Download: | |
Mirror Download [FCC.gov] | |
Document ID | 17158 |
Application ID | coEHAm0qRHl6VYBczSV//Q== |
Document Description | APPENDIX M |
Short Term Confidential | No |
Permanent Confidential | No |
Supercede | No |
Document Type | User Manual |
Display Format | Adobe Acrobat PDF - pdf |
Filesize | 193.93kB (2424138 bits) |
Date Submitted | 1998-12-22 00:00:00 |
Date Available | 1999-03-10 00:00:00 |
Creation Date | 0000-00-00 00:00:00 |
Producing Software | Acrobat PDFWriter 3.0 for Windows |
Document Lastmod | 1998-12-21 14:52:01 |
Document Title | ttlepage |
Document Creator | ttlepage |
Document Author: | NORAND |
Compliance Statement Insert
Device Name: Wireless LAN Access Point
Model Number: 6710
The responsible party for the compliance of this device is:
Intermec Technologies Corporation
550 Second Street SE
Cedar Rapids, Iowa 52401 USA
(319) 369-3100
CAUTION: See users guide instructions for handling, charging, and replacing batteries. Failure to follow those instructions can result in
personal injury, fire, or battery explosion.
This product conforms to the following approvals. The user(s) of this product are cautioned to use accessories and peripherals approved by
Norand Corporation. The use of accessories other than those recommended or changes to this product that are not approved by Norand
Corporation may void the compliance of this product and may result in the loss of the users authority to operate the equipment.
FCC Digital Emissions Compliance
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
•
•
•
•
Reorient or relocate the radio of television receiving antenna.
Increase the separation between the computer equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the radio or television receiver is connected.
Consult the dealer or an experienced radio television technician for help.
Canadian Digital Apparatus Compliance
This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada.
FCC Spread Spectrum Transmitter Compliance
This device is also certified to operate under Part 15, Subpart C, Section 15.247 of the FCC rules for Intentional Radiation Products. This certification
includes Docket 87-389 covering rules effective June 1994. It may not cause interference to authorized radio communication devices, and must accept any
interference caused by those devices.
Canadian RSS-210 Spread Spectrum Transmitter Compliance
Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including
interference that may cause undesired operation of the device.
Canadian 2.4 GHz Spread Spectrum Radio Certification
This device requires a radio license, unless it is installed totally inside a building. (User’s must obtain this license.)
Une license radio est requise oour ces dispositifs, sauf ouor ceux installés tout á fait á l’intérieur d’un bâtiment. (Il faut que l’utilisateur obtienne cette
license.)
Antenna Requirements
FCC rules section 15.203 and Canada RSS-210 require that this device be operated using an antenna furnished by Norand Corporation. The antenna
coupling on this product has been designed to accept only antennas manufactured Norand. Use of an antenna other than that furnished with the equipment is
prohibited by FCC and Industry Canada rules.
European Notice
The 902-928 MHz Spread Spectrum Transmission (SST) radio referred to within the manual is not available for sale in Europe (including, but not limited to,
Great Britain, Italy, Germany, France, Spain, Norway, Denmark, Sweden, Finland, Portugal, and the Benelux countries). Any references in the manual to 902928 MHz SST, or modules containing 902-928 MHz SST radios, should be disregarded by the users of this product in Europe.
578-100-019 Revision B
Page 1 of 4
DECLARATION OF CONFORMITY
(According to ISO/IEC Guide 22 and EN 45014)
PAGE ONE OF TWO
THE PRODUCT HEREWITH COMPLIES WITH THE REQUIREMENTS OF :
THE LOW-VOLTAGE DIRECTIVE 72/32/EEC.
THE EMC DIRECTIVE 89/336/EEC.
Manufacturer’s Name:
Intermec Technologies Corporation
550 2nd Street SE
Cedar Rapids, Iowa 52401
European Representative:
Intermec International Incorporated
Sovereign House, Vastern Road
Reading, Berkshire
RG1 8BT England
Declares that the product listed below:
Product Type: ITE/Residential, Commercial, and Light Industrial
Product Name: Wireless LAN Access Point
Model Number: 6710
Product Options: All
Beginning Serial Number: All
Date Issued: May 30, 1996
Conforms to the following product specifications:
Safety: IEC 950 / EN 60950
EMC: EN 55022 : 1995 / CISPR Publications 22 : 1993, Class B Limits and Methods
EN 50082-1 : 1992 Generic Immunity Standard
ETS 300 339 : Jun. 1993 Draft RES Generic EMC for radio equipments
IEC 801-2 per Draft prETS 300 339, Clause 9.2
+ 8 kV Air / + 4 kV Contact
IEC 801-3 per Draft prETS 300 339, Clause 9.1
3 V/M, 80-1000 MHz, 80% @ 400 Hz
IEC 801-4 per Draft prETS 300 339, Clause 9.3
AC Power Leads + 2 kV; Signal and Control Leads + 1.0 kV
IEC 801-5 (Draft) Tested per Draft prETS 300 339, Clause 9.8
IEC 801-6 Tested per Draft prETS 300-339, Clause 9.4 AC Power Leads and Signal and
Control Leads 3 Vrms, 150 kHz - 80 MHz, 80% @ 400 Hz
Draft prETS 300 339, Clause 9.6, Tested per IEC 1000-4-11 30%
(10 ms), 60% (100 ms), and 95% (5000ms) of 220 VAC nominal.
prETS 300 683 : EMC Standard for short range devices
IEC1000-4-2 Tested per Draft prETS 300 683, Clause 9.3
+ 8 KV Air / + 4 KV Contact
ENV 50140 Tested per Draft prETS 300 683, Clause 9.2
3 V/M, 80-1000 MHz, 80% @ 400 Hz
IEC1000-4-4 Tested per Draft prETS 300 683, Clause 9.4
AC Power Leads + 2 kV; Signal And Control Leads + 1.0 kV
ENV 50142 Tested per Draft prETS 300 683, Clause 9.8
ENV 50141 Tested per Draft prETS 300 683, Clause 9.5
AC Power Leads and Signal and Control Leads 3 Vrms,
150 kHz - 80 MHz, 80% @400 Hz
IEC 1000-4-11 Tested per Draft prETS 300 683, Clause 9.7
30% (10ms), 60% (100ms), and 95% (5000ms) of 230 VAC nominal.
Type Approval Certification(s): see second page of Declaration of Conformity
578-100-019 Revision B
Page 2 of 4
DECLARATION OF CONFORMITY
PAGE TWO OF TWO
I, the undersigned, hereby declare that the equipment specified above conforms the above Directive(s) and
Standard(s).
Company Official: Arvin Danielson
Signature:
Position: Vice President
Signed Copy on File
Date: June 3, 1998
European Contact: Scott Mercer, Intermec International Incorporated, Sovereign House, Vasern Road, Reading,
Berkshire, RG1 8BT England; Phone INT+44 118 987 9400; Fax INT+44 118 987 9401
Product Type:
Product Name:
ITE/Residential, Commercial, and Light Industrial
Wireless LAN Access Point
Model Number: 6710
Product Option: RM111
Type Approval Certifications:
BRAZIL:
FCC ID: EHARM450P
CANADA:
1008 195 234A
CHILE:
FCC ID: EHARM450P
COLOMBIA:
FCC ID: EHARM450P
COSTA RICA:
FCC ID: EHARM450P
DENMARK:
97001D
Telestyrelsen
FINLAND:
Label added in Finland
GERMANY:
A129416H RM11
A132600J QE
HONG KONG:
FCC ID: EHARM450P
ICELAND:
Samþykkisnúmer IS-2454-00
ITALY:
DGPGF/SEGR/2/144/03/336451/AP/0000778
NORWAY:
Typegodkjenningsnummer
NO97000460-R
PERU:
FCC ID: EHARM450P
SPAIN:
E D.G.Tel 07 97 0100
SWEDEN:
Godkand av Post&Telestyrelsen
Ue970071
UNITED ARAB
EMIRATES:
No special markings
UNITED
KINGDOM:
W.T. License Exempt
ID: 11918 I-ETS 300 220
URUGUAY:
FCC ID: EHARM450P
VENEZUELA:
FCC ID: EHARM450P
Product Option: RM160
Type Approval Certifications:
ARGENTINA:
FCC ID: EHARM915P
AUSTRALIA:
FCC ID: EHARM915P
BRAZIL:
FCC ID: EHARM915P
CANADA:
1008 102 269
CHILE:
FCC ID: EHARM915P
COLOMBIA:
FCC ID: EHARM915P
COSTA RICA:
FCC ID: EHARM915P
MEXICO:
SCýT: RCPNORM97-319
PERU:
FCC ID: EHARM915P
PHILIPPINES:
FCC ID: EHARM915P
UNITED STATES:
FCC ID: EHARM915P
VENEZUELA:
FCC ID: EHARM915P
Product Option: RM180
Type Approval Certifications:
ARGENTINA:
FCC ID: EHARM24002PC
AUSTRALIA:
FCC ID: EHARM24002PC
AUSTRIA:
CEPT-RLAN A
BRAZIL:
FCC ID: EHARM24002PC
CANADA:
1008 101 760A
CHILE:
FCC ID: EHARM24002PC
COLOMBIA:
FCC ID: EHARM24002PC
COSTA RICA:
FCC ID: EHARM24002PC
DENMARK:
CEPT/RLAN/DK/9514
Telestyrelsen
FINLAND:
Label added in Finland
FRANCE:
96 0145 PP 0
GERMANY:
G128682H
578-100-019 Revision B
Page 3 of 4
GREECE:
ÁÑ×ÉÊÁ ÅËÅÃ×ÏÌÅÍÇ ÓÕÓÊÅÕÇ
×ÑÇÓÇ:ÌÅÔÁÖÏÑÁÓ ÄÅÄÏÌÅÍÙÍ
'Åãêñéóç Êõêëïöñéáò ÕÐÌÅ/ÄÔÅÅ/ÅÊ537
HONG KONG:
FCC ID: EHARM24002PC
ICELAND;
CEPT RLAN IS-2433-01
INDIA:
FCC ID: EHARM24002PC
ITALY:
CEPT-RLAN I
DCSR/2/4/144-03/335321/AT/0000158
KOREA:
Radio Type Registration
MEXICO:
SCýT: RCPNORM97-308
NETHERLANDS:
ministrie van verkeer en waterstaat
NL96030574
CEPT-RLAN NL
NORWAY:
CEPT-RLAN N
PERU:
FCC ID: EHARM24002PC
POLAND:
M£
Œ.H. Nr 042/98
SINGAPORE:
TAC No: PMREQ-WLAN-B-1028-96
SPAIN:
CEPT RLAN E 00 96 0431
SWEDEN:
Godkaend av Post- och Telestyrelsen
Ue 960004
CEPT-RLAN S Norand Corporation RM180
TAIWAN:
85G0069
TURKEY:
FCC ID: EHARM24002PC
UNITED
KINGDOM:
CEPT-RLAN GB
UNITED STATES:
FCC ID: EHARM24002PC
VENEZUELA:
FCC ID: EHARM24002PC
Product Option: RM188
Type Approval Certifications:
JAPAN:
578-100-019 Revision B
MKK Approved
Page 4 of 4
6710 Access Point
USER’S GUIDE
P/N 961-047-081
Revision C
July 1998
" NOTICE
This publication contains information proprietary to Intermec Technologies Corporation. It is being supplied to you with the express understanding that the information contained herein is for the benefit of the contracting party only, and may
not be copied, distributed, or displayed to third parties without the express written consent of Intermec Technologies Corporation, and shall be returned to Intermec Technologies Corporation upon written request. If a purchase, license, or
nondisclosure agreement has been executed, the terms of that agreement shall
govern this document.
This publication is furnished for information only, and the information in it is
subject to change without notice. Although every effort has been made to provide
complete and accurate information, Intermec Technologies Corporation assumes
no responsibility or liability for any errors or inaccuracies that may appear in this
document.
We welcome your comments concerning this publication. Although every effort
has been made to keep it free of errors, some may occur. When reporting a specific
problem, please describe it briefly and include the book title and part number, as
well as the paragraph or figure number and the page number.
Send your comments to:
Intermec Technologies Corporation
Publications Department
550 Second Street SE
Cedar Rapids, IA 52401
INTERMEC, NORAND, PEN*KEY, and TRAKKER are registered trademarks
and ANTARES and JANUS are trademarks of Intermec Technologies Corporation.
Ó
1996 Intermec Technologies Corporation. All rights reserved.
This publication printed on recycled paper.
Acknowledgments
Portions of this product contain software which is licensed from and is copyrighted
by Epilogue Technology Corporation, 1988--1995, all rights reserved.
DECnet and VT are registered trademarks of Digital Equipment Corporation.
Ethernet is a trademark of Xerox Corporation.
Hewlett-Packard and HP are registered trademarks and HP OpenView is a
trademark of Hewlett-Packard Company.
Microsoft is a registered trademark of Microsoft Corporation.
Netscape Navigator is a trademark of Netscape Communications Corporation.
Novell and NetWare are registered trademarks and IPX and SPX are trademarks
of Novell, Inc.
PC AT is a registered trademark of International Business Machines Corporation.
PROCOMM and PROCOMM PLUS are registered trademarks of DataStorm
Technologies, Inc.
Proxim and RangeLAN are trademarks of Proxim, Inc.
FCC Computer Compliance
" NOTICE
This equipment meets Class B digital device limits per Part 15 of FCC Rules.
These limits protect against interference in a residential area. It emits, uses, and
can radiate radio frequency energy. If you do not install and use the equipment
according to its instructions, it may interfere with radio signals. However, there is
no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception,
which can be determined by turning our equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the radio or television receiving antenna.
Increase the separation between the computer equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to
which the radio or television receiver is connected.
Consult the dealer or an experienced radio or television technician for
help.
FCC Spread Spectrum Radio Certification
" NOTICE
This device is certified to operate under Part 15, Subpart C, Section 15.247 of the
FCC rules for Intentional Radiation Products. This certification includes Docket
87-389 covering rules effective June 1994. It may not cause interference to
authorized radio communication devices, and must accept any interference caused
by those devices.
Antenna Requirements
" NOTICE
FCC rules section 15.203 and Canada’s RSS-210 require that this device be operated using an antenna furnished by Intermec Technologies Corporation. The antenna coupling on this product has been designed to accept only antennas
manufactured by us. Use of an antenna other than that furnished with the equipment is prohibited by FCC and Industry Canada rules.
Canadian Computer Compliance
This Class B digital apparatus meets all requirements of the Canadian
Interference-Causing Equipment Regulations.
Cet appareil numerique de la classe B respecte toutes les exigences du Reglement
sur le material boilleur du Canada.
Canadian Spread Spectrum Radio Certification
" NOTICE
This device complies with RSS-210 of Industry Canada. Operation is subject to
the following two conditions: (1) this device may not cause interference, and (2)
this device must accept any interference, including interference that may cause
undesired operation of the device.
Canadian 2.4 GHz Radio License
" NOTICE
This device requires a radio license, unless it is installed totally inside a building.
(Users must obtain this license)
Une licence radio est requise pour ces dispositifs, sauf pour ceux installés tout à
fait à l’intérieur d’un bâtiment. (Il faut que l’utilisateur obtienne cette licence.)
Telephone Installation Warning Notices
The following notices apply to equipment that may be connected to telephone lines
or systems. For your personal safety, and to protect this equipment from potential
electrical or physical damage, do NOT connect equipment to telephone lines or
data communication equipment unless the following warnings have been read,
understood, and complied with.
Never install telephone wiring during a lightning storm.
Never install telephone jacks in wet locations unless the jack is specifically designed for wet locations.
Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface.
Use caution when installing or modifying telephone lines.
Avoid using telephone (other than cordless type) during an electrical
storm. There may be a remote risk of electric shock from lightning.
Do not use the telephone to report a gas leak in the vicinity of the leak.
Installation du téléphone : avertissements
Les avertissements qui suivent s’appliquent à tout équipement qui peut être
branché aux lignes ou systèmes téléphoniques. Pour votre sécurité personnelle et
pour protéger l’équipement de tout dommage électrique ou physique potentiel, NE
PAS brancher un ordinateur tablette électronique ou ses périphériques aux lignes
téléphoniques ou équipements avant que les avertissements suivants aient été lus,
compris et observés :
Ne jamais installer de câblage téléphonique pendant un orage électrique.
Ne jamais installer de prise téléphonique dans un endroit humide à
moins que la prise ait été spécifiquement conçue pour être utilisée dans
les endroits humides.
Ne jamais toucher les fils de téléphone ou de l’équipement terminal non
isolés à moins que la ligne téléphonique n’ait été débranchée de l’interface réseau.
User de prudence lors de l’installation ou de la modification de lignes
téléphoniques.
Éviter d’utiliser un téléphone (autre qu’un appareil téléphonique sans
fil) pendant un orage électrique. Il pourrait y avoir un faible risque d’électrocution par la foudre.
Ne pas utiliser le téléphone afin de signaler une fuite de gaz à proximité
de la fuite.
B CAUTION:
Intermec Technologies Corporation suggests you buy cables from us
to connect with other devices. Our cables are safe, meet FCC rules,
and suit our products. Other cables may not be tested. They may
cause problems from electrostatic discharge or induced energy. Our
warranties do not cover loss, injury, or damage from other cables.
CONTENTS
SECTION 1
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1-1
Purpose of This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wireless Station User’s Guides . . . . . . . . . . . . . . . . . . . .
System Management Publications . . . . . . . . . . . . . . . . .
Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1-1
1-1
1-3
1-3
1-3
1-4
1-4
SECTION 2
Features and Functional Overview . . . . . . . . . . . . . . . . . . . .
2-1
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bridging Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Access Point Bridging Layer . . . . . . . . . . . . . . . . . . . . . .
Network Organization . . . . . . . . . . . . . . . . . . . . . . . .
Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pending Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Flooding Configurations . . . . . . . . . . . . . . . . . . . . . . .
Proxy ARP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bridge Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ethernet Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ethernet Port Filters . . . . . . . . . . . . . . . . . . . . . . . . .
Radio Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2-1
2-2
2-2
2-4
2-4
2-5
2-5
2-6
2-7
2-7
2-7
2-8
2-9
2-10
6710 Access Point User’s Guide
CONTENTS
ii
Configuration and Management . . . . . . . . . . . . . . . . . . . . . .
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Diagnostics and Configuration Port . . . . . . . . . . . .
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DHCP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Electronic Software Distribution . . . . . . . . . . . . . . .
TFTP Client and Server . . . . . . . . . . . . . . . . . . .
Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sample Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Power Cord . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Industrial Locking Mounting Bracket . . . . . . . . . . . . . .
2-11
2-11
2-11
2-12
2-12
2-12
2-12
2-13
2-13
2-13
2-13
2-14
2-14
2-16
2-19
2-19
2-19
SECTION 3
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-1
Checking the Default Configuration . . . . . . . . . . . . . . . . . . .
Preparing for the Installation . . . . . . . . . . . . . . . . . . . . . . . . .
Collecting the Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ethernet LAN Components . . . . . . . . . . . . . . . . . . . . . . .
10BASE2 Components . . . . . . . . . . . . . . . . . . . . . . . .
10BASE-T Component . . . . . . . . . . . . . . . . . . . . . . . .
10BASE5 Components . . . . . . . . . . . . . . . . . . . . . . . .
Communication Equipment . . . . . . . . . . . . . . . . . . . . . . .
Local DIAG Port Access . . . . . . . . . . . . . . . . . . . . . . .
Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Web Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Network Management Platform . . . . . . . . . . . . . . . . . . .
Finding the Best Location . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Site Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Installation Guidelines . . . . . . . . . . . . . . . . . . .
Mounting the Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . .
Horizontal (Tabletop) Mount . . . . . . . . . . . . . . . . . . . . . .
Vertical and Ceiling Mounts . . . . . . . . . . . . . . . . . . . . . . .
3-1
3-2
3-2
3-2
3-3
3-3
3-4
3-5
3-5
3-6
3-6
3-6
3-7
3-7
3-7
3-8
3-8
3-9
6710 Access Point User’s Guide
CONTENTS
Connecting to Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10BASE2 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
End of Segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Middle of Segment . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10BASE5 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
N-Series Transceiver . . . . . . . . . . . . . . . . . . . . . . . . . .
Vampire Tap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10BASE-T Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing PC Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WLIF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
900 MHz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
S-UHF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Applying Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3-10
3-11
3-11
3-12
3-13
3-13
3-13
3-16
3-17
3-17
3-18
3-19
3-20
SECTION 4
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4-1
Creating a Local DIAG Port Session . . . . . . . . . . . . . . . . . . .
Accessing the Configuration Menus . . . . . . . . . . . . . . . .
Accessing the ROM Command Monitor . . . . . . . . . . . . .
Creating a Telnet Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Default and Site Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the Access Point . . . . . . . . . . . . . . . . . . . . . . . . .
Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the View Command . . . . . . . . . . . . . . . . . . . . . . . .
TCP/IP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP Frame Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DHCP Server Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bootp Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Networks With DHCP and Bootp Servers . . . . . . .
Handshaking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Infinite Leases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Auto ARP Minutes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4-2
4-4
4-5
4-6
4-7
4-7
4-8
4-8
4-12
4-12
4-14
4-16
4-16
4-17
4-18
4-19
4-19
4-20
4-21
4-21
4-21
4-21
4-22
6710 Access Point User’s Guide
iii
CONTENTS
Bridge Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Serial Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lan ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Root] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Root Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Super Root Candidates . . . . . . . . . . . . . . . . . . . .
Super Root Selection . . . . . . . . . . . . . . . . . . . . . .
Super Root Redundancy . . . . . . . . . . . . . . . . . . .
[Global Radio] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Global Flooding] . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Inbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Outbound to Secondaries . . . . . . . . . . . . . . . . . .
Outbound to Stations . . . . . . . . . . . . . . . . . . . . . .
Flooding Level Checklist . . . . . . . . . . . . . . . . . . . . . .
S-UHF Flooding Level . . . . . . . . . . . . . . . . . . . . . . . .
Flood Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ARP Server Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Ports] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MAC Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hello Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ethernet Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL Frame Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cable Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Static Addresses] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Normal RX Filter] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Frame Types] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[SubTypes 1] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
User-Defined Subtypes in [SubTypes 1]
and [SubTypes 2] . . . . . . . . . . . . . . . . . . . . . . . . .
Filtering Examples . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
iv
6710 Access Point User’s Guide
4-23
4-23
4-23
4-24
4-24
4-24
4-25
4-25
4-25
4-27
4-27
4-28
4-28
4-29
4-30
4-31
4-36
4-36
4-36
4-38
4-39
4-39
4-40
4-40
4-41
4-41
4-42
4-42
4-43
4-44
4-46
4-46
4-48
4-49
4-50
CONTENTS
[Advanced RX Filter] . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Expressions] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ExprSeq . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Op . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Value Id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Values] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Bridging] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bridge Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Designated Bridge Candidates . . . . . . . . . . . . .
Designated Bridge Selection . . . . . . . . . . . . . . .
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Flood Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WLIF Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security Id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Node Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Master Parms] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Channel and Subchannel . . . . . . . . . . . . . . . . . . . . . .
Network With 15 or Fewer Access Points . . . .
Network With 16 or More Access Points . . . . .
Wireless Hops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Slave Parms] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MAC Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Manual MAC Parms] . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hop Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Beacon Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deferral Slot and Fairness Slot . . . . . . . . . . . . . . . .
Fragment Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Transmit Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Norm Ack Retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frag Ack Retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Norm QFSK Retry . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frag QFSK Retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
900 MHz Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mode--Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4-52
4-52
4-53
4-54
4-54
4-54
4-55
4-55
4-56
4-57
4-57
4-57
4-58
4-58
4-58
4-59
4-60
4-60
4-61
4-62
4-62
4-63
4-63
4-65
4-66
4-68
4-69
4-70
4-70
4-70
4-71
4-72
4-72
4-73
4-73
4-73
4-74
4-74
4-74
6710 Access Point User’s Guide
CONTENTS
vi
S-UHF Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Call Sign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Master Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Attach Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[IP Addresses] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[TX Filter] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Service Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Advanced Password . . . . . . . . . . . . . . . . . . . . . . . . . . .
Combining Radio Options . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Same LAN ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Different LAN IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a Web Browser Session . . . . . . . . . . . . . . . . . . . . . .
Configuration Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning Your Installation . . . . . . . . . . . . . . . . . . . . . . . .
Using the Configuration Guide . . . . . . . . . . . . . . . . . . . .
4-76
4-76
4-76
4-77
4-77
4-78
4-79
4-79
4-82
4-82
4-83
4-83
4-84
4-84
4-86
4-86
4-86
4-87
4-87
4-87
4-88
4-88
4-92
4-92
4-92
SECTION 5
Software Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5-1
File System Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Boot Segments 1 and 2 . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Segments 3 and 4 . . . . . . . . . . . . . . . . . . . . . . . . . . .
Active and Inactive Segments . . . . . . . . . . . . . . . . . . . . .
RAM Segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Segment Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Downloading Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fb Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fd Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fdel Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5-1
5-1
5-1
5-2
5-3
5-3
5-4
5-4
5-4
5-5
5-6
5-7
6710 Access Point User’s Guide
CONTENTS
Fe Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TFTP Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server Stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TFTP Client Commands . . . . . . . . . . . . . . . . . . . . . . . . . .
Get . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Put . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Script Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sample Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Script File Command Summary . . . . . . . . . . . . . . . . . . .
TFTP Client Command Retry . . . . . . . . . . . . . . . . . . . . .
Reboot Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SDVars Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ServerIpAddress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ScriptFilename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
StartTime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CheckPoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terminate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SetActivePointers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NextPowerUpTime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ROM Command Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting the Command Monitor . . . . . . . . . . . . . . . . . . .
Viewing ROM Commands . . . . . . . . . . . . . . . . . . . . . . . . .
B ...............................................
FX s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NPWD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SR z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PWD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FS s n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FB s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FFR f . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FPC f s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6710 Access Point User’s Guide
5-8
5-8
5-9
5-10
5-10
5-10
5-10
5-11
5-12
5-12
5-13
5-14
5-15
5-16
5-16
5-17
5-18
5-18
5-18
5-19
5-19
5-20
5-21
5-21
5-22
5-22
5-23
5-23
5-23
5-23
5-24
5-24
5-24
5-25
5-25
5-25
5-26
5-26
5-26
5-26
5-26
vii
CONTENTS
FPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MI String . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RMI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
X ............................................
Exiting the ROM Command Monitor . . . . . . . . . . . . . . .
Software Download Example . . . . . . . . . . . . . . . . . . . . . . . . .
Upgrading Through DIAG Port . . . . . . . . . . . . . . . . . . .
Starting the TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . .
Upgrading TFTP Clients . . . . . . . . . . . . . . . . . . . . . . . . . .
5-26
5-27
5-27
5-27
5-27
5-28
5-28
5-28
5-29
5-29
5-29
5-31
5-31
SECTION 6
Indicator Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ETHERNET Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
STATUS Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
STATUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NETWORK MODE Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PCMCIA Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Power-Up Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6-1
6-2
6-2
6-3
6-4
6-5
6-6
6-7
APPENDIX A
viii
Access Point Specifications . . . . . . . . . . . . . . . . . . . . . . . . .
A-1
Product Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Electrical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . .
Physical Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A-1
A-1
A-2
A-2
6710 Access Point User’s Guide
CONTENTS
APPENDIX B
WLIF Specifications and Antennas . . . . . . . . . . . . . . . . . . .
B-1
RM180 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Radio Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Part Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Antenna Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Whip Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remote Antenna Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Medium Gain Patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Medium Gain Collinear Dipole . . . . . . . . . . . . . . . . . . . .
High Gain Collinear Dipole . . . . . . . . . . . . . . . . . . . . . . .
High Gain Yagi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Antenna Adapter Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Model 2100 Antennas and Cables . . . . . . . . . . . . . . . . . . . . .
2.4 GHz Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.4 GHz Antenna Cables and Connectors . . . . . . . . . . .
B-1
B-2
B-2
B-3
B-3
B-3
B-3
B-4
B-4
B-5
B-5
B-6
B-6
B-6
APPENDIX C
900 MHz Specifications and Antennas . . . . . . . . . . . . . . . .
C-1
RM160 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Radio Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Part Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Antenna Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Whip Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remote Antenna Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
C-1
C-2
C-2
C-2
C-2
C-3
APPENDIX D
S-UHF Specifications and Antennas . . . . . . . . . . . . . . . . . .
D-1
RM111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Radio Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Part Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wireless Hops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Antenna Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Whip Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Site License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Transaction Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
D-1
D-2
D-2
D-3
D-3
D-3
D-4
D-4
D-4
6710 Access Point User’s Guide
ix
CONTENTS
Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Predicting Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing a Single Access Point . . . . . . . . . . . . . . . . . . .
Installing Multiple Access Points . . . . . . . . . . . . . . . . . .
Extending Coverage . . . . . . . . . . . . . . . . . . . . . . . . . .
Reusing the Frequency . . . . . . . . . . . . . . . . . . . . . . . .
Increasing System Throughput . . . . . . . . . . . . . . . .
Option 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Option 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frequency and Separation Guidelines . . . . . . . . . .
D-5
D-5
D-6
D-6
D-6
D-7
D-8
D-9
D-9
D-10
APPENDIX E
OWL/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Addressing Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installation Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Safeguards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Default Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Addressing Limitations and Flooding Restrictions . . .
Permanent Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Default Filter Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Subnet Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Password Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tunnel Origination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Building the Spanning Tree . . . . . . . . . . . . . . . . . . .
Establishing and Maintaining Tunnels . . . . . . . . .
Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frame Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Inbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Station Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mobile IP Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E-1
E-2
E-2
E-2
E-3
E-3
E-4
E-4
E-6
E-6
E-7
E-7
E-9
E-9
E-10
E-10
E-11
E-11
E-11
E-12
E-12
6710 Access Point User’s Guide
CONTENTS
OWL/IP Configuration Examples . . . . . . . . . . . . . . . . . . . . .
Example 1: Class C IP Addresses . . . . . . . . . . . . . . . . .
Step 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Option A: Unicast Addressing . . . . . . . . . . . . .
Option B: Directed Broadcast . . . . . . . . . . . . . .
Step 4: Set TX Filters . . . . . . . . . . . . . . . . . . . . . . . .
Example 2: Class B IP Address Using Subnetting . .
Step 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Option A: Unicast Addressing . . . . . . . . . . . . .
Option B: Directed Broadcast . . . . . . . . . . . . . .
Option C: All Subnets Broadcast . . . . . . . . . . .
Step 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E-13
E-13
E-15
E-15
E-15
E-16
E-16
E-17
E-19
E-19
E-19
E-21
E-21
E-21
E-22
E-23
APPENDIX F
Port and Cable Pin-Outs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
F-1
DIAG Port Pin-Outs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
AUI Port Pin-Outs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DIAG Port Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
F-1
F-2
F-3
APPENDIX G
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G-1
Product Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About This Product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MIB-II Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6710 Access Point MIB Information . . . . . . . . . . . . . . . . . . .
Access to Management Information . . . . . . . . . . . . . . . . . . .
MIB-II Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MIB Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G-1
G-1
G-2
G-2
G-3
G-4
G-6
G-6
6710 Access Point User’s Guide
xi
CONTENTS
MIB Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product OIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Interface Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SNMP Version 1 Configuration Group . . . . . . . . . . . . .
Bridging Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Control Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MIB Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G-8
G-8
G-9
G-12
G-17
G-18
G-22
G-23
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Glossary-1
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FIGURES
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
xii
Index-1
6710 Access Points . . . . . . . . . . . . . . . . . . . . . . . .
6710 Access Point Functions . . . . . . . . . . . . . .
Sample Network Configuration . . . . . . . . . . . .
Access Point Components . . . . . . . . . . . . . . . . . .
PC Card Slots . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2-1
2-2
2-15
2-16
2-17
Figure 3-1 T-Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-2 Cable Terminator . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-3 Cable With RJ45 Plugs . . . . . . . . . . . . . . . . . . . .
Figure 3-4 N-Series Transceiver . . . . . . . . . . . . . . . . . . . . . .
Figure 3-5 Vampire Tap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-6 Mounting Bracket . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-7 End of 10BASE2 Segment . . . . . . . . . . . . . . . . .
Figure 3-8 Middle of 10BASE2 Segment . . . . . . . . . . . . . . .
Figure 3-9 N-Series Transceiver . . . . . . . . . . . . . . . . . . . . . .
Figure 3-10 Vampire Tap . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-11 10BASE-T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 3-12 WLIF PC Card Assembly . . . . . . . . . . . . . . . . .
Figure 3-13 900 MHz PC Card Assembly . . . . . . . . . . . . . .
Figure 3-14 S-UHF PC Card Assembly . . . . . . . . . . . . . . . .
Figure 3-15 AC Power Input Connection . . . . . . . . . . . . . .
3-3
3-3
3-3
3-4
3-5
3-9
3-11
3-12
3-14
3-15
3-16
3-17
3-18
3-19
3-21
6710 Access Point User’s Guide
CONTENTS
Figure 4-1 Local Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 4-2 Telnet Session . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 4-3 Access Points Servicing IP Wireless
Stations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 4-4 Wireless Hopping Through WLIF Radios . . . .
Figure 4-5 OWL/IP Overview . . . . . . . . . . . . . . . . . . . . . . . .
Figure 4-6 Web Browser Session . . . . . . . . . . . . . . . . . . . . . .
4-49
4-65
4-80
4-89
Figure 6-1 Indicator Lights . . . . . . . . . . . . . . . . . . . . . . . . . .
6-1
Figure B-1 Antenna Adapter Cable . . . . . . . . . . . . . . . . . . .
B-5
Figure D-1 Extending Coverage . . . . . . . . . . . . . . . . . . . . . .
Figure D-2 Frequency Reuse . . . . . . . . . . . . . . . . . . . . . . . . .
Figure D-3 Increased System Throughput . . . . . . . . . . . . .
D-7
D-8
D-10
Figure E-1
Figure E-2
Figure E-3
Figure E-4
E-8
E-8
E-14
E-20
Secondary LAN . . . . . . . . . . . . . . . . . . . . . . . . . .
OWL/IP Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . .
Example Class C Configuration . . . . . . . . . . . .
Example Class B Configuration . . . . . . . . . . . .
TABLES
Table 4-1 Configuration Guide
Table 6-1
Table 6-2
Table 6-3
Table 6-4
Table 6-5
Table 6-6
......................
4-92
ETHERNET Indicator Lights . . . . . . . . . . . . . . .
Error Mode Status Codes . . . . . . . . . . . . . . . . . . .
MODE Indicator Light . . . . . . . . . . . . . . . . . . . . .
NETWORK MODE Indicator Lights . . . . . . . . .
PCMCIA Indicator Lights . . . . . . . . . . . . . . . . . . .
DIAG Port Baud Rates, ROM Mode . . . . . . . . . .
6-2
6-3
6-5
6-5
6-6
6-6
Table D-1 Coverage Prediction
......................
D-5
....................
E-13
MIB-II Information . . . . . . . . . . . . . . . . . . . . . . . .
MIB Information . . . . . . . . . . . . . . . . . . . . . . . . . .
MIB Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
products GROUP . . . . . . . . . . . . . . . . . . . . . . . . .
hw GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
fsinfo GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G-3
G-4
G-7
G-8
G-9
G-10
Table E-1 Mobile IP Comparison
Table G-1
Table G-2
Table G-3
Table G-4
Table G-5
Table G-6
4-3
4-6
6710 Access Point User’s Guide
xiii
CONTENTS
Table G-7 segment GROUP . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-8 dir GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-9 criticalErrors GROUP . . . . . . . . . . . . . . . . . . . . . .
Table G-10 nifx GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-11 portState GROUP . . . . . . . . . . . . . . . . . . . . . . . .
Table G-12 portStats GROUP . . . . . . . . . . . . . . . . . . . . . . . .
Table G-13 ptxq GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-14 pmsg GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-15 community TABLE . . . . . . . . . . . . . . . . . . . . . . .
Table G-16 trapTarget TABLE . . . . . . . . . . . . . . . . . . . . . . . .
Table G-17 rt GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-18 brg GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-19 addr GROUP . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-20 brgState GROUP . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-21 bridgeStats GROUP . . . . . . . . . . . . . . . . . . . . . .
Table G-22 powerUp GROUP . . . . . . . . . . . . . . . . . . . . . . . . .
Table G-23 softwareDownLoad GROUP . . . . . . . . . . . . . . .
xiv
6710 Access Point User’s Guide
G-10
G-11
G-11
G-12
G-13
G-14
G-15
G-16
G-17
G-17
G-18
G-19
G-20
G-20
G-22
G-23
G-23
Section 1
Preface
Purpose of This Guide
This user’s guide describes the installation, setup, and
maintenance of the 6710 Access Point. This guide covers
access point FLASH version 1.27 or greater and ROM
version 1.12 or greater.
Norand Corporation is now part of Intermec Technologies
Corporation. As part of our continuing efforts to offer the
broadest range of system solutions in the industry, the 6710
Access Point and other open wireless local area network
(LAN) components have been merged into the INTERMECR
Integrated Network Communications Architecture (INCA).
Where appropriate, we have continued to use the Norand
name in references to the open wireless LAN to maintain
continuity with existing product in the field.
Organization
This Preface describes the intended audience for this guide,
lists related publications, and tells how to contact the
Customer Response Center. Other sections do the
following:
Section 2,
“Features and
Functional
Overview”
Describes the access point and how
it operates on the open wireless
LAN. It also describes access point
components.
6710 Access Point User’s Guide
1-1
SECTION 1
Preface
Section 3,
“Installation”
Helps you prepare your site before
you install the access point, and
shows how to connect the access
point to 10BASE-T, 10BASE2, and
10BASE5 Ethernet.
Section 4,
“Configuration”
Describes how to create a
communications session with the
access point, access FLASH and
ROM, and set up the access point
through its configuration menus.
Section 5,
Describes file system methodology
“Software Download” and the functional characteristics
of the software download process.
Section 6,
“Indicator Lights”
Describes the access point’s
indicator lights and contains
troubleshooting tips.
Appendixes contain supplemental information:
Appendix A
Lists mechanical, electrical, and
environmental specifications for
the access point.
Appendix B
Lists specifications and antennas
for the WLIF radio.
Lists specifications and antennas
for the 900 MHz radio.
Lists specifications and antennas
for the synthesized UHF radio. It
also discusses UHF technology.
Appendix C
Appendix D
Appendix E
Appendix F
Appendix G
Describes OWL/IP (IP tunneling).
Shows port and cable pin-outs.
Describes the 6710 Management
Information Base (MIB).
The glossary at the end of this manual lists network terms.
1-2
6710 Access Point User’s Guide
SECTION 1
Preface
Intended Audience
This user’s guide is intended for these audiences:
Network administrator who is familiar with various
types and configurations of computer networks, how
they work, and the terminology used when discussing
them.
Hardware installer who is responsible for performing
the physical installation of the access point and any
related hardware that might be required.
Related Publications
The following publications are available. They include
information about hardware and software products related
to or used with the access point and the network on which it
operates.
Numbers in parentheses after the title indicate the
publication’s part number. Contact your Sales
Representative for ordering information.
Wireless Station User’s Guides
Wireless station user’s guides describe how to set up,
operate, and maintain radio terminals in each series of
terminal. Specific manuals are:
PEN*KEYR Model 6400 User’s Guide (961-047-093)
PEN*KEY Model 6500/6550 User’s Guide (961-047-099)
RT1100 Radio Terminal User’s Guide (961-047-069)
RT1700 Radio Terminal User’s Guide (961-047-068)
RT5900 Radio Terminal User’s Guide (961-047-121)
6710 Access Point User’s Guide
1-3
SECTION 1
Preface
System Management Publications
NORAND Open Wireless LAN with HP OpenView for
Windows User’s Guide (961-051-009)
This guide describes how to install and use the OpenView
for Windows network management platform by
Hewlett-Packard (HP).
OWLView for HP OpenView for UNIX User’s Guide
(961-051-011)
This guide describes how to install and use the OWLView
for HP OpenView for UNIX network management platform.
OWLView for HP OpenView for Windows User’s Guide
(961-051-010)
This guide describes how to install and use the OWLView
for HP OpenView for Windows network management
platform.
Customer Support
The goal of Intermec Technologies Corporation is 100
percent customer satisfaction. If you would like more
information about the access point or other open wireless
LAN system components, contact us through the Customer
Response Center.
In North America, call: 800-221-9236 or 319-369-3533
1-4
6710 Access Point User’s Guide
Section 2
Features and Functional Overview
This section describes the 6710 Access Point and how it
operates on the open wireless LAN. This section also
describes access point components.
Description
The 6710 Access Point provides transparent, wireless
communications between a wired Ethernet LAN and
wireless stations. Figure 2-1 shows current designs;
information in this user’s guide applies to both designs.
Figure 2-1
6710 Access Points
6710 Access Point User’s Guide
2-1
SECTION 2
Features and Functional Overview
The access point functions as a 4-port translating bridge.
Functionality within the access point can be partitioned
into two major functional blocks: bridging functionality
and management functionality. Bridging functions pertain
to the forwarding of data through the access point.
Management functionality involves configuration, software
upgrade, and network management.
Figure 2-2 is a simplified diagram showing the functions
within the access point.
Management and Configuration
Bridging
MIB
DHCP
SNMP
Agent
Forwarding
Database
TCP/IP
TFTP
File
System
HTTP
Port 2
(NIC 2)
Port 3
(NIC 1)
Port 4
(OWL/IP)
Bridging
Telnet
Proxy ARP
Network
Organization
Device
Configuration
RS-232 Diagnostics Port
Port 1
(Ethernet)
AUI
10BASE2
10BASE-T
Figure 2-2
6710 Access Point Functions
Bridging Functionality
General Concepts
Bridges are common components in wired LANs. Bridges
are devices that join two or more LAN segments. This
provides the appearance of a single LAN segment to the
protocols and applications that operate within the LAN.
2-2
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Bridges operate at the Media Access Control (MAC)
sublayer of the Data Link Layer (Layer 2) of the
International Organization for Standardization (ISO)
protocol model. Operating at the MAC layer allows bridges
to operate transparently to commonly used network
protocols such as TCP/IP, Novell SPX/IPX, NetBEUI, and
DECnet.
In wired LANs, bridges do the following:
Segment traffic for better efficiency and performance.
Extend the reach of LANs when cable length or node
limits have been reached.
Translate between different LAN types such as IEEE
802.3 Ethernet and 802.5 Token Ring.
A LAN environment normally consists of a collection of
nodes or stations, each identified by a unique 48-bit
physical address (also called an IEEE address or MAC
address). Data is sent on the LAN as frames or packets
that contain the source address of the station sending the
frame, and the destination address of the recipient station.
A bridge has at least two ports, each connected to a
different LAN segment. Bridges learn which source
addresses are generating traffic on each of their ports. If
the bridge receives a frame with a destination address
corresponding to a source address it has seen on another
port, it forwards the frame to the port. If it receives a
frame where the source and destination addresses are on
the same port, it ignores (drops) the frame, since the
destination node receives the original transmission.
Generally, if a bridge receives a frame for an unknown
destination address on any one port, it floods the frame on
all other ports.
6710 Access Point User’s Guide
2-3
SECTION 2
Features and Functional Overview
Access Point Bridging Layer
The 6710 Access Point functions as a bridge with up to four
ports:
An Ethernet port.
" One or two radio ports.
" An Open Wireless LAN/Internet Protocol (OWL/IP)
port.
The access point is a translating bridge because it forwards
frames between Ethernet and wireless media that have
unique physical and MAC protocol implementations. The
access point implements the basic learning and forwarding
functions of a simple wired LAN bridge. It also includes
additional functionality to address unique problems in
wireless LANs.
Significant functions supported at the bridging layer
include network organization, support for roaming and
power-managed stations, and programmable flooding levels.
Network Organization
Open wireless LAN networks may be complex, supporting:
Small or large numbers of access points on a single
wired LAN backbone.
" Stations that roam between coverage areas and
employ power management to improve battery life.
More complex topologies include the following:
2-4
Range extension through wireless access points, which
are not connected to the wired LAN backbone.
Secondary LANs (connection of wired LAN segments
by wireless links).
Mixed radio frequency (RF) media.
Operation over multiple IP subnets.
Multiple, independent wireless LANs on one wired
LAN backbone.
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Access points automatically configure into a self-organized
network using a spanning tree topology. They
automatically reconfigure the network to maintain reliable
operation as devices are added or removed, or in the event
of some types of wired LAN failure. The spanning tree
provides efficient, loop-free forwarding of frames through
the network and rapid roaming of mobile stations within
the network.
The spanning tree is initiated by the super root, an access
point that coordinates the network and distributes common
system parameters to other access points and stations. The
super root is elected from a group of access points
designated at the time of installation. The election process
also occurs in the event of a super root failure, preventing a
single point of failure.
Forwarding
The bridge maintains a forwarding database of all physical
station addresses known to the access point, and the correct
port for each address. This database makes efficient
forwarding decisions in the bridging software.
The database is updated through monitoring addresses on
each port, and by messages exchanged between access
points when stations roam. The database also includes the
power management status of each station, supporting the
pending message feature of the network.
Pending Messages
Wireless stations may use power management to maintain
battery life. These stations wake up periodically to receive
messages that may have arrived while their radio was
powered down. The bridging software provides a pending
message delivery service, allowing frames to be held until
the station is ready to receive them.
6710 Access Point User’s Guide
2-5
SECTION 2
Features and Functional Overview
Flooding Configurations
Standard LAN bridges flood frames on all ports when the
destination address is unknown. Additionally, many
network protocols use multicast addressing for connection
and status communications. A multicast frame is a special
type of frame destined for more than one physical address.
Standard bridges always flood multicast frames.
Most wireless media supported in the access point operate
at lower media speeds than Ethernet. Indiscriminate
flooding from a busy Ethernet backbone to a wireless
medium can consume a substantial portion of the available
wireless bandwidth. This reduces system performance even
though flooded frames are frequently not intended for
stations on a given wireless segment.
To allow performance tuning, the access point provides
separate flooding control options for both unicast (single
physical address) and multicast frames. Access points
serving as designated bridges connecting wired LAN
segments may be configured to use different flooding
settings than access points serving only wireless stations.
Two of the wireless media supported in the access point —
synthesized UHF (S-UHF) and 900 MHz — provide reliable
attach mechanisms, which guarantee that wireless stations
are always in the access point’s forwarding database.
Unicast flooding is never required for these stations.
The Wireless LAN Interoperability Forum (WLIF) 2.4 GHz
option also provides a reliable attach mechanism for
stations using the NORANDR Network Layer (NNL)
terminal emulation network protocol. Multicast flooding
levels are set for individual networks based on the needs of
wireless stations to receive multicast frames. For networks
with IP wireless stations only, the Proxy ARP Server
provides an option to enabling multicast flooding.
2-6
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Proxy ARP Server
The Proxy ARP Server is an advanced flooding control
capability for stations using IP. An ARP (Address
Resolution Protocol) is a type of multicast message used to
determine the physical (MAC) address of a station using a
specific IP address. When Proxy ARP is enabled, the IP
addresses of stations using IP are included in the
forwarding database. If the destination IP address matches
an entry in the forwarding database, the ARP is sent to the
physical unicast address matching that IP address.
To allow customization of this capability to optimize
performance, the server operates in one of the following
modes:
No flooding.
Delayed flooding.
Normal flooding.
Proxy ARP Server is discussed in more detail in Section 4,
“Configuration.”
Bridge Ports
The access point has the following physical ports:
An Ethernet port.
Two PC card slots capable of accepting a variety of
wireless Network Interface Cards (NICs).
The access point also has a logical OWL/IP port.
Ethernet Port
The Ethernet port can be configured to support 10BASE-T
twisted pair, 10BASE2 thinnet, or an AUI connection. The
AUI connection can support 10BASE5 thicknet or 10BASEF
fiber optic connections with the appropriate media
adapters.
6710 Access Point User’s Guide
2-7
SECTION 2
Features and Functional Overview
The physical connections are on the bottom panel of the
access point. The desired Ethernet medium is selectable
through the device configuration menus. Section 3,
“Installation,” has more information about connecting the
access point to Ethernet media. Section 4, “Configuration,”
describes how to set the medium through the configuration
menus.
Ethernet Port Filters
The Ethernet port can be configured to support a variety of
preconfigured and custom input filters. Access points are
commonly installed on LANs that carry traffic for wired and
wireless devices. Setting filters prevents unnecessary
traffic from the wired LAN from being forwarded onto the
wireless medium. This is important because common
wireless technologies operate at data rates below Ethernet
speeds.
Normally, filters are set to pass traffic known to be (or
likely to be) destined for wireless stations, and drop traffic
not destined for stations requiring wireless connectivity.
Filtering occurs in the Ethernet driver software that
controls low level operation of the Ethernet ports,
minimizing involvement of other functions when
unnecessary frames are received. In most installations, the
predefined filters are used. The default access point
configuration sets no filters. Filter setup is discussed in
more detail in Section 4, “Configuration.”
Filtering and flooding control (described on page 2-6) are
complimentary but have different functions. Filters allow
frames to be eliminated based upon content of the frame,
usually the network protocol header fields within the frame.
For example, filters can be set to eliminate some or all IP
traffic or Novell IPX traffic.
2-8
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Filtering occurs regardless of whether the destination
address is in the forwarding database. Using filters can
improve the performance of the access point and prevent
undesired frames from being forwarded to wireless stations
attached to the access point.
Flooding decisions are made after frames have been
received on a port and filtered. Flooding settings determine
how the access point forwards frames to destination
addresses not in the forwarding database.
Radio Ports
Each of the two radio ports in the access point are a
connection into a LAN segment consisting of all wireless
stations and access points that use the same wireless
technology, are within wireless communications range of
the access point, and are configured to communicate
together.
The two PC card slots are intended for wireless NICs and
are designated as NIC1 and NIC2. Internally, they are
configured as Port 3 and Port 2, respectively. The following
wireless options are currently supported:
WLIF (2.4 GHz).
" 900 MHz.
" 450 MHz S-UHF.
The different media options provide alternative coverage
and throughput tradeoffs. Radio media options are
described in more detail in Appendixes B, C, and D.
The access point also supports combinations of two adapters
for operation in mixed media systems; or, for WLIF radios,
a wireless access point capability. The following dual radio
configurations are supported:
WLIF and 900 MHz.
WLIF and S-UHF.
WLIF and WLIF (limited to Master/Slave
configuration for wireless access points).
6710 Access Point User’s Guide
2-9
SECTION 2
Features and Functional Overview
Configuration of individual radio options and the WLIF
wireless access point configuration are discussed in Section
4, “Configuration.”
OWL/IP Port
The OWL/IP port is a logical port used in installations
where the wireless infrastructure is required to operate
across multiple IP subnets; that is, in installations where
IP routers are used.
The OWL/IP port is an advanced capability that allows
stations supporting IP and nonroutable protocols such as
NNL (used in some terminal emulation installations) to
roam without losing connectivity when a wireless LAN
installation must extend over multiple IP subnets. In some
cases, OWL/IP may also provide connectivity in larger,
routed networks when roaming between IP subnets is not
required, but where it is desirable to configure a single
wireless network across router boundaries.
OWL/IP uses General Router Encapsulation (GRE), a
registered protocol from the TCP/IP protocol suite. GRE
allows frames destined for stations on a different IP subnet
to be encapsulated with an IP address that passes
transparently through routers. Encapsulation is also
sometimes referred to as tunneling.
To simplify configuration, OWL/IP functionality is treated
as an additional port within the access point architecture.
It is a logical port in that there is no physical radio or wired
LAN port associated with OWL/IP.
Encapsulated frames may be sent through any of the three
physical ports. Access points separated by one or more
routers may be thought of as originating and receiving
nodes on the two sides of a tunnel that is established
through the router.
2-10
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
The forwarding database entry for a station on the other
side of the tunnel includes the physical port (NIC1, NIC2,
or Ethernet) the frame should be forwarded through, and
an indication that encapsulation is required. The receiving
access point on the other side of the tunnel de-encapsulates
the frame and then forwards it on the correct physical port.
OWL/IP is described in more detail in Section 4,
“Configuration,” and Appendix E, “OWL/IP.”
Configuration and Management
Configuration
The access point can be configured through a local RS-232
connection, or remotely through a TCP/IP connection. The
access point includes a command monitor and menu driven
configuration with online help. The command monitor and
file system configuration are contained in permanent
read-only memory (ROM) within the access point, and can
be accessed through the RS-232 diagnostics port even if
software is not loaded in the access point.
Most access point functionality is provided by the software
stored within the file system. Configuration parameters
are stored in nonvolatile EEPROM memory, and are
maintained in the event of power loss.
Diagnostics and Configuration Port
An RS-232 configuration port is provided for direct access to
the access point’s command monitor and configuration
menus. Access through the diagnostics port is
password-protected for security.
6710 Access Point User’s Guide
2-11
SECTION 2
Features and Functional Overview
The port uses a standard PC AT style cable, and operates at
speeds up to 57.6 Kbps. Configuration using this port is
described in Section 4, “Configuration.”
Remote Access
Remote access is available over TCP/IP connections using
Telnet or Hypertext Transfer Protocol (HTTP) for
configuration management, and Simple Network
Management Protocol (SNMP) for network management.
TCP/IP
The access point supports remote access through a Request
for Comments (RFC) compliant TCP/IP stack. Before initial
usage, the stack must be initially configured with an IP
address and an optional default router through the RS-232
diagnostics port. Alternatively, the access point may be
configured with a Dynamic Host Configuration Protocol
(DHCP) server name. The access point then obtains its IP
address, default router, and subnet mask from a DHCP
server.
DHCP Client
The access point contains a DHCP client, allowing it to
receive an IP address over the network. The DHCP client
supports temporary and permanent leases. It also accepts
permanent leases from a Bootstrap Protocol (Bootp) server.
See Section 4, “Configuration,” for further detail on DHCP
operation.
Telnet
Telnet may be used to access the access point’s
configuration menus. The command interface is identical to
the command interface through the diagnostics port. See
Section 4, “Configuration,” for more information about
access through Telnet.
2-12
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
HTTP
The access point supports configuration using HTTP from a
workstation equipped with a Web browser. Internet
Explorer or Netscape Navigator is recommended. See
Section 4, “Configuration,” for more information about
access through a Web browser.
Electronic Software Distribution
The access point supports electronic software distribution,
which allows software upgrades after installation. The
access point provides a dual bank file system with one
active bank and one inactive bank. It operates from the
active bank, allowing software upgrades to be stored in the
inactive bank. This enables upgrades to be loaded while
the access point is operating.
The upgrade can be started immediately after downloading
by swapping the active and inactive banks and rebooting.
The access point can also be programmed to load the new
software at a later time, such as after all access points have
been upgraded or during a time of little system activity.
TFTP Client and Server
Software downloads are accomplished using the Trivial File
Transfer Protocol (TFTP), another member of the IP suite.
Each access point contains a TFTP client and server. The
TFTP client allows the access point to obtain software
updates from a TFTP server. The server can be an access
point configured with the TFTP server enabled, or another
network workstation with TFTP server capability.
Scripting
The access point supports a scripting capability that
automates most of the software download process. Scripts
can be uploaded to the access point through Telnet or
SNMP.
6710 Access Point User’s Guide
2-13
SECTION 2
Features and Functional Overview
Network Management
The access point is instrumented for network management,
with variables defined in the Management Information
Base (MIB). The MIB is SNMP V1 compliant.
Management information can be accessed through the
SNMP agent. The MIB may be ordered separately and
compiled for any SNMP network management platform.
Additional capabilities are supported in the OWLView
network management application for HP OpenView.
Appendix G, “MIB,” contains the 6710 Access Point MIB.
Consult the following documentation for more information
on network management:
NORAND Open Wireless LAN with HP OpenView for
Windows User’s Guide (961-051-009)
OWLView for HP OpenView for UNIX User’s Guide
(961-051-011)
OWLView for HP OpenView for Windows User’s Guide
(961-051-010)
Sample Configuration
Figure 2-3 shows a sample network configuration. It also
shows access points providing additional coverage and
wireless links to secondary Ethernet LANs.
" NOTE:
2-14
Consult Appendix D, “S-UHF Specifications and Antennas,” for
network configuration limitations for S-UHF systems.
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Terminal Emulation
Gateway
Host
LAN Server
Distribution LAN
6710 Access Point
6710 Access Points
Wireless Hop
6710 Access Point
(Designated Bridge)
Secondary Ethernet LAN
PEN*KEYR 6400
Computer
Notebook
(WLIF)
Desktop
PEN*KEY 6400
Computer
Figure 2-3
Sample Network Configuration
6710 Access Point User’s Guide
2-15
SECTION 2
Features and Functional Overview
Components
Figure 2-4 shows access point components, described on the
following pages. Not shown is the mounting bracket, which
attaches the access point to a wall or ceiling.
Figure 2-4
Access Point Components
2-16
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
1. Protective cover. The cover protects two Type II or
Type III PC card slots. Figure 2-5 shows where the
slots are located.
1. PC card slots
Figure 2-5
PC Card Slots
2. Indicator lights. Four pairs of indicator lights
(LEDs) on the front panel show the status of the
access point. During the power-up sequence, the
lights show the results of the power-up self diagnostics
and provide information about the operating status.
After the power-up sequence, the lights show the
current operating status and indicate if a problem
exists. Section 6, “Indicator Lights,” describes the
lights in detail.
6710 Access Point User’s Guide
2-17
SECTION 2
Features and Functional Overview
3. Rubber feet. Four nonskid rubber feet provide a
stable base for the access point when you place it on a
desktop or other horizontal surface.
When the mounting bracket is installed for an access
point mounted vertically or on the ceiling, the rubber
feet provide a small amount of tension to the bracket
to help hold it in place.
4. AC INPUT. The AC INPUT connector is a standard
IEC type, three-prong AC input connector. The power
cord attaches to this connector. The internal power
supply is an autosensing international power supply.
It accepts a source voltage between 85 and 264 V ac,
with a frequency between 47 and 63 Hz.
5. 10 BASE 2. The 10 BASE 2 port is a standard BNC
port through which the access point connects to
10BASE2 Ethernet (thinnet).
6. 10 BASE T. The 10 BASE T port is a standard RJ45
port through which the access point connects to
10BASE-T (UTP) Ethernet.
7. AUI. The AUI port is a 15-pin, D-subminiature
(D-sub) port. The access point connects to an AUI
network adaptor through this port, for connection to
10BASE5 Ethernet (thicknet). Appendix F, “Port and
Cable Pin-Outs,” contains pin definitions.
" NOTE:
Section 3, “Installation,” shows how to connect the access point to
10BASE2, 10BASE5, and 10BASE-T.
8. DIAG. The DIAG port is a 9-pin D-sub
communication port that communicates at RS-232
levels. Use this port to configure the access point,
download new software, and retrieve statistics.
Appendix F contains pin definitions.
2-18
6710 Access Point User’s Guide
SECTION 2
Features and Functional Overview
Accessories
Power Cord
The power cord connects the access point to the wall outlet.
The following chart lists power cord part numbers.
Country
Part Number
Australia
321-472-001
Denmark
321-501-001
Europe
321-473-001
Italy
321-471-001
Germany
321-515-001
United Kingdom
321-474-001
United States
321-054-001
Industrial Locking Mounting
Bracket
The Industrial Locking Mounting Bracket “locks” the access
point into the bracket. This bracket is recommended for
installations where vibration, shaking, or other movement
can dislodge the access point from its mount.
Item
Part Number
Mounting kit
203-386-001
6710 Access Point User’s Guide
2-19
SECTION 2
2-20
Features and Functional Overview
6710 Access Point User’s Guide
Section 3
Installation
This section describes how to:
Check the access point’s default configuration.
Prepare for the installation.
Collect the networking equipment you need.
Find the best location.
Connect to the Ethernet medium.
Install PC cards.
Apply power.
Checking the Default Configuration
The access point is shipped with default settings for system
software parameters, which are listed in Section 4,
“Configuration.” You may need to change some default
settings to achieve a more efficient configuration for your
site. See Section 4 for information about reconfiguring the
access point. The access point should be properly
configured before it is connected to the network.
6710 Access Point User’s Guide
3-1
SECTION 3
Installation
Preparing for the Installation
" NOTE:
Someone who knows and understands all applicable local building
codes and is proficient with the tools and equipment used to install
FCC Class B electromechanical devices should physically install the
access point.
Before you install the access point, unpack it and inspect it
for damage or missing parts. Save all the paperwork you
received. If the access point appears to be damaged, contact
the Customer Response Center for instructions on
returning the unit for replacement.
The shipment contains the access point with FLASH and
the following items:
Mounting bracket
AC power cord
Warranty card
Collecting the Equipment
Before you install the access point onto the network, collect
the equipment you will need.
Ethernet LAN Components
The access point directly connects to 10BASE2, 10BASE-T,
or 10BASE5 Ethernet medium. Consult a cabling reference
for maximum run lengths and node limits for Ethernet
wiring.
3-2
6710 Access Point User’s Guide
SECTION 3
Installation
10BASE2 Components
10BASE2 components include a T-connector, a cable
terminator, and the proper lengths of 10BASE2 coax cable.
The 10BASE2 T-connector (Figure 3-1) attaches to the
access point’s 10BASE2 port, and connects the access point
to the middle or end of 10BASE2 cable.
Figure 3-1
T-Connector
A cable terminator (Figure 3-2) attaches to the
T-connector. It is required for a device connected to the end
of 10BASE2 cable. The terminator properly terminates the
network cable to maintain proper impedance. Proper
termination is necessary for reliable Ethernet operation.
Figure 3-2
Cable Terminator
10BASE-T Component
10BASE-T coax cable is normally used to connect the
access point to an Ethernet hub. The cable has an RJ45
plug on each end (Figure 3-3).
Figure 3-3
Cable With RJ45 Plugs
6710 Access Point User’s Guide
3-3
SECTION 3
Installation
10BASE5 Components
10BASE2 components include the proper lengths of
10BASE5 coax cable, an AUI drop cable (less than or equal
to 50 feet/15 meters long), and a transceiver. Two types of
transceivers are the intrusive N-Series transceiver and the
nonintrusive vampire tap.
The N-Series transceiver (Figure 3-4) is a T-shaped
connector with a 15-pin AUI port and two type N
connectors. This transceiver is intrusive because network
service is disrupted while the coaxial cable is cut and a
threaded N-series connector placed on each end of the cable.
A 10BASEF (fiber optic) adapter may be attached directly
to the AUI connector.
Figure 3-4
N-Series Transceiver
The vampire tap is an insulation-piercing clamp device that
clamps onto the coaxial cable (Figure 3-5). The vampire tap
pierces the coaxial cable’s insulation and makes contact
with the shield and inner conductor without cutting the
cable.
3-4
6710 Access Point User’s Guide
SECTION 3
Installation
Figure 3-5
Vampire Tap
Communication Equipment
You can access the access point’s system software
configuration menus locally through the unit’s DIAG port,
or remotely through a Telnet session or Web browser.
Local DIAG Port Access
For local access, you need the following:
Third-party communications software terminal
emulation package with Y-modem capability (such as
PROCOMM PLUS by DataStorm Technologies, Inc.).
Install the program according to its user guide.
PC (personal computer) station, which should meet
the requirements outlined in the user guide for the
terminal emulation program.
Cable to connect the PC to the access point’s DIAG
port. The following chart lists cables.
6710 Access Point User’s Guide
3-5
SECTION 3
Installation
For this PC Port
Use Cable Part Number
9-pin
25-pin
226-106-001 (null modem cable)
321-355-001
Telnet
You need the following to access the configuration menus
through a Telnet session:
PC or workstation with an installed and configured
network interface card and a Telnet application. You
can also use a host capable of acting as a Telnet client.
Telnet VT emulator (TNVT) installed on the PC.
IP address for the access point. See Section 4 for more
information about IP addresses.
Web Browser
The access point’s configuration menus are designed for
HTML Level 2.0 or higher. You need the following to access
the configuration menus through a Web browser:
Graphical browser application.
Internet or local network connection.
IP address for the access point. See Section 4 for more
information about IP addresses.
Network Management Platform
To manage the system through a network management
platform, you need the platform (such as OpenView for
Windows by Hewlett-Packard) installed on a network
management station using SNMP. The station must meet
the requirements outlined in the platform’s user guide.
3-6
6710 Access Point User’s Guide
SECTION 3
Installation
Finding the Best Location
Site Survey
Intermec strongly recommends that Intermec or certified
providers conduct a site survey to determine the ideal
locations for all of your network components. A proper site
survey requires special equipment and training. A site
survey provides an installation recommendation that
addresses various factors, which can affect the performance
of your wireless LAN system.
General Installation Guidelines
Coverage in most sites requires a network of access points
to be installed. Radio coverage varies greatly with factors
such as building construction, number and type of
obstructions in the signal path, and the RF media in use.
Additional factors related to the intended use of the system
also dictate installation practices. The following general
practices should be followed in any installation:
Locate access points centrally within areas requiring
coverage.
Try to position the access point so its indicator lights
are visible. The lights are useful for troubleshooting
the installation.
Position antennas below roof trusses and away from
I-beams, racks, or other structures and obstructions.
Overlap access point coverage areas to avoid coverage
holes.
Install wired LAN cabling within node limit and cable
length limitations.
6710 Access Point User’s Guide
3-7
SECTION 3
Installation
Ensure that a power outlet is within 6 feet of the
access point. An uninterruptable power supply is
recommended when the ac power system is not
reliable.
Ensure that LAN and ac cables can reach the access
point after you install it. Leave sufficient room
around the access point so you can easily attach and
remove cables.
Do not locate an access point with the S-UHF radio
option in a computer room. RF emissions from the
higher speed processors in current-generation
computers may reduce system range.
Mounting the Access Point
You can mount the access point horizontally on a tabletop,
vertically on a wall or post, or on the ceiling.
Horizontal (Tabletop) Mount
1. Remove the mounting bracket from the bottom of the
access point. The bracket is not needed for a tabletop
installation.
2. Set the access point in position. The unit rests
securely on four rubber feet that keep it from slipping
out of place.
3. Make all Ethernet connections. See “Connecting to
Ethernet” on page 3-10.
4. Make all power connections. See “Applying Power” on
page 3-20.
5. Watch the indicator lights to verify that the access
point is working properly. See Section 6, “Indicator
Lights,” for help.
3-8
6710 Access Point User’s Guide
SECTION 3
Installation
Vertical and Ceiling Mounts
See Figure 3-6 and the procedure following it.
" NOTE:
If mounting the access point on a hollow wall, secure the mounting
plate to a 3/4” (thick) plywood base by four 1” X 1/4” nuts, bolts, and
washers. Anchor the plywood base to two separate wall studs by
four 2” X 1/4” diameter lag screws (two lag screws in each stud).
6.00"
1.00"
2.00"
1.00"
2.00”
1.00"
Figure 3-6
Mounting Bracket
6710 Access Point User’s Guide
3-9
SECTION 3
Installation
1. Inspect where the access point will be mounted and
determine what hardware is needed. Different
surfaces such as drywall, wood, and concrete block
require different mounting hardware. For this reason,
a universal mounting bracket is included with the
access point.
2. Remove the mounting plate from the bottom of the
access point.
3. Using the mounting plate as a template, mark where
the anchors that secure the mounting plate to the
surface should be located.
4. Attach the access point mounting plate to the wall or
ceiling with 2I x 1/4I diameter lag screws or bolts,
depending upon the surface. The mounting plate
must be secured to the surface by at least four
anchors, one on each corner.
5. Reattach the access point to the mounting plate.
6. Make all Ethernet connections. See “Connecting to
Ethernet.”
7. Make all power connections. See “Applying Power” on
page 3-20.
8. Watch the indicator lights to verify that the access
point is working properly. See Section 6, “Indicator
Lights,” for help.
" NOTE:
An optional locking kit is available. See Section 2, “Features and
Functional Overview,” for more information.
Connecting to Ethernet
The following pages show how to connect the access point to
10BASE2, 10BASE5, and 10BASE-T Ethernet.
3-10
6710 Access Point User’s Guide
SECTION 3
Installation
10BASE2 Ethernet
The access point connects to the end or middle of the
10BASE2 cable segment.
" NOTE:
Cable lengths between network devices on the 10BASE2 Ethernet
LAN must meet ANSI/IEEE standards.
End of Segment
See Figure 3-7 and the procedure following it.
10 BASE 2
10 BASE T
DIAG
AUI
AC INPUT
100/240 VAC
1. Cable terminator (50 ohm)
2. T-connector
3. 10BASE2 cable
Figure 3-7
End of 10BASE2 Segment
1. Plug the T-connector (2) into the 10 BASE 2 port.
2. Plug one end of the Ethernet cable (3) into an open
end of the T-connector. Align the notches in the cable
end with the posts on the T-connector, push the cable
in, and twist one-quarter turn.
3. Plug the cable terminator (1) into the other end of the
T-connector.
6710 Access Point User’s Guide
3-11
SECTION 3
Installation
Middle of Segment
See Figure 3-8 and the procedure following it.
10 BASE 2
10 BASE T
DIAG
AUI
AC INPUT
100/240 VAC
1. 10BASE2 cable
2. T-connector
Figure 3-8
Middle of 10BASE2 Segment
1. Plug the T-connector (2) into the 10 BASE 2 port.
2. Plug one end of the Ethernet coaxial cable (1) into an
open end of the T-connector. Align the notches in the
cable end with the posts on the T-connector, push the
cable in, and twist about one-quarter turn.
3. Plug the end of another Ethernet coaxial cable
segment into the other open end of the T-connector.
3-12
6710 Access Point User’s Guide
SECTION 3
Installation
10BASE5 Ethernet
The access point connects to 10BASE5 through an N-Series
transceiver or vampire tap.
" NOTE:
Cable lengths between network devices on the 10BASE5 Ethernet
LAN must meet ANSI/IEEE standards.
N-Series Transceiver
See Figure 3-9 and the following procedure.
1. Attach one end of the drop cable (1) to the AUI port.
2. Route the drop cable to the 10BASE5 cable (4) and
determine a suitable spot to cut the cable and attach
the transceiver (3).
3. Attach the transceiver to the 10BASE5 cable, then
connect the other end of the drop cable to the AUI port
(2) on the transceiver.
Vampire Tap
See Figure 3-10 and the following procedure.
1. Attach one end of the drop cable (1) to the AUI port.
2. Route the drop cable to the 10BASE5 cable and
determine a suitable spot on the cable to attach the
vampire tap (3).
3. Attach the vampire tap to the 10BASE5 cable, then
connect the other end of the drop cable to the AUI port
(2) on the tap.
6710 Access Point User’s Guide
3-13
SECTION 3
Installation
10 BASE 2
DIAG
AUI
10 BASE T
AC INPUT
100/240 VAC
1.
3.
4.
Drop cable
15-pin AUI port
N-Series transceiver
10BASE5 coax
Figure 3-9
N-Series Transceiver
3-14
6710 Access Point User’s Guide
SECTION 3
10 BASE 2
10 BASE T
Installation
DIAG
AUI
AC INPUT
100/240 VAC
1.
2.
3.
4.
Drop cable
15-pin AUI port
Vampire tap
10BASE5 coax
Figure 3-10
Vampire Tap
6710 Access Point User’s Guide
3-15
SECTION 3
Installation
10BASE-T Ethernet
See Figure 3-11 and the procedure following it.
10 BASE 2
10 BASE T
AUI
DIAG
AC INPUT
100/240 VAC
1. Cable with RJ45 plugs
2. RJ45 jack (or hub port)
Figure 3-11
10BASE-T
1. Plug the cable with RJ45 jacks (1) into the 10 BASE T
port.
2. Plug the other end of the cable into RJ45 jack or hub
port (2).
3-16
6710 Access Point User’s Guide
SECTION 3
Installation
Installing PC Cards
The following pages describe how to install WLIF, 900 MHz,
and S-UHF PC cards.
WLIF
The WLIF radio option is a Type III PC card that can be
installed in either slot. To install the card, see Figure 3-12.
1.
3.
4.
5.
6.
7.
Nonskid rubber feet (4)
Access point (no radio)
PC card (RM180)
Antenna cable
End plate
4-- 40 captive thumb screws
Hex nut and lock washer (supplied with antenna cable)
Figure 3-12
WLIF PC Card Assembly
6710 Access Point User’s Guide
3-17
SECTION 3
Installation
900 MHz
The 900 MHz radio option is a Type III PC card that can be
installed in either slot. To install the card, see Figure 3-13.
1.
3.
4.
5.
6.
7.
Nonskid rubber feet (4)
Access point (no radio)
PC card (RM160)
Antenna cable
End plate
4-- 40 captive thumb screws
Hex nut and lock washer (supplied with antenna cable)
Figure 3-13
900 MHz PC Card Assembly
3-18
6710 Access Point User’s Guide
SECTION 3
Installation
S-UHF
The S-UHF radio option is a Type II PC card that can only
be installed in the left-hand slot (with LEDs facing down).
To install the card, see Figure 3-14.
1.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Nonskid rubber feet (4)
Access point (no radio)
Sliding latch (open for RM111 adapter)
PC card (RM111)
Flex circuit
RM111 adapter
Radio bracket
Conductive washer
End plate
4-- 40 captive thumb screws
4-- 40 x .25 PH
Antenna adapter
10
11
12
Figure 3-14
S-UHF PC Card Assembly
6710 Access Point User’s Guide
3-19
SECTION 3
Installation
Applying Power
B CAUTION:
NEVER remove the cover of the access point with power
applied. ALWAYS make the access point connection before
making the connection at the source (“load to source”).
Damage to the radio or other devices can occur with the cover
removed.
" NOTE:
Connect the access point to an uninterruptable power source — a
power source that cannot be inadvertently turned off or otherwise
disconnected.
Power is applied to the access point through the grounded
AC INPUT connector. See Figure 3-15 and the following
procedure.
1. Plug the receptacle end of the power cord (1) into the
AC INPUT connector.
2. Insert the three-prong plug on the other end of the
power cord (2) into a grounded power outlet.
3. See Section 6, “Indicator Lights,” for descriptions of
the indicator lights.
3-20
6710 Access Point User’s Guide
SECTION 3
10 BASE 2
10 BASE T
Installation
DIAG
AUI
AC INPUT
100/240 VAC
1. Receptacle on power cord
2. Three-prong plug
Figure 3-15
AC Power Input Connection
6710 Access Point User’s Guide
3-21
SECTION 3
3-22
Installation
6710 Access Point User’s Guide
Section 4
Configuration
This section describes how to:
Create a local DIAG port, Telnet, and Web browser
session with the access point.
" Access the access point’s FLASH and ROM.
" Set up the access point through its configuration
menus.
You can configure the access point locally through its DIAG
port, or remotely through Telnet or a Web browser. The
following chart shows the sessions you can use to do other
tasks.
Task
DIAG Port
Telnet
Browser
Change configuration passwords
Modify the configuration
Ö
Ö
Ö
Ö
Ö
Ö
Upgrade FLASH
Ö
Ö
Check the FLASH version
Ö
Ö
Access ROM
Ö
Check the ROM version
Ö
Use online help
Ö
Ö
Ö
6710 Access Point User’s Guide
4-1
SECTION 4
Configuration
Only one type of session can be running at a time. For
example, if someone starts a Telnet session while someone
else is configuring the access point through its DIAG port,
the configuration through the DIAG port will terminate.
Creating a Local DIAG Port Session
In summary, you establish a local DIAG port session with
the access point through a VT100 terminal emulation
program. Most general purpose communications software
(such as PROCOMM PLUS) supports this emulation.
To create a session, see Figure 4-1 and the procedure
following it. You should carefully review the procedure first
to become familiar with the process.
4-2
6710 Access Point User’s Guide
SECTION 4
Configuration
10BASE2
10BASET
AUI
DIAG
AC INPUT
100/240 VAC
1. PC with terminal emulation program
2. Cable: 321-355-001 for a 25-pin PC COM port
or
Cable: 226-106-001 for a 9-pin PC COM port
(standard null modem cable)
3. 6710 Access Point DIAG port
Figure 4-1
Local Session
1. Ensure the terminal emulation program is installed
on the PC.
2. With both the PC and access point powered OFF,
connect the communication cable to the appropriate
PC COM port.
6710 Access Point User’s Guide
4-3
SECTION 4
Configuration
3. Connect the other end of the communication cable to
the DIAG port on the access point. Turn the PC on.
4. After the PC boots, start the terminal emulation
program.
5. Set the terminal emulation program’s options
according to what you want to do: Access the
configuration menus, or access the ROM command
monitor.
Accessing the Configuration
Menus
1. Set the terminal emulation parameters in your
communications software. If you are configuring this
access point for the first time, set the parameters to
the access point’s default settings:
9600, 8N1, full duplex
If you have already changed the default settings, set
the parameters to those you set in FLASH mode
through the configuration menus.
2. Plug the access point into the outlet. These messages
appear:
QXS6700K
Executing file USTART29.BIN from segment
Quickly press a key to perform configuration before startup
Starting system
3. To access the configuration menus, wait until you see
the message “Quickly press a key to perform
configuration before startup.” Press any key to access
the configuration menus.
4. See “Configuring the Access Point” on page 4-12.
4-4
6710 Access Point User’s Guide
SECTION 4
Configuration
Accessing the ROM Command
Monitor
1. Set the terminal emulation parameters in your
communications software. If you are configuring this
access point for the first time, set the parameters to
the default settings for ROM mode:
9600, 8N1, full duplex
If you have already changed the default settings, set
the parameters to those you set in ROM mode through
the ROM command monitor.
2. Plug the access point into the outlet. These messages
appear:
QXS6700K
Executing file USTART29.BIN from segment
Quickly press a key to perform configuration before startup
Starting system
3. Press any key within 5 seconds of the first ROM
message.
Note that if the access point is in Power-Up Quiet
mode (versus Power-Up Normal mode, the default
setting), the ROM messages do not display. More
information about Power-Up Quiet (PQ) mode and
Power-Up Normal (PN) mode starts on page 5-27 in
Section 5, “Software Download.”
4. See page 5-22 in Section 5, “Software Download,” for
information about the ROM command monitor.
6710 Access Point User’s Guide
4-5
SECTION 4
Configuration
Creating a Telnet Session
Before you can configure the access point through Telnet,
you must connect the unit to the Ethernet cable. (See
Section 3, “Installation,” for help.) You must also perform
initial configuration through the DIAG port to:
" NOTE:
Set an IP address or DHCP server name. You should
also configure a subnet mask and IP router address.
Set the Ethernet cable type.
The access point includes an autodetect feature that senses the
Ethernet medium if traffic is present. If no traffic is present on the
cable, the system software defaults to 10BASE-T. For most
installations, it is recommended that you explicitly set the Ethernet
type.
The access point must go through its boot sequence before
you can create a Telnet session. If you reboot the unit while
in a session, the session terminates. You can create a new
session after the unit reboots.
To create a Telnet session, see Figure 4-2 and the procedure
following it.
Ethernet LAN
Telnet
1. PC or workstation with Telnet VT emulator (TNVT)
2. 6710 Access Point
Figure 4-2
Telnet Session
4-6
6710 Access Point User’s Guide
SECTION 4
Configuration
1. Ensure the access point is connected to the Ethernet
cable, and has an assigned IP address and cable type.
2. Ensure the PC or workstation has an installed and
configured Ethernet interface card.
3. Ensure the Telnet VT emulator is installed on the PC
or workstation.
4. Open a new Telnet session on the PC or workstation.
5. Enter the access point’s IP address in the host name
or IP address field.
6. See “Configuring the Access Point” on page 4-12.
Default and Site Settings
The access point is factory configured with the default
settings listed in the following charts. You may need to
change the defaults to match the way your system is set up.
You can record your site’s settings in the table for reference.
TCP/IP
Option
Default
IP Address
IP Subnet Mask
IP Router
IP Frame Type
DHCP
0.0.0.0
255.255.255.0
0.0.0.0
DIX
Enabled, if IP Address is zero
Norand DHCP Server
DHCP Server Name
Auto ARP Minutes
Site Setting
6710 Access Point User’s Guide
4-7
SECTION 4
Configuration
Security
Option
Default
Password
Service Password
Advanced Password
CR52401
Enabled
“” (empty string)
Site Setting
Bridge
Option
Default
Serial Number
Lan ID
[Root]
Root Priority
[Global Radio]
UHF Rfp Threshold
Set Globally
Value
UHF Frag Size
Set Globally
Value
Falc Frag Size
Set Globally
Value
Awake Time
Set Globally
Value
[Global Flooding]
Inbound
Multicast
Unicast
Outbound to Secondaries
Multicast
Unicast
Outbound to Stations
Multicast
Unicast
(Read-only)
4-8
6710 Access Point User’s Guide
Disabled
70
Disabled
250
Disabled
250
Disabled
Primary
Disabled
Disabled
Disabled
Disabled
Disabled
Site Setting
SECTION 4
Option
[Ports]
Ethernet port:
Name
MAC Address
Status
Hello Period
[Ethernet]
OWL Frame Type
Cable Type
[Static Addresses]
[Normal RX Filter]
[Frame Types]
Action
Scope
[SubTypes 1]
Action
SubType
Scope
[SubTypes 2]
Action
SubType
Scope
[Advanced RX Filter]
[Expressions]
ExprSeq
Offset
Op
Value Id
Action
[Values]
Value
[Bridging]
Bridge Priority
Status
Flood Register
Default
Configuration
Site Setting
omde
(Unique number)
Enabled
2 seconds
DIX
Auto Detect
00:00:00:00:00:00
Pass
Unlisted
Pass
(Various)
(Various)
Pass
DIX--IP--TCP--Port
00 00
EQ
And
Enabled
Disabled
6710 Access Point User’s Guide
4-9
SECTION 4
Configuration
Option
WLIF radio port:
Name
MAC Address
Status
Hello Period
[WLIF]
Security Id
Node Type
[Master Parms]
Channel
Subchannel
Wireless Hops
MAC Config
[Manual MAC Parms]
Hop Period
Beacon Frequency
Deferral Slot
Fairness Slot
Fragment Size
Transmit Mode
Norm Ack Retry
Frag Ack Retry
Norm QFSK Retry
Frag QFSK Retry
900 MHz radio port:
Name
MAC Address
Status
Hello Period
[Falcon]
File Name
Mode--Channel
ARP Server Mode
4-10
6710 Access Point User’s Guide
Default
omdpxma
(Unique number)
Enabled
2 seconds
NORANDOWL
Master
Disabled
Default
200 ms
Default
Default
310
AUTO
255
255
255
255
omdflca
(Unique number)
Enabled
1 second
falcon_d.29k
(First mode in list)
Disabled
Site Setting
SECTION 4
Option
S-UHF radio port:
Name
MAC Address
Status
Hello Period
[UHF]
File Name
Call Sign
Frequency
Master Mode
Attach Priority
OWL/IP port:
Name
MAC Address
Status
Hello Period
[OWL/IP]
Mode
[IP Addresses]
Type
Address
[TX Filter]
[Frame Types]
Action
Scope
[SubTypes 1]
Action
SubType
Scope
[SubTypes 2]
Action
SubType
Scope
Default
Configuration
Site Setting
omduhfb
(Unique number)
Enabled
2 seconds
synuhf_d.29k
“” (empty string)
(First frequency in list)
Disabled
High
omdip
(Unique number)
Enabled
2 seconds
Listen
Unicast
(None)
Pass
Unlisted
Pass
(Various subtypes)
(Various settings)
Pass
DIX--IP--TCP--Port
00 00
6710 Access Point User’s Guide
4-11
SECTION 4
Configuration
Configuring the Access Point
When you create a local DIAG port or remote Telnet session
with the access point, the configuration program’s password
screen appears:
Configuration of Access Point
Copyright (c) 1995-1997 Norand Corporation.
All rights reserved.
Portions copyright Epilogue Technology Corporation 1988-1995.
All rights reserved
IP:
Serial:
0.0.0.0
(Unique 10-digit number.)
Password:
" NOTE:
A different screen appears when you create a session through a
Web browser. See page 4-88 for information about Web browser
sessions.
The password screen shows the current settings for the IP
address and serial number. It also shows the prompt for
the top-level password. Enter the password (case
insensitive) to display the Main Menu. The default
password is CR52401.
Main Menu
After you enter the top-level password, the Main Menu
appears:
4-12
6710 Access Point User’s Guide
SECTION 4
Configuration
Loading configuration from EEPROM
Command
File
View
Clear
Read
Write
Reboot
Exit
Description
File system menu
View/modify the configuration
Set the configuration to default values
Read the configuration from EEPROM
Write the configuration to EEPROM
Restart using last written configuration
Disconnect
Display this help
The menu lists the commands you can use to do various
tasks, described on the following pages. The screen also
displays the command prompt (>). At the prompt, type the
name of the command you want to perform and press
[Enter]. (Commands are case insensitive.) The Main Menu
redisplays when you enter an invalid command.
The following chart describes how to use the commands.
Use
To
File
List file system commands and descriptions.
Section 5, “Software Download,” describes the
commands and file system methodology.
View or modify configuration program settings.
See “Using the View Command” on page 4-14.
View
Clear
Read
Reset the access point’s configuration to the factory-set default settings, which start on page 4-7.
Load the most recent configuration from
EEPROM. The configuration that was written to
EEPROM since the access point was last
rebooted becomes the new configuration.
6710 Access Point User’s Guide
4-13
SECTION 4
Configuration
Use
To
Read
The access point’s configuration is stored in
(Continued) EEPROM. You reprogram the EEPROM
whenever you change the configuration, write
(save) the new configuration to EEPROM, and
reboot the access point.
Write
Write (save) a new configuration to EEPROM.
This command overwrites the previous configuration. You must write the new configuration
to EEPROM and reboot the access point for
any changes to take effect.
Reboot
Reboot the access point. You must reboot the unit
for any changes you made to the configuration to
take effect.
Exit
Quit the configuration program. If you exit a new
configuration without writing it to EEPROM, any
changes you made are not saved.
Display online help for a command, option, or
setting.
Using the View Command
To view or modify configuration program settings, type
View at the command prompt. The Main Options Menu
appears:
[Tcpip]
[Bridge]
[Security]
The following chart describes how to use the options.
4-14
6710 Access Point User’s Guide
SECTION 4
Configuration
Use
To
[Tcpip]
Page 4-16
Set options necessary for communications with
this access point. The options apply to all
TCP/IP ports. Telnet, SNMP, and HTTP
communications are supported.
Control the bridging of messages among the
radio and Ethernet ports for this access point.
Settings to control interaction with other access
points are also under the [Bridge] option.
Set the configuration program’s top-level
password and other security passwords.
[Bridge]
Page 4-23
[Security]
Page 4-86
The screens in this section show the options’ default
settings. Some settings (such as the serial number) are
unique to each access point. Other settings (such as certain
radio configurations) are automatically set and you cannot
change them. This section identifies the settings you
cannot change as “read-only.”
The following chart shows how to navigate the View
command’s menus and edit data.
Press
To
[-] or [--]
Scroll up through items in a list.
[¯], [+], [=], or [Tab]
Scroll down through items in a list.
[®], [Enter], or [Spacebar] Display an option’s settings or
prompt after you highlight the
option. Also use these keys to
select the desired setting.
[¬], [Esc], or [Backspace] Exit a menu or prompt.
[Esc]
Cancel editing.
[Enter]
Complete editing.
6710 Access Point User’s Guide
4-15
SECTION 4
Configuration
TCP/IP Options
Use [Tcpip] to set options necessary for communications
with this access point, such as IP addresses. Addresses are
required for remote setup or SNMP network management.
Options are:
IP Address
IP Subnet Mask
IP Router
IP Frame Type
DHCP
DHCP Server Name
Auto ARP Minutes
0.0.0.0
255.255.255.0
0.0.0.0
“Norand DHCP Server”
IP Address
IP Address is the unique address locally assigned to this
access point. The prompt is:
Range is:
4 nums 0..255
The default is 0.0.0.0, which disables the ability to use
TCP/IP. Following are suggestions for setting the address:
4-16
If you are installing this access point on an existing
Ethernet segment, you should allocate the IP address
from the same pool as the existing computers on the
segment.
If you are installing this access point on a new
Ethernet segment that is not going to connect to the
Internet, try using this Class B address:
172.16.h.h
6710 Access Point User’s Guide
SECTION 4
Configuration
The host number is “h.h.” This Class B network
address is reserved by the numbering authority for a
company’s internal use. If the Class B address
appears on the Internet, routers drop the data.
Note the following:
If the IP address is 0.0.0.0 and DHCP is set to
“Enabled, if IP address is zero,” this IP address is
obtained through DHCP.
" If DHCP is set to Enabled, DHCP is used to obtain the
IP address.
" If the IP address is 0.0.0.0 and DHCP is disabled,
TCP/IP access to this access point is disabled.
A discussion of DHCP starts on page 4-19.
IP Subnet Mask
IP subnets partition traffic and are connected by routers.
The subnet mask indicates how many bits of the IP address
represent a network number and how many indicate a host
number. The prompt is:
Range is:
4 nums 0..255
The default is 255.255.255.0. Following are suggestions for
setting the subnet mask:
If you are installing this access point on an existing
Ethernet segment, the subnet mask should match the
other computers on the segment.
If you are using the 172.16.h.h address suggested for
IP Address, you may want to use a subnet mask of
255.255.248.0. This mask provides the network
172.16 with 30 subnets of 2046 computers each.
The IP address breakdown is:
6710 Access Point User’s Guide
4-17
SECTION 4
Configuration
16 bits of network address.
" 5 bits of subnet address. Do not use all 0’s or all
1’s.
" 11 bits of host address. Do not use all 0’s or all
1’s.
The following chart lists IP addresses when the submask is
255.255.248.0.
Subnet
30
First Address
172.16.8.1
172.16.16.1
172.16.24.1
Last Address
172.16.15.254
172.16.23.254
172.16.31.254
172.16.240.1
172.16.247.254
If you are using DHCP to obtain an IP subnet mask for this
access point, the subnet mask obtained from DHCP
overrides the setting for the IP Subnet Mask option.
IP Router
" NOTE:
The IP address of the router is required only if this access point will
communicate with devices on the other side of the router.
IP Router identifies the default router used to forward data
frames to addresses on another subnet. The prompt is:
Range is:
4 nums 0..255
The default is 0.0.0.0, which disables the ability to
exchange TCP/IP traffic with another subnet or network.
4-18
6710 Access Point User’s Guide
SECTION 4
Configuration
A router that connects subnet 1 to subnet 2 might have the
address 172.16.8.1 on subnet 1 and 172.16.16.1 on subnet 2.
A host with IP address 172.16.16.5 would specify an IP
router address of 172.16.16.1 to reach host 172.16.8.10.
IP routers are usually configured so a computer only needs
to know one router’s address. This is true even if several
routers on the segment connect to several other segments.
If you are using DHCP to obtain an IP router address, and
the DHCP server specifies a default IP router, the DHCP
server specification overrides the setting for IP Router.
IP Frame Type
IP Frame Type sets the type of frame containing IP traffic:
DIX
802.3
Setting
Description
DIX (default)
Sets Ethernet type to DIX (Ethernet 2.0) for IP
frames.
Sets Ethernet type to 802.3 with a SNAP header
for IP frames. Select 802.3 if other network
computers use SNAP encapsulation for IP
frames.
802.3
DHCP
DHCP provides a way for this access point (the client) to
obtain IP addresses from a DHCP server on the network.
Settings are:
Enabled
Enabled, if IP address is zero
Disabled
6710 Access Point User’s Guide
4-19
SECTION 4
Configuration
Setting
Description
Enabled
DHCP always obtains IP addresses for the
access point, subnet mask, and (optional)
default router when the access point reboots.
It also obtains the lease expiration time.
If IP Address is 0.0.0.0, DHCP obtains IP
addresses for the access point, subnet mask,
and (optional) default router. It also obtains
the lease expiration time. The access point
ignores other DHCP configuration options.
Disables DHCP. You must manually set the IP
addresses before the TCP/IP stack is enabled.
Enabled, if IP
address is zero
(default)
Disabled
" NOTE:
If you are using OWL/IP tunneling, you should not use DHCP to
allocate IP addresses to super root candidates or designated bridges
unless a permanent lease is used, and the access point is rebooted
after getting an address. OWL/IP options start on page 4-79.
The access point responds only to address offers from
DHCP or Bootp servers. In either case the server is
specified in the DHCP server name field.
DHCP Server Name
The prompt for the DHCP server name is:
Range is:
31 chars
The access point responds only to the named server. The
default server name is “Norand DHCP Server.” This name
prevents the access point from inadvertently obtaining an
IP configuration from existing servers on the network.
If the DHCP server name is configured with a null string
(“”), the access point responds to offers from any server.
4-20
6710 Access Point User’s Guide
SECTION 4
Configuration
The class identifier string for the access point is “Norand
Access Point.” Servers use this string to identify the access
point.
Bootp Operation
The access point can also accept addresses from a Bootp
server identified in the DHCP server name field. An
address offer from a Bootp server is treated as if it were an
infinite lease from a DHCP server.
Networks With DHCP and Bootp Servers
If the DHCP server name is configured as “”, the access
point responds to either DHCP or Bootp servers. The
access point gives preference to DHCP offers. If a Bootp
reply arrives at the access point before any DHCP offers are
received, the access point waits an additional 4 seconds for
a DHCP offer before responding. If a DHCP offer is
received within the 4-second period, the Bootp reply is
ignored and the DHCP offer is accepted.
Handshaking
When the access point responds to a DHCP or Bootp server,
it broadcasts a single ARP request to the address offered. If
no ARP response is received within 3 seconds, the access
point assumes the IP address is unique and completes the
negotiation for that address. If an ARP reply is received
before the timeout, the access point assumes the address is
a duplicate and declines the offer.
Infinite Leases
A DHCP server may be configured to grant an infinite lease
to the access point. A Bootp grant is always treated as an
infinite lease. The access point stores the IP address,
subnet mask, and default router in the EEPROM
configuration register and disables DHCP. These settings
are maintained if the access point is powered off or rebooted
through the ROM command monitor. To restore DHCP
client operation, reconfigure the IP address to 0.0.0.0.
6710 Access Point User’s Guide
4-21
SECTION 4
" NOTE:
Configuration
DHCP is documented in RFCs 1533, 1534, and 1541. Bootp is
documented in RFC 951.
Auto ARP Minutes
The access point periodically sends an unsolicited ARP
response so routers can update their routing tables. The
response enables a network management platform to learn
about the access point on the network by querying routers.
Auto ARP Minutes is the number of minutes between
periodic ARP requests. The prompt is:
Range is:
0..120
The default is 5 minutes. A setting of 0 disables Auto ARP
Minutes.
If the default router’s address is 0, the ARP request is sent
to the IP address of this access point. Without the Auto
ARP Minutes option, an access point might not use its IP
address for extended periods of time and expire from the
router’s ARP table.
Auto ARP Minutes enhances the discovery of the network
architecture by network management tools, such as
OpenView by Hewlett-Packard. The network management
tool queries IP router ARP tables to locate the active IP
addresses for the subnet IP addresses for access points
should not be allowed to expire. The network management
program would then need to ping all potential addresses on
a subnet to locate active IP addresses, or require the user to
enter a list.
4-22
6710 Access Point User’s Guide
SECTION 4
Configuration
Bridge Options
Use [Bridge] to configure options that define the bridging
topology of the open wireless LAN. Options are:
Serial Num ber
Lan ID
[Root]
[Ports]
ARP Server Mode
“(Unique 10-digit number.)”
Serial Number
Serial Number is a read-only setting that displays this
access point’s unique 10-digit serial number, which
identifies this unit on the network.
Lan ID
The LAN ID (also called domain) is a number that logically
isolates adjacent but independent open wireless LANs. The
prompt is:
Range is:
0..254
Following are ranges:
" NOTE:
900 MHz and S-UHF radios: 0 (default) to 254.
WLIF radio: 0 to 15.
For mixed systems containing WLIF radios, you must use LAN ID 0
to 15.
6710 Access Point User’s Guide
4-23
SECTION 4
Configuration
You should change the default of 0 to another number to
avoid a potential conflict with an adjacent network. All
access points and wireless stations in the same network
must have the same LAN ID.
" NOTE:
See page 4-87 for information about combining WLIF, 900 MHz, and
S-UHF radios in a common network by following basic guidelines for
LAN ID and controller setup.
[Root]
[Root] options apply to access points configured to operate
as the super root. They should be set to the same settings
in all access points with a nonzero root priority configured.
Options are:
Root Priority
[Global Radio]
[Global Flooding]
Root Priority
Root Priority determines which access points are candidates
to become the super root node on the distribution LAN (also
called primary LAN). The prompt is:
Range is:
0..7
The default is 1.
Super Root Candidates
Access points assigned a root priority between 1 and 7 are
candidates to become the super root. Access points
assigned a root priority of 0 are prohibited from becoming
the super root.
4-24
6710 Access Point User’s Guide
SECTION 4
Configuration
Super Root Selection
The access point with the highest assigned root priority
becomes the super root whenever it is powered on and
active. If the current super root goes offline, the remaining
candidates negotiate to determine which one becomes the
new super root. This normally takes about 1 minute.
The super root is always the access point with the highest
root priority (other than 0). If two or more access points
have the same root priority, the unit with the highest
Ethernet address becomes the super root.
Super Root Redundancy
For redundancy, two or three access points should have a
nonzero root priority. All other access points should have a
root priority of 0. (Redundancy is the ability of another
access point to take over if the super root goes offline.)
You should do the following:
" Configure one access point as a primary super root
(with the highest root priority).
" Configure one or two access points as “fallback” super
roots (with lower priority).
" Configure remaining access points with a root priority
of 0.
[Global Radio]
" NOTE:
Use the same [Global Radio] settings in all super root candidates.
[Global Radio] distributes network-wide configuration
parameters. Settings in the super root are distributed
throughout the network. Options are:
UHF Rfp Threshold
UHF Frag Size
Falcon Frag Size
Awake Time
Set Globally
Value
70
250
250
6710 Access Point User’s Guide
4-25
SECTION 4
Configuration
The previous sample screen shows the options’ default
settings, which are optimum for most installations. It is
recommended that you not change the defaults.
Option
Description
UHF Rfp Threshold
This option adjusts the S-UHF protocol
characteristics for smaller data frames.
The recommended setting in most cases is
Disabled. For installations that primarily send very small frames, Enabled at the
default value of 70 may improve network
response time.
For reliable transmission, large frames
may be fragmented or split into several
smaller frames. The receiver reassembles
the fragments into a complete frame. The
default is 250.
For reliable transmission, large frames
may be fragmented or split into several
smaller frames. The receiver reassembles
the fragments into a complete frame. The
default is 250.
This option establishes an awake time
after a station transmits. Portable
stations do not enter a power managed
state for this time period. The access
point may deliver a response without
using the pending message delivery
mechanism during the awake time.
The time is specified in tenths of seconds.
When awake time is Disabled (the
default), each station uses its own default
(2 seconds for 900 MHz or S-UHF
stations). Longer awake times may
reduce station battery life.
UHF Frag Size
Falcon Frag Size
Awake Time
(Does not apply to
WLIF radio.)
4-26
6710 Access Point User’s Guide
SECTION 4
Configuration
Each [Global Radio] option has the following settings:
Set Globally
Value
Set Globally
The value for all radios in the system is specified according
to how Set Globally is configured.
Setting
Description
Enabled
If this access point is the super root, it sets the
value for all stations and access points in the
network. This setting has no effect in access
points other than the super root.
The super root does not distribute global
parameters. All radios in the network use local
settings or defaults.
Disabled
(default)
Value
Following are ranges and defaults for the Value option.
Value
Range
Default
UHF Rfp Threshold
0--250 octets
70
UHF Frag Size
0--250 octets
250
Falcon Frag Size
0--250 octets
250
Awake Time
0--255 (tenths of seconds)
6710 Access Point User’s Guide
4-27
SECTION 4
Configuration
[Global Flooding]
" NOTE:
Use the same [Global Flooding] settings in all super root candidates.
Use [Global Flooding] to set system-wide flooding options.
The settings are sent throughout the network when and if
this access point becomes the super root. Options are:
Inbound
Outbound to Secondaries
Outbound to Stations
Multicast
Unicast
An access point normally forwards frames only to
destination addresses it has learned and stored in the
forwarding database. Frames are forwarded only on the
port that provides the shortest path to the destination
address. The access point can be configured to flood frames
on one or more ports when the destination address is
unknown.
Global flooding options allow for different flooding
configurations to optimize performance. Settings in the
super root are distributed to all other access points.
A frame flooded toward the distribution LAN (LAN segment
containing the super root) is inbound. A frame flooded
away from the distribution LAN is outbound. A special
case of outbound is outbound to secondary LANs.
" NOTE:
A Flooding Level Checklist starts on page 4-31.
Inbound
Flooding may be configured separately for unicast (single
physical address) and multicast (group address) frame
types. Many network protocols use multicast messages for
establishing and maintaining connections, and use unicast
messages for data exchange.
4-28
6710 Access Point User’s Guide
SECTION 4
Configuration
Inbound options are:
Multicast
Unicast
Multicast and Unicast options have the following settings:
Enabled
Primary
Disabled
Setting
Description
Enabled
Access point floods to all ports, similar to a
conventional bridge.
Primary
Frames are flooded inbound only. This
(Multicast default) setting is useful in many wireless installations where the super root, servers, or
gateways for wireless stations are on the
same Ethernet segment.
Disabled
Frames are not flooded. Use this setting
(Unicast default)
only if the Outbound to Secondaries option
is also set to Disabled.
Outbound to Secondaries
Outbound to Secondaries floods frames with unknown
destinations to secondary LAN segments. Settings are:
Enabled
Registered
Disabled
6710 Access Point User’s Guide
4-29
SECTION 4
Configuration
Setting
Description
Enabled
All designated bridges flood to secondary
LANs. This setting allows the super root to
control flooding for all access points serving
as designated bridges for secondary LANs
(see page 4-57).
Designated bridges flood according to their
individual flood register settings. This setting allows individual designated bridges to
be configured separately.
Flooding is disabled in all designated
bridges. This setting allows the super root to
control flooding for all access points serving
as designated bridges for secondary LANs
(see page 4-57). This setting should be used
only if Inbound flooding is Disabled.
Registered
Disabled
(Multicast and
Unicast default)
Outbound to Stations
Outbound to Stations applies only to access points with the
WLIF radio option. Settings are:
Enabled
Disabled
4-30
Setting
Description
Enabled
Frames are flooded.
Disabled
(Multicast and
Unicast default)
Frames are not flooded.
6710 Access Point User’s Guide
SECTION 4
Configuration
Flooding Level Checklist
You can use the following list of questions to determine the
required flooding levels for the Inbound and Outbound to
Secondaries options. The list is structured so that you
should skip later questions as soon as you determine
the appropriate flood level settings.
If your answer is “I do not know,” go to the next question. If
you cannot determine the appropriate flooding levels, use
the higher (multicast) flooding levels.
" NOTE:
If extensive flooding is enabled, it will be more important to set
Ethernet filters to reduce unnecessary traffic in the radio network. In
general, the need for filters increases with the amount of traffic on
the distribution LAN and the flooding levels. Filtering starts on page
4-43.
1. Is the open wireless LAN used only with NORANDR
emulation terminals?
Answer
Settings
Yes
Inbound/Unicast/Disabled
Inbound/Multicast/Enabled
Outbound to Secondaries/Unicast/Disabled
Outbound to Secondaries/Multicast/Disabled
Comments:
Unicast flooding is not required to support NORAND
terminal emulation because the NORAND transport
layer (used for terminal emulation) periodically
generates traffic. Inbound multicast flooding is
required. Outbound multicast flooding is not required
because NORAND terminal emulation stations do not
need to receive multicast frames.
6710 Access Point User’s Guide
4-31
SECTION 4
Configuration
2. Does the network contain only 900 MHz or S-UHF
access points?
Answer
Settings
Yes
Inbound/Unicast/Disabled
Outbound to Secondaries/Unicast/Disabled
Comments:
Unicast flooding is never required for 900 MHz or
S-UHF access points, since stations supporting these
media options establish reliable connections as they
roam between access points. The correct port for
S-UHF or 900 MHz stations is always known.
3. Do all nodes in the radio network routinely transmit a
frame at least once every 4 minutes?
Answer
Settings
Yes
Inbound/Unicast/Disabled
Outbound to Secondaries/Unicast/Disabled
4. Do any nodes in the radio network need to receive
multicast or broadcast messages?
Answer
Settings
No
Inbound/Multicast/Enabled
Outbound to Secondaries/Multicast/Disabled
Note: TCP/IP nodes must receive broadcast ARP frames.
Comments:
The destination of a multicast frame is never known.
The Disabled setting should be used for any network
where stations do not need to receive multicast
frames. The Disabled setting can be used for
secondary LANs that only need to receive ARP frames.
When WLIF wireless stations must receive multicast
frames, set Outbound to Stations to Enabled.
4-32
6710 Access Point User’s Guide
SECTION 4
Configuration
5. Do nodes in the radio network communicate with
other nodes in the radio network?
Answer
Settings
Yes
Inbound/Unicast/Enabled
Inbound/Multicast/Enabled
Inbound/Unicast/Primary
Inbound/Multicast/Primary
Outbound to Secondaries/Unicast/Registered
Outbound to Secondaries/Multicast/Registered
No
Comments:
The Enabled settings facilitate peer-to-peer
applications, where nodes in the open wireless LAN
communicate with each other.
In general, the Primary and Registered settings are
designed for client or terminal applications where
nodes in the open wireless LAN communicate with
server nodes on the distribution LAN.
6. Do radio-equipped wireless station nodes (open or
non-wireless LAN) need to receive multicast or
broadcast frames?
Answer
Setting
Yes
Outbound to Stations/Multicast/Enabled
6710 Access Point User’s Guide
4-33
SECTION 4
Configuration
7. Does the radio network contain WLIF nodes that do
not periodically generate traffic?
Answer
Setting
Yes
Inbound/Unicast/Primary
Outbound to Secondaries/Unicast/Registered*
or
Inbound/Unicast/Enabled**
* Support communications with a distribution LAN.
** Supports general peer-to-peer communications.
" NOTE:
WLIF nodes using NORAND terminal emulation periodically
generate traffic, and do not require flooding.
Comments:
You may need to enable unicast flooding if the radio
network contains WLIF terminal nodes or nodes on a
secondary Ethernet LAN that do not periodically
generate traffic. Occasional traffic is needed to
maintain information in the forwarding database.
You can also do the following:
4-34
Use the Outbound to Secondaries/Unicast/
Enabled setting to force unicast flooding to WLIF
nodes.
Use the Inbound/Unicast/Primary or Outbound
to Secondaries/Unicast/Registered setting in
combination with the Flood Register/Unicast
setting for selected secondary Ethernet LANs.
These settings avoid network-wide universal
flooding if nodes that do not periodically generate
traffic are restricted to those secondary Ethernet
LANs.
6710 Access Point User’s Guide
SECTION 4
Configuration
8. Does the radio network contain a secondary Ethernet
LAN(s) with connected nodes that do not periodically
generate traffic?
Answer
Setting
Yes
Outbound to Secondaries/Unicast/Enabled
Alternatively, you can configure permanent
addresses in the Static Address Table (page 4-42).
9. Does the radio network contain a secondary Ethernet
LAN(s) with connected nodes that must receive
multicast or broadcast frames?
Answer
Setting
Yes
Inbound/Multicast/Primary
Outbound to Secondaries/Multicast/Registered
or
Inbound/Multicast/Enabled
Outbound to Secondaries/Multicast/Registered
Comments:
You can use the settings listed in the above chart
in combination with a Flood Register setting of
Multicast for selected secondary Ethernet LANs,
if nodes in the radio network that must receive
broadcast or multicast frames are restricted to
those LANs.
You should use the Outbound to
Stations/Enabled setting if wireless stations
must receive multicast frames. For example,
TCP/IP wireless stations may need to receive
broadcast ARP requests.
You can use Ethernet filters to reduce multicast
flooding for any Inbound or Outbound to
Secondaries setting other than Disabled.
6710 Access Point User’s Guide
4-35
SECTION 4
Configuration
S-UHF Flooding Level
Because of its low bandwidth, S-UHF is vulnerable to
excess traffic from busy backbones. The recommended
settings for S-UHF is Inbound/Disabled and Outbound to
Secondaries/Disabled (for the multicast and unicast
options). These settings prevent excessive traffic from
being forwarded onto the RF medium.
Flood Register
You can use the Inbound option and Outbound to
Secondaries option in combination with the Flood Register
setting for the Ethernet port. You can configure the
network so that unicast or multicast frames are flooded
only to secondary Ethernet LANs that have unicast or
multicast flooding (or both) enabled. Unicast and multicast
flooding options for secondary Ethernet LANs start on page
4-59.
ARP Server Mode
ARP Server Mode can convert multicast ARP requests to
unicast ARP requests for stations in the forwarding
database. ARP Server Mode can significantly improve
wireless network performance in busy IP networks.
Settings are:
Disabled
No Flooding
Delay Flooding
Normal Flooding
When ARP Server Mode is enabled, the IP addresses are
included in the forwarding database entry for the station.
The ARP server learns the IP addresses of wireless stations
by monitoring ARP packets. Additionally, some stations
may have the capability of explicitly registering IP
addresses with the ARP server.
4-36
6710 Access Point User’s Guide
SECTION 4
Configuration
Setting
Description
Disabled
(default)
No special action is taken when an ARP is
received. Multicast ARP requests are
subject to the Ethernet filters and the flooding settings. The Disabled setting is useful
when a system has no IP radio traffic or has
stations that do not register IP addresses.
ARP server converts ARPs from multicast to
the unicast address of the destination station. No Flooding is the most efficient configuration, since multicast ARPs are never
forwarded. Use of this setting requires stations to register IP addresses with the access
point. Use No Flooding or Disabled if wireless stations do not need to respond to ARPs.
ARP server converts ARPs from multicast to
the unicast address of the destination station. If the destination address is unknown,
the initial ARP request is not forwarded. If
the requesting device retries the ARP
request, second and subsequent ARP requests are forwarded. ARP requests from
wireless stations are flooded inbound.
Delay Flooding is the preferred option when
wireless stations should respond to ARPs,
but are not capable of registering their IP
addresses with the access point.
ARP server converts ARPs from multicast to
the unicast address of destination station. If
the destination address is unknown, the
ARP request is flooded according to the multicast flood level settings. ARP requests
from wireless stations are flooded inbound.
Normal Flooding is useful when wireless
stations need to respond to ARP requests,
but are not capable of registering IP addresses with the access point. Normal Flooding
sends more unnecessary ARPs over wireless
links then delay flooding. Normal Flooding
does not introduce occasional delays in ARP
responses as Delay Flooding does.
No Flooding
Delay Flooding
Normal Flooding
6710 Access Point User’s Guide
4-37
SECTION 4
Configuration
[Ports]
Use [Ports] to define options for the access point’s Ethernet
port, radio ports, and OWL/IP (IP tunneling) port. The
following sample screen shows all the ports.
Name
“omde”
“omdpxma”
“omdflca”
“omduhfb”
“omdip”
MAC Address
00:00:00:00:00:00
00:00:00:00:00:00
09:46:19:01:0a:02
01:55:b2:b3:90:e5
00:00:00:00:00:00
Status
Hello Period
<2 Seconds>
<2 Seconds>
<1 Second>
<2 Seconds>
<2 Seconds>
Because the system software autosenses the type of radio
option installed in each port, your screen displays only the
ports for the installed radios.
The following chart defines options in the Name column.
Option
omde
omdpxma (or omdpxmb)
omdflca (or omdflcb)
omduhfb
omdip
Description
Ethernet port
WLIF (Proxim 2.4 GHz) radio port
Falcon (900 MHz) radio port
S-UHF radio port
OWL/IP port (IP tunneling)
Select a port to display its options:
Name
MAC Address
Status
Hello Period
[Ethernet]
[WLIF]
[Falcon]
[UHF]
[OWL/IP]
4-38
6710 Access Point User’s Guide
(Depends on the port.)
00:c0:b2:00:00:00
<2 Seconds>
SECTION 4
Configuration
Name, MAC Address, Status, and Hello Period appear for
all ports. The remaining options appear as follows:
[Ethernet]
[WLIF]
[Falcon]
[UHF]
[OWL/IP]
Appears if you selected “omde.” Options start on
page 4-41.
Appears if you selected “omdpxma” (or
“omdpxmb”) and a WLIF radio is installed in
either PC card slot. Options start on page 4-60.
Appears if you selected “omdflca” (or “omdflcb”)
and a 900 MHz radio is installed in either PC
card slot. Options start on page 4-74.
Appears if you selected “omduhfb” and a S-UHF
radio is installed in its PC card slot. Options
start on page 4-76.
Appears if you selected “omdip.” Options start
on page 4-79.
Name
The read-only Name setting displays the driver name for
the type of device occupying this communication port. For
example, “omde” is the driver name for the Ethernet port.
The name is for internal system use.
MAC Address
MAC Address is a read-only option that displays the
network address of the Ethernet port or radio port. The
access point automatically identifies the addresses of
devices installed in or attached to its communication ports.
" NOTE:
After you reconfigure and reboot the access point, wait for the
power-up sequence to complete before you check the MAC address.
The proper address should appear after you reboot the access point.
If you do not wait for the access point to completely power up, the
MAC address may display all zeros. However, the access point
should still operate normally.
6710 Access Point User’s Guide
4-39
SECTION 4
Configuration
Status
The Status option sets the condition of the Ethernet port or
radio port. Settings are:
Enabled
Disabled
Setting
Description
Enabled (default) Port is available for use.
Disabled
Port is not available for use.
Hello Period
The hello period determines how frequently the access point
broadcasts hello messages on the network. On Ethernet
links and wireless links between access points, hello
messages are used to maintain the spanning tree. On
wireless links, hellos also serve as beacon messages to
synchronize communications with power managed stations.
Settings for Hello Period are:
1 Second
2 Seconds
3 Seconds
The hello period can be 1 or 2 seconds (default) on 900 MHz
or S-UHF radio links. A 1-second hello period requires the
wireless station to wake up more often, which increases
battery usage. However, a 1-second hello period can reduce
the delay before a pending message is received. For most
installations, the default (2 seconds) is recommended.
The Ethernet hello period can be set to 2 or 3 seconds.
4-40
6710 Access Point User’s Guide
SECTION 4
Configuration
Ethernet Options
Use [Ethernet] to set Ethernet port options:
OWL Frame Type
Cable Type
[Static Addresses]
[Normal RX Filter]
[Advanced RX Filter]
[Bridging]
OWL Frame Type
OWL Frame Type is the Ethernet type for communication
among access points (open wireless LAN frames). Settings
are:
DIX
SNAP
Setting
Description
DIX (default)
Adds DIX (Ethernet 2.0) header to open wireless
LAN frames. DIX is the default because it adds
less overhead to the wireless data.
Adds an 802.3 SNAP header to open wireless
LAN frames. In some cases, open wireless LAN
frames must be encapsulated in SNAP frames.
SNAP
6710 Access Point User’s Guide
4-41
SECTION 4
Configuration
Cable Type
Cable Type specifies the type of Ethernet medium to which
the access point is connected. It is recommended that you
explicitly set the cable type. Settings are:
10BaseT
10Base2
AUI
Auto Detect
Setting
Description
10BaseT
Selects the RJ11 connector (sets type to
10BASE-T, twisted pair). The cable type
defaults to 10BASE-T if no traffic is heard on
any Ethernet port (10BASE2, 10BASE5, or
10BASE-T) during a 10-second time window
when the access point starts up.
Selects the BNC connector (sets type to
10BASE2, thinnet).
Selects the AUI 15-pin D-sub connector (sets
type to 10BASE5 thicknet, and other types).
10Base2
AUI
Auto Detect
(default)
Automatically selects the correct cable type by
listening for traffic on the Ethernet ports during
initialization. For this to work, the access point
must be connected to the Ethernet medium
during system start-up, and another device on
the Ethernet medium must be transmitting at
least one frame every 10 seconds.
[Static Addresses]
Use [Static Addresses] to define a list of 20 or fewer
permanent unicast 802 MAC addresses connected to this
Ethernet port. The Static Address Table displays the
addresses:
4-42
6710 Access Point User’s Guide
SECTION 4
Configuration
1 00.00.00.00.00.00
2 00.00.00.00.00.00
3 00.00.00.00.00.00
20
00.00.00.00.00.00
Select an address, then type 6 hexadecimal pairs for the
new address at the prompt:
Range is:
6 hex pairs
Static addresses become permanent entries in the route
table. This is useful when configuring designated bridges
for secondary LANs, since it reduces the need to flood
frames to wired stations on the secondary LAN segment.
See page 4-57 for discussion of designated bridges for
secondary LANs.
[Normal RX Filter]
Ethernet filters allow elimination of frame types that do not
need to be forwarded to wireless stations. The main benefit
of filtering is reduction in unnecessary wireless
transmissions. Options are:
[Frame Types]
[SubTypes 1]
[SubTypes 2]
6710 Access Point User’s Guide
4-43
SECTION 4
Configuration
[Frame Types] allows filters to be established for common
networking protocols such as IP, Novell IPX, and 802.2 LLC
(Logical Link Control). Separate selections are available for
each of the three Ethernet standards: DIX (Ethernet 2.0),
802.3, and 802.3 SNAP.
A filter may be configured to pass or drop all frames of a
given type. Alternatively, filters may be set to operate on
selected subtypes within each frame type category.
[SubTypes 1] lists several predefined frame types as well as
user-defined frame types. Settings under [SubTypes 2]
allow additional user-defined frame subtypes to be
specified. The default access point configuration passes all
frame types.
[Frame Types]
[Frame Types] options are:
DIX-IP-TCP Ports
DIX-IP-UDP Ports
DIX-IP-Other Protocols
DIX-IPX Sockets
DIX-Other EtherTypes
SNAP-IP-TCP Ports
SNAP-IP-UDP Ports
SNAP-IP-Other Protocols
SNAP-IPX Sockets
SNAP-Other EtherTypes
802.3-IPX Sockets
802.2-IPX Sockets
802.2-Other SAPs
4-44
6710 Access Point User’s Guide
Action
Scope
SECTION 4
" NOTE:
Configuration
Frame Type
Description
DIX--IP--TCP Ports
DIX--IP--UDP Ports
SNAP--IP--TCP Ports
SNAP--IP--UDP Ports
DIX--IP--Other Protocols
SNAP--IP--Other Protocols
DIX--IPX Sockets
SNAP--IPX Sockets
802.3--IPX Sockets
DIX--Other EtherTypes
SNAP--Other EtherTypes
802.2--IPX Sockets
Primary Internet Protocol Suite
(IP) transport protocols.
802.2--Other SAPs
SAPs other than IPX or SNAP.
IP protocols other than TCP or
User Datagram Protocol (UDP).
Novell NetWare protocol.
DIX or SNAP registered protocols
other than IP or IPX.
Novell running over 802.2 LLC.
Some IP protocol ports cannot be filtered because they are used for
configuration and management of the access point. These include
HTTP, Telnet, SNMP, and Internet Control Message Protocol (ICMP).
Filters set for these protocols are ignored for the Ethernet frame type
configured in the access point’s [Tcpip] menu.
Frame types have the following settings:
Action
Scope
Setting
Description
Action
Defines how the frame is processed:
Pass
(default)
Drop
Frame is passed to the bridging function
for further processing.
Frame is discarded.
6710 Access Point User’s Guide
4-45
SECTION 4
Configuration
Setting
Description
Scope
Defines whether the action applies to all frames of
this type, or is restricted to selected subtypes:
Unlisted Applies only to subtypes that are not
(default) configured under [SubTypes 1] or
[SubTypes 2].
All
Applies to all frames of this type.
[SubTypes 1] and [SubTypes 2] settings
for this frame type are ignored.
[SubTypes 1]
The predefined subtypes in the [SubTypes 1] menu provide
preconfigured filters that are useful in many networks. The
values for these subtypes cannot be changed. Subtypes are:
DIX-ARP
SNAP-ARP
802.2-IPX-RIP
802.2-IPX-SAP
NNL
NETBIOS
(through)
16
Action
SubType
<802.2-IPX-Socket>
<802.2-IPX-Socket>
<802.2-SAP>
(User-defined subtypes.)
Value
08 06
08 06
04 51
04 53
87 5b
f0 f0
(User-defined subtypes.)
User-Defined Subtypes in [SubTypes 1] and
[SubTypes 2]
The value under user-defined subtypes allow individual
protocol ports, sockets, or SAPs to be specified for each of
the listed frame types. The filter takes action if either the
source or destination fields in the frame match the specified
port, socket, or SAP. A value of 00 00 denotes the subtype
as Unlisted.
4-46
6710 Access Point User’s Guide
SECTION 4
Configuration
Subtypes for [SubTypes 2] are:
Action
1
2
3
22
SubType
Value
00 00
00 00
00 00
00 00
Subtype
Value
DIX--IP--TCP--Port
Port value in hexadecimal.
DIX--IP--UDP--Port
Port value in hexadecimal.
DIX--IP--Protocol
Protocol number in hexadecimal.
DIX--IPX--Socket
Socket value in hexadecimal.
DIX--EtherType
Specify the registered DIX type in
hexadecimal.
Port value in hexadecimal.
SNAP--IP--TCP--Port
SNAP--IP--UDP--Port Port value in hexadecimal.
" NOTE:
SNAP--IP--Protocol
Port value in hexadecimal.
SNAP--IPX--Socket
Socket value in hexadecimal.
SNAP--EtherType
802.3--IPX-Socket
SAP in hexadecimal. To filter on both
SAP and OUI (Organizationally Unique
Identifier), use advanced filters.
Socket value in hexadecimal.
802.2--IPX-Socket
Socket value in hexadecimal.
802.2--SAP
SAP in hexadecimal.
Port values may be entered in decimal, by adding a period to the
entry. For example, “23.” for port 23. The Value field displays the
hexadecimal equivalent.
6710 Access Point User’s Guide
4-47
SECTION 4
Configuration
Filtering Examples
The following network examples illustrate how filters may
be set to optimize wireless performance. The sample
network in Figure 4-3 contains the following:
" NOTE:
4-48
Wireless stations using IP.
A secondary LAN containing IP and IPX hosts, linked
by access points (AP) 2 and 4.
An IPX router connecting to another Novell network.
DIX and 802.3 SNAP frames.
Many networks use only one Ethernet frame type. DIX is the most
common type. Set filters only for the Ethernet frame types found on
your network.
6710 Access Point User’s Guide
SECTION 4
AP 1
(Super Root)
IP Host
Configuration
Novell Server
Distribution LAN
IPX Router
AP 3
AP 2
IP Wireless
Stations
AP 4
AP 5
AP 6
IP Host
IPX Host
Secondary LAN
Figure 4-3
Access Points Servicing IP Wireless Stations
Example 1
Access points 1, 3, 5, and 6 in Figure 4-3 service only IP
wireless stations. In these access points it is desirable to
pass necessary IP traffic, but eliminate unnecessary IPX
traffic. These do not need to be forwarded to the secondary
LAN. In this case it is not necessary to use the
[SubTypes 1] or [SubTypes 2] configuration.
6710 Access Point User’s Guide
4-49
SECTION 4
Configuration
In example 1, [Frame Types] is set as follows:
DIX-IP-TCP Ports
DIX-IP-UDP Ports
DIX-IP-Other Protocols
DIX-IPX Sockets
DIX-Other EtherTypes
SNAP-IP-TCP Ports
SNAP-IP-UDP Ports
SNAP-IP-Other Protocols
SNAP-IPX Sockets
SNAP-Other EtherTypes
802.3-IPX Sockets
802.2-IPX Sockets
802.2-Other SAPs
Action
Scope
Example 2
Access points 2 and 4 in Figure 4-3 service IP wireless
stations as well as wired IP and IPX hosts on the secondary
LAN. These access points have an additional requirement
to pass IPX traffic.
The IPX router in this network periodically sends IPX-RIP
(Routing Information Protocol) frames for coordinating with
other routers. These do not need to be forwarded to the
secondary LAN because the secondary LAN does not
contain a router.
To filter the RIP frames, it is necessary to use the
[SubTypes 1] configurations. The example sets filters for
three different cases: DIX, 802.2, or 802.3 SNAP frames.
In many actual networks, only one of these would be
required, since all stations would be configured for one of
the three options.
4-50
6710 Access Point User’s Guide
SECTION 4
Configuration
In example 2, [Frame Types] is set as follows:
DIX-IP-TCP Ports
DIX-IP-UDP Ports
DIX-IP-Other Protocols
DIX-IPX Sockets
DIX-Other EtherTypes
SNAP-IP-TCP Ports
SNAP-IP-UDP Ports
SNAP-IP-Other Protocols
SNAP-IPX Sockets
SNAP-Other EtherTypes
802.3-IPX Sockets
802.2-IPX Sockets
802.2-Other SAPs
Action
Scope
[SubTypes 1] options are configured to drop IPX RIP for
802.2, DIX, and 802.3 frames. DIX is already specified as a
predefined filter. For 802.2 and 802.3 frames, it is
necessary to use a user-defined filter.
In example 2, [SubTypes 1] is set as follows:
DIX-ARP
SNAP-ARP
802.2-IPX-RIP
802.2-IPX-SAP
NNL
NETBIOS
Action
SubType
<802.2-IPX-Socket>
<802.2-IPX-Socket>
<802.2-SAP>
<802.3-IPX-Socket>
Value
08 06
08 06
04 51
04 53
87 5b
f0 f0
04 51
04 51
00 00
00 00
6710 Access Point User’s Guide
4-51
SECTION 4
Configuration
[Advanced RX Filter]
If you need more flexibility than that provided by [Normal
RX Filter], you can use the tables for [Advanced RX Filter]
to specify additional filters. Settings for [Advanced RX
Filter] execute after those for [Normal RX Filter]. For
example, if [Normal RX Filter] dropped a frame, the frame
cannot be “undropped.” If [Normal RX Filter] passed a
frame, [Advanced RX Filter] then executes.
Specifying an advanced filter for [Advanced RX Filter] is
more complicated than specifying one for [Normal RX
Filter]. If possible, use [Normal RX Filter] to set filters.
[Advanced RX Filter] options are:
[Expressions]
[Values]
[Expressions]
Use [Expressions] to enter expressions used to match the
patterns stored in pattern lists to consecutive bytes in
received Ethernet frames. Settings for Expressions execute
in sequence until a determination is made to pass or drop
the frame, as follows:
If the last Then listed in this table is Then Drop, the
table’s default is an implied Else Pass.
" If the last Then is Then Pass, the default is an implied
Else Drop.
The Value Table displays the filter expressions to be
executed:
4-52
6710 Access Point User’s Guide
SECTION 4
ExprSeq Offset
22
Mask
Op
Value Id
Configuration
Action
0
0
0
0
Filter expressions have the following settings:
ExprSeq
Offset
Mask
Op
Value Id
Action
ExprSeq
ExprSeq contains a sequence number that orders
expressions in ascending order. It is a method of changing
the sequence execution. The prompt is:
Range is:
0..65535
The default is 0. Change these numbers as needed for
reordering. After you save the changes (through the Write
command), the statements are physically reordered and
renumbered.
6710 Access Point User’s Guide
4-53
SECTION 4
Configuration
Offset
This setting defines the offset in a received Ethernet frame
to match the patterns. The prompt is:
Range is:
0..65535
A frame matches a pattern list if the masked bytes at the
specified offset in the frame match any of the masked
patterns in the pattern list. The default is 0.
Mask
This setting indicates the bits that are significant at the
specified offset. The prompt is:
Range is:
8 hex pairs
The default is “” (an empty string).
The length of this mask determines the number of
characters compared at the offset. If this field is “” (an
empty string, the default), the length of the field is
determined by the longest value in the Value Table with the
matching Value Id.
Op
Op is a memory comparison operator in the following chart.
4-54
Operator
Description
LT
Less than one value.
LE
Less than or equal to one value.
EQ (default)
Equal to any in the list.
NE
Not equal to any in the list.
GE
Greater than or equal to one value.
GT
Greater than one value.
6710 Access Point User’s Guide
SECTION 4
Configuration
Value Id
The field at the specified offset is compared with values in
the Value Table with the Value Id. The prompt is:
Range is:
0..255
The default is 0. When using a comparison operator that
requires a single value (LT, LE, GE, and GT), only the first
value found will be compared.
Action
The Action setting instructs the Ethernet driver and
indicates what should happen when this expression is true.
Settings are:
And
Pass
Drop
Setting
Description
And
Instructs Ethernet driver to continue with the
next simple expression, if the expression condition is satisfied. Two or more simple expressions
are ANDed together to form a complex expression.
Instructs Ethernet driver to accept the frame for
further processing and pass the frame up to the
bridging layer (the frame is not discarded).
Instructs Ethernet driver to reject the frame.
Pass
(default)
Drop
6710 Access Point User’s Guide
4-55
SECTION 4
Configuration
[Values]
Use [Values] to enter pattern lists that contain byte
patterns that match consecutive bytes in received Ethernet
frames. Settings for [Values] are referenced by the Value Id
from the Expression Table. The values to be used in a filter
expression are as follows:
Value Id
22
Value
Filter expression values have the following settings:
Value Id
Value
Setting
Description
Value Id
An identifier used by an expression in the Expression Table. The range is 0 (default) to 255. All
values with the same identifier are considered to
be in the same list. When used in an expression
that allows only one value (that is, LT, LE, GE, or
GT), only the first value in the list is used.
One of the values to be compared. The range is 8
hexadecimal pairs.
Value
4-56
6710 Access Point User’s Guide
SECTION 4
Configuration
[Bridging]
[Bridging] options are:
Bridge Priority
Status
Flood Register
Bridge Priority
The bridge priority allows selection of the access point
serving as a designated bridge for a secondary LAN. As
with the root priority, the bridge priority allows designation
of access points as primary or fallback bridges. The prompt
is:
Range is:
0..7
" NOTE:
The S-UHF radio option does not support designated bridging.
Designated Bridge Candidates
Access points with a bridge priority between 1 (default) and
7 are candidates to become the designated bridge; access
points with a bridge priority of 0 are prohibited from
bridging. The access point with the highest bridge priority
(other than 0) becomes the designated bridge whenever it is
connected (powered on and active) to the secondary LAN.
If two access points have the same bridge priority, the
access point with the highest Ethernet address becomes the
designated bridge. However, a lower bridge priority access
point may become the designated bridge if the wireless link
to a higher bridge priority access point is unacceptable.
6710 Access Point User’s Guide
4-57
SECTION 4
Configuration
Designated Bridge Selection
If the current designated bridge goes offline, the remaining
candidates negotiate to determine which one becomes the
new designated bridge.
Summary
In summary, the designated bridge:
Physically connects to a secondary Ethernet LAN.
Is within the radio coverage area of an access point on
the distribution LAN.
Has the highest nonzero bridge priority. If it has the
same bridge priority as another access point, then it
has the highest Ethernet address (unless the access
point with the highest priority is out of radio range).
Status
The Status option determines if the access point can
function as a designated bridge. Settings are:
Enabled
Disabled
Setting
Description
Enabled (default)
This access point may function as the
designated bridge for the secondary
Ethernet LAN.
This access point cannot be the designated
bridge for the secondary Ethernet LAN.
The Disabled setting has the same effect as
setting Bridge Priority to 0. The Disabled
setting is valuable for debug.
Disabled
4-58
6710 Access Point User’s Guide
SECTION 4
Configuration
Flood Register
As the designated bridge for this secondary Ethernet LAN,
the access point can register the type of frames it expects to
flood — unicast, multicast, or both. This information is
registered with other access points. Setting [Global
Flooding] settings in the super root overrides individual
Flood Register settings in designated bridges.
Flood Register settings are:
Disabled
Multicast
Unicast
Enabled
" NOTE:
Set the same Flood Register setting in any access point that is a
candidate to become the designated bridge for a secondary Ethernet
LAN.
Setting
Description
Disabled
(default)
No flooding occurs. (The super root, however,
enables flooding if the Outbound to Secondaries
Multicast or Unicast option is set to Enabled.*)
Enables multicast flooding. (The super root
disables multicast flooding if the Outbound to
Secondaries Multicast option is set to Disabled.*)
No unicast flooding occurs. (The super root
enables unicast flooding if the Outbound to
Secondaries Unicast option is set to Enabled.*)
Enables unicast flooding. (The super root disables
unicast flooding if the Outbound to Secondaries
Unicast option is set to Disabled.*)
No multicast flooding occurs. (The super root
enables multicast flooding if the Outbound to
Secondaries Multicast option is set to Enabled.*)
Multicast
Unicast
* See page 4-29 for more information about Outbound to
Secondaries.
6710 Access Point User’s Guide
4-59
SECTION 4
Configuration
Setting
Description
Enabled
Multicast and unicast flooding occurs. (The super
root disables flooding if the Outbound to
Secondaries Multicast or Unicast option is set to
Disabled.*)
* See page 4-29 for more information about Outbound to
Secondaries.
Global flooding settings in the super root take precedence
over Flood Register settings.
WLIF Options
" NOTE:
Appendix B provides additional information about the WLIF radio.
Use [WLIF] to set Proxim 2.4 GHz radio options:
Security Id
“NORANDOWL”
Node Type
[Master Parms]
MAC Config
[Manual MAC Parms]
" NOTE:
[Slave Parms] appears instead of [Master Parms] if Node Type is set
to Slave. [Manual MAC Parms] appears if MAC Config is set to
Manual.
Security Id
Security Id prevents unauthorized wireless stations from
associating with this access point. The prompt is:
Range is:
20 chars
4-60
6710 Access Point User’s Guide
SECTION 4
Configuration
The default security ID is NORANDOWL.
All WLIF access points and wireless stations in the network
must have the same security ID to communicate. The
security ID is case sensitive. That is, if the access point’s
security ID is in uppercase, the wireless station’s must also
be in uppercase. Refer to the wireless station’s user guide
for more information about setting its security ID.
Node Type
Node Type determines if this radio is a Master to which
wireless stations attach, or is a Slave radio that must
attach to a Master. Configuration of a WLIF radio as a
Slave is necessary if the access point is configured as a
wireless access point, or the designated bridge for a
secondary LAN.
Configuration as a wireless access point requires
installation of two WLIF radios: one Master and one Slave.
The Master radio services stations local to the wireless
access point. The Slave radio provides communications
between the wireless access point and the network
infrastructure. Figure 4-4 on page 4-65 shows a network
example.
Node Type options are:
Master
Slave
Setting
Description
Master
(default)
Slave
The port is configured to communicate with
wireless stations.
The port is configured to communicate with
other access points.
6710 Access Point User’s Guide
4-61
SECTION 4
Configuration
[Master Parms]
[Master Parms] contains parameters the access point needs
when you configure it as a Master radio. Settings are:
Channel
Subchannel
Wireless Hops
Channel and Subchannel
Channel sets this radio’s hopping sequence. Subchannel
enables access points to share the same channel without
receiving another access point’s frames. The prompt for
Channel and Subchannel is:
Range is:
0..15
The default for Channel and Subchannel is 1.
The channel must be unique for each access point located
close enough together (within the same coverage area) such
that a wireless station may choose to connect with any of
them. To maximize the available bandwidth, the channel
and subchannel pair should be unique for each closely
located access point.
When channels are different among access points, an access
point cannot receive another access point’s traffic. An
access point discards frames if the channel and subchannel
IDs in the frame header do not match the access point’s
channel and subchannel settings.
Two access points on different subchannels share the same
hopping sequence, but behave as if they were on different
channels.
4-62
6710 Access Point User’s Guide
SECTION 4
Configuration
Network With 15 or Fewer Access Points
If 15 or fewer access points are on the network, the channel
should be different for all access points. The subchannel
can be the same as or different than the channel.
EXAMPLE 1:
The channel and subchannel could be set as follows (the access
point number in the first column is arbitrary):
Access Point
Channel
Subchannel
10
11
12
13
14
15
10
11
12
13
14
15
Network With 16 or More Access Points
When the number of in-range access points is 16 or more,
channels must be reused. The channel can be the same for
two or more, but they should have different subchannels.
In this case, access points using the same channel receive
traffic for another access point but discard frames with the
incorrect subchannel. To minimize interference, access
points using the same channel (but different subchannels)
should be physically located outside the radio range of one
another.
6710 Access Point User’s Guide
4-63
SECTION 4
EXAMPLE 2:
4-64
Configuration
If 43 access points are on the network, 1 to 15 could be assigned the
channel and subchannel numbers in the previous example. Access
points 16 to 43 could be set as follows (the access point number in
the first column is arbitrary):
Access Point
Channel
Subchannel
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
10
11
12
13
14
15
10
11
12
13
6710 Access Point User’s Guide
SECTION 4
Configuration
Wireless Hops
To create a wireless hop, you must enable one or more
WLIF radios on the distribution LAN as wireless hopping
Masters and then configure the Slave stations (through
[Slave Parms]) to connect to these Masters.
EXAMPLE:
In Figure 4-4, two access points have two WLIF radios. One radio is
configured as a Master to provide the wireless connection to the
distribution LAN. The other radio is configured as a Slave to service
wireless station traffic.
Slave
Ethernet (Distribution) LAN
Master
Master
Slave
Slave
Master
Secondary LAN
Secondary LAN
Figure 4-4
Wireless Hopping Through WLIF Radios
" NOTE:
For best performance, use one or two external antenna kits when
using two WLIF radios. A minimum separation of 10 feet (3 meters)
between antennas is required.
6710 Access Point User’s Guide
4-65
SECTION 4
Configuration
Settings for the Master are:
Enabled
Disabled
Setting
Description
Enabled
Sets up this access point’s radio port to wireless
hop. This access point honors connections from
an access point with a Slave radio.
Prevents this access point’s radio port from
wireless hopping. This access point does not
honor connections from an access point with a
Slave radio.
Disabled
(default)
[Slave Parms]
[Slave Parms] contains parameters this radio needs when
you configure it as a Slave radio. Options are:
Master
Master
Master
Master
Master
Master
Master
Master
Channel
Subchannel
For the WLIF radio to wireless hop, at least one access
point on the secondary LAN must be equipped with a WLIF
radio configured for Slave mode. The secondary LAN can
be one of the following:
4-66
6710 Access Point User’s Guide
SECTION 4
" NOTE:
Configuration
An Ethernet segment.
The radio range of a single access point with two
radios. One radio must be operating as a Master to
service wireless station traffic. The other radio must
be operating as a Slave to provide the wireless hop to
the distribution LAN.
You must set the Root Priority for the access point with the Slave
radio to 0 to prevent it from becoming the open wireless LAN super
root.
You must prevent the access point with the Slave radio
from synchronizing with Master radios in access points
attached to the same secondary LAN. To identify the
Masters with which the Slave is allowed to synchronize, do
the following:
1. Identify eight or fewer Master stations with which the
Slave is allowed to synchronize by selecting Master
.
2. Enter the channel and subchannel pairs that you set
for Channel and Subchannel, as follows:
Channel
Subchannel
Setting*
Description
Channel
Channel the Master WLIF radio is using
(default is 1).
Subchannel the Master WLIF radio is
using (default is 1).
Subchannel
* Channel and Subchannel are discussed on page 4-62.
6710 Access Point User’s Guide
4-67
SECTION 4
Configuration
The Slave access point synchronizes with Masters whose
channel and subchannel appear in the list of configured
Masters. Precedence is given by the order of the list.
Master 1 has highest precedence; Master 8 has lowest.
Channel and subchannel settings can be 0, where 0 means
“do not care.” For example:
You can set the Master 1 channel to 0 and subchannel
to 1. The Slave synchronizes with any Master on any
channel as long as the Master’s subchannel is 1.
" You can set the Master 1 channel to 0 and subchannel
to 0, which means “do not care.” The Slave
synchronizes with any Master.
Remember that:
Any Master with which the Slave is allowed to
synchronize must have Wireless Hops enabled.
A Slave station must have a root priority of 0.
A Slave station must not be allowed to synchronize
with a Master connected to its own secondary LAN.
MAC Config
Use MAC Config options to enhance the performance of the
WLIF radio. Options are:
Default
Interference
Throughput
Manual
" NOTE:
4-68
An inefficient MAC Config radio setting can adversely affect the
performance of your open wireless LAN. You should change MAC
Config radio settings only under the direct supervision of a Systems
Engineer.
6710 Access Point User’s Guide
SECTION 4
Configuration
Setting
Description
Default
(default)
Uses the factory-set settings for the radio protocol (settings are located under [Manual MAC
Parms]). The Default setting should be used for
normal operation.
Interference
Optimizes the settings for the radio protocol for
better performance in environments with high
interference or multipath.
Optimizes the settings for the radio protocol for
better performance of file transfer operations in
open or uncongested environments, such as office areas.
Throughput
Manual
Allows you to adjust WLIF MAC parameters
(located under [Manual MAC Parms]) individually. Do not select this setting unless a Systems
Engineer directs you to do so.
[Manual MAC Parms]
" NOTE:
Adjusting the settings for [Manual MAC Parms] is not advised unless
instructed by Technical Support.
Occasionally, a site’s WLIF radio parameters may need to
be fine-tuned. Options for [Manual MAC Parms] enable the
Customer Response Center to fine-tune this access point’s
performance. Settings are:
Hop Period
Beacon Frequency
Deferral Slot
Fairness Slot
Fragment Size
Transmit Mode
Norm Ack Retry
Frag Ack Retry
Norm QFSK Retry
Frag QFSK Retry
<200ms>
310
255
255
255
255
6710 Access Point User’s Guide
4-69
SECTION 4
Configuration
Hop Period
Hop Period sets the hopping time period, which determines
how long the radio stays on a frequency in the hopping
sequence before stepping to the next frequency. Settings
are:
100 ms
200 ms
400 ms
The default is 200 ms. A longer period results in better
throughput. A shorter period results in faster roaming
response and better immunity from interference.
Beacon Frequency
The access point periodically transmits a beacon to allow
Slave radios (wireless stations) to quickly scan each
frequency to find a Master (an access point). Beacon
Frequency is the number of hops that occur between
beacons. The prompt is:
Range is:
1..7
A setting of 1 is one beacon on every hop. A setting of 7 is
one beacon every 7 hops. The default is 2.
You can reduce the scan time and, therefore, the time
required for roaming by increasing the beacon frequency.
More beacons may let wireless stations synchronize faster,
but beacons use bandwidth otherwise available for data.
Deferral Slot and Fairness Slot
The number of deferral and fairness slots determines the
average back-off time when the channel is sensed to be
busy.
4-70
6710 Access Point User’s Guide
SECTION 4
Configuration
Settings for both options are:
Default
The default setting is Default. You can do the following:
Reduce the number of slots on lightly-loaded networks
to increase throughput.
" Increase the number to help prevent repeated
collisions under a heavy load.
You can set Fairness Slot as follows:
Increase the number to prioritize the channel access
for nodes that have been waiting the longest to access
the channel.
Decrease the number to minimize initial back-off
delays.
Fragment Size
Fragment Size determines the maximum size of a fragment
to be sent over this radio during interference. The prompt
is:
Range is:
1..1540
The default is 310.
If two ACK errors occur in a row during the transmission of
a large data frame, it splits into two or more fragments and
each fragment transmits separately. An ACK error occurs
if a acknowledgment frame is not received from the
destination node.
6710 Access Point User’s Guide
4-71
SECTION 4
Configuration
Smaller fragments may allow successful operation in an
environment with a high level of interference at the
expense of throughput.
Transmit Mode
Transmit Mode modulates the transmit signal and sets the
bits per second. Settings are:
BFSK
QFSK
AUTO
Setting
Description
BFSK
Binary Frequency Shift Keying. Transmits at 0.8
Mbps per second. Data is transmitted by shifting
between two frequencies to represent one bit of 0
or 1. BFSK has extended range over QFSK at the
expense of throughput.
QFSK
Quadrature Frequency Shift Keying. Transmits at
1.6 Mbps per second. Data is transmitted by shifting among four frequencies to represent two bits of
0 or 1. QFSK has better throughput over BFSK at
the expense of range.
AUTO
(default)
Automatically adapts the bit rate to the error
conditions. The transmit mode is automatically
selected for the best range and throughput.
Norm Ack Retry
Norm Ack Retry is the number of times any unfragmented
frame (QFSK or BFSK) is resent unsuccessfully before
fragmenting. The prompt is:
Range is:
1..255
4-72
6710 Access Point User’s Guide
SECTION 4
Configuration
The number includes retries that occurred in QFSK mode,
and should be larger than Norm QFSK Retry. A value of
255 (default) indicates that the radio may choose an
optimum value.
Frag Ack Retry
Frag Ack Retry is the number of times any fragmented
frame (QFSK or BFSK) is resent unsuccessfully before
failure. The prompt is:
Range is:
1..255
Frag Ack Retry should be larger than Frag QFSK Retry. A
setting of 255 (default) indicates that the radio may choose
an optimum value.
Norm QFSK Retry
Norm QFSK Retry is the number of times an unfragmented
QFSK frame is resent unsuccessfully before switching to
BFSK when Transmit Mode is AUTO. The prompt is:
Range is:
1..255
The retries that occur are also counted by Norm Ack Retry.
Norm QFSK Retry should be smaller than Norm Ack Retry.
The default is 255.
Frag QFSK Retry
Frag QFSK Retry is the number of times a fragmented
QFSK frame is resent unsuccessfully before switching to
BFSK when Transmit Mode is set to Auto. The prompt is:
Range is:
1..255
6710 Access Point User’s Guide
4-73
SECTION 4
Configuration
The default is 255.
The retries that occur are also counted by Frag Ack Retry.
Frag QFSK Retry should be smaller than Frag Ack Retry.
900 MHz Options
" NOTE:
Appendix C provides additional information about the 900 MHz radio.
Use [Falcon] to set 900 MHz radio options:
File Name
Mode-Channel
”falcon_d.29k”
File Name
File Name is the name of the radio’s driver software. Only
change this name when directed to do so by a Systems
Engineer. Normally, the program’s file name should not be
changed.
Mode- Channel
Mode sets the bit rate option for the 900 MHz radio.
Generally, the higher the bit rate, the lower the range of the
access point. Channel defines a frequency range that is a
small portion of the available bandwidth.
Various communication modes are available, which enable
you to balance the need for radio coverage with the need for
speed. Select the Mode--Channel option to display the list
of mode and channel combinations, which are
country-dependent.
4-74
6710 Access Point User’s Guide
SECTION 4
Configuration
For example, in the United States the following
combinations are valid:
DS
DS
DS
DS
DS
DS
DS
DS
DS
225K-Channel
090K-Channel
090K-Channel
090K-Channel
090K-Channel
090K-Channel
090K-Channel
090K-Channel
450K-Channel
25
10
15
20
25
30
35
40
25
The following chart describes the settings shown in the
previous sample screen:
Setting
Description
DS 225K--Channel 25
Uses one Direct Sequenced channel at
225,000 bits per second. This one
moderate-speed channel uses all available bandwidth. DS 225K is mode 1.
DS 090K--Channel 10
through
DS 090K--Channel 40
Use one of several Direct Sequenced
channels at 90,000 bits per second.
Seven low-speed channels share the
available bandwidth. DS 90K is mode
2.
DS 450K--Channel 25
Uses one Direct Sequenced channel at
450,000 bits per second. This one
high-speed channel uses all available
bandwidth. DS 450K is mode 3.
900 MHz radio options for a wireless station are set
through its Advanced Setup firmware menus. Wireless
station and access point settings must match. Refer to the
wireless station’s user guide for more information about
Advanced Setup.
6710 Access Point User’s Guide
4-75
SECTION 4
Configuration
S-UHF Options
" NOTE:
Appendix D provides additional information about the S-UHF radio.
Use [UHF] to set S-UHF radio options:
File Name
Call Sign
Frequency
Master Mode
Attach Priority
" NOTE:
“synuhf_d.29k”
“”
(First frequency in list.)
Attach Priority displays if Master Mode is set to Disabled.
File Name
File Name is the name of the radio’s driver software. Only
change this name when directed to do so by a Systems
Engineer. Normally, the program’s file name should not be
changed.
Call Sign
" NOTE:
Ignore this option if your site is outside of the United States.
Call Sign displays your network’s callsign. The prompt is:
Range is:
12 chars
Agencies that allocate S-UHF frequencies, such as the
Federal Communications Commission (FCC) in the United
States, may require that this access point periodically
transmit a callsign.
4-76
6710 Access Point User’s Guide
SECTION 4
Configuration
The callsign is granted as part of the FCC license process.
Insert the callsign from the FCC license certificate at the
callsign prompt.
Frequency
The Frequency option displays a list of frequencies
programmed at the factory. Some radios have multiple
frequencies. For example:
466170000 Hz
530000000 Hz
The default frequency is the first frequency programmed
into the list. Due to regulatory constraints in most
countries, frequencies can only be programmed by the
factory or service centers equipped to make this change.
Master Mode
Access points with the S-UHF option installed can operate
with Master Mode enabled or disabled. Master Mode may
improve performance in some environments. It should only
be enabled if the access point radio coverage area does not
overlap other access points operating on the same
frequency. If Master mode is disabled, this restriction does
not apply. An access point operating with Master Mode
disabled may overlap coverage areas with access points on
the same or different frequencies.
Master Mode settings are:
Enabled
Disabled
6710 Access Point User’s Guide
4-77
SECTION 4
Configuration
Setting
Description
Enabled
The access point controls channel access for
stations in its coverage area.
Access point and stations coordinate channel
access.
Disabled
(default)
Attach Priority
If the access point is operating with Master Mode disabled,
the attach priority of the access point can be specified.
Stations in the coverage area of two access points with
different attach priorities normally attach to the higher
priority access point. However, attach priority is used in
combination with other factors such as loading and signal
strength, and a station may attach to a lower priority access
point that provides a better wireless link. Stations ignore
the attach priority when selecting between two access
points with the same attach priority.
Attach Priority is useful when it is desirable to have a
redundant network with some access points serving as
standby units. If the higher priority unit fails, stations fall
back to the lower priority unit within the same coverage
area.
Attach Priority settings are:
High
Medium
Low
4-78
Setting
Description
High
(default)
Medium
High priority access point.
Low
Low priority access point.
6710 Access Point User’s Guide
Medium priority access point.
SECTION 4
Configuration
OWL/IP Options
" NOTE:
Appendix E provides additional information about OWL/IP and
contains configuration examples.
Overview
The OWL/IP extension to the open wireless LAN
architecture enables a wireless LAN installation to span
multiple IP subnets. OWL/IP is an advanced capability
that requires basic knowledge of IP addressing conventions
and routing to configure and use. You should review the
following pages and Appendix E before using this capability.
OWL/IP does the following:
Enables access points on different IP subnets to belong
to the same wireless network.
Supports transparent roaming of wireless stations
between access points on different subnets without
losing network connections for:
Wireless stations using Internet Protocol (IP).
Wireless stations using other network protocols,
such as NORAND Network Layer (NNL), that
are normally not routable.
OWL/IP is activated by enabling the OWL/IP port in the
access point. The port is an entryway to an IP tunnel
originated by the super root on the home subnet, and
terminated by a designated bridge operating on a remote
subnet (Figure 4-5). Frames forwarded through the tunnel
are encapsulated using the Generic Router Encapsulation
(GRE) protocol running over IP.
6710 Access Point User’s Guide
4-79
SECTION 4
Configuration
Server or
Gateway
Super Root
AP 3
IP Router
Remote Subnet 1
Home Subnet
AP 2
(Designated
Bridge)
AP 1
Tunnel
Tunnel
IP Router
Remote Subnet 2
Non-IP Station
AP 4
(Designated
Bridge)
IP Station
Figure 4-5
OWL/IP Overview
The super root can originate IP tunnels to eight or fewer IP
addresses. The number of tunnels supported may be more
than or fewer than eight, depending on the type of
addressing used and redundancy needs within the
installation.
OWL/IP tunnels are configured using the following steps:
1. Choose which subnet is the home subnet, and which
subnets are remote subnets. If possible, choose the
subnet that contains gateways or servers for wireless
stations as the home subnet; however, these servers
may be on other subnets if necessary.
4-80
6710 Access Point User’s Guide
SECTION 4
Configuration
Select primary and fallback super root access points
on the home subnet. IP addresses for wireless
stations used with OWL/IP must belong to the home
subnet. See OWL/IP limitations in Appendix E.
2. Select access points on each remote subnet to serve as
designated bridges for those subnets. Configure
primary and fallback bridge priorities under the
[Bridging] menu, described on page 4-57.
Configure and record the IP addresses of all
designated bridges. Designated bridge candidates
must have permanent IP addresses. (DHCP should
not be used to assign IP addresses to OWL/IP
designated bridges unless a permanent lease is
specified, and the access points are rebooted prior to
configuring OWL/IP.)
It is not necessary to configure Global Flooding or
Flood Register settings for OWL/IP designated
bridges. These do not apply to OWL/IP designated
bridges.
3. Use the [OWL/IP] menu to configure super root
candidates to Originate if Root (described on page
4-82). Configure the IP Addresses Table (page 4-83)
using the appropriate addressing for designated
bridges on each subnet. All super root candidates
should be configured identically.
4. Configure OWL/IP [TX Filter] settings in all super
root and designated bridge candidates. A discussion of
[TX Filter] starts on page 4-84.
5. For networks using IP networking on wireless
stations, use of the ARP server capability in the access
point is strongly recommended. A discussion of ARP
server starts on page 4-36.
6710 Access Point User’s Guide
4-81
SECTION 4
Configuration
OWL/IP Menu
OWL/IP configuration menu options are:
Mode
[IP Addresses]
[TX Filter]
In summary:
The Mode value specifies the operation of the access
point when the OWL/IP port is enabled. This value
determines whether the access point is configured to
serve as the originator or termination of a tunnel.
The [IP Addresses] table in the menus provides the
super root with the information necessary to establish
communications with designated bridges on remote
subnets.
The [TX Filter] configuration menu specifies the frame
types that are forwarded through OWL/IP tunnels.
Mode
The OWL/IP port may be configured with the following
options:
Listen
Originate if Root
Setting
Description
Listen (default)
Access points can serve as the termination of
a tunnel if they are the designated bridge for
the subnet, but cannot originate a tunnel.
Access points originate tunnels if they are
functioning as super root for the network.
Originate if Root
4-82
6710 Access Point User’s Guide
SECTION 4
Configuration
[IP Addresses]
The configuration screen for [IP Addresses] is:
Type
Address
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
Each line in the IP Addresses Table contains one IP address
entry. Settings are:
Type
Address
0.0.0.0
Type
The Type setting specifies the type of Ethernet MAC
address used by the super root when forwarding frames
through the OWL/IP port. This setting allows flexibility in
configuring OWL/IP routing. In most cases, IP and MAC
address types should match. The MAC frame type and IP
address in combination dictate how GRE encapsulated
frames are forwarded to IP routers. Settings are:
Unicast
Multicast
Broadcast
6710 Access Point User’s Guide
4-83
SECTION 4
Configuration
Setting
Description
Unicast
(default)
Standard IP routing is used. Frames are
forwarded to the unicast MAC address of the
router. This is either the default router specified
in the [Tcpip] configuration menu of the access
point, or an alternative router assigned by ICMP
redirect.
Multicast
Reserved for future use.
Broadcast
OWL/IP frames are sent using an Ethernet
broadcast address. This capability allows use of
directed, and All Subnets IP addressing.
Address
The Address setting is the target IP address of the access
point to which OWL/IP frames are addressed. The address
should be consistent with the type (unicast, multicast, or
broadcast). The prompt is:
Range is:
4 nums 0..255
Entries are cleared by setting addresses to 0.0.0.0.
[TX Filter]
Configuration of filters for the OWL/IP port is done using
the transmit filter ([TX Filter]) option. Filter setup is
similar to the normal Ethernet filter menu, described on
page 4-43. Note that the Ethernet receive filters and the
OWL/IP transmit filters are both applied to frames
forwarded through a tunnel.
OWL/IP filters restrict the frame types that are allowed to
be forwarded from the home subnet to remote subnets. By
default, filters are programmed to drop all protocol types
except for three protocols specified in the [SubTypes 1]
screen. The types are NNL DIX type 875b, IP Address
Resolution Protocol (ARP) DIX 0806, and ICMP 0001.
4-84
6710 Access Point User’s Guide
SECTION 4
Configuration
The filter configuration must be changed to allow
forwarding of other desired protocols, including TCP or
UDP. See Appendix E for discussion of OWL/IP restrictions
and permanent filters. Filters must be configured in all
super root candidates and OWL/IP designated bridges.
Default filter settings for OWL/IP are shown below.
DIX-IP-TCP Ports
DIX-IP-UDP Ports
DIX-IP-Other Protocols
DIX-IPX Sockets
DIX-Other EtherTypes
SNAP-IP-TCP Ports
SNAP-IP-UDP Ports
SNAP-IP-Other Protocols
SNAP-IPX Sockets
SNAP-Other EtherTypes
802.3-IPX Sockets
802.2-IPX Sockets
802.2-Other SAPs
Action
Scope
Default filter settings for [SubTypes 1] are shown below.
DIX-ARP
SNAP-ARP
802.2-IPX-RIP
802.2-IPX-SAP
NNL
NETBIOS
16
Action
SubType
<802.2-IPX-Socket>
<802.2-IPX-Socket>
<802.2-SAP>
Value
08 06
08 06
04 51
04 53
87 5b
f0 f0
00 00
00 00
00 00
00 00
6710 Access Point User’s Guide
4-85
SECTION 4
Configuration
Security Options
Use [Security] to set these passwords:
Password
Service Password
Advanced Password
“************”
“************”
Password
This option is the top-level password you need to access the
configuration menus. The prompt is:
Range is:
16 chars
Enter 16 or fewer alphanumeric characters for this
password. It is case insensitive and can be any combination
of letters, numbers, and symbols. For security, the
password appears as asterisks on the screen.
Service Password
Intermec maintains a service password so its Customer
Response Center can configure this access point if
necessary. For example, if you forget what the
configuration menus’ top-level password is, the Customer
Response Center can access the menus through the service
password.
By default, the Service Password is enabled. If setting a
service password violates your security guidelines, you can
disable it. If it is already disabled and you forget the
configuration menus’ password, you may need to send this
access point to a Service Center to be reconfigured.
Contact the Customer Response Center for more
information about the service password. See the Preface for
contact information.
4-86
6710 Access Point User’s Guide
SECTION 4
Configuration
Advanced Password
When you set an advanced password, it is required to
configure the following:
Security/Advanced Password and Bridge/Ports/omdip
The prompt is:
Range is:
16 chars
Enter 16 or fewer alphanumeric characters for this
password. It is case insensitive and can be any combination
of letters, numbers, and symbols. For security, the
password appears as asterisks on the screen.
Combining Radio Options
You can combine WLIF, 900 MHz, and S-UHF radios in a
common network by following basic guidelines for LAN ID.
Two alternatives are possible: same LAN ID and different
LAN IDs.
Same LAN ID
Using the same LAN ID for all radio options configures all
access points into a single network regardless of radio type.
This approach allows management of a single network
using the OWLView network management application.
An Ethernet path or wireless hop must exist from all access
points to the super root and back-up super root candidates.
In addition, globally distributed system parameters —
particularly flooding levels — must be appropriate for all of
the installed radio options.
6710 Access Point User’s Guide
4-87
SECTION 4
Configuration
Different LAN IDs
Using separate LAN IDs for each radio option configures all
access points with different radios into a distinct network
regardless of radio type. It may be more appropriate if the
installation topology or applications supported do not fit the
alternative that uses the same LAN ID. OWLView shows
two distinct LANs for this type of installation.
Creating a Web Browser Session
" NOTE:
The access point’s configuration menus are designed for HTML
Level 2.0 or higher.
Before you can configure the access point through a Web
browser, you must connect the unit to the Ethernet cable.
(See Section 3, “Installation,” for help.) You must also
perform initial configuration through the DIAG port to:
" NOTE:
Set an IP address or DHCP server name. You should
also configure a subnet mask and IP router address.
Set the Ethernet cable type.
The access point includes an autodetect feature that senses the
Ethernet medium if traffic is present. If no traffic is present on the
cable, the system software defaults to 10BASE-T. For most
installations, it is recommended that you explicitly set the Ethernet
type.
The access point must go through its boot sequence before
you can configure it through the browser. If you reboot it
while you are configuring it through the browser, the
session terminates. You can create a new session after the
access point reboots. To establish a browser session, see
Figure 4-6 and the procedure following it.
4-88
6710 Access Point User’s Guide
SECTION 4
Ethernet LAN
Configuration
HTTP
1. Platform with Web browser
2. 6710 Access Point
Figure 4-6
Web Browser Session
1. Ensure the access point is connected to the Ethernet
cable and has an assigned IP address.
2. Ensure the Web browser is installed on the platform.
3. Start the browser application.
4. Enter the access point’s IP address in the browser’s
Uniform Resource Locator (URL) field. For example:
http://999.999.99.99
After you enter the correct IP address, the Enter
Network Password screen appears:
Enter Network Password
OK
Please enter your authentication information.
Resource:
Cancel
(resource number)
User name:
(resource number)
Password:
*******
Save this password in your password list.
6710 Access Point User’s Guide
4-89
SECTION 4
Configuration
5. Enter the user name and password. Refer to the
following chart for help with all fields.
Setting
Description
Resource
A number assigned to this session.
The number changes every time
you access the Enter Network
Password screen.
User name
The Resource number. For example, if the Resource number is 3550,
the user name is 3550.
Configuration menus’ top-level
password. The default password is
CR52401 (case insensitive). For
security, the password appears as
asterisks on the screen.
Password
Save this password
in your password
list
" NOTE:
If you check this option, the browser saves the password. You do not
need to select this option because
the Resource number changes
every time you access this screen.
Only one computer at a time can access the configuration menus. If
you unexpectedly receive a request for the user name and
password, another user may be trying to view or modify the
configuration through Telnet or the DIAG port. If a different computer
tries to start another Web browser session, it is refused until the
current session logs out.
Following is the initial screen that appears after you enter
the correct user name and password. Configure the access
point by following the directions provided on this screen
and the help screens. In addition, this user guide’s Index
lists the page numbers for all menu options.
4-90
6710 Access Point User’s Guide
SECTION 4
Configuration
Access Point Configuration
Configuration Menus
Review/write Changes
Logout
Reboot
Security
Once you’ve successfully entered the user name and password into your browser,
you are authorized to access the configuration. If five (5) minutes elapses
without configuration activity, you will become unauthorized again.
Only one computer at a time is allowed to be authorized for access to the configuration menus. If you unexpectedly receive a request for user name and
password, it’s possible that another user is currently attempting to view or
modify the configuration via telnet or the serial port. An attempt to start
another HTTP session from another computer will be refused until this session
has been logged out.
How to use the Configuration Menu
1. Select Review/write changes to see the existing changes from the defaults.
Optionally select an Undo option to remove changes.
2. Locate and change configuration items by navigating in the Configuration
Menu.
3. Select the Submit Changes button to submit the changes on each form.
4. Repeat the above steps until all changes have been submitted.
5. Select Review/write changes and review the changes you have made.
6. Select Commit to write the changes.
Note: Some early browser versions can’t be convinced by the server to always
get a fresh copy of a document that was previously fetched. This might cause
old and misleading information to be displayed. Updating the browser, pressing
the reload button, or disabling the browser’s cache may be helpful.
Copyright e 1996-1997 Norand Corporation. All rights reserved.
6710 Access Point User’s Guide
4-91
SECTION 4
Configuration
Configuration Guidelines
Planning Your Installation
To plan your installation, refer to “Finding the Best
Location” in Section 3 for installation guidelines.
Using the Configuration Guide
The configuration guide in Table 4-1 summarizes the
necessary steps to set up an open wireless LAN. The
left-hand column provides basic setup information for a
simple network using 6710 Access Points on a single
Ethernet segment. This type of network may contain
bridges or hubs, but may not contain OWL/IP links through
routers, secondary LANs, or wireless access points. The
right-hand column provides additional steps for more
complex networks that include these additional
components.
Table 4-1
Configuration Guide
z = required step; Z = recommended step
Simple Network
Advanced Functions
1. Configuration Planning
4-92
Select which access points will be
primary and fallback super root
candidates (page 4-24).
6710 Access Point User’s Guide
Secondary LANs and OWL/IP:
Select which access points will be
primary and fallback designated
bridges (pages 4-57 and 4-79).
SECTION 4
Configuration
Table 4-1 (Continued)
Configuration Guide
z = required step; Z = recommended step
Simple Network
Advanced Functions
2. Preliminary Configuration Before
Installation
(Through DIAG Port):
Set LAN ID to a nonzero value
(page 4-23).
Configure access points with IP
address configuration (page 4-16) or
DHCP server name (page 4-20).
OWL/IP: Configure IP addresses
in access points serving as super
root candidates or OWL/IP designated bridge candidates.
DHCP may not be used to assign
addresses to these access points
unless a permanent lease is
assigned, and the access points
are rebooted prior to configuring
OWL/IP.
Configure the Ethernet port cable
type (page 4-42).
For the open wireless LAN frame
type, use DIX (the default) (page
4-41).
Configure the root priority in super
root candidates to specify primary
and fallback access points. Set all
other access points to root priority 0.
(Page 4-24.)
Set the highest root priority in
the primary super root, and lower
root priorities in no more than
two fallback super roots (page
4-24).
Secondary LANs or wireless
access point: If using WLIF
(2.4 GHz) radios, configure the
Slave radio setup in wireless
access points or secondary LAN
designated bridges (page 4-61).
6710 Access Point User’s Guide
4-93
SECTION 4
Configuration
Table 4-1 (Continued)
Configuration Guide
z = required step; Z = recommended step
Simple Network
Advanced Functions
3. Additional Configuration
(Through DIAG Port, or Remotely
Using Telnet or HTTP):
Set LAN ID to a nonzero value
(page 4-23).
Set Global Flooding parameters in
super root candidates (page 4-28).
Secondary LANs: Set the Flood
Register values (page 4-59) in
designated bridge candidates if
Global Flooding options are set to
Registered (page 4-30).
Secondary LANs and OWL/IP:
Set the Bridge Priority in all
designated bridge candidates
(page 4-57).
Configure the radio ports:
WLIF: Security ID (page 4-60),
Node Type (page 4-61), and Channel
and Subchannel (page 4-62).
900 MHz: Mode--Channel (page
4-74).
S-UHF: Frequency (page 4-76).
Enable the Proxy ARP Server if IP
wireless stations are being supported (page 4-36).
Set Ethernet filters to optimize
frames forwarded to wireless
stations (page 4-43).
4-94
6710 Access Point User’s Guide
OWL/IP: Configure all super
root candidates to Originate if
Root (page 4-82), and configure
the IP Addresses Table in each
candidate (page 4-83).
OWL/IP: Configure [TX Filter]
in super root candidates and
designated bridges (page 4-84).
Section 5
Software Download
This section describes the file system structure, File Menu
commands, and ROM command monitor for the access
point.
File System Structure
The access point’s file system has four separate segments
(analogous to a directory in most computer file systems):
Boot Segments 1 and 2
The first two segments (1 and 2) are .75 Mb boot segments.
Either boot segment can hold the bootable (executable)
FLASH file USTART29.BIN, which loads when you reboot
the access point. You can store different versions of
USTART29.BIN in the boot segments and then configure
the access point to use one of them.
Data Segments 3 and 4
The next two segments (3 and 4) are .25 Mb data segments.
Either data segment can hold the data file for the 900 MHz
radio (FALCON_D.29K) or the synthesized UHF radio
(SYNUHF_D.29K).
6710 Access Point User’s Guide
5-1
SECTION 5
Software Download
When you reboot the access point, the data files load into
the radio module. (Note that the WLIF radio does not have
a data file.)
Active and Inactive Segments
The access point can have an active boot and data segment,
as well as an inactive boot and data segment:
The inactive segment is where you can download a
new file.
" The active segment contains the files that are loaded
at boot time. An active boot segment pointer and an
active data segment pointer point to the appropriate
“active” segments. The segment not pointed to by one
of these “active” pointers is the inactive boot or data
segment.
After you load an inactive segment with a new file, you can
change the “active” pointers to the segment that holds the
new file. You then reboot the access point so the changes
take effect. At this point the following occur:
" NOTE:
5-2
The access point is running the new version of
software.
The segment holding the new files is now the “active”
segment.
The old version of software is in an inactive segment.
If the active segment is empty when you reboot the access point, you
must establish a new session through the DIAG port to reload the
access point with software.
6710 Access Point User’s Guide
SECTION 5
Software Download
RAM Segment
The file system supports a fifth segment known as the RAM
segment. The RAM segment is similar to the other
segments, except the file contents are stored in RAM and
the segment’s contents are lost when you reboot the access
point.
The RAM segment is limited to a maximum of 4096 bytes.
It is used to hold small script files during the software
download process.
When you view the file directory, the program currently
executing displays as if it were in the RAM segment. This
program, however, is not really a part of the RAM segment.
You cannot delete or erase it, and TFTP commands cannot
read or write to it. It displays as part of the file directory so
you can determine which version of software is running.
Segment Names
You must enter a segment for most access point file system
commands. You can type the numeric digits (1, 2, 3, or 4)
corresponding to the respective file segments, or you can
use the following mnemonics (the access point translates
them to a segment number):
Mnemonic
Description
AB
Active boot segment.
IB
Inactive boot segment.
AD
Active data segment.
ID
Inactive data segment.
RAM
RAM segment.
6710 Access Point User’s Guide
5-3
SECTION 5
Software Download
File Names
Several file system commands require you to enter file
names. You can precede file names by a segment number or
name followed by a colon.
EXAMPLE 1:
AB:USTART29.BIN refers to the file USTART29.BIN in the active
boot segment (segment 1 or 2).
EXAMPLE 2:
1:USTART29.BIN refers to the file USTART29.BIN in segment 1.
If you omit the segment number or segment name, the
access point searches the segments in this order until it
finds a file matching the file name:
RAM, 1, 2, 3, 4
Downloading Programs
You can download new programs to the access point while it
is operating. The unit has two program FLASH directories
so that if an issue exists with the download of the new
FLASH, the system can reboot to the previous version. An
internal timer allows the activation of the new software
program to be immediate or activated at a later time.
File Menu Commands
Commands for software download and other processes are
located on the File Menu. To display the commands, type
the following at the Main Menu prompt:
>file
5-4
6710 Access Point User’s Guide
SECTION 5
Software Download
The File Menu appears:
Loading configuration from EEPROM
Command
Fb
Fd
Fdel
Fe
Tftp
Script
SDVars
Exit
Description
fb
fd ( | all) - directory list
fdel - delete file
fe ( | all) - erase segment(s)
File transfer
Execute script files
Software download variables
Return to main menu
File>
Fb Command
Use Fb to make inactive segments active. The format is:
File>fb
EXAMPLE 1:
is the name or number of the boot
segment to be activated. Boot segments are 1 and 2,
or AB (active boot) and IB (inactive boot).
is the name or number of the data
segment to be activated. Data segments are 3 and 4,
or AD (active data) and ID (inactive data).
This command makes segment 1 the active boot segment:
File>fb 1
6710 Access Point User’s Guide
5-5
SECTION 5
EXAMPLE 2:
Software Download
This command makes segment 1 the active boot segment and
segment 4 the active data segment:
File>fb 1 4
You can use an asterisk (*) in place of either or to tell the access point to not
change that segment. For example, this command leaves
the active boot segment unchanged and changes the active
data segment to 4:
File>fb * 4:
This can also be accomplished by:
File>fb ab: 4:
" NOTE:
Colons are optional but you can use them for better command
consistency.
Fd Command
Use Fd to display the FLASH file system directory,
including information about the boot file. For example:
Boot
Boot
Boot
Data
File=USTART29.BIN
Address=250ef0
Segment=1
Segment=3
File Directory:
seg
type
length
date
USTART29.BIN
279299
12-05-97 15:25:58 v01.27
USTART29.BIN
331444
12-19-97 15:28:22 v01.27
FALCON_D.29K
014965
12-15-97 13:30:01 v02.20
SYNUHF_D.29K
019159
12-11-97 09:10:35 v02.20
5-6
6710 Access Point User’s Guide
time
ver
SECTION 5
Software Download
Following are field descriptions:
“File Directory name” lists the names of all files
currently loaded in FLASH.
" “seg” is the segment in which the boot file is loaded.
(R indicates the RAM segment.)
" “type” is the type of file: E for executable (boot file), D
for data.
" “length” is the file size in bytes.
" “date” and “time” are the date and time the file was
created.
" “ver” is the file version number in the format vxx.xx.
You should use the Fd command often to ensure that the
correct version of FLASH file USTART29.BIN is in the
active boot segment.
" NOTE:
If the active segment contains no files when you reboot the access
point, the unit enters the ROM command monitor and you lose the
ability to Telnet to it during this session. In this case you must
access the unit through its DIAG port to correct the problem.
Fdel Command
Fdel deletes the file name from the access point file system.
When you delete a file, it is marked as invalid but remains
in the file system. To reclaim the space from a deleted file,
you must erase the segment in which the file resides.
The command’s format is:
File>fdel
EXAMPLE:
This command erases the file USTART29.BIN saved in the inactive
boot drive:
File>fdel ib:USTART29.BIN
6710 Access Point User’s Guide
5-7
SECTION 5
Software Download
Fe Command
Fe erases files in a specified segment of FLASH memory.
Once you have erased the files, you can restore them only
by reloading them from another source. The command’s
format is:
File>fe
is a segment number, a segment name, or the
word “all.” Specifying “all” erases all FLASH file segments
but does not erase the RAM segment.
EXAMPLE 1:
This command erases FLASH segment 1:
File>fe 1:
EXAMPLE 2:
This command erases the inactive boot segment:
File>fe ib:
TFTP Command
Use the Tftp command to display the following screen:
Argument
Get
Put
Server
Description
Get
Put
Start/Stop/Query TFTP Server
Display this help
File>
An access point (client) can obtain files from a TFTP server.
The server may be one access point configured to act as the
server, or another device on the network. The server must
operate in octet (8 bit) mode.
5-8
6710 Access Point User’s Guide
SECTION 5
Software Download
As a server, the access point can service read and
write requests from an access point client. To operate
as a TFTP server, the access point must be loaded
with these software versions:
" ROM version 1.13 or greater
" FLASH (USTART29.BIN) version 1.23 or greater
" As a client, the access point can read files from and
write files to any TFTP server on the network. The
client always requests octet mode.
In general, TFTP client sessions should fail only if the
server is not responding because it is busy serving other
clients or because it has not been started. In either case,
the access point back-off algorithm should prevent excessive
network traffic when many access points are trying to
contact a TFTP server. When you type TFTP client
commands at the command line, the access point does not
retry failed transfers.
" NOTE:
Near the end of this section is a detailed example of how to use
TFTP to upgrade an access point with a new version of FLASH. The
example incorporates most of the TFTP commands.
TFTP Server
Use the Server command to display TFTP commands. The
format is:
File>tftp server
These commands are supported:
Help for Server command:
Argument
Description
Start
Start TFTP server
Stop
Stop TFTP server
Log
Display TFTP server message log
Display this help
File>
6710 Access Point User’s Guide
5-9
SECTION 5
Software Download
Server Start
Use Server Start to enable the access point as a TFTP
server. The format is:
File>tftp server start
After you issue this command, the access point responds to
TFTP client requests directed to its IP address. When
acting as a server, the access point TFTP supports up to
four concurrent TFTP sessions.
Server Stop
Use Server Stop to stop the access point from being a TFTP
server when you are done transferring files. The format is:
File>tftp server stop
After you issue this command, the access point no longer
responds to TFTP client requests. Current TFTP sessions
with the server are completed, however.
Server Log
Server Log saves a history of TFTP client requests. The
command’s format is:
File>tftp server log
The TFTP server log contains useful TFTP server status
information starting from when you set up the server. You
must reboot the access point to clear the log.
TFTP Client Commands
The TFTP client in the access point supports standard Get
and Put commands.
5-10
6710 Access Point User’s Guide
SECTION 5
Software Download
Get
Use Get on an access point client to download software from
a TFTP server (a PC or another access point). The format
is:
File>tftp get
EXAMPLE 1:
is the IP address of the server (or “*”
which indicates the value of the ServerIpAddress
variable, described later in this section).
is the name of the file to get from
the server. The file name can contain directory path
information and must be in the format required by the
server’s operating system.
The file must have an appropriate 29K file header.
Boot files and data files are normally delivered with
the proper file header attached, but script files you
create must have the file header appended before
transfer to an access point.