relevant IPaddresses. See Section2.2.5 for more detail.Traffic is also affectedby the per-interfacepacket filters. If config-ured, per-interfacepacket filters mustinclude filters to permitIGMP and MLD trafficto and from the FMP.See Section 4.6.3 formore detail.Different models of Fortress Mesh Point chassis feature varying numbers of user-configurable Ethernet ports. Fortress Mesh Points can be additionally equipped with one to four independent internal radios supporting various capabilities defined in the IEEE (Institute of Electrical and Electronics Engineers) 802.11-2007 standard, or with no radios. On each radio internal to a Mesh Point, up to four independent wireless interfaces, or Basic Service Sets (BSSs), can be configured. The maximum number of bridging BSSs supported on any Mesh Point is eight, even on a four-radio ES2440. The single-radio ES210 can support of a maximum of four BSSs without regard to their function. Alternatively, an ES210 Mesh Point can be dedicated to act as a wireless client by configuring a single station (STA) interface on its single internal radio.Compare your Mesh Point’s model number to Table 3.1 on page 38 to determine the number of Ethernet ports with which the Mesh Point you are configuring is equipped and the number and type(s) of radio(s) installed in it.Fortress Mesh Point radios can connect to the radios of remote Fortress Mesh Points to form mesh networks and, on separate BSSs, serve as access points (APs) or access interfaces to connect compatibly configured wireless devices to a wireless LAN (WLAN) or to an FP Mesh access network. On Mesh Points with more than one radio, the higher power radio(s) dedicated to the higher frequency band (5 GHz, standard equipment, or 4.4 GHz) will generally be the better choice for network bridging (or backhaul) links. In Mesh Points with two radios (ES520, ES820 and dual radio ES2440s),
Fortress ES-Series CLI Guide: Networking and Radio Configuration28these are Radio 2. In a four-radio ES2440, Radio 2, Radio 3 and Radio 4 are all in this category. In Fortress Mesh Points equipped with any number of radios, the standard-equipment Radio 1 is a dual-band 802.11a/g (or 802.11a/g/n) radio. Radio 1’s 802.11g capability typically indicates its use to provide wireless access to devices within range.You can configure the Mesh Point's network interfaces to meet various deployment and security requirements. Ethernet port configuration is covered in Section 3.9. Creating and configuring radio interfaces are described in Section 3.3 and Section 3.4.3.2 Network Bridging Each Mesh Point can maintain simultaneous network links with up to 100 other Mesh Points, so that up to 101 directly linked Fortress Mesh Points can be present on a given network. Many more Mesh Points can belong to a more widely deployed mesh network encompassing nodes linked indirectly through other nodes. Networked radios must: use the same radio frequency band (Section 3.4)be set to the same channel (Section 3.4)The BSSs that comprise the network must:be enabled for bridging (Section 3.4.9)be configured with the same SSID (Section 3.4.9)By default, the Mesh Point can manage bridging links and route network traffic using Fortress’s FastPath Mesh (FP Mesh) tactical mobile networking. Alternatively, Spanning Tree Protocol (STP) can be used for mesh link management. However, STP is being deprecated in this release and will no longer be a configurable option in subsequent releases. Fortress strongly recommends using FP Mesh.Both protocols enable the deployment of self-forming, self-healing secure networks, and both prevent bridging loops while providing path redundancy. STP prevents network loops by selectively shutting down some mesh network links.FastPath Mesh maintains the availability of every mesh connection and additionally provides optimal path routing of network traffic, along with independent IPv6 mesh addressing and DNS (Domain Name System) distribution functions to support the FP Mesh network and user controls to configure and tune it.
Fortress ES-Series CLI Guide: Networking and Radio Configuration29On certain model Mesh Points (ES820-35, ES2440-35, ES2440-3555, ES2440-3444 and ES2440-3444m), FastPath Mesh also permits multiple internal radios to be combined into a single virtual FastPath Mesh bridging radio using a common channel (refer to Section 3.3.5 for more detail).Supported FastPath Mesh and STP network topologies are illustrated and described in detail in the Introduction to the Fortress Mesh Point Software GUI Guide.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.2.1 Bridging ConfigurationCAUTION: In orderto prevent bridg-ing loops (multiple OSI[open systems intercon-nection] layer 2 paths tothe same device), youmust use -mode stp or-mode mesh on net-worked Mesh Points.The Mesh Point uses FastPath Mesh bridging by default. STP is available if enabled on the Mesh Point. View the current bridging configuration with show bridging. The output varies based on the type of bridging that is enabled. With FastPath Mesh enabled, the show bridging output shows the subnet ID and zone (encrypted or clear), as well as the Mobility Factor, Cost Parameters (described below) and Configured values. > show bridgingmesh: enabled      subnetId: 0x8895      zone: encryptedstp: disabledMobility Factor:  10Cost Parameters:'a' Cost Value: 1'b' Cost Value: 1Configured values:   mode: mesh   subnetId: 0x8895   zone: encryptedWith STP enabled, the show bridging output shows the bridge priority and Mesh Point name, as well as the Mobility Factor and Cost Parameters (described below) and Configured values.> show bridgingmesh: disabledstp:  enabled      priority: 49152      name: br0Mobility Factor:  10Cost Parameters:'a' Cost Value: 1'b' Cost Value: 1Configured values:   mode: stp
Fortress ES-Series CLI Guide: Networking and Radio Configuration30If you are certain that connected Mesh Points are physically configured so that no possibility exists of a bridging loop forming, you can disable bridging link management by setting the bridging mode to off. # set bridging -mode offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.2.2 FastPath Mesh Bridging NOTE: WhenVLANs are usedin FP Mesh bridgingdeployments, all Coreinterfaces  must be con-figured as VLAN trunkports (refer to Section3.9).Nodes on a FastPath Mesh network are of two basic types:FastPath Mesh Point (FPMP) - a Fortress Mesh Point with FastPath Mesh enabledNon-Mesh Point (NMP) - any node that is not an FPMPFP Mesh nodes can connect over their Ethernet ports or radio BSSs. An FP Mesh interface must be configured for the type of connection it provides:NOTE: An ES210 inSTA (wireless cli-ent) mode (Section3.4.11) does not supportFP Mesh bridging, butcan function, like otherwireless devices, as anNMP.FPMPs connect to other FPMPs only on Core interfaces. NMPs connect to FPMPs only on Access interfaces A given interface can be of only one type. Each interface on a FastPath Mesh Point can therefore be used either to connect NMPs to the network or to bridge to other FPMPs in the network, but a given interface cannot serve both functions at once.You can enable FP Mesh bridging with set bridging:# set bridging -mode meshNOTE: Afterchanging thebridging mode, youmust reboot the MeshPoint.You can also use set bridging or add mesh to configure the rest of the settings for FP Mesh bridging, described below.FastPath Mesh Subnet ID and ULAWhen FP Mesh is enabled, a Unique Local IPv6 Unicast Address (a.k.a. unique local address, or ULA), as defined in RFC-4193, is generated for the Mesh Point, in the format:| 7 bits |1|  40 bits   |  16 bits  |          64 bits           |+--------+-+------------+-----------+----------------------------+| Prefix |L| Global ID  | Subnet ID |        Interface ID        |+--------+-+------------+-----------+----------------------------+Prefix - FC00::/7 identifies the address as a Local IPv6 unicast addressL - 1 indicates that the prefix is locally assigned.Global ID - pseudo-randomly allocated 40-bit global identifier used to create a globally unique prefixSubnet ID - 16-bit subnet identifierInterface ID - 64-bit Interface ID
Fortress ES-Series CLI Guide: Networking and Radio Configuration31The ULA is not configurable. You can use set bridging to enter a specific 16-bit hexadecimal subnet identifier. The default is 0x8895. # set bridging -mode mesh -s <subnetIdInHex>FastPath Mesh ZoneUse the -zone parameter to indicate whether FP Mesh network traffic will pass in the clear zone or the encrypted zone:# set bridging -mode mesh -zone clear|encryptedPlacing the network in the encrypted zone globally enables end-to-end Fortress’s Mobile Security Protocol (MSP) for the FP Mesh network. The Mesh Point Core interfaces used to form the network must be configured to reside in the same -zone as the FP Mesh network overall (refer to Section 3.9).You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).Cost parametersCAUTION: Thedefault cost equa-tion values are normallyoptimal for FP Mesh. Ill-considered changes caneasily affect networkbehavior adversely.You can rebalance how the FP Mesh network computes the throughput and latency costs of available data paths by specifying new values for a and/or b in the FP Mesh cost equation:cost = a *(1/CLS) + b*(Q/CLS) + U...in which:CLS - (Current Link Speed) is the time-averaged link speed, as measured in bits per second.Q - is the time-averaged current queue depth, as measured in bits.U - is the user defined per-interface cost offset, which allows you to configure one link to be more costly than another. Any non-negative integer between 0 (zero) and 4,294,967,295 can be defined (for configuration information, refer to Section 3.4.9.11 for wireless and Section 3.9 for Ethernet interface controls).a and b - are user defined constants, corresponding to throughput and latency, respectively. Any non-negative integer between 0 (zero) and 65,535 can be defined. The default for each is 1.Define new throughput and latency values with set bridging -cost-parameters -a and -b, where the aValue is the throughput cost weighting factor and the bValue is the latency cost weighting factor. As a rule, a higher aValue improves overall throughput, while a higher bValue, reduces latency.
Fortress ES-Series CLI Guide: Networking and Radio Configuration32# set bridging -cost-parameters -a <aValue> -b <bValue>3.2.2.1 Multicast SnoopingWhen the bridging mode is configured to be mesh, the Mesh Point automatically snoops IGMP and MLD multicast protocols in order to provide a better multicast experience for the Non-Mesh Points (NMPs) it supports. The Mesh Point may also be configured to subscribe to a multicast group on behalf of an NMP. This is useful in cases where the NMP does not use IGMP or MLD.If VLANs are enabled on the FastPath Mesh Point (refer to Section 3.11), you must associate each multicast group subscription with the VLAN used for multicast traffic. To do this, you must subscribe by specifying the appropriate VLAN ID, in addition to the Mesh Access interface for the stream. If a VLAN ID of 0 is specified, the multicast group subscription will be applied when VLANs are disabled.Observe the multicast groups to which the MP is currently subscribed (whether learned or configured) with show:> show mesh -multicast-groupsVLAN ID: 1, MAC Address: 33:33:00:00:00:fb   IP Address: FF02:0:0:0:0:0:0:FB     Interface: Ethernet1, vifIndex:3                Listener(Learned)VLAN ID: 1, MAC Address: 33:33:00:00:49:49   IP Address: Not Available     Interface: eth0, vifIndex:6                Talker(Learned)VLAN ID: 1, MAC Address: 33:33:ff:30:d7:c0   IP Address: FF02:0:0:0:0:1:FF30:D7C0     Interface: eth0, vifIndex:6                Listener(Learned)NOTE: Only wire-less BSSs config-ured as Mesh Accessinterfaces can be usedfor multicast group sub-scription. Do not specifya Mesh Core interface.To subscribe to a multicast group, use the add mesh command. Identify the FP Mesh interface (-interface) by specifying the wired Interface name or wireless BSS name for the stream and specifying the multicast address for the group by MAC or IP address. FPMPs can subscribe as multicast listeners, talkers or both. If VLANs are configured and enabled on the FPMP, enter a VLAN ID for the multicast group:# add mesh -multicast-group -ip <IpAddress>|-mac <MacAddress> -interface <InterfaceName>|-bss <BssName> -vlan <vlanID> -mode listener|talker|bothYou can force the MP to leave a configured multicast group with the del mesh command:# del mesh -multicast-group -ip <IpAddress>|-mac <MacAddress> -interface <InterfaceName>|-bss <BssName>
Fortress ES-Series CLI Guide: Networking and Radio Configuration33You can change the multicast group subscriptions with the update mesh command:# update mesh -multicast-group -ip <IpAddress>|-mac <MacAddress> -interface <InterfaceName>|-bss <BssName> -vlan <vlanID> -mode listener|talker|bothYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).NOTE: The For-tress Mesh Rout-ing Protocol auto-matically calculates theneighbor cost based onthe quality of the link.Overriding a neighborcost injudiciously cancause disruption to theentire mesh network.Do not configure neigh-bor cost overridesunless you are workingwith Fortress technicalsupport to troubleshoota problem.3.2.2.2 Configuring Neighbor Cost OverridesThe cost of reaching a neighbor node (another Mesh Point directly linked to the current MP) on an FP Mesh network is the cost associated with the Mesh Core interface used to reach the node. You can override the interface cost for a particular neighbor by specifying a fixed cost for that node, with -nbrcost cost, followed by an integer between 1 and 4,294,967,295. The higher the cost value, the less likely the neighbor will be used to route network traffic.Alternatively, you can configure the interface, with -nbrcost maxreach, to be used to reach the specified neighbor node only as a last resort, if no other path is available, or to never be used, with -nbrcost unreach.# add mesh -nbrcost cost <1..4294967295>|maxreach|unreach -mac <MacAddress>|-ip <IpAddress>|-name <NodeName> -interface <InterfaceName>|-bss <BssName>NOTE: A node isassumed to haveonly one IPv6 uniquelocal address. If differ-ent costs are configuredfor the same neighborby more than one IPv6address, applied cost isunpredictable.Specify a given neighbor’s cost override value by MAC address (-mac), IP address (-ip), or node name (-name). Specify an Ethernet -interface or wireless -bss by the name associated with it.You can update the cost override with the update mesh command:# update mesh -nbrcost cost <1..4294967295>|maxreach|unreach -mac <MacAddress>|-ip <IpAddress>|-name <NodeName> -interface <InterfaceName>|-bss <BssName>Remove a neighbor cost override for a specific MAC address, IP address, or node name; for a specific Interface name or BSS name; or use -all to remove all the cost overrides with the del command: # del mesh -nbrcost {-mac <MacAddress>|-ip <IpAddress>|-name <NodeName>}|{-interface <InterfaceName>|-bss <BssName>}|-allYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.2.3 Fine-tuning FastPath Mesh Network PerformanceThe Mesh Point CLI provides set mesh commands for fine-tuning the network performance of the FastPath Mesh network. Available network performance settings include:
Fortress ES-Series CLI Guide: Networking and Radio Configuration34Multicast transmit modePacket intervalTransmit controlClamping of multicast videoMesh routing reactivityPacket time to live valueFrame processor mode3.2.3.1 Selecting the FastPath Mesh Multicast Transmit Mode NOTE: Do notchange the Multi-cast Transmit Modeunless you are workingwith Fortress technicalsupport to troubleshoota problem.The multicast transmit mode determines how multicast packets are transmitted over radio interfaces. Specify the multicast transmit mode with the set command: # set mesh -multicastmode auto|reliable|efficient When set to auto, the multicast mode is determined automatically. When there is more than one neighbor with an interested listener behind it, packets are transmitted in efficient mode. Otherwise, reliable mode is used. Auto is the default multicast mode.When the multicast mode is reliable, multicast packets are transmitted reliably (that is, multicast packets are transmitted with the reliability associated with the transmission of 802.11 unicast frames). Each multicast packet is duplicated over every MRP (Mesh Radio Port) connection. The bandwidth consumed by multicast packets in this mode is at least ‘n’ times the bandwidth consumed in the ‘efficient’ mode, where n is the number of MRP connections.When multicast mode is efficient, multicast packets are transmitted on a best-effort basis (that is, multicast packets are transmitted with the reliability associated with the transmission of 802.11 multicast frames). A single copy of each multicast packet is placed on the air. 3.2.3.2 Setting the FastPath Mesh Packet Interval NOTE: Do notchange the PacketInterval unless you areworking with Fortresstechnical support totroubleshoot a problem.The FP Mesh packet interval is the time interval in milliseconds between sending mesh routing protocol control packets. The default is auto. Specify a packet interval in milliseconds with the set mesh command:# set mesh -packetinterval auto|<100..4000>In an FP Mesh network with 10 or fewer neighbors, the mesh responds more quickly to changes with a smaller packet interval. In an FP Mesh network with more than 20 neighbors, small packet intervals are impractical due to performance restrictions. An interval of 600 ms is practical for a mesh network where a node may have as many as 39 neighbors.
Fortress ES-Series CLI Guide: Networking and Radio Configuration35NOTE: Do notchange the Trans-mit Control settingunless you are workingwith Fortress technicalsupport to troubleshoota problem3.2.3.3 Setting the FastPath Mesh Transmit Control LevelThe FP Mesh transmit control setting determines the resiliency level used for the transmission of control packets. This setting balances the trade-off between the resiliency of the control packet versus the air time consumed to send the routing update. Specify the transmit control level with the set mesh command: # set mesh -transmitcontrol auto|aggressive|moderate|conservative|ultra-conservativeSetting the level to aggressive sends control packets in the most efficient but least reliable way; ultra-conservative sends control packets in the most reliable but least efficient way. The default is auto.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.2.3.4 Setting Multicast Video Clamping Thresholds Multicast video is particularly challenging in a wireless environment due the amount of data transmitted over the shared wireless channel. A video stream can affect data between other stations, and in turn be affected by other traffic on the channel. In addition, video codecs are highly sensitive to packet loss, which is common with multicast traffic due to the lack of delivery retries. Even a .5–1% loss of packets can render an MPG2 video unwatchable.If the Mesh Point tries to stream video over a low-quality link (low signal strength, or slow data rate), the video traffic can clog the channel and use much of the bandwith, while the video received is of no benefit. Multicast clamping enables you to tune your network to prevent multicast traffic from being sent over low-quality links. You can essentially “clamp” the multicast stream when the Mesh Point detects that the signal strength and bit rate are inadequate to carry multicast video traffic. Use set mesh with the -rssi and -rate options to define the Received Signal Strength Indicator (RSSI) and bit-rate thresholds (in dBm and Mbps, respectively) at which clamping takes effect. Multicast clamping is disabled (off) by default. Once enabled, the Mesh Point will stop sending multicast traffic whenever the link quality drops below either of the specified thresholds. When the link quality improves by 5 dBm beyond the lower limits, the node will resume sending IPv4 multicast traffic. # set mesh -rssi <dBmValue> -rate <MbpsValue>You can supply threshold values for both -rssi and -rate or for only one parameter.
Fortress ES-Series CLI Guide: Networking and Radio Configuration36To determine where to set rssi and rate limits, consider the video stream’s bit rate, the number of streams, other traffic, and so on. For example, Fortress recommends an RSSI floor of -80 dBm and bit-rate floor of 12 Mbps for a single, 3-Mbps video stream sent to a cluster of four receivers. # set mesh –rssi -80 –rate 12It is not necessary to continually change clamping mode values if RSSI is near the set limit. The value set by –rssi is subject to dampening in cases where the link’s RSSI changes quickly. Clamping will be activated if the RSSI goes below the value set by –rssi, and the node will not resume transmitting unless the RSSI climbs by 5dBm. This provides a buffer so that the system does not act too quickly on nominal changes, and increases tolerance to rapid changes.Multicast clamping applies only to IPv4 multicast addresses that are not treated as broadcast, per RFC 4541. Multicast addresses that follow the format X.0.0.Y or  X.128.0.Y, where X is in the range 224–239 (inclusive), and Y is in the range 1–255 (inclusive), are treated as broadcast, and therefore are not affected by multicast clamping. For example, the IPv4 address 224.0.0.1 would not be affected by this setting. Unaffected addresses can be assigned to low bit-rate multicast traffic, such as text, to ensure that such traffic continues to flow even while the higher bit-rate video is being clamped.3.2.3.5 Setting Mesh Routing ReactivityFastPath Mesh network deployments must balance the stability of the network against its reactivity to changes in network topology. Reactivity permits the network to quickly detect and adjust to topology changes with minimal network traffic disruption. Stability allows the network to filter out unnecessary topology changes to provide optimized throughput. Three levels of reactivity can be configured on the Mesh Point. # set mesh -reactivity least|medium|mostThe least reactivity is appropriate for stationary FastPath Mesh network and for large deployments of 30 or more nodes. A mobile deployment should use the most reactive setting (the default). The medium setting offers a compromise between stability and reactivity.3.2.3.6 Setting Mesh Packet Time To LiveIn a highly-interconnected FastPath Mesh network deployment, it is possible to have many different routing paths of approximately equal preference between any two nodes. In this situation, mesh’s fast routing changes may result in a
Fortress ES-Series CLI Guide: Networking and Radio Configuration37temporary transient routing loop. In those special deployments, the protocol can suppress the loop more quickly if the Mesh Time To Live (TTL) is set. The default for the TTL is four hops, which is optimal for a large full-connected mesh and acceptable for many other deployments.In contrast, if the Mesh network deployment is a chain of hops with no alternate routing paths, change the setting to be the number of hops in the longest optimal routing path, plus 2.To disable TTL checking, set the TTL to off or 0.Specify the TTL setting with the set mesh command:# set mesh -ttl off|0-153.2.3.7 Viewing Current Mesh Performance ParametersView current mesh performance parameters with show:# show mesh Mesh is enabledRFC 4193 ULA: FD00:0:8895:8895:214:8CFF:FE2A:1C00Subnet Id: 0x8895Mesh Transmit Control: autoMesh Reactivity: mostMesh Time to Live: 4Mesh Multicast RSSI clamp: -80 dBmMesh Multicast rate clamp: 12 MbpsMesh Multicast Mode: autoMesh Control Packet Interval: auto3.2.3.8 Frame Processor ParametersThe Frame Processor mode should always be set to responsive (the default) when FastPath Mesh is enabled. This setting should only be changed under the direction of Fortress technical support personnel. Establish frame processor parameters with set fp -mode.# set fp -mode responsive|performanceView current frame processor mode settings with show fp:# show fpMode: responsive3.2.4 STP Bridging NOTE: STP Bridg-ing Mode isincompatible with theMesh Point’s VLANfunction (see Section3.11).STP bridging is being deprecated in this release and will no longer be a configurable option in subsequent releases. Fortress therefore recommends using FastPath Mesh, which is the default setting.When STP is used for link management, the Fortress Mesh Point can connect to other Fortress Mesh Points to form mesh networks and, on separate BSSs, simultaneously serve as
Fortress ES-Series CLI Guide: Networking and Radio Configuration38access points (APs) to connect compatibly configured wireless devices to a wireless LAN (WLAN).FastPath Mesh is the default bridging mode.In addition to enabling/disabling STP with the -mode switch, you can use -p to set the priority number at which the Mesh Point will be used as the root switch in the STP configuration. The Mesh Point with the lowest priority number on the network serves as STP root. The default is 49152. Configure Bridging with set bridging:NOTE: Afterchanging thebridging mode, youmust reboot the MeshPoint.# set bridging -mode stp -p 0...65535You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).View current STP bridging settings using the command show stp.# show stp BridgeID EnableSTP BridgePriority-------- --------- --------------br0      1         491523.3 Global Radio Settings Global settings apply to all radios internal to the Mesh Point. Different Fortress Mesh Point models can be variously equipped with one to four independent internal radios supporting various 802.11 capabilities, or with no radios. Table 3.1 Fortress Mesh Point Model Radiosseriesbasic model # of radios radio label standard equipment default band standard model # 4.4GHz option 4.4 GHzmodel #ESES2440a4Radio 1 802.11a/g/n 802.11gES2440-3555bno ES2440-3444borES2440-3444mbRadio 2–Radio 4 802.11a/n 802.11a yes2Radio 1 802.11a/g/n 802.11gES2440-35bno ES2440-34orES2440-34mRadio 2 802.11a/n 802.11a yes0n/a ES2440-0 n/aES820 2Radio 1 802.11a/g/n 802.11gES820-35bno ES820-34Radio 2 802.11a/n 802.11a yesES520 2Radio 1 802.11a/g 802.11g ES520-35 no ES520-34Radio 2 802.11a 802.11a yesES210 1Radio 1 802.11a/g/n 802.11a ES210-3 yes ES210-4a. All standard-equipment (802.11a/g/n and 802.11a/n) ES2440 radios support MIMO (Multiple-Input Multiple-Output); MIMO-capable 4.4GHz radios are optional, as indicated by the final “m” in these 4.4 GHz model numbers. (Enable MIMO through the Mesh Point CLI, as described in the CLI Guide.)
Fortress ES-Series CLI Guide: Networking and Radio Configuration39Compare your Mesh Point’s model number to Table 3.1 above to determine the number of and type of radio(s) with which the Mesh Point you are configuring is equipped. Use show device (refer to Section 6.1) to view the model number and other system information.NOTE: ES210 MeshPoint BSS and STAfunctions are mutuallyexclusive.Each radio installed in a Fortress Mesh Point can be configured with up to four BSSs, which can serve either as bridging interfaces networked with other Fortress Mesh Points or as access interfaces for connecting wireless client devices. A maximum total of eight bridging-enabled BSSs can be present on multi-radio Mesh Points: a hardware constraint in dual radio models, but a maximum that must be user-imposed on a four-radio ES2440. Refer to Section 3.4.9 for details on radio BSS configuration. When ES820-35, ES2440-35, ES2440-3555 and ES2440-3444 model Mesh Points are enabled for FastPath Mesh bridging, their internal radios can instead be configured, in twos or threes (depending on the model), to use a single channel and act as a single virtual bridging radio with improved coverage and/or mobility.Alternatively, an ES210 Mesh Point can be dedicated to act as a wireless client by configuring a single station (STA) interface on its single internal radio. Refer to Section 3.4.11 for details on radio STA configuration.3.3.1 Country Code and Regulatory AuthoritiesThe available and default Country Code depends on the area license in effect on the Mesh Point:United States (US) - is the only available Country Code when the Mesh Point is licensed to operate in the United States, the default.Public Safety (PS) - is the only available Country Code when the Mesh Point is licensed to operate in the 4.9 GHz frequency band, reserved for official public safety transmission in the United States.Argentina (AR) - is the default Country Code when the Mesh Point is licensed to operate outside of the United States: a World area license permits you to select from a list of 123 countries, excluding the United States and Public Safety Country Codes described above.Refer to Section 5.6 for information on obtaining a new area license and installing it on the Mesh Point.To allocate bandwidth and prevent interference, radio transmission is a regulated activity, and different regulatory authorities specify hardware configurations and restrict the b. Channel Sharing, combining multiple radios in a virtual bridging radio, option available with FastPath Mesh.
Fortress ES-Series CLI Guide: Networking and Radio Configuration40strength of signals broadcast on particular frequencies according to different rules.If necessary, the Mesh Point filters options available for individual radio settings (Section 3.4) according to the requirements of the relevant regulatory domain as they apply to the Mesh Point’s internal radios.In order to comply with the requirements of the relevant regulatory domain, the Country code must accurately identify the country in which the Mesh Point will operate or, in the case of the US Public Safety code, the context in which it will be used. The rules of the Federal Communication Commission (FCC) regulatory domain dictate available radio settings in the 5 GHz 802.11a and the 2.4 GHz 802.11g frequency bands in the United States.The 4.4 GHz - 4.9 GHz frequency range is regulated by the United States National Telecommunications and Information Administration (NTIA). Use of 4.4 GHz radios in the U.S. without government approval is strictly forbidden. View the country currently specified with show country:> show country USThe help output for set country provides the country codes for all countries that can be specified.# set countryUsage: set country CountryShortName[US]Possible Countries:US     United StatesNOTE: Changingthe  Country Coderequires you to rebootthe Mesh Point (see Sec-tion 5.2).Establish the Mesh Point’s country of operation with set country:# set country <CountryCode>The US is specified by default.3.3.2 Environment Setting NOTE: Contactyour Fortress rep-resentative about inter-national and specializedlicensing options.Mesh Points in the U.S. are restricted to outdoor use. The setting is therefore fixed on outdoor on Mesh Points licensed for U.S. operation (the default), and the set environment command cannot be used.You can, however, view the environment setting with show environment:> show environmentoutdoor
Fortress ES-Series CLI Guide: Networking and Radio Configuration413.3.3 Unit of Distance MeasureMesh Point radios are individually configured for the distance over which they transmit and receive (refer to Section 3.4). The unit used to measure the specified distance is itself a globally configured setting.View the unit of measure currently specified with show unit:> show unitmetricEstablish the unit of measure for Mesh Point radio distance settings with set unit:# set unit english|metric When metric is specified (the default), the Mesh Point sets distances in kilometers. When english is specified, the Mesh Point sets distances in miles.3.3.4 Radio Frequency KillOn all radio-equipped platforms other than the ES820, the RF kill function simply turns the radio(s) installed in the Mesh Point off (Enabled) and on (Disabled).NOTE: Refer to theES820 Vehicle MeshPoint Hardware Guide,Specifications for the37-Pin Input/Output Con-nector, for more informa-tion on the RF Kill toggleswitch.On the ES820, Kill All RF behavior depends upon the physical state of its RF Kill latch/toggle switch:On ES820 Mesh Points, the current state of the RF Kill hardware toggle is displayed (view-only) in the Mesh Point GUI, beside the Kill All RF setting.The default RF kill setting on all platforms is Disabled, in which state the Mesh Point receives and transmits radio frequency signals normally. Use set rfkill to enable or disable the RF kill function. # set rfkill disable|enableView the current RF Kill setting with show rfkill. # show rfkillDisabledYou can also enable/disable RF kill through Fortress Mesh Point chassis controls (refer to the Fortress Hardware Guide for the Mesh Point you are configuring).Kill All RF SW Setting RF Kill HW Toggle RF Killed?Disabled Disabled/Off NoDisabled Enabled/On YesEnabled Disabled/Off YesEnabled Enabled/On Yes
Fortress ES-Series CLI Guide: Networking and Radio Configuration423.3.5 Channel Sharing NOTE: The channelsharing functionis absent from CLI setoptions and show radiooutput on Mesh Pointsthat do not support it.On ES820-35, ES2440-35, ES2440-3555, ES2440-3444 and ES2440-3444m model Mesh Points that are enabled for FastPath Mesh bridging (described in Section 3.2.2), you can combine certain of their internal radios into a single virtual bridging radio by enabling channel sharing.In certain deployments, such virtual channel-sharing radios can provide superior coverage and/or mobility for network bridging links.NOTE: Changingsharing requiresyou to reboot the MeshPoint (see Section 5.2).Channel sharing is disabled by default.When channel sharing is enabled on dual radio Mesh Points that support the function (the ES820-35 and ES2440-35), Radio 1 and Radio 2 are combined to form a single virtual radio, configured with a single set radio command set. When channel sharing is enabled on four-radio Mesh Points that support it (the ES2440-3555 and ES2440-3444), Radio 2, Radio 3, and Radio 4 are combined in this way.Because a virtual radio created through channel sharing is configured through a single set radio command set, identical configuration parameters are applied simultaneously to all of the radios included in the virtual radio.NOTE: A virtualradio createdthrough channel shar-ing can be used only fornetwork bridging.Like their common radio settings, the single bridging BSSs configured on radios combined through channel sharing must be identically configured. To facilitate this, when you add a new BSS to the virtual radio, the BSS is replicated automatically on each of the radios that comprise the channel-sharing virtual radio. Any subsequent changes to this virtual combined BSS will likewise be extended to the configurations of each actual BSS that comprises it.Channel sharing is limited to Unlicensed National Information Infrastructure (UNII)-3 channels in the 5 GHz-band: 149–165, when not on a 4.4 GHz radio.View the current sharing setting with show sharing. # show sharingDisabledThe default channel sharing setting on all platforms is Disabled, in which state Mesh Point radios function independently. Use set sharing to enable or disable channel sharing on Mesh Point radios. # set sharing disable|enableAs command output informs you, you must reboot the Mesh Point in order for a change to channel sharing to take effect.# set sharing enabled[OK] This change will not take effect until the system is rebooted.# reboot
Fortress ES-Series CLI Guide: Networking and Radio Configuration43Confirm: Reboot device now? [Y|N] y3.4 Individual Radio Settings View the current settings for the Mesh Point’s radio(s) with show radio. Mesh Points with more than one radio display each radio’s configuration information separately:> show radioRadioName:       radio1AdminState:      disableRadioBand:       802.11gChannelToUse:    1Distance:        1NetworkType:     PtMPAntennaGain:     9ShortPreamble:   enableBeaconInterval:  100NoiseImmunity:   disableChannelLock:     disableChannelScan:     enableReunification:   enableLonelyNode:      enableTimeout:         300IgnoreRequest:   disableTransmitPower:   autoOper Status:     downChan Number:     0Chan Frequency:  0 KHzChan Width:      0 MHzChan Max TPO:    0 dBmChan Max EIRP:   0 dBmChan TX Power:   0 dBmRF Kill:         Disabled------------------------------------RadioName:       radio2AdminState:      disableRadioBand:       802.11aChannelToUse:    149Distance:        1NetworkType:     PtMPAntennaGain:     9BeaconInterval:  100NoiseImmunity:   disableChannelLock:     disableChannelScan:     enableReunification:   enableLonelyNode:      enableTimeout:         300IgnoreRequest:   disableTransmitPower:   autoOper Status:     downChan Number:     0Chan Frequency:  0 KHzChan Width:      0 MHzChan Max TPO:    0 dBmChan Max EIRP:   0 dBmChan TX Power:   0 dBmRF Kill:         Disabled
Fortress ES-Series CLI Guide: Networking and Radio Configuration44As described for Channel Sharing (Section 3.3.5, above), multiple Mesh Point radios can be combined to form a single virtual radio. The settings of radios combined in this way are still shown separately in show radio output. The channel sharing state of Mesh Points that support is included in show radio output (Chan Sharing: Enabled), and radios that make up a channel-sharing virtual radio are shown to have identical settings.# show radioRadioName:       radio1AdminState:      disableRadioBand:       802.11naht40plusChannelToUse:    149Distance:        1NetworkType:     PtMPAntennaGain:     9GuardInterval:   longBeaconInterval:  100NoiseImmunity:   disableTransmitPower:   autoOper Status:     downChan Sharing:    EnabledChan Number:     0Chan Frequency:  0 KHzChan Width:      0 MHzChan Max TPO:    0 dBmChan Max EIRP:   0 dBmChan TX Power:   0 dBmRF Kill:         Disabled------------------------------------RadioName:       radio2AdminState:      disableRadioBand:       802.11naht40plusChannelToUse:    149Distance:        1NetworkType:     PtMPAntennaGain:     9GuardInterval:   longBeaconInterval:  100NoiseImmunity:   disableTransmitPower:   autoOper Status:     downChan Sharing:    EnabledChan Number:     0Chan Frequency:  0 KHzChan Width:      0 MHzChan Max TPO:    0 dBmChan Max EIRP:   0 dBmChan TX Power:   0 dBmRF Kill:         DisabledNOTE: Antennaport labels corre-sponds to radio num-bering: Radio 1 usesANT1, and so on.The RadioName corresponds to the Mesh Point’s front-panel labeling. It is used to identify the interface you can configure with set radio, as described below.On Mesh Points with channel sharing enabled (see Section 3.3.5), the virtual combined radio settings can be displayed (and configured) by specifying the RadioName of any of the
Fortress ES-Series CLI Guide: Networking and Radio Configuration45radios included in it: radio1 or radio2 on the ES820-35 and ES2440-35; radio2, radio3 or radio4 on the ES2440-3555, ES2440-3444 or ES2440-3444m. Configuration changes made to any of the combined radios will be propagated to all of the radios that make up the virtual radio.AdminState normally displays the radio’s actual operational state and corresponds with the configured value. Under certain circumstances, the state of a Mesh Point radio can become temporarily impossible to determine. In these cases, AdminState displays Unavailable.The conditions that can produce such an AdminState are typically short-lived and will clear immediately. During certain DFS events, however, or in cases where all possible channels are excluded, an AdminState of Unavailable can persist for more extended periods of up to 30 minutes.Below the configured settings, show radio displays current operating details for the radio, among them: Chan Max TPO - the maximum transmit power output in dBm at antenna connector, based on the operating channel and regulatory constraintsChan Max EIRP - the maximum Equivalent Isotropically Radiated Power in dBm, based on the operating channel and regulatory constraintsChan TX Power - the peak transmit power output in dBm on the operating channelConfigure radio settings interactively by entering the set radio command without arguments. The Mesh Point CLI presents one field at a time, and you can either enter a new value for a given field or strike Enter↵ to leave the value unchanged and go on to the next field. The following example shows all of the settings you can administer with set radio. The available values for each setting may vary based on the Mesh Point you are administering. # set radioRadioName (radio1 name of radio interface): radio2AdminState[disable] (enable|disable to set radio interface state):RadioBand[802.11a] (802.11g|802.11nght20|802.11nght40plus|802.11nght40minus|802.11a|802.11naht20|802.11naht40plus|802.11naht40minus to set band):802.11naht40plusGuardInterval[long] (any|long to set short and long, or only long HT40 guard interval (reboot required)):ChannelToUse[149] (channel number to use):Distance[1] (Distance in mile or kilometer):BeaconInterval[100] (25..1000 to set beacon interval in milliseconds):NetworkType[PtMP] (PtMP|PtP to set network type):AntennaGain[5] (0..50 to set antenna gain in dBi):
Fortress ES-Series CLI Guide: Networking and Radio Configuration46TransmitPower (auto|1..33 to set transmit power in dBm):NoiseImmunity[disable] (enable|disable to set noise immunity):MIMO[N] (Y|N to enable MIMO operational mode):ForceSTBC[Y] (Y|N to force STBC transmission):ChannelLock[disable] (enable|disable to set channel lock):ChannelScan[enable] (enable|disable to set channel scan):IgnoreRequest[disable] (enable|disable to set ignore channel change request):Reunification[enable] (enable|disable to set reunification):LonelyNode[enable] (enable|disable to set lonely node):Timeout[300] (60..86400 to set lonely node timeout in seconds):RadioName identifies the radio and cannot be changed. AdminState simply turns the radio on and off.3.4.1 Radio Band, Short Preamble, Guard IntervalNOTE: Radio2cannot be config-ured to use the 802.11b/gfrequency band.RadioBand selects both the frequency band of the radio spectrum a Mesh Point radio will use (for dual band radios) and whether it will use the 802.11n standard for wireless transmission/reception (for radios that support the option).5 GHz and 2.4 GHz OptionsRadios installed as Radio 1 in radio-equipped Fortress Mesh Points (refer to Table 3.1, above) can operate in either the 5 GHz 802.11a frequency band or the 802.11g 2.4 GHz band of the radio spectrum, according to your selection for RadioBand. By default, a dual-band radio installed as Radio 1 in a multi-radio Mesh Point is configured to operate in the 2.4 GHz 802.11g band. The dual-band radio installed in the ES210 is configured to operate in the 802.11a band by default.CAUTION: Use of4.4 GHz radios inthe U.S. without govern-ment approval is strictlyforbidden. In Mesh Points equipped with more than one radio, the additional radio(s) can function in only a single frequency band: the 5 GHz 802.11a band in standard-equipment radios, or the 4.4 GHz band in Mesh Points that support this option.The virtual channel-sharing radio that can be created by combining radios on select model Mesh Points through channel sharing (as described in Section 3.3.5) is limited to the 5 GHz 802.11a frequency band UNII-3 channels.The RadioBand setting is among those subject to the relevant regulatory domain. In some cases, in order to bring the Mesh Point into compliance, dual-band radios could be automatically fixed on the 802.11g band and radios fixed on the 802.11a band could be disabled altogether. Consult your local regulatory authority for the applicable specifications and requirements for radio devices and transmissions.ShortPreamble applies only to 2.4 GHz band operation: # set radioRadioName (name of radio interface, any of radio1|radio2): radio1AdminState (enable|disable to set radio interface state):
Fortress ES-Series CLI Guide: Networking and Radio Configuration47RadioBand[802.11g](802.11b|802.11g|802.11nght20|802.11nght40plus|802.11nght40minus|802.11a|802.11naht20|802.11naht40plus|802.11naht40minus to set band):ShortPreamble[enable] (enable|disable to set 802.11b short preamble): [...etc.]The short preamble is used by virtually all wireless devices currently being produced, so leaving the setting at its default enabled value is recommended for most network deployments. When ShortPreamble is disabled, connecting devices must use the long preamble, which is still in use by some older 802.11b devices. If the WLAN must support devices that use the long preamble, you must disable ShortPreamble.802.11n OptionsBSSs configured on the radio(s) installed in certain Mesh Point models are additionally capable of 802.11n operation (refer to Table 3.1 on page 38). A Mesh Point radio BSS configured to use the 802.11n standard is fully interoperable with other 802.11n network devices. On 802.11n-capable radios, there are three possible high-throughput (ht) 802.11n options for each frequency band supported on the radio: three for the 5 GHz 802.11na band and three for the 2.4 GHz 802.11ng band, when present:ht20 - 802.11n - High-Throughput 20 MHz, the radio will use only 20 MHz channel widths, while taking advantage of the standard’s traffic handling efficiencies. ht40plus - High-Throughput 40 MHz plus 20 MHz, the radio can use 40 MHz channel widths by binding the selected 20 MHz channel to the adjacent 20 MHz channel above it on the radio spectrum.ht40minus - High-Throughput 40 MHz minus 20 MHz, the radio can use 40 MHz channel widths by binding the selected 20 MHz channel to the adjacent 20 MHz channel below it on the radio spectrum.On ES2440-34m and ES2440-3444m Mesh Points, there is a fourth high-throughput (ht) option for the 4.4 GHz band radios:ht10 - 802.11na - High-Throughput 10 MHz, the radio will use only 10 MHz channel widths while taking advantage of the standard’s traffic handling efficiencies.NOTE: Changingthe radio guard-interval requires youto reboot the Mesh Point(see Section 5.2).When an 802.11n HT40 band setting is specified (802.11naht40plus, 802.11naht40minus, 802.11nght40plus, and 802.11nght40minus), you can specify whether the radio will use only long guard intervals between symbol transmissions (the default), or that the radio can use any (i.e., both long and short) symbol transmission guard intervals.
Fortress ES-Series CLI Guide: Networking and Radio Configuration483.4.2 Channel SelectionThe ChannelToUse setting selects the portion of the radio spectrum the radio will to use to transmit and receive—in order to provide wireless LAN access or to establish the initial connections in a mesh network.NOTE: Consultyour local regula-tory authority for appli-cable radio device andtransmission rules andfor DFS channel desig-nations.The channels available for user selection are determined by the frequency band the radio uses, subject to the relevant regulatory domain rules. In most regulatory domains, certain channels in the 5 GHz frequency band are designated DFS (Dynamic Frequency Selection) channels. DFS compliance also restricts the channels available for user selection (and broadcast) on 802.11a radios.Without a Channel license installed (refer to Section 5.6), 5 GHz-band Unlicensed National Information Infrastructure (UNII) 2 extended channels 116, 132 and 136 are also unavailable for selection. These channels are restricted by the FCC requirement for a 30MHz guard band around Terminal Doppler Weather Radar (TDWR) operating within 35km (refer to Section 3.4.8.2).NOTE: Where2.4GHz 802.11gchannels power levelsare restricted (e.g. theEU countries), Fortressradios which cannoteffectively comply willdisable the 802.11gchannels. The default inthat situation is band802.11a and channel100. A dual-band radio that uses the 2.4 GHz 802.11g band by default ((Radio 1 in all multiple-radio Mesh Points)) is set to channel 1 by default.The second internal radio in multiple-radio Mesh Points (the 5 GHz 802.11a Radio 2 in the standard model ES2440, ES820 and ES520) and a dual-band radio that uses 802.11a by default (the single Radio 1 in the ES210) has a default channel setting of:149, when the Mesh Point is licensed for standard United States operation (the default). 20, when the Mesh Point is licensed for United States Public Safety operation.C1, when the Mesh Point is equipped with 4.4 GHz band radios. Radio 3 and Radio 4 in an ES2440-3555 are set by default to channels:157 and 165, respectively, when the Mesh Point is licensed for standard United States operation (the default).40 and 60, respectively, when the Mesh Point is licensed for United States Public Safety operation. C1' and C3, respectively, when the ES2440 Mesh Point is equipped with 4.4 GHz band radios.
Fortress ES-Series CLI Guide: Networking and Radio Configuration49Table 3.2 shows radio channel-to-frequency mappings for radios using the 802.11b/g/n bands.Table 3.3 shows radio channel-to-frequency mappings for radios using the 802.11a/n bands.Table 3.2 Mapping 802.11b/g/n Radio Channels to Frequencies, in MHz Setting Center 802.11 b/g or 802.11n ht20 802.11n ht40 Plus 802.11n ht40 MinusLow High Low High Low HighChannel 1 2412 2402 2422 2402 2442 ~ ~ Channel 2 2417 2407 2427 2407 2447 ~  ~Channel 3 2422 2412 2432 2412 2452 ~  ~Channel 4 2427 2417 2437 2417 2457  ~  ~Channel 5 2432 2422 2442 2422 2462 2402 2442Channel 6 2437 2427 2447 2427 2467 2407 2447Channel 7 2442 2432 2452 2432 2472 2412 2452Channel 8 2447 2437 2457 ~ ~ 2417 2457Channel 9 2452 2442 2462  ~  ~ 2422 2462Channel 10 2457 2447 2467 ~ ~ 2427 2467Channel 11 2462 2452 2472  ~ ~  2432 2472Table 3.3 Mapping 802.11a/n Radio Channels to Frequencies, in MHz Setting Center 802.11a or 802.11n ht20 802.11n ht40 Plus 802.11n ht40 MinusLow High Low High Low HighChannel 52 5260 5250 5270 5250 5290  ~  ~Channel 56 5280 5270 5290 ~  ~ 5250 5290Channel 60 5300 5290 5310 5290 5330  ~  ~Channel 64 5320 5310 5330 ~  ~ 5290 5330Channel 100 5500 5490 5510 5490 5530  ~ ~ Channel 104 5520 5510 5530  ~ ~  5490 5530Channel 108 5540 5530 5550 5530 5570 ~ ~ Channel 112 5560 5550 5570 ~  ~ 5530 5570Channel 116 5580 5570 5590 ~   ~  ~  ~Channel 120  disabled due to FCC restrictions in the 5600-5650MHz band for avoiding interference with TDWR systems (refer to Section 3.4.8)Channel 124Channel 128Channel 132 5660 5650 5670 5650 5690 ~  ~Channel 136 5680 5670 5690  ~ ~  5650 5690Channel 140 5700 5690 5710  ~ ~  ~  ~ Channel 149 5745 5735 5755 5735 5775  ~ ~ Channel 153 5765 5755 5775  ~ ~  5735 5775Channel 157 5785 5775 5795 5775 5815 ~  ~
Fortress ES-Series CLI Guide: Networking and Radio Configuration50Table 3.4 shows the channels available for selection when the Mesh Point is licensed for United States Public Safety operation, with the corresponding frequency. All channels are available to the standard model 520 5GHz 802.11a-only band radio. Highlighted rows show the only Public Safety channels available to other 5GHz model radios. For more information on radio models, see Section 1.3.1 and Table 3.1.Channel 161 5805 5795 5815  ~ ~  5775 5815Channel 165 5825 5815 5835  ~  ~ ~   ~Table 3.3 Mapping 802.11a/n Radio Channels to Frequencies, in MHz Setting Center 802.11a or 802.11n ht20 802.11n ht40 Plus 802.11n ht40 MinusLow High Low High Low HighTable 3.4 Mapping 4.9 GHz Public Safety Radio Channels to FrequenciesSettingFrequency5 MHz Nominal Channel Width 10 MHz Nominal Channel Width 20 MHz Nominal Channel WidthChannel 5 4942.5 ~ ~Channel 10 ~ 4945 ~Channel 15 4947.5 ~ ~Channel 20 ~ ~ 4950Channel 25 4952.5 ~ ~Channel 30 ~ 4955 ~Channel 35 4957.5 ~ ~Channel 40 ~ ~ 4960Channel 45 4962.5 ~ ~Channel 50 ~ 4965 ~Channel 55 4967.5 ~ ~Channel 60 ~ ~ 4970Channel 65 4972.5 ~ ~Channel 70 ~ 4975 ~Channel 75 4977.5 ~ ~Channel 80 ~ ~ 4980Channel 85 4982.5 ~ ~Channel 90 ~ 4985 ~Channel 95 4987.5 ~ ~
Fortress ES-Series CLI Guide: Networking and Radio Configuration51Table 3.5 shows the channels available for selection on 4.4 GHz Mesh Point radios, with their corresponding center frequencies and nominal frequency ranges. Channels in the shaded cells are available only on the 4.4 GHz radios installed in the ES2440-3444m and ES2440-34mTable 3.5 Mapping 4.4 GHz Radio Channels to Frequencies20 MHz Nominal Channel Width 40 MHz Nominal Channel WidthChannel Setting Center Frequency Nominal Range Channel Setting Center Frequency Nominal RangeC1 4410 4400-4420 A1 4420 4400-4440C2 4430 4420-4440C3 4450 4440-4460 A2 4460 4440-4480C4 4470 4460-4480C5 4490 4480-4500 A3 4500 4480-4520C6 4510 4500-4520C7 4530 4520-4540 A4 4540 4520-4560C8 4550 4540-4560C9 4570 4560-4580 A5 4580 4560-4600C10 4590 4580-4600C11 4610 4600-4620 A6 4620 4600-4640C12 4630 4620-4640C13 4650 4640-4660 A7 4660 4640-4680C14 4670 4660-4680C15 4690 4680-4700 A1’ 4720 4700-4740C1’ 4710 4700-4720C2’ 4730 4720-4740 A2’ 4760 4740-4780C3’ 4750 4740-4760C4’ 4770 4760-4780 A3’ 4800 4780-4820C5’ 4790 4780-4800C6’ 4810 4800-4820
Fortress ES-Series CLI Guide: Networking and Radio Configuration52The virtual radio that can be created by combining radios on select model Mesh Points through channel sharing (as described in Section 3.3.5) is limited to 5 GHz-band UNII-3 channels: 149 (the default) –165 (when the virtual radio is not comprised of 4.4 GHz radios).3.4.3 Distance, Beacon Interval, Noise ImmunityWhen the radio is used for bridging, set Distance to the greatest unbridged distance between neighbor network nodes. The unit used, kilometers by default, is determined by the set unit control (Section 3.3.3). The default of 1 is appropriate for radios used to provide network access to local wireless devices.Table 3.6 Mapping 4.4 GHz Radio Channels to Frequencies10 MHz Nominal Channel WidthChannel Setting Center Frequency Nominal Range Channel Setting Center Frequency Nominal RangeD1 4405 4400-4410 D22 4615 4610-4620D2 4415 4410-4420 D23 4625 4620-4630D3 4425 4420-4430 D24 4635 4630-4640D4 4435 4430-4440 D25 4645 46404650D5 4445 4440-4450 D26 4655 4650-4660D6 4455 4450-4460 D27 4665 4660-4670D7 4465 4460-4470 D28 4675 4670-4680D8 4475 4470-4490 D29 4685 4680-4690D9 4485 4480-4490 D30 4695 4690-4700D10 4495 4490-4500 D1’ 4705 4700-4710D11 4505 4500-4510 D2’ 4715 4710-4720D12 4515 4510-4520 D3’ 4725 4720-4730D13 4525 4520-4530 D4’ 4735 4730-4740D14 4535 4530-4540 D5’ 4745 4740-4750D15 4545 4540-4550 D6’ 4755 4750-4760D16 4555 4550-4560 D7’ 4765 4760-4770D17 4565 4560-4570 D8’ 4775 4770-4780D18 4575 4570-4580 D9’ 4785 4780-4790D19 4585 4580-4590 D10’ 4795 4790-4800D20 4595 4590-4600 D11’ 4805 4800-4810D21 4605 4600-4610 D12’ 4815 4810-4820
Fortress ES-Series CLI Guide: Networking and Radio Configuration53CAUTION: Radiosusing DFS chan-nels (Section 3.4.8) mustuse the default 100 msBeaconInterval.The Fortress BeaconInterval default of 100 milliseconds is optimal for almost all network deployments and recommended for bridging operation. Configure the interval in milliseconds between 25 and 1000—only when necessary (as required by an unusual network deployment) and only on radios using non-DFS channels.The NoiseImmunity setting allows 802.11a radios to compensate for unusual local interference by aggressively lowering the receive threshold for connected nodes. Noise Immunity is disabled by default, and Fortress recommends retaining this default unless operating conditions require a change. 3.4.4 Network Type, Antenna Gain, Tx Power NOTE: Antennaport labels corre-sponds to radio num-bering: Radio 1 usesANT1, and so on.NetworkType and AntennaGain values are used to calculate allowable TransmitPower values and are therefore also subject to regulatory requirements. Consult applicable rules for the regulatory domain in which the radio is operating to determine permitted settings.The TransmitPower setting can automatically determine the appropriate power setting based on country of operation and other factors using auto (the default), or you can manually set the transmit power to a value between 1-33 dBm. In order to comply with relevant rules and regulations, you must configure the Mesh Point with values that accurately reflect its hardware configuration and conform to the applicable TransmitPower limit for the Mesh Point’s current regulatory domain. Consult your local regulatory authority for applicable specifications and requirements for radio devices and transmissions.The Mesh Point permits you to select TransmitPower settings that exceed those allowed by your current configuration, but a warning will signal the error. Do not exceed the TxPower limit for the Mesh Point’s current configuration and regulatory domain.3.4.5 MIMO CAUTION: It isimportant to installboth antennas for aMIMO-enabled radio, orthe radio will not func-tion.Only the ES2440 can be equipped with radios that support Multiple-Input Multiple-Output (MIMO) wireless operation. Both standard-equipment 802.11a/g/n and 802.11a/n radios support MIMO, and MIMO support is optionally available in ES2440s equipped with 4.4 GHz radios. You can quickly determine whether the 4.4 GHz radios installed in the ES2440 support MIMO by observing the number of antenna ports per radio on the chassis back panel. MIMO-capable radios are equipped with two antenna ports. MIMO support is additionally indicated by the final "m" in these platform’s full model numbers: ES2440-34m, ES2440-3444m.
Fortress ES-Series CLI Guide: Networking and Radio Configuration54Other Fortress platform models, with or without 4.4 GHz-radio options, do not.NOTE: The MIMOfunction is absentfrom CLI set radiooptions and show radiooutput on Mesh Pointsthat do not support it.MIMO can be enabled only when the radio is configured to use one of the 802.11n frequency Band options. MIMO is disabled by default on all radios that support it.In order to take advantage of MIMO, both radios forming a given link must be configured for it. In a mixed network environment, MIMO-enabled radios will negotiate the best mutually supported communication with Single-Input Single-Output (SISO) radios.Use the interactive set radio command to configure MIMO on any radio that supports the function. Or use set radio with the -mimo switch with Y and N arguments.# set radio -mimo Y|NThe command will fail if the radio is not configured to use one of the 802.11n -band options.3.4.6 STBCSpace-Time Block Coding (STBC) is a technique that helps improve error rates and reliability in a system that is experiencing poor transmission performance. This improvement is accomplished by transmitting a stream over multiple antennas which provides the receiver with multiple copies of the same data stream. The redundancy in the transmission increases the range and provides the receiver with a better chance to receive the complete signal.NOTE: The STBCfunction is absentfrom CLI set radiooptions and show radiooutput on Mesh Pointsthat are not capable oftransmitting STBCencoded signals.The ES2440-35, -3555, -3444, -34, -3444m, and -34m are capable of transmitting STBC encoded signals when MIMO is enabled. When the transmission quality drops below MCS-8 and MIMO is enabled, the radio will transmit STBC encoded signals. The ES2440-35, -3555, -3444, -34, -3444m and -34m are also capable of receiving STBC encoded signals.The ES820-35 and -34 are capable of receiving STBC encoded signals, but are not capable of transmitting STBC encoded signals. Transmission of STBC encoded signals is automatic below MCS-8 on any radio that supports the function. To force transmitting STBC encoded signals at all times (even when the radio would normally use a rate higher than MCS-7), use the interactive set radio command with the -forcestbc switch with Y argument. This favors reliability or range over throughput. The default for -forcestbc is N.# set radio -forcestbc Y|N
Fortress ES-Series CLI Guide: Networking and Radio Configuration55NOTE: Settings forChannelLockand  ChannelScan donot affect the channelscanning behavior of anconfigured STA inter-face, which must chan-nel scan to find an APwith which to associate.3.4.7 Channel Lock and Other Channel Selection FeaturesWhen ChannelLock is set to enable (default is disable) and at least one BSS is configured, the radio will not switch from the currently configured channel, regardless of settings or activity that would ordinarily trigger a channel switch. The Mesh Point ignores WDS-related channel scanning and remote WDS peer channel change requests. Radar events that occur while on a DFS channel cause the radio to be disabled, rather than to select an alternate channel.NOTE:  Whenenabled,  Chan-nel Lock takes prece-dence over any otherchannel selection func-tion, except for channelscanning on configuredSTA interfaces. Settingsfor the remaining chan-nel selection functionsdo not appear in showradio output. When ChannelLock is enabled, the Channel Scanning, Reunification, and Lonely Node features are disabled, and the Ignore Remote Channel Change Request feature is enabled. You cannot change these settings, and these parameters do not appear in the output for show radio. When ChannelScan is set to enable (the default), WDS-related channel scanning occurs under any of the following conditions:a WDS-enabled BSS exists and the Mesh Point is bootinga WDS BSS is administratively disabled, then re-enabledthe radio is administratively disabled and re-enabledthe lonely node feature is enabledWhen Channel Scanning is disabled (explicitly, or via Channel Lock), Reunification and Lonely Node are also disabled. The IgnoreRequest setting of enable causes the Mesh Point to drop remote channel-change requests. When set to disable (the default), remote channel change requests from compatible peers are processed and if the channel isn’t excluded, the Mesh Point changes to the requested channel. If the channel is excluded, a channel change request for an alternate channel is sent. When Channel Lock is enabled, IgnoreRequest is also enabled.When Reunification is enabled (default), during WDS-related channel scanning, a remote channel change request is sent to unselected channels in order to unify disjoint networks. For example, during WDS-related channel scanning, a Mesh Point with a WDS-enabled BSS with SSID “bravo” discovers a compatible “bravo” network on channels 149 and 165. Based on channel precedence, the Mesh Point chooses one of these two frequencies for operation. It then sends a remote channel change request to the unselected channel so that all Mesh Points can operate on a common channel. When Channel Lock is enabled or Channel Scanning is disabled, Reunification is disabled.When the LonelyNode setting is enable (default), the Mesh Point scans periodically to select an alternate channel with compatible peers. The Lonely Node Timeout setting
Fortress ES-Series CLI Guide: Networking and Radio Configuration56determines the scan interval, between 60–86400 seconds (the default is 300). Lonely Node operates under the following conditions:Channel Lock is disabledChannel Scanning is enabledA WDS BSS is enabledNo FP Mesh peer connections exist on the bridging radioThe same settings are output interactively regardless of the specified radio. The possible values for each setting vary based on the features supported by the Mesh Point you are administering. Alternatively, you can use the set radio command with valid switches and arguments to change the radio settings:# set radio -name radio1|radio2 -adminstate enable|disable -band 802.11g|802.11nght20|802.11nght40plus|802.11nght40minus|802.11a|802.11naht20|802.11naht40plus|802.11naht40minus -guardinterval any|long -shortpreamble enable|disable -channel <channel#> -distance 1–50 -beaconint 25–1000 -nettype PtMP|PtP -gain 0–50 -txpower auto|1–33 -noiseimmunity enable|disable -mimo Y|N -forcestbc Y|N-lock enable|disable -scan enable|disable -reunification enable|disable -lonelynode enable|disable -lonelynodetimeout 60–86400 -ignorereq enable|disableThe sample output for the show radio command (at the beginning of this section) shows the default radio settings.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.4.8 DFS, TDWR, and Channel Exclusion Channels in the 5 GHz 801.11a frequency band can be excluded from selection by several means and for various reasons.3.4.8.1 Dynamic Frequency Selection NOTE:  Radarevents occurringwhile on a DFS channelwhile  ChannelLock isenabled cause the radioto be disabled, ratherthan to select an alter-nate channel. (See Sec-tion 3.4.7.)Most regulatory domains, including the Mesh Point’s default FCC domain, require that certain channels in the 5 GHz 801.11a frequency band operate as DFS (Dynamic Frequency Selection) channels. DFS is a radar (radio detection and ranging) avoidance protocol. Devices transmitting on a DFS channel must detect approaching radar on the channel, vacate the channel within 10 seconds of doing so, and stay off the channel for a minimum of 30 minutes thereafter.Radios using the 2.4 GHz 802.11g frequency band or the 4.4 GHz band are not subject to DFS.
Fortress ES-Series CLI Guide: Networking and Radio Configuration573.4.8.2 Licensed TDWR Channels NOTE: Without alicense, channels116, 132 and 136 cannotbe entered in theChannelToUse set-ting, or entered usingadd xchannel. In order to satisfy the FCC requirement for a 30 MHz guard band around Terminal Doppler Weather Radar (TDWR) operating within 35 km, UNII 2 extended channels 116, 132 and 136 are available for selection only when a Channel license is installed on the Mesh Point (refer to Section 5.6). When a Channel license is installed, you can satisfy the TDWR requirement using static channel exclusions (refer to Section 3.4.8.3, below).3.4.8.3 Channel ExclusionA channel can be excluded from use by the Mesh Point’s radios in the following ways:NOTE: Channelsharing amongmultiple internal radioscan be enabled on selectmodel Mesh Points incertain deployments.Refer to Section 3.3.5.It has been specified for exclusion (see below).For DFS channels, radar was detected on the channel, automatically excluding it from use for 30 minutes.Another of the Mesh Point’s internal radios is using the channel.For bridging radios, the channel was learned remotely from another node in the network. NOTE: Remotelylearned channelexclusions age out of theexcluded list after theremote Mesh Pointstops propagating theexclusion. If a Channel license is installed (refer to Section 5.6), and the Mesh Point is operating in the vicinity of Terminal Doppler Weather Radar, the FCC requires you to exclude channels within 30 MHz of TDWR frequencies (refer Section 3.4.8.2). The currently excluded channels you can view with show xchannel are sorted according to cause, where both the DFS and other-radio channel exclusions are listed under Local Exclusion List Entries. Mesh Points with more than one radio display channel exclusion information for each radio separately, or you can specify the radio to view using -radio:# show xchannel -radio <radioName> RadioName: radio1Static Exclusion List Entries (Admin)Channel  Band     Freq (KHz)-------  -------  ----------NoneLocal Exclusion List EntriesChannel  Band     Freq (KHz)  Reason              Timeout (mins)-------  -------  ----------  ------------------  --------------NoneRemote Exclusion List Entries (Seen on WDS Peer)Channel  Band     Freq (KHz)-------  -------  ----------None
Fortress ES-Series CLI Guide: Networking and Radio Configuration58NOTE: You mustspecify the ES210Mesh Point’s radio byname: radio1.Add channels to the Static Exclusion List with add xchannel:# add xchannel -radio radio1|radio2 -channel <#>Delete channels from the exclusion list with del xchannel:# del xchannel -radio radio1|radio2 -channel <#> -all You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.4.9 Radio BSS Settings  NOTE: An ES210Mesh Point canalternatively support asingle wireless clientSTA Interface. (Refer toSection 3.4.11.)View the current settings for configured Basic Service Sets (BSSs) with show bss:> show bss No BSS are configured for radio1No BSS are configured for radio2By default there are no BSSs configured on any radio.You can configure up to four BSSs on an individual Mesh Point radio with the add bss command. A maximum total of eight bridging-enabled BSSs can be present on multi-radio Mesh Points: a hardware constraint in dual radio models, but a maximum that must be user-imposed on a four-radio ES2440.A virtual radio created through channel sharing, as described in Section 3.3.5, can support only a single bridging BSS.3.4.9.1 BSS Radio, BSS Name and SSID NOTE: An SSIDcannot be sharedacross multiple BSSs onthe same Mesh Point,unless channel sharingis enabled (refer to Sec-tion 3.3.5).The minimum parameters required to create a new BSS are to identify the radio (-radio) on which it will be created, name the BSS (-name) and provide an SSID of up to 32 characters or enter random with the -ssid switch to generate a random 16-character SSID.Certain interface names and prefixes, such as aux and sta_, are reserved for internal use. If the BSSName you enter is reserved, the Mesh Point CLI will return an error requiring you to modify your entry.# add bss -radio radio1 -name bss1.1 -ssid random[OK]The above example creates a BSS with these default settings:# show bssRadioName:              radio1Name:                   bss1.1Ssid:                   <randomly generated ssid>EnableWDS:              NAdminState:             enableAdvertiseSsid:          YDropBroadcastProbeReq:  NIdleTimeout:            5Only11g:                N
Fortress ES-Series CLI Guide: Networking and Radio Configuration59WMM:                    enableFragThreshold:          offRtsThreshold:           offDtimPeriod:             1VlanId:                 1SwitchingMode:          accessVlanAllowAll:           YVlanActiveTable:        <none>Zone:                   encryptedUcostOffset:            0Description:802.1X/11i Security:    noneRateMode:               autoMaxRate:                54MinRate:                1McastRate:              1BssId:                  00:14:8c:08:10:91Except for the final line of output (BssId, which displays the BSS’s MAC address), if you specify only the radio, each of the settings shown above can be configured interactively with add bss:# add bss -radio radio1BssName (string for identity): bss1.2Ssid ('random'(randomly generate)|string(32 chars max)): ssid1.2EnableWds[N] (Y|N to allow peer-to-peer connection): yMinimumRSS (-95..0 to set minimum receive signal strength when WDS is enabled):AdminState (enable|disable to set BSS administrative state):AdvertiseSsid (Y|N to advertise or hide SSID in Beacon frame): nDropBroadcastProbeReq (Y|N to drop or respond to broadcast Probe Request frame sent with no SSID):StaIdleTimeout[5] (timeout in minutes before an idle STA is disassociated):Only11g (Y|N to support only 802.11g):RateMode (auto|fixed to set bit-rate adaptation mode):MaxRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set maximum transmission rate in Mbps):MinRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set minimum transmission rate in Mbps):WMM (enable|disable to set Wi-Fi Multimedia (WMM) support):FragThreshold (off|256..2345 to set maximum fragment size):RtsThreshold (off|1..2345 to set minimum packet size for RTS/CTS handshake):DtimPeriod (DTIM period in beacon intervals):VlanId (1..4094 to assign the interface to the corresponding VLAN):SwitchingMode (trunk|access to set VLAN mode):AllowAll (Y|N to allow all VLANs in trunk interface):Table (list of active VLAN IDs when allow all is disabled):Zone (clear|encrypted (default is encrypted)):UCostOffset (0..4294967295 to set user-defined offset used to compute virtual interface cost):McastRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set multicast transmission rate in Mbps):6EnhancedMcast (Y|N to set enhanced multicast):BeaconEncrypt (enable|disable to set WDS Beacon Management frame encryption):WdsMtu (wifi|ether to set mtu size for WDS links):Description (string of description):802.1X/11i Security (none|wpa|wpapsk|wpa2|wpa2psk|wpa2mixed|wpa2mixedpsk):[OK]
Fortress ES-Series CLI Guide: Networking and Radio Configuration603.4.9.2 WDS Bridging or AP Infrastructure Configuration NOTE: BSSs withWDS enabled arealways in the MeshPoint’s encrypted zone.Enabling WDS (Wireless Distribution System) functionality (EnableWds y) enables the Mesh Point radio on which the BSS is configured for bridging: The BSS can be used to connect as a node in a network of Mesh Points. When the BSS is enabled for bridging, you can also set the minimum received signal strength (MinimumRSS), that other WDS network nodes must maintain in order to stay connected, in decibels referenced to milliwatts from -95 to 0 (zero), with zero disabling the function (i.e., permitting nodes to stay connected at any RSS). The default is -80 dBm. When WDS is disabled (EnableWds n), MinimumRSS does not apply.The single BSS supported on a virtual radio created through channel sharing (described in Section 3.3.5), is restricted to bridging operation (EnableWds y).A BSS on which WDS is disabled (EnableWds n) can be used to provide infrastructure network connectivity for wireless devices in range, enabling the radio on which the BSS is configured as an AP (access point).3.4.9.3 BSS State, SSID Advertising and Drop Probe RequestsAdminState allows you to take a BSS off line (disable it) without deleting it from the Mesh Point configuration. Newly added BSSs are enabled by default.NOTE: SettingAdvertiseSsidto  yes is not permittedon bridging BSSs, whereenabling the functionwould serve no pur-pose and could pose asecurity risk.AdvertiseSsid gives you the option of broadcasting the SSID (y, the default) or hiding it (n) for Access Point (AP) BSSs. SSIDs should never be advertised for bridging BSS: You cannot enable AdvertiseSsid when WDS is enabled (EnableWds y).Enabling DropBroadcastProbeReq causes the BSS to ignore probe requests that do not include the BSS's currently configured SSID. The function is disabled by default. Enabling this feature reduces probe responses, which is not appropriate for all deployments but can boost available bandwidth under certain circumstances. Fortress recommends that you leave the setting at its default value, except under the direction of Technical Support. 3.4.9.4 BSS STA Idle Timeout and 802.11g-Only SettingsWhen the BSS is used as a network AP, you can also set an IdleTimeout for the interface: the maximum period of time that a connected devices’s session can remain inactive before the Mesh Point terminates its association to the BSS. Set StaIdleTimeout in whole minutes between 1 and 71582788; or specify 0 (zero) to disable the function, permitting devices associated with the BSS to remain connected regardless of session inactivity.
Fortress ES-Series CLI Guide: Networking and Radio Configuration61You can configure BSSs on Radio 1 to accept connections only from 802.11g devices (Only11g y), instead of also accepting 802.11b device connections (Only11g n, the default).3.4.9.5 BSS Unicast Transmission Rate SettingsWhen a BSS is configured to use a RateMode setting of auto (the default), the interface dynamically adjusts the bit rate at which it transmits unicast data frames—throttling between the configured MaxRate and MinRate—to provide the optimal data rate for the connection.At a RateMode setting of fixed, the BSS will use the configured MaxRate for all unicast transmissions and ignore the configured MinRate.NOTE: Radio Bandsettings are cov-ered in Section 3.4.Transmission rates are set in megabits per second (Mbps). However, the rate as configured in MaxRate or MinRate is only a hint to the radio as to what rate is the desired unicast transmission rate. See Section 3.4.9.5.1 below for more information.MaxRate can be set only to a value greater than or equal to the currently configured MinRate, which likewise can be set only to a value less than or equal to the configured MaxRate. Usable values for transmission rate settings depend on the Band setting for the radio on which the BSS is configured, as indicated by the markers in Table 3.7.The default MaxRate and MinRate settings for a new BSS define the largest range possible, as determined by the 802.11 standard in use by the radio on which you are configuring the BSS. These defaults therefore also depend on the relevant radio’s Band setting.The default MaxRate depends on whether or not the radio is using 802.11n: On a radio with an 802.11a or 802.11g Band setting, the default MaxRate is 54 Mbps. On a radio using any of the 802.11n settings in either frequency band, the default MaxRate is 65 Mbps. The default MinRate depends on the radio frequency band without regard to 802.11n: On a radio using any 802.11g Band setting, including all 802.11ng options, the default MinRate is 1 Table 3.7 Usable Rate Settings (in Mbps) per Radio Band Setting1 2 5.5 6 9 111218243648546.51319.526395258.565802.11a  802.11g  802.11naht  802.11nght   
Fortress ES-Series CLI Guide: Networking and Radio Configuration62Mbps. On a radio using any of the 5 GHz 802.11a settings, including 802.11na options, the default MinRate is 6 Mbps.3.4.9.5.1 Actual Unicast Transmission Rates If the Band setting is 802.11a or 802.11g, the fixed unicast transmission rate you can expect is exactly the MaxRate you have entered. However, if the Band setting is one of the 802.11n options, the fixed unicast transmission rate you can expect is different depending on certain configuration settings of the radio on which you are configuring the BSS:MIMO (see Section 3.4.5),Force STBC (see Section 3.4.6), Channel Width (ht20, ht40, ht10; see Section 3.4.2). When you specify the rate in 802.11n, you are actually specifying a particular Modulation and Coding Scheme (MCS), which yields different rates depending on the width of the channel and the number and use of spatial streams you have previously specified for the radio.Example 1: if you pick a fixed MaxRate of 26, and your radio has MIMO enabled and you have not chosen to Force STBC, you are requesting MCS 11. If your Band is 802.11n ht40 (40 MHz wide), MCS 11 means the unicast transmission rate for your BSS will always be 108 Mbps. Example 2: With everything the same as Example 1 (fixed MaxRate of 26, MIMO enabled, and Band 802.11n ht40), enabling Force STBC will give you MCS 3 and 54 Mbps. The Force STBC means although you are still using 2 spatial streams (MIMO), both are transmitting the same data; Force STBC means you are giving up throughput for range and reliability. Table 3.8 shows the expected output transmission rates for each MaxRate for the combinations of radio configuration.
Fortress ES-Series CLI Guide: Networking and Radio Configuration63NOTE: It is possi-ble to configure arate such as 48, which isnot an 802.11n rate, forMaxRate or MinRateon an 802.11n capableradio. In that case theMCS chosen will be theone associated with thenext higher 802.11n rate.For 48, that would berate "52", or MCS 5 or13, depending on theother radio configura-tion settings.Table 3.8 can also be used to figure out the range of unicast transmission rates the radio will use when RateMode auto and the MaxRate and MinRate are configured. For example, look up each of those rate settings under the correct configuration options, and the results will give the top and bottom of the range.3.4.9.6 BSS WMM QoS SettingTraffic received on BSSs enabled for Wi-Fi Multimedia (WMM) QoS (Quality of Service) is prioritized according to the WMM tags included in its VLAN tags, if present, or directly in its 802.11 headers, if no VLAN tags are present. WMM is enabled by default.When WMM is disabled, traffic received on the BSS is treated as untagged and marked for Medium (or Best Effort) QoS handling (Section 3.10). The internal marking is used if the data is transmitted out an interface that requires marking (such as another WMM-enabled BSS or an 802.1Q VLAN trunk).NOTE: BSSs serv-ing as Core inter-faces in an FP Meshnetwork (Section 3.2.2)should be enabled forWMM, to allow prioritiza-tion of FP Mesh controlpackets.On ES210 Mesh Points in Station Mode (refer to Section 3.4.11), WMM is also enabled by default on new STA Interfaces (as described in Section 3.4.11).3.4.9.7 BSS Fragmentation and RTS ThresholdsThe fragmentation threshold (FragThreshold) allows you to configure the maximum size of the frames the BSS sends whole. Frame sizes larger than the specified threshold are broken into smaller frames before they are transmitted. An Table 3.8 Fixed Unicast Transmission Rate By MaxRate For 802.11Max Rate Setting Actual Radio SettingFORCE STBC = OFFand MIMO = ON(FORCE STBC = ON and MIMO = ON)or SISO orNOT MIMO CAPABLEMCS 10MHz 20MHz 40MHz MCS 10MHz 20MHz 40MHz6.5 8 6.5 13 27 0 3.25 6.5 13.513 9 13 26 54 1 6.5 13 2719.5 10 19.5 39 81 2 9.75 19.5 40.526 11 26 52 108 3 13 26 5439 12 39 78 162 4 19.5 59 8152 13 52 104 216 5 26 52 10858.5 14 58.5 117 243 6 29.25 58.5 121.565 15 65 130 270 7 32.5 65 135
Fortress ES-Series CLI Guide: Networking and Radio Configuration64acknowledgement is sent for each frame received, and if no acknowledgement is sent the frame is retransmitted.FragThreshold is set in bytes: 256–2345, or the function can be turned off (the default). Fragmentation becomes an advantage in networks that are:experiencing collision rates higher than five percentsubject to heavy interference or multipath distortion serving highly mobile network devicesA relatively small fragmentation threshold results in smaller, more numerous frames. Smaller frames reduce collisions and make for more reliable transmissions, but they also use more bandwidth. A larger fragmentation threshold results in fewer frames being transmitted and acknowledged and so can provide for faster throughput, but larger frames can also decrease the reliability with which transmissions are received.The RTS threshold (RtsThreshold) allows you to configure the maximum size of the frames the BSS sends without using the RTS/CTS protocol. Frame sizes over the specified threshold cause the BSS to first send a Request to Send message and then receive a Clear to Send message from the destination device before transmitting the frame.The RTS protocol threshold is set in bytes: 1–2345, or the function can be turned off (the default). The smaller the RTS threshold, the more RTS/CTS traffic is generated at the expense of data throughput. On large busy networks, however, RTS/CTS speeds recovery from radio interference and transmission collisions, and a relatively small RTS Threshold may be necessary to achieve significant improvements.3.4.9.8 BSS DTIM Beacon CountdownNOTE: The beaconinterval is config-ured with set radio-beaconint, as des-cribed in Section 3.4.3.APs buffer broadcast and multicast messages for devices on the network and then send a Delivery Traffic Indication Message to “wake-up” any inactive devices and inform all network clients that the buffered messages will be sent after a specified number of beacons have been transmitted.The value specified with -dtim determines the number of beacons in the countdown between transmitting the initial DTIM and sending the buffered messages. Set the DTIM beacon countdown (-dtim) in whole numbers: 1–255, inclusive (the default is 1).A longer DTIM beacon countdown conserves power by permitting longer periods of inactivity for power-saving devices, but it also delays the delivery of broadcast and multicast messages. Too long a delay can cause multicast packets to go undelivered.
Fortress ES-Series CLI Guide: Networking and Radio Configuration653.4.9.9 BSS VLANs Settings NOTE: Packetsbelonging to aBSS's native VLAN, asestablished by VlanId,are always allowed totraverse a trunk link; sountagged packets arealways allowed.VlanId assigns a VLAN ID between 1 and 4094 to the BSS. By default all interfaces are assigned VLAN ID 1. If the VLAN ID you enter is not already present in the Active VLAN Table (Section 3.11.1), it will be automatically added. A new VLAN ID configured in this way will not yet be associated with an IPv4 address. Refer to Section 3.11.1 for instructions on associating a new VLAN with an IP address. SwitchingMode determines whether the BSS will act as a trunk or access (the default) interface in Fortress’s VLANs implementation. SwitchingMode is automatically fixed on Trunk when WDS is enabled.AllowAll (or -vlanAllowAll) and Table (or -vlanActiveList) configure VLAN trunk filtering for the interface, when the interface SwitchingMode is trunk. When AllowAll is Y (yes, the default), no filtering takes place on the interface. If you set AllowAll to n (no), the interface accepts only packets with VLAN tags matching a VLAN ID that has been specified for the BSS using the Table option. (When SwitchingMode is access, these options have no effect.)3.4.9.10 BSS Fortress Security ZoneZone places the BSS in the Mesh Point’s clear or encrypted zone. Traffic in the encrypted zone is subject to Fortress’s Mobile Security Protocol (MSP), as configured on the Mesh Point itself (refer to Section 4.1).By default BSSs are created in the encrypted zone. When WDS is enabled, the BSS’s Zone value is fixed on encrypted and cannot be changed. Configuring a BSS to reside in the clear zone exempts all traffic on that BSS from MSP. Standard Wi-Fi security protocols can be applied to the traffic on a BSS (Section 3.4.9.15, below), regardless of whether the BSS is in the clear or encrypted zone.3.4.9.11 FastPath Mesh BSS Cost OffsetThe UCostOffset setting applies only when FastPath Mesh (Section 3.2) is licensed and enabled on the Mesh Point.UCostOffset specifies a non-negative integer, between 0 (zero, the default) and 4,294,967,295, by which you can weight the interface more or less heavily in the FP Mesh cost equation. The higher the offset, the less attractive the interface, with the maximum (4,294,967,295) causing the interface to never be used to route network traffic.
Fortress ES-Series CLI Guide: Networking and Radio Configuration663.4.9.12 BSS Multicast Settings NOTE:McastRateis dynamic and isnot user configurable forbridging-enabled BSSs.McastRate specifies the lowest bit rate at which a BSS configured to act as a network AP (EnableWds n) will send multicast frames, in megabits per second. BSSs on a radio that is fixed on the 5 GHz 802.11a band, or configured by default to use the 5 GHz 802.11a band, have a default McastRate of 6 Mbps, which is appropriate for a BSS using the 5 GHz frequency band. Fortress recommends leaving BSSs in the 802.11a band, including all 802.11na options, at the default of 6. BSSs on a radio configured by default to use the 2.4 GHz 802.11g band have a default McastRate of 1 Mbps, which is appropriate for a BSS using the 2.4 GHz frequency band. Fortress recommends leaving BSSs in the 802.11g band, including all 802.11ng options, at the default of 1.EnhancedMcast is an advanced function inappropriate for typical Mesh Point deployments. Do not modify this setting, except as directed by a Fortress representative.3.4.9.13 Bridging MTU and Beacon EncryptionOn bridging BSSs (EnableWds y), WdsMtu configures the Maximum Transmission Unit for the interface as appropriate for wireless (wifi) or Ethernet (ether) transmissions. The default WdsMtu is wifi. NOTE: BeaconEn-crypt cannot bereconfigured after a BSSis created. You mustdelete, and then recreatethe BSS with the newsetting, in order tochange it.On bridging BSSs (EnableWds y), you can use BeaconEncrypt enable to encrypt the entire contents of 802.11 beacon frames. At the default, disabled (BeaconEncrypt disable), 802.11 management frame contents, including beacons, are transmitted as cleartext, as is typically the case in wireless bridging implementations. BeaconEncrypt must be enabled (or disabled) on both ends of the bridging link. Full implementation of the function requires it to be enabled on all BSSs forming the WDS network.3.4.9.14 BSS DescriptionYou can optionally enter a Description of the BSS of up to 32 characters. To include spaces in the description string, enclose it in quotation marks.As an alternative to interactive configuration, you can use the add bss command with valid switches and arguments to configure any of the settings described above when you create a new BSS:# add bss -radio radio1|radio2 -name <BSSname> -ssid random|<ssid> -wds y|n -minRSS -95–0 -adminstate enable|disable -adssid y|n -dropbcpr y|n -idletimeout <minutes>-only11g y|n -ratemode auto|fixed -maxrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -minrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -wmm enable|disable -frag off|256–2345 -rts off|256—2345 -dtim 1–255 -vlanID 1—4094 -switchingmode trunk|access -vlanAllowAll y|n -vlanActiveList 1,2,3...4094 -zone encrypted|clear
Fortress ES-Series CLI Guide: Networking and Radio Configuration67-ucost 0–4294967295 -mcastRate 1|2|5.5|11|6|9|12|18|24|36|48|54 -enhancedmcast y|n -wdsmtu wifi|ether -beaconencrypt enable|disable -desc <“descriptive string”> -1X11i none|wpa|wpapsk|wpa2|wpa2psk| wpa2mixed|wpa2mixedpsk -keytype hex|ascii -wpakey <wpaKey> -wpakeyconfirm <wpaKey> -rekeyperiod 0—2147483647 -gmkrekeyperiod 0—2147483647 -radiusperiod 0—2147483647 -strictrekey y|n -reauthperiod 0—2147483647 -preauth y|n 3.4.9.15 BSS Wi-Fi Security ConfigurationBSSs on Fortress Mesh Point radios support WPA (Wi-Fi Protected Access) and WPA2 security.When you choose an 802.1X/11i Security setting other than none (the default), the Mesh Point CLI prompts you for the additional inputs required by the security method you choose.802.1X/11i Security (none|wpa|wpapsk|wpa2|wpa2psk|wpa2mixed|wpa2mixedpsk): wpa2WpaKeyFormat[hex] (hex|ascii to set key string format): hex|asciiWpaKey[""] (WPA key with length 64(hex), 8..63(ascii)):<hexORasciiKey>WpaKeyConfirm[""] (confirm WPA key):<hexORasciiKey>GtkRekeyInterval (group transient key (GTK) rekey interval in seconds): <GTKeyInterval>GmkRekeyInterval (group master key (GMK) rekey interval in seconds): <GMKeyInterval>GtkStrictRekey (Y|N to rekey GTK when a STA leaves the BSS): yReauthInterval (EAPOL reauthentication interval in seconds): <ReAuthInterval>PreAuth[N] (Y|N to set RSN pre-authentication): yWPA (wpa), WPA2 (wpa2) and WPA2-Mixed (wpa2mixed) are enterprise modes of WPA. You can specify wpa or wpa2 to be used exclusively by the BSS, or you can configure it to use either by specifying wpa2mixed.WPA and WPA2 use EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) to authenticate network connections via X.509 digital certificates. For the Mesh Point to successfully negotiate a WPA/WPA2 transaction, you must have specified a locally stored key pair and certificate for the Mesh Point to use to authenticate the connecting device as an EAP-TLS peer, and at least one CA (Certificate Authority) certificate must be present in the local certificate store. Refer to Section 4.2 for guidance on configuring an EAP-TLS key pair and digital certificate.These additional settings apply to wpa, wpa2 and wpa2mixed selections:rekeyperiod (GtkRekyInterval) - specifies the interval at which Group Transient Keys are regenerated. The default is zero (0), which value disables the rekeying function; the same key will be used for the entire session. Specify a new interval in whole seconds between 0 and 2147483647, inclusive.gmkrekeyperiod (GmkRekyInterval) - specifies the interval at which the Group Master Key is are regenerated. The default is 1800. A zero (0) value disables the rekeying function. Specify a new interval in whole seconds between 0 and 2147483647, inclusive.
Fortress ES-Series CLI Guide: Networking and Radio Configuration68radiusperiod (RadiusRetryInterval) specifies the number of seconds (0—2147483647) between retries of the primary authentication server. The default is 0 (zero), which disables the function: If the primary Wi-Fi authentication server cannot be reached on the initial attempt, it is not retried until all configured network servers (secondary, tertiary, etc.) have been tried in turn and also failed.strictrekey (GtkStrictRekey) - enter y or n to indicate whether to automatically rekey whenever a STA leaves the BSS. reauthperiod - to ensure that a peer whose certificate has been revoked is not allowed to remain associated, you can establish a reauthentication period. Any peer with a certificate that is no longer valid will be dropped. Specify an interval in whole seconds between 0 and 2147483647, inclusive. The default is 3600. See Section 4.2.2.3  for additional information on Certificate Revocation. preauth - to facilitate roaming between network access points, enabling preauthentication on the BSS permits approaching WPA2 wireless clients to authenticate on the Mesh Point while still connected to another network access point, while wireless clients moving away from the Mesh Point can remain connected while they authenticate on the next network AP. By default, preauth is set to n (disabled).For WPA-PSK (pre-shared key), WPA2-PSK and WPA-Mixed-PSK (wpapsk, wpa2psk, wpa2mixedpsk) you can set the interval, in seconds, between key exchanges (rekeyperiod). The default is zero (0), which value disables key exchange; the same key will be used for the entire session. You must also specify whether the pre-shared key will be an ascii plaintext passphrase of 8–63 characters or a 64-digit hexadecimal string and then enter the key itself:You can use the same switches with the update command to edit BSS settings.You can delete a specified BSS or all configured BSSs with the del command:# del bss -all|-name <name>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Networking and Radio Configuration693.4.10 Antenna Tracking / Rate Monitoring NOTE: A Mainte-nance user can runthe show tracking com-mand in continuousmode (-samples 0) whilean Administrative useradjusts the radio andbss configuration forbest link quality.Administrative and Maintenance users have the ability to monitor the data rate and RSSI of a specific WDS link between two Fortress Mesh Points using the show command:# show tracking -mac <macAddr> -radio <RadioName> -interval <Interval> -samples <Samples> -format <Format> macAddr is the MAC address of the specific radio of the Fortress Mesh Point to which this FMP is connected. An FMP has a base MAC address, but it also has individual MAC addresses for each radio. To figure out which address to use, run the show bss command on the remote FMP. Use the BssId MAC address of the appropriate BSS on the remote FMP as the macAddr in the command on this FMP.CAUTION: Theshow trackingcommand may have animpact on the perfor-mance of the FMP andthe throughput of dataon the channel.RadioName is the name of the radio on this FMP that connects to the remote FMP. The default radio name is radio2.Interval is the time in milliseconds between lines of monitoring output. The default interval is 100 milliseconds, or 10 output lines per second.Samples is the number of output lines to emit. The default number of samples is 50 lines. If you enter 0, the output lines will continue to show until you hit Ctrl-C to stop the output.CAUTION: Theshow trackingcommand should neverbe run by more than oneuser simultaneously.Format is the format of the output. The default (and only current capability) is format 1, which is:$BATSR,RADIO_NAME,VERSION,MODE,LINK_STATUS,RSSI,LINK_SPEED,LINK_DISTANCE,REMOTE_IP,REMOTE_MAC,*CHECKSUM# show tracking -mac 00:14:8c:00:0a:b4 $BATSR,ES-00148cf80780radio2,5.4.5.2041-CS,WDS,Connected,-41,54,N/A,N/A,00:14:8c:00:0a:b4,*7eIn this example, BATSR is a hardcoded string that refers to this format. WDS is the mode. LINK_DISTANCE and REMOTE_IP are unavailable, so they are shown as N/A. 00:14:8c:00:0a:b4 is the MAC address of the remote FMP. It will always be the same MAC that was requested in the show command. Finally the *7e is the NMEA-0183-compliant XOR data sum prefixed by '*'.This command is useful when trying to aim the FMP's antenna in a new installation, and also when trying to debug link quality issues. For best results, the LINK_SPEED value should be as high as possible. The RSSI should be the smallest absolute number (e.g. -47 is much better than -85), but not past -35 for ES820s and ES2440s, and not past -25 for ES520s.
Fortress ES-Series CLI Guide: Networking and Radio Configuration703.4.11 ES210 Mesh Point STA Settings and Operation NOTE: Each MeshPoint radio canalternatively support upto four BSS interfaces.Refer to Section 3.4.9.Configuring a station (sta or STA) interface on the ES210 Mesh Point radio causes the Mesh Point to act as a dedicated WLAN client device, or station, rather than as an AP or a wireless bridge (or FastPath Mesh Point).An ES210 configured with such an interface is in station mode. Only a single STA Interface is permitted on a given ES210, and when one is present, no additional wireless interface of any type can be configured. If one or more BSSs have been configured on the Mesh Point radio, you must delete all BSSs before you can enable a STA interface. NOTE: On theES210, the portEthernet1 is labeledEthernet (WAN) on thechassis, and Ethernet2 islabeled Ethernet.Station mode is supported only by the ES210 Mesh Point.A STA interface can only bridge between a wireless network AP and one or more Ethernet devices connected to the clear Ethernet port(s) on the ES210. In addition, no wired (Ethernet) bridging can occur when the Mesh Point is in station mode. An ES210 in STA mode does not support Fast Path Mesh bridging (Section 3.2.2), but can function, like other wireless devices, as an NMP (non-Mesh Point) on a FastPath Mesh Network. In other words, an ES210 in STA mode should be configured to run STP bridging mode rather than MESH bridging mode.For example, on an ES210 on which the Ethernet2 port is clear and the Ethernet1 port is encrypted (the defaults), a typical station mode setup would use the Ethernet2 port to connect one or more Ethernet devices. If the Ethernet1 port is in the clear zone, it can be used in the same way. Devices on a clear Ethernet port, however, cannot communicate with devices on an encrypted Ethernet port when the ES210 is in station mode.You can preconfigure a STA interface with the settings required to connect to a specific network. Alternatively, you can scan for available networks within range and select one to use to create the sta interface that will connect the ES210 to the network.In order to facilitate the ES210 Mesh Point's Station Mode network scanning function, a temporary STA interface, __FORTRESS__TEMP_STA__, is present in the default configuration. This STA Interface must be enabled in the GUI before it will be visible in the CLI (see the Fortress Mesh Point Software GUI Guide). View the default station configuration with show sta:# show staRadioName:            radio1Name:                 __FORTRESS__TEMP_STA__Ssid:                 __FORTRESS__TEMP_STA__Bssid:                00:00:00:00:00:00AdminState:           enable
Fortress ES-Series CLI Guide: Networking and Radio Configuration71WMM:                  enableFragThreshold:        offRtsThreshold:         offZone:                 clearDescription:802.1X/11i Security:  noneRateMode:             autoMaxRate:              54MinRate:              1McastRate:            1StaId:                00:14:8c:2a:0c:90Operational Status:   upAccess Point:         00:00:00:00:00:00You can use update sta to overwrite these parameters, or delete this STA configuration entirely and add a new one with the necessary parameters. 3.4.11.1 STA Radio, Name, SSID and SSID RoamingThe minimum parameters required to create a new STA interface are to identify the radio (-radio) on which it will be created, name the STA (-name) and provide an SSID of up to 32 characters. # add sta -radio radio1 -name station1 -ssid ssid1[OK]Warning: 802.1X/11i Security is set to none and zone is set to clear!The above example creates a STA with these default settings:# show sta RadioName:            radio1Name:                 station1Ssid:                 ssid1Bssid:                00:00:00:00:00:00AdminState:           enableBgScan:               disableBgScanIdlePeriod:     250BgScanInterval:       60WMM:                  enableFragThreshold:        offRtsThreshold:         offZone:                 clearDescription:802.1X/11i Security:  noneRateMode:             autoMaxRate:              54MinRate:              6McastRate:            6StaId:                00:14:8c:f8:18:d0Operational Status:   upAccess Point:         Not-Associated
Fortress ES-Series CLI Guide: Networking and Radio Configuration72Except for the Zone and the final lines of output (beginning with StaId, which displays the STA’s MAC address), each of the settings shown above can be configured with add sta: # add sta -radio radio1RadioName[radio1] (radio1 name of radio interface): radio1StaName (string for identity): <NewStation>Ssid (string(32 chars max)): NewStationSSIDBssid (MAC address of AP):AdminState (enable|disable to set STA administrative state):RateMode (auto|fixed to set bit-rate adaptation mode):MaxRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set maximum transmission rate in Mbps):MinRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set minimum transmission rate in Mbps):BgScan (enable|disable to set background scan support):BgScanIdlePeriod (100..60000 to set background scan idle period in milliseconds):BgScanInterval (15..86400 to set background scan interval in seconds):WMM (enable|disable to set Wi-Fi Multimedia (WMM) support):FragThreshold (off|256..2345 to set maximum fragment size):RtsThreshold (off|1..2345 to set minimum packet size for RTS/CTS handshake):McastRate (1|2|5.5|11|6|9|12|18|24|36|48|54 to set multicast transmission rate in Mbps):Description (string of description):802.1X/11i Security (none|wpa|wpapsk|wpa2|wpa2psk|wpa2mixed|wpa2mixedpsk): wpapskWpaKeyFormat (hex|ascii to set WPA key string format): asciiWpaKey (WPA key with length 64/hex, 8..63/ascii): 00000000WpaKeyConfirm (confirm WPA key with length 64/hex, 8..63/ascii): 00000000PtkRekeyInterval (pairwise transient key (PTK) rekey interval in seconds): 600To create a STA Interface, specify a StaName of up to 254 alphanumeric characters to identify the interface in the Mesh Point configuration. You cannot edit the StaName after the STA Interface has been created. Certain interface names and prefixes, such as aux and sta_ for examples, are reserved for internal use. If the StaName you enter is reserved, the Mesh Point CLI will return an error requiring you to modify your entry.Specify the network SSID to which the ES210 Mesh Point will associate. To determine which networks are available, you can use show scan (refer to Section 3.4.11.11). To disable roaming among multiple APs with the same SSID, in Bssid, specify the MAC address of a single wireless AP to which the STA Interface is permitted to associate.3.4.11.2 STA StateAdminState determines whether the interface is disabled or enabled. A newly added STA is enabled by default. 3.4.11.3 STA Unicast Transmission Rate SettingsWhen a STA Interface is configured to use a RateMode setting of auto (the default), the interface dynamically adjusts the bit rate at which it transmits unicast data frames—throttling
Fortress ES-Series CLI Guide: Networking and Radio Configuration73between the configured MaxRate and MinRate—to provide the optimal data rate for the connection.At a RateMode setting of fixed, the interface will use the configured MaxRate for all unicast transmissions and ignore the configured MinRate.Transmission rates are set in megabits per second (Mbps). MaxRate can be set only to a value greater than or equal to the currently configured MinRate, which likewise can be set only to a value less than or equal to the configured MaxRate. Usable values for transmission rate settings depend on the Band setting for the radio on which the STA Interface is configured, as shown in Table 3.8 in Section 3.4.9.5 above.NOTE: Radio Bandsettings are cov-ered in detail in Section3.4.Please refer to Section 3.4.9.5 for information on default MaxRate and MinRate settings. 3.4.11.4 STA Background ScanningTo permit background scanning for available APs, set Bgscan to enabled. The default is disabled. Background scanning enables the STA to scan periodically so that show scan data remains current. (The show scan command is covered in more detail in Section 3.4.11.11.)   BgScanIdlePeriod indicates how long the STA must be idle before going off-channel as part of background scan, in milliseconds between 100–60000 (the default is 250 ms idle time). If the STA is very busy sending and receiving traffic, going off channel would be highly detrimental to traffic flow. If the traffic volume is low, background scanning can occur with no user impact.BgScanInterval indicates how often the STA initiates a background scan. Set this value in seconds: 15–86400 (the default is 60 seconds). 3.4.11.5 STA WMM QoS SettingWhen Wi-Fi Multimedia QoS (Quality of Service) is Enabled (the default) on the STA Interface, it advertises that it is capable of WMM. If the AP to which the STA Interface associates is also enabled for WMM, WMM will be used for the association. If the AP is not capable of and enabled for WMM, having WMM Enabled on the STA Interface will have no effect.WMM is enabled by default for a STA interface.In a WMM enabled association, packets sent from the Mesh Point include WMM tags that permit traffic from the Mesh Point to be sorted according to the priority information contained in those tags.
Fortress ES-Series CLI Guide: Networking and Radio Configuration743.4.11.6 STA Fragmentation and RTS ThresholdsThe fragmentation and RTS protocol thresholds are set in bytes: 256–2345 for FragThreshold and 1–2345 for RtsThreshold—or these functions can be turned off (the default for both). The Delivery Traffic Indication Message (-dtim) beacon countdown can be set in whole values 1–255, inclusive (the default is 1).3.4.11.7 STA Multicast RatePlease refer to Section 3.4.9.12 for information on the STA Multicast Rate. 3.4.11.8 STA DescriptionYou can optionally enter a description of the interface of up to 100 characters. To include spaces in the description string, enclose it in quotation marks.3.4.11.9 STA Wi-Fi Security ConfigurationBy default, no Wi-Fi security is applied to traffic on a STA Interface. Traffic on a STA Interface with a Wi-Fi Security setting of None is unsecured.3.4.11.9.1 WPA, WPA2 and WPA2-Mixed SecurityYou can specify that WPA or WPA2 be used exclusively by the STA Interface, or you can configure it to be able to use either by selecting WPA2-Mixed.WPA and WPA2 use EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) to authenticate network connections via X.509 digital certificates. You must have specified a locally stored key pair and certificate to use to authenticate the Mesh Point as an EAP-TLS peer, and at least one CA (Certificate Authority) certificate must be present in the local certificate store. Refer to Section 4.2 for guidance on configuring an EAP-TLS key pair and digital certificate.These additional settings apply to WPA, WPA2 and WPA2-Mixed selections:rekeyperiod (PtkRekeyInterval) - specifies the interval at which new pair-wise transient keys (PTKs) are negotiated. The default is 0 (zero), which disables the rekeying function. Specify a new interval in whole seconds between 0 and 2147483647, inclusive.
Fortress ES-Series CLI Guide: Networking and Radio Configuration75NOTE: UnlikeSuite B KeyEstablishment (Sec-tion 4.1.5), the Suite BTLS Cipher option isavailable regardless ofwhether Suite B islicensed on the MeshPoint (Section 5.6).tlscipher - specifies the list of supported cipher suites, the sets of encryption and integrity algorithms, that the Mesh Point will send to the 802.1X authentication server:All - the default, supports both Legacy and Suite B cipher suites (as described in the next two items)Legacy - supports Diffie-Hellman with RSA keys (DHE-RSA-AES128-SHA and DHE-RSA-AES256-SHA)Suite B - supports Diffie-Hellman with ECC keys (ECDHE-ECDSA-AES128-SHA and ECDHE-ECDSA-AES256-SHA)In EAP-TLS, the authentication server selects the cipher suite to use from the list of supported suites sent by the client device (or rejects the authentication request if none of the proposed suites are acceptable).subjectmatch - optionally provides a character string to check against the subject Distinguished Name (DN) of the authentication server certificate. Each RDN (Relative Distinguished Name) in the sequence comprising the certificate DN is compared to the corresponding RDN in the string provided. When subjectmatch is not specified, no subject DN check is performed.certhash - optionally provides a 64-character hash value to check against the hash value of the authentication server certificate. If no value is provided for certhash, no hash value check is performed.3.4.11.9.2 WPA-PSK, WPA2-PSK and WPA2-Mixed-PSK SecurityWPA-PSK (Wi-Fi Protected Access) and WPA2-PSK are the pre-shared key modes of WPA (as distinguished from the enterprise modes described above). You can specify that WPA-PSK or WPA2-PSK be used exclusively by the STA Interface, or you can configure it to be able to use either by selecting WPA2-Mixed-PSK.Pre-shared key mode differs from enterprise mode in that PSK bases initial key generation on a user-specified key or passphrase instead of through digital certificates. Like enterprise-mode, PSK mode generates encryption keys dynamically and exchange keys automatically with connected devices at user-specified intervals.
Fortress ES-Series CLI Guide: Networking and Radio Configuration76NOTE: Thetlscipher,subjectmatch, andcerthash settings donot apply when WPA-PSK, WPA2-PSK, WPA2-Mixed or None isselected for 802.1X/11i Security.These additional settings apply to WPA-PSK, WPA2-PSK and WPA2-Mixed-PSK selections:PtkRekeyInterval (-rekeyperiod) - specifies the interval at which new keys are negotiated. Specify a new interval in whole seconds between 1 and 2147483647, inclusive, or 0 (zero), to permit the same key to be used for the duration of the session.WpaKeyFormat (-keytype) - determines whether the specified key is an ascii passphrase or a hexadecimal key. WpaKey and WpaKeyConfirm  - specify the preshared key itself, as:a plaintext passphrase between 8 and 63 characters in length, when ascii is selected for keytype.a 64-digit hexadecimal string, when hex is selected for keytype.# add sta -radio <RadioName> -name <StaName> -ssid <Ssid> -bssid <Bssid> -adminstate enable|disable -ratemode auto|fixed -maxrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -minrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -bgscan enable|disable -bgscanIdlePeriod 100–60000-bgscaninterval 15–86400 -wmm enable|disable -frag off|256–2345 -rts off|256—2345 -mcastRate 1|2|5.5|11|6|9|12|18|24|36|48|54 -desc <“descriptive string”> -1X11i none|wpa|wpapsk|wpa2|wpa2psk|wpa2mixed|wpa2mixedpsk -keytype hex|ascii -wpakey <64/hex>|<8..63/ascii> -wpakeyconfirm <64/hex>|<8..63/ascii> -rekeyperiod <rekeyseconds> -tlscipher all|legacy|suite-b -subjectmatch <substring> -certhash <hash> 3.4.11.10 Editing or Deleting a STA Interface ConnectionYou can use the same switches with the update command to edit STA settings.# update sta -name <StaName> -ssid <Ssid> -bssid <Bssid> -adminstate enable|disable -ratemode auto|fixed -maxrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -minrate 1|2|5.5|11|6|9|12|18|24|36|48|54 -bgscan enable|disable -bgscanIdlePeriod 100–60000-bgscaninterval 15–86400 -wmm enable|disable -frag off|256–2345 -rts off|256—2345 -mcastRate 1|2|5.5|11|6|9|12|18|24|36|48|54 -desc <“descriptive string”> -1X11i none|wpa|wpapsk|wpa2|wpa2psk|wpa2mixed|wpa2mixedpsk -keytype hex|ascii -wpakey <64/hex>|<8..63/ascii> -wpakeyconfirm <64/hex>|<8..63/ascii> -rekeyperiod <rekeyseconds> -tlscipher all|legacy|suite-b -subjectmatch <substring> -certhash <hash> You can delete the STA interface with the del command: # del sta -all|-name <StaName>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.4.11.11 Establishing a STA Interface ConnectionYou can use the ES210 Mesh Point’s scan function to detect networks within range of the Mesh Point. A STA Interface must be present and enabled (-adminstate enable), and the Mesh
Fortress ES-Series CLI Guide: Networking and Radio Configuration77Point radio must also be enabled before you can scan for a network to connect to.Scan for available networks using show scan. Use more to break the list after a page of output.> show scan moreSSID                             BSSID             Channel RSSI Security-------------------------------- ----------------- ------- ---- ------------                                 00:14:8c:f8:29:94 149     60   none210tofcx                         00:14:8c:1e:ab:d0 9       10   wpa2AWAN                             00:1d:e6:24:86:f0 6       15   wpaBase-11a                         00:14:8c:08:3b:c2 149     63   noneBase-11g                         00:14:8c:f6:00:c3 1       61   noneFree Public WiFi                 02:12:f0:0a:e9:39 11      22   noneGUEST                            00:1d:e6:24:86:f1 6       15   noneWIRELESS                         02:60:a5:ee:e0:b3 11      24   nonepeg10wpa2                        00:14:8c:08:26:50 165     18   wpa2pskvsc-tf                           00:25:9c:67:aa:86 6       35   wpa2mixedpsk--- Total Scanned APs: 10If the network you will be connecting to uses WPA, WPA2 or WPA2-Mixed to authenticate connecting devices, you must import a valid EAP-TLS digital certificate for the STA Interface before the ES210 Mesh Point will be permitted to connect. Refer to Section 4.2 for guidance.If the network you will be connecting to uses WPA-PSK, WPA2-PSK or WPA2-Mixed-PSK, you will be required to enter a valid pre-shared key for the STA Interface, as described below, before the Mesh Point will be permitted to connect. Refer to WPA-PSK, WPA2-PSK and WPA2-Mixed-PSK Security in Section 3.4.11 for more on the pre-shared key. If the connection requires a pre-shared key for authentication, you must specify whether it is an ascii or hexadecimal string and enter, then re-enter, the correct key, as described under WPA-PSK, WPA2-PSK and WPA2-Mixed-PSK Security in Section 3.4.11.If the connection uses a digital signature for authentication, you can optionally configure the additional security options described under WPA, WPA2 and WPA2-Mixed Security in Section 3.4.11.
Fortress ES-Series CLI Guide: Networking and Radio Configuration783.4.11.12 ES210 Station Access Control ListsWhen the STA Interface is using WPA, WPA2 and WPA2-Mixed Security, an additional level of security can be provided via an Access Control List (ACL). The Station ACL function is enabled when any ACL entry is administered. Once the ACL is enabled, the Mesh Point compares the X.509 digital certificates of 802.1X authentication servers against the filter criteria in the ACEs contained in the ACL, in the specified Priority order. If no match is found, access is denied. If a match is found, access is allowed or denied according to the ACL entry’s Access rule.The ACEs available for inclusion on the ACL are created using add ace, and edited using update ace. (see Section 4.3). Once Access Control Entries have been created, they can be added to the Station ACL using add station-acl. # add station-acl -name <ACEname> -access allow|deny -priority 1-100You can configure up to 100 ACL entries to be applied in the specified priority. Name identifies the ACE that you want to add to the station ACL. View a list of available ACE names with show ace (see Section 4.3).Priority establishes the order in which the ACL entry will be applied, from 1 to 100, relative to other configured ACL entries. Priority values must be unique. Entries with lower priority numbers take precedence over those with higher priority numbers.Access determines whether the Mesh Point will Allow or Deny (the default) access to an authentication server whose X.509 certificate matches the criteria specified in the ACL entry.View the entries in the Station ACL using show:# show station-aclPrio Type  ACE Name---- ----- ----------------------- Total ACLs: 0Use del station-acl to remove entries from the Station ACL.NOTE: Deleting allACL entries dis-ables the STA InterfaceACL function.# del station-acl -all|-name <ACEname>Deleted ACL entries no longer appear when you run show station-acl.3.5 Local Area Network Configuration Network settings includes those that establish the Mesh Point’s basic LAN configuration: hostname and IPv4 and IPv6 settings.
Fortress ES-Series CLI Guide: Networking and Radio Configuration793.5.1 Hostname and IPv4 Settings View basic network properties with the show network command:> show networkCurrent IP values:    IPv4 Enabled:y    Hostname:hostname    IP:192.168.1.9    Netmask:255.255.255.0    DefaultGateway:192.168.1.1   Configured IP values:    IP:192.168.1.9    Mask:255.255.255.0    Gateway:192.168.1.1NOTE: The For-tress Mesh Point’sdefault IP address is:192.168.254.254Current IP values are those actually in use on the IPv4 network. Configured IP values are those specified for the Mesh Point (by factory defaults or an administrator). These values can differ briefly between your changing IP values and the new settings taking effect.IPv4 is enabled by default. If the Mesh Point is installed on a network that uses IPv6 exclusively, you can disable IPv4. If the Mesh Point is installed on an IPv4 network, disabling IPv4 prevents you from managing the Mesh Point via IPv4 through the Mesh Point GUI and SSH. Additionally, all IPv4 services, (NTP, SNMP, remote audit logging, external authentication services, etc.) will be disabled. If the Mesh Point’s internal IPv4 DHCP server is enabled, it, too, will be disabled when IPv4 is disabled. Other configurable parameters establish the Mesh Point’s hostname, assign the IPv4 address and subnet mask of the Mesh Point’s management interface and identify the IPv4 default gateway (or router) for the network on which you are installing the Mesh Point. Configure IPv4 network properties for the Fortress Mesh Point with the set network command, as follows:# set network IPv4Enabled[y] (y|n):yHostname[ES-00148c081080]:<hostname>IPaddress[192.168.1.9]:<mngmtIPaddr>Netmask[255.255.255.0]:<subnetmask>DefaultGateway[192.168.1.1]:<dfltGtwy>Confirm: Save and use this configuration? (n|y): y[INFO] This operation may take some time....[OK]The Mesh Point CLI displays the configurable fields for set network one at a time. Enter a new value for the field—or leave the field blank and the setting unchanged—and strike Enter↵, to display the next field. The final confirmation query
Fortress ES-Series CLI Guide: Networking and Radio Configuration80displays only when you have entered a value into at least one of the fields presented.Alternatively, you can run set network non-interactively with valid switches and arguments in any order and combination:# set network -enable y|n -h <hostname> -ip <IPv4addr> -nm <subnet_mask> -gw <default_gatewayIP> The Mesh Point CLI returns [OK], when settings are successfully changed, and informs you that there may be brief delay before your change(s) take effect.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.5.2 IPv6 Settings NOTE: IncomingICMPv6 (InternetControl Message Proto-col version 6) packetsrequire administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includethe relevant IPv6addresses. See Section2.2.5 for more detail.Traffic is affected by theper-interface packet fil-ters. If configured, per-interface packet filtersmust include filters topermit ICMPv6 traffic.See Section 4.6.3 formore detail.The Mesh Point supports IPv6, which is always enabled. When an IPv6 router is present on the network and Automatic Address is Enabled on the Mesh Point (the default), the Mesh Point will be automatically provided a compatible IPv6 Global Address and Prefix Length. Any network IPv6 routers configured to do so will additionally supply their own addresses as the Mesh Point’s IPv6 Default Gateways.View the Mesh Point’s current IPv6 configuration with show networkv6:> show networkv6Current IPv6 values:    Automatic Address Enabled:n    Global Address:2001:DB8:0:0:0:0:0:2    Global Address Prefix Length:128    Link Local Address:FE80:0:0:0:214:8CFF:FE08:1080    Other Addresses:FD00:0:8895:8895:214:8CFF:FE08:1980/64                    2099:0:0:0:214:8CFF:FE08:1980/64    Default Gateways:FE80:0:0:0:0:0:0:1 (metric=47)                     2001:0:0:0:0:0:0:1 (metric=23)Configured IPv6 values:    Global Address:2001:DB8:0:0:0:0:0:2    Global Address Prefix Length:128    Gateway:FE80:0:0:0:0:0:0:1    Default Gateway Metric:1024Prefix lengths for Other Addresses are shown after the addresses, and the metrics for all Default Gateways are shown in parentheses).You can choose to allow all IPv6 settings to be automatically configured on the Mesh Point, opt to manually configure the global address and IPv6 gateway/metric, or use both manually and automatically configured global addresses.
Fortress ES-Series CLI Guide: Networking and Radio Configuration81Change the Mesh Point’s IPv6 network settings with set networkv6 with valid switches and arguments in any order and combination:# set networkv6 -auto y|n -ip <IPv6GlobalAddr> -pl <prefix_length> -gw <IPv6DfltGtwyAddr> -gm <DfltGtwyMetric>When automatic addressing is at its default of enabled (-auto y), and there is an IPv6 router on the network configured to provide the global prefix, the Mesh Point will automatically configure a compatible IPv6 global address for itself. If additional IPv6 routers are present, auto-addressing will configure additional IPv6 global addresses.If you choose to manually configure IPv6 settings, these include:NOTE: Fortress’sFastPath Meshfunctionality includesindependent IPv6addressing, which cansupply additional IPv6ULAs (Unique LocalAddresses, refer to Sec-tion 3.2.2).-auto (auto addressing) - configures the Mesh Point to learn IPv6 global prefixes from network routers (y, the default) or to use only a locally established global address (n).-ip (configurable global address) - manually establishes an IPv6 global network address—which must be within the IPv6 global scope—for the Mesh Point’s management interface.-pl (configurable prefix length) - specifies the bit length of the prefix portion of the Mesh Point’s configurable global address.-gw (configurable gateway) - manually provides the IP address of the default gateway for the Mesh Point’s IPv6 subnet. The default gateway address must be a compatible link-local or global address (i.e., lie within the same prefix as either the global address or the link-local address).If no default gateway is necessary (i.e., you are configuring the Mesh Point for use on a private network unconnected to other OSI Layer 3 networks), you need not configure an IPv6 default gateway.-gm (configurable gateway metric) - establishes the IPv6 metric, or relative routing cost, for the configurable gateway, allowing it to be assigned a preference relative to the automatically assigned default gateways.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.5.3 DNS Client Settings The Mesh Point can be configured as a standard Domain Name System client.
Fortress ES-Series CLI Guide: Networking and Radio Configuration82NOTE: Mesh Pointsoftware alsoincludes a standardDNS service (Section3.8), and FP Mesh pro-vides name resolutionwithin the mesh inde-pendent of any DNSservice (Section 3.2.2).View the current DNS client configuration with show:> show dns-clientDomain:               ftimesh.localPreferred DNS server: UnknownAlternate DNS server: UnknownConfigure DNS settings with set, which can be used interactively:# set dns-clientDomain: <domainName>Preferred IP: <preferredDNSsvrIPaddrs>Alternate IP: <alternateDNSsvrIPaddrs>The Mesh Point CLI displays the configurable fields for set dns one at a time. Enter a new value for the field—or leave the field blank and the setting unchanged—and strike Enter↵, to display the next field.Alternatively, you can run set dns non-interactively with valid switches and arguments in any order and combination:# set dns-client -d <domainName> -ip1 <preferredDNSsvrIPaddrs> -ip2 <alternateDNSsvrIPaddrs>The Mesh Point CLI returns [OK] when settings are successfully changed.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.6 Time and Location Configuration You should either set the Mesh Point’s internal clock at installation, or enable and configure its NTP (Network Time Protocol) function.3.6.1 System Date and Time View Mesh Point date and time settings with the show clock command:> show clockSun Jul 15 23:39:39 UTC 2001You can use the -local switch to show the local time rather than the default TimeZone, UTC (Universal Time Coordinated):> show clock -localTue Sep 30 23:08:23 ETD 2008Set system date and time on the Fortress Mesh Point, using the twenty-four-hour clock and numerical date, through the set clock command, as follows:# set clock# set clock -h 14 -m 21 -s 46 -M 12 -D 12 -Y 2010
Fortress ES-Series CLI Guide: Networking and Radio Configuration83The set clock command returns the Mesh Point’s current date and time values, which you can edit and re-enter: use the left/right arrow keys to navigate displayed fields, backspace over current values or overwrite them. When you finish typing in new values, strike Enter↵ to save them. The Mesh Point CLI returns [OK] when settings are successfully changed.Alternatively, you can run set clock non-interactively with valid switches and arguments, as shown below.# set clock -h <hrs> -m <mins> -s <secs> -M <M> -D <D> -Y <YYYY>To set the Mesh Point’s internal clock in local time rather than UTC, use the -local switch with set clock.# set clock -local# set clock -local -h 10 -m 21 -s 46 -M 12 -D 12 -Y 2008The Mesh Point CLI returns [OK] when settings are successfully changed.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.6.2 Time Zone View the current time zone setting with show:> show timezone              America/New_YorkThe set command is used to change the time zone setting interactively, displaying allowable country|territory values for you to enter, and then allowable zone values. Entries are case-sensitive: enter your choice exactly as it appears in the list.# set timezoneAfrica, America, Asia, Atlantic, Australia, Brazil, Canada, Europe, Indian, Mexico, Mideast, Pacific, US,--> Enter timezone|continent|country|territory name: USAlaska, Aleutian, Arizona, Central, East-Indiana, Eastern, Hawaii, Indiana-Starke, Michigan, Mountain, Pacific, Samoa--> Enter second level timezone|country|state|city|territory name: US/EasternThe Mesh Point CLI returns [OK] when settings are successfully changed.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.6.3 NTP Client Configuration The Mesh Point supports configuration with up to three Network Time Protocol (NTP) servers.View the current NTP configuration with show ntp:
Fortress ES-Series CLI Guide: Networking and Radio Configuration84> show ntpServerName:    primaryIPorHostname:  192.168.10.9Active:        YAuthEnabled:   NAuthKeyIndex:  0  (not valid)ServerName:    secondaryIPorHostname:Active:        NAuthEnabled:   NAuthKeyIndex:  0  (not valid)ServerName:    tertiaryIPorHostname:Active:        NAuthEnabled:   NAuthKeyIndex:  0  (not valid)No NTP servers are configured by default.NOTE: IncomingNTP packetsrequire administrativeaccess. If the administra-tive IP address ACL (dis-abled by default) isenabled, it must includeIP addresses for the NTPserver(s). See Section2.2.5 for more detail.Traffic is affected by theper-interface packet fil-ters. If configured, per-interface packet filtersmust include filters topermit NTP traffic toand from the FMP. SeeSection 4.6.3 for moredetail.NTP servers are specified by local ServerName (or -name), as primary, secondary, and tertiary, and added to the Mesh Point configuration by network IP address or hostname (IPorHostname, or -ip).The Active (or -enable) parameter permits you to control whether or not a configured NTP server is currently in use by the Mesh Point’s NTP client function.Optionally, you can configure the Mesh Point to use RSA SHA1 to authenticate incoming NTP packets from a configured NTP server by specifying y(es) for AuthEnabled (-auth y) for the server. In order for the Mesh Point to successfully authenticate NTP packets from a configured server, you must also specify a key index value for the server with AuthKeyIndex (-keyindex). Specify a valid index value from 1 to 65534.Configure a new NTP server for the Mesh Point or change the settings of an existing server interactively with set ntp:# set ntpServerName (primary|secondary|tertiary to select server):primary|secondary|tertiaryIPorHostname (IP address or name of the server:<NTPsrvrIPaddr>|<NTPsrvrHostname>Active (Y|N to enable|disable the server):y|nAuthEnabled (Y|N to enable|disable SHA1 authentication):y|nAuthKeyIndex (specifies which key the server expects the client to authenticatewith (valid indices: 1-65534; set 0 or 65535 to invalidate index)):0|1-65534Alternatively, you can use the command non-interactively to specify any of the same settings:# set ntp -name primary|secondary|tertiary -ip <NTPsrvrIPaddr>|<NTPsrvrHostname>|"" -enable y|n -auth y|n -keyindex 0|1-65534
Fortress ES-Series CLI Guide: Networking and Radio Configuration85NOTE: The -ip flagwith empty doublequotation marks deletesa configured server.A Mesh Point enabled to authenticate NTP packets must additionally be configured, using add ntp-key, with the key(s) (and indices) that will be used to authenticate configured NTP server(s). # add ntp-keyAuthKeyIndex (specifies which key the server expects the client to authenticate with (valid indices: 1-65534)): 1-65534AuthKey (SHA1 authentication key with length 40/hex, 1..39/ascii): <40-digitHexadecimalKey>|<1-40-digitASCIIkey>You must specify a valid index value for the key you are configuring, which should match the value specified (with set ntp, above) for the relevant server(s).The key length requirement is dictated by the type of the key you are configuring:A hexadecimal key must be 40 characters long.An ascii key length can be 1–40 characters long.Any number of NTP authentication keys can be present in the Mesh Point configuration.You can also use add ntp-key non-interactively:# add ntp-key -keyindex 0|1-65534 -key 40/<hexadecimalKey>|1...40/<asciiKey>You can use the same switches with update ntp-key to change the key associated with the specified key index.# update ntp-key -keyindex <N> -key 40/<hexadecimalKey>|1...40/<asciiKey>You can delete a single NTP key, identified by its associated key index value, or all NTP keys currently configured on the Mesh Point:# del ntp-key -keyindex <AuthKeyIndex>|-allSet the timeout interval for multiple NTP servers, in minutes between 5 and 1440, with set ntptimeout:# set ntptimeout 5..1440View the current NTP timeout setting with show ntptimeout:# show ntptimeout Timeout:  240You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Networking and Radio Configuration863.7 GPS and Location ConfigurationOnly the ES2440 and ES210 Mesh Points are equipped with an internal GPS receiver that, when enabled and connected to a GPS antenna, permits the Mesh Point to use the signals of GPS satellites in range to triangulate its exact position on the globe. The internal GPS is disabled by default.The ES820 and ES520 Mesh Points can be equipped with external GPS receivers. Fortress Mesh Point Hardware Guides for these models provide details on supported devices. Install external USB GPS receivers according to their manufacturers’ instructions. After installing an external GPS receiver, you must enable it.Enable the internal GPS or an external GPS receiver with the set location command:# set location -mode gpsView the current location with show location:# show location Mode: gpsFix type: 3DLatitude: 42°34'17.659"NLongitude: 71°24'44.180"WAltitude: 93 metersSpeed: 0.0000 m/sSatellites: 8Last Fix: Tue Mar 23 13:46:42 2010The Mode indicates whether the location will be determined by the GPS, or set manually.The Fix type indicates how many, if any, GPS satellites are within the Mesh Point’s range and whether or not the Satellite Based Augmentation System (SBAS) was used to determine the Mesh Point’s location:Unavailable: No satellites are within range and no fix is obtainable. 2D or 2D SBAS: A limited number of satellites are within range. A fix is obtainable, but the location is not as accurate as when the fix type is 3D or 3D SBAS.3D: Indicates that enough satellites are available to get accurate longitude, latitude, and altitude readings.3D SBAS: The most accurate fix type. It indicates that enough satellites are available to get accurate longitude, latitude, and altitude readings and that the SBAS was used to determine the location.
Fortress ES-Series CLI Guide: Networking and Radio Configuration87The Latitude, Longitude, and Altitude show the Mesh Point’s current location. The Speed indicates the speed at which the Mesh Point is currently moving, if at all. Satellites shows the number of GPS satellites within range of the Mesh Point at the time of the Last Fix.The set bridging command includes a -mobility switch that configures how frequently the Mesh Point receives fresh positioning information from the GPS satellite with which it is in communication, on a scale from 1 to 60. The lowest setting is appropriate for fixed networks. A higher refresh rate should be used for Mesh Points on a mobile mesh network, with the highest setting reserved for the fastest-moving network nodes.# set bridging -mobility 1–60The default Mesh Point bridging -mobility setting is 30.Disable the internal GPS or an external GPS receiver by setting the GPS mode back to manual operation. You should disable an external GPS receiver installed in an ES820 or ES520 in advance of removing the GPS receiver from the chassis USB port.You can also configure a Mesh Point’s location parameters manually with the set location command:# set location -mode manual -altitude 93 -latitude 39:37:48.84N -longitude 104:59:7.26WSpecify the Mesh Point’s altitude in meters and the latitude and longitude coordinates in degrees, minutes and seconds, north/south or east/west in the format:DD:MM:SS.ssN/S/E/W, with no spacesOnce set, view the configured location with show location:# show location Mode:        manualLatitude:    39:37:48.84NLongitude:   104:59:7.26WAltitude:    93 metersYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2). NOTE: WhenVLANs areenabled (refer to Sec-tion 3.11), the MeshPoint’s DHCP and DNSservices are accessibleonly in the managementVLAN.3.8 DHCP and DNS Services Mesh Point functionality includes standard, user configurable network IPv4 and IPv6 DHCP (Dynamic Host Control Protocol) and DNS services.3.8.1 Enabling DHCP ServicesWhen the Mesh Point’s internal DHCP servers are enabled, the Mesh Point provides standard DHCP services to network
Fortress ES-Series CLI Guide: Networking and Radio Configuration88DHCP clients. Both internal DHCP servers are disabled by default. NOTE: IncomingDHCP unicastrequests require admin-istrative access. If theadministrative IPaddress ACL (disabledby default) is enabled, itmust include IPaddresses to permitDHCP requests. See Sec-tion 2.2.5 for more detail.Traffic is affected by theper-interface packet fil-ters. If configured, per-interface packet filtersmust include filters topermit DHCP traffic toand from the FMP. SeeSection 4.6.3 for moredetail.View the current DHCP server settings with the show dhcp-server command:# show dhcp-serverDHCPv4 Server State-------------------Mode          :  serverMin IPv4 range:  172.30.16.1Max IPv4 range:  172.30.16.255Max Lease Time:  60DHCPv6 Server State-------------------Mode          :  serverIPv6 range    :  autoMax Lease Time:  60You can use the set dhcp-server command to enable either DHCP server.# set dhcp-server -mode off|server -version ipv4|ipv6 -auto y|n -iprangeMin <IPrangeMin> -iprangeMax <IPrangeMax> -maxLeaseTime <0..525600>The -mode switch enables a DHCP server if set to server or disables the server if set to off. The -maxLeaseTime determines the maximum time in minutes, up to 525,600 (365 days), before the DHCP lease expires. The default max lease time is 60 minutes.To enable the Mesh Point’s internal IPv4 DHCP server, use the set command to specify the lowest and highest IPv4 addresses in the Mesh Point’s IPv4 DHCP address pool:# set dhcp-server -mode server -version ipv4 -iprangeMin 172.30.16.1 -iprangeMax 172.30.16.255To enable the Mesh Point’s internal IPv6 DHCP server with automatic addressing, use the set command:# set dhcp-server -mode server -version ipv6 -auto yAlternatively, you can use the set command to enable the internal IPv6 DHCP server and specify the pool’s start and end IPv6 addresses:# set dhcp-server -mode server -version ipv6 -ipRangeMin <IPrangeMin> -ipRangeMax <IPrangeMax> -maxLeaseTime <MaxLeaseTime>View the leases obtained from the DHCP servers with the show command:# show dhcp-server-leases
Fortress ES-Series CLI Guide: Networking and Radio Configuration89[ Active DHCP LEASES ]Mac leaseExpiry hostname  ipAddress gateway----------------- ---------------------------- --------------------------- ------------- ---------------------00:0c:29:8e:ac:0a Wed Mar 24 19:34:49 2010 UTC  FD00:0:8895:8895:20C:29FF:FE8E:AC0A 00:0c:29:8e:ac:14 Wed Mar 24 19:25:07 2010 UTC vmclient12.gdfortress.com   172.30.50.204 172.30.50.1You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.8.2 Enabling DNS Servers and Adding External DNS ServersNOTE: IncomingDNS queriesrequire administrativeaccess. If the administra-tive IP address ACL (dis-abled by default) isenabled, it must includeIP addresses to permitDNS queries. See Section2.2.5 for more detail.Traffic is affected by theper-interface packet fil-ters. If configured, per-interface packet filtersmust include filters topermit DNS traffic toand from the FMP. SeeSection 4.6.3 for moredetail.Internal DHCP services use the internal DNS server (see below) and the locally configured DNS client settings and domain name (refer to Section 3.5.3).View the current DNS client settings with the show command:# show dns-clientDomain:               gdfortress.comPreferred DNS server: 10.2.2.35Alternate DNS server: UnknownThe Mesh Point’s internal DNS server is enabled by default. To enable or disable DNS services, use the set command:# set dns-server -enable y|nDetermine whether the DNS server is enabled with the show command:# show dns-serverDNS Server State: EnabledYou can use the add dns-entry command to map a DNS name to an IP address.# add dns-entry -name <DNSName> -ip <DNSIPAddr>NOTE: Fortress’sFastPath Meshfunctionality includesautomatic RFC-4193IPv6 addressing inde-pendent of network IPv6DHCP services (see Sec-tion 3.2.2).View the current DNS servers with the show command:# show dns-entryIpAddress                     Domain           Name      Type----------------------------- ---------------- --------- -------172.30.16.237                 gdfortress.com   ESnnn-237 selfFE80:0:0:0:214:8CFF:FEF8:18C0 gdfortress.com   ESnnn-237 self172.30.16.240                 gdfortress.com   ExtDNS1   staticTotal 3 EntriesYou can delete a single DNS entry by name or all added DNS entries:# del dns-entry -all|-name <DNSName> -ip <DNSIPAddr>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Networking and Radio Configuration903.8.3 Enabling Multicast DNSMulticast DNS (mDNS) enables plug-and-play or zero configuration networking, which allows a link-local IP network to be created automatically without manual configuration or special configuration servers (such as DHCP or DNS). A set of hosts on the same link, all implementing zero-configuration networking, can immediately start to communicate via IP without any external configuration. When enabled on Fortress Mesh Points, non-Mesh Points that support zero-configuration networking can use mDNS queries to resolve MP and NMP names in the mesh (in the .local domain), even when DNS services are not available. mDNS is very similar to DNS, except that queries are sent to the link-local multicast address instead of to a DNS server’s unicast address. To enable the multicast DNS server, use the set command: # set multicast-dns -enable y|nDetermine whether or not the multicast DNS server is enabled with the show command:# show multicast-dnsMulticast DNS State: disableYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.9 Ethernet Interfaces Fortress Mesh Points are equipped for wired network connections with varying numbers of Ethernet ports with various optional characteristics.Table 3.9 Fortress Mesh Point Ethernet PortsFortress model # of Eth ports HW label GUI label takes PoE serves PoE default encryptionES2440 3Ethernet1Ethernet 1/WAN/PoEyes no encryptedEthernet2 & Ethernet3 Ethernet2 & Ethernet3 no no clearES820 2 Enet1/P1 Ethernet1 no no encryptedEnet2/P2 Ethernet2 no no clearES520 9 WAN wan1 yes no encrypted1–8 lan1–lan8 no yes clearES210 2 Ethernet (WAN) Ethernet1 no no encryptedEthernet Ethernet2 no no clear
Fortress ES-Series CLI Guide: Networking and Radio Configuration91View the current configuration of the Mesh Point’s Ethernet interfaces (followed by status information and statistics not shown in this example) with show interface. The output for this command varies based on the number and type of interfaces on the Mesh Point (refer to Table 1.1 on page 3):# show interface[CONFIGURED INFO]                          Switching                                     UCost            Enable TrafficName      Mode     VlanId Mode      Duplex Speed 8021x Zone      MeshIf Offset MeshEncap QoS    Class--------- -------  ------ --------- ------ ----- ----- --------- ------ ------ --------- ------ -------Ethernet1 enabled  1      access    auto   auto  N     encrypted access 0      N         N      lowEthernet2 enabled  1      access    auto   auto  N     clear     access 0      N         N      low[STATUS INFO]Name      Link Duplex Speed Collisions--------- ---- ------ ----- ----------Ethernet1 down half   10    0Ethernet2 up   full   100   0[STATISTIC INFO]Name      Type    State          InBytes    InPackets InErrTotal OutBytes   OutPackets OutErrTotal--------- ------- -------------- ---------- --------- ---------- ---------- ---------- -----------Ethernet1 wired   disabled       0          0         0          0          0          0Ethernet2 wired   forwarding_all 70804      1079      40         32816      587        0The Name of the interface cannot be changed, and correlates to the hardware port. Refer to Table 3.9 to find the appropriate port name. Use it (with the -name switch) to identify the interface you want to configure with set interface:# set interface -name <InterfaceName>Mode[enabled] (enabled|disabled to set administrative mode):Zone[clear] (clear|encrypted):MeshIf[access] (core|access(default) to make interface Mesh Net or not (e.g. Access)):UCostOffset[100] (user-defined offset used in computing interface cost [0..4294967295], default is 0)MeshEncap[N] (Y|N to enable|disable Mesh encapsulation on Mesh core interface):VlanId[1] (Vlan ID for untagged PDUs [1..4094]):SwitchingMode[access] (trunk|access to set switching mode):AllowAll[Y] (Y|N to allow all VLANs in trunk interface):Table (list of active VLAN IDs when allow all is disabled):8021x[N] (Y|N to enable or disable IEEE 802.1X port authentication):RadiusRetryInterval[0] (maximum interval in seconds before primary RADIUS server is tried again):ReauthInterval[3600] (EAPOL reauthentication interval in seconds):PSE[disable] (enable|disable to enable or disable PoE PSE):AutoNegotiation[N] (Y|N for auto negotiation):EnableQoS[N] (Y|N to enforce traffic class priority, override 802.1p):TrafficClass[low] (low|medium|high|critical to set traffic class priority):DuplexMode (half|full): SpeedValue (10|100 to set speed when autoNegotiation is off):Mode enables/disables the port itself. Ports are enabled by default). Zone places the port in the Mesh Point’s clear or encrypted zone. Refer to Table 3.9 for the default clear/encrypted values for each port.
Fortress ES-Series CLI Guide: Networking and Radio Configuration92Three settings configure the port’s FastPath Mesh attributes and apply only when FastPath Mesh is enabled on the Mesh Point:MeshIf (-meshif, a.k.a., FastPath Mesh Interface Mode) - establishes the port’s role in the FP Mesh network.core interfaces connect to other FastPath Mesh network nodes.When VLANs are used in FastPath Mesh bridging deployments, all FP Mesh core interfaces must be configured as VLAN trunk ports (described below).access interfaces connect Non-Mesh Points (NMPs) to the network. All Ethernet ports are configured as FP Mesh access interfaces by default. UCostOffset (-ucost, or user cost offset) - allows you to weight the port more heavily in the FP Mesh cost equation in order to make it less attractive relative to other interfaces. Enter a non-negative integer between 0 (zero) and 4,294,967,295. The higher the offset, the less attractive the interface. A neighbor with the maximum cost (4,294,967,295) will never be used to route traffic. The default is 0 (zero). Network Cost Weighting and the FP Mesh cost equation are described in Section 3.2.2.MeshEncap (-meshencap, or mesh encapsulation) - adds the capability to add two additional MAC addresses to encrypted packets traversing wired interfaces. The two new addresses become the MAC addresses of the sending Mesh Point and the receiving Mesh Point.The purpose of this feature is to improve interoperability with Layer 2 switches when the Ethernet ports are used as Mesh Core. This feature is automatically enabled whenever an Ethernet port is configured as a Mesh Core, unless the administrator specifically disables it.It is highly recommended that Mesh encapsulation is not disabled on Mesh Core interfaces, unless there is a need to interoperate with older software for a temporary amount of time.Ports that connect Mesh Points to one another must be configured as core interfaces, and these core interfaces must all be configured to reside in the same Zone (encrypted or clear) as the FP Mesh network as a whole.
Fortress ES-Series CLI Guide: Networking and Radio Configuration93NOTE: Packetsbelonging to aport's native VLAN(VlanId), are alwaysallowed; so untaggedpackets are alwaysallowed to traverse atrunk link.VlanId assigns a VLAN ID between 1 and 4094 to the port. By default all ports are assigned VLAN ID 1. If the VLAN ID you enter is not already present in the Active VLAN Table (Section 3.11.1), it will be automatically added.SwitchingMode determines whether the port will pass packets with their VLAN tagging information unchanged (trunk) or the port will accept only untagged incoming packets and pass them only to interfaces assigned to the same VLAN ID (access, the default).NOTE: WhenVLANs are usedwith FP Mesh bridging,all Core interfaces mustbe configured as VLANtrunk ports (refer to Sec-tion 3.11.3).AllowAll and Table configure VLAN trunk filtering for the interface, when the interface SwitchingMode is trunk. When AllowAll is Y (yes, the default), no filtering takes place on the port. If you set AllowAll to n (no), the interface accepts only packets with VLAN tags matching a VLAN ID that has been specified for the port using the Table option. (When SwitchingMode is access, these options have no effect.)802.1x is disabled by default on all ports, so that non-802.1X devices can connect to any port. When enabled, devices connecting to the port must be 802.1X supplicants successfully authenticated by the 802.1X server configured for the Mesh Point.RadiusRetryInterval specifies the number of seconds (0—2147483647) between retries of the primary authentication server. The default is 0 (zero), which disables the function: If the primary authentication server cannot be reached on the initial attempt, it is not retried until all configured network servers (secondary, tertiary, etc.) have been tried in turn and also failed.ReauthInterval configures the wired 802.1X EAPOL (Extensible Authentication Protocol Over LAN) reauthentication period, in seconds (0—2147483647), where 0 (zero) disables the function. The default is 3600 seconds.NOTE: On sup-ported hardware,the WAN port isenabled to draw PoEfrom external PowerSourcing Equipment; itcannot serve PoE.PSE (Power Sourcing Equipment), when present, is disabled by default. Only the ES520 Mesh Point can act as Power over Ethernet Power Sourcing Equipment (PoE PSE), and only via the eight ports of its internal LAN switch, named lan1–lan8.When enabled, the Mesh Point’s internal LAN switch ports 1–8 port will serve Power over Ethernet (PoE) up to the maximum’s described in the Fortress Mesh Point Hardware Guides.
Fortress ES-Series CLI Guide: Networking and Radio Configuration94NOTE: The ES2440supports a portspeed of 1000 Mbpswhen AutoNegotia-tion is enabled (y), butyou cannot specify thatvalue for Speed.AutoNegotiation is enabled (y) by default on all ports. If you disable AutoNegotiation, specify the Duplex mode and negotiation Speed. Duplex determines whether the port will allow only Full duplex communication or only Half duplex communication. Speed determines the speed at which the port will transmit and receive data 10 Mbps or 100 Mbps. When QoS is disabled (EnableQoS:n), the port passes packets tagged with IEEE 802.1p Quality of Service information, as tagged, according to the Mesh Point’s four-class 802.1p QoS implementation (Section 3.10). This is the default setting on all ports. Enabling QoS on a given port (EnableQoS:y) configures the port to apply its assigned Quality of Service class to all packets received on the port, overriding any IEEE 802.1p tag already present. When you enable QoS on a port, you can then assign the port to—and therefore apply to all traffic passed on the port—one of the four available service classes: TrafficClass low, medium, high or critical. Alternatively, you can use the set interface command with valid switches and arguments to configure any of the above settings on an individual Ethernet port:# set interface -name <InterfaceName> -adminstate enable|disable -zone clear|encrypted -meshif core|access -ucost 0–4294967295 -meshencap Y|N -vlanID 1-4094 -switchingmode trunk|access -8021x y|n -radiusperiod 0—2147483647 -reauthperiod  0—2147483647-pse enable|disable -autoneg y|n -duplex half|full -speed 10|100 -QoSAdmin y|n -priority low|medium|high|critical3.10 Quality of Service The Mesh Point supports Quality of Service (QoS) traffic expediting standards, including IEEE 802.1p (Traffic Class Expediting), the WMM® (Wi-Fi Multimedia) subset of IEEE 802.11e (QoS for Wireless LAN), and the more recent Differentiated Services (DiffServ) model described in RFC 2474 (Definition of the Differentiated Services Field [DS Field] in the IPv4 and IPv6 Headers) and RFC 2475 (An Architecture for Differentiated Services).Incoming network traffic is sorted for expediting into one of four QoS TrafficClass priority queues: critical - packets in the critical queue are delivered ahead of packets at all other QoS levels.high - packets in the high queue are delivered after critical packets and ahead of packets in lower-level queues.medium - packets in the medium queue are delivered on a Best Effort basis: after those in higher-level queues, but ahead of low priority traffic.
Fortress ES-Series CLI Guide: Networking and Radio Configuration95low - packets in the low queue are delivered after packets in all other QoS queues; the low priority queue is intended for network background traffic.The Mesh Point’s implementation of DiffServ and the earlier IP precedence traffic prioritization standards are mutually compatible. QoS prioritization information will be derived from Incoming packet headers in any of the supported standard formats. All such information is overridden, however, by the QoS setting of the Ethernet port through which the packet is received, if the port is enabled for QoS.Mesh Point QoS processing follows these steps:1If the packet is received on an Ethernet port on which the QoS is enabled, it is sorted into the TrafficClass queue specified by the port setting.2If the packet header includes a VLAN tag, the packet is sorted into the queue that maps to the 802.1p user-priority tag contained in the VLAN tag.3If the IPv4 or IPv6 packet header includes a DiffServ field, the packet is sorted into the queue that maps to the DSCP (DiffServ Code Point) contained in the DS field.4If the packet is a wireless frame, it is sorted according to the WMM information in the 802.11 header.5If the packet contains no QoS information, it is sorted into the medium queue.The mapping that determines an incoming packet’s traffic class in Step 2 is configured in the Mesh Point’s TrafficClass-to-Tags map. In Step 3, this mapping is configured in the Mesh Point’s TrafficClass-to-DSCP map. Reconfiguring these maps is described below.View the Mesh Point’s current QoS mapping schemes with show qos:# show qos TrafficClass  Tags------------  ------------low           1  2  medium        0  3  high          4  5  critical      6  7  TrafficClass  DSCP------------  ------------------------low           10 12 14 medium        0  1  2  3  4  5  6  7                8  9  11 13 15 16 17 18               19 20 21 22 23 24 25 27               29 31 32 33 35 37 39 40               41 42 43 44 45 47 48 49
Fortress ES-Series CLI Guide: Networking and Radio Configuration96              50 51 52 53 54 55 56 57               58 59 60 61 62 63 high          26 28 30 critical      34 36 38 46The example output above shows the Mesh Point’s default QoS configuration.You can restore the default QoS Tags and DSCP mappings with the set qos command:# set qos -resetdefaultsThe -resetdefaults switch takes no arguments and should only be used by itself, without any other set qos switches.3.10.0.0.1 IP Precedence QoS Tags and MappingWhen the Mesh Point is configured to use VLANs (vlan -mode enabled or translate (refer to Section 3.11), 802.1p priority tags are conveyed, over interfaces with a VLAN -switchingmode of trunk (refer to Section 3.9), as part of the VLAN tags included in packet headers.NOTE: Per-portQoS settings (referto Section 3.9) overrideany priority informationin the packet headers oftraffic on that port.When VLANs are disabled, the Mesh Point drops regular VLAN traffic but accepts specialized priority-tagged packets in order to support Ethernet QoS exclusive of a VLAN implementation. (Priority-tagged packets use a VLAN tag with a VLAN ID of zero, a null-value VLAN ID.)When no VLAN tags are present in wireless packets, QoS priority tags can be conveyed in their 802.11 headers.When enabled on the BSS (see Section 3.4.9.6), WMM Quality of Service is in effect for wireless bridge links, the connections formed between bridging BSSs on Mesh Point radios (refer to Section 3.4.9.2).NOTE: To deter-mine/configureWMM QoS capabilityfor a given device, con-sult its documentation.QoS is negotiated individually for devices connecting to a WMM-enabled BSS configured to provide wireless access points (APs). If the connecting device supports and is enabled for WMM QoS, the Mesh Point prioritizes traffic for the device according to its priority tags. Traffic from devices that do not send priority tags is marked for Medium (or Best Effort) QoS handling.WMM is enabled by default on new BSSs (refer to Section 3.4.9.6).NOTE: You candisable 802.1p QoSon the Mesh Point byassigning all eight802.1p tags to the samepriority level.The Mesh Point sorts 802.1p-tagged packets into QoS TrafficClass priority queues according to the configurable QoS Tags map. The default mapping conforms to IEEE standard 802.1D, MAC Bridges, Annex G.You can reconfigure the Tags-to-TrafficClass map with set qos:# set qos -tag 0,1,2...7 -priority low|medium|high|critical
Fortress ES-Series CLI Guide: Networking and Radio Configuration973.10.0.0.2 DiffServ QoS and DSCP MappingDiffServ increases the number of definable priority levels over the earlier IP precedence tagging standards, permitting greater granularity in traffic QoS sorting. DiffServ QoS information is conveyed in the six most significant bits—the Differentiated Services Codepoint, or DSCP—in the packet header’s DS field.You can reconfigure the DSCP-to-TrafficClass map with set qos:# set qos -dscp 0,1,2...63 -priority low|medium|high|critical3.11 VLANs ImplementationVLANs (virtual local area networks) are Disabled on the Mesh Point by default: VLAN traffic is not passed. Packets received with VLAN tags are discarded, and per-port VLAN settings are disregarded.When FastPath Mesh (mesh) is used for bridging, the Mesh Point can support up to eight VLANs in enabled VLAN Mode. When bridging is off, the Mesh Point can support up to 48 VLANs in enabled or in translate VLAN Mode.3.11.0.0.1 Enabled VLAN ModeYou can set vlan -mode to enabled on the Mesh Point only when the global bridging mode is set to mesh or off. The enabled VLAN Mode is incompatible with the default global bridging setting, STP. NOTE: Bridgingconfiguration isdescribed in Section 3.2.When VLANs are Enabled, the Mesh Point implements port-based VLANs, in which the VLAN identity of an untagged frame is derived from the access port on which it is transmitted or received.Each of the Mesh Point’s network interfaces can be associated with a particular VLAN and configured as a VLAN trunk port or access port.VLAN traffic is handled as shown in Table 3.10.
Fortress ES-Series CLI Guide: Networking and Radio Configuration98Configuring VLANs on the Mesh Point typically requires you to: 1Define one or more new VLANs on the Mesh Point’s Active VLAN Table by specifying an associated VLAN ID and IPv4 address for each. If the IPv4 address is not specified, it defaults to Not Configured.2For each new VLAN, configure one or more of the Mesh Point’s network interface(s) as VLAN access ports by specifying the associated VLAN ID and ensuring that SwitchingMode is set to Access. Untagged frames received on a VLAN access port are associated with the interface’s VLAN ID and forwarded only to other access ports on the same VLAN and to the trunk port.NOTE: In EnabledVLAN Mode, thereis only one VLAN trunkper Mesh Point, definedby the Mesh Point’sActive VLAN Table andused by all Trunk ports.3Configure one or more trunk ports to carry tagged frames, where the VLAN tag identifies the VLAN with which the frame is associated. If Fortress’s FastPath Mesh is used for bridging, every FP Mesh Core port must be configured as a VLAN trunk port. This parameter is set automatically during BSS configuration and is enforced during Ethernet port configuration.4If Fortress’s FastPath Mesh is used for bridging and the Mesh Point is subscribed to one or more multicast group(s), you must associate each multicast group subscription with Table 3.10 VLAN Traffic Handling on the Mesh Pointreceived traffic VLAN traffic handlinginterface Switching Mode VLAN tagging on ingress internal on egressAccessuntaggedaccept tag w/ ingress interface Default VLAN IDtag = egress interface Default VLAN ID: send untaggedtag = ingress interface Default VLAN ID tag ≠ egress interface Default VLAN ID: droptag ≠ ingress interface Default VLAN ID dropTrunkuntagged accept tag w/ ingress interface Default VLAN ID send untaggedtag = ingress interface Default VLAN ID accept preserve tag as receivedtag ≠ ingress interface Default VLAN ID and is in Active VLAN Table accept preserve tag as received send tagged as receivedtag ≠ ingress interface Default VLAN ID and is not in Active VLAN Table drop
Fortress ES-Series CLI Guide: Networking and Radio Configuration99the VLAN used for multicast traffic by subscribed FPMPs (described in Section 3.2.2). 5Enable VLANs on the Mesh Point.When FastPath Mesh is used for bridging, the Mesh Point can support up to eight VLANs, in Enabled VLAN Mode. When BridgingMode is Off, the Mesh Point can support up to 48 VLANs, in Enabled VLAN Mode.NOTE: Layer 2 dis-covery protocolsmust also be turned offon any 3rd-party net-work AP. Bridging loopdetection is incompati-ble with VLAN transla-tion, which is intendedto support an intention-al loop in the L2 switch.3.11.0.0.2 Translate VLAN ModeYou can set VLAN Mode to Translate only when the Mesh Point’s global bridging Mode is Off. Translate VLAN Mode is incompatible with FastPath Mesh (the default) and STP bridging link management.In Translate VLAN Mode, pairs of encrypted-side and clear-side VLAN IDs are used to map packets with matching VLAN ID tags between encrypted and clear VLANs on the Mesh Point. Each such VLAN pair therefore constitutes a VLAN Map.When a packet tagged with a VLAN ID that matches the Encrypted Side VLAN ID of a VLAN Map is received on any encrypted interface, the Mesh Point re-tags the packet with the VLAN Map’s Clear Side VLAN ID as it passes the packet to any clear interface. Likewise, when a packet is received on any clear interface with a VLAN ID tag that matches the Clear Side VLAN ID of a configured VLAN Map, the packet is re-tagged with the Encrypted Side VLAN ID as it is passed to any encrypted interface.NOTE: Any num-ber of VLANtrunks can be config-ured on a Mesh Point inTranslate VLAN Mode.In this way VLAN ID-tagged packets can be passed in either direction between VLANs on the Mesh Point’s clear and encrypted interfaces as their VLAN ID tags are translated accordingly. VLAN user-priority tags are preserved during VLAN translation.You can also configure a VLAN map (vlanmap), in which the same VLAN ID is configured as the Encrypted Side VLAN ID and the Clear Side VLAN ID, causing packets with matching VLAN ID tags to pass between the Mesh Point’s encrypted and clear interfaces without VLAN translation.NOTE: There is noneed for VLANMaps to be associatedwith specific interfaces. When the Mesh Point is in Translate VLAN Mode, an incoming packet will be dropped, rather than forwarded from clear to encrypted or encrypted to clear, if there is no VLAN map with a matching VLAN ID configured for it.VLAN IDs 1 through 4094 (inclusive) can be used in VLAN maps. Note, however, that VLAN ID 1 is the default Management VLAN ID. The VLAN IDs you configure in translation maps must be present in the Mesh Point’s Active VLAN ID Table (described in Section 3.11.1, below).VLAN translation maps may not overlap: a given VLAN ID can be used in only one VLAN map in the Mesh Point’s vlanmap
Fortress ES-Series CLI Guide: Networking and Radio Configuration100table (although it can be used twice in the same map, as noted above).Observe the currently configured VLAN maps with show vlanmap:# show vlanmapMap Name            Clear Vlan ID Encrypted Vlan IDvlan12              12            2012vlan11              11            2011vlan10              10            10Before you create VLAN translation maps, add the VLAN IDs you will include in those maps to the Mesh Point’s Active VLAN Table, as described in Section 3.11.1, below. Create VLAN translation maps with the add vlanmap command:# add vlanmap -n <name> -vc <clearVLANID> -ve <encryptedVLANID>Specify VLAN IDs 1–4094, inclusive, and not in use by another VLAN map, but note the default Management VLAN ID is 1. Once established, the VLAN map name cannot be changed. Use the name, with the -n switch, to identify the map for update or deletion.Update VLAN translation maps with the update vlanmap command:# update vlanmap -n name -vc <clearVLANID> -ve <encryptedVLANID>You can delete a specified VLAN map or all configured VLAN maps with the del command:# del vlanmap -all|-n name3.11.1 Global VLAN Settings Use set vlan to configure or update the Management VLAN ID on the Mesh Point:# set vlan -mode enabled|disabled|translate -mid 1–4094Mode determines whether VLAN functionality is Enabled, Translate or Disabled (the default). (VLAN Mode options are described above.)The mid setting identifies the management VLAN. VlanId 1 is specified as the default Management VLAN ID and associated with the current IPv4 address of the Mesh Point’s management interface. The Management VLAN ID must specify the VLAN associated with the IPv4 address of the Mesh Point’s management interface (refer to Section 3.9) in order for the Mesh Point to remain accessible at its current IPv4 address. In the event of a
Fortress ES-Series CLI Guide: Networking and Radio Configuration101mismatch between the IPv4 address associated with the Management VLAN ID and that of the Mesh Point’s management interface, you can restore remote management access to the Mesh Point only by reconfiguring it via a direct physical connection to its Console port.Additionally, when VLANs are enabled, the Mesh Point’s internal DHCP and DNS services (described in Section 3.8) are accessible only in the management VLAN. The Mesh Point will not provide DHCP and DNS services on VLANs other than the one associated with the Management VLAN ID. Use add vlan to include additional VLANs in the Active VLAN Table:# add vlan -id 1–4094 -ip <IPv4Addr> -nm <subnetMask> NOTE: VLAN IDs0 and 4095 arereserved for internaluse.The -id switch specifies a VLAN ID number, from 1–4094, inclusive, for the VLAN.The -ip switch associates the VLAN with a specific Unicast IPv4 address. Alternatively, you can associate the VLAN with an IP Address of 0.0.0.0. This will prevent IGMP queries from being sent on the VLAN, in which cases IPv4 multicast listeners on the VLAN may not be automatically discovered. VLANs configured in this manner will appear as Not Configured in show vlan. Use the -nm switch to enter the IPv4 subnet mask associated with this VLAN. To change the IP address associated with a VLAN, use update:# update vlan -id <vlanID> -ip <IPv4Addr> -nm <subnetMask>View the current VLAN configuration with show:> show vlanMode: enabledManagement VLAN: 1[ACTIVE VLAN ID TABLE]ID   IPv4 Address    IPv4 Subnet Mask--   ------------    ----------------1    192.168.1.6     255.255.255.02    Not Configured  255.255.255.03    Not Configured  255.255.255.0[VLAN STATISTICS]ID   EncryptRx  EncryptTx  ClearRx    ClearTx    KeyExchangeRx  KeyExchangeTx  WllsRx     WllsTx     VlanMgmt--   ---------  ---------  -------    -------    -------------  -------------  ------     ------     --------1    0          0          142        35         0              0              0          0          02    0          0          0          0          0              0              0          0          03    0          0          0          0          0              0              0          0Delete one VLAN or all VLANs from the Mesh Point configuration by ID number with del vlans:# del vlan -id <vlanID>|all
Fortress ES-Series CLI Guide: Networking and Radio Configuration102You can also have a new VLAN automatically added to the table by specifying a VLAN ID not yet present on the table for one of the Mesh Point’s Ethernet ports or radio BSSs (refer to Section 3.11.2 below). VLAN IDs can be associated with IPv4 addresses, however, only through the Active VLAN Table controls.Changes to the Active VLAN Table take effect immediately.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).3.11.2 Network Interface VLAN SettingsEach of the Mesh Point’s Ethernet ports and each BSS configured on its radio(s) can be associated, by VlanID, with a particular VLAN and configured as a VLAN Trunk or Access port.When an Ethernet port or BSS on the Mesh Point is configured as a VLAN trunk interface, it can be configured to carry all VLANs or to filter which VLANs can use the interface. By default, trunk interfaces are configured to allow all VLANs (AllowAll Y).All of the Mesh Point’s Ethernet ports have a default VLAN SwitchingMode of Access and a default VlanId of 1. A default VlanId of 1 is also supplied during the creation of new wireless interfaces. A radio BSS’s default VLAN SwitchingMode depends on whether the interface is configured to perform network bridging. When EnableWDS is y, the VLAN Switching Mode is fixed on Trunk. When EnableWDS is n, the default VLAN SwitchingMode is Access and the setting is user configurable. The Mesh Point’s Ethernet port VLAN Switching Mode and Default VLAN ID settings are covered in Section 3.9. These settings on radio BSSs are described in Section 3.4.9.3.11.3 VLANs and FastPath MeshNOTE: TranslateVLAN  Mode isincompatible with Fast-Path Mesh bridging.When VLANs are Enabled in FastPath Mesh bridging deployments, some additional considerations apply.3.11.3.0.1 FP Mesh networks have an upper limit of eight VLANs.Although up to 48 VLANs can be present on the Active VLAN Table and no lower maximum is enforced, Fortress generally advises that no more than eight total VLANs be configured in FP Mesh bridging deployments.If your FastPath Mesh network requires a larger number of VLANs, consult Fortress Technical Support.
Fortress ES-Series CLI Guide: Networking and Radio Configuration1033.11.3.0.2 FP Mesh Core interfaces must be VLAN trunk ports.The requirement that only VLAN trunk ports can serve as FP Mesh Core interfaces is enforced for wireless interfaces: The same setting that configures a radio BSS to provide wireless bridging also controls whether it will serve as an FP Mesh Core or Access interface. Bridging interfaces are FP Mesh Core interfaces by definition. Therefore, if the Meshif setting is core, the interface’s VLAN SwitchingMode must be Trunk (refer to Section 3.2.2).3.11.3.0.3 FP Mesh multicast group subscriptions must specify a VLAN.In addition to the interface and MAC/IP address of the multicast group, each multicast group subscription on the Mesh Point must specify by VLAN ID the correct VLAN to use for multicast traffic (refer to Section 3.2.2).3.11.3.0.4 FP Mesh NMPs are provided internal DHCP and DNS services only in the management VLAN.The DHCP and DNS services internal to the Mesh Point and provided virtually configuration-free for Non-Mesh Points in FastPath Mesh deployments (refer to Section 3.2.2) are available only in the management VLAN (described in Section 3.11.1). An NMP that is not in the management VLAN will not be able to use these services. For example, an NMP attached to a VLAN access port whose default VLAN is not the management VLAN will not be able to use these services.3.12 ES210 Mesh Point Serial Port SettingsThe serial port on the front panel of the ES210 Mesh Point is configured by default to be used for Console port access to the Mesh Point CLI.On the ES210 Mesh Point, you can reconfigure the serial port to instead connect the Mesh Point to an external third-party Serial Sensor, or another serial device.When the Serial Sensor is Enabled, the serial port behaves like a serial terminal server, passing data between the specified TCP (Transmission Control Protocol) port and the device connected to the serial port. Serial data can be accessed using telnet ip_addr tcp_port, with no options.Only one TCP connection at a time is permitted to the Serial Sensor TCP port. The ES210 Mesh Point can send data from and to the connected serial device over any of the Mesh Point’s wired or wireless interfaces, under the security provisions configured for the interface and on the Mesh Point overall.
Fortress ES-Series CLI Guide: Networking and Radio Configuration1043.12.1 Configuring the Serial Port NOTE: You mustreboot the MeshPoint in order to changethe function of theES210 serial port.Enabling the serial sensor disables the serial port for Mesh Point CLI access. The Mesh Point CLI remains accessible by a terminal emulation application over an SSH2 (Secure Shell 2) network connection, provided SSH access is on (the default; refer to Section 4.1.13).Use set sensor to enable and configure the ES210 Mesh Point’s serial port to connect to an external serial device:# set sensor -enable y|n -baud 300|600|1200|2400|4800|9600|19200|38400 -parity none|even|odd-stopBits 1|2 -port <5000..65534>CAUTION:Enabling theSerial Sensor functionon the ES210 Mesh Pointdisables managementaccess through the serialport.Enable (y) or disable (n) the serial sensor function. Disabling the Serial Sensor function re-enables the port’s Mesh Point CLI Console function and automatically returns serial port settings to the correct values for the Mesh Point CLI (baud rate: 9600, parity: none, stop bits: 1). Specify the Baud Rate (-baud), the number of bits per second for the serial connection at 300, 1200, 2400, 4800, 9600 (the automatic setting for the Console port), 19200, or 38400 (the default when sensor is Enabled). Parity specifies whether the parity bit used for error checking results in an Even or Odd number of bits per byte or, with a setting of None (the default), that no parity bit should be added.StopBits specifies whether the port should use a stop bit of 1 (the default) or 2.Specify the TCP port (-port) for the serial interface. Port values between 5000 and 65534 are valid; the default is port 5001. The serial port always uses 8 data bits per character and no hardware or software flow control.After entering the configuration information, you must reboot the ES210 Mesh Point to change the serial port function (refer to Section 5.2). You can view the current serial sensor settings for the Mesh Point:# show sensorSerial Sensor SettingsEnabled:        noBaud Rate:      38400Parity:         noneStop Bits:      1Port:           5001
Fortress ES-Series CLI Guide: Networking and Radio Configuration105Restoring the ES210 Mesh Point’s factory default configuration restores the serial port to the default Mesh Point CLI Console function (refer to Section 5.5). 3.12.2 Resetting the Serial PortWhen the ES210 Mesh Point is enabled for and connected to an external serial device, you can manually restart the serial port’s TCP session with reset sensor.# reset sensorResetting the serial port has no effect when the Serial Sensor function is disabled.3.13 Mesh Viewer Protocol SettingsFortress offers a stand-alone viewer application called the Mesh Viewer to monitor the status and connections of the FastPath Mesh network. Mesh Points provide information about their status and health using the proprietary protocol Mesh Viewer Protocol (MVP). The CLI allows configuration of several parameters relating to the MVP.View the current MVP settings with show mvp:# show mvpMesh Viwer Manager is runningMVP packet transmission is enabledMVP packet transmission interval: 30 secsConfigured MVP port numbers   MVP IPv6 multicast UDP port: 4949   MVP client TCP port: 4949Use set mvp to alter MVP settings:# set mvp -serviceUp Y|N -enable Y|N -interval 5-300 -udpport 1042, 4949, 49152-65535 -tcpport 1042, 4949, 49152-65535NOTE: PORT 4949should only beused in stand-alonemesh networks (mesheswith no connection tothe Internet).The -serviceUp switch starts or stops the MVP manager process. The default is to start the process. Configuring the process off saves CPU cycles if there is no need for the MVP (if there is no Mesh Viewer running).The -enable switch enables or disables sending out MVP packets. The default is for nodes to send MVP packets. Configuring MVP packet sending off saves CPU cycles and may save bandwidth.The -interval switch controls the time interval between MVP packet transmission. The value is in seconds from 5 seconds to 300 seconds (5 minutes). The default is 30 seconds. A smaller value will provide more up-to-date information the Mesh Viewer, but at the cost of CPU cycles and bandwidth.
Fortress ES-Series CLI Guide: Networking and Radio Configuration106The -udpport switch chooses the UDP port out which the Mesh Point will send its MVP packets to the MVP Listener Mesh Point within the mesh network, or to the Mesh Viewer itself, if the Mesh Viewer is directly connected to a mesh network access interface.The -tcpport switch chooses the TCP port on which the MVP Listener Mesh Point will listen for incoming TCP connections from the Mesh Viewer, which may be on the mesh network or many be on a remote network connected to the mesh. The MVP Listener Mesh Point will then forward all MVP packets it receives from other Mesh Points to the Mesh Viewer, along with its own MVP packets.
Fortress ES-Series CLI Guide: Networking and Radio Configuration107
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing109Chapter 4Network Security, Authentication and Auditing4.1 Fortress Security Settings NOTE: FortressMSP is not sup-ported on an ES210 MeshPoint in Station Mode(refer to Section 3.4.10).The CLI provides controls for various aspects of the Mesh Point’s overall network security provisions: Fortress MSP (Mobile Security Protocol) functions including key establishment, data encryption and network Access ID; FIPS operation; global session timeouts; and several additional management and network access settings.A basic set of security settings can be viewed through the Mesh Point CLI with show crypto:# show cryptoCryptoEngine:AES256ReKeyInterval:14400 seconds (4h)Key Beacon Interval:30 secondsDHsize:1024,2048Compression:OnLegacy:Off The Security settings you can view through show crypto are configured through the set crypto command, using various switches, as described in the relevant subsections below.The Access ID and passwords cannot be displayed for security reasons.Several security settings have their own show and set commands, as described in their respective subsections.4.1.1 Operating Mode The Fortress Mesh Point can be operated in either of two modes: Normal or FIPS (the default).The rigidly enforced administrative requirements of FIPS operating mode are required by deployments and applications that must comply with the Federal Information Processing Standards (FIPS) for cryptographic modules. However, the high levels of security that can be implemented in Normal operating mode generally meet or exceed the needs of virtually all networked environments that are not required to comply with FIPS.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing110NOTE: Contactyour Fortress rep-resentative for up-to-date information on theMesh Point’s FIPS vali-dation status.FIPS operating mode in the current version of Mesh Point software may still be in the process of being validated as compliant with FIPS 140-2 Security Level 2. These Federal standards enforce security measures beyond those of Normal operating mode, the most significant of which include:Only a designated Crypto Officer, as defined by FIPS, may perform administrative functions on the Mesh Point and its Secure Clients. (The preconfigured administrator-level admin account corresponds to the FIPS Crypto Officer role; refer to Section 2.2.3.)If the Mesh Point encounters a FIPS Error condition, it shuts down and reboots, running FIPS self-tests as a normal part of boot-up. If FIPS self-tests pass, the Mesh Point will return to normal operation. If FIPS self-tests fail, before any interfaces are accessible, the Mesh Point will again reboot. If the Mesh Point is unable to pass power-on self-tests, it will cycle perpetually through this reboot process. In this case, you must return the Mesh Point to your vendor for service or replacement.DH-512 and DH-1024 key establishment (Section 4.1.5) are no longer FIPS 140-2-compliant and are therefore not compatible with FIPS operating mode.NOTE: Onlydevices config-ured on the Mesh Pointto pass clear text onencrypted interfaces arepermitted to do so, evenwhen encrypted zonecleartext is enabled.Regardless of the current operating mode, the Mesh Point can be configured to allow unencrypted data on encrypted interfaces by enabling cleartext traffic in the encrypted zone (refer to Section 4.1.9). In FIPS terminology, this indicates that the Mesh Point is in Bypass Mode (BPM), as selectively permitted clear text can pass, along with any encrypted traffic, on encrypted interfaces.The current operating mode can be determined by the command prompt: FIPS; for FIPS mode, or > or # for Normal operating mode.The show fips command provides the same information, as well as a status indicator:# show fipsState:OnStatus:OKPossible FIPS Status values depend on the current FIPS State.When the FIPS State is On:OK - FIPS tests passed: FIPS tests have either never failed or have not failed since the last time set fips retest was executed.Test in progress - FIPS tests are currently running.When the FIPS State is Off:
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing111OK - has no meaning with regard to FIPS tests, which are run regardless of the FIPS State, but can fail without affecting the reported FIPS Status. When FIPS is Off, the Mesh Point will continue to pass traffic regardless of FIPS test results, and the FIPS Status is always OK.FIPS operating mode, which complies with Federal Information Processing Standards 140-2, is the default mode of operation. The Fortress Mesh Point’s Normal operating mode does not comply with FIPS. NOTE: In FIPSoperating modethe command prompt is<hostname>FIPS>(for view-only accounts)or  <hostname>FIPS#(for  administrator-level accounts).Change between operating modes with the set fips command. To turn FIPS operating mode on:# set fips onTo place the Mesh Point in Normal operating mode, turn FIPS operating mode off:FIPS# set fips offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.2 FIPS Settings View complete current FIPS tests settings and statistics with show fips -v:FIPS> show fips -vState:OnStatus:OKTestControl:No periodic testsRunInterval:86400ReSeedInterval:86400RunRngContinuousTests:YesLast Run Succeeded:YesPrngPostFail:NoSoftCryptHashFailCT:0SoftCryptCompressFailCT:0SoftCryptEncryptFailCT:0SoftCryptRngFailCT:0SoftCryptMiscFailCT:0FPCDDuplicateIVFailCT:0FPCDTrngFailCT:0FPCDPrngFailCT:0ECDHKeyGenFailCT:0OpenSSLFailCT:0PktEncryptFailCT:0PktDecryptFailCT:0BadPktDecryptFailCT:0SuiteBPktEncryptFailCT:0SuiteBPktDecryptFailCT:0SuiteBBadPktDecryptFailCT:0CCMPPktEncryptFailCT:0CCMPPktDecryptFailCT:0CCMPBadPktDecryptFailCT:0BypassGuestCreateFailCT:0
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing112BypassBroadcastFailCT:0BypassUnknownDAFailCT:0BypassHostToGuestFailCT:0BypassHostToClientFailCT:0BypassRcvClrFromClientFailCT:0BypassCCMPSecureFailCT:0BypassCCMPNonSecureFailCT:0PktEncryptTimeoutCT:0PktDecryptTimeoutCT:0BadPktDecryptTimeoutCT:0SuiteBPktEncryptTimeoutCT:0SuiteBPktDecryptTimeoutCT:0SuiteBBadPktDecryptTimeoutCT:0CCMPPktEncryptTimeoutCT:0CCMPPktDecryptTimeoutCT:0CCMPBadPktDecryptTimeoutCT:0BypassGuestCreateTimeoutCT:0BypassBroadcastTimeoutCT:0BypassUnknownDATimeoutCT:0BypassHostToGuestTimeoutCT:0BypassHostToClientTimeoutCT:0BypassRcvClrFromClientTimeoutCT:0BypassCCMPSecureTimeoutCT:0BypassCCMPNonSecureTimeoutCT:0KeyGenCryptoFailCT:0LastFailedRunTS:0FailedRunCT:0LastCompleteRunTS:Sun May 17 08:23:38 2015CompleteRunCT:183NOTE: In FIPSoperating mode,the Mesh Point stopspassing traffic in theencrypted zone uponany FIPS test failure anduntil all FIPS tests areagain passed.You can display just the first two lines of the show fips -v output by omitting the -v switch.The Mesh Point runs a number of self-tests described in FIPS 140-2, (Federal Information Processing Standards’ Security Requirements for Cryptographic Modules).FIPS tests run—and self-test failures are logged—regardless of whether it is in FIPS or Normal operating mode. When the Mesh Point is in FIPS operating mode, it will additionally shut down and reboot upon the failure of any FIPS self-test, as required by FIPS 140-2 (refer to Section 4.1.1).FIPS tests can be automatically triggered or manually executed, and automatic FIPS testing is always enabled, regardless of operating mode or FIPS settings. Automatic test triggers include any security-related change to the Mesh Point’s configuration (deleting a user, for example, or changing the re-key interval). Use the set fips command to change FIPS test settings and to manually initiate FIPS self-tests.Run FIPS self tests manually with set fips:FIPS# set fips retest
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing113As required by FIPS 140-2, if a FIPS test fails, the failure persists—through reboots and software upgrades—until the Mesh Point again passes the full battery of FIPS tests. In FIPS operating mode, If the Mesh Point fails a FIPS test, it automatically reboots. If the failure persists through the boot cycle, the Mesh Point continues to reboot until the test passes or the Mesh Point is taken out of service. In addition to the FIPS tests triggered regularly on the Mesh Point, you can configure additional, periodic FIPS testing, with set fips:FIPS# set fips periodic|noperiodicPeriodic FIPS testing is disabled by default (noperiodic). When periodic tests are enabled, they run at the FIPS-test run-interval specified using set fips with the -r switch. The default is 86,400 seconds, or 24 hours.You can also configure the interval at which the random number generator is reseeded using set fips with the -s switch. The default is 86,400 seconds, or 24 hours.FIPS# set fips -r <RunIntervalSeconds> -s <SeedIntervalSeconds>With set fips you can also configure whether the Mesh Point’s random number generator test will be run routinely (it is enabled by default):# set fips rngtestRngContinuousTests? [N|Y]This command can be run only interactively. The Mesh Point CLI displays RngContinuousTests? and you can enter your selection—or leave the field blank and the setting unchanged—and strike Enter↵.The Mesh Point CLI returns [OK] when settings are successfully changed. You cannot turn off FIPS random number generator tests when the Mesh Point is in FIPS operating mode.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.3 MSP Encryption Algorithm The encryption algorithm determines how the Mesh Point encodes data. All Secure Clients logging on through the Fortress Mesh Point, and other Mesh Points with security associations to this one, must use the same encryption algorithm. View the encryption algorithm (among other security settings) in effect on the Mesh Point with show crypto (shown in Section 4.1).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing114Select the encryption algorithm that the Mesh Point will allow Secure Clients and other Fortress controller to use with set crypto:# set crypto -e AES128|AES192|AES256For information on setting encryption algorithms on Secure Clients, refer to the Fortress Secure Client User Guide.The default encryption algorithm is AES256.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.4 Encrypted Data Compression View the encrypted data compression setting (among other security settings) in effect on the Mesh Point with show crypto (shown in Section 4.1). Data compression on the Mesh Point is configured with set crypto:# set crypto -comp on|offCompression is turned on by default.All Mesh Points in a given network must be configured to use the same encrypted data compression setting, in order for them to be able to communicate.The Mesh Point CLI returns OK when settings are successfully changed.NOTE: Separatemulticast andbroadcast packets aresent for each config-ured key group. Tomaximize wirelessthroughput, limit thenumber you select. 4.1.5 MSP Key Establishment Select the method of key establishment the Mesh Point will allow Secure Clients and other Fortress devices to use with set crypto, as follows:# set crypto -dh 512|1024|2048|suiteBYou can specify any of three supported Diffie-Hellman groups (DH-2048 is the default selection). When operating the Mesh Point in FIPS mode (Section 4.1.2), you cannot use DH-512 or DH-1024 key establishment, because the smaller Diffie-Hellman group moduli are no longer compliant with FIPS 140-2 Security Level 2. NOTE: DH-512 keyestablishment can-not be selected when a32-digit Access ID (Sec-tion 4.1.16) is used.When it has been licensed on the Mesh Point (Section 5.6), you can also select the NSA (National Security Agency) Suite B-compliant elliptic curve Diffie-Hellman key establishment. The set crypto -dh command is not additive; it overwrites existing settings.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing115NOTE: Secure Cli-ent versions ear-lier than 3.1 supportonly DH-512 key estab-lishment.A Secure Client logging on to the Mesh Point must use a key establishment setting present in the Mesh Point’s configuration. For information on configuring key establishment on Secure Clients, refer to the Fortress Secure Client User Guide.The Mesh Point CLI returns OK when settings are successfully changed.4.1.6 MSP Re-Key Interval The re-keying interval is the length of time between new keys issued by the Mesh Point. View the re-keying interval (among other security settings) in effect on the Mesh Point with show crypto (shown in Section 4.1).The re-keying interval in effect between the Fortress Mesh Point and its Clients or other Mesh Points is set, in values between 1 and 24 hours, with the set crypto command:NOTE: The user canchoose to disable re-keying ONLY if FIPS modeis disabled, by choosing are-keying interval of 0.# set crypto -t <hrs>The default re-keying interval is 4 hours.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.7 Key Beacon Interval In order to maintain active, secure connections to other Fortress devices on the Fortress-secured network, the Mesh Point transmits network key beacons at regular, user-configurable intervals. View the key beacon interval (among other security settings) in effect on the Mesh Point with show crypto (shown in Section 4.1).The Mesh Point’s beacon interval is set in seconds between 0 and 3000, inclusive (a setting of 0 (zero) disables the beacon). It is configured with the set crypto command using the -b switch:# set crypto -b <secs>The default beacon interval is 30 seconds.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.8 Fortress Legacy Devices You can configure the Mesh Point to support legacy devices. View the current legacy device setting (among other security settings) in effect on the Mesh Point with show crypto (shown in Section 4.1).Enable or disable support for legacy devices with set crypto:# set crypto -legacy on|offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1164.1.9 Encrypted Zone Cleartext Traffic By default, the Mesh Point does not allow cleartext traffic to pass on encrypted interfaces. In order for configured cleartext devices (access points and/or Trusted Devices) to be permitted access on an encrypted interface, cleartext must be turned on.Disabling cleartext traffic on encrypted interfaces after AP management rules or Trusted Devices have been configured will not remove them from the configuration. Because these cleartext devices cannot decrypt encrypted traffic, however, the Mesh Point will not be able to communicate directly with them until cleartext traffic is permitted on encrypted interfaces.View the current cleartext setting on the Mesh Point with the show command: > show cleartextOnEnable/disable cleartext traffic in the encrypted zone with the set command:# set cleartext on|offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.10 Encrypted Zone Management Settings Access to the Mesh Point’s management interface via an encrypted interface on the Mesh Point can be globally controlled. When encrypted management access is globally allowed, you can additionally permit authorized cleartext devices on encrypted interfaces to manage the Mesh Point.4.1.10.1 Encrypted Interface Management AccessBy default, the Mesh Point allows the management interface to be accessed on encrypted non-bridging interfaces by local Secure Client devices or through remote Fortress devices or network bridging links. View the current management access setting for encrypted interfaces with the show command: > show clientmanagementOnEncrypted interface client management applies to any connection to an encrypted interface on the current Mesh Point, including:connections through a remote Fortress Mesh Pointbridging links between networked Fortress Mesh Pointsauthorized cleartext devices when clearmanagement (below) is enabled.local Fortress Secure Client connections
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing117Client management is enabled (on) by default.If encrypted interface client management is disabled (off), you will be able to manage the Mesh Point only through a clear interface (or through the serial Console port).Enable/disable client management access on the Mesh Point’s encrypted interfaces with the set command:# set clientmanagement on|offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.10.2 Authorized Cleartext Device Management Access NOTE: If eitherclientmanage-ment or cleartext isoff, clear devices onencrypted interfaces willnot be able to managethe Mesh Point, regard-less of the clearman-agement setting.By default, the Mesh Point blocks management access by authorized cleartext devices on encrypted interfaces. View the current setting with the show command: > show clearmanagementOffIf management access via encrypted interfaces is globally permitted (see clientmanagement, above), you can enable management access for authorized cleartext devices on encrypted interfaces with the set command:# set clearmanagement on|offYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.11 Authorized Wireless Client Management SettingsBy default, the Mesh Point allows management access by authorized wireless clients in the clear zone. View the current setting with the show command:> show wifimanagementOnThe management access for authorized wireless clients in the clear zone can be configured with the set command:# set wifimanagement on|offYou mut be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.12 Turning Mesh Point GUI Access Off and OnBrowser connections to the Mesh Point’s management interface are secured via https (Hypertext Transfer Protocol Secure). GUI access can be authenticated via the self-signed X.509 digital certificate automatically generated by the Mesh Point for use by SSL (Secure Socket Layer) and present by default in the local certificate store. You can also import and select a different certificate for the Mesh Point's SSL function (refer to Section 4.2.2).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing118You can turn off GUI access to the Mesh Point altogether by disabling the user interface. The Mesh Point GUI is enabled by default.You can view the current GUI access setting with show gui:> show guiStatus:    OnSSL Private Key: ssl_auto_keyRequire client certificate: noAuto Logon client certificate: noIf you want to limit access to the Fortress Mesh Point exclusively to the Mesh Point CLI, you can disable the Mesh Point GUI, as follows:# set gui offTo re-enable the Mesh Point GUI, enter:# set gui onYou can use the -key switch to indicate or change the private key and client certificate to use for SSL sessions:# set gui -key <keyname>Use the -nokey switch to clear the encryption key currently in use:# set gui -nokey If you want to require the GUI client to present a digital certificate to be authenticated before being permitted access, set -requireClientCertificate to enabled.:# set gui -requireClientCertificate enabled[OK] Note: You must restart the controller for client authentication changes to take effect.Turn this functionality back off with the same command: # set gui -requireClientCertificate disabled[OK] Note: You must restart the controller for client authentication changes to take effect.NOTE: When SSOis configured, ifthe Mesh Point is alsoconfigured to authenti-cate with a RADIUSserver rather than withlocal authentication, theuser must enter user-name and password thefirst time the certificateCommon Name usertries to logon. This isnecessary in order topopulate the localauthentication cache.As the prompt informs you, you must reboot the Mesh Point in order to put a change to -requireClientCertificate into effect: refer to Section 5.2.If you want to automatically log in GUI users who have presented a valid certificate, without requiring them to enter user name and password, set -clientCertificateSignOn to enabled:# set gui -clientCertificateSignOn enabledYou must also require the GUI client to present a digital certificate; -requireClientCertificate must be enabled if -clientCertificateSignOn is enabled. This feature is most useful when Common Access Cards (CAC) are used, but any X509 client certificate may be used as long as the Common Name (CN) contains the user name.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing119The Mesh Point CLI returns OK when settings are successfully changed.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.13 SSH Access to the Mesh Point CLISSH2 (Secure Shell protocol 2) is enabled on the Mesh Point by default. The Mesh Point does not support SSH1.You can view the current SSH setting with show ssh:> show sshEnableSsh: YPublic Keys---------0 public keys configuredNOTE: DisablingSSH preventsremote access to theMesh Point CLI fromthe network. With SSHdisabled you can accessthe CLI only over adirect connection to theMesh Point’s Consoleport.4.1.13.1 Disabling and Enabling SSH Access to the Mesh Point CLITo disable SSH, enter:# set ssh offYou can disable SSH from a remote terminal session; however, the SSH session will be dropped immediately upon execution of the command. To re-enable SSH, log in to the Mesh Point CLI (via a direct connection to the Mesh Point’s Console port) and enter:# set ssh onYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.13.2 Configuring Public Key AuthenticationFor more secure authentication, the Mesh Point provides the capability to configure SSH to utilize Public Key Authentication in addition to entering a username/password.There are two ways to import the public key into the Mesh Point.The first way is to manually enter the contents of the SSH public key. When the following command is executed, the user will be prompted to enter the SSH public key information:# import sshkey -name <SSHPublicKeyName>The second way is to provide a URL to the SSH public key file:# import sshkey -name <SSHPublicKeyName> -url <SSHPublicKeyURL>The Mesh Point provides the capability to delete the SSH public keys either all at once or by name.To delete all the SSH public keys:
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing120# del sshkey -allTo delete a specific SSH public key:# del sshkey -name <SSHPublicKeyName>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.14 Blackout Mode  NOTE: You canalso toggle theMesh Point’s BlackoutMode in the Mesh PointGUI (described in theGUI Guide), and withchassis controls on someMesh Point models(covered in their respec-tive Hardware Guides).The Blackout Mode setting on the Fortress Mesh Point globally turns all chassis LEDs on and off. When Blackout Mode is Enabled, none of the Mesh Point’s LEDs will illuminate for any reason—except for a single, initial blink (green) of less than half a second, at the beginning of the boot process in some models. When Blackout Mode is Disabled (the default), the LED indicators function normally.View the current blackout mode with show blackout:> show blackoutOnEnable/disable blackout mode with the set command:# set blackout on[OK]You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.1.15 Allow Cached Credentials When a device’s session times out, the device is required to renegotiate encryption keys in order to reconnect to the network. When the Mesh Point is configured to permit cached authentication credentials (the default), Secure Clients are allowed to transparently reauthenticate, without user intervention. You can force Secure Client users to re-enter their credentials whenever their sessions are reset by disabling the cachedauth setting.View the current cached credentials settings with show cachedauth:> show cachedauthClientReAuth: NEnable/disable permission for Secure Clients to reauthenticate with cached user credentials with set cachedauth:# set cachedauth y|nYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1214.1.16 Fortress Access ID NOTE: Secure Cli-ent versions ear-lier than 3.1 supportonly 16-digit AccessIDs.The Access ID is a 16- or 32-digit hexadecimal ID that provides network authentication for the Fortress Security System. It is set with the set accessid command, as follows:# set accessid <16digithexid>|<32digithexid>|random|default -confirm <16digithexid>|<32digithexid>|random|defaultNOTE: A 32-digitAccess ID cannotbe configured whenDH-512 key establish-ment (Section 4.1.5) isselected.You can manually enter either a 16-digit or a 32-digit hexadecimal Access ID of your own composition, or you can elect to have the Mesh Point randomly generate a 32-digit Access ID and display the result for you to record.Regardless of how you establish the Mesh Point’s Access ID, you must make a record of the Access ID at the same time that you create it. For security purposes, once you have left the screen on which it was initially established, the Access ID can never again be displayed.CAUTION: TheAccess ID is dis-played exactly once, atits creation, after whichthere is no way—in theGUI or CLI—to discoverthe Access ID config-ured on the Mesh Point.All Secure Clients logging on to the Mesh Point must be configured to use the same Access ID as the Mesh Point. For information on setting the Access ID on Secure Clients, refer to the Fortress Mesh Point Software GUI Guide.The default Access ID is represented by 16 zeros (0000000000000000) or the word default, which when used with the set accessid command will return to the Mesh Point’s Access ID to its default setting.The Mesh Point CLI returns OK when settings are successfully changed.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.2 Digital Certificates The Mesh Point automatically generates a self-signed digital certificate conforming to the X.509 ITU-T1 standard for a public key infrastructure (PKI). This certificate and associated RSA 2048-bit public/private key pair are present in the Mesh Point’s certificate management configuration and used for the Mesh Point GUI by default.4.2.1 Generating CSRs and Key Pairs The generate csr command allows you to generate a PKCS (Public Key Cryptography Standards) #10 certificate signing request (CSR).# generate csr -name <CSRname> -subject <X.500 DN> -newkey -type rsa2048|ec256|ec3841. International Telecommunication Union-Telecommunication Standardization Sector; formerly, CCITT
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing122The -subject option is defined as X.500 Distinguished Names and has to be a quoted string with the following format:"/C=<country>/ST=<state>/O=<organization>/CN=<commonname>"The -type option selects the algorithm and key length, in bits, for the key pair to be generated for the CSR:rsa2048 - (the default) RSA (Rivest, Shamir and Adleman) 2048-bitec256 - elliptical curve 256-bitec384 - elliptical curve 384-bit The -newkey option allows you to generate a new public/private key pair automatically while generating the CSR. If the key pair already exists (see "generate keypair"), use the key pair name as the CSRname and omit the -newkey option.The generate keypair command allows you to generate a public/private key pair.generate keypair -name <Keyname> -type rsa2048|ec256|ec384View current public or private key pairs with the show keypair command:# show keypairKey                                  Type     Cert-----------------------------------  -------  ----ssl_auto_key                         rsa2048  yesYou can delete a public/private key pair or all key pairs:# del keypair -name <KeyName>|-all4.2.2 Managing Local CertificatesThe Mesh Point’s self-signed certificate, used by default for the Mesh Point GUI, is automatically generated and always present in the local certificate store. View current certificates with the show certificate command:# show certificateEnd User Certificates---------------------Name        : ssl_auto_keyHash        : 86cef5bbcc57acf9b27613efff3697519ebc956db0b68191580b9b6c5d0e1cf1Usage       : sslSubject     : CN=192.168.1.6, emailAddress=support@gdfortress.comIssuer      : C=US, ST=MA, O="Fortress Technologies", OU="Gateway Security", CN="Fortress Technologies Certificate Authority", emailAddress=support@gdfortress.com (cert=Not Available)Valid as of : Sep 28 09:45:21 2012 GMTValid until : Oct 28 09:45:21 2012 GMT
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing123Append more to any show certificate command to scroll through the output one page at a time, using Enter↵ or the space bar to page down. When more is omitted, use Ctrl-C to truncate multiple-screen command output.View only a specific certificate with the -name switch:# show certificate -name CACERT00000002Name        : CACERT00000002Subject     : C=US, O=U.S. Government, OU=DoD, OU=PKI, CN=DoD JITC Root CA 2Issuer      : C=US, O=U.S. Government, OU=DoD, OU=PKI, CN=DoD JITC Root CA 2 (cert=CACERT00000002)Valid as of : Jul 15 03:31:31 2005 GMTValid until : Jul  4 03:31:31 2030 GMTYou can opt to display abbreviated certificate information with the -brief switch, or more complete certificate key information than is displayed by default, with the -detail switch. You can filter show certificate output to include only -expired certificates, only -ca (Certificate Authority) certificates, only -enduser certificates, or only those certificates that have been validated by an -ocsp (Online Certificate Status Protocol) responder.    4.2.2.1 Importing and Deleting CertificatesVarious types of certificates, in PEM.ASN.1 DER or PKCS7 format, can be imported and installed on the Mesh Point. If the certificate you are importing is not an end user certificate (the default), you must specify its type, and you must configure the parameters required for the type of certificate you are importing:End-user certificates (or certificate chains) are associated with a public/private key pair used by the Mesh Point. You must specify, with -key, the key pair/CSR (certificate signing request) to associate with the certificate (or the first certificate in a certificate chain).# import certificate -key <keypairCSR>CA certificates are certificates associated with Certificate Authorities that are trusted by the Mesh Point (a trusted intermediate CA, a trusted root CA, or a chain of certificates for multiple trusted CAs). You must specify a CA certificate, with -ca. Use -url to configure the URL (full IP address or domain name) for an LDAP (Light Directory Access Protocol) server, and -ldapsb to specify (as the distinguished name of the search base object) a starting point for certificate retrieval searches of the LDAP directory.# import certificate -ca -url <LDAPsrvrURL> -ldapsb <searchBaseDN>
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing124Trusted OCSP Responder certificates are certificates (or certificate chains of multiple certificates of one or more trusted OCSP responders) associated with OCSP responders from which the Mesh Point always accepts signed OCSP responses. You must specify a trusted OCSP responder certificate, with -ocsp. Use -url to configure the standard http address (full IP address or domain name) of the certificate server from which the certificate or certificate chain being installed will be retrieved. Use -ldapattr to specify whether the certificate attribute for retrieval is a CA certificate, with ca, or an end user certificate, with user.# import certificate -ocsp -url <CertSrvrURL> -ldapsb <searchBaseDN> -ldapattr ca|userYou can delete the entire contents of the Mesh Point certificate store with -all, or all of those certificates that have -expired:CAUTION: If youdelete the onlyavailable certificate(s)for the Mesh Point GUI’sSSL connection, yoursession will end andyou will not be able toreconnect until, after abrief delay, the defaultself-signed SSL certifi-cate has been automati-cally restored.# del certificate -all|-expiredYou can also delete a specific certificate by -name. If the certificate is a CA certificate, add the -ca switch. If it is the certificate for a trusted OCSP responder, add -ocsp.# del certificate -name <CertificateName> -ca -ocspYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.2.2.2 Assigning Stored Certificates to Mesh Point FunctionsLocally stored signed certificates can have any of three applications on the Mesh Point, as indicated in the Usage column of the show certificate output: ssl - the Secure Socket Layer certificate is used by the Mesh Point GUI to secure browser connections to the management interface via https.By default, the Mesh Point GUI uses the automatically generated self-signed certificate for SSL. When additional certificates have been imported, you can change this assignment.NOTE: The  IPseccertificate assign-ment option applies onES-series Mesh Pointsonly when a Suite Blicense has beeninstalled (refer to Sec-tion 5.6).IPsec - the Internet Protocol Security certificate is used to authenticate an IPsec-licensed/enabled Mesh Point as an endpoint in IPsec transactions (refer to Section 4.4.1).EAP-TLS - the Extensible Authentication Protocol-Transport Layer Security certificate is used:to authenticate EAP-TLS 802.1X supplicants—when the Mesh Point’s internal authentication server is configured to provide 802.1X authentication service (refer to Section 4.5.2.4).to authenticate an ES210 Mesh Point as a wireless station—when it is dedicated to act as a wireless Client (refer to Section 3.4.10).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing125Because Mesh Points used as wireless Clients must be dedicated to the function, the EAP-TLS certificate will only be used for one of these applications.Use set gui to assign a certificate to the GUI function:# set gui -key <name>Enter the name of the certificate with -key.Use the -nokey switch to clear the encryption key currently in use. # set gui -nokey Similarly, assign certificates to IPsec and EAP-TLS with the following commands:# set ipsec -key <name>|-nokey # set eap-tls -key <name>|-nokeyA given function can have only one certificate assigned to it. You can, however, assign the same certificate to more than one function.View the certificates assigned to each function with the corresponding show command:> show guiStatus:    OnSSL Private Key: ssl_auto_keyGUI Mode:  AdvancedRequire client certificate: no> show ipsecIPsec is enabled.IPsec crypto suites: SuiteB128,LegacyISAKMP SA lifetime 1440 minutesSA lifetime 2400 minutes, 5000 KBCRL checking is enabled.IKE version 1No key pair used for IPsec authentication> show eap-tlsEAP-TLS Private Key: EAP-TLS-Station
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing126NOTE: IncomingCRL trafficrequires administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includeIP addresses for CRL.See Section 2.2.5 formore detail. Traffic isaffected by the per-interface packet filters.If configured, per-inter-face packet filters mustinclude filters to permitCRL traffic to and fromthe FMP. See Section4.6.3 for more detail.4.2.2.3 Managing the Certificate Revocation List The global Certificate Revocation List (CRL) function is enabled by default, as it must be in order for per-function CRL options to take effect when they are enabled.When CRL functionality is enabled globally and for IPsec and/or internal RADIUS EAP-TLS functions, digital certificates are checked against the lists of certificates that have been revoked by their issuing authorities. Peer certificate chains are traced back to a trusted root certificate, and each certificate's serial number is checked against the contents of the issuing authority’s CRL to verify that none of the certificates in the chain have been revoked, as described in IETF RFC1 3280.CRL locations are commonly embedded in digital certificates. When such certificates are installed, a Mesh Point enabled for CRL-checking automatically downloads and uses CRLs from those locations. You can optionally specify an additional location for the Mesh Point to check for CRLs.Manage the local CRL with set certificate-revocation:# set certificate-revocation -method crl|none -url <CRLFileLocation> -period 120–1440 -crlMandatory enabled|disabledNOTE: The IPsecCRL option isdescribed in Section4.4.1. The EAP-TLS CRLoption on the internalRADIUS server isdescribed in Section4.5.2.4.Indicate the -method of certificate-revocation that will be used on the Mesh Point, either crl or none. If -method is crl, indicate the CRL file location (as an HTTP URL) and the update period in minutes. When -crlMandatory is enabled, it forces verification to fail the certificate if the issuing authority's revocation list is not present or is unreachable. If the -method is crl, -crlMandatory defaults to enabled. If the -method is none, -crlMandatory is irrelevant. View current CRL parameters with show certificate-revocation:> show certificate-revocationCertificate Revocation----------------------Method: crlPeriod: 120 minutesMandatory: enabled1. Internet Engineering Task Force Request for Comments
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1274.3 Access Control EntriesAn Access Control Entry (ACE) is a filter applied to the X.509 digital certificates used to authenticate connections over a network. An ordered set of Access Control Entries, each with an associated allow/deny action, comprises an Access Control List (ACL), as used by three possible Mesh Point functions:IPsec - as described in Section 4.4.5 internal RADIUS - as described in Section 4.5.2.7 ES210 Radio STA Interface - as described in Section 3.4.11.12A given ACE can be specified simultaneously for IPsec and internal RADIUS ACLs. (An ES210 in Station Mode must be dedicated to that function.) ACEs are prioritized per ACL. The action to be taken when an ACE applies to an X.509 certificate is configured per instance of the ACE in each ACL that includes it.Each ACE must be uniquely named. Each must provide at least one value against which to match X.509 certificates and can apply up to three filter criteria. Use add ace to configure ACEs on the Mesh Point: # add ace -name <ACEname> -pattern <DNpattern> -keyusage digitalsignature,keyagreement -extkeyusage tlsserver,tlsclientName identifies the ACE in the Mesh Point configuration. You will use this name to add the ACE to one or more Access Control Lists, as mentioned above. Pattern specifies the pattern against which X.500 Distinguished Names (DNs) in X.509 certificates will be matched. Each Relative Distinguished Name (RDN) in the certificate DN is compared, in order, to the corresponding RDN subpattern specified by the ACE. You can use an asterisk (*) as a wildcard character in RDN subpatterns. For example, the distinguished name:/O=Fortress Technologies/OU=Engineering/CN=John Doeis composed of three RDNs. In addition to exact matches, the Distinguished Name pattern can match one or more of the component RDNs using one or more wildcard characters. All of the following subpatterns will match /O=Fortress Technologies:/O=Fortress Technologies - matches exactly./O=* - matches any string./O=*Technologies - matches any string ending in “Technologies”.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing128/O=Fortress* - matches any string beginning with “Fortress”./O=*Tech* - matches any string containing “Tech” in the middle of the string.As shown in the examples above, Pattern must be specified using a forward slash (/) to indicate each RDN subpattern:/RDNsubpattern1/RDNsubpattern2/RDNsubpattern3NOTE: In order tomatch the ACE, anX.509 certificate mustmatch all of the exten-sion values specified inKeyUsage and Ext-KeyUsage.Each RDN contained in a certificate’s DN is compared, in order, to the RDN subpatterns specified by the ACE Pattern (Distinguished Name). RDN matching is case sensitive. The DN match will succeed if every RDN subpattern matches, or fail with the first non-matching subpattern.KeyUsage specifies the optional Key Usage extension against which X.509 certificates will be matched. KeyUsage identifies the purpose(s) for which the certificate’s public key can be used, as defined by the certification authority (CA) that issued the certificate:digitalsignature - matches certificates whose public keys can be used to generate digital signatures.keyagreement - matches certificates whose public keys can be used to establish key agreement.You can enter one or both of these criteria, separated by a comma. ExtKeyUsage specifies the optional Extended Key Usage extension against which X.509 certificates will be matched. ExtKeyUsage defines additional restrictions placed by the issuing CA on how the certificate's public key can be used:tlsserver - matches certificates whose public keys can be used by TLS (Transport Layer Security) servers.tlsclient - matches certificates whose public keys can be used by TLS clients. You can enter one or both of these criteria, separated by a comma. If multiple criteria are specified for an ACE, it will apply only to X.509 certificates that match them all.An ACE configured on the Mesh Point has no effect on Mesh Point operation until it has been included in an applicable function’s ACL, as outlined at the beginning of this section.View existing ACEs with show:# show aceName: excludeOPattern: /O=*
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing129Key Usage: digital signature, key agreementExtended Key Usage: (not set)Name: test2Pattern: /O=*Key Usage: (not set)Extended Key Usage: (not set)You cannot change the Name of an existing ACE, but you can edit and/or add to the filter criteria it specifies with update ace.# update ace -name <ACEname> -pattern <DNpattern> -keyusage digitalsignature,keyagreement -extkeyusage tlsserver,tlsclientYou can also delete a single ACE or all ACEs from the Mesh Point configuration.# del ace -all|-name <ACEname>Deleted ACEs no longer appear in the show ace output. 4.4 Internet Protocol SecurityNOTE: Fortress’sIPsec function isnot yet supported onIPv6 networks.When a Suite-B license is installed (refer to Section 5.6), Fortress Mesh Points can be configured to secure private communications over public networks by implementing the IPsec protocol suite. Fortress’s IPsec implementation uses: NOTE: IncomingIKE traffic requiresadministrative access. Ifthe administrative IPaddress ACL (disabledby default) is enabled, itmust include IPsec peerIP addresses. Section2.2.5 for more detail.Traffic is affected by theper-interface packet fil-ters. If configured, per-interface packet filtersmust include filters topermit IKE traffic to andfrom the FMP. See Sec-tion 4.6.3 for more detail.ISAKMP (Internet Security Association and Key Management Protocol) as defined in RFC 2408IKEv1 (Internet Key Exchange version 1) as defined in RFC 2409, and IKEv2 as defined in RFC 4306IPsec Tunnel Mode using ESP (Encapsulating Security Payload) as defined in RFC 4303Strong standards-based cryptographic algorithm suites including:NSA (National Security Agency) Suite B:AES-128-GCM, 16B ICV1AES-256-GCM, 16B ICVLegacy AES-128-CBCLegacy AES-256-CBCIn IPsec Phase 1, ISAKMP is used to authenticate the initial Security Association (SA)—via digital signature or pre-shared key—and to encrypt the control channel over which IKE messages are exchanged. The Phase 1 IKE SA secures negotiation of the Phase 2 IPsec SAs over which network traffic 1. Advanced Encryption Standard-Galois/Counter Mode, 16-bit integrity check value
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing130is sent and received, according to the ESP protocol, using the specified encryption standard(s).Security Policy Database (SPD) entries determine how IPsec is applied to traffic on the Mesh Point. SPD entries are configured—per interface—to apply a specified action to traffic based on its source and destination subnets.Once the function is enabled and configured, the Mesh Point functions as an IPsec gateway for the locally connected devices, using its own IP address as the IPsec peer address and conducting IKE transactions on behalf of (and transparently to) the devices it secures.IPsec can be used alone or in conjunction with the Fortress Security settings described in Section 4.1.4.4.1 Global IPsec SettingsIPsec is globally disabled by default. When you enable IPsec, you must also provide for at least one authentication method for ISAKMP connections:For IPsec peers to be authenticated via digital signature using an X.509 certificate, you must specify the key pair and associated certificate to use for IPsec, as configured in the Mesh Point’s digital certificate management function (refer to Section 4.2).For IPsec peers to be authenticated by pre-shared keys, you must specify those keys, per peer (refer to Section 4.4.4, below).Once IPsec is globally enabled and configured, you must specify at least one SPD entry (configured to Apply IPsec) on at least one Mesh Point interface, before the Mesh Point can send and receive IPsec-protected traffic (refer to Section 4.4.2).Configure global IPsec settings with set ipsec:# set ipsec -enable y|n -nokey|-key <key> -crypto suiteB256|suiteB128|legacy -salifeMinutes <salifeMinutes>|0 -salifeKB <salifeKB>|0 -isakmplifeMinutes <isakmsalifeMinutes>|0 -crl y|n -ikeVersion <ikeVersion>  Indicate whether IPsec is enabled (y) or disabled (n). Use -key with the key pair name to specify or change the key pair and certificate in use. To clear the current key pair used for IPsec authentication, use -nokey (refer to Section 4.2). Select the cryptographic algorithm suite(s) that the Mesh Point will accept when acting as an IKE responder and will offer when acting as an IKE initiator.SuiteB 256 - AES-256-GCM, 16B ICV (default selection)SuiteB 128 - AES-128-GCM, 16B ICV (default selection)
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing131Legacy - AES-128-CBC, AES-256-CBCSpecify a time- and/or data-limited lifespan at the end of which a new IKE transaction must be negotiated to establish new IPsec SAs for the connection and/or a time-limited lifespan for Phase 1 ISAKMP-authenticated SAs:NOTE: If bothIPsec SA limits areset to positive values,both apply, and which-ever condition occursfirst will cause the SA toexpire. IPsec SA lifetime in minutes (-salifeMinutes) from 1 to 71,582,788 to determine how long the SA will be used before it expires, or specify 0 (zero) to impose no time limit. The default is 240 minutes (4 hours).IPsec SA lifetime in kilobytes (-salifeKB) from 1 to 4,294,967,295 to determine how much data will pass on the SA before it expires, or specify 0 (zero) to impose no data limit. The default is 0 (zero), unlimited data. ISAKMP SA lifetime in minutes (-isakmplifeMinutes) from 1 to 71,582,788 to determine how long the ISAKMP-authenticated SA will be used before it expires, or specify 0 (zero) to impose no time limit. The default is 1440 minutes (24 hours).CAUTION: If youdisable IPsec whenthe function is in use, allIKE and IPsec SAs willbe immediately termi-nated, configured SPDentries will be disabled,and IPsec traffic willcease to be sent orreceived on any inter-face. Indicate whether the IPsec Certificate Revocation List (CRL) function is enabled (y) or disabled (n). When the IPsec CRL is enabled, peer certificate chains are traced back to a trusted root certificate and each certificate's serial number is checked against the contents of the issuing authority’s CRL to verify that none of the certificates in the chain have been revoked, as described in RFC 3280. Specify which IKEversion will be used to initiate SAs. You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).View current IPsec parameters with show ipsec:# show ipsecIPsec is disabled.IPsec crypto suites: SuiteB256,SuiteB128ISAKMP SA lifetime 1440 minutesSA lifetime 240 minutes, unlimited KBCRL checking is disabled.IKE version 2No key pair used for IPsec authentication
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1324.4.2 Interface Security Policy Database Entries CAUTION: WhenL2TP is enabled(Section 4.4.6), do notapply an SPD entry to awireless bridgingenabled BSS (Ena-bleWds[Y]). L2TP/IPsecis not supported forbridging BSSs.When IPsec is globally enabled and configured (refer to Section 4.4.1), the Mesh Point configuration can include up to 100 SPD entries, each associated with one of the Mesh Point’s network interfaces.An interface with at least one SPD configured for it is enabled to process IPsec traffic. An interface with no SPD configured for it is disabled for IPsec traffic.Each SPD entry defines the traffic to which it will apply by a specified local subnet of IP addresses—the source of outbound traffic and destination of inbound traffic. You can likewise specify a remote subnet of IP addresses to which an SPD will apply—defining traffic by its outbound destination/inbound source—as well as the IP address of the connecting device. How traffic defined by an SPD entry will be handled is determined by the specified Action, as shown in Table 4.1.Traffic on an interface that has no matching SPD definition will be handled according to whether any SPD entry has been configured for that interface:NOTE: Devicesthat implementthe IPsec model aresometimes referred to asred/black boxes.An interface with no SPD entry configured for it permits packets to pass unprotected by IPsec. Such an interface is a red interface, in IPsec terms, indicating the unprotected status of traffic on that interface.An interface with at least one SPD entry configured for it drops any packet that does not match (one of) the traffic selector(s) defined by the SPD entry(-ies) configured for that interface. In IPsec terms, such an interface is functioning as a black interface, indicating the secure status of any traffic passing on it.NOTE: Creating ordeleting an SPDentry causes all activeIPsec SAs to be renego-tiated. Add an SPD entry with add spd:# add spdName (policy name): From172NetTo520Interface (Interface name): encLocal address (Local address): 172.0.0.0Local mask (Local mask): 255.0.0.0Remote address (Remote address): 172.28.128.202Remote mask (Remote mask): 255.255.255.255Peer address (IPsec peer address): 172.28.120.121Table 4.1 Configurable SPD Entry Actionsaction inbound packets outbound packetsApplymust be IPsec-protected IPsec-encrypt and send as ESPBypassmust not be IPsec-protected send unprotected by IPsecDropdrop without further processing
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing133Action (bypass|drop|apply): bypassPriority (1..100): 10Provide a Name for SPD entry, and associate the SPD entry with an Ethernet or wireless Interface on the Mesh Point. Interface name must match the name of the Ethernet port or currently configured BSS on the Mesh Point. You can specify only a single Ethernet or wireless interface.The SPD entry will apply to traffic over the local subnet of IP addresses specified with Local Address and Local Mask. The SPD entry will also apply to traffic over the remote subnet of IP addresses specified with Remote Address and Remote Mask. If the Action to be applied by the SPD entry is Apply, you must identify the IP address (Peer Address) of the remote device to and from which IPsec-protected traffic will be sent. If the Action is Drop or Bypass, no IPsec peer is expected for the SPD. Action determines how packets selected by the local and remote subnet parameters specified above will be handled:Drop - drop packets without further processing (default selection)Bypass - receive and send only packets unprotected by IPsecApply - receive and send only packets protected by IPsecPriority establishes the order in which the policy defined by the entry will be applied, from 1 to 100, relative to other configured policies. Priority values must be unique. Policies with lower Priority numbers take precedence over those with higher Priority numbers. Alternatively, you can use switches and arguments to enter SPD information:# add spd -name <SPDname> -interface <interfaceName> -localaddr <LocalIPaddr> -localmask <Localmask> -remoteaddr <RemoteIPaddr> -remotemask <RemoteMask> -peer <PeerIPaddr> -action drop|bypass|apply -priority 1-100To view currently configured SPD entries, run show spd:# show spd                                               Priority: 10, policy name: From172NetTo520Local: 172.0.0.0/255.0.0.0, Remote: 172.28.128.202/255.255.255.255Interface: enc, Action: bypassPriority: 11, policy name: From172NetTo520-2Local: 172.0.0.0/255.0.0.0, Remote: 172.28.128.241/255.255.255.255Interface: enc, Action: bypass
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1342 SPD entries registeredUse show with the -name flag to display only the specified SPD entry, or with -all to show the complete list of configured SPDs.The -dynamicpeers flag permits you to display only IPsec peers connected through dynamic endpoint SPDs (refer to Section 4.4.3, below). To display just the total number of SPDs on the Mesh Point, use show with the -counter flag:# show spd -counter2 SPD entries registeredTo delete IPsec SPD entries:# del spd -all|-name <SPDname>Deleted SPD entries are removed from the show spd output.4.4.3 Dynamic Endpoints for IPsecWhen IPsec is globally enabled and configured on the Mesh Point, SPD (Security Policy Database) rules can be used to define dynamic endpoints for IPsec SAs.NOTE: If L2TP isdisabled, IPsecdynamic endpoints canbe used simultaneouslyfor FP Mesh WDS andVPN client connections.Dynamic endpoint SPDs configured on the Mesh Point are intended to permit IPsec SAs to be dynamically created for one of two types of connection:FastPath Mesh network WDS (wireless distribution system) bridging linksVPN (virtual private network) client connections, from LAC (L2TP Access Concentrator) clients NOTE: SPD entriesspecifying staticIPsec peer IP addresses,as described in Section4.4.2, can coexist withdynamic SPDs. SPD rules for dynamic endpoints are created in Mesh Point UIs with existing IPsec spd controls by specifying 0.0.0.0—to indicate any IP address—for the appropriate SPD entry parameters.Dynamic SPD rules are implemented along with and in the same manner as any static SPD entries present in the Mesh Point IPsec configuration: Packets incoming on the associated interface are compared against each SPD entry’s Remote traffic selector, and when the IP subnet from which the packet originated matches, the rule’s Action is applied. Outgoing packets are handled in the same way, except that an SPD rule’s application is triggered by matches to the entry’s Local traffic selector.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing135NOTE: Mesh Pointsmust be correctlyconfigured for FastPathMesh, as described inSection 3.2.2, in order fordynamic endpoint IPsecSAs to work properly.4.4.3.1 Dynamic Endpoints for FastPath Mesh NetworksWhen FastPath Mesh is enabled and L2TP is disabled, networked Mesh Points can be configured to use dynamic SPD rules to transparently provide IPsec SAs over the flexible bridging links comprising the FastPath Mesh WDS (wireless distribution system).Most simply, you can configure dynamic-endpoint IPsec SAs for the FastPath Mesh network by configuring the same dynamic SPD rule for the bridging interface on each FastPath Mesh Point (FPMP) through which a Non-Mesh Point (NMP) may connect:Policy Name: meshALLPriority: 50Interface: FPmeshLocal: 0.0.0.0/0.0.0.0Remote: 0.0.0.0/0.0.0.0Action: ApplyPeer Address: 0.0.0.0A dynamic SPD rule like the one above must be configured on the FPMPs at both endpoints of the dynamic IPsec tunnel, which is formed on-demand, when these SPD rules are triggered. Either endpoint can initiate the IKE transaction to begin the creation of an IPsec SA over the WDS connection. Only one such SPD rule—as configured on each endpoint Mesh Point—is required, and only one pair of IPsec SAs is created, per IPsec tunnel, over each FastPath Mesh WDS-enabled bridging BSS.An SPD entry like the one above is required only for the WDS bridging interfaces on FPMPs intended to provide network connectivity for NMP/hosts. Once WDS IPsec SAs are established, IPsec uses the FastPath Mesh routing tables to route access network traffic for Non-Mesh Point (NMP) host devices on the network into the correct SAs. A connected NMP/host can roam between Mesh Point access interfaces with no change to the FastPath Mesh network WDS IPsec SAs.4.4.3.2 Dynamic Endpoints for VPN Client Connectionswith dynamic client IP addresses Dynamic IPsec endpoints permit VPN clients whose IP addresses are themselves dynamically established (or otherwise unknown) to connect to the network.After a remote VPN client has successfully authenticated (via pre-shared key exchange or digital certificate), the Mesh Point dynamically creates and applies an SPD rule for it, automatically configured with the authenticated client’s IP address as the Peer Address for the SPD rule.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing136Dynamically created VPN client rules are always generated with a remote mask of 255.255.255.255. Dynamic IPsec SAs are created for VPN clients only when the remote partner has a 32-bit traffic selector for the client and requests that an IPsec SA be established.Typically, a dynamic endpoint SPD rule with a Peer Address of 0.0.0.0 and an Action of Apply, is configured such that new Apply rules are automatically added to the IPsec configuration for VPN clients, as they are authenticated for network access.NOTE: Dynamical-ly extracted val-ues for Remote IPAddress and Peer IPAddress can differ. Theremote portion is thepartner SA endpoint’sdata address. The peeraddress is the partner’spublic address.For example, with this dynamic SPD rule configured:Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: 0.0.0.0/0.0.0.0Action: ApplyPeer Address: 0.0.0.0...if two VPN clients: x.x.x.11 and x.x.x.12, connect to the 10.0.0.0 network through the Mesh Point, the rule transparently expands into:Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: x.x.x.11/255.255.255.255Action: ApplyPeer Address: x.x.x.11Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: x.x.x.12/255.255.255.255Action: ApplyPeer Address: x.x.x.12Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: 0.0.0.0/0.0.0.0Action: ApplyPeer Address: 0.0.0.0with static client IP addresses NOTE: SPD entriesspecifying staticIPsec peer IP addressesas described in Section4.4.2 can coexist withdynamic SPDs. On networks that use static IP addresses, a single dynamic SPD rule can also be used to replace the multiple SPD entries that would otherwise need to be manually configured, one per IPsec peer. An example of a dynamic SPD rule for a network that uses static IP addresses would be:policy name: dynmc-clientsFTPriority: 50 Interface: lan7Local: 0.0.0.0/0.0.0.0Remote: 192.168.10.0/255.255.255.0
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing137Action: Apply Peer Address: 0.0.0.0...can replace the multiple SPD entries that would need to be configured with static IP addresses for multiple VPN clients connecting from the 192.168.10.0/255.255.255.0 subnet:policy name: clientFT-1Priority: 1 Interface: lan7Local: 0.0.0.0/0.0.0.0Remote: 192.168.10.101/255.255.255.255Action: Apply Peer Address: 10.1.101.1policy name: clientFT-2Priority: 2 Interface: lan7Local: 0.0.0.0/0.0.0.0Remote: 192.168.10.102/255.255.255.255Action: Apply Peer Address: 10.1.102.1...etc.In a second example, the same IPsec peers in the above statically configured set could be permitted access by an SPD rule triggered by incoming traffic from any subnet:policy name: dynmc-clientsFT-allPriority: 50 Interface: lan7Local: 0.0.0.0/0.0.0.0Remote: 0.0.0.0/0.0.0.0Action: Apply Peer Address: 0.0.0.0Note that the rule in the second example (above) selects all traffic to and from any subnet connected to the interface:Local : 0.0.0.0/0.0.0.0Remote: 0.0.0.0/0.0.0.0A dynamic SPD rule configured in this way will preempt any SPD entry subsequent to it in priority order and permit access on the associated interface to any successfully authenticated connecting client.for partner Mesh PointsIPsec dynamic endpoint functionality can also be triggered by a 32-bit SPD rule configured on an IPsec SA partner Mesh Point, most typically an ES210 Mesh Point.For example, if an ES210 Mesh Point with the public IP address 4.1.1.50 and private IP address 10.10.10.46 is configured with this SPD entry:Policy Name: Client46Priority: 11Interface: eth2Local: 10.10.10.46/255.255.255.255Remote: 10.0.0.0/255.0.0.0Action: ApplyPeer Address: 192.168.42.35
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing138The Mesh Point at the other end of the IPsec SA would transparently and dynamically expand the SPD rule in the example for dynamic client IP addresses, above, into:Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: 10.10.10.46/255.255.255.255Action: ApplyPeer Address: 4.1.1.50Policy Name: VPPNclientsPriority: 94Interface: eth2Local: 10.0.0.0/255.0.0.0Remote: 0.0.0.0/0.0.0.0Action: ApplyPeer Address: 0.0.0.0Once dynamic peers are established, view them with show spd :# show spd -dynamicpeersPriority: 90, policy name: DynamoLocal: 0.0.0.0/0.0.0.0, Remote: 0.0.0.0/0.0.0.0Interface: DM, Action: apply, peer address: 0.0.0.0Dynamic Peers:       10.14.150.211       10.14.150.212       10.14.150.213       10.14.150.214       10.14.150.215       10.14.150.2161 SPD entry registered6 Dynamic peers registered4.4.4 IPsec Pre-Shared KeysAs an alternative to using a digital certificate, the identity a given IPsec peer can be authenticated by a static pre-shared key (PSK), as configured on both parties to the initial ISAKMP transaction.PSKs on the Mesh Point can be specified as a string of ASCII characters or a series of hex bytes (hexadecimal pairs). Alternatively, you can generate a random key of a specified length.To configure a PSK for an IPsec peer manually:# set ipsec-psk -peer <peer> -ascii <keystring>|-hex <hexdigitstring>Specify the IP address of the IPsec peer to be authenticated by the PSK, then specify and enter either an -ascii string or a series of -hex bytes.To automatically generate a PSK for an IPsec peer:# set ipsec-psk -peer <peerIPaddr> -generate -length <length>
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing139For -length, optionally specify the number of bytes to comprise the key, from 16 to 128. If you omit this value, the default key length is 32 bytes. The -generate switch always results in a hex key. Record the resulting PSK. You must also configure a matching key on the specified IPsec peer.You can view the IP addresses of the IPsec peers for which PSKs are configured using show ipsec-psk:# show ipsec-pskIPsec PSKs configured for the following peers:        172.28.128.208        172.28.128.209        172.28.128.210        172.28.128.211        172.28.128.212        172.28.128.2136 IPsec PSKs configuredTo delete IPsec peer PSKs:# del ipsec-psk -all|-peer <peerIPaddr>4.4.5 IPsec Access Control ListsAn additional level of security can be provided in the Mesh Point’s IPsec implementation via the IPsec ACL. The function is enabled when at least one ACL entry is configured. It is disabled by default: no ACL entries are present.When the ACL is enabled, the Mesh Point compares the X.509 digital certificates of 802.1X authentication servers against the filter criteria in the ACEs contained in the ACL, in the specified Priority order. If no match is found, access is denied. If a match is found, access is allowed or denied according to the ACL entry’s Access rule.You can configure up to 100 IPsec ACL entries to be applied in the specified priority.The ACEs available for inclusion on the ACL are created using add ace, and edited using update ace (see Section 4.3). Once Access Control Entries have been created, they can be added to the ACL using add ipsec-acl. # add ipsec-acl -name <ACEname> -access allow|deny -priority 1-100Name identifies the ACE that you want to add to the ACL. View a list of available ACE names with show ace (see Section 4.3). Priority establishes the order in which the ACL entry will be applied, from 1 to 100, relative to other configured ACL entries. Priority values must be unique. Entries with lower priority
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing140numbers take precedence over those with higher priority numbers.Access determines whether the Mesh Point will Allow (the default) or Deny access to an authentication server whose X.509 certificate matches the criteria specified in the ACL entry.View the entries in the ACL using show:# show ipsec -aclPrio Access ACE Name            ---- ------ --------------------   1 allow  Test4                  5 allow  Test2                 50 allow  Test1                 99 allow  Test3               4 IPsec ACLs configuredUse the -counter switch to show the number of IPsec ACLs configured. To delete IPsec ACL entries:NOTE: Deleting allACL entries dis-ables the Mesh Point’sIPsec ACL function.# del ipsec-acl -all|-name <ACEname>Deleted ACL entries no longer appear when you run show ipsec -acl. 4.4.6 L2TP/IPsec ConnectionsNOTE: IncomingL2TP trafficrequires administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includeL2TP peer IP addresses.See Section 2.2.5 formore detail. Traffic isaffected by the per-interface packet filters.If configured, per-inter-face packet filters mustinclude filters to permitL2TP traffic to and fromthe FMP. See Section4.6.3 for more detail.When a Suite-B license is installed and IPsec is enabled, Layer 2 Tunnel Protocol (L2TP) functionality can be used to establish an L2TP/IPsec tunnel from a client (L2TP Access Concentrator, or LAC) to a server (L2TP Network Server, or LNS). L2TP can be used to establish a virtual network, which enables a remote host or other remote network to access an enterprise network securely. Based on a request from a remote device (LAC), an IPsec SA will be established, the remote user will be authenticated, and the L2TP tunnel session established. The tunnel session will remain active until it is deleted by an administrator, or the IPsec SA is deleted or expires. Currently the ES210 Mesh Point can only serve as an L2TP LAC, and the ES2440, ES820, and ES520 Mesh Points can only operate in LNS mode. A given device can operate in either LAC or LNS mode, but not both.Mesh Points do not support L2TP/IPsec on radio BSS interfaces enabled for wireless bridging (EnableWds[Y], described in Section 3.4.2). When L2TP is enabled, do not apply an SPD entry (as described in Section 4.4.2, below) to a wireless bridging interface.The L2TP LNS uses the configured RADIUS server(s) on a system, on which EAP-TLS must be enabled.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing141To establish a connection over an L2TP/IPsec tunnel, both the LNS device and the LAC device must be configured. To configure the LNS device, use set l2tp-lns: # set l2tp-lnsEnableL2TP (Y|N to enable|disable L2TP/IPSec LNS support): yLocalAddress (IP address of LNS local PPP interface): <lnsIPaddr>LACIpRangeMin (Start IP for LACs IP address range): <minIPaddr>LACIpRangeMax (End IP for LACs IP address range): <maxIPaddr>Enter y or n to enable or disable the L2TP server functionality. This setting applies to all interfaces on the Mesh Point. In LocalAddress, enter the IPv4 address of the Point -to-Point Protocol (PPP, or PtP) interface on the L2TP server. In the LACIpRangeMin field, enter the beginning of the range of IP addresses from which this server will accept L2TP tunnel connection requests. In the LACIpRangeMax field, enter the end of the that range of IP addresses. Alternatively, you can execute set l2tp-lns non-interactively with valid switches and arguments in any order:# set l2tp-lns -enable y|n -localaddr <LocalIPAddress> -iprangemin <BeginIPAddr> -iprangemax <EndIPAddr>   To configure the (ES210) LAC device, use set l2tp-lac:# set l2tp-lacEnableL2TP (Y|N to enable|disable L2TP/IPSec LAC support): yDestAddress (IP address of LNS to connect with): <lnsIPaddr>Key (name of the private key & client certificate to use for L2TP authentication):Enter y or n to enable or disable the L2TP server. In DestAddress, enter the IPv4 address the LNS. This is the same address entered in LocalAddress with set l2tp-lns. Enter the name of the key pair/ certificate to use for EAP-TLS user authentication. Alternatively, you can execute set l2tp-lac non-interactively with valid switches and arguments in any order:# set l2tp-lac -enable y|n -lnsaddr <LNSAddress> -key <keyname>|-nokeyUse the -key switch to indicate or change the key pair/ certificate to use for EAP-TLS user authentication. Use the -nokey switch to clear the encryption key currently in use. View current L2TP settings using show l2tp: # show l2tpCurrent L2TP Settings:    Enabled: Y
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing142    Mode: lac    LAC Setting:      LNS connect address: 0.0.0.0      User auth key/cert: Not setUse the -sessions switch to view any active L2TP sessions, including Tunnel ID and Session ID:# show l2tp -sessionsCurrent L2TP Settings:    Enabled: Y    Mode: lns    LNS Setting:      Local address: 192.168.1.1      LAC IP range min: 192.168.1.2      LAC IP range max: 192.168.2.254      User auth key/cert: l2tpTunnel and session information:Tunnel Id Peer IP         Our IP        State       Session Id15144     172.26.58.140   172.26.58.134 ESTABLISHED 59324You can delete all L2TP sessions, only those for a particular Tunnel ID, or a single session, using del l2tp-session.    # del l2tp-session -all|-tunnelid <tunnelId>|-sessionid <sessionId>You must be logged on to an administrator-level account (refer to Section 2.2) to change configuration settings. 4.5  Authentication and Timeouts The Mesh Point is equipped with an internal authentication service (Section 4.5.2) and can be configured to use an external Fortress RADIUS server (internal to another Mesh Point) or a 3rd-party freeRADIUS or Microsoft® IAS® (Internet Authentication Service) server, as described below.Timeouts can be configured for Mesh Points that are not using RADIUS (Section 4.5.5) and in the internal RADIUS server (Section 4.5.2 and Section 4.5.3).4.5.1 Authentication Servers Use show auth to display currently configured authentication servers:> show auth[Authentication Server List]Name   Priority Mode     Type       AuthType          IPaddr       PortNumber Description AdminState------ -------- -------- ---------- ----------------- ------------ ---------- ----------- ----------RADIUS 1        external thirdParty USER_DEVICE|8021X 192.168.1.22 1812                   active[Highest Priority Active Authentication Server Entry For Each Type]AuthType    IpAddr       AdminState Type----------- ------------ ---------- ----------
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1438021X       192.168.1.22 active     thirdPartyADMIN       0.0.0.0      inactiveUSER_DEVICE 192.168.1.22 active     thirdPartyNo authentication servers are configured by default.The Mesh Point can actively use up to three authentication servers at a time. You can configure the same authentication server to provide more than one supported authentication type. Only the active server for the applicable authentication type will determine the success or failure of a given authentication attempt. Failed credentials are not forwarded to any other server.NOTE: Only fortressRadiusservers support all threetypes of authentication(see the Fortress MeshPoint Software GUI Guidefor more detail). For redundancy, multiple authentication servers can be configured on the Mesh Point. The additional servers will become active only if the server with the earliest priority number for a given authentication type becomes unavailable. In this case the server next in the priority sequence for that authentication type, if one is configured and available, will be used.Add an external authentication server to the Mesh Point configuration interactively with add auth:# add authName (Name of the server): radSrv1Type (fortressRadius|thirdParty): fortressRadiusAuthType (userdev|8021x|admin): userdevPriority (Priority [0..999] of the server): 4Sharedkey (Authentication Key [1-31 characters in length]): sharedkey4IPaddr (IP address of the external server): 192.168.1.9PortNumber (Port number [1..65535] to communicate with the server): 1812MaxRetries (Maximum number of retries (userdev and admin auth types only)): 3AdminState (active|inactive to set admin state (default is active)):Description (Description of the server):You must name the server (Name), identify its Type, and specify what type of authentication the server will perform (AuthType). You can also specify the Priority number, from 1–999, at which the server will be used for the specified authentication type. Lower priority numbers are used first. A value of 0 (zero) assigns a priority of last. By default, servers are assigned consecutive priority numbers, beginning with 1, in the order in which they are added to the Mesh Point’s configuration.You should then specify the external server’s IPaddress and SharedKey (1–64 printable characters), and the PortNumber to use for authentication transactions with the server.In addition, you can specify how many times the Mesh Point will attempt to connect to the server before determining that the server is unavailable and going on to the next configured
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing144server on the priority list (MaxRetries). You can configure 1 to 10 maximum connection attempts; the default is 3.You can determine whether a server is active or inactive (AdminState). Configured servers are active by default. Optionally, you can add a descriptive string of up to 32 characters for the server. If you want to include spaces in the Description, enclose it in quotation marks.Alternatively, you can add authentication servers to the Mesh Point configuration using valid Mesh Point CLI switches with the add auth command:# add auth -name <serverName> -type fortressRadius|thirdParty -atype 8021x|admin|userdev -prio 0–999 -ip <serverIPaddr> -port <port#> -key <sharedKey> -maxretry 1–10 -admin active|inactive -desc <description|“descriptive string”>When authentication servers have been configured for the Mesh Point, you can view all of the settings for each server by using the -detail switch with show auth:> show auth -detailName:           LocalPriority:       1Mode:           localType:           fortressRadiusAuthType:       USER_DEVICE|ADMINIPaddr:         127.0.0.1PortNumber:     1812MaxRetries:     3Description:AdminState:     activeOnce an authentication server has been configured on the Mesh Point, you cannot change its name. Use the -name switch with the update command to reconfigure the server you specify.# update auth -name <serverName> -type fortressRadius|thirdParty -atype 8021x|admin|userdev -prio 0–999 -ip <serverIPaddr> -port <port#> -key <sharedKey> -maxretry 1–10 -admin active|inactive -desc <description|“descriptive string”>You can delete a specified authentication server or all configured authentication servers with the del command. If you enter del auth by itself, the CLI will prompt you for the server’s name or permit you to enter all interactively.# del auth -all|-name <serverName>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1454.5.2 Internal Authentication ServerNOTE: IncomingRADIUS trafficrequires administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includeIP addresses of authen-ticating users, devices,administrators and802.1X supplicants. SeeSection 2.2.5 for moredetail. Traffic is affectedby the per-interfacepacket filters. If config-ured, per-interfacepacket filters mustinclude filters to permitRADIUS traffic to andfrom the FMP. See Sec-tion 4.6.3 for moredetail.The users and Secure Client devices you add to the Mesh Point’s local authentication configuration apply only when the internal authentication, or RADIUS, server is enabled (below).View current settings for the internal authentication server with show localauth:> show localauthEnableLocalAuth:       NPort:                  1812EnableDevAuth:         NEnableUserAuth:        YDefaultDeviceState:    pendingDefaultMaxRetries:     3DefaultIdleTimeout:    30DefaultSessionTimeout: 30EnableAdminAuth:       NEnable8021xAuth:       NProtocols:             md5Check CRL:             NEnableOcsp:            NOcspUrl:EnableOcspNonce:       YCaCertUrl:LdapSearchBase:EAP-TLS cipher set:    allPriority:              0The above output shows the default settings for the internal authentication server, which is disabled by default. The internal authentication server is enabled and configured with set localauth:# set localauthEnableLocalAuth[N] (Y|N to enable|disable local authentication server): yPort[1812] (Port number to communicate):SharedKey (Authentication key): authkeyPriority (Local server priority [0..999]):EnableDevAuth[N] (Y|N to enable|disable Device authentication): yEnableUserAuth[N] (Y|N to enable|disable User Authentication): yDefaultDeviceState[pending] (pending|allow|deny): allowDefaultMaxRetries[3] (Maximum attempts at reaching server before failover 1-30, default is 3):DefaultIdleTimeout[30] (User idle timeout in minutes 1-720, default is 30):DefaultSessionTimeout (Authentication timeout in minutes, 1-200, default is 30):EnableAdminAuth[N] (Y|N to enable|disable administrator authentication):Enable8021xAuth[N] (Y|N to enable|disable 802.1x authentication):EnableEAP-MD5 (Y|N to enable|disable support for EAP-MD5 protocol):EnableEAP-TLS (Y|N to enable|disable support for EAP-TLS protocol):EnableCRLCheck[N] (Y|N to enable|disable CRL check):EnableOcsp[N] (Y|N to enable|disable OCSP):OcspUrl[""] (URL of OCSP responder):EnableOcspNonce[Y] (Y|N to enable|disable OCSP nonce):CaCertUrl[""] (URL of CA certificate or chain):LdapSB[""] (Search base for CA certificate or chain (LDAP only)):
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing146TLSCipherSuite (all|legacy|suite-b to set supported cipher suite for EAP-TLS):Enabling the internal authentication server causes an entry to be automatically added to the authentication server list output by the show auth command (refer to Section 4.5.1). This entry is automatically removed if the internal authentication server is disabled.NOTE: The sharedkey on the internalauthentication servermust be 1–64 printablecharacters.4.5.2.1 Basic Internal Authentication Server Settings In addition to enabling (y) and disabling (n) local authentication, you can configure the port used by the internal authentication server, change the server’s shared key (SharedKey), and establish a Priority for this authentication server.4.5.2.2 Certificate Authority SettingsThe CaCertUrl (CA Certificate URL) parameter specifies the full LDAP uniform resource locator, as a domain name or IP address, of the LDAP server from which the Mesh Point will download the most recent CA certificates. This setting, with LdapSB (described in the next paragraph) permits CA certificates on the Mesh Point to be automatically refreshed at the time the internal RADIUS server is enabled.The LdapSB (LDAP Search Base) parameter specifies the starting point in the LDAP (Lightweight Directory Access Protocol) directory for certificate retrieval search, as the distinguished name of the search base object. (ou=engineering,dc=gdfortress,dc=com, for example). This setting, with CaCertUrl (described in the paragraph above) permits CA certificates on the Mesh Point to be automatically refreshed at the time the internal RADIUS server is enabled.4.5.2.3 Global User and Device Authentication SettingsNOTE: Individualdevice authentica-tion settings overridethe global DefaultDeviceState  settingon the internal authenti-cation server.Fortress Secure Client device authentication (set localauth EnableDevAuth) and local user authentication (set localauth EnableUserAuth) are enabled (y) and disabled (n) independently. At least one must be enabled, even if internal authentication is disabled.You can also configure the default connection state of Secure Client devices auto-populating the authentication database (set localauth DefaultDeviceState):pending (default) requires an administrator to change devices’ authentication state settings to allow before they can connect. allow permits auto-populating devices to connect by default (provided their individual authentication mode is allowfirst or defer, as described in Section 4.5.4). deny blocks all device connections by default.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing147The maximum number of authentication retries (DefaultMaxRetries) and idle and session timeout settings (DefaultIdleTimeout and DefaultSessionTimeout) configured on the internal authentication server are applied globally to all authenticating devices and users. A device that exceeds the maximum allowable retry attempts to authenticate on the Mesh Point is locked out until the device’s individual authentication mode is set to allowfirst Such a device is locked out on every Mesh Point in a network, and you must change the device’s authentication mode on every Mesh Point that handles traffic from the device.Users who exceed the maximum allowable retry attempts to log on to the Fortress-secured network are locked out until you reset their sessions. On a network of Mesh Points, you must reset the session on each Mesh Point that passes traffic for the device.Specify maximum authentication retries in whole numbers between 1 and 255; the default is 3. Specify idle and session timeouts in minutes: between 1 and 720 for idle timeouts, and 1 and 200; for session timeouts. 0 (zero) disables the timeout setting. The default session timeout is 30 minutes. The default idle timeout is 30 minutes.4.5.2.4 Local 802.1X Authentication SettingsThe Mesh Point’s internal RADIUS server can be configured to authenticate 802.1X supplicant credentials using two possible EAP (Extensible Authentication Protocol) types.NOTE: EAP-TLSprovides a signifi-cantly higher level ofsecurity than EAP-MD5.EAP-MD5 verifies an MD5 (Message-Digest algorithm 5) hash of each user’s password, which requires a user’s credentials to be present in the Mesh Point’s local user authentication service before the local 802.1X service can authenticate that user. Refer to Section 4.5.3 for guidance.In order to use EAP-TLS (EAP with Transport Layer Security) public key cryptography authentication, you must import a valid EAP-TLS digital certificate for the local service and the root CA (Certificate Authority) certificate that signs the local server certificate. You must also import any root CA certificate(s) used to sign supplicant certificates, so that the local server can verify their authenticity. Refer to Section 4.2 for guidance. Additional local server configuration settings in set localauth apply only to EAP-TLS, as noted below. Enable8021xAuth[N] (Y|N to enable|disable 802.1x authentication):EnableEAP-MD5 (Y|N to enable|disable support for EAP-MD5 protocol):EnableEAP-TLS (Y|N to enable|disable support for EAP-TLS protocol):EnableCRLCheck[N] (Y|N to enable|disable CRL check):TLSCipher (all|legacy|suiteb to set supported cipher suite for EAP-TLS):
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing148Enable802.1XAuth turns the service on (y) and off (n, the default).Use EnableEAP-MD5 to enable (y) or disable (n) support for the EAP-MD5 protocol. EnableEAP-TLS enables or disables support for EAP-TLS. NOTE: CRL-check-ing must be glob-ally enabled (thedefault), as described inSection 4.4.1, in orderfor the EAP-TLS CRLfunction to operate.EnableCRLCheck applies only to EAP-TLS, and determines whether certificates used to authenticate 802.1X supplicants are checked against the lists of certificates that have been revoked by their issuing authorities. CRLCheck is Disabled by default. When the function is Enabled, supplicant certificate chains are traced back to a trusted root certificate and each certificate's serial number is checked against the contents of the issuing authority’s CRL to verify that none of the certificates in the chain have been revoked, as described in RFC 3280.TLSCipherSuite also applies only to EAP-TLS, and specifies the list of supported cipher suites, or sets of encryption and integrity algorithms, that the 802.1X service will accept:All - the default, supports both Legacy and Suite B cipher suites (below)Legacy - supports Diffie-Hellman with RSA keys (DHE-RSA-AES128-SHA and DHE-RSA-AES256-SHA)Suite B - supports Diffie-Hellman with ECC keys (ECDHE-ECDSA-AES128-SHA and ECDHE-ECDSA-AES256-SHA)In EAP-TLS, the authentication server selects the cipher suite to use from the list of supported suites sent by the client device (or rejects the authentication request if none of the proposed suites are acceptable).If you will be using the local user service to authenticate administrators on the current or a remote Mesh Point (Section 2.1.1), you must enable administrator authentication (EnableAdminAuth: y). It is disabled by default. 4.5.2.5 OCSP Authentication Server SettingsNOTE: The inter-nal RADIUSserver’s OCSP cache isintended to store entriesfor users’ CACs (Com-mon Access Cards).The Online Certificate Status Protocol (OCSP) can be used to determine the current revocation status of an X.509 digital certificate, as an alternative to CRLs (Certificate Revocation Lists). Revocation status determined through OCSP is based on more current information than is possible with CRLs.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing149NOTE: IncomingOCSP trafficrequires administrativeaccess. If the adminis-trative IP address ACL(disabled by default) isenabled, it must includeIP addresses for theOCSP responder andvalidating devices. SeeSection 2.2.5 for moredetail. Traffic is affectedby the per-interfacepacket filters. If config-ured, per-interfacepacket filters mustinclude filters to permitOCSP traffic to andfrom the FMP. See Sec-tion 4.6.3 for moredetail.The Mesh Point's internal RADIUS server can optionally be configured to check the revocation status of certificates using OCSP. In this configuration, the internal RADIUS server acts as an OCSP client. The OCSP client function is disabled by default.When the OCSP client function is enabled, the internal RADIUS server determines the current revocation status of an X.509 digital certificate presented to it for validation, using information obtained from either the configured OCSP responder or the local OCSP cache. Any certificate whose revocation status cannot be determined to be Good is rejected.The OCSP cache serves as a backup source of revocation information, when the configured OCSP responder cannot be reached: a certificate’s revocation status, as obtained directly from the configured OCSP responder, is saved whenever the responder can be reached.The certificate revocation status that is saved in the cache is valid for a limited period of time, as specified by the global ValidityPeriod. The cached revocation status of a certificate expires at the end of its ValidityPeriod, after which it is not used to determine revocation status. NOTE: For moredetail on OCSPCache Operation, refer tothe Fortress Mesh PointSoftware GUI Guide.An entry for an X.509 certificate can be added to the cache administratively, or it can be learned automatically. In either case, the revocation status for the certificate is saved (updated or added) to the cache, whenever it is retrieved from the configured OCSP responder.Administratively Added OCSP Cache EntriesWhen adding an OCSP cache entry administratively, the certificate is identified by the SearchText character string. This must be a substring of the certificate’s Subject field—typically a substring of the Common Name component of the Subject field—that identifies the certificate without ambiguity. At the time it is added, a manually entered OCSP cache entry is marked Not yet validated, and it is treated as though it has expired, unless it matches a previously cached (learned) certificate. If it matches a previously learned certificate, the expiration time associated with the entry is left unchanged.When the certificate matching the entry is presented for validation, if the revocation status of the certificate can be determined by successfully contacting the configured OCSP responder, the entry’s Not yet validated status is updated to reflect the revocation status returned in OCSP response.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing150OCSP Cache LearningThe OCSP cache learning function (AutoLearningEnabled: Y) can be used to limit which certificates will be considered for validation, as follows: NOTE: Adminis-tratively addedOCSP cache entries per-mit the correspondingcertificate to be consid-ered for validation evenwhen the entry’s Statusis Not yet validated. When OCSP cache learning is enabled, every certificate presented to the internal authentication server for validation will be processed. If the revocation status of the certificate can be successfully determined by contacting the configured OCSP responder, an entry for the certificate will be added to the cache—or, if an entry already exists for the certificate, it will be updated or refreshed in the cache.When cache learning is disabled (AutoLearningEnabled: N), not all certificates presented to the internal authentication server for validation will be processed. Only certificates that match an entry already present in the cache will be considered for validation. Other certificates will be rejected without further processing.Three set localauth options configure the Mesh Point’s OCSP function globally:EnableOcsp[N] (Y|N to enable|disable OCSP):OcspUrl[""] (URL of OCSP responder):EnableOcspNonce[Y] (Y|N to enable|disable OCSP nonce):Turn the OCSP client function on (Y) and off (N, the default) with EnableOcsp. If you enable OCSP client functionality, you must configure the OCSP responder URL (OcspUrl). Specify the full global web address, as a domain name or IP address, of the server that will process the Mesh Point's OCSP requests. By default, OCSP requests from the internal authentication server contain the nonce extension (EnableOcspNonce: Y). Alternatively, the nonce extension can be omitted (EnableOcspNonce: N).4.5.2.6 OCSP Cache Settings and ManagementWhen OCSP is enabled, use show ocspcache to observe global OCSP cache settings and any cache entries:# show ocspcacheOCSP Cache (ValidityPeriod: 168 hours, AutoLearningEnabled: Y, TotalEntries: 0)Index  Common Name         Search Text         Status------ ------------------- ------------------- -----------------No entries to showValidityPeriod specifies the length of time, in hours, for which OCSP cache entries are renewed, upon receipt of a validation status of Good from the configured OCSP responder, or when the entry is manually renewed. The default ValidityPeriod is 168 hours (seven days).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing151OCSP cache learning is enabled by default (AutoLearningEnabled: Y), which configures the internal RADIUS server to save information learned from OCSP responses to the OCSP cache. If a response pertains to an existing cache entry, the entry is updated or refreshed. If a response pertains to a new certificate, an entry is created for the certificate in the OCSP cache. When learning is disabled (AutoLearningEnabled: N), the internal RADIUS server will attempt to validate a certificate only when an entry for it is already present in the OCSP cache. Disable learning if you do not want to automatically authenticate new users on the network.Manually add OCSP cache entries for digital certificates with the add command:# add ocspcache -searchtext <uniqueSubjectSubstring>Typically, -searchtext specifies a substring of the Common Name component of the certificate’s Subject field. It must identify the certificate without ambiguity. If a matching manual entry is present for a new certificate, it will be sent to the OCSP responder for validation, even when OCSP cache learning is disabled.# show ocspcacheOCSP Cache (ValidityPeriod: 168 hours, AutoLearningEnabled: Y, TotalEntries: 1)Index  Common Name         Search Text         Status------ ------------------- ------------------- -----------------1                          ou=engineering,dc= Not yet validatedThe Not yet validated Status of an entry manually added to the OCSP cache will be overwritten by the first actual Status value received for the matching certificate from the OCSP responder, and the certificate’s Common Name will be recorded in the entry. OCSP cache entries are identified by -index number or -searchtext string, which, once established, cannot be changed. Use these switches with an entry’s Index number or Search Text string, respectively, to identify an entry for update. Alternatively, you can use -all to apply an update to every entry in the cache.Use update ocspcache with -renew to refresh an OCSP cache entry—or -all entries in the cache—to the currently configured ValidityPeriod (described above). # update ocspcache -index <Index#>|-searchtext <uniqueSubjectSubstring>|-all -renewUse update ocspcache with -expire to mark an OCSP cache entry—or -all entries in the cache—immediately expired.# update ocspcache -index <Index#>|-searchtext <uniqueSubjectSubstring>|-all -expire
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1524.5.2.7 Internal Authentication Server Access Control ListsWhen the internal RADIUS server is used for 802.1X EAP-TLS authentication (refer to Section 4.5.2.4), an additional level of security can be provided via an Access Control List (ACL). The internal RADIUS ACL function is enabled when any ACL entry is administered. Once the ACL is enabled, the Mesh Point compares the X.509 digital certificates of 802.1X authentication servers against the filter criteria in the ACEs contained in the ACL, in the specified Priority order. If no match is found, access is denied. If a match is found, access is allowed or denied according to the ACL entry’s Access rule.The ACEs available for inclusion on the ACL are created using add ace, and edited using update ace (see Section 4.3).Once Access Control Entries have been created, they can be added to the ACL using add radius-acl. # add radius-acl -name <ACEname> -access allow|deny -priority 1-100You can configure up to 100 ACL entries to be applied in the specified priority. Name identifies the ACE that you want to add to the ACL. View a list of available ACE names with show ace (see Section 4.3). Priority establishes the order in which the ACL entry will be applied, from 1 to 100, relative to other configured ACL entries. Priority values must be unique. Entries with lower priority numbers take precedence over those with higher priority numbers.Access determines whether the Mesh Point will Allow or Deny (the default) access to an authentication server whose X.509 certificate matches the criteria specified in the ACL entry.View the entries in the RADIUS ACL using show:# show radius-aclPrio Access ACE Name            ---- ------ --------------------   1 allow  Test4                  5 allow  Test2                 50 allow  Test1                 99 allow  Test3               --- Total ACLs: 4Use del radius-acl to remove entries from the internal RADIUS ACL.NOTE: Deleting allACL entries dis-ables the Radius ACLfunction.# del radius-acl -all|-name <ACEname>Deleted ACL entries no longer appear when you run show radius-acl.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing153NOTE: The MeshPoint maintains aseparate, local adminis-trator database thatautomatically “learns”administrators who suc-cessfully logon througha Fortress user databaseor third-party RADIUSserver (refer to Section2.2.3).4.5.3 User Authentication Users for whom you create authentication accounts will be one of two types: Secure Client users connect to the Mesh Point’s encrypted interfaces via devices running the Fortress Secure Client; Admin users are using the Mesh Point’s local user authentication database to gain administrative access to the Mesh Point’s management interface.View currently configured users with show userauth:# show userauthUserName UserFullname IdleTimeout SessionTimeout AdminState AdminAuth-------- ------------ ----------- -------------- ---------- -------------admin2                30          200            active     Administratorperson1  Full Name1   30          200            active     None    person2  Full Name2   30          200            active     Noneperson3  Full Name3   30          200            active     NoneAdd new users interactively with add userauth:# add userauthUserName (User name): <username>Password (User password): <userpw>Password Confirm (Password Confirm): <userpw>IdleTimeout[30] (User idle timeout in minutes): 1–720SessionTimeout[1200] (User session timeout in minutes): 1—200UserFullname (User full name): <“Full Username”>AdminState (active|inactive to set User's admin state): active|inactiveAdminAuth (logviewer|maintenance|administrator|none):none|administrator|maintenance|logviewerAlternatively, you can add users to the Mesh Point’s internal RADIUS server using valid Mesh Point CLI switches with the add command:# add userauth -name <username> -passwd <userpw> -passwordConfirm <userpw>-idletimeout 1–720 -sestimeout 1—200 -fullname <“Full Username”> -admin active|inactive-adminauth none|administrator|maintenance|logviewerNOTE: Passwordsdo  not need to beunique.The username (-name) and password (-passwd) are the credentials the user must input in order to authenticate on the Mesh Point. Both are required. Usernames must be 1–32 (inclusive) alphanumeric characters in length. Passwords must comply with the requirements configured with set account (page 17). You can also enter a user’s full name with the -fullname switch, which accepts an entry up to 250 characters in length; enclose the string in quotation marks to include spaces.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing154NOTE: When usingan external authen-tication server, user and(when applicable) deviceauthentication settingsare configured in theexternal application.Set individual users’ session timeouts in minutes, from 1 to 200 (inclusive). Set individual users’ idle timeouts in minutes from 1 to 720 (inclusive).User accounts are active by default. To disable a user’s account set -admin to inactive.User accounts have no administrative privileges on any Mesh Point by default, as configured by an -adminauth value of none. The Mesh Point’s user authentication database can however be used to authenticate administrators on a remote Mesh Point (or on the current Mesh Point) when it is configured for radius administrative authentication through the set account command (refer to Section 2.2.1). The level of administrative privileges of an administrator authenticated in this way are determined by the role specified by the -adminauth value. A value of administrator grants full management access, maintenance grants view-only and limited administrative permissions, and logviewer confines permissions to limited system-log viewing (as described in greater detail in Section 2.2).Once a user account has been established, you cannot change the username associated with it. Use the -name switch with the update command to reconfigure the account of the user you specify. The same switches and arguments used with add userauth (above) can be used to edit other account settings:# update userauth -name <username> -password <userpw> -passwordConfirm <userpw> -idletimeout 1–720 -sestimeout 1—200 -fullname <“Full Username”> -admin active|inactive -adminauth none|administrator|maintenance|logviewerYou can delete a specified user account or all configured user accounts with the del command:# del userauth -all|-name <username>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.5.4 Client Device Authentication Local device authentication settings apply only to Secure Client devices authenticating through the Mesh Point’s internal authentication server. (Controller authentication of other Fortress devices is covered in Section 4.6.2, below.)When device authentication is enabled (Section 4.5.2.1), the Mesh Point detects devices attempting to access the Mesh Point’s encrypted zone and lists them for local authentication. You can also manually add a device for internal RADIUS authentication by entering its MAC address and Fortress Device ID.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing155Attempts made by auto-populating Client device to connect to the Mesh Point-protected network are treated according to the default device state (DefaultDeviceState) configured on the internal authentication server (Section 4.5.2.1).View the current list of authenticating Secure Client devices with show deviceauth:> show deviceauthDeviceID         MACAddress         EnableUserAuth   AuthStateMode  AdminState CommonName          ---------------- ------------------ ---------------- -------------- ---------- ------------------- 333300148cf80001 00:14:8c:f8:00:01  Y                allowfirst     active     Test1               333300148cf80002 00:14:8c:f8:00:02  N                denyall        inactive   Test2               333300148cf80003 00:14:8c:f8:00:03  N                defer          active     Test3               333300148cf80004 00:14:8c:f8:00:04  Y                allowfirst     inactive   Test4               333300148cf80005 00:14:8c:f8:00:05  Y                allowfirst     active     Test5               333300148cf80006 00:14:8c:f8:00:06  Y                allowfirst     active     Test6               333300148cf80007 00:14:8c:f8:00:07  Y                allowfirst     active     Test7               333300148cf80008 00:14:8c:f8:00:08  Y                allowfirst     active     Test8               333300148cf80009 00:14:8c:f8:00:09  Y                allowfirst     active     Test9               ---Total devices: 9Manually add devices for authentication with add deviceauth:# add deviceauth -deviceID <deviceID> -deviceMac <deviceMACaddr> -name <deviceName> -userAuth y|n -mode  allowfirst|denyall|defer -admin active|inactiveThe 16-digit hexadecimal Fortress Device ID automatically generated for Secure Client devices and the device’s MAC address must be specified in order to manually add a device for local authentication. These are not user configurable settings.You can optionally specify a name (-name) for the device and determine whether its user must also authenticate (-userAuth) before the device is permitted to connect. User authentication is enabled for authenticating devices by default.The -mode switch determines the initial state of the device’s connection to the encrypted zone: allowfirst (the default) to allow the device to connect using the first key establishment method it attempts to use, denyall to block any connection attemptdefer to apply the default device state (DefaultDeviceState) configured through set localauth (Section 4.5.2.1)Devices that have been manually added for internal RADIUS authentication have a default administrative state (-admin) of active. You can temporarily suspend a device from authentication, without deleting its record, by changing -admin to inactive. Once a device account has been established, use the -deviceID switch with the update command to reconfigure
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing156authentication for the device you specify. The same switches and arguments used with add deviceauth (above) can be used to edit other authentication settings:# update deviceauth -deviceID <deviceID> -userAuth y|n -name <deviceName>-mode allowfirst|denyall|defer -admin active|inactive -keysize DH512|DH1024|DH2048|suiteBIn addition, after a device has been added to device authentication and allowed to connect, you can specify the key establishment method(s) the device will be allowed to use for subsequent connections with -keysize.You can delete a specified device from authentication or all configured devices with the del command:# del deviceauth -all|-deviceID <deviceID>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.5.5 Session Idle Timeouts When idle sessions are timed out by the Mesh Point, affected devices must re-establish their connections and reauthenticate on the encrypted network. When the Mesh Point is configured to permit cached authentication credentials (the default, Section 4.1.15), the Mesh Point uses cached credentials to reauthenticate the users of timed-out devices transparently.Idle timeouts for host devices—devices connecting from the clear zone—can only be set globally.Idle timeouts for Secure Client devices can be set at the same global level as host idle timeouts, but when the internal authentication server is enabled (Section 4.5.2), the local global setting overrides the overall global setting (as displayed and configured with the show and set idletimeout commands described below).Use show idletimeout to display Secure Client and host idle-timeout settings:# show idletimeoutclients: 30 minuteshosts:   30 minutesThe output above shows the Mesh Point’s default, 30-minute idle timeout values.You can configure session timeout values globally for all devices, globally for a particular device type (clients or hosts) or for individual devices, identified by their MAC addresses. Set timeouts in minutes from 1 to 43200, or enter 0 (zero) to disable the timeout function.Set the timeout value for all connected devices on both the encrypted and clear sides of the network by entering only the
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing157command, option and parameter, without switches or arguments:# set idletimeout <min>Set the timeout value for all clients (devices on the encrypted side of the network running the Fortress Secure Client) with:# set idletimeout <min> -c allSet the timeout value for all hosts (devices in communication with the Mesh Point on the clear side of the network) with:# set idletimeout <min> -h allTo configure the idle timeout value for a single device, use the appropriate switch (as shown above: -c or -h) with the device’s MAC address, as follows: # set idletimeout 60 -c 00:09:43:bd:3a:00The above example sets the idle timeout value for a Secure Client device with the specified MAC address.You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.6 ACLs and Cleartext Devices 4.6.1 MAC Address Access Control The Mesh Point supports Access Control List (ACL) filtering of devices by their MAC (Media Access Control) addresses.There is also an ACL associated with the Mesh Point’s IPsec function, which is covered in Section 4.4.5 with the other IPsec configuration settings.View the current ACL configuration with show maclist:> show maclistNOTE: The MaxBlocked numberis actually the maxi-mum number of permit-ted MAC addresses andshow blocked listspermitted devices byMAC address.Filtering Mode: enabledMac Address       Descriptions          MAC Entry Type ----------------- --------------------- -----------------00:00:00:11:11:13 Test 3                 Mesh Point00:00:00:11:11:14 Test 4                 Mesh Point00:10:60:33:9f:6b Host NMS               Mesh Point00:14:8c:3a:a5:00 automatically added    Mesh Pointb4:a4:e3:d1:0a:c3 Router                 Mesh PointTotal Mac White List entries: 5View currently blocked devices by MAC address with show blocked:> show blockedMax Blocked : 200Blocked Addresses-----------------00:14:8c:00:82:0000:14:8c:12:64:c0
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing15800:14:8c:3a:aa:40b4:a4:e3:d1:0a:87Configure ACL filtering with set maclist:# set maclist -m enabled|disabled -fUse the -m switch to configure whether the ACL whitelist filtering mode is enabled, which explicitly allows network access to the listed devices.You can clear (i.e., flush) the ACL with set maclist by entering the -f switch without arguments.Add new MAC addresses to the ACL whitelist with add maclist:# add maclist -mac <MACaddr> -desc <description>Delete a single device from the ACL or all filtered MAC addresses with the del maclist command:# del maclist -all|-mac <MACaddr>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.6.2 Destination MAC Address Filter The Mesh Point supports filtering packets by destination MAC address, for up to eight destination MAC addresses. The Mesh Point will drop any packet that has a destination MAC address that matches one of these filters.View the current destination MAC address filters with show dest-maclist:> show dest-maclistNOTE: A commonuse for the desti-nation MAC address fil-ters is to block packetsof foreign routing proto-cols from entering theFortress Mesh. The For-tress Mesh Routing pro-tocol is not meant to beused in combinationwith other routing pro-tocols such as Cisco’sV T P,  C D P, S h a re d  S T P,etc.Enabled: enabledMAC-----------------00:01:02:03:04:0501:00:0c:cc:cc:cc01:00:0c:cc:cc:cd Configure destination MAC address filtering with set dest-maclist:# set dest-maclist -enable Y|NUse the -enable switch to configure whether the destination MAC address filter list filtering mode is enabled, which filters packets destined for the listed devices.Add new MAC addresses to the destination MAC address filter list with add dest-maclist:
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing159# add dest-maclist -mac <MACaddress>|-ciscoprotUse the -ciscoprot switch to add the destination addresses for the most common Cisco protocols to the destination MAC address filter list.Delete a single device from the ACL or all filtered MAC addresses with the del dest-maclist command:# del dest-maclist -all|-mac <MACaddress>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.6.3 IP Address Packet FilterAlthough the Fortress Mesh Point is a Layer-2 device, it has the capability to filter IP packets. The user can create filter rules on each interface, wired or wireless, to permit or deny packets based on:IPv4Source address / mask (prefix length)Destination address / mask (prefix length)ProtocolIPv6Source address / mask (prefix length)Destination address / mask (prefix length)Next header (Protocol)TCPSource portDestination portUDPSource portDestination portA user may configure up to 16 rules per interface. Enabling packet filters on an interface adds an extra automatically generated rule to the interface. This rule denies (drops) all IP packets which did not match any configured filter rule.Add packet filter rules with add pktfilter:# add pktfilter -name <filterName> -action permit|deny -log Y|N      -type ipv4|ipv6|tcp|udp -interface <interfaceName>      -priority <1..16> -srcaddr <srcAddress> -srcpl <srcPrefixLen>      -destaddr <destAddress> -destpl <destPrefixLen>      -protocol <protocolNumber> -srcport <srcPort>       -destport <destPort>You must specify the following information in order to create a packet filter rule:
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing160Name: a unique packet filter rule name of 1 to 200 characters.Action: whether to permit the packet or deny it. Denied packets are dropped without further processing.NOTE: The usermust turn on theglobal Common Criterialogging as well as set-ting the log switch onthe individual filter rulein order to request theseaudit logs. See setlogging -ccaudit inSection 4.7.1.Log: whether or not to log when a packet matches this rule. The FMP will write out audit logs reporting what packets have matched the rule. For performance reasons, the FMP reports the count of how many packets have matched the rule over the last 8 seconds, rather than emitting a log for every packet.Type: what type of packet - IPv4, IPv6, TCP, or UDP - to match.Interface: this rule will be tested whenever a packet enters or exits the FMP on this interface.NOTE: There is norequirement forthe priorities to be num-bered contiguously. Infact it is common toleave gaps in case a newintervening rule isneeded in the future,because it is not possibleto modify an existingrule. The user mustdelete the rule and re-add it with the updatedspecifications.Priority: the order in which to apply this rule. Priority is a number between 1 and 16 inclusive. Rules on each interface are tested against the packet beginning with the lowest numbered priority and ending with the highest numbered priority. In addition, depending on the Type chosen, you may be required to enter other information. For Type IPv4 or IPv6:REQUIRED: Source Address of the appropriate Type (e.g., if Type is IPv4, the Source Address must be an IPv4 address);REQUIRED: Source Prefix Length. This is the bit length of the subnet mask of the IP Address (e.g., if the IPv4 mask is 255.255.255.0, the Prefix Length is 24);REQUIRED: Destination Address of the appropriate Type, plus Destination Prefix Length;OPTIONAL: Protocol Number: the Internet Assigned Numbers Authority (IANA) number of the IPv4 or IPv6 protocol on which to filter. If the protocol is not specified, the filter is applied to all protocols of that Type (IPv4 or IPv6).NOT ALLOWED: Source or Destination Port.For Type TCP or UDP:OPTIONAL: Source Port: the IANA number of the TCP or UDP port to match to the source port of the packet. If the source port is not specified, the filter will be applied no matter what the packet's source port is.OPTIONAL: Destination Port: the IANA number of the TCP or UDP port to match to the destination port of the packet. If
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing161the destination port is not specified, the filter will be applied no matter what the packet's destination port is.NOT ALLOWED: Source Address, Source Prefix Length, Destination Address, Destination Prefix Length, and Protocol.Adding rules to an interface does not automatically cause those rules to be applied to packets entering and exiting that interface. The user must enable packet filtering on the interface using set pktfilter:CAUTION: It iseasy to forget thatthe final rule on EVERYinterface that hasenabled packet filters isan automatically gener-ated rule that DENIESALL PACKETS! This istrue even if there are nopacket filtering rulesconfigured. Be very surebefore enabling packetfiltering on an interfacethat you have not fil-tered out the packetsthat must go through inorder to ensure yourability to monitor andcontrol the FMP! Thisincludes any necessary"helper" IP protocolssuch as DNS, DHCP,DHCPv6, ICMP,ICMPv6, IGMP, NTP,IKE, L2TP, RADIUS,OCSP, and CRL. If youenable packet filteringon an interface withoutconfiguring permitrules, the FMP will dropall IP packets that comein or that would be for-warded out that inter-face.# set pktfilter -interface <interfaceName> -enable Y|NView the current packet filter configuration with show pktfilter:# show pktfilter -name <filterName> -interface <interfaceName> -all more  > show pktfilterPacket filtering status (per interface):bssForDoc: disabledlan1: disabledlan2: disabledlan3: enabledlan4: disabledlan5: disabledlan6: disabledlan7: disabledlan8: disabledwan1: disabledPacket filtering rules on interface lan3 (enabled):Name:             AllowICMPv6Priority:         5Action:           permitLog:              NInterface:        lan3Type:             ipv6Protocol:         58Source:           0:0:0:0:0:0:0:0/0, Port: anyDestination:      0:0:0:0:0:0:0:0/0, Port: anyName:             AllowIPv6SrvPriority:         7Action:           permitLog:              NInterface:        lan3Type:             ipv6Protocol:         anySource:           2001:0:0:0:0:0:0:47/64, Port: anyDestination:      0:0:0:0:0:0:0:0/0, Port: any
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1622 rules registeredYou can restrict the show output by specifying an interface name, which will show only rules for that interface, or by specifying a filter name, which will show only that filter. Showing all rules is the default. However, please observe that the automatically generated rule which drops all non-matching packets is NOT shown in the display. Use the more option to page through the output, with Ctrl-C to exit.Delete existing packet filter rules with del pktfilter:# del pktfilter -name <filterName> -interface <interfaceName> -all CAUTION: For-tress advises usersto be aware that thepacket inspectionrequired in order to fil-ter packets in this way isCPU-intensive and thusmay cause decreasedthroughput or increasedlatency of packets.You can restrict which filters to delete by specifying an interface name, which will delete only rules for that interface, or by specifying a filter name, which will delete only that filter. The user must enter one of the three choices (-name, -interface, or -all). The automatically generated deny rule cannot be deleted. It is important to remember that if you delete all filters from a given interface but you leave packet filters enabled on that interface, all IP packets in or out of that interface will be dropped.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1634.6.3.1 Packet Filtering on Ingress and Egress CAUTION: A use-ful tool for under-standing the effect ofconfigured filters is towrite out the set of rulesas if each rule were 2rules: one applying tothe inbound packets onthe interface and theother to the outboundpackets. For example:add pktfilter -nameSrvTalksToAnyone -action permit -log N-type ipv4 -inter-face lan3 -priority5 -srcaddr 10.1.1.1-srcpl 32 -destaddr0.0.0.0 -destpl 0This will match all pack-ets the server 10.1.1.1 onlan3 sends to any desti-nation on any interface.After we exchange allthe source fields for allthe destination fields,we see that it will alsomatch all packets beingforwarded from anysource to the serverOUT on lan3.When a packet enters any interface, the FMP checks whether packet filtering is enabled on that interface. If it is, the FMP compares the packet's information to each configured rule in priority order. The FMP takes the action specified by the first matching rule; e.g. if the action is permit, the FMP continues to process the packet. If the action is deny, the FMP drops the packet immediately. If the packet does not match any of the configured rules, it will always match the automatically-generated packet deny rule at the end.Once the FMP has determined the interface out which the packet should be forwarded, the FMP checks whether packet filtering is enabled on that egress interface. If it is, the FMP compares the packet's information to each configured rule in priority order - but with one significant difference. The packet's SOURCE information (address, prefix length, port) is compared to the rule's DESTINATION information.4.6.3.2 ICMPv6 Neighbor Discovery AlertNeighbor Discovery (ND) is IPv6's equivalent of IPv4's ARP protocol. IPv4 hosts use ARP to discover the MAC address corresponding to a given IPv4 address. IPv6 hosts use ND to discover the MAC address corresponding to a given IPv6 address. There is one significant difference when it comes to packet filtering. ARP is a separate protocol, and is thus not filtered out by IPv4 filtering mechanisms. ND packets are IPv6 packets, because ND is part of ICMPv6. A user can permit traffic between two IPv4 hosts with one or two simple IPv4 packet filtering permit rules. For IPv6, however, Fortress advises permitting all ICMPv6 packets using some variation of the following rule on all appropriate interfaces:# add pktfilter -name AllowICMPv6 -action permit -log N -type ipv6 -interface lan3 -priority 3 -srcaddr 0::0 -srcpl 0 -destaddr 0::0 -destpl 0 -protocol 58You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.6.4 Fortress Controller Access Control  NOTE: Local con-troller authentica-tion settings applyregardless of whetherdevice authentication isenabled (as describedfor Secure Clientdevices authenticationin Section 4.5.4, above).Fortress’s controller device authentication assigns every Mesh Point a unique Device ID that is subsequently used to authenticate the device for access to the Fortress-secured network.The Mesh Point automatically detects other Fortress devices on the network and populates a record of authenticating controllers. Attempts made by auto-populating devices to connect to the Mesh Point-protected network are treated according to the
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing164global default authentication state (Default Auth State) for controllers.View the current default authentication state and the list of authenticating Fortress devices with show controllerauth:> show controllerauthDefault Auth State: allowDeviceID         DeviceMac         AuthState AdminState---------------- ----------------- --------- ------adcd6a989e7b1b9a 00:18:4d:58:85:7b pending   activea11a28d8a54da448 00:30:ab:1b:4f:5d pending   activeThe default authentication state for detected devices is allow. Globally configure the setting with set controllerauth:# set controllerauth -defaultAuthState allow|pending|denyManually add devices for authentication with add controllerauth:# add controllerauth -deviceID <controllerDeviceID> -mac <controllerMACaddr> -authstate allow|pending|deny -admin active|inactiveNOTE: Display theMesh Point’sDevice ID with showdeviceid.The 16-digit hexadecimal Fortress Device ID automatically generated for Fortress devices and the device’s MAC address must be specified in order to manually add a device for authentication. Device IDs and MAC addresses are not user configurable; you must specify these values as assigned to the device you are adding.The -authstate switch determines the initial state of the device’s connection to the encrypted zone: pending requires an administrator to change the device’s authstate setting to allow before it can connect. allow (default) permits the device to connect. deny blocks connection attempts by the device.An individual device’s -authstate overrides the global authentication state set with set controllerauth.Fortress devices have a default administrative state (-admin) of active. You can temporarily suspend a device from authentication, without deleting its record, by changing -admin to inactive. Once a device account has been established, use the update command interactively, or with the -deviceID switch, to reconfigure authentication for the device you specify. The same switches and arguments used with add deviceauth (above) can be used to edit other authentication settings:# update controllerauth -deviceID <controllerDeviceID> -authstate allow|pending|deny -admin active|inactive
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing165You can delete a specified controller device, or all controllers from authentication with the del command:# del controllerauth -deviceID <controllerDeviceID>|allYou must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).4.6.5 Cleartext Device Access Control You may want to allow certain devices to pass unencrypted data, or cleartext, on the Mesh Point’s encrypted interfaces. These might be wireless 3rd-party APs (access points) or Trusted Devices that require cleartext access to the encrypted zone.Mesh Points equipped with one or more radios can themselves serve as wireless access points (APs), as described in Section 3.4.9. NOTE: Each APname must beunique on the MeshPoint.4.6.5.1 3rd-Party AP Management View configured AP management rules with show ap:# show apNAME             IP              MAC              2W S PASSALL PORT---------------- --------------- ---------------- -- - ------- ----east             192.167.1.22    11:2b:3c:4d:5e:00 Y N N       anynorth            192.167.1.44    e1:2b:33:40:0d:5e Y N N       anysouth            192.167.1.33    11:2b:3e:40:0d:5e Y N N       anywest             192.167.1.11    1a:2b:3c:4d:5e:6f Y N N       any--- Total APs: 4Use the add, update and del (delete) commands to manage APs for the Mesh Point-secured WLAN, as described in the following sections.Add AP management rules with the add ap command:# add ap -name <APname> -mac <MACaddr> -ip any|<IPaddr> -ports any|<port1,port2,…> -2way y|n -passall y|n -state enable|disablein which APname is a descriptive identifier for the AP, MACaddr is the MAC address of the AP, and IPaddr either configures the AP to take any IP address or specifies the AP’s network address. The -ports switch specifies, by number, the port(s) accessible to the AP (comma delimited, without spaces), or that any port is accessible to the AP. NOTE: STP andCisco® Layer 2,VLAN managementtraffic to or fromswitches in the MeshPoint’s encrypted zonerequires -passall tobe enabled (y).The -passall switch determines whether the Mesh Point will permit all OSI Layer 2 traffic to pass in the encrypted zone (y) or filters Layer 2 traffic (n, the default). The -state switch enables or disables Mesh Point management of the AP. The -2way switch enables/disables two-way communication for the AP. You must configure a name, MAC address and either any or a specific IP address for the AP management rule when you add
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing166it to the Mesh Point configuration. You must also assign either any or at least one port.You can leave out the -state, -passall, and -2way arguments, if the defaults suit your needs. APs are enabled for Fortress Mesh Point management by default, and two-way communication on APs is enabled.Use the update command to change AP settings, as follows:# update ap north# update ap north -name north -ip 192.167.1.44 -mac e1:2b:33:40:0d:5e -2way y -passall n -state disable -ports anyThe update ap command returns the current settings for the specified AP, which you can edit and re-enter: use the left/right arrow keys to navigate displayed fields, backspace over current values or overwrite them. When you finish typing in new values, strike Enter↵ to save them. You can also use the update ap command with only the switches and arguments you need:# update ap east -state enableThe Mesh Point CLI returns [OK] when settings are successfully changed.NOTE: APs thathave been dis-abled or deleted fromMesh Point manage-ment continue to passnetwork traffic.Delete a single AP or all APs from Fortress Mesh Point management with the del ap command, as follows:# del ap -name <APname>|allYou must be logged on to an administrator-level account to execute add, update and del commands (refer to Section 2.2).4.6.5.2 Trusted Devices View configured Trusted Devices with show td:> show tdNAME             IP              MAC                S  PORT---------------- --------------- ----------------   -  ----audit            192.167.1.13    6f:0a:00:2c:3d:4e  N  email,fileshareguests           192.167.1.7     3a:b2:3c:4f:55:e6  Y  webprint            192.167.1.22    3e:23:f5:d2:01:2a  Y  fileshare--- Total TDs: 3Use the add, update and del (delete) commands to manage Trusted Devices for the Mesh Point-secured WLAN, as described in the following sections.Add Trusted Devices with the add td command, as follows:# add td -name <TDname> -ip any|<IPaddr> -mac <MACaddr> -state enable|disable -ports any|<portset1,portset2,…>
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing167NOTE: Each TDname must beunique on the MeshPoint.in which TDname is a descriptive identifier for the Trusted Device, MACaddr is the MAC address of the Trusted Device, and IPaddr either configures the Trusted Device to take any IP address or specifies its network address. The -state switch enables/disables access for the Trusted Device. The -ports switch specifies commonly used port sets, by function, accessible through the Trusted Device (comma delimited, without spaces), or that any port is accessible through the Trusted Device.CAUTION: Specify-ing that any portcan access a TD canpose a significant secu-rity risk.Valid port set values are: web (ports 80, 443)ssh (port 22)snmp (ports 161, 162)email (ports 25, 110, 143, 220)fileshare (ports 137, 138, 139)telnet (port 23)Maximize network security by specifying the narrowest possible port access for Trusted Devices.You must configure a name, MAC address and either any or a specific IP address for the Trusted Device when you add it to the Mesh Point configuration. You must also assign either any or at least one port set.You can leave out the -state switch; Trusted Devices are disabled by default.Use the update command to change Trusted Device settings, as follows:# update td guests # update td guests -name guest -ip 192.167.1.12 -mac 11:2a:3b:4d:56:1a -state enable -ports webThe update td command returns the current settings for the specified Trusted Device, which you can edit and re-enter: use the left/right arrow keys to navigate displayed fields, backspace over current values or overwrite them. When you finish typing in new values, strike Enter↵ to save them. You can also use the td update command with only the switches and arguments you need:# update td guests -name visitorThe Mesh Point CLI returns [OK] when settings are successfully changed.Delete a single Trusted Device or all Trusted Devices from Mesh Point management with the del td command, as follows:# del td <name>|-allYou must be logged on to an administrator-level account to execute add, update and del commands (refer to Section 2.2).
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1684.7 Remote Audit Logging When remote audit logging is enabled, the Mesh Point sends audit log messages of the specified severity level (and higher) to the configured external syslog server (Section 4.7.1). Audit-logged administrative and device activity can then be separately filtered by a number of additional parameters (Sections 4.7.2 and 4.7.4).4.7.1 Enabling Audit Logging View the audit logging and syslog server settings currently in effect with show logging:> show loggingEnableAuditMode:  YSeverity:         criticalEnableRemote:     NRemoteHost:Common Criteria Auditing:  NNOTE: Audit logmessages are iden-tified as such in the localevent log, but remotelog filtering functionshave no effect on localevent logging.By default, no external syslog server is configured for the Mesh Point. To send log messages from the Mesh Point to an external audit log, you must enable and configure the connection to the syslog server. You can also specify the severity level at and above which log messages are sent to the configured server. By default, only messages of critical or greater severity are forwarded to the audit log.You can also enable Common Criteria audit logs which may impact performance or throughput. These logs include per-interface packet filtering logs and logs reporting traffic drops due to excessive traffic on an interface.# set loggingEnableAuditMode[Y] (Y|N to enable logging audit mode):Severity[info] (emergency|alert|critical|error|warning|notice|info):EnableRemote[N] (Y|N to enable remote logging): y|nRemoteHost[""] (Name or IP address of remote logging host): <IPaddr>|<hostname>EnableCCAudit[N] (Y|N to enable Common Criteria audit logging):You must be logged on to an administrator-level account to configure audit logging (refer to Section 2.2).4.7.2 Globally Filtering Audited Administrative Activity NOTE: Changes toadministrativeaudit logging take effectat the next administra-tor logon.When remote audit logging is enabled, you can filter audited administrative activity globally, by a number of parameters. Globally configured audit-log filters apply only to the activity of administrative accounts with an -audit setting of automatic (Section 2.2.3) and only when the administrator’s MAC address is not subject to conflicting audit-log settings (Section
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing1694.7.3). An individual account or MAC address auditing setting of required or prohibited overrides global audit logging settings. NOTE: Adminis-trator audit log-ging is viewed andconfigured through thesame command optionsas learned-device auditlogging, which is cov-ered in Section 4.7.4.View the current global settings for administrative activity audit logging with show audit:# show auditAudit Settings--------------Login:              enableSecurity:           enableConfiguration:      enableGUI:                requiredSSH:                requiredSNMP:               requiredConsole:            requiredWired:              requiredWireless:           required Clear Zone:         requiredEncrypted Zone:     requiredLearned Wired:      enableLearned Wireless:   enableLearned Encrypted:  enableLearned Clear:      enableNOTE: On MeshPoints withoutradios, Wireless inter-faces and related auditlogging controls areabsent.You can globally filter audit logging of administrative activity by event type. When Login, Security and/or Configuration are set to enable (the default), events of that type are sent to the audit log. When any of these event types are set to disable, corresponding events are not sent.You can also globally filter audit logging of administrative activity based on:1the management interfaces administrators use to access the Mesh Point: GUI, SSH, SNMP, Console2the zones administrators connect from: Clear Zone, Encrypted Zone3the physical interfaces administrators connect through: Wired, WirelessBecause any given administrative session can be defined by more than one of the above parameters, they are used hierarchically, in the order given above, to determine whether an event will be audited:NOTE: TheLearned deviceparameters returned byshow audit are cov-ered in Section 4.7.4.Each of these administrator interface and zone parameters can cause a given event be required (the default) for auditing or prohibited from auditing, and the first such “hard” setting in the hierarchy of audit parameters determines whether or not an event is forwarded to the audit log. Alternatively, auditing can be set to automatic for any parameter, which allows an inferior setting in the hierarchy to determine audit behavior.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing170Configure global audit logging of administrative activity interactively with set audit:Alternatively, you can execute set audit non-interactively with valid switches and arguments in any order and combination:# set audit -login enable|disable -security enable|disable -configuration enable|disable -GUI required|prohibited|automatic -SSH required|prohibited|automatic -SNMP required|prohibited|automatic -console required|prohibited|automatic -wired required|prohibited|automatic -wireless required|prohibited|automatic -encryptedzone required|prohibited|automatic -clearzone required|prohibited|automatic NOTE: Additionalswitches to config-ure learned deviceauditing with setaudit are covered inSection 4.7.4.The Mesh Point CLI returns [OK] when settings are successfully set. You must be logged on to an administrator-level account to configure audit logging (refer to Section 2.2).4.7.3 Auditing and Filtering Administrative Activity by MAC Address You can specify MAC addresses for audit logging of administrative activity and filter audit events by interface and zone.Audit logging settings for specified MAC addresses override global auditing settings for administrative activity (Section 4.7.2). However, the -audit settings of individual administrative accounts (Section 2.2.3), override MAC-address auditing.View current MAC-address auditing settings with show macaudit:# show macaudit -allMAC Address Description Gui Ssh Snmp Wired Wireless Clear Zone Encrypted Zone----------- ----------- --- --- ---- ----- -------- ---------- --------------By default, no MAC addresses are specified for auditing.# set auditLogin[enable] (enable|disable to enable or disable auditing of logins):Security[enable] (enable|disable to enable or disable auditing of security events):Configuration[enable] (enable|disable to enable or disable auditing of configuration events):GUI[required] (required | prohibited | automatic to enable or disable auditing of events from the GUI):SSH[required] (required | prohibited | automatic to enable or disable auditing of events from access via SSH):SNMP[required] (required | prohibited | automatic to enable or disable auditing of events from access via SNMP):Console[required] (required | prohibited | automatic to enable or disable auditing of events from access via the console):Wired[required] (required | prohibited | automatic to enable or disable auditing of events from access via wired interfaces):Wireless[required] (required | prohibited | automatic to enable or disable auditing of events from access via wireless interfaces):Clear Zone[required] (required | prohibited | automatic to enable or disable auditing of events from access via the clear zone):Encrypted Zone[required] (required | prohibited | automatic to enable or disable auditing of events from access via the encrypted zone):Learned Wired[enable] (enable|disable to enable or disable auditing of learned wired activity):Learned Wireless[enable] (enable|disable to enable or disable auditing of learned wireless activity):Learned Encrypted[enable] (enable|disable to enable or disable auditing of learned wireless activity):Learned Clear[enable] (enable|disable to enable or disable auditing of learned wireless activity):
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing171When more than one MAC address has been added for audit logging, you can view the individual settings for that MAC address by specifying it:# show macaudit -mac 1a2b3c4d5e6fAdd a MAC address for audit logging of associated administrative activity with add macaudit:# add macaudit -mac <MACaddress> -desc <description|“descriptive string”> -gui required|prohibited|automatic -ssh required|prohibited|automatic -snmp required|prohibited|automatic -encryptedzone required|prohibited|automatic -clearzone required|prohibited|automatic -wired required|prohibited|automatic -wireless required|prohibited|automaticNOTE: On MeshPoints withoutradios, Wireless inter-faces and related auditlogging controls areabsent.The switches following those that specify the MAC address and optionally provide a description configure how audit logging of the administrative activity associated with the specified MAC address will be filtered:1by the management interface used to access the Mesh Point: -gui, -ssh, -snmp2by the zone the MAC address connected from: -clearzone, -encryptedzone3by the physical interfaces the MAC address connected through: -wired, -wirelessBecause an administrative session associated with a given MAC address can be defined by more than one of the above parameters, they are used hierarchically, in the order given above, to determine whether an event will be audited:Each parameter can cause a given event to be required (the default) for auditing or prohibited from auditing, and the first such “hard” setting in the hierarchy of audit parameters determines whether or not an event is forwarded to the audit log. Alternatively, auditing can be set to automatic for any parameter, which allows an inferior setting in the hierarchy to determine audit behavior.Once a MAC address has been added for administrative auditing, you cannot change it. Use the -mac switch with the update command to reconfigure the audit settings for the MAC address you specify. The same switches and arguments used with add macaudit (above) can be used to edit filter settings:# update macaudit -mac <MACaddress> -desc <description|“descriptive string”> -gui required|prohibited|auto -ssh required|prohibited|auto -snmp required|prohibited|auto -encryptedzone required|prohibited|auto -clearzone required|prohibited|auto -wired required|prohibited|auto -wireless required|prohibited|autoThe Mesh Point CLI returns [OK] when settings are successfully changed.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing172You can delete a specified MAC address or all MAC addresses currently configured for administrator audit logging with the del command:# del macaudit -mac <MACaddress>|allYou must be logged on to an administrator-level account to configure audit logging (refer to Section 2.2).4.7.4 Filtering Audited Learned-Device Activity When remote audit logging is enabled (Section 4.7.1), you can filter audit logging of events generated by devices connecting to the Mesh Point-secured network by interface and zone (encrypted and clear). View the current settings for audit logging of learned device activity in the last four lines of show audit output:NOTE: Learned-device audit log-ging is viewed and con-figured through thesame command optionsas global administratoraudit logging, which iscovered in Section 4.7.2.# show auditAudit Settings--------------Login:              enableSecurity:           enableconfiguration:      enableGUI:                requiredSSH:                requiredSNMP:               requiredConsole:            requiredWired:              requiredWireless:           requiredClear Zone:         requiredEncrypted Zone:     requiredLearned Wired:      enableLearned Wireless:   enableLearned Encrypted:  enableLearned Clear:      enableYou can filter audit-log events associated with connecting devices by the types of interfaces they can connect to (wired and wireless) and the zones they can connect from (encrypted and clear). When audit logging for these parameters are set to enable (the default), events of that type are sent to the audit log. When they are set to disable, corresponding events are not sent.
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing173Configure audit logging of learned-device activity interactively in the last four fields of set audit:Alternatively, you can execute set audit non-interactively with valid switches and arguments in any order and combination:# set audit -ldwired enable|disable -ldwireless enable|disable -ldencryptedzone enable|disable -ldclearzone enable|disable The Mesh Point CLI returns [OK] when settings are successfully set. You must be logged on to an administrator-level account to configure audit logging (refer to Section 2.2).4.8 Wireless SchedulesThe Mesh Point provides the ability to configure a schedule for session establishments by wireless clients. The Mesh Point supports a single wireless schedule which is applied globally across all configured Access Point (AP) BSSs. When enabled, wireless clients are restricted to establish a session only on the specified days within the specified time range (24 hour format). The time range is applied to all days selected in the schedule. When disabled, wireless clients are allowed to establish a session on any day at any time.View the current wireless schedule with the show command:> show wifischeduleWifi ScheduleAdmin state:  enable    Days:  mon,tue,wed,thur,fri Start time:  08:30End time:  17:30Add the wireless schedule with the add command:# add wifischedule -adminstate <enable/disable> -days <mon,tue,wed,thu,fri,sat,sun> -startTime <hh:mm> -endTime <hh:mm>Delete the wireless schedule with the del command:# del wifischedule# set auditLogin[enable] (enable|disable to enable or disable auditing of logins):Security[enable] (enable|disable to enable or disable auditing of security events):configuration[enable] (enable|disable to enable or disable auditing of configuration events):GUI[required] (required | prohibited | automatic to enable or disable auditing of events from the GUI):SSH[required] (required | prohibited | automatic to enable or disable auditing of events from access via SSH):SNMP[required] (required | prohibited | automatic to enable or disable auditing of events from access via SNMP):Console[required] (required | prohibited | automatic to enable or disable auditing of events from access via the console):Wireded[required] (required | prohibited | automatic to enable or disable auditing of events from access via wired interfaces):Wireless[required] (required | prohibited | automatic to enable or disable auditing of events from access via wireless interfaces):Clear Zone[required] (required | prohibited | automatic to enable or disable auditing of events from access via the clear zone):Encrypted Zone[required] (required | prohibited | automatic to enable or disable auditing of events from access via the encrypted zone):Learned Wired[enable] (enable|disable to enable or disable auditing of learned wired activity):Learned Wireless[enable] (enable|disable to enable or disable auditing of learned wireless activity):Learned Encrypted[enable] (enable|disable to enable or disable auditing of learned wireless activity):Learned Clear[enable] (enable|disable to enable or disable auditing of learned wireless activity):
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing174Update the wireless schedule with the update command:# update wifischedule -adminstate <enable/disable> -days <mon,tue,wed,thu,fri,sat,sun> -startTime <hh:mm> -endTime <hh:mm>You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing175Chapter 5System Options, Maintenance and Licensing5.1 Resetting Connections Clear the Mesh Point’s databases of connected devices and reset network sessions with the commands:# reset clients|hosts -all|-mac <MacAddress># reset guests|sessions|default|sensorsThe clients parameter resets a connection with a device (-mac switch) or all connections with devices (-all switch), where the devices are on the encrypted side of the network running the Fortress Secure Client, and other Fortress Mesh Points.The hosts parameter resets a connection with a device (-mac switch) or all connections with devices (-all switch), where the devices are in communication with the Mesh Point on the clear side of the network.The guests parameter resets connections with devices given access on the encrypted side of the network as Trusted Devices, access points (APs), and/or WPA2 wireless stations.The sessions parameter resets all connections on both the encrypted and clear sides of the network. Devices disconnected in this way must reauthenticate to re-establish their sessions. The default parameter resets the Mesh Point to the factory default configuration, as described in Section 5.5.The sensors parameter applies exclusively to the ES210 Mesh Point, as described in Section 3.12.2.You must be logged on to an administrator-level or a maintenance-level account to reset connections (refer to Section 2.2).
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing1765.2 Rebooting the Mesh Point NOTE: The rebootand reset defaultcommands end allactive sessions on theFortress Mesh Point. Restart the Fortress Mesh Point with reboot, confirming your intention at the query, as follows:# rebootConfirm: Reboot device now? [Y|N] yYou can reboot the system after a specified amount of time with -delay. The system automatically reboots after the number of minutes indicated, between 1–1440. A value of 0 (zero) cancels any pending reboot. # reboot -delay 20Confirm: Schedule delayed reboot? [Y|N] y[OK] System will be rebooted after 20 minutes.NOTE: You canalso reboot someMesh Point models withchassis controls (refer tothe appropriate Hard-ware Guide).The reboot command does not power cycle the Mesh Point. When the Mesh Point has rebooted, you must log back in to the Mesh Point CLI. Except for the boot that occurs after you upgrade the Mesh Point’s software, by default the Mesh Point boots the same image, on the same partition, that it used when it last booted. From a serial session, you can interrupt the boot process by striking Ctrl-C, which allows you to choose the software image to boot and optionally reset the Mesh Point to its factory default configuration.You must be logged on to an administrator-level or a maintenance-level account to reboot the Mesh Point (refer to Section 2.2).5.2.1 Booting Selectable Software Images The Mesh Point stores two, user-selectable copies (or images) of the Mesh Point software on separate partitions of the internal flash memory. When the Mesh Point’s software is upgraded (Section 5.3), the new software is first written to the non-running boot partition, overwriting any version stored there. When the Mesh Point is rebooted to complete the upgrade process, it boots from the partition to which the upgrade was downloaded, with the same configuration settings that were in effect before the upgrade procedure.The Mesh Point then defaults to the boot partition with the latest software image—or the last image booted—whenever it restarts. New configuration changes are not written to the non-running boot partition. If you boot from the non-running boot partition, configuration settings will return to those in effect at the time the Mesh Point’s software was last upgraded (or when the image on the partition last ran).
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing177View which of the two software images on the Mesh Point is currently running and which is selected for the next time the Fortress Mesh Point is booted with show bootimage:> show bootimageImage1: 5.4.3.1058Image2: 5.4.3.1052Running Image1NextRun Image1Use set bootimage to select an image for the next bootCAUTION: If anAvailableImageis listed as Invalid, donot run the image.# set bootimage 1|2[OK] reboot required for next run ImageNYou can also use set bootimage without argument to discover the current running image before making the decision to specify the other image for the next boot.# set bootimageAvailable Image1:5.4.3.1058Available Image2:5.4.3.1052You are running Image1Would you like to switch the Image? [Y|N] y|nThe Mesh Point does not automatically restart when a new boot image is selected. To begin using the software on the image you specified, you must restart the Mesh Point with the reboot command.You must be logged on to an administrator-level account to select a different image for the next boot (refer to Section 2.2).5.3 Upgrading Mesh Point Software View the current software version with the about command (Section 6.1).Upgrades to Mesh Point software are supplied by General Dynamics C4 Systems in the form of upgrade packages, protected by the password, fortress. Upgrade package files must be used on the correct platform model, as distinguished by their file names:ES2-<version.build>.pkg: ES2440ES-<version.build>.pkg: ES820, ES520, ES210When you upgrade Mesh Point software, the new version is written to the non-running compact flash card partition as a new boot image (Section 5.2.1). The existing version of the software currently saved on the non-running flash partition is overwritten by the upgrade process.
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing178You must specify a path to an FTP server with an anonymous user account in order to successfully execute the upgrade command, or the Mesh Point returns the error:[Error] file must be an FTP url, for example "ftp://ftp.server.com/path/to/gw.pkg"To begin the basic upgrade process, use the upgrade command to specify the location of the upgrade file and its password:# upgrade -f <ftp://ftp.server.com/path/gw.version.pkg> -p fortress -ramdisk y|nCAUTION: If youuse  -ramdisk yto upgrade a Mesh Pointwith insufficient RAMto hold the necessarytemporary images, theupgrade will fail. In order to speed the upgrade process, the ES2440 Mesh Point defaults to using RAM (Random Access Memory) to hold the temporary image files used during upgrades. Because the ES520, ES820 and ES210 have less RAM, they default to using internal flash memory to hold these images. You can change this aspect of the upgrade process with the -ramdisk switch: y (yes) to use RAM, n (no) to use flash memory.NOTE: Do not use-ratelimit or-noresume for locallystored upgrade files(with the -e switch,described below).Optionally, you can throttle the download transfer rate for upgrade files stored on an FTP server by specifying an upper -ratelimit in whole megabits per second (Mbits/s), 1–100. To ensure that you are starting fresh with a new download, you can also direct the Mesh Point to refrain from attempting to resume partial downloads of an upgrade file with the -noresume switch, which takes no arguments. If no previously initiated partial download is detected, the upgrade function ignores the -noresume switch.# upgrade -f <ftp://ftp.server.com/path/gw.version.pkg> -p fortress -ratelimit 1–100 -noresumeThe Mesh Point CLI displays the status of the upgrade process, which can take several minutes.After the upgrade has completed, you must reboot the Mesh Point, as described in Section 5.2.If you experience problems after the Mesh Point reboots, revert to the previously running Mesh Point software version (as described in Section 5.2.1), and then retry the upgrade.There are two additional upgrade options exclusively for use in conjunction with the Mesh Point’s Auto-Config function:# upgrade -d -f <ftp://ftp.server.com/path/gw.version.pkg> -p fortress -ratelimit 1–100 -noresumeThe -d switch permits you to store the upgrade file (for distribution and later use), without upgrading the Mesh Point’s current software version.
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing179# upgrade -e -ramdisk y|nNOTE: After theupgrade andreboot, FastPath Meshwill be the default set-ting for Bridging Mode. Ifyour Mesh Point wasconfigured for STP priorto the upgrade, you mayneed to reconfigure yournetwork accordingly.The -e switch is used to upgrade Mesh Point software using an upgrade file stored in this way, (as opposed to an upgrade file stored on an FTP server). As shown, you can use the -e switch with the -ramdisk option (described above), while -ratelimit and -noresume are not intended for use with locally stored files.These -d and -e switches should not be used during standard upgrade procedures; refer to the Fortress Mesh Point Auto Configuration Guide information.You must be logged on to an administrator-level account to upgrade Mesh Point software (refer to Section 2.2).5.4 Initiating FIPS Retests You can manually run FIPS self tests with set fips:FIPS# set fips retestThe Mesh Point returns [OK] when FIPS tests run successfully.FIPS tests are triggered by any security-related change to the Mesh Point configuration, regardless of FIPS settings. You cannot turn FIPS testing off on the Mesh Point. Failed FIPS tests are recorded in the Mesh Point’s event log.For more on FIPS operating mode and self-tests, refer to Sections 4.1.1 and 4.1.2.5.5 Restoring Defaults NOTE: Installedlicenses for addedfeatures (Section 5.6) areunaffected by resettingthe Mesh Point to factorydefaults.Restore all Fortress Mesh Point configuration settings to their factory default values with reset default, confirming your intention at the query, as follows:# reset defaultWarning: Reset to the default configuration?[Y|N] yWaiting for reset completed...You must be logged on to an administrator-level account to restore factory default settings (refer to Section 2.2).5.6 Features Licensing NOTE: area licenseapplies only toMesh Points with stan-dard-equipment radios(i.e., only 2.4 and/or 5GHz radio-equippedMesh Points). It does notapply to Mesh Pointswith 4.4 GHz radio.There are various optional features on Fortress Mesh Points that you can enable only after entering or uploading valid license keys for these functions.advradio - (advanced radio) enables specialized radio settings. Consult your Fortress representative for more detail.area - (area of operation) permits the Mesh Point to operate within the rules of various regulatory domains and authorities:
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing180CAUTION: Use of4.4 GHz radios inthe U.S. without gov-ernment approval isstrictly forbidden.United States - is the default area license, allowing Mesh Points with standard-equipment radios to operate in the United States in the 5 GHz and the 2.4 GHz frequency bands, as regulated by the Federal Communication Commission (FCC). Mesh Points with one or more 4.4 GHz - 4.9 GHz radios are also licensed by default for United States operation, but are regulated by the National Telecommunications and Information Administration (NTIA), the parent agency of the FCC. United States Public Safety - permits 4.9 GHz-capable Mesh Points to operate in the 4.9 GHz frequency band, reserved for official public safety transmission in the United States. Every Mesh Point that supports 5 GHz 802.11a operation also supports 4.9GHz 802.11a operation, when a United States Public Safety license is installed.World - area licenses the Mesh Point to operate outside of the United States. You must further configure the Mesh Point’s Country Code, in order to bring the Mesh Point into regulatory compliance for the domain in which it will operate (refer to Section 3.3.1).channel - enables UNII 2 extended channels 116, 132 and 136. In order to accommodate the FCC requirement for a 30 MHz guard band around Terminal Doppler Weather Radar (TDWR) operating within 35 km, these channels are available for selection only when a channel license is installed. Refer to Section 3.4.7 for additional information on channel configuration.NOTE: mesh licenseis no longerrequired; Fortress’s Fast-Path Mesh bridging linkmanagement function isnow enabled by defaultand is no longer a licens-able feature (refer to Sec-tion 3.2.2).suite-b - provides support for:an additional key establishment method that employs NSA (National Security Agency) Suite B cryptography (Section 4.1.5). This feature applies to all Fortress Mesh Points. IPsec and L2TP functionality.By default, only the default United States Area license is installed on radio-equipped Mesh Points.View currently licensed features with the show license command:
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing181NOTE: Fortresssupplies licensekeys at the time featurelicenses are purchased.If you purchased a fea-ture license with theMesh Point, the licensekey is included in yourshipment.> show licenseFeature  Status        Description-------- ------------- --------------------------advradio Installed     Advanced Radioarea     United States Radio area of operationchannel  Not installed Channels 116, 132, and 136mesh     Installed     Meshsuite-b  Installed     Suite B SecurityFortress generates features licenses specific to each Mesh Point or a set of license keys for multiple features and/or multiple Mesh Points in a group license text file. You must specify the serial number of each unit for which you want to license a feature in order for Fortress to generate a valid license key or group license file.View the Mesh Point’s serial number with show device. The output from this command varies based on the model, number of radios, and power sources:> show deviceModel: ES520-35Version: 5.4.5.2057SerialNumber: 108470035Radio 1: 802.11abg 400mWRadio 2: 802.11a 600mWDeviceIP: 172.28.120.99Gui: OnSsh: OnSnmp(V3): OffConsumed PSE Power: 0WFirmware version: 1.14.52Time till reboot: not setTo enable a given feature on a single Mesh Point, specify the feature and the valid, Mesh Point-specific license key for the feature using the set license command:# set license -feature advradio|area|channel|mesh|suite-b -key<licensekey>To enable more than one feature on a Mesh Point or a feature on more than one Mesh Point, use the import license-file command to upload the group license file, where the LicenseFilename includes the complete path and filename. Alternatively, you can enter the entire license key (keyfilecontents):# import license-file -file <LicenseFilename>|-keytext <keyfilecontents>You must reboot the Mesh Point after installing licenses to operate in a different Area and to enable TDWR-restricted U-NII 2 extended Channel selection.
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing182The FastPath Mesh license also requires the Mesh Point to be rebooted before you can enable the feature. After it has been licensed, Suite B can be immediately enabled. You must be logged on to an administrator-level account to change configuration settings (refer to Section 2.2).5.7 Pinging a Device You can ping a device on the clear side of the Fortress Mesh Point, i.e, devices on the Mesh Point’s LAN, or any other device, using its IPv4 address, its IPv6 global or local address, or, if the network uses DNS, by its hostname. If no security association exists for devices in an encrypted zone, the ping will fail. > ping <IPv4addr>|<IPv6addr>|<hostname>The Mesh Point pings three times and then displays the ping statistics.> ping 123.45.6.78PING 123.45.6.78 (123.45.6.78) from 123.45.6.89 : 56(84) bytes of data.NOTE: IncomingICMP (InternetControl Message Proto-col) packets requireadministrative access. Ifthe administrative IPaddress ACL (disabledby default) is enabled, itmust include the rele-vant IP addresses. SeeSection 2.2.5 for moredetail. Traffic is affectedby the per-interfacepacket filters. If config-ured, per-interfacepacket filters mustinclude filters to permitICMP traffic to andfrom the FMP. See Sec-tion 4.6.3 for moredetail.64 bytes from 123.45.6.78: icmp_seq=1 ttl=128 time=18.3 ms64 bytes from 123.45.6.78: icmp_seq=2 ttl=128 time=23.0 ms64 bytes from 123.45.6.78: icmp_seq=3 ttl=128 time=23.0 ms--- 123.45.6.78 ping statistics ---3 packets transmitted, 3 received, 0% loss, time 2025msrtt min/avg/max/mdev = 18.318/21.490/23.098/2.243 msYou must be logged on to an administrator-level or a maintenance-level account to execute ping (refer to Section 2.2).5.8 Tracing a Packet Route You can run traceroute for a device by its IPv4 address or IPv6 global address or, if the network uses DNS, by its hostname:> traceroute <IPv4addr>|<IPv6addr>|<hostname>The Mesh Point traces the route and then displays the results.You must be logged on to an administrator-level or a maintenance-level account to execute traceroute (refer to Section 2.2).5.9 Tracing the FastPath Mesh PathOn a Mesh Point in a FastPath Mesh network, you can run meshpath for a device by its MAC address, IPv4 address, IPv6 address or, if the network uses DNS, by its node name:# meshpath -mac <MacAddress>|-ip <IpAddress>|-name <NodeName>Please be patient... this command may take some time to complete.
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing183Hop 1 00:14:8c:32:41:40 (FD00:0:8895:8895:214:8CFF:FE32:4140 - Car2-MAC-4140-IP-20) 1072ms cost=7407 (MESH2)Hop 2 00:14:8c:31:be:40 (FD00:0:8895:8895:214:8CFF:FE31:BE40 - Car1-MAC-BE40-IP-10) 4167ms cost=7407 (MESH2)Hop 3 00:10:60:17:53:bc (*) 4168ms cost=0 (Ethernet2)Total cost = 14814Total cost = 3400NOTE: The MeshPath trace tool isintended for use onlywhen FastPath Mesh isenabled on the MeshPoint.The results are similar to traceroute, except that traceroute uses OSI Layer 3, and meshpath uses OSI Layer 2. The meshpath results display the total end-to-end cost to reach a particular node in a FastPath Mesh network, along with each hop and its associated cost. You must be logged on to an administrator-level or a maintenance-level account to execute meshpath (refer to Section 2.2).5.10 Copying Running Configurations CAUTION:  Youmust only usecopy running-config tocopy configurations to aMesh Point of the samemodel from which theconfiguration file wascreated. Once a Mesh Point has been configured, you can use that Mesh Point’s configuration to set up other Mesh Points in the network using copy running-config. This command creates a text file that contains all of the configuration information for the current Mesh Point, and copies it to the specified SCP (Secure Copy) server using SSH2 (Secure Shell 2) for in-transit encryption and authentication. You can then use this file to configure additional network Mesh Points. Sensitive information in the configuration file is protected by use of an encryption key. Generate a configuration file with copy running-config:# copy running-config -from <local> -to <remote-url> -encKey <keyText> -host <hostname> -user <username> -password <password> -excludenetworkconfThe -from <local> parameter indicates that the configuration file will be created from the currently running local configuration. The file is generated on the local Mesh Point, and also transferred to the location specified by the -to <remote-url> parameter. The remote URL can be either a fully qualified domain name (FQDN), or an IP address. You must specify an encryption key (-encKey), a text string of 8–32 characters used to encrypt the sensitive information in the file.Enter the hostname (-host) of the target node (the Mesh Point where the file will be copied), and the username (-user) and -password required by the SCP server. If you include the -excludenetworkconf switch, basic network parameters (hostname, IP addresses, etc.) will be omitted from the configuration file, allowing the file to be installed on a
Fortress ES-Series CLI Guide: System Options, Maintenance and Licensing184different Mesh Point without overwriting its existing network settings. To view the resulting configuration file, use show running-config. You must also supply the encryption key with the show command. # show running-config -encKey <keyText>To install the configuration file on the target Mesh Point(s), use copy running-config again, providing different values for the -to and -from. switches. # copy running-config -from <remote-url> -to <local> -host <hostname> -user <username> -password <password>CAUTION:  A copyof a running con-figuration can beinstalled only on a MeshPoint of the exact modelas the Mesh Point fromwhich the configurationwas copied. Specify the location of the configuration file with -from <remote-url>. This value can be either a fully qualified domain name (FQDN), or an IP address. The -to <local> parameter indicates that the configuration file will be installed as the new local running configuration. You must supply the user name and password in effect on the computer on which the file is stored. If the file has been moved from the computer to which it was originally copied, the credentials to install the file will typically be different from those used when the file was saved. You can omit the encryption key from the copy operation that installs the configuration file. This command copies the configuration information to the target Mesh Point. The configuration parameters will overwrite the configuration currently present on the target node. You must be logged on to an administrator-level account to execute copy running-config (refer to Section 2.2).5.11 Diagnostic Commands The Mesh Point CLI provides diagnostic commands for customer use only when you are working with Fortress technical support to troubleshoot a problem with the network:diag <script_name>: uses the script to display radio and bridge link diagnostic informationshow tech -arp|-route|-disk|-top|-last: displays technical information about the network, such as the routing table or the CPU utilizationwlan <command>: on radio-equipped Mesh Points, assists in diagnosing wireless issues; consult your Fortress representative about command options.
Fortress ES-Series CLI Guide: System and Network Monitoring185Chapter 6System and Network Monitoring6.1 Viewing System Information Obtain a basic overview of the Mesh Point configuration—including software and firmware versions, serial number, network address, and GUI, SSH, and SNMP settings—with show device. The output from this command varies based on the model, number and type of radios, and power sources:> show deviceModel: ES520-35Version: 5.4.5.2057SerialNumber: 108470035Radio 1: 802.11abg 400mWRadio 2: 802.11a 600mWDeviceIP: 172.28.120.99Gui: OnSsh: OnSnmp(V3): OffConsumed PSE Power: 0WFirmware version: 1.14.52Time till reboot: not setThe about command also shows the software version, along with the hardware model on which the software is running and the Fortress software’s cryptographic module revision.> about Product model:ES520-35Product version:5.4.5.2057Crypto engine version:Rev109Each of the set and add commands used to configure the Mesh Point and covered in the preceding chapters (2–5) of this user guide has a show command that displays current configuration information for the associated function. Refer to configuration coverage for more detail on show output for these commands.6.1.1 Viewing the Mesh Point Device ID The Device ID is used to authenticate the Mesh Point on Fortress-secured networks. It is automatically generated for each device and is not user configurable.
Fortress ES-Series CLI Guide: System and Network Monitoring186You must be logged on to an administrator-level account (refer to Section 2.2) to display the Fortress Mesh Point’s Device ID in the Mesh Point CLI:# show deviceid333300148c0810796.1.2 Viewing System Uptime The show uptime command displays the number of days, hours and minutes that the Fortress Mesh Point has been operating since its last boot:> show uptime18 days 1 hr 27 min6.2 Monitoring Connections 6.2.1 Viewing AP Associations NOTE: Associa-tions are not rele-vant to Mesh Pointmodels that do not con-tain radios.On Mesh Points equipped with one or more radios (refer to Table 1.1 on page 3), view devices currently connected to any BSSs configured (as APs or FP Mesh Access interfaces) to provide network access to the wireless devices with show association:> show association                                                  Rate  Signal   802.1X/11iRadio  BSS                    MAC Address       (Mbps) Strength Security    Zone------ ---------------------- ----------------- ------ -------- ----------- ---------radio1 QA_Infra_R1_WPA2_PSK_E 00:22:fb:93:10:b8 54     -53      wpa2psk     encrypted radio1 QA_Infra_R1_WPA2_PSK_E 00:22:fb:97:0c:0c 54     -41      wpa2psk     encrypted --- Total AP association: 2Radio - the radio to which the device is connectedBSS - the name of the Basic Service Set through which the device is connectedMAC Address - the device’s Media Access Control address of the associated deviceRate - the data rate of the device’s connection, in megabits per secondSignal Strength - the strength of the RF signal from the device, in decibels referenced to milliwatts802.1X/11i Security - the IEEE 802.11i security protocol the device is usingZone - whether the device is connecting from the encrypted or clear zone
Fortress ES-Series CLI Guide: System and Network Monitoring187NOTE: BridgeLinks are not rele-vant to Mesh Point mod-els that do not containradios.6.2.2 Viewing Bridging LinksOn Mesh Points equipped with one or more radios (refer to Table 1.1 on page 3), view current wireless bridging links with show bridgelinks:# show bridgelinks                         Rate   SignalRadio  MAC Address      (Mbps)  Strength  Device ID        State ------ ----------------- ------ -------- ---------------- --------------radio1 00:14:8c:1e:ab:80 54     -70      333300192f1d562f forwarding_allradio1 00:14:8c:1e:ac:40 54     -75      3333001ca5211b96 forwarding_allradio1 00:14:8c:1e:c6:40 54     -76      33330016df733cd1 forwarding_allradio1 00:14:8c:1e:c6:80 54     -82      333300148c1e33c1 forwarding_allradio1 00:14:8c:1e:c6:c0 54     -72      3333001ca5fe351d forwarding_allradio1 00:14:8c:1e:c7:40 54     -71      333300148c1ec740 forwarding_allradio1 00:14:8c:1e:d3:00 54     -72      3333001a44eb67d2 forwarding_allradio1 00:14:8c:1e:d4:c0 54     -72      333300148c1ed4c0 forwarding_allradio1 00:14:8c:1e:eb:00 54     -73      none             forwarding_allradio1 00:14:8c:1e:eb:80 54     -69      none             forwarding_allradio1 00:14:8c:1e:eb:c0 54     -78      none             forwarding_allradio1 00:14:8c:1e:ed:40 54     -68      none             forwarding_allradio1 00:14:8c:1e:ed:c0 54     -75      none             forwarding_all--- Total WDS bridge links: 14Radio - the radio on which the BSS forming the bridging link is configuredMAC Address - the MAC address of the connected nodeRate - the maximum data transmission rate of the link in megabits per second. Because of the radio enhancements and traffic handling efficiencies defined in the newer standard, bridging links between radios configured to use 802.11n can show Rate values higher than the Maximum Rate configured for either individual interface (refer to Section 3.4.9)Signal Strength - the strength of the RF signal of the link, in decibels referenced to milliwattsDevice ID - the unique hexadecimal Fortress-generated identifier which provides device authentication on the Mesh Point-secured network of the connected network nodeDuring normal operation, a Device ID of none is shown for a Mesh Point that has been detected but for which a Device ID has not been established (because key establishment is not yet complete or for a unidirectional link). A Device ID of none can also indicate mismatched Access IDs between the current and connected Mesh Points (Section 4.1.16).State - the bridging status of the connected network node. Possible values and meanings depend on the Mesh Point’s current Bridging Mode setting (refer to Section 3.2.1):
Fortress ES-Series CLI Guide: System and Network Monitoring188When STP is used for bridging, possible values may be:Disabled - not passing trafficForwarding - passing all trafficListening - listening for BPDUs (Bridge Protocol Data Units) in order to build its loop-free path, but not yet forwarding general data framesBlocking - blocking user traffic (usually because it is a duplicate or sub-optimal path)When FastPath Mesh is used, possible values may be:Disabled - not passing trafficForwarding All - passing all trafficBlocking - blocking all traffic6.2.3 Viewing Client Connections View information on Mesh Points and other devices on the encrypted side of the network with show show clients:> show clientsMAC               PartnerDeviceID  Type State        AuthSt  DHKeyType   Hostname        Traffic Allowed----------------- ---------------- ---- ------------ ------- ----------- --------------- ---------------00:02:2d:73:7e:dc 02d48e379526f4c2 MSP  Secure       Success MODP-2048   QALSTA-3        00:02:2d:80:a2:08 6fac6a1af46e50cd MSP  Secure       Success MODP-2048   QALSTA-900:02:a5:6f:9f:34 42e23ef6af66421e MSP  Secure       Success MODP-2048   QALSTA-800:18:4d:58:84:cc 1e694d0d57a25ecf MSP  Secure       Success MODP-2048   QALSTA-1000:18:4d:58:85:7b adcd6a989e7b1b9a MSP  Secure       Success MODP-2048   QALSTA-200:30:ab:1b:4f:5d a11a28d8a54da448 MSP  Negotiating  Unknown MODP-1024   QALSTA-1600:40:36:01:b4:58 7f48a2a3e4319c0c MSP  Secure       Success MODP-1024   QALSTA-600:90:4b:19:8b:16 5bb26a560ff49206 MSP  Secure       Success MODP-2048   QALSTA-2000:c0:49:cb:17:42 -                MSP  Initial      Unknown -           Unknown--- Total Clients: 9Displayed fields include (when applicable):MAC - the MAC address of the client devicePartnerDeviceID - the device’s unique, hexadecimal, Fortress-generated identifier, which provides device authentication on the Mesh Point-secured network (when device authentication is enabled)Type - identifies the device as an MSP client accessing the network encrypted zoneState - the state of the device’s key establishment transactions on the Mesh Point:Initializing - key exchange with device initializingNegotiating - static keys exchanged with the deviceSecure - dynamic keys exchanged with the deviceFailed - key exchange with the device failedInferior DKey - Received inferior dynamic key from the deviceKey Failed - key exchange with the device failed
Fortress ES-Series CLI Guide: System and Network Monitoring189Update Access ID - Access ID push in progress for the deviceAuthSt - the state of the device’s authentication transactions on the Mesh Point:Unknown - connected, not yet ready to proceedInitial - ready to proceed, waiting for device to respondStarted - response received, authentication in processSuccess - authentication succeeded: network access permittedLocked - authentication failed: network access blockedDHKeyType - the method (or Diffie-Hellman group) that the device is using for key establishmentHostname - the hostname of the device, if a hostname has been configured for itTraffic Allowed - whether the device is permitted to pass traffic on the Mesh Point-secured network:All - secure connection established: the device is permitted to pass all trafficManagement - secure connection could not be established: the device is not permitted to pass trafficBelow these, a count of currently connected clients is given.You can use the -v switch to view more details about the connected clients, including the version, status, Username, and Idle Timeout.6.2.4 Viewing Host Connections View information on devices in communication with the Mesh Point on the clear side of the network with show hosts:> show hostsMAC               IdleTimeout----------------- -----------00:02:2d:5c:f3:02 3000:02:2d:73:7e:dc 3000:02:2d:80:a2:08 3000:02:a5:6f:9f:34 3000:05:32:0a:aa:02 3000:06:5b:ae:4e:9e 3000:14:8c:08:2c:c0 3000:14:8c:08:43:00 3000:15:f9:97:70:18 3000:18:4d:58:85:7b 3000:30:ab:1b:4f:5d 3000:40:36:01:b4:58 3000:90:4b:0d:f4:a2 3000:90:4b:19:8b:16 30---Total Hosts: 14
Fortress ES-Series CLI Guide: System and Network Monitoring190Hosts are displayed by their MAC addresses. The idle timeout (the number of minutes the Mesh Point is configured to allow host connections to be unused before clearing their sessions) is shown for each. A count of currently connected hosts is shown below the list.6.2.5 Viewing Guest Connections View information on devices given access on the encrypted side of the network as Trusted Devices, access points (APs), and/or WPA2 wireless stations with show guests:> show guestsMAC               GuestType AuthState IdleTimeout Username----------------- --------- --------- ----------- --------00:0c:29:2b:a9:09 TD        Success   3000:14:8c:2b:4a:50 WPA2      Success   16200--- Total Guests: 2MAC - the media access control (MAC) address of the cleartext deviceGuestType - identifies the type of connected deviceAuthState - (authentication state) the state of the device’s network authentication processIdleTimeout - the number of minutes the Mesh Point is configured to allow guest connections to be unused before clearing their sessions, requiring them to reauthenticate to re-establish their connections.Username - the username associated with the device, when applicable and configuredBelow these, a count of currently connected guest devices is provided6.3 Monitoring Statistics The show statistics command displays the packets the Mesh Point has passed since cryptographic processing was last started:> show statisticsEncrypted:     5272674Decrypted:     1584058ClearRx:       343ClearTx:       651KeyPackets:    8707RadiusRx:      0RadiusTx:      0BadDecrypted:  81651The show interface command displays traffic statistics for each port, below the configuration and status information it displays. The output for this command varies based on the
Fortress ES-Series CLI Guide: System and Network Monitoring191number and type of interfaces on the Mesh Point (refer to Table 1.1 on page 3):# show interface[CONFIGURED INFO]                          Switching                                     UCost            Enable TrafficName      Mode     VlanId Mode      Duplex Speed 8021x Zone      MeshIf Offset MeshEncap QoS    Class--------- -------  ------ --------- ------ ----- ----- --------- ------ ------ --------- ------ -------Ethernet1 enabled  1      access    auto   auto  N     encrypted access 0      N         N      lowEthernet2 enabled  1      access    auto   auto  N     clear     access 0      N         N      low[STATUS INFO]Name      Link Duplex Speed Collisions--------- ---- ------ ----- ----------Ethernet1 down half   10    0Ethernet2 up   full   100   0[STATISTIC INFO]Name      Type  State      InBytes InPackets InErrTotal OutBytes OutPackets OutErrTotal--------- ----- ---------- ------- --------- ---------- -------- ---------- -----------Ethernet1 wired disabled   0       0         0          0        0          0Ethernet2 wired forwarding 0       0         0          6428477  95865      46.4 IPsec SAs MonitoringWhen a Suite-B license is installed (refer to Section 5.6) and IPsec is enabled and configured (refer to Section 4.4), you can view just the total number of Security Associations established between the Mesh Point and its IPsec peers with show ipsec -sa -counter.  # show ipsec -sa -counter3 SAs registeredOmit the -counter switch to view current SAs:# show ipsec -saInbound SPI 0xCEEEECF / outbound SPI 0xCC2D277, crypto suite Suite B 256Peer: 172.28.128.208, local 0.0.0.0/0 <=> remote 172.28.128.208/32Lifetime: 239/240 minutes, unlimited KBInbound SPI 0x2DA5DE79 / outbound SPI 0xDBC63AA, crypto suite Suite B 256Peer: 172.28.128.211, local 0.0.0.0/0 <=> remote 172.28.128.211/32Lifetime: 220/240 minutes, unlimited KBInbound SPI 0x4A2D1748 / outbound SPI 0xD42E2E98, crypto suite Suite B 256Peer: 172.28.128.209, local 0.0.0.0/0 <=> remote 172.28.128.209/32Lifetime: 163/240 minutes, unlimited KB3 SAs registeredExcept for the Lifetime countdown, Inbound SPI and Outbound SPI (Security Parameter Index), the IPsec parameters are configured, globally or per SPD (Security Policy Database) entry, with set ipsec (refer to Section 4.4.1).
Fortress ES-Series CLI Guide: System and Network Monitoring192NOTE: If both dataand time limits areconfigured, an SA willexpire at whichevercomes first, potentiallywhen  Lifetime stillshows time remaining. Inbound SPI and Outbound SPI- the 32-bit Security Parameter Index included in an IPsec packet, together with the destination IP address and IPsec protocol, uniquely identifies the SA. SPIs are pseudorandomly derived during IKE transactions. crypto suite - the cryptographic algorithm suite in use by the SAPeer - the remote IPsec peer participating in the SA by IP addresslocal - the subnet of local IP addresses defined in the SPD entry used by the SA (the outbound source subnet or inbound destination subnet).remote - the subnet of remote IP addresses defined in the SPD entry used by the SA (the inbound source subnet or outbound destination subnet).Lifetime - the bottom number in the ratio is lifetime minutes, which is the global SA time limit specified for the SA. The top number is the remaining time (a countdown from the global SA lifetime limit), also in minutes. The last value is the limit on the amount of data an SA can pass before being deleted, in kilobytes. The default global setting configures no data limit for SAs as unlimited KB.Use the -counter switch to show the number of IPsec SAs currently registered.# show ipsec -sa -counter99 SAs registeredYou can also delete any or all SAs:# del ipsec-sa -all|-spi <spi>To delete a specific SA, first run show ipsec -sa to obtain the Security Parameter Index (SPI) of the SA. 6.4.1 IPsec ISAKMP Security AssociationsYou can view the ISAKMP (Internet Security Association and Key Management Protocol) Security Associations established between the Mesh Point and its IPsec peers with show ipsec: # show ipsec -isakmp-sa                                                                                                                              Peer: 20.20.20.46, IKE version 2, created Thu Mar 24 13:54:18 2011      ISAKMP SPI (cookie): 029855C873249AE4A63F62C13818EC29Peer: 20.20.20.86, IKE version 2, created Thu Mar 24 13:54:23 2011      ISAKMP SPI (cookie): 050F07DA25C49BC9364AF71F92F4AFF9Use the -counter switch to show the number of ISAKMP SAs currently registered.# show ipsec -isakmp-sa -counter2 SAs registered
Fortress ES-Series CLI Guide: System and Network Monitoring1936.5 FastPath Mesh Monitoring When bridging is set to FastPath Mesh (Section 3.2.2), the Mesh Point CLI provides show mesh commands to view an array of information on the configuration, composition and operation of the FP Mesh network.6.5.1 FastPath Mesh Bridging Configuration View the current FP Mesh settings with the show mesh command:# show meshMesh is enabledRFC 4193 ULA: FD00:0:8895:8895:214:8CFF:FEF8:18C0Subnet Id: 0x8895Mesh Transmit Control: autoMesh Reactivity: mostMesh Time to Live: 4Mesh Multicast RSSI clamp: offMesh Multicast rate clamp: offMesh Multicast Mode: autoMesh Control Packet Interval: autoThe Transmit Control setting is covered in Section 3.2.3.3. The Reactivity control is covered in Section 3.2.3.5. The Time to Live control is covered in Section 3.2.3.6. Multicast clamping thresholds are covered in Section 3.2.3.4, and Multicast Mode in Section 3.2.3.1. The Control Packet Interval control is covered in Section 3.2.3.2.Use the other show mesh commands to view specific FP Mesh network information described in Table 6.1.Table 6.1 Show Mesh CommandsShow Mesh Commands Descriptionshow mesh -forwarding-table -mac <MacAddr>|-ip <IpAddr>|-name <HostName>Displays which FastPath Mesh Point is forwarding traffic for a particular MAC address. The MAC address can belong to the FPMP itself, another FPMP node, or a Non-Mesh Point (NMP): a host, client, Trusted Device, etc., behind the FastPath Mesh Point.show mesh -interfaces -verboseDisplays a list of FP Mesh interfaces, including the inter-face name, type, current status, and the reason for the current status. Use the -verbose switch to view all the available details for each interface.
Fortress ES-Series CLI Guide: System and Network Monitoring194show mesh -ip -ckip <IpAddress> -mp -dupmp -nmp -dupnmpDisplays a list of IP addresses or, with the -ckip <IpAddress> option, a list of all MAC addresses associated with the specified IP address (useful for locating duplicates of a particular IP address). Use the -mp switch to list all network Mesh Points’ IP addresses; the -dupmp switch to list all MPs that have duplicate IP addresses. Use the -nmp switch to list all NMPs’ IP addresses; the -dupnmp switch to list all NMPs that have duplicate IP addresses.show mesh -loopdetectFP Mesh prevents bridging loops from forming on Core interfaces, which connect MPs to one another. A net-work loop can form, however, when more than one mesh point interconnected via core interface is also con-nected to the same OSI Layer 1 or Layer 2 device. The loop is mitigated by blocking an access interface on one of the Mesh Points. If such a loop exists on the network, it is displayed with this command.show mesh -multicast-forwarding -mac <MacAddr> -vlan <vlanID> -senders -all|-aging|-invalid -verbose -keysDisplays the multicast forwarding table. Use the -mac switch to list only the forwarding for the specified MAC address. Use the -senders switch with the -mac switch to list all the senders to that MAC address. Use the -all|-aging|-invalid switches to filter the list. Use the -verbose switch to display all the multicast for-warding details. Use the -keys switch to show only the destination, source and previous hop for each entry. You can flush the multicast forwarding table with del mesh -multicast-forwarding -all. (Flushed entries become invalid, but continue to be displayed with the show mesh -multicast-forwarding -all command. To see only the valid entries, omit the -all switch.)show mesh -multicast-groups -configDisplays the current multicast subscriptions. Use the -config switch to display only those multicast stream subscriptions that were manually configured. show mesh -nbrcost -config|-mac <MacAddr>|-ip <IpAddr>|-name <NodeName>|-interface <InterfaceName>|-bss <BssName>Displays the actual cost to use and configured costs to reach a specified neighbor (by MAC address, IP address, or node name) over the specified wired (InterfaceName) or wireless (BssName) interface. Use the -config switch to view only the configured costs.show mesh -neighbor -mac <MacAddr>|-ip <IpAddr>|-name <NodeName>Displays the information for another MP (neighbor) directly connected to the current MP as specified by MAC address, IP address, or node name. This com-mand shows the half-duplex Link Speed between this MP and the neighboring MP.Table 6.1 Show Mesh CommandsShow Mesh Commands Description
Fortress ES-Series CLI Guide: System and Network Monitoring1956.6 Viewing the System Log The system log in the Mesh Point CLI is displayed with the viewlog command:# viewlog10/06/2008 12:06:41 Info      Gateway Auth: AUDIT console: logon Succeeded for user 'admin' using local authentication, Logged in role = Administrator10/06/2008 11:59:39 Info      Gateway Auth: AUDIT internal: SUCCESS logout Succeeded for user 'admin' Reason = User Logout10/06/2008 10:41:24 Info      Gateway Auth: AUDIT GUI admin 192.168.1.46: logon Succeeded for user 'admin' using local authentication, Logged in role = Administrator10/06/2008 09:16:01 Warning   System: HTTP daemon health check failed - restarting10/06/2008 09:14:31 Info      FIPS: FIPS tests completed successfully10/06/2008 09:14:31 Info      DBP: AUDIT internal: SUCCESS Setting FIPS to be Non Periodic10/06/2008 09:14:31 Info      FIPS: FIPS running these tests:   Wlls Bypass Tests10/06/2008 09:14:31 Info      FIPS: FIPS beginning test run10/06/2008 09:14:31 Info      Access: AUDIT internal: Creating Device '00:0d:60:cd:e8:40' learned on a Wired interface in the Clear zone10/06/2008 09:14:31 Info      DBP: AUDIT internal: SUCCESS Setting FIPS to be Run Once10/06/2008 09:14:28 Info      FIPS: FIPS tests completed successfully10/06/2008 09:14:28 Info      DBP: AUDIT internal: SUCCESS Setting FIPS to be Non Periodic10/06/2008 09:14:28 Info      FIPS: FIPS running these tests:   Wlls Bypass Tests10/06/2008 09:14:28 Info      FIPS: FIPS beginning test run10/06/2008 09:14:28 Info      Access: AUDIT internal: Creating Device '00:18:3a:53:36:e7' learned on a Wired interface in the Clear zone10/06/2008 09:14:28 Info      DBP: AUDIT internal: SUCCESS Setting FIPS to be Run Once10/06/2008 09:14:27 Notice    Radio Mgr: Port vif_lan7 state changed from blocking to forwarding10/06/2008 09:14:05 Info      MaPS Mgr: MaPS disabled - going idle10/06/2008 09:14:04 Info      System: IP default gateway changed from 0.0.0.0 to 192.168.1.110/06/2008 09:14:04 Info      System: eth0 interface connectedshow mesh -neighbors -brief-interface <InterfaceName>|-bss <BssName> Displays the MPs directly connected to the current MP.show mesh -peer -mac <MacAddr>|-ip <IpAddr>|-name <NodeName>Displays the network information for a specific peer by MAC address, IP address, or node name.show mesh -peers -nmpDisplays all the MP nodes (peers) on the FP Mesh net-work, including the current MP. Use the -nmp switch to view the MAC addresses of each Non-Mesh Point.show mesh -routing statistics|table -more-mac <MacAddr>|-ip <IpAddr>|-name <HostName>-numprefs <num>Displays FP Mesh routing statistics (neighbors, virtual interface, and Tx/Rx control packets and bytes), or the FP Mesh routing table, which, when used with -more, can be output one destination at a time using the Enter↵ key. Specify a particular FPMP network node—by MAC address, IP address, or host name—to display, in order of cost, routes to the specified node; use -numprefs to limit the number of routes displayed, or omit this switch to show all routes to the node. show mesh -statistics -clearDisplays the FP Mesh network statistics. Use the -clear switch to reset the statistics.Table 6.1 Show Mesh CommandsShow Mesh Commands Description
Fortress ES-Series CLI Guide: System and Network Monitoring19610/06/2008 09:14:04 Info      System: vif_lan7 interface connected10/06/2008 09:14:04 Info      System: br0 interface connected10/06/2008 09:14:03 Info      System: br0 interface connected10/06/2008 09:14:03 Info      System: eth0 interface connected-More-Three switches can be used with viewlog:# viewlog -all|-num <#events>|-fifoThe -all switch displays the entire event log, 20 events at a time. You can specify the number of events to display with the -num switch. By default, viewlog displays log messages from newest to oldest. You can reverse the order with the -fifo (first-in, first-out) switch, which displays the log, 20 events at a time, in reverse chronological order.Strike any key to scroll through viewlog output. Strike Ctrl-C to exit viewlog.A set usb-logging command, which enables logging to an external USB device, is present only on ES820 and ES520 Mesh Points, which are equipped with USB interfaces. The function is intended for use only in cooperation with Fortress Technical Support. Leave set usb-logging disabled (the default), except as directed by a Fortress representative.6.7 Support Package FilesTo assist in diagnosing a problem with the Mesh Point, Fortress Technical Support may request that you generate a diagnostics file.Diagnostics files encrypt the information collected from the Mesh Point, so the file can be securely sent as an e-mail attachment.Create a diagnostics file with the support command:# support -f <ftp://ftp.server.com/pathFORsupport.pkg> -p<filePassword> -u <FTPloginUsername>:<UserPassword> -nocoreYou must specify, using the -f switch, a valid path to a network FTP server on which to download the support.pkg file, and, with the -p switch, a password for the file consisting of 1–20 alphanumeric characters and/or keyboard symbols. Specify valid log-in credential for the FTP server, with the -u switch, in the format: username:password.The -nocore switch omits core files from the support package. Do not use this switch unless instructed to do so by Fortress Technical Support.
Fortress ES-Series CLI Guide: Supported ServicesA-1Appendix ASupported ServicesThe following table identifies the service names and port numbers supported and used by Fortress products:Service Name Port Number Transport Protocol DescriptionSSH 22 TCP Secure Shell v2 - Fortress Command Line Interface (CLI)DNS 53 TCP Domain Name SystemDHCP 67 UDP Dynamic Host Configuration ProtocolHTTP 80 TCP Hypertext Transfer Protocol - Fortress Graphical User Interface (GUI)SNMP 161 UDP Simple Network Management Protocol v3HTTPS 443 TCP Hypertext Transfer Protocol over TLS/SSL - Fortress Graphical User Interface (GUI)IKE 500 UDP Internet Key Exchange v2MVP 4949 TCP Fortress Mesh Viewer Protocol
Fortress ES-Series CLI Guide: Supported ServicesA-2
Fortress ES-Series CLI Guide: IndexIIndexNumerics4.4 GHz radios 3–4, 27, 38, 40, 51channels 48, 51EULA addendum vii4.9 GHz Public Safety radio channels 50802.11i authentication 67–68802.1X authenticationconfiguring Ethernet ports 93–94configuring server(s) 143–144digital certificates 124AAccess Control ListsAccess Control Entries 127administrative IP address ACL 22–23cleartext device access 165–167controller device access 158–165IPsec ACL 139MAC address ACL 157–158packet filters 159radius ACL 152station ACL 78Access ID 121default 121Secure Client configuration 121add pktfilter 159administrative accountsauthentication 15–18individual accountsconfiguring 19–21in local user database 154role 12–13, 154logon controls 13–18logon message 18passwordschanging 21configuring requirements 17–18defaults 8unlocking 15Antenna Tracking 69Antenna Tracking / Rate Monitoring 69AP associations 186AP management rules 165–166audit loggingconfiguring 168–173individual administrative accounts 20authentication802.1X authenticationconfiguring Ethernet ports 93–94configuring server(s) 143–144administrator authentication 15–18authentication servers 142–144internal RADIUS OCSP 148–151client device authentication 154–156controller device authentication 158–165user authentication 146, 153–154WPA/WPA2 authentication 67, 74–76BBasic Service Sets 58–68beacon interval 119blackout mode 120boot imageselecting at boot 176BPMsee FIPS, bypass modebridging 28–38FastPath Mesh 5, ??–37monitoring 193–195interfacesconfiguring 60, 72FastPath Mesh 30received signal strength setting 60monitoring links 187–188Spanning Tree Protocol 37–38CCAC OCSP entries 148–151cached user credentials 120channel exclusion 57–58channel settings 48–52, 55–56channel sharing 42–43cleartext devices 165–167guest devices managing the Mesh Point 117,??–117viewing 190cleartext LED 110cleartext setting 116CLIaccessing 8command syntax 11–12see also administrative accountsCommandsadd/del ipacl 23add/del ipsec-acl 139add/del maclist 158add/del pktfilter 159–162add/del radius-acl 152add/del spd 132, 134
Fortress ES-Series CLI Guide: IndexIIadd/del station-acl 78add/del vlan 101–102add/del xchannel 58add/update ocspcache 151add/update/del ace 127add/update/del admin 20–22add/update/del ap 165–166add/update/del auth 143–144add/update/del bss 59–68add/update/del controllerauth 164–165add/update/del deviceauth 155–156add/update/del dns-entry 89add/update/del macaudit 171–172add/update/del mesh 32–33add/update/del snmptrap 25add/update/del sta 71–76add/update/del td 166–167add/update/del userauth 16, 153–154copy running-config 184del ipsec-psk 139del ipsec-sa 192diag 184generate csr 121import certificate 123, 124import license-file 181meshpath 182, 183ping 182reboot 176reset certificate-revocation 105reset clients 175reset default 175, 179reset guests 175reset hosts 175reset noloop 175reset sessions 175set accessid 121set account 16, 17, 18set audit 170, 173set banner 18set blackout 120set bootimage 177set bridging 30, 38set cachedauth 120set certificate-revocation 126set clearmanagement 117set cleartext 116set clientmanagement 117set clock 82, 83set controllerauth 164set country 40set crypto 114, 115set dhcp-server 88set dns-client 82set dns-server 89set eap-tls 125set environment 40set fips 111, 112, 113, 179set fp 37set gui 118set idletimeout 157set interface 91set ipacl 23set ipsec 130set ipsec-psk 138set l2tp-lac 141set l2tp-lns 141set license 181set localauth 16, 145–150set location 86, 87set logging 168set maclist 158set mesh 34–36set multicast-dns 90set network 79, 80set networkv6 81set ntp 84set ntptimeout 85set pktfilter 161set qos 96, 97set radio 45set rfkill 41, 42set sensor 104set snmp 24set ssh 119set timezone 83set unit 41show account 13show ace 128show admin 12, 19show ap 165show association 186show audit 169, 172show auth 142, 144show banner 18show blackout 120show bootimage 177show bridgelinks 187show bridging 29show bss 58show cachedauth 120show certificate 122show certificate-revocation 104, 105,126show clearmanagement 117show cleartext 116show clientmanagement 116show clients 188
Fortress ES-Series CLI Guide: IndexIIIshow clock 82show controllerauth 164show country 40show crypto 109show device 181, 185show deviceauth 155show deviceid 186show dhcp-server 88show dhcp-server-leases 88show dns-client 82, 89show dns-entry 89show dns-server 89show eap-tls 125show environment 40show fips 110, 111show fp 3, 37show guests 190show gui 118, 125show hosts 189show idletimeout 156show interface 91, 191show ipacl 22show ipsec 125, 131, 191, 192show ipsec-acl 140show ipsec-psk 139show keypair 122show l2tp 141show license 181show localauth 145show location 86, 87show logging 168show macaudit 170, 171show maclist 157, 158show mesh 32, 193, 194show multicast-dns 90show network 79show networkv6 80show ntp 84show ntptimeout 85show ocspcache 150, 151show pktfilter 161show qos 95show radio 43show radius-acl 152show rfkill 41, 42show running-config 184show scan 77show snmp 23show spd 133show ssh 119show sta 71show station-acl 78show statistics 190show stp 38show td 166show tech 184show timezone 83show tracking 69show unit 41show uptime 186show userauth 153show vlan 101show xchannel 57traceroute 182unlock 15upgrade 178, 179viewlog 195, 196compression 114Console port 8adapter 8serial settings 8controller devicesACL authentication 158–165country of operation 40Crypto Officer 110Ddata compression 114date and timesystem date and time 82DB9-to-RJ-45 adapter 8defaultAccess ID 121administrative passwords 8encryption algorithm 114idle timeout settings 156IP address 79operating mode 109, 111re-keying interval 115restoring defaults 179SSH setting 119del pktfilter 162device authenticationclient device authentication 154–156controller device authentication 158–165Device IDBridge Device ID 185viewing 185controller device Device ID 164Secure Client Device ID 188DHCP services 87–89digital certificatesgenerating 121–122importing 123–124OCSP 148–151
Fortress ES-Series CLI Guide: IndexIVdistancesetting 45units 41DNS client settings 81–82DNS service 89domain name 82multicast DNS 90domain name 82dynamic IPsec endpoints 134–138EEAP-TLSBSS WPA 67–68encrypted interfaces 90Ethernet 90encrypted zone cleartext 116encryption algorithm 113, 114Ethernet ports 90–94FFastPath Mesh 5, ??–37interfaces 30licensing 179–182monitoring 193–195tracing a mesh path 182tuning performance 33–37FIPS 109–113bypass mode 110indicatorscleartext LED 110retesting 113Fortress Securityconfiguring BSSs 65configuring Ethernet ports 91Ethernet port setting 90fragmentation threshold 63Ggetting help 10–11GPS 86–87GUI 5administrative accounts 12–18enabling/disabling 117–119Hhardwareguides 1platform models 3–4help 10–11host devicesconfiguring timeouts 156–157resetting 175host name 79–80IIPsecdynamic endpoints 134–138IPv4 79–80default address 79IPv6 80–81Kkey establishmentconfiguring 114–115Secure Client configuration 115LL2TP 134LEDsblackout mode 120licensed featuresadding 179–182location 86–87logging on/offglobal logon settings 13–18logging on/off CLI 8–10logon message 18MMAC addressesACL filtering 157–158cleartext device MAC addressesestablishing 165–167viewing 190controller device MAC addressesestablishing 164Secure Client MAC addressesestablishing 155viewing 188management interfaceIP address 79–81mDNS server settings 90Mesh Point GUIsee GUIMIB 25military band radiossee 4.4 GHz radiosMIMO 38, 53–54MSP 2MSP beacon interval 119
Fortress ES-Series CLI Guide: IndexVmulticast clamping 36multicast DNS settings 90multicast group subscription ??–33multicast video performance 36Nnetwork settings 79–81DHCP services 87–89DNS service 89NTP 83–85OOCSP 148–151operating mode 109–113default 109Ppacket filters 159passwordsadministrator passwordschanging 21defaults 8configuring requirements 17–18SNMP passphrases 24user passwords 153ping 182PoE 3, 90LAN switch PSEenabling per port 93portsConsole port 8adapter 8serial settings 8Ethernet ports 90–94for AP management rules 165for Trusted Devices 167public key certificatesgenerating 121–122importing 123–124QQoSconfiguring 94–97per port override 94Rradios 3, 27, 284.4 GHz radios 3–4, 27, 38, 40, 51channels 48, 51EULA addendum vii4.9 GHz Public Safety radio channels 50AP associationsmonitoring 186bridging 28monitoring links 187–188radio settings 38–56channel sharing 42–43country 40MIMO 53–54received signal strengthsetting 60RF kill 41wireless interfaces 58–68rebooting 176received signal strengthminimum setting 60re-keying intervalconfiguring 115default 115remote logging 168–173individual administrative accounts 20resettingfactory defaults 179resetting connections 175restoringdefault settings 179RF kill 41RJ-45-to-DB9 adapter 8RTS threshold 63Ssafetyprecautions 1Secure ClientsAccess ID 121key establishment 115managing the Mesh Point 116monitoring 186–189resetting 175timeout settings 156–157security settingsAccess ID 121administrator passwords 21BSS security 65–68configuring basic security 109–120passwordsconfiguring requirements 17–18RF kill 41serial settings 8sessionsmonitoring 186–190
Fortress ES-Series CLI Guide: IndexVIresetting 175timeout settings 156–157set pktfilter 161show pktfilter 161show tracking 69SNMP 5configuring 23–25MIB 25software upgrades 177–179software versionupgrading 177–179viewing 177SSH 119SSIDs 58, 71statisticsinterface statistics 190–191traffic statistics 190STP 37–38system clock 82system log 195–196Ttime zone 83timeout settingsadministrative timeouts 13–18session and idle timeouts 156–157traceroute 182tracking, antenna 69transmit power 45setting 53Trusted Devicesconfiguring 166–167managing the Mesh Point 117, ??–117resetting 175timeout settings 156–157Uuptime 186user accounts 153–154user authentication 146, 153–154VVLANsconfiguring 100–102WWAN port 90–94wireless interfaces 58–68WMM 63WPA/WPA2 authentication 67, 74–76Zzoneconfiguring BSSs 65configuring Ethernet ports 91
Fortress ES-Series CLI Guide: GlossaryXIIIGlossary802.11 The IEEE standard that specifies technologies for wireless networks.802.11i The amendment to the 802.11 standard that describes security for wireless networks, or Robust Security Networks.802.1X The IEEE standard for port-based network access control, providing authentication and authorization to devices attached to a given port (or preventing access from that port if authentication fails). 802.16 The IEEE standard that specifies technologies for fixed broadband wireless MANs that use a point-to-multipoint architecture, also called WiMAX, WirelessMAN™ or the Air Interface Standard.Access IDIn Fortress products, a user-defined, 16-digit hexadecimal value that provides network authentication for all devices authorized to communicate over a Fortress-secured net-work. Network authentication is one of the components of Multi-factor Authentica-tion™.access point (AP) A device that transmits and receives data between a wired LAN and a WLAN, to connect wireless devices within range to the LAN. AESAdvanced Encryption Standard—a FIPS-approved NIST standard for 128/192/256-bit data encryption for protecting sensitive (unclassified) U.S. government (and related) data; also referred to as the Rijndael algorithm. NIST FIPS-approved AES in November, 2001.administrator password In Fortress products, a password that guards against unauthorized modifications to the system or its components (compare user password).APIPA Automatic Private IP Addressing—a Microsoft feature that allows a DHCP client unable to acquire an address from a DHCP server to automatically configure itself with an IP address from a reserved range (169.254.0.1 through 169.254.255.254). The client uses the self-configured IP address until a DHCP server becomes available.ARP Address Resolution Protocol—describes how IP addresses are converted into physical, DLC addresses (ex., MAC addresses).ASAuthentication Server—a network device running an authentication service: software that checks credentials to verify the identity of network users and/or devices in order to restrict access to the network or to its resources or to track network activity.Autonomous System—as defined by RFC 1930, a network or connected set of networks, usually under a single administrative entity, with a single clearly defined routing policy; “the unit of routing policy in the modern world of exterior routing.”BPM In FIPS, bypass mode—state in which cleartext is allowed to pass on an encrypted interface.bridge A network device that connects two networks or two segments of the same network.BSS Basic Service Set—the primary collection of entities associated in a wireless network, as defined in the IEEE 802.11 standard.
Fortress ES-Series CLI Guide: GlossaryXIVCA Certificate Authority—an entity, often a trusted 3rd-party, that issues the X.509 digital certificates used to mutually verify the identities of organizations, servers or other enti-ties connecting to one another over a public network.CAC Common Access Card—a United States Department of Defense (DoD) smartcard issued as standard identification for active duty military personnel, reserve personnel, civilian employees, and eligible contractor personnel.CCITT Comite Consultatif Internationale de Telegraphie et Telephonie, former name of the ITU-T.CLI command-line interface—a user interface in which the user enters textual commands on a single line on the monitor screen.client In client-server architecture, an application that relies on another, shared application (server) to perform some of its functions, typically for an end-user device.Client Refer to Fortress Secure Client.CRL Certificate Revocation List—a list of the serial numbers of digital certificates that have been revoked by their issuing CA and that therefore should not be relied upon.Crypto Officer password A FIPS-defined term—sometimes, Crypto password—the administrator password in For-tress devices operating in FIPS mode.Data Link Layer Refer to DLC.dBi decibels over isotropic—a unit of measure of RF antenna gain: the power emitted by an antenna in its direction of strongest RF emission divided by the power that would be transmitted by an isotropic antenna emitting the same total power.dBm decibels referenced to milliwatts—an absolute (non-relative) unit of power measure-ment that indicates the ratio, in decibels (dB), of measured power referenced to one milliwatt (mW)Deployable Mesh Point Name of the Fortress ES520 model Mesh Point.device authenticationIn Fortress products, a means of controlling network access at the level of individual devices, tracking them via their generated Device IDs and providing controls to explic-itly allow and disallow them on the network; one of the factors in Fortress’s Multi-factor Authentication™.Device IDIn Fortress products, a 16-digit hexadecimal value generated for and unique to each Fortress Mesh Point or MSP Secure Client device on the Fortress-secured network. Device IDs are used for device authentication and are neither modifiable nor transfer-able.DHCPDynamic Host Configuration Protocol—an Internet protocol describing a method for flexibly assigning device IP addresses from a defined pool of available addresses as each networked device comes online, through a client-server architecture. DHCP is an alternative to a network of fixed IP addresses. Diffie-Hellman key establishment A protocol by which two parties with no prior knowledge of one another can agree upon a shared secret key for symmetric key encryption of data over an insecure channel. Also, Diffie-Hellman-Merkle key establishment; exponential key exchange.DLC Data Link Control—the second lowest network layer in the OSI Model, also referred to as the Data Link Layer, OSI Layer 2 or simply Layer 2. The DLC layer contains two sub-layers: the MAC and LLC layers.DMZ Demilitarized Zone—in IT, a computer (or subnet) located between the private LAN and a public network, usually the Internet. DNSDomain Name System, Server or Service—a system or network service, defined in the TCP/IP Internet Protocol Suite, that translates between textual domain and host names and numerical IP addresses.
Fortress ES-Series CLI Guide: GlossaryXVDoD Department of Defense—the United States military.EAP Extensible Authentication Protocol—defined by RFC 2284, a general protocol for user authentication. EAP is implemented by a number of authentication services, including RADIUS. EAP-MD5 An EAP security algorithm developed by RSA Security® that uses a 128-bit generated number string to verify the authenticity of data transfers.EAPoL Extensible Authentication Protocol over LAN—IEEE 802.1X (Port Based Network Access Control) network port authentication protocol.EAP-TLS EAP-Transport Layer Security—a Point-to-Point Protocol (PPP) extension supporting mutual authentication, integrity-protected cipher suite negotiation, and key exchange between two endpoints, within PPP.EAP-TTLS EAP-Tunneled TLS—An EAP-TLS protocol that uses TLS to establish a secure connection between a client and server.EDIPI Electronic Data Interchange Personal Identifier—United States Department of Defense (DoD) identification number used in Defense Enrollment and Eligibility Reporting Sys-tem (DEERS) personnel database records.ES210 The Fortress hardware model identifier of the Tactical Mesh Point.ES2440 The Fortress hardware model identifier of the High-Capacity Infrastructure Mesh Point.ES520 The Fortress hardware model identifier of the Deployable Mesh Point.ES820 The Fortress hardware model identifier of the Vehicle Mesh Point.FastPath Mesh™ Fortress’s bridging link and traffic management protocol for optimizing tactical mobile mesh networking.FIPS Federal Information Processing Standards—issued by NIST, FIPS mandate how IT, including network security, is implemented by the U.S. government and associated agencies.FIPS operating mode In Fortress products, the operating mode that complies with FIPS 140-2 Security Level 2.Fortress Secure Client A software client module for securing network communications on devices such as lap-tops, PDAs, tablet PCs, and industrial equipment such as barcode scanners and porta-ble terminals.Fortress Mesh Point(FMP)Fortress ES210 (Tactical Mesh Point), ES520 (Deployable Mesh Point) and ES820 (Vehi-cle Mesh Point) ES2440 (High-Capacity Infrastructure Mesh Point) radio-equipped net-work devices that provide secure wireless networks and secure LAN, WLAN and WAN access.Fortress Security System The secure network deployment of one or more Fortress Mesh Points and/or Fortress Secure Clients.FPMP FastPath Mesh Point—in Fortress Mesh Points, a Mesh Point on which FastPath Mesh routing is licensed and enabled.FQDN Fully Qualified Domain Name—the complete, unambiguous domain name specifying the exact location in the DNS hierarchy of a particular entity on the network.FTP File Transfer Protocol—a client-server protocol for transferring files between hosts on a TCP-based network.frame In Fortress GUIs, a portion of a larger screen or dialog, graphically set apart from other elements on the screen and providing the interface for a specific feature or function set.In IT, a packet of data transmitted/received.
Fortress ES-Series CLI Guide: GlossaryXVIgateway In IT, a node on a network, usually a router, that provides a connection to another net-work. GPS Global Positioning Systemgroups An association of network objects (users, devices, etc.) typically used to allocate shared resources and apply access policies.GUI graphical user interface—a user interface in which the user manipulates various interac-tive objects (menu items, buttons, etc.) displayed on the monitor screen.hash function Mathematical computation for deriving a condensed representation or hash value, usu-ally a fixed-size string, from a variable-size message or data file.High-CapacityInfrastructure Mesh Point Name of the Fortress ES2440 model Mesh Point.HTTP Hypertext Transfer Protocol—used to transmit and receive all data over the World Wide Web.HTTPS HTTP Secure sockets—HTTP with an encryption/authentication layer.IANA Internet Assigned Number Authority—the organization that assigns Internet Protocol (IP) addresses and port numbers. ICMP Internet Control Message Protocol —supports packets containing error, control, and informational messages. The ping command uses ICMP to test an Internet connection. IDS Intrusion Detection System—monitors network activity to identify suspicious patterns that may indicate a network or system attack and supports automated and/or manual real-time responses.IEEE Institute of Electrical and Electronics Engineers—a nonprofit technical professional association that develops, promotes, and reviews standards within the electronics and computer science industries.IETF Internet Engineering Task Force—the primary standards organization for the Internet.IGMP Internet Group Management Protocol—The portion of the IP multicast specification that describes dynamically managing the membership of multicast groups.Internet Protocol Suite Also, TCP/IP—the basic, two-part communication protocol in use on the Internet (refer to IP and TCP).IP Internet Protocol—defines a method for transmitting data, in packets, from one com-puter to another over a network; one of the founding protocols in the TCP/IP suite of networking protocols.IPS Intrusion Prevention System—allows network administrators to apply policies and rules to network traffic, as it is monitored by an intrusion detection system.IPsec Internet Protocol security—a set of protocols developed by the IETF to support secure exchange of packets at the IP layer, deployed widely to implement VPNs.IPv4 Internet Protocol version 4—the first widely implemented and still the most prevalent version of IP.IPv6 Internet Protocol version 6—the next version of IP slated for wide implementation, intended to overcome the limitations of, and to eventually replace, IPv4.ISO International Organization for Standardization, formerly the International Standards Organization—ISO still refers to standards (ex., ISO 9000); the whole name refers to the organization, sometimes appending the earlier initialization in parentheses.isotropic antenna A theoretical, idealized antenna that would transmit power uniformly in all directions; used to measure antenna gain in dBi.IT Information Technology
Fortress ES-Series CLI Guide: GlossaryXVIIITU-T International Telecommunications Union-Telecommunication, Geneva-based interna-tional organization for telecommunications standards, formerly CCITT.key establishment An transaction through which two parties with no prior knowledge of one another can agree upon a shared secret key for symmetric key encryption of data over an insecure channel. Sometimes, key exchange.L2TP Layer 2 Tunnel Protocol—an emerging IETF extension to PPP that supports VPNs by facilitating the tunneling of PPP packets across an intervening network.LAN Local Area Network—a collection of computers located within a small area (such as an office building) that shares a common communications infrastructure and network resources (i.e., printers, servers, etc.).Layer 2 or OSI Layer 2—the second lowest network layer in the OSI Model, also referred to as Data Link Control (DLC) or the Data Link Layer. Layer 2 contains two sublayers: the MAC and LLC layers.LDAPLightweight Directory Access Protocol—a protocol used to access directories on a net-work, including the Internet. LDAP makes it possible to search compliant directories to locate information and resources on a network. LDAP is a streamlined version of the Directory Access Protocol, part of the X.500 standard for network directory services.LLC Logical Link Control—one of two sublayers of OSI Layer 2 (refer to DLC), in which frame synchronization, flow control and error checking takes place.MAC Media Access Control—one of two sublayers of the OSI Model’s DLC, at which data access and transmission permissions are controlled.MAC address Media Access Control address—a unique number that identifies a device, used to prop-erly direct network traffic to the device.MAN Metropolitan Area Network—a collection of interconnected computers within a town or city.MIB Management Information Base—SNMP-compliant information that an SNMP agent stores about itself and sends in response to SNMP server requests (PDUs).MIMO Multiple-Input Multiple-Output—as defined by the 802.11n amendment to IEEE 802.11 standard set, the use of multiple antennas at both transmitter and receiver to improve radio connection performance.MITM Man in the Middle attack—a network security breach in which an attacker is able to intercept, read, insert and modify messages between two parties without their knowing that the link between them has been compromised.MLD Multicast Listener Discovery—a means, defined in the IPv6 ICMPv6 protocol, of discov-ering multicast listeners on a directly attached link (analogous to IGMP in IPv4). MobileLink™ In GE Medical Systems Information Technologies, a proprietary method for wireless transmission of serial output.MRD Multicast Router Discovery—a mechanism, defined in IETF RFC 4286, for identifying multicast routers independent of the multicast routing protocol they use.MRP Mesh Radio Port—in Fortress Mesh Points, a pair-wise network link formed between bridging-enabled BSSs configured on the Mesh Points.MSI The Microsoft installer system written by Microsoft for Windows platforms.MSP Mobile Security Protocol—The Fortress protocol that provides authentication and encryption at the Media Access Control (MAC) sublayer, within the Data Link Layer (Layer 2) of the Open System Interconnection (OSI) networking model.
Fortress ES-Series CLI Guide: GlossaryXVIIIMulti-factor Authentication™ In Fortress products, the combination of network authentication (through the network Access ID), device authentication (through the Device ID), and user authentication (through user credentials), that guards the network against unwanted access.multiplexing The practice of transmitting multiple signals over a single connection.NetBIOS Network Basic Input/Output System—an API that originally provided basic I/O services for a PC-Network and that has been variously adapted and augmented to support cur-rent LAN/WLAN technologies.network authentication In Fortress products, the requirement that all devices must authenticate with the cor-rect Access ID in order to connect to the Fortress-secured network; one of the factors in Fortress’s Multi-factor Authentication™.network resource An entity on the network that provides a service or function, such as e-mail or printing, to devices and users on the network. NIC Network Interface Card—computer circuit board that enables a computer to connect to a network.NIAPNational Information Assurance Partnership—a collaboration between NIST and the National Security Agency (NSA), in response to the Computer Security Act of 1987 (PL 100-235), to promote sound security requirements for IT products and systems and appropriate measures for evaluating them.NIST National Institute of Standards and Technology, the U.S. Government agency responsi-ble for publishing FIPS.NMP Non-Mesh Point—in Fortress Mesh Points, any node on a Fortress FastPath Mesh net-work that is not an FPMP (FastPath Mesh Point).NSA National Security Agency—United States intelligence agency administered by the Department of Defense.NTLM Windows NT LAN Manager—a user authentication protocol developed by Microsoft®.OCSPOnline Certificate Status Protocol—protocol for determining the revocation state of an X.509 digital certificate, in which an OCSP client issues a status request to an OCSP responder and suspends acceptance of the certificate in question until the responder provides a positive response.operating mode In Fortress products, the way in which access controls and cryptographic processing are implemented on the Fortress-secured network.OSI ModelOpen System Interconnection Model—an ISO standard that defines a networking framework for implementing data transfer and processing protocols in seven layers. (Also see, DLC.)PAN Personal Area Network—a collection of networked computers and devices worn by or within reach of an individual personPDU Protocol Data Unit—often synonymous with packet, a unit of data and/or control infor-mation as defined by an OSI layer protocol.PKI Public Key Infrastructure (PKI), a system of digital certificates and other registration authorities that authenticate the validity of each party involved in an Internet transac-tion; sometimes, trusted hierarchy.policy The means by which access to the secure network and its resources are controlled for users, devices and groups.PPP Point-to-Point Protocol—a method for communicating TCP/IP traffic over serial point-to-point connections.QoS Quality of Service
Fortress ES-Series CLI Guide: GlossaryXIXRADIUSRemote Authentication Dial-In User Service—an authentication service design that issues challenges to connecting users for their usernames and passwords and authenti-cates their responses against a database of valid usernames and passwords; described in RFC 2865.RAM Random Access Memory—data storage that permits data bytes to be accessed in ran-dom order. RF Radio FrequencyRFC Request for Comments—a document proposing an Internet standard that has been accepted by the IETF as potentially developing into an established Internet standard.RSA SecurID® An authentication method created and owned by RSA Security.RSNRobust Security Network - the concept, introduced in the 802.11i amendment to the IEEE 802.11 standard, of a wireless security network that allows only RSNAs to be cre-ated.RSNARobust Security Network Association - in the IEEE 802.11i amendment, a wireless con-nection between 802.11i entities established through the 802.11i 4-Way Handshake key management scheme.RRL Resilient Radio Link—in Fortress Mesh Points, active wireless links that form along the best available path between the bridging-enabled BSSs of networked Mesh Points. RRLs provide fault-tolerant connections for Fortress’s self-healing wireless networks.SCP Secure Copy—a network protocol, based on SSH, for securely transferring files between remote computers over public networks.Secure Client Refer to Fortress Secure Client.Secure Client device In Fortress products, a device such as a laptop, PDA, tablet PC, or barcode scanner, that has the Fortress Secure Client installed and configured to permit the device to commu-nicate on the Fortress-secured network.SFP Small Form Pluggable—shorthand for fiber optic Small Form Pluggable transceiver.SHA Secure Hash Algorithm, cryptographic hash functions developed by the NSA and pub-lished by NIST in FIPS 180-2. SHS Secure Hash Standard—FIPS-approved NIST standard specifying five secure hash algo-rithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512.SISO Single-Input Single-Output—as distinguished from more recently developed  radio oper-ation.SLIP Serial Line Internet Protocol—a method for communicating over serial lines, developed for dial-up connections.SMTP Simple Mail Transfer Protocol—describes a method for transmitting e-mail between servers.SNMPSimple Network Management Protocol—a set of protocols for simplifying management of complex networks. The SNMP server sends requests (PDUs) to network devices, and SNMP-compliant devices (SNMP agents) respond with data about themselves (stored in MIBs).SNMP agent Any network device running the SNMP daemon and storing a MIB, a client of the SNMP server.SSH® Secure Shell®, sometimes, Secure Socket Shell—a protocol, developed by SSH Com-munication Security®, for providing authenticated and encrypted logon, file transfer and remote command execution over a network.SSID Service Set Identifier—a unique name that identifies a particular wireless network
Fortress ES-Series CLI Guide: GlossaryXXSTBC Space-Time Block Coding is a technique that helps improve error rates and reliability in a system that is experiencing poor transmission performance. STP Spanning Tree Protocol—a link management protocol, operating at OSI layer 2, that prevents bridging loops while permitting path redundancy in a bridged network.Suite B A set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization Program.SWLAN Secure Wireless Local Area Networksymmetric key encryption A class of cryptographic algorithm in which a shared secret between two or more par-ties is used to maintain a private connection between or among them.Tactical Mesh Point Name of the Fortress ES210 model Mesh Point.TCP Transmission Control Protocol—defines a method for reliable (i.e., in order, with integ-rity checking) delivery of data packets over a network; one of the founding protocols in the TCP/IP suite of networking protocols.TCP/IP Transmission Control Protocol/Internet Protocol, also Internet Protocol Suite—the basic, two-part communication protocol in use on the Internet (refer to IP and TCP).TLSTransport Layer Security—a two-part protocol that defines secure data transmission between client/server applications communicating over the Internet. TLS Record Proto-col uses data encryption to secure data transfer, and the TLS Handshake Protocol allows the client and server to authenticate each other and negotiate the encryption method to use before exchanging data.Trusted Device In Fortress products, a device that does not have the Secure Client installed but is allowed network access through rules defined for it on the Fortress Mesh Point.trusted hierarchy Refer to PKI.UDP User Datagram Protocol—defines a method for “best effort” delivery of data packets over a network that, like TCP, runs on top of IP but, unlike TCP, does not guarantee the order of delivery or provide integrity checking.UI User Interface—the means by which a human end user provides input to and receives output from computer software.ULA Unique Local Address—an IPv6 globally unique unicast address (subnet identifier), defined in IETF RFC 4193, intended for local (intranet) communications and not intended to be routable on the Internet.user authentication A mechanism for requiring users to submit established credentials (user name and password, smartcard, etc.) and checking the validity of these credentials before allow-ing users to log on to a device or network.user password The password an end must enter in order to access a network or device that requires user authentication (compare administrator password).Vehicle Mesh Point Name of the Fortress ES820 model Mesh Point.VLAN Virtual Local Area Network—a collection of computers configured through software to behave as though they are members of the same network, even though they may be physically connected to separate subnets.VoIP Voice over IP, sometimes VOI (Voice over Internet)—any of several means for transmit-ting audio communications over the Internet.VPN Virtual Private Network—a private network of computers connected, entirely or in part, by public phone lines.WAN Wide Area Network—a collection of interconnected computers covering a large geo-graphic area.
Fortress ES-Series CLI Guide: GlossaryXXIWDS Wireless Distribution System—a means for interconnecting multiple stations (STAs), access points or nodes in a wireless network.WEP Wired Equivalent Privacy—a security protocol for wireless networks, defined in the IEEE 802.11b amendment. WEP has been found to be vulnerable to attack, and WPA is intended to supplant it in current and future 802.11 standards.Wi-Fi® Wireless Fidelity—used generically to refer to any type of 802.11 network.WiMAXWorldwide Interoperability for Microwave Access—the IEEE 802.16 specification for fixed, broadband, wireless MANs that use a point-to-multipoint architecture, defining bandwidth use in the licensed frequency range of 10GHz–66GHz and the licensed and unlicensed frequency range of 2GHZ–11GHz.WIDS Wireless Intrusion Detection System—a means for detecting and preventing unauthor-ized or unwelcome connections to a network.WLAN Wireless Local Area Network. A local area network that allows mobile users network access through radio waves rather than cables.WMM®Wi-Fi Multimedia wireless quality of service implementation defined in subset of the IEEE standard 802.11e, QoS for Wireless LAN.WPAWi-Fi Protected Access—a security protocol for wireless networks, defined in the IEEE 802.11i amendment, that uses 802.1X and EAP to restrict network access, and TKIP encryption to secure data transfer. WPA is intended to replace WEP in current and future 802.11 standards.WPA2 Wi-Fi Protected Access 2—a later implementation of WPA that uses the FIPS 140-2 compliant AES encryption algorithm.
Fortress ES-Series CLI Guide: GlossaryXXII

Navigation menu